Symantec reports on increased Iranian action (by attack groups "Cadelle" and "Chafer") against internal dissidents and foreign regional organizations. Airlines and telcos figure prominently among the foreign targets. (Note that regional airlines were targets of last year's "Operation Cleaver.") Symantec gives the hackers relatively low technical marks, but says they may nonetheless have accumulated a lot of sensitive information.
Observers see ISIS/Daesh information operations as heavily invested in various prophesies, and that Daesh response to Western counteroffensives (and statements of intent like US President Obama's recent speech). Many argue that Daesh actions, whether cyber or kinetic, can only be understood within prophetic context.
Anonymous still plans to troll ISIS this Friday.
Palo Alto describes "BackStab," which compromises iOS mobile backup files stored on a user's non-mobile device.
Windows systems also come in for criminal attention. The "Nemesis" bootkit, which FireEye attributes to FIN1, "a financially motivated threat group" (read, criminal gang), targets payment processing. Nemesis is a complex, difficult-to-detect platform that supports a wide range of actions against target systems.
TeslaCrypt expands its set of victims. Ransomware and other forms of cyber extortion are expected to continue trending upward. Two US Senators, Johnson (Republican-Wisconsin) and Carper (Democrat-Delaware) ask the Department of Homeland Security what it's doing about the problem.
Cyber stocks appear to be rebounding from yesterday's sell-off.
Europe enacts a data-breach reporting law. In the US, President Obama weighs in on encryption: he wants tech companies to '"make it harder for terrorists to use technology to escape from justice."
Today's issue includes events affecting Australia, Canada, China, European Union, France, Germany, India, Indonesia, Iran, Malaysia, Netherlands, Russia, Singapore, Thailand, Turkey, United Arab Emirates, United Kingdom, United Nations, United States.
U.S. Seeks to Avoid Ground War Welcomed by Islamic State(New York Times) As the debate on how best to contain the Islamic State continues to rage in Western capitals, the militants themselves have made one point patently clear: They want the United States and its allies to be dragged into a ground war
TeslaCrypt — New CryptoTrojan on the March(Check and Secure) Cases of cyber "hostage taking" have reached new heights over the last couple of years, with ever more attention being paid to the causes and effects of this new illegal trend
The Pre-Holiday Retail Risk Report(Bay Dynamics) In 2015, retailers are expected to hire 775,000 workers to deal with the holiday shopping demand. As retailers focus on customers and sales, information security often gets pushed to the backburner
Storm clouds hover over data security in year ahead(IT WIre) The cloud is the number one area of risk where security of data is likely to come under a greater number of attacks and breaches in the next 12 months from hackers, according to enterprise security vendor Blue Coat Systems
Cyber security: do CEOs need to step up?(Security Watch) Despite the risks associated with cyber breaches less than half (49%) of CEOs around the world are fully prepared for a future cyber event, according to a new study from KPMG International
Cybersecurity experts earning up to £10,000 per day says ManpowerGroup(International Business Times) Cybersecurity experts are hot in the UK. A record demand for the professionals has led to a surge in their salaries as well, with some earning up to £10,000 a day as companies scrambled to protect themselves from embarrassing data breaches, according to a study
L-3 Agrees on $550M Gov't Services Segment Sale to CACI(GovConWire) New York City-based defense contractor L-3 Communications (NYSE: LLL) has agreed to sell its government services business segment to Arlington, Virginia-headquartered public sector services company CACI International (NYSE: CACI) for $550 million cash, the companies said Tuesday
Small business advocates wary about impact of new DoD cyber rules(Federal News Radio) The Defense Department has an understandable preoccupation with the cybersecurity practices of its vendors, especially since a preponderance of the successful cyber thefts of Defense information involve private IT systems, not government ones
GSA, DHS begin march toward cyber shared services(Federal News Radio) The Homeland Security Department is taking a different, and maybe somewhat surprising path, for its latest task order under the continuous diagnostic and mitigation (CDM) program
DHS ramps up outreach around Internet of Things(FierceGovernmentIT) The Homeland Security Department will host an industry day in the heart of Silicon Valley this week in an effort to better understand and respond to the security challenges associated with the Internet of Things
CenturyLink awarded DHS EINSTEIN 3 Accelerated service expansion contract(CenturyLink) CenturyLink, Inc. (NYSE: CTL) was recently awarded a service expansion contract from the U.S. Department of Homeland Security (DHS) to provide EINSTEIN 3 Accelerated (E3A) protections to U.S. federal civilian agencies that cannot access E3A services through their existing Internet service provider
Liquid metal Turing Phone delayed to Q1 2016(Venture Beat) The so-called Turing Phone, whose alleged tight security and all-liquid metal enclosure have earned it considerable buzz, has been delayed beyond its scheduled December 18 shipping deadline
Technologies, Techniques, and Standards
Tips for managing and securing SSH keys(Help Net Security) A new NIST report raises awareness of the major vulnerabilities associated with SSH user key management and provides concrete steps for securing and protecting SSH systems and environments
MIT hacking institute to vet mHealth apps, tools(FierceMobileHealthcare) The Massachusetts Institute of Technology, via its nonprofit health tech start-up, will begin issuing reviews of connected medical devices, mHealth services and apps researched by Harvard University physicians and experts from MIT's Hacking Medicine Institute
DHS Picks 5 Recipients for Cyber Physical Systems Security Contracts(ExecutiveBiz) The Department of Homeland Security's science and technology directorate has awarded five contracts worth $7.8 million combined to universities and other institutions to perform research and develop tools designed to safeguard cyber physical networks from cyber attacks
Last-minute scramble over cybersecurity bill(The Hill) The House Homeland Security Committee is working to alter the compromise text of a major cybersecurity bill prepared by the House and Senate Intelligence committees, according to multiple people tracking the negotiations
DOD CIO winners honored for security, savings(GCN) This year's winners of the Defense Department's CIO Award for Cyber and IT Excellence were honored at a Pentagon ceremony Dec. 1 for their work protecting the warfighter, securing government networks and identifying millions of dollars in savings
United States Secret Service: An Agency in Crisis(Committee on Oversight and Government Reform: US House of Representatives) The United States Secret Service (USSS) is tasked with a zero-failure mission: to protect the President and other protectees at all costs
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
The Atlantic Council's Cyber 9/12 Student Challenge(Washington, D.C. USA, March 11 - 12, 2016) Now entering its fourth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges...
Program on Cyber Security Studies (PCSS)(Garmisch-Partenkirchen, Germany, December 2 - 17, 2015) The Marshall Center has developed a comprehensive program to explore the increasing domestic, international and transnational challenges in cyber security. Our goal is to provide a comprehensive, policy-focused,...
2015 Cyber Security Exchange(Orlando, Florida, USA, December 6 - 8, 2015) This dynamic, three-day event will provide Cyber Security executives with valuable insights to reach their full potential by exploring security leadership strategies, heightened data privacy concerns,...
Disrupt London 2015(London, England, UK, December 7 - 8, 2015) TechCrunch Disrupt is one of the most anticipated technology conferences of the year. Join us at this iconic startup and thought leadership event in London on December 7 and 8. What happens at Disrupt?...
Passwords 2015(University of Cambridge, England, UK, December 7 - 9, 2015) More than half a billion user passwords have been compromised over the last five years, including breaches at internet companies such as Target, Adobe, Heartland, Forbes, LinkedIn, Yahoo, and LivingSocial.
ACSAC (Annual Computer Security Applications Conference)(Los Angeles, California, USA, December 7 - 11, 2015) ACSAC is one of the most important cyber security conferences in the world, and the oldest information security conference held annually. Researchers, government representatives, academia and security...
Cyber Risk Wednesday: 2016 Threat Landscape(Washington, DC, USA, December 9, 2015) To discuss how 2016 will likely challenge today's security thinking and what we can learn from the past year's developments and these trends, please join the Atlantic Council's Cyber Statecraft Initiative...
NSA RCTCON(Fort Meade, Maryland, USA, December 9, 2015) The NSA RCTCON industry exposition will be attended by 250-300 IC (Intelligence Community) cyber personnel working on solutions to the current cyber threats that face the U.S
SANS Institute: Information Security Training(Las Vegas, Nevada, USA, September 12 - 21, 2015) Information security training in Las Vegas from SANS Institute, the global leader in information security training. At SANS Network Security 2015, SANS offers more than 40 hands-on, immersion-style security...
cyberSecure(New York, New York, USA, December 15 - 16, 2015) Today's business leaders recognize that a multi-disciplinary approach is critical to protecting the bottom line. What's too often missed is a vision that incorporates best practices that allow you add...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.