Russian broadcast system Hacked telling citizens to seek shelter and take iodide pills

Russian Hacker Radiation

Revelations 6:3-4 “when he opened the second seal, I heard the second living creature say, “Come!” 4 And out came another horse, bright red. Its rider was permitted to take peace from the earth, so that people should slay one another, and he was given a great sword.

Important Takeaways:

  • Terrified Russians are ordered to take anti-radiation pills and rush to nuclear bomb shelters as TV station servers are HACKED
  • TV and radio programs in Moscow and the Sverdlovsk region, including Yekaterinburg city, were interrupted with an alarming message telling citizens a missile strike had been conducted on Russian soil.
  • The population was urged to take potassium iodide pills, don gas masks to protect themselves and to seek shelter.
  • Hacked screens displayed an ominous map of Russia, gradually covered with red from west to east.
  • A message below in bright yellow stated: ‘Everyone immediately to shelter.’
  • The screen then showed the instantly recognizable black and yellow radiation warning sig
  • Some commentators claimed this could be a ploy by the Kremlin to warn the public to be ready for war as Putin ramps up his rhetoric amid deep tension between east and west over the conflict in Ukraine.
  • There was no immediate claim of responsibility

Read the original article by clicking here.

GiveSendGo has been hacked, 92,000 Freedom Convoy Donors names Leaked

Proverbs 22:8 “Whoever sows injustice will reap calamity, and the rod of his fury will fail.”

Important Takeaways:

  • Hackers Just Leaked the Names of 92,000 ‘Freedom Convoy’ Donors
  • GiveSendGo, the Christian crowdfunding site that helped raise $8.7 million for the anti-vax “freedom convoy” in Canada, was hacked
  • Analysis of the leaked data by extremism researcher Amarnath Amarasingam shows that while the majority of donors come from the U.S. (56%) and Canada (29%), there are also thousands of donations from overseas, including the U.K., Australia, and Ireland.
  • No one has claimed credit for the hack of the GiveSendGo website, but users who visited the site on Sunday evening were redirected instead to GiveSendGone.wtf, where they were greeted by a video from the Disney film Frozen and a message that read:
    • “Attention GiveSendGo grifters and hatriots. You helped fund the January 6th insurrection in the U.S. You helped fund an insurrection in Ottawa. In fact you are committed to fund anything that keeps the raging fire of misinformation going until it burns the world’s collective democracies down. On behalf of sane people worldwide who wish to continue living in a democracy, I am now telling you that GiveSendGo itself is now frozen.”

Read the original article by clicking here.

EU investigates hacked diplomatic communications

A European Union flag is seen outside the EU Commission headquarters in Brussels, Belgium November 14, 2018. REUTERS/Francois Lenoir/File Photo

BRUSSELS (Reuters) – The European Union is investigating a cyber hack of its diplomatic communications, allegedly by Chinese hackers, that revealed EU concern about U.S. Donald Trump, Russia and Iran, the bloc said on Wednesday.

“The Council Secretariat is aware of allegations regarding a potential leak of sensitive information and is actively investigating the issue,” the body that represents EU governments in Brussels said in a statement.

The Secretariat declined to comment further but said it “takes the security of its facilities, including its IT systems, extremely seriously”, referring to concerns about vulnerabilities in its data systems across 28 EU states.

The New York Times reported late on Tuesday that hackers had broken into the EU’s diplomatic communications for years, downloading cables that showed worries about the Trump administration, struggles to deal with Russia and China, and the threat of Iran reviving its nuclear programme.

More than 1,100 cables were supplied to the Times by security firm Area 1 after it discovered the breach, the newspaper said, adding that Area 1 investigators believed the hackers worked for China’s People’s Liberation Army.

The cables include memorandums of conversations with leaders in Saudi Arabia, Israel and other countries that were shared across the European Union, according to the report.

One cable, the Times said, showed European diplomats describing a meeting between U.S. President Donald Trump and Russian counterpart Vladimir Putin in Finland as “successful (at least for Putin)”.

Another, written after a July 16 meeting, relayed a detailed report and analysis of talks between European officials and Chinese President Xi Jinping, who was quoted comparing Trump’s “bullying” of Beijing to a “no-rules freestyle boxing match”.

A third, from March 7, shows Caroline Vicini, the deputy head of the EU mission in Washington, recommending that the trade bloc’s diplomats describe the United States as “our most important partner”, even as it challenged Trump “in areas where we disagreed with the U.S. (e.g., on climate, trade, Iran nuclear deal)”.

The hackers also infiltrated the networks of the United Nations, the American Federation of Labor and Congress of Industrial Organizations (AFL-CIO), and ministries of foreign affairs and finance worldwide, the Times report added.

(Reporting by Rama Venkat in Bengaluru and Robin Emmott in Brussels; editing by Andrew Roche)

Boy, 11, hacks into replica U.S. vote website in minutes at convention

FILE PHOTO: A man takes part in a hacking contest during the Def Con hacker convention in Las Vegas, Nevada, U.S. on July 29, 2017. REUTERS/Steve Marcus/File Photo

(Reuters) – An 11-year-old boy managed to hack into a replica of Florida’s election results website in 10 minutes and change names and tallies during a hackers convention, organizers said, stoking concerns about security ahead of nationwide votes.

The boy was the quickest of 35 children, ages 6 to 17, who all eventually hacked into copies of the websites of six swing states during the three-day Def Con security convention over the weekend, the event said on Twitter on Tuesday.

The event was meant to test the strength of U.S. election infrastructure and details of the vulnerabilities would be passed onto the states, it added.

The National Association of Secretaries of State – who are responsible for tallying votes – said it welcomed the convention’s efforts. But it said the actual systems used by states would have additional protections.

“It would be extremely difficult to replicate these systems since many states utilize unique networks and custom-built databases with new and updated security protocols,” the association said.

The hacking demonstration came as concerns swirl about election system vulnerabilities before mid-term state and federal elections.

U.S President Donald Trump’s national security team warned two weeks ago that Russia had launched “pervasive” efforts to interfere in the November polls.

Participants at the convention changed party names and added as many as 12 billion votes to candidates, the event said.

“Candidate names were changed to ‘Bob Da Builder’ and ‘Richard Nixon’s head’,” the convention tweeted.

The convention linked to what it said was the Twitter account of the winning boy – named there as Emmett Brewer from Austin, Texas.

A screenshot posted on the account showed he had managed to change the name of the winning candidate on the replica Florida website to his own and gave himself billions of votes.

The convention’s “Voting Village” also aimed to expose security issues in other systems such as digital poll books and memory-card readers.

(Reporting by Brendan O’Brien in Milwaukee; Editing by Andrew Heavens)

Russia spied on Skripal and daughter for at least 5 years: UK

Salisbury District Hospital is seen after Yulia Skripal was discharged, in Salisbury, Britain, April 10, 2018. REUTERS/Peter Nicho

LONDON (Reuters) – Russia’s intelligence agencies spied on former double agent Sergei Skripal and his daughter Yulia for at least five years before they were attacked with a nerve agent in March, the national security adviser to Britain’s prime minister said.

Mark Sedwill said in a letter to NATO Secretary General Jens Stoltenberg on Friday that email accounts of Yulia had been targeted in 2013 by cyber specialists from Russia’s GRU military intelligence service.

Sedwill also said in the letter, which was published by the government, that it was “highly likely that the Russian intelligence services view at least some of its defectors as legitimate targets for assassination.”

The Skripals were targeted by what London says was a nerve agent attack that left both of them critically ill for weeks. British Prime Minister Theresa May has said it is highly likely that Moscow was behind the attack.

Russian Foreign Minister Sergei Lavrov noted on Friday that a report this week by the Organisation for the Prohibition of Chemical Weapons (OPCW) did not confirm the origin of the poison used against the Skripals.

Lavrov said the report only confirmed the composition of the substance and that Britain’s claim that it confirmed the UK position on the Skripal case was overstated.

Separately on Friday, Russia’s ambassador to Britain said he was concerned the British government was trying to get rid of evidence related to the case.

“We get the impression that the British government is deliberately pursuing the policy of destroying all possible evidence, classifying all remaining materials and making an independent and transparent investigation impossible,” Alexander Yakovenko told reporters.

He also said Russia could not be sure about the authenticity of a statement issued by Yulia Skripal on Wednesday in which she declined the offer of help from the Russian embassy.

(Reporting by Kate Holton; Writing by William Schomberg and Elisabeth O’Leary; Editing by Stephen Addison)

How the families of 10 massacred Rohingya fled Myanmar

Rehana Khatun, whose husband Nur Mohammed was among 10 Rohingya men killed by Myanmar security forces and Buddhist villagers on September 2, 2017, poses for a picture with her child at Kutupalong camp in Cox's Bazar, Bangladesh, March 25, 2018. Picture taken March 25, 2018. REUTERS/Mohammad Ponir Hossain

By Andrew R.C. Marshall

KUTUPALONG REFUGEE CAMP, Bangladesh (Reuters) – Rehana Khatun dreamed her husband came home. He appeared without warning in their village in western Myanmar, outside their handsome wooden house shaded by mango trees. “He didn’t say anything,” she said. “He was only there for a few seconds, and then he was gone.” Then Rehana Khatun woke up.

She woke up in a shack of ragged tarpaulin on a dusty hillside in Bangladesh. Her husband, Nur Mohammed, is never coming home. He was one of 10 Rohingya Muslim men massacred last September by Myanmar soldiers and Rakhine Buddhists at the coastal village of Inn Din.

Rehana Khatun’s handsome wooden house is gone, too. So is everything in it. The Rohingya homes in Inn Din were burned to the ground, and what was once a close-knit community, with generations of history in Myanmar, is now scattered across the world’s largest refugee camp in Bangladesh.

A Reuters investigation in February revealed what happened to the 10 Rohingya men. On September 1, soldiers snatched them from a large group of Rohingya villagers detained by a beach near Inn Din. The next morning, according to eyewitnesses, the men were shot by the soldiers or hacked to death by their Rakhine Buddhist neighbors. Their bodies were dumped in a shallow grave.

The relatives the 10 men left behind that afternoon wouldn’t learn of the killings for many months – in some cases, not until Reuters reporters tracked them down in the refugee camps and told them what had happened. The survivors waited by the beach with rising anxiety and dread as the sun set and the men didn’t return.

This is their story. Three of them fled Inn Din while heavily pregnant. All trekked north in monsoon rain through forests and fields. Drenched and terrified, they dodged military patrols and saw villages abandoned or burning. Some saw dead bodies. They walked for days with little food or water.

They were not alone. Inn Din’s families joined nearly 700,000 Rohingya escaping a crackdown by the Myanmar military, launched after attacks by Rohingya militants on August 25. The United Nations called it “a textbook example of ethnic cleansing,” which Myanmar has denied.

On Tuesday, the military said it had sentenced seven soldiers to long prison terms for their role in the Inn Din massacre. Myanmar government spokesman Zaw Htay told Reuters the move was a “very positive step” that showed the military “won’t give impunity for those who have violated the rules of engagement.” Myanmar, he said, doesn’t allow systematic human rights abuses.

Reuters was able to corroborate many but not all details of the personal accounts in this story.

The Rohingya streamed north until they reached the banks of the Naf River. On its far shore lay Bangladesh, and safety. Many Inn Din women gave boatmen their jewelry to pay for the crossing; others begged and fought their way on board. They made the perilous crossing at night, vomiting with sickness and fear.

Now in Bangladesh, they struggle to piece together their lives without husbands, fathers, brothers and sons. Seven months have passed since the massacre, but the grief of Inn Din’s survivors remains raw. One mother told Reuters her story, then fainted.

Like Rehana Khatun, they all say they dream constantly about the dead. Some dreams are bittersweet – a husband coming home, a son praying in the mosque – and some are nightmares. One woman says she sees her husband clutching a stomach wound, blood oozing through his fingers.

Daytime brings little relief. They all remember, with tormenting clarity, the day the soldiers took their men away.

“ALLAH SAVED ME”

Abdul Amin still wonders why he was spared.

Soldiers had arrived at Inn Din on August 27 and started torching the houses of Rohingya residents with the help of police and Rakhine villagers. Amin, 19, said he and his family sought refuge in a nearby forest with more than a hundred other Rohingya.

Four days later, as Inn Din burned and the sound of gunfire crackled through the trees, they made a dash for the beach, where hundreds of villagers gathered in the hope of escaping the military crackdown. Then the soldiers appeared, said Amin, and ordered them to squat with their heads down.

Amin crouched next to his mother, Nurasha, who threw her scarf over his head. The soldiers ignored Amin, perhaps mistaking him for a woman, but dragged away his brother Shaker Ahmed. “I don’t know why they chose him and not me,” Amin said. “Allah saved me.”

The soldiers, according to Amin and other witnesses, said they were taking the men away for a “meeting.” Their distraught families waited by the beach in vain. As night fell, they returned to the forest where, in the coming days, they made the decision that haunts many of them still: to save themselves and their families by fleeing to Bangladesh – and leaving the captive men behind.

Abdu Shakur waited five days for the soldiers to release his son Rashid Ahmed, 18. By then, most Rohingya had set out for Bangladesh and the forest felt lonely and exposed. Abdu Shakur said he wanted to leave, too, but his wife, Subiya Hatu, refused.

“I won’t go without my son,” she said.

“You must come with me,” he said. “If we stay here, they’ll kill us all.” They had three younger children to bring to safety, he told her. Rashid was their oldest, a bright boy who loved to study; he would surely be released soon and follow them. He didn’t. Rashid was one of the 10 killed in the Inn Din massacre.

“We did the right thing,” says Abdu Shakur today, in a shack in the Kutupalong camp. “I feel terrible, but we had to leave that place.” As he spoke, his wife sat behind him and sobbed into her headscarf.

“DAY OF JUDGMENT”

By now, the northward exodus was gathering pace. The Rohingya walked in large groups, sometimes thousands strong, stretching in ragged columns along the wild Rakhine coastline. At night, the men stood guard while women and children rested beneath scraps of tarpaulin. Rain often made sleep impossible.

Amid this desperate throng was Shaker Ahmed’s wife, Rahama Khatun, who was seven months pregnant, and their eight children, aged one to 18. Like many Rohingya, they had escaped Inn Din with little more than the clothes they wore. “We brought nothing from the house, not even a single plate,” she said.

They survived the journey by drinking from streams and scrounging food from other refugees. Rahama said she heaved herself along slippery paths as quickly as she could. She was scared about the health of her unborn child, but terrified of getting left behind.

Rahama’s legs swelled up so much that she couldn’t walk. “My children carried me on their shoulders. They said, ‘We’ve lost our father. We don’t want to lose you.'” Then they reached the beach at Na Khaung To, and a new ordeal began.

Na Khaung To sits on the Myanmar side of the Naf River. Bangladesh is about 6 km (4 miles) away. For Rohingya from Inn Din and other coastal villages, Na Khaung To was the main crossing point.

It was also a bottleneck. There were many Bangladeshi fishing boats to smuggle Rohingya across the river, but getting on board depended on the money or valuables the refugees could muster and the mercy of the boatmen. Some were stranded at Na Khaung To for weeks.

The beach was teeming with sick, hungry and exhausted people, recalled Nurjan, whose son Nur Mohammed was one of the 10 men killed at Inn Din. “Everyone was desperate,” Nurjan said. “All you could see was heads in every direction. It was like the Day of Judgment.”

CROSSING THE NAF

Bangladesh was perhaps a two-hour ride across calm estuarine waters. But the boatmen wanted to avoid any Bangladesh navy or border guard vessels that might be patrolling the river. So they set off at night, taking a more circuitous route through open ocean. Most boats were overloaded. Some sank in the choppy water, drowning dozens of people.

