Researchers digging through the code of the recently discovered Flame worm say they have come across a wealth of evidence that suggests Flame and the now-famous Stuxnet worm share a common origin.
Browsing Category: Critical Infrastructure
North Korean agents have been linked to a malware attack on a South Korea’s Incheon International Airport, according to a report from the JoongAng Daily, a South Korean paper.
The U.S. Department of Homeland Security is warning IT administrators and operators of industry control systems about the danger posed by the Flame (aka sKyWIper) malware after Microsoft acknowledged that the malware is able to spoof its Windows Update service to push malicious code onto vulnerable systems.
In and advisory, the Department of Homeland Security’s Industrial control System (ICS) CERT said that it doesn’t believe the Flame malware targets industrial control systems (ICS) or SCADA systems, but the group advised critical infrastructure owners to be on alert.
Two financial industry groups: The American Bankers Association (ABA) and the Financial Services Roundtable announced on Thursday that they have applied to the Internet Corporation for Assigned Names and Numbers (ICANN) to operate to top level Internet domains, .bank and .insurance, on behalf of the financial services industry.
A 33 year-old Chinese man pleaded guilty in U.S. Federal Court to stealing proprietary source code used by the U.S. Federal Reserve to help track billions of dollars in government transfers that occur daily, according to a report by Reuters.
The White House revealed today a set of initiatives it plans to use as part of its public-private partnership to combat increasingly disruptive networks of infected computers known as botnets.
UPDATE: Are the winds of cyber war blowing, or is the newly discovered Flame worm just a tempest in a teapot? Just days after it was disclosed to the public, the Flame worm is fanning the flames of controversy within the security world. Threatpost takes a look at what people are saying.
The Department of Homeland Security Is Offering Organizations That Use Industrial Control Systems advice or mitigating the effects of cyber attacks. Among the agency’s recommendations: hold on to data from infected systems and prevent enemies from moving within your organization.
The FBI said that there are still more than 330,000 computers believed to be infected with the DNSChanger malware, with just weeks to go before a court order to cut off their ability to communicate with the rest of the Internet. Fully 77,000 are located in the U.S., according to data provided to Threatpost.