Aussie cyber spies to control critical infrastructure during ransomware attacks

Aussie cyber spies to control critical infrastructure during ransomware attacks

The new bill, if passed, will allow cyber warfare operatives to take over control of critical infrastructure under attack. Australia’s top cyber spies are set to gain greater powers in the event of ransomware or other cyber attacks on critical infrastructure. The Australian Signals Directorate (ASD), a government agency in charge of cyber warfare and information security, would be able to take over control of critical infrastructure — including energy, communications and banking systems — under new legislation introduced into Parliament.The legislation even considers health care and....


Related News

Bitcoin Ransomware Attacks Involving Cryptowall Originated from the Same Place - Report

Ransomware and Bitcoin make a great combination, but for all the wrong reasons. There was a sudden increase in the number of ransomware attacks earlier in this year which continued into the last few months. While these attacks continue even today, most of them usually go unreported in the media. Cryptowall is one of the widely used malware to launch ransomware attacks. The malware has been so good at doing its job that even the FBI has given up on it. What the guys behind it are using it for is a completely different story though. Who is behind all these ransomware attacks involving....

Banks Buy Bitcoin as Ransomware Wreaks Havoc

The increase in ransomware attacks on banks has forced them to buy bitcoin. Who would have imagined that traditional banks would be buying Bitcoin so soon? The answer is – probably no one. The recent increase in Bitcoin ransomware attacks on banks and financial institutions has forced them to take this extreme step. According to the CEO of Malwarebytes – Marcin Kleczynski, the malicious ransomware programs have created a huge security threat to banks. In order to ensure uninterrupted service, the banking industry is even prepared to pay the price demanded by cyber criminals to recover data....

US Treasury Dept sanctions crypto OTC broker Suex for alleged role in facilit...

The government agency hinted at possible additional sanctions for "financial institutions, cyber insurance firms, and companies involved in digital forensics and incident response" that facilitated ransomware payments. The United States Department of the Treasury has announced it will impose sanctions on Czech Republic and Russia-based business Suex OTC for allegedly allowing hackers to access cryptocurrency sent as payment for ransomware attacks.In a Sept. 21 advisory update, the Treasury Department Office of Foreign Assets Control, or OFAC, added Suex OTC to its list of Specially....

New Popcorn Time Ransomware Adopts Referral Marketing Strategy

Popcorn Time ransomware offers victims a chance to claim the decryption key for free, if they infect two more users. Ransomware has become the latest evil on the internet. The number of victims falling to ransomware attacks either due to negligence or lack of awareness about good internet usage practices has been on a rise since the past couple of years. Almost all ransomware attacks are accompanied by a demand for payment in Bitcoin. Due to the rising attacks, media outlets, cyber security firms and even law enforcement agencies have started advising internet users on safe internet usage....

Four in Ten US Businesses Hit By Ransomware In Past 12 Months

In fact, 1% of attacks saw a demand of US$150,000 to be paid in Bitcoin. Ransomware developers are always one step ahead of security researchers these days. Not only in the way their software works, but also how they target potential victims. American businesses are seeing an influx in ransomware attacks all of a sudden. More particularly, company executives are a prime target for ransom are right now. While nearly nine in ten ransomware attacks are targeting hospitals these days, corporations are not out of the woods just yet. A new study unveiled how 40% of businesses investigated had....