“Israel and the United States created the Stuxnet worm to sabotage Iran’s nuclear programme, a leading security expert has claimed.
Ralph Langner told a conference in California that the malicious software was designed to cripple systems that could help build an Iranian bomb.
Mr Langner was one of the first researchers to show how Stuxnet could take control of industrial equipment.
It is widely believed that its target was machinery used to enrich uranium.”
From BBC News
Posts tagged “Malware”
“Virus experts are warning that the next big security threat is on mobile phones and that the attacks have begun in earnest.
For months, security researchers have been tracking how hackers were trying to take their exploits to a new platform and infect smart phones with malware that could remotely control the devices.
Earlier this week, Symantec released a report about the spread of an infected app called “Steamy Windows” on Google’s Android platform. Unknown hackers created a copycat version of the app, secretly loaded it with malicious commands, and released it to the web on unofficial app download sites.”
From The Globe and Mail
“More than 50 applications on Google’s Android Market have been discovered to be infected with malware called ‘DroidDream’ which can compromise personal data by taking over the user’s device, and have been ‘suspended from the store.
Google removed the apps from the Market immediately on being alerted, but it is not clear whether it has removed them from devices to which they have been downloaded. As many as 200,000 Android devices could have been infected.”
From The Guardian
“Chinese hackers that attacked systems at Google and Adobe also infiltrated global financial services firm Morgan Stanley, according to internal emails stolen from HBGary, a security firm that was working with the bank.
In the emails, made public earlier this month by the activist hacker group Anonymous following a vengeful hack, an HBGary researcher said Morgan Stanley provided him details of the attack but asked that the information be kept secret.”
From SC Magazine
“Booby-trapped adverts that hit visitors with fake security software have been discovered on the London Stock Exchange (LSE) website.
Analysis of the LSE site suggests that over the last 90 days, about 363 pages had hosted malware.
The LSE said its site was now safe and an investigation showed that ads provided by a third party were the culprit.”
From BBC News
“The proportion of websites secretly harbouring malware has reached one in 3,000 according to security firm Kaspersky.
It found a surge in the number of web-based attacks in 2010, with more than 580 million incidents detected.
Risk was no longer focused on sites with illegal content, such as pirate films and music. Instead, criminals were increasingly using legitimate websites, such as shopping and online gaming.”
From BBC News
“For the past decade, those who used the Internet to report the news might have assumed that the technological edge was in their favor. But online journalists now face more than just the standard risks to those working in dangerous conditions. They find themselves victims of new attacks unique to the new medium.
Ronald Deibert and Nart Villeneuve of the University of Toronto’s Citizen Lab, in partnership with computer security consultants at the SecDev Group, have conducted some of the most detailed postmortems of online attacks on the press, including the malware sent to Chinese foreign correspondents, and a forthcoming examination of Burma’s DDOS incidents. Their academic work firmly states that they cannot connect such events directly to the Chinese or Burmese states. Deibert says the evidence they have collected does show, however, that both attacks utilized techniques and strategies common to petty cyber-criminals, including individual “hackers” who work simply for the thrill of bringing down a highly visible, but vulnerable target.”
“2010 was a big year for Internet crime with botnets and targeted attacks becoming headline news on an almost weekly basis. The public disclosure of international organizations such as Google, Adobe, Juniper Networks and many others succumbing to what would eventually be labeled as “Operation Aurora” kicked off the year and revealed that “sophisticated”, “advanced” and “persistent” malware were now every-day inclusions of the criminals toolkit.”
Read from Damballa
According to a report released on Wednesday by McAfee, five multinational oil corporations have experienced cyber attacks on their computer networks. The command and control attacks have been attributed to hackers in China. A comparison has been made with these recently announced attacks at the sophisticated GhostNet and Shadow malware networks, which were both revealed by a research team at the Citizen Lab.
From The New York Times
“According to data released by EUROSTAT, the European Union’s statistics agency, one third of internet users in the EU caught a computer virus, despite the fact that 84% of internet users used IT security software (anti-virus, anti-spam or firewall) for protection.
In 2010 in the EU27, a large majority of individuals (84%) who used the internet in the last 12 months stated that they used an IT security software or tool to protect their private computer and data. Among the Member States, more than 90% of internet users in the Netherlands (96%), Luxembourg, Malta and Finland (all 91%) used IT security software, while it was less than two-thirds in Latvia (62%), Romania (64%) and Estonia (65%).”
From ZD Net