TERRORISTS, BANDITRY ACTIVITIES IN NORTHWEST HAVE REDUCED- SHEHU SANI. (PHOTO).

Image
 Terrorists, banditry activities in Northwest have reduced – Shehu Sani Shehu Sani, a former Kaduna Central Senator, has disclosed a decrease in the activities of terrorists and bandits in the Northwest. Sani said the recent killings of some top terrorists’ leaders could have been responsible for the decrease. Posting on X, the former lawmaker wrote: “In the last few weeks, there is a noticeable decrease in terrorist and banditry attacks and kidnappings in the North Western parts of this country. “The elimination of some of the top terrorist leaders must have been responsible.This is commendable and should be sustained.” In the past weeks, notable bandit leaders have been killed in the North. Those eliminated include- Haliru Kachalla Sububu or Buzu, Kachalla Tukur Sharme (killed by rival gang), Sani Black, another prominent bandit leader, killed along with his brother and two children, Kachalla Makore, Kachalla Mai Shayi Kachalla Tsoho Lulu and Mai’Yar Gitta. Gitta lost his life after

NORTH KOREAN HACKERS STEALING MILITARY SECRETS, SAYS US AND ALLIES. (PHOTO).


 North Korean hackers have conducted a global cyber espionage campaign in efforts to steal classified military secrets to support Pyongyang's banned nuclear weapons programme, the United States, Britain and South Korea said in a joint advisory on Thursday.

The hackers, dubbed Anadriel or APT45 by cybersecurity researchers, are believed to be part of North Korea's intelligence agency known as the Reconnaissance General Bureau, an entity sanctioned by the U.S. in 2015.

The cyber unit has targeted or breached computer systems at a broad variety of defence or engineering firms, including manufacturers of tanks, submarines, naval vessels, fighter aircraft, and missile and radar systems, the advisory said.


Victims in the U.S. have also included the National Aeronautics and Space Administration (NASA), Randolph Air Force Base in Texas and Robins Air Force Base in Georgia, FBI and U.S. Justice Department officials said on Thursday.

In the February 2022 targeting of NASA, the hackers used a malware script to gain unauthorized access to its computer system for three months, U.S. prosecutors allege. Over 17 gigabytes of unclassified data were extracted.


"The authoring agencies believe the group and the cyber techniques remain an ongoing threat to various industry sectors worldwide, including but not limited to entities in their respective countries, as well as in Japan and India," the advisory said.

Internationally isolated North Korea, known formally as the Democratic People's Republic of Korea (DPRK), has a long history of using covert hacking teams to steal sensitive military information.


To fund their operations, the hackers used ransomware to target U.S. hospitals and healthcare companies, U.S. officials allege.


On Thursday, the U.S. Justice Department said it had charged one suspect, Rim Jong Hyok, for conspiring to access computer networks in the United States and money laundering.


One of the ransomware incidents that Rim is charged with involved a May 2021 hack against a Kansas-based hospital that paid ransom after the hackers encrypted four of its computer servers.


The hospital paid in bitcoin, which was transferred to a Chinese bank and then withdrawn from an ATM in Dandong, China, next to the Sino-Korean Friendship Bridge which connects the city to Sinuiju, North Korea, the indictment said.

The FBI said it is offering a reward of up to $10 million for information that would lead to Rim's arrest. He is believed to be in North Korea.


FBI and Justice Department officials told reporters on Thursday they have seized some of the online accounts belonging to the hackers, including $600,000 in virtual currency that will be returned to victims of the ransomware attacks.


"The global cyber espionage operation that we have exposed today shows the lengths that DPRK state-sponsored actors are willing to go to pursue their military and nuclear programmes," said Paul Chichester at Britain's National Cyber Security Centre, part of the country's GCHQ spy agency.


In August last year, Reuters exclusively reported that an elite group of North Korean hackers had successfully breached systems at NPO Mashinostroyeniya, a rocket design bureau based in Reutov, a small town on the outskirts of Moscow.


As was the case with that hack, APT45 - part of North Korea's Reconnaissance General Bureau intelligence agency - used common phishing techniques and computer exploits to trick officials at the firms they were targeting into giving away access to their internal computer systems, Thursday's advisory said.

Comments

Popular posts from this blog

INNOSON GIVES OUT BRAND NEW IVM G5 AND SALARY FOR LIFE TO THE MAN WHO PROPHESIED ABOUT HIS VEHICLE MANUFACTURING IN 1979.(PHOTO).

SHAKIRA COVERS WOMEN'S HEALTH MAGAZINE,APRIL ISSUE.

AMBODE,SOYINKA & OTHERS AT THE OFFICIAL LAUNCH OF LAGOS AT 50 YEARS ANNIVERSARY AGAINST 2017.{PHOTOS}.