The boatmen charged about 8,000 taka (about $100) per person. Some women paid with their earrings and nose-rings. Others, like Abdu Shakur, promised to reimburse the boatman upon reaching Bangladesh with money borrowed from relatives there.

He and his wife, Subiya Hatu, who had argued over leaving their oldest son behind at Inn Din, set sail for Bangladesh. Another boat of refugees sailed along nearby. Both vessels were heaving with passengers, many of them children.

In deeper water, Abdu Shakur watched with horror as the other boat began to capsize, spilling its passengers into the waves. “We could hear people crying for help,” he said. “It was impossible to rescue them. Our boat would have sunk, too.”

Abdu Shakur and his family made it safely to Bangladesh. So did the other families bereaved by the Inn Din massacre. During the crossing, some realized they would never see their men again, or Myanmar.

Shuna Khatu wept on the boat. She felt she already knew what the military had done to her husband, Habizu. She was pregnant with their third child. “They killed my husband. They burned my house. They destroyed our village,” she said. “I knew I’d never go back.”

THE ONLY PHOTO

Two months later, in a city-sized refugee camp in Bangladesh, Shuna Khatu gave birth to a boy. She called him Mohammed Sadek.

Rahama Khatun, who fled Myanmar on the shoulders of her older children while seven months pregnant, also had a son. His name is Sadikur Rahman.

The two women were close neighbors in Inn Din. They now live about a mile apart in Kutupalong-Balukhali, a so-called “mega-camp” of about 600,000 souls. Both survive on twice-a-month rations of rice, lentils and cooking oil. They live in flimsy, mud-floored shacks of bamboo and plastic that the coming monsoon could blow or wash away.

It was here, as the families struggled to rebuild their lives, that they learned their men were dead. Some heard the news from Reuters reporters who had tracked them down. Others saw the Reuters investigation of the Inn Din massacre or the photos that accompanied it.

Two of those photos showed the men kneeling with their hands behind their backs or necks. A third showed the men’s bodies in a mass grave. The photos were obtained by Reuters reporters Wa Lone and Kyaw Soe Oo, who were arrested in December while investigating the Inn Din massacre. The two face charges, and potentially 14-year jail sentences, under Myanmar’s Official Secrets Act.

Rahama Khatun cropped her husband’s image from one of the photos and laminated it. This image of him kneeling before his captors is the only one she has. Every other family photo was burned along with their home at Inn Din.

For the Rohingya crisis in graphics, click http://fingfx.thomsonreuters.com/gfx/rngs/MYANMAR-ROHINGYA/010051VC46K/index.html

(Reporting by Andrew R.C. Marshall. Edited by Peter Hirschberg.)

Saks, Lord & Taylor hit by payment card data breach

The Lord & Taylor flagship store building is seen along Fifth Avenue in the Manhattan borough of New York City, U.S., October 24, 2017. REUTERS/Shannon Stapleton

By Jim Finkle and David Henry

TORONTO/NEW YORK (Reuters) – Retailer Hudson’s Bay Co on Sunday disclosed that it was the victim of a security breach that compromised data on payment cards used at Saks and Lord & Taylor stores in North America.

One cyber security firm said that it has evidence that millions of cards may have been compromised, which would make the breach one of the largest involving payment cards over the past year, but added that it was too soon to confirm whether that was the case.

Toronto-based Hudson’s Bay said in a statement that it had “taken steps to contain” the breach but did not say it had succeeded in confirming that its network was secure. It also did not say when the breach had begun or how many payment card numbers were taken.

“Once we have more clarity around the facts, we will notify our customers quickly and will offer those impacted free identity protection services, including credit and web monitoring,” the statement said.

A company spokeswoman declined to elaborate.

The breach comes as Hudson’s Bay struggles to improve its financial performance as a tough retail environment has weighed on sales and margins. Last June, it launched a transformation plan to cut costs and is working to monetize the value of its substantial real estate holdings.

Hudson’s Bay disclosed the incident after New York-based cyber security firm Gemini Advisory reported on its blog that Saks and Lord & Taylor had been hacked by a well-known criminal group known as JokerStash.

