Rantburg

Today's Front Page   View All of Sat 06/01/2024 View Fri 05/31/2024 View Thu 05/30/2024 View Wed 05/29/2024 View Tue 05/28/2024 View Mon 05/27/2024 View Sun 05/26/2024
2023-01-07 Cyber
Russian hackers reportedly targeted US nuclear sites after Ukraine invasion
[IsraelTimes] Team known as Cold River created fake login pages and emailed scientists in bid to get to their passwords; unclear if effort was successful

A team of Russian hackers targeted three nuclear research labs in the US last summer, according to a Friday Rooters report.

The hacking team known as Cold Water, which is believed to be behind dozens of high-profile hacking incidents in recent years, targeted the Brookhaven (BNL), Argonne (ANL) and Lawrence Livermore National Laboratories (LLNL), according to internet records viewed by Rooters.

The news agency was unable to determine why those three labs were targeted, nor whether the hacking attempts had been successful.
The news agency was unable to determine why those three labs were targeted, nor whether the hacking attempts had been successful. None of the labs or government offices involved responded to requests for comment on the story.

Cybersecurity experts told Rooters that Cold River has escalated its hacking attempts since Russia began its invasion of Ukraine last February.

The hacking attempt against US nuclear labs occurred between August and September 2022 as UN experts entered a Russian-controlled area of Ukraine to inspect the Zaporizhzhia nuclear power plant amid fears of a radiation disaster due to Russian shelling in the area.

Cold River hackers created fake login pages for the three nuclear research labs in a bid to get ahold of the passwords of employees at those facilities to gain access to their computer systems, the internet records revealed. The hackers often use email accounts and domain names that look similar to legitimate service providers, such as "goo-link.online" and "online365-office.com," which appear to be the addresses of firms such as Google or Microsoft.

Cybersecurity experts told Rooters that Cold River had been responsible for targeting Britannia’s Foreign Office in 2016 and also managed to get ahold of the emails belonging to the former head of Britannia’s MI6 spy agency, leaking them to the public. Similar operations targeted government officials in Poland and Latvia, according to eastern European security officials.

In another recent espionage incident, Cold River created fake websites for three European NGOs investigating international war crimes just as a UN commission of inquiry released a report finding Russian forces responsible for human rights
...which are often intentionally defined so widely as to be meaningless...
violations in Ukraine. Rooters did not specify whether the targeted NGOs were involved in the compiling of that commission’s report.
Posted by trailing wife 2023-01-07 00:00|| || Front Page|| [20 views ]  Top

#1 They were doing it before the invasion. Why stop?
Posted by Procopius2k 2023-01-07 10:52||   2023-01-07 10:52|| Front Page Top

18:06 trailing wife
17:51 NoMoreBS
17:28 Frank G
17:25 Frank G
15:13 jpal
14:56 Besoeker
14:49 NoMoreBS
14:43 NoMoreBS
14:38 Besoeker
14:36 Besoeker
14:33 NoMoreBS
14:32 Besoeker
14:29 Unaique Squank4019
14:23 NoMoreBS
14:14 swksvolFF
14:12 swksvolFF
14:11 swksvolFF
14:09 M. Murcek
13:38 swksvolFF
13:30 Grom the Reflective
13:27 Tennessee
13:26 Bobby
13:26 Skidmark
13:11 Rex Mundi









Paypal:
Google
Search WWW Search rantburg.com