. | . |
Nation-backed hackers tune attacks to COVID-19; Facebook ads locations tags by Staff Writers San Francisco (AFP) April 22, 2020 Google on Wednesday warned that nation-backed hackers are exploiting the coronavirus pandemic to target health care organizations and those working to fight the pandemic. A security team tasked with defending against government-backed cyberattacks on Google and its users said it identified more than a dozen state-sponsored groups using COVID-19 themes as bait in phishing and malware traps. Early this month, Google reported that it was detecting about 18 million pandemic-themed malware or phishing messages per day and some 240 million COVID-linked spam messages. "Hackers frequently look at crises as an opportunity, and COVID-19 is no different," Shane Huntley of Google Threat Analysis Group said in a blog post. Examples of ploys included bogus solicitations for charities; messages crafted to appear as though sent from remote workers, and websites impersonating pages of governments or public health agencies. Huntley noted that one hacker campaign sent messages to US government workers with phony offers of free meals or delivery options available from fast food franchises because of the pandemic. Clicking on the emails led to online pages designed to trick people into providing user names and passwords to Google accounts, according to the security team. Most of the messages were automatically filtered as spam, and steps were taken to block access to deceptive websites asking for credentials, according to Huntley. "We're not aware of any user having their account compromised by this campaign, but as usual, we notify all targeted users with a 'government-backed attacker' warning," Huntley said. "We've also seen attackers try to trick people into downloading malware by impersonating health organizations." Some COVID-19 themed targeting of international health organizations discovered by Google was deemed the work of an Iran-linked group referred to as "Charming Kitten." Hackers allied under a "Packrat" banner traced to South America were said to have been behind emails linking to a fake World Health Organization website log-in page, according to Huntley. Google is tightening security at more than 50,000 accounts thought to be in the crosshairs of state-sponsored hackers, according to the California-based internet firm. "Generally, we're not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics," Huntley said. US and British security agencies earlier this month issued similar warnings, saying some 2,500 web addresses were linked to various fraud schemes.
Facebook adds location of posts to curb state-led manipulation The move adds to efforts made by the leading social network to give users more context and information about messages aimed at influencing politics and comes following a massive foreign influence campaign in the 2016 US election on social media. Facebook said that from 2018 it began offering information about people managing a page on Facebook and Instagram and where they are located. "Today, we're going a step further to provide the location of high-reach Facebook pages and Instagram accounts on every post they share, so people have more information to help them gauge the reliability and authenticity of the content they see in their feeds," said a blog post from the Facebook and Instagram product managers. "These changes are part of our broader efforts to protect elections and increase transparency on Facebook and Instagram so people can make more informed decisions about the posts they read, trust and share." The new feature will be tested in the United States initially and will focus on posts made from outside the country. Facebook and other social networks have been struggling to root out "inauthentic" content, including messages that appear to be from a local political entity but are in fact from foreign actors. Both Facebook and Twitter have blocked state-linked accounts operated in Russia, China, Iran and elsewhere for posting under false pretenses.
Key witness testifies in Moscow espionage trial of US ex-marine Moscow (AFP) April 20, 2020 The key witness for the prosecution appeared in a Russian court on Monday to testify in the high-profile trial of a former US marine charged with espionage, news agencies reported. The trial of Paul Whelan, 50, is continuing behind closed doors in a Moscow court despite the coronavirus pandemic and diplomatic protests. Whelan's lawyer Vladimir Zherebenkov told news agency Interfax that the witness had testified against Whelan. The lawyer did not provide further details of the session but sai ... read more
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |