The US Government, specifically the White House, yesterday joined the British Foreign Office in attributing last year's NotPetya pseudoransomware campaign to Russia. This was an unsurprising statement, as US officials have long regarded Russia as the prime suspect. NotPetya began with attacks in Ukraine and spread to other countries. The UK was particularly affected. Exploits leaked by the Shadow Brokers (who attributed them to NSA) were instrumental in the NotPetya attacks.
Recorded Future's research suggests that the Olympic Destroyer malware that hit the Winter Games' during the opening ceremonies was deployed in a complex, multipart operation. They also point out that circumstantial code similarities to malware known to have been developed by various nation-states, including China and North Korea, are consistent with false flag misdirection, and provide thin at best evidence of the existence of a "cyber axis of evil." Speculation about responsibility for Olympic Destroyer continues.
Aqua has published a study of how cryptocurrency miners successfully attack container environments.
Comodo's 2017 Global Malware Report observes that online advertising and digital media buys have continued to increase their role as vectors for malware distribution.
FedEx has secured an AWS S3 bucket left open (apparently inadvertently) to the Internet.
Secureworks researchers track the proliferation of SamSam ransomware. They find the criminal operators ("Gold Lowell") unusually hands-on, devoted to effective exploitation of readily available commodity attack tools.
Oracle is said to have acquired Zenedge for an undisclosed sum. VMWare's purchase of CloudCoreo is seen as a push into the cloud security market.