The LinkedIn breach that surfaced yesterday turns out to be a continuation of the breach the business-focused social network suffered in 2012. Back then it was thought that 6.5 million hashed passwords were compromised, but this week 117 million turned up for sale in a criminal market (where they’re selling for peanuts.) LinkedIn is so far responding with selective password resets for affected users, which is what it did in 2012.
ESET reports finding a surveillance campaign tracking separatists, journalists, self-proclaimed governments, and so on in the Donbass region of eastern Ukraine. They detected it as the Win32/Prikormka information-stealing Trojan. The campaign is being called “Operation Groundbait” because the phishing emails that distributed the malware posed as price lists for groundbait. (“Groundbait” is what American meat fishermen call “chum.”)
“Phineas Phisher,” the hacktivist to whom the Gamma Group and Hacking Team capers are generally attributed, has stolen €10K in Bitcoin and donated it to Kurdish “anti-capitalists” in Rojava, a region in the north of Syria. He hints he’s got more thefts planned.
The US Securities and Exchange Commission had harsh words for the financial sector. SEC testimony before Congress called out trading and financial clearinghouses for what it characterized as a “reckless” cyber security posture.
In industry news, Cisco surprised the markets yesterday as it reported better than expected results and optimistic guidance. Its positive results were driven largely by its security and collaboration lines of business, which fall squarely in the cyber sector.
KEYW moves closer to selling Hexis.
Today's issue includes events affecting Brazil, China, European Union, Israel, Malaysia, Mexico, Netherlands, Nigeria, Panama, Russia, Slovenia, Syria, Turkey, Ukraine, United States, and Vietnam.
today we're in Washington, DC, covering DCOI 2016, the second annual US-Israeli cyber security summit. We're live-Tweeting the proceedings, and we'll have extensive reports in tomorrow's issue.
ON THE PODCAST
Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we talk with the University of Maryland's Ben Yelin, who fills us in on the case of that guy cooling off in jail for refusing to unlock hard drives the cops say are filled with illegal images. (We welcome reviews, by the way: you can provide an iTunes review here.)
DCOi 2016(INSS) DCOI 2016 is a concerted effort of the state of Israel and the Institute for National Security Studies (INSS) of Tel-Aviv University, a non-profit organization t that aims towards enhancing collaboration between the United-States and Israel in cybersecurity. The summit is supported by Israel state agencies alongside companies and corporation across the United-States and Israel and is free of charge for registrants. DCOI 2016 will present best technological and creative skills, industry leaders and some of the most innovative entrepreneurs in the world
Cyber Attacks, Threats, and Vulnerabilities
As Scope of 2012 Breach Expands, LinkedIn to Again Reset Passwords for Some Users(KrebsOnSecurity) A 2012 data breach that was thought to have exposed 6.5 million hashed passwords for LinkedIn users instead likely impacted more than 117 million accounts, the company now says. In response, the business networking giant said today that it would once again force a password reset for individual users thought to be impacted in the expanded breach
Hacker Selling 117 million LinkedIn Login Credentials(HackRead) Social media platforms are becoming excessively and increasingly vulnerable to data leaks, hacks, and scams. Every other day we read about some or the other social networking website getting exploited, compromised, scammed or hacked resulting in exposure of profiles, email IDs, usernames, and passwords
Slovenian bank was recipient named in failed Vietnam cyber-heist(Reuters via Euronews) Cyber-criminals unsuccessfully tried to send 1.2 million euros (937,290 pounds) from a Vietnamese bank to a Slovenian bank via the SWIFT network last December, but there have been no other cases of fraudulent transfers in Vietnam, a top central bank official said on Tuesday
Did Anonymous Hack Turkish Hospitals Resulting in Massive Data Breach?(HackRead) A hacker claiming links with Anonymous hacktivist group has uploaded a Youtube video claiming to have hacked into the servers of Turkish medical institutions and leaked massive database from the systems. In the video, a figure wearing the standard Anonymous Guy Fawkes mask is heard saying that this cyber attack is an act of “revenge” against the hacking of two hospitals in the United States
Ransomware the biggest immediate cyber threat, Kaspersky warns(Cyber Security Business) Ransomware has overtaken advanced persistent threat network attacks as the most frequent cyber threat, according to security firm Kaspersky Lab, and it doesn’t appear to be slowing down as authorities have had a hard time combating the viruses
Nuclear center waits over a year to report cyber-attack(Asahi Shimbun) Computer hackers infiltrated a server installed at a facility that oversees handling of plutonium and other nuclear materials, but the breach was not reported for over a year because officials thought it wasn’t serious
Scope of Gaping Android Security Hole Grows(Threatpost) Security researchers at Skycure are upping the ante on a vulnerability that it says now leaves 95.4 percent of Android devices vulnerable to an attack that hands over control of a phone or tablet to an attacker
You are what you click: Online search security risks(Help Net Security) When it comes to the desire for the ideal body, people may be willing to sacrifice their online security if it takes them a step closer to achieving desired results, according to a Intel Security survey
Security Patches, Mitigations, and Software Updates
Microsoft Disables Wi-Fi Sense on Windows 10(KrebsOnSecurity) Microsoft has disabled its controversial Wi-Fi Sense feature, a component embedded in Windows 10 devices that shares access to WiFi networks to which you connect with any contacts you may have listed in Outlook and Skype — and, with an opt-in — your Facebook friends
SEC says cyber security biggest risk to financial system(Reuters) Cyber security is the biggest risk facing the financial system, the chair of the U.S. Securities and Exchange Commission (SEC) said on Tuesday, in one of the frankest assessments yet of the threat to Wall Street from digital attacks
FireEye's Pronounced Downturn Presents A Great Opportunity(Seeking Alpha) FireEye's comprehensive platform is well-suited for the increasingly complex cyber security landscape. FireEye's major management changes should not be a great cause of concern. While FireEye is well-positioned in the long term, the company still has some daunting near-term challenges on the growth and financial front
Why Secureworks fell despite positive view from analysts(Inside Stock Trader) Secureworks Corp (NASDAQ:SCWX) was spun off by Dell and went for the initial public issue last month at $14 and raised $112 million. This was below the street expectation who were expecting the stock price between the range $15.50 and $17.50. As a result, the stock has fell over 6% till May 17th, 2016 from its listing on April 25th, 2016
30 Jahre G Data – Von der Studentenfirma zum Weltunternehmen WERBUNG(MobileGeeks) Die G DATA Software AG feierte im September 2015 ihr 30-jähriges Bestehen. Das von zwei Informatikstudenten gegründete Unternehmen aus der Ruhrgebietsstadt Bochum hat das weltweit erste Virenschutzprogramm für Computer entwickelt. Heute beschäftigt die einstige Studentenfirma mehr als 470 Mitarbeiter und verkauft seine Sicherheitslösungen in mehr als 90 Ländern weltweit
6 Hot Cybersecurity Fintechs(Bob's Guide) Over 65% of British businesses have been pinpointed by hackers in the past year, and the cyber security industry is undergoing extensive change as officials are feeling increasingly threatened by the rapid rate and scale of attacks. We take a look at the best cybersecurity fintechs out there and how they are making a difference for businesses worldwide
'Hack the Pentagon' Payouts Coming Soon(Defense News) The Pentagon expects to pay out rewards to individuals who successfully hacked department websites under a new program by the end of the month
Microsoft seeks bounty hunters to secure Nano Server(TechTarget) With the release of Windows Server 2016 due sometime in the third quarter, Microsoft is crowdsourcing its efforts to smooth out any vulnerabilities with a key feature in its next major server operating release — the smaller server deployment dubbed Nano Server — by offering a financial incentive for bug hunters
ThreatQuotient Joins FS-ISAC Affiliate Program(BusinessWire) A leading proponent for sharing threat intelligence across industry verticals, ThreatQuotient joins prominent financial services organization to ensure the protection of critical financial systems
Science, technology, assessment bridges CEMA, kinetic effects in tactical command posts(DVIDS) Nine months of planning a new way for the U.S. Army to assess cyber and electromagnetic activities, or CEMA, in a tactical environment culminated in a two-week long event at the end of April where engineers challenged Soldiers in their brigade command post staff interactions to find better ways for the Army to operate in a modern threat environment
ESET releases new decryptor for TeslaCrypt ransomware(We Live Security) Have you been infected by one of the new variants (v3 or v4) of the notorious ransomware TeslaCrypt? If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or were left unchanged, then ESET has good news for you: we have a decryptor for TeslaCrypt
The life of a social engineer: Hacking the human(Help Net Security) A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and antisocial). But he is one – he just “hacks” humans
Collaborating to beat the bad guys(ITWeb) Today's cyber criminals are collaborating with each other, sharing ideas or compromised systems. They are collaborating more and more efficiently, reusing one another's code to breach their targets
Can cyberspace be mapped? NGA's working on it(C4ISR & Networks) The National Geospatial-Intelligence Agency, by its very charter and pedigree, is a mapping agency: providing geographic context that informs intelligence and high-level security decisions. But how can an agency map a domain that doesn’t physically exist like any other?
