Take our user survey and make your voice heard.
world

Hackers' broad attack sets cyber experts worldwide scrambling to defend networks

6 Comments
By Jack Stubbs

The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.

© Thomson Reuters 2020.

©2024 GPlusMedia Inc.

6 Comments
Login to comment

Again, Trump remains silent. His golf game, tweets and scams to get his followers to send him money a higher priority.

Why is it Trump claims he still wants a job he's unwilling to do?

https://www.usnews.com/news/world/articles/2020-12-18/with-trump-silent-reprisals-for-hacks-may-fall-to-biden

Trump's dumping yet another problem on Biden, and even though the problems will continue to hurt the US long after Trump's gone, his supporters (US and 'foreign') LOL.

3 ( +3 / -0 )

I also read that 18,000 American companies are now owned by China. Taking ''necessary steps'' in the aftermath of the #cyberattack when sensitive state information has been leaked already is too late. 

Necessary steps to protect critical infrastructures should be taken seriously by ALL governments around the world.

0 ( +0 / -0 )

Glad to know the GOP supports the attacks, with Trump saying absolutely nothing about them, and given how much they hate Biden, who is against the hacks and said whomever did it (likely Russia) would pay.

1 ( +1 / -0 )

researchers at Moscow-based private cybersecurity firm Kaspersky. The hack hijacked ubiquitous network management software made by SolarWinds Corp. Kaspersky decrypted online web records left behind by the attackers.

Hilarious.

A Moscow company, staffed with Russian experts, is providing all the data on the hack.

Not even close to all the data, and they're not even the only ones to decode, even publishing the list on Github

https://krebsonsecurity.com/2020/12/malicious-domain-in-solarwinds-hack-turned-into-killswitch/

The killswitch revelations came as security researchers said they’d made progress in decoding SUNBURST’s obfuscated communications methods. Chinese cybersecurity firm RedDrip Team published their findings on Github, saying its decoder tool had identified nearly a hundred suspected victims of the SolarWinds/Orion breach, including universities, governments and high tech companies.

https://github.com/RedDrip7/SunBurst_DGA_Decode

0 ( +0 / -0 )

Login to leave a comment

Facebook users

Use your Facebook account to login or register with JapanToday. By doing so, you will also receive an email inviting you to receive our news alerts.

Facebook Connect

Login with your JapanToday account

User registration

Articles, Offers & Useful Resources

A mix of what's trending on our other sites