Anonymous hacktivists, exercised by Russian troop movements in the vicinity of Ukraine, announce Operation Ukraine (#OpIndependence) and threatens a cyber riot against any country (and they're looking at you, Russia) that would undermine Ukrainian stability and independence.
CryptoLocker continues its creepy spread through the United Kingdom, with vectors now masquerading as Royal Mail communications. The ransomware is enjoying surprising success: a University of Kent study suggests forty percent of British CryptoLocker victims are paying up.
Bogus "payment certificate" notifications carry a cross-platform Java remote access Trojan (JRAT) to targets in the UK and the UAE.
"Gameover," current darling of the ZeuS Trojan family, gets an unwelcome upgrade in the form of a kernel-mode rootkit.
SpyEye and Tilion banking malware are found to be the work of the same author (or team of authors).
The energy sector continues to mull its difficulties obtaining cyber insurance. Vulnerabilities in that sector seem, a study published by Rice University suggests, particularly well-placed to spread risk to defense establishment targets. Energy companies are advised to take a hard look at cyber risk and give the recently released NIST cyber framework close attention.
Where, an editorialist wonders on the hundredth anniversary of sea power theorist Alfred Mahan's death, is Mahan's cyber power counterpart?
Bitcoin exchange Mt. Gox has filed for bankruptcy amid reports it's lost coins worth $473 million, but competing exchanges (and their clients) aren't giving up on the cryptocurrency.
Security researchers outline ten crypto transparency principles in an open letter to the tech industry.
Today's issue includes events affecting Australia, Canada, China, Germany, Israel, Japan, Republic of Korea, Russia, Switzerland, Taiwan, Turkey, Ukraine, United Arab Emirates, United Kingdom, United States..
RSA Cybersecurity Conference Sees Record Attendance(Top Tech News) The large hall of Moscone Center in San Francisco, site of the RSA Conference 2014 this week, was filled with vendors hawking new technologies to thwart malware makers, hackers, identity thieves and other online miscreants. Automated threat warning and incident response were big themes this year
Podcast: RSA Wrap-Up — Day 2(Threatpost) Dennis Fisher and Mike Mimoso run down the news from day two of the RSA Conference, including the new FBI director's speech and preview Trusty Con
[TrustyCon] EMC, RSA, NSA, @TrustyCon, and "dirty tricks"(ComputerWorld) The RSA (NYSE:EMC) Conference was boycotted yesterday by TrustyCon attendees. A range of speakers criticized the company's alleged cosy links with the NSA, arguing that the industry badly needs a huge dose of trustworthiness
[TrustyCon] Lavabit Case May Be One of Many in Coming Years(Threatpost) The Lavabit case, which saw the secure email provide's owner shut the company down after being forced to hand over to the government the encryption key that protected his users' data, may seem like an extreme reaction to a unique situation. But, experts say it's likely that there will be similar situations in the near future, and technology providers an users should change the way they think about what the threats to their data may be
[TrustyCon] Fixing Trust Through Certificate Transparency(Threatpost) The security of data being transmitted over the Web relies on a large number of moving parts, from the integrity of the machine sending the data, to the security of the browser, to the implementation of encryption, to the fragility of the certificate authority system. Experts have been spending the best part of the last decade trying to address many of these issues, but there are still a number of hard problems to solve
RSA: Enterprise Security's Sucker Punch(eSecurity Planet) Addressing RSA attendees, IDC analysts detail outlook for the current and future IT security landscape. At IDC's annual analyst breakfast meeting at the RSA conference here, analysts discussed the mindset of IT executives toward security, which one analyst described as "My Eyes Glaze Over"
Stealthy attacks multiply and victims turn to spooks-as-a-service(IT World) As the list of victims of sophisticated cyber attacks expands, so does the need for high-priced talent to help investigate and recover from those attacks. The latest solution: hosted services offering access to cyber intelligence and incident response to customers who lack it
Intelligent Cybersecurity for the Real World(Cisco Blogs) Security trends and innovation are in the spotlight this week at the annual RSA Conference in San Francisco. With the rapidly expanding attack surface and increasingly sophisticated attackers, the event is a must for insights on how the industry can meet this pace of change, evolve and defend against advanced threats. Solving our customers' toughest security challenges is our number one priority…For starters, we're delivering new product innovation by adding Advanced Malware Protection (AMP) to our Web and Email Security Appliances and Cloud Web Security. We are calling this "AMP Everywhere"
Webroot delivers APT protection for enterprises(Help Net Security) Webroot announced the release of BrightCloud Security Services and BreachLogic Endpoint Agent, two cloud-based security offerings designed to help enterprises address the explosive growth and increasing sophistication of online threats, particularly targeted attacks such as "spearphishing" and advanced persistent threats (APTs)
Android, iOS solution reveals data-leaking apps(Help Net Security) Your mobile device knows everything about you. But how well do you know your mobile device? Beginning today, savvy consumers can truly take control of their personal information on their devices — by installing viaProtect from viaForensics
Anonymous Declares Cyberwar on Countries Found Disturbing Peace in Ukraine(HackRead) The online Anonymous Hacktivist has released a video message in which it has declared cyberwar on countries and organizations, posing a threat to freedom and independence of Ukraine. The operation has been named as "Operation Ukraine" (#OpIndependence). A 4:37 minute video message highlights several aspects of Ukrainian crisis such as international interference and divided mindset
CryptoLocker Now Comes In The Mail(SecurityWatch) Earlier this month Brian and I both wrote about ransomware and the threat it poses to both business and individual computer users. Now, if further evidence is needed of how the problem continues to grow, it appears that there is a large run of CryptoLockered-emails appearing, purporting to have come from Royal Mail
Notorious "Gameover" malware gets itself a kernel-mode rootkit…(Naked Security) Zeus, also known as Zbot, is a malware family that we have written about many times on Naked Security. We've covered it as plain old Zbot. We've covered the Citadel variant, which appeared when the original Zbot code was leaked online. We've even written about the time it pretended to be a Microsoft fix for CryptoLocker, a completely different strain of malware. Currently, the most widespread Zbot derivative is the Gameover bot, also known as Zeus P2P because of its use of peer-to-peer network connectivity for command and control
Why Co-ops Should Take Note of Cyber Framework(ECT.coop) The Obama administration's voluntary framework for cyber security, finalized after significant collaboration with the private sector, should be studied by all electric cooperatives
Hacks on Gas: Energy, Cybersecurity, and U.S. Defense (James A. Baker III Institute for Public Policy, Rice University) Cybersecurity in the energy sector can trace its start to an account (that may or may not be true) about U.S. involvement in a computer-based attack on the energy infrastructure of the Soviet Union during the Cold War. Elements of the incident are described in the memoir of Thomas C. Reed, an official in the administration of President Ronald Reagan and a former National
Reconnaissance Office director
America is the prime target of international cyberattacks(Quartz) The United States has been cyberattacked by governments and criminal organizations a lot more than any other country. At least that's the conclusion of a study released this morning of 40,000 online attacks against customers of the cyber-forensics company FireEye
Wanted: A Mahan for Cyberspace(Real Clear Defense) This year marks an important but likely overlooked anniversary — 100 years since the death of Alfred Thayer Mahan. A notable military officer and scholar, Mahan revolutionized military strategy and security policy with his 1890 book The Influence of Sea Power Upon History
The Future of Bitcoin After the Mt. Gox Incident(SecureList) No doubt it's been a crazy week for anyone even remotely interested in Bitcoin. Mt. Gox, once the largest Bitcoin marketplace out there, has shut down, putting a bitter end to an almost month-long situation in which all withdrawals were halted because of "technical issues"
The Future of Bitcoin Exchanges: Comments From a Mt. Gox Competitor(IEEE Spectrum) Mt. Gox, the Japan-based exchange which until recently handled the majority of trades between Bitcoin and fiat currencies, went offline this Tuesday, hours after the media got its hands on a document (supposedly leaked from within Mt. Gox) that described the company as insolvent and preparing for bankruptcy. Panic quickly spread among traders many of whom are still waiting for reimbursement from the exchange
Enterprise-level UTM for home and small offices(Help Net Security) WatchGuard Technologies announced the WatchGuard Firebox T10 Unified Threat Management (UTM) solution, a network security appliance that allows enterprises to extend powerful network security to small office home office (SOHO) environments
DDoS and BCP 38(Internet Storm Center) Quite often on many lists we will hear the term Best Current Practice (BCP) 38 bandied about and further recommendations to implement (See NANOG Mailing list archive). Some will say 'it will aid in DDoS mitigation' and even others will even state 'All Internet Service Providers (ISP) should implement this.' Now before the philosophical discussions ensue in the comments, it might be a good idea to discuss, technically, what it is? And perhaps what it can do
Cybersecurity in the Golden State(Office of the Attorney General, State of California) California is at the center of the digital revolution that is changing the world. Because of work done by companies right here in our home state, we are more connected — and empowered — than ever before. But we are also increasingly vulnerable
Outgoing NSA chief Keith Alexander signals openness to surveillance reform(The Guardian) General Keith Alexander, testifying before the Senate armed services committee for what could be the final time as head of the NSA, told senators that one option under consideration in the Obama administration's deliberations about revamping the NSA's surveillance programs was to "get only that data" relating to terrorist communications
Cost of NSA surveillance hard to define(FierceGovIT) Surveillance by the National Security Agency costs the United States in terms of direct costs to American taxpayers to pay for it, costs to lost opportunities in the American Internet industry, costs to foreign relations work and costs to Internet security, said Anne-Marie Slaughter, president and chief executive of the New America Foundation. But pegging a dollar value on it is a difficult exercise, said panelists during a Feb. 25 event hosted by the think tank in Washington
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
RSA Conference USA(San Francisco, California, USA, February 24 - 28, 2014) Hundreds of game-changing interactions will give you an unparalleled diversity of industry insight and information based on best practices, real implementation stories, and detailed case studies. Each...
Cybersecurity Tax Credits Webinar(Online, March 11, 2014) Learn about tax credits designed to help your cybersecurity company grow in Maryland. Details will be presented by Jeffrey Wells, Executive Director of Cyber Development and Mark Vulcan, Esq., CPA, Program...
ICS Summit 2014(Lake Buena Vista, Florida, US, March 17 - 18, 2014) The 9th Annual North American ICS Security Summit brings together the program managers, control systems engineers, IT security professionals and critical infrastructure protection specialists from asset...
MCT-Congress: Going Mobile with Clinical Trials(Edinburgh, Scotland, UK, March 20 - 21, 2014) It is almost inevitable that mHealth solutions will be adopted across healthcare systems worldwide over the next decade. What is less clear is the impact that mobile solutions are having and could have...
Fourth Annual China Defense and Security Conference(Washington, DC, USA, March 25, 2014) The Jamestown Foundation will hold its Fourth Annual China Defense and Security Conference on March 25 in Washington, D.C. In keeping with the Foundation's mission, the conference will focus on understanding...
SEC Cybersecurity Roundtable(Washington, DC, USA, March 26, 2014) The Securities and Exchange Commission today announced that it will host a roundtable next month to discuss cybersecurity and the issues and challenges it raises for market participants and public companies,...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.