CV2-Forn http://feed.informer.com/digests/D323EP5PEC/feeder CV2-Forn Respective post owners and feed distributors Tue, 02 Oct 2018 08:53:24 -0400 Feed Informer http://feed.informer.com/ Chris Uhlmann: <b>China&#39;s cyber</b> traps already inside the castle wall | The Australian https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.theaustralian.com.au/inquirer/chinas-cyber-traps-already-inside-the-castle-wall/news-story/44f265a20a9bd8579a60f475f9475554&#38;ct=ga&#38;cd=CAIyGjI3ODY4ZjM4MDVmNjU1MGY6Y29tOmVuOlVT&#38;usg=AOvVaw3Cuyde4dnB4TNOGAzMz3o4 Google Alert - china +cyber urn:uuid:849bd6f7-1134-dc2b-859d-1244e685bf0b Fri, 26 Apr 2024 10:02:42 -0400 The <b>cyber</b> battalions of the People&#39;s Republic of <b>China</b> have compromised parts of our critical infrastructure and are hunting for weaknesses in all of&nbsp;... <b>China</b>-linked PlugX malware infections found in more than 170 countries https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://therecord.media/plugx-malware-infections-more-than-170-countries&#38;ct=ga&#38;cd=CAIyHGUyMjQ2OGJhZTYwNWI0NWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw1qMdRqACRsIoDZmuRvocDw Google Alert - "deep panda" OR china OR chinese AND cyber OR hacker OR hacked urn:uuid:b0f5145c-9230-30d6-9ce4-238fbb9a94bf Fri, 26 Apr 2024 08:04:59 -0400 <b>Cyber</b> Security News | The Record &middot; Leadership &middot; <b>Cybercrime</b> &middot; Nation-state &middot; Elections &middot; Technology &middot; <b>Cyber</b> Daily® &middot; Click&nbsp;... <b>Chinese Hackers</b> Behind the Multi-Year Volkswagen <b>Cyberattack</b> - The <b>Cyber</b> Express https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://thecyberexpress.com/chinese-hackers-behind-volkswagen-cyberattack/&#38;ct=ga&#38;cd=CAIyHGUyMjQ2OGJhZTYwNWI0NWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw2jOSdJWDYK95SLAugA5bdz Google Alert - "deep panda" OR china OR chinese AND cyber OR hacker OR hacked urn:uuid:67e7998a-48cc-1e97-2359-e099512e3760 Fri, 26 Apr 2024 05:35:24 -0400 Moreover, the <b>hacking</b> tools employed, including the notorious “<b>China</b> Chopper,” further implicate <b>Chinese</b> origins, though conclusive proof remains&nbsp;... <b>Russian Cyber</b> Criminals Claim Responsibility for Attack Tipton Plant - WIBC https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://wibc.com/325888/russian-cyber-criminals-claim-responsibility-for-attack-tipton-plant/&#38;ct=ga&#38;cd=CAIyHDNjZjllMTcxNDc3NGNlODA6Y29tOmVuOlVTOkw&#38;usg=AOvVaw2emli7Dwc4LgeTMTU1dkNG Google Alert - (russia OR russian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:a90e9a01-acc7-8bb0-146e-2bc3aa303776 Fri, 26 Apr 2024 02:56:29 -0400 The <b>Cybersecurity</b> &amp; Infrastructure Security AgencyCISA is looking into the <b>cyber attack</b>. A group of <b>Russian hackers</b>, the People&#39;s <b>Cyber</b> Army of <b>Russia</b>&nbsp;... Sweden’s liquor supply severely impacted by ransomware attack on logistics company https://securityaffairs.com/162333/cyber-crime/swedens-liquor-supply-ransomware-attack.html Security Affairs urn:uuid:1563d4a4-d2a6-fa80-be19-0095bcba454f Fri, 26 Apr 2024 02:51:46 -0400 A ransomware attack on a Swedish logistics company Skanlog severely impacted the country&#8217;s liquor supply.  Skanlog, a critical distributor for Systembolaget, the Swedish government-owned retail chain suffered a ransomware attack. Systembolaget has a monopoly on the sale of alcoholic beverages containing more than 3.5% alcohol by volume. It operates stores across Sweden and is responsible [&#8230;] <div style="margin-top: 0px; margin-bottom: 0px;" class="sharethis-inline-share-buttons" ></div> <h2 class="wp-block-heading">A ransomware attack on a Swedish logistics company Skanlog severely impacted the country&#8217;s liquor supply. </h2> <p>Skanlog, a critical distributor for Systembolaget, the Swedish government-owned retail chain suffered a ransomware attack. Systembolaget has a monopoly on the sale of alcoholic beverages containing more than 3.5% alcohol by volume. It operates stores across Sweden and is responsible for the retail sale of wine, spirits, and strong beer.</p> <p>“It affects about 15% of our sales volume. Wine and liquor most of all,” Sofia Sjöman Waas, a press officer at Systembolaget, <a href="https://www.euronews.com/next/2024/04/25/alcohol-sales-disrupted-in-sweden-after-reported-ransomware-attack">told Euronews Next</a>. “We are accustomed to handling small to large scales of disruptions even though they are rarely on this scale,” Waas added. “We have many other items delivered to us as usual via other distributors. Therefore, there will continuously be many alternatives available at our stores,”<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw></p> <p>Mona Zuko, Skanlog’s chief executive, attributed the cyber attack to a North Korean ransomware gang.</p> <p>“We have been centrally attacked by a cyber attack, which has caused our entire system to be down until we can fix it and get it back up,” Skanlog’s Swedish CEO Mona Zuko told <a href="https://www.di.se/live/nordkoreanskt-hackerangrepp-bakom-hotande-varubrist-pa-systembolaget/"><strong>local newspaper</strong></a> Dagens Industri. <gwmw style="display:none;"></gwmw></p> <p>“Our systems, including our central business system, have been affected by the attack. We use a Microsoft financial system, and an inventory system called Dynaman which is critical to our operations.” <gwmw style="display:none;"></gwmw></p> <p>Due to the cyber attack&#8217;s impact on the logistics company, the media reported it may be difficult to get hold of alcoholic beverages this weekend. Skanlog spokesman <a href="https://www.aftonbladet.se/nyheter/a/vgWLbj/systembolaget-vissa-drycker-kan-salja-slut">warned</a> that certain alcoholic beverages could be sold out within a few days.</p> <p>SCMagazine <a href="https://www.scmagazine.com/brief/third-party-ransomware-attack-threatens-swedens-liquor-supply">reported</a> that Systembolaget, in response to Skanlog&#8217;s uncertainty about restoring its operations, plans to implement a backup procedure to address potential delays in deliveries. This decision comes as a precautionary measure to ensure continuity in the distribution of alcoholic beverages.<gwmw style="display: none; background-color: transparent;"></gwmw><gwmw style="display:none;"></gwmw></p> <p><a href="http://www.linkedin.com/pub/pierluigi-paganini/b/742/559"><strong>Pierluigi&nbsp;Paganini</strong></a></p> <p id="geom_inter_1713255827528_73_13">Follow me on Twitter:&nbsp;<a href="https://twitter.com/securityaffairs"><strong>@securityaffairs</strong></a>&nbsp;and&nbsp;<a href="https://www.facebook.com/sec.affairs"><strong>Facebook</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@securityaffairs">Mastodon</a></p> <p id="geom_inter_1713255827528_43_14"><strong>(</strong><a href="http://securityaffairs.co/wordpress/"><strong>SecurityAffairs</strong></a><strong> –</strong> <strong>hacking, ransomware)</strong><gwmw style="display:none;"></gwmw></p> <p><a href="https://twitter.com/intent/tweet?text=Sweden%27s%20liquor%20shelves%20to%20run%20empty%20this%20week%20due%20to%20ransomware%20attack%20https://therecord.media/sweden-ransomware-liquor-shortage-skanlog-systembolaget%20@TheRecord_Media" target="_blank" rel="noreferrer noopener"></a><gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw></p> Breaking News Cyber Crime Hacking Malware Cybercrime hacking news information security news IT Information Security Pierluigi Paganini ransomware Security Affairs Security News Skanlog sweden Pierluigi Paganini A Chinese ship remains the focus of the investigation into Baltic Sea gas pipeline damaged last year https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.wboy.com/news/world/ap-a-chinese-ship-remains-the-focus-of-the-investigation-into-baltic-sea-gas-pipeline-damaged-last-year/&#38;ct=ga&#38;cd=CAIyHDdhZTZkMmUyOTcyMmYxYTM6Y29tOmVuOlVTOkw&#38;usg=AOvVaw3S--cYZe8wXWwT-syycjaJ Google Alert - cyber AND coast guard urn:uuid:47cfd8bc-debf-425f-14f8-e749712aae5c Thu, 25 Apr 2024 23:57:48 -0400 ... <b>Coast Guard</b>, a leak from Nord Stream ... <b>Coast Guard</b> via AP, File). World. A Chinese ship ... WVU hosts international <b>cyber</b> defense exercise &#39;LOCKED … Security Expert Dmitri Alperovitch Talks <b>Russia</b> &amp; Ransomware - Techopedia https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.techopedia.com/interview-dmitri-alperovitch-talks-cybersecurity-russia-ransomware&#38;ct=ga&#38;cd=CAIyHDNjZjllMTcxNDc3NGNlODA6Y29tOmVuOlVTOkw&#38;usg=AOvVaw1dXd0yaWh8gUB4zQYR_VtZ Google Alert - (russia OR russian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:4aa1faba-339f-82ca-e98e-9db4b7cc2d8a Thu, 25 Apr 2024 21:15:42 -0400 A: Right now, the primary challenge in <b>cyber</b> warfare, particularly from <b>Russian cybercrime</b> groups, is ransomware. They&#39;re launching attacks not just&nbsp;... Pakistanis Trapped in Cambodia&#39;s <b>China</b>-Run <b>Cyber</b> Slave Ring Targeting US - Reddit https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.reddit.com/r/pakistan/comments/1ccr2zk/pakistanis_trapped_in_cambodias_chinarun_cyber/&#38;ct=ga&#38;cd=CAIyGjI3ODY4ZjM4MDVmNjU1MGY6Y29tOmVuOlVT&#38;usg=AOvVaw3CCnz9FN20d0n-D0x4Gkus Google Alert - china +cyber urn:uuid:cd201eac-c0b5-4bae-e642-859d06d826cb Thu, 25 Apr 2024 18:28:53 -0400 Even <b>Chinese</b> citizens have been trapped by this. It&#39;s an ever growing global human trafficking issue. Pakistan, India, <b>China</b>, Nepal, etc. all have&nbsp;... <b>Chinese</b> Keyboard Apps Open 1B People to Eavesdropping - Dark Reading https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.darkreading.com/endpoint-security/most-chinese-keyboard-apps-vulnerable-to-eavesdropping&#38;ct=ga&#38;cd=CAIyHGUyMjQ2OGJhZTYwNWI0NWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw2FK40WI-SaP1YNEDxAG-k8 Google Alert - "deep panda" OR china OR chinese AND cyber OR hacker OR hacked urn:uuid:a0437b0a-48e8-cf99-4214-7236ba8ee52c Thu, 25 Apr 2024 18:09:18 -0400 ... <b>China</b>: Baidu, Samsung, Huawei ... <b>cyber</b> espionage, surveillance, and other ... <b>China</b>, in fact, use a Pinyin keyboard to input <b>Chinese</b> characters. The Israel-<b>Iran</b> Conflict Through an Intelligence Lens | Flashpoint https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://flashpoint.io/blog/israel-iran-conflict-intelligence-lens/&#38;ct=ga&#38;cd=CAIyHDI1ODM3ZjZmZTg4YTk2YWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw0-smY_oVgGD7plDPvSPmU3 Google Alert - (iran OR iranian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:9faa01e1-3ada-eb36-e2c8-ee4e27c19ca0 Thu, 25 Apr 2024 17:06:01 -0400 Examining the strategic intelligence, <b>cyber</b> tactics, and physical confrontations that define the enduring Israel-<b>Iran</b> conflict. Phl, US To Counter China&#39;s False Narratives On WPS – Envoy | OneNews.PH https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.onenews.ph/articles/phl-us-to-counter-china-s-false-narratives-on-wps-envoy&#38;ct=ga&#38;cd=CAIyHDdhZTZkMmUyOTcyMmYxYTM6Y29tOmVuOlVTOkw&#38;usg=AOvVaw0r_TYhDWcQRIyhwCbBDGhw Google Alert - cyber AND coast guard urn:uuid:3aa71289-0819-4931-166c-7cf08076abee Thu, 25 Apr 2024 16:49:48 -0400 Why Is The Philippines Upgrading Its Batanes Military Defense? ... <b>Coast Guard</b> boat patrols the West Philippine ... <b>cyber</b>-digital space to strengthen the&nbsp;... Another Belgian MP falls victim to <b>Chinese cyberattack</b> - The Brussels Times https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.brusselstimes.com/1021142/another-belgian-mp-falls-victim-to-chinese-cyberattack&#38;ct=ga&#38;cd=CAIyHGUyMjQ2OGJhZTYwNWI0NWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw1My9Oia_VoKVMrXwgeE3_V Google Alert - "deep panda" OR china OR chinese AND cyber OR hacker OR hacked urn:uuid:f436d67a-a96f-0fdc-9538-7d2dbe2dc3e0 Thu, 25 Apr 2024 16:07:29 -0400 Another Belgian MP falls victim to <b>Chinese cyberattack</b> ... <b>cyberattacks</b> from <b>China</b>. He contrasted this ... <b>Chinese cyber</b>-<b>attacks</b>, says <b>hacked</b> MP &middot; 364 top&nbsp;... US is reviewing risks of <b>China&#39;s</b> use of RISC-V chip <b>technology</b> - teiss https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.teiss.co.uk/cyber-threat-intelligence/us-is-reviewing-risks-of-chinas-use-of-risc-v-chip-technology-13920&#38;ct=ga&#38;cd=CAIyGjI3ODY4ZjM4MDVmNjU1MGY6Y29tOmVuOlVT&#38;usg=AOvVaw29-2T_JPZQieona0o9t-EP Google Alert - china +cyber urn:uuid:242f2452-185e-6bbc-99b7-92f477835e35 Thu, 25 Apr 2024 15:37:06 -0400 The U.S. Department of Commerce is reviewing the national <b>security</b> implications of <b>China&#39;s</b> ... Capita IT Systems Outage Raises Concerns of <b>Cyber</b>-Attack&nbsp;... The growing threat of <b>Chinese cyberattacks</b> - Bewley Recruitment https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.bewleyrecruitment.com/blog/2024/04/the-growing-threat-of-chinese-cyberattacks&#38;ct=ga&#38;cd=CAIyGjI3ODY4ZjM4MDVmNjU1MGY6Y29tOmVuOlVT&#38;usg=AOvVaw0gsYLAaVn_R_nnT4UnHL6a Google Alert - china +cyber urn:uuid:d9448480-abb0-c1bc-3e1b-44e5b51a117f Thu, 25 Apr 2024 14:24:31 -0400 The growing threat of <b>Chinese cyberattacks</b>. Posted by Nigel Ling. true 25 April 2024. Share this article. <b>Cyber</b> Attacks ... While the article focuses on&nbsp;... <b>Cyber</b> Threats Linked to <b>Iran</b>-Israel Conflict - ReliaQuest https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.reliaquest.com/blog/cyber-threats-linked-to-iran-israel-conflict/&#38;ct=ga&#38;cd=CAIyHDI1ODM3ZjZmZTg4YTk2YWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw3D0TMKhB9j4qbq88NwU86h Google Alert - (iran OR iranian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:725defe1-43f6-1c92-08e0-69579e416bd4 Thu, 25 Apr 2024 13:56:28 -0400 Israeli Threats. The full extent of Israel&#39;s <b>cyber</b> offensive capabilities is largely speculative: <b>Cybersecurity</b> research and intelligence analysis has&nbsp;... <b>North Korea&#39;s</b> Lazarus Group Deploys New Kaolin RAT via Fake Job Lures https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://thehackernews.com/2024/04/north-koreas-lazarus-group-deploys-new.html&#38;ct=ga&#38;cd=CAIyHGRiYWMzMTE5OTYxYTQ1MGQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw2OTYkm3tLnz3ZY2unLf2gW Google Alert - (north korean OR north korea) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:d0e502dd-1fe8-6ade-0240-4d50c1f28985 Thu, 25 Apr 2024 12:53:43 -0400 ... <b>Hacker</b> News Share on Email Share on WhatsApp &middot; Facebook Messenger Share on Facebook Messenger Share on Telegram. SHARE. <b>cyber</b> espionage,&nbsp;... <b>Cyber Security</b> Headlines: <b>Chinese</b> keyboard flaws, hacked news story, TikTok on the clock https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://cisoseries.com/cyber-security-headlines-chinese-keyboard-flaws-hacked-news-story-tiktok-on-the-clock/&#38;ct=ga&#38;cd=CAIyGjI3ODY4ZjM4MDVmNjU1MGY6Y29tOmVuOlVT&#38;usg=AOvVaw3DxEy1_FkJEHjf2QGhLLSQ Google Alert - china +cyber urn:uuid:b708d9e1-3a78-142e-e392-f78653cc964a Thu, 25 Apr 2024 12:18:24 -0400 Last year, researchers at Citizen Lab found that the popular Sogou <b>Chinese</b> keyboard app failed to use TLS when sending keystroke <b>data</b> to the cloud&nbsp;... <b>Russian hackers</b> claim responsibility for <b>cyberattack</b> on Tipton plant - Kokomo Tribune https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.kokomotribune.com/news/local_news/russian-hackers-claim-responsibility-for-cyberattack-on-tipton-plant/article_93391a20-0305-11ef-862a-6b6067ac0171.html&#38;ct=ga&#38;cd=CAIyHDNjZjllMTcxNDc3NGNlODA6Y29tOmVuOlVTOkw&#38;usg=AOvVaw05A0Jutnr1sK0ToVWtLFQ5 Google Alert - (russia OR russian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:61547cc8-f332-e95d-20d9-45e47543a08b Thu, 25 Apr 2024 10:58:04 -0400 The <b>Russian hacker</b> group &quot;People&#39;s <b>Cyber</b> Army of <b>Russia</b>&quot; claimed responsibility for the <b>cyberattack</b> in a Telegram post. The Indiana Department of&nbsp;... <b>Iran</b> rejects U.S. &quot;baseless&quot; <b>cyber-attack</b> charges against <b>Iranian</b> individuals, firms https://www.google.com/url?rct=j&#38;sa=t&#38;url=http://en.people.cn/n3/2024/0425/c90000-20161381.html&#38;ct=ga&#38;cd=CAIyHDI1ODM3ZjZmZTg4YTk2YWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw3nZPPIOvcaRqy93TpkcFHt Google Alert - (iran OR iranian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:c812d627-e72e-dec8-58a0-2e0a3db4794a Thu, 25 Apr 2024 10:47:42 -0400 <b>Iran</b> rejects U.S. &quot;baseless&quot; <b>cyber-attack</b> charges against <b>Iranian</b> individuals, firms. (Xinhua) 10:29, April 25, 2024. TEHRAN, April 24 (Xinhua) --&nbsp;... U.S. Charges Four <b>Iranians</b> With Treasury, State Dept. <b>Hack</b> Attempts - MeriTalk https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.meritalk.com/articles/u-s-charges-four-iranians-with-treasury-state-dept-hack-attempts/&#38;ct=ga&#38;cd=CAIyHDI1ODM3ZjZmZTg4YTk2YWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw24cadPDbMJNJx0U2Ybfysa Google Alert - (iran OR iranian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:d49baa5c-ae94-706a-06d1-63f5558f304a Thu, 25 Apr 2024 10:29:01 -0400 ... <b>cyber</b>-criminal activity lead back to <b>Iran</b>,” he said. “Today&#39;s ... Easterly Touts <b>Ransomware</b> Warnings, Teases &#39;<b>ReadySetCyber</b>&#39; Pilot &middot; Information&nbsp;... Head of Belgian Foreign Affairs Committee says she was <b>hacked</b> by <b>China</b> | Reuters https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.reuters.com/world/europe/head-belgian-foreign-affairs-committee-says-she-was-hacked-by-china-2024-04-25/&#38;ct=ga&#38;cd=CAIyHGUyMjQ2OGJhZTYwNWI0NWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw0L7WNelGaazHi-9DMY0NXS Google Alert - "deep panda" OR china OR chinese AND cyber OR hacker OR hacked urn:uuid:ffa2414a-83f1-075e-1e7e-b854bfba6648 Thu, 25 Apr 2024 10:16:10 -0400 ... <b>Chinese</b> state-backed <b>hacking</b> activity. Beijing has denied all such accusations. Van Hoof found out about the <b>cyber attack</b> last month, three years&nbsp;... DHS asked to consider potentially &#39;devastating&#39; impact of <b>hacks</b> on rural water systems https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://therecord.media/water-utility-cyberattacks-lawmakers-letter-to-dhs&#38;ct=ga&#38;cd=CAIyHDNjZjllMTcxNDc3NGNlODA6Y29tOmVuOlVTOkw&#38;usg=AOvVaw22e13kdlsFAs-CV586H884 Google Alert - (russia OR russian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:632224ae-aa6a-0d59-edc1-e81fa6ed742b Thu, 25 Apr 2024 10:10:47 -0400 ... <b>Cyber</b> Army of <b>Russia</b>, is linked to a <b>Russian</b> state actor, Sandworm — which has gained global notoriety for its past, and present, digital assaults&nbsp;... South <b>Korean</b> Defense Industry Under Siege by <b>North Korean Hacker</b> Groups - The <b>Cyber</b> Express https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://thecyberexpress.com/north-korean-hacker-groups-target-south/&#38;ct=ga&#38;cd=CAIyHGRiYWMzMTE5OTYxYTQ1MGQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw381Z1xLQjZvyxv_l_hkVyF Google Alert - (north korean OR north korea) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:8154cf22-5471-1ea0-69ee-e709124af572 Thu, 25 Apr 2024 07:48:14 -0400 The National Police Agency said, “It is expected that <b>North Korea&#39;s hacking</b> attempts targeting defense technology will continue, so not only defense&nbsp;... Head of Belgian Foreign Affairs Committee says she was <b>hacked</b> by <b>China</b> - Yahoo Finance https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://finance.yahoo.com/news/head-belgian-foreign-affairs-committee-110911983.html&#38;ct=ga&#38;cd=CAIyHGUyMjQ2OGJhZTYwNWI0NWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw1_SIsvY7UTCrF9OoZhCqQk Google Alert - "deep panda" OR china OR chinese AND cyber OR hacker OR hacked urn:uuid:6d40ebe1-b70b-d332-f4ce-a890e3a3d2c0 Thu, 25 Apr 2024 07:14:31 -0400 Head of Belgian Foreign Affairs Committee says she was <b>hacked</b> by <b>China</b> ... <b>Chinese</b> state-backed <b>hacking</b> activity. Beijing ... <b>cyber attack</b>. &quot;I have also&nbsp;... <b>Cyber</b> Security Headlines: <b>Chinese</b> keyboard flaws, <b>hacked</b> news story, TikTok on the clock https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://cisoseries.com/cyber-security-headlines-chinese-keyboard-flaws-hacked-news-story-tiktok-on-the-clock/&#38;ct=ga&#38;cd=CAIyHGUyMjQ2OGJhZTYwNWI0NWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw3DxEy1_FkJEHjf2QGhLLSQ Google Alert - "deep panda" OR china OR chinese AND cyber OR hacker OR hacked urn:uuid:84ad02f9-638b-8109-9554-a7a5f538cc5a Thu, 25 Apr 2024 06:19:17 -0400 The researchers found a lack of TLS in apps from Baidu, Tencent, and iFlytek, as well as ones preinstalled on Android devices sold in <b>China</b>. The only&nbsp;... U.S. slaps fresh sanctions against <b>Iran</b> over alleged <b>cyber</b> crimes - Tehran Times https://www.google.com/url?rct=j&#38;sa=t&#38;url=https://www.tehrantimes.com/news/497595/U-S-slaps-fresh-sanctions-against-Iran-over-alleged-cyber-crimes&#38;ct=ga&#38;cd=CAIyHDI1ODM3ZjZmZTg4YTk2YWQ6Y29tOmVuOlVTOkw&#38;usg=AOvVaw2Taol9sm0EP19t3NASegLU Google Alert - (iran OR iranian) +(cyber OR "cyber attack" OR hacker OR hacking) urn:uuid:d8f36817-b341-de55-659a-8e34c3b2a03e Thu, 25 Apr 2024 02:48:16 -0400 ... <b>Iran&#39;s</b> Revolutionary Guard <b>cyber</b> command. The business targets, according to federal prosecutors in Manhattan, were mostly defense contractors&nbsp;... Improving Dark Web Investigations with Threat Intelligence https://www.recordedfuture.com/blog/improving-dark-web-investigations-with-threat-intelligence Recorded Future urn:uuid:41e9b1a0-9e5b-a098-c365-4ff47051ec2a Tue, 09 Apr 2024 20:00:00 -0400 Explore how threat intelligence enhances dark web investigations, mitigating cyber threats to protect enterprise data and maintain brand trust. <p>Safeguarding sensitive data, maintaining brand reputation, and cultivating customer trust pose continuous challenges for enterprise organizations. However, the dark web, a hidden corner of the internet, poses unique challenges for cybersecurity professionals. Criminal activities such as the sale of stolen credentials and plans for targeted attacks thrive in this dark section of the internet.</p><p>This blog post explores some of the threats that originate on the dark web and how external <a href="https://www.recordedfuture.com/products/threat-intelligence">threat intelligence solutions</a> can enable organizations to proactively defend themselves.</p><p>Since its inception in the early 2000s, the dark web has evolved into a hub for illegal activities. It facilitates the trade of hacking methods and compromised credentials as well as the distribution of malware and ransomware. Its also constantly evolving, with threat actors discovering, sharing, and acting on new vulnerabilities and exploits every day. </p><p>During the early stages of the dark web, secretive forums and file-sharing platforms thrived, resembling a shadowy version of Reddit or Etsy. The notorious Silk Road, extensively detailed in the book <a href="https://www.goodreads.com/book/show/31920777-american-kingpin">American Kingpin</a>, and the emergence of cryptocurrencies like Bitcoin have been pivotal in shaping the dark web, giving rise to sophisticated underground markets akin to a dark eBay.</p><p>Notorious ransomware groups like LockBit and ALPHV have been operating on dark web platforms, taking credit for their actions and revealing their targets. Additionally, Telegram has emerged as a favored platform for secretive engagements, facilitating and enabling a range of activities from communication to coordination to distribution of malicious content.</p><p>Attacks stemming from conversations, information sharing, and transactions on the dark web have resulted in financial, operational, and reputational losses for organizations across the globe. However, improving dark web monitoring capabilities can help organizations be proactive in mitigating threats to their business, their customers, and their supply chain. </p><h3 id="how-does-the-dark-web-affect-organizations">How does the dark web affect organizations?</h3><p>The dark web in itself is not all that dangerous to most organizations, but whats taking place there should pique the interest of defenders. The dark web provides a platform for ransomware groups to operate and for bad actors to sell and exchange malware, <a href="https://www.recordedfuture.com/blog/how-to-triage-leaked-credentials">compromised credentials</a>, exploit kits, and stolen payment cards.</p><h4 id="ransomware">Ransomware</h4><p>The dark web is a well known home for ransomware groups, which continued to wreak havoc on organizations in 2023. In the past year, ransomware payments ballooned to $1.1 billion (<a href="https://therecord.media/ransomware-payments-doubled-to-more-than-1-billion-2023">The Record</a>) and, according to a report from <a href="https://www.securityweek.com/the-ransomware-threat-in-2024-is-growing-report/">Delinea</a>, 76% of victims paid a ransom. The dark web provides a secure and anonymous environment for ransomware groups to communicate, collaborate, and conduct their illicit activities. </p><h4 id="credentials">Credentials</h4><p>Dark web markets and forums are popular destinations for initial access brokers and threat actors looking to sell and buy valid credentials. Valid credentials have become so popular for threat actors that under MITRE ATT&amp;CKs initial access vectors, Valid Accounts (T1078) was the top TTP according to both <a href="https://www.recordedfuture.com/2023-annual-report">Recorded Future</a> and <a href="https://www.ibm.com/downloads/cas/L0GKXDWJ">IBM X-Force</a>.</p><p>Using information from our <a href="https://www.recordedfuture.com/products/identity-intelligence">Identity Intelligence</a> module, Recorded Future researchers found a 135% rise in the overall number of harvested credentials and a <a href="https://www.recordedfuture.com/2023-annual-report">166%</a> increase in credentials associated with cookies. Additionally, <a href="https://www.ibm.com/reports/threat-intelligence?utm_content=SRCWW&p1=Search&p4=43700079592066625&p5=e&gad_source=1&gclid=Cj0KCQjwq86wBhDiARIsAJhuphncRPuRrpSJ3EiavMqrf8Uva7poktd7mlJt3PjtbzN8ElcunRfT35AaAh0OEALw_wcB&gclsrc=aw.ds">researchers at IBM found a 266%</a> upsurge in the use of infostealers. With the right access and contacts, someone could purchase a valid credential for just $10, enabling them to log in to a corporate network or personal account, bypass multi-factor authentication controls, and begin their infiltration. </p><p><img src="https://cms.recordedfuture.com/uploads/Dark_Web_Blog_Post_Identity_7007048e3c.webp" alt="DarkWebBlogPost_Identity.webp"><em>Recorded Futures <a href="https://www.recordedfuture.com/products/identity-intelligence">Identity Intelligence</a> module helps organizations defend against employee and customer credentials that have been stolen by infostealer malware. <a href="https://www.recordedfuture.com/videos/toyota">Watch</a> how Toyota Motors North America defends against compromised credentials, and <a href="https://www.recordedfuture.com/splunk/mitigate-account-takeovers">take an interactive tour</a> of Identity Intelligence.</em></p><h4 id="exploit-kits">Exploit Kits</h4><p>Similar to how novice cooks purchase meal kits, less-skilled threat actors can purchase exploit kits on the dark web. Despite their <a href="https://go.recordedfuture.com/hubfs/reports/cta-2021-0209.pdf">slight dip in popularity</a>, dark web exploit kits are pre-packaged tools and frameworks that cybercriminals use to exploit vulnerabilities in software and systems. These kits make it easier for threat actors to launch attacks and gain unauthorized access to targeted systems. They often provide a convenient gateway for cybercriminals to exploit vulnerabilities without needing advanced technical skills. </p><h4 id="payment-cards">Payment Cards</h4><p>In 2022 it looked like the dark web market for stolen credit cards was slowing down. However, supply bounced back to previous levels in 2023. According to the <a href="https://www.recordedfuture.com/annual-payment-fraud-intelligence-report-2023">2023 Annual Payment Fraud Intelligence Report</a> from Recorded Future, 71.4 million payment cards were posted for sale on the dark web in 2023, and another 48 million were posted for free on various sources. A median fraud charge of $79 caused $9.4 billion in preventable fraud losses for card issuers and $35 billion in potential chargeback fees for merchants and acquirers. </p><h3 id="how-does-recorded-future-remediate-threats-originating-on-the-dark-web">How does Recorded Future remediate threats originating on the dark web?</h3><h4 id="ransomware-extortion-websites">Ransomware Extortion Websites</h4><p>Threat actors use ransomware extortion websites to threaten to leak victim files. These files often include network details, financial information and documents, PII, employee or client credentials, and other sensitive information that motivates the victim to pay the ransom. Victims who concede typically do so based on a promise that the data will be deleted, but we saw with <a href="https://therecord.media/lockbit-lied-about-deleting-exfiltrated-data-after-ransom-payments">Lockbit</a> that this doesnt always happen. On the other hand, victims who dont pay are likely to have additional data leaks posted to the extortion site. </p><p>For years, Recorded Future has collected information from ransomware extortion websites, analyzed it, and turned it into actionable intelligence to help organizations <a href="https://www.recordedfuture.com/solutions/ransomware">proactively mitigate the impact of a ransomware attack</a>. Presently, Recorded Future collects information from text posts, images, and leaked file metadata on over 100 ransomware extortion websites. </p><p>Information found in ransomware victim metadata can help identify companies and organizations that could be direct or indirect victims of a ransomware attack. Access to leaked file metadata enables organizations to investigate leads for potential data exposure that could impact them as well as relevant third and fourth parties. </p><p><img src="https://cms.recordedfuture.com/uploads/FI_Blog_Image_1_7f0f6d9b4d.webp" alt="FI Blog_Image 1.webp"><em>Image of Recorded Futures ransomware victim metadata analysis, which helps identify organizations that are most likely to be victims (direct or indirect) of a ransomware incident.</em></p><h4 id="dark-web-markets">Dark Web Markets</h4><p>Unlike e-commerce sites on the open web, dark web markets like Russian Market, 2Easy, and others make their fortunes selling compromised credentials, PII, and stolen credit cards. Threat actors can use this information to access an employees account, create personalized <a href="https://www.recordedfuture.com/blog/typosquatting-domains-analysis">spearphishing campaigns</a>, or place fraudulent transactions. </p><p>Recorded Future collects information from a number of dark web markets to help organizations mitigate any risk stemming from items for sale. For example, by <a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">identifying stolen credit card information</a> being sold on dark web markets, card issuers can place heightened controls on cards with a high risk of being used for fraud. Additional signals, such as the card being sold or used in transactions with known tester merchants, can enable the issuer to take proactive actions to block the card from further transactions or issue the customer a new card. </p><p>According to a large <a href="https://go.recordedfuture.com/hubfs/case-studies/lg-finance-inst-payment-fraud.pdf">North American financial institution</a>, When transactions occur on customer cards identified by Recorded Future as being present on the dark web or used on known tester merchants, most of the time the transaction is actually fraudulent. </p><p><img src="https://cms.recordedfuture.com/uploads/Dark_Web_Blog_Image_2_e7c38d4b99.webp" alt="Dark Web Blog - Image 2.webp"><em>Recorded Future Payment Fraud Intelligence detects compromised payment cards for sale on the dark web, enabling financial institutions to take a proactive approach to preventing fraud.</em></p><h4 id="dark-web-forums">Dark Web Forums</h4><p>Dark web forums are often where conversations get started between threat actors, those with something to sell, and lower-skilled cybercriminals looking for more advanced tools. Threat actors can exchange information, techniques, and tools to improve their hacking skills and stay up to date on the latest trends in cybercrime. Some will use dark web forums to recruit affiliates to carry out cybercriminal activities, including distributing malware, launching phishing campaigns, and participating in ransomware attacks. </p><p>Similar to dark web markets, dark web forums also serve as marketplaces where threat actors can sell compromised credentials, personal data, financial details, and other valuable information. They can also facilitate the trade of hacking tools, exploit kits, <a href="https://www.recordedfuture.com/blog/rat-corporate-risk-assessment">remote access trojans (RATs)</a>, and other malicious software that can be used to compromise systems and networks. </p><p>Recorded Future collects information from over 250 top-tier and medium-tier dark web forum sources to provide actionable information to organizations. Information can include whether threat actors are mentioning an organizations brand or supply chain partners, whether any new vulnerabilities are being referenced, and which threat actors are known to utilize specific forums. </p><p>Frequent mentions of a company or product on the dark web often correlate, indicating an imminent attack, an illicit sale of company assets or accounts, or potentially more complex fraud schemes. </p><p>Dark web monitoring provides visibility into this restricted environment to help clients stay a step ahead of cybercrime campaigns that could affect their organizations, their suppliers, or the software products they use. </p><h4 id="telegram">Telegram</h4><p>Since its creation in 2012, Telegram a multi-purpose chat application has quickly gained popularity among the underground cybercriminal community. Telegrams security, large number of chat options, and convenience have led to its growing popularity. Few dark web markets rival Telegrams reliability. </p><p>According to some experts, the future of large-scale, highly role-specialized criminal activity will take place on Telegram and future alternatives. Currently, cybercriminals have used Telegram groups to conduct transactions of illicit goods, post announcements from related internet forums, and communicate with fellow criminals. </p><p>Recorded Future helps organizations understand cyber-related chatter on Telegram about their own brands, relevant third parties, and other organizations of note. Since threat actors often discuss their activities on Telegram whether theyre reporting planned attacks, exchanging information, or sharing findings visibility enables organizations to stay out in front of threats and build resilience against unexpected risks. </p><p>Recorded Future helped one client detect exposed credentials on a Telegram channel, both identifying the threat and enhancing the urgency to remediate the risk. Another client in the financial services industry was able to identify a fraudulent check on a Telegram channel through Recorded Futures optical character recognition (OCR) capabilities. The analyst reported the incident to their internal fraud management team to prevent the check from being cashed. </p><h4 id="how-recorded-future-helps-mitigate-dark-web-threats">How Recorded Future helps mitigate dark web threats</h4><p>Threat actors have long used dark web sites and forums to remain anonymous and attempt to gain an advantage over their targets. This is unlikely to change anytime soon. To combat this challenge, organizations require proactive visibility into the deep recesses of the dark web to ensure that they can mitigate threats. To help security practitioners and leaders, Recorded Future provides extensive intelligence across a wide range of dark web channels, which can be delivered via alerts, playbooks, and human-curated intelligence reports. </p><h4 id="alert-notifications">Alert Notifications</h4><p>Without timely alerting, intelligence becomes a collection of information. For many clients, the ability to prioritize alerts based on external threat intelligence and risk factors is crucial for improving their security operations and risk management. The ability to build different alert rules and manage notifications helps users ensure that theyre receiving relevant and timely alerts. In addition, Recorded Future <a href="https://www.recordedfuture.com/blog/next-evolution-recorded-future-ai-powering-threat-intelligence">AI Insights</a> and transparent evidence help users swiftly determine the severity of an alert and what action to take. </p><p><img src="https://cms.recordedfuture.com/uploads/Dark_Web_Blog_Post_AI_4013bb9b88.webp" alt="DarkWebBlogPost_AI.webp"><em>Recorded Future AI Insights help organizations reduce investigation time by providing automated and actionable context. The above example shows the AI Insights for RedLine Stealer. Learn more about recent updates to Recorded Future AI Insights in <a href="https://www.recordedfuture.com/blog/next-evolution-recorded-future-ai-powering-threat-intelligence">this blog post</a>.</em></p><p>One Recorded Future client has found it beneficial to set up automatic reporting for any mention of his organizations brand or credentials on the deep dark web. Alerts generated by Recorded Future free the organizations analysts from having to build and run the same queries over and over, giving them time to focus on more strategic tasks. </p><h4 id="playbook-alerts">Playbook Alerts</h4><p>When <a href="https://www.recordedfuture.com/blog/dark-web-threats">threats are found on the dark web</a>, defenders need a way to rapidly distill information, triage alerts, and reduce time-to-action. Recorded Futures playbook alerts help defenders by automating large phases of the investigation, updating users on changes in risk, producing verdicts, and providing recommended next steps. In addition, playbook alerts are automatically prioritized based on severity and risk so organizations know where to focus.</p><p>Clients report being <a href="https://www.recordedfuture.com/blog/recorded-future-threat-intelligence-delivers-measurable-outcomes-security-teams">48% faster</a> at identifying a new threat than before, with playbook alerts being a key component in reducing mean time to detect (MTTD) and mean time to investigate (MTTI). These alerts have proven to be beneficial for high-impact third-party cyber events, helping organizations identify issues such as recent attention on ransomware extortion websites, credentials compromised by infostealer malware, and exploit chatter about vulnerabilities that could affect their tech stack. </p><h4 id="humint">HUMINT</h4><p>Recorded Futures dark web collection is made possible by undercover engagements and human intelligence (HUMINT) from our <a href="https://www.recordedfuture.com/research/insikt-group">Insikt Group</a>, a team of expert analysts and researchers who provide analysis on nation-state threats, cybercriminals, technical sourcing and collection, and more. To infiltrate these restricted forums and deliver critical intelligence requires human expertise, an essential first step toward automating collections. </p><p>To learn more about the Recorded Future Insikt Group, check out our latest <a href="https://www.recordedfuture.com/research/intelligence-reports">Intelligence Reports</a> and our <a href="https://www.recordedfuture.com/2023-annual-report">2023 Annual Report</a>. </p><p>When intelligence is neither timely nor actionable, it becomes old news quickly. To navigate todays complex threat ecosystem, organizations require proactive insights into the dark web and closed sources to help them monitor any threats to their organization, partners, or industry. With a vast collection of timely and actionable intelligence from dark web sources, Recorded Future arms defenders with distilled information to build resilience against unexpected threats. </p><p>To see how Recorded Future can improve dark web visibility for your organization, <a href="https://go.recordedfuture.com/demo?utm_campaign=demo-button-2023-top-nav-bar&utm_source=recordedfuture&utm_medium=website&utm_content=20231003&utm_term=website">request a demo</a>. </p> Blog 2023 Threat Analysis and 2024 Predictions https://www.recordedfuture.com/blog/2023-threat-analysis-and-2024-predictions Recorded Future urn:uuid:3b216382-3e16-0450-cfba-4d1f18e86c3f Mon, 08 Apr 2024 20:00:00 -0400 Our 2023 annual report serves as a playbook of adversaries’ tactics, techniques, and procedures (TTPs). Check out our on-demand Annual Report webinar or read on for a summary of key topics and themes in the report. <p>2023 was a year in which cybercrime evolved in significant ways. Our <a href="https://www.recordedfuture.com/2023-annual-report">2023 annual report</a> serves as a playbook of adversaries tactics, techniques, and procedures (TTPs) in 2023, with the goal of giving your security team a 360-degree view of the threat landscape. And with its predictions for 2024, the report also offers a roadmap for your enterprise. No matter where you are in your security journey, youll find the information you need to develop more effective security operations and strategies.</p><h4 id="the-influence-of-macro-trends-on-the-cyber-threat-landscape">The influence of macro trends on the cyber threat landscape.</h4><p>The report begins by reviewing key trends and events in technology, geopolitics, macroeconomics, and cyber policy in 2023. These include:</p><ul><li>Threat actors exploited enterprise software at scale, as observed in CL0P ransomware groups attack on third-party managed file transfer (MFT) services such as Fortras GoAnywhere and Progress Softwares MOVEit. </li><li>Offensive tooling is increasingly targeting Linux and macOS systems. Ransomware kits continue to expand beyond Windows environments, facilitating an expanded range of victims.</li><li>Nation states such as China-linked Spamouflage Dragon are already using AI-generated images to improve information operations (IO).</li></ul><p>Youll find valuable context and insights to connect the dots between these and other macro trends and the broader cyber threat landscape.</p><ul><li>Ransomware groups will likely increase their targeting of technologies supporting hybrid and remote work.</li><li>The phishing landscape will become the spearphishing landscape as generative AI helps attackers create particularized lures.</li><li>The rise of passwordless logins will likely drive criminal activity away from infostealers and back to email-based credential harvesting.</li></ul><h4 id="key-theme-1-ransomware-groups-will-likely-increase-their-targeting-of-technologies-supporting-hybrid-and-remote-work">Key theme #1: Ransomware groups will likely increase their targeting of technologies supporting hybrid and remote work.</h4><p>In 2023, threat actors inflicted widespread damage by taking advantage of the fact that hybrid work and cloud computing have made enterprises <a href="https://www.recordedfuture.com/blog/the-cloud-has-complicated-attack-surface-management">attack surfaces increasingly complex and hard to manage</a>. </p><p><strong>How Recorded Future can help:</strong> Recorded Future enables analysts to understand the top initial access vectors used by ransomware actors to target their victims. One of the most targeted vulnerabilities for VPN technologies in 2023 was <a href="https://www.recordedfuture.com/blog/fortinet-CVE-2023-27997-impact-mitigation-techniques">CVE-2023-27997</a>. Check out how you can evaluate an unpatched FortiOS VPN exposure by drilling into host details, including detected technologies. Be able to pivot to the vulnerability to see its use by FIN7.</p><div class="wistia_responsive_padding" style="padding:56.25% 0 0 0;position:relative;"><div class="wistia_responsive_wrapper" style="height:100%;left:0;position:absolute;top:0;width:100%;"><iframe src="https://fast.wistia.net/embed/iframe/esfuuon0rv?seo=false&videoFoam=true" title="Annual Report 2023: Ransomware &amp; Exposure Management Video" allow="autoplay; fullscreen" allowtransparency="true" frameborder="0" scrolling="no" class="wistia_embed" name="wistia_embed" msallowfullscreen width="100%" height="100%"></iframe></div></div><script src="https://fast.wistia.net/assets/external/E-v1.js" async></script><h4 id="key-theme-2-the-phishing-landscape-will-become-the-spearphishing-landscape-as-generative-ai-helps-attackers-create-particularized-lures">Key theme #2: The phishing landscape will become the spearphishing landscape as generative AI helps attackers create particularized lures.</h4><p>Although it will take time for threat actors to develop the knowledge and skills to integrate AI into their operations, early adopters are already working on ways to amplify their tactics with AI. </p><p>The most tangible risks involve influence operations, social engineering, data privacy breaches, and intellectual property violations. In 2023, adversaries began using AI-powered chatbots to create convincing phishing emails, support scam operations, and analyze e-commerce merchants anti-fraud systems to facilitate payment fraud. They also began advertising malicious open-source LLM projects on the dark web with the promise of producing malware, creating phishing emails, and more.