“The only time anyone hears about hacking or cybersecurity is when the bad guys win,” says Gary Berman, who gives the good guys the superhero treatment.
“X-Tunnel” is publicly available as device “cleaning” and optimization software CCleaner, which they allegedly used to “delete traces of their presence on the DCCC network.”
The report specifically notes the risk of installing malware and counterfeit hardware or software as well as “failure or disruption in the production or distribution of critical products.”
This is particularly prevalent issue in the world of tech, where a June Digital Ocean report found that 44 percent of hiring managers said they have problems retaining talent.
Once activated, the malware runs through a process that downloads and installs “common” Windows tools, WinRAR, and Ammyy Admin, a remote desktop software.
Burr: “The committee continues its investigation and I am hopeful that this installment of the committee’s work will soon be followed by additional summaries providing the American people with clarity.”
Sixty-four percent said that employers were within their rights to monitor employees on company or personal devices so long as they were transparent about it.
The IRS has created a tool to “automate the IT workforce planning process” but that has yet to fully be implemented due to “resource constraints and competing priorities.”
This may be a sign that some cybercriminals are moving away from ransomware and other money-making attacks that require direct payment from the target, opting to just hijack users’ systems to earn cryptocurrency.
Only 11 percent of respondents did not think that an attack on the U.S. is imminent. Further, only 13 percent think that “Congress and the White House understand the cyber threat.”