Friday, May 27, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Russian Hackers’ next target might be 2020 Olympics

Russian Hackers’ next target might be 2020 Olympics

Seda Nur Cinar by Seda Nur Cinar
October 30, 2019
in Cybersecurity
2 min read
0 0
0
2
SHARES
26
VIEWS
Share on FacebookShare on TwitterShare on EmailFollow on Google News

Russian hackers have begun a hacking campaign targeting at least 16 national and international sporting and anti-doping organizations spanning across three continents on September 16. This is not the first time that they have targeted such organizations. These attacks raise the question of whether the 2020 Tokyo Summer Games is in their target list?

Majority of attacks were not successful

This Monday, Microsoft Vice President Tom Burt wrote a blog post about new cyberattacks targeting sporting and anti-doping organizations. According to Burt, The Russian state-sponsored hacking group Fancy Bear/APT28 has been attacking since 16 September 2019. This group is to be believed as an offshoot of Strontium which is another hacker group. He warned about new potential actions being taken by the World Anti-Doping Agency.

Microsoft Threat Intelligence Center discovered these significant cyberattacks and Burt shared details about them: “Some of these attacks were successful, but the majority were not. Microsoft has notified all targeted customers in these attacks and has worked with those who have sought our help to secure compromised accounts or systems.”

Follow the three ways for protection

Previously, Fancy Bear/APT28 attacked such organizations also and released the medical records and emails in 2016 and 2018 The cyberattack of 2018 had targeted a federal court in the United States. Moreover, they have also targeted organizations involved in the democratic process. The same group was also active on the attack on servers belonging to the Democratic National Committee during the 2016 election.

It’s critical that governments and the private sector are increasingly transparent about nation-state activity so we can all continue the global dialogue about protecting the internet. We also hope that publishing this information helps raise awareness among organizations and individuals about steps they can take to protect themselves.

Like Microsoft, they recommended at least three ways for protection from these attack types:

  1. The first step is using two-factor authentication on all business and personal email accounts,
  2. Second is learning how to spot phishing schemes and protect yourself from them,
  3. Third turning on security alerts about links and files from suspicious websites.

See more Cyber Security News


Tags: Cyber AttackHacking
Share2TweetSendShare
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy
Previous Post

Google stops supporting Flash

Next Post

Volta Networks & Delta in partnership to accelerate cloud-native virtual routing deployments

Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Related News

Tor Browser on Tails 5.0 is not safe

Tor Browser on Tails 5.0 is not safe

May 27, 2022 12:32 pm
VMware ESXi servers are being targeted by a new ransomware

VMware ESXi servers are being targeted by a new ransomware

May 26, 2022 2:07 pm
StackPatch unveils new WAF packages

StackPath unveils new WAF packages

May 24, 2022 4:56 pm

Word files embedded in PDF files are carrying keyloggers

May 24, 2022 2:24 pm
Next Post
Volta Networks & Delta in partnership to accelerate cloud-native virtual routing deployments

Volta Networks & Delta in partnership to accelerate cloud-native virtual routing deployments

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

Best web hosting service providers

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Advertisement

Recent News

  • WordPress.com unveils WordPress Starter plan
  • Wayland 1.21 Alpha is released
  • AlmaLinux 9 “Emerald Puma” is available for download
  • Zyxel is patching 4 new vulnerabilities
  • Tor Browser on Tails 5.0 is not safe

Our Latest Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic
Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic

by Atalay Kelestemur
November 25, 2021 3:23 am


Cloud7 News is a news source that publishes the latest news, industry news and exclusive interviews on web hosting, cloud computing, data center, cybersecurity and linux.

News Categories

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Blockchain

Our Free Modules

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.