The White House deployed words to chide Russia for the NotPetya attack. On 15 February 2018, the White House Press Secretary released a blunt statement: In June 2017, the Russian military launched the most destructive and costly cyber-attack in history. The attack, dubbed “NotPetya,” quickly spread worldwide, causing billions of ...

The newest ransomware attack called NotPetya has re-ignited the debate ongoing since the earlier WannaCry attack. Cybersecurity experts, policymakers, and citizens affected have all asked: who is to blame for these attacks? The underlying vulnerability in both these attacks is based on a Microsoft vulnerability, which was discovered and extensively used by the National Security ...

Over the past few weeks, a critical question has been discussed amidst cybersecurity professionals and experts. Who would pair North Korean-linked malware with an alleged U.S. government cyber exploit leaked by the suspected Russia-affiliated Shadow Brokers to create a new variant of ransomware – a form of malware typically within ...

Despite the insistence of many pundits and technical experts, the recent WannaCry outbreak was – mercifully – a poorly organized attack with a poorly constructed tool. It was, in fact, the best of all worst-case scenarios. This salvo – and the attendant global reaction – only highlights the degree of gross ...

Everybody who depends on digital information systems, which is everybody, saw a few glimpses of silver lining from the WannaCry ransomware attack that took the planet by storm Friday. For one thing, the attacks slowed, and there was no massive second wave. “The good news is, the infection rates have ...

Over the weekend, businesses and critical services like banks, hospitals, telecommunications services and transportation hubs around the world were hit with a cyber attack that locked users out of their own systems using a form of ransomware known as WannaCry. The potential loss of data may lead not only to ...

Who’s to blame for the astonishingly successful ransomware attack sweeping the planet? Microsoft, the information technology giant whose popular Windows operating systems harbored the flaw malicious hackers exploited to paralyze at least 200,000 computers and systems in 150 countries, is pointing the finger at Washington. “Repeatedly, exploits in the hands ...

Friday’s global attack on computers in some 150 countries was clearly a wake-up call. It took government systems offline, affected corporations of all kinds, took critical infrastructure systems out of service and even changed the agenda of the G7 meeting in Italy. But, it was an attack carried out without ...

In response to the massive Wannacry ransomware attack that infected over 200,000 computers around the world, Brad Smith, Microsoft’s President and Chief Legal Officer, wrote a blog post Sunday night on lessons from the cyberattack—and the “urgent need for collective action” to keep people safe online. Below is an excerpt. ...

As businesses wake up to the possibility that the WannaCry ransomware tool will spread beyond the already estimated 200,000 computers already infected across Europe, experts are calling for a stronger public-private partnership on cybersecurity. The wake up call from this latest attack: there was a patch that would have shored ...

As people’s lives become more attached to the internet, cyber attacks will have more of an impact. One of the most pressing threats is the growth of botnets, or networks of compromised computers that can be leveraged for a variety of nefarious purposes. The Cipher Brief spoke with Omri Iluz, ...

Imagine an army of computers, acting under the instructions of a criminal syndicate, terrorist group, or foreign government. The sheer size of this network of devices augments the computing power of a single hacker, allowing them to coordinate attacks capable of knocking offline crucial websites belonging to banks, social media, ...

The problem of stolen credentials is a well-known threat in the security industry. But knowing something is a problem and understanding the full scope are two different things. The Shamoon 2 attacks targeting critical organizations across Saudi Arabia should serve as a clear demonstration about how significant the problem of ...

This week I’m attending the annual RSA Conference in San Francisco, where government and industry leaders have come together to discuss the looming challenges and newest tools in cybersecurity. Throughout the week, I’ll be speaking with experts, bringing you insights on the threats emanating from cyberspace, ranging from ransomware and ...

Trying to keep malware off your computer is standard practice at this point, but not many people know that malware also poses a threat to their phones. The Cipher Brief asked Ravi Devireddy, CTO and co-founder of E8-Security, about mobile phone malware. According to Devireddy, the problem is not as ...

Bring-your-own-device culture is very convenient, but with a growing amount of malware targeting mobile devices, it is also creating new vulnerabilities. The Cipher Brief spoke to Daniel Ford, a forensic analyst at Rook Security, about the growing threat of mobile phone malware as it relates to businesses. His recommendation: limit ...

As malware continues to grow and change, the number and types of at-risk devices will do the same. Currently, malware oriented towards mobile devices is on the rise, with hackers focusing on smartphones and tablets. Ryan Olson, the director of threat intelligence at Palo Alto Networks, says that the targeted ...

What do you use your phone for in a given day? Texting, checking the news, social media, banking, getting directions, playing games – most people will use their phones for all of this and more. At this point, they are an essential aspect of modern life. Due to all this ...

Industrial control systems (ICS) underly many aspects of our critical infrastructure, and there are concerns that they are becoming more vulnerable to hackers. The Cipher Brief has covered the threats to these systems, but recently there have been reports that Russia-affiliated hackers were able to cause power outages in Ukraine ...