The @ncsccUA warns of a cyberattack on the document management system of state bodies. The attack belongs to the so-called supply chain attacks. Methods and means of carrying out this cyberattack allow to connect it with one of Russia's hacker spy groups.https://t.co/ICgYxuuflH
在昨天烏克蘭政府指責替俄羅斯效力的APT駭客組織,襲擊了其文件管理系統,即行政機關電子互動系統(System of Electronic Interaction of Executive Bodies)。行政機關電子互動系統是一個基於網路的入口網站,烏克蘭政府機構使用該入口網站在彼此之間以及與公共機構之間分發文件。烏克蘭國家安全與防禦委員會(NSDC)的官員今天在一份聲明中說, 攻擊的目的是大規模感染當局的資訊資源。
Amazing research by @megabeets_ and @EyalItkin revealing how American exploits potentially leaked over to China – years before anyone ever heard of the Shadow Brokershttps://t.co/C50ReDcXPR
報告提到,中國駭客組織有可能是在Equation Group攻擊中國目標時取得了程式碼,也可能是在其攻擊Equation Group的基礎建設時捕獲了程式碼。研究還提到,APT31利用「箭」,在2015年至2017年3月期間進行了網路攻擊, 直到Microsoft修補了它利用的漏洞。據研究人員稱,箭是“EpMe”的山寨,該產品也被包括在2017年 Shadow Brokers的“ Lost in Translation”資料外洩中,並被“重新設計”來攻擊美國公民。
@Kia this is absolutely unacceptable during these conditions. I pay good money for this monthly and you’ve failed me in a time of need. #IceStormpic.twitter.com/OrWHn8unVW
We apologize we are having server issues that may affect your ability to login to the UVO app or send commands. We are working to resolve it as quickly as possible. An update will be provided as soon as possible. Thank you for your patience. ^RM