Events in Crimea escalate, kinetically, at least, with Ukraine alleging more Russian troop deployments as Crimea's rump-puppet parliament votes to join Russia. Some signs of cyber rioting break out, as anti-Putin hacktivists (perhaps operating independently) claim successful attacks on Russia's Rosoboronexport via a compromised Indian embassy network.
Indian media report a significant, long-standing penetration of that country's military networks.
Two major new cyber campaigns are reported. General Dynamics Fidelis reports that a criminal group, "STTEAM," is operating against oil and gas sector targets in the Middle East. (No further attribution is available, but Turkish words show up in the code.) Trend Micro discovers "Siesta" (so-called for its long periods of dormancy), a campaign directed against the energy, finance, security, defense, and healthcare sectors. Siesta is distributed via spearphishing of executives in targeted companies.
Two old campaigns remain active and dangerous: "Dexter" and "Project Hook" still endanger point-of-sale systems.
Apple's iOS is reported vulnerable to exploitation via malicious mobileconfig files.
Bitcoin exchange looting continues. Bitcoin aficionados protest that the flaws lie in the exchanges, not the cryptocurrency itself.
More cyber criminals are seen turning to extortion, as seen in Meetup's and Brand.com's experience. Expect threats of encryption, denial-of-service, and online reputational damage.
Cisco patches an authentication flaw in its routers. Microsoft will fix Internet Explorer zero-day CVE-2014-0322 on next week's Patch Tuesday.
Even as cyber security jobs open up, US students seem to fail at ideation: they're not seeing themselves in the field.
Charges dropped in the Barrett Brown hyperlink case.
Today's issue includes events affecting Azerbaijan, Colombia, Egypt, Ethiopia, European Union, Hungary, India, Iran, Italy, Kazakhstan, the Republic of Korea, Malaysia, Mexico, Morocco, Nigeria, Oman, Panama, Poland, Russia, Saudi Arabia, Sudan, Thailand, Turkey, the Ukraine, United Arab Emirates, United Kingdom, United States, and Uzbekistan..
U.S. Knew Of 'Imminent' Move In Crimea, Top Official Says(NPR) Senior U.S. officials were warned of imminent Russian military action in Crimea about a week before the troop movements that have sparked a major international crisis over Ukraine, the head of the Defense Intelligence Agency tells NPR
Computers of armed forces and DRDO hacked(Economic Times) In a major security breach, around 50 computers belonging to the armed forces and the DRDO were hacked sometime back and classified files could have been compromised
Oil & Gas Firms Targeted In Web Server Hacks(Dark Reading) 'STTEAM' group also attacking Middle East state government sites, General Dynamics Fidelis says. A group of hackers who goes by the handle "STTEAM" has hit about a half-dozen oil and gas and government agencies in the Middle East using a mix of hacktivist, nation-state, and pure cybercrime techniques
Siesta cyber espionage campaign targets many industries(Help Net Security) Trend Micro researchers have uncovered yet another cyber espionage campaign targeting a wide variety of industries including energy, finance, security and defense, and healthcare. Dubbed "Siesta" on account of the periods of dormancy the delivered malware is ordered to enter at regular intervals, the campaign starts with malicious emails delivered to the target company's executives
Navy Hacking Blamed on Iran Tied to H-P Contract(Wall Street Journal) A major infiltration of a military network blamed on Iran was facilitated by a poorly written contract with computer-services provider Hewlett-Packard Co. HPQ, said people familiar with the matter
Bitcoin Heists Cause More Trouble(InformationWeek) Attackers continue to pummel bitcoin "banks," exchanges, and crypto-currency users themselves via malware that steals virtual wallets
Where have all the Bitcoins gone?(Naked Security) In the past, when we've covered anything that sounded even remotely like "Bitcoin trouble," we've ended up with well-meaning Bitcoin fans on our case. That's because many of, though not all, the Bitcoin troubles we have written about have really been troubles at the interface between Bitcoins and traditional currency
Newsweek Outting of Bitcoin's Satoshi Nakamoto Sparks Backlash(IEEE Spectrum) In an article published this morning by Newsweek, reporter Leah McGrath Goodman claims to have unmasked the elusive creator of the Bitcoin protocol. According to her story, the programmer, who for five years has been the subject of a high-stakes hacker manhunt, is a 64-year old, ailing Japanese American who loves model trains, deeply mistrusts the government and lives in the suburbs of Los Angeles. And his name really is Satoshi Nakamoto
Brand.com blackmail, cyber attack shines light on cybercrime(Communities Digital News) In December, Brand.com president Mike Zammuto was the subject of a cyber attack. "One or more people sent us email demanding $500,000 in Bitcoin," said Zammuto. "They said that if we did not pay then that they would attack Brand.com and myself online and cause us to lose business"
How cyber criminals beat email filters and web gateways(Computing) Cyber criminals can use clever psychological tricks to entice users to click on their malicious emails, and can be so adept at hiding their intentions that traditional email and gateway filtering fails to stop them
Security Patches, Mitigations, and Software Updates
Cisco Patches Authentication Flaw in Wireless Routers(Threatpost) There's a serious security flaw in some of Cisco's wireless routers that could allow a remote attacker to take complete control of the router. The bug is in a number of the Cisco small business routers, as well as a wireless VPN firewall
There's No Real Difference Between Online Espionage and Online Attack(The Atlantic) You can't hack passively. Back when we first started getting reports of the Chinese breaking into U.S. computer networks for espionage purposes, we described it in some very strong language. We called the Chinese actions cyber-attacks. We sometimes even invoked the word cyberwar, and declared that a cyber-attack was an act of war
Baroness fires cyber attack warning(Yorkshire Post) Britain must be braced for a cyber attack aimed at crippling its military, industry and energy supplies during times of crisis, according to the former chairman of the Joint Intelligence Committee
Antivirus Users Want Low Impact, Good Detection, Survey Shows(PC Mag) Independent testing lab AV-Comparatives ran a survey last December asking site visitors just what they want to see in an antivirus product, what's most important to them in testing, and which information sources they trust. AV-Comparatives gave me a special link for my own post announcing this survey, which allowed them to supply me with figures for SecurityWatch readers, separate from the worldwide figures
Healthcare IT must adopt top security(European Hospital) With eavesdropping into secure systems brought sharply into focus as a result of revelations of monitoring by the US National Security Agency (NSA), a leading communication expert has warned that many hospitals across Europe need to take further steps to better protect the sensitive data stored on their healthcare IT systems
Baltimore's software and IT industries are hiring(Baltimore Business Journal) Research Director-Looking at the list below, I think maybe it's not such a bad time to be a tech professional in the market for a job. Below are all the jobs mentioned to us in a recent survey of local software and IT consulting firms, when we asked each company if they're hiring in the next few months
American Career Aspirations Do Not Include Cybersecurity(InfoSecurity Magazine) The worldwide cybersecurity skills shortage is well-documented; and many countries have developed programs to fill the gap. These programs usually try to instill interest in schools, or tempt IT professionals into a career in security
Avira Free Mac Security 18.104.22.168 Released(Softpedia) Avira has released a new update to its free antivirus software for OS X customers, Avira Free Mac Security 22.214.171.124, which packs equal doses of new features, enhancements, and fixes
Abacus Solutions Plays Key Role in Live Cybersecurity Simulation To Help Companies Understand the Threat Landscape(PRWeb) A report released this week details the large-scale cyber attack simulation that took place in Atlanta last week. The simulation, which was produced by the Technology Association of Georgia (TAG) and hosted by General James B. Butterworth, Adjunct General of the Georgia National Guard, exposed vulnerabilities companies have in protecting critical data, and in the real-time decision-making that happens during actual cyber attacks. Abacus Solutions Security Architect Jeff Jones played a key role as leader of one of the seven teams that attacked the fictitious business called The Logistics Company
Corero First Line of Defense Receives Two Info Security Global Excellence Awards(Wall Street Journal) Corero Network Security (LSE: CNS), a leading provider of First Line of Defense(R) security solutions, today announced that its DDoS Defense technology for the Enterprise was selected for two 2014 Info Security Global Excellence Awards. The Corero First Line of Defense solution received silver in the "Security Products and Solutions for Medium Enterprises" category and bronze in "Security Products for Finance and Banking"
CIOs Battle Worker Apathy Towards Lost or Stolen Mobile Phones(CIO) Like spoiled teenagers, American workers are telling their CIO that lost or stolen phones are simply not their fault, not their problem. Corporate data theft is no big deal. It's just a phone, they say. Besides, aren't you responsible for mobile data security? It's enough to make a CIO's blood boil
Survey: Centralized SSH security can help avoid high-profile breaches(TechTarget) Secure Shell keys used to protect machine-to-machine transactions are often going unmonitored by organizations, allowing hackers and insiders to use the unmanaged keys for malicious intent, according to a survey released by Cambridge, Mass.-based Forrester Research Inc
CSA to open source software defined perimeter "sometime this year"(Business Cloud) After a successful hackathon last week that saw its Software Defined Perimeter (SDP) network remain unbreached, the Cloud Security Alliance's (CSA) executive director Jim Reavis revealed that the organisation is on track to release an open source version of the framework "sometime this year"
New technique targets C code to spot malware attacks(Help Net Security) Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on previous techniques by targeting code written in the C programming language — which is often used to create root exploit malware, whereas the bulk of Android applications are written in Java
Cryptographic obfuscation and 'unhackable' software(A Few Thoughts on Cryptographic Engineering) I have a thing for over-the-top cryptography headlines — mostly because I enjoy watching steam come out of researchers' ears when their work gets totally misrepresented. And although I've seen quite a few good ones, last week WIRED managed a doozy
A Cyber Army in Formation at South Korea's Hacker School(CSO) Many countries around the world are making large investments in cyber warfare from both an offensive and a defensive perspective. This is particularly true in emerging markets where finding parity in kinetic strength — tanks, submarines, ICBMs etc. — doesn' seem tenable, but where cyber can act as a great equalizer. South Korea is one such example
Norwich Ranked High as Cyber Security School(Northfield News) Norwich University was ranked second on a list of schools considered by security practitioners to be the best in the country for cybersecurity courses and degree programs
Privacy is in our blood, says NSA official(The Hill) Civil liberties are a top concern at the National Security Agency (NSA), the agency's new privacy chief said Thursday. "In their blood is [the] protection of your privacy," Rebecca Richards said Thursday, speaking at a privacy conference hosted by the International Association of Privacy Professionals
Four Federal Cyber Escapades to Watch for this Spring(Nextgov) The Obama administration's 2015 budget request hints at novel approaches to the cyber threat at civilian agencies and the Pentagon. Funding-related papers released on Tuesday to justify spending for congressional appropriators do not include the details. So, look for officials to color in the picture during House and Senate hearings in the weeks ahead
Navy to Expand Information Dominance Capabilities(SIGNAL) The U.S. Navy is working to incorporate information dominance as a key part of its future warfighting tool kit. As a part of this ongoing effort, the sea service is standing up a new force dedicated to information dominance
California launches cyber-attack awareness campaign(FierceCIO) In response to growing IT security threats against government agencies, public corporations and private institutions, the State of California has launched a campaign to better educate organizations on the cyber security threats they face and steps they can take to better safeguard themselves
Litigation, Investigation, and Law Enforcement
Gen. Dempsey: NSA leaks will cost billions(AP via WAAY TV) The top U.S. military officer says it will take two years of study and billions of dollars to overcome the loss of security to military operations and tactics that were revealed in the massive stash of documents taken by former National Security Agency contractor Edward Snowden
Ex-OCR adviser offers HIPAA auditing tips(FierceHealthIT) Attorney David Holtzman, former senior adviser at the U.S. Department of Health & Human Services Office for Civil Rights, expects OCR will begin its HIPAA audit program in April, and says it's important for providers to be prepared from all angles
The Judge Who Said No to the NSA(American Lawyer) When Judge Richard Leon took on the NSA over its collection of phone data, it wasn't the first time he had questioned government's antiterrorism tactics
Barrett Brown hyperlink charges dropped(Naked Security) Barrett BrownThe US government has moved to drop several charges against journalist and activist Barrett Brown that could have had far-reaching consequences for all users of the web
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
CyberBiz Summit(Linthicum, Maryland, USA, March 28, 2014) Learn first-hand how to get your cyber business started, how to raise capital, and what to do to make it happen. Join us for four informative sessions, networking and breakfast at the BWI Westin on Friday,...
The Device Developers' Conference: Bristol(Bristol, England, UK, May 20, 2014) The Device Developers' Conference is an annual UK event for the developers of intelligent systems and devices. The objective is to provide an event that provides engineers with an opportunity to learn...
The Device Developers' Conference: Cambridge(Cambridge, England, UK, May 22, 2014) The Device Developers' Conference is an annual UK event for the developers of intelligent systems and devices. The objective is to provide an event that provides engineers with an opportunity to learn...
The Device Developers' Conference: Manchester(Manchester, England, UK, June 3, 2014) The Device Developers' Conference is an annual UK event for the developers of intelligent systems and devices. The objective is to provide an event that provides engineers with an opportunity to learn...
The Device Developers' Conference: Scotland(Uphall, Scotland, UK, June 5, 2014) The Device Developers' Conference is an annual UK event for the developers of intelligent systems and devices. The objective is to provide an event that provides engineers with an opportunity to learn...
Global Summit on Computer and Information Technology(, January 1, 1970) The summit is hosting multiple conferences in different areas of Computer & Information Technology. CIT is a major platform for researchers and industry practitioners from different fields of computer...
Nuclear Regulatory Commission ISSO Security Workshop(, January 1, 1970) Exhibitors will have the opportunity to showcase cutting-edge products and services available in today's market. All companies specializing in products and services that would benefit the NRC workforce...
ICS Summit 2014(Lake Buena Vista, Florida, US, March 17 - 18, 2014) The 9th Annual North American ICS Security Summit brings together the program managers, control systems engineers, IT security professionals and critical infrastructure protection specialists from asset...
Suits and Spooks Singapore(, January 1, 1970) Our first international Suits and Spooks conference will be held in Singapore with a visit to Malaysia on March 20-21, 2014. The focus will be on how multi-national corporations can profitably operate...
MCT-Congress: Going Mobile with Clinical Trials(Edinburgh, Scotland, UK, March 20 - 21, 2014) It is almost inevitable that mHealth solutions will be adopted across healthcare systems worldwide over the next decade. What is less clear is the impact that mobile solutions are having and could have...
Cyber Security for Energy & Utilities(, January 1, 1970) Following the rapid evolution of the cyber and digital world, IT Security Directors, Information Security Directors, Chief Security Officers, Chief Information Officers and many more will gather at the...
Veritas 2014(, January 1, 1970) At Veritas 2014, hear directly from the big data experts in top tier retail finance who are now implementing strategy and starting to yield real commercial value. Experts dedicated to Big Data in the...
Black Hat Asia(, January 1, 1970) Black Hat is returning to Asia for the first time since 2008, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four...
SEC Cybersecurity Roundtable(Washington, DC, USA, March 26, 2014) The Securities and Exchange Commission today announced that it will host a roundtable next month to discuss cybersecurity and the issues and challenges it raises for market participants and public companies,...
Cyber Security Management for Oil and Gas(, January 1, 1970) Attend to gain cutting-edge information from oil and gas cyber security experts on: Using the very latest in intelligence techniques to find and neutralize the newest threats in time. Preventing security...
ISSA Colorado Springs — Cyber Focus Day(Colorado Springs, Colorado, USA, March 27, 2014) Join us for the Information Systems Security Association (ISSA) — Colorado Springs Chapter — Cyber Focus Day set to take on Thursday, March 27, 2014 at Colorado Technical University (CTU).
SyScan 2014(Singapore, March 31 - April 4, 2014) SyScan is a deep knowledge technical security conference. It is the aspiration of SyScan to congregate in Asia the best security experts in their various fields, to share their research, discovery and...
Interop Conference(, January 1, 1970) Interop Conference sessions help you find actionable solutions to your current IT headaches and plan for future developments.
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.