Established in 2006 as a Community of Reality

Welcome to the Neno's Place!

Neno's Place Established in 2006 as a Community of Reality


Neno

I can be reached by phone or text 8am-7pm cst 972-768-9772 or, once joining the board I can be reached by a (PM) Private Message.

Join the forum, it's quick and easy

Established in 2006 as a Community of Reality

Welcome to the Neno's Place!

Neno's Place Established in 2006 as a Community of Reality


Neno

I can be reached by phone or text 8am-7pm cst 972-768-9772 or, once joining the board I can be reached by a (PM) Private Message.

Established in 2006 as a Community of Reality

Would you like to react to this message? Create an account in a few clicks or log in to continue.
Established in 2006 as a Community of Reality

Many Topics Including The Oldest Dinar Community. Copyright © 2006-2020


    Saudi Arabia announces its exposure to a large electronic espionage campaign

    Rocky
    Rocky
    Admin Assist
    Admin Assist


    Posts : 268963
    Join date : 2012-12-21

    electronic -  Saudi Arabia announces its exposure to a large electronic espionage campaign Empty Saudi Arabia announces its exposure to a large electronic espionage campaign

    Post by Rocky Tue 21 Nov 2017, 4:15 am


    electronic -  Saudi Arabia announces its exposure to a large electronic espionage campaign NB-222102-636468438779576012










    Saudi Arabia announces its exposure to a large electronic espionage campaign



    Alsumaria News / Baghdad , 
    said security officials in Saudi Arabia, Saudi spy exposure to a campaign letter and large - scale had been monitored since last February, it included five countries in the Middle East and other countries outside the region. 

    The Saudi e-security center said in a statement that the kingdom had been subjected to an electronic hacking campaign that carried the technical fingerprints of the "Mady Water" group, the name used by the US company Palo Alto Networks.




    Unit 42 of Palo Alto has published research showing how to use a series of interconnected attacks this year to "malicious documents" with government identities that appear to be official; to deceive users from target organizations to download documents and hack their computer networks. 

    Among the documents used to deceive the victims are documents that are believed to have been sent by sources such as the US National Security Agency, Iraqi Intelligence, Russian Kaspersky Security Company and the Kurdistan Regional Government of Iraq , the unit said in a statement . 

    The attacks targeted organizations in Saudi Arabia, Iraq, the UAE, Turkey and Israel, as well as other countries outside the Middle East, such as Georgia, India, Pakistan and the United States, the unit's researchers said.

    The Security Center said in its statement that the attacks sought to "steal data" from computers using a "link sent through spam" to the credentials of targeted users. 

    "Some malicious programs have been planted using Wethering Hole technology where the user is redirected to another Web site and the malicious file is downloaded," the center said. 

    The technical "breakthroughs" provided by Unit 42 were similar to those the center said were part of attacks against Saudi Arabia. The center said it had uncovered an "advanced electronic threat" (APT). 

    Saudi Arabia has been the target of multiple cyber attacks, including the attack on the "Chamon" virus. 

    Saudi Aramco, the world's largest oil company, has been attacked with an old version of the virus "Chamon"

    The E-Security Center refused to provide further details on the source of the attack or the names of the organizations or entities targeted. 

    "We can not confirm any link between what the center published and our research about MadiWater," said Christopher Bowd, a director at Unit 42, who told Reuters. "There is not enough information to confirm that link."



    http://www.alsumaria.tv/news/222102/%D8%A7%D9%84%D8%B3%D8%B9%D9%88%D8%AF%D9%8A%D8%A9-%D8%AA%D8%B9%D9%84%D9%86-%D8%AA%D8%B9%D8%B1%D8%B6%D9%87%D8%A7-%D9%84%D8%AD%D9%85%D9%84%D8%A9-%D8%AA%D8%AC%D8%B3%D8%B3-%D8%A5%D9%84%D9%83%D8%AA%D8%B1%D9%88%D9%86%D9%8A%D8%A9-%D9%88%D8%A7%D8%B3%D8%B9%D8%A9/ar

      Current date/time is Fri 26 Apr 2024, 2:32 pm