Technology Russia-linked hackers targeted hotel guests across Europe: security firm

20:55  11 august  2017
20:55  11 august  2017 Source:   Reuters

UK sets out new powers to impose sanctions after Brexit

  UK sets out new powers to impose sanctions after Brexit The British government published plans on Wednesday for a bill that would give it the legal power to impose sanctions after it leaves the European Union, including making it easier to cut off terrorism funding and freeze assets. Britain now negotiates and imposes non-UN sanctions against specific countries through EU laws. Without the new legislation, it would not have the legal authority to enforce those sanctions. Has Your Home's Value Increased? See It's Current Worth Sponsored by Trulia More than 30 sanctions regimes are currently in place, including against Russia, North Korea and Iran.

Russia - linked hackers targeted hotel guests across Europe - security firm - A cyber-spying group with suspected links to Russian military intelligence was probably behind a campaign targeting hotel guests in eight mostly European countries last month

FRANKFURT (Reuters) - A cyber-spying group with suspected links to Russian military intelligence was probably behind a campaign targeting hotel guests in eight mostly European countries last month, researchers at security firm FireEye said on Friday.

These preliminary findings are the latest to allege that Russia is engaged in far-flung hacking activity aimed at governments, businesses and election campaigns, including Hillary Clinton's unsuccessful White House bid last year.© REUTERS/Kacper Pempel/Illustration These preliminary findings are the latest to allege that Russia is engaged in far-flung hacking activity aimed at governments, businesses and election campaigns, including Hillary Clinton's unsuccessful White House bid last year. A cyber-spying group with suspected links to Russian military intelligence was probably behind a campaign targeting hotel guests in eight mostly European countries last month, researchers at security firm FireEye said on Friday.

The espionage group, dubbed APT 28, sought to steal password credentials from Western government and business travelers using hotel wi-fi networks, in order then to infect their organizational networks back home, FireEye said in a report (https://goo.gl/oQh8c1).

UK govt sets out tougher guidelines to protect smart cars from hackers

  UK govt sets out tougher guidelines to protect smart cars from hackers The British government issued new guidelines on Sunday requiring manufacturers of internet-connected vehicles to put in place tougher cyber protections to ensure they are better shielded against hackers. Pay 0% Interest Until August 2018 With This Card See The Card Sponsored by NextAdvisor The government said it was concerned that smart vehicles, which allow drivers to do things such as access maps and travel information, could be targeted by hackers to access personal data, steal cars that use keyless entry systems, or take control of technology for malicious reasons.

U.S. Diplomat Engaging in Back-Channel Diplomacy With North Korea - AP. Trump: U.S. ‘Locked and Loaded’ For North Korea. Russia - Linked Hackers Targeted Hotel Guests Across Europe : Security Firm .

Hackers With Ties to Russia Target Hotels Across Europe . A cyber-spying group with suspected links to Russian military intelligence was probably behind a campaign targeting hotel guests in eight mostly European countries last month, researchers at security firm FireEye said on Friday.

suitlady
Stop Paying Interest – Get 0% Intro APR Until 2019
Find Out More
Sponsored by CompareCards

The wave of attacks during the first week of July targeted travelers who were staying in several hotel chains in at least seven countries in Europe and one in the Middle East, it said.

These preliminary findings are the latest to allege that Russia is engaged in far-flung hacking activity aimed at governments, businesses and election campaigns, including Hillary Clinton's unsuccessful White House bid last year.

Several governments and security research firms have linked APT 28 to the GRU, Russia's military intelligence directorate. Other researchers have tracked the same pattern of attacks, but stopped short of linking APT 28 to the Russian state.

Russian hackers can reportedly take over unsecured hotel WiFi

  Russian hackers can reportedly take over unsecured hotel WiFi Security-conscious travelers typically avoid public WiFi hotspots, instead using VPNs and other tools to make sure their data is safely encrypted as it transmits from computer to unsecured wireless router to the internet. According to FireEye, the EternalBlue exploit could let hackers access anyone's computer connected to the hotel WiFi and silently gather usernames and passwords without victims even having to type them in. "It's definitely a new technique" for this Russion hacker group, FireEye's Ben Read told Wired. "It's a much more passive way to collect on people. You can just sit there and intercept stuff from the WiFi traffic.

