The MIT Technology Review brings to attention research done by security company FireEye which, by monitoring "millions of malware messages sent over the past 18 months," discovered spikes in malware activity prior to the Russia-Ukraine and Israel-Hamas conflicts.
The FireEye study drew on data collected from more than 5,000 corporate and government clients around the world. FireEye’s software captures “callback” messages sent by malware inside a network—either reporting its status to its operators or picking up new commands. Those messages were used to determine the location of the computer controlling the malware.
The patterns were most likely caused by government agencies ramping up efforts to gather intelligence or attack their adversaries, says Kenneth Geers, who worked on the project. “In the run-up to the Crimea crisis, you saw a rise of malware callbacks in both Russia and Ukraine,” he said at the Black Hat computer security conference Thursday.
|The Hotter it Gets, The More We Want to Kill Each Other #ClimateChange|
|Using ISIS' Social Media Feed Against Itself|
|"Instability and collapse could soon take place in North Korea."|
|“Slut-Shaming” Jewish Israeli Women Supporting Palestine|
|How the Next Korean War Could Look Like|
|“It knows the very contours of my face.”|
|How to Avoid Jury Duty|
|The (Very Scary) People of Public Transit|
|If Sir David Attenborough Restored Vintage Toys|
|CaptchaTweet: Write Tweets in Captcha Form|
|“They created a dictatorship without mercy.”|
|“When Life Gives You Lemons.”|
|Recycled Vacuum Lamps|
|“A two-legged robot created by Agility Robotics, designed to get your delivery from a car to your door.”|
|Pat the Zombie: A Cruel Adult Spoof of 'Pat the Bunny'|
|Fake Name Generator|
|“The company is losing billions, has essentially no underlying value, and its business could be hammered overnight.”|