class Akismet_REST_API { /** * Register the REST API routes. */ public static function init() { if ( ! function_exists( 'register_rest_route' ) ) { // The REST API wasn't integrated into core until 4.4, and we support 4.0+ (for now). return false; } register_rest_route( 'akismet/v1', '/key', array( array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_key' ), ), array( 'methods' => WP_REST_Server::EDITABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'set_key' ), 'args' => array( 'key' => array( 'required' => true, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_key' ), 'description' => __( 'A 12-character Akismet API key. Available at akismet.com/get/', 'akismet' ), ), ), ), array( 'methods' => WP_REST_Server::DELETABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'delete_key' ), ) ) ); register_rest_route( 'akismet/v1', '/settings/', array( array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_settings' ), ), array( 'methods' => WP_REST_Server::EDITABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'set_boolean_settings' ), 'args' => array( 'akismet_strictness' => array( 'required' => false, 'type' => 'boolean', 'description' => __( 'If true, Akismet will automatically discard the worst spam automatically rather than putting it in the spam folder.', 'akismet' ), ), 'akismet_show_user_comments_approved' => array( 'required' => false, 'type' => 'boolean', 'description' => __( 'If true, show the number of approved comments beside each comment author in the comments list page.', 'akismet' ), ), ), ) ) ); register_rest_route( 'akismet/v1', '/stats', array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_stats' ), 'args' => array( 'interval' => array( 'required' => false, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_interval' ), 'description' => __( 'The time period for which to retrieve stats. Options: 60-days, 6-months, all', 'akismet' ), 'default' => 'all', ), ), ) ); register_rest_route( 'akismet/v1', '/stats/(?P[\w+])', array( 'args' => array( 'interval' => array( 'description' => __( 'The time period for which to retrieve stats. Options: 60-days, 6-months, all', 'akismet' ), 'type' => 'string', ), ), array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'privileged_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_stats' ), ) ) ); register_rest_route( 'akismet/v1', '/alert', array( array( 'methods' => WP_REST_Server::READABLE, 'permission_callback' => array( 'Akismet_REST_API', 'remote_call_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'get_alert' ), 'args' => array( 'key' => array( 'required' => false, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_key' ), 'description' => __( 'A 12-character Akismet API key. Available at akismet.com/get/', 'akismet' ), ), ), ), array( 'methods' => WP_REST_Server::EDITABLE, 'permission_callback' => array( 'Akismet_REST_API', 'remote_call_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'set_alert' ), 'args' => array( 'key' => array( 'required' => false, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_key' ), 'description' => __( 'A 12-character Akismet API key. Available at akismet.com/get/', 'akismet' ), ), ), ), array( 'methods' => WP_REST_Server::DELETABLE, 'permission_callback' => array( 'Akismet_REST_API', 'remote_call_permission_callback' ), 'callback' => array( 'Akismet_REST_API', 'delete_alert' ), 'args' => array( 'key' => array( 'required' => false, 'type' => 'string', 'sanitize_callback' => array( 'Akismet_REST_API', 'sanitize_key' ), 'description' => __( 'A 12-character Akismet API key. Available at akismet.com/get/', 'akismet' ), ), ), ) ) ); } /** * Get the current Akismet API key. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function get_key( $request = null ) { return rest_ensure_response( Akismet::get_api_key() ); } /** * Set the API key, if possible. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function set_key( $request ) { if ( defined( 'WPCOM_API_KEY' ) ) { return rest_ensure_response( new WP_Error( 'hardcoded_key', __( 'This site\'s API key is hardcoded and cannot be changed via the API.', 'akismet' ), array( 'status'=> 409 ) ) ); } $new_api_key = $request->get_param( 'key' ); if ( ! self::key_is_valid( $new_api_key ) ) { return rest_ensure_response( new WP_Error( 'invalid_key', __( 'The value provided is not a valid and registered API key.', 'akismet' ), array( 'status' => 400 ) ) ); } update_option( 'wordpress_api_key', $new_api_key ); return self::get_key(); } /** * Unset the API key, if possible. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function delete_key( $request ) { if ( defined( 'WPCOM_API_KEY' ) ) { return rest_ensure_response( new WP_Error( 'hardcoded_key', __( 'This site\'s API key is hardcoded and cannot be deleted.', 'akismet' ), array( 'status'=> 409 ) ) ); } delete_option( 'wordpress_api_key' ); return rest_ensure_response( true ); } /** * Get the Akismet settings. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function get_settings( $request = null ) { return rest_ensure_response( array( 'akismet_strictness' => ( get_option( 'akismet_strictness', '1' ) === '1' ), 'akismet_show_user_comments_approved' => ( get_option( 'akismet_show_user_comments_approved', '1' ) === '1' ), ) ); } /** * Update the Akismet settings. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function set_boolean_settings( $request ) { foreach ( array( 'akismet_strictness', 'akismet_show_user_comments_approved', ) as $setting_key ) { $setting_value = $request->get_param( $setting_key ); if ( is_null( $setting_value ) ) { // This setting was not specified. continue; } // From 4.7+, WP core will ensure that these are always boolean // values because they are registered with 'type' => 'boolean', // but we need to do this ourselves for prior versions. $setting_value = Akismet_REST_API::parse_boolean( $setting_value ); update_option( $setting_key, $setting_value ? '1' : '0' ); } return self::get_settings(); } /** * Parse a numeric or string boolean value into a boolean. * * @param mixed $value The value to convert into a boolean. * @return bool The converted value. */ public static function parse_boolean( $value ) { switch ( $value ) { case true: case 'true': case '1': case 1: return true; case false: case 'false': case '0': case 0: return false; default: return (bool) $value; } } /** * Get the Akismet stats for a given time period. * * Possible `interval` values: * - all * - 60-days * - 6-months * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function get_stats( $request ) { $api_key = Akismet::get_api_key(); $interval = $request->get_param( 'interval' ); $stat_totals = array(); $response = Akismet::http_post( Akismet::build_query( array( 'blog' => get_option( 'home' ), 'key' => $api_key, 'from' => $interval ) ), 'get-stats' ); if ( ! empty( $response[1] ) ) { $stat_totals[$interval] = json_decode( $response[1] ); } return rest_ensure_response( $stat_totals ); } /** * Get the current alert code and message. Alert codes are used to notify the site owner * if there's a problem, like a connection issue between their site and the Akismet API, * invalid requests being sent, etc. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function get_alert( $request ) { return rest_ensure_response( array( 'code' => get_option( 'akismet_alert_code' ), 'message' => get_option( 'akismet_alert_msg' ), ) ); } /** * Update the current alert code and message by triggering a call to the Akismet server. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function set_alert( $request ) { delete_option( 'akismet_alert_code' ); delete_option( 'akismet_alert_msg' ); // Make a request so the most recent alert code and message are retrieved. Akismet::verify_key( Akismet::get_api_key() ); return self::get_alert( $request ); } /** * Clear the current alert code and message. * * @param WP_REST_Request $request * @return WP_Error|WP_REST_Response */ public static function delete_alert( $request ) { delete_option( 'akismet_alert_code' ); delete_option( 'akismet_alert_msg' ); return self::get_alert( $request ); } private static function key_is_valid( $key ) { $response = Akismet::http_post( Akismet::build_query( array( 'key' => $key, 'blog' => get_option( 'home' ) ) ), 'verify-key' ); if ( $response[1] == 'valid' ) { return true; } return false; } public static function privileged_permission_callback() { return current_user_can( 'manage_options' ); } /** * For calls that Akismet.com makes to the site to clear outdated alert codes, use the API key for authorization. */ public static function remote_call_permission_callback( $request ) { $local_key = Akismet::get_api_key(); return $local_key && ( strtolower( $request->get_param( 'key' ) ) === strtolower( $local_key ) ); } public static function sanitize_interval( $interval, $request, $param ) { $interval = trim( $interval ); $valid_intervals = array( '60-days', '6-months', 'all', ); if ( ! in_array( $interval, $valid_intervals ) ) { $interval = 'all'; } return $interval; } public static function sanitize_key( $key, $request, $param ) { return trim( $key ); } } US authorities suspect China of involvement in cyberattack on 60 thousand American organizations - Novichok (Moscow) Times
Sunday, November 9, 2025
  • Login
No Result
View All Result
NEWSLETTER
Novichok (Moscow) Times
Social icon element need JNews Essential plugin to be activated.
  • Home
  • CARTOONS
  • UKRAINE
    • KYIV POST
    • Pravda
  • BELLINGCAT
  • THE INSIDER
  • NAVALNY
  • Home
  • CARTOONS
  • UKRAINE
    • KYIV POST
    • Pravda
  • BELLINGCAT
  • THE INSIDER
  • NAVALNY
No Result
View All Result
Novichok (Moscow) Times

US authorities suspect China of involvement in cyberattack on 60 thousand American organizations

by novichoktimes
July 19, 2021
in THE INSIDER
0
US authorities suspect China of involvement in cyberattack on 60 thousand American organizations

[ad_1]

The White House believes that cybercriminals associated with the Ministry of State Security of the People’s Republic of China are behind the March cyberattack through a vulnerability in Microsoft’s Exchange Server software. At least 60,000 American organizations were affected by the cyberattack. With accusations against Beijing spoke at a briefing Sunday evening, a senior Washington administration official.

According to her, the US authorities, together with allies and partners “with a high degree of confidence” in their conclusions are ready to officially attribute “malicious cyber campaign using zero-day vulnerabilities (vulnerabilities that have not yet been fixed) in Microsoft Exchange Server <... > cybercriminals associated with the Ministry of State Security of the People’s Republic of China ”.

According to the American official, the Chinese Ministry of State Security “deliberately uses contract cybercriminals to conduct unauthorized cyber operations around the world.” She added that this tactic “surprised” the American side.

“We have expressed our concern to high-ranking officials of the PRC government as to the incident with [ПО] Microsoft and the relatively wider [спектра] malicious activities of the PRC in cyberspace, making it clear that the PRC’s actions threaten the security, confidence and stability in cyberspace. The United States, our allies and partners do not rule out further actions to bring China to justice, ”she said.

In early March, at least 60 thousand organizations and companies in the United States were hacked due to vulnerabilities in Microsoft Exchange Server. The attack resulted in the spread of a ransomware virus. The American administration was unable to immediately name those who, it believes, are responsible for the cyberattack. Since then, Microsoft has become one of the main recipients of US government assistance to improve the security of computer networks in the country.

According to a spokeswoman for the US leadership, the PRC Department of State Security is using contract cybercriminals to conduct unauthorized cyber operations around the world, among other things, for personal gain. “All for the financial benefit of cyber operators associated with the PRC government <...>,” she added.

On Monday, the US authorities released new data on the cyberattack and announced their response. In particular, the US Department of Justice opened a criminal case against four hackers from the PRC Ministry of State Security. For many years they have organized cyberattacks against organizations in a dozen countries around the world. Such important areas as health care, defense, education, and air transportation were under threat. These same hackers tried, in particular, to steal information about the development of a vaccine against the Ebola virus.

“The United States has long been concerned about China’s irresponsible and destabilizing behavior in cyberspace,” she said at the briefing. According to her, this policy of Beijing “poses a huge threat to the American economy and national security.”

A White House spokeswoman clarified that the United States is acting in cooperation with Australia, Britain, Canada, New Zealand, Japan, partners in the EU and NATO. China’s malicious and aggressive activities include ransomware, theft of funds using cryptocurrency, and fraud, she said.

The presenter of the briefing also said that the US National Security Agency, the Federal Bureau of Investigation and the Infrastructure and Cyber ​​Security Agency (CISA) will introduce the public to “more than 50 tactics, techniques and techniques of cyber players associated with the Chinese government.” She explained that the relevant theses of the administration will be reflected in a press release on Monday, while similar statements are expected from the EU and NATO.

“This is the first time NATO has publicly linked such malicious cyberspace activity to China,” said a US administration official. – We are at the first important stage of drawing attention to <...> communication [Китая] with these actions and cohesion of our collective efforts in the field of security, ensuring the protection of networks and other actions necessary to suppress these threats. “

The presenter of the briefing also dwelled on the problem of combating hackers operating from Russia. In particular, we managed to disable the sites of the hacker group Revil. “We see, I think, like many of you, <...> based on information from open sources, that the account of a REvil representative may be blocked in Russian hacker channels. We see that the REvil infrastructure [по-прежнему] does not work. We believe this is a very positive development. This group has caused tremendous damage to victims around the world, ”she said.

The American authorities “will continue to declare to the Russian government that they believe Russia is responsible for the actions of criminals operating from the Russian Federation.” “We will continue to strive for further progress, not only in blocking infrastructure, but also in terms of bringing criminals to justice,” the presenter of the briefing emphasized.

According to her, the US strategy to counter ransomware viruses consists of four parts: improving security systems, tracking cryptocurrency transactions, working with other states to create a coalition “to bring Russia and other countries to justice”, shutting down the infrastructure and payment system of hackers …

Bloomberg previously reported that sites allegedly belonging to hackers from the REvil group have been disabled. As noted by security analysts interviewed by the agency, when you try to visit a site where members of the group usually post their statements, you receive a notification that this page was not found. Bloomberg emphasizes that the situation is similar with other resources related to hackers from REvil, who are allegedly behind the cyberattacks on the American division of the Brazilian meat processing company JBS and the software company Kaseya.

As the press secretary of the Russian president Dmitry Peskov said on Thursday, the Kremlin still does not have information about whether the disappearance of the REvil group sites is connected with contacts between Russia and the United States in the field of cybersecurity. transfers TASS.

[ad_2]

Source link

novichoktimes

novichoktimes

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Usefull Links

  • Home
  • CARTOONS
  • UKRAINE
    • KYIV POST
    • Pravda
  • BELLINGCAT
  • THE INSIDER
  • NAVALNY

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • UKRAINE
  • CARTOONS
  • News

© 2021-2023 Novichok (Moscow) Times

No Result
View All Result
  • Home
  • CARTOONS
  • UKRAINE
    • KYIV POST
    • Pravda
  • BELLINGCAT
  • THE INSIDER
  • NAVALNY

© 2021-2023 Novichok (Moscow) Times

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In