Search Results for “NICOLE PERLROTH”


June 17, 2019
Cyberlaw Podcast

Cyberlaw Podcast  
Episode 268: “Treason” at the New York Times

Stewart Baker interviews New York Times national security correspondent David Sanger (@SangerNYT) on his latest piece with Nicole Perlroth. Stewart is also joined by Mark MacCarthy (@Mark_MacCarthy), Nick Weaver (@ncweaver), and Steptoe Summer Associate David Benger to discuss other recent developments including the RAMBleed exploit, a spy used an AI-generated face to target people on LinkedIn and more.

May 25, 2019
Nicole Perlroth and Scott Shane / New York Times

Nicole Perlroth and Scott Shane / New York Times  
EternalBlue Exploit Developed by NSA Is a Key Component in Ransomware That Has Crippled Baltimore’s Government Systems, Report

A key component of the malware that cybercriminals used in the ransomware attack on Baltimore municipal systems, which has crippled the city government for three weeks now, is EternalBlue, a sophisticated exploit developed by the NSA’s elite Equation Group and exposed by agents known as the ShadowBrokers, according to security experts briefed on the case. EternalBlue was also a factor in earlier attacks in Texas and Pennsylvania, sources say. Experts say the damage in Baltimore is far more extensive than it would have been without the EternalBlue component because the cyberweapon exploits a vulnerability in unpatched Microsoft software that allows hackers to spread their malware faster and farther than they otherwise could. While state hackers from Russia, North Korea, and China have deployed EternalBlue in their attacks since its exposure in 2017, most notably in the notorious WannyCry ransomware worm, the NSA has not accepted responsibility for it or even answered the most basic questions related to it.

June 1, 2019
Scott Shane and Nicole Perlroth / New York Times

Scott Shane and Nicole Perlroth / New York Times  
Rep. Ruppersberger From Maryland Said NSA Denies One of Its Exploits, EternalBlue, Was Used in Baltimore Ransomware Attack

A Democratic U.S. congressman from Maryland, Representative C.A. Dutch Ruppersberger, said that the National Security Agency (NSA) had denied that one of its hacking tools, stolen in 2017, was used in a ransomware attack on Baltimore’s government that had disrupted city services for more than three weeks. The newspaper had been told that by people directly involved in the investigation in Baltimore that the N.S.A. tool, EternalBlue, was found in the city’s network by all four contractors hired to study the attack and restore computer services. Ruppersberger said that senior leaders of NSA told him that “there is no evidence at this time that EternalBlue played a role in the ransomware attack affecting Baltimore City.” He also said the NSA exploit “was not used to gain access nor to propagate further activity within the network.”

Related: New York Times, Baltimore Sun, Panda SecurityStateScoop, Hackaday, DataBreachToday.com, Security Ledger, Malwarebytes Unpacked,

Tweets: @ScottShaneNYT


June 16, 2019
David E. Sanger and Nicole Perlroth / New York Times

David E. Sanger and Nicole Perlroth / New York Times  
U.S. Is Stepping up Incursion Into Russia’s Power Grid to Deploy Cyber Tools, Officials Withhold Details From Trump for Fear He Might Disrupt, Expose Sensitive Operation, Report

The New York Times reported that the U.S. is stepping up its incursion into Russia’s electric power grid in a warning to President Vladimir Putin that the U.S. has new authority to deploy cyber tools more aggressively, according to current and former government officials. Following the elevation of cyber as a military domain and after Donald Trump granted the military greater leeway to use cyber tools in a “defend forward ” fashion via a still-classified document known as National Security Presidential Memoranda 13, the U.S. has engaged in various actions including “signaling” to Russia its presence in its grid and establishing a “persistent presence” inside Russian networks. Pentagon and intelligence officials declined to go into detail with Donald Trump about their operations against Russia for fear he might countermand them or discuss them with foreign officials.

