Mourners pay tributes at a makeshift memorial for the victims of the deadly Halloween crowd surge, outside a subway station in the district of Itaewon in Seoul on November 1, 2022. (Photo by JUNG YEON-JE/AFP via Getty Images) North Korean hackers exploit Itaewon tragedy to infiltrate South Korean targets The notorious hacking group used the Halloween tragedy that killed more than 150 people to trick South Koreans into downloading malware. Dec 7, 2022 By AJ Vicens
The flag of the People’s Republic of China. (Photo by PHILIP PACHECO/AFP via Getty Images) Researchers uncover sophisticated global Chinese hacking operation The group used six backdoors against more than a dozen industrial plants, research institutes and government agencies, according to Kaspersky. Aug 8, 2022
Gen. Paul Nakasone, Cyber Command’s commander, at a Senate Armed Services Committee hearing on March 25, 2021. (Photo by Andrew Harnik-Pool/Getty Images) US report details SolarWinds hacking tools “Reduced exposure to malicious activity” for U.S. organizations is the goal. Mar 31, 2021 By Sean Lyngaas
After SolarWinds breach, lawmakers ask NSA for help in cracking Juniper cold case The lawmakers are hoping to crack open a cold case and learn from it before the next big supply-chain breach happens. Jan 29, 2021 By Sean Lyngaas
(Photo illustration / Scoop News Group) Microsoft identifies second hacking group affecting SolarWinds software The discovery underscores the extent to which SolarWinds, whose customers include Fortune 500 companies, is a valuable target for hackers. Dec 21, 2020 By Sean Lyngaas
(LibreShot / Martin Vorel) MacOS backdoor appears to be update of tool previously used by Vietnam-linked group Researchers at Trend Micro say a newly discovered MacOS backdoor uses tactics previously associated with the group known as APT32 or OceanLotus. Nov 30, 2020 By Joe Warminsky
(Getty Images) Well-developed backdoor can harvest information from restaurants, bars and hotels, researchers say A point-of-sale-system widely used in the hospitality industry is vulnerable to a backdoor, ESET reports. Nov 12, 2020 By Joe Warminsky
(Getty Images) Chinese banks require clients to use tax programs laced with backdoors, report says A Chinese bank required a company to use a specific kind of tax software for local tax purposes, but the software deployed a backdoor, Trustwave researchers say. Jul 14, 2020 By Shannon Vavra
(Flickr user Ben Nuttal) How GitHub untangled itself from the ‘Octopus’ malware that infected 26 software projects It's an example of the potentially insidious nature of open-source supply chain compromises. May 29, 2020 By Sean Lyngaas
Rather than one continued operation, Turla’s espionage missions have come in waves. (Getty Images) ‘Turla’ spies have been stealing documents from foreign ministries in Eastern Europe, researchers find Turla has a knack for rewriting code and using it to steal state secrets. May 26, 2020 By Sean Lyngaas