Wednesday, May 18, 2022
TOP TECH
  • Home
  • Technology News
  • Artificial Intelligence
  • Computing
  • Gaming & Culture
  • Blockchain
  • Security
  • Space
  • Gadgets
No Result
View All Result
TOP TECH
No Result
View All Result
Photo of the Remarkables mountain range in Queenstown, New Zealand.
Home Security

Who Is the Hacker Behind the Lapsus$ Extortion Gang?

by admin
March 26, 2022
in Security
0
Who Is the Hacker Behind the Lapsus$ Extortion Gang?
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter


World's Best Mobile app builder that turns your website into a Stunning mobile app in 1 click

There are quiet weeks within the safety world, after which there are weeks like this one. 

Monday kicked off with the Lapsus$ extortion gang—a cybercriminal group so weird and with such high-profile targets that some individuals suspected they have been Russian state-sponsored hackers—claiming that it had breached Okta, a preferred authentication companies firm, simply hours after it leaked supply code for Microsoft’s Bing search, Bing Maps, and Cortana voice assistant. Provided that Okta is utilized by some 14,000 corporations, the information appeared “actually, actually unhealthy,” as one safety skilled informed WIRED. Okta’s fumbled messaging across the incident only made matters worse. Finally, the corporate stated that hackers had accessed the accounts of an worker at third-party Okta subprocessor Sykes, doubtlessly placing as many as 366 prospects in danger. However, as we’ll get into beneath, that was solely the beginning of Lapsus$’s eventful week.

Russia’s tragic battle in opposition to Ukraine, in the meantime, continues to overshadow all else. Because the destabilizing destruction continues, we detailed the tightrope President Biden (and, by extension, the NATO alliance) should stroll as Russian president Vladimir Putin grows more and more remoted and the obvious probability of Russia claiming management of Ukraine dwindles. We additionally took a glance again at the biggest hack to take place since the war began in late February. The assault, in opposition to the bottom community of the KA-SAT satellite tv for pc owned by US-based Viasat, bricked modems and in any other case knocked offline some 27,000 prospects throughout Europe. The thriller of who carried out the assault, nevertheless, has reportedly been solved. (Trace: Russia.)

The ceaseless saga of Russian hackers culminated on Thursday when the US Division of Justice unsealed a pair of indictments against alleged Russian government hackers who authorities say focused US and worldwide power corporations worldwide. One indictment focuses on three hackers stated to work for Russian intelligence company FSB, as a part of a gaggle recognized by safety researchers as Berserk Bear, Dragonfly 2.0, and Havex. Whereas Berserk Bear’s alleged hacking focused nuclear services within the US, the group will not be recognized to have precipitated any bodily destruction as a part of its hacking actions. The identical can’t be stated for the Russian hacker group often known as Xenotime, which safety researchers say precipitated disruptions at a Saudi oil refinery in 2017 and, in keeping with the second indictment unsealed Thursday, focused a US oil refinery with equally harmful intentions.

Comply with alongside for the most recent on these tales and extra on this week’s safety information roundup.

Quickly after Lapsus$ claimed to have hacked Okta and leaked Microsoft supply code (which Microsoft later confirmed), Bloomberg reported that security researchers identified the gang’s ringleader to be a youngster from Oxford, UK, who’s “so expert at hacking—and so quick—that researchers initially thought the exercise they have been observing was automated.” Nearly as fast have been the arrests that adopted: The BBC reported hours after Bloomberg’s report that Metropolis of London police arrested seven individuals, ages 16 to 21, in reference to Lapsus$ exercise, which along with concentrating on Okta and Microsoft reportedly included hacking Samsung, Nvidia, EA, and Ubisoft. The 16-year-old recognized by safety researchers might or might not have been among the many arrested group. Regardless, police reportedly released all seven with out prices, and the gang’s chaotic power has thus far continued unabated.

The primary lingering query surrounding the Viasat satellite tv for pc hack, which disrupted Ukranian army communications together with that of tens of hundreds of civilian and company prospects all through Europe, was whodunnit? The reply, as anticipated, was Russia, in keeping with unnamed US officers who spoke with The Washington Put up. Particularly, the assault was reportedly instigated by the GRU, the Russian army intelligence company. Whereas the GRU is house to Sandworm, the hacker group answerable for finishing up devastating cyberattacks in opposition to Ukraine and unleashing the expensive NotPetya cyberattack, it is not recognized whether or not Sandworm hackers have been concerned within the Viasat hack.

The White Home on Monday warned US corporations of “evolving intelligence that Russia could also be exploring choices for potential cyberattacks” in retaliation for US sanctions in opposition to Russia over its battle in opposition to Ukraine. The White Home provided few particulars however hinted at labeled briefings for potential targets and urged corporations to institute stronger safety safeguards. Given the Biden administration’s tactic of releasing intelligence within the lead-up to Russia’s invasion of Ukraine final month that proved correct, many assumed an assault could possibly be imminent. Because the week wore on, extra particulars emerged: CNN reported that the FBI had warned 5 US power corporations that Russian hackers had scanned their networks—an early step typically used to determine potential avenues of assault. And the US Cybersecurity and Infrastructure Safety Company held a call with greater than 13,000 “business ‘stakeholders’” to reply their questions and additional encourage extra strong safety on company networks. 

Russia is not the one nation whose hackers have been busy. Google’s Menace Evaluation Group this week revealed that North Korean hackers efficiently exploited a zero-day vulnerability within the Chrome net browser for roughly a month earlier than the corporate issued a patch. One marketing campaign, which TAG researchers dubbed Operation Dream Job, focused some 250 individuals in media and tech with faux job recruiter emails that included a hyperlink that, when clicked, would provoke the exploit equipment. The opposite marketing campaign, Operation AppleJeus, particularly focused 85 individuals in cryptocurrency and fintech utilizing the identical exploit equipment that was deployed in Operation Dream Job. Whereas North Korean hackers have used similar tactics earlier than, the revelation serves as a reminder to always update your apps.


Extra Nice WIRED Tales





Source link

--->>Make 1,000$ A Day - Click Here<<---
SUBSCRIBE NOW

No spam guarantee.

--->>Make Money Working 30 Minutes A Day - Click Here<<---
--->>Start Changing Your Life Today - Click Here<<---
ShareTweetShare
Photo of the Remarkables mountain range in Queenstown, New Zealand.

Related Posts

Report: 88% of business leaders would pay the ransom if hit by a cyberattack
Security

Report: 88% of business leaders would pay the ransom if hit by a cyberattack

May 18, 2022
This Hacktivist Site Lets You Prank-Call Russian Officials
Security

This Hacktivist Site Lets You Prank-Call Russian Officials

May 18, 2022
Ask the experts: Mitigating risk in securing cloud environments
Security

Ask the experts: Mitigating risk in securing cloud environments

May 18, 2022
Your iPhone Is Vulnerable to a Malware Attack Even When It’s Off
Security

Your iPhone Is Vulnerable to a Malware Attack Even When It’s Off

May 17, 2022
Cornami raises $68M to support quantum encryption
Security

Cornami raises $68M to support quantum encryption

May 17, 2022
Crippling AI cyberattacks are inevitable: 4 ways security pros can prepare
Security

Crippling AI cyberattacks are inevitable: 4 ways companies can prepare

May 17, 2022
Next Post
AEW: Fight Forever trademark shows wrestling game’s likely name

AEW: Fight Forever trademark shows wrestling game's likely name

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

DON'T MISS OUT!
Subscribe To Our Newsletter So You Do Not Miss Any Updates Or Special Offers
We promise not to spam you. Unsubscribe at any time.
Invalid email address
Thanks for subscribing!

Recommended

The latest app to get a Windows 11 redesign? The humble Notepad

The latest app to get a Windows 11 redesign? The humble Notepad

October 12, 2021
API security ‘arms race’ heats up

API security ‘arms race’ heats up

November 19, 2021
Linux vulnerability can be ‘easily exploited’ for local privilege escalation, researchers say

Linux vulnerability can be ‘easily exploited’ for local privilege escalation, researchers say

January 26, 2022
Microsoft launches new Defender capabilities for fixing Log4j

Microsoft launches new Defender capabilities for fixing Log4j

December 29, 2021
Latest Moto Edge features improved camera and a faster processor

Latest Moto Edge features improved camera and a faster processor

August 19, 2021
Weird Al’s Getting a Magnificently Elaborate Pinball Machine

Weird Al’s Getting a Magnificently Elaborate Pinball Machine

February 24, 2022

Recent News

Microsoft previews a new, totally redesigned Outlook for Windows app

Microsoft previews a new, totally redesigned Outlook for Windows app

May 18, 2022
How AI powers modern product lifecycle management

How to use responsible AI to manage risk

May 18, 2022
Apple details new iPhone features like door detection, live captions

Apple details new iPhone features like door detection, live captions

May 18, 2022

Photo of the Remarkables mountain range in Queenstown, New Zealand.

Categories

  • Artificial Intelligence
  • Blockchain
  • Computing
  • Gadgets
  • Gaming & Culture
  • Security
  • Space
  • Technology News
Photo of the Remarkables mountain range in Queenstown, New Zealand.

Find Via Tags

adds Amazon Android app Apple Apples apps automation Blockchain Business Cloud cybersecurity Data digital Facebook features Future game games gaming Google hackers latest launches Metaverse Microsoft million open platform raises report Review Security series software Star Startup tech TechCrunch trailer Ukraine Windows work world years
  • Privacy & Policy
  • About Us

© 2021 Top Tech

No Result
View All Result
  • Home
  • Technology News
  • Artificial Intelligence
  • Computing
  • Gaming & Culture
  • Blockchain
  • Security
  • Space
  • Gadgets

© 2021 Top Tech

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.