Thursday, May 7, 2020 |
Tag Cloud Tags:
Australia,
China,
hacker,
Indonesia,
Israel,
Media,
Military,
News,
PLO,
Security,
War,
Worthy News |
Learn about our FREE SYNDICATION Service |
Sign up for our Worthy Briefs! |
Printer Friendly
(Worthy News) – On the morning of Jan. 3, an email was sent from the Indonesian Embassy in Australia to a member of the premier of Western Australia’s staff who worked on health and ecological issues. Attached was a Word document that aroused no immediate suspicions, since the intended recipient knew the supposed sender.
The attachment contained an invisible cyberattack tool called Aria-body, which had never been detected before and had alarming new capabilities. Hackers who used it to remotely take over a computer could copy, delete or create files and carry out extensive searches of the device’s data, and the tool had new ways of covering its tracks to avoid detection.
Now a cybersecurity company in Israel has identified Aria-body as a weapon wielded by a group of hackers, called Naikon, that has previously been traced to the Chinese military. And it was used against far more targets than the office of Mark McGowan, the premier of Western Australia, according to the company, Check Point Software Technologies, which released a report on Thursday about the tool. [ Source: NY Times (Read More…) ]
We're being CENSORED ... HELP get the WORD OUT! SHARE!!!
Fair Use Notice:This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.
Tag Cloud Tags:
Australia,
China,
hacker,
Indonesia,
Israel,
Media,
Military,
News,
PLO,
Security,
War,
Worthy News