<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Cyber &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/cyber/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sat, 19 Jun 2021 12:27:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Ministry of Public Security investigates cyber attack on Voice of Vietnam Online Newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-voice-of-vietnam-online-newspaper/</link>
		
		<dc:creator><![CDATA[Ninh Cơ]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 12:27:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[A05]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[Negativity]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Voice]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[VOV VN]]></category>
		<category><![CDATA[VOV VN Electronic Newspaper]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-voice-of-vietnam-online-newspaper/</guid>

					<description><![CDATA[To clarify the reason why the website of Voice of Vietnam Radio and its social media platform cannot be accessed, the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) has investigated. . On the morning of June 14, discussing with the press, Mr. Ngo Thieu Phong, Editor-in-Chief Online newspaper Voice of Vietnam [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>To clarify the reason why the website of Voice of Vietnam Radio and its social media platform cannot be accessed, the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) has investigated. .</strong><br />
<span id="more-25501"></span> On the morning of June 14, discussing with the press, Mr. Ngo Thieu Phong, Editor-in-Chief <strong> Online newspaper Voice of Vietnam</strong> (<strong> Vov</strong> .vn), said it had sent an official letter requesting the Ministry of Public Security to investigate and clarify cyber attacks against the Vov.vn website and its social networking platform.</p>
<p> At noon on the same day, discuss with Newspaper <em> Workers,</em> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (A05 &#8211; Ministry of Public Security) said that the unit has received an official dispatch from the Voice of Vietnam Electronic Newspaper. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_15_39179349/2c801c011343fa1da352.jpg" width="625" height="416"> <em> Website VOV Newspaper is not accessible at the time &#8211; Photo: Screenshot</em> Like Newspaper <em> Laborer </em> It was reported that from the evening of June 12, the access to Vov.vn electronic newspaper had difficulties, the transmission line was slow. By 12 o&#8217;clock on June 13, readers could not access the Vov.vn link at all. According to the technical department of the Voice of Vietnam Electronic Newspaper, this is the result of a denial of service (DDoS) attack that overflows the bandwidth, making access to the newspaper crippled. At the same time, the fanpage of this newspaper also received tens of thousands of negative and offensive comments. The agency has been in contact with Google and Facebook to handle the related issues. A representative of the Voice of Vietnam Electronic Newspaper also said that the attack on the newspaper affected the operation of the editorial office, affecting readers&#8217; access to information. The Voice of Vietnam has sent a dispatch to the relevant authorities to request a settlement, in which it is requested that the Ministry of Public Security search for the perpetrators of the online newspaper attack. Online newspaper Voice of Vietnam (Vov.vn) has had many technical solutions to fix the problem and access normally from the evening of June 13.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25501</post-id>	</item>
		<item>
		<title>Ministry of Public Security investigates cyber attack on VOV online newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</link>
		
		<dc:creator><![CDATA[Hoàng Lam]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 03:49:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[Documentary]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Overload]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Rescue]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[VNCERT]]></category>
		<category><![CDATA[VOV]]></category>
		<category><![CDATA[VOV Electronic Newspaper]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[Zing]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</guid>

					<description><![CDATA[Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate. On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate.</strong><br />
<span id="more-25338"></span> On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry of Public Security to investigate and clarify cyber attacks targeting the VOV website and the platform. the agency&#8217;s social media platform.</p>
<p> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) also confirmed that he had received an official letter from VOV. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. In addition, the Cyber ​​Emergency Response Center (VNCERT) and network operators also participate in supporting and solving problems. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39178611/9961ece8e3aa0af453bb.jpg" width="625" height="416"> <em> At the time of the cyber attack, readers could not access the website of VOV newspaper. Photo: VOV.</em> Exchange with <em> Zing</em> , a representative of VOV&#8217;s technical department said that cyberattacks on the agency&#8217;s resource system began on June 12. At about 13:00 on June 13, the bandwidth system was overloaded, suspected of being attacked by a denial of service (DDoS). On the morning of June 14, the administrator continued to record a new attack that caused the bandwidth of the system and the website to be overloaded. This is the first time this newspaper has been attacked by DDoS. In addition to the above attacks, the VOV side also believes that the person behind the attacks also discredits the stars of the VOV electronic newspaper on Google or repeatedly makes offensive and threatening comments on the newspaper&#8217;s fanpage. The VOV side is reviewing and detecting malicious code in the system, and at the same time limiting the consequences of cyberattacks, calculating damage to coordinate with authorities to solve.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25338</post-id>	</item>
		<item>
		<title>Large-scale cyber attack &#8211; a new trend of hackers</title>
		<link>https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</link>
		
		<dc:creator><![CDATA[DUY QUANG]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 05:06:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ferry Terminal]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[JBS SA]]></category>
		<category><![CDATA[largescale]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[Non governmental organizations]]></category>
		<category><![CDATA[Petroleum pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[Rare]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[State of Massachusetts]]></category>
		<category><![CDATA[suffered]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Trend]]></category>
		<guid isPermaLink="false">https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</guid>

					<description><![CDATA[In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers. Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters) In an age where [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers.</strong><br />
<span id="more-24847"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_194_39169587/fc73c274cc3625687c27.jpg" width="625" height="427"> </p>
<p> <em> Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters)</em> In an age where technology is creeping into every aspect of life, the term cyberattack is not new. Many people think simply that a cyber attack is an attempt by a hacker to steal data or money by infiltrating a computer network, databases, network infrastructure, websites, and devices. individual or organization. But now, hackers have found a way to make a lot of money illegally by attacking physical infrastructure targets, disrupting essential services, affecting not only to a person, a company that can spread to an entire city, even a country. <strong> Cyberattacks on the rise</strong> Over the past time, the US has continuously suffered from ransomware attacks targeting large companies, non-governmental organizations and government agencies. Most recently, on June 2, a ferry terminal operator service in the US state of Massachusetts became the target of a cyber attack, partially disrupting the ferry service payment system. Previously, hackers attacked the world&#8217;s leading meat processing group JBS SA, a branch in the US. In early May, the largest US oil pipeline operator Colonial Pipeline was also attacked by ransomware and forced to shut down some systems, disrupting supplies and pushing gasoline prices to record highs. green. Not only the US, the targets of hackers are very diverse. According to data from cybersecurity company BlackFog, from the beginning of 2021 to the present, US organizations and businesses have suffered 52 ransomware attacks, three times higher than the second-ranked country, the UK (16 (16). competition), followed by France (7), Canada (7), Australia (4), the Netherlands (4) and India (3). The rest of the world suffered only 39 attacks by hackers. <strong> Danger wave</strong> According to CNN, hacker groups have found that attacking critical service infrastructure can easily make them more money, in less time. These types of attacks have the potential to cause chaos in life, which can lead to product scarcity, push prices higher&#8230; The bigger the disruption, the quicker the hacked companies pay the hacker to fix the problem soon. The US Cybersecurity and Infrastructure Agency (CISA) has listed 16 industries as critical infrastructure sectors, including energy, healthcare, financial services, water, etc. Attacks, disruption of these industries can have a dramatic impact, undermining the US economy and security. More dangerously, most companies in this industry do not consider themselves technology-focused companies, leaving the operating system defenseless against increasingly sophisticated attacks by hackers. In addition, it is no coincidence that cyber attacks have increased sharply in the context of the raging Covid-19 pandemic. Millions of people move to remote work, including employees with access to critical infrastructure, while ransomware is deployed simply by enticing victims to click a link in an email. . Eric Cole, a former cybersecurity official under President Barack Obama, said that in order to promote automation, the internal networks of critical infrastructures are now networked and make the risk more risky. higher attack. In particular, hospital systems and healthcare providers are often targeted because they are busy dealing with Covid-19 and have little time to update their defenses. In response to this new wave of danger, on June 3, the White House sent an open letter, asking essential service companies to &#8220;consider ransomware as a threat to our core business.&#8221; themselves, rather than simply risk data theft.” US Commerce Secretary Gina Raimondo on June 6 asked the private sector of the country to be vigilant against the increasing wave of cyber attacks, and said that the threat is always present and even present. may become more severe. In order to protect your safety as well as your wallet, according to <em> CNN</em> , not only the US, companies, organizations and agencies also need to quickly close potential vulnerabilities in the system, update software and ensure that the most important functions are &#8220;immune&#8221; from damage. network attacks. Individuals also need to be cautious and alert before clicking on any link on the internet.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24847</post-id>	</item>
		<item>
		<title>Meat producer JBS pays ransom after hacker attack The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States.</title>
		<link>https://en.spress.net/meat-producer-jbs-pays-ransom-after-hacker-attack-the-worlds-largest-meat-company-jbs-has-apparently-paid-a-ransom-of-11-million-after-a-cyber-attack-by-hackers-it-was-another-incident-in-a-serie/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 22:06:06 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Apparently]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cases]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker attack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[JBS]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[meat]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[paid]]></category>
		<category><![CDATA[pays]]></category>
		<category><![CDATA[Producer]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Series]]></category>
		<category><![CDATA[States]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[worlds]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=24057</guid>