Several governments and security research firms have linked APT 28 to the GRU, Russia 's military intelligence directorate. He declined to comment on how far the attack reached or whether it caused any damage. Russia - linked hackers targeted hotel guests across Europe : security firm .

By Eric Auchard. FRANKFURT, Aug 11 (Reuters) - A cyber-spying group with suspected links to Russian military intelligence was probably behind a campaign targeting hotel guests in eight mostly European countries last month, researchers at security firm FireEye said on Friday.

Moscow vehemently denies the accusations.

Benjamin Read, manager of cyber espionage analysis for U.S.-based FireEye, said the technical exploits and remote chain of command used to mount the attacks all clearly pointed to APT 28, whose vast scope of activities his firm has detailed since 2014.

"We are moderately confident in our assessment," Read told Reuters, saying this was because the technical inquiry was still in its early days. "We just don't have the smoking gun yet."

The latest attempts were identified and thwarted in the initial infiltration stage. But similar methods were used in the autumn of 2016 at hotels in Europe, and managed to breach the computer of a U.S. government employee, he said.

In the July attacks, FireEye found spear-phishing emails were used to trick hotel employees to download an infected hotel reservation document, which then installed GAMEFISH malware run remotely from internet sites known to be controlled by APT 28.

Swiss hotel sign tells Jews to shower before and after swimming

  Swiss hotel sign tells Jews to shower before and after swimming The owner of a Swiss hotel has been accused of anti-Semitism after she singled out Jews in two different signs."To our Jewish guests ... please take a shower before you go swimming and although after swimming. If you break the rules, I'm forced to cloes (sic) the swimming pool for you ...," wrote Ruth Thomann, owner of the Paradies Apartment House in Arosa, Switzerland.

Scripts of Game of Thrones episodes, actor contact info and more leaked in HBO hack 2d. Game Of Thrones has IKEA to thank for Jon Snow’s most famous look 3d. Russia - linked hackers targeted hotel guests across Europe : security firm .

FRANKFURT – A cyber-spying group with suspected links to Russian military intelligence was probably behind a campaign targeting hotel guests in eight mostly European countries last month, researchers at security firm FireEye said on August 11.

This foothold gave the cyber spies control over guest wi-fi networks and could help them grab passwords of targeted victims and sniff unencrypted data being transmitted to shared network drives in the up-market, business-class hotels of major cities.

"We did not observe any guest credentials being stolen. However there were multiple hotel chains targeted and we don't know the full extent of the operation," Read said.

The July attacks took advantage of a recently leaked piece of malicious software known as EternalBlue, believed to have been stolen from the U.S. National Security Agency, giving hackers a highly sophisticated way to move silently inside organizations' networks once they infect even a single machine.

It was also EternalBlue that fueled the worldwide spread of WannaCry ransomware in May and the NotPetya attack against Ukraine in June, which fanned out globally to hit dozens of major firms.

The 2016 hotel attacks tricked one user with a fake Adobe Flash update and were likely launched by a nearby hacker on the same guest wi-fi network, FireEye said. APT 28 logged into the guest's web-based Outlook email account 12 hours later, it said.

The government employee returned to the United States and the infection spread to their agency when their computer was reconnected to the network, Read said. He declined to comment on how far the attack reached or whether it caused any damage.

(Reporting by Eric Auchard; Editing by Mark Trevelyan)

A hacker leaked the decryption key for Apple's Secure Enclave, severely affecting iOS security .
A hacker going by the pseudonym xerub has claimed to have leaked the decryption key for Apple's Secure Enclave Processor (SEP) firmware, which could be a massive blow to iOS security.  According to Apple, SEP was incorporated into iOS security in Apple S2, Apple A7, and later A-series processors and provides "all cryptographic operations" for data protection. Apple's SEP is also responsible for verifying Touch ID and fingerprint initiated transactions.

—   Share news in the SOC. Networks

Topical videos:

This is interesting!