Thought you’d seen the last of prolific hacking group Pawn Storm? Think again. Just-published research from Trend Micro reveals fascinating new insights into one of the world’s longest-running cyber espionage groups. As politicians in the US continue to argue over the impact of its audacious campaign against Democratic Party officials last year, Pawn Storm is at it again, attempting to influence public option ahead of major elections in France and Germany.
We’ve discovered multiple phishing domains set up by the group explicitly to target French presidential front-runner Emmanuel Macron and German political organisations allied to two main parties there.
Our report, Two Years of Pawn Storm, reveals a highly organised and sophisticated group whose tactics should make essential reading for any IT security professional looking to improve their organisation’s defences. Continue reading →
CISOs these days have a lot to keep them awake at night. Threats grow more sophisticated, varied and voluminous than ever before. IT environments become more complex to manage and secure as new cloud and virtual systems are slotted in beside legacy technology, expanding the attack surface. Then there are the bad guys: not just cybercrime gangs or lone hacktivists now but also potentially state-backed groups. With such a backdrop cyber security vendors have a responsibility to their customers to prove their products are as robust and trustworthy as they possibly can be.
That’s why Trend Micro is thrilled to have been awarded the “EICAR trusted IT security” seal of quality. Continue reading →
UK law enforcers were in celebratory mood last week after a major co-ordinated strike against cyber criminals across the country. In total, 57 suspects were arrested in 25 separate operations nationwide for a range of offences, from DDoS to phishing and online fraud to malware distribution. One suspect was even arrested on suspicion of hacking US Department of Defence systems. Continue reading →
Transport minister Claire Perry warned this week that hackers may look to disrupt driverless car systems in the future for political or economic ends. “The more we move to technologically assisted forms of transport, whether it’s smart motorways or driver assisted vehicles, there is also a risk of cyber hacking – so we are mindful of that,” she told the Commons transport committee. Continue reading →