skip navigation

More signal. Less noise.

Daily briefing.

The CEO of Strava promises to work with the US military and Government to better keep sensitive data secure. The company's fitness app generated a publicly accessible heat map of user activity that could be readily correlated with the location of sensitive US bases. Even anonymized and aggregated data can yield interesting intelligence.

An opinion piece in Technology Review argues that when it comes to user privacy, you're probably on your own. A report in the Guardian seconds that conclusion, noting that Strava isn't the only app tracking you: you're just a tap away from giving yourself away.

Hackers thought to be associated with Iran have been phishing Israeli nuclear scientists. The bait consists of links to bogus British news sites.

Phishing in the interest of state security can be done cheaply and without much skill. The University of Toronto's Citizen Lab has a report on a campaign directed against "members of the Tibetan community." For just a thousand dollars the phishers successfully spied for nineteen months.

Observers note that the large denial-of-service campaign against financial institutions in the Netherlands came shortly after stories broke about Dutch intelligence services having hacked into Russia's Cozy Bear.

Cisco has patched serious vulnerabilities in its VPN offerings. Users are advised to apply the patches as soon as possible.

In cryptocurrency news, South Korean authorities report $600 million in fraud, but will permit trading to continue. And the US Securities and Exchange Commission last week alleged fraud and shut down AriseBank's initial coin offering.

Notes.

Today's issue includes events affecting Australia, China, European Union, India, Iran, Israel, Republic of Korea, NATO/OTAN, Netherlands, Russia, United Kingdom, United States.

Implement these seven cybersecurity best practices for 2018.

Is your organization prepared for the threat landscape of 2018? In this article, ObserveIT takes a look at  seven cybersecurity best practices—ranging from preparing for GDPR to testing backup systems to leveling up user training—that will better prepare you for everything from spearphishing to insider threats. Rather than dwell on the past, take stock of where your organization stands today and put these best practices in place, and you’ll be well-prepared for the coming year.

In today's podcast we hear from our partners at Ben Gurion University of the Negev, as  Yossi Oren discusses insecure mobile device cases, that is, the kind of cases you'd put your phone into to protect it from scratches and bumps. Those cases can have security issues. Our guest is JT Keating from Zimperium on the effects Meltdown and Spectre are having on mobile devices.

Cyber Attacks, Threats, and Vulnerabilities

Strava CEO responds after the company's heatmap may have compromised secret US military bases worldwide (Business Insider) Strava CEO James Quarles said he would work with the military and government to address potentially sensitive data.

Strava’s privacy PR nightmare shows why you can’t trust social fitness apps to protect your data (MIT Technology Review) Companies still aren’t taking user privacy seriously enough, so you need to figure it out for yourself.

Worried about Strava? It’s not the only app mapping our every move (the Guardian) Giving away all manner of personal information is only a tap away on your phone settings, as the fitness tracking site’s blunder has shown, writes Guardian video games editor Keza MacDonald

The Strava Heat Map Shows Even Militaries Can't Keep Secrets from Social Data (WIRED) The US military is reexamining security policies after fitness tracker data shared on social media revealed bases and patrol routes

Iran hackers reportedly tried to phish Israeli nuclear scientists (Times of Israel) Emails sent to Israeli researchers contained links to news stories from a fake British media outlet, TV report says

Dutch Banks, Tax Agency Under DDoS Attacks a Week After Big Russian Hack Reveal (BleepingComputer) At least three Dutch banks and the Dutch tax office reported on Monday suffering coordinated DDoS attacks against their respective infrastructures.

Juha Saarinen: When hackers get hacked themselves (New Zealand Herald) By now, anyone who's glanced sideways at the internet and the IT systems that connect to it should be totally aware that it's a very unsafe place, riddled with hackers hell-bent on causing grief for innocent users.

Phishing Campaign Underscores Threat from Low Budget, Low Skilled Attackers (Dark Reading) For just over $1,000, a phishing operation successfully spied on members of the Tibetan community for 19 months, Toronto University's Citizen Lab found.

GPS tracking company reviews privacy settings amid fitness app security concerns (Military Times) The company that published a global heat map detailing sensitive military installations will simplify its privacy settings and review its app’s features to ensure it cannot be compromised by actors with bad intent, the company announced late Monday.

Researchers find new flaw in Oracle's MICROS retail systems (Computing) Vulnerability allows unauthorised access to sensitive data

Digital Extortion to Expand Beyond Ransomware (Dark Reading) In the future of digital extortion, ransomware isn't the only weapon, and database files and servers won't be the only targets.

