I’m not following. VBScript seems like the right tool. Why would they use something else? They’re generally light years beyond US defense capabilities so there’s a real dearth of suffering on their side.
Now if the joke is that they’re suffering because they have to use VBScript, I can get behind that
WScript.Echo "Just saying if I was invited onto a team intent on wreaking havoc upon our enemies, I would probably quit after 100 lines of calling windows apis in VBScript" & vbNewLine
Meanwhile if you load Baofeng software from a few years ago antivirus software today will ping out. It never used to ping out, such is the nature of zero days.
Meanwhile Israel has been selling weapons grade hacking technology for decades, they've been directly linked to the assassination of Jamal Khashoggi as well as the Mexican cartels.
Meanwhile Argentina happens to be the hub for zero day exploits, with a bunch of hackers inventing their own shit and selling directly to state actors or whoever will pay.
The only way you can remain secure is to regularly install a fresh OS. Change my mind.
Sure. Even regularly installing a new OS doesn't necessarily keep you secure if someone wanted to discreetly install malware on your device. In addition to firmware-level rootkits that re-install themselves on fresh OSs (even platform-agnostic ones), it's possible that someone might interdict whatever hardware is bought and implant it with additional small hardware that compromises it in some way.
Your incorrect assumption is that only cartels and nation states are using said software. Weaponized versions of this stuff are making their way to consumer levels where you just need to piss off the wrong person online. I don’t worry about the US government targeting me beyond normal levels; I worry about employers deploying spyware.
It absolutely works. My company spends a ton of time and resources in an attempt to prevent folks from plugging in random USB drives.
Classes to user restrictions.
Amazing how some folk are.
Also, would this be the same group that hacked the Socchi Winter Olympics, soon after Russia was banned? The one that the US indicted and labelled as a "petulant child"?
Maybe the attribution isn't 100% (as would be expected with how the attacker masked themselves using techniques from every major nation state hacker) but Russian hackers were indeed indicted for it.
A group of Russian-state hackers known for almost exclusively targeting Ukranian entities has branched out in recent months either accidentally or purposely by allowing USB-based espionage malware to infect a variety of organizations in other countries.
“Gamaredon continues to focus on [a] wide variety [of] Ukrainian targets, but due to the nature of the USB worm, we see indications of possible infection in various countries like USA, Vietnam, Chile, Poland and Germany,” Check Point researchers reported recently.
The image above, tracking submissions of LitterDrifter to the Alphabet-owned VirusTotal service, indicates that the Gamaredon malware may be infecting targets well outside the borders of Ukraine.
The data suggests that the number of infections in the US, Vietnam, Chile, Poland, and Germany combined may be roughly half of those hitting organizations inside Ukraine.
The core essence of the Spreader module lies in recursively accessing subfolders in each drive and creating LNK decoy shortcuts, alongside a hidden copy of the “trash.dll” file.
“Comprised of two primary components—-a spreading module and a C2 module—it’s clear that LitterDrifter was designed to support a large-scale collection operation,” Check Point researchers wrote.
The original article contains 744 words, the summary contains 185 words. Saved 75%. I'm a bot and I'm open source!