					<description><![CDATA[After a hacker attack Meat producer JBS pays ransom Status: 10.06.2021 7:13 a.m. The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States. The US subsidiary of the Brazilian [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/usa-jbs-fleischproduzent-101https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Logo of the Brazilian meat producer JBS on a factory in the USA | AFP" title="Logo of the Brazilian meat producer JBS on a factory in the USA | AFP"></p>
<h1> After a hacker attack Meat producer JBS pays ransom </h1>
<p>Status: 10.06.2021 7:13 a.m. </p>
<p> <strong> The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States. </strong> The US subsidiary of the Brazilian meat processor JBS paid the equivalent of eleven million dollars in ransom after a hacker attack. The payment was made to prevent further disruption by the hackers and to restore the smooth operation of the affected locations, said the Dallas-based company. According to the US media, the payment was made in Bitcoin. According to the US government, the company had received a ransom note from a criminal organization likely based in Russia. The attack paralyzed JBS production in Australia and affected Canada and the United States.</p>
<h2> &#8220;A difficult decision&#8221;</h2>
<p>&#8220;This was a very difficult decision for our company and for me personally,&#8221; explained Managing Director Andre Nogueira. &#8220;However, we felt that this decision had to be made in order to avoid any potential risk to our customers.&#8221; The investigations are still ongoing, but preliminary results have suggested &#8220;that no company, customer or employee data has been compromised.&#8221;</p>
<h2> US investigators suspect Russia is behind it</h2>
<p>US President Joe Biden said last week that investigators had linked Russia to the JBS case. &#8220;JBS USA was in constant contact with government officials throughout the incident,&#8221; the company said. In the USA, the state and business are currently fighting a series of attacks with blackmail software known as &#8220;ransomware&#8221;. The data of the attacked systems are encrypted. The hackers demand cash payments in cryptocurrency so that they can unlock access again and not publish the data.</p>
<h2> Ransom payment in Bitcoin</h2>
<p>The US utility company was also last month <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXIOw7DIAwA0LuwOzRrzsJiEfNRjUHGiKHq3duM733ccpcrZmNewQe_9z4MM80ZC67jpn9VtUfJgl9ipEKlkQQfO3epyDDqIK5CwJ0mZeIbCsY3KaBkrSmBoszeNirB-TqPYo3d9wc5S6jTfAAAAA.." class="textlink" title="Link zu: Colonial Pipeline räumt Lösegeld-Zahlung an Hacker ein" target="_blank" rel="nofollow noopener"> Colonial pipeline</a> The victim of a hacker attack with a blackmail Trojan that temporarily shut down the entire pipeline network. The US Federal Police FBI blames a hacker group called &#8220;Darkside&#8221; for the attack and later tracked down the ransom of 75 Bitcoin that Colonial had paid &#8211; at the time it was worth $ 4.4 million.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24057</post-id>	</item>
		<item>
		<title>Cyber ​​chanting!Electronic wooden fish with RGB, can knock out &#8220;Prajna Heart Sutra&#8221;, netizen: want to buy</title>
		<link>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bchantingelectronic-wooden-fish-with-rgb-can-knock-out-prajna-heart-sutra-netizen-want-to-buy/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 05:06:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[buy]]></category>
		<category><![CDATA[chantingElectronic]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Fish]]></category>
		<category><![CDATA[Heart]]></category>
		<category><![CDATA[knock]]></category>
		<category><![CDATA[Netizen]]></category>
		<category><![CDATA[Prajna]]></category>
		<category><![CDATA[RGB]]></category>
		<category><![CDATA[Sutra]]></category>
		<category><![CDATA[Wooden]]></category>
		<guid isPermaLink="false">https://en.spress.net/cyber-%e2%80%8b%e2%80%8bchantingelectronic-wooden-fish-with-rgb-can-knock-out-prajna-heart-sutra-netizen-want-to-buy/</guid>

