US authorities continue to investigate what's being characterized informally (albeit all but officially) as a Russian government campaign to "disrupt" upcoming US elections. Direct hacking of voting is feared, but such Russian activity as has been observed is more consistent with influence operation than classic cyberattack. Observers see the probable goal as undermining confidence in US institutions to the detriment of the US and the advantage of Russia. Most of the interest in the alleged Russian campaign continues to center on what Russian intelligence services may have collected from political parties (especially the Democratic Party) and from candidate Clinton's State-Department-era private email server.
Wikileaks' Julian Assange (objectively aligned with Russia's government) has promised to release as many as "100,000 pages" of new material "related to Hilary Clinton."
Criminals are using malware installed on Seagate Central NAS to mine cryptocurrencies. Sophos researchers describe "Mal/Miner-C," which is being used to extract value from Monero, more susceptible to mining than the older Bitcoin. Of 207,110 active Seagate Central NAS devices allowing anonymous remote access, 7,263 permit write-access enabled, and 5,137 of these are infected with Mal/Miner-C.
KrebsOnSecurity reports on vDOS, an Israel-based booter DDoS-attack service that earned its masters some $600,000 over the past two years.
InfoArmor publishes an update on GovRAT, a criminal campaign now in version 2.0 and afflicting US Government and military targets.
The Congressional report on 2015's massive OPM breach is out. Cylance offers a vade mecum for the dismaying contents.
Two alleged Crackas-with-attitude are arrested in North Carolina.