Cyber security news for all

More

    North Korea uses digital attacks to respond to international sanctions

    Different groups within the hidden Cobra work with the same malware towards different targets. Several hacker groups of implanted malware have used the same code over the years. Software that was compiled in the same development environment can do a significant amount. But there is not only the same code, but also the same functionality.

    Basically, almost every state runs a program for aggressive behavior in data networks in one way or another, the speakers. The advantages over traditional use of violence are the lower costs, easier denial and that it can be used worldwide. As a rule, government actions are intended to support certain government goals. These can be of a political, foreign policy, military or financial nature or serve directly to influence people or organizations.

    North Korea often uses digital attacks to respond to international sanctions. Opponents and enemies of the state are also regularly attacked, as are humanitarian organizations that report human rights deficiencies in North Korea. In addition, the country is trying to obtain foreign military technology through hacking. Unfortunately, the North Koreans are not alone with such crimes. Yet another factual picture is rare for states. They avoid sanctions by participating in cryptocurrencies and digital bank robberies.

    Assignment Of An Attack Is Based On Extensive Prior Knowledge

    The reuse of code, certificates and systems form together a picture, depending on the situation, clearly indicates the perpetrator. In the geopolitical arena, there is no question of sufficient evidence for a criminal conviction. Intelligence agencies can also access information that is not accessible to private researchers. Spear phishing does not exploit a technical weak point, but a human one. Attackers use a pretext to extract the access data from target persons.

    Recent Articles

    Unclear cyber attacks that target Covid-19 vaccine campaign

    Security researchers have discovered some cyber attacks that are targeted against the delivery of vaccine against COVID. The targeted attacks began in 2 months...

    New malware called Egregor is on the rise

    New malware is on the rise. The Egregor malware has only been in active for 2 months, but it is already becoming apparent that...

    Anyone with a smartphone can become a victim of cyber-mobbing

    Cyber-mobbing is becoming a huge risk in the current COVID crisis. According to a study, almost 20 percent of students in Germany are exposed...

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox