Tyson Gay Tests Positive for Banned Substance No Usain

American sprinter, Tyson Gay, has tested positive for a banned substance and will not compete at the World Championships next month in Moscow. This exit from the track meet means he and world-record Jamaican sprinter Usain Bolt will not have the epic race most track fans were anticipating.Gay didn’t discuss the substance in a recent phone conversation to the press Sunday, where he talked about his positive test. He said he was contacted by the U.S. Anti-Doping Agency last week, where they told him his sample came back positive from a May 16 test.“I don’t have a sabotage story. I don’t have any lies. I don’t have anything to say to make this seem like it was a mistake or it was on USADA’s hands, someone playing games,” said Gay, who fought back sobs as he spoke. “I don’t have any of those stories. I basically put my trust in someone and I was let down.”A few years back, Gay was involved in a USADA program called ‘My Victory,’ where athletes pledge to compete drug-free. In his testimonial video for the initiative, Gay said, “I compete clean because I really believe in fairness, and besides that, my mom would kill me! Just being honest.”The sprinter also said he already discussed the test results with his teammates, friends and family, including his mother and daughter.“They already know it is some type of accident, or some type of — I don’t want to use certain words, to make it seem like an accident, because I know exactly what went on, but I can’t discuss it right now,” he said. “My career and my name have always been better than medals or records or anything like that. I’ve always wanted a clean name with anything. Unfortunately, I have to break this news, that I have a positive ‘A’ sample.” read more

FireEye reports infrastructurecrippling Triton malware linked to Russian government tech institute

first_imgYesterday, FireEye said that they have uncovered the hacking group behind the Triton malware which was recently used to impact an unnamed “critical infrastructure” facility. This malware is designed to penetrate into the target’s networks and sabotage their industrial control systems and has often been used in power plants and oil refineries to control the operations of the facility. The Triton malware attack first occurred in August 2017, where it was used against a petrochemical plant owned by Tasnee in Suadi Arabia. Researchers believe that the operators of this attack must have been active since 2014. FireEye also believes Triton attack to be linked to a Russian government-owned technical research institute in Moscow. Triton, also known as Trisis, has been specifically engineered to target a specific type of industrial control system (ICS), namely Triconex safety instrumented systems (SIS) controllers developed by Schneider Electric. FireEye’s first analysis on Triton after the 2017 attack was, “malicious actors used Triton to manipulate industrial safety systems at a critical infrastructure facility and inadvertently caused a process shutdown.” FireEye has also released a report which explains the custom information technology tools and tactics the threat actor leveraged during the early stages of the targeted attack lifecycle. “The information in this report is derived from multiple TRITON-related incident responses carried out by FireEye Mandiant”, the researchers state in their blog. According to the FireEye report, the threat actor leveraged different custom and commodity intrusion tools including SecHack, NetExec, WebShell, and some more. “The actor’s custom tools frequently mirrored the functionality of commodity tools and appear to be developed with a focus on anti-virus evasion. The group often leveraged custom tools when they appeared to be struggling with anti-virus detection or were at a critical phase in the intrusion (e.g., they switched to custom backdoors in IT and OT DMZ right before gaining access to the engineering workstation)”, the researchers mentioned in their report. The report further mentions, “After establishing an initial foothold on the corporate network, the TRITON actor focused most of their effort on gaining access to the OT network. Most of the attack tools they used were focused on network reconnaissance, lateral movement, and maintaining a presence in the target environment.” Actors have also used several other obfuscation methods including: Renaming their files to make them look like legitimate files; Planting webshells on the Outlook Exchange servers; Relying on encrypted SSH-based tunnels to transfer tools and for remote command execution; Routinely deleting dropped attack files, execution logs, and other files; Using multiple staging folders and directories that are very less used by legitimate users or processors. To know more about this report in detail, read FireEye’s complete report on the Triton attack. Read Next ASUS servers hijacked; pushed backdoor malware via software updates potentially affecting over a million users Researchers prove that Intel SGX and TSX can hide malware from antivirus software Mac users affected by ‘Shlayer Trojan’ dropped via a Steganography-based Ad Payload; Confiant and Malwarebytes reportlast_img read more