Rocco Penn A tech blogger, social media analyst, and general promoter of all things positive in the world. "Bring it. I'm ready." Find me on Media Caffeine, Twitter, and Facebook.

Hackers are now hiding behind commercial security software

43 sec read

State-sponsored hacking attempts frequently rely on specially written software, but that’s a risky move. Unless it’s well-made, custom code can be a giveaway as to who’s responsible. Attackers are switching things up, however. Security researchers at CrowdStrike and Cymmetria have discovered that a likely cyberwarfare campaign against military-related targets in Europe and Israel used commercial security software to both cover its tracks and improve its features.

A previously undisclosed hacking campaign against military targets in Israel and Europe is probably backed by a country that misused security-testing software to cover its tracks and enhance its capability, researchers said. The attack program relied on software usually sold by Boston-based Core Security to companies and other customers that want to test their own defenses, said researchers coordinated by Israel’s independent Computer Emergency Response Team, or CERT. The researchers from CrowdStrike and startup Cymmetria will present their unusual findings at the annual Chaos Communication Congress security conference in Hamburg on Saturday. Criminal hackers have made use of penetration-testing tools such as Metasploit for years, other experts said, but most major government-sponsored hacks have specially written tools supplemented by free and widely available programs. That is in part because commercial programs could be traced back to specific customers.

Avatar of Rocco Penn
Rocco Penn A tech blogger, social media analyst, and general promoter of all things positive in the world. "Bring it. I'm ready." Find me on Media Caffeine, Twitter, and Facebook.

Obama wants $19 billion to improve America’s cyber security

Cyber attacks have grown to become one of the most-important issues in the United States, with both corporations and government agencies suffering from them in...
Avatar of Brian Molidor Brian Molidor
58 sec read

A hacker managed to steal information from the DHS…

Motherboard reported on Sunday that a hacker managed to get their hands on the personal information of about 30,000 employees for the DHS and FBI,...
Avatar of Alfie Joshua Alfie Joshua
1 min read

The Java plug-in is finally going to meet its…

It’s been more than two decades since Oracle decided to start plaguing web browsers with its Java plug-in, but it looks like it’s time for Oracle...
Avatar of Chastity Mansfield Chastity Mansfield
58 sec read

Leave a Reply

Your email address will not be published. Required fields are marked *