skip navigation

More signal. Less noise.

Daily briefing.

The US Department of Homeland Security warns of an increased risk of cyber attacks against infrastructure. Experts continue to assess the international threat, with a familiar focus on Russia and China.

Syria's Internet connectivity has been restored; the government blames the outage on "terrorism," but few credit this.

Various minor hacks surface, but today's most interesting news is legal. US prosecutors have indicted eight people alleged to have committed ATM debit card thefts that netted them $45M. Seven of those indicted are now in custody. The eighth was murdered two weeks ago in the Dominican Republic. The gang operated out of Yonkers, New York, but the two banks they targeted (via card processing centers in the US and India) were the National Bank of Ras Al-Khaimah PSC in the United Arab Emirates and the Bank of Muscat in Oman.

The attack was bankrolled by well-financed criminal syndicates, enabled by hackers, and carried out by mules who withdrew cash from ATMs. The attack is called "unlimited" because the hackers disabled the automated limits on withdrawals designed to minimize the consequences of fraud. Doing so required that the criminals not only penetrate the banks' cyber perimeters, but gain administrative access as well.

(Compare the apparently unrelated prosecution of Algerian hacker Hamza Bendelladj, who allegedly made his money not by stealing, but by selling the means to do so—the SpyEye Trojan.)

Citing security concerns, India joins the US and Australia in preparing to impose restrictions on import of Huawei and ZTE hardware.

Notes.

Today's issue includes events affecting Algeria, Australia, Belgium, Canada, China, Dominican Republic, European Union, Germany, India, Japan, Oman, Romania, Russia, Thailand, Turkey, United Arab Emirates, United States..

Cyber Attacks, Threats, and Vulnerabilities

US warns industry of heightened risk of cyberattack (Washington Post) Officials are highly concerned about "increasing hostility" against "U.S. critical infrastructure organizations," according to the warning, which was released by the Department of Homeland Security on a computer network accessible only to authorized

Chinese cyber espionage - widespread, aggressive (ITWeb) Any company doing a large deal with a Chinese company has likely had its systems compromised, says Richard Bejtlich, Chief Security Officer at Mandiant. Addressing the 8th annual ITWeb IT Security Summit, in Sandton, this morning, Bejtlich said cyber espionage is widespread and common in China. "Every time I read of a major deal pending with a Chinese company, I know we will be getting a call from the counter party soon, if we aren't already helping them," he said

On the Cyber Threat: Be Concerned…Be Very Concerned (New America Foundation) The panelists agreed that China - with its "vacuum cleaner approach" of almost indiscriminate spying - and Russia - which employs a careful, more strategic approach to espionage - are the most capable of executing a cyber attack on the U.S

The Cyberwar Spiral: A History (Russian National Programming) As we know, everything in history repeats itself. What has just happened had, at some point, happened before, and any event, any action is a repetition of the well-known and well-trod. In the 2000s, western media was gripped by a mass hysteria regarding the cyberthreat from Russia; Russian media was spared the same effect

What Is the Syrian Electronic Army Trying to Accomplish, Anyway? (Slate) In June 2011, just a few short months after protests first erupted in Syria, the country's president, Bashar Al-Assad, made a speech in which he thanked a group called the "Syrian Electronic Army" (SEA). Calling it a "virtual army in cyberspace," Al-Assad praised the group for its effort in trying to shape the Syrian narrative. Since then, that effort has included taking over the Facebook pages of celebrities from Oprah to Nicolas Sarkozy, hacking the website of Harvard University, and setting up a fake YouTube site to intercept the credentials of users who attempted to log in

Syrian state media say Internet service has been restored nationwide (Washington Post) Syrian state media say Internet service has been restored nationwide

Our internet connections depend on vulnerable undersea cables (Quartz) If you've been following the events in Syria over the past few days, you know the country's Internet is now back from the dead after a 19-hour outage that the government blamed on "terrorist" sabotage—an explanation bought by approximately zero people

Melbourne IT admits hack, says 'twas but a flesh wound (The Register) Australian domain registrar Melbourne IT admits "an unauthorised third party" has attacked the company, but says the incident was minor

Phishers taking over accounts of telecommunication customers (Help Net Security) The Internet Crime Complaint Center has received numerous reports of phishing attacks targeting various telecommunication companies' customers. Individuals receive automated telephone calls that claim to be from the victim's telecommunication carrier. Victims are directed to a phishing site to receive a credit, discount, or prize ranging from $300 to $500

Hacker leaks part of Candace Bushnell's unpublished book (Help Net Security) A hacker that goes by the name of "Guccifer" - the same one who has allegedly compromised email accounts belonging to the Bush family and some of their close friends earlier this year - has hacked the

Name.com breach just one of many executed by HTP hackers? (Help Net Security) Internet registrar Name.com has suffered a breach and has been informing users about it via email, requesting them to change their passwords. "Name.com recently discovered a security breach where

BitDefender Warns Of Rise in Fake Escrow Sites (SiliconANGLE) There are currently around 2,000 fake escrow sites on the internet today, says BitDefender. The company notes that these sites are often in cahoots with sellers looking to scam their customers, and sometimes even set up by the sellers themselves

Snapchat images that have "disappeared forever" stay right on your phone (Naked Security) Snapchat is a wildly popular app for Androids and iDevices that allows you to share photos with your friends. Snapchat replaces more pedestrian ways of sharing photos, such as sending them by email

New Terrorist Magazine Targets Obama, Drones (ABC News) President Barack Obama appears with a bull's-eye on his head in a new English-language magazine published online apparently by Islamist militants, who also urge Muslims around the world to try to hack and manipulate American drones. "Wanted Dead Only. Barack Obama Mass Murderer. Reward: in the Hereafter," reads the full page poster that depicts a darkened image Obama as a target

Security Patches, Mitigations, and Software Updates

Microsoft Patch Tuesday targets multitude of Internet Explorer faults (CSO) Microsoft is issuing critical security bulletins this Patch Tuesday that affect all versions of Internet Explorer and deal with an exploit that attackers are actively working. Internet Explorer 6, 7, 8, 9 and 10 are the recipients of a patch that can prevent an exploit that enables remote code execution in the browser. This affects all Windows operating systems except XP

Zero-Day Flaws Force Fast Fixes From Microsoft And Adobe (TechWeekEurope UK) As exploits do the rounds on the Internet, Microsoft has confirmed a temporary fix for a Internet Explorer 8 zero-day vulnerability, whilst Adobe promised to patch a serious flaw in its ColdFusion platform. The Internet Explorer 8 zero-day was used in

Cyber Trends

69% of surveyed Canadian businesses experienced cyber attack in a 12-month period (Canadian Underwriter) Preparedness against cyber crime among Canadian businesses is lacking despite seven in 10 polled organizations being the victim of a cyber attack, suggests a survey released this week by the International Cyber Security Protection Alliance (ICSPA)

Marketplace

India joins list of nations vetting Huawei, ZTE (The Register) India has joined the list of countries concerned about allowing the installation of telecoms kit from Chinese companies Huawei and ZTE. The USA has banned the pair from winning contracts connecting phones from sea to shining sea, citing security concerns (although many feel its real worry is protecting local companies). Australia forbade Huawei from supplying the nation's nascent national broadband network, on security grounds. Australia's decision was made just a few weeks after a visit by Barack Obama, who's retinue is believed to have offered Australian authorities a briefing on the risks posed by Huawei

Security processes accelerate adoption of commercial devices (Air Force Link) Approval last week of security technical implementation guides for BlackBerry and Samsung Knox devices means that Defense Department organizations will be able to use those devices in conjunction with a secure

Check Point: A Safe Bet To Ride The Rising Cyber-Security Trend (Seeking Alpha) Check Point Software Technologies Ltd. (CHKP) is the worldwide leader in securing the Internet, providing customers with uncompromised protection against

Carl Icahn and Southeastern Propose Alternative Offer To Michael Dell's Buyout (TechCrunch) Dell shareholders Carl Icahn and Southeastern Asset Management have teamed up to propose an alternative offer to founder Michael Dell's $24.4 billion leveraged buyout deal

As Tech Giants Scramble For Talent, It's Buy Or Die (TechCrunch) The writing's on the wall. Mobile is the future, and it requires different skill than the web. Entrepreneurship is more fetishized than ever, making standard hiring tough. The result is days like today where Yahoo, Twitter, Salesforce, and Box all bought startups, and Facebook and Microsoft were reported to be in talks for major acquisitions. Big is a scary thing to be right now

Information assurance certification gives SMEs the edge (ComputerWeekly.com) IT consultancy Purple Frog Systems believes its gold certification to the IASME information assurance standard for small to medium enterprises give it a competitive edge. Many of the firm's customers are large corporations looking for help in data

Ron Mason Appointed ASRC Federal C4ISR Group SVP (GovConWire ) Ron Mason, a former program executive officer for the U.S. Air Force, joined ASRC Federal as senior vice president for the C4ISR solutions group (command, control, communications, computers, intelligence, surveillance and reconnaissance). The former Senior Executive Service official will be responsible for developing business strategies and identifying business opportunities across C4ISR markets in his new

