ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Dragonfly 2.0 Attackers Probe Energy Sector | #CyberSecurity #Powergrid #CyberAttacks

Dragonfly 2.0 Attackers Probe Energy Sector | #CyberSecurity #Powergrid #CyberAttacks | ICT Security-Sécurité PC et Internet | Scoop.it
Symantec has warned of a new attack campaign targeting energy firms, which may have already given the hackers access to operational systems in the US and Europe.

The security giant claimed the Dragonfly threat group is behind the new round of attacks, ongoing since December 2015.

Organizations in the US, Turkey and Switzerland were identified as targets for a range of tools and techniques including malicious emails, watering hole attacks and trojanized software.

Emails with content specific to the energy sector were designed to socially engineer the recipients into opening a malicious attachment. If opened, they would steal the victims' network credentials.

Watering hole attacks were also used to harvest credentials, with the hackers booby-trapping sites likely to be visited by energy sector workers.

The stolen credentials were then typically used in follow-on attacks designed to install backdoors to provide remote access and give the hackers the option of installing additional tools.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=GRID

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Dragonfly

 

Gust MEES's insight:
Symantec has warned of a new attack campaign targeting energy firms, which may have already given the hackers access to operational systems in the US and Europe.

The security giant claimed the Dragonfly threat group is behind the new round of attacks, ongoing since December 2015.

Organizations in the US, Turkey and Switzerland were identified as targets for a range of tools and techniques including malicious emails, watering hole attacks and trojanized software.

Emails with content specific to the energy sector were designed to socially engineer the recipients into opening a malicious attachment. If opened, they would steal the victims' network credentials.

Watering hole attacks were also used to harvest credentials, with the hackers booby-trapping sites likely to be visited by energy sector workers.

The stolen credentials were then typically used in follow-on attacks designed to install backdoors to provide remote access and give the hackers the option of installing additional tools.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=GRID

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Dragonfly

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers Gain Direct Access to US Power Grid Controls | #CyberSecurity #Awareness

Hackers Gain Direct Access to US Power Grid Controls | #CyberSecurity #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Hackers who hit American utilities this summer had the power to cause blackouts, Symantec says. And yes, most signs point to Russia.

 

IN AN ERA of hacker attacks on critical infrastructure, even a run-of-the-mill malware infection on an electric utility’s network is enough to raise alarm bells. But the latest collection of power grid penetrations went far deeper: Security firm Symantec is warning that a series of recent hacker attacks not only compromised energy companies in the US and Europe but also resulted in the intruders gaining hands-on access to power grid operations—enough control that they could have induced blackouts on American soil at will.


Symantec on Wednesday revealed a new campaign of attacks by a group it is calling Dragonfly 2.0, which it says targeted dozens of energy companies in the spring and summer of this year. In more than 20 cases, Symantec says the hackers successfully gained access to the target companies’ networks. And at a handful of US power firms and at least one company in Turkey—none of which Symantec will name—their forensic analysis found that the hackers obtained what they call operational access: control of the interfaces power company engineers use to send actual commands to equipment like circuit breakers, giving them the ability to stop the flow of electricity into US homes and businesses.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=GRID

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Dragonfly : vent de panique sur le secteur de l’énergie | #CyberAttacks #PowerGrid

Dragonfly : vent de panique sur le secteur de l’énergie | #CyberAttacks #PowerGrid | ICT Security-Sécurité PC et Internet | Scoop.it

Symantec a publié un rapport portant sur les activités du groupe cybercriminel connu sous le nom de DragonFly. 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=GRID

 

Gust MEES's insight:

Symantec a publié un rapport portant sur les activités du groupe cybercriminel connu sous le nom de DragonFly. 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=GRID

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Dragonfly hackers target over 1000 Western energy firms

Dragonfly hackers target over 1000 Western energy firms | ICT Security-Sécurité PC et Internet | Scoop.it
More than one thousand energy firms are said to have been targeted by internet hackers, with particular interest in compromising industrial control systems.


There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.


Gust MEES's insight:

There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.


No comment yet.