The motivation behind attacks on European supercomputers, first discovered in an incident at the UK's ARCHER National Supercomputing Service, is now clearer: the attackers were cryptojacking, ZDNet reports. ARCHER has been updating its status regularly. Der Spiegel has reported attacks at six facilities in Germany. Last Thursday the Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities also closed outside access to its systems. TU-Dresden took the same action for its Taurus system. On Saturday Switzerland disclosed a similar incident at CCSC. The European Grid Infrastructure (EGI) Computer Security Incident Response Team (CSIRT) confirmed that the intruders were seeking to use the supercomputers as cryptomining rigs.
Elexon, a middleman in the UK's electrical grid, continues to recover from the cyberattack it sustained last week. Industry Week, while noting that the incident did not compromise power distribution, argues that the attack should place infrastructure operators on alert.
Global Times reports that Beijing intends to place US tech companies on an "unreliable entity list" that would severely restrict their ability to do business in China, a "counterattack" in a new "tech Cold War" China claims the US started.
The REvil ransomware gang released documents they said offered a foretaste of President Trump's "dirty laundry" they'd obtained in a hack of a celebrity law firm, but as Forbes reports the emails amount to little.
US state agencies administering unemployment relief funds are experiencing a surge in COVID-19 fraud, the Washington Post reports. The New York Times faults weak identity verification systems.