Search Results for “Jack Stubbs”


July 24, 2019
Joseph Menn, Jack Stubbs / Reuters

Joseph Menn, Jack Stubbs / Reuters  
Russian Defense Contractor Sanctioned for 2016 Presidential Election Interference Has Developed Spyware Called Monokle Used to Spy on Android Phones

A Russian defense contractor, St. Petersburg-based Special Technology Center (STC), accused by the United States of supporting cyber-attacks has developed sophisticated surveillance software dubbed Monokle used to spy on smartphones, researchers at Lookout Security say. STC  developed code that has been aimed at a small number of targets, including those interested in a rebel militia in Russian-allied Syria, according to Lookout’s report. The report says the firm discovered the malware aimed at phones running Google’s Android almost a year ago. The malware can be operated remotely and communicated with an Internet Protocol address that was also used to send commands to defensive software made by STC. Monokle can be installed on victims’ devices in multiple ways, including through corrupted versions of popular apps and in some cases installed certificates that allowed it to intercept encrypted internet traffic. It has also attempted to capture user codes for unlocking devices. Special Technology Center was sanctioned by the U.S. Government in connection with interference in the 2016 US presidential elections

August 2, 2019
Jack Stubbs / Reuters

Jack Stubbs / Reuters  
Facebook Takes Down More Than 350 Accounts and Pages With 1.4 Million Followers in Propaganda Operation Tied to Saudi Government

In its ongoing efforts to combat “coordinated inauthentic behavior,” Facebook said it had suspended more than 350 accounts and pages with about 1.4 million followers connected to the government of Saudi Arabia, the company. The accounts and pages promoted state propaganda and attacked regional rivals, primarily targeting countries in the Middle East and North Africa, including Qatar, the UAE, Egypt Palestine, the first such network tied to the Saudi government on Facebook. The operation created accounts to look like local news operations and spent $100,000 on Facebook advertising. The Saudi government denies any involvement in the operation.

Related: SecurityWeek, CNN.com, The Hill: Cybersecurity, Tech Insider, Ad Week, Facebook Newsroom, Mashable, iTnews – Security, EJ Insight, Reuters, Ad Week, Digital Trends, The Hill, Cyberscoop, Daily Beast, Al Jazeera


September 6, 2019
Jack Stubbs / Reuters

Jack Stubbs / Reuters  
China Has Broken Into Telecom Networks to Track Uighur Travelers in Central and Southeast Asia, Sources

As part of a wider cyber-espionage campaign targeting “high-value individuals” such as diplomats and foreign military personnel, hackers working for the Chinese government have broken into telecoms networks to track Uighur travelers in Central and Southeast Asia, according to two intelligence officials and two security consultants. The Muslim minority group is considered a security threat by Chinese rulers and has have been subject to mass detention, mandatory “retraining” and widespread surveillance. According to the sources, different groups of Chinese hackers have compromised telecoms operators in countries including Turkey, Kazakhstan, India, Thailand and Malaysia, which are countries used by Uighurs to travel between Xinjiang and Turkey to escape persecution.

June 26, 2019
JACK STUBBS, JOSEPH MENN and CHRISTOPHER BING / Reuters

JACK STUBBS, JOSEPH MENN and CHRISTOPHER BING / Reuters  
Years-Long ‘Cloud Hopper’ Hacking Campaign Tied to Chinese Government Hit Eight of World’s Largest Technology Service Providers, Attacks Emanated to Waves of Clients

Eight of the world’s biggest technology service providers were hacked by teams of spies connected to the Chinese Ministry of State Security in an elaborate and years-long campaign called Cloud Hopper, a Reuters investigation discovered. Cloud Hopper was the subject of a U.S. indictment in December that accused two Chinese nationals of identity theft and fraud. At that time, prosecutors described an elaborate operation that victimized multiple Western companies but stopped short of naming them, although Reuters was able to identify two of them, Hewlett Packard Enterprise and IBM. The remaining six companies are Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation and DXC Technology. Waves of clients of these eight companies were also victims, including Ericsson, Sabre, and shipbuilding company Huntington Ingalls Industries, although it is impossible to say how many clients of the service providers were compromised.

Related: New York Post, CBC, Kyiv Post, GlobalNews.ca, Slashdot, IT Pro, CRN

Tweets:@georgevhulme @Bing_Chris


June 27, 2019
Christopher Bing, Jack Stubbs, Joseph Menn / Reuters

Christopher Bing, Jack Stubbs, Joseph Menn / Reuters  
Hackers From Western Spy Agencies Broke Into Russia’s Yandex to Deploy Rare Regin Malware to Spy on Developers, Sources

Hackers working for Western intelligence agencies broke into Russian Internet search company Yandex, known as “Russia’s Google,” in late 2018 deploying a rare type of malware called Regin in an attempt to spy on user accounts in the company’s research and development unit, four people with knowledge of the matter told Reuters. Regin has been known to be used by intelligence agencies in the Five Eye countries, which is composed of the United States, Britain, Australia, New Zealand, and Canada. The sources said the hackers appeared to be searching for technical information that could explain how Yandex authenticates user accounts, which could help spy agencies impersonate a Yandex user and access their private messages. Yandex spokesman Ilya Grabovsky acknowledged the attack but said it had been neutralized at an early stage and caused no damage.

Related: CNBC Technology, Slashdot, CNET News, Techradar, The Register – Security, ARN, Security – Computing, Deccan Chronicle

Tweets:@josephmenn


May 2, 2019
Jack Stubbs / Reuters

Jack Stubbs / Reuters  
’10KBlaze’ Exploits Are Targeting 50,000 Misconfigured SAP NetWeaver Installations, Enable Hackers to Steal and Modify ‘Business Critical’ Information

Exploits known as “10KBLAZE” are targeting administrative misconfigurations of SAP NetWeaver installations, including S4/HANA, researchers at security firm Onapsis report. The misconfigurations enable a hacker to steal anything that sits on a company’s SAP systems and also give them the ability to modify any information there. SAP sells “business critical” software that allows companies to track customer and business interactions. NetWeaver is a technology platform that integrates a variety of business processes into an SAP environment. An estimated 50,000 companies are exposed to the 10KBLAZE exploits as a result of the vulnerabilities. SAP issued proper configuration instructions for the installations in 2009 and 2013 but about 90% of the vulnerable SAP systems have not followed the advice.

April 16, 2019
Christopher Bing, Jack Stubbs / Reuters

Christopher Bing, Jack Stubbs / Reuters  
U.S. Reportedly Plans to Pitch Allies on ‘Intellectual Framework’ to Effectively Bar Huawei, Chinese Vendors From 5G Networks

The U.S. will push its allies at a meeting in Prague next month to adopt shared security and policy measures that will make it more difficult for China’s Huawei to dominate 5G telecommunications networks, according to sources familiar with the matter and documents seen by Reuters. The meeting from May 2 -3 will be attended by officials from 30 countries to agree on security principles for next-generation telecoms network. Against the backdrop of a strong campaign by the U.S. against Huawei due to fear of spying by the Chinese government, the U.S. reportedly plans to adopt a softer approach against the telecom tech giant while in Prague, with U.S. officials hoping to provide the “intellectual framework” needed for other countries to effectively bar Chinese vendors.