All, including the U.S. government, must make cyber security a top priority.
Back in July 2015, Hackers were discovered to have accessed the United States Census Bureau and got access to data that can be used to mount a later attack. “Hackers have breached a computer network used by the U.S. Census Bureau and have made off with “non-confidential” information from a government database that has since been published online, the agency admits. The U.S. Census Bureau is investigating an IT security incident relating to unauthorized access to non-confidential information on an external system that is not part of the Census Bureau internal network.” Read more…
USB Killer 2.0: A harmless-looking USB stick that destroys computers
Plugging in random USB sticks in your computer has never been more dangerous, as a researcher who goes by the name Dark Purple has demonstrated his new device: USB Killer 2.0.
When plugged into a computer, the deadly USB draws power from the device itself. With the help of a voltage converter the device’s capacitors are charged to 220V, and it releases a negative electric surge into the USB port.
This surge “fries” the USB port and, in the researcher’s demonstration, the motherboard – perhaps not always after the first surge, but the malicious USB device repeats the process until no more power can be drawn.
He noted that it’s unlikely that the hard disk and the information on it was damaged.
“In my experience and testing, most systems have the USB 5v supply isolated from other supplies so the hard drive, cpu, memory and other components will still work, but the mainboard and itself is not going to boot again without replacing the PCH, power regulation, and several supporting components,” Joe Fitzpatrick, consultant and researcher at SecuringHardware.com, commented on Ars Technica’s site.
“Some newer platforms have the CPU and PCH in a single chip, I expect that the whole chip would be fried in that case. My reading of USBKiller 2.0 is that the -220V is applied to the USB data pins. This results in just the USB controller, again likely just the PCH, getting fried. It is less likely to harm the other components in the system.”
The attack is not limited to computers, Dark Purple says. The device is able to incapacitate almost any equipment equipped with USB Host interface – phones, routers, modems, TVs, etc.
“The design for a USBkiller is pretty simple for anyone familiar with power regulation circuitry, there’s no doubt in my mind that it’s doable. But it’s probably a good thing no design details have been published,” concluded Fitzpatrick.
Dark Purple was also the creator of the first iteration of USB Killer, which pumped 110 volts into the target devices.
also called CyberEspionage.
Well, it looks like the Chinese government continues to use Hackers to gain an advantage… allegedly. Reports continue to surface about China and its relentless hacking strategy for economic gain.
Recent attacks against several high-profile US media outlets, Including The New York Times, The Wall Street Journal, The Washington Post, and Bloomberg, as well as against Twitter and others, have further raised concerns over Chinese hackers.
China continues to deny the allegations and, in fact, claim to be a victim of hacking.
A security company, Madiant, has obtained evidence that China’s People’s Liberation Army is engaging in cyber espionage and published a report outlining the evidence. According to Mandiant, various tools were used to steal an unknown number of files from victims and to repeatedly access the email accounts of several executives, including the CEO and General Counsel.
Video outlining the attack strategy…