The MIT Technology Review brings to attention research done by security company FireEye which, by monitoring "millions of malware messages sent over the past 18 months," discovered spikes in malware activity prior to the Russia-Ukraine and Israel-Hamas conflicts.
The FireEye study drew on data collected from more than 5,000 corporate and government clients around the world. FireEye’s software captures “callback” messages sent by malware inside a network—either reporting its status to its operators or picking up new commands. Those messages were used to determine the location of the computer controlling the malware.
The patterns were most likely caused by government agencies ramping up efforts to gather intelligence or attack their adversaries, says Kenneth Geers, who worked on the project. “In the run-up to the Crimea crisis, you saw a rise of malware callbacks in both Russia and Ukraine,” he said at the Black Hat computer security conference Thursday.
|You Can't Hack Constellations|
|There Were No Weapons of Mass Destruction in Iraq|
|Film Industry Hires Cyber Hitmen To Take Down Internet Pirates|
|Russian Tanks Roll into Ukraine|
|Russians Want to Know if They Are at War|
|Fast, Clean, Cost-Effective Metal 3D-Printing|
|“Robots should be fitted with an 'ethical black box' to keep track of their decisions.”|
|Making a Movie Inside a Video Game|
|"A real-time surveillance machine that has been developed for online advertising is rapidly expanding into other fields."|
|"You only need about 100 miles by 100 miles of solar panels to power the entire United States."|
|"Warp drives could become a real technology within the lifetimes of today’s toddlers."|
|"State borders are a lot weirder than they first appear."|
|Iron Star Civilizations|
|“An unfolding 'Cambrian Explosion' in robotics.”|
|Google Map Shows You the Most Photographed Areas of the World|