Security agencies worldwide brace for calendar driven terrorist attacks (US Independence Day, Ramadan, UK Armed Forces Day, etc.) with their estimates significantly informed by intelligence collected online. One trend noted: as Reuters puts is "There's no such thing as a lone wolf in cyberspace." Alienation, specious communities, and online disinhibition create virtual cells whose common purposes require no central direction.
Saudi Arabia and Iran sharpen regional cyber competition.
The US Office of Personal Management (OPM) takes down its e-QIP online questionnaire (used in security clearance background investigations) as a "proactive measure." Information collected on the SF-86 forms includes not only about individuals applying for clearances, but about their colleagues, relatives, and neighbors. Observers wonder when the Government will notify these other people that aspects of their identity is at risk, but this question seems largely rhetorical — the challenge of doing so is enormous. E-QIP is expected to be down for about six weeks.
Calls for OPM Director Archuleta's resignation grow louder, her fifteen-point security plan widely seen as too little, too late.
Leaked documents allege US surveillance of French corporate and Foreign Ministry targets.
A vulnerability last week's Adobe Flash patch closed is already being exploited in the wild, evidence of how short the re-engineering cycle has become when patches disclose the bugs they fix.
Damballa reports CryptoWall ransomware has been observed riding click-fraud campaigns.
Criminals are spreading Dyre malware through compromised wireless routers.
Many popular virtual private networks (VPNs) are reported to be exposing user data through IPv6 leakage.
Today's issue includes events affecting Australia, Brazil, Chile, China, European Union, France, Germany, Iran, Iraq, Mexico, Nigeria, Russia, Saudi Arabia, Syria, Taiwan, United Kingdom, United States.
NSA wiretapped two French finance ministers: Wikileaks(Reuters) The U.S. National Security Agency wiretapped the communications of two successive French finance ministers and collected information on French export contracts, trade and budget talks, according to a report by WikiLeaks
Crooks Use Hacked Routers to Aid Cyberheists(KrebsOnSecurity) Cybercriminals have long relied on compromised Web sites to host malicious software for use in drive-by download attacks, but at least one crime gang is taking it a step further: New research shows that crooks spreading the Dyre malware for use in cyberheists are leveraging hacked wireless routers to deliver their password-stealing crimeware
How Malware Campaigns Employ Google Redirects and Analytics(Internet Storm Center) The email message sent to the bank employee claimed that the sender received a wire transfer from the recipient's organization and that the sender wanted to confirm that the payment went through without issues. The victim was encouraged to click a link that many people would consider safe
Windows kerberos ticket theft and exploitation on other platforms(Mikkolehtisalo) In the past there has been a lot of talk about pass the hash, but surprisingly little about different methods for exploiting kerberos tickets. Besides the discussion focused on golden tickets the Kerberos has not really ever been a major target for abuse
Hackers Behavior Before and During the 2015 Copa America(Cytegic) Cytegic DyTA intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTA enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geopolitical region, industry sector and corporate assets. The following report represents the most interesting and active cyber-trends that DyTA analyzed before and during the Copa America 2015 in Chile. As a background we analyzed the main trends that occurred during the 2014 World Cup which took place in Brazil during June to July 2014
Searches for Pirated Content Lead to Pain and Little Gain(Threatpost) People love to try and get something for nothing, especially on the Internet where there's all kinds of things available for nothing. But a lot of those free things are illegal and attackers have become very adept at taking advantage of users' desire for free episodes of Gilmore Girls or bonus Dragon Ball Z content
MERS News Used in Targeted Attack against Japanese Media Company(TrendLabs Security Intelligence Blog) Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from Yahoo! Mail to easily pass through anti-spam filters, the attackers copied publicly available information from the Internet to lure the recipient to open the message
Nigerian scam groups target SMEs in Taiwan(AsiaOne) Trend Micro Inc. has issued a warning to Taiwanese small- and medium-sized enterprises about the newest Nigerian hacking scheme that will not only steal information, but also cancel transactions initiated by enterprises and transfer the money to the hacker's bank accounts instead
Mercenary hackers: an elusive, challenging foe(Christian Science Monitor Passcode) For-hire criminal hackers are a plentiful resource for nation-states and militant groups to carry out digital attacks. They are also expert at covering up their tracks, making it difficult to pinpoint true culprits
Many Companies Face A Huge Security Problem In Just Two Weeks. Is Yours One Of Them?(Forbes) Many companies don't want to admit it, but they haven't yet transitioned entirely to the cloud. It's happening, of course, but it's taking time. One recent survey by BetterCloud reported that by 2020, 62% of the 1,500 its customers will be running 100% of their information technology in the cloud. But that still leaves a lot of companies in the United States using internal servers to run their businesses
Breaking the IoT Connection(re/code) In many ways, the current obsession with the Internet of Things is understandable. The tech press is constantly on the lookout for something cool and fresh to write about, and IoT is this year's hot topic. Plus, the idea of connecting essentially everything to everything is pretty compelling at a conceptual level
How Investors are Profiting from Cyber Crime Fear(Investopedia) The FBI Internet Crimes Complaint Center (IC3) received its three millionth internet crime complaint in 2014, having received 269,422 complaints in 2014 alone — with losses estimated at over $800 million
India facing dearth of cryptographers: Ex-DRDO chief(Business Standard) Former DRDO chief V.K. Saraswat on Monday expressed concern at the shortage of experts involved in making and cracking secret codes, as they have a major role to play in bolstering India's cyber defence
NIST Revises Key Computer Security Publication on Random Number Generation(NIST Tech Beat) In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for generating random numbers, a crucial element in protecting private messages and other types of electronic data. The action implements changes to the methods that were proposed by NIST last year in a draft document issued for public comment
How to Protect Your Aging Network (Enterprise Tech) The Office of Personnel Management breach was the most recent and public example of the damage aging networks can help deliver to an organization: A lack of standard practices such as encryption, data masking, and redaction that prevents many attacks
Cyber Resilience And Spear Phishing(Dark Reading) Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks
Creating a Cybersecurity Governance Framework: The Necessity of Time(Security Intelligence) Today's organizations are going through a big change in the way they operate, the way they think and the way they function. This change is being pushed by major technological (cloud and mobile), intellectual (big data and analytics) and behavioral (social) transformations that are affecting the entire IT industry. Security also has been hit by this revolution. In fact, more than the change itself, the impact to security is due to the speed of the developments
Cyber Battleground Range helps keep up with training demands for the U.S. Army(Military Embedded Systems) To help validate soldier's cyber security skills, the U.S. Army Communications-Electronics Command (CECOM) is setting up Cyber Battleground Range. The training ground is expected to open up to all units in late summer of 2015 and will provide soldiers with a realistic environment that applies the skills learned in a classroom training curriculum
Quantum cryptography set for lift-off(Physics World) Exchanging messages with almost complete security by exploiting the strange laws of quantum mechanics should in future be possible on a global scale. That is the conclusion of physicists in Italy, who have found that the delicate states needed for quantum cryptography can be transmitted via laser beam from an orbiting satellite to a receiver on the surface of the Earth. The researchers say that the relatively simple technology needed for such encryption could be incorporated into conventional communications satellites
GOP Lawmakers to President Obama: Remove OPM Director Archuleta and CIO Donna Seymour(House Committee on Oversight and Government Reform) Today, House Oversight and Government Reform Committee Chairman Jason Chaffetz (R-UT), along with 17 Republican Members of Congress, sent a letter to President Obama requesting the removal of Katherine Archuleta as Director of the U.S. Office of Personnel Management (OPM) and Ms. Donna Seymour, OPM Chief Information Officer (CIO) after a massive data breach compromised the Personally Identifiable Information (PII) of millions of past, current, and prospective federal employees
Influencers: OPM chief should be held responsible for breach(Christian Science Monitor Passcode) The Office of Personnel Management chief should be held responsible for the lapse in security that led to the breach of millions of personal records, a whopping 84 percent of Passcode's pool of security and privacy experts said
Government Lacks Strategy For Cyber Attack Response, Say Techonomy Policy Panelists(Forbes) As the Internet spreads its tentacles into every nook of society, attacks are rapidly increasing against individuals, companies, governments, and the very Net infrastructure upon which they all rely. The attackers range from cyber criminals to non-state actors like ISIS and nation-states. But law enforcement, government regulation, and an established military response are not even close to keeping up, said a group of experts at the Techonomy Policy conference in Washington on June 9
What Washington really knows about the Internet of Things(Politico) President Barack Obama wears a FitBit monitor on his wrist to count his steps and calories, and has waxed poetic about the power of wearable technology to "give each of us information that allows us to stay healthier"
Proposed Cyber Legislation And Their Impact On The Security Community(Hacker Samurai) As the number of breach incidents continues to climb, the importance of a highly skilled cybersecurity workforce on protecting our nation?s critical infrastructure sectors continues to grow. But how does proposed legislation impact the cyber communities ability to do their job?
Suspected Pro-Kremlin 'Hell' Hacker Denies Allegations in German Court(Moscow Times) The hacker known as "Hell" shot to fame after leaking information from several e-mail and LiveJournal accounts belonging to public figures in Russia. Following years of hacking attacks on the online accounts of various Russian opposition figures, a man suspected of being the notorious hacker known as "Hell" — who is believed to have ties to Russian officialdom — is currently standing trial in Germany
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
(ISC)² Security Congress(Anaheim, California, USA, September 28 - October 1, 2015) Proudly colocated for the fifth year in a row, (ISC)² Security Congress 2015 and ASIS International 61st Annual Seminar and Exhibits (ASIS 2015) expect more than 19,000 professionals worldwide from...
IP Expo Europe(London, England, UK, October 7 - 8, 2015) With six top enterprise IT events under ONE roof, IP EXPO Europe assists the IT Industry in future proofing their IT and embracing a digital future. The event showcases brand new exclusive content and...
NSA Information Assurance Symposium (IAS) 2015(Washington, DC, USA, June 29 - July 1, 2015) The NSA Information Assurance Directorate (IAD)'s Information Assurance Symposium (IAS) is a biannual forum hosted by the National Security Agency (NSA). IAS events of the past have proven to be the preferred...
US News STEM Solutions: the National Leadership Conference(San Diego, California, USA, June 29 - July 1, 2015) San Diego offers the perfect backdrop for the 4th annual U.S. News STEM Solutions National Leadership Conference, June 29 — July 1, 2015 in San Diego, CA. Please make your plans now to join fellow...
Information Assurance Symposium(Washington, DC, USA, June 29 - July 1, 2015) The NSA Information Assurance Directorate (IAD)'s Information Assurance Symposium (IAS) is a biannual forum hosted by the National Security Agency (NSA). IAS events of the past have proven to be the preferred...
Cyber Security for Healthcare Summit(Philadelphia, Pennsylvania, USA, June 29 - July 1, 2015) Our IQPC Cyber Security for Healthcare Summit will help Hospitals and Medical Device manufacturers to prepare and manage risks by viewing cybersecurity not as a novel issue but rather by making it part...
National Insider Threat Special Interest Group Meeting(Laurel, Maryland, USA, July 16, 2015) Topics to be discussed at the meeting; Insider Threat Program Development & Implementation, Behavioral Indicators Of Concern, Legal Considerations When Developing & Managing An Insider Threat Program.
TakeDownCon Rocket City(Huntsville, Alabama, USA, July 20 - 21, 2015) TakeDownCon is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their...
CyberMontgomery 2015(Rockville, Maryland, USA, July 30, 2015) Montgomery County, Maryland, is home to the National Institute of Standards and Technology (NIST), the National Cybersecurity Center of Excellence (NCCoE), the FDA, NIH, NOAA, NRC and more than a dozen...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.