Potential protection against the “Hacienda” intelligence program
Today, a group of journalists has reported the existence of the “Hacienda” spy program. According to this report, five western intelligence agencies are using the Hacienda software to identify vulnerable servers across the world in order to control them and use them for their own purposes. Scientists at the Technische Universität München (TUM) have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.
Port scanners are programs that search the Internet for systems that exhibit potential vulnerabilities. According to the report published today by journalists at Heise Online, Hacienda is one such port scanning program. The report says that this program is being put into service by the “Five Eyes,” a federation of the secret services of the USA, Canada, the UK, Australia and New Zealand. “The goal is to identify as many servers as possible in other countries that can be remotely controlled,” explains Dr. Christian Grothoff, Emmy Noether research group leader at the TUM Chair for Network Architectures and Services.
New free software “TCP Stealth”
Grothoff and his students at TUM have developed the “TCP Stealth” defense software, which can inhibit the identification of systems through both Hacienda and similar cyberattack software and, as a result, the undirected and massive takeover of computers worldwide, as Grothoff explains. “TCP Stealth” is free software that has as its prerequisites particular system requirements and computer expertise, for example, use of the GNU/Linux operating system. In order to make broader usage possible in the future, the software will need further development.
The Latest on: Cyberattack software
via Google News
The Latest on: Cyberattack software
- Cyber Attack Simulation Software Marketon June 27, 2020 at 7:46 am
A Cyber Attack Simulation exposes both known and unknown vulnerabilities of elite cyber consultants acting like a cybercriminal and putting your defenses in a real life threat scenario A cyber attack ...
- New Ransom X Ransomware used in Texas TxDOT cyberattackon June 26, 2020 at 7:17 am
A new ransomware called Ransom X is being actively used in human-operated and targeted attacks against government agencies and enterprises.
- Is Your Risk Of Cyberattack Higher Amid The Pandemic?on June 26, 2020 at 5:25 am
You likely don’t have to worry about hacktivists fighting for a higher cause, cyber-mercenaries hacking you on someone else's behalf or cyberterrorists intent on watching the world burn. But you do ...
- D3 Security and Check Point Software Partner to Help Customers Respond to the Next Generation of Cyber Threatson June 25, 2020 at 5:00 pm
D3 NextGen SOAR integrates with multiple Check Point products VANCOUVER, British Columbia (PRWEB) June 25, 2020 D3 Security, the leader in next-generation security ...
- Australia Is Under Sustained Cyber Attack, Warns The Governmenton June 21, 2020 at 8:00 pm
Prime Minister Scott Morrison had some alarming news for Australians this morning: we are under cyber attack. He informed the nation the attacks “hadn’t just started”, and that Australian businesses ...
- How to protect yourself from the cyber attack on Australiaon June 19, 2020 at 7:23 pm
Australia is under a major cyber attack with private and public sector organisations being targeted by a foreign entity, but there are steps you can take to protect yourself.
- China slams accusations they were behind cyber-attack on the Australian government and businesseson June 19, 2020 at 5:39 pm
Australian Strategic Policy Institute executive director Peter Jennings said the attack was '95 per cent or more' likely to have been launched from China.
- Cyber attack in Australia: China the chief suspect behind attackon June 19, 2020 at 8:10 am
China has denied it is behind a massive and “malicious” cyber attack on Australia’s essential services, government agencies, industry and infrastructure.
- Australia is under sustained cyber attack, warns the government. What’s going on, and what should businesses do?on June 18, 2020 at 10:21 pm
Australia is coming under sustained cyber attack by a 'state-based' actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.
- Australia’s Cyber Attack Was Probably Routine Espionage, Expert Sayson June 18, 2020 at 9:09 pm
Australia says it was the target of a sophisticated, state-based cyber attack. An expert says it's likely a routine espionage reconnaissance gone wrong.
via Bing News