Connect with us

Cybersecurity

New York Times: Russian Intelligence Hackers Targeted Us

Published

on

New York Times

In a report late Tuesday, the New York Times revealed that it’s Moscow bureau was the target of a cyberattack from Russian hackers, earlier this month.

Although details are currently scarce, the New York Times’s Moscow bureau was, according to the publication, the target of an attempted cyberattack this month.

A spokeswoman for The Times insisted that there was no evidence to show that the cyberattack was successful.

We are constantly monitoring our systems with the latest available intelligence and tools,” Eileen Murphy stated. She added, “We have seen no evidence that any of our internal systems, including our systems in the Moscow bureau, have been breached or compromised.”

The New York Times is one among other US news organizations targeted with cyberattacks, CNN reported earlier, citing US officials as sources while not naming the other news agencies.

The officials revealed that investigations so far point to Russian intelligence as the instigators of the attacks. The news network also hinted that The Times’ email network may have been among the targets of the cyberattack, while noting that Times employees’ email services are outsourced to Google.

Private investigators involved in earlier investigations which saw hackers breach the networks of the Democratic National Committee (DNC) point to two of Russia’s intelligence agencies behind the incidents. They maintain with “high confidence” that the now-infamous attack on DNC servers was the doing of two Russian intelligence agencies, the F.S.B and the G.R.U. The former is notably the successor to Russia’s K.G.B while the latter is the country’s leading military intelligence unit.

Since the DNC hack, the FBI has also widened the net of its investigation, covering other recent breaches including that of the Democratic Congressional Campaign Committee, the fund-raising arm of the Democratic party.

Russia intelligence alleged involvement in United States’ affairs, particularly during a time when the latter is gearing up toward the Presidential elections, is gaining notoriety and attention from all corners. Indeed, Republican presidential nominee Donald Trump infamously asked Russian hackers to dig up rival Hillary Clinton’s emails.

Once the FBI’s investigation is complete, senior US administration officials claim that US President Obama will have to make a decision. If Russian culpability is far too strong with the evidence presented, the NYT reports that economic sanctions, quiet warnings toward Russia or even a cyberespionage counterattack, is entirely within the realms of possibility.

Meanwhile, cyberespionage is a practice that most governments engage in, according to comments from US National Intelligence Director James R. Clapper Jr, last year. He remarked that the much-publicized OPM breach was not an attack and rather a form of “theft or espionage.”

“We, too, practice cyberespionage,” Clapper Jr stated,”…we’re not bad at it.”

Featured image from Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

4 stars on average, based on 1 rated postsSamburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.




Feedback or Requests?

2 Comments

2 Comments

  1. Kerouac

    August 27, 2016 at 6:13 pm

    These are coming left and right, back and around, up and down, all the time. NYT isn’t innocent, nor are the Russians, Obama administration, or so-called “alt media” sell-outs to the big-name dirty-tricks! Am I the only one who just doesn’t care anymore if this is true? I mean, Clinton overplaying it, Trump downplaying it, I just think I’ve become indifferent to stuff. Trump may be semi-cozy with Putin, but it ain’t some conspiracy theory, and Clinton is just distracting sh*t from her scandal, then Breitbart does what these NYT/AP/CNN type shams do by blaming her crime on a tool which isn’t even perfect, instead of focusing on the fact, neither candidate is perfect, and the media usually lies for Clinton, but as much as I prefer alt-media, usually more of Old-Right affiliation, there are some doing this sh*t on that side, too. I’m sad to say, I have no more sympathy for hacks like this – if that makes me a sociopathic traitor, so-be-it. I’m American and I’m pissed at both sides and everything in between! This just means more news for me and their humiliation as well as any dirt this can dig up on ’em! Government controls the media and the government is its own corporation, virtually indistinguishable from the monopolies who front the show below them! They’re all guilty! What we need is more freedom, transparency, none of the f*cking back-and-forth…you get that from people who like crypto and not guns or guns and not crypto, or who race-bait on both sides. Research is valuable, screw any such accusations, but it ain’t right to fan the flames and then get that big media show and its drama, and it also needs to be said what you take away from someone else can be taken away from you, especially when companies or the populace advocate such tyrannical centralization. I value my crypto, I value my right to bear arms, if NYT or Fox, CNBC, etc., can’t understand that by picking either sides when they’re all the same, then good luck, this stupid sell-out willingness just produces more like-minded people as me who couldn’t care less when I have more important things to worry about like my ability to pay bills, these taxes, college debt, while the Federal Reserve, DoJ, NSA, IRS, State Dept and White House f*ck all our lives up on behalf of gaining their leverage through publications like this, then play the victim-game!

  2. Kerouac

    August 27, 2016 at 6:52 pm

    Trump ain’t innocent, but he didn’t “ask” them to dig more up on her. Firstly, he was trolling and the MSM picked up on it – left and right – aka establishment and establishment. Secondly, they didn’t need to, they were in the systems before, they already have the data and that’s been proven. And it’s funny because the Obamacrats such as Clinton and even RINOs like Jeb push for stricter surveillance to supposedly “prevent” this sh*t, when we all know it’s to, #1: cover-up actions of the federal government, #2: take away both our crypto and gun rights – which are of the same vein and should be treated as such, and #3: win elections by distracting the media from the real scandal which is what the emails contained in the first place (bleachbit ain’t perfect, FBI is almost always corrupt; don’t turn a blindeye to it just because you may dislike the “cleared” dumba** who was “under investigation,” because corruption is corruption and it’s no need to pollute the media with hyped drama). I’m not going to advocate foreign intervention by Russia anymore than I’d advocate our involvement over this type of crap-drama, but all I’m saying is: the establishment acts as though it’s the victim when it perpetrated several felonies and got away with it, externally blames it, outright perjors, when it does the same against other nations and that’s “justified,” even though Arab Spring led to not-so-better tyranny replacement in Egypt, the rise of Islamic terror organization, ISIS in Syria, cozying up with Iran, or even picking sides in the Crimean crisis when let’s face it, both Russia AND Ukraine are corrupt. But the fact we’d pretend Ukraine is innocent when they do the same dirty sh*t we call Putin out for doing, to protect a dying disorder named the European Union, is pitiful!

    While there is evidence to show Russians were behind DCLeaks, keep in mind they also leaked RNC emails which is a no-no if they were sabotaging in favor of Trump rather than just sabotaging us, period, and 2nd: the people behind DCCC were Slavic, but they very likely could’ve been Moldovan which would make a lot of sense. TAO “hack” was obviously faked to look as though the Russians did it. While I don’t trust Putin who’s an authoritarian, there ain’t no conspiracy between him and Trump subverting the election by conspiring some hack. Further, let’s face it: Trump, Clinton, Putin – not much different. proud a**, a** who plays victim and silences any challengers, a** who’s surely authoritarian but also loved by his own people.

    No one’s innocent here. Who got shafted as always? The citizens who’ve gotta pay for the ISIS “refugees,” hand over their liberties either crypto or firearms, privacy, 1st amendment, etc., in order to feed a hungry leviathan led by a two-headed monster feigning rivalry in a hopeless contest charaded as being “OUR” choice. The people in power get away with it. Comey and the other charlatons in office are just headed by Loretta – another fraudulent SoB, who wanna take away your 4th amendment in the name of so-called “security,” but none really know what it means. Ben Franklin and Thomas Jefferson did! It’s a lost art. We deserve security, but good gawd man, government ain’t your deity anymore than f*cking corporations are! The government IS a monopoly, and the sooner we get them and their bend-over lobbyists out of power, the better! Until then, we see this war on common sense and a penchant for sensationalist “media,” from either corrupt side. And think that Gary Johnson’s any better? He sold out just like everyone else! We’re supposed to proudly wave the Gadsden, not become a tool of the centralized dictatorship that is D.C. Pride in your country is very important, but that means respecting the liberties we are supposedly guaranteedd under our founding principles, because without them, there’s no reasonable sense of pride by anyone who valued what we once were. Until we hold the aristocrats responsible for their crimes, instead of painting them into a portrait of victimhood while demonizing anyone who dares rebel against uselessly ill-conceived “laws,” we don’t have a Consttitutional Republic! The cultist culture of selling-out one’s own values makes me sick and I see it in Shrilldebeast fanatic circles just as I do in Trumpkin circles! I’d rather take an a** who shows his a**holery, than one who vigorously hides it, but in the end, no matter which side wins, we’re all gonna be f*cking doomed! In such a sensible, educated world, this would be recognized as realism, but most others see it as pessimism. Meh, give it names, IDC, it’s my opinion and I’m gonna come right out and say it!

You must be logged in to post a comment Login

Leave a Reply

Altcoins

Monero Price Analysis: Stronger Malware to Mine Monero; XMR/USD Has Room for Another Potential Squeeze South

Published

on

  • Researchers: a stronger malware has been uncovered, which can mine Monero.
  • XMR/USD price action remains stuck in a narrowing range, subject to an imminent breakout.

The XMR/USD price has seen some upside on Saturday, holding gains of around 3% towards the latter stages of the day. Despite the press higher from the bulls, a move which has been observed across the cryptocurrency market, vulnerabilities remain. Price action has been ranging for the past nine sessions. Once again, this isn’t specifically just XMR, as this type of behavior is witnessed across the board. The narrowing in play came after the steep drop that rippled across the market on 10th January.

Price action was initially well-supported to the upside by an ascending trend line, which was in play from 15th December. This at the time was a very promising recovery, as XMR/USD had gained as much as 55%. Unfortunately, however, the bulls were unable to break down supply heading into the $60 region and were eventually dealt a big hammer blow. On 10th January, the market bears forced a heavy breach to the downside, smashing through this support. The price had dropped a big double-digits, some 20%.

Stronger Malware Mining Monero (XMR)

There is a dangerous form of malware that can bypass being detected and mine Monero (XMR) on cloud-based servers. A recent notice was put out by Palo Alto Networks’ Unit 42, an intelligence team that specializes in cyber threats, regarding a Linux mining malware. This was detailed to have been developed by Rocke group, which has the ability uninstall cloud security products. It can do this to the likes of Alibaba Cloud and Tencent Cloud, to then illegally mine Monero on compromised machines.

The two researchers from Palo Alto Networks, Xingyu Jin and Claud Xiao, detailed the findings of their studies. Once the malware is downloaded, it takes administrative control to initially uninstall all cloud security products. Shortly after, it will then then transmit code that will mine the Monero (XMR). Further within their press release, they said, “To the best of our knowledge, this is the first malware family that developed the unique capability to target and remove cloud security products.”

Technical Review – XMR/USD

XMR/USD daily chart.

Given the current range block formation, eyes should be on the key near-term technical areas. Firstly, to the downside, $43, which is the lower part of the range. A breach here will likely see a retest of the December low, $38. To the upside, resistance be observed at around the mid $46 level. Should a breakout be observed here, then a potential retest of the broken trend line will be watched.

Disclaimer: The author owns Bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.6 stars on average, based on 123 rated postsKen has over 8 years exposure to the financial markets. During a large part of his career, he worked as an analyst, covering a variety of asset classes; forex, fixed income, commodities, equities and cryptocurrencies. Ken has gone on to become a regular contributor across several large news and analysis outlets.




Feedback or Requests?

Continue Reading

Altcoins

Dash 51% Attack Fears Cooled as Core Dev Group Suggest Benevolent Miner

Published

on

Dash investors may have been starting to question the security of their holdings in light of Ethereum Classic’s (ETC) recent attack, and the subsequent fallout which revealed Dash’s own vulnerability to 51% attacks.

Three addresses, all controlled by the same user, were in control of more than 51% of the Dash mining hashrate, as reported on CCN a few days ago. On top of that, over 74% of the entire Dash hashrate was accessible via Nicehash – a cloud-mining marketplace – where it could be purchased for as little as $3,104 per hour.

Hashing Power Removed from Nicehash

As of Saturday’s statement by the Dash Core Group, the same individual still controls the majority of the Dash hashrate. However, the group pointed out that since the news concerning a 51% attack broke out earlier this week, the individual has begun to remove their hashing power from Nicehash, and spread it around separate mining pools.

The team stated clearly that they do not believe the miner in question to be malicious:

“…we don’t believe the entity in control of the wallets in question plans or wants to attack because their mining activities began at least 4 months ago and their blocks have been published for all to see.”

The group believe the sudden removal of hashing power from Nicehash – as shown above – is a signal of benevolent intentions on the part of the miner. As a major holder of Dash, they reason that the miner would want to secure the network as best they could.

“This removes the risk of a malicious party renting the hashing power via NiceHash and simultaneously signals that the entity in control of the hashing power does not have negative intent. We believe the miner behind the hashing power was made aware by the same info we discovered online and quickly moved to more protected pools as they appear to be a major stakeholder of Dash.”

Future Proof?

The announcement ends with a look to the future in the form of Dash’s upcoming ChainLocks technology. To be implemented in an as yet unspecified future update, ChainLocks will unite the mining layer with that of the Dash’s masternodes.

