The UN acknowledges that cyberattacks are extremely sophisticated and cannot identify the culprit
The United Nations recently acknowledged that the organization was the target of a large-scale cyberattack in the summer of 2019. In particular, the attack is thought to be sponsored by a nation.
According to an investigation report, around July 2019, a group of hackers successfully exploited a flaw in the Microsoft SharePoint service and spread an unknown malware to gain access to dozens of servers. important at United Nations offices in Geneva and Vienna, as well as the Office of the United Nations High Commissioner for Human Rights (OHCHR). 'The attack has led to some of our core infrastructure components being successfully hacked by hackers. Because the exact nature and extent of the case could not be determined, we decided not to disclose the details of the case at the time, '' a UN spokesman said.
Jake Williams, a former white-hat hacker who worked for the US government, identified the attack as the color of a cyber-espionage operation. The reason is that the entire traces of the intrusion were neatly cleaned up by attackers, making UN security experts unable to determine where these hackers came from. how to calculate. More than 400GB of data from UN servers was stolen without leaving any traces behind, suggesting they are 'skilled' hackers and most likely funded by a certain government. .
The good news (unless you are an employee of the United Nations) is that the compromised servers mostly contain employee information. The UN then asked all its staff to reset their personal passwords, but declined to go into details.
This is not the first time the United Nations cover up information about the data breaches they encounter. In 2016, Panda Emissary, a hacker group connected to the Chinese government, gained unauthorized access to the International Civil Aviation Organization's servers. The United Nations only voiced its acknowledgment of the breach only after CBC reported it.
You should read it
- You can hack Mazda cars with USB Flash Drive
- How to know if Facebook, Instagram, Google and other social networks have been hacked
- Here's how to check if your TeamViewer account is hacked.
- Computers that are not connected to the internet can still be hacked
- 5 signs that your family's surveillance camera has been hacked
- How to fix hacked / infected phone
- 6 dire consequences that a website must suffer if it is hacked
- Does resetting a hacked router make it safe again?
May be interested
- Conficker - the culprit of 'spam tsunami'after being successfully upgraded on the night of 9/4, conficker infected pcs became 'spam robot' with the ability to send billions of spam every day.
- 'Falling' before the culprit who hacked dozens of credit cards with a super algorithm developed by himselfwhen receiving information that hundreds of unauthorized transactions of credit card holders had been made, the argentine police assumed that the culprit was an organization with many hackers.
- 5 ways to identify safety extension before installationcurrently, there are thousands, millions of extensions and a wide variety of genres in browsers. therefore, you need to know how to anticipate unsafe extensions, avoid false false settings, contain malicious code, malware, data collection, ...
- Beware of Android scams!existing forms of fraud are becoming more and more sophisticated, even on smartphones is a fertile ground for scammers to act. in this article, we will help you be aware of the types of scams on android like ...
- Scores in the background of running apps make your laptop run out of battery quicklydoes your laptop run out of battery very quickly without an apparent reason? chances are the laptop is running some background apps, silently 'consuming' too much battery capacity. let's find out to identify the 'culprit'.
- How to set up a website with Project Shield: DDOS prevention service from Googledespite having the same name as nvidia's handheld game console, google's project shield is a completely standalone project that will be of great help to small websites.
- How to identify and install the correct driver missing for Windows?windows device manager is a very important tool in windows operating system, it lists all the list of hardware devices recognized by windows, including problems related to device drivers not recognized yet.
- Signs you should break up with the man you are getting to knowthere is a way to know if there is something about the person you are courting that makes you nervous. here is a list of subtle signs you can use to tell what a man is really like.
- Simple way to 'identify' insect bitesplease refer to the simple ways to identify insect bites in the article below!
- 5 signs to identify phishing websiteswhen it comes to online security, there's one age-old problem: phishing. many people receive phishing content through email or social media platforms.