Canada's CSEC attributes Babar, Bunny, Casper, Dino, NBot and Tafacalou (Kaspersky calls the Trojans "Animal Farm") to France's DGSE. (Much publicly cited evidence is linguistic or circumstantial, based on presumed DGSE intelligence targets.)
Elsewhere in Canada, a group styling itself the "United Islamic Cyber Force" vandalizes websites belonging to the francophone party Bloc Québécois. (The UICF calls for an invasion of Rome, but this seems more prophetic and aspirational than imminent.) The Bloc Québécois is Provincial but not provincial, larger and better resourced than other recent North American targets of Islamist cyber vandals.
The University of Toronto's Citizenlab accuses the Hacking Team (a well-known Italian cyber firm) of selling its ICS lawful intercept tool to Ethiopia ("the world's first turnkey surveillance state") for use against US-based dissident journalists.
Xiaomi says the M 4 LTE device in which Bluebox found pre-loaded malware was, in fact, a counterfeit (Bluebox concurs). Not only a counterfeit, but "a very good one at that," the device offers an object lesson in supply chain vulnerability.
Trend Micro reports finding a bogus Flash update sniffing home networks for vulnerabilities.
Sophos grumps at BitTorrent for including "foistware" in its uTorrent client.
While waiting for Redmond's Patch Tuesday, admins may consult Apple's latest upgrades.
The Guardian runs a surprisingly sympathetic piece on cybercrime victims giving hackers a dose of their own medicine.
Concerns over cyber labor shortages continue: Cisco estimates there are more than 1M unfilled cyber jobs worldwide.
Analysts wonder how one determines threat intelligence return on investment.
Today's issue includes events affecting Algeria, Austria, Canada, China, Ethiopia, France, Germany, Iran, Iraq, Ireland, Israel, Italy, Malaysia, Morocco, Netherlands, New Zealand, Russia, Sweden, Syria, Turkey, Ukraine, United Kingdom, United States.
The CyberWire will be offering special coverage of SINET's ITSEF conference in Mountain View, California, next week. We'll be live-tweeting from the event, and our editor will be moderating a panel on emerging trends in cyber attack.
Malware Snoops Through Your Home Network(TrendLabs Security Intelligence Blog) In recent years, we have seen a lot of reports about home routers being vulnerable to attacks. Our research as early as 2008 shows malware rigging routers to redirect users to different sites. Other attacks we have seen include backdoors and possible DNS rebinding attacks. In these scenarios, the intent and goal of the attacks are pretty straight-forward
BEDEP: Backdoors Brought Into The Light By Flash Zero-Days(TrendLabs Security Intelligence Blog) The earlier Flash zero-days of the year have brought a new malware threat to the forefront: the BEDEP malware family. It has been the payload of two zero-day exploits in recent weeks: CVE-2015-0311 in late January, and CVE-2015-0313 in early February
State Investigating Cyber-Attack On FSA Testing System(CBS Miami) South Florida students did not encounter any technical issues Monday while taking the state's new standardized test, however, the state's top law enforcement agency is investigating testing delays caused by cyber-attacks on a server used to administer the Florida Standards Assessment (FSA)
Busted scammer resorts to death threats(Naked Security) When his phone rang and he began to listen to the crook on the other end, Jakob Dulisse wasn't fooled for an instant by the "Microsoft tech support" scam
Seagate Confirms NAS Zero Day, Won't Patch Until May(Threatpost) Seagate, over the weekend, confirmed the zero-day vulnerability in its Seagate Business Storage 2-Bay NAS boxes disclosed March 1. But in the same breath, told customers exposed to the vulnerability that a patch is still two months away
TextSecure to Drop Support for Encrypted SMS(Threatpost) Open Whisper Systems is phasing out support for encrypted SMS and MMS messages in its TextSecure messaging product. The move does not spell the end for encrypted messaging for users of the Android app, as the company plans to switch to its own transport protocol to address some of the security and performance issues inherent in SMS
Cybersecurity Companies Booming in Wake of Major Corporate Cyber Attacks(Intellectual Property Brief) Over the last year and a half, several major multinational corporations have fallen victim to an unprecedented number of massive cyber attacks and security breaches. Consumer databases and information systems have released millions of records. But not everyone is suffering; cyber security companies and the overall stock market are reaping the benefits of hackers' dirty work
Managing cyber risks more than just IT: p&c conference(Canadian Underwriter) Managing cyber risk in brokerages is really about managing people, not just IT issues, said two speakers at Insurance Canada's 13th Annual P&C Insurance Technology Conference in downtown Toronto on Monday
CISO's Need a Seat at the Table(Venafi Blog) Cyber breach headlines are on the increase and underscore the need for security awareness at the very highest levels of an organization. In 2014 alone, hundreds of millions of records were stolen and tens of millions of dollars were spent on investigations, fines and lawsuits. I was wondering… in how many cases did the CISO have access to the Board of Directors?
'Dark' coins rising(CSO) Cryptocurrency users are stepping up efforts to make payments payments untraceable and fully anonymous
The Security Download: Anticipating Cyberattacks with Machine Learning(Wall Street Journal) Artificial intelligence and machine learning are playing a larger role in cybersecurity, which can in theory help companies identify risks and anticipate problems before they occur. The idea is to create software that can adapt and evolve to combat ever-changing attack strategies, or identify patterns of suspicious behavior
Galois Successfully Demonstrates 'Anti-Hacking' Software For UAVs And Cars(Midland Daily News) To address growing evidence that commercial Unmanned Aerial Vehicles (UAV), automobiles and other vehicles are vulnerable to hacking and sophisticated cyber security attacks, Galois today announced it has developed and successfully demonstrated what has been called "the world's most secure UAV software"
Mother-Son Team Poised For Cybersecurity National Finals(Leesburg Today) A Leesburg 11-year-old discovered a love for cybersecurity less than a year ago and is now on his way to go up against some of the brightest young minds in the nation at the CyberPatriot National Youth Cyber Defense Competition this week
Stepping up defense of net infrastructure(The Hill) You leave for work and lock the door behind you. You get in the car and fasten your seatbelt. On the highway, you abide by the legal speed limit. These choices reflect a desire for physical security and an awareness, even subconsciously, of potential danger in your daily routine
The government is doubling down on cybersecurity — really this time(Washington Business Journal) I tend to be reluctant to make definitive forecasts, but I'm ready to say 2015 is quickly turning into the year of cybersecurity. Yes, cyber has been a top concern for several years, and several policy initiatives are simply carrying over. But a brand new initiative potentially brings a fresh, game-changing new focus to the crucial concept of cyber threat sharing
Should the U.S. be able to counter-attack nation-state cyber-aggressors without attribution?(The Stack) The testimony of U.S. Navy Adm. Michael S. Rogers on March 4th — before the House Armed Services Committee on cyber operations and improving the military's cybersecurity posture — not only paints an unusually vivid picture of a nation trying to re-invent its military infrastructure in response to a problem that it only partially understands, but also provides some indication as to the means by which it intends to get off the back-foot regarding response policies to cyber-attacks such as last autumn's Sony Hack incident
Maritime Security: Sneak Preview of the Coast Guard's Cybersecurity Strategy(In Homeland Security) Last week, the Coast Guard participated in a maritime cybersecurity learning seminar and symposium with American Military University (AMU) and Command, Control and Interoperability Center for Advanced Data Analysis, (CCICADA), at Rutgers University. The organizers of the event plan to publish a comprehensive book on cybersecurity as an outcome of the symposium. The attendees included participants from government, private sector and academia. CCICADA is the Department of Homeland Security's University Center of Excellence on cybersecurity
Cyber Subs: A Decisive Edge For High-Tech War?(Breaking Defense) THE FUTURE: Imagine you're a Chinese high commander, taking stock at the outbreak of the next great war. All your aides and computer displays tell you the same thing: For hundreds of miles out into the Western Pacific, the sea and sky are yours. They are covered by the overlapping threat zones of your long-range land-based missiles, your Russian-made Sukhoi aircraft, your home-grown stealth fighters, and your ultra-quiet diesel submarines, all cued by your surveillance network of sensors on land, sea, air, and space
Justice Dept. vows to strike harder against hackers, nations behind cyberattacks(Christian Science Monitor: Passcode) John Carlin, chief of the Justice Department's National Security Division, says the US needs to raise the stakes for cyberattacks on the US: If the cost of stealing information from American companies results in swift criminal action or sanctions, hackers may eventually decide it's not worth it
Microsoft Case: The Government Responds, But Fails to Convince(Just Security) The government has now filed its Second Circuit brief in the dispute with Microsoft (discussed here, here, and here), challenging key assertions by Microsoft and its many amici, and making a strong argument that a warrant issued under the Stored Communications Act (SCA) requires Microsoft to turn over emails in its custody and control, regardless of whether they are being held (in this case in Dublin)
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Conference on Cyber Defence in Europe(Berlin, Germany, March 25 - 26, 2015) The conference aims to address these and other issues of cyber defense in a broad audience of policy-makers, senior officials and experts from EU institutions and Member States, representatives of industry...
BSides Augusta 2015(Augusta, Georgia, USA, September 12, 2015) Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of...
Fraud Summit San Francisco(San Francisco, California, USA, September 15, 2015) ISMG's Fraud Summit is a one-day event focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges. Among the areas to be discussed are...
Annual Privacy Forum 2015(Luxemburg, October 7 - 8, 2015) The distributed implementation of networks and services offers the opportunity for new Privacy Enhancing Technologies (PETs) that could support users' needs while safeguarding their personal data. Although...
OISC: Ohio Information Security Conference(Dayton, Ohio, USA, March 11, 2015) Technology First invites you to participate in the 12th Annual Ohio Information Security Conference Wednesday, March 11, at the Sinclair Community College Ponitz Center in Dayton, Ohio. The conference...
RiSK Conference 2015(Lasko, Slovenia, March 11 - 12, 2015) In recent years RISK conference has become one of the leading events on computer security in the Adriatic region and is attended by engineering as well as executive staff of companies from the region.
B-Sides Vancouver(Vaqncouver, British Columbia, Canada, March 16 - 17, 2015) The third annual Security B-Sides Vancouver is an information security conference that will be held March 16th and 17th. We love to see brand new speakers, seasoned speakers, and everyone in between
Insider Threat 2015 Summit(Monterey, California, USA, March 16 - 17, 2015) The Insider Threat 2015 Summit is about bringing Government and Industry organizations and their cybersecurity leaders together in order to better understand the type of threats that may impact their infrastructure...
2015 North Dakota Cyber Security Conference(Fargo, North Dakota, USA, March 17, 2015) The North Dakota Cyber Security Conference brings together community members from academia, government and industry to share strategies, best practices and innovative solutions to address today's challenges...
Philadelphia SecureWorld(Philadelphia, Pennsylvania, USA, March 18 - 19, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.