The Register: A Code War has replaced The Cold War. And right now we’re losing it

The Register: A Code War has replaced The Cold War. And right now we’re losing it . “Like the Cold War, the Code Wars won’t have much of a body count and might never flare into outright violence. But when we peel back the cool surfaces, we witness the same titanic battles for power and control, this time using cyberspace as a platform for dominance – just as, militarised by ICBMs, outer space became the premier platform for dominance in the Cold War.”

CyberScoop: FBI alert warns of Russian, Chinese use of deepfake content

CyberScoop: FBI alert warns of Russian, Chinese use of deepfake content. “The FBI warned in an alert Wednesday that malicious actors ‘almost certainly’ will be using deepfakes to advance their influence or cyber-operations in the coming weeks. The alert notes that foreign actors are already using deepfakes or synthetic media — manipulated digital content like video, audio, images and text — in their influence campaigns.”

The Verge: Russian intelligence reportedly used fake news sites to spread misinformation about coronavirus vaccines

The Verge: Russian intelligence reportedly used fake news sites to spread misinformation about coronavirus vaccines. “Four online publications linked to Russian intelligence agencies have been spreading false or misleading information about coronavirus vaccines, The Wall Street Journal reported, citing an official at the US Department of State’s Global Engagement Center.”

Ars Technica: Hackers tied to Russia’s GRU targeted the US grid for years

Ars Technica: Hackers tied to Russia’s GRU targeted the US grid for years. “For all the nation-state hacker groups that have targeted the United States power grid—and even successfully breached American electric utilities—only the Russian military intelligence group known as Sandworm has been brazen enough to trigger actual blackouts, shutting the lights off in Ukraine in 2015 and 2016. Now one grid-focused security firm is warning that a group with ties to Sandworm’s uniquely dangerous hackers has also been actively targeting the US energy system for years.”

AP: Russian hack brings changes, uncertainty to US court system

AP: Russian hack brings changes, uncertainty to US court system. “Trial lawyer Robert Fisher is handling one of America’s most prominent counterintelligence cases, defending an MIT scientist charged with secretly helping China. But how he’ll handle the logistics of the case could feel old school: Under new court rules, he’ll have to print out any highly sensitive documents and hand-deliver them to the courthouse. Until recently, even the most secretive material — about wiretaps, witnesses and national security concerns – could be filed electronically. But that changed after the massive Russian hacking campaign that breached the U.S. court system’s electronic case files and those of scores of other federal agencies and private companies.”

Google Blog: New campaign targeting security researchers

Google Blog: New campaign targeting security researchers. “Over the past several months, the Threat Analysis Group has identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations. The actors behind this campaign, which we attribute to a government-backed entity based in North Korea, have employed a number of means to target researchers which we will outline below.”

CNET: Russia blamed for SolarWinds hack in joint FBI, NSA and CISA statement

CNET: Russia blamed for SolarWinds hack in joint FBI, NSA and CISA statement. “Key government intelligence agencies said Tuesday that the SolarWinds hack is ‘likely Russian in origin,’ according to a joint statement from the FBI, NSA, Cybersecurity and Infrastructure Security Agency and Office of the Director of National Intelligence. It’s the first time the four agencies have attributed the cyber attack to Russia.”

Associated Press: Hacked networks will need to be burned ‘down to the ground’

Associated Press: Hacked networks will need to be burned ‘down to the ground’. “Experts say there simply are not enough skilled threat-hunting teams to duly identify all the government and private-sector systems that may have been hacked. FireEye, the cybersecurity company that discovered the intrusion into U.S. agencies and was among the victims, has already tallied dozens of casualties. It’s racing to identify more.”

Washington Post: The U.S. government spent billions on a system for detecting hacks. The Russians outsmarted it.

Washington Post: The U.S. government spent billions on a system for detecting hacks. The Russians outsmarted it.. “When Russian hackers first slipped their digital Trojan horses into federal government computer systems, probably sometime in the spring, they sat dormant for days, doing nothing but hiding. Then the malicious code sprang into action and began communicating with the outside world…. Why then, when computer networks at the State Department and other federal agencies started signaling to Russian servers, did nobody in the U.S. government notice that something odd was afoot? The answer is part Russian skill, part federal government blind spot.”