Войти

Iranian hackers encroached on Intel's artificial intelligence

2018
0
0
Image source: Фото: Andrej Sokolow / DPA / Globallookpress.com

A company that develops processors for Intel for use in the field of artificial intelligence was attacked by the pay2key encryption group, which is associated with Iran. The attackers immediately began to merge the stolen data.

The company Habana Labs, which produces processors adapted for artificial intelligence technologies for Intel, was subjected to a cyber attack. attackers belonging to a certain extortionate group pay2key stole confidential data and began to spread them in the public domain, simultaneously demanding that habana pay a ransom within 72 hours to stop the leak.

The stolen data includes information about the Windows domain and DNS information about it, as well as a list of files from the Gerrit software code audit system. well, the most significant component of the leak is business documents and fragments of program code, presumably belonging to habana and, therefore, intel.

pay2key is a ransomware organization, presumably of Iranian origin. It was closely studied by Israeli information security firms checkpoint and Profero.

in november 2020, checkpoint experts reported that several companies in brazil were victims of pay2key. The attackers used the RDP protocol to penetrate the local networks of the victim companies and distributed the cryptographer to all resources available within it within one hour. The average ransom amount was $110-140 thousand in bitcoins, although sometimes attackers demanded about half as much.

For their part, Profero experts were able to associate pay2key with the Iranian crypto exchange Excoino with a high degree of confidence.

According to the publication Bleeping Computer, experts believe that the motivation of attackers is not necessarily related to profit. It is likely that the main task is to harm Israeli businesses, and not only large ones.

Head of Profero Omri Segev Moyal (Omri Segev Moyal) recommended that the Israeli IT business throw all efforts to strengthen cyber defense, since pay2key and other Iranian cyber groups are clearly not going to stop there.

According to Profero, pay2key previously attacked the Israeli developer of software for the field of cargo transportation Amital, and through it-and several of its clients.

"When it comes to attacks on business, it is not so important what exactly the motivation is associated with, especially when it comes to real damage," he said. Anastasia Melnikova, information security expert at SEC Consult Services. - in this case, the attackers could easily perform three tasks at once: to make money, cause harm and steal information about advanced developments in the interests of an unfriendly state. In this regard, the least likely is the "honest" return of the stolen data after the payment of the ransom, if any. Research and development in the field of artificial intelligence technologies is such a highly competitive environment, and at the international level, that sometimes all means are good."

The rights to this material belong to
The material is placed by the copyright holder in the public domain
  • The news mentions
Do you want to leave a comment? Register and/or Log in
ПОДПИСКА НА НОВОСТИ
Ежедневная рассылка новостей ВПК на электронный почтовый ящик
  • Discussion
    Update
  • 26.04 21:57
  • 8642
Without carrot and stick. Russia has deprived America of its usual levers of influence
  • 26.04 21:10
  • 15
Генерал-майора Ивана Попова приговорили к пяти годам колонии общего режима и лишили звания
  • 26.04 20:59
  • 4
КНДР ратифицировала договор о стратегическом партнерстве с Россией - ЦТАК
  • 26.04 20:56
  • 10
"Vampires" against "Geraniums" in Ukraine
  • 26.04 20:38
  • 1475
Корпорация "Иркут" до конца 2018 года поставит ВКС РФ более 30 истребителей Су-30СМ
  • 26.04 20:20
  • 39
Commander of the US Air Force in Europe on the role of aviation in the fighting in Ukraine
  • 26.04 19:58
  • 21
Russian air defense systems: the first experience of real combat use
  • 26.04 02:52
  • 2
СМИ: японские военные вышли на финишную прямую в создании рельсотрона
  • 25.04 19:36
  • 1
A massive attack by Ukrainian UAVs on Crimea may be preparation for an amphibious operation
  • 25.04 17:11
  • 0
БПЛА для Беларуси – запас карман не тянет!
  • 25.04 17:11
  • 40
CEO of UAC Slyusar: SSJ New tests with Russian engines will begin in the fall - TASS interview
  • 25.04 16:54
  • 0
Некоторые аспекты устойчивости обороны в современных вооружённых конфликтах
  • 25.04 16:22
  • 1
В Москве состоялось расширенное заседание Военного совета Сухопутных войск
  • 25.04 15:56
  • 1
На Украине показали заброшенную БМП на шасси Т-55
  • 25.04 15:49
  • 1
Стрельбу доработанного БТР-82А показали на видео