Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
April 8, 2019.
By the CyberWire staff
As an attack on optical-equipment manufacturer Hoya shows, cryptojacking can disrupt production. (BeInCrypto has the report.)
Akamai has released a study of credential-stuffing attacks. This easily scaled, commodity form of attack especially affects media outlets, gaming companies, and the entertainment sector generally.
Researchers at IBM's X-Force find that online criminals are redoubling their efforts as tax season enters its homestretch. The attackers are showing a propensity to impersonate major payroll and accounting firms.
British Ministers are introducing strict controls over online content. The Telegraph calls it a victory for the "duty of care" the paper has been calling for; the Government says the proposed law's goal is the protection of children.
Facebook not only hosted a thriving, active collection of criminal groups trading in a vigorous hood-to-hood market, but as Gizmodo points out, the social networks algorithms even made it easy for the crooks to find one another. Facebook notes correctly that the groups were (for years) in violation of its terms of service, and has dismantled them, but the incident suggests how difficult it will be to police content.
US Secretary of Homeland Security Kirstjen Nielsen resigned yesterday, citing her hope that her successor "will have the support of Congress and the courts in fixing the laws which have impeded our ability to fully secure America’s borders and which have contributed to discord in our nation’s discourse." The Washington Post says the former Secretary had been regarded as one of the Administration's most senior officials with significant cybersecurity experience.
Today's issue includes events affecting China, Ecuador, European Union, Germany, India, Israel, Japan, Russia, Turkey, United Kingdom, United Nations, United States.
A note to our readers: The CyberWire is a finalist in the Cybersecurity Association of Maryland's 2019 Awards, eligible to win the 2019 People's Choice Award, and we'd appreciate your support. Please vote for us here, and feel free to spread the word. The deadline for voting is 4:00 PM Eastern Time on April 11th. Thanks for your support.
Get a Backstage Pass to LookingGlass’ Digital Business Risk Roadshow
When it comes to digital business risk, you don’t want a general admission perspective. Get a backstage pass for the LookingGlass Digital Business Risk Roadshow to learn the industry-latest on effective third party risk management, taking a proactive security approach, and get a cybercriminal mastermind's insights on manipulating your organization’s cyber strengths and weaknesses. Come see us in a city near you. The tour includes San Francisco, NYC, D.C., and Houston!
Global Cyber Innovation Summit(Baltimore, Maryland, United States, May 1 - 2, 2019) This unique, invitation-only forum brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. Request an invitation today.
Cybersecurity Impact Awards(Arlington, Virginia, United States, May 14, 2019) The inaugural Cybersecurity Impact Awards are open for nominations until April 12 and are dedicated to recognizing companies that have corporate or Federal headquarters in the DMV area for their leadership and innovation within the cybersecurity industry. Award winners will be honored during an awards ceremony on May 14.
Inside the 2014 hack of a Saudi embassy(CSO Online) According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.
Analysis | Why 5G Phones Are Arriving With Subplot of Espionage(Washington Post) The 5G wireless technology now being introduced by phone companies promises to bring a world of innovations to mobile service -- from connected appliances to self-driving cars -- just as cable transformed television generations ago with hundreds of new channels. It also promises to bring a new global round of technology competition -- one that overlaps with arguments over security that have pitted the U.S. against China and raised tensions in Europe, to the dismay of telecom executives who fear
Credential Stuffing: Attacks and Economies(Akamai) Akamai recorded nearly 30 billion credential stuffing attacks in 2018. Each attack represented an attempt by a person or computer to log in to an account with a stolen or generated username and password. The vast majority of these attacks were performed by botnets or all-in-one applications.
Ongoing DNS hijacking campaign targeting consumer routers(Badpackets) Over the last three months, our honeypots have detected DNS hijacking attacks targeting various types of consumer routers. All exploit attempts have originated from hosts on the network of Google Cloud Platform (AS15169). In this campaign, we've identified four distinct rogue DNS servers being used
The Social Engineering Behind Operation Sharpshooter, Rising Sun(Security Boulevard) We are learning more about Operation Sharpshooter, an espionage campaign that targeted financial services, government and critical infrastructure primarily focused in German, Turkey, the UK and the US. It is important to show how easily this attack was delivered to end users and how quickly it can infect your enterprise. Despite millions invested in user The post The Social Engineering Behind Operation Sharpshooter, Rising Sun appeared first on Bromium.
Cryptojacking Attacks: Who's Mining on Your Coin?(Security Intelligence) X-Force data revealed that while browser-based cryptojacking was increasingly popular through most of 2018, cryptomining malware made a resurgence at the end of 2018 and into Q1 2019.
TrickBot malware attacks are ramping up ahead of Tax Day(TechCrunch) A powerful data-stealing malware campaign with a tax theme is on the rise to target unsuspecting filers ahead of Tax Day. TrickBot, a financially motivated trojan, infects Windows computers through a malicious Excel document sent by a specially crafted email. Once infected, the malware targets vuln…
Facebook’s Own Algorithms Boosted Cybercriminal Groups(Gizmodo) You might have a certain idea of where cybercriminals congregate. Maybe you imagine a black hoodie operator working at night on the dark net or something out of Mr. Robot. In fact, these things are often much more simple and mundane than they seem.
Sextortion Scams Now Using Password Protected Evidence Files(BleepingComputer) New variants of the sextortion scams are now attaching password protected zip files that contain alleged proof that the sender has a video recording of the recipient. While you cannot view the individual files in the archive, you can see what they are named, which can cause recipients to become scared enough to make a payment.
Wiley Collaborates with Google Cloud on Certification(Wiley News Room) John Wiley and Sons, Inc. (NYSE:JWA)(NYSE:JWB) today announced a new collaboration with Google Cloud aimed at providing a range of resources to support learners in the fast-growing market for Google’s Cloud certifications.
What keeps federal cyber experts up at night about CDM(FedScoop) The future of the Continuous Diagnostics and Mitigation program remains unclear as early adopters like NASA seek more funding to maintain its cybersecurity tools moving forward. Started by the Department of Homeland Security in 2012, CDM initially focused on asset and identity and access management across agencies before moving onto network security and data protection. …
Security Culture Questions to Consider(Government Technology) Here are three basic questions that security leaders need to keep coming back to in order to assess enterprise security culture and ongoing cyber-risk.
Intel may never make a CPU we can trust, but others might(Digital Trends) Remember the Spectre and Meltdown security exploits from last year? Intel and AMD really hopes you don’t. Despite what they want you to believe, these speculative execution exploits aren’t going away, at least not with the solutions proposed so far.
Scientists advance quantum key distribution tech to strengthen cyber security(Security Boulevard) Researchers from the Centre for Quantum Technologies in Singapore are helping advance a technique involving pairs of entangled light particles to enable stronger cyber security. The project, driven by the NUS-Singtel Cyber Security Research & Development Laboratory, has long been in the making, but only now the final breakthroughs have made it into a paper
WVU researcher awarded NSF CAREER grant to develop new techniques to secure cyberspace(My Buckhannon) Yanfang (Fanny) Ye, assistant professor of computer science and electrical engineering at West Virginia University, has been awarded a prestigious CAREER award from the National Science Foundation in support of her work to enhance the security of cyberspace. The award comes with $500,000 in funding over a five-year period. As the Internet becomes increasingly ubiquitous, …
University to offer cybersecurity summer camp(Indiana Gazette) Thanks to a fourth year of funding from the National Science Foundation and the National Security Agency, Indiana University