Array ( [id] => 74858 [title] => Hackers behind Gloucester City Council cyberattack 'highly likely' linked to Russian intelligence services, GCHQ claims [router] => hackers-behind-gloucester-city-council-cyberattack-highly-likely-linked-to-russian-intelligence-services-gchq-claims [subtitle] => [description] => [prop] => [tag] => Cyberconflict and warfare,Cybercrime [cover] => /web/uploads/image/20230811/2O0TLc10ShP345819O6w1DpuDNf7PQ01.webp [columnid] => 234 [columnname] => News [iscomment] => 0 [sort] => 0 [source] => [author] => [goods_price] => 0.00 [goods_sellnum] => 0 [goods_num] => 0 [contentid] => 94061 [fieldid] => 0 [views] => 264 [cetime] => 1686572580 [uptime] => 1699849666 [seo_title] => Hackers behind Gloucester City Council cyberattack 'highly likely' linked to Russian intelligence services, GCHQ claims [seo_keyword] => Cyberconflict and warfare,Cybercrime [seo_description] => The City Council suffered a cyberttack in December 2021, by the hacker group Conti, which has since been disbanded. [pushopts] => {"isgglj":1,"isyhlj":1,"isbinglj":1} [revar] => [columns] => Array ( [id] => 234 [title] => News [subtitle] => [description] => [callidentity] => [cover] => [pcisshow] => 1 [mobisshow] => 1 [parentid] => 68 [topid] => 9 [sort] => 0 [router] => news [linkurl] => [prop] => 2 [docopt] => 1 [showcount] => 0 [tpl_pc_cover] => [tpl_pc_list] => [tpl_pc_content] => [tpl_mob_cover] => [tpl_mob_list] => [tpl_mob_content] => [seo_title] => [seo_description] => [seo_keyword] => [pushopts] => {"isbdlj":0} [visible] => 0 [contentid] => 0 [fieldid] => 0 [multiimgid] => 0 [isdis] => 0 [is_urlformat] => 1 [cetime] => 0 [uptime] => 1722570848 [lang_id] => en ) [columnrouter] => /support/events-news/news [content] =>
GCHQ, the UK's intelligence, security and cyber agency, says it is highly likely that the hackers behind the cyber attack on Gloucester City Council had links to Putin's intelligence services. The council was attacked in December 2021 by the hacker group Conti, which has since been disbanded. Gloucester City Council had to rebuild all of its computer servers after a ransomware cyberattack severely disrupted its ability to deliver services.
GCHQ's National Cyber Security Centre (NCSC) assessed that the Conti group was almost certainly motivated by financial gain, choosing their targets based on the value they thought they might be able to extort. It is highly likely that key members of the group had links to the Russian intelligence services.
The Group's decision to target certain organisations, such as the International Olympic Committee, almost certainly reflects Russian state-sponsored objectives. The group is likely to be an outgrowth of earlier organised cybercrime groups and probably has extensive links with other cybercrime groups.
Although the group behind Conti was disbanded in May 2022, reports suggest members of the group are still involved in new ransomware strains.
[field] => Array ( [revar] => ) )GCHQ, the UK's intelligence, security and cyber agency, says it is highly likely that the hackers behind the cyber attack on Gloucester City Council had links to Putin's intelligence services. The council was attacked in December 2021 by the hacker group Conti, which has since been disbanded. Gloucester City Council had to rebuild all of its computer servers after a ransomware cyberattack severely disrupted its ability to deliver services.
GCHQ's National Cyber Security Centre (NCSC) assessed that the Conti group was almost certainly motivated by financial gain, choosing their targets based on the value they thought they might be able to extort. It is highly likely that key members of the group had links to the Russian intelligence services.
The Group's decision to target certain organisations, such as the International Olympic Committee, almost certainly reflects Russian state-sponsored objectives. The group is likely to be an outgrowth of earlier organised cybercrime groups and probably has extensive links with other cybercrime groups.
Although the group behind Conti was disbanded in May 2022, reports suggest members of the group are still involved in new ransomware strains.
