Russia’s War The Choice Against Ukraine gained global attention this week with Russian President Vladimir Putin continue to escalate the conflict when the United States and Europe fiercely isolated the Kremlin. Although the front lines of the war are not digital, this week Ukraine highlighted that Russia is attacking the country’s computer networks that have come under attack with hacking attempts. After many years of doing this, Ukraine’s internet infrastructure is resilientand the Ukrainian government is also experimenting the establishment of a volunteer “IT Army” to organize recruitment from all over the world for its purpose.
Ukrainians have based on Telegram messaging platform to receive more of their news and official government updates on the situation, and hacktivists tried to make their mark in conflict as well, although their actions are often constrained by the realities of kinetic warfare.
We have the story of an online scammer who used tactics like misleading press releases and fraudulent domain names in an attempt to sabotage competitors in the alcohol-free spirit industry. And start-up Kytch, which sold a McDonald’s ice cream machine repair device before the fast food giant wrecked its business, is sue Golden aAches for $900 million in damages.
But please wait a moment. We’ve rounded up all the news here that we didn’t break or cover in depth this week. Click on the title to read the full story. And it’s safe out there.
US internet infrastructure company Cogent Communications on Friday said it was terminating relationships with Russian customers, including Russian state telecommunications companies Rostelecom and TransTelekom. The global internet is interdependent and Russia has backbone providers other than Cogent to stay connected to the world, but the company is one of the largest. Cogent said it weighed the risks that some people in Russia would lose their global connection against the possibility that the Russian government would benefit from Cogent’s services in conducting disinformation and hacking campaigns. public targets Ukraine. “Our goal is not to hurt anyone. It’s just not to empower the Russian government to have another tool in their war arsenal,” said Cogent CEO Dave Schaeffer. washington articles.
The notorious Conti ransomware gang has long been believed to be based in Russia, and last week the group announced its support for the Kremlin’s invasion of Ukraine. Since then, Conti has suffered a series of damaging leaks. A Twitter user with the handle @ContiLeaks dropped about 60,000 messages from Conti’s internal chats on Sunday, revealing details of the organization’s inner workings, including how the team recruits and trains member. Then, @ContiLeaks published a second newsletter that included more than 100,000 internal messages and files related to accessing the team’s source code and application programming interface. By Wednesday, researchers began to notice that Conti was dismantling its infrastructure. It’s not uncommon for ransomware groups to go underground and rebuild under a new name, but the story shows the severity of the counterattack Conti received from pro-Ukrainian hackers.
Following a ransomware attack last week, chipmaker Nvidia has had to deal with attackers who appear to have stolen 1 terabyte of data from the company and are slowly leaking increasingly sensitive data from the trove. The hacking group, known as Lapsus$, which is said to be based in South America, also claimed that Nvidia tried to “re-hack” or attack them in retaliation. Earlier this week, attackers leaked information about upcoming Nvidia GPUs and the source code for the Nvidia AI rendering system known as DLSS. After the company refused to pay the attackers a ransom, it released the usernames and passwords of more than 71,000 Nvidia employees on Friday, along with two code-signing certificates that could be compromised by other attackers on the network. worldwide abuse to make their malware seem authentic and trustworthy.
Stories with WIRED are more amazing