US Treasury sanctions Russian research institute behind Triton malware

Discussion in 'malware problems & news' started by guest, Oct 24, 2020.

  1. guest

    guest Guest

    US Treasury sanctions Russian research institute behind Triton malware
    US imposes sanctions against Russia's Central Scientific Research Institute of Chemistry and Mechanics (CNIIHM)
    October 23, 2020
    https://www.zdnet.com/article/us-tr...ian-research-institute-behind-triton-malware/
    U.S. Department of the Treasury: Treasury Sanctions Russian Government Research Institution Connected to the Triton Malware
     
  2. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,078
    Location:
    DC Metro Area
    "Anne Neuberger to lead SolarWinds response

    The White House has tapped Anne Neuberger, a career intelligence veteran and former senior cybersecurity official at the National Security Agency, to lead the government's response to the SolarWinds hack...

    Neuberger formerly served as the director of the NSA's cybersecurity division and was tapped by the White House to be the deputy national security advisor for cyber and emerging technology at the National Security Council..."

    https://fcw.com/articles/2021/02/11/neuberger-usg-hack-lead.aspx
     
  3. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,078
    Location:
    DC Metro Area
    "Swiss Firm Says It Has Accessed Servers of a SolarWinds Hacker

    (Bloomberg) -- A Swiss cybersecurity firm says it has accessed servers used by a hacking group tied to the SolarWinds breach, revealing details about who the attackers targeted and how they carried out their operation. The firm, PRODAFT, also said the hackers have continued with their campaign through this month...

    The aim of the hacking group, dubbed SilverFish by the researchers, was to spy on victims and steal data, according to PRODAFT’s report...

    the report offers insights into how the hacking organization operated...

    SilverFish’s hackers maintained regular working hours and were most active Monday to Friday between the hours of 8 a.m. and 8 p.m., the report said. The hackers operated servers in Russia and Ukraine, and shared some of the same servers as a notorious Russian criminal hacking group known as Evil Corp., the report said..."

    https://www.bnnbloomberg.ca/swiss-firm-says-it-has-accessed-servers-of-a-solarwinds-hacker-1.1579756
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.