Expanding Internet access in Africa is carrying ISIS information operations along with it. Nigeria seems particularly affected, as ISIS connects with local extremists, especially Boko Haram.
Proofpoint looks at CryptXXX ransomware (discovered last week) warning that the malware is well-positioned to extort Bitcoin payments.
Chip-and-PIN cards are spreading in the US, and cyber criminals are making a last minute push to compromise legacy magnetic-strip swipe systems before they’re superseded. FireEye and its recently acquired iSight unit are tracking the familiar carding gang FIN6, which is more active than usual in attacking vulnerable point-of-sale systems and selling paycard data on black market carding sites.
ESET looks at another familiar threat—the Dorkbot worm, whose infrastructure was taken down last December. It’s crippled but not eliminated: ESET warns that Dorkbot continues to circulate. It’s being used in attacks on bank accounts and to lock systems (unlocking them requires payment of ransom).
Researchers at Arbor Networks caution East Asian users against an APT group employing the “Four Element Sword” of known vulnerabilities. The campaign is infecting victims with an array of remote access Trojans (RATs).
The spread of encryption, most recently in WhatsApp, suggests that technology may soon render the ongoing round of the Crypto Wars moot. (Legislation is still being considered in the US Congress.)
Australia announced its national cyber strategy yesterday. It features a strong commitment to applied cyber research, development of a domestic security industry, and, joining two of the other Five Eyes, an open avowal of offensive cyber capabilities.
Today's issue includes events affecting Australia, China, Iran, Iraq, Democratic Republic of Korea, Libya, Nigeria, Russia, Syria, United Kingdom, United States.
We'll continue our coverage of the SINET ITSEF conference from Mountain View, California, with a final wrap-up in tomorrow's issue.
ON THE PODCAST
Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day.
America Can’t Do Much About ISIS(Defense One) That leaves patience, containment, and humanitarian aid as the least-bad policies while waiting for this awful war to play itself out
CryptXXX set to become the worst bitcoin-stealing ransomware yet(Brave New Coin) Bitcoin has a new and potentially considerable threat to its reputation, if California cybersecurity firm Proofpoint is correct. Last week, the company warned that a previously undocumented ransomware sample that they found, CryptXXX, would not only be encrypting files locally and on all mounted drives, “it’s stealing Bitcoins and a large range of other data”
How One Cybercrime Gang Is Ratcheting Up PoS Attacks(Dark Reading) With magnetic-stripe payment card transactions gradually starting to disappear in the US, cybercriminals have been on a tear with PoS attacks against retail and hospitality targets that haven't yet adopted EMV card payment, FireEye researchers say
Dorkbot: 5 years since detection(We Liive Security) In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries
Q1 2016 Global DDoS Threat Landscape Report(Imperva Incapsula) Every DDoS attack mitigated is an invitation for the attacker to try harder. This is the reality of DDoS protection business and the common motive for many of the trends we are observing in the DDoS threat landscape today
Encryption delivers quantum of solace(SC Magazine) Data creation and transmission is growing exponentially, with 2.8 zettabytes of data created in 2012, forecast to reach 40 zettabytes (ZB) by 2020 (IDC), and currently encryption offers the best option to secure all that data says Roi Perez
Data breaches fueled valuations of cyber firms(SC Magazine) Stoked by headlines announcing major data breaches, the stock valuations of cybersecurity companies outperformed the Nasdaq and S&P 500 by double over the past three years, according to Bessemer Venture Partners' new Cyber Index, released on Tuesday
Why Palo Alto Will Exceed Street Expectations Again(MoneyShow) The need for data security solutions continues to increase but data security stocks have underperformed during 2016 says Michael Berger, Associate Editor of MoneyShow.com, who highlights his favorite stock in this sector, Palo Alto Networks
Dell's SecureWorks Set to Price First U.S. Tech IPO of the Year(Bloomberg Technology) SecureWorks Corp., the cybersecurity company owned by Dell Inc., is planning to go public this week in the first initial public offering of a U.S. technology company this year, after the slowest start for offerings since the recession
Despite Currently Trading At A Premium, Cisco Offers Promising Upside(Seeking Alpha) Advancements into IT services and software have helped bring new growth and life into a very large, mature company. Aside from a safe and reliable business model, the software giant offers serviceable growth, strong free cash flow and a nice dividend. Strategic acquisitions play a big factor into this article's DCF analysis of Cisco.
DHS and Pentagon Race to Close Cyber Gap(GovTechWorks) The shortage of cyber security talent across the government and commercial sectors keeps expanding. No one knows how big that number is, but security firms and government officials regularly cite estimates of 1 million or more cyber job vacancies worldwide
ESET offers beta version of home internet security(GDN) ESET, a global pioneer in IT security for more than two decades, has announced the availability of its beta version of ESET Nod32 Antivirus 10 together with a brand new product designed for home users - ESET Internet Security
Generic Ransomware Detection Comes to OS X(Threatpost) With each new unrelenting ransomware sample, security researchers understand that no matter how quickly antivirus signatures are updated or how rapidly decryptors are built and shared, current defenses will continue to fall short. The problem is that most adequate defenses are sample-specific; Kaspersky Lab has built ransomware decryptors for CoinVault and Bitcryptor, and Cisco has a similar tool to unlock some TeslaCrypt infections, just to name two
Cyber threats coming from the inside(Security Brief) Awareness amongst business leaders around IT security, particularly within government, is on the rise, according to SolarWinds, who says company data leaks dominating news headlines is contributing to the increase
Combating ‘human nature’ security risks(IT Pro Portal) The phrase ‘it’s just human nature!’ is more than a cliché. Cybercriminals already appreciate this notion, as evident in the rise of successful phishing and other social engineering attacks
Government admits cyber attack capacity(AM) The Australian Government has admitted for the first time that it has the ability to launch cyber attacks. The statement is contained in a $230 million Cyber Security Strategy that will be launched by the Prime Minister today
Rules For Cyberwarfare Still Unclear, Even As U.S. Engages In It(NPR) When Defense Secretary Ashton Carter landed in Iraq for a surprise visit this week, he came armed with this news: More than 200 additional U.S. troops are headed to that country. They'll join the fight to retake the Iraqi city of Mosul from the Islamic State. As that battle unfolds on the ground, a parallel war against ISIS is unfolding in cyberspace
Apple, FBI Encryption Debate Continues At Congressional Hearing(InformationWeek) The US House Energy & Commerce Committee hosted two panel discussions April 19, in the hope of advancing an open debate about government access to encrypted technologies. Representatives heard from Apple's top lawyers, as well as law enforcement
'The War on Cryptography Is a War on Online Banking'(American Banker) In the conclusion of a three-part interview, Ryan Singer, a blockchain-tech entrepreneur, explains why bankers should care about Washington's resurgent efforts to insert back doors into security systems
Air Force Updates Doctrine on Cyberspace Operations(Federation of American Scientists) Within living memory, even a passing mention of cyber weapons or U.S. offensive activities in cyberspace was deemed sufficient to justify national security classification
DISA director: ‘Gloves are off’ in cyber war, time for new defenses(Federal News Radio) In describing a handful of his agency’s top cybersecurity acquisition priorities, the director of the Defense Information Systems Agency said DoD needs new tools to grapple with the fact that cyber adversaries have become much more brazen in recent years, and are no longer concerned with whether or not they’re detected when trying to penetrate Defense networks
Release: Gov. Nixon announces statewide cybersecurity preparedness initiative(Missouri Times) Speaking to the State Emergency Management Agency’s 28th Annual Missouri Emergency Management Conference today, Gov. Jay Nixon announced the Missouri Office of Administration has been awarded a grant from the U.S. Department of Homeland Security for a statewide cybersecurity preparedness initiative
Donald Trump: Clinton won't be indicted(Politico) Alleging that “she’s being protected,” Donald Trump said Wednesday he did not think Hillary Clinton would be indicted for the email controversy that the FBI is investigating
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
SecureWorld Philadelphia(King of Prussia, Pennsylvania, USA, April 20 - 21, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...
Army SIGINT(Fort Meade, Maryland, USA, April 25, 2016) Approximately 500 attendees will come together to discuss future technologies in Signals Intelligence (SIGINT), focusing on applications for the actual users in the field (the soldiers). Most attendees...
6th European Data Protection Days (EDPD)(Berlin, Germany, April 25 - 26, 2016) The EDPD Conference will provide participants from the business side with all the important news and updates for the international data protection business at a high level. These include key developments...
CISO San Francisco(San Francisco, California, USA, April 26, 2016) The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions...
Staying Ahead of the Curve - Securing a Nation Amid Change(Washington, DC, USA, April 26, 2016) A discussion of the changing cybersecurity landscape, featuring a keynote by General Keith Alexander, former Director, National Security Agency, and a panel discussion of the challenges facing Federal...
Assured Communications 2016(Crystal City, Virginia, USA, April 27, 2016) A basic tenet of building an expeditionary fighting force that can respond to hot spots around the world is the ability to surge. That applies to satellite bandwidth as much as it does to personnel and...
CISO Houston(Houston, Texas, USA, April 28, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...
Cybersecurity Futures 2020(Washington, DC, USA, April 28, 2016) On April 28, some of the country's leading policymakers, hackers, and creative thinkers will join Passcode and UC Berkeley to discuss the Internet's alternate futures – and explore how unconventional thinking...
3rd East Africa Cyber Defense Convention 2016(Nairobi, Kenya, April 29, 2016) Building on the success of previous conventions series in the last two years and with insights from cybersecurity experts, participants at this conferene learn how organisations should successfully respond.
CISO United States(Chicago, Illinois, USA, May 1 - 3, 2016) The CISO Summit will bring together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda...
SANS Security West 2016(San Diego, California, USA, May 1 - 6, 2016) With cyber-attacks and data breaches on the rise, attacks becoming more frequent, sophisticated and costlier, the gap in the ability to defend has become wider and more time sensitive. Now is the perfect
CEBIT(Sydney, New South Wales, Australia, May 2 - 4, 2016) With the Australian Federal Government officially announcing its national cyber security policy, ahead of CeBit Australia’s business technology event, CeBIT is ultra strong on cyber security, too. CeBIT’s...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.