Facebook Vice President David Marcus is the face of the company's Libra digital currency, but the original driving force was a 26-year-old female corporate-development...Technologyread more
Amazon's new policy for account suspensions doesn't go far enough to protect sellers from potentially unfair and wrongful suspensions, merchants say.Technologyread more
There is no end in sight to the Boeing 737 Max grounding after two fatal crashes, prompting airlines to rethink their growth plans.Airlinesread more
After a year of flooding, Midwest farmers face a stifling heat wave that's spreading across the U.S.Weather & Natural Disastersread more
On Saturday, Disney's Marvel Studios announced its upcoming slate of superhero films during a panel at San Diego Comic-Con.Entertainmentread more
Moving lots of data to a public cloud over the internet can take months or years. CNBC got an inside look at how AWS transfers data to the cloud for its clients.Technologyread more
A quarter of the S&P 500 companies report earnings next week, and that could buffet the market as investors await the July Fed meeting.Market Insiderread more
Iran's Revolutionary Guard claims a British tanker it still holds, Stena Impero, failed to follow international maritime rules.World Newsread more
"It troubles me that the most important political office in the world is becoming the face of racism and exclusion," Kaeser said in a Twitter post.Politicsread more
Silver's rally could be losing its shine after the precious metal reached its year-to-date high, futures experts warn.Futures Nowread more
Some 40% of Americans would struggle to come up with even $400 to pay for an emergency expense. Just how are so many Americans so short on cash? Blame debt.Personal Financeread more
Hackers infiltrated dozens of companies around the world with advanced malicious software that extracted information from their systems, according to McAfee.
Research released by the cybersecurity firm on Wednesday showed that the infiltration campaign — called "Operation Sharpshooter" — targeted defense and government organizations.
The report said that between October and November, the cybercriminals targeted individuals at 87 companies using social media, sending them messages disguised as recruitment campaigns to get them to open a malicious document.
Once opened, another program called "Rising Sun" was installed, opening a "backdoor" portal that gave hackers the ability to extract intelligence and send it on to a control server. Attackers gained access to usernames, IP addresses, network configuration and system settings data.
"We know that this campaign was intended to conduct espionage, indeed it was only recently launched. The question of the ultimate purpose remains to be seen," Raj Samani, chief scientist and fellow at McAfee, told CNBC via email on Wednesday.
"In many cases such attacks are a precursor for something else, however we are hopeful that identifying and sharing the details will prevent the true nature of the campaign from being carried out."
It appears the attack could be linked to the Lazarus Group, a cybercrime collective that has been associated with North Korea by various cybersecurity firms, because it drew from the source code of a hack that targeted South Korean firms in 2015. However, McAfee researchers said it appeared "too obvious" to conclude that Lazarus was responsible, adding the attack could be a "false flag" aimed at diverting attention toward the notorious organization.
"The original malicious documents were hosted in the U.S.," Samani said. "In terms of attribution, certainly there are similarities with tactics and code previously attributed to the Lazarus Group, however we are conscious that this may be an intentional tactic to make it appear so."
Lazarus has been connected to a spate of high-profile cyberattacks, including the 2014 Sony Pictures hack and last year's WannaCry ransomware attack that crippled numerous businesses and institutions around the world.
McAfee's Samani said that data have been stolen from the companies as a result of the hack, but the scale of theft is not yet known.
"We can confirm they have been targeted and certainly many victims have clicked onto the malicious documents and downloaded malware," Samani said. "However it is unclear how much data was stolen at this stage."
The McAfee report did not identify any companies affected by the cyberattack, but highlighted that 87 firms across 24 countries — including the U.S., the U.K. and Russia — had been impacted.
"We will continue to monitor this campaign and will report further when we or others in the security industry receive more information," researchers at McAfee wrote in a blog post.