The MIT Technology Review brings to attention research done by security company FireEye which, by monitoring "millions of malware messages sent over the past 18 months," discovered spikes in malware activity prior to the Russia-Ukraine and Israel-Hamas conflicts.
The FireEye study drew on data collected from more than 5,000 corporate and government clients around the world. FireEye’s software captures “callback” messages sent by malware inside a network—either reporting its status to its operators or picking up new commands. Those messages were used to determine the location of the computer controlling the malware.
The patterns were most likely caused by government agencies ramping up efforts to gather intelligence or attack their adversaries, says Kenneth Geers, who worked on the project. “In the run-up to the Crimea crisis, you saw a rise of malware callbacks in both Russia and Ukraine,” he said at the Black Hat computer security conference Thursday.
|The Traditional Submarine is Becoming Obsolete|
|The Sounds of War in Gaza|
|On ISIS' Carefully Edited Videos|
|Snipers of the Taliban|
|Source of blue lights over Norway discovered|
|“Astronomers have sent a radio message to a neighbouring star system.”|
|“When automation starts displacing lawyers, accountants and bankers, then we might see some push-back.”|
|“A fraudster poses as an attractive woman and encourages a man to masturbate in front of a webcam.”|
|CaptchaTweet: Write Tweets in Captcha Form|
|“The homemade airplane does indeed fly!”|
|How to Avoid Jury Duty|
|Japanese Robot Serves Ice Cream From Inside a Vending Machine|
|“Semis, not personal cars, are the smartest use of autonomous technology.”|
|“Facebook has contributed to, and profited from, the erosion of democratic norms in the United States.”|
|“The education industry as a whole is a con.”|
|Short Story of Similar Objects|
|Google Map Shows You the Most Photographed Areas of the World|