The operation disabled Sandworm’s command and control of the bots from the devices “before it could do any harm,” Wray said. “Sandworm has a long history of outrageous, destructive attacks,” he said. Sandworm is the same group that in 2015 attacked the Ukrainian electric grid, and led cyber attacks during the 2018 Olympics, Wray said. “The Russian government has shown it has no qualms about conducting this kind of criminal activity, and they continue to pose an imminent threat.” “We’ve disrupted this botnet before it could be used,” said FBI Director Christopher Wray during a news conference in Washington, D.C. That malware then would allow Sandworm to take command and control of the firewall devices, which often connected multiple computers across a network, to potentially conduct malicious activities. Attorney’s office in Pittsburgh.Īccording to the DOJ, Sandworm, an intelligence team of the Russian government, installed the malware on thousands of network security devices manufactured by WatchGuard and ASUS typically used in home offices or small to mid-sized business beginning as early as June 2019. The operation to disrupt the “Cyclops Blink” malware was led by the FBI in Pittsburgh, Atlanta and Oklahoma City, and the U.S. #Malware wednesday journaly series#Department of Justice announced a series of measures Wednesday to combat Russian criminal activity, including an operation to disrupt a malware program that officials said would have allowed the Russian government to control thousands of infected security devices around the world.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |