{"id":250,"date":"2021-10-30T12:59:00","date_gmt":"2021-10-30T10:59:00","guid":{"rendered":"http:\/\/scpo-cybersecurityassociation.com\/?p=250"},"modified":"2021-12-12T13:25:31","modified_gmt":"2021-12-12T12:25:31","slug":"cyber-monitoring-1-october-2021","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2021\/10\/30\/cyber-monitoring-1-october-2021\/","title":{"rendered":"Cyber Monitoring #1 (October 2021)"},"content":{"rendered":"\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Facebook Papers:&nbsp;<\/strong>A trove of insider documents from Facebook has been unveiled after journalists spent weeks pouring over the information from a noted whistleblower.&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=3ba97dd672&amp;e=9f1453c0d1\" target=\"_blank\">The so-called &#8220;Facebook Papers&#8221;<\/a>&nbsp;detail how the social media site is still grabbing with misinformation around the COVID-19 vaccine and gaps in support for non-English-speaking users. Frances Haugen, the former employee who provided the documents to journalists, also&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=00454cfc01&amp;e=9f1453c0d1\" target=\"_blank\">testified before British parliament this week<\/a>. She detailed how Facebook&#8217;s algorithm prioritizes engagement, which can sometimes lead to the promotion of fake news articles.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>REvil takedown:&nbsp;<\/strong>Security researchers from multiple countries teamed up to&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=6e1f659941&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">take down the REvil ransomware group<\/a>&nbsp;last week. The group&#8217;s major victims in the past include the Colonial Pipeline in the U.S. and meatpacker JBS.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>&#8216;Trickbot&#8217; group hacker faces charges in the US:&nbsp;<\/strong>A Russian national&nbsp;had his initial appearance in federal court last week after his extradition from the Republic of Korea to the US to face charges for his alleged role in a transnational, cybercriminal organization. According to court documents, Vladimir Dunaev, 38, was a member of a transnational, cybercriminal organization that deployed a computer banking trojan and ransomware suite of malware known as \u201cTrickbot.\u201d<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>Hacks from Turkey:&nbsp;<\/strong>Hackers reportedly hailing from Turkey compromised a&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=ba6170448a&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">portion of former President Donald Trump&#8217;s website<\/a>. A portion of the site briefly displayed positive messages regarding&nbsp;Turkish President Recep Tayyip Erdo\u011fan.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>Disinformation in Sudan:&nbsp;<\/strong>Two distinct Sudanese networks,&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=f3848977ed&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">recently removed by Facebook<\/a>for coordinated inauthentic behavior, posed as credible media outlets to rally support for state security services and former regime loyalists and undermine the ongoing civilian-led democratic transition.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>Disinformation during the 2016 US Elections:<\/strong>&nbsp;A&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=c43cdbdfb7&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">well-known ethical hacker in the security community<\/a>&nbsp;recently unveiled himself as being part of a massive fake news operation that influenced the outcome of the 2016 presidential election. The previously undercover &#8220;Hacker X&#8221; detailed how a company recruited him into developing a large operation to spread disinformation on Facebook and other social media platforms.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>Crypto transactions linked to cyberattacks:&nbsp;<\/strong>The Biden Administration took several steps over the past week to&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=0b96f20070&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">crack down on illegal cryptocurrency transactions<\/a>, especially those linked to cyber attacks. This included a warning to private companies that they could face the consequences of sanctions if they deal with virtual currencies that facilitate ransomware payment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out what happened in the cyberspace during the month of October and make the most of our news monitoring!<\/p>\n","protected":false},"author":7,"featured_media":275,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":6,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/250\/revisions"}],"predecessor-version":[{"id":267,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/250\/revisions\/267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/275"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}