ISIS/Daesh is said to have developed and issued its own homebrewed, secure Android messaging app.
We've seen much discussion of ISIS/Daesh information operations (their inspiration of the San Bernardino massacre is becoming clearer). But it's worth remembering that Daesh has at least one regional competitor — Syria's Assad regime — and that competitor is showing some online propaganda chops as well. Their principal social media mouthpiece is retailing familiar conspiracy-theory tropes: ISIS as US puppet, Holocaust denial, etc.
Facebook, Google, and Twitter step up their efforts to contain ISIS information operations, and the efforts are proving as problematic as the companies themselves have long predicted. Some potential models, however, have emerged, including earlier work against child pornography and online piracy.
Anonymous has declared this coming Friday "ISIS Trolling Day."
The Russian espionage-cum-criminal enterprise known variously as Pawn Storm, Sofacy, etc. resurfaces with some enhanced capabilities. The group made its name with intrusions into NATO targets (including the defense industry). This time around it's also going after Ukraine. Many note that Pawn Storm is "attacking air-gapped systems"; what this appears to mean is that it's using infected USB drives as vectors.
"Hacker Buba," as we now know the crook who's trying to extort some $3 million in Bitcoin from UAE banks, has begun to release some customer information. Both this form of direct blackmail and extortion by ransomware (as recently seen in new CryptoWall distributions) are on the rise.
Massacres in Paris and San Bernardino reignite crypto debates in France and the US.
Today's issue includes events affecting Australia, Canada, China, India, Iraq, NATO, Philippines, Russia, Syria, Thailand, Ukraine, United Arab Emirates, United Kingdom, United States.
Anonymous wants December 11th to be 'Isis trolling day'(Neowin) Anonymous, the on and offline hacktivist movement, is declaring December the 11th to be "Isis trolling day". This is part of the movement's ongoing effort to disrupt and discredit the terrorist's organizations online presence
Sofacy APT hits high profile targets with updated toolset(Securelist) Sofacy (also known as "Fancy Bear", "Sednit", "STRONTIUM" and "APT28") is an advanced threat group that has been active since around 2008, targeting mostly military and government entities worldwide, with a focus on NATO countries. More recently, we have also seen an increase in activity targeting Ukraine
Hacker Holds United Arab Emirates Bank to Ransom, Demands $3 Million(Tripwire: the State of Security) A malicious hacker that successfully breached the IT systems of a large bank in the United Arab Emirates (UAE) demanded nearly $3 million worth of cryptocurrency or the financial information of hundreds of its customers would be leaked online
DD4BC, Armada Collective, and the Rise of Cyber Extortion(Recorded Future) DD4BC, a group that named itself after its extortion method of choice — DDoS "4" Bitcoin — has attacked over 140 companies since its emergence in 2014. Other groups, inspired by their success, are jumping on the bandwagon. Is this form of extortion here to stay?
Infostealers, Exploit Kits & Ransomware, Just Your Typical Malware Campaign(Softpedia) In an optimal scenario, when you get infected with malware, you think it's only one virus. Unfortunately, in the real world it's not so, and security analysts from Heimdal Security have unveiled details about a malware campaign that starts with infostealers, goes through exploit kits, and finishes with computers being locked down with ransomware
PornHub caught in Malvertising Row — Again(Check & Secure) Malvertising is nothing new. Malvertising in Porn is nothing new. Malvertising on PornHub, again, is nothing new. However the threat of malicious banner ads on adult entertainment websites is not going away and as a result of this, ever more visitors become infected
A New Security Paradigm Needed to Support the Internet of Things(Cisco Blog: Innovation) This "incident response" approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies [sic] perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS) to prevent security threats
How to Get the C-Suite Fired in the 21st Century(Dark Matters) Hola readers! (Being in Panama, I need to improve my Española) Hoping everyone had a safe and joyous Thanksgiving. Before launching my own company in July, I worked with a Defense Contractor in Virginia. Oddly enough, one of the things I worked on was how to assess risk during Mergers and Acquisitions (M&A) activities because we were evaluating it as a service offering
US Army awards 1 billion deal to Booz Allen Hamilton(Consultancy.uk) In an attempt to stay ahead in the traditional and cybercrime battlefield, several US military commands a while ago launched a massive programme aimed at identifying and managing global threats to the US, the so-called the Global Threat Mitigation Program (GTMP)
IBM signs security pact with Federal Bank for mobile app(Economic Times) IBM has signed a deal for an undisclosed amount with Federal BankBSE 1.32 % to provide a security layer on the Kochibased lender's mobile application which will also warn the users in case they attempt a transaction over an insecure network or through an infected device
What Our B-Round Means for the Growth of Social Media Security(ZeroFOX) Here at ZeroFOX, we are excited to close a $27 million Series B funding round. Highland Capital led the round with the support of NEA, Genacast, Core Capital and Silicon Valley Bank. Needless to say, we're looking forward to the future of ZeroFOX and the growth of social media security
Let's Encrypt Initiative Enters Public Beta(Threatpost) The Let's Encrypt initiative reached yet another milestone this week when it entered public beta, something it claims should help make it easier for website owners to embrace HTTPS encryption
Technologies, Techniques, and Standards
There is no one-stop-shop for cyber security standards — ICC BASIS tells Internet governance forum(International Chamber of Commerce) International Chamber of Commerce (ICC) Business Action to Support the Information Society (BASIS) urged stakeholders to recognize that cyber security standards must be globally accepted, industry led and recognized by the broadest community possible in a main session on cyber security and digital trust at the Internet governance forum (IGF) in Joa Pessoa Brazil
Continuous Monitoring for Random Strings(Internet Storm Center) Greeting ISC readers. Mark Baggett here. Back in August I released a tool called freq.py that will help to identify random characters in just about any string by looking at the frequency of occurrence of character pairs
California Attack Has U.S. Rethinking Strategy on Homegrown Terror(New York Times) The day before Thanksgiving, President Obama reassured Americans there was "no specific and credible intelligence indicating a plot on the homeland." Seven days later came an explosion of gunfire and the deadliest terrorist attack in America since Sept. 11, 2001
US, China cybersecurity hotline offers no guarantees(IDG via CSO) Speaking at the New England Cybercrime Conference the nation's top lawyer for national security also addressed the threat of cyber terrorists. He doesn't think they have advanced cyber weapons because if they did they would have used them
Hackers to Pentagon: You're Doing Cyber Wrong(GovTechWorks) What happens when you bring together some of the nation's leading hackers, the Pentagon's chief of training and an Air Force Academy professor who teaches cyber skills to cadets? They all agree on one thing: The government's approach to cyber security is coming up short
Cyber Security at the Speed of Bureaucracy(Ricochet) The Office of Personnel Management's (OPM) security clearance files were hacked 20 months ago. It is just now notifying the people whose personal identification information was stolen
Banks must tighten cybersecurity — BSP(Manila Bulletin) The Bangko Sentral ng Pilipinas (BSP) has called on the banking industry to tighten and strengthen cybersecurity amid a growing cyber-threat landscape
Litigation, Investigation, and Law Enforcement
US can't access NSA phone records in California terror case(WIVB 4) The U.S. government's ability to review and analyze five years' worth of telephone records for the married couple blamed in the deadly shootings in California lapsed just four days before the attack, when the National Security Agency's controversial mass surveillance program was formally shut down
Variety Jones, Alleged Silk Road Mentor, Arrested in Thailand(Wired) More than two years after Ross Ulbricht was arrested in a San Francisco and accused of creating and running the Dark Web drug bazaar known as the Silk Road, a manhunt on the other side of the world has found the man believed to be Ulbricht's closest adviser and mentor: Variety Jones
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Program on Cyber Security Studies (PCSS)(Garmisch-Partenkirchen, Germany, December 2 - 17, 2015) The Marshall Center has developed a comprehensive program to explore the increasing domestic, international and transnational challenges in cyber security. Our goal is to provide a comprehensive, policy-focused,...
2015 Cyber Security Exchange(Orlando, Florida, USA, December 6 - 8, 2015) This dynamic, three-day event will provide Cyber Security executives with valuable insights to reach their full potential by exploring security leadership strategies, heightened data privacy concerns,...
Disrupt London 2015(London, England, UK, December 7 - 8, 2015) TechCrunch Disrupt is one of the most anticipated technology conferences of the year. Join us at this iconic startup and thought leadership event in London on December 7 and 8. What happens at Disrupt?...
Passwords 2015(University of Cambridge, England, UK, December 7 - 9, 2015) More than half a billion user passwords have been compromised over the last five years, including breaches at internet companies such as Target, Adobe, Heartland, Forbes, LinkedIn, Yahoo, and LivingSocial.
ACSAC (Annual Computer Security Applications Conference)(Los Angeles, California, USA, December 7 - 11, 2015) ACSAC is one of the most important cyber security conferences in the world, and the oldest information security conference held annually. Researchers, government representatives, academia and security...
Cyber Risk Wednesday: 2016 Threat Landscape(Washington, DC, USA, December 9, 2015) To discuss how 2016 will likely challenge today's security thinking and what we can learn from the past year's developments and these trends, please join the Atlantic Council's Cyber Statecraft Initiative...
NSA RCTCON(Fort Meade, Maryland, USA, December 9, 2015) The NSA RCTCON industry exposition will be attended by 250-300 IC (Intelligence Community) cyber personnel working on solutions to the current cyber threats that face the U.S
SANS Institute: Information Security Training(Las Vegas, Nevada, USA, September 12 - 21, 2015) Information security training in Las Vegas from SANS Institute, the global leader in information security training. At SANS Network Security 2015, SANS offers more than 40 hands-on, immersion-style security...
cyberSecure(New York, New York, USA, December 15 - 16, 2015) Today's business leaders recognize that a multi-disciplinary approach is critical to protecting the bottom line. What's too often missed is a vision that incorporates best practices that allow you add...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.