Well, despite the witch hunt. That witch hunt, of course, refers to special Council Robert muellers investigation. A widening probe that includes whether trump attempted to obstruct justice by interfering with the fbis possible collusion. You just heard from a member of trumps legal team who is making the sunday news show rounds defending his client as the federal investigations heat up. Joining me now is civil rights attorney, and business and political marketing consultant, none of whom i could actually hear right now. So im going to go ahead and let david start off. And david if you could just walk us through what the defense as you understand it is so far from the white house. Well, this is a key point. When youre the subject of an fbi investigation, you dont always know. They dont call up and say, by the way, were investigating you. So the fact that jay comes out and says on the sunday morning shows, including on meet the press that the president is not under investigatio well, ja
Prominent cybersecurity researchers among those targeted in North Korean hacking campaign
Industry shocked by APT-linked attacks exploiting zero-day browser and OS vulnerabilities
Security researchers are becoming the target of a widespread hacking campaign attributed to North Korea’s state-sponsored actors.
Yesterday (January 25), Google’s Threat Analysis Group (TAG) disclosed details of the operation she claims was carried out by attackers supported by the North Korean government.
Recommended
According to Google, the group has focused on security vulnerability researchers in recent months with the intention of infecting their machines with malware.
The malware opened a back door that served to facilitate communication between compromised machines and the attacker-controlled command and control server.
…
A vulnerability broker he had known for a while and trusted had introduced him to a new researcher called James Willy from New York, Caceres [said]. We hopped in a group chat, the three of us, and he sent me a Visual Studio project to take a look at a driver bug that caused a blue screen of death.
… James [said] it was linked to Google Chrome – an instant attention-grabber for bug hunters. Vulns affecting software used by tens of millions worldwide are rare and command hefty rewards. … The code was all legit, it was a real crash with potential security implications, but I wasn t careful when I opened the Visual Studio project. [But] opening some Visual Studio projects can cause code to execute, which was the North Koreans attack vector.
Vulnerability Researchers Hit by North Korean Hackers
News Highlights: Vulnerability Researchers Hit by North Korean Hackers. Application security, containerization and sandboxing, cybercrime Google warns that social engineering attacks have left researchers’ systems behind Mathew J. Schwartz (euroinfosec) • January 26, 2021
Recommended Tweets used by attackers to demonstrate previous “exploits” they discovered (source: Google)
North Korean hackers have “targeted security researchers working on researching and developing vulnerabilities at various companies and organizations” to trick them into installing backdoor software, Google warns Threat Analysis Group.
The group’s blog post on Monday describes what it says as a month-long attack campaign that has already claimed multiple victims.
Tweets used by attackers to demonstrate previous exploits they d discovered (Source: Google)
North Korean hackers have been targeting security researchers working on vulnerability research and development at different companies and organizations to trick them into installing backdoored software, warns Google s Threat Analysis Group.
The group s Monday blog post describes what it says is a monthslong attack campaign that has already notched up multiple victims.
The campaign traces to a government-backed entity based in North Korea, which has used a variety of techniques to trick researchers, Google warns. We hope this post will remind those in the security research community that they are targets to government-backed attackers and should remain vigilant when engaging with individuals they have not previously interacted with.