fbpx
Open post

Hackers, and their modern day affect

The government has always had a side of it that is less than reputable, usually when it involves the interference of other countries and governments under the guise of “for our own good”. However as of late, it seems the government isn’t what we need to worry about when it comes to interference in others’ business. Hackers are taking the lead when it comes to invading others business, via the internet and the tools associated with that technology.

Hackers have been making headlines almost everyday this year thus far for their interference in things from hospital functioning to government elections. Hackers are becoming a force of their own, almost like a rampaging, no law country, doing what they feel like, when they feel like it. At times, hackers can be great vigilantes that help shine the spotlight that is the worlds population onto topics that have been hiding in the dark, forcing a necessary change. However as of late, it seems countries have begun recruiting this form of technological tool and using it as another means of persuasion and confusion.

Hackers are now being used by governments and country leaders to disrupt events like the Winter Olympics, and elections. A recent example is the hacking of a former sheriff’s Twitter account, to cause havoc and persuade people to see the former sheriff in a different, not so great light.

Former sheriff  David Clarke, a known right-wing, has become the target of Turkish hackers, attempting to smear Clarke’s name for decisions he has backed. Clarke is a known supporter of Donald Drumpf. It seems the hackers, known as “Ayyildiz Tim” which translates to “Star and Crescent team”, an obvious connection to the Turkish flag, use the hacked accounts they get, to send direct messages to Drumpf, which seem to hold Islamic sentiments and support for the Turkish president Erdogan. This comes as a surprise seeing as Drumpf has recently declared that Jerusalem is the capital of Israel, a large disrespect to those of the Islamic faith.

This very instance of hackers using technology to influence or bend people to their will or persuasion is truly a terrifying idea, but makes you question in what way this differs from the governments past actions.

No matter your view on the issue, what im sure everyone can agree on, is the displeasing realization that your account on any site or program has been altered and is being used by an outside party! Ensure your online security is strong and secure! Give Re2tech a call and let us help you learn about your network and the possible vulnerabilities that are present! Don’t wait until your hit by hackers and ransomware and make the next hacking news article!

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

 

 

Open post

US says North Korea is behind cyberattacks dating back to 2009

The FBI and DHS are pinning several high-profile hacks on a group called Hidden Cobra, formally known as the Lazarus Group.

On Tuesday, the US Department of Homeland Security and the FBI issued a joint statement saying that the people behind the attacks are “cyber actors of the North Korean Government” who target computers running unpatched, older versions of Microsoft Windows. They also gain access to specific computers using Adobe Flash.

The FBI and DHS have referred to the attacks as hidden cobra, saying those responsible were previously named the Lazarus group and Keepers of Peace. The recent WannaCry ransomware attacks and the infamous attacks on Sony in 2014 are said to be at the hands of the Lazarus group.

 

Both of these were big-time events. The WannaCry attack locked users out of their computers, hitting more then 300,000 PC’s in more than 150 countries in a matter of days. The hack into Sony pictures was bad enough that President Obama weighed in saying the attack caused lots of damage.

The DHS and FBI stated that the perpetrators are capable of introducing malware, keystroke logging, using remote access tools and employing denial of service attacks.

The US government believes cybersecurity is a top concern right now. Recently President Trump signed an executive order urging greater action to improve government cyberdefense.

Cyber security is becoming more and more of a problem in this day and age. Definitely something we in the public really need to pay attention to.

If you need help making sure your network is secure, please contact us today!

contact_us_button

Open post

Cybersecurity extremely lax at Mar-a-lago

Propublica and Gizmodo reported that based on their most recent investigation the private club President Trump owns has extremely lax cybersecurity. He calls it the southern white house. Trump has used the resort to meet with staff and foreign heads of state on official buisness.

In February, Trump took a call about a ballistic missile launch from North Korea in the dining room with members and wait staff in attendance. Also in April he tracked the first attack ordered on Syria from a make shift situation room at Mar-a-lago.

Security holes found include : a wifi enabled printer that could be accessed publicly, a misconfigured router that was not encrypted,  use of outdated WEP encryption on three of the clubs wireless networks, making it easily hackable, and a database with an insecure login page on the website in which is not protected by standard web encryption.

Also Mar-a-lago guests only have to show a photo ID when they enter the facilities main door, and the club even serves as a venue for public events.

Mar-a-Lago guests only have to produce a photo ID when they enter through the facility’s main door. Also, the club serves as a venue for ticketed public events.

There is quite a few pretty serious security holes. Wouldn’t you think if a place was holding meetings that are usually done in the white house, should have the same sort of security?

 

Scroll to top