Archinect - News 2024-05-02T09:53:35-04:00 https://archinect.com/news/article/150368666/hackers-are-using-architects-computers-for-crypto-mining-cybersecurity-firm-warns Hackers are using architects’ computers for crypto-mining, cybersecurity firm warns Niall Patrick Walsh 2023-09-08T11:09:00-04:00 >2024-03-15T01:45:58-04:00 <img src="https://archinect.gumlet.io/uploads/de/de526c706d44f41cd448a7b65d3b5210.png?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><p>Cybersecurity firm Cisco Talos <a href="https://blog.talosintelligence.com/cybercriminals-target-graphic-designers-with-gpu-miners/" target="_blank">is warning</a> of the potential for <a href="https://archinect.com/news/tag/730701/cybersecurity" target="_blank">hackers</a> to target architects and other designers with <a href="https://archinect.com/news/tag/1767607/cryptocurrency" target="_blank">crypto-mining</a> malware. The hacking campaign, which has largely targeted French-speaking architects, engineers, and graphic designers, sees the victim&rsquo;s computer infected with malware via installer tools.</p> <p>&ldquo;Cybercriminals are abusing Advanced Installer, a legitimate Windows tool used for creating software packages, to drop cryptocurrency-mining malware on infected machines,&rdquo; Cisco Talos explains.</p> <figure><figure><a href="https://archinect.gumlet.io/uploads/91/91f118ff2a1dfebec9105b9fd6df300d.jpg?auto=compress%2Cformat&amp;w=1028" target="_blank"><img src="https://archinect.gumlet.io/uploads/91/91f118ff2a1dfebec9105b9fd6df300d.jpg?auto=compress%2Cformat&amp;w=514"></a><figcaption>Related on Archinect: <a href="https://archinect.com/news/article/150289975/many-firms-not-capitalizing-on-digital-marketing-or-technology-aia-report-finds" target="_blank">Many firms not capitalizing on digital marketing or technology, AIA report finds</a></figcaption></figure></figure><p>The vulnerability centers on Advanced Installer, a package used in the installations of legitimate software installers such as Adobe Illustrator, Autodesk Revit, and SketchUp. The hackers package such installers with malicious scripts and use Advanced Installer&rsquo;s Custom Actions feature to make the software installers execute the malicious scripts.</p> <p>The resulting malware allows h...</p> https://archinect.com/news/article/150195258/zaha-hadid-architects-hit-with-ransomware-attack Zaha Hadid Architects hit with ransomware attack Antonio Pacheco 2020-04-27T17:18:00-04:00 >2024-01-23T19:16:08-05:00 <img src="https://archinect.gumlet.io/uploads/93/93659f0eff057219ae9779a2a2c1eaf4.png?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><p>Information stolen from the servers of Zaha Hadid Architects (<a href="https://archinect.com/zaha-hadid" target="_blank">ZHA</a>) is being held at ransom by computer hackers.&nbsp;</p> <p><em>The Architect&rsquo;s Journal</em> <a href="https://www.architectsjournal.co.uk/news/zaha-hadid-architects-held-to-ransom-by-cyberhacker/10046940.article" target="_blank">reports</a> that the 348-person, London-based practice has been ensnared by a ransomware attack that has resulted in the loss of some unknown quantity of confidential information.&nbsp;</p> <p>According to the report, ZHA alerted police on Tuesday, April 21st that the attack had taken place after office employees discovered messages from the hackers announcing that information stored on its internal server had been encrypted and would only be returned if the hackers were paid a ransom. According to&nbsp;<em>AJ,</em> instead of communicating with the hackers, ZHA is working with a cyber forensics team to investigate the situation.</p> <p>The architecture firm maintains that the information had been previously backed up and that its work was not under threat, though it is unclear exactly what information was taken. A ZHA spokesperson tells&nbsp;<em>AJ, &ldquo;</em>We immediately worked to secure our networ...</p> https://archinect.com/news/article/149950329/hackers-can-use-the-vibration-motor-in-your-phone-to-eavesdrop-on-you Hackers can use the vibration motor in your phone to eavesdrop on you Nicholas Korody 2016-06-08T15:05:00-04:00 >2016-06-16T00:17:17-04:00 <img src="https://archinect.gumlet.io/uploads/wt/wtz2y8075pk1400h.jpg?