Twitter has warned some users that their accounts "may have been targeted by state-sponsored actors." The warning's text suggests the actors may be looking for email addresses, IP addresses, or phone numbers. The BBC reports speculation that the state sponsoring the reconnaissance is either China or North Korea, but it's unclear whether this is based on evidence or a priori probability.
The US Justice Department describes ISIS/Daesh's social media "crowdsourcing of terrorism," where inspiration substitutes for command-and-control.
Anonymous takes a break from fighting ISIS to attempting a DDoS attack against one of Donald Trump's commercial websites. Their "#OpTrump" is prompted by the US presidential candidate's remarks about Islamic immigration. Other Anonymous cells romp farther afield, releasing personally identifiable information stolen from European Space Agency subdomains. The motive? The lulz.
FireEye describes "LatentBot" — obfuscated, modular, easily updated, and dangerous, but still pretty noisy, flagged by many AV products as a generic Trojan.
Ransomware continues its proliferation.
In Europe, Trend Micro sees something new: the development of a German cyber criminal underground. Not as big as that a few hundred kilometers to the east, but well-organized and active.
In industry news, LookingGlass acquires QinetiQ cyber unit Cyveillance.
Israel mulls calling for a NATO-like international organization for cyber security. The aspiration isn't Article 5 (collective response to attacks), "but rather...to detect and mitigate before Article 5."
Europe moves closer to a Safe Harbor replacement. France won't ban Tor or public Wi-Fi after all. US debates over both Wassenaar and controls over encryption resume.
Today's issue includes events affecting Brazil, Canada, China, European Union, France, Germany, Hungary, India, Iraq, Ireland, Israel, Democratic Peoples Republic of Korea, Republic of Korea, Peru, Philippines, Poland, Russia, Singapore, South Africa, Spain, Syria, United Arab Emirates, United Kingdom, United States.
Polycom VVX-Series Business Media Phones Path Traversal Vulnerability (0-Day)(Depth Security Blog) In June I spent a little time in the web administrative interface of a Polycom VVX600 IP phone running UC Software Version 220.127.116.115. As I proxied the traffic through BurpSuite, I immediately noticed something interesting in the requests that the interface uses to display phone background images and ring tones to web users
U-Markt Peering into the German Cybercriminal Underground(Trend Micro) The German cybercriminal underground is well-developed and -managed by cybercriminals even though it remains a small community in number compared with the Russian and Brazilian underground markets. It may also be the most developed underground within the European Union (EU) despite the existence of a French underground market. The Spanish underground, however, merged with the Latin American market
Security Patches, Mitigations, and Software Updates
Google extends Safe Browsing to Android Chrome(Naked Security) Google says that its Safe Browsing service already protects about 1 billion desktop users from all sorts of online nastiness, be it malware, unsavory software, or social engineering (particularly phishing) sites
Maintaining Privacy in the IoT Era(Information Security Buzz) Advances in technology have paved the way for an entirely new era of communication between people and machines
Cyber-warrior CEO lists 5 top threats in 2016(Manila Times) It's almost the end of the year and like most corporate executives, Jeff Castillo finds himself in a mad rush to finish everything that has to be done and prepare for the coming year
Global survey by Gemalto reveals impact of data breaches on customer loyalty(Dark Reading) Nearly two-thirds (64%) of consumers surveyed worldwide say they are unlikely to shop or do business again with a company that had experienced a breach where financial information was stolen, and almost half (49%) had the same opinion when it came to data breaches where personal information was stolen
The Price of the Wearable Craze: Less Data Security(NBC News) Technology pioneer isn't a role people associate with former vice president Dick Cheney, but technology security experts today give his medical advisory team props for a move made back in 2007 — disabling the wireless capability on Cheney's pacemaker
Hackers in 'white hats' join effort to thwart the bad guys(Financial Times) Commuters in the Israeli port city of Haifa fumed during a particularly tedious traffic jam two years ago, never guessing that the logjam was caused not by an accident or some other relatively customary event — but reportedly by cyber attack
7 Top Technology Trends for 2016(LinkedIn) 2o15 was a transformative year for technological innovation. 2106 continues that technology trend with more disruption in sight. Below is a short list of my predicted trends for the coming year
CyberArk: Great Company, Expensive Stock(Seeking Alpha) A comparison to peers suggests that CyberArk is trading at high valuations around $40 per share. But CyberArk has a solid business, with strong profitability and a good product. Buying the stock now is very risky, while holding the stock is perfectly fine
UK hosts international cyber attack response test(ComputerWeekly) The UK has hosted an exercise to test how investigators and prosecutors across Europe and the US would work together in the event of a complex international cyber criminal incident
Learn to Hack Your Own Code(DZone) There are several quick tips and techniques to teach yourself how to hack your own code including free, open-source tools
Use The Privilege(Internet Storm Center) Windows is an operating system with security features. For example, one can specify which users can access a file
Don't Be a Victim of Tax Refund Fraud in '16(KrebsOnSecurity) With little more than a month to go before the start of the 2016 tax filing season, the IRS and the states are hunkering down for an expected slugfest with identity thieves who make a living requesting fraudulent tax refunds on behalf of victims. Here's what you need to know going into January to protect you and your family
Israel Military Eyes NATO-Like Global Cyber Coalition(Defense News) A principal architect of the Israeli military's cyber defense force says Israel can play a key role in creation of an operational alliance — similar to that of NATO, but global in scope — to collectively defend against global cyber threats
What's the Plan?(US News and World Report) After the 9/11 attacks, a spooked Congress put aside its partisan divisions and worked quickly to provide law enforcement and intelligence agencies the tools they wanted to prevent another assault
Can National Security Advisor settle cybersecurity feud?(Christian Science Monitor Passcode) Two Congressional lawmakers want Susan Rice to get involved in a dispute between the State Department and industry officials over proposed export rules for technology that could be used for malicious purposes
DoD eyeing commercial cloud options for secret data(C4ISR & Networks) The Defense Department's cold feelings toward moving any of its classified data to a commercial cloud provider might be warming up as the department evaluates options for commercial cloud companies to handle and store secret information
National Guard making headway in nationwide cyber force(Defense Systems) As the Pentagon and the individual service branches push forward with filling out the eventual 133 cyber mission teams under the U.S. Cyber Command, the Guard and Reserve will be playing an increasingly important domestic role
Litigation, Investigation, and Law Enforcement
OPM still searching for 7 percent of breach victims(Federal Times) The Office of Personnel Management has been sending some 800,000 letters a day since Sept. 30, alerting current, former and prospective federal employees and family members that their information was compromised in a network breach last year
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Program on Cyber Security Studies (PCSS)(Garmisch-Partenkirchen, Germany, December 2 - 17, 2015) The Marshall Center has developed a comprehensive program to explore the increasing domestic, international and transnational challenges in cyber security. Our goal is to provide a comprehensive, policy-focused,...
cyberSecure(New York, New York, USA, December 15 - 16, 2015) Today's business leaders recognize that a multi-disciplinary approach is critical to protecting the bottom line. What's too often missed is a vision that incorporates best practices that allow you add...
cyberSecure (New York, New York, USA, December 15 - 16, 2015) Today's business leaders recognize that a multi-disciplinary approach is critical to protecting the bottom line. What's too often missed is a vision that incorporates best practices that allow you add...
CES CyberSecurity Forum(Las Vegas, Nevada, USA, January 6, 2016) Premiering at CES 2016 — the global stage for next generation technologies — The CyberSecurity Forum will bring together security experts and technology visionaries with executives and policymakers...
FloCon 2016(Daytona Beach, Florida, USA, January 11 - 14, 2016) The FloCon network security conference provides a forum for large-scale network flow analytics. Showcasing next-generation analytic techniques, FloCon is geared toward operational analysts, tool developers,...
Cyber Security Breakdown: Chicago(Chicago, Illinois, USA, January 12, 2016) This half day session will provide you with the critical information you need to start formulating an effective response in the eventuality of a cyber security event. Rather than try and handle the breach...
Insider Threat Program Development Training Course — Georgia(Atlanta, Georgia, USA, January 12 - 14, 2016) The National Insider Threat Special Interest Group website has some very "eye opening" examples of how "damaging and costly" an "insider threat incident" can be. The FBI Insider Threat Alert states companies...
FTC PrivacyCon(Washington, DC, USA, January 14, 2016) The Federal Trade Commission will in January hold a wide-ranging conference on security and privacy issues lead by all manner of whitehat security researchers and academics, industry representatives, consumer...
POPL 2016(St. Petersburg, Florida, USA, January 20 - 22, 2016) The annual Symposium on Principles of Programming Languages is a forum for the discussion of all aspects of programming languages and programming systems. Both theoretical and experimental papers are welcome,...
Automotive Cyber Security Summit — Shanghai(Shanghai, China, January 21 - 22, 2016) The conference, which brings together automakers, suppliers, various connected-services providers and security specialists, will focus on government regulations, emerging automotive cyber security standards...
CyberTech 2016(Tel Aviv, Israel, January 26 - 27, 2016) Cybertech is the most significant conference and exhibition of cyber technologies outside of the United States. Cybertech provided attendees with a unique and special opportunity to get acquainted with...
Global Cybersecurity Innovation Summit(London, England, UK, January 26 - 27, 2016) SINET presents the Global Cybersecurity Innovation Summit, which focuses on providing thought leadership and building international public-private partnerships that will improve the protection of our respective...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.