</p><p><strong>How Recorded Future can help:</strong> Analysts can examine evidence of phishing in the Recorded Future platform with the Detection Trends dashboard. This dashboard visualizes detections across multiple security platforms, from SIEMs to SOARs to email security platforms. Filtering based on a specific MITRE T-code, such as <strong>T1598</strong>(Phishing for Information), analysts can quickly view associated YARA rules to run in their environment. The Detection Explorer will also showcase relevant indicators of compromise (IoC). We can see that this IoC has been used by <strong>TAG-66.</strong></p><div class=wistia_responsive_padding style=padding:56.25% 0 0 0;position:relative;><div class=wistia_responsive_wrapper style=height:100%;left:0;position:absolute;top:0;width:100%;><iframe src=https://fast.wistia.net/embed/iframe/zn4q8l15zi?seo=false&videoFoam=true title=Annual Report 2023: Using MITRE to Kick-Off Investigations (Phishing) Video allow=autoplay; fullscreen allowtransparency=true frameborder=0 scrolling=no class=wistia_embed name=wistia_embed msallowfullscreen width=100% height=100%></iframe></div></div><script src=https://fast.wistia.net/assets/external/E-v1.js async></script><p><strong>Get the 2023 Recorded Future Annual Report today.</strong></p><p><a href="https://www.recordedfuture.com/2023-annual-report">Download the Annual Report </a> for a comprehensive analysis of these and other critical threat events from 2023, plus a look at what we expect from adversaries in 2024. </p><p><a href="https://go.recordedfuture.com/demo?utm_campaign=demo-button-2023-top-nav-bar&utm_source=recordedfuture&utm_medium=website&utm_content=20231003&utm_term=website">Get in touch</a> with Recorded Future to find out how our technology solutions and expertise can help your organization stay a step ahead of adversaries and protect your business-critical IP.</p> Blog 2023 Annual Report https://www.recordedfuture.com/2023-annual-report Recorded Future urn:uuid:5086d311-a10f-deb7-ee58-65a87dd4ac8c Wed, 20 Mar 2024 20:00:00 -0400 Insikt Group analyzes cyber threat and geopolitical trends observed throughout 2023 and provides a comprehensive overview of the cyber threat landscape. <p>New Insikt research examines 2023, a year of unexpected outcomes and escalating cybersecurity threats. Throughout the year, cyber threat actors exploited the prevailing chaos to steal data, conduct espionage, and disrupt geopolitics, an example being nation-states like China targeting Taiwanese semiconductor firms. Additionally, the text highlights the rise in exploitation of &quot;as-a-service&quot; enterprise software and shared cloud infrastructure, which led to an increase in weaponized vulnerabilities and high-profile cyberattacks, such as the MOVEit exploit by the ransomware gang CL0P. This attack underscored the growing risk and profitability of targeting enterprise systems, suggesting a trend that could continue into 2024.</p><p>Furthermore, the abuse of legitimate internet services for malware distribution, the exploitation of Linux and macOS vulnerabilities, and the compromise of business process organizations for scams like SIM swapping were noted as tactics used by threat actors to extend their reach and effectiveness.</p><p><img src="https://cms.recordedfuture.com/uploads/unnamed_3_740b5ef73c.jpg" alt="unnamed-3.jpg"></p><p>Finally, we present our forecasts for the cyber threat landscape in 2024. These predictions not only focus on direct cybersecurity threats but also consider the broader implications of geopolitical and regulatory changes in the cybersecurity arena.</p><p>To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2024-0321.pdf">click here</a> to download the report as a PDF.</p> Research (Insikt) Attributing I-SOON: Private Contractor Linked to Multiple Chinese State-sponsored Groups https://www.recordedfuture.com/attributing-i-soon-private-contractor-linked-chinese-state-sponsored-groups Recorded Future urn:uuid:872a0e8d-0d1e-65fd-5da5-77cf80b3c1bb Tue, 19 Mar 2024 20:00:00 -0400 Insikt Group uncovers ties between I-SOON and multiple Chinese state-sponsored cyber groups like RedAlpha and RedHotel. <p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>New Insikt Group Research provides updated insights on the recent i-SOON leak. On February 18, 2024, an anonymous leak of documents from Anxun Information Technology Co., Ltd. (i-SOON), a Chinese IT and cybersecurity company, shed light on China&#39;s state-sponsored cyber espionage operations. The leak is significant as it reveals the connections between i-SOON and several Chinese state-sponsored cyber groups such as RedAlpha, RedHotel, and POISON CARP, indicating a sophisticated network of espionage operations that includes the theft of telecommunications data for tracking individuals. </p><p><img src="https://cms.recordedfuture.com/uploads/i_soon_a369d1c384.png" alt="i-soon.png"><em>Chinese threat activity groups linked to i-SOON (Source: Recorded Future)</em></p><p>Insikt Group&#39;s analysis of the leaked materials confirmed the operational and organizational ties between i-SOON and these espionage groups and also corroborates the role of digital quartermasters in providing shared cyber capabilities across Chinas offensive cyber ecosystem. This information is invaluable for network defenders, offering insights into the motivations and methodologies of targeted cyber espionage against public and private sector organizations.</p><p>Despite the leak, i-SOON, a relatively small entity within China&#39;s extensive network of private contractors engaged in state-sponsored cyber activities, is expected to continue its operations with minor adjustments. The revelations may have implications for future US legal actions against i-SOON personnel while providing a deeper understanding of the scale and sophistication of Chinese cyber-espionage efforts.</p><p>Notably, since the material was leaked, Insikt Group has already identified newly observed domain and infrastructure developments from i-SOON-linked groups RedAlpha and RedHotel.</p><p>To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2024-0320.pdf">click here</a> to download the report as a PDF.</p><h2>Appendix A Indicators of Compromise</h2><table><tbody><tr><td style="font-family:Courier New;background-color:#ffffff;"><strong>Note:</strong> These indicators are historical and often date back several years. They are included solely as a collation of the referenced infrastructure used in this report to identify connections between i-SOON and tracked Chinese state-sponsored threat activity and should not be used as indications of current activity.<br><br><strong>Domains:</strong><br>1ds[.]me<br>antspam-mail[.]services<br>bayantele[.]xyz<br>dnslookup[.]services<br>docx[.]1ds[.]me<br>gmail[.]isooncloud[.]com<br>gmailapp[.]me<br>i-soon[.]net<br>ip[.]1ds[.]me<br>lengmo[.]myds[.]me<br>lengmo[.]net<br>linercn[.]org<br>livehost[.]live<br>mailnotes[.]online<br>mailteso[.]online<br>mpt[.]buzz<br>mptcdn[.]com<br>mydigi[.]site<br>news[.]1ds[.]me<br>wcuhk[.]livehost[.]live<br>web[.]goog1eweb[.]com<br>whkedu[.]dnslookup[.]services<br>www[.]gmailapp[.]me<br>www[.]sw-hk[.]services<br><br><strong>IP Addresses:</strong><br>1.192.194[.]162<br>66.98.127[.]105<br>101.219.17[.]111<br>118.31.3[.]116<br>171.88.142[.]148<br>171.88.143[.]37<br>171.88.143[.]72<br>221.13.74[.]218<br><br><strong>Email Addresses:</strong><br><u>Chen Cheng aka lengmo:</u><br>l3n6m0@gmail[.]com<br><br><u>Wu Haibo aka Shutd0wn:</u><br>shutdown@139[.]com<br><br><u>Zheng Huadong:</u><br>yetiddbb@qq[.]com<br><br><u>Liang Guodong aka liner aka girder:</u><br>girvtr@gmail[.]com<br>liang007@outlook[.]com<br>gird4r@gmail[.]com<br>girder1992@hotmail[.]com<br>evalliang@163[.]com<br>6060841@qq[.]com<br>leungguodong@outlook[.]com<br>l3nor@hotmail[.]com<br></td></tr></tbody></table> Research (Insikt) Threat Intelligence for Financial Services https://www.recordedfuture.com/blog/threat-intelligence-for-financial-services Recorded Future urn:uuid:c825f00e-37da-fff4-f468-02ea65f8a871 Tue, 12 Mar 2024 20:00:00 -0400 Dive into the world of threat intelligence for financial services. Learn how to navigate cybersecurity challenges and deploy strategic solutions to protect assets and customer data <h3 id="four-challenges-and-four-solutions-to-improve-resilience">Four Challenges and Four Solutions to Improve Resilience</h3><p>Its no secret that cyber threat actors are hungry for customer data. According to <a href="https://www.ibm.com/downloads/cas/L0GKXDWJ">IBM</a>, data theft and leak was the most common impact for organizations that suffered an attack. In addition, a report from <a href="https://www.securityweek.com/the-ransomware-threat-in-2024-is-growing-report/">Delinea</a> found that data exfiltration was the most prominent motivation for ransomware attacks today. </p><p>There are few industries that handle more valuable customer data than the financial services industry. Thus there are few targets more attractive to a threat actor. </p><p>Many financial services organizations have substantial amounts of money and assets, which can make them attractive to ransomware attackers keen on going after big game targets. And the interconnected nature of the financial sector means that compromising one institution or commonly used product can lead to broader impacts across the entire industry. </p><p>In Recorded Futures recent fireside chat webinar, <a href="https://go.recordedfuture.com/client-financial-services-fireside-chat">Navigating Risk: How Threat Intelligence Is Transforming Financial Services</a>, Citizens Bank Cyber Threat Intelligence Manager Lea Cure summed up the complex nature of <a href="https://www.recordedfuture.com/blog/financial-services-cybersecurity-attack-surface-threats">financial services cybersecurity</a>:</p><p>As a financial institution, we have money, we have peoples information. Thinking about how we protect that information is very different from other organizations. The technologies we use and the technologies we use to move money are critical. If those go down, what will we do? What are our playbooks?</p><p>In this blog well cover the challenges financial services organizations face, and how for each challenge threat intelligence provides critical context to help defenders be faster, more efficient, and more effective at preventing nefarious actors from stealing their customer data and impacting business operations. </p><h2 id="challenge-1-supply-chain-attacks">Challenge #1: Supply Chain Attacks</h2><p>On numerous occasions, prospects and clients across industries have told us that supply chain attacks are a top concern. In our <a href="https://go.recordedfuture.com/client-financial-services-fireside-chat">fireside chat</a>, both our client panelists said they felt the same way. </p><p>Their concern is certainly warranted, as theres often little that can be done to prevent a supply chain attack. A <a href="https://www.gartner.com/en/newsroom/press-releases/2023-12-13-gartner-survey-finds-45-percent-of-organizations-experienced-third-party-related-business-interruptions-during-the-past-two-years">Gartner survey</a> found that 45% of organizations experienced third-party-related business interruptions over the past couple years. </p><p>Outside of the financial industry theres a lot less regulation, especially in the technology service providers area, said Christopher Martinkus, a Threat Intelligence Manager for a North American commercial bank. Thats where you see a lot of these breaches occurring. I know for us, weve seen way more attacks on our third-party service providers than weve seen targeting us specifically. </p><p>As an example, threat actors like the ransomware group CL0P focus on <a href="https://www.recordedfuture.com/patterns-targets-ransomware-exploitation-vulnerabilities-2017-2023">exploiting vulnerabilities</a> in file transfer software from Accellion, SolarWinds, and MOVEit. By gaining unauthorized access to files being transferred, CL0P has been able to steal sensitive information, encrypt files for ransom, and use the compromised files for other malicious activities. </p><p>Its becoming even more challenging to reduce risk across the supply chain in the as-a-service era. <a href="https://www.gartner.com/en/experts/zachary-smith">Zachary Smith</a>, Senior Principal of Research at <a href="https://www.gartner.com/en/newsroom/press-releases/2023-12-13-gartner-survey-finds-45-percent-of-organizations-experienced-third-party-related-business-interruptions-during-the-past-two-years">Gartner</a>, said, Cybersecurity teams struggle to build resilience against third-party-related disruptions and to influence third-party-related business decisions. </p><h2 id="solution-mitigate-supply-chain-risk">Solution: Mitigate Supply Chain Risk</h2><p>Can threat intelligence help organizations be more proactive in identifying risks that stem from their partners and vendors? Recorded Future client Christopher Martinkus thinks its possible to <a href="https://www.recordedfuture.com/solutions/supply-chain">mitigate supply chain risk</a>. </p><p>We&#39;ve actually had it where an alert came through that a third party of ours was listed on a ransomware extortion site, he said, and we were notifying that vendor before they even knew that they were listed there. </p> Blog Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign https://www.recordedfuture.com/russia-aligned-tag-70-targets-european-government-and-military-mail Recorded Future urn:uuid:39d21247-86ea-7fac-94b0-a94709be7cd4 Thu, 15 Feb 2024 19:00:00 -0500 Insikt Group has observed TAG-70 leveraging cross-site scripting (XSS) vulnerabilities against Roundcube webmail servers in Europe, targeting government, military, and national infrastructure. <p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>Recorded Futures Insikt Group has identified TAG-70, a threat actor likely operating on behalf of Belarus and Russia, conducting cyber-espionage against targeting government, military, and national infrastructure entities in Europe and Central Asia since at least December 2020. In its latest campaign, which ran between October and December 2023, TAG-70 exploited cross-site scripting (XSS) vulnerabilities in Roundcube webmail servers in its targeting of over 80 organizations, primarily in Georgia, Poland, and Ukraine. This activity is reminiscent of other Russian-aligned threat groups such as BlueDelta (APT28) and Sandworm, which have targeted email solutions, including Roundcube, in previous campaigns.</p><p><img src="https://cms.recordedfuture.com/uploads/tag_70_chart_28741e8d2b.png" alt="tag-70-chart.png"><em>Geographic spread of victims of TAG-70s Roundcube exploit in October 2023 (Source: Recorded Future)</em></p><p>The compromised email servers represent a significant risk, particularly in the context of the ongoing conflict in Ukraine. They could expose sensitive information about Ukraine&#39;s war effort, its diplomatic relations, and its coalition partners. Moreover, the targeting of Iranian embassies in Russia and the Netherlands suggests a broader geopolitical interest in assessing Iran&#39;s diplomatic activities, especially regarding its support for Russia in Ukraine. Similarly, espionage against Georgian government entities reflects interests in monitoring Georgia&#39;s aspirations for European Union (EU) and NATO accession.</p><p>To mitigate the risk posed by TAG-70&#39;s campaign, organizations should ensure that their Roundcube installations are patched and up-to-date, while actively hunting for indicators of compromise (IoCs) in their environments. The sophistication of TAG-70&#39;s attack methods and its targeting of government and military entities underscore the need for robust cybersecurity measures and proactive threat intelligence efforts. The widespread nature of TAG-70&#39;s activities and its potential impact on national security highlight the urgency for vigilance and preparedness among affected organizations and government agencies.</p><p>To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2024-0217.pdf">click here</a> to download the report as a PDF.</p> Research (Insikt) The Next Evolution of Recorded Future AI: Powering the Future of Threat Intelligence https://www.recordedfuture.com/blog/next-evolution-recorded-future-ai-powering-threat-intelligence Recorded Future urn:uuid:9cc6e4f9-00ac-578a-ca02-36de9d150bc9 Mon, 12 Feb 2024 19:00:00 -0500 Discover how Recorded Future AI delivers crucial threat intelligence and insights, enabling security teams to stay ahead of sophisticated cyber threats efficiently. <p><strong>Available in the following solutions:</strong><a href="https://www.recordedfuture.com/solutions/ransomware">Ransomware Mitigation</a>, <a href="https://www.recordedfuture.com/solutions/automation-security-workflows">Automated Security Workflows</a>, and <a href="https://www.recordedfuture.com/solutions/supply-chain">Mitigate Supply Chain Risk</a><br></p><p><strong>Available in the following modules:</strong><a href="https://www.recordedfuture.com/products/threat-intelligence">Threat Intelligence</a>, and <a href="https://www.recordedfuture.com/products/geopolitical-intelligence">Geopolitical Intelligence</a><br></p><p>In the ever-changing and converging threat landscape, organizations must remain vigilant to protect their critical assets and sensitive data from increasingly sophisticated attacks. At Recorded Future, were constantly finding new innovations to help customers deal with their most pressing security challenges. Back in April 2023, we were the first company to introduce AI for Intelligence with Recorded Future AI Insights. Today, we are excited to announce the general availability of the next evolution with Enterprise AI for Intelligence, supercharged with a generative AI-based assistant.</p><p>This capability gives security teams on-demand access to critical threat intelligence and actionable insights via a simple natural language interface. Combining the power of <a href="https://www.recordedfuture.com/platform/intelligence-cloud">Recorded Futures Intelligence Cloud</a>, the most comprehensive and transparent sourcing* in the industry. This includes research and reports from <a href="https://www.recordedfuture.com/research/insikt-group">Insikt Group</a>, Recorded Futures threat research division. Our AI continuously learns and adapts, providing security teams with the most up-to-date and relevant threat intelligence.</p><h2 id="see-recorded-future-ai-in-action">See Recorded Future AI in Action</h2><h3 id="scenario-1-based-on-an-indicator-of-compromise-ioc-related-to-bluebravo-a-cti-analyst-is-tasked-to-provide-information-related-to-the-full-scope-of-the-threat">Scenario 1: Based on an indicator of compromise (IoC) related to BlueBravo, a CTI analyst is tasked to provide information related to the full scope of the threat.</h3><p>The IP Intelligence Card highlights a known command and control (C2) server associated with <a href="https://www.recordedfuture.com/bluebravo-uses-ambassador-lure-deploy-graphicalneutrino-malware">BlueBravo</a>.</p><p><img src="https://cms.recordedfuture.com/uploads/AI_blog_2_031c4cf14a.png" alt="AI-blog-2.png"></p><p>Recorded Future AI provides powerful assistance in understanding a comprehensive list of tactics, techniques, and procedures (TTPs), and associated indicators of compromise (IoCs) with BlueBravo. As MITRE is a common framework to analyze attacks, Recorded Future AI can tie the TTPs to specific MITRE T-codes. The Red Team can use information about how BlueBravo targets Windows Management Instrumentation (WMI) and powershell to inform their next threat hunt.</p><p><img src="https://cms.recordedfuture.com/uploads/AI_blog_3_b6aed9b6b3.png" alt="AI-blog-3.png"></p><h3 id="scenario-2-a-cti-team-needs-to-assess-the-latest-zero-day-vulnerabilities-prioritize-by-active-exploits-and-provide-an-executive-summary-to-the-ciso">Scenario 2. A CTI team needs to assess the latest zero-day vulnerabilities, prioritize by active exploits and provide an executive summary to the CISO.</h3><p>Search for the latest vulnerabilities using simple English prompts and Recorded Future AI will provide a list with embedded links into each CVE showing details, remediation steps, and playbooks. </p><p><img src="https://cms.recordedfuture.com/uploads/AI_Blog_4_4943970ce6.png" alt="AI-Blog-4.png"></p><p>An analyst can quickly create a comprehensive executive summary of the <a href="https://www.recordedfuture.com/products/vulnerability-intelligence">vulnerability assessment</a> for their CISO - and generate a report that used to take hours in a matter of minutes. </p><p><img src="https://cms.recordedfuture.com/uploads/AI_blog_5_445e0a5760.png" alt="AI-blog-5.png"><img src="https://cms.recordedfuture.com/uploads/AI_blog_6_005b076457.png" alt="AI-blog-6.png"></p><h3 id="scenario-3-an-intelligence-team-needs-to-monitor-geopolitical-trends-and-their-impact-on-cyber-events">Scenario 3: An intelligence team needs to monitor geopolitical trends and their impact on cyber events.</h3><p>With elections, summits, and hearings, government entities need to stay up-to-date on cybersecurity threats and provide real-time reporting to their chain of command.</p><p>Lets look at how Recorded Future AI gathers information on China&#39;s disinformation campaigns.</p><p><img src="https://cms.recordedfuture.com/uploads/AI_blog_7_283fe8071e.png" alt="AI-blog-7.png"></p><p>Suggested follow-up questions from Recorded Future AI expands the scope of your inquiry and provides additional insights. Recorded Future provided this follow-on question about the Volt Typhoon cyber campaign. </p><p><img src="https://cms.recordedfuture.com/uploads/AI_blog_8_e775dd7237.png" alt="AI-blog-8.png"></p><h2 id="discover-whats-next-with-recorded-future-ai">Discover Whats Next with Recorded Future AI.</h2><p>For Security teams that need to detect and respond to suspicious activity, time is of the essence. Recorded Future AI will continue to evolve so that analysts can automatically aggregate and analyze commonalities across attacks, brand exposure, and much more. To stay up-to-date on the latest in AI-driven threat intelligence, <a href="https://go.recordedfuture.com/cyber-daily?utm_campaign=search__us__cyber_daily&utm_term=cyber%20daily_p&utm_source=google&utm_medium=ppc&utm_content=574841911147&hsa_ver=3&hsa_acc=7443287029&hsa_mt=p&hsa_src=g&hsa_cam=15866256612&hsa_grp=133857593404&hsa_tgt=kwd-851343250790&hsa_kw=cyber%20daily&hsa_ad=574841911147&hsa_net=adwords&gad_source=1&gclid=CjwKCAiAlJKuBhAdEiwAnZb7lUTUlODq-2CIHrBdEIQIm0XSXpvsuQElS6sJWGnjGFLZvyz9oojDFRoCNfIQAvD_BwE">sign up</a> for our newsletter.</p><p><em>*Open web, dark web, technical, and our proprietary Insikt Group sources. We are the only threat intelligence provider that offers mid-point / network traffic analysis with your proprietary data.</em></p><p><em>***Recorded Future uses OpenAI&#39;s large-scale language generation model to summarize content and help our clients consume the vast intelligence available via Recorded Future more efficiently.</em></p> Blog Leaks and Revelations: A Web of IRGC Networks and Cyber Companies https://www.recordedfuture.com/leaks-and-revelations-irgc-networks-cyber-companies Recorded Future urn:uuid:450a0dbf-ecbb-449d-04b5-5d00470e08e9 Wed, 24 Jan 2024 19:00:00 -0500 Iranian intelligence and military, along with contractors, target democratic processes in Western countries, including the 2020 US election. <p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>The report discusses Iranian intelligence and military entities associated with the Islamic Revolutionary Guard Corps (IRGC) involved in cyber activities targeting Western countries through their network of contracting companies. Four known intelligence and military organizations linked to the IRGC engage with cyber contractors. Iranian threat groups linked to the network of contracting parties have launched espionage and ransomware attacks and are leading efforts to destabilize target countries through information operations. The victims are linked to governments, media, non-governmental organizations, critical infrastructure, and the healthcare sector, just to name a few. Some contractors are also implicated in developing technologies that enable surveillance activity that contributes to human rights abuses. </p><p>The IRGC-related cyber companies export technologies for surveillance and offensive purposes. The report highlights some select cases of financial activities outside Iran, suggesting contractors likely rely on the IRGC Quds Force (QF) for lucrative arrangements in countries like Iraq, Syria, and Lebanon. </p><p><img src="https://cms.recordedfuture.com/uploads/Leaks_and_Revelations_001_52f7656887.png" alt="Leaks-and-Revelations-001.png"><em>Major ransomware-style attacks led by pro-Iranian government fronts like Moses Staff, N3tW0rm, and Agrius (Source: Recorded Future)</em></p><p>The report delves into an interconnected network associated with the IRGC&#39;s cyber program, revealed by a string of multi-year leaks and doxxing efforts led by anti-government hacktivists and dissident networks. Overlaps between sanctioned individuals and specific contracting parties are observed. </p><p>To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2024-0125.pdf">click here</a> to download the report as a PDF.</p> Research (Insikt) Annual Payment Fraud Intelligence Report: 2023 https://www.recordedfuture.com/annual-payment-fraud-intelligence-report-2023 Recorded Future urn:uuid:2e8cb7c6-27b5-96eb-fb49-78e3f363d696 Wed, 20 Dec 2023 19:00:00 -0500 2023's payment fraud trends predict a persistent underground market and evolving sophisticated cyber-fraud threats in 2024. <p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>In 2023, the payment fraud underground showed signs of recovery following Russian law enforcement&#39;s crackdown on domestic cybercriminals and the Russian invasion of Ukraine in 2022. The dark web carding shops saw a rebound in the volume of stolen payment cards, with 119 million cards posted for sale online. The median fraud charge was $79, resulting in $9.4 billion in preventable fraud losses for card issuers and $35 billion in potential chargeback fees for merchants and acquirers.</p><img src="https://cms.recordedfuture.com/uploads/annual_payment_fraud_intelligence_report_2023_year_review_47d772273d.jpg" alt="Annual payment fraud intelligence report 2023" style="margin: auto;" /><p>Fraudsters refined their techniques, using sophisticated social engineering tactics, phishing, scams, and advanced cyber-based tools like 3-D Secure bypass software. The report suggests that the trend toward hybrid cyber-fraud threats is likely to accelerate in 2024, requiring financial institutions and stakeholders to allocate resources for improved collaboration between cyber threat intelligence (CTI) and fraud teams.</p><p>Magecart actors continued to use Google Tag Manager, Telegram Messenger, and attack-carrier domains for e-skimmer infections in 2023. Restaurants, bars, and online ordering platforms were targeted, and phishing and scam pages gained prominence for card compromise. Most breaches and e-skimmer infections targeted US merchants, but a significant portion affected merchants in other countries with developed e-commerce sectors.</p><p>Threat actors engaged in card-testing activity, and workflows for 3DS bypass gained popularity in 2023. Cybercriminals utilized artificial intelligence workflows for fraud schemes, and social engineering tactics exploiting victims became more prevalent. Telegram sources became increasingly important for free full card data, but the threat remained lower compared to for-sale card data on dark web carding shops.</p><p>Looking ahead to 2024, fraudsters are expected to refine their tactics, continuing to compromise cards using both old and new methods. Stolen payment cards from North American and European financial institutions led in volume throughout 2023 and are likely to persist in 2024. The report concludes that in 2024, fraudsters will likely combine sophisticated technical solutions, nuanced workflows, and social engineering tactics to bypass rules-based fraud detection.</p><p>To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/cta%20-2023-1221.pdf">click here</a> to download the report as a PDF.</p> Research (Insikt) Aggressive Malign Influence Threatens to Shape US 2024 Elections https://www.recordedfuture.com/aggressive-malign-influence-threatens-us-2024-elections Recorded Future urn:uuid:44aff969-9967-718a-fa2f-f5e89561e19b Wed, 13 Dec 2023 19:00:00 -0500 Russia, China, Iran, domestic violent extremists (DVEs), and hacktivist groups will very likely conduct influence operations at varying levels of magnitude and sophistication to shape or disrupt the United States (US) 2024 elections in pursuit of strategic geopolitical goals. <p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>New Insikt Group research outlines malign influence threats to the United States&#39;s 2024 elections from various actors, including Russia, China, Iran, domestic violent extremists (DVEs), and hacktivist groups. These entities are expected to engage in influence operations to shape or disrupt the elections for strategic geopolitical purposes. The dynamic global backdrop, including Russia&#39;s war with Ukraine, Israel&#39;s conflict with Iran-supported Hamas, China&#39;s assertiveness on Taiwan, and social media content moderation controversies, creates a conducive environment for aggressive targeting of the 2024 US elections.</p><p>The identified overarching influence trends include increasing polarization and undermining confidence in US democratic institutions, reducing domestic support for aiding US allies, and undermining political candidates with unfavorable policies while promoting those with favorable policies. Influence operations are anticipated to employ historical and innovative tactics, including cyber-enabled operations and the integration of generative artificial intelligence. </p><p>Additionally, the report warns of the likelihood of DVEs physically attacking and threatening election personnel or infrastructure and an increase in false information surrounding US-deployed voting technologies and voting systems manufacturers from domestic sources as the 2024 elections approach.</p><p><img src="https://cms.recordedfuture.com/uploads/malign_influence_threatens_2024_us_elections_joe_biden_729bcfc106.png" alt="Aggressive Malign Influence Threatens to Shape US 2024 Elections" style="margin: auto;" /><em>Screenshot of RTs parody video The 11th Package of Anti-Russian Sanctions Challenge featuring a deepfake of US president Joe Biden (Source: <a href="https://www.rt.com/rt-promo-2022-en/#sanctions">RT</a>)</em></p><p>The spread of false and manipulated information by state and non-state actors has the potential to influence voter behavior and impact election outcomes. Insikt Groups findings emphasize that even unsuccessful influence activities can damage public trust in democratic institutions. Advanced actors may leverage official announcements and events opportunistically in pursuit of their objectives.