Daily Drop (633): Invisible War: GPS, CN: Nvidia's Operations, TSA: Railroads, Musk: Ukraine, Spamouflage Dragon, Commercial Space, Newnew Polar Bear, Space Force: On-Orbit Refueling, GoPIX Malware
10-25-23
Wednesday, Oct 25, 2023 // (IG): BB // The Leek Sino-Satire // Coffee for Bob
Pentagon's New Frontier: Integrating Commercial Space Innovations for National Security
Bottom Line Up Front (BLUF): The Department of Defense (DoD) is actively developing a strategy to integrate commercial space capabilities, particularly on-orbit satellite refueling, into its operations to bolster national security. This approach aims to leverage rapid advancements and innovation rates in the commercial sector, addressing current limitations in military satellite maneuvers and increasing competitiveness against global adversaries.
Analyst Comments: Strategic Integration of Commercial Capabilities: Assistant Secretary of Defense John Plumb emphasized the DoD’s intent to harness commercial space advancements for national security purposes. The focus is on in-space logistics, notably satellite refueling, a capability currently absent in the department’s offerings. This integration aims to enhance the flexibility and longevity of military satellites, providing a strategic advantage, especially in the geostationary belt where fuel constraints limit operational lifespan. Shift in Procurement and Requirements Process: The traditional “requirements process” and “programs of record” are under scrutiny, with calls for their replacement with more flexible “mission areas.” This shift would streamline the integration of commercial services, ensuring rapid adoption of advanced technologies. Frank Calvelli, assistant secretary of the Air Force for space acquisition and integration, highlighted the need for procurement reforms, emphasizing the potential for increased agility in space programs.
FROM THE MEDIA: The DoD's move to integrate commercial space capabilities represents a significant strategic shift, seeking to augment U.S. space defense competencies. By focusing on innovations like on-orbit satellite refueling, the department aims to overcome current operational constraints and establish a robust presence in space. However, this initiative requires navigating institutional hurdles, reforming procurement processes, and fostering a culture receptive to commercial sector collaboration and innovation. The outcome of these efforts could profoundly influence the U.S.'s strategic position in space, especially concerning rival spacefaring nations.
READ THE STORY: SN
Finland Accuses Chinese Vessel of Subsea Pipeline Damage
Bottom Line Up Front (BLUF): The Finnish authorities have pinpointed a Chinese ship, the Newnew Polar Bear, as responsible for the recent damage to a critical subsea gas pipeline between Finland and Estonia. The incident, which also affected a telecommunications cable, occurred under ambiguous circumstances, with investigations focusing on whether it was an intentional act or a navigational blunder.
Analyst Comments: The disruption to the Balticconnector gas pipeline, a crucial energy link activated in 2020, was detected due to an abnormal drop in pressure, an anomaly for such a newly operational infrastructure. Finnish network operator Gasgrid Finland flagged this incident, suggesting significant downtime for repairs, impacting regional energy stability. Finnish investigations traced seabed disturbances and an anchor trail to the Newnew Polar Bear, a vessel under a Chinese shipping company. Despite several outreach attempts, the ship didn't cooperate while traversing Finland's exclusive economic zone, prompting Finnish officials to seek collaboration with Chinese authorities for further probing. The incident has thrust into focus the vessel's navigational practices, especially concerning the security of critical underwater infrastructure in international waters.
FROM THE MEDIA: This development underscores the delicate nature of underwater infrastructure, where even non-malicious activity can trigger significant repercussions. It calls for enhanced maritime navigational protocols to safeguard such critical installations. Additionally, it stresses the need for international cooperation in managing incidents in shared marine environments, ensuring accountability and preventing future mishaps.
READ THE STORY: The Record
The Invisible War: How GPS Spoofing Changes Combat Dynamics
Bottom Line Up Front (BLUF): In modern warfare, as evidenced in recent conflicts involving Israel, Gaza, and Ukraine, GPS spoofing has emerged as a critical strategy. Despite its seemingly innocuous designation, GPS spoofing, a technique used for misleading missile and aircraft systems about their actual geographic locations, has significant implications. These extend from altering the dynamics on the battlefield to potentially endangering civilian life and disrupting international aviation.
Analyst Comments: GPS spoofing involves advanced electronic warfare technology where false signals are broadcasted, misleading GPS receivers. Initially, this strategy was employed as a protective measure against precision-guided weaponry that relies on GPS data. This method's efficacy has been notably demonstrated in Israel's defense tactics against militant threats, specifically from Hamas and Hezbollah. Strategic Utility and Risks: The adoption of GPS spoofing underscores its strategic utility in contemporary conflicts. However, it also introduces profound risks. Misdirection due to spoofing not only confuses military ordnance, potentially causing weaponry to deviate harmlessly, but also risks civilian air travel by disrupting flight paths, potentially leading to international airspace violations or worse, civilian casualties.
FROM THE MEDIA: GPS spoofing represents a double-edged sword in modern warfare. While it is a significant defensive mechanism for nations like Israel in the face of real threats, its ramifications—potential civilian causalities, disruption of global air travel, and the absence of clear regulatory frameworks—present a complex challenge for global security and ethical warfare practices. The international community is compelled to consider establishing comprehensive guidelines for such technologies, balancing between national security imperatives and global safety and ethical concerns.
READ THE STORY: Politico
U.S. Government Accelerates AI Chip Export Restrictions, Affecting Nvidia's Operations in China
Bottom Line Up Front (BLUF): The U.S. government has enforced immediate restrictions on Nvidia’s sale of certain AI chips to China, a significant deviation from the initial 30-day grace period. These restrictions impact a range of Nvidia's products, notably excluding the RTX 4090. Despite the geopolitical implications and the shock to Nvidia’s Chinese market plans, the company anticipates no near-term significant financial downturn due to robust global demand.
Analyst Comments: The immediate enforcement of U.S. export restrictions on AI chips profoundly impacts market dynamics, particularly shaking Nvidia's dealings with major Chinese firms and potentially spurring China's push for technological self-reliance. Despite Nvidia's public confidence in its financial resilience, leveraging its diverse global market, there's an underlying tension considering the significant investments at stake in China. This abrupt policy shift, extending beyond Nvidia to industry stalwarts like Intel and AMD, signifies a broader, more aggressive U.S. strategy to throttle China's technological advancement, including measures to close loopholes in indirect exports and product specification adjustments. Amidst these sweeping changes, the curious case of the RTX 4090's exclusion from sanctions raises speculation regarding potential strategic motives or forthcoming regulatory re calibrations, highlighting the volatile, unpredictable nature of the global tech industry's regulatory landscape.
FROM THE MEDIA: The U.S. government's abrupt enforcement of export restrictions on Nvidia's high-performance AI accelerators to China underscores the escalating tech war, with immediate ripples across the sector. While Nvidia downplays financial impact, leveraging its global market diversity, the move marks a significant shift in international trade dynamics and U.S. export control policies. The decision's rapid enforcement, bypassing the standard grace period, hints at the U.S.'s intensifying scrutiny over tech exports, especially concerning AI and semiconductor technology. The industry anticipates further clarifications and potential ripple effects on other tech giants, underscoring the need for strategic adaptability amid geopolitical flux.
READ THE STORY: The Register
TSA Reinforces Cybersecurity Measures for Railroads Amid Growing Threats
Bottom Line Up Front (BLUF): The Transportation Security Administration (TSA) has decisively renewed critical cybersecurity regulations applicable to both passenger and freight railroad carriers, reinforcing the sector's defenses against the increasing prevalence of cyberattacks. These mandates, comprehensive in scope, demand rigorous cybersecurity testing, updated assessment submissions, and detailed reporting on the efficacy of implemented security measures.
Analyst Comments: The TSA's renewal of cybersecurity directives indicates a proactive stance in enhancing the resilience of the rail industry amid growing cyber threats, enforcing annual response plan testing and advanced protective measures like network segmentation. This move, a collaborative effort with agencies such as CISA and the Federal Railroad Administration, signifies a unified front against cyber adversaries. Rooted in the aftermath of significant cyber incidents, these directives address vulnerabilities in the railroad industry, emphasizing crucial defenses such as access control and timely patch management to counteract the industry's historical susceptibility to cyberattacks. Furthermore, the strategic national context cannot be understated; the directives come at a time of heightened tension due to potential geopolitical cyber conflicts, especially concerning the situation with Taiwan. The involvement of White House officials underscores the gravity of these threats and the essential nature of the rail sector's protection against international threats and espionage.
FROM THE MEDIA: The TSA's renewed cybersecurity directives for railroad carriers mark a significant stride in safeguarding the U.S. rail industry from cyber threats. These comprehensive measures, developed in concert with multiple federal agencies, require stringent testing, reporting, and the fortification of cybersecurity protocols, addressing vulnerabilities exposed by recent cyberattacks. The initiative also reflects broader national security objectives, recognizing the rail system's strategic significance and the evolving threat landscape posed by international actors.
READ THE STORY: The Record
U.S. Space Force Invests in On-Orbit Refueling for Enhanced Satellite Operations
Bottom Line Up Front (BLUF): The U.S. Space Force has contracted Astroscale U.S. Inc., with a $25.5 million deal to pioneer an in-orbit satellite refueling system, expected to be operational by 2026. This strategic move aims to extend the operational life of military satellites, previously constrained by limited fuel supply, marking a significant shift toward more flexible and enduring space capabilities.
Analyst Comments: The U.S. Space Force's contract with Astroscale signifies a pivotal development, marking a departure from traditional space strategies and heralding an era of enhanced satellite longevity through in-orbit refueling. This groundbreaking approach addresses the critical limitation of satellite operational lifespans, offering the promise of extended missions and heightened readiness in space. Moreover, the collaboration with Astroscale underscores an essential strategic shift, emphasizing the synergy between military needs and commercial technological innovation. This partnership not only accelerates access to advanced technology within the military landscape but also provides a practical, real-world platform for private sector advancements, catalyzing further innovations. The tactical edge gained through this initiative is considerable; the unpredictability it introduces into satellite operation cycles adds a complex layer to the U.S. space strategy, potentially deterring adversarial actions with the new dynamics of satellite maneuverability and sustained presence.
FROM THE MEDIA: The U.S. Space Force's contract with Astroscale signifies a progressive step in prolonging satellite life and, by extension, national security preparedness in space. By eliminating the restrictions of fuel limits, military satellites can operate more efficiently and adaptively, a strategic advantage in the dynamic realm of space. The collaboration with commercial entities not only infuses the military with innovative technologies but also stimulates growth and practical applications within the private sector. However, this advancement necessitates comprehensive planning regarding personnel training and the adaptation of operational protocols to fully integrate this new capability.
READ THE STORY: Stripes
Musk's Ukraine Comment: Fuel to the Fire of Online Russian Propaganda
Bottom Line Up Front (BLUF): Elon Musk's recent mockery of Ukrainian president Vlodymr Zelensky ignited a storm of activity among Russian trolls on the social media platform X, leading to a surge in pro-Kremlin propaganda. Despite Musk's efforts to curb inauthentic accounts after acquiring X, the platform witnessed a coordinated campaign capitalizing on his post, with trolls praising Musk and amplifying pro-Russian messaging.
Analyst Comments: The landscape of digital interaction and political discourse collided dramatically when Elon Musk posted a controversial meme. This act, initially personal and non-political, reverberated through the online world, inadvertently supporting Russian propagandistic messages. It catalyzed a systematic response involving approximately 160 fake accounts on platform X, generating a flurry of posts that falsely depicted broad support for Musk as a pro-Russian figure. This orchestrated activity, mostly disseminated in Russian, sought to fortify Kremlin-backed narratives and manipulate public perception on an international scale. While experts, including former social media platform researchers and academics, identified this campaign as a typical coordinated disinformation effort, they acknowledged the investigation's constraints without access to X's confidential internal data.
FROM THE MEDIA: In October, a meme posted by Elon Musk deriding Ukraine's president became a rallying point for Russian trolls on X. These trolls, operating through fake accounts, initiated a large-scale but low-engagement campaign to disseminate pro-Russian propaganda, casting Musk as a Kremlin sympathizer. This activity, verified by independent experts, underscores the ongoing challenges social media platforms face in combating disinformation. It also brings to light potential inadequacies in Musk’s approach to managing X, particularly concerning security policy decisions and their unintended consequences in bolstering misleading campaigns. The incident stands as a cautionary tale of how influential figures' online behavior can be exploited for geopolitical agendas, stressing the urgency for fortified countermeasures as several nations approach significant elections.
READ THE STORY: Wired
Spamouflage Dragon: Canada Unmasks China-Linked Disinformation Campaign
Bottom Line Up Front (BLUF): Canada's government has publicly attributed a large-scale disinformation operation on social media to China-linked actors, targeting its political figures, including Prime Minister Justin Trudeau. The campaign utilized "spamouflage" tactics, employing a network of fake social media accounts to disseminate and amplify derogatory content and conspiracy theories, impacting politicians across major parties and straining the diplomatic relations between Canada and China.
Analyst Comments: The Canadian foreign ministry exposed a comprehensive influence operation, allegedly tied to China, that aimed at discrediting numerous Canadian politicians through a wave of online disinformation. This campaign, known for using "spamouflage" tactics, involved the creation or hijacking of social media accounts to blanket social media platforms with propaganda and misleading information. In a detailed analysis, the Australian Strategic Policy Institute (ASPI) identified that these activities peaked between August and September, with fake accounts bombarding Facebook and X (formerly Twitter) profiles of Canadian officials with thousands of comments. These remarks not only attacked the integrity and credibility of public figures by calling them "corrupt," "racist," and "dishonest," but also extended to unfounded personal accusations and conspiracy theories. One such theory absurdly connected the U.S. military to the Hawaii wildfires.
FROM THE MEDIA: This revelation underscores the evolving threat of digital disinformation campaigns orchestrated by state-linked entities, particularly from China, aiming to destabilize foreign governments and manipulate public opinion. The incident has reignited concerns over foreign interference, digital platform security, and the need for robust international cyber diplomacy and defense strategies. The Canadian response, balanced between public acknowledgment and diplomatic caution, reflects the delicate act nations must navigate in the increasingly contentious cyber-powered global landscape.
READ THE STORY: The Record
GoPIX Malware Targets Brazil's PIX Payment Users Through Malvertising
Bottom Line Up Front (BLUF): The PIX payment system, widely popular in Brazil, has come under attack from threat actors deploying the GoPIX malware through a strategic malvertising campaign. Leveraged through malicious advertisements triggered by searches for "WhatsApp web," the malware aims to hijack PIX payment requests by replacing them with strings controlled by the attackers. This sophisticated strategy not only highlights the vulnerabilities within instant payment platforms but also underscores the persistent risk of malware in the constantly evolving cyber threat landscape.
Analyst Comments: The cybercriminal landscape is witnessing a sophisticated evolution, as exemplified by the GoPIX malware attack on Brazil's PIX payment system. By leveraging malvertising and cloaking techniques, attackers are not only able to disguise their operations but also specifically target and exploit genuine users. The GoPIX malware itself is designed to manipulate financial transactions by hijacking and altering payment requests, proving detrimental particularly in the realm of instant payments and cryptocurrency. Moreover, the cybersecurity arena is experiencing a proliferation of information-stealing tools and MaaS, which are readily available, easy to use, and increasingly powerful, catering to a wide range of criminals, regardless of their technical expertise. This democratization of cybercrime tools represents a concerning shift in the threat landscape, necessitating that individuals, businesses, and cybersecurity professionals remain vigilant, innovative, and ready to combat these evolving threats with enhanced, dynamic security protocols. The instances of similar attacks targeting popular communication apps further underline the importance of continuous vigilance and the adoption of advanced security measures.
FROM THE MEDIA: The GoPIX malware campaign targeting Brazil's PIX instant payment system users represents a new wave of cyber threats capitalizing on popular services and platforms. By exploiting the security gaps in these digital platforms and users' trust in them, cybercriminals manage to execute high-impact attacks. These incidents call for heightened awareness and enhanced security protocols, especially concerning digital financial transactions. The incident further highlights the necessity for continuous advancements in cybersecurity measures, as the tactics and tools used by cybercriminals are evolving rapidly, marked by the rise of services like Lumar in the dark web marketplace. The cybersecurity community must prioritize adaptive, forward-thinking strategies to mitigate these emerging threats.
READ THE STORY: THN
Unlocking a $235 Million Secret: The Quest to Crack a Bitcoin Tycoon's Lost Password
Bottom Line Up Front (BLUF): Unciphered, a cybersecurity startup, claims to have developed a technique capable of cracking the IronKey S200, a highly secure USB drive. This breakthrough is significant as it could potentially unlock entrepreneur Stefan Thomas's USB, containing 7,002 bitcoins valued at approximately $235 million. Despite proving their technique's efficacy, Unciphered faces an unexpected hurdle: Thomas's reluctance to use their services, citing prior commitments to other cracking teams.
Analyst Comments: The unfolding situation around Stefan Thomas's inaccessible bitcoin fortune illustrates a dramatic intersection of high-stakes digital asset management, technological innovation, and human decision-making. Unciphered's breakthrough in non-destructive IronKey access techniques marks a significant step in data recovery efforts, especially for encrypted devices safeguarding valuable assets. This development not only underscores the advancing capabilities in digital security and hacking methods but also brings to the forefront the intricate dynamics between contractual obligations, trust, and the high risks involved in digital currency storage. Despite the technical feasibility presented by Unciphered, the outcome hinges on various factors beyond technological expertise, including existing agreements, the psychological ramifications of potential failure, and the overarching legal and ethical landscape of cryptocurrency management. The case remains a high-interest scenario, setting a precedent for similar future occurrences in the expanding and unpredictable domain of digital assets.
FROM THE MEDIA: Unciphered's technical achievement in cracking the IronKey S200 marks a significant milestone in cybersecurity and cryptocurrency circles. However, the full potential of this breakthrough remains unrealized due to the intricate web of contractual obligations and cautious decision-making by bitcoin owner Stefan Thomas. The situation underscores the multifaceted challenges in the crypto landscape, extending beyond technical barriers to include legal, ethical, and interpersonal factors. As Unciphered seeks to navigate these complexities, the broader implications of their work could influence future endeavors in digital asset recovery and cybersecurity solutions. The unfolding dynamics between Unciphered, Thomas, and other parties involved will be crucial in determining whether technical innovations can indeed lead to the recovery of fortunes locked away in digital vaults.
READ THE STORY: Wired
Critical VMware Vulnerability Patched: Immediate Action Recommended
Bottom Line Up Front (BLUF): VMware has rolled out urgent security updates for a critical vulnerability (CVE-2023-34048) in its vCenter Server, potentially allowing remote code execution. With no available workarounds, users are urged to apply the patches immediately to prevent possible exploitations, as the flaw holds a severe CVSS score of 9.8. The updates are accessible for specific software versions, and due to the flaw's seriousness, a patch is also released for older vCenter Server versions.
Analyst Comments: In the ever-evolving realm of cybersecurity, the discovery of a critical vulnerability within VMware's vCenter Server has prompted immediate and decisive action from the company. Identified as CVE-2023-34048, this significant security lapse, rooted in the DCE/RPC protocol, leaves systems open to potential remote code execution attacks, marking a severe risk for businesses operating on virtualized infrastructures. The prompt disclosure by researcher Grigory Dorodnov and the subsequent urgent response underscore the importance of collaborative efforts in cybersecurity between researchers and corporate entities. By releasing immediate patches for its products, including older, often less-secured versions, VMware demonstrates a strong commitment to safeguarding its user base.
FROM THE MEDIA: The recent discovery of a critical flaw in VMware's vCenter Server underscores the relentless landscape of cybersecurity threats, particularly in widely used virtualization solutions. This vulnerability, with its high severity score, necessitates immediate patching, as it leaves the door open for potential remote code execution attacks. VMware's proactive approach in providing security updates across various software iterations, coupled with their transparent communication, illustrates industry best practices in cybersecurity management. Nonetheless, this incident serves as a stark reminder for organizations to maintain rigorous security protocols, engage in routine system checks, and apply updates promptly to safeguard against evolving cyber threats.
READ THE STORY: THN
Zero-Day Alert: Winter Vivern's Cyber-Espionage Campaign Targets European Governments
Bottom Line Up Front (BLUF): The espionage group known as Winter Vivern has launched a sophisticated attack on European governments by exploiting a zero-day vulnerability in the Roundcube Webmail server. This exploit, identified as CVE-2023-5631, allows malicious actors to access sensitive information through seemingly non-threatening emails. The rapid patch released by Roundcube post-discovery highlights the critical nature of this security breach, requiring immediate action by affected and potentially vulnerable entities to secure their digital communication infrastructure.
Analyst Comments: The recent cyber-espionage campaign by Winter Vivern marks a concerning escalation in the cyber threat landscape, characterized by the exploitation of a zero-day vulnerability in Roundcube Webmail. This strategy, requiring no user interaction—merely the viewing of a malicious email—underscores a significant advancement in the group's operational tactics, signaling a potentially broader threat to European governmental communications. The breach, already responsible for compromising sensitive geopolitical targets, emphasizes the necessity for enhanced defensive cyber strategies beyond the immediate patches issued by software providers.