					<description><![CDATA[Jin Lei from the concave temple Qubit Report &#124; Public Account QbitAI It is said that everything can be cyberpunk. It&#8217;s just that he never expected that Muyu hadn&#8217;t even let it go. &#8220;Bring your own&#8221; cyberpunk RGB, the atmosphere is firmly grasped. Knock on the wooden fish, you can actually output the &#8220;Prajna Heart [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Jin Lei from the concave temple</p>
<p> Qubit Report | Public Account QbitAI It is said that everything can be cyberpunk. It&#8217;s just that he never expected that Muyu hadn&#8217;t even let it go. <img fifu-featured="1" decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777226/1000"> &#8220;Bring your own&#8221; cyberpunk RGB, the atmosphere is firmly grasped. <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_match/0/13548781890/0"> Knock on the wooden fish, you can actually output the &#8220;Prajna Heart Sutra&#8221;! <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_match/0/13548783066/0"> Sri Lanka One! ! ! This wave of operations is really fresh enough, and netizens exclaimed again and again: <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777211/1000"> Some netizens even joked that this kind of practice takes one year or two years. <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777212/1000"> Of course, there are also many netizens who call &#8220;want to buy&#8221;! Cyber ​​Muyu transformed by Japanese netizens The creator of such cyberpunk muyu is a netizen named ukokq. He posted the video of &#8220;Sybo Muyu&#8221; on the Internet, and it attracted a lot of attention in just a few days. <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777225/1000"> Although many netizens are holding a curious mentality, look at this &#8220;cyber muyu&#8221;. But behind the idea that ukokq was born, there is a story. When ukokq was scanning social networking sites, he saw a post like this: <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777217/1000"> Another netizen mistakenly believed that &#8220;USB Muyu&#8221; was sold on the Internet, but when he took a closer look, it was a label&#8230; (Come and feel this feel) <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777238/1000"> Although it was an oolong, ukokq felt that &#8220;this idea should be retained.&#8221; And about a month ago, ukokq&#8217;s grandmother passed away. During his death day, he chanted in front of the Buddha every day and became interested in the Prajna Heart Sutra, which he rarely touches. From this, ukokq gave birth to an interesting idea: If I can express the Prajna Heart Sutra in language or text through a USB wooden fish, will it make me more familiar with the more serious religion in my impression? So let&#8217;s do it! Many people will think that this is the age, why do you still get Type-a? <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777219/1000"> In fact, this was done deliberately by ukokq, because he wanted to retain the most authentic look of the wooden fish that inspired him in the first place. The shape of the Type-a mouth is the closest to the label on the back of the product Muyu: I strongly believe that this element cannot be thrown away! So he bought the Type-a mouth and thread from a hundred-yen shop, then used a carving knife to grind a hole in the back of the wooden fish and embedded it in. <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777252/1000"> As for why a color LED is put in the &#8220;mouth&#8221; of Muyu, ukokq&#8217;s explanation is this: Since my original intention was to &#8220;spit out&#8221; worries without knocking the wooden fish, it would be a good way to express worldly desires if we could create colorful light. But the biggest difficulty is programming, because ukokq is difficult to detect the time each time Muyu is hit. So, in order to study what kind of physical changes happened inside Muyu, he first installed a microphone and carried out data measurements. However, due to the influence of other noises such as the nearby power supply, it is still impossible to obtain good results. Therefore, ukokq additionally installed an acceleration sensor, and achieved higher-precision detection through simultaneous measurement with a microphone. &#8230; In the end, ukokq created this one Cyber ​​Muyu. There are also Cyber ​​Buddha beads&#8230; I saw a comment from a netizen who said that he had seen the &#8220;Cyber ​​Buddha Bead&#8221; before. So curious to search. <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13548777223/1000"> △Source: Hardcore disassembly There really is&#8230; The kind with counts when it comes to the disk&#8230;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23437</post-id>	</item>
		<item>
		<title>Biden declares state of emergency after serious cyber attack</title>
		<link>https://en.spress.net/biden-declares-state-of-emergency-after-serious-cyber-attack/</link>
		
		<dc:creator><![CDATA[Thanh Hảo]]></dc:creator>
		<pubDate>Fri, 21 May 2021 06:35:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Biden]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[declares]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipe]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Planes]]></category>
		<category><![CDATA[Promulgate]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[State]]></category>
		<category><![CDATA[State of emergency]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/biden-declares-state-of-emergency-after-serious-cyber-attack/</guid>

