A representative for a pro-Islamic State hacking group issued a chilling warning to members of the U.S. military and government Wednesday, promising that “very soon” followers of the organization would retaliate for overseas bombing targeting the terror organization.
Speaking to TheBlaze using smartphone messenger application Kik, a representative for the Islamic State Hacking Division said the group is constantly spying on U.S. servicemen. The organization on Tuesday published personal information purporting to belong to U.S. military and government online.
“Just like they spy on muslims, we are spying on them, watching their employees, watching their soldiers, recording their movements and taking their location information and passing it on to the soldiers of the islamic state,” the anonymous male member told TheBlaze. Continue reading
As described earlier in a previous post, these are essentially proxy groups with state backing. They create a group that allows for plausible deniability, showing no attributable activity.
A security firm is warning that a group of Russian hackers known for targeting military, government and media organizations is now preparing to attack banks in the U.S. and elsewhere.
The group’s preparations, which have included writing new malware, registering domain names similar to those of intended targets, and setting up command-and-control servers, were discovered by analysts from security firm Root9B.
A Chinese hacking group infiltrated the Forbes.com site in November and used it to launch targeted attacks against website visitors from U.S. banking and defense companies, a cybersecurity company said on Tuesday.
The attack took place over a period of several days, starting Nov. 28, and took advantage of unpatched vulnerabilities in Adobe Flash and Microsoft Internet Explorer 9, according to ISight Partners. The vulnerability was kept quiet until Tuesday, when Microsoft issued a patch to plug the security hole in its web browser. Adobe had previously published a patch for Flash. Continue reading
(Reuters) – A sophisticated hacking group recently attacked a U.S. public utility and compromised its control system network, but there was no evidence that the utility’s operations were affected, according to the Department of Homeland Security.
DHS did not identify the utility in a report that was issued this week by the agency’s Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT. Continue reading