FROM THE MEDIA: The cybersecurity landscape faces a new challenge with Winter Vivern's latest campaign targeting European governmental communications through a zero-day exploit in Roundcube Webmail. This development marks a concerning evolution in the group's capabilities and highlights the continual arms race between cybercriminals and security entities. Immediate patch application and adherence to best cybersecurity practices are crucial for government entities in safeguarding sensitive information against these ever-advancing threats. The situation also underscores the importance of international cooperation in cyber threat intelligence and defense strategy development.
READ THE STORY: THN
Huawei Amplifies Satellite Chip Order Amid Mate 60 Pro's Soaring Demand
Bottom Line Up Front (BLUF): Huawei is intensifying its production capabilities for the Mate 60 Pro, evidenced by a substantial order of 5.7 million additional satellite chips from Huali Chuangtong, following the Mate 60 Pro's escalating sales. This strategic move highlights Huawei's strengthening position in the satellite communication-equipped smartphone market.
Analyst Comments: Huawei's recent procurement of an additional 5.7 million satellite mobile chips, amounting to an investment of approximately 495 million yuan, underlines the company's commitment to cementing its foothold in the satellite-enabled communication sector. The chips, identified as part of the Huawei Mate 60 Pro through product teardowns, signify the tech giant's response to burgeoning demand and its intent to maintain supply chain fluidity. The financial impact on Huali Chuangtong, the chip supplier, has been pronounced, with stock values experiencing substantial growth. This symbiotic relationship not only underscores Huali's integral role within Huawei's supply chain but also attests to its capability and reputation in the satellite technology landscape.
FROM THE MEDIA: Huawei's aggressive strategy in acquiring a vast number of satellite chips corresponds with its aspiration to lead the satellite smartphone market. By bolstering its satellite communication features in flagship models like the Mate 60 Pro, the company is poised to satisfy growing consumer demand and technological trends. Furthermore, this development accentuates the symbiotic prosperity and growth shared with their suppliers, heralding a robust and innovative phase for Huawei in the realm of satellite communications technology.
READ THE STORY: HC
Items of interest
Space Espionage: Russia's Troubling Satellite Maneuvers Near French Asset
Bottom Line Up Front (BLUF): In a recent and potentially alarming space maneuver, Russia's satellite, known as Luch-5X or Olymp-K-2, moved within an unusually close proximity of 60 kilometers to the French Eutelsat 3B communications satellite. This act raises espionage concerns, echoing past incidents of Russian satellites approaching foreign space assets. The move is seen as an unfriendly act, with the potential threat not limited to physical collision but extending to possible espionage or intelligence compromise.
Analyst Comments: The event involving Russia's Luch-5X demonstrates a continuing pattern of provocative space behavior, representing potential security threats more than mere orbital mechanics. Russia's maneuvering close to operational satellites of other nations, particularly those handling sensitive communications, suggests an intent beyond passive observation, possibly extending into active espionage. This form of space brinkmanship destabilizes trust, complicating global space traffic management and the norms of peaceful space operations. While the satellite's approach did not pose a collision risk, the strategic implications are profound. It signifies a willingness to push boundaries, potentially triggering defensive or even aggressive counter-responses. Additionally, the ambiguity surrounding Luch-5X's capabilities further complicates the scenario, making it difficult to gauge the full extent of the threat it presents to global communications networks.
FROM THE MEDIA: The close approach of Russia's Luch-5X satellite to the French Eutelsat 3B underscores an ongoing trend of space behavior that many global observers find alarming. This incident, reminiscent of previous similar occurrences, highlights the growing urgency for comprehensive space conduct agreements. The risk of espionage is a glaring issue, with the potential to undermine not just commercial confidence but also global security dynamics. As space becomes increasingly congested and contested, incidents like this underscore the need for more robust mechanisms to prevent the weaponization of space or the use of satellites in ways that could undermine international security and cooperation.
READ THE STORY: INSIDER
The Largest Hack The World Has Ever Seen (Video)
FROM THE MEDIA: The SolarWinds hack is considered the largest cyber attack the world has ever seen. This video goes behind the scenes uncovering specific details about the SolarWinds cyber incident. Hackers infiltrate American Government Agencies and spy on their movements to collect information. The videos includes several internet security companies, Cybersecurity threats, cyber security companies and hints at Cyber warfare.
SolarWinds hack: Who is responsible?(Video)
FROM THE MEDIA: Brett Johnson was a US Most Wanted cybercriminal, called the Original Internet Godfather by US Secret Service for building the the first organized cybercrime community called ShadowCrew, which was the precursor to today's darknet and darknet markets.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.