The Sony data loss has spread (reports say) to Deloitte, as a spreadsheet containing some of the accounting firm's sensitive salary information has been found among data dumped to the Internet. (The Deloitte spreadsheet has been traced to a Sony employee — there's no suggestion Deloitte itself was hacked.)
Attribution remains contentious. North Korea has finally said it had nothing to do with the attack. While such denial is in itself not particularly persuasive, some observers think the nature of the attack may argue that the "Guardians of Peace" may have been (or at least employed) one or more disgruntled insiders. More analysts, however, see enough similarities between this incident and 2012's Shamoon attack on Saudi Aramco or 2013's WhoIs hit on South Korean banks to perceive a common playbook (perhaps a common toolkit).
The air travel sector remains concerned about Operation Cleaver, as do media in the United Arab Emirates.
The Regin cyber espionage campaign returns to the headlines with concerns that it augurs a new phase of cyber threat, with exploits even more readily commodified and traded than they currently are.
Preloaded mobile malware was discovered earlier this week. Lookout has found one of them, the Trojan "DeathRing," out and active in the wild.
Reports claim that a T-Mobile update for Samsung Galaxy Note 4 contains malicious code.
Apple patches Safari; IBM fixes a vulnerability in Endpoint Manager for mobile devices. VMWare kills a cross-site-scripting bug. Microsoft plans seven fixes for Patch Tuesday. Adobe will update Reader and Acrobat.
Today's issue includes events affecting China, Egypt, Germany, India, Iran, Indonesia, Israel, Kenya, Democratic Peoples Republic of Korea, Republic of Korea, Nigeria, Russia, Taiwan, United Arab Emirates, United Kingdom, United States, and Vietnam.
Dateline SINET Showcase
SINET Showcase and Workshops 2014(SINET) Showcase provides a platform to identify and highlight "best-of-class" security companies that are addressing industry and government's most pressing needs and requirements. The chosen SINET 16 Innovators present their technological solutions to representatives from the ecosystem of the entrepreneur: venture capital, investment banking, system integration, academia, science, legal, policy, private industry and executives from the Federal Government, including civilian, intelligence and military professionals. Showcase's objective is to increase awareness of innovative solutions that may lead to an investment in, or the purchase of, advanced technologies that will help secure our nation's critical infrastructure and command-and-control systems.
SINET Workshops deliver critical knowledge, targeted perspective and opportunities for direct information sharing between entrepreneurs and security experts. Held in conjunction with IT Security Entrepreneurs Forum and Showcase, each workshop offers expert insight from industry and government officials, venture capitalists, leading researchers and successful entrepreneurs who share thought leadership, experience and "know how." There is no comparable opportunity to learn how to navigate the Federal Government sector, and to obtain the necessary financing, professional services and guidance needed to win
Security Innovation Network (SINET) Announces Its 2014 Top 16 Emerging Cybersecurity Companies(Yahoo! Finance) The Security Innovation Network™ (SINET), an organization focused on advancing Cybersecurity innovation through public-private collaboration, announced today the winners of its annual SINET 16 competition. The companies, which were selected from a pool of 180 applicants from around the world, represent a range of Cybersecurity solution providers who are identifying cutting-edge technologies to address Cybersecurity threats and vulnerabilities. The selected companies will share their work with buyers, builders, investors and researchers during the SINET Showcase on Dec. 3 — 4, 2014 at the National Press Club in Washington, DC
Cyber Attacks, Threats, and Vulnerabilities
Sony Hack Spreads to Auditing Firm Deloitte(Hollywood Reporter) A 2005 spreadsheet detailing employee salaries at the New York-based firm was found among the Sony files, according to Fusion. Meanwhile, the studio says the investigation into the source of the attack is ongoing
Sony hack fits pattern of recent destructive attacks(Christian Science Monitor) The ferocity of the Sony Pictures attack took the technology world by surprise. But it has similarities to other destructive hacks. Among other things, the Sony malware relied on the same commercial software to access and erase Sony hard drives as was used in a destructive attack on oil giant Saudi Aramco in 2012
Did North Korea Really Hack Sony?(Bloomberg) Could it have been an inside job? Perhaps a disgruntled employee with a thumb drive, like Edward Snowden? PLUS: New details of the attack itself from a leaked FBI report
How to defend against a Sony hack(San Diego Union-Tribune) Some security researchers speculated that North Korea was behind the Sony Pictures breach — a sign of more nation-state cyber attacks. Sony was scheduled to release a comedy about TV journalists recruited to assassinate North Korea's leader
Warning! Android phones coming with Pre-Installed malware, Which is non-removable(Hackers News Bulletin) In this Android World, everyone having that, but one thing still matters in these latest Android Phone from where its manufacturing is, as this question comes into rise when anyone found a Malware inside his/her phone, which is sending your personal info to an Anonymous IP Address, exactly I am talking about the Spying or Infecting your device remotely
T-Mobile Update for Samsung Galaxy Note 4 Contains Malware(Hack Read) The last few days have seen an upheaval on tech forums about applications that install themselves in an unauthorized and almost sneaky way, getting unbelievable access and permissions without the phone owner even knowing it
All PayPal accounts were 1 click away from hijacking(Naked Security) Until Egyptian cyber-security researcher Yasser Ali found it and reported it to PayPal, there was a security hole that meant 150 million-plus customers were one measly click away from account hijacking
Banks: Credit Card Breach at Bebe Stores(KrebsOnSecurity) Data gathered from several financial institutions and at least one underground cybercrime shop suggest that thieves have stolen credit and debit card data from Bebe Stores Inc., a nationwide chain of some 200 women?s clothing stores
Ransomware is the Future of Consumer Cybercrime(Threatpost) It's 2020, bitter cold outside, you're running late for work, and the Linux box that controls your car isn't going to start unless you wire $20 worth of Bitcoin to an increasingly business-like criminal enterprise operating out of Eastern Europe
Sifma raises cost and security concerns over Finra's CARDS project(FierceFinanceIT) The Securities Industry and Financial Markets Association (Sifma) says the Financial Industry Regulatory Authority's (Finra) proposed "CARDS" program will impose high costs on the industry and open up new cyber security risks. In a comment letter sent to Finra this week, Sifma said its concerns are supported by two separate studies the industry trade group commissioned
Worrying about cyberwar is making countries less safe(Quartz) Ten days ago, on Nov. 24, online security firms revealed the existence of a powerful computer virus called Regin. A tool of espionage (pdf), the bug displayed all the hallmarks of nation-state backing, researchers said. Suspicion immediately fell on the US and Israel
'Cyber Pearl Harbor' plausible, says cyber military expert(FierceGovernmentIT) The threat of a "cyber Pearl Harbor" — a hotly debated term after then-Defense Secretary Leon Panetta used the phrase in a 2012 address — isn't just an idea used for shock value; a cyber attack with catastrophic effects on the United States is very possible, according to an expert on cyber military operations
High Voltage of 2015: Kaspersky Lab's Short-Range Predictions(Information Security Buzz) Cyber criminals are growing in confidence. Previously, they attacked users of banking services, seeing them as the weak link in the security chain. But next year, Kaspersky Lab experts anticipate high-stakes targeted cyber-attacks pinpointing the banks themselves. And the fraudsters won?t stop there; we expect they will go for broke and try to develop new malware that can take cash directly from ATMs. In addition to financial cybercrime, 2015 is also likely to bring even more privacy concerns, security worries about Apple devices, and renewed concern bout preventing hackers from using connected devices like network printers to penetrate corporate networks
Black Lotus Report Shows DDoS Volume Decreasing But Sophistication Of Attacks Increasing(Business Solutions) A new report from Black Lotus, a provider of distributed denial of service (DDoS) protection, shows that attackers are using less bandwidth to cause trouble but are getting smarter about how their attacks work. The report found that the most likely source for new DDoS attacks will be Vietnam, India, and Indonesia in 2015, according to a press release. Although these nations lack bandwidth to launch massive DDoS attacks, they do have a high volume of compromised end-point devices, which can be utilized in botnet attacks. In Q3 2014, China was the leading source of DDoS attacks, followed by the United States and Russia
Pindrop Security Identifies Top Phone Scams Affecting Consumers in 2014(MarketWired) Pindrop Security, the pioneer in phone fraud prevention and call center authentication for banks and enterprise call centers, today announced the release of a new report, "Top Consumer Phone Scams: 2014." The report provides an in-depth analysis of the most common phone scams affecting consumers this year
The Problem With The Internet Of Things(TechCrunch) Lightbulbs, washing machines, thermostats, fridges and locks. If you believe the Internet Of Things salespeople, over the next 10 years, everything in your home is set to become connected
Welcoming Our AI Overlords(InformationWeek) Stephen Hawking warns artificial intelligence could end humanity, but science fiction often proposes a harmonious future for people and machines. Who's right?
Why Splunk (SPLK) Stock Might be a Great Pick(Zacks) One stock that might be an intriguing choice for investors right now is Splunk, Inc. (SPLK - Snapshot Report). This is because this security in the Internet Software industry space is seeing solid earnings estimate revision activity, and is in great company from a Zacks Industry Rank perspective
Bank-funded cyber info sharing software released(The Hill) Cyber threat info-sharing software developed with backing from major banking trade groups is now widely available. The software, Soltra Edge, is built to collect cyber threat information from myriad sources and convert it into a standard, readable format for companies. The software was funded by banking industry groups
DB Networks Boosts Capabilities of DBN-6300(Top Tech News) DB Networks Expands Into Intelligent Continuous Monitoring with the DBN-6300, Powered by Machine Learning & Behavioral Analysis -- The DBN-6300 is already providing companies with the actionable intelligence and situational awareness to vastly improve their data center security posture
Covata and NSC Global Announce First Joint Customer Project with T-Systems Subsidiary of Deutsche Telekom(Yahoo! Finance) Covata Limited (CVT.AX) and reseller partner NSC Global today announced its first major joint project, which delivers on the companies' existing partnership, inked earlier this year. The project advances the European go-to-market strategy for the Covata Platform and marks the first major milestone in working towards a contractual agreement with T-Systems, a subsidiary of German based ICT Company Deutsche Telekom
Protecting your child's digital identity(Help Net Security) Each day, as infosec professionals, we dedicate ourselves to protecting our client's most valuable assets. We spend countless hours focused on keeping data, intellectual property, systems and files out of the hands of cyber criminals. Our clients win and we win — at work. But what are we doing about protecting our most valuable assets at home — our children's digital identity?
Electron pairs on demand(Nanowerk News) In quantum optics, generating entangled and spatially separated photon pairs (e.g. for quantum cryptography) is already a reality. So far, it has, however, not been possible to demonstrate an analogous generation and spatial separation of entangled electron pairs in solids. Physicists from Leibniz University Hannover and from the Physikalisch-Technische Bundesanstalt (PTB) have now taken a decisive step in this direction. They have demonstrated for the first time the on-demand emission of electron pairs from a semiconductor quantum dot and verified their subsequent splitting into two separate conductors
Legislation, Policy, and Regulation
Warring State: China's Cybersecurity Strategy(Center for a New American Security) Cyberspace and information technology have enabled the economic, political, and cultural integration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace
One step forward, one step back: U.S. Senate introduces crypto backdoor bill while House removes fix(Access) Today, U.S. Senator Ron Wyden introduced a bill to prohibit the government from mandating backdoors in hardware and software technologies. The legislation prohibits any federal agency from intentionally weakening consumer encryption standards. As we've previously said, strong encryption standards and device security are critical to the privacy of individual users. Access commends Senator Wyden and urges the Senate to quickly pass the Secure Data Act
Justice Department Plans New Cybercrime Team(NPR) The leader of the Justice Department's criminal division is expected to announce today the creation of a new unit to prevent cybercrime and work alongside law enforcement, private sector companies and Congress
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Healthcare Cyber Security Summit 2014(San Francisco, California, USA, December 3 - 10, 2014) SANS is teaming up with the National Health Information Sharing & Analysis Center (NH-ISAC) to offer the 2nd Annual Healthcare Cyber Security Summit
Tax Incentives for Cybersecurity Businesses(Elkridge, Maryland, USA, December 9, 2014) Learn the details and take the opportunity to ask questions of leading experts on how to apply for tax credits (including cyber, research, security clearance, and secured space tax credits) and get the...
(ISC)² Security Congress EMEA(London, England, UK, December 8 - 10, 2014) Building on the experience of the US-based (ISC)² Security Congress, now in its fourth year, (ISC)² Security Congress EMEA will offer a complementary and unique opportunity within the Europe...
ACSAC 30: Annual Computer Security Applications Conference(New Orleans, Louisiana, USA, December 8 - 12, 2014) ACSAC is more than just high quality, peer-reviewed research (though our 2013 acceptance rate was barely 19%). Our comprehensive program also includes training, case studies, panels, workshops, posters,...
Cybersecurity 2015: Beyond the Breach(Washington, DC, USA, December 9, 2014) With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what's ahead for...
ICFPT 2014(Shanghai, China, December 10 - 12, 2014) ICFPT is the premier conference in the Asia-Pacific region on field-programmable technologies including reconfigurable computing devices and systems containing such components. Field-programmable devices...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.