Cyber security news for all


    Attackers used a combination of stolen passwords for European supercomputers

    The supercomputers that were disconnected from the network last week are only gradually reconnecting. Upon request, the data center in Scotland and Germany announced that log ins would initially only be permitted during normal operating hours, in order to be able to guarantee the increased monitoring requirements.

    Combined Multiple Vulnerabilities For Attack

    Supercomputers centers across the country had their systems taken down in mid May after the attack became known. In addition to high-performance computers, all members of the partnership for advanced computing in Europe network were affected while those responsible are still covering themselves and have not released any information about the major attack.

    The Attackers Combined Two Vulnerabilities

    On the one hand, they used compromised user accounts on external systems whose private keys were configured with an empty passphrase. On the other hand, as the centre informed its users, they used an error in the software that can be used to obtain administration rights after regular login.Those responsible still do not know anything about the specific goals, but ask their users to report any suspicious things.

    New Passwords And Keys Needed

    Like several other high performance data centers affected, the European based company has called on all users to renew passwords and secure shell keys. The users were asked to generate new key pairs, whereby it is essential to ensure that no empty passphrase is assigned to the private key on the computer from which the login is made. In addition, all users of the cluster systems must insert key-specific from clauses into their authorized keys file, in order to restrict access to the external systems that are actually required.

    Many questions remain unanswered in what is probably the biggest attack on the supercomputers network in Europe to date. Which software bug allowed the attackers to gain administrator rights? In the end, one will also have to ask how the answer to such a networked attack must be coordinated.

    Recent Articles

    Russian Cybercriminal Behind “Cardplanet” Site Sentenced

    According to the United States Department of Justice, a Russian cybercriminal, Aleksey Burkov, 30—who operated Cardplanet site: a site that trafficked stolen card details—has...

    Hackers Used Malicious Docker Images to Mine Monero

    Researchers found malicious images on Docker Hub used for crypto mining. Palo Alto Networks' Unit  42, unraveled a crypto mining scheme which uses malicious Docker...

    NSA outlines requirements for secure collaboration services for US government telework

    The new National Security Agency (NSA) guidelines are a window of security for users. Everyone has been trying to return to their lives since...

    Cybercriminals threaten to sell off “scandalous” files swiped from Mariah Carey, Nicki Minaj, Puff Daddy’s legal eagles

    There's no escaping these cybercriminals. In a recent case of "cyber-extortion," threat actors known as REvil, are threatening to expose celebrity "dirt." These threat actors...

    Twitter apologises for exposed customers data

    In what is described as a "data security incident," sensitive details of Twitter's customers were exposed. Unlike other cases of a breach which are...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox