Monday, July 13, 01:06 p.m.
Home security Hackers target the World Health Organization amid a pandemic

Hackers target the World Health Organization amid a pandemic

Υγείας

As Reuters reports, Hacker they tried to attack World Health Organization earlier this month.

According to the head of the WHO Information Security Service, Flavio Aggio, the hackers' identity was not disclosed and their attempt was unsuccessful. But he stressed that attempts hacking against the World Health Organization have increased tremendously since the organization began to fight the coronavirus.

He first pointed to the attempted invasion of WHO systems by Alexander Urbelis, a cyber security expert and lawyer at the New York-based Blackstone Law Group, which monitors illegal activity at Internet.

Urbelis reports that he began tracking the hacker team on March 13 when he noticed that they had created a malware website which mimicked the World Health Organization's internal email system. The expert said he did not know who was responsible, but two other sources said they suspected a top team hacker known as DarkHotel, which has been conducting online spying operations since 2007.

When asked by Reuters about the incident, Aggio confirmed that the site identified by Urbelis was used in a theft attempt passwords many employees.

In a report last week, the World Health Organization warned that hackers were pretending to be the organization in order to steal money and sensitive information from the public.

However, government officials in areas such as Britain and the USA have seen an increase in attack attempts since the launch of pandemic of the coronavirus.

At present, the motives for the attack on the World Health Organization have not been made known, but this is not the first time this has happened.

The companies Cybersecurity, including Romania's Bitdefender and Moscow-based Kaspersky, said they have identified many of DarkHotel's businesses in East Asia - an area that has been particularly affected by the coronation. Specific targets included government officials and business executives in places such as China, North Korea, Japan and the United States.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

TrickBot malware accidentally warns victims that they have been infected

The famous TrickBot malware accidentally left a test module that warns the victims that they are infected and should contact ...

Financial institutions: The risk of data breach is higher!

According to a report, financial institutions tend to be at greater risk of data breach due to a lack of proper security controls ....

Google Chrome: Import, export and backup stored passwords

Google Chrome Password Manager lets you save usernames and passwords and ...

Apple: do not cover the camera on MacBook devices

Many users today have a habit of covering their laptop camera in order to protect themselves from any surveillance through it. However...

COVID-19-workplace: What can you do to avoid becoming a source of infection?

The number of COVID-19 cases worldwide seems to be increasing. However, most countries have ...

The best books of 2020, according to Amazon

If you like good books and are looking for new additions to your collection, choose from the 5 best books, according to ...

US Secret Service: Warns of increased attacks on MSPs

In June, the US Secret Service warned the private sector as well as government agencies that there has been a worrying increase ...

Create an imaginative meme and win a OnePlus Nord

One of the most anticipated financial smartphones of OnePlus, the OnePlus Nord, is going to be presented soon at an event that will take place ...

Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.