Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

Russian Hackers Reportedly Attacked US Nuclear Labs | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


Russian hackers targeted three US nuclear research laboratories in a phishing scam last year, Reuters reports(Opens in a new window)

A hacking team known as Cold River reportedly created fake login pages for the Brookhaven, Argonne, and Lawrence Livermore National Laboratories and emailed them to nuclear scientists in the hope that they would reveal their passwords. 

Adam Myers, senior vice president of intelligence at cybersecurity firm CrowdStrike, told Reuters that Cold River is “involved in directly supporting Kremlin information operations.”  

The hacking attempts happened as UN experts entered Russian-controlled Ukraine to inspect Europe’s biggest atomic power plant, Reuters reports.

In its bid to convince people into entering usernames and passwords, Cold River used email accounts to register domain names that resembled legitimate services run by Google and Microsoft, security researchers told Reuters.

Cold River has reportedly been in operation since at least 2015. Email accounts that were used in the hacking group’s phishing operations between 2015 and 2020 were traced to an IT worker in the Russian city of Syktyvkar, Reuters reported.

While Moscow has consistently denied it carries out hacking operations, and there is no confirmation from Russia that is sponsoring these attacks, it is notable that Cold River has been solely targeting countries that are critics and enemies of Moscow. And Cold River’s hacking campaigns have intensified since the Russian invasion of Ukraine, according to cybersecurity researchers who spoke to Reuters.

Recommended by Our Editors

In May 2022, Reuters reports, Cold River broke into and leaked emails(Opens in a new window) that belonged to the former head of Britain’s MI6 intelligence service. 

And in another operation(Opens in a new window), the hacking group registered domain names that were an imitation of at least three European NGOs that were investigating war crimes.

These attacks are reported to have occurred just before and after the Oct. 18 launch of a UN independent commission inquiry that found Russian forces to be responsible for the “vast majority” of human rights violations in the early weeks of the Russian invasion of Ukraine.

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

var facebookPixelLoaded = false;
window.addEventListener(‘load’, function(){
document.addEventListener(‘scroll’, facebookPixelScript);
document.addEventListener(‘mousemove’, facebookPixelScript);
})

function facebookPixelScript() {
if (!facebookPixelLoaded) {
facebookPixelLoaded = true;
document.removeEventListener(‘scroll’, facebookPixelScript);
document.removeEventListener(‘mousemove’, facebookPixelScript);

!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;
n.push=n;n.loaded=!0;n.version=’2.0′;n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,
document,’script’,’//connect.facebook.net/en_US/fbevents.js’);

fbq(‘init’, ‘454758778052139’);
fbq(‘track’, “PageView”);
}
}

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW