Information operations continue in parallel with Gaza fighting. Hamas and its hactivist sympathizers successfully hijack an Israeli television station and deface a webpage belonging to the country's largest newspaper, Haaretz. Expect more, particularly if the cease-fire takes.
Gameover Zeus is resurfacing, and it gains a competitor in the black market: the "Zeus-like" banking Trojan Kronos is selling for $7k in Russian criminal fora. An early bird discount is available to those who act now.
Other Russian criminals adopt a high-minded tone. W0rm (familiar to cyber-crime-watchers) hacked media outlet CNet and stole a database containing user credentials, but the W0rms say they've taken a principled decision not to distribute the data. They hacked, they say, just to highlight security problems.
The US Secret Service warnings against hotel Wi-Fi — particularly in hotels with business centers — prompt others to note that free hotspots are becoming a widely available attractive nuisance. And public PCs in business centers, libraries, etc. should be approached with extreme caution: "cesspools," Seltzer calls them, like "sharing needles" (to mix lurid metaphors) and advises never using their installed OS should you have to access personal or business resources through them.
Future Java patches may work on Windows XP machines after all, says Oracle.
Security experts call for cloud malware analysis, better information sharing, and more attention to identity management.
HM Government announces a major investment in UK cyber security, shifting defence resources from conventional physical weapons. The US IC expects big benefits from its coming adoption of Amazon Web Services.
Today's issue includes events affecting China, Ireland, Israel, Lebanon, Palestinian Territories, Russia, Saudi Arabia, United Arab Emirates, United Kingdom, United States..
We're just two days away from SINET's New York Innovation Summit. The CyberWire will be covering the conference live.
Cyber Attacks, Threats, and Vulnerabilities
Hamas 'Takes Over' Channel 10(Arutz Sheva) Terrorists from the Izz al-Din al-Qassam Brigades, Hamas's "military wing", were able to take over the broadcast of Israel's Channel 10 on Monday evening
CNET attacked by Russian hacker group(CNet) A Russian hacker group that has attacked some of the biggest news and business sites in the world claims it penetrated CNET's website over the weekend and stole a database of registered reader data
WiFi Is Getting Even More Public — Don't Make Yourself A Target(Forbes) Flight delayed and you need to get work done? Airport public WiFi is a tempting solution and lets you work on the marketing plan stored on your Google GOOGL +1.3% Drive. With 5.8 million hotspots expected to be available by 2015, it's becoming easier to work remotely from anywhere
OSUETA v0.8 OpenSSH User Enumeration Timing Attack Released(ToolsWatch) OSUETA stands for OpenSSH User Enumeration Timing Attack and is a small script written in Python to exploit a bug present in versions 5 .* and 6.* of OpenSSH . In these versions during the authentication process, you may obtain a list of users in the system discriminated by the time it takes the system to evaluate an arbitrarily long password
"I've been hacked, and now I'm pregnant!"(We Live Security) We put trust in technology every day. We drive a car to work, and trust that its brakes won't fail too badly, and that its engine won't explode in a massive fireball on the dual carriageway
Bulletin (SB14-195) Vulnerability Summary for the Week of July 7, 2014(US-CERT) The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information
Security Patches, Mitigations, and Software Updates
Java on XP?(Lumension Blog) Is it still supported, and what should you do about it?
Cisco Patches Four-Year-Old Apache Struts 2 Issue(Softpedia) A vulnerability in Apache Struts 2 that would allow a potential attacker to execute arbitrary code on an affected system has been patched by Cisco at the end of last week; the security issue was initially reported in July 2010
Kaspersky Lab survey finds half of financial institutions tolerate losses caused by cybercrime(Zawya) Save as PDF Add to Reading List Dubai, 14 July 2014: According to a survey conducted by Kaspersky Lab together with B2B International in 2014 around the world, including the GCC region, 52% of financial companies reimburse customer losses caused by Internet fraud without actually investigating the circumstances. Almost a third of companies believe the costs incurred by cyber threats are less than the cost of protection. As cybercriminals increasingly target e-payments, this approach could translate into considerable expenses for the company
Why Identity Management Is the New Security(Information Security Buzz) Another day, another massive security breach. Most recently, hackers exposed a security hole in Apple's iCloud that grants unauthorized access to lost and stolen iOS devices. eBay suffered a crippling cyberattack that compromised its main database, forcing all users to change their passwords. And AOL confirmed a significant security incident involving unauthorized access to the company's network and systems
General Dynamics Fidelis Cybersecurity Solutions Joins Forces with Microsoft to Further Protect Customers(Wall Street Journal) General Dynamics Fidelis Cybersecurity Solutions announced that it has joined the Microsoft Active Protections Program (MAPP). Under this industry partnership program, General Dynamics Fidelis will receive advanced information from Microsoft about their monthly security bulletins, allowing the team to anticipate emerging threats and provide faster and more comprehensive protection for Fidelis XPS customers
Bechtel Looks to Bolster U.S. Cybersecurity Ranks(Natural Gas Intel) Seeking to shore up the United States's ability to protect against a cyber attack on government, industry or energy infrastructure, Bechtel on Monday unveiled a program with two U.S. national security laboratories to fund multiyear positions for early-career professionals in critical cybersecurity fields
Meet 'Project Zero,' Google's Secret Team of Bug-Hunting Hackers(Wired) When 17-year-old George Hotz became the world's first hacker to crack AT&T's lock on the iPhone in 2007, the companies officially ignored him while scrambling to fix the bugs his work exposed. When he later reverse engineered the Playstation 3, Sony sued him and settled only after he agreed to never hack another Sony product
First aid kit for people who face digital threats(Help Net Security) A group of NGOs that includes the EFF, Global Voices, and Internews, has launched the Digital First Aid Kit, an open source self-assessment tool for people who face digital threats
Free Antivirus by Microsoft — Microsoft Security Essentials(Streetwise Tech) Microsoft is on its way in leading the world of antivirus software, as they introduce their easiest to use antivirus — the Microsoft Security Essentials. It is an antivirus software product that provides protection against different types of malware, viruses, spyware and threats
Barracuda Web Application Firewall Now Available in Azure Gallery as part of Microsoft Azure Certified(Wall Street Journal) Barracuda Networks, Inc. (NYSE: CUDA), a leading provider of cloud-connected security and storage solutions, today announced the latest release of the Barracuda Web Application Firewall, version 7.9. This new version extends Microsoft Azure support with automated provisioning and configuration, enabling customers to take advantage of the dynamic, elastic nature of the cloud. The Barracuda Web Application Firewall Vx is available in the Azure Gallery as part of the new Microsoft Azure Certified program. Barracuda is presenting this new functionality at the Microsoft Worldwide Partner Conference this week in Washington, DC
G Data Anti-Virus — Features and Updates(Streetwise Tech) G Data Software, a collection of anti-malware solutions developed by G Data Software Inc., is considered one of the best anti-virus software in the global market today. It supports a high level of security and protection for users. Furthermore, it is user-friendly and easy to navigate
Endpoint security myths and why they persist(Help Net Security) In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist. Furthermore, he talks about the hurdles with protecting endpoint clients in the enterprise and offers advice on what organizations can do in order to stay ahead of the threats
IoT privacy tech working group announced(Help Net Security) TRUSTe formed a multi-stakeholder IoT Privacy Tech Working Group to identify the technical standards and best practices necessary to help enhance consumer privacy in the Internet of Things (IoT)
What is Haka(Haka) Haka is an open source security oriented language which allows to apply security policies on (live) captured traffic
AOC Cloud(Internet Storm Center) In matters of food and wine, the Europeans have this concept of "AOC", based on the originally French "Apellation d'origine contrée". It means that, say, Bordeaux wine actually comes from there, and is not re-bottled Malbec from Patagonia. The point I'm trying to make, albeit poorly, is that it is sometimes important to know where things are coming from, which implies traceability to the source
Introduction to Smart Meters(Security Intelligence Blog) While wearable personal technology may be the most "public" face of the Internet of Everything, the most widespread use of it may be in smart meters
Cyber Operations Centers of Academic Excellence List Expands(SIGNAL) The National Security Agency (NSA) has selected five more schools for the National Centers of Academic Excellence (CAE) in Cyber Operations Program, which is designed to cultivate more U.S. cyber professionals. These schools are now designated as Cyber Operations CAEs for the 2014-2019 academic years
UTSA to promote cyber status in D.C.(San Antonio Business Journal) A team of officials from the University of Texas at San Antonio is travelling to Washington, D.C., this week to promote the school's cybersecurity agenda
Snowden Document Exposes Extensive List of British Spying Tools(TechCrunch) The Government Communication Headquarters (GCHQ) — Britain's National Security Agency (NSA) equivalent — commands a wide-ranging set of tools that enable it to hack into popular social media and communications outlets and plant false information on the Internet, according to a document published by The Intercept Monday. The long list of options ranges from inflating the results of online polls to allowing the agency to monitor Skype communications in real time, though the details of that capability remain murky
Open letter from UK legal academic experts re DRIP(via Paul Bernal) On Thursday 10 July the Coalition Government (with support from the Opposition) published draft emergency legislation, the Data Retention and Investigatory Powers Bill ("DRIP"). The Bill was posited as doing no more than extending the data retention powers already in force under the EU Data Retention Directive, which was recently ruled incompatible with European human rights law by the Grand Chamber of the Court of Justice of the European Union (CJEU) in the joined cases brought by Digital Rights Ireland (C-293/12) and Seitlinger and Others (C-594/12) handed down on 8 April 2014
OPM hacking attack exposes weaknesses in cyber defense(Federal Times) As investigators probe a March cyber attack on sensitive federal personnel databases, some experts and policy makers are calling for more clarity over who is responsible for protecting federal networks from cyber threats
Poll: US global image survives spying concerns(Deseret News) Widespread global opposition to U.S. electronic surveillance since the revelations by onetime National Security Agency contractor Edward Snowden has not badly tarnished the overall image of the United States, and it remains far more popular around the world than rising power China, according to a poll released Monday
Top Army brass defend troubled intelligence system(AP via Progress-Index) When Gen. John Campbell, the Army's vice chief of staff, appeared last year at a budget hearing on Capitol Hill, he cited his son's experiences as a soldier in Afghanistan to answer a senator's tough questions about a troubled intelligence technology system
How the CIA Partnered With Amazon and Changed Intelligence(DefenseOne) The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks
Litigation, Investigation, and Law Enforcement
Arrests made after keyloggers found on public PCs at US hotels(Naked Security) Proof of the dangers of publicly accessible PCs came up yet again when the US Secret Service last week warned that cybercrooks are installing keyloggers on the PCs in hotel business centers to steal personal and business information from travelers
Su Bin, Lode-Tech, And Privatizing Cyber Espionage In The PRC(Digital Dao) The criminal complaint against Chinese businessman Su Bin (aka Stephen Su, Stephen Subin) is a must-read. Be sure to read the Wall Street Journal article as well. It marks the first time that the FBI has issued an arrest warrant for a foreigner charged with an act of cyber espionage via a network attack that has until now been attributed solely to state actors like the PLA
United States of America vs. Su Bin, aka Stephen Su, aka Stephen Subin (United States District Court for the Central District of California) Complaint for violation of Title 18, United States Code, and Section 1030(b) (Conspiracy to Gain Unauthorized Access to a Protected Computer and Obtaining Information and Things of Value with Intent to Defraud), and Section 1030(a)(2)(C) (Unauthorized Access of a Protected Computer and Obtaining Informaiton)
Disarray, data manipulation at Phila. VA, report finds(Philly.com) Inspectors surveying Philadelphia's Veterans Affairs benefits center in June found two stunning signs of disarray: mail bins brimming with claims dating to 2011 and other benefits that had been paid twice
FBI cyber expert is ex-discount furniture salesman(Freenewspos) J. Keith Mularski's world has expanded greatly since he stopped selling discount furniture to join the FBI in 1998. Especially since he transferred from Washington, D.C., in 2005 to fill a vacancy in the Pittsburgh field office's cyber squad — which he now heads
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
2nd Annual Oil & Gas Cyber Security Conference(Houston, Texas, USA, July 15 - 17, 2014) This highly interactive, hands-on forum will break down each potential cyber threat specific to the oil and gas industry, as well as tackle key issues including managing communication between OT and IT...
Security Startup Speed Lunch DC(Washington, DC, USA, July 22, 2014) Our goal is to connect the most promising security startups in the world with decision-makers at aerospace, asset-management, banking, communications, defense, energy, healthcare, government, technology...
SHARE in Pittsburgh(Pittsburgh, Pennsylvania, USA, August 3 - 8, 2014) LEARN: Subject-matter experts and practitioners are on-hand at SHARE events to discuss major issues facing enterprise IT professionals today.
FOCUS: SHARE provides leading-edge technical education on a variety of topics. Whether you are an IT manager, IT architect, systems analyst, systems programmer or in IT support, SHARE offers focused sessions to benefit all job roles.
ENGAGE: At SHARE events, you will experience a wide variety of formal and informal networking opportunities that encourage valuable peer-to-peer interaction...
Passwords14(Las Vegas, Nevada, USA, August 5 - 6, 2014) Passwords is the first and only conference of its kind, where leading researchers, password crackers, and experts in password security from around the globe gather in order to better understand the challenges...
BSidesLV 2014(Las Vegas, Nevada, USA, August 5 - 6, 2014) We have an amazing array of speakers each year, covering topics such as Penetration Testing, Forensics, Incident Response, Risk, and everything in between. We have a Lockpick Village, the Squirrels in...
4th Annual Cyber Security Training Forum(Colorado Springs, Colorado, USA, August 5 - 6, 2014) The Information Systems Security Association (ISSA) — Colorado Springs Chapter and FBC, Inc. will co-host the 4th Annual Cyber Security Training Forum (CSTF). CSTF is set to convene from Tuesday August...
DEF CON 22(Las Vegas, Nevada, USA, August 7 - 10, 2014) The annual hacker conference, with speakers, panels, and contests. Visit the site and penetrate to the schedules and announcements.
South Africa Banking and ICT Summit(Lusaka, Zambia, August 8, 2014) The South Africa Banking and ICT Summit is the exclusive platform to meet industry thought leaders and decision makers, discover leading edge products and services and discuss innovative strategies to...
SANS Cyber Defense Summit and Training(Nashville, Tennessee, USA, August 13 - 20, 2014) The SANS Institute's Cyber Defense Summit will be paired with intensive pre-summit hands-on information security training (August 13-18). This event marks the first time that SANS will conduct a training...
Resilience Week(Denver, Colorado, USA, August 19 - 21, 2014) Symposia dedicated to promising research in resilient systems that will protect critical cyber-physical infrastructures from unexpected and malicious threats—securing our way of life.
AFCEA Technology & Cyber Day(Tinker AFB, Oklahoma, USA, August 21, 2014) The Armed Forces Communications & Electronics Association (AFCEA) — Oklahoma City Chapter will once again host the 10th Annual Information Technology & Cyber Security Day at Tinker AFB. This is the only...
Build IT Break IT Fix IT: Build IT(Online, August 28, 2014) The Build it Break it Fix it security contest is a new security-oriented programming contest held by the Maryland Cybersecurity Center, Cyberpoint, and Trail of Bits. The Build it Break it Fix it security...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.