Hackers Accessed Law Enforcement Private Portal
- Arrest records
- Tools for sharing information about terrorist events and active shooters
"APT30’s attempts to compromise journalists and media outlets could also be used to punish outlets that do not provide favorable coverage – for example, both the New York Times and Bloomberg have had trouble securing visas for journalists in wake of unfavorable corruption reporting,", the report said.
"APT30 uses three pieces of malware [SHIPSHAPE, SPACESHIP, FLASHFLOOD] that are believed to have been designed to propagate to removable drives with the intent of eventually infecting and stealing data from computers located on air-gapped networks."
"It means that the Chinese have discarded their fig leaf of quasi-plausible deniability," McReynolds said. "As recently as 2013, official PLA [People's Liberation Army] publications have issued blanket denials such as, 'The Chinese military has never supported any hacker attack or hacking activities.' They can't make that claim anymore."
"We are still at the early stages of the investigation and there is still much work to be done. We will continue to work closely with the FBI to identify those to who commit offences and hold them to account," said Craig Jones, head of the cyber crime unit at SEROCU.
"The arrest is in connection with an ongoing investigation into cyber-fraud offences which took place between 2013 and August 2014 during which victims reported funds being stolen from their PayPal accounts," Thames Valley police said in a press release.
"They took everything... Xbox One, phones, laptops, computer USBs, etc.," Omari said in an email to the Daily Dot, who broke the story.
"Despite rumours of the Russian government's alleged involvement in high-profile government and military cyber attacks, there has been little hard evidence of any link to cyber espionage," Dan McWhorter, FireEye vice president of Threat Intelligence, wrote in a blog post discussing the report.
"FireEye's latest APT report sheds light on cyber espionage operations that we assess to be most likely to be sponsored by the Russian government, long believed to be a leader among major nations in performing sophisticated network attacks."
“This group, unlike the China-based threat actors we track, does not appear to conduct widespread intellectual property theft for economic gain,” FireEye stated in the report. “Nor have we observed the group steal and profit from financial account information.”
“The coding practices evident in the group’s malware suggest both a high level of skill and an interest in complicating reverse engineering efforts,” the report stated.
"In the coming days we will update you with specific details and hundreds of documents that the #SEA has obtained."
Want more Interesting Articles to your Inbox every Morning? We'll keep you up to date with Latest News and In-Depth coverage of Current and Future Trends in Information technology. Subscribe & WIN a Free Pass to NULLCON 2016
No Thanks, I Don't want to Learn anything New