Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

Russian Hackers Reportedly Targeted US Nuclear Research Labs: Here’s How They Tried Tricking Scientists | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


A group of Russian hackers reportedly targeted three U.S. nuclear research laboratories in the summer of 2022. 

The Russian group Cold River carried out a phishing campaign against scientists at the Brookhaven, Argonne, and Lawrence Livermore National Laboratories to obtain passwords, Reuters reports. 

According to the report, hackers created fake login pages for the laboratories and contacted nuclear scientists to try to trick them into revealing their passwords.

“This is one of the most important hacking groups you’ve never heard of,” Reuters quoted Adam Meyers, senior vice president of intelligence at U.S. cybersecurity firm CrowdStrike saying. “They are involved in directly supporting Kremlin information operations.”

Cold River hacked into and leaked emails belonging to the former head of Britain’s MI6 spy service in 2022 and targeted Britain’s foreign ministry in 2016.

Also Read: Russian Ministry Website Hacked With The Message ‘Glory To Ukraine’

The hacking team has been involved in many other high-profile hacking incidents. 

According to Reuters, western officials say the Russian government is a global leader in hacking and uses cyber espionage to spy on foreign governments and industries to seek a competitive advantage. 

In a blog post, SEKOIA.IO said that Cold River sought to contribute to “Russian intelligence collection about identified war crime-related evidence and international justice procedures.” However, Reuters was unable to confirm this detail. 

Read Next: Putin Threatens To Strike New Targets In Ukraine, Says This Is What’s Prolonging The War

Photo: Pete Linforth/Pixabay.

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW