Cyber Attacks, Threats, and Vulnerabilities
North Korea's unsuccessful missile launch 'may have been thwarted by US cyber attack' (The Telegraph) A North Korean missile launch that failed shortly after it was fired may have been thwarted by cyber attacks from the US.
Behind North Korea’s Fizzled Missile: Has China Lost Control of Kim? (The Daily Beast) Kim Jong Un has shown that he doesn’t care what Washington and Beijing say, and he may have made himself an even bigger threat to these great powers.
North Korea more likely to launch cyberattack than military strike: DHS chief (The Washington Times) North Korea is more likely to wage a cyberattack against the United States than a military strike, according to Homeland Security Secretary John Kelly.
Homeland Sec. Kelly: N. Korea cyber attack could threaten U.S. (NBC News) Secretary of Homeland Security John Kelly said North Korea poses a cyber threat to the United States but that a military strike from the nuclear power is currently unlikely.
Six key security weaknesses in industrial systems (ComputerWeekly) Organisations should mitigate six key vulnerabilities in industrial control systems to reduce the risk of cyber attack, warns security firm FireEye
Analysts identify #SyriaHoax as Russian-fueled propaganda (ABC News) As Syrian president Bashar al-Assad called videos of last week’s chemical attack a “fabrication,” a piece of propaganda promoted by a Russian cyber operation and bearing the hashtag #SyriaHoax has gained traction in the United States, analysts tell ABC News.
How Terrorists Recruit Female Suicide Bombers (Observer) Terror groups brainwash vulnerable women cast out of society.
Shadow Brokers Release New Files Revealing Windows Exploits, SWIFT Attacks (BleepingComputer) On Good Friday and ahead of the Easter holiday, the Shadow Brokers have dumped a new collection of files, containing what appears to be exploits and hacking tools targeting Microsoft's Windows OS and evidence the Equation Group had gained access to servers and targeted the SWIFT banking system of several banks across the world.
What you need to know about that latest NSA data dump (Recode) This could make it even harder for Europe and Silicon Valley to trust the U.S. government.
New leak suggests NSA penetrated Mideast banking networks (Naples Herald) A new set of documents purportedly lifted from the U.S. National Security Agency suggests that American spies have burrowed deep into the Middle East’s financial network, apparently compromising the Dubai office of the anti-money laundering and financial services firm EastNets.
Hackers Release Files Indicating NSA Monitored Global Bank Transfers (VOA) The release included computer code that could be adapted by criminals to break into SWIFT interbank messaging system and monitor activity
The New Shadow Brokers Leak Connects the NSA to the Stuxnet Cyber Weapon Used on Iran (Motherboard) Researchers have found an hidden gem inside the treasure trove of the new alleged NSA hacking tools dumped by the Shadow Brokers.
NSA's arsenal of Windows hacking tools have leaked (ZDNet) The NSA used the Windows hacking tools to target several banks.
Leaked NSA exploits plant a bull's-eye on Windows Server (PCWorld) Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS.
Leaked NSA Malware Threatens Windows Users Around the World (The Intercept) More than half of all desktop computers may be vulnerable to the hacking tools, some of which exploit unpatched vulnerabilities.
Mysterious Microsoft patch killed zero-days released by NSA-leaking Shadow Brokers (Ars Technica UK) Microsoft fixed critical vulnerabilities in uncredited update released in March.
We Can Calm Down: Microsoft Already Patched Most of the Shadow Brokers Exploits (Motherboard) And the three remaining exploits are only designed for unsupported systems, the company says.
Why Did Microsoft Wait Six Months To Patch a Critical Word Zero-Day? (Motherboard) The strange life and afterlife of a Microsoft Word Zero-Day that ended up in the hands of criminal and government hackers.
Detecting SMB Covert Channel ("Double Pulsar") (SANS Internet Storm Center) With Friday's release of additional Shadowbroker tools, a lot of attention was spent on exploits with names like "Eternalblue", which exploited only recently patched vulnerabilities. Another item of interest however, is the command and control channel used to communicate with systems post exploitation.
Newly Leaked Hacking Tools Were Worth $2 Million on the Gray Market (Motherboard) The new Windows hacking tools allegedly stolen from the NSA were worth a lot of money before they were dropped for free on the internet.
'Amateurish' espionage campaign launched with leaked Hacking Team tools (Cyberscoop) A mysterious group appears to be relying on hacking tools that were originally stolen from Italian surveillance company Hacking Team — and leaked online two years ago — to spy on European government officials, think tanks and journalists, according to new research published Thursday by cybersecurity firm F-Secure. Dubbed the “Callisto Group,” the hackers were first discovered by F-Secure after they sent a wave of phishing emails to a wide array of different targets that were all similarly involved in either discussing or reporting on government policies related to foreign affairs and national security.
Callisto Group Repurposed Dumped Hacking Team Spying Tool (BankInfo Security) Cyberattackers love not having to reinvent the wheel. At least, that's the tactic favored by the Callisto group, an "advanced threat actor" that's been
Blog: Cyber-thugs blow out access to Venezuelan oil data at Johns Hopkins (American Thinker) What happens when you dig a little too deeply into Venezuelan state oil company data posted online?
Increase in jRAT Campaigns (Cloud Security Solutions | Zscaler) The Zscaler ThreatLabZ team has detected a rise in Java-based remote access Trojan variants — jRATs — which give attackers a backdoor into a victim's system and can be capable of remotely taking control of the system once it's infected.
CLDAP Protocol Allows DDoS Attacks with 70x Amplification Factor (BleepingComputer) In a report released on Tuesday, Akamai says it spotted DDoS attacks leveraging the CLDAP protocol for the first time, and attacks using this protocol have the potential to incur serious damage, based on the opinion of its experts.
IoT Global Round-Up: Mirai Accepts Capitalism as Botnets Boom (Cyware) Mirai is the name of the botnet that silenced US infosec journalist Brian Krebs, of Krebs on Security, in a 620Gbps DDOS attack late last year. The same botnet took French hosting provider OVH offline after enlisting around 145,000 IoT devices to hack CCTV cameras. According to IBM, a new variant called the ELF Linux/Mirai malware is designed to scan for devices running Telnet services and compromise them.
New Ransomware Discovery From Forcepoint (Information Security Buzz) Forcepoint Security Labs has identified a new form of ransomware called “CradleCore” – a crimeware kit that is currently being offered to cybercriminals looking to own custom ransomware. “Cradle Ransomware” as it is also being known is peculiar in the sense that it is being sold as source code. Typically, ransomware is monetised by developers using …
Cerber Dominates Ransomware Landscape After Locky's Demise (BleepingComputer) The Cerber ransomware family has risen to take Locky's place at the top of the ransomware mountain after new Locky versions stopped coming out last year, and spam operations spreading Locky have slowed down to a trickle in 2017.
Ransomware Recap: Tougher Tactics and Evasion Techniques (Trend Micro) Ransomware authors are nothing if not persistent. They continue to try new evasion techniques, new programming languages, new naming conventions, and even more forceful demand tactics to pressure victims into paying.
Rise In Hospital Cyber Attacks (Information Security Buzz) Following the news about the rise in hospital cyber attacks, Wieland Alge, General Manager EMEA at Barracuda Networks commented below. Wieland Alge, General Manager EMEA at Barracuda Networks: “Healthcare records holding sensitive and personal data are 100 times more valuable than stolen credit card details, so it comes as no surprise to us that the NHS is …
Bitcoin Wallets Under Siege From 'Collider' Attack (Forbes) Scary if this works.
McAfee LinkedIn page hijacked (CSO Online) On Sunday evening, the LinkedIn page for McAfee was hijacked by a single person or an unknown number of individuals who apparently watched Twitter for reactions. The business page was defaced with random remarks, and at one point made a passive reference to a Twitch hack in 2016.
OurMine strikes again, hundreds of popular Youtube accounts hacked (HackRead) OurMine hackers who also call themselves "An online security group" performed “The biggest hack in the history of Youtube.” As a result, hundreds of popula
Steal from the Rich, to Give to the Poor: A Cyber Brotherhood's Tale (Wapack Labs) Wapack Labs is researching a self-proclaimed cyber brotherhood that has pledged to halt the unjust distribution of money. For the past year...
The spirit of Robin Hood (CIGTR) A year ago, today ... Although his origin is not very clear, the figure of Robin Hood has become a common reference in the popular culture...
A Wretched Bin of Scum and Villainy (OpenDNS Umbrella Blog) A Brief History of Pastes For more than 25 years, people looking to share computer code and snippets of text have used pastebins, web applications designed to store text. Often chosen because they would preserve formatting, pastebins were also an attractive option for IRC enthusiasts who wanted to talk about problems they were having with their …
Cyber Trends
A Carpe Diem Moment for the IoT and Cybersecurity (SIGNAL Magazine) Now is the time, while the Internet of Things is still in its early stages of development, to take bold action to reduce quantum computing threats.
How cybercriminals are hurting businesses (The Nation Nigeria) Experts have raised the alarm that the activities of cybercriminals which currently result in an estimated loss of over N127b in the country annually is bound to get worse judging by the increasing level of sophistication by the practitioners. Ibrahim Apekhade Yusuf in this report examines the clear and present dangers Almost everyone is veryRead More
The Long Slog To Getting Encryption Right (Dark Reading) Encryption practices have improved dramatically over the last 10 years, but most organizations still don't have enterprise-wide crypto strategies.
Cleaning up shadow IT (CSO Online) Citizen developers may help enterprises to develop apps more quickly, but what is this new breed of developer going to do to enterprise security?
Malware forces Slovak internet (Incita Security) Nowadays, when about three quarters of Slovaks use internet and the technology is spreading to many items of everyday use, malware threats are greatly increasing their power.
Marketplace
Tanium’s Family Empire Is in Crisis (Bloomberg.com) Orion Hindawi and his dad built the world’s most valuable cybersecurity startup. Now they’re grappling with employee unrest and an executive exodus.
The CEO of a $3.7 billion startup is accused of firing employees right before their stock options vest, report says (Business Insider) An exposé of the hot security startup Tanium paints a picture of a house of horrors for some employees.
Okta, Inc. IPO: What Investors Need to Know (Madison.com) Investors interested in technology have had a nice surprise this year -- initial public offerings. As the trough of 2016 moves further into memory, companies such as Snap and MuleSoft
Where Is Watson? The Mystery Behind IBM’s Numbers (247wallst.com) nternational Business Machine Corp. (NYSE: IBM) is about to announce earnings for the first quarter of 2017. Most eyes will be on Watson revenue. It is an umbrella brand, and it covers some large portion of IBM’s cloud and so-called artificial intelligence operations.
Report: Use of big data among public safety, intelligence agencies expected to grow (Federal Times) New report from Research & Markets forecasts continued growth of big data and data analytics industry for use by public safety and intelligence organizations.
Trend Micro Recognized as One of the National Capital Region's Top Employers for 2017 (Sys-Con Media) Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced its recognition in the National Capital Region's Top Employers for 2017. Trend Micro’s employee philosophy, “Be the best part of you,” drives the company culture and helped propel the organization to this prestigious list.
CyberRx and Wapack Labs Launch Partnership to Strengthen SMB Cybersecurity (Yahoo! Finance) CyberRx and Wapack Labs are announcing a strategic partnership to improve cybersecurity among small and medium-sized businesses . The CyberRx software platform helps U.S. and international businesses to assess their cyber capabilities within the Cybersecurity Framework, developed by the National Institute
Products, Services, and Solutions
Interset Expands Support for Compromised Account Detection with More Probabilistic Models for Unsupervised Machine Learning (Marketwired) With its latest release, the automated, intelligent security analytics platform intensifies compromised account attack detection
SAS Tackles the Cybersecurity Analytics Challenge (eSecurity Planet) Cybersecurity analytics is far from perfect, so data analytics pioneer SAS is hoping its expertise can help make it easier.
LifeStatus360 Receives Comprehensive Security Certification (Yahoo! Finance) LifeStatus360 is pleased to announce their receipt of the Comprehensive Security Certification awarded from AltiusIT, a leader in security and compliance ...
Technologies, Techniques, and Standards
Certification Marks for IoT Devices – A Suggestion to the FTC and California (Fortinet Blog) According to a recent prediction detailed in the Deloitte Global TMT Predictions 2017 report, incidents of DDoS are expected...
‘FG should create framework for cryptocurrency trading’ (Guardian (Nigeria)) The slowness in the adoption and trading in Crypto currency in Nigeria has been blamed on the Federal Government’s failure to adopt a framework for the implementation of blockchain that can give rise to its participation.
Like Gold, Bitcoin’s Cryptography Has Been Valued for a Millenia (Nigeria Today) When people debate the value of gold and bitcoin some often cite that gold has been valuable to humans for millennia. Yet people fail to realize that bitcoin’s backbone of cryptography has been valued for thousands of years as well.
Part 2: Artificial Intelligence Techniques Explained | Deloitte (Deloitte Nederland) In this second AI blog we will discuss some fundamental AI techniques: Heuristics, Support Vector Machines, Neural Networks, the Markov Decision Process, and Natural Language Processing.
Potentially conflicting pressures in incident response. (Infosecurity Magazine) Understanding the nature and extent of the cybersecurity incident is critical for successful eradication.
Why we should let our walls down when it comes to cybersecurity (TheHill) OPINION | The reality is that threats are bound to find their way in, so companies must find ways to build layers and adapt.
Research and Development
Pentagon taking steps to secure US cyber infrastructure from attacks as war looms with North Korea (Business Insider) War between the US and an adversary like North Korea "wouldn’t begin with a bang, but begin silently."
Getting ready: Pentagon to protect electric grid from massive attack (Washington Examiner) The Pentagon is taking steps to both protect the nation's communications and power lifeline and create a backup.
Academia
University of Maryland, Baltimore County wins 2017 National Collegiate Cyber Defense Championship (PRNewswire) University of Maryland, Baltimore County defeated nine other finalist...
Lee's Summit Team Wins National Cyber Security Competition (KSHB) Lee's Summit middle schoolers took home top prize at this year's CyberPatriot IX National Finals Competition in Baltimore.