JokerStash, which sells stolen data on the criminal underground, on Wednesday said that it planned to release more than 5 million stolen credit cards, according to Gemini Chief Technology Officer Dmitry Chorine.

The hacking group has so far released about 125,000 payment cards, about 75 percent of which appear to have been taken from the Hudson’s Bay units, Chorine told Reuters by telephone.

The bulk of the 5 million card numbers that JokerStash said it plans to release are likely from Saks and Lord & Taylor, but it is too early to say for sure, Chorine said.

“It’s hard to assess at the moment, primarily because hackers have not released the entire cards in one batch,” he told Reuters.

Alex Holden, chief information security officer with cyber security firm Hold Security, confirmed that the 125,000 cards had been released by JokerStash but said it was too soon to estimate how many had been taken from Hudson’s Bay.

If in fact millions of records were stolen, the breach would be one of the largest involving payment cards in the past year, but it would still be far smaller than any of the biggest thefts on record, which occurred a decade ago.

Hackers stole more than 130 million credit cards from credit-card processor Heartland Payment Systems, convenience store operator 7-Eleven Inc and grocer Hannaford Brothers Co, from 2006 to 2008, according to U.S. federal investigators.

Cyber criminals stole some 40 million payment cards in a 2013 hack on Target Corp and 56 million from Home Depot Inc in 2014.

Hudson’s Bay said there is no indication its recent breach involved online sales at Saks and Lord &Taylor outlets or its Hudson’s Bay, Home Outfitters and HBC Europe units.

The company said that customers will not be liable for fraudulent charges resulting from the breach.

(Reporting by Jim Finkle in Toronto and David Henry in New York; Editing by Bill Rigby and Steve Orlofsky)

North Korean hackers behind attacks on cryptocurrency exchanges

A coin representing the bitcoin cryptocurrency is seen on computer circuit boards in this illustration picture

SEOUL (Reuters) – South Korea’s spy agency said North Korean hackers were behind attacks on cryptocurrency exchanges this year in which some 7.6 billion won ($6.99 million) worth of cryptocurrencies were stolen, a newspaper reported on Saturday.

The cyber attacks attributed to North Korean hackers also included the leaking of personal information from 36,000 accounts from the world’s busiest cryptocurrency exchange Bitthumb in June, South Korea’s Chosun Ilbo reported, citing the country’s National Intelligence Service (NIS).

Attacks also included the theft of cryptocurrencies from accounts at exchanges Yapizon, now called Youbit, and Coinis in April and September, it said.

The 7.6 billion won of stolen cryptocurrencies are now worth about 90 billion won ($82.7 million), Chosun Ilbo reported. It also cited the NIS as saying North Korean hackers had also demanded 6 billion won ($5.5 million) from Bitthumb in return for deleting the leaked personal information.

Another cyber attack on about 10 cryptocurrency exchanges by North Korean hackers in October, using emails containing malware, was thwarted by the Korea Internet Security Agency (KISA), the newspaper reported.

The NIS found that the malware used in hacking the exchanges was made with the same method as malware used in hacking Sony Pictures and the central bank of Bangladesh in 2014 and 2016 respectively, the Chosun Ilbo reported.

The NIS also said emails used in the attacks used North Korean internet addresses, according to the Chosun Ilbo.

The NIS declined to comment. Representatives for KISA, Bitthumb, Youbit and Coinis could not be reached for comment.

($1 = 1,087.9500 won)

(Reporting by Joyce Lee and Heekyong Yang; Editing by Paul Tait)

China to recall up to 10,000 webcams after U.S. Hack

A hand is silhouetted in front of a computer screen in this picture illustration.

By Sijia Jiang

HONG KONG (Reuters) – A recall of webcams linked to a major cyber attack in the United States last week will involve up to 10,000 of the compromised devices, Chinese manufacturer Hangzhou Xiongmai Technology Co told Reuters on Tuesday.

Xiongmai said it would recall some surveillance cameras sold in the U.S. on Monday after security researchers identified they had been targeted in the attack, which rendered Twitter, Spotify and dozens of other major websites unavailable.

Friday’s cyber attack alarmed security experts because it represented a new type of threat rooted in the proliferation of simple devices such as webcams which often lack proper security.

Hackers found a way to harness hundreds of thousands of them globally to flood a target with so much traffic that it couldn’t cope, cutting access to some of the world’s best known websites.

The disruptions come at a time of unprecedented fears about the cyber threat in the United States, where hackers have breached political organizations and election agencies.

Liu Yuexin, Xiongmai’s marketing director, told Reuters the company would recall the first few batches of surveillance cameras made in 2014 that monitor rooms or shops for personal, rather than industrial, use.

Xiongmai had now fixed loopholes in earlier products, prompting users to change default passwords and having telnet access blocked, Liu said. He declined to give an exact number of vulnerable devices, but estimated it at less than 10,000.

Devices using the firm’s components in China and elsewhere were unlikely to suffer from similar attacks because they were more frequently used for industrial purposes and within more secure intranet networks, he added.

“The reason why there has been such a massive attack in the U.S. and (one) is not likely going to be in China is that most of our products in China are industrial devices used within a closed intranet only,” Liu said.

“Those in the U.S. are consumer devices exposed in the public domain,” he added.

Liu said surveillance cameras with core modules made by Xiongmai were widely used for banks, shops and housing estate surveillance in China. The firm is a “top three supplier” in China, he said, but declined to name specific clients.

Beyond the recall, Liu added the firm may take measures to enhance the safety of its products by migrating to safer operating systems and adding further encryption.

“Internet of Things (IoT) devices have been subject to cyber attacks because they are mostly based on the Linux open source system,” he said. “Our department had been looking to develop products based on other systems since 2015 and plan to do more in the future.”

(Editing by Adam Jourdan and Alexander Smith)

Senators accuse Yahoo of ‘unacceptable’ delay in hack discovery

Yahoo CEO Marissa Mayer delivers her keynote address at the annual Consumer Electronics Show (CES) in Las Vegas, Nevada

By Dustin Volz

WASHINGTON (Reuters) – Six Democratic U.S. senators on Tuesday said it was “unacceptable” that Yahoo only last week announced a 2014 hack into 500 million user accounts and asked embattled CEO Marissa Mayer for more information about the company’s investigation into the data breach.

The lawmakers said they were “disturbed” the two-year-old intrusion was detected so long after the hack occurred.

“That means millions of Americans’ data may have been compromised for two years,” the senators wrote in a joint letter addressed to Mayer. “This is unacceptable.”

Yahoo did not immediately respond to a request for comment about the letter.

Yahoo has faced mounting questions about exactly when it knew about the 2014 cyber attack that exposed the email credentials of users, a critical issue for the company as it seeks to prevent the breach from affecting a pending takeover of its core business by Verizon Inc.

The internet firm has said it detected the breach this summer after conducting a security review prompted by an unrelated hack claim that turned out to be meritless. Yahoo has not given a precise timeline explaining when it was made aware of the 2014 attack, or if it knew of the breach before announcing the deal with Verizon in late July.

The senators requested a briefing from Yahoo to explain the company’s investigation into the breach, its cooperation with law enforcement and national security authorities, and plans to protect affected users.

The letter was signed by Senators Patrick Leahy, Al Franken, Elizabeth Warren, Richard Blumenthal, Ron Wyden and Edward Markey.

The senators asked Mayer for a timeline of the hack and its discovery and how such a large breach went undetected for so long. They also asked what Yahoo was doing to prevent another breach in the future, if the company has changed its security protocols, and whether the U.S. government had warned of a possible hacking attempt.

The letter came a day after Democratic Senator Mark Warner asked the U.S. Securities and Exchange Commission to investigate whether Yahoo and its senior executives fulfilled obligations to inform investors and the public about the hacking attack, which Yahoo has blamed on a “state-sponsored actor.”

(Reporting by Dustin Volz; Editing by Chizu Nomiyama and Andrew Hay)