Are organizations prepared for the ransomware threat? (Naked Security) When ransomware like WannaCry and Petya wreaked havoc on global organizations last year, many were left seemingly defenseless against this relentless, but not entirely new, threat.

Look Out: Chrome Extension Malware Has Evolved (WIRED) While helpful and creative, Chrome extensions have also become a new playground for hackers intent on stealing your data.

Google DoubleClick targeted by cyber-scammers looking to propagate Coinhive cryptocurrency mining malware (Computing) Coinhive exploits Javascript flaws to mine for cryptocurrencies at the expense of web users

Attackers disrupt business operations through stealthy crypto mining (Help Net Security) Either by slowing down computers or by crashing systems and applications, the WannaMine crypto mining worm is seriously affecting business operations and rendering some companies unable to operate for days and even weeks.

Cyber crooks are using HTTPS domains to deceive users (Computing) HTTPS does not in itself mean websites are secure and legitimate

Tor Proxy Used By Cybercriminals To Initiate Bitcoin Theft (HackRead) Tor proxy owners are replacing Bitcoin payment addresses to divert payments from ransomware victims to their own wallets.

Scammers become the scammed: Ransomware payments diverted with Tor proxy trickery (Register) Of course this does nothing for victims' encrypted files

Google deleted more crappy apps in 2017, most were killed off automatically (CNET) From a flashlight app that actually stole your money to a fake WhatsApp that millions of people downloaded, it’s been a busy year for Google's security team.

Deepfakes AI celebrity p[0]rn channel shut down by Discord (Naked Security) In 2015, Reddit admitted that in terms of privacy, it had blown it.

Agari: Business Email Compromise (BEC) Attacks Reach 96 Percent of Organizations (Sys-Con Media) Agari, a leading cybersecurity company, today published research revealing that 96 percent of organizations have received business email compromise (BEC) emails during the second half of 2017.

Most Threatening DNS Security Risks And How To Avoid Them (HackRead) The DNS or Domain Name System is one of the most necessary components for the internet functionality but how to protect it against attacks? Here's how.

Julian Assange duped by fake Sean Hannity account, tried to send “news” about Senate Democrat (Salon) “I felt bad. He really thought he was talking to Sean Hannity”

Rep. Devin Nunes Campaign Site Still Hosts Russian SEO Spam From Last Year's Hack (BleepingComputer) The campaign website of a controversial US politician was hacked last year and hosted Russian SEO spam, according to several sources.

Fools and their crypto (TechCrunch) I believe that the token sale economy will drive the next startup revolution. Just as sites like TechCrunch, organizations like Y Combinator and the men in..

Ethereum Startup Leaves Penis for Investors & Vanishes with $11 (HackRead) Ethereum startup Prodeum vanished into thin air after collecting $11 from investors for ICO and leaves behind a penis.

Cryptocurrency Scams Are Just Straight-Up Trolling at This Point (WIRED) US regulators and Facebook are finally coming for bogus ICOs.

Facebook Just Banned All Cryptocurrency Advertising (Motherboard) Facebook banned ads for "financial products and services that are frequently associated with misleading or deceptive promotional practices."

Security Patches, Mitigations, and Software Updates

Cisco Patches Critical Code Execution Flaw in Security Appliances (Security Week) Cisco patches critical remote code execution and denial-of-service (DoS) vulnerability in security devices running ASA software

Cisco VPNs have a remote code execution flaw, and it's bad (CSO Online) Cisco devices running Adaptive Security Appliance software have a remote code execution and denial of service bug. And it's as bad as it gets -- rated 10 out of 10 for severity.

Google Play is an 'order of magnitude' better at blocking malware (The Parallax) Google says it’s removing more malware than ever from its Google Play app store. But there are indications that the risks have also risen, as hackers see dollar signs in Android users.

Intel Chips Without Meltdown, Spectre Flaws Arriving This Year (eWEEK) Intel promises new processors to fix the Meltdown and Spectre vulnerabilities; attackers distribute cryptocurrency miners via the DoubleClick ad network; up to 30 million systems were impacted by an unauthorized Monero mining campaign; and Microsoft improves Azure cloud disaster recovery visibility.

Cyber Trends

Cybersecurity Is 'The No. 1 Threat to Our Nation': Jeh Johnson’s Legalweek Keynote (New York Law Journal) At Legalweek 2018 former U.S. Secretary of Homeland Security Jeh Johnson discussed cybersecurity’s growing role in national security.

OTX Trends Part 3 - Threat Actors (Alien Vault) By Javvad Malik and Chris DomanThis is the third of a three part series on trends identified by AlienVault in 2017.Part 1 focused on exploits and part 2 addressed malware. This part will discuss threat actors and patterns we have detected with OTX.Which threat actors should I be most concerned about?Which threat actors your organization should be most concerned about will vary greatly. A flower shop will have a very different threat profile from a defense contractor. Therefore below

Widespread API use heightens cybersecurity risks (Help Net Security) A new Imperva survey showed a heightened concern for cybersecurity risk related to widespread API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot attacks, and authentication enforcement for APIs.

10 Cybersecurity Threats Facing The Oil And Gas Industry (Chem.Info) The oil and gas industry is bracing for an increase in cyberattacks over the next year.

Most top US and EU e-retailers are putting their consumers at risk (Help Net Security) A study by 250ok has revealed that 87.6 percent of the root domains operated by top e-retailers in the United States and European Union are unable to protect consumers from phishing attacks.

Blurred Lines Between Networking and Security (Infosecurity Magazine) Networking and security used to be largely separate IT methodologies – not any longer.

Marketplace

Don’t Forget Cybersecurity in Your M&A Due Diligence (CFO) Traditionally, cybersecurity oversight in any merger and acquisition process has been relegated to an add-on check.

Navy plans to spend $100 million on cyber through new other transaction authority (FederalNewsRadio.com) The Navy's Space and Naval Warfare Systems Command is jumping on the OTA bandwagon, seeking to spend $100 million on 14 cyber technology areas.

Two Aussie founders sell cyber security start-up for $1B (ARN) Australian-born online fraud detection start-up, ThreatMetrix, has been acquired by the UK’s Relx Group in a cash deal worth $1.01 billion.

What we know about Chronicle, Alphabet's mysterious new company (Popular Science) It focuses on cybersecurity and uses machine learning.

U.S. Department of Defense Awards Booz Allen Hamilton $91.5M Contract to Provide Cybersecurity Support (BusinessWire) U.S. Department of Defense Awards Booz Allen $91.5M Contract to Provide Cybersecurity Support

Aporeto Bolsters Executive Team With Appointment of Jason Schmitt as CEO and Hussain Al-Shorafa as Vice President of Sales (BusinessWire) Aporeto, a new security model for containers, microservices and cloud applications, today announced two additions to their leadership team with Jason

Products, Services, and Solutions

Ivanti and CrowdStrike Forge Strategic Partnership to Deliver Advanced Endpoint Security (Ivanti) Alliance offers joint protection and response to incoming threats, so security and IT teams can act swiftly on the highest-priority alerts

GlobalSCAPE, Inc. Launches EFT Arcus: A Next Generation Cloud-Based Managed File Transfer Platform (BusinessWire) As organizations increasingly undergo digital business transformation, the silos that create complexity among people, processes and data are starting

Synopsys Expands Coverity Support for New Programming Languages, Secure Coding Standards, and DevOps Toolchain Integrations (PR Newswire) Synopsys, Inc. (Nasdaq: SNPS) today announced its Coverity®...

Denim Group Joins AWS US GovCloud Making ThreadFix Available to Federal Customers (BusinessWire) Premier application vulnerability correlation and resolution platform to be easily deployed in Government cloud environment

Guidewire Software : Schinnerer Launches Cyber Warranty for Technology Solution Providers | 4-Traders (SURPERFORMANCE) Victor O. Schinnerer & Company, a leading underwriting manager, in collaboration with Guidewire Software , a provider of software products to the Property & Casualty insurance... | janvier 30, 2018

FIME selected by mada payment system to develop next-gen testing and validation scheme (FIME) The online platform will streamline mada’s new product testing and certification process for member banks, and POI & card vendors.

What is Wickr, the new favourite app of dark net drug dealers? (Verdict) What Wickr offers is great in principal, but an underbelly of criminals have set up shop on the highly encrypted messaging app.

LoginRadius Launches Multi-factor Authentication (EIN News) LoginRadius releases Multi-factor Authentication as an additional layer of Security

Sarkari bot tool takes global malware to the cleaners (The Economic Times) Since the launch of the Cyber Swachhta Kendra or the Botnet Cleaning and Malware Analysis Centre last year, there has been a 51% decrease in malware infections in all networks in the country.

Power & utility cybersecurity begins and ends with secure messaging (Utility Dive) To mitigate cyber threats and the many dangers of email phishing, many power and utilities companies have begun to adopt secure messaging platforms, writes Vaporstream CEO Galina Datskovsky.

