{"id":30736,"date":"2020-10-26T21:33:33","date_gmt":"2020-10-26T19:33:33","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=30736"},"modified":"2025-08-27T23:46:57","modified_gmt":"2025-08-27T20:46:57","slug":"trumps-twitter-hack-attacks-on-russias-defence-complex-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/trumps-twitter-hack-attacks-on-russias-defence-complex-and-other-cybersecurity-news\/","title":{"rendered":"Trump&#8217;s Twitter hack, attacks on Russia&#8217;s defence complex, and other cybersecurity news"},"content":{"rendered":"<p>We have gathered the most important cybersecurity news from the past two weeks.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Donald Trump defined the IQ level required to hack accounts, after which his Twitter page was allegedly hacked;<\/li>\n<li>Data emerged showing growth in infected IoT devices;<\/li>\n<li>In the United States, new charges were brought against Russian hackers;<\/li>\n<li>Experts documented North Korean hackers launching attacks on Russia&#8217;s defence sector.<\/li>\n<\/ul>\n<\/div>\n<p><!--more--><\/p>\n<h2 class=\"wp-block-heading\">A researcher hacked Donald Trump&#8217;s Twitter account<\/h2>\n<p>On October 19, during a campaign appearance in Arizona, U.S. President Donald Trump stated:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cNobody gets hacked. To get hacked you need somebody with an IQ of 197, and he needs to know about 15 percent of your password.\u201d<\/p>\n<\/blockquote>\n<blockquote class=\"wp-block-quote twitter-tweet is-layout-flow wp-block-quote-is-layout-flow\">\n<p dir=\"ltr\" lang=\"en\">\u201cNobody gets hacked. To get hacked you need somebody with an IQ of 197, and he needs about 15 percent of your password.\u201d<a href=\"https:\/\/t.co\/6aR8yU2MVg\">pic.twitter.com\/6aR8yU2MVg<\/a><\/p>\n<p>\u2014 Judy Ruliani (@mshelton) <a href=\"https:\/\/twitter.com\/mshelton\/status\/1318303047647309824?ref_src=twsrc%5Etfw\">October 19, 2020<\/a><\/p>\n<\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In response to Trump&#8217;s statement, Dutch information-security engineer Victor Gevers hacked Trump&#8217;s Twitter account. According to Gevers, he gained access to Trump&#8217;s private messages and was able to post on his behalf. Gevers also said that the president did not have two-factor authentication configured.<\/p>\n<blockquote class=\"wp-block-quote twitter-tweet is-layout-flow wp-block-quote-is-layout-flow\">\n<p dir=\"ltr\" lang=\"en\">Dear <a href=\"https:\/\/twitter.com\/realDonaldTrump?ref_src=twsrc%5Etfw\">@realDonaldTrump<\/a>,<br \/>I\u2019ve tried to notify multiple times because of your passwords for Twitter are too weak. Last Friday, I contacted <a href=\"https:\/\/twitter.com\/CISAgov?ref_src=twsrc%5Etfw\">@CISAgov<\/a>, <a href=\"https:\/\/twitter.com\/TeamTrump?ref_src=twsrc%5Etfw\">@TeamTrump<\/a>, <a href=\"https:\/\/twitter.com\/WhiteHouse?ref_src=twsrc%5Etfw\">@WhiteHouse<\/a>, <a href=\"https:\/\/twitter.com\/DonaldJTrumpJr?ref_src=twsrc%5Etfw\">@DonaldJTrumpJr<\/a>, and <a href=\"https:\/\/twitter.com\/twittersecurity?ref_src=twsrc%5Etfw\">@twittersecurity<\/a>, just like in Oct 2016. But no one responds. Please keep 2FA enabled! <a href=\"https:\/\/t.co\/DRCCS8NAa4\">https:\/\/t.co\/DRCCS8NAa4<\/a><\/p>\n<p>\u2014 Victor Gevers (@0xDUDE) <a href=\"https:\/\/twitter.com\/0xDUDE\/status\/1318325035447234561?ref_src=twsrc%5Etfw\">October 19, 2020<\/a><\/p>\n<\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h2 class=\"wp-block-heading\">The United States charged six Russian nationals in cyberattacks on infrastructure in France, South Korea, Ukraine, and the United States<\/h2>\n<p>The United States Department of Justice charged six Russian citizens in cyberattacks on infrastructure in France, South Korea, Ukraine and the United States. According to the department, all defendants were officers of the GRU.<\/p>\n<p>They are linked to hacker groups such as Sandworm Team, Telebots, Voodoo Bear and Iron Viking.<\/p>\n<p>It is claimed that the hackers used malware KillDisk, Industroyer, the NotPetya ransomware and Olympic Destroyer. NotPetya\u2019s damages alone are estimated at $1 billion.<\/p>\n<p>Additionally, Assistant Attorney General John Demers for National Security said that China is becoming increasingly willing to work with hackers who serve the Chinese government.<\/p>\n<p>The recent US indictments against Chinese hackers suggest that the country has become a haven for cybercriminals if they also act in the interests of the state, Demers said.<\/p>\n<h2 class=\"wp-block-heading\">Norway accuses Russia of cyberattacks on parliament<\/h2>\n<p>Norway\u2019s Foreign Minister Ine Eriksen S\u00f8reide <a href=\"https:\/\/www.bbc.com\/news\/world-europe-54518106\" target=\"_blank\" rel=\"noopener noreferrer\">said<\/a> that the August cyberattack on the parliament\u2019s mail server was carried out by Russia, describing it as a serious incident that undermines \u201cthe most important democratic institution of the country.\u201d<\/p>\n<p>Moscow rejected the accusations, calling them nothing more than \u201ca serious and deliberate provocation.\u201d<\/p>\n<h2 class=\"wp-block-heading\">North Korea conducts cyberattacks on Russia\u2019s defence complex<\/h2>\n<p>The North Korean hacker group Kimsuky <a href=\"https:\/\/www.kommersant.ru\/doc\/4538451\" target=\"_blank\" rel=\"noopener noreferrer\">is conducting<\/a> phishing attacks on Russian defence enterprises, specifically the state corporation Rostec.<\/p>\n<p>Reports indicate the number of such cyberattacks rose sharply from April to September, but did not cause serious damage. Perhaps the hackers were simply probing.<\/p>\n<h2 class=\"wp-block-heading\">Google reveals details of a massive DDoS attack<\/h2>\n<p>In 2017, Google Cloud <a href=\"https:\/\/u1f987.com\/en\/news\/google-reveals-details-of-a-previously-unknown-large-scale-ddos-attack\">was subjected to<\/a> a massive DDoS attack, peaking at 2.54 Tbps.<\/p>\n<p>It remains one of the largest DDoS attacks to date. According to Google, the attack originated from networks of Chinese internet providers. The described incident surpasses the scale of the Amazon AWS attack that occurred in February 2020, which peaked at 2.3 Tbps.<\/p>\n<h2 class=\"wp-block-heading\">Germany launches trial against cyber-bunker operators<\/h2>\n<p>The operators of the \u201ccyber-bunker\u201d <a href=\"https:\/\/u1f987.com\/en\/news\/trial-opens-in-germany-against-operators-of-the-cyber-bunker\">are charged<\/a> with involvement in 249,000 crimes. Deals facilitated through the bunker included drug trafficking, cyberattacks and counterfeiting.<\/p>\n<p>Among the main questions to be considered at the trial are \u2014 in which cases the operator is responsible for content on the servers it provides, and whether the cyber-bunker operators knew about the activities of their clients who owned illegal sites.<\/p>\n<h2 class=\"wp-block-heading\">Cisco Talos notes rising activity of botnet for cryptocurrency mining<\/h2>\n<p>Cisco Talos <a href=\"https:\/\/blog.talosintelligence.com\/2020\/10\/lemon-duck-brings-cryptocurrency-miners.html\" target=\"_blank\" rel=\"noopener noreferrer\">warned<\/a> about a campaign that uses a sophisticated multi-module botnet network with several propagation methods. The botnet, known as \u201cLemon Duck,\u201d targets covert cryptocurrency mining, specifically Monero.<\/p>\n<h2 class=\"wp-block-heading\">Chinese hackers mask malware as popular antivirus<\/h2>\n<p>Google <a href=\"https:\/\/blog.google\/threat-analysis-group\/how-were-tackling-evolving-online-threats\" target=\"_blank\" rel=\"noopener noreferrer\">said<\/a> that a large campaign by the Chinese-linked APT31 groups distributes malware masquerading as the McAfee antivirus.<\/p>\n<p>The hackers send emails to users with links that lead to a collaborative GitHub service, from which the user\u2019s system begins to download malware. This allows hackers to upload and download files, as well as execute various commands on infected devices.<\/p>\n<h2 class=\"wp-block-heading\">Phishing campaign masquerades as Microsoft Teams alerts<\/h2>\n<p>Analysts at Abnormal Security <a href=\"https:\/\/www.databreachtoday.com\/phishing-campaign-mimics-microsoft-teams-alerts-a-15238\" target=\"_blank\" rel=\"noopener noreferrer\">found<\/a> a phishing campaign that mimics automated messages from the popular collaboration platform Microsoft Teams to steal Office 365 credentials.<\/p>\n<p>According to the analysis, between 15,000 and 50,000 Office 365 users were targeted.<\/p>\n<h2 class=\"wp-block-heading\">In numbers<\/h2>\n<ul class=\"wp-block-list\">\n<li>The number of IoT devices worldwide infected with malware rose by 100% over the past year, according to Nokia\u2019s security threat report.<\/li>\n<li>Check Point Research data show an increase in the daily average number of ransomware attacks by 50% compared with the first half of the year. The countries with the highest number of such attacks in the third quarter were the United States (98.1%), India (39.2%), Sri Lanka (436%), Russia (57.9%), and Turkey (32.5%).<\/li>\n<li>Almost 88% of cybersecurity professionals surveyed are satisfied with their pay, but worry that new technologies such as artificial intelligence and machine learning will replace them in the future. The study was conducted in the United Kingdom, Germany, Singapore, the United States and Australia.<\/li>\n<li>$620 million McAfee raised after going public at $20 per share on Oct 21, per the IPO.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read?<\/h2>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/u1f987.com\/en\/news\/how-the-pandemic-is-killing-internet-freedom-a-freedom-house-report\">They explained<\/a> how the COVID-19 pandemic affected internet freedom worldwide. Spoiler: it did not get any freer.<\/li>\n<li><a href=\"https:\/\/u1f987.com\/en\/news\/the-pantheon-of-the-darknet-or-what-lies-ahead-for-the-deep-web-after-a-wave-of-illegal-market-closures\">They analysed<\/a> what will happen to the darknet after a string of illegal-market closures.<\/li>\n<\/ul>\n<p>Sign up for ForkLog news on Telegram: <a href=\"https:\/\/t.me\/forklogfeed\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog Feed<\/a> \u2014 all the news, <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog<\/a> \u2014 the most important stories and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have gathered the most important cybersecurity news from the past two weeks.<\/p>\n","protected":false},"author":1,"featured_media":30737,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1111,1238,1233],"class_list":["post-30736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"15","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/30736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=30736"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/30736\/revisions"}],"predecessor-version":[{"id":30738,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/30736\/revisions\/30738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/30737"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=30736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=30736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=30736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}