This means that a 51% attacker would also have to secure a majority of the blockchain’s masternodes to execute their plans. More can be read on ChainLocks here.

Dash Coin Price

Almost mid-way through the first month of 2019, Dash has recovered 26% of its value since the market lows of mid-December. That’s when one unit of DASH was valued at $58.27 – a 96% decline since December 2017.

Dash’s 26% recovery in the past month still leaves the coin 95% off its all-time high. As of Saturday the coin had settled down along with the broader market, after a sharp 17.5% decline 48 hours before.

Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.5 stars on average, based on 145 rated postsGreg Thomson is a full-time crypto writer and digital nomad. He eats ICOs for breakfast and bleeds altcoins. Wherever he lays his public key is his home.




Feedback or Requests?

Continue Reading

Cryptocurrencies

Where to Store Your Crypto?

Published

on

By

Storing crypto on virtual exchanges has some inherent security risks that have been exploited by hackers and cyber criminals. This article will touch upon this important topic and provide you with alternative methods in which to store your digital assets.

Cold and Hot Wallets

The main thing in cryptocurrency storage is the private key and who has access to it.

Cold storage wallets operate offline and without a constant internet connection. If your key is not on the Internet, then it is much more difficult to steal.

A hot storage wallet is a wallet with constant connection to the Internet.

So, all storage options can be distinguished by the following criteria:

  1. private keys are kept by you or by third parties.
  2. without internet connection or with internet connection

A cold storage wallet with a private key is considered the most reliable storage option. Such a wallet is suitable for long-term storage of large amounts. However, it is not convenient if, for example, you do trading and need access to your wallet for transferring small amounts.

Hardware Wallets

hardware wallets like Ledger, Trezor, Pi Wallet, Keepkey, Opendime, Bitlox, etc. have a flash drive within the software without an internet connection. You can connect to the Internet only when sending a transaction. You need to confirm the transaction physically, from the device itself. This is a “cold” method of storage without an internet connection (connection only at the time of the transaction). The user keeps private keys.

Paper Wallets

This method of storage will be also convenient for you if you want to conserve your funds for an extended period. In offline mode, you can generate a public and private key. For example, if you are using the service walletgenerator.net it will transfer those keys in the form of a QR-code, which can be printed and stored by you.

Physical Bitcoin Wallet

A physical bitcoin wallet has almost the same properties as a paper wallet. Encrypted bitcoins cannot be spent until the seal protecting the secret key has been broken. However, the security of the seal is not considered very reliable.

Desktop Offline Wallets.

There are also two main types of offline wallets:

  1. Wallets, where the user is the only one with the access to private keys. You can install such wallets on a personal computer as a separate program. As a rule, these are the wallets from the developers of that cryptocurrency. For example, Bitcoin Core. Litecoin Core, Mist, etc. Such wallets are also called “heavy” wallets since during installation they take up quite a lot of space (for example, you will have to free up at least 200 GB for a Bitcoin wallet in 2018). When installing such wallets on laptops flash drives that are disconnected from the Internet can also be called “cold” wallets. In general, they are also considered safe.
  2. The so-called “light” offline wallets. These are desktop wallets that allow you to store cryptocurrency without downloading its full registry to a bunch of gigabytes. Some of them give you private keys and the ability to restore a lost wallet at any time using seed phrases. There is a drawback – they do not always contain the full version of the blockchain, and sometimes won’t show up-to-date transaction information. Examples of such a wallet are Electrum and Armory.

Light wallets can be multi-currency, with a built-in internal exchange for example Exodus. Its private keys can also be restored using seed-phrases. However, inside such wallets, not only you but also developers have access to your private keys.

It is also worth to mention an essential aspect of light wallets, which are open source code. If something happens to the wallet, then it will be only possible to restore the wallet using the seed phrase only if the function is restored.

As a conclusion on cold wallets, I can say that their main advantage is reliability and security, and the main drawback is that it is difficult to move cryptocurrencies quickly. Therefore, cold wallets are suitable for long-term storage. For everyday transactions, hot wallets are the best. The exceptions are some hardware wallets that are compatible with online cryptocurrency storage and exchange services.

Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
2 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 5 (2 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.9 stars on average, based on 43 rated postsVladislav Semjonov has a legal and financial background. He has been involved in crypto space since early 2017 in both ICO advising positions in several ICO consultancy firms, and as an ICO analyst for VC. He began contributing for Hacked.com in April 2017.




Feedback or Requests?

Continue Reading

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending