skip navigation

More signal. Less noise.

Daily briefing.

Ransomware and distributed denial-of-service (DDoS) campaigns continue to dominate the news at week's end. The Magnitude exploit kit has been spotted delivering CryptoWall in a malvertising campaign. And, in the black market, ransomware purveyors offer their services (under the CryptoLocker brand) in exchange for ten percent of any ransom paid.

High-end Australian email provider FastMail sustains a DDoS attack similar to the ones that recently crippled Runbox, Zoho, Hushmail and ProtonMail. FastMail takes pains to say that it has no intention of paying ransom to get out from under the attack. Security blogger Graham Cluley sustains his own DDoS incident, noting that it occurred even as he was speaking about the Armada Collective and other DDoS hoods. He says the attackers used UPnP reflection, DNS reflection, and TCP SYN flooding, but have issued no ransom demands. As of this writing his site appears still under attack.

Point-of-sale malware remains a problem even as we reach the second anniversary of the Target breach that brought the issue to prominence. Trustwave describes "Cherry Picker," which has been infesting targets since 2011 (and cleaning up after itself). Proofpoint discovers a newer strain, "Abbadon," which researchers noticed downloading in the course of a Vawtrak banking Trojan infection.

Several interesting proofs-of-concept are out, including the use of barcodes as a malware vector.

Microsoft fixes the patch that caused Outlook problems.

Investors take a new look at the cyber sector, informed by Tenable funding and Cisco results. Microsoft's German cloud servers will be secured by G-Data.

Notes.

Today's issue includes events affecting Australia, Canada, China, European Union, Germany, Iran, Democratic Peoples Republic of Korea, Russia, Ukraine, United Kingdom, United States.

Cyber Attacks, Threats, and Vulnerabilities

More Ransomware Being Spread Via Malvertising (Dark Reading) Magnitude exploit kit has popped up in new malvertising campaign and dropping CryptoWall

New Ransomware business cashing in on CryptoLocker's name (CSO) Program takes a 10 percent cut of the ransom payment

FastMail the latest victim of a sustained DDoS offensive (We Live Security) FastMail has been subjected to a number of distributed denial of service (DDoS) attacks, the premium email provider has revealed

I wrote about DDoS attacks, and my website got DDoS attacked (Graham Cluely) I would like to apologise to readers who may have found that their regular grahamcluley.com fix has been disrupted since last Sunday, after my site suffered a significant distributed denial-of-service (DDoS) attack

Cherry Picker POS Malware Has Remained Hidden For Four Years (Dark Reading) Sophisticated obfuscation techniques have allowed malware to evade AV systems and security vendors for a long time, says Trustwave

Researchers Discover Two New Strains of POS Malware (Threatpost) Point of sale malware has gotten more sophisticated as we inch closer to the two-year anniversary of the Target data breach. Now, two weeks from the biggest shopping day of the year, two new and different strains of point of sale malware have come to light, including one that's gone largely undetected for the past five years

Hacker claims Comcast breach linked to unpatched Zimbra vulnerability noted by NullCrew (Office of Inadequate Security) There's a new claim in the Comcast breach first reported by Steve Ragan. Darren Pauli reports that a hacker claiming responsibility for the breach notes that it was NullCrew's hack and taunting of Comcast in 2014 that set the stage for the theft of hundreds of thousands of users' information

TalkTalk hired BAE Systems' infosec bods before THAT hack (Register) Plus: Police told us not to answer questions, says telco

Instagram password stealer app yanked from App Store and Google Play (Naked Security) Here's a question: Would you install a mobile app that offered smartphone access to a popular online service?

Apps Permissions in the Google Play Store (Pew Research Center) Analysis of over 1 million apps in Google's Android operating system in 2014 shows apps can seek 235 different kinds of permissions from smartphone users. The average app asks for five permissions

Healthcare Apps, WordPress Most Popular Web Attack Targets (Dark Reading) No application escaped without a Shellshock attack in 2015, either, report finds

Spam and phishing in Q3 2015 (Securelist) Spam: features of the quarter. Online dating. The dating theme is typical for spam emails, but in the third quarter of 2015 we couldn't help but notice the sheer variety appearing in these types of mailings

Webcam Hacking: Recent Uptick in IP Camera Trolling Highlights Potential Risks of IP Devices (Cyveillance) A new doll from Mattel, the "Hello Barbie," available in December, demonstrates just how ubiquitous Internet-connected webcams and microphones are becoming

The cyber elephant in the room (Security Systems News) I've spent several days recently with two major camera companies, Hikvision and Axis Communications

Tool Controls Botnet With Twitter Direct Messages (Dark Reading) 'Twittor' exploits the expanded capacity of Twitter DMs to replace traditional botnet command-and-control server infrastructure

Snooping Samsung S6 calls with bogus base stations (Security Affairs) A duo of security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, demonstrated how to intercept calls using bogus base stations

One Bad Barcode Spoils Whole Bunch (Threatpost) Barcodes' pervasiveness in retail, health care and other service industries notwithstanding, hackers really haven't paid much attention to these tiny lines of data

Efficient multivariate statistical techniques for extracting secrets from electronic devices (Computer Lab, University of Cambridge) In 2002, Suresh Chari, Rao Josyula and Pankaj Rohatgi presented a very powerful method, known as the 'Template Attack', to infer secret values processed by a microcontroller, by analysing its power-supply current, generally known as its 'side-channel leakage'… In this thesis, I describe efficient implementations of this template attack, that can push its limits further, by using efficient multivariate statistical analysis techniques

Security Patches, Mitigations, and Software Updates

Microsoft surreptitiously reissues botched patch KB 3097877 for Windows 7 (InfoWorld) The new, fixed patch has the same KB number as the old, bad patch that crashed Outlook and busted network logon

Adobe Flash Bug Discovery Leads To New Attack Mitigation Method (Dark Reading) Prototype aims to prevent exploits that employ 'use after free' bugs in Windows, Linux, OS X software

Exploit Writing and Mitigation Going Hand in Hand (Threatpost) More and more white hats who practice offensive security and exploit writing are simultaneously talking about exploit mitigation

Security Audit: Scrapyd (SPECT Research) In this post I'll write about the vulnerabilities discovered in scrapyd, the scrapy daemon. It's a full review of security issues and measures to take in order to run scrapyd safely

LinkedIn algorithms will know how many spammy email notifications you want (Naked Security) If you've been getting more email notifications from LinkedIn than you'd like, there's some good news from the social network: you're going to see a lot less of them

Cyber Trends

Slush Helsinki: IoT security on the rise, physical security becoming more prevalent (SC Magazine) As this year's Slush conference opens, securing The Internet of Things has become a hot topic with many of the exhibiting companies tackling the issue head on

There is No Such Thing as the Internet of Things — at Least Not Yet! (Legaltech News) The invention of thousands of individual smart products does not equate to the development of a unified Internet of Things, one that allows for the interoperation of all of these Wi-Fi connected objects

The Lingering Mess from Default Insecurity (KrebsOnSecurity) The Internet of Things is fast turning into the Internet-of-Things-We-Can't-Afford

McAfee forecasts growing cyber threats for the next five years (Fedscoop) For hackers, a more pervasive Internet means more targets and a larger attack surface, the company warns

Are connected medical devices a disaster waiting to happen? (MedCityNews) Remember in late July when the Food and Drug Administration issued an advisory warning of security flaws in Hospira's Symbiq smart infusion pumps?

It Only Takes One Hour to Detect APTs on Network, Apparently (InformationSecurityBuzz) Survey reveals unmanaged credentials are the biggest security issue for organisations and IT professionals are unrealistic about time it takes to identify threats

Cybercriminals turn to automation to profit from Web app attacks (FierceITSecurity) Cybercriminals are increasingly using automation to ramp up the magnitude and velocity of attacks intended to compromise Web applications and steal sensitive data, according to security firm Imperva's annual Web Application Attack Report released on Thursday

Videology and White Ops Report Shows That Blocking Bots on Video Ads Can Increase Brand Engagement by 22% (Sys-Con Media) Videology, a leading software provider for converged TV and video advertising, and White Ops, the leader in online fraud detection for digital advertising, today released the findings from a new whitepaper entitled "Eradicating Bot Fraud: The Path to Zero-Tolerance." This joint report is designed to help advertisers better understand the issue of ad fraud in video advertising and the viable options available to fight back against this $7 billion problem

Federal Government Most Prone To Repeat Breaches (Dark Reading) It isn't just the White House that gets compromised more than once. Also, in a shifting trend, malicious insider attacks don't cut quite as deep as outsiders' do, report finds

Australia vulnerable to a cyber-attack disaster (Sydney Morning Herald) Australian government agencies and organisations are increasingly vulnerable to a major cyber attack yet security has not evolved in more than 20 years, according to an international cybercrime expert

Marketplace

CFOs Reveal Their Top Issues for 2016 (CFO) What will CFOs be spending their time on next year? Preserving margins and sustaining or improving earnings performance top the list, says Protiviti

UK firms look to threat intelligence to focus security efforts (ComputerWeekly) Performance, skills and costs remain biggest hurdles to true data-driven security, reveals an IDC study

Thoughts on Cisco's Results; Implications for Rest of Tech Space — Choppy Environment Remains into 2016 (FBRFlash) Last night Cisco delivered headline results which beat the Street, but all eyes for investors this morning will be around the company's softer outlook and macro comments

Despite Record $250 Million Tenable Investment There Is 'No Cybersecurity Bubble' (Forbes) Venture capitalists have declared there is no cybersecurity bubble despite some epic investments in industry start-ups this year, peaking with a huge $250 million round raised by Tenable. It's believed to be a record round for a cybersecurity firm

Columbia cyber firm VOR Technology to grow staff more than 200 percent (Baltimore Business Journal) Columbia cybersecurity firm VOR Technology LLC plans grow its workforce by more than 220 percent after landing multiple contracts from the U.S. Department of Defense

Israel's Cymmetria, Which Deceives Hackers, Raises $9 Million (Wall Street Journal) Cymmetria Inc., an Israeli start-up whose software lures hackers into cyber traps within organizations' networks has raised around $9 million, the latest sign that investors are flocking to one of cyber-security's hottest trends: deceiving hackers and catching them red handed

Hill-Based OPSWAT Provides Cybersecurity (Potrero View) In our interconnected and device-laden world, cybersecurity has become a hot topic, especially after recent data breaches at the Sony and Target corporations

Cybersecurity firm offers 'premium' cash rewards to hackers who can break Tor (Daily Dot Politics ) A big pay day is coming to the hacker who can break the Tor anonymity network and reveal the identity of users around the world

How CloudLock Became the Nation's Fastest-Growing Cybersecurity Startup (BostInno) The Waltham firm is entirely focused on securing cloud applications

Why Microsoft Corporation Bought Secure Islands (Motley Fool) The software titan has purchased its third Israeli security firm within a year

G DATA ist Launch-Partner der deutschen Microsoft Cloud (FinanzNachrichten) 83 Prozent der deutschen Unternehmen erwarten laut Bitkom, dass sich das von ihnen genutzte Rechenzentrum in Deutschland befindet und dem deutschen Recht unterliegt

Products, Services, and Solutions

Five Cloud-based Vulnerability Management Solutions for Enterprise (Information Security Buzz) Cloud-based vulnerability management solutions have the advantage of being up and running quickly and are often more cost effective than in-house solutions

GasPot Integrated Into Conpot, Contributing to Open Source ICS Research (TrendLabs Security Intelligence Blog) In August of this year, we presented at Blackhat our paper titled The GasPot Experiment: Unexamined Perils in Using Gas-Tank-Monitoring Systems

Utility Takes a Holistic Approach to Security (Baseline) The Lower Colorado River Authority deploys a cloud-based security solution that identifies more forms of malware and addresses zero-day threats more effectively

Technologies, Techniques, and Standards

Cyber security vital to insurers as 'treasure chests' of personal data (Business Insurance) Cyber security is "arguably the single most important issue" facing the insurance industry, according the chair of the National Association of Insurance Commissioners' Cybersecurity Task Force

Federal CFO: Using Military Strategy to Improve Response and Resilience to Cyber Incidents (Wall Street Journal) At a recent cyber wargame simulation, executives from diverse corporate functions worked through a major cybersecurity breach at a fictitious company

US and UK test financial sector response to cyber attack (Reuters via CNBC) Britain and the United States carried out a planned drill with leading global firms on Thursday to see how they would respond to a cyber incident in the financial sector

Pentagon purges HTML from .mil emails (FCW) The Pentagon is tightening the screws on its campaign to improve email security

The dark side of layered security (CSO) Sometimes, layered security can have unintended consequences and even make a company less secure than before

Google Reconnaissance, Sprinter-style (Internet Storm Center) When doing security assessments or penetration tests, there's a significant amount of findings that you can get from search engines

Using Privacy to Enhance Security (Infosec Daily News) Two concepts that have been a source of debate since the emergence of the Internet are privacy and security

'We take your security seriously' (Engadget) Anyone who has even the slightest amount of contact with the internet is familiar with the scenario: An email or actual piece of mail arrives from a company who apparently handles some part of your connected life

Security 101 for CEOs (Tripwire: the State of Security) There are important security lessons for CEOs following the embarrassing revelation that a teenager hacked into the personal email accounts of CIA Director John Brennan and Homeland Security Secretary Jeh Johnson. This isn't the first nor will it be the last time that people hack into accounts using a variety of techniques; it illustrates the lengths to which amateurs and bad actors will go

When you realize security isn't a sprint (CSO) A different way to think about security than quick sprints and finish lines

Design and Innovation

Solving Security: If You Want Something New, Stop Doing Something Old (Dark Reading) Black Hat Europe keynoter Haroon Meer tells security pros to work smarter, think out of the box, and speak out to the C-suite

Keeping Data Secure: A Happy Marriage of Hardware & Software (Infosec Island) We've all heard the stories about being hacked — and perhaps even experienced this ourselves — whether by rogue individuals or organized criminal organizations

Academia

UMD Honors Students Participate in Parsons-Hosted Cyber Contest (GovConExecutive) Parsons has led a cyber contest for University of Maryland students in an effort to improve the cybersecurity skills of the future workforce

Jacksonville State expanding its cybersecurity focus (Jacksonville News) Jacksonville State is delving deeper into cybersecurity

Hacking Contests Drive Millennials to Cybersecurity (IBM Security Intelligence) It's no secret that the cybersecurity talent shortage is one of the biggest challenges facing our industry, with experts predicting 1.5 million open and unfilled global security positions over the next five years

Legislation, Policy, and Regulation

EU wants to mandate US firms disclose intelligence requests (The Hill) European negotiators want a new U.S.-EU data transfer pact to require U.S. businesses to report intelligence agency requests for information on European citizens, according to EU Justice Commissioner Vera Jourova

China, US Discuss Law Enforcement Cooperation on Cybercrimes (Diplomat) A U.S. delegation is in Beijing to follow up on an cybersecurity agreement made during Xi Jinping's visit

Cyber 'War Games' Against China, Iran and North Korea Set for 2016 (Nextgov) It's 2020 and Russian forces are seizing the Arctic, partly by hacking the FedEx networks that handle shipping orders for U.S. troops

DISA Director Forecasts Future Cybersecurity Safeguards (SIGNAL) Lt. Gen. Alan Lynn, USA, calls on industry to help the Defense Department safeguard its networks

Why governments need to take the lead in cybersecurity (Help Net Security) Time and time again we hear people lament about the impact cybercrime has on our businesses, our individual lives, the economy, and on society

A journalist at the forefront of combating terrorism (Poynter) Rick Stengel used to assign stories on terrorism and U.S. foreign policy. Now he helps to combat one and shape the other

Ben Carson on Cybersecurity. Not. (CSO) A call out to Ben Carson from the cybersecurity community

Litigation, Investigation, and Law Enforcement

What lies behind the JPMorgan Chase cyber-attack (Economist) The criminal economy is developing faster than the lawful one can defend itself

JP Morgan Breach Only One Piece Of Vast Criminal Enterprise, Indictments Reveal (Dark Reading) Three men at the head of 'diversified criminal conglomerate' used hacking to commit and enhance their securities fraud, illegal online gambling, illegal Bitcoin exchange, and illegal payment processing businesses, 23-count indictment alleges

AI Could Tell When Your Dark Web Drug Dealer Is About to Scam You (Motherboard) The dark web, despite all the attention police have been giving it lately, is still the wild west of the internet

AI could alert Dark Web buyers to drug dealer scams (Naked Security) Two weeks of trudging out to an empty mailbox

Tor Project says FBI paid Carnegie Mellon $1m to unveil Tor users (Naked Security) In November 2014, a far-flung, multi-nation bust, dubbed Operation Onymous, snared 410+ supposedly hidden services running 27 markets, including Silk Road 2.0, stripping away the concealing layers of the Tor anonymizing service to lay identities bare

Database of 70 million prisoner phone calls breached, leaked (Help Net Security) A vast collection containing metadata of over 70 million records of phone calls placed by prisoners to at least 37 US states and links to actual recordings for each call has been leaked to reporters of The Intercept by an anonymous hacker

Oz railway lets newspaper photograph train keys (Register) Your opsec slip is showing, Metro Rail

Ohio man arrested for soliciting the murder of U.S. military members (Military Times) An Akron man was arrested today on federal charges that he solicited the murder of members of the U.S. military

Jail for British DDoS attacker, who said too much on Twitter (We Live Security) He isn't the first and he certainly won't be the last

Anonymous Exposes Identity of Alleged Halifax Rapist, Police Reopens The Case (Hack Read) Halifax police forced to re-open investigation in a sexual assault case after Anonymous exposes the identity of the alleged culprit

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

cybergamut Tech Tuesday: The Threat Landscape and the Path Forward: Fundamentals of a Risk-Aware Orgnaization (Elkridge, Maryland, USA, January 5, 2016) John McLaughlin of IBM Security provides a quantitative analysis of the attacks seen by IBM and the thousands of IBM customers in the preceding year. Specific attention will be paid to the protocols engaged,...

cybergamut Tech Tuesday: Neuro Cyber Analytics: Understanding the Patterns of Human Cognition in the Cyber Domain (Elkridge, Maryland, Middletown, February 23, 2016) This presentation will discuss Neuro Cyber Analytics. Humans use context-specific neurocognitive patterns for receiving and processing internal and external sensory information. Stated differently, people...

Upcoming Events

Black Hat Europe (Amsterdam, the Netherlands, November 10 - 13, 2015) Black Hat prides itself with being "the most technical and relevant global information security event series in the world." For the past 16 years, the Black Hat events have given their attendees the opportunity...

Pen Test Hackfest Summit & Training (Alexandria, Virgina, USA, November 16 - 23, 2015) SANS Pen Test Hackfest Training Event and Summit is coming back to Washington DC, bigger and better than ever! The Hackfest is an ideal way to learn offensive techniques so you can better defend your environment.

cybergamut Technical Tuesday: Hackproof Signal Processing for Wireless Communications ("Central Maryland, " USA, November 17, 2015) Conventional computing and communications expose myriad attack surfaces because of the Turing-equivalence of the instruction set architectures and the mathematical impossibility of forming a complete set...

Cybersecurity, the SEC and Compliance (New York, New York, USA, November 18, 2015) The recent SEC CyberSecurity Examination Initiative focuses on information safeguards for financial services organizations. Are you prepared? Please join us for a panel discussion on what cybersecurity...

CyberCon 2015 (Pentagon City, Virginia, USA, November 18, 2015) CyberCon 2015 is the forum for dialogue on strategy and innovation to secure federal and defense networks, as well as private sector networks that hold their sensitive data

Internet-of-Things World Forum 2015 (London, England, UK, November 18 - 19, 2015) This conference features speakers from leading IoT companies and their customers. Learn how the Internet-of-Things is creating new markets for products, services, and solutions

2015 U.S. Cyber Crime Conference (National Harbor, Maryland, USA, November 14, 2015) The 2015 U.S. Cyber Crime Conference (Formerly the DoD Cyber Crime Conference) has brought world-class forensics and incident response training combined with outstanding community networking for over 15...

CyberPoint 2nd Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, November 19, 2015) CyberPoint International announces its 2nd Annual Women in Cyber Security Reception to be held on November 19, 2015. Bringing together women from across the region and all different points on the career...

DefCamp6 (Bucharest, Romania, November 19 - 20, 2015) Why DefCamp? Because it's the most important conference on Hacking & Information Security in Central Eastern Europe, bringing hands-on talks about the latest research and practices from the INFOSEC field,...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.