Changes

Jump to navigation Jump to search
no edit summary
Line 10: Line 10:  
''''Asus'' & '''CCleaner'''<br/>
 
''''Asus'' & '''CCleaner'''<br/>
 
In July 2017, security analysts discovered Barium (aka ShadowHammer, ShadowPad, Wicked Panda), which is a Chinese hacker group that uses supply chain attacks as their core tool. They seed infections to many victims and then sort them to find espionage targets. This group infiltrated Asus and infected users through software updates and infected other users through CCleaner.<br/>
 
In July 2017, security analysts discovered Barium (aka ShadowHammer, ShadowPad, Wicked Panda), which is a Chinese hacker group that uses supply chain attacks as their core tool. They seed infections to many victims and then sort them to find espionage targets. This group infiltrated Asus and infected users through software updates and infected other users through CCleaner.<br/>
''' Maersk'''
+
''' Maersk'''<br/>
In June 2017, NotPetya, a Russian hacker group's malware, spread by disguising itself as a legitimate software update. First, it hijacked Ukrainian accounting software and then seeded a worm that caused a record-breaking US$10 billion in damages around the world, including at the shipping company Maersk, which spent over a week on manually recovering its active directory.<ref><ref>[https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/petya.html Petya vs NotPetya, McAfee]</ref>[https://www.semperis.com/blog/notpetya-flashback-the-latest-supply-chain-attack-puts-active-directory-at-risk-of-compromise/ NotPetya Flashback, Semperis]</ref>
+
In June 2017, NotPetya, a Russian hacker group's malware, spread by disguising itself as a legitimate software update. First, it hijacked Ukrainian accounting software and then seeded a worm that caused a record-breaking US$10 billion in damages around the world, including at the shipping company Maersk, which spent over a week on manually recovering its active directory.<ref>[https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/petya.html Petya vs NotPetya, McAfee]</ref><ref>[https://www.semperis.com/blog/notpetya-flashback-the-latest-supply-chain-attack-puts-active-directory-at-risk-of-compromise/ NotPetya Flashback, Semperis]</ref>
    
==References==
 
==References==
Bureaucrats, Check users, lookupuser, Administrators, translator
14,952

edits

Navigation menu