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><em><p>Hackers may be pickin&rsquo; up good vibrations from your phone. All the better to surveil you with, my dear. Researchers at the Electrical and Computer Engineering school of the University of Illinois at Urbana-Champaign discovered that the vibration motor in your devices can operate like a microphone, according to the researchers&rsquo; paper. That means, if a hacker rewires your vibration motor (which TechCrunch reported could be executed &ldquo;in a minute or two&rdquo;), they can listen to what you&rsquo;re saying.</p></em><br /><br /><p>In related news:</p><ul><li><p><a href="http://archinect.com/news/article/149950267/university-of-calgary-pays-16k-to-recover-data-held-hostage-by-ransomware-attackers" rel="nofollow" target="_blank">University of Calgary pays $16K to recover data held hostage by ransomware attackers</a></p></li><li><p><a href="http://archinect.com/news/article/147905808/nypd-admits-to-using-stringrays-military-tech-that-sweeps-up-cell-data" rel="nofollow" target="_blank">NYPD admits to using "Stringrays," military tech that sweeps up cell data</a></p></li><li><p><a href="http://archinect.com/news/article/149942421/welcome-to-the-hudson-yards-c-2019-the-world-s-most-ambitious-smart-city-experiment" rel="nofollow" target="_blank">Welcome to the Hudson Yards, c. 2019: the world's most ambitious "smart city" experiment</a></p></li><li><p><a href="http://archinect.com/features/article/149948918/if-houses-had-airplane-modes-an-interview-with-joseph-grima-of-space-caviar" rel="nofollow" target="_blank">If houses had airplane modes: an interview with Joseph Grima of Space Caviar</a></p></li></ul><p><em>The theme for June is&nbsp;<strong><a href="http://archinect.com/news/tag/753896/june-privacy" rel="nofollow" target="_blank">Privacy</a></strong>.&nbsp;</em><em>How has architecture transformed notions of privacy? How have privacy concerns transformed architecture? Submit to our&nbsp;<a href="http://archinect.com/news/article/149947974/open-call-for-submissions-privacy" rel="nofollow" target="_blank">open call</a>&nbsp;by Sunday, June 19!</em></p> https://archinect.com/news/article/149950267/university-of-calgary-pays-16k-to-recover-data-held-hostage-by-ransomware-attackers University of Calgary pays $16K to recover data held hostage by ransomware attackers Nicholas Korody 2016-06-08T13:05:00-04:00 >2016-06-08T13:05:06-04:00 <img src="https://archinect.gumlet.io/uploads/99/99wbtxycd0bk16vd.JPG?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><em><p>Canada's University of Calgary paid almost $16,000 ($20,000 Canadian, ~&pound;10,800) to recover crucial data that has been held hostage for more than a week by crypto ransomware attackers. The ransom was disclosed on Wednesday morning in a statement issued by University of Calgary officials. It said university IT personnel had made progress in isolating the unnamed ransomware infection and restoring affected parts of the university network.</p></em><br /><br /><p><em>"It went on to warn that there's no guarantee paying the controversial ransom will lead to the lost data being recovered."</em></p><p>Attacks with ransomware have become increasingly frequent. As the name suggests, ransomware allows hackers to take computers hostage until the user pays up. The increasing prevalence of bitcoin and other cryptocurrencies has facilitated the rise in such attacks.</p><p>As the University of Calgary's Vice President stated, ""We are conducting world class research daily and we don&rsquo;t know what we don&rsquo;t know in terms of who&rsquo;s been impacted and the last thing we want to do is lose someone&rsquo;s life&rsquo;s work."</p><p>For more on that state of privacy in our digital era, check out these links:</p><ul><li><p><a href="http://archinect.com/features/article/149948918/if-houses-had-airplane-modes-an-interview-with-joseph-grima-of-space-caviar" target="_blank">If houses had airplane modes: an interview with Joseph Grima of Space Caviar</a></p></li><li><p><a href="http://archinect.com/news/article/149949640/casing-the-joint-geoff-manaugh-discusses-his-latest-book-a-burglar-s-guide-to-the-city-on-one-to-one-26" target="_blank">Casing the joint: Geoff Manaugh discusses his latest book, "A Burglar's Guide to the City" on One-to-One #26</a></p></li><li><p><a href="http://archinect.com/news/article/149946045/goodbye-to-public-anonymity-this-new-russian-face-recognition-app-may-spell-its-end" target="_blank">Goodbye to public anonymity? This new Russian face-recognition app may spell its end</a></p></li><li><p><a href="http://archinect.com/news/article/149942421/welcome-to-the-hudson-yards-c-2019-the-world-s-most-ambitious-smart-city-experiment" target="_blank">Welcome to the Hudson Yards, c. 201...