Andy Greenberg

10.1K Followers
179 Following
679 Posts
Writer for WIRED. Author of SANDWORM. New book, TRACERS IN THE DARK: The Global Hunt for the Crime Lords of Cryptocurrency, out now. [email protected]
Website:https://andygreenberg.net/
WIRED page:https://www.wired.com/author/andy-greenberg/
Birdsite:https://twitter.com/a_greenberg
Bluesky:@agreenberg.bksy.social
Feds just took down 4 botnets, including the Aisuru and Kimwolf botnets that carried out record-breaking DDOS attacks peaking at 30+ terabits per second, nearly three times the previous record. DOJ says the botnets had hijacked more than three million devices. https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/
US Takes Down Botnets Used in Record-Breaking Cyberattacks

The Aisuru, Kimwolf, JackSkid, and Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.

WIRED
This tool has already been used in distinct hacking campaigns against Ukrainians, Malaysians, Saudi and Turkish victims. If other hackers needed any more encouragement to adopt it, too, the Russian spies who used it left it fully unobfuscated with helpful code comments legible.

A second iOS exploit has been found in the wild, again used by Russian spies to infect websites and hack visitors' iPhones. This one works on iOS 18, and appeared in a very reusable form, so will likely proliferate.

If you haven't updated your iPhone, now's the time. https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites.

WIRED
With its breach of med tech firm Stryker, Iranian hacker group Handala has become the most prominent face of the regime's attempts at retaliatory cyberattacks. We dug into who's behind the group—named after a Palestinian cartoon character—its tactics, and its history. https://www.wired.com/story/handala-hacker-group-iran-us-israel-war/
How ‘Handala’ Became the Face of Iran’s Hacker Counterattacks

Amid a paralyzing breach of medical tech firm Stryker, the group has come to represent Iran's use of “hacktivism” as cover for chaotic, retaliatory state-sponsored cyberattacks.

WIRED
Good reporting by
@lorenzofb to confirm what we reported as a theory last week: That the highly sophisticated iPhone hacking toolkit known as Coruna, found in the hands of Russian spies and now criminal hackers, is an out-of-control US-government-funded creation. https://techcrunch.com/2026/03/09/an-iphone-hacking-toolkit-used-by-russian-spies-likely-came-from-u-s-military-contractor/
The mystery of a globetrotting iPhone-hacking toolkit

Tools used in a series of hacking campaigns by hackers in Russia, Ukraine, and China may have originated inside U.S. government contractor L3Harris, TechCrunch has learned.

TechCrunch

Hacking internet-connected civilian security cameras for recon has become a standard operating procedure of modern warfare. First for Russia and Ukraine, now for Israel and Iran.

Your insecure internet-of-things surveillance system is now their targeting system. https://www.wired.com/story/from-ukraine-to-iran-hacking-security-cameras-is-now-part-of-wars-playbook/

From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’

New research shows hundreds of attempts by apparent Iranian state hackers to hijack consumer-grade cameras, timed to missile and drone strikes. Israel, Russia, and Ukraine have also adopted this trick.

WIRED
Some very interesting "opinions" from @riskybusiness about this story here: https://youtu.be/4MwR6dRixJo?t=840
Risky Business (827): Iranian cyber threat actors are down but not out

YouTube
Senator Ron Wyden and Rep. Shontel Brown are calling for an investigation into the vulnerability of modern computers to what the NSA calls TEMPEST: spy techniques that pick up devices' accidental electromagnetic/radio/acoustic emissions to learn their secrets. https://www.wired.com/story/how-vulnerable-are-computers-to-an-80-year-old-spy-technique-congress-wants-answers/
How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

A pair of US lawmakers are calling for an investigation into how easily spies can steal information based on devices’ electromagnetic and acoustic leaks—a spying trick the NSA once codenamed TEMPEST.

WIRED
A full iOS exploitation toolkit, "Coruna," has been found in the wild, hacking iPhones that visited infected websites, used by Russian spies targeting Ukrainians and thieves targeting Chinese crypto holders. And it may have been originally created for the US government. https://www.wired.com/story/coruna-iphone-hacking-toolkit-us-government/
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.

WIRED

The FBI secretly controlled a staffer at a dark web drug market that did $100 million in sales. The informant allegedly approved the sale of drugs even after warnings they contained fentanyl—including dealers whose pills led to a confirmed overdose death.

https://www.wired.com/story/an-fbi-asset-helped-run-a-dark-web-site-that-sold-fentanyl-laced-drugs-for-years/

An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years

A staffer of the Incognito dark web market was secretly controlled by the FBI—and still allegedly approved the sale of fentanyl-tainted pills, including those from a dealer linked to a confirmed death.

WIRED