to connectVideoFox News Flash, important news, for Sept. 26
Fox News Flash, important news, for Sept. 26 are right here. Check out what to click on Foxnews.com
Researchers have discovered a web site that presents itself as a site for the AMERICAN veterans who may have ties with Iran, according to reports in the media.
Researchers from security firm Cisco’s Talos was reported this week that its web site, with the Rent of the Heroes of the Military, the spread of the malware, which allows hackers to control the victim’s computer, such as the one reported by Bleeping Computer.
An interesting twist is that the hackers are able to also be made for active military personnel, and not just the veterans, according to ZDNet, which cites that Iran was behind the attack.
THE ONLY SCARY ONE-A-SIM-SWAP FRAUD THAT ALLOWS HACKERS TO TAKE OVER YOUR PHONE AND STEAL YOUR MONEY
As a cyber security analyst with the Department of Homeland Security, speaking on background, told ZDNet that the attackers are targeting military networks.
“They [the hackers] were in and the hope that one of their goals in the use of a DOD system to download and execute the malware,” the analyst told the news outlet. “The odds are low, but it’s worth a shot…Pretty clever approach, and I can say that,” the analyst added, referring to the Department of Defense (dod).
Fox News has not reached Cisco on the issue of Iran’s reported involvement in the hack.
The poor actor had already been identified by Symantec as a period of time, a group behind the earlier attacks on an IT-service provider in the kingdom of Saudi Arabia, according to Cisco’s Talos.
The fake veterans web site has three links for downloading the desktop app is free, but the app is actually a fake installer. When the fake installer is launched, the progress bar almost completes and then an error message is displayed.
“The setup program checks whether or not Google is accessible. If it doesn’t, then it will stop the installation process. If it is reachable, the installer will download the two binaries, [file],” according to Cisco’s Talos.
CHINESE CYBER HACKERS HAVE BUILT A BACK DOOR INTO THE U.S.-CHINA TRADE WAR, A REPORT SAID
One of the binary files used for the execution of the “discovery” of the system and the second is a Remote administration tool.
“For the attacker to retrieve information such as the date, time, and the drivers,” Cisco’s Talos the researchers wrote in the report. “An attacker could then refer to the information on the system, patch level, and the number of processors in the network, the configuration of the hardware and firmware versions of the controller, and the name of the trustee, to the list of accounts, etc., etc. This is a significant amount of information relating to a machine, and it makes the attacker to be well prepared to conduct additional attacks.”
The amount and type of information that is the focus that makes the attack especially dangerous, Warren, Mercer, a researcher with Cisco Talos, he told Fox News.
“If you focus on the agenda of the would-be attackers, it is unlikely that a garden-variety seizure…she definitely wanted to have something a lot more important than your cat’s,” Mercer said.
Mercer added that it is very difficult to measure the effectiveness of this type of attack, because it was discovered before the operation went into high gear. “We did not identify an in-the-wild – activity-and since the publication, in the shadow of the actor, and the website is no longer available.”
CLICK HERE TO VIEW THE FOX NEWS APP