					<description><![CDATA[The US government has just declared a state of emergency after the largest fuel pipeline in the country was attacked by malicious code. Colonial Pipeline transports 2.5 million barrels of fuel a day – accounting for 45% of the East Coast&#8217;s supplies of diesel, gasoline and jet fuel. This arterial oil route was completely paralyzed [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The US government has just declared a state of emergency after the largest fuel pipeline in the country was attacked by malicious code.</strong><br />
<span id="more-16831"></span> Colonial Pipeline transports 2.5 million barrels of fuel a day – accounting for 45% of the East Coast&#8217;s supplies of diesel, gasoline and jet fuel. This arterial oil route was completely paralyzed after being attacked by a cyberattack on May 7 and is still in the process of restoring operation.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_23_38787518/84535b29466baf35f67a.jpg" width="625" height="351"> <em> Colonial Pipeline transports 2.5 million barrels of fuel per day. Photo: Colonial Pipeline</em> According to the BBC, the state of emergency allows fuel to be transported by road. The news agency quoted experts as saying that fuel prices could increase by 2-3% on May 10, but the real impact would be much worse if this situation continued for longer. Many sources confirm that the malicious code attack is caused by a cybercriminal gang called DarkSide, which infiltrated Colonial&#8217;s system on May 6 and stole nearly 100GB of data as a &#8220;hostage&#8221;. After taking over the data, the group of hackers locked this data on some computers and servers, demanded a ransom and warned that if they did not receive the money, they would release the data on the internet. Colonial is working with law enforcement, cybersecurity and the US Department of Energy to restore service. On the evening of May 9, the company announced that although the four main pipelines continued to stop, some smaller lines between the terminals and delivery points were still operating. &#8220;Immediately after learning of the attack, Colonial proactively shut down certain systems to stop the threat. These actions temporarily halted all pipeline operations and affected some systems. our information technology system, which we are actively working on restoring,&#8221; said Colonial. &#8220;We are in the process of restoring service to other pipelines and will bring the entire system back online when we believe it is safe and in full compliance with all federal regulations. &#8220;. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_23_38787518/ff0927733a31d36f8a20.jpg" width="625" height="414"> <em> The DarkSide message appears on the victim&#8217;s computer screen. </em> DarkSide isn&#8217;t the largest cybercriminal gang in the field, but the incident demonstrates the heightened risk that malware poses to critical U.S. industrial infrastructure, not just businesses. This gang lists all types of stolen data and sends the victim the URL of the &#8220;personal leak site&#8221;, where the data is pre-loaded waiting for automatic publication, if the company or organization does not. payment before the deadline. DarkSide claims to provide proof of the data obtained, and is ready to delete all such data from the victim&#8217;s network. According to Digital Shadows, a London-based cybersecurity company that tracks global cybercrime groups to help businesses limit their risk of being hacked, DarkSide acts like a company.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16831</post-id>	</item>
		<item>
		<title>US fuel supply crisis after cyber attack on Colonial Pipeline</title>
		<link>https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</link>
		
		<dc:creator><![CDATA[Lê Quân]]></dc:creator>
		<pubDate>Tue, 18 May 2021 12:18:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The gas station]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</guid>

					<description><![CDATA[Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago. Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago.</strong><br />
<span id="more-15836"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_72_38808364/c96b64f97abb93e5caaa.jpg" width="625" height="416"> </p>
<p> Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel season. Colonial Pipeline said the company is trying to resume operations this weekend after its fuel pipeline system was paralyzed since May 7 after being hit by a cyber attack. The shutdown of the Colonial Pipeline&#8217;s fuel pipeline system shut down nearly half of the US East Coast&#8217;s fuel supply. The US Energy Administration on May 10 called for mandatory cybersecurity standards for fuel pipeline operators and operators. &#8220;Incentivizing the voluntary application of standards to pipelines is inadequate,&#8221; said US Federal Energy Regulatory Commission Chairman Richard Glick. The US Federal Bureau of Investigation (FBI) has accused a cybercriminal group called &#8220;DarkSide&#8221; of causing a ransomware attack on Colonial Pipeline. Reuters news agency quoted cybersecurity experts as saying that DarkSide is based in Russia or Eastern Europe, so the gang usually avoids targeting computers that use the languages ​​of the former Soviet republics. However, US President Joe Biden on May 10 expressed he did not believe that the Russian government was behind the cyber attack on the Colonial Pipeline. &#8220;So far there is no evidence based on our intelligence that Russia is involved,&#8221; Biden said. A statement titled DarkSide group on May 10 stated: &#8220;Our goal is to make money and not create problems for society.&#8221; Ransomware attack is a type of malware designed to disable computers by encrypting data and blackmailing victims if they want to regain system access. It is not clear what price the hackers offered for Colonial Pipeline, and the company has not commented on the matter. Fuel demand in the southeastern United States has increased sharply in recent days as consumers fear fuel shortages. The Southeastern region of the United States has long depended mainly on the supply of fuel flowing through the Colonial Pipeline&#8217;s pipeline system. The average national gasoline price rose 6 cents to $2.96 a gallon last week, the highest since May 2018 and close to a peak set in 2014, the American Automobile Association said. also warned of speculation about fuel hoarding as the supply continued to decrease. Katina Willey, a resident of Florida on May 10, said she had to go to 5 gas stations to buy gas. &#8220;Consumers have to wait in long lines at three of the five gas stations I go to,&#8221; added Katina Willey. Many other car owners said they were also looking to refill their gas tanks out of fear that the fuel situation could worsen. If the Colonial Pipeline&#8217;s pipeline disruptions continue, fuel suppliers may be able to force fuel transportation by trucks and trains to partially ease the fuel shortage. The US Department of Transportation on May 9 lifted travel restrictions for fuel truck drivers in 17 states affected by supply disruptions.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15836</post-id>	</item>
		<item>
		<title>The Problem Behind DarkSide&#8217;s Cyber ​​Attack</title>
		<link>https://en.spress.net/the-problem-behind-darksides-cyber-%e2%80%8b%e2%80%8battack/</link>
		
