How China turned a prize-winning iPhone hack against the Uyghurs

In March 2017, a group of hackers from China arrived in Vancouver with one goal: Find hidden weak spots inside the world's most popular technologies. Google's Chrome browser, Microsoft's Windows operating system, and Apple's iPhones were all in the crosshairs. But no one was breaking the law.

MIT Technology Review

Ransomware attack leads to shutdown of major U.S. pipeline system

A ransomware attack caused a major East Coast fuel pipeline operator to shut down its entire network on Friday, according to two U.S. officials familiar with the matter. The attack on top U.S. operator Colonial Pipeline appears to have been carried out by a criminal group, but federal officials and the private security firm Mandiant are still investigating the matter, one official said.

Washington Post

Ransomware in ICS Environments

Although ransomware impacting industrial control systems (ICS) is often IT-focused, ransomware can have disruptive impacts on operational technology (OT) as well.

Dragos

The Feds Can Access The Private Data On Your Phone Through Your Car

According to a report from The Intercept, one of the largest law enforcement agencies in the U.S., the Customs And Border Protection, has now found a convenient back door to siphon much of the information from the fortress of your smartphone: your car.

Jalopnik

US fuel pipeline hackers 'didn't mean to create problems'

A cyber-criminal gang that took a major US fuel pipeline offline over the weekend has acknowledged the incident in a public statement. "Our goal is to make money and not creating problems for society," DarkSide wrote on its website. The US issued emergency legislation on Sunday after Colonial Pipeline was hit by a ransomware cyber-attack.

BBC News

Shining a Light on DARKSIDE Ransomware Operations

Since initially surfacing in August 2020, the creators of DARKSIDE ransomware and their affiliates have launched a global crime spree affecting organizations in more than 15 countries and multiple industry verticals.

FireEye

Rclone Wars: Transferring leverage in a ransomware attack

Defenders can sabotage double extortion ransomware schemes by detecting unusual file transfer utilities such as Mega and Rclone.

Red Canary

Scammer Used Fake Court Order to Take Over Dark Web Drug Market Directory

Image: LagartoFilm via Getty Images Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet. Do you know anything else about this phishing campaign? We'd love to hear from you.

Vice

Joint advisory: Further TTPs associated with SVR cyber actors

The NCSC, CISA, FBI and NSA publish advice on detection and mitigation of SVR activity following the attribution of the SolarWinds compromise.

Ncsc

Experts suggest French insurer AXA's plan to shun ransomware payouts will set a precedent - CyberScoop

When French insurer AXA signaled last week that it would no longer write new cyber-insurance policies covering extortion payouts to criminals, ransomware and cyber insurance experts had two reactions. They wondered why it took so long, and how long it would take others to follow suit.

CyberScoop