Feds Seize Two Domains Used in USAID Phishing and Linked to SolarWinds Attackers

From cybersecurity exploits to distributed denial-of-service (DDoS) attacks that result in a data breach, cyber-attacks have become an order of the day and present a growing threat to businesses.

Whether they’re from state-sponsored cyber warfare units or so-called hacktivist groups, this type of attack is a cause for concern.

On Tuesday, May 25th, for instance, US authorities seized malware distribution and two command-and-control (C2) domains linked to a recent wave of spear-phishing emails that impersonated messages from the Agency for International Development (USAID). 

The move follows last week’s exposure of an ongoing attack intended to impersonate emails from the agency.

Volexity and Microsoft disclosed the attack last week, attributed to the so-called Nobelium Group (also tracked as APT29)- the same Russian group blamed for last year’s SolarWinds supply chain attack.

According to a US Department of Justice statement on the case, the seizure of the domains was aimed at disrupting the resultant exploitation of victims by malicious actors and identifying compromised machines.

Why Are Cyber Attack Threats Escalating?

While most people mistakenly think the internet is becoming more secure, it’s quite the opposite. To some extent, this is true for numerous private clouds, but the general cloud is still insecure.

The modern consumer demands corporate transparency, connection, social media interactions, and entire-time access to a cloud that garners personal data. Unfortunately, hackers find ways to access that data as well as insecure corners of the cloud every day.

Bottom line,

Tracking increasing and evolving cyber-attacks is vital to better cybersecurity. Or even much better, corporations ought to destroy data on unused devices as they’re more prone to cyber-attacks. At Phiston technologies, we encourage you to think twice about the new devices you buy and the ones you use. We also offer an ideal way to destroy data on a device securely.

We are located in Miami and focused on selling hard drive destruction gear to businesses. If you have any delicate information, you simply can’t throw your media or hard drives in the garbage can for apparent reasons, the best way to securely terminate data on a device is to entirely destroy the connected device with an SSD data crusher, media, or hard drive eraser.

Our product line meets NSA specifications in making and destroying contents of USBs, CDs, hard drives, and DVDs unreadable. Contact us today to learn more about our services.

Download Whitepaper

'Download

Product Enquiry

Request Quote


    Button