U.S. seizes domains used in USAID hack

The Justice Department announced it has seized domains Russian hackers responsible for the SolarWinds attack used in a phishing scheme last month targeting governments and organizations through mimicking the United States Agency for International Development.

Prosecutors said in a statement Tuesday that they seized two domains on Friday that Russia-linked Nobelium hacker group had used as part of its wide-scale attack targeting some 3,000 individual accounts across more than 150 governments, think tanks and organizations.

The scheme, uncovered by Microsoft on Thursday, involved gaining access to the Constant Contact email service of the USAID from which the hackers sent malicious links through authentic-looking government emails to their targets.

When the links were clicked, a malicious file would download a so-called back door onto the computer offering the hackers access to its information and that of other computers on its network.

Microsoft said most of the emails distributed were blocked by email threat detention systems and marked as spam though some may have been delivered.

The Justice Department said it seized theyardservice.com and worldhomeoutlet.com through a court order with the aim to disrupt Nobelium’s activities and identify victims, though prosecutors state the hackers may have deployed other backdoors between the initial attack, which began May 25, and Friday’s seizure.

“Last week’s action is a continued demonstration of the department’s commitment to proactively disrupt hacking activity prior to the conclusion of a criminal investigation,” said Assistant Attorney General John Demers of the department’s National Security Division.

Nobelium has been blamed for the attack in November that breached at least nine U.S. federal agencies and dozens of companies through the widely used SolarWinds software.

Hot this week

When AI Studies Together Security Questions Follow

ChatGPT's Study Together feature highlights security considerations for collaborative learning, with actionable steps to protect information during group AI interactions.

The Hidden Cybersecurity Risks of Working Multiple Tech Jobs

Exploring how juggling multiple tech jobs creates hidden security vulnerabilities and practical steps to maintain protection without burnout.

Kubernetes Isnt a Magic Fix for Tech Problems

Kubernetes often masks deeper tech issues like security gaps, especially when adopted hastily. Focus on fundamentals and training for real resilience.

Exposed Secrets in GitHub Commits

Accidental leaks of secrets in GitHub commits are more common than you think. Learn practical steps to prevent credentials exposure in your repositories.

Human Expertise Remains Essential in the Age of AI

AI transforms cybersecurity work but cannot replace human judgment. Practical steps help professionals adapt and thrive by combining technical tools with irreplaceable skills.

Topics

When AI Studies Together Security Questions Follow

ChatGPT's Study Together feature highlights security considerations for collaborative learning, with actionable steps to protect information during group AI interactions.

The Hidden Cybersecurity Risks of Working Multiple Tech Jobs

Exploring how juggling multiple tech jobs creates hidden security vulnerabilities and practical steps to maintain protection without burnout.

Kubernetes Isnt a Magic Fix for Tech Problems

Kubernetes often masks deeper tech issues like security gaps, especially when adopted hastily. Focus on fundamentals and training for real resilience.

Exposed Secrets in GitHub Commits

Accidental leaks of secrets in GitHub commits are more common than you think. Learn practical steps to prevent credentials exposure in your repositories.

Human Expertise Remains Essential in the Age of AI

AI transforms cybersecurity work but cannot replace human judgment. Practical steps help professionals adapt and thrive by combining technical tools with irreplaceable skills.

Why Securing IP Addresses Matters More Now

Let's Encrypt now issues free certificates for IP addresses, enabling stronger security for devices and services without domain names worldwide.

LibreOffice Offers Free Guides to Simplify Transition from Microsoft Office

LibreOffice provides free migration guides to help users leave Microsoft Office, highlighting open source benefits for security and cost savings globally.

A Fairer Way to Pay for Web Crawling

Cloudflare's new pay-per-crawl model offers cost transparency for web scraping needs while protecting site owners from excessive traffic.
spot_img

Related Articles

Popular Categories

spot_imgspot_img