Final Week to Compete in Cyber Quests Competition (USCC) The annual Cyber Quests online competition is underway and open to competitors, but only for one more week. Cyber Quests determines who qualifies for the U.S. Cyber Challenge (USCC) Summer Cyber Camps, a leading nationwide program in cybersecurity workforce development. The competition continues through Sunday, April 23, 2017, with registration closing the day before on Saturday, April 22, 2017.
JSU Calls for Applications for Second GenCyber Security Camp (Jacksonville State University) Jacksonville State University is excited to announce that the second GenCyber camp will take place July 10-14 in Ayers Hall on the university’s campus. The week-long camp will provide cyber security training for 25 high school and middle school teachers in the fields of math, computer science, technology and social studies.
Legislation, Policy, and Regulation
Merkel had secret briefing from MI6 on terrorism strategy (Times (London)) Angela Merkel sought secret intelligence on terrorist threats to Germany from British spy chiefs above the heads of her own security services on at least two occasions, according to reports.
After years of US failure, Donald Trump is finally playing North Korea at its own game (The Telegraph) It’s been a big weekend in Pyongyang.
India urgently needs a data security policy: V.C. Gopalratnam (The Hindu) Identity and access management, as well as data storage standards should be well-defined, says Cisco’s senior IT executive
Pentagon, Fearing Cyber Attack, Moves to Find Alternative Comms Network (IJR - Independent Journal Review) The new technology would be able to preemptively "sense" cyberattacks.
For China, Trump realises trade and security do mix (Today) The news media have been quick to note United States President Donald Trump’s embrace of bombing in Syria and the need for the North Atlantic Treaty Organization (Nato) as reversals of the foreign policy he advocated on the stump.
Will Congress Help Fund New State and Local Cyberprograms? (Government Technology) Back in early March, a bipartisan group introduced the State Cyber Resiliency Act. If passed and funded, the legislation would provide grants for state and local governments to improve cybersecurity protections and incident response. Here’s what you need to know.
US Air Force Announces New NORAD, Cyber Command Intelligence Directors (Sputnik) US Air Force Chief of Staff Gen. David Goldfein assigned new intelligence directors for the US Cyber Command and North American Aerospace Defense Command (NORAD), the Department of Defense said in a press release on Friday.
Army taps reservists with cyber skills to fight IS militants (Star Tribune) A decade ago, he was a young Army soldier training Iraqi troops when he noticed their primitive filing system: handwritten notes threaded with different colors of yarn, stacked in piles. For organization's sake, he built them a simple computer database.
Military seeks civilians with high-tech skills to counter IS (Spokesman-Review) The American military is looking for new ways to bring in more civilians with high-tech skills who can help fight Islamic State militants and prepare for the new range of technological threats the U.S. will face.
Marine social media training to be in person, not on MarineNet (Marine Corps Times) Small unit leaders will hold unit discussions on social media and six other topics.
Microsoft Outlines Cyber Geneva Convention Proposal (Nextgov) The company is also promoting an international nonpolitical body for cyber attribution.
Litigation, Investigation, and Law Enforcement
Facebook Streams a Murder, and Must Now Face Itself (WIRED) With a man's death come questions about the limits and responsibilities of social media.
Geheimtreffen: Merkel übergibt Dossier über Putin an britische Spione (Deutsche Wirtschafts Nachrichten) Geheimtreffen: Merkel übergibt britischen Spionen Putin-Dossier. (Dieser Artikel ist nur für Abonnenten zugänglich)
How the FBI relies on dark web intel firms as frontline investigators (Cyberscoop) A cadre of former intelligence officers is lurking on the dark recesses of the internet on behalf of government and a shortlist of wealthy clients.
Microsoft says U.S. foreign intelligence surveillance requests more than doubled (Reuters) Microsoft Corp (MSFT.O) said on Thursday it had received at least a thousand surveillance requests from the U.S. government that sought user content for foreign intelligence purposes during the first half of 2016.
Microsoft publishes first National Security Letter in transparency report (TechCrunch) Microsoft's biannual transparency report was just released and, like many other major tech companies that have been putting out their reports recently, the..
Turkish Journalists Acquitted After Six Years on Trial Based on Arsenal Consulting's Digital Forensics (PRNewswire) An Istanbul court on April 12 ordered the acquittal of the 13 remaining...
Hacked: How $171 mn stolen from Union Bank was recovered (The Hindu) Details emerge of how the money was retrieved from accounts in four different countries after government intervention
Engineer Arrested for Attempted Theft of Trade Secrets (Dark Reading) Software engineer Dmitry Sazonov has been arrested for trying to steal valuable code from his employer, a financial services firm.
Courts Are Using AI to Sentence Criminals. That Must Stop Now (WIRED) Opinion: Courts should pause the use of algorithms for criminal sentencing.