The MIT Technology Review brings to attention research done by security company FireEye which, by monitoring "millions of malware messages sent over the past 18 months," discovered spikes in malware activity prior to the Russia-Ukraine and Israel-Hamas conflicts.
The FireEye study drew on data collected from more than 5,000 corporate and government clients around the world. FireEye’s software captures “callback” messages sent by malware inside a network—either reporting its status to its operators or picking up new commands. Those messages were used to determine the location of the computer controlling the malware.
The patterns were most likely caused by government agencies ramping up efforts to gather intelligence or attack their adversaries, says Kenneth Geers, who worked on the project. “In the run-up to the Crimea crisis, you saw a rise of malware callbacks in both Russia and Ukraine,” he said at the Black Hat computer security conference Thursday.
|"If you believe the guys who are in this trial, nobody is fighting in Syria. Everybody's cooking."|
|Source of blue lights over Norway discovered|
|On ISIS' Carefully Edited Videos|
|Despite a Decline in Wars, the World is Getting Less Peaceful Each Year|
|Of Mice and Man|
|“What life is like on the front lines of the digital revolution.”|
|“Let the Chinese Communist Party rule forever and enslave us all?”|
|“It is full of hallucinations both wonderful and terrifying, a mental goulash of reality and fantasy.”|
|Japanese Robot Serves Ice Cream From Inside a Vending Machine|
|How to Avoid Jury Duty|
|“How to build a house.”|
|“Instead of consuming fossil fuels, it would then feed surplus electricity into the grid.”|
|When the Wrong Hastag Can Get You Killed by an Assassination Drone|
|CaptchaTweet: Write Tweets in Captcha Form|
|Humans Need Not Apply|
|Knowing how to operate a smartphone does not qualify as being tech savvy.|
|"Acting better than Star Trek deserves."|