Sunday, June 7, 04:09
Home security State hackers and criminals mimic each other

State hackers and criminals mimic each other

The 2019 Cyber ​​Threat Intelligence Estimate report, conducted by Optiv Security, suggests that both government hackers and Criminals of cyberspace, increasingly claim that they are each other, to try to hide their traces as part of advanced technical attacks.

The top sectors targeted are retail and healthcare companies, as well as government and financial institutions. The Cryptojacking and ransomware are two new additions to the list of threats, along with botnets, Denial-of-Service (DDoS) attacks, the Phishing and malware.

Optiv says cybercriminals and government hackers are learning from each other and becoming more successful. They are also trying to imitate each other by adopting similar techniques in an attempt to confuse security researchers.

Earlier this week, Check Point Software Technologies warned that US government services were vulnerable to a new collection of attack techniques, linked to a Chinese government-backed hacking team. For seven months, hackers were constantly changing the method of their attacks, trying to hide their origin.

Check Point researchers said the hackers had been working hard to create useful information documents in forms related to government documents. US government agencies are particularly vulnerable to this new attack.

Crowdstrike posted one this week report which characterized the Chinese hackers as the most active of any country, and said they had attacked many industries: chemicals, toys, healthcare, hospitality, construction, technology and telecommunications.

The tools and techniques developed by state hackers help cyber criminals earn hundreds of millions in cash and IP. As governments seek backdoors security systems and their security teams develop advanced hacking tools, cybercriminals benefit more from exploiting weak security systems and using the same tools.

One example is the US National Security Agency's EternalBlue hacking tool. which is in the hands of cyber criminals and is used in ransomware attacks in US cities and government agencies.

Government efforts to develop sophisticated attack software, which then leaks into Internet, exacerbates an already dangerous cybersecurity landscape. State security teams do not seem to be developing defensive technologies, which means an ever-growing arsenal of advanced attack technologies that can use, adapt and improve cybercriminals.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Lyrics from AI technology or from people: Can you tell them apart?

While a large percentage of people can recognize when they are talking on a chatbot instead of a human operator, it seems that this is not the case ...

Technology and children: When are they ready for safe use?

Today's children and teens use various messaging apps and social media to ...

Call of Duty Black Ops Cold War: The first video leaked

The first video from the gameplay of Call of Duty 2020, which is rumored to be called Black Ops Cold War, has just been revealed.

Elon Musk: "It's time to break up Amazon"

Elon Musk intensifies the fight with Jeff Bezos with a new tweet: The General Manager of Tesla Inc., Elon Musk, said ...

Attack on America's 5G towers on Saturday!

Protests over 5G connectivity are scheduled to take place over the weekend, according to NATE. According to a recommendation that was identified ...

Windows 10 Updates: You can block them with Wu10Man!

Microsoft launched the Windows 10 update in May 2020, so it will be available on your computer soon ....

ECh0raix Ransomware: New campaign targets QNAP NAS devices!

Malicious agents behind eCh0raix Ransomware have launched a new campaign targeting QNAP NAS devices. ECh0raix was observed ...

Mac: How to change the storage location of your screenshots?

When you take screenshots on your Mac device using the Shift-Command-3 shortcut to take a screenshot of the entire computer screen or Shift-Command-4 ...

Malware USBCulprit: Aims devices that are not connected to a network

Did you think that devices without any connection to a local or other network (air-gapped devices) are safe? Think again! The USBCulprit malware that ...

Free Microsoft Teams: You can finally create meetings!

Users of the free version of Microsoft Teams can now create video meetings. The change, identified by ...