FindFace app heralds the end of public anonymity and privacy?(Help Net Security) While Facebook battles in court to be allowed to use its facial recognition tech (which it already gave up using in Europe), another company – whose facial recognition offering has been indirectly put in the hands of the greater public via a mobile app – is currently in talks with businesses, police departments and city governments that are eager to use its algorithm
Enhancing network security: A cyber strategy for the next administration(American Enterprise Institute) Communications in cyberspace pose distinctive security challenges. Starting in 2009, the United States Military incorporated a Cyber Command on the premise that cyberspace domination could be as important in a time of conflict as traditional domains of air, sea, and land warfare. This agency’s charter covers only “specified Department of Defense information networks,” leaving the civilian Internet for other
Snowden and the NSA: Behind the Scenes(US News and World Report) Civil liberties and national security expert Geoffrey Stone lays out little-known facts about NSA surveillance and the pitfalls of Snowden's defense
IBM Calls For Government To Play A Support Role For ‘Permissioned Blockchain’(CrytpoCoin News) IBM sees blockchain technology as an essential tool for business, government, and society, and as such, its development calls for government support, according to Jerry Cuomo, the company’s vice president of blockchain technologies. He believes the technology can transform commerce as well as interactions between individuals and governments
Homeland Security’s Cyber Chief Expands Silicon Valley Footprint(Bloomberg Technology) The U.S. Department of Homeland Security plans to expand its Silicon Valley office to a staff of about 20 as the strained relationship between the government and technology companies over encryption plays out in public and in courtrooms
Manazir: Networked Systems Are The Future Of 5th-Generation Warfare, Training(USNI) Success in a future operating environment will depend on networking – sharing data among sensors and weapons, weaving together the various domains, and bringing in manned and unmanned systems into the same decision loop – the Navy’s deputy chief of naval operations for warfare systems (OPNAV N9) said Tuesday at the Navy League’s Sea-Air-Space Exposition 2016
Litigation, Investigation, and Law Enforcement
Finjan Holdings (FNJN) Receives USPTO Affirmation of '944, '633 Patentability(StreetInsider) Finjan Holdings, Inc. (Nasdaq: FNJN) and its subsidiary Finjan, Inc. ("Finjan") announces two recent, favorable decisions by the U.S. Patent and Trademark Office ("USPTO") regarding Finjan's U.S. Patent Nos. 6,154,844 ("the '844 Patent") and 7,647,633 ("the '633 Patent"), as both patents survive multiple challenges from various defendants
DCOI 2016(Washington, DC, USA, May 18 - 19, 2016) DCOI 2016 is a concerted effort of the state of Israel and the Institute for National Security Studies (INSS) of Tel-Aviv University, a non-profit organization that aims towards enhancing collaboration...
ISSA LA Eighth Annual Information Security Summit(Universal City, California, USA, May 19 - 20, 2016) The ISSA-LA Information Security Summit is the only educational forum in the great Los Angeles area specifically designed to attract an audience from all over Southern California as a means to encourage...
HITBSecConf2016 Amsterdam(Amsterdam, the Netherlands, May 23 - 27, 2016) The event kicks off with all new 2 and for the first time, 3-day training sessions held on the 23rd, 24th and 25th. Courses include all new IPv6 material by Marc 'van Hauser' Heuse of THC.org, an in-depth...
Enfuse 2016(Las Vegas, Nevada, USA, May 23 - 26, 2016) Enfuse is a three-day security and digital investigations conference where specialists, executives, and experts break new ground for the year ahead. It's a global event. It's a community. It's where problems...
Cybersecurity Law Institute(Washington, DC, USA, May 25 - 26, 2016) Those lawyers who ignore cyber threats are risking millions of dollars for their companies or their clients. Recent reports by Cisco and the World Economic Forum both highlight the paramount importance...
4th Annual Cybersecurity Law Institute(Washington, DC, USA, May 25 - 26, 2016) At our 4th annual Institute, in the capital where cybersecurity regulations and enforcement decisions are made, you will be able to receive pragmatic advice from the most knowledgeable legal cybersecurity...
SecureWorld Atlanta(Atlanta, Georgia, USA , June 1 - 2, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...
Innovations in Cybersecurity Education Workshop 2016(Halethorpe, Maryland, USA, June 3, 2016) Innovations in Cybersecurity Education is a free regional workshop on cybersecurity education from high school through post-graduate. It is intended primarily for educators who are teaching cybersecurity...
ISS World Europe(Prague, Czech Republic, June 7 - 9, 2016) ISS World Europe is the world's largest gathering of regional law enforcement, intelligence and homeland security analysts as well as telecom operators responsible for lawful interception, hi-tech electronic...
Data Breach & Fraud Prevention Summit Asia(Mumbai, India, June 8, 2016) ISMG’s Data Breach & Fraud Prevention Summit Asia – Mumbai is a one-day event that will focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the
New York State Cyber Security Conference(Albany, New York, USA, June 8 - 9, 2016) June 8-9 marks the 19th Annual New York State Cyber Security Conference and 11th Annual Symposium on Information Assurance (ASIA) and we invite you to join us for this nationally recognized event. The...
SecureWorld Portland(Portland, Oregon, USA, June 9, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...
Cleared Job Fair(Tysons Corner, Virginia, USA, June 9, 2016) ClearedJobs.net connects you with cleared facilities employers, including Federal Acquisition Strategies, Firebird Analytical Solutions & Technologies, Leidos, PAE, TRIAEM, Commonwealth Computer Research,...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.