Related: RT USA, Digital Trends, CNET, Washington Examiner, The Merkle, Task & Purpose, CNN.com – Politics, Gizmodo, POLITICO, Engadget, Mother Jones, Star Tribune, PressTV, The Hill: Cybersecurity, NBC News Top Stories, Daily Kos, TIME, South China Morning Post, POLITICO, Daily Mail,RT USA, Star Tribune, Ubergizmo, AP Breaking News, The Guardian, Gizmodo, Vanity Fair, RAPPLER, The Verge

RT USA: Hack away! NYT says US planted CYBER KILL SWITCH into Russian power grid… media shrugs
Digital Trends: The Russian hackers behind Triton tried to attack the U.S. power grid
CNET: US Cyber Command powers up attacks against Russia’s electrical grid
Washington Examiner : US ramps up attacks on Russian power grid – Washington Examiner
The Merkle: Power Grid Hacking Attacks in the US and Russia are Bound to Escalate
Task & Purpose: US Cyber Command is reportedly going on offense against Russia’s power grid
CNN.com – Politics: New York Times: US ramping up cyber attacks on Russia
Gizmodo: The US Has Allegedly Placed Malware Deep in Russia’s Power Grid
POLITICO: Trump slams NYT report on U.S. cyber attacks against Russia
Engadget: The US planted offensive malware in Russia’s power grid
Mother Jones: America Is Targeting the Russian Electric Grid — But Don’t Tell the President
Star Tribune: U.S. buries digital land mines in Russia’s power grid
PressTV: US targeting Russia power grid in increased online attacks: Report
The Hill: Cybersecurity: US ramping up digital attacks on Russia’s power grid: report
NBC News Top Stories: New York Times slams Trump: ‘Accusing the press of treason is dangerous’
Daily Kos: Trump again attacks press as ‘Enemy of the People’, suggests public may ‘demand’ he not leave office
TIME: President Trump Accuses the New York ‘Times’ of a ‘Virtual Act of Treason’ for an Article His Own Administration Reportedly Cleared
South China Morning Post: Donald Trump slams NYT report on US cyberattacks against Russia as a ‘virtual act of treason’
POLITICO: Trump slams NYT report on U.S. cyber attacks against Russia
Daily Mail : Trump DENIES that the US is increasing cyber attacks on Russia and accuses the NYTimes of ‘treason’
RT USA: ‘Treason!’ Trump slams NYT claim of US cyberattacks on Russia’s power grid as harmful fake news
Star Tribune: U.S. buries digital land mines in Russia’s power grid
Ubergizmo : U.S. Reportedly Planted Offensive Malware In Russia’s Electrical Grid
AP Breaking News: Trump calls newspaper report on Russia power grid ‘treason’
The Guardian: Trump accuses New York Times of ‘virtual treason’ over Russia cyber warfare report
Gizmodo: The US Has Allegedly Placed Malware Deep in Russia’s Power Grid
Vanity Fair: Trump to Putin: Don’t Worry, the New York Times Is Full of Sh*t
RAPPLER: New York Times’ Russia report is ‘virtual treason,’ Trump says
The Verge: US Cyber Command has reportedly been aggressively targeting Russia’s electrical grid


July 13, 2019
Nicole Perlroth / New York Times

Nicole Perlroth / New York Times  
FEC Says Cybersecurity Firm Area 1 Security Can Provide Discounted Anti-Phishing Services to Presidential Candidates

The Federal Election Commission (FEC)  said that security company Area 1 Security could immediately start helping 2020 presidential candidates defend their campaigns from the kinds of malicious phishing attacks that Russian hackers exploited in the 2016 election. The FEC made its advisory decision one month after FEC attorneys told the Commission to deny Area 1 Security’s request because it would be violating campaign finance laws that prohibit corporations from offering free or discounted services to federal candidates. The FEC determined that Area 1 could provide anti-phishing services to candidates because the company was not offering the campaigns special, discounted pricing, but simply offering the same lower-tier cost that was available to other organizations of similar size and financial resources.

Related: Cyberscoop, TechCrunch, The Hill, Krebs on Security, Engadget

Tweets:@jeffstone500 @nicoleperlroth @orenfalkowitz


April 22, 2017
MARTHA BELLISLE / Associated Press

MARTHA BELLISLE / Associated Press  
Russian MP’s Son Gets Longest Hacking Sentence Ever, 27 Years in Prison

A Russian hacker, Roman Seleznev, who is the son of a Russian Parliament member, yesterday received the longest sentence of any hacker in U.S. history, 27 years in federal prison on a 29-count felony charge for stealing 2.9 million credit card numbers and selling them online. After the sentence was announced in the U.S. District Court in Seattle, Seleznev’s attorney read a statement from his client contending that he is a political prisoner due to strained relations between the U.S. and Russia. Seleznev was also ordered to pay $170 million in restitution to his victims.

Related: TASS, Sputnik International, Ars Technica, TIME, TASS, Al Jazeera, Sputnik International, TASS, Reddit hacking, ReutersSlashdot, The Hill: Bloomberg Politics, BBC News, CyberscoopDeutsche Welle, Finextra Research news, The Hacker News, New York Times, Krebs on Security

TASS: Russia’s envoy to attend announcement of sentence to alleged Russian cybercriminal
Sputnik International: Russian Citizen Seleznev Sentenced to 27 Years in US Prison for Cybertheft
Ars Technica: Russian man gets longest-ever US hacking sentence, 27 years in prison
TIME: Hacker Son of Russian Lawmaker Sentenced to 27 Years in U.S. Prison
TASS: Arrest of Seleznev de facto kidnapped is unlawful – Russian embassy in U.S.
Al Jazeera: Russian hacker Roman Seleznev sentenced to 27 years
Sputnik International: Russia’s Seleznev Plans to Transfer Money to Pay Back Victims of Fraud
TASS: Media: Russian citizen Seleznev sentenced to 27 years in US prison
Reddit hacking: Russian man gets longest-ever US hacking sentence, 27 years in prison
Reuters.: Russian lawmaker’s son gets 27 years prison in U.S. hacking case
Slashdot: DOJ: Russian ‘Superhacker’ Gets 27 Years In Prison
The Hill: Cybersecurity: Russian hacker sentenced to 27 years after stealing 1.7M credit card numbers
Bloomberg Politics: Russian Lawmaker’s Hacker Son Gets 27-Year U.S. Prison Term
BBC News: Russian MP Seleznev incensed after son jailed in US
Cyberscoop: Prolific Russian credit-card hacker gets 27 years
Deutsche Welle: US sentences son of Russian lawmaker to 27 years for hacking
Finextra Research news: Russian hacker sentenced to 27 years in US prison
The Hacker News: US Court Sentences Russian Lawmaker’s Son to 27 Years in Jail for Hacking
New York Times – Nicole Perlroth: Russian Hacker Sentenced to 27 Years in Credit Card Case
Krebs on Security: The Backstory Behind Carder Kingpin Roman Seleznev’s Record 27 Year Prison Sentence


April 24, 2017
Sam Schechner / Wall Street Journal

Sam Schechner / Wall Street Journal  
Russian Hacking Group Fancy Bear Tried to Hack France’s Macron Campaign, Report

The same hacking group that wreaked havoc with the U.S. presidential election, Russia’s Fancy Bear, also known as Pawn Storm or APT28, tried to hack French centrist presidential candidate Emmanuel Macron’s campaign email accounts via a prolonged phishing attack, security firm Trend Micro will reveal in a report slated for release tomorrow. The hackers set up multiple IP addresses to mimic those of the Macron campaign in an effort to lure staffers to click on bad links that would have triggered the installation of malware capable of spying on the campaign. The emails were quickly identified and then blocked, campaign officials said. The Kremlin is backing Macron’s rival, national socialist candidate Marine LePen.

Related: Reuters, Washington ExaminerThe Independent, Axios, Associated Press World, IBTimes.co.uk , SC Magazine, MotherboardChina Post Online, New York Times – Nicole Perlroth, Dark ReadingWashington Post World, Business InsiderCNN.com, Digital Journal, The Times of Israel, ProPublica, The VergeUSA Today, Vocativ, BBC News, Digital JournalPBS News Hour, The Local, The Huffington Post, DataBreachToday.com, CNN.comRT News, The Hill: Cybersecurity, Deutsche Welle, Daily Kos, SecurityWeek, Sputnik International, USA Today, The Guardian, TIME, ABC News, The Register, Trend Micro

Reuters: Macron Campaign Was Target of Cyber Attacks by Spy-Linked Group
Washington Examiner: Report: Russia tried to hack French presidential candidate
The Independent: French election: Russian hackers 'targeted Emmanuel Macron camp'
Axios: Russia-linked hackers have targeted Macron
Associated Press World: Macron campaign says it fought off cyberespionage attempts
IBTimes.co.uk : French Elections: Russian hacking group Fancy Bear targeted Macron through phishing attacks
CNET: Russian hackers target French presidential candidate
SC Magazine: Cozy Bear targeted French presidential candidate Emmanuel Macron: Trend Micro
Motherboard: Russian Hackers ‘Fancy Bear’ Targeted French Presidential Candidate Macron
China Post Online: Russia-linked hackers targeted Macron campaign: researchers
New York Times – Nicole Perlroth: Russian Hackers Who Targeted Clinton Appear to Attack France’s Macron
Dark Reading : Macron Targeted by Russian Cyber Spies
Washington Post World: Researchers: Russia-linked hackers targeted Macron campaign
Business Insider: Russian hackers are believed to have targeted France’s favorite to win the presidential election
CNN.com: Was the French election hacked?
Digital Journal: Russian hackers ‘targeted Macron campaign’
The Times of Israel: Russia-linked hackers reportedly targeted Macron campaign
ProPublica: Russia’s Shadow-War in a Wary Europe
The Verge: French presidential frontrunner’s campaign hit by phishing attempts from Russia-linked hackers
USA Today: DNC hackers strike again, now in France
Vocativ: Report: Russians Who Hacked Clinton Campaign Now After France’s Macron
BBC News: Russian hackers ‘target’ presidential candidate Macron
Digital Journal: Russian hackers ‘targeted Macron campaign’
BGR: Russian hackers may have targeted Emmanuel Macron: Cyber security firm
NBC News: Macron Campaign Hit by Hackers With Possible Russia Links – NBCNews.com
PBS News Hour: Hackers targeted French presidential candidate Emmanuel Macron, cybersecurity researchers say
The Local: Macron campaign was ‘targeted by Russian hackers’
The Huffington Post: Russians Who Hacked DNC Reportedly Target France’s Presidential Frontrunner
DataBreachToday.com: Russian Hackers Said to Target French Presidential Candidate
CNN.com: Macron targeted by hackers, cyber firm says
RT News: ‘Nothing but fake news:’ Kremlin dismisses claims Russia-linked hackers ‘targeted Macron campaign’
The Hill: Cybersecurity: DNC hackers targeted French presidential candidate Macron: researchers
Deutsche Welle: Suspected Russia hackers ‘targeted Macron campaign’
Daily Kos: While Republicans slow-walk investigations here, Russian hackers now targeting French election
SecurityWeek: French Presidential Candidate Targeted by Russia-Linked Hackers
Sputnik International: EU Bosses Breach Diplomatic Protocol in Supporting Macron for French President
USA Today: DNC hackers strike again, now in France
The Guardian: Hackers have targeted election campaign of Macron, says cyber firm
TIME: Emmanuel Macron’s Campaign Was Targeted by Russian Hackers, Researchers Say
ABC News: Researchers: Russia-linked hackers targeted Macron campaign
The Register: Kremlin-backed DNC hackers going after French presidential hopeful Macron
Trend Micro: From Espionage to Cyber Propaganda: Pawn Storm’s Activities over the Past Two Years