{"id":18380,"date":"2022-02-26T10:45:21","date_gmt":"2022-02-26T18:45:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/26\/news-12113\/"},"modified":"2022-02-26T10:45:21","modified_gmt":"2022-02-26T18:45:21","slug":"news-12113","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/26\/news-12113\/","title":{"rendered":"DDoS Attempts Hit Russia as Ukraine Conflict Intensifies"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6219337b5683bb6cc6074867\/master\/pass\/Security-Roundup-1238495396.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 26 Feb 2022 14:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/brian-barrett\">Brian Barrett<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">When Russian president<\/span> Vladimir Putin launched an unprovoked war against Ukraine this week, he did so with a warning that any interference from the West would be met with a response \u201cnever seen\u201d in history. The <a href=\"https:\/\/www.wired.com\/story\/putin-nuclear-threat-ukraine-sanctions-history\/\">implied nuclear threat has little if any precedent<\/a> over the last several decades, and while the Kremlin is far more likely to unleash cyberattacks, it was a chilling indication of how far Putin may be willing to escalate.<\/p>\n<p class=\"paywall\">Russia\u2019s notorious Sandworm hackers, meanwhile, did not sit idly by when <a href=\"https:\/\/www.wired.com\/story\/vpnfilter-router-malware-outbreak\/\">researchers exposed their VPNFilter malware<\/a> in 2018. Intelligence agencies in the US and UK this week detailed <a href=\"https:\/\/www.wired.com\/story\/sandworm-cyclops-blink-hacking-tool\/\">Cyclops Blink, a hacking tool that Sandworm developed<\/a> soon after VPNFilter was no longer useful. Cyclops Blink targets network devices, conscripting them into a botnet and exposing them to further infection. While UK officials said that the revelation was not directly related to the situation in Ukraine, it did come at a time of <a href=\"https:\/\/www.wired.com\/story\/russias-cyber-threat-to-ukraine-is-vast-and-underestimated\/\">increasingly serious cyberattacks<\/a> against the country.<\/p>\n<p class=\"paywall\">We also took a look <a href=\"https:\/\/www.wired.com\/story\/intel-lab-istare-hack-chips\/\">inside Intel\u2019s iStare lab<\/a>, where the company\u2019s researchers work to hack chips in an effort to head off the next <a href=\"https:\/\/www.wired.com\/story\/meltdown-spectre-bug-collision-intel-chip-flaw-discovery\/\">Spectre and Meltdown<\/a> or <a href=\"https:\/\/www.wired.com\/2016\/08\/new-form-hacking-breaks-ideas-computers-work\/\">Rowhammer attack<\/a>. And we talked to security researchers who figured out how to <a href=\"https:\/\/www.wired.com\/story\/little-seal-bug-shiny-objects-spy-listen\/\">eavesdrop on any room that has a shiny object in it<\/a> within view.<\/p>\n<p class=\"paywall\">If you\u2019re looking to lock down your Chrome browsing experience, you might want to give <a href=\"https:\/\/www.wired.com\/story\/how-to-use-google-chrome-enhanced-safety-mode\/\">Enhanced Safe Browsing a try<\/a>; we talked you through how to set it up. And we picked the <a href=\"https:\/\/www.wired.com\/story\/best-personal-safety-tech\/\">best personal safety devices, apps, and alarms<\/a> for when you need a little extra protection in the real world as well.<\/p>\n<p class=\"paywall\">And there&#x27;s more! We\u2019ve rounded up all the news here that we didn\u2019t break or cover in depth this week. Click on the headlines to read the full stories. And stay safe out there.<\/p>\n<p class=\"paywall\">Leading up to and in the early days of Russia\u2019s invasion of Ukraine, the Kremlin\u2019s cyberspace strategy has included a <a href=\"https:\/\/www.wired.com\/story\/ukraine-ddos-russia-crypo-roblox-security-news\/\">combination of denial-of-service attacks and data wipers<\/a>. This week saw several efforts to DDoS Russia in return, with mixed results. Russian government, military, and bank websites have all been hit with traffic tsunamis, though for the most part they appear to be holding steady. Mil.ru, the country\u2019s military domain, appears to have put geofencing measures in place as part of an effort to stave off the attack, blocking access to any devices that aren\u2019t in Russia. A more successful DDoS took Russian state news site RT offline Thursday and well into Friday; the hacktivist collective <a data-offer-url=\"https:\/\/twitter.com\/YourAnonTV\/status\/1496968999900377088\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/YourAnonTV\/status\/1496968999900377088&quot;}\" href=\"https:\/\/twitter.com\/YourAnonTV\/status\/1496968999900377088\" rel=\"nofollow noopener\" target=\"_blank\">Anonymous appears to have claimed responsibility<\/a>.<\/p>\n<p class=\"paywall\">Reuters reports exclusively this week that Ukraine has taken to underground forums in search of a few good hackers. While the country has no standing cyber force, its Defense Ministry has moved to recruit people to spy on Russian forces and help defend critical infrastructure from cyberattacks. Applicants are submitting their information to a Google Docs form\u2014including professional references\u2014and will be vetted before being asked to officially join.<\/p>\n<p class=\"paywall\">The NFT space is rife with hacks and scams, but the scale of this one is noteworthy. It appears that a phishing campaign parted 17 NFT collectors from their digital tchotchkes. The victims all received emails that appeared to come from the <a href=\"https:\/\/www.wired.com\/story\/opensea-nfts-twitter\/\">OpenSea marketplace<\/a>, when in fact it was a scammer who soon flipped their ill-gotten tokens for nearly $3 million. In an unrelated incident, a Texas man is suing OpenSea for $1 million because someone stole his Bored Ape NFT, and he is unable to retrieve it.\u00a0<\/p>\n<p class=\"paywall\">Security researchers from Pangu Labs say they\u2019ve pieced together the origins of a nearly decade-old hacking tool, and that it traces back to the Equation Group, which is widely thought to be the US National Security Agency. They say they were able to make the link thanks in part to a leak by the Shadow Brokers, a mysterious group that <a href=\"https:\/\/www.wired.com\/2016\/08\/shadow-brokers-mess-happens-nsa-hoards-zero-days\/\">released a trove of apparent NSA secrets<\/a> in 2016. More interesting than the tool itself, though, is the public attribution to the NSA\u2014which, while not unprecedented, is extremely rare. Or at least, it has been.\u00a0<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-ddos-nft-nsa-security-news\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6219337b5683bb6cc6074867\/master\/pass\/Security-Roundup-1238495396.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 26 Feb 2022 14:00:00 +0000<\/strong><\/p>\n<p>Plus: Hacker recruits, NFT thefts, and more of the week\u2019s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-18380","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18380"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18380\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18380"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}