Get threat intelligence on hackers and vulnerabilities FREE every day with the Recorded Future Cyber Daily. Sign up today.
March 25, 2016.
By The CyberWire Staff
Observers see the Islamic State's bombings in Brussels as suggesting two trends with implications not only for physical combat, but for information operations as well. As ISIS loses territory and combat capability, it looks elsewhere for propaganda-of-the-deed, and it seeks to inspire disaffected youth who'd otherwise be recruited by more conventional street gangs.
Local recruiting and cellular organization make online collection more difficult for authorities, and intelligence development and sharing remain as challenging as ever.
Anonymous declares another anti-ISIS operation, but few observers have high expectations.
Verizon Enterprise Solutions has apparently suffered a data breach, with some 1.5 million customer records exposed.
Fox IT reports certified ethical hacker credentialing shop E-Council's website has been redirecting to Angler and serving TeslaCrypt ransomware. Trend Micro discovers a new ransomware variant, "Petya," that overwrites an infected device's master boot record.
RSA researchers find a remote code execution flaw that affects widely used digital video recorders manufactured by the Chinese firm TVT.
Check Point outlines problems with the Google and Apple walled-garden app stores. You're better off getting your apps there than from, say, Leon's House o' Apps, but beware: there can still be snakes in those gardens.
In patch news, Google updates Chrome, and Oracle fixes a problem with Java SE. Microsoft will be providing an easy way for users to disable macros in Office.
The FBI and Cellebrite are still working on that jihadist iPhone, and the Justice Department yesterday indeed indicted seven Iranians for hacking that dam in Rye, New York.
Today's issue includes events affecting Australia, Belgium, Canada, China, European Union, France, Germany, Iran, Iraq, Russia, Singapore, Syria, United Kingdom, United States.
ON THE PODCAST
Catch the CyberWire's Daily podcast this afternoon, and don't miss our Week-in-Review, either, up soon thereafter. In the Daily, we'll hear from the MorphoTrust's Mark DiFraia on protecting your identity when filing state tax returns, and from the Johns Hopkins University's Joe Carrigan on mobile app permissions. And the Week-in-Review will have two big interviews, with Craig Williams from Cisco's Talos unit on OSX graphics driver vulnerabilities, and with Cylance's Jon Gross on Dust Storm. Since the crypto wars continue, we ask the University of Maryland's Jonathan Katz to look back at the old Clipper Chip. (And of course we'll also discuss more of the day's news.)
2016 National Conference of Minority Cybersecurity Professionals(Washington, DC, March 23 - 24, 2016) The landmark ICMCP conference will elevate the national dialogue on the necessary measures needed to attract and develop minority cybersecurity practitioners to address the cross-industry cybersecurity skills shortage.
Women in Cybersecurity (WiCYS) 2016(Dallas, TX, March 31 - April 2, 2016) The 3rd annual conference brings together women (students, faculty, researchers, professionals) in cybersecurity from academia, research organizations and industry for the sharing of knowledge and experience, networking and mentoring.
The Islamic State’s European Front(New York Times) The bombs that exploded in the Brussels airport and at a central metro station on Tuesday morning, killing at least 30 people, came as only the latest in a string of terrorist outrages on a continent that is starting to see horrific violence as the new normal. Hours later the Islamic State claimed responsibility
Brussels bombings are a sign of Islamic State’s panic(Reuters) The death count from Tuesday’s separate bombing attacks in Brussels continued to climb Wednesday, with Belgium police reporting at least 31 dead and nearly 270 injuried. The atrocities are tragic and unacceptable. But the West should understand that this is what winning may look like in the battle against Islamic State. The attackers’ coordinated strikes could well stem more from a sense of weakness, than strength
Crooks Steal, Sell Verizon Enterprise Customer Data(KrebsOnSecurity) Verizon Enterprise Solutions, a B2B unit of the telecommunications giant that gets called in to help Fortune 500’s respond to some of the world’s largest data breaches, is reeling from its own data breach involving the theft and resale of customer data, KrebsOnSecurity has learned
PETYA Crypto-ransomware Overwrites MBR to Lock Users Out of Their Computers(TrendLabs Security Intelligence Blog) As if encrypting files and holding them hostage is not enough, cybercriminals who create and spread crypto-ransomware are now resorting to causing blue screen of death (BSoD) and putting their ransom notes at system startup—as in, even before the operating system loads
Doxing: An Increasingly Popular Form of Online Harassment(Cyveillance) Recently, a hacker released the personal information of 29,000 federal employees – twenty thousand from the Department of Justice and 9,000 from Homeland Security – which included names, job titles, phone numbers, and email addresses. Incidents like this, including the doxing of CIA director John Brennan by a hacktivism collective, prompted the FBI to issue a warning to law enforcement and high-profile public officials indicating they could be targeted by hacktivists, who have increasingly adopted doxing as a form of social justice
Security Patches, Mitigations, and Software Updates
Stable Channel Update(Chrome Releases) The stable channel has been updated to 49.0.2623.108 for Windows, Mac, and Linux
Oracle Security Alert for CVE-2016-0636(Oracle) This Security Alert addresses CVE-2016-0636, a vulnerability affecting Java SE running in web browsers on desktops. This vulnerability is not applicable to Java deployments, typically in servers or standalone desktop applications, that load and run only trusted code. It also does not affect Oracle server-based software
Second-Hand Devices Are the Next Privacy Frontier(Wireless Week) The telecommunications industry is heating up right now, following the FCC’s latest proposed regulation that would require broadband and wireless carriers to get consumers’ permission before sharing data with third parties, such as marketers
Cyber insurance penetration continues to grow(Business Insurance) More U.S.-based Marsh L.L.C. clients are buying stand-alone cyber insurance and increasing the limits purchased, says the brokerage in a report issued Thursday
The Future Cyber Risk Insurance Market(LIFARS) The importance of cybersecurity in the future can hardly be overstated. Organizations everywhere know this very well and are increasing their cybersecurity spending – which in turn propels the cybersecurity industry forward at an increasing rate. Similarly, there is an immense growth potential in the cyber risk insurance market
Evolution of the enterprise managed security services market(Help Net Security) In this podcast recorded at RSA Conference 2016, Court Little, Director of Product Management at Solutionary, talks about how the enterprise managed security services market in the last year has taken some interesting turns
Why you need a CSO/CISO(CIO) When it comes to security, you're better off employing a specialist. However, according to recent research, less than half of companies employ a CSO/CISO
Meet The Fortune 100 CISO(Dark Reading) Digital Guardian data shows that the typical Fortune 100 CISO is a white male with a background in IT security and a Bachelor's degree in business
Burlington firm walks businesses through cyber security(Burlington Free Press) Justin Fimlaid kept Keurig Green Mountain's cyber secrets from 2009 to 2013. Then, Fimlaid founded his own firm, NuHarbor Security in Burlington, partly because he was so dissatisfied with the help he tried to hire to protect information while at Keurig
Cybersecurity Professional Awards – Winners & Finalists(Cybersecurity Excellence Awards) The 2016 Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security. Based on the content of their nomination and the popular vote by the Information Security Community (both ratings and comments), we are announcing the following winners and finalists for the 2016 Cybersecurity Excellence Awards in the category Cybersecurity Professional
Products, Services, and Solutions
Local firm to train vets for cybersecurity jobs(Pittsburgh Business Times) One local firm is doing its part to help Pittsburgh become a cybersecurity hub: it's offering training for local vets, free of charge. Solutionary, a managed security services provider based in Pittsburgh, is partnering with the SANS Institute, an information security training and certification organization, to offer immersion training in cybersecurity
8 tips for preventing ransomware(Naked Security) Chances are you know someone, or some organization, who has suffered a ransomware attack – it could be your local police department, a small business, big hospital, or someone in your family
Chip-and-PIN adoption still slow(CSO) The “chip-and-PIN” credit card system is more secure than the legacy “swipe-and signature.” But adoption of the new system remains slow — many small merchants find the cost of upgrading more significant than the increased liability risk from fraud
Europeans balk at intelligence sharing as toll of terror rises(New York Times via Alaska Dispatch-News) If another example of the failure of European intelligence services to share and act on information about potential terrorists was needed, Wednesday’s identification of the bombers in the deadly Brussels attacks the day before certainly provides it
How Belgium's Bumbling Bureaucrats Boosted Europe's Terror Threat(Newsweek) As the world sends its sympathy to the victims of the recent terror attacks in Brussels, the most fervent prayer to be uttered for Belgium itself is that it finally wakes up. The incompetent Belgian government, its bureaucratic law enforcement agencies and its half-hearted intelligence services deserve as much blame for the slaughter as the murderers
U.S., Germany eye ways to deepen cyber collaboration(Reuters) Senior U.S. and German officials agreed this week to deepen their collaboration on a range of cyber issues, including working to promote norms for responsible state behavior in cyberspace and expanding training in developing countries
Sessions: Obama not taking terror threat seriously enough(Washington Examiner) Alabama Sen. Jeff Sessions said late Thursday that President Obama's refusal to specifically connect recent terrorism acts to radical Islamic groups will impede the world's ability to fully address the threat
Halvorsen: DoD's cybersecurity training, culture have improved(FierceGovernmentIT) Defense Department Chief Information Officer Terry Halvorsen said cybersecurity training and overall awareness of cyberthreats have improved across the organization since a phishing scheme last summer compromised the Joint Chiefs of Staff unclassified email network
How security pros blunted alleged Iran cyber attacks(USA Today) New criminal charges linking Iran to 2011-2013 cyber attacks on the U.S. put suspects' names and faces on an episode that plagued 46 banks and financial institutions nationwide — and hundreds of thousands of their customers
Security and privacy controls on Healthcare.gov data hub remain weak(FierceGovernmentIT) Over a 17-month period, Healthcare.gov experienced 316 security incidents – none of which resulted in the leak of sensitive data or compromised systems – but the Government Accountability Office remains concerned that the technical controls that protect information flowing from the website to federal partners' data systems are inadequate
Kirk Nahra: HIPAA, data issues will keep providers on their toes(FierceHealthIT) Looking at the year to come in healthcare privacy and security, there will be many HIPAA and legislative issues providers should keep their eyes on, Kirk Nahra, a partner at Wiley Rein LLP, said during a talk at the 24th National HIPAA Summit in the District of Columbia this week
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Newly Noted Events
Staying Ahead of the Curve - Securing a Nation Amid Change(Washington, DC, USA, April 26, 2016) A discussion of the changing cybersecurity landscape, featuring a keynote by General Keith Alexander, former Director, National Security Agency, and a panel discussion of the challenges facing Federal...
Cyber Investing Summit 2016(New York, New York, USA, May 3, 2016) The Cyber Investing Summit is an all-day conference focusing on the investment opportunities, trends and strategies available in the $100+ billion cyber security sector. Network with investment professionals,...
Black Hat Asia 2016(Singapore, March 29, 2016) Black Hat is returning to Asia again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days — two...
TU-Automotive Cybersecurity USA 2016(Novi, Michigan, USA, March 29 - 30, 2016) TU-Automotive Cybersecurity dissects the real issues behind the headlines, helping you to apply technology and best practices to deliver robust security defenses and processes within a more secure ecosystem.
Insider Threat Summit(Monterey, California, USA, March 29 - 30, 2016) The focus of the Insider Threat Summit is to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation of privileged identities and ethical physical...
SecureWorld Boston(Boston, Massachussetts, USA, March 29 - 30, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...
Insider Threat Program Development Training(Washington, DC, USA, March 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC.
Women in Cyber Security 2016(Dallas, Texas, USA, March 31 - April 2, 2016) With support from National Science Foundation, Award #1303441 (Capacity Building in Cybersecurity: Broadening Participation of Women In Cybersecurity through the Women in Cybersecurity Conference and Professional...
SANS Atlanta 2016(Atlanta, Georgia, USA, April 4 - 9, 2016) Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. Take advantage of tips and tricks from the experts...
Billington CyberSecurity INTERNATIONAL Summit(Washington, DC, USA, April 5, 2016) On April 5, in Washington, D.C., join leading cybersecurity officials from across the globe at the Billington CyberSecurity INTERNATIONAL Summit to engage in an intensive information exchange between leading...
Cyber Security Summit Atlanta(Atlanta, Georgia, USA, April 6, 2016) The Inaugural Atlanta Cyber Security Summit will be held April 6th at the Ritz-Carlton, Buckhead. This event is for Sr. Executives only. We are Honored to have the US Asst. Attorney General of National...
ASIS 15th European Security Conference & Exhibition(London, England, UK, April 6 - 8, 2016) ASIS Europe 2016 invites you to join security professionals and experts from over Europe and beyond in one of the most dynamic centres of business and culture in the world
ISC West 2016(Las Vegas, Nevada, USA, April 6 - 8, 2016) ISC West is the leading physical security event to unite the entire security channel, from dealers, installers, integrators, specifiers, consultants and end-users of physical, network and IT products.
ASIS 15th European Security Conference & Exhibition (London, England, UK, April 6 - 8, 2016) ASIS Europe 2016 invites you to join security professionals and experts from over Europe and beyond in one of the most dynamic centres of business and culture in the world.
Cyber Risk Management 360(Baltimore, Maryland, USA, April 7, 2016) The Cybersecurity Association of Maryland, Inc. (CAMI) is partnering with the MD Department of Commerce, Chesapeake Regional Tech Council and Greater Baltimore Committee to host our first Signature event...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.