Wednesday, April 14, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Pharmaceutical giant Bayer targeted by cyberattack, threat ‘contained’

April 6, 2019
in Internet Security
Pharmaceutical giant Bayer targeted by cyberattack, threat ‘contained’
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

UK on Huawei: New engineering flaws found, old vulnerabilities haven’t been fixed yet
Board that oversees Huawei security in the UK offers only ‘limited assurance’ that risk to national security can be mitigated.

Bayer has revealed an attempt to compromise the company’s networks through a cyberattack but has assured interested parties that the breach has been contained.

You might also like

Cybersecurity: Victims are spotting cyber attacks much more quickly – but there’s a catch

Samsung’s new Galaxy Quantum 2 uses quantum cryptography to secure apps

Brave browser disables Google’s FLoC tracking system

The German drug manufacturer said in a statement on Thursday that infectious software was discovered on Bayer systems back in early 2018, as reported by Reuters.

Rather than remove the malware, the company elected to keep a covert eye on the software to try and work out its purpose, as well as who was responsible for implanting the malicious code.

The malware was removed at the end of March, concluding Bayer’s espionage activities on its own networks. Damage is currently being assessed.

CNET: Kaspersky Lab will warn you if your phone is infected with stalkerware

Bayer says that there “is no evidence of data theft,” but has not provided any further details on the purpose or scope of the malware. The drug maker did say, however, that the software is the work of a hacking group known as Winnti.

According to Kaspersky Labs (.PDF), back in 2013, Winnti’s objective was to steal the “source code of online game projects as well as digital certificates of legitimate software vendors.”

See also: Home DNA kit company asks you to upload your family tree for the FBI

The stolen certificates were later found to be in use in order to sign malware used by other cyberthreat groups to target political activists spanning across South Korea and Tibet, as well as the ethnic minority Uyghur group located in China.

It appears that Winnti then expanded its horizons towards industrial espionage and has since been connected to a cyberattack against German tech giant ThyssenKrupp, which took place in 2016.

TechRepublic: What is the Dark Web, and why is it so bad if your information is there?

Dubbed a “professional” attack by ThyssenKrupp, the hacker’s aim was to steal technological information and valuable intellectual property from the company’s industrial unit.

401TRG believes the group is related to Chinese espionage efforts and attacks have systematically taken place against valuable targets between 2009 and 2018.

Phishing campaigns are the typical attack vector, followed by infection with custom malware or public tools such as Cobalt strike. 

Previous and related coverage

Credit: Source link

Previous Post

This is how enterprises should implement artificial intelligence, machine learning, IT News, ET CIO

Next Post

Department of Energy Announces $20 Million to Develop Artificial Intelligence and Machine Learning Tools

Related Posts

Cybersecurity: Victims are spotting cyber attacks much more quickly – but there’s a catch
Internet Security

Cybersecurity: Victims are spotting cyber attacks much more quickly – but there’s a catch

April 14, 2021
Samsung’s new Galaxy Quantum 2 uses quantum cryptography to secure apps
Internet Security

Samsung’s new Galaxy Quantum 2 uses quantum cryptography to secure apps

April 14, 2021
Brave browser disables Google’s FLoC tracking system
Internet Security

Brave browser disables Google’s FLoC tracking system

April 13, 2021
These new vulnerabilities put millions of IoT devices at risk, so patch now
Internet Security

These new vulnerabilities put millions of IoT devices at risk, so patch now

April 13, 2021
Apple looking to close the gap between web and app privacy
Internet Security

Who do I pay to get the ‘phone’ removed from my iPhone?

April 13, 2021
Next Post
Department of Energy Announces $20 Million to Develop Artificial Intelligence and Machine Learning Tools

Department of Energy Announces $20 Million to Develop Artificial Intelligence and Machine Learning Tools

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

ML Ops and the Promise of Machine Learning at Scale
Machine Learning

ML Ops and the Promise of Machine Learning at Scale

April 14, 2021
How to Enter Your First Zindi Competition | by Davis David
Neural Networks

How to Enter Your First Zindi Competition | by Davis David

April 14, 2021
B2B Content Marketing – Facing Challenges
Marketing Technology

B2B Content Marketing – Facing Challenges

April 14, 2021
Five Top Quality APIs
Learn to Code

Five Top Quality APIs

April 14, 2021
Cybersecurity: Victims are spotting cyber attacks much more quickly – but there’s a catch
Internet Security

Cybersecurity: Victims are spotting cyber attacks much more quickly – but there’s a catch

April 14, 2021
Detecting the “Next” SolarWinds-Style Cyber Attack
Internet Privacy

Detecting the “Next” SolarWinds-Style Cyber Attack

April 14, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • ML Ops and the Promise of Machine Learning at Scale April 14, 2021
  • How to Enter Your First Zindi Competition | by Davis David April 14, 2021
  • B2B Content Marketing – Facing Challenges April 14, 2021
  • Five Top Quality APIs April 14, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates