Hackers Continue to Target US Water Supply

In light of all that Facebook news later on-although frankly speaking, when not-you can only imagine jumping on the ship. If so, harvest how to delete your Facebook account. You are good

But that’s not all that happened this week! Google sheds light on Iran’s new hacking group known as APT35, or Charming Kitten, and how they use Telegram bots to find out if a phishing lure has a nibble. Speaking of Telegram, a new report shows how poor the work done on the messaging service perpetuation of extremism on stage.

There is good news for Cloudflare this week, as a judge decided that The internet infrastructure company is not responsible if one of its customers violates the copyright schemes of their websites. And there is bad news for the public, as the Missouri governor has repeatedly threatened to sue a reporter for responsibly exposing a security breach on a state website he discovered.

And there is more! Each week we focus on all the WIRED security news not covered in depth. Click on the news headlines to read the full stories, and stay safe there.

In February, there was someone Attempts to poison the water supply in a Florida town by hacking into its control system and large amounts of sodium hydroxide. In 2020, a former employee of a Kansas water facility accessed and opened its controls away And that’s before you get to the four ransomware attacks documented by intelligence officials this week, in a joint warning about ongoing threats posed by hackers to water facilities in US and wastewater. The alert explains that water treatment plants tend to invest in physical infrastructure rather than IT resources, and tend to use outdated versions of the software, making them equally vulnerable to attack. Unscrupulous hackers have ample access to destruction, and ransomware attackers always want a target that can’t afford to remain offline for any significant period of time. While this is not surprising sounded the same warning in April—The FBI / CISA / NSA / EPA joint memo provides new details on how many confirmed attacks have occurred in recent months, and it offers some instructions for critical operators in infrastructure how not to be the next victim.

A comprehensive hack on Twitch recently included source code, gamer payments, and more, cause a movement between streamers labi na. But this isn’t the biggest hack in Twitch history. The difference went to a 2014 compromise, detailed by Motherboard this week, that broke enough that Twitch had to “do most of the code infrastructure,” the report agreed, because many of its servers probably compromised. Inside Twitch, the hack became known as “Urgent Pizza” because of how much the engineers had to work overtime – and the dinners the company fed them – to ease the attack. Very good reading.

Chances are you’ve heard this story by now, but it’s still worth including a case with allegations that it’s wild. The Department of Justice ordered Navy engineer Jonathan Toebbe and his wife to attempt to provide state secrets to a foreign country; the people on the other end of the line became FBI agents. Toebbe is said to have participated in several “dead three”On sensitive information; Court documents say he kept data cards on everything from a peanut butter sandwich to a packet of gum. He allegedly offered thousands of documents, demanding $ 100,000 in cryptocurrency.

It’s always a good idea to update everything on your devices regularlyautomatically, though—But especially if that update is specifically designed to fix the so-called zero-day bug. In this case, a security researcher was so tired of Apple not to credit his submissions that last month he posted a proven concept exploit and complete details for four various iOS security bugs. This is the second to be patched, leaving two to go. Hopefully Apple will give him a proper hat tip if that needs to be fixed.

More WIRED Stories

Source link


Leave a Reply

Your email address will not be published. Required fields are marked *