The only trouble is nothing in the GRIZZLYSTEPPE report said which of those technical indicators were found in the DNC hack. government that companies can use to determine whether their networks may be compromised by a number of different Russian cybercrime groups. Profexer comes from the “GRIZZLYSTEPPE” report, a collection of technical indicators or attack “signatures” published in December 2016 by the U.S. The Times’ reasoning for focusing on the travails of Mr. American intelligence agencies have determined Russian hackers were behind the electronic break-in of the Democratic National Committee.” “Profexer’s posts, already accessible to only a small band of fellow hackers and cybercriminals looking for software tips, blinked out in January - just days after American intelligence agencies publicly identified a program he had written as one tool used in Russian hacking in the United States. The story, “ In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking,” details the plight of a hacker in Kiev better known as “ Profexer,” who has reportedly agreed to be a witness for the FBI. It’s a good read, as long as you can ignore that the premise of the piece is completely wrong. government as part of the arsenal used by Russian hackers suspected of hacking into the Democratic National Committee (DNC) last year. The Times says the man did so after one of his software tools was identified by the U.S. The New York Times this week published a fascinating story about a young programmer in Ukraine who’d turned himself in to the local police.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |