Tech

US uncovers “Swiss Army knife” for hacking industrial control systems

Enlarge (credit: cravetiger | Getty Images) Malware designed to target industrial control systems like power grids, factories, water utilities, and oil refineries represents a rare species of digital badness. So when the United States government warns of a piece of code built to target not just one of those industries, but potentially all of them, […]

Tech

Russia’s Sandworm hackers attempted a third blackout in Ukraine

Enlarge (credit: Getty Images | Sundry Photography) More than half a decade has passed since the notorious Russian hackers known as Sandworm targeted an electrical transmission station north of Kyiv a week before Christmas in 2016, using a unique, automated piece of code to interact directly with the station’s circuit breakers and turn off the […]

Tech

Russia’s Sandworm hackers attempted a third blackout in Ukraine

Enlarge (credit: Getty Images | Sundry Photography) More than half a decade has passed since the notorious Russian hackers known as Sandworm targeted an electrical transmission station north of Kyiv a week before Christmas in 2016, using a unique, automated piece of code to interact directly with the station’s circuit breakers and turn off the […]

Tech

Feds allege destructive Russian hackers targeted US oil refineries

Enlarge / Critical infrastructure sites such as this oil refinery in Port Arthur, Texas, rely on safety systems. (credit: IIP Photo Archive) For years, the hackers behind the malware known as Triton or Trisis have stood out as a uniquely dangerous threat to critical infrastructure: a group of digital intruders who attempted to sabotage industrial […]

Tech

Scammers have 2 clever new ways to install malicious apps on iOS devices

Enlarge (credit: Getty Images) Scammers pushing iOS malware are stepping up their game by abusing two legitimate Apple features to bypass App Store vetting requirements and trick people into installing malicious apps. Apple has long required that apps pass a security review and be admitted to the App Store before they can be installed on […]

Tech

Researchers find threat group that has been active for 5 years

Enlarge / Warning: Data transfer in progress (credit: Yuri_Arcurs/Getty Images) Researchers on Tuesday revealed a new threat actor that over the past five years has blasted thousands of organizations with an almost endless stream of malicious messages designed to infect systems with data-stealing malware. TA2541, as security firm Proofpoint has named the hacking group, has […]

Tech

Researchers find threat group that has been active for 5 years

Enlarge / Warning: Data transfer in progress (credit: Yuri_Arcurs/Getty Images) Researchers on Tuesday revealed a new threat actor that over the past five years has blasted thousands of organizations with an almost endless stream of malicious messages designed to infect systems with data-stealing malware. TA2541, as security firm Proofpoint has named the hacking group, has […]

Tech

Mac malware spreading for ~14 months is growing increasingly aggressive

Enlarge (credit: Getty Images) Mac malware known as UpdateAgent has been spreading for more than a year, and it is growing increasingly malevolent as its developers add new bells and whistles. The additions include the pushing of an aggressive second-stage adware payload that installs a persistent backdoor on infected Macs. The UpdateAgent malware family began […]

Tech

Android malware can factory reset phones after draining bank accounts

Enlarge (credit: Getty Images) A banking-fraud trojan that has been targeting Android users for three years has been updated to create even more grief: besides draining bank accounts, the trojan can now activate a kill switch that performs a factory reset and wipes infected devices clean. Brata was first documented in a post from security […]

Tech

Booby-trapped sites delivered potent new backdoor trojan to macOS users

Enlarge (credit: Getty Images) Researchers have uncovered advanced, never-before-seen macOS malware that was installed using exploits that were almost impossible for most users to detect or stop once the users landed on a malicious website. The malware was a full-featured backdoor that was written from scratch, an indication that the developers behind it have significant […]