ChildFund India has signed a Memorandum of Understanding (MOU) with the Karnataka State Commission for Protection of Child Rights (KSCPCR) to safeguard children from online threats and to promote a safer digital environment. The following effort will promote awareness through workshops and seminars, allowing the entire community to spot possible threats in the digital realm more quickly.
This significant step will improve the government's efforts to create a better and more secure digital future for children in Karnataka since children spend considerable time online, exposing them to threats such as dangerous material, cyberbullying, online abuse, and exploitation.
Shri. K. Naganna Gowda, Honorable Chairman of KSCPCR, emphasised the need to preserve children's rights because of the rising frequency of sexual abuse and exploitation online. He also believes that this partnership is essential because they would work together to establish safer online platforms for children and ensure that abusers are brought to justice. Mr Rajesh Ranjan Singh, a member of the board of ChildFund India, also expressed his appreciation for the collaboration.
[field] => Array ( [revar] => ) ) Array ( [id] => 74861 [title] => Senior US cybersecurity official warns of Chinese hackers targeting US critical infrastructure in potential conflict [router] => senior-us-cybersecurity-official-warns-of-chinese-hackers-targeting-us-critical-infrastructure-in-potential-conflict [subtitle] => [description] => [prop] => [tag] => Critical infrastructure,Cyberconflict and warfare [cover] => /web/uploads/image/20230811/2O0TLc10ShP345819O6w1DpuDNf7PQ01.webp [columnid] => 234 [columnname] => News [iscomment] => 0 [sort] => 0 [source] => [author] => [goods_price] => 0.00 [goods_sellnum] => 0 [goods_num] => 0 [contentid] => 94064 [fieldid] => 0 [views] => 261 [cetime] => 1686572580 [uptime] => 1699849666 [seo_title] => Senior US cybersecurity official warns of Chinese hackers targeting US critical infrastructure in potential conflict [seo_keyword] => Critical infrastructure,Cyberconflict and warfare [seo_description] => Cybersecurity and Infrastructure Security Agency Director Jen Easterly also underlined that defense measures must be undertaken, but may not be enough. [pushopts] => {"isgglj":1,"isyhlj":1,"isbinglj":1} [revar] => [columns] => Array ( [id] => 234 [title] => News [subtitle] => [description] => [callidentity] => [cover] => [pcisshow] => 1 [mobisshow] => 1 [parentid] => 68 [topid] => 9 [sort] => 0 [router] => news [linkurl] => [prop] => 2 [docopt] => 1 [showcount] => 0 [tpl_pc_cover] => [tpl_pc_list] => [tpl_pc_content] => [tpl_mob_cover] => [tpl_mob_list] => [tpl_mob_content] => [seo_title] => [seo_description] => [seo_keyword] => [pushopts] => {"isbdlj":0} [visible] => 0 [contentid] => 0 [fieldid] => 0 [multiimgid] => 0 [isdis] => 0 [is_urlformat] => 1 [cetime] => 0 [uptime] => 1722570848 [lang_id] => en ) [columnrouter] => /support/events-news/news [content] =>During a recent event at the Aspen Institute, US Cybersecurity and Infrastructure Security Agency Director Jen Easterly highlighted the increasing risk of Chinese hackers targeting critical American infrastructure, including pipelines and railways, in the event of a potential conflict with the USA. Easterly expressed her concerns about Beijing's substantial investments in developing the capability to sabotage US infrastructure. She emphasised the need to be prepared, build resilience, and focus on countering this real threat. Easterly also cautioned that defence measures might not be sufficient, as Chinese state actors possess formidable resources and capabilities, making it challenging to prevent disruptions.
Reuters reports that the Chinese Embassy in Washington has not responded to requests for a reaction regarding this warning. Easterly's remarks further underscore a prior warning issued by the US intelligence community, which stated in its annual threat assessment that Beijing would likely consider aggressive cyber operations against critical infrastructure and military targets within the USA if they believed a major confrontation was imminent.
[field] => Array ( [revar] => ) )