</p><p>To counter these threats, a whole-of-government approach integrated with private industry is recommended. This involves publicly identifying, announcing, and refuting false information related to the elections. Prebunking, or proactively addressing misinformation, is suggested as a method to enable the public to discern credible information. Awareness among government officials, public figures, and business executives, along with pre-planned playbooks and responses, is deemed crucial to mitigating risks associated with influence activities.</p><p>To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2023-1214.pdf">click here</a> to download the report as a PDF.</p> Research (Insikt) Charting China’s Climb as a Leading Global Cyber Power https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power Recorded Future urn:uuid:d28b66d0-7d18-6e08-09ad-a440c8c26277 Mon, 06 Nov 2023 19:00:00 -0500 Keeping SEC-ure: Using Threat Intelligence to Stay Ahead of the New SEC Regulations https://www.recordedfuture.com/blog/keeping-secure-threat-intelligence-stay-ahead-new-sec-regulations Recorded Future urn:uuid:67c5339a-ab42-5da7-623e-35ca19576063 Mon, 02 Oct 2023 20:00:00 -0400 Explore how Recorded Future's threat intelligence aids compliance with new SEC Cybersecurity Regulations, ensuring proactive cyber risk management & transparent communication with the market. <h3 id="introduction">Introduction</h3><p>Recently there have been <a href="https://www.forbes.com/sites/chuckbrooks/2023/03/05/cybersecurity-trends--statistics-for-2023-more-treachery-and-risk-ahead-as-attack-surface-and-hacker-capabilities-grow/?sh=1aa49aa919db">millions</a> of attacks demonstrating that public companies of all sizes and operating in all industries are susceptible to cybersecurity incidents. These incidents can cause business interruptions, impose direct costs via remediation or ransomware payments, lost revenues due to exfiltration of intellectual property and interruptions, litigation and regulatory risk, and damage to reputation. </p><p>In response, on Sept. 5, the SECs latest Cybersecurity Risk Management, Strategy, Governance and Incident Disclosure rule went into effect which fundamentally altered the way US public companies communicate with the market about cybersecurity incidents and governance. </p><p>The <a href="https://www.sec.gov/files/rules/proposed/2022/33-11038.pdf">SEC</a> sought to enhance and standardize disclosures to better inform investors about cybersecurity related matters. Given the ever increasing importance of availability, integrity and confidentiality of information and infrastructure as digital transformation has accelerated, it is unsurprising that the SEC has stepped in to ensure that public markets have sufficient transparency related to these issues. </p><p>Fortunately, public companies do not need to face these challenges alone. Commercial threat intelligence providers, and Recorded Future especially, can help regulated entities tackle these new regulatory obligations while mitigating their cybersecurity risk. </p><h3 id="third-party-risk">Third-Party Risk</h3><p>One of the key <a href="https://info.cybergrx.com/ponemon-report">statistics</a> highlighted by the SEC in the proposal of this new rule is that 63% of breaches are linked to a third party. The SEC also clarified that updates to Item 106(b) of Regulation S-K will require disclosure concerning a registrants selection and oversight ofthird-party entities.</p><p>Recorded Futures <a href="https://www.recordedfuture.com/platform/third-party-intelligence">Third-Party Intelligence Module</a> is geared to specifically address this concern. Recorded Future Third-Party Intelligence empowers security teams and business leaders to make fast, informed decisions about the companies in their organizations supply chain and reduce the overall risk of data breaches and reputational damage. Third-Party Intelligence provides deep visibility into suspicious activity related to vendor ecosystems, and provides organizations an opportunity to conduct meaningful oversight of third-party entities. </p><p>One of the biggest differentiators of commercial threat intelligence providers, is that cybersecurity governance shifts from relying on a vendors answers to a security questionnaire that may be inaccurate and/or stale to externally sourced intelligence. This can give investors confidence that organizations are using independently collected data to have visibility into their supply chains. </p><p>Recorded Futures Third Party Intelligence Module gives real-time alerts on security incidents, breaches, and a wide variety of risky security practices allowing registrants to stay a step ahead. Plus, Recorded Future provides access to exclusive sources including high-tier dark web forums, ransomware extortion sites, and a massive leaked credential and data library to better protect organizations from emerging risk. Third Party Intelligence also provides quantitative Risk Scores for third parties better enabling cybersecurity risk assessment as required under Item 106(b). </p><h3 id="cybersecurity-incident-reporting">Cybersecurity Incident Reporting</h3><p>Under the updated rule, the SEC has amended Form 8-K to require current disclosure of material cybersecurity incidents. Given that organizations will be mandated to disclose these incidents, it is imperative that registrants have as much context and intelligence about incidents as possible. </p><p>Recorded Futures Intelligence Cloud is perfectly positioned to provide that insight. This extends from information about <a href="https://www.recordedfuture.com/support/threat-actor-cards">threat actors</a> via the <a href="https://www.recordedfuture.com/platform/threat-intelligence">Threat Intelligence</a> Module, to granular exposure insights. Examples include compromised credentials via <a href="https://www.recordedfuture.com/platform/identity-intelligence">Identity Intelligence</a> Modules and compromised card data via the <a href="https://www.recordedfuture.com/platform/payment-fraud-intelligence">Fraud Intelligence</a> Module to provide visibility into the exact extent of a specific breach. </p><p>One can imagine the materially different way the market may react to a disclosure with an unknown threat actor, unknown scope, and unknown intent, versus being able to provide guidance of the probable intent of the threat actor, past history of the threat actor, and the precise scale of impact. For example, the public exposure related to an incident connected with <a href="https://www.recordedfuture.com/chinese-state-sponsored-cyber-espionage-expansion-power-influence-southeast-asia">Chinese state-sponsored</a> advanced persistent threat will be dramatically different compared to an attack associated with <a href="https://www.recordedfuture.com/ransomware-as-a-service">ransomware-as-a-service</a> actors which are more often associated with reputational risks. </p><p>Accessible intelligence will better enable organizations to address Item 1.05 in Form 8-K to assess whether any data was stolen, altered, accessed, or used for any other unauthorized purpose. Only comprehensive threat intelligence will allow companies to confidently determine motivations of threat actors, their typical TTPs, and insights into the criminal underground where data is monetized.</p><p>Further, given that the SEC will require disclosure by organizations within four business days, it is imperative to have a threat intelligence provider, like Recorded Future, that operates in <a href="https://www.recordedfuture.com/platform/intelligence-graph">real time</a>. It is also important to note that the ticking clock only starts upon determination of materiality - yet another analysis where threat intelligence can help in better understanding the scope and impact of the incident. The SEC itself <a href="https://www.sec.gov/files/rules/proposed/2022/33-11038.pdf">states</a> that the analysis should [take] into consideration all relevant facts and circumstances surrounding the cybersecurity incident and threat intelligence can provide such context. </p><h3 id="policies-and-procedures-to-identify-and-manage-cybersecurity-risk">Policies and Procedures to Identify and Manage Cybersecurity Risk</h3><p>One of the elements of the SEC rule is that Item 106 will be added to Regulation S-K which will require registrants to describe its policies and procedures, if any, for the identification and management of risks from cybersecurity threats. </p><p>Last year, Recorded Future launched <a href="https://www.recordedfuture.com/use-a-threat-map-to-visualize-your-cyber-threats">Threat Maps</a> which automates the analysis of threat actors targeting a clients enterprise, and organizes the intent and opportunity of those groups to harm an organization. An organizations customized Threat Map shows the most dangerous threats that have an opportunity to harm an organization, and changes over time allows security teams to better prioritize countermeasures. Use of Threat Maps allow organizations to carefully calibrate response and granularly identify specific threats - it is the difference between merely gesturing at Nation-State Threats writ large, and actually being able to point to specific threats such as <a href="https://www.recordedfuture.com/north-koreas-cyber-strategy">Lazarus Group</a>. This level of granularity allows organizations to have actionable insights to both be more authoritative with the market, and more efficiently deploy risk mitigation strategies. </p><p>Threat Maps join Recorded Futures expansive offerings, such as <a href="https://www.recordedfuture.com/platform/secops-intelligence">SecOps Intelligence</a>, which collects data from a comprehensive range of sources, contextualizes it, and feeds meaningful insights directly into existing security tools and workflows to improve alert triage, threat detection, and threat blocking - providing a more comprehensive process in line with SEC requirements. </p><h3 id="conclusion">Conclusion</h3><p>The SEC has ushered in a new era of cybersecurity transparency for public companies. Public companies should begin preparing immediately for the enforcement of these updates. Preparations should be focused on the collaboration between internal stakeholders and access to the relevant information from both external and internal sources to be able to comply with the new requirements. </p><p>To tackle these challenges, it is now imperative that registrants have the most comprehensive and timely intelligence available - Recorded Future is the most comprehensive and independent threat intelligence cloud platform. It enables organizations to identify and mitigate threats across cyber, supply-chain, physical, and fraud domains, and can be a powerful tool in complying with the new regulations. </p><p><em><strong>Hear me talk to Christopher Hart (Partner at Foley Hoag LLP) and Lavonne Burke (VP Legal - Global Security &amp; Resilience and Digital (IT) at Dell Technologies) about these regulations and how organizations can stay ahead at <a href="https://recordedfuture.cventevents.com/event/0203d0b1-5001-4775-a538-25514e9d4a71/websitePage:a6645acb-f7e6-4b9a-99c3-079ca5f1890a">PREDICT 2023 in Washington D.C.</a> on Oct. 11 at 10:05 a.m. ET.</strong></em></p> Blog Multi-year Chinese APT Campaign Targets South Korean Academic, Government, and Political Entities https://www.recordedfuture.com/multi-year-chinese-apt-campaign-targets-south-korean-academic-government-political-entities Recorded Future urn:uuid:f832407d-bc73-37dd-a550-32fb9099b619 Mon, 18 Sep 2023 20:00:00 -0400 Insikt Group shares analysis of TAG-74, a Chinese-led cyber-espionage campaign targeting South Korean academia, politics, and government. <p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>Recorded Future&#39;s Insikt Group has conducted an analysis of a prolonged cyber-espionage campaign known as TAG-74, which is attributed to Chinese state-sponsored actors. TAG-74 primarily focuses on infiltrating South Korean academic, political, and government organizations. This group has been linked to Chinese military intelligence and poses a significant threat to academic, aerospace and defense, government, military, and political entities in South Korea, Japan, and Russia. TAG-74s targeting of South Korean academic institutions aligns with China&#39;s broader espionage efforts aimed at intellectual property theft and expanding its influence within higher education worldwide.</p><p>The motivation behind Chinese state-sponsored actors collecting intelligence in South Korea is likely driven by regional proximity and South Korea&#39;s strategic role in China&#39;s competition with the United States and its regional allies in the Indo-Pacific. Recent tensions have emerged as China expressed concerns about South Korea&#39;s closer relations with the US and its perceived involvement in Taiwan and alignment with the US and Japan&#39;s containment of China. TAG-74&#39;s intelligence collection efforts, which include spoofed domains and decoy documents related to inter-Korean cooperation, are expected to intensify as China seeks information to shape its diplomatic and business engagements with South Korean entities.</p><p><img src="https://cms.recordedfuture.com/uploads/multi_year_chinese_apt_campaign_targets_south_korean_academic_government_political_entities_body_ecee001094.png" alt="multi-year-chinese-apt-campaign-targets-south-korean-academic-government-political-entities-body.png"><em>Typical infection chain observed in TAG-74 campaign targeting South Korea (Source: Recorded Future)</em></p><p>TAG-74 is a well-established Chinese state-sponsored threat activity group specializing in intelligence collection against South Korean, Japanese, and Russian organizations. Their tactics, techniques, and procedures (TTPs) include the use of .chm files that trigger a DLL search order hijacking execution chain to load a customized version of the VBScript backdoor ReVBShell. Additionally, a custom backdoor known as Bisonal is used to enhance capabilities once initial access through ReVBShell is established. This customized ReVBShell variant is likely shared between TAG-74 and another closely related threat activity group, Tick Group, indicating collaboration between these groups.</p><p>The persistence of TAG-74 in targeting South Korean organizations and its likely operational alignment with the Northern Theater Command suggests that the group will continue its active and long-term intelligence-gathering efforts in South Korea, Japan, and Russia. Notably, the use of .chm files by Chinese state-sponsored actors is not particularly common outside of South Korea. However, the use of this attack vector in activity targeting South Korea has been seen both in TAG-74 campaigns and, more widely, in activity attributed to North Korean state-sponsored threat activity groups such as Kimsuky and APT37. Organizations should monitor for the presence and use of .chm files, particularly if they are not commonly used within their environment, as this tactic has gained prevalence among threat actors in recent years.</p><p>To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0919.pdf">click here</a>.</p> Research (Insikt) Recruiter Tips: Insights on the Hiring Process at Recorded Future https://www.recordedfuture.com/blog/hiring-process-recruiter-insights Recorded Future urn:uuid:1c98aaf8-05e9-12c3-c37f-f259589e42e9 Wed, 16 Aug 2023 20:00:00 -0400 Discover insights from a Recruiter at Recorded Future, the world's largest threat intelligence company, about their hiring process and improving the candidate experience. <p>Recorded Future is the worlds largest threat intelligence company. It is the most comprehensive and independent threat intelligence cloud platform. It enables organizations to identify and mitigate threats across cyber, supply-chain, physical, and fraud domains. It is trusted by 1,700+ customers to get real-time, unbiased and actionable intelligence.</p><p>As a company, we strongly believe our employees are the backbone of our success. Perfecting our hiring process and candidate journey is crucial both for us and the talents we interact with on a daily basis. Recorded Future is committed to being a workplace that attracts top talents and an environment where builders thrive.</p><p>This blog shares great insights and best practices to engage top talent and provide a world-class candidate experience. We wanted to hear from an expert, so we interviewed Chris Barnes, Recruiting Manager at Recorded Future. </p><h3 id="the-basics">The Basics</h3><p><em>Can you introduce yourself and what you do at Recorded Future?</em></p><p><strong>Chris:</strong> Im Chris, I manage talent acquisition for all technical and post-sales departments in North America and I&#39;ve been with Recorded Future for almost two years.</p><p><img src="https://cms.recordedfuture.com/uploads/chris_barnes_recruiting_manager_tips_d84da055ce.jpg" alt="chris-barnes-recruiting-manager-tips.jpg"></p><p><em>What does Recorded Future do?</em></p><p><strong>Chris:</strong> Recorded Future is able to help organizations protect their security posture in a wide variety of ways. Whether it&#39;s protecting their security posture from a security operations standpoint, protecting their security posture from a brand management standpoint, or a third-party vendor management standpoint for instance. We provide clients with actionable intelligence in all of these areas and more. It helps clients take more of a proactive stance in their security posture, especially given the fact that in the last 10 years in the cyber security space, a lot of tools are being used more from a reactive approach.</p><p>Recorded Future is the most comprehensive and independent threat intelligence cloud platform. It enables organizations to identify and mitigate threats across cyber, supply-chain, physical, and fraud domains. It is trusted by 1,700+ customers to get real-time, unbiased and actionable intelligence. <a href="https://www.recordedfuture.com/platform">Learn more about our platform</a>.</p><p><em>Can you tell us a bit about your experience at Recorded Future so far?</em></p><p><strong>Chris:</strong> Its been very positive. It&#39;s a very collaborative environment here and I am really able to drive talent initiatives and recruit for a purposeful mission. What we do: securing the world with intelligence is really unique and being able to recruit for that mission is really exciting.</p><h3 id="the-interview-process">The Interview Process</h3><p><em>What is the process like?</em></p><p><strong>Chris:</strong> The process at Recorded Future typically consists of five stages. </p><ol><li><p><strong>Resume Review:</strong> that would be reviewing a candidate&#39;s resume. </p></li><li><p><strong>Preliminary Screen:</strong> if their profile seems to fit the roles needs and requirements - a phone call with a recruiter is scheduled to determine if the candidate&#39;s experience aligns well with the goals for the position.</p></li><li><p><strong>Interviews:</strong> if the preliminary screen is a success, the candidate typically moves to either a panel interview or one-on-one interviews with employees they would collaborate with, should they be hired. </p></li><li><p><strong>For technical positions</strong> this usually includes additional assessments such as a code walkthrough, product demonstration, or scenario-based exercise. For some of the client-facing positions we have, candidates might be evaluated in role play scenarios as well.</p></li><li><p><strong>References:</strong> upon success in the previous steps we will gather references from the candidate.</p></li></ol><p>Decision: the hiring team will then determine if they will extend an offer to the candidate.</p><p><em>How does the process differ from one job to another or to a non-technical team?</em></p><p><strong>Chris:</strong> The interview process for our technical teams usually focuses on a specific technical skill set that will enable success against the business objectives for the position. This can be evaluated in the form of a technical case study, code walk-through, or technical presentation. In our working environment, collaboration is a key factor for successful initiatives and the technical evaluation also allows for a candidate to demonstrate how they would approach working with other team members.</p><h3 id="what-we-look-for-in-candidates">What We Look For In Candidates</h3><p><em>What type of positions do you look to hire for?</em></p><p><strong>Chris:</strong> Recorded Future hires across the globe into multiple functions from engineering, to customer service, consulting, and sales.</p><p><em>What skill sets do you look for?</em></p><p><strong>Chris:</strong> While the exact skills required may differ among roles, we consistently seek extraordinary people who align with our values, work hard and are willing to go the extra mile to achieve goals.</p><p>For technical or semi-technical roles, the experience and skills we look for in candidates align to the technical components of our product and how we provide threat intelligence to our clients. For instance, Python is an essential language for some of our roles. That skill-set can apply to a wide-ranging amount of positions, such as Customer Success Managers, Data Engineering, Professional Services, Threat Research, and many other technical teams we have. </p><p>All of our positions require strong written and verbal communication skills. When providing information to internal or external stakeholders, it is imperative to be able to clearly define and articulate information needed to grow our business.</p><h3 id="resume-building--interviewing-tips">Resume Building &amp; Interviewing Tips</h3><p><em>Do you have any advice for crafting a strong resume for the industry?</em></p><p><strong>Chris:</strong> Something that is not thought of as much as it should be, is the ability to clearly define your experience and accomplishments in your resume format, so your skill-sets and experience align to the position clearly and thoughtfully. A common best practice is describing not only what you know, but how you applied your skills, and how it resulted in success for the business through a measurable indicator. Your resume should broadcast how your skills align to the criteria needed to achieve success in the position. If this is not defined clearly and thoroughly, it could be hard to determine if your experience aligns to the position.</p><p><em>Is it important to match a resume to the job description?</em></p><p><strong>Chris:</strong> It is common for a candidate to have multiple resumes that can speak to their experience in different ways. In each version, I would still recommend demonstrating how you have used your experience.</p><p><em>How should someone prepare for an interview?</em></p><p><strong>Chris:</strong> To start, be on-time and ready for the interview, aware of who you are interviewing with, have an understanding of the history of the company, what the business focus of the company is, and based on the information that has been shared with them thus far, an understanding of the position. Come prepared with questions and ready to share why youre interested in the opportunity.</p><p>The job description and the business focus of a company should definitely be part of the research and preparation, prior to an interview. However, looking deep into a company throughout the interview process and taking advantage of the time you have with the interviewers to learn about how you can grow, how you can collaborate with others, and how the position you are interviewing for can contribute to the mission of the company are the foundation to understanding the position in totality. This is something each candidate should consider at each step of the interview process. Ultimately, this is how you will be utilizing your time when striving for success!</p><p><em>Any interviewing tips?</em></p><p><strong>Chris:</strong> When interviewing for a position at any stage in the interview process, it is important to show you have invested time in researching our company. You could have experience and skills that match all requirements of the position, but if a candidate shows a lack of preparation or awareness for the interview, it will be seen as they may take a similar approach to their work, once hired.</p><p>Regardless of the position we are hiring for, a good tool for candidates is to apply the STAR method (describing examples by clearly defining the situation, task, action, and result) when describing their experience. The STAR method not only clearly defines the steps someone took to achieve success, but it also allows the hiring team to fully determine whether or not a candidate has experience needed to successfully complete the business objectives aligned to the position.</p><p><em>Are there any particular questions you often ask candidates during interviews?</em></p><p><strong>Chris:</strong> I ask each candidate what they know about Recorded Future to start the interview to gauge the amount of interest and research they put into their preparation for the interview. I also ask why they are interested in Recorded Future, and what is driving their interest for a new opportunity in their career.</p><h3 id="why-you-should-join-recorded-future">Why You Should Join Recorded Future</h3><p><em>How would you describe the company culture at our organization?</em></p><p><strong>Chris:</strong> We have three Core Values that all of our Futurists live by: We have high standards, act ethically, and we practice inclusion. We are a highly collaborative environment: supporting team members across the organization acts as the ultimate driver of our success. This core aspect of our DNA truly drives our ability to grow. The mission of the company really aligns well with our culture and regardless of what department you work in and the responsibilities of your position, you are contributing to something that is making the world safer. </p><p>Read more about our core values: <a href="https://www.recordedfuture.com/company-values-our-guiding-principles">Setting The Scene - Company Core Values, Our Guiding Principles</a></p><p><em>What opportunities for growth and development does our company offer?</em></p><p><strong>Chris:</strong> As part of development and career progression for Futurists, all levels of management encourage and support development and career progression for their team members. There are current examples of this that range from Interns who were offered a full-time position upon completion of their Internship, to Futurists who have moved to adjacent teams within the company based on personal interest, and those who have chosen to pursue career advancement into SME or management positions. </p><h3 id="final-words">Final Words</h3><p>There are many reasons why Recorded Future is a great opportunity for job seekers. 1. We are a leader in the industry: no one is doing what we&#39;re doing at the scale that we are. Were the world&#39;s largest intelligence company. 2. Probably most importantly, were a people-first company. Whether that&#39;s in the way we collaborate together, the way we promote diversity and inclusion, or the way we put a strong focus on learning and development and building tailored careers for our employees so they can thrive and build their own paths.</p><p>Learn more about our DE&amp;I initiatives from our most recent blog: <a href="https://www.recordedfuture.com/erg-stories-apida-heritage-month-2023">APIDA Heritage Month: ERG Employee Stories, Community, and Support</a></p><h4 id="now-what">Now what?</h4><p>If any of that resonates with you or youre interested in learning more about careers at Recorded Future, we invite you to <a href="https://www.recordedfuture.com/careers">visit our careers page</a>. </p><p>Are you actively looking for a new opportunity? <a href="https://www.recordedfuture.com/jobs">Were hiring</a> across teams and across locations. </p><p>For more information or questions, feel free to email <a href="mailto:careers@recordedfuture.com">careers@recordedfuture.com</a>.</p> Blog @mccaffreyr3: 'MSNBC. 5 Feb. Chinese INTELL collection massive. Primary cyber intrusion. Also Human INTELL. 260 satellites. Still US cannot tolerate continued balloon reconnaissance penetrations of sovereign airspace. ' https://twitter.com/mccaffreyr3/status/1622391138979319809/video/1 All News on 'The Twitter Times: v/900' urn:uuid:6a584f2e-655c-313a-f399-0fa62931620f Sun, 05 Feb 2023 20:40:57 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://twitter.com/mccaffreyr3/status/1622391138979319809/video/1' style='color: #666666; text-decoration: none;'>twitter.com</a> <span style='color: #666666; text-decoration: none;'>- Barry R McCaffrey</span> </div> <div style='margin: 3px 0 3px 0;'> <link href='http://vjs.zencdn.net/4.12/video-js.css' rel='stylesheet'><script src='http://vjs.zencdn.net/4.12/video.js'></script><video id='twt-1622391138979319809-1' class='video-js vjs-default-skin' controls preload='auto' width='480' height='270' poster='http://pbs.twimg.com/ext_tw_video_thumb/1622390686225154048/pu/img/hVIdCq22wSgtE7DD.jpg'><source src='https://video.twimg.com/ext_tw_video/1622390686225154048/pu/vid/640x360/P8CiU4CRMeCQatLg.mp4?tag=12' type='video/mp4'/><source src='https://video.twimg.com/ext_tw_video/1622390686225154048/pu/pl/9oX7Fpgmyfw4wAKr.m3u8?tag=12&container=fmp4' type='application/x-mpegURL'/></video> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Ftwitter.com%2Fmccaffreyr3%2Fstatus%2F1622391138979319809%2Fvideo%2F1&text=%40mccaffreyr3%3A+%27MSNBC.+5+Feb.+Chinese+INTELL+collection+massive.+Primary+cyber+intrusion.+Also+Human+INTELL.+260+satellites.+Still+US+cannot+tolerate+continued+balloon+reconnaissance+penetrations+of+sovereign+airspace.+%27&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Ftwitter.com%2Fmccaffreyr3%2Fstatus%2F1622391138979319809%2Fvideo%2F1&t=%40mccaffreyr3%3A+%27MSNBC.+5+Feb.+Chinese+INTELL+collection+massive.+Primary+cyber+intrusion.+Also+Human+INTELL.+260+satellites.+Still+US+cannot+tolerate+continued+balloon+reconnaissance+penetrations+of+sovereign+airspace.+%27'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div> @mccaffreyr3: 'MSNBC continued. 5 Feb. Unlikely that the debris from the Chinese shoot down will yield any bonanza of technical intelligence. Principle tools of Chinese collection 260 satellites, cyber, humint. ' https://twitter.com/mccaffreyr3/status/1622361431932014592/video/1 All News on 'The Twitter Times: v/900' urn:uuid:ed2d61fd-473e-0d89-faeb-5c19bde5ab67 Sun, 05 Feb 2023 18:37:01 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://twitter.com/mccaffreyr3/status/1622361431932014592/video/1' style='color: #666666; text-decoration: none;'>twitter.com</a> <span style='color: #666666; text-decoration: none;'>- Barry R McCaffrey</span> </div> <div style='margin: 3px 0 3px 0;'> <link href='http://vjs.zencdn.net/4.12/video-js.css' rel='stylesheet'><script src='http://vjs.zencdn.net/4.12/video.js'></script><video id='twt-1622361431932014592-1' class='video-js vjs-default-skin' controls preload='auto' width='480' height='270' poster='http://pbs.twimg.com/ext_tw_video_thumb/1622361209478729729/pu/img/30opGvQadjKZHgcG.jpg'><source src='https://video.twimg.com/ext_tw_video/1622361209478729729/pu/vid/640x360/cyO4usB7lfy0LwGR.mp4?tag=12' type='video/mp4'/><source src='https://video.twimg.com/ext_tw_video/1622361209478729729/pu/pl/-zK-uwr7MJdo3KDA.m3u8?tag=12&container=fmp4' type='application/x-mpegURL'/></video> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Ftwitter.com%2Fmccaffreyr3%2Fstatus%2F1622361431932014592%2Fvideo%2F1&text=%40mccaffreyr3%3A+%27MSNBC+continued.+5+Feb.+Unlikely+that+the+debris+from+the+Chinese+shoot+down+will+yield+any+bonanza+of+technical+intelligence.+Principle+tools+of+Chinese+collection+260+satellites%2C+cyber%2C+humint.+%27&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Ftwitter.com%2Fmccaffreyr3%2Fstatus%2F1622361431932014592%2Fvideo%2F1&t=%40mccaffreyr3%3A+%27MSNBC+continued.+5+Feb.+Unlikely+that+the+debris+from+the+Chinese+shoot+down+will+yield+any+bonanza+of+technical+intelligence.+Principle+tools+of+Chinese+collection+260+satellites%2C+cyber%2C+humint.+%27'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div> @fomocapdao: 'Launch balloon > Shot down Balloon > China responded with retaliation > Cyber attack > Italy internet goes down It's all coincidences ' https://twitter.com/fomocapdao/status/1622302263438884873/photo/1 All News on 'The Twitter Times: v/900' urn:uuid:8671c669-fc83-9435-b640-a597960c9d90 Sun, 05 Feb 2023 14:39:46 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://twitter.com/fomocapdao/status/1622302263438884873/photo/1' style='color: #666666; text-decoration: none;'>twitter.com</a> </div> <div> <img style='margin: 6px 0 6px 0; max-width: 300px; width: expression((this.width > 300) && (this.width >= this.height) ? 300: true); max-height: 300px; height: expression((this.height > 300) && (this.height >= this.width) ? 300: true); border: none;' src='http://pbs.twimg.com/media/FoOTF2QX0AEZviS.jpg'/> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Ftwitter.com%2Ffomocapdao%2Fstatus%2F1622302263438884873%2Fphoto%2F1&text=%40fomocapdao%3A+%27Launch+balloon+%3E+Shot+down+Balloon+%3E+China+responded+with+retaliation++%3E+Cyber+attack+%3E+Italy+internet+goes+down%0AIt%27s+all+coincidences+%27&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Ftwitter.com%2Ffomocapdao%2Fstatus%2F1622302263438884873%2Fphoto%2F1&t=%40fomocapdao%3A+%27Launch+balloon+%3E+Shot+down+Balloon+%3E+China+responded+with+retaliation++%3E+Cyber+attack+%3E+Italy+internet+goes+down%0AIt%27s+all+coincidences+%27'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div> MyIndMakers https://www.myind.net/Home/viewArticle/china-orchestrating-cyber-attacks-on-allies-competitors-ipcsc-report All News on 'The Twitter Times: v/900' urn:uuid:0405d977-12dd-526c-8b7e-52c970117042 Sun, 05 Feb 2023 10:37:04 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://www.myind.net/Home/viewArticle/china-orchestrating-cyber-attacks-on-allies-competitors-ipcsc-report' style='color: #666666; text-decoration: none;'>myind.net</a> </div> <div> <div> <img src='https://myind.net/sites/default/files/field/image/8abd193c_cyber_security.jpg' style='margin: 6px 6px 6px 0; max-width: 200px; width: expression((this.width > 200) && (this.width >= this.height) ? 200: true); max-height: 200px; height: expression((this.height > 200) && (this.height >= this.width) ? 200: true); border: none;'/> </div> <div style='margin: 6px 0 0 0;'>MyIndMakers enables the exchange of Global Ideas and Solutions from India. All day news updates related to Business, Hindu, Hinduism, India, Indic, Culture, Travel, Religion, Politics, Foreign Policy, Modi, Swami, BJP, Congress, Trump, Biden, Israel, Jihad, Christianity, China, Japan, Book Reviews, Movie Reviews, Indian Artciles, Blogs, Interviews, Podcasts, Videos, MyIndBook, MyIndMakers, myind.net,China, orchestrating, cyber attacks, allies, competitors, IPCSC </div> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Fwww.myind.net%2FHome%2FviewArticle%2Fchina-orchestrating-cyber-attacks-on-allies-competitors-ipcsc-report&text=MyIndMakers&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Fwww.myind.net%2FHome%2FviewArticle%2Fchina-orchestrating-cyber-attacks-on-allies-competitors-ipcsc-report&t=MyIndMakers'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div> Digicel Business invests millions to protect against cyber criminals - Trinidad Guardian https://www.guardian.co.tt/business/digicel-business-invests-millions-to-protect-against-cyber-criminals-6.2.1626430.1ce5bbeebf All News on 'The Twitter Times: v/900' urn:uuid:f7621a9c-4aca-476e-1a80-8c5498ee9d23 Sun, 05 Feb 2023 10:37:04 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://www.guardian.co.tt/business/digicel-business-invests-millions-to-protect-against-cyber-criminals-6.2.1626430.1ce5bbeebf' style='color: #666666; text-decoration: none;'>guardian.co.tt</a> </div> <div> <div> <img src='http://www.guardian.co.tt/image-3.4065124.248447.20230205125546.bef83d9a95' style='margin: 6px 6px 6px 0; max-width: 200px; width: expression((this.width > 200) && (this.width >= this.height) ? 200: true); max-height: 200px; height: expression((this.height > 200) && (this.height >= this.width) ? 200: true); border: none;'/> </div> <div style='margin: 6px 0 0 0;'>Dig&shy;i&shy;cel Busi&shy;ness con&shy;tin&shy;ues to pump mil&shy;lions of dol&shy;lars in&shy;to its cy&shy;ber&shy;se&shy;cu&shy;ri&shy;ty ser&shy;vices as the com&shy;pa&shy;ny has seen an uptick in fraud&shy;sters not on&shy;ly em&shy;a&shy;nat&shy;ing from T&amp;T but al&shy;so East&shy;ern Eu&shy;rope, Rus&shy;sia, Chi&shy;na, North Ko&shy;rea, and most re&shy;cent&shy;ly Brazil in South Amer&shy;i&shy;ca. </div> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Fwww.guardian.co.tt%2Fbusiness%2Fdigicel-business-invests-millions-to-protect-against-cyber-criminals-6.2.1626430.1ce5bbeebf&text=Digicel+Business+invests+millions+to+protect+against+cyber+criminals+-+Trinidad+Guardian&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Fwww.guardian.co.tt%2Fbusiness%2Fdigicel-business-invests-millions-to-protect-against-cyber-criminals-6.2.1626430.1ce5bbeebf&t=Digicel+Business+invests+millions+to+protect+against+cyber+criminals+-+Trinidad+Guardian'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div> @NikitaS_Live: 'India bans Chinese Apps- 234 apps banned by Information Technology Ministry. These apps were sourced to create terror among Indian Users. Welcome move..now a dip in cyber crimes,cyber bullying is expected. #ChineseApps #InformationTechnolo https://twitter.com/NikitaS_Live/status/1622221340093853696/photo/1 All News on 'The Twitter Times: v/900' urn:uuid:e360519e-3449-ada5-e7a8-cb8a04989f23 Sun, 05 Feb 2023 08:42:06 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://twitter.com/NikitaS_Live/status/1622221340093853696/photo/1' style='color: #666666; text-decoration: none;'>twitter.com</a> </div> <div> <img style='margin: 6px 0 6px 0; max-width: 300px; width: expression((this.width > 300) && (this.width >= this.height) ? 300: true); max-height: 300px; height: expression((this.height > 300) && (this.height >= this.width) ? 300: true); border: none;' src='http://pbs.twimg.com/media/FoNJtEoaYAIlD3M.jpg'/> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Ftwitter.com%2FNikitaS_Live%2Fstatus%2F1622221340093853696%2Fphoto%2F1&text=%40NikitaS_Live%3A+%27India+bans+Chinese+Apps-%0A234+apps+banned+by+Information+Technology+Ministry.+These+apps+were+sourced+to+create+terror+among+Indian+Users.%0AWelcome+move..now+a+dip+in+cyber+crimes%2Ccyber+bullying+is+expected.%0A%23ChineseApps+%23InformationTechnologyministry+%27&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Ftwitter.com%2FNikitaS_Live%2Fstatus%2F1622221340093853696%2Fphoto%2F1&t=%40NikitaS_Live%3A+%27India+bans+Chinese+Apps-%0A234+apps+banned+by+Information+Technology+Ministry.+These+apps+were+sourced+to+create+terror+among+Indian+Users.%0AWelcome+move..now+a+dip+in+cyber+crimes%2Ccyber+bullying+is+expected.%0A%23ChineseApps+%23InformationTechnologyministry+%27'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div> @Covert_Radio: '"Chinese Spy Satellite"...? *** WARNING *** They spoke at Davos about "Cyber Attacks & Power Grid Attacks". Now, OUT OF NO WHERE, a "Chinese Spy Satellite" shows up in American Airspace? Potentially with Military Hardware? They're NORMALIZ https://twitter.com/Covert_Radio/status/1621576973330833408/photo/1 All News on 'The Twitter Times: v/901' urn:uuid:15d1df74-4f40-9046-21a0-ba79889c9043 Fri, 03 Feb 2023 14:50:18 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://twitter.com/Covert_Radio/status/1621576973330833408/photo/1' style='color: #666666; text-decoration: none;'>twitter.com</a> </div> <div> <img style='margin: 6px 0 6px 0; max-width: 300px; width: expression((this.width > 300) && (this.width >= this.height) ? 300: true); max-height: 300px; height: expression((this.height > 300) && (this.height >= this.width) ? 300: true); border: none;' src='http://pbs.twimg.com/media/FoD9e9xXoAE-BAm.jpg'/> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Ftwitter.com%2FCovert_Radio%2Fstatus%2F1621576973330833408%2Fphoto%2F1&text=%40Covert_Radio%3A+%27%22Chinese+Spy+Satellite%22...%3F+***+WARNING+***+They+spoke+at+Davos+about+%22Cyber+Attacks+%26+Power+Grid+Attacks%22.+Now%2C+OUT+OF+NO+WHERE%2C+a+%22Chinese+Spy+Satellite%22+shows+up+in+American+Airspace%3F+Potentially+with+Military+Hardware%3F+They%27re+NORMALIZING+this%21+NEXT+TIME+will+be+an+%22EMP%22%21+%27&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Ftwitter.com%2FCovert_Radio%2Fstatus%2F1621576973330833408%2Fphoto%2F1&t=%40Covert_Radio%3A+%27%22Chinese+Spy+Satellite%22...%3F+***+WARNING+***+They+spoke+at+Davos+about+%22Cyber+Attacks+%26+Power+Grid+Attacks%22.+Now%2C+OUT+OF+NO+WHERE%2C+a+%22Chinese+Spy+Satellite%22+shows+up+in+American+Airspace%3F+Potentially+with+Military+Hardware%3F+They%27re+NORMALIZING+this%21+NEXT+TIME+will+be+an+%22EMP%22%21+%27'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div> Surging Electrical Infrastructure Attacks Pose Disruption Threat for American Businesses - Interos - Interos https://www.interos.ai/blog-surging-electrical-infrastructure-attacks-pose-disruption-threat-for-american-businesses-interos/ All News on 'The Twitter Times: v/901' urn:uuid:ea11f698-c929-12ed-304f-183b70f2509d Fri, 03 Feb 2023 10:55:23 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://www.interos.ai/blog-surging-electrical-infrastructure-attacks-pose-disruption-threat-for-american-businesses-interos/' style='color: #666666; text-decoration: none;'>interos.ai</a> <span style='color: #666666; text-decoration: none;'>- interos-blogger</span> </div> <div> <div> <img src='https://www.interos.ai/wp-content/uploads/2023/02/power-blog-image-linkedin.png' style='margin: 6px 6px 6px 0; max-width: 200px; width: expression((this.width > 200) && (this.width >= this.height) ? 200: true); max-height: 200px; height: expression((this.height > 200) && (this.height >= this.width) ? 200: true); border: none;'/> </div> <div style='margin: 6px 0 0 0;'>By Alberto Coria and Trent Chinnaswamy A growing number of attacks on the United States&rsquo; critical electricity infrastructure threatens to cause supply chain disruption to thousands of businesses across the country. In 2022, the U.S. electrical grid sustained at least 103 deliberate physical and cyber-attacks &ndash; the highest level in a decade. Two recent attacks on electricity substations in North Carolina, and four in Washington, have raised alarm among experts at the U.S. Department of Homeland .&nbsp; <a href='https://www.interos.ai/blog-surging-electrical-infrastructure-attacks-pose-disruption-threat-for-american-businesses-interos/' style='color: #093D72; font-style: italic; text-decoration: none;'>show all text</a> </div> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Fwww.interos.ai%2Fblog-surging-electrical-infrastructure-attacks-pose-disruption-threat-for-american-businesses-interos%2F&text=Surging+Electrical+Infrastructure+Attacks+Pose+Disruption+Threat+for+American+Businesses+-+Interos+-+Interos&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Fwww.interos.ai%2Fblog-surging-electrical-infrastructure-attacks-pose-disruption-threat-for-american-businesses-interos%2F&t=Surging+Electrical+Infrastructure+Attacks+Pose+Disruption+Threat+for+American+Businesses+-+Interos+-+Interos'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div> It wouldn't stop at Stuxnet - by Hack Jartman https://hackjartman.substack.com/p/it-wouldnt-stop-at-stuxnet All News on 'The Twitter Times: v/904' urn:uuid:dfa9c121-f26c-1bf0-2a92-9b090965d6c2 Fri, 03 Feb 2023 00:56:45 -0500 <div style='margin: 0 0 6px 0;'> <a href='https://hackjartman.substack.com/p/it-wouldnt-stop-at-stuxnet' style='color: #666666; text-decoration: none;'>hackjartman.substack.com</a> <span style='color: #666666; text-decoration: none;'>- Hack Jartman</span> </div> <div> <div> <img src='https://substackcdn.com/image/fetch/w_1200,h_600,c_limit,f_jpg,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e388e16-d2ab-4d50-86b5-52078dc0f445_256x256.png' style='margin: 6px 6px 6px 0; max-width: 200px; width: expression((this.width > 200) && (this.width >= this.height) ? 200: true); max-height: 200px; height: expression((this.height > 200) && (this.height >= this.width) ? 200: true); border: none;'/> </div> <div style='margin: 6px 0 0 0;'>We all know that the CIA likes to dip their tentacles in many a plot around the world. This is not news to any like-minded, paranoid individuals reading this. Over the past 15 years, the CIA has become increasingly involved in cyber security, leading to speculation about its involvement in recent cyber attacks. The CIA (and others) have been linked to cyber attacks on Iran&rsquo;s nuclear program. In 2010, an operation known as Operation Olympic Games destroyed a large portion of Iran&rsquo;s uranium enric.&nbsp; <a href='https://hackjartman.substack.com/p/it-wouldnt-stop-at-stuxnet' style='color: #093D72; font-style: italic; text-decoration: none;'>show all text</a> </div> </div> <div style='clear:both; margin: 6px 0 0 0;'> <a style='text-decoration: none; border: none;' target='_blank' href='https://twitter.com/share?url=https%3A%2F%2Fhackjartman.substack.com%2Fp%2Fit-wouldnt-stop-at-stuxnet&text=It+wouldn%27t+stop+at+Stuxnet+-+by+Hack+Jartman&via=twttimes'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/twitter-share.png'/> </a> <a style='text-decoration: none; border: none;' target='_blank' href='https://facebook.com/sharer.php?u=https%3A%2F%2Fhackjartman.substack.com%2Fp%2Fit-wouldnt-stop-at-stuxnet&t=It+wouldn%27t+stop+at+Stuxnet+-+by+Hack+Jartman'> <img style='border: none' src='https://tweetedtimes.com/pics/buttons/facebook-share.png'/> </a> </div>