Blockchain Startup for Information Security Offers a New Approach to the Threat Detection (NewsBTC) PolySwarm allows IT experts around the world to monetize their security expertise by creating and maintaining specialized threat detection software.

Webroot Releases New Fulfillment Option for LogRhythm Customers (PR Newswire) Webroot, the Smarter Cybersecurity® company, and LogRhythm have...

Schneider Electric and Cylance partner on cyber security protection (Control Design) This agreement involves placing Cylance’s security capabilities within the Industrial Software Platform.

Review: BluVector enables machines to protect themselves (CSO Online) With machine learning that gets smarter and more network-aware over time, BluVector can tip the scales back in favor of defenders.

Technologies, Techniques, and Standards

ISACA Releases Guide to GDPR Implementation as May Deadline Approaches (BusinessWire) Publication provides practical advice on adopting and managing GDPR

NATO cyber defense center appointed to train, educate troops (Fifth Domain) The CCD-COE is a global leader in thinking on cyber operations, strategy and international law

Army Takes on Wicked Problems With the Internet of Battlefield Things (Meritalk) The Army’s work on the Internet of Battlefield Things (IoBT) is more than just a way to carve out a catchy name for the proliferation of smartphones, tablets, wearable devices, cameras and embedded devices that take the field with military forces. It also underscores the most important element of having those connected devices–the data collection and automated analytics capabilities required to make good use of the information they provide.

Enterprise plans for security automation and orchestration (CSO Online) Organizations want to merge threat intelligence with internal security telemetry, add custom functionality for security operations, and automate remediation tasks.

Learn from Coincheck’s $530m heist and ‘trust no one’ when dealing with cryptocurrencies, says Carbon Black security strategist (Business Insider Singapore) A hack of a Japanese cryptocurrency last Friday (Jan 26) which led to 260,000 customers affected by the heist of more than 500 million NEM coins, is a reminder that people should take precautions when protecting and using cryptocurrency.

GDPR, other regulations improve business digital defense strategies (SiliconANGLE) In recent years cybersecurity has become a global priority for businesses, consumers and governments alike.

Research and Development

Chinese satellite uses quantum cryptography for secure video conference between continents (MIT Technology Review) Quantum cryptography has never been possible over long distances. But the first quantum communications satellite is rewriting the record books.

Legislation, Policy, and Regulation

The 2018 State of the Digital Union: The Seven Deadly Sins of Cyber Security We Must Face (War on the Rocks) When President Barack Obama made his first State of Union address, there were a series of key challenges for cyber security policy. There was increasing pr

What a Pentagon Report from the Year 2000 Got Right About Cyber War (Nextgov.com) Many of the issues that concern cyber strategists today were already clear at the turn of the century.

Developing Countries Want a Seat at the Offensive Cyber Capability Table (CyberDB) As 2018 commences, cyberspace remains in constant flux, a dynamic landscape that still favors hostile actors’ freedom of movement over the efforts of network defenders.

Cyber warfare set to surge in 2018 but expert says Britain is not prepared (Security Brief) Cyber war has exploded and is now quite literally on our doorstep - despite this an expert claims Britain's defences are severely underfunded.

‘Winter’ of cyber-threats is coming, experts warn (Times of Israel) At Tel Aviv conference, ex-CIA director David Petraeus says US-Israel collaboration in foiling attacks is 'far beyond what is being published in the media'

Cyber Attack Wouldn't Merit Nuclear Strike: Joint Chiefs Vice Chairman (Military.com) A cyber attack on U.S. infrastructure would not warrant a nuclear strike, the vice chairman of the Joint Chiefs said.

Trump expected to tap Army cyber warfare chief to lead NSA (POLITICO) The NSA is looking for a new leader after its current director, Admiral Mike Rogers, announced he will retire this spring, ending a near four-year run.

How Congress Can Help Protect US Companies From Cyberattack (The Daily Signal) Cyber threats are not going away, and they will only increase in intensity and quantity.

Defending our nation’s cyber services (TheHill) As the chief cybersecurity official for the Department of Homeland Security, Jeanette Manfra is laser-focused on preventing cyberattacks that could destabilize the U.S. financial system or open the federal government up to spying.

Secretaries of State in West Virginia & Kentucky Arm Candidates with Cybersecurity Playbook (Huntington News) To mark their states' candidate filing deadlines, Alison Lundergan Grimes, the Democratic Secretary of State of Kentucky, and Mac Warner, the Republican Secretary of State of West Virginia, are distributing the “Cybersecurity Campaign Playbook” to candidates in their states seeking to be on the ballot in 2018.

Wanted: a firewall to protect U.S. elections (Harvard Gazette) A new bipartisan initiative at Harvard Kennedy School picks up where the federal government leaves off, bringing together experts in national security, cybersecurity, and politics to develop practical strategies, tools, and guidance to help U.S. political campaigns protect themselves from cyber threats.

South Korea reveals $600m in illegal trades but is not planning to ban cryptocurrencies (Computing) 'No intention to ban or suppress cryptocurrency market'

Litigation, Investigation, and Law Enforcement

Blow for Snoopers’ Charter After Liberty Court Victory (Infosecurity Magazine) Blow for Snoopers’ Charter After Liberty Court Victory.Judges rule previous surveillance regime is unlawful

Feds shut down alleged $600 million cryptocurrency scam (Ars Technica) AriseBank project was endorsed by boxer Evander Holyfield.

Drugs Tripped Up Suspects In First Known ATM “Jackpotting” Attacks in the US (KrebsOnSecurity) On Jan. 27, 2018, KrebsOnSecurity published what this author thought was a scoop about the first known incidence of U.S. ATMs being hit with “jackpotting” attacks, a crime in which thieves deploy malware that forces cash machines to spit out money like a loose Las Vegas slot machine. As it happens, the first known jackpotting attacks in the United States were reported in November 2017 by local media on the west coast, although the reporters in those cases seem to have completely buried the lede.

US DoJ Launches Dark Web Drugs Taskforce (Infosecurity Magazine) US DoJ Launches Dark Web Drugs Taskforce. J-CODE is latest response to country’s opioid crisis

'We must find the golden path' – Israeli National Police CTO on the challenges of capturing cyber criminals (Independent.ie) Finding the 'golden path' in the hunt for criminals using encryption to 'go dark' is proving a challenge for the Israeli National Police (INP).

GoGet's customer database hacked, suspect arrested (CRN Australia) Personal details, including payment information could have been accessed.

Director of 'security firm' avoids jail for 'pretending to be Microsoft' in cyber scam (CRN) Director cold-called victims claiming their computers were infected and in some cases remotely locked machines until payment was made

Tech Support Scammers Fined in US, Jailed in UK (Security Week) Operators of a nationwide computer repair scam have been banned from the tech support business as part of settlements with the FTC and Ohio.

WeissLaw LLP Files Class Action Lawsuit Against Barracuda Networks, Inc. (Business Insider) WeissLaw LLP announced that a class action was commenced in the United States District Court for the Northern District...

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference (Atlanta, Georgia, USA, September 17 - 19, 2018) The International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference continues to elevate the national dialogue on the very necessary strategic, tactical and operational...

Upcoming Events

Legal CIO (New York, New York, USA, January 31 - February 1, 2018) LegalCIO: Formerly the Law Firm Chief Information and Technology Officers Forum, combines cutting-edge updates on legal technologies with the chance to exchange practical guidance and discuss daily challenges...

Women in Data Protection, Securing Medical Devices and Health Records (Washington, DC, USA, February 9, 2018) Join some of the top cyber and privacy professionals as they talk about the landscape of the medical device and electronic health records market. They will also talk about the dangers to patients' health...

Cyber Security Summit: Silicon Valley (San Jose, California, USA, February 13, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their companies’ critical data with innovative solution providers & renowned information security experts.

Security Titans (Scottsdale, Arizona, USA, February 23, 2018) Security Titans is a ground-breaking event, bringing the biggest names in Information Security together - all in one day, on a single stage to give the nation's cyber security industry access to the very...

European Cybersecurity Forum – CYBERSEC Brussels (Brussels, Belgium, February 27, 2018) CYBERSEC Forum is an unique opportunity to meet and discuss the current issues of cyber disruption and ever-changing landscape of cybersecurity related threats. Our mission is to foster the building of...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, March 6 - 7, 2018) The course will cover current regulations like National Insider Threat Policy NITP and NISPOM Conforming Change 2, and more. The course will provide the ITP Manager and Facility Security Officer with the...

SINET ITSEF 2018 (Silicon Valley, California, USA, March 7 - 8, 2018) Bridging the gap between Silicon Valley and the Beltway. SINET – Silicon Valley provides a venue where entrepreneurs can meet and interact directly with leaders of government, business and the investment...

PCI Security Standards Council Middle East and Africa Forum (Cape Town, South Africa, March 14 - 15, 2018) Don’t miss the data security event of the year for the payment card industry. Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes...

Cyber 9-12 (Washington, DC, USA, March 16 - 17, 2018) Now entering its fifth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.