Someone, Trend Micro reports, has established honeypots on gas gauge monitoring systems in seven countries. There's no obvious campaign in progress, beyond IoT probing. Those responsible are thought to be the Assad sock puppets of the Syrian Electronic Army, although Trend Micro acknowledges the possibility this being a false-flag operation, in which case the Mullah's sock puppets of the Iranian Dark Coders would be the leading suspects.
ICANN warns that an unknown "unauthorized person" has accessed its website's profile accounts.
A Chinese espionage group known as "TG-3390" or "Emissary Panda" has targeted at least fifty companies. Emissary Panda seems most interested in the aerospace sector, and has used watering holes and stolen credentials to accomplish its intrusions. Dell SecureWorks advises two-factor authentication as a defense against Emissary Panda's ministrations.
Recorded Future reports the availability in the wild of exploits for Android Stagefright vulnerabilities. Google takes these seriously enough to both patch the vulnerability and revise its patching policies. Analysts doubt, however, that monthly Nexus updates will do the trick for Android security.
Malvertising surges, with last week's Yahoo infestation suggesting that there are more Flash vulnerabilities out there. Observers complain that advertisers are doing a disservice by keeping Flash alive.
Onapsis notes three SAP pivots implicated in last year's USIS hack, probable ancestor of the OPM breach.
In industry news, Proofpoint buys the assets of Marble Security. Bulls slaver over story stocks.
NIST releases the SHA-3 crypto standard.
Experts continue to doubt the very possibility of a crypto golden key.
Today's issue includes events affecting Brazil, China, Germany, Iran, Jordan, Russia, Syria, United Arab Emirates, United Kingdom, United States.
The GasPot Experiment: Hackers Target Gas Tanks(TrendLabs Security Intelligence Blog) Physically tampering with gasoline tanks is dangerous enough, given how volatile gas can be. Altering a fuel gauge can cause a tank to overflow, and a simple spark can set everything ablaze. But imagine how riskier it is if a hacker can do all this remotely, especially now that a number of fuel companies worldwide use Internet-connected systems to monitor their tanks
ICANN website security breached(CSO) The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a warning to those who registered with its public website that their profile accounts were accessed by an "unauthorized person". ICANN states that the usernames, email addresses, and encrypted passwords to people's profile accounts have been compromised in the last week. Profile accounts on the ICANN website can contain "user preferences for the website, public bios, interests, newsletter subscriptions, etc."
Watering Hole Campaign Compromises More Than 50 Companies(eWeek) Further research into one China-linked espionage group finds a network of more than 100 Websites, serving a variety of industries and government agencies, that have been compromised to infect targets with espionage trojans
Stagefright Exploits Hit the Web(Recorded Future) Exploits and proof of concepts (POCs) are appearing on the Web for Stagefright, hyped as the "Mother of all Android vulnerabilities" capable of gaining remote code execution privileges via a malicious MMS (e.g., a picture message). This collection of 10 vulnerabilities reportedly impacts 95% of all Android devices — over 900 million phones
Advising You about Malvertising(Trend Micro: Simply Security) This week we learned of a concerted cybercriminal effort to subvert the Yahoo ad network, which could have affected the 6.9 billion monthly visitors to their site. The threat actors behind this attack utilized a few threats we've seen recently, such as malvertisements and exploit kits
The Rise of Malvertising(National Law Review) One of the hottest topics in cyberthreat detection right now is the rise of malvertising, online advertising with hidden malware that is distributed through legitimate ad networks and websites. In the first half of this year the number of malvertisements has jumped 260% compared to the same period in 2014, according a new study released at the Black Hat USA conference here today by enterprise digital footprint security company RiskIQ. The sheer number of unique malvertisements has climbed 60% year over year
Pentagon Hack 'Most Sophisticated' Ever(Daily Beast) The hacking of the Joint Chiefs of Staff email network on July 27 marked the "most sophisticated" cyberbreach in U.S. military history, Department of Defense officials concede. Various government officials are working to revamp parts of their network in response. In the meantime, officials have spent the last 10 days scrubbing the system and creating mock hacking scenarios before giving military personnel access to it again
How your battery life could be used as an undeletable cookie(Naked Security) How much charge does your computer's battery have right now? Actually, you don't have to tell me because if you're using Firefox, Chrome or Opera I can find out for myself with a little code and some help from the HTML5 Battery Status API (Application Program Interface)
How your washing machine can steal computer files(CNN Money) Imagine hackers stealing top secret files from a military base. Except they don't need the Internet to pull data out of the facility's computers. Instead, they can just infect an office printer and — with software alone — turn it into a radio
Warning: Zero-day vulnerabilities found in top-selling Amazon smart home systems(IT Pro Portal) Tripwire, Inc., a leading global provider of advanced threat, security and compliance management solutions, today announced results of an extensive security assessment of three top-selling smart home automation hub products available on Amazon. The research uncovered zero-day flaws in each hub that could allow hackers to take control of smart home functionalities
Security alert at Hover leads to password reset(Graham Cluley) Website domain name registrar Hover has emailed users warning of possible "unauthorised access" to one of its systems, and told them that they will not be able to log into the service until they reset their passwords
Attacker Demands $15,000 Ransom for Stolen Customer Credentials(IBM Security Intelligence) A cybercriminal going by the name DetoxRansome claims to have stolen some of the login credentials of Bitdefender's users and threatened to release the details if $15,000 is not paid as ransom. The attacker told Forbes that all information, including passwords and usernames, was unencrypted
Health Data Breaches Stem From Cyber Attack, Exposed Binders(Health IT Security) Health data breaches can occur because of numerous reasons, which is why covered entities and their business associates must have comprehensive training measures and data security measures. All physical safeguards, technical safeguards and administrative safeguards need to properly align to give healthcare organizations the best chance at keeping PHI secure
Security Patches, Mitigations, and Software Updates
"The Dream Of Internet Freedom Is Dying"(TechCrunch) So says Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society, who gave the keynote address at the (somewhat infamous) Black Hat security conference today. Once, techno-utopians could say things like "The Internet treats censorship as damage and routes around it" with a straight face. Today, though, the ongoing centralization of the Internet in the name of security and convenience "increasingly facilitates surveillance, censorship, and control," to quote Granick again
Lightbulb moment: Why the Internet of Things is a security watershed(We Live Security) The white-hot market for wearable devices, bolstered by increasing connectivity speeds and better battery technology has led to an almost unprecedented explosion in the Internet of Things. These IoT devices are challenging traditional notions of security and security practices due to their sheer volume and variety — in a few years there will be billions of tiny, connected devices in almost every item we encounter
Internet of Things (IoT) Security Market Worth 28.90 Billion USD by 2020(MarketWatch) According to a new market research report, "Internet of Things (IoT) Security Market by Technologies (Network, Cloud and Application Security, Identity Access Management, Analytics, UTM, IDS/IPS, Device Management, Encryption), Industry Verticals and Applications - Global Forecast to 2020", published by MarketsandMarkets, Internet of Things (IoT) Security Market is expected to grow from USD 6.89 Billion in 2015 to USD 28.90 Billion by 2020, at a Compound Annual Growth Rate (CAGR) of 33.2% from 2015 to 2020
API security becoming a CXO level concern(Help Net Security) Today at Black Hat USA 2015, Akana released the findings of a survey of over 250 security practitioners, including CSOs, CISOs, and security architects
Amid Cyber War, CyberArk, Palo Alto Are Young Guns(Investor's Business Daily) The threat of a cyberattack always seems to loom large, as entities from Target (NYSE:TGT) to Anthem (NYSE:ANTM) to the U.S. Office of Personnel Management have fallen victim to security breaches. Even a car in motion is vulnerable to getting hacked
Q&A: Proofpoint CEO On How To Keep Up With Rapidly Evolving Security Landscape(CRN) Proofpoint is fresh off of a second quarter in which the security vendor posted double-digit sales and billings growth. The Sunnyvale, Calf.-based company has been named a "leader" by Gartner in its 2015 Gartner Magic Quadrant for Secure Email Gateways and saw revenue rise 37 percent to $63.5 million in the second quarter. Earnings for the quarter posted a net loss of $25 million, compared to $15.1 million in the same quarter last year. Behind those numbers is a rapidly changing and competitive security landscape for both the vendor and its partners, CEO Gary Steele said in an interview with CRN after the earnings call
Keeping an Eye on Cyber Security: FireEye(Express Computer) Cloud is re-defining the security paradigm and putting huge challenges on enterprises as well as security companies to meet the expectation of customers. In an interview with EC's Mohd Ujaley, FireEye's Senior Vice President and Chief Information Officer Julie Cullivan, says "At a time when we are having rapid increase in cloud deployments and BYOD, the CIOs need to ensure that there is balance between productivity and protection"
iSIGHT Partners Continues Global Expansion(Realwire) New Australian threat analysis center and sales office extends reach into the Asia Pacific Japan region and completes the company's "Follow the Sun" Global Threat Analysis Capability
CrowdStrike Named 2015 Technology Pioneer by World Economic Forum(BusinessWire) CrowdStrike Inc., provider of the first true Software-as-a-Service (SaaS) based next-generation endpoint protection platform, today announced that it has been recognized as a Technology Pioneer by World Economic Forum (WEF). CrowdStrike has been honored as one of the world's most innovative companies for pioneering groundbreaking technology in the cybersecurity industry and for driving visionary leadership and long-standing market value
Contract to Notify and Protect OPM Hack Victims Now Out(Nextgov) Vendors who win the job of protecting the identities of 21.5 million victims of the largest known federal data breach will have to let the government inside their own databases, according to new contracting papers
Pentagon seeks recruits at Black Hat 2015 hacker conference(IHS Jane's Defence Weekly) The world's largest gathering of self-described hackers, the Black Hat conference in Las Vegas, opened to the media on 5 August, with major defence contractors, security researchers, government officials mingling with hacking enthusiasts as the Pentagon — and US government — struggle to recruit cyber personnel
Palo Alto Networks and Tanium forge strategic alliance for security solutions(First Post) Palo Alto Networks and Tanium, the company that provides security and systems management solutions, announced the formation of a strategic alliance which will transform the effectiveness, accuracy, and speed by which large, distributed organizations prevent, detect, and respond to today's cyberthreats
Qualys announces free global asset inventory service(Help Net Security) At Black Hat USA 2015, Qualys announced the availability of Qualys AssetView, a free cloud-based asset inventory service that enables companies to search for information on any IT asset where an agent is deployed, scaling to millions of assets for organizations of all sizes. Global IT assets can be searched in seconds and an up-to-date inventory continuously maintained
CDNetworks to showcase Cloud Security 2.0 at Black Hat USA 2015(Help Net Security) Cloud Security 2.0 includes intelligent, next generation behavioral-based WAF technology and DDoS mitigation. This comprehensive solution combines web application and website acceleration with end to end security including DDoS attack mitigation at the network and application layers with 24/7 monitoring and customer portal visibility
BrightPoint Shares Leading Threat Intelligence Platform(CIO Today) BrightPoint Security broadens availability of leading threat intelligence platform across all ISAC/ISAO Organizations — all ISACs/ISAOs can benefit from proven solution leveraged by NH-ISAC to offer threat intelligence sharing to members for free
NIST releases SHA-3 cryptographic hash standard(Help Net Security) The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" standard, a next-generation tool for securing the integrity of electronic information
Why It's Time to Encrypt Lawfare(Lawfare) The good people at Just Security, a fellow online security blog, recently moved their entire website to "HTTPS". This means you'll always see "https://" in your browser when you visit, with a little lock sign next to it that means your connection is secure and encrypted
The Windows 10 Security Settings You Need to Know(Wired) So you finally installed Windows 10 and joined the ranks of the other 67 million users. You open your browser to search for a place to grab lunch, and Bing already knows your location. You notice that all the banner ads are geared toward your secret knitting hobby. And when you open Cortana to ask what's going on, she knows your name and the embarrassing nickname your mother calls you
Sigcheck and virustotal-search(Internet Storm Center) In my last diary entry I mentioned offline use of Sysinternal tools with my tool virustotal-search
SAP Security for CISOs. Part one: How I started my SAP journey(ERPScan) Hello, dear readers, recently we have finished our series of articles on how to Secure SAP Systems from XXS vulnerabilities. Having a great success with the previous series, I decided to launch another series of articles called "SAP Security for CISOs". However, you don't need to be a CISO to benefit from reading these articles as they are great starting point for everybody who is into security but wants to know more about emerging topic called SAP Security and doesn't know where to begin
What is the core idea behind applying ISO 27001?(We Live Security) The dynamic environment of security risks is a place of constant change, where new threats develop, vulnerabilities are discovered, and security incidents arise with major repercussions, both for companies and individuals. One approach is centered on the idea that faced with this scenario, it is only a matter of time until a company will have to suffer the consequences of these threats
The real secret to success in Silicon Valley, according to a Stanford professor(Quartz) Silicon Valley has become something of a mecca for talented entrepreneurs looking to make their mark. As a professor teaching them, I have had a ringside seat as some of the most driven businesspeople on the planet slug it out. An intoxicating blend of innovation, money and cutting-edge technology means the story is told with a liberal dusting of magic. Life here is not all billion-dollar valuations poolside parties and drinks with venture capitalists
The One Thing Every Great Company Has In Common(TechCrunch) Obscured in the valuation dust of the current unicorn stampede is a key question: What actually makes a great company great? What do the future Facebooks, Googles and Apples have in common — not to mention the current ones?
Security Sense: Encryption is a necessity that cannot feasibly be compromised(Windows IT Pro) It's always fascinating to watch how security concepts are communicated to the general public and by "fascinating", I mean it's sometimes horrifying. There is no more poignant an example than that of encryption and I found the piece from CNN a few days ago on how encryption is a growing threat to security to be the absolute epitome of disinformation. It would be understandable if the general public walked away from reading and watching this piece with the distinct impression that encryption was the root of all evil. Why? Apparently "because terrorism"
Senators Want New Opt In Privacy Protections for Broadband(DSL Reports) Senator Ed Markey (D-Mass.) and seven other senators have sent FCC boss Tom Wheeler a letter (pdf) urging him to impose tougher privacy protections for broadband consumers. The FCC was already considering expanding such protections after recently reclassifying ISPs as common carriers under the Communications Act. As deep packet inspection and clickstream sales surged over the last decade, privacy has often been little more than an afterthought
How DoD is making cyberattacks more costly, less successful(C4ISR & Networks) One of the best ways to reduce the cyber threat is to make it harder and more costly for adversaries to initiate attacks, says Defense Department CIO Terry Halvorsen. Powerful and innovative security measures such as multifactor authentication and biometrics, along with strategic security planning and training, could make launching attacks on DoD resources time-consuming and futile
VA launches cyber squad(FCW) LaVerne Council, the new CIO at the Department of Veterans Affairs, has assembled a team charged with coming up with an overall cybersecurity plan for the agency. The new Enterprise Cybersecurity Strategy Team will be led by Susan McHugh-Polley, a senior executive program manager at VA
Inside the $100M 'Business Club' Crime Gang(KrebsOnSecurity) New research into a notorious Eastern European organized cybercrime gang accused of stealing more than $100 million from banks and businesses worldwide provides an unprecedented, behind-the-scenes look at an exclusive "business club" that dabbled in cyber espionage and worked closely with phantom Chinese firms on Russia's far eastern border
'Software Liability is Inevitable'(Threatpost) The push for some form of liability for vendors who sell faulty or insecure software is nearly as old as software itself. Software makers have pushed back hard against it for decades, but the day may soon come when software liability is a reality
Signal and Noise: Identity Crisis(Legaltech News) We now live in a world of data sets where pieces of information can be combined together in a myriad of ways to de-anonymize the user
Aveshka, Inc. sues Global Record Systems, LLC in federal court for unpaid debt and services(BusinessWire) Aveshka, Inc., a tech services firm in Arlington, Va. announces a U.S. District Court entered final judgment against Global Record Systems, LLC, a healthcare information technology firm with offices in Rockville, Md. for more than $2.6 million in connection with an unpaid loan made by Aveshka, Inc., as well as unpaid services rendered (Case No. 1:14cv1006, U.S. District Court, Eastern District of Virginia, Alexandria Division.) With interest, the judgment amount exceeds $2.9 million. On July 20, 2015, the Court also granted Aveshka judgment for an additional $50,000 in attorneys' fees and costs
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
2nd Annual Senior Executive Cyber Security Conference(Baltimore, Maryland, USA, September 10, 2015) The one-day symposium will examine the potential advantages and pitfalls of an information-sharing strategy from the technological, business and regulatory perspectives
Smart Industry(Chicago, Illinois, USA, October 5 - 7, 2015) The Industrial Internet of Things (IIoT) is no longer a futuristic notion. Those that are embracing IIoT now are realizing positive, near-term benefits and creating a competitive advantage in the market.
Black Hat USA(Las Vegas, Nevada, USA, August 1 - 6, 2015) Black Hat — built by and for the global InfoSec community — returns to Las Vegas for its 18th year. This six day event begins with four days of intense Trainings for security practitioners...
Defcon 23(Las Vegas, Nevada, USA, August 4 - 7, 2015) DEF CON has been a part of the hacker community for over two decades. See the organization's website for more information
3rd Annual Psyber Behavioral Analysis Symposium(Fort Meade, Maryland, USA, August 11, 2015) The 3rd Annual Psyber Behavioral Analysis Symposium is hosted by the NSA/CSS Threat Operations Center and the FBI Behavioral Analysis Unit-2/Cyber Behavioral Analysis Center. The goal of the Symposium...
USENIX Security(Washington, D.C., USA, August 12 - 14, 2015) The USENIX Security Symposium reunites researchers, practitioners, system administrators, system programmers, and others specialists interested in the latest advances in the security and privacy of computer...
5th Annual Cyber Security Training & Technology Forum (CSTTF)(Colorado Springs, Colorado, USA, August 19 - 20, 2015) The Information Systems Security Association (ISSA) Colorado Springs Chapter and FBC, Inc. will once again co-host the 5th Annual Cyber Security Training & Technology Forum (CSTTF). CSTTF 2015 will bring...
Decepticon 2015(Cambridge, England, UK, August 24 - 26, 2015) Decepticon brings together researchers and practitioners in the detection and prevention of deception. Previously, deception research has been fragmented across conferences in many different disciplines,...
AFCEA OKC Technology & Cyber Security Day(Oklahoma City, Oklahoma, USA, August 27, 2015) FBC and the Armed Forces Communications & Electronics Association (AFCEA) Oklahoma City Chapter will be partnering once again to host the annual Technology Day & "Scholarship" Golf Tournament at Tinker...
Power Grid Cyber Security Exchange 2015(San Diego, California, USA, August 30 - September 1, 2015) The Power Grid Cyber Security Exchange will take a deep dive into the cyber security strategies, innovative approaches and strategic planning necessary to balance the competing priorities of today's technology...
2015 HTCIA International Conference & Training Expo(Orlando, Florida, USA, August 30 - September 2, 2015) Bringing together experts from all over the world to share their latest research and techniques related to cybersecurity, incident response and computer forensics
ICFP 2015(Vancouver, British Columbia, Canada, August 31 - September 2, 2015) ICFP 2015 provides a forum for researchers and developers to hear about the latest work on the design, implementations, principles, and uses of functional programming. The conference covers the entire...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.