Products, Services, and Solutions

5 Russian-Made Surveillance Technologies Used in the West (Wired Danger Room) We all know surveillance is big in Putin's Russia. What you may not know is that Russia's surveillance tech is being used all over — even here in the U.S. The Kremlin is up to its domes in spy technology

McAfee taps Intel to offer high-throughput intrusion-prevention system (CSO) McAfee is taking advantage of its new owners by rolling out a high-throughput intrusion-prevention system (IPS) family built on Intel technology. The Intel-based NS-Series comes in three models: the 2U-sized 9100 and 9200 models and the 9300, which is a 4U device. Intel bought McAfee for nearly $8 billion in 2010 and this is the first family of products that incorporate Intel's technology

AhnLab V3 Click Review (Gadget Review) There's a lot of programs to help PC owners overcome viruses and other forms of malicious online attacks. But many PC users just don't bother to install anything and hope they won't be targeted. Into this void comes the V3 Click. Shaped like a hockey puck, its design insures that you see it's there -- but more importantly that it won't be forgotten should it be taken out from your home. Why do that? Because it provides portable anti-virus protection

Technologies, Techniques, and Standards

I Think We're All Botnets On This Bus (Dark Reading) How many undercover researchers can fit under one cover? Threat intelligence is such a thing these days that everyone is doing it. I talk to dozens of vendors who tell me about the sensors they have distributed across the Internet; the thousands of honeypots and honeyclients they're running; the traffic they're capturing; and they even tell me about their researchers monitoring IRC channels

Technologies Clear Up Cloudy Data Security (Dark Reading) With employees wanting to use data both inside the company and out, cloud-security startups have focused on two models: Protecting data in third-party cloud services and protecting data on the endpoint

Erase The Line Between QA Defects And Security Flaws? (Dark Reading) Is a defect a defect by any other name? Some testing advocates push for industry to stop segregating security from the rest of quality testing categories

Hacking back: cops and corporations want cybersecurity to go on the offensive (The Verge) Law enforcement agencies and private companies don't always get along, but one occasion where they frequently come together is to complain that their networks are being penetrated by a seemingly continuous stream of cyber attacks. Whether it's the relative nuisance of DDoS attacks from hacktivist groups like Anonymous, or more serious threats of data theft and espionage from criminal gangs and foreign governments, the general rule has been that private entities maintain a defensive posture while the government hunts down the culprits

Hacking back: Digital revenge is sweet but risky (IT World) As cyberattacks increase, victims are fighting back. But retaliation has its own consequences--and may create more damage

Healthcare leaders streamline third party assessment process (src) Recent breach data clearly indicates that third party business partners pose significant risk of data loss to a healthcare organization, often requiring public notification and subsequent reporting

Big data helping social media become anti-social (FierceBigData) I have the courage of my great-grandparents to thank for my living in a country where I am free to express my thoughts without fear of serious reprisal. I have no clue who they were or what circumstances led them to emigrate, but no matter the circumstances, it takes courage to uproot oneself and travel someplace from where one is unlikely to return. So thanks great-grandmas and great-grandpas, whoever you were

Sure, information has value, but don't forget the risks (ComputerWorld) Most companies describe information as the lifeblood of the organization. But too many enterprises have clogged their arteries. How can this be? Over time, the value of information declines, while the associated costs remain constant and the compliance and legal risks actually rise. This conclusion, based on research conducted by members of the Compliance Governance and Oversight Council (CGOC), implies that those who champion the defensible disposal of all information that has no legal, regulatory or business value can help their companies significantly reduce costs and risk

Research and Development

Unmanned Systems Soon May Offer Universal Remote (SIGNAL) Unmanned vehicles may become joint platforms as new software allows operators using a standard control system to use craft employed by different services. So, an Army squad deep in the battlefield may be able to use data accessed directly from a Navy unmanned aerial vehicle to bring an Air Force strike to bear against enemy forces

PayPal: Time to Ditch Passwords and PINs (CSO) "We have a tombstone here for passwords," Barrett toldthe audience, pointing to a slide with a tombstone for passwordswith the years 1961 to 2013 etched on it. "Passwords, when used ubiquitously everywhere at Internetscale are starting to fail us," he added

Google's five-year plan for authentication: It's complicated (CSO) Some of the technology has to be deployed together for maximum security, making the process complicated, said one security expert

Legislation, Policy, and Regulation

Biometric Database of All Adult Americans Hidden in Immigration Reform (Wired Threat Level) Civil rights advocates are worrying that immigration reform the Senate began debating yesterday is the first step toward a national identification system that would grow into a dossier on Americans and chronicle our most every move. That's because buried in

UK's New Defamation Law May Accelerate The Death Of Anonymous User-Generated Content Internationally (Forbes) Historically, United Kingdom defamation law has been victim-favorable. In an effort to modernize its defamation law, the UK Parliament recently enacted the Defamation Act 2013 (royal assent was given on April 25). The act generally makes it harder for plaintiffs to win defamation lawsuits, but I'll focus on the effects of Section 5 of the act, entitled "Operators of websites"

White House releases open data policy (FierceGovIT) Agencies and departments are now required to collect and create information in a way that supports downstream processing and sharing, through the use of machine-readable and open formats, data standards, and common core and extensible metadat

Is anonymity already a lost cause? (FierceBigData) The first laws written for the European Union related to the privacy of personal data came in 1995, a world away from the big data realities of today. In a piece written for MIT Technology Review this week (found on Mashable) Patrick Tucker said the definition of personal data has evolved to include far more information than those European legislators could ever have imagined. Not only has personal data evolved, but other identifiable data has evolved along with it

Litigation, Investigation, and Law Enforcement

$45M Bank Hack Suspect Was Shot Dead While Playing Dominoes (Wired Threat Level) Alberto Yusi Lajud-Peña, one of a number of suspected ringleaders behind a coordinated and sophisticated global bank heist operation that netted the thieves $45 million in stolen funds, was mowed down inside his Dominican Republic home

DOJ Statement on Global Cyberheist (Bank Info Security) Following is the complete text of a Department of Justice statement. A four-count federal indictment was unsealed in Brooklyn charging eight defendants with participating in two worldwide cyber-attacks that inflicted $45 million in losses on the global financial system in a matter of hours. These defendants allegedly formed the New York-based cell of an international cybercrime organization that used sophisticated intrusion techniques to hack into the systems of global financial institutions, steal prepaid debit card data, and eliminate withdrawal limits

Eight Charged in Debit Card Cyber Attack Targeting Banks (Businessweek) Eight New York residents were charged in what U.S. prosecutors said was a $45 million global debit card cyber-attack scheme targeting banks based in the United Arab Emirates and Oman. The defendants are accused in a four-count indictment unsealed

Payment card processors hacked in $45 million fraud (PCWorld) A vast debit card fraud scheme that allegedly netted US$45 million has been linked to the hacking of credit card processors in the U.S. and India

Cyber-attacks behind possibly record-breaking bank heist (CBS News) It may be the largest bank robbery in history: A crime ring is accused of stealing $45 million from financial institutions from around the world. But these criminals weren't wearing masks or waving guns. They were armed with computers

How hackers allegedly stole "unlimited" amounts of cash from banks in just hours (Ars Technica) Feds accuse eight men of participating in heists that netted $45 million. Federal authorities have accused eight men of participating in 21st-Century Bank heists that netted a whopping $45 million by hacking into payment systems and eliminating withdrawal limits placed on prepaid debit cards

Alleged SpyEye big fish hauled in for US trial (The Register) Alleged SpyEye kingpin Hamza Bendelladj now faces a 23-count computer hacking and fraud indictment following his extradition from Thailand to the US last week. Bendelladj, a 24-year-old Algerian national, is suspected by the FBI of making millions from selling the SpyEye banking Trojan toolkit to cybercrooks through various underground online marketplaces and carding forums

HP Hit By Fresh Lawsuit Over Troubled Autonomy Deal (TechWeek Europe) HP's headaches continue after it faces a fresh Autonomy lawsuit, and is accused of knowing it was a bad deal. Executives at Hewlett-Packard allegedly ignored warnings before it bought British software maker Autonomy for $11.3 billion (£7.3bn) that the company's financial numbers had been exaggerated

The EU's Unofficial Spy Services Are Growing Out-Of-Control (Business Insider) Brussels, the center of gravity of the European Union and seat of NATO Headquarters, not only teems with lobbyists, diplomats, military personnel, bureaucrats, politicians, Americans, and other weird characters from around the world, but also with spies

RedHack Not a Terrorist Group, Turkish Prosecutors Say (Softpedia) After hacking into the website of Turkey's Foreign Ministry, some of the country's officials said that the notorious RedHack group would be placed on the list of terrorist organizations. However, prosecutors have ruled that the hackers are not terrorists

Downloading al-Qaeda terror guide 'will lead to arrest and prosecution' (The Times) Downloading Inspire has led to more than 20 prosecutions in Britain in the past 18 months.Security agencies and police are adopting a zero-tolerance approach in investigations into the distribution of al-Qaeda's online magazine Inspire after its emergence as a common thread in a series of terrorism plots

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Interop Las Vegas (Las Vegas, Nevada, USA, May 6 - 10, 2013) Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Join us in Las Vegas for access to 125+ workshops and conference classes,...

CyberSecurity UAE Summit 2013 (Dubai, UAE, May 13 - 14, 2013) Review developments, strategies and best practice in global cyber security. Assess the nature of the latest threats being faced and the impact of these upon your organisation. Discuss the most promising...

GovSec (Washington, DC, USA, May 13 - 15, 2013) GovSec is the nation's premier event for Government, Homeland Security, and Law Enforcement professionals looking for proven strategies and cost effective technology so they can achieve their mission of...

cybergamut Technical Tuesday: Identifying TLS/SSL Encrypted Network Exploitation Activity Using Traffic Externals (Columbia, Maryland, USA, May 14, 2013) Jeff Kuhn of CACI describes recently completed CACI research using adaptive data analytics to distinguish encrypted exploitation activity from legitimate network traffic based on traffic externals in a...

Thriving in the Post-Sequestration GovCon Era (McLean, Virginia, USA, May 14, 2013) The Potomac Officers Club is hosting a summit for GovCon executives and government leaders to collaborate and share ideas on how to navigate a new era involving sequestration. At least five speakers, each...

Second Maryland Cybersecurity Center Symposium (MC2) (College Park, Maryland, USA, May 14 - 15, 2013) Drawing on regional experts of national and international acclaim, MC2's second Annual Cybersecurity Symposium will showcase the latest research, trends, and topics in cybersecurity, including: keynote...

FOSE (Washington, DC, May 14 - 16, 2013) FOSE is the premier event for government technology professionals interested in innovative, effective tools and solutions allowing you and your agency or organization to advance your mission. From IT managers...

7th Annual INSA IC Industry Day (Springfield, Virginia, USA, May 15, 2013) This annual event is held at the TS/SCI level in cooperation with ODNI as a comprehensive forum for IC leaders to relate their budget priorities to industry. The theme of this year's IC industry day is...

Hack Miami (Miami, Florida, USA, May 17 - 19, 2013) The HackMiami 2013 Hackers Conference seeks to bring together the brightest minds within the information security industry and the digital underground. This conference will showcase cutting edge tools,...

CEIC 2013 (Orlando, Florida, USA, May 19 - 22, 2013) The largest digital-investigations conference of its kind and the only one to offer hands-on lab sessions for practical skills development. CEIC offers relevant and practical information from expert speakers.

IEEE Symposium on Security and Privacy (San Francisco, California, USA, May 19 - 22, 2013) Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers...

U.S. Department of State Mobile Computing Forum (Washington, DC, USA, May 23, 2013) The U.S. Department of State's Bureau of Information Resource Management will host an educational forum and IT Expo, themed "Mobile Computing," reflecting their mission to empower diplomacy, consular services...

International Workshop on Cyber Crime (IWCC) (San Francisco, California, USA, May 24, 2013) The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field...

Web 2.0 Security and Privacy (San Francisco, California, USA, May 24, 2013) The goal of this one-day workshop is to bring together researchers and practitioners from academia and industry to focus on understanding Web 2.0 security and privacy issues, and to establish new collaborations...

Maryland/DC Celebration of International Trade (Linthicum, Maryland, USA, May 21, 2013) Join Maryland exporters and international business experts as they celebrate International Trade Week. Hosted by the Maryland/DC District Export Council this event is a content rich celebration of international...

IEEE-Cyber 2013 (Nanjing, China, May 26 - 29, 2013) This conference will cover cyber physical systems, cyber control and automation, cyber robotics, and the Internet of things.

Cyber Security @ CeBIT (Sydney, New South Wales, Australia, May 28 - 30, 2013) The Cyber Security Conference will serve as a platform where all those involved in securing and governing ICT within an organisation can discuss the newest challenges and strategies. The event is a must-attend...

Private Sector Crossovers: Protecting People, Property and Information (, January 1, 1970) With its annual cyber conference on May 29, the Howard County Chamber of Commerce and its GovConnects initiative will offer expert speakers on cyber security and efforts to protect government agencies...

Cyber Security for the Chemical Industry (Franfurt, Hessen, Germany, May 29 - 30, 2013) It is becoming increasingly more important than ever to be aware of the latest cyber threats, and equipped to protect your company from them. In addition to physical security, these industries are faced...

DGI Cyber Security Conference & Expo (Washington, DC, 2013, May 30, 2013) Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies - from mobile devices and social media to virtualization and cloud computing - will...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.