Sunday, January 24, 17:08
Home security State hackers and criminals mimic each other

State hackers and criminals mimic each other

The 2019 Cyber ​​Threat Intelligence Estimate report, conducted by Optiv Security, suggests that both government hackers and Criminals of cyberspace, increasingly claim that they are each other, to try to hide their traces as part of advanced technical attacks.

The top sectors targeted are retail and healthcare companies, as well as government and financial institutions. The Cryptojacking and ransomware are two new additions to the list of threats, along with botnets, Denial-of-Service (DDoS) attacks, the Phishing and malware.

Optiv says cybercriminals and government hackers are learning from each other and becoming more successful. They are also trying to imitate each other by adopting similar techniques in an attempt to confuse security researchers.

Earlier this week, Check Point Software Technologies warned that US government services were vulnerable to a new collection of attack techniques, linked to a Chinese government-backed hacking team. For seven months, hackers were constantly changing the method of their attacks, trying to hide their origin.

Check Point researchers said the hackers had been working hard to create useful information documents in forms related to government documents. US government agencies are particularly vulnerable to this new attack.

Crowdstrike posted one this week report which characterized the Chinese hackers as the most active of any country, and said they had attacked many industries: chemicals, toys, healthcare, hospitality, construction, technology and telecommunications.

The tools and techniques developed by state hackers help cyber criminals earn hundreds of millions in cash and IP. As governments seek backdoors security systems and their security teams develop advanced hacking tools, cybercriminals benefit more from exploiting weak security systems and using the same tools.

One example is the US National Security Agency's EternalBlue hacking tool. which is in the hands of cyber criminals and is used in ransomware attacks in US cities and government agencies.

Government efforts to develop sophisticated attack software, which then leaks into Internet, exacerbates an already dangerous cybersecurity landscape. State security teams do not seem to be developing defensive technologies, which means an ever-growing arsenal of advanced attack technologies that can use, adapt and improve cybercriminals.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

Google: How to view and delete the data it collects for you

There are some companies that people do not seem to trust much - one of them is Google. The reason...

Signal: How to check if your messages are private and secure?

The Signal messaging application has suddenly gained a large number of new users, which is due to the recent "scandal" of WhatsApp, which announced ...

Instagram: How to enable notifications for specific profiles

There are some profiles on Instagram where you want to see the content they publish as soon as possible - it can be a news ...
00:01:55

NASA's historic launch pad is to be demolished

NASA's famous Mobile Launcher Platform-2 launch platform, which has been linked to the Apollo and Space Shuttle missions, ...
00:02:12

Elon Musk: Gives $ 100 million for best CO2 capture technology

https://www.youtube.com/watch?v=Y0iUZc30vj4 Ο Elon Musk δήλωσε χθες, στο λογαριασμό του στο Twitter, ότι σκοπεύει να δώσει 100 εκατομμύρια...

How can you unblock sites and services using a VPN?

The Internet is free and open to all. However, there are some sites and services whose content is blocked, which ...

Google Chrome: How to manage your extensions?

Google Chrome extensions can be very useful, as they improve your productivity when using the browser.

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...

The DeLorean can return as an electric car

The DMC DeLorean has been out of production for almost 40 years, but it looks like the iconic vehicle will return as an electric car.

Windows RDP servers are used to support DDoS

Cybercrime gangs are abusing Windows Remote Desktop Protocol (RDP) systems to reinforce the unwanted ...