</a></p></li></ul> https://archinect.com/news/article/149938165/city-governments-are-learning-the-hard-way-that-there-s-no-one-size-fits-all-approach-to-cybersecurity City governments are learning the hard way that there's no one-size-fits-all approach to cybersecurity Amelia Taylor-Hochberg 2016-04-04T13:09:00-04:00 >2016-04-10T00:07:56-04:00 <img src="https://archinect.gumlet.io/uploads/3w/3wi638n3xd6wyb9y.jpg?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><em><p>Among the toughest cybersecurity challenges cities face are recruiting a skilled workforce, increasing education and training for employees on cyberthreats, and taking steps to ensure utility companies and service providers are protecting public water and electrical systems. [...] Cybersecurity experts say large cities are competing with private companies to recruit and retain skilled workers. Smaller cities, particularly in rural areas, often lack staffing and funds for cybersecurity</p></em><br /><br /><p>More cybersecurity and hacker news on Archinect:</p><ul><li><a title="Hack The City" href="http://archinect.com/news/article/142516207/hack-the-city" rel="nofollow" target="_blank">Hack The City</a></li><li><a title="France moves to block Tor, ban free and public Wi-Fi" href="http://archinect.com/news/article/142821980/france-moves-to-block-tor-ban-free-and-public-wi-fi" rel="nofollow" target="_blank">France moves to block Tor, ban free and public Wi-Fi</a></li><li><a title="Architecture of paranoia" href="http://archinect.com/news/article/125922478/architecture-of-paranoia" rel="nofollow" target="_blank">Architecture of paranoia</a></li><li><a title="Traffic Lights are Easy to Hack" href="http://archinect.com/news/article/107023856/traffic-lights-are-easy-to-hack" rel="nofollow" target="_blank">Traffic Lights are Easy to Hack</a></li><li><a title="When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet" href="http://archinect.com/news/article/78289196/when-smart-homes-get-hacked-i-haunted-a-complete-stranger-s-house-via-the-internet" rel="nofollow" target="_blank">When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet</a></li><li><a title="The New French Hacker-Artist Underground" href="http://archinect.com/news/article/36693009/the-new-french-hacker-artist-underground" rel="nofollow" target="_blank">The New French Hacker-Artist Underground</a></li></ul> https://archinect.com/news/article/107023856/traffic-lights-are-easy-to-hack Traffic Lights are Easy to Hack Nicholas Korody 2014-08-20T18:26:00-04:00 >2014-08-27T18:17:57-04:00 <img src="https://archinect.gumlet.io/uploads/wz/wzncucigwb0avhjm.jpg?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><em><p>In a paper published this month, the researchers describe how they very simply and very quickly seized control of an entire system of almost 100 intersections in an unnamed Michigan city from a single ingress point. The exercise was conducted on actual stoplights deployed at live intersections [...] As is typical in large urban areas, the traffic lights in the subject city are networked ... allowing them to pass information to and receive instruction from a central management point.</p></em><br /><br /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"> <html><head><meta></head></html> https://archinect.com/news/article/106092479/hackers-present-threat-to-internet-of-things Hackers Present Threat to Internet of Things Nicholas Korody 2014-08-08T13:16:00-04:00 >2018-01-30T06:16:04-05:00 <img src="https://archinect.gumlet.io/uploads/tr/trzrjlzulcun20k3.jpg?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><em><p>A hacker with a smartphone can unlock your front door [...] Criminals and intelligence agencies grab data from your home thermostat to plan robberies or track your movements. According to computer-security researchers, this is the troubling future of the Internet of Things, the term for an all-connected world where appliances like thermostats, health-tracking wristbands, smart cars and medical devices communicate with people and each other through the Internet.</p></em><br /><br /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"> <html><head><meta></head></html>