Europe News

thumbnail

Spanish police arrest two accused of hacking radioactivity alert system

Spain’s National Police said Wednesday that two people have been arrested for allegedly hacking the country’s Radioactivity Alert Network (RAR) and disabling more than one-third of the sensors that are used to monitor excessive radiation levels across the country. The attack occurred between March and June of 2021, and was allegedly carried out by two individuals who were at one point involved in maintaining the system, which is run by Spain’s General Directorate of Civil Protection and Emergencies (DGPCE). The police did not disclose the names of the arrested individuals, or say what motivated the attack. “During the investigation it was determined that the two detainees had been responsible for the maintenance program of the RAR system, through a company contracted by the DGPCE, for which they had a deep knowledge of it that made it easier for them to carry out the attacks and helped them in their efforts to mask their authorship, significantly increasing the difficulty of the investigation,” the National Police said. Read more about it: here

thumbnail

LockBit 3.0 Ransomware Victim : FAAC Group

According to the Redpacketsecurity media, the cybercriminal ransomware as a service group LockBit 3.0 has claimed responsibility for an attack on the Italian-based international group "FAAC" and published this claim on 13 August 2022.  Read more about it : here

thumbnail

The german gymnasium of Gunzenhausen affected by cyber attack

For a time, the IT system of a Franconian grammar school was completely paralysed. The reason for this is said to have been a cyber attack. But who is behind the attack? The IT systems of the Simon-Marius-Gymnasium in Gunzenhausen were temporarily unavailable last week. The reason was a cyberattack. The district administration Weißenburg-Gunzenhausen informed about this in a press release on Tuesday (09.08.2022). Now the search for those responsible begins. According to the district office, unauthorised access to the school's network was detected last week. This caused the deletion of data on the school server. The incident was promptly detected and all necessary measures were taken. However, it is still unclear whether the perpetrators were able to steal sensitive data.  Read more about it : here

thumbnail

Russian hacker group is said to have targeted German energy suppliers

According to research by BR and WDR , the Federal Public Prosecutor has issued an arrest warrant against a Russian hacker who was said to have been involved in operations against the networks of energy suppliers. According to this, Pawel A. belongs to a hacker group known as "Berserk Bear", which is said to be behind the Russian secret service FSB. Among other things, the suspect is said to be jointly responsible for a hack on the network of the company Netcom BW in the summer of 2017, a subsidiary of the German energy supplier EnBW. Years of investigations by the State Criminal Police Office of Baden-Württemberg preceded the identification of Pawel A. In September 2021, the Attorney General in Karlsruhe then obtained an arrest warrant, which has not yet been made public. The Federal Office for the Protection of the Constitution was also able to at least partially monitor the incoming and outgoing Internet traffic of the hacker group. One of the servers used by the group was located in Germany. Read more about it: here

thumbnail

Attack on a Polish company that provides remote reading of water meters

Hackers attacked a company involved in remote reading of water meters. Residents fear whether their data is safe and their water consumption will be falsified.  On Thursday, notices appeared on the cage from the cooperative that there had been a cyber-attack on the company that deals with remote reading of water meters. We don't know what this entails, whether the data is secure or whether the readings will not be falsified, says Mr Janusz from Marymont. He adds: - A few years ago, the co-op urged us to get new water meters. It was a considerable expense from the renovation fund, but the radio reading was supposed to be more accurate. The idea was also to reduce fraud, because not everyone was giving the true state of the meters after all. And now something like this. Read more about it : here

thumbnail

After Latvia recognized Russia as a sponsor of terrorism, she is the target of cyber attacks

The Latvian Parliament, by resolution, recognised Russia as a state sponsoring terrorism and deliberately attacking civilians in Ukraine. Riga's decision was said to have been acted upon by a pro-Russian hacking group by launching a cyber attack. The Latvian Parliament, in adopting the resolution on Thursday, indicated that Russian forces are knowingly and premeditatedly carrying out attacks against Ukrainian targets, including civilians, and that the Kremlin is financing terrorism. Read more about it : here

thumbnail

Cyber ​​attack against the news agency STT - some systems were shut down as a precaution

The news agency is working on solving the problems, and is investigating whether a data leak may have occurred. The news agency STT has been subjected to an extensive cyber attack. STT's news and image services still work, but in a limited form. The attack was discovered on Friday night and several systems were shut down for security reasons. The company is working on solving the problems. Right now there is no information that a data leak would have occurred, but this issue is also being investigated. According to the news agency's managing editor Minna Holopainen, STT is prepared for cyber attacks. Read more about it: here

thumbnail

KillNet disable an Estonian payment system

The pro-Russian hacktivist group KillNet claimed on its Telegram channel a cyberattack against the Estonian online payment system "ESTO AS". The group claims to have successfully disabled online payment services throughout the Republic of Estonia and that it is impossible to use them. 

thumbnail

Cyber-attack on TeleTrader

Transmission of real-time data was severely disrupted, customer and user data not affected. TeleTrader, a subsidiary of the Baha Group, which is one of the world's leading providers of real-time financial data, was attacked by hackers on 5 August. The attackers succeeded in paralysing servers and deleting data. Customer-specific information and user data were not affected by the attack. The incident was reported to the police. Read more about it : here

thumbnail

Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive

Organizations around the world rely on the use of trusted, reliable online storage services – such as DropBox and Google Drive – to conduct day-to-day operations. However, our latest research shows that threat actors are finding ways to take advantage of that trust to make their attacks extremely difficult to detect and prevent. The latest campaigns conducted by an advanced persistent threat (APT) that we track as Cloaked Ursa (also known as APT29, Nobelium or Cozy Bear) demonstrate sophistication and the ability to rapidly integrate popular cloud storage services to avoid detection. The use of trusted, legitimate cloud services isn't entirely new to this group. Extending this trend, we have discovered that their two most recent campaigns leveraged Google Drive cloud storage services for the first time. The ubiquitous nature of Google Drive cloud storage services – combined with the trust that millions of customers worldwide have in them – make their inclusion in this APT’s malware delivery process exceptionally concerning. Read more about it: here