/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

The UK and the US identify “Cyclops Blink”, botnet malware tied to the Russian-backed Sandworm hacking group that has been circulating for almost three years

The Russian government's Sandworm group uses previously unseen Cyclops Blink.  —  Hackers for one of Russia's …

Ars Technica Dan Goodin

Discussion

  • @ncsc @ncsc on x
    New Sandworm malware Cyclops Blink replaces VPNFilter https://www.ncsc.gov.uk/...
  • @nsa_csdirector Rob Joyce on x
    Cyclops Blink has been targeting devices since 2019. Reboots and updates alone won't remove the #malware, but our joint advisory shares resources to help. @NCSC, @FBI, @CISAgov and @NSAgov #teamwork https://twitter.com/...
  • @arstechnica @arstechnica on x
    Hackers for one of Russia's most brazen spy agencies have infected home and small-office network devices around the world with previously unseen malware. https://arstechnica.com/...
  • @campuscodi Catalin Cimpanu on x
    Officials said the malware is a “replacement” for VPNFilter, another RU botnet the FBI sinkholed in May 2018 -Report comes as Russia prepares to invade Ukraine, where cyberattacks are expected to be used as cover -Removing the malware is not simple, per: https://twitter.com/...