		<dc:creator><![CDATA[Trang Hoàng]]></dc:creator>
		<pubDate>Sat, 15 May 2021 10:10:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Colony]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[DarkSides]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Half]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The infrastructure]]></category>
		<category><![CDATA[The White House]]></category>
		<category><![CDATA[worry]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-problem-behind-darksides-cyber-%e2%80%8b%e2%80%8battack/</guid>

					<description><![CDATA[A cyberattack shuts down the largest energy infrastructure in the United States, the Colonial Pipeline system that supplies nearly half of the gasoline and diesel consumed by the East Coast. Illustration. https://tinhtexaydung.petrotimes.vn The attack resulted in higher gas prices, causing drivers to worry about shortages, while Colonial Pipeline Co. is working to restart the fuel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A cyberattack shuts down the largest energy infrastructure in the United States, the Colonial Pipeline system that supplies nearly half of the gasoline and diesel consumed by the East Coast.</strong><br />
<span id="more-14602"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_232_38828024/c76a29db3699dfc78688.jpg" width="625" height="362"> </p>
<p> <em> Illustration. https://tinhtexaydung.petrotimes.vn</em> The attack resulted in higher gas prices, causing drivers to worry about shortages, while Colonial Pipeline Co. is working to restart the fuel line. However, the price of gasoline sold at pumping stations is higher and the possibility of fuel supply shortage is inevitable. After all, it is only temporary and its effects will be fleeting. But there&#8217;s a bigger problem: this has to do with America&#8217;s energy infrastructure, exactly how secure is its cybersecurity infrastructure? Experts soon said: The team that carried out this attack consisted of seasoned hackers. Later, a ransomware group called DarkSide claimed responsibility for the attack, and the FBI also pointed to this group as the culprit. Here&#8217;s what DarkSide said in its statement: “We are apolitical, we do not engage in geopolitics, do not need to tie us to a defined government, and seek our motives. . Our goal is to make money, and not create any other problems for society. Starting today, we&#8217;re introducing censorship and vetting of each company that our partners want to encrypt to avoid future social consequences.&#8221; The statement was clearly intended to address allegations made that Russia was behind the attack, but even the White House was careful not to point the finger at Moscow. President Biden said there was no evidence that they were involved in the attack. That&#8217;s related to geopolitical motives, but the statement also suggests that DarkSide and its partners won&#8217;t stop, even if they don&#8217;t intentionally cause problems. “Colonial may be at risk of leaking consignor confidential data,” said Vicki Knott, CEO of CruxOCM, a provider of control room operations services to the oil and gas industry. https://tinhtexaydung.petrotimes.vn</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14602</post-id>	</item>
		<item>
		<title>The cyber attack stagnates the leading fuel pipeline in the United States</title>
		<link>https://en.spress.net/the-cyber-attack-stagnates-the-leading-fuel-pipeline-in-the-united-states/</link>
		
		<dc:creator><![CDATA[PHẠM TRUNG (Theo Reuters, AP)]]></dc:creator>
		<pubDate>Mon, 10 May 2021 05:31:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas tank]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[leading]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[stagnates]]></category>
		<category><![CDATA[States]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-cyber-attack-stagnates-the-leading-fuel-pipeline-in-the-united-states/</guid>

					<description><![CDATA[Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack. The Colonia company had to shut down the fuel pipeline after a cyber attack. Photo: AP. Leading American fuel pipeline company Colonial shut down its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack.</strong><br />
<span id="more-12826"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_14_38780441/8745c7efdaad33f36abc.jpg" width="625" height="416"> </p>
<p> <em> The Colonia company had to shut down the fuel pipeline after a cyber attack. Photo: AP.</em> Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack. Every day, the Colonial company ships 2.5 million barrels of gasoline, diesel, jet fuel and other products through a 850-kilometer pipeline connecting the eastern and southern coasts of the United States. The company has shut down systems to stop the threat after learning about the attack. According to sources, hackers are most likely a highly professional cybercrime group. And the malware used in the attack is ransomware. Ransomware is a type of malware designed to lock systems by encrypting data and taps money to regain access. This malware has become popular in the past 5 years. The Colonial Company has invited a third-party cybersecurity company to conduct an investigation and contacted law enforcement and other federal agencies to initiate an investigation. Colonial provided no further details or said how long their fuel lines would be closed. “Cyber ​​vulnerabilities have become a systemic issue,” said Ms. Algirde Pipikaite, Head of Network Strategies at the World Economic Forum&#8217;s Cyber ​​Security Center. Without measures to protect cybersecurity, attacks are occurring more often on industrial systems such as oil and gas pipelines or water treatment plants. In 2017, Colonial shut down its gas distillation and production lines during Hurricane Harvey that hit the Gulf Coast. That contributes to tight supply and price increases in gasoline in the US.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12826</post-id>	</item>
		<item>
		<title>Cyber ​​weapons &#8211; Weapons of immeasurable danger</title>
		<link>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/</link>
					<comments>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/#respond</comments>
		
		<dc:creator><![CDATA[CTV Lê Ngọc/VOV.VN (theo topwar.ru)]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 07:28:29 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[APCS]]></category>
		<category><![CDATA[Apple II]]></category>
		<category><![CDATA[BELL]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Computer virus]]></category>
		<category><![CDATA[Computer worm]]></category>
		<category><![CDATA[Container ship]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Evergreen Group]]></category>
		<category><![CDATA[Gas]]></category>
		<category><![CDATA[immeasurable]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Robert Morris]]></category>
		<category><![CDATA[Rootkit]]></category>
		<category><![CDATA[Stuxnet virus]]></category>
		<category><![CDATA[Suez Canal]]></category>
		<category><![CDATA[Tankers]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Weapons]]></category>
		<guid isPermaLink="false">https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/</guid>

					<description><![CDATA[The downside of digital is the risk of being attacked by cyber weapons &#8211; a problem that has been of particular interest to experts in many fields and the media recently. The modern world is being &#8220;digitized&#8221; at a rapid rate. Almost every service, every industry, from finance, industrial enterprises, &#8230; to the armed forces, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The downside of digital is the risk of being attacked by cyber weapons &#8211; a problem that has been of particular interest to experts in many fields and the media recently.</strong><br />
<span id="more-976"></span> </p>
<p>The modern world is being &#8220;digitized&#8221; at a rapid rate. Almost every service, every industry, from finance, industrial enterprises, &#8230; to the armed forces, is already networked at one level or another. In the &#8220;smart home&#8221; with TVs, refrigerators, vacuum cleaners, washing machines, microwave ovens &#8230;, and even smart light bulbs are becoming common; On the street, there were the first cars with autonomous driving systems.</p>
<p>Such devices are expected to make people&#8217;s lives easier, but certainly these technologies will also be applied in other areas as well. While digital systems and services make the quality of human life much better, in theory all digital systems can be hacked &#8211; which is already in practice. positive.</p>
<p><strong>Computer virus</strong></p>
<p>Theoretical basis for the development of the &#8220;computer virus&#8221; was formed almost simultaneously with the emergence of the computer itself in the mid-20th century. In 1961, engineers Viktor Vysotsky, Doug McIlroy and Robert Morris of the Room Bell&#8217;s telephone experiment had developed programs that could make copies of themselves &#8211; the first viruses. They are created in the form of a game that engineers call &#8220;Darwin&#8221;, the purpose of which is to send bots to friends to see which will destroy more of the competitors&#8217; programs and create more copies of itself to fill someone else&#8217;s computer.</p>
<p><img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/984065cd4f8fa6d1ff9e.jpg" width="625" height="397"></p>
<p><em>Cyber ​​weapons are said to be equally complex and are weapons of mass destruction; Source: topwar.ru</em></p>
<p>In 1981, Virus 1,2,3 and Elk Cloner appeared on Apple II personal computers; a few years later, the first anti-virus programs appeared. The word &#8220;computer virus&#8221; in fact includes many types of malware: worms, hijackers (rootkits), spyware, zombies, adware, virus blocking (winlock), Trojan viruses (trojans) and their combination. If the first viruses are often written for entertainment, over time they begin to be &#8220;commercialized&#8221; &#8211; to steal personal and financial data, disrupt device operations, encrypt the data. for the purpose of blackmail &#8230;</p>
<p>With the advent of electronic money, computer viruses received a new function &#8211; bringing the user&#8217;s computer &#8220;as a slave&#8221; to mining cryptocurrency, forming a huge network of computers. botnet infection (before that, botnet also existed, such as to send spam mail or DDoS attack). Opportunities like this cannot help but make the military and intelligence agencies in general with missions &#8211; steal something, destroy something &#8230;, care.</p>
<p><strong>Computer virus &#8211; a strategic weapon</strong></p>
<p>On June 17, 2010, for the first time in history, the win32 / Stuxnet virus &#8211; a computer worm that infects not only computers running the Microsoft Windows operating system, but also industrial systems that control the processes. automatic production, detected. This worm can be used as a means of gathering unauthorized data (spying) and sabotaging automated process control systems (APCS) of industrial enterprises, power plants, boilers, etc.</p>
<p>According to cybersecurity experts, this virus is the most complex software product, developed by a professional team of dozens of experts. In terms of complexity, it can be compared to a Tomahawk cruise missile, and is designed for cyber operations. The Stuxnet virus has damaged some uranium enrichment centrifuges, slowing down Iran&#8217;s nuclear program. Intelligence agencies of Israel and the US are suspected of developing the Stuxnet virus.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/5397a01a8a5863063a49.jpg" width="625" height="391"></p>
<p><em>Industrial facilities, infrastructure, services &#8230; all can be targets of cyber weapons; Source: topwar.ru</em></p>
<p>Later, other computer viruses were discovered, with a degree of complexity similar to that of win32 / Stuxnet (most suspected of being an Israeli / US product), such as: Duqu, designed to collect confidential data in a confidential manner; Wiper (late April 2012), destroyed all information on some of the servers of one of the largest oil companies in Iran and completely paralyzed its work for a few days; Flame, a spy virus, is believed to be developed specifically for attacks on Iran&#8217;s computer infrastructure (can identify mobile devices with Bluetooth module, track location, stealing confidential information and eavesdropping on conversations); Gauss, aimed at stealing financial information: e-mail, passwords, bank account data, cookies, as well as system configuration data; Maadi (suspected of Iran) &#8211; can collect information, remotely change computer parameters, record audio and transmit it to remote users &#8230;</p>
<p><strong>Application</strong></p>
<p>In the Middle East, for example, the largest producer of liquid natural gas (LNG), has an interest that seriously conflicts with the interests of another country. The Middle East country has a network of oil and gas pipelines, LNG production lines and a fleet of Q-Flex and Q-Max tankers designed to transport LNG and has a military base of the third country. three are on its territory. An armed attack directly on a Middle Eastern country could do more harm than good. Then, the solution might be the use of cyber weapons.</p>
<p>Modern oil and container ships are becoming more and more automated; No less automation is used in LNG plants. Therefore, specialized malware is loaded into the control systems of the Q-Flex and Q-Max tankers, or their LPG storage systems, theoretically permissible at a certain time ( or on an external command, if there is a network connection) creates an artificial accident that completely or partially destroys selected tanks / tanks. It is very likely that flaws in the LNG production process lead to neutralization, including potentially destroying the plant.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/2c2cdda1f7e31ebd47f2.jpg" width="625" height="359"></p>
<p><em>Cyber ​​weapons can easily have the same effects as the recent Suez Canal clogging; Source: topwar.ru</em></p>
<p>An explosion of an LNG carrier due to an accident at the entrance to a port or the failure of the LNG storage device can not only result in damage to the vessel itself, but also damage to coastal infrastructure. The goals could therefore be: undermine the energy supplier&#8217;s reputation, with the possibility of consumers reorienting the natural gas market of another country; increasing prices for world energy sources, helping to generate more revenue for the national budget; undermining political activity and interfering in the internal affairs of other countries in the region, due to a decrease in the financial capacity of the country in question.</p>
<p>Depending on the economic damage inflicted, a complete shift in ruling elites could occur, as well as a limited conflict between that state and its neighbors, who may want to take advantage of neighboring countries&#8217; weaknesses to change the balance of power in the region. The crux of this activity is secrecy, so that there is no direct blame without clear evidence. The United States has repeatedly been accused of conducting hostile operations against even its most staunchest allies.</p>
<p>Another option for using cyber weapons has been suggested by a recent incident. A giant ship &#8211; an oil tanker or a container ship, passing through a narrow canal, suddenly the control system gives out a series of commands to dramatically change the direction and speed of movement, resulting in the ship spinning break and completely block the channel. It can even be flipped, making it extremely time-consuming and costly to rescue it. The Evergreen Group&#8217;s container ship blocking the Suez Canal shows how congestion of shipping arteries affects the global economy. It is especially effective if such incidents occur simultaneously on several channels.</p>
<p>Or most recently, Iran is accusing Israel of terrorizing its Natanz nuclear base network &#8230; In the absence of a clear trace of the culprit, it would be extremely difficult to establish &#8211; anyone can also be blamed for this. Therefore, the development of industrial-scale cyber weapons is considered to be a top priority. Information technology along with nanotechnology and biotechnology are the cornerstones of dominance in the 21st century, but the development of cyber weapons is much cheaper than the development of promising nano biotechnology. and conventional modern weapons ./.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">976</post-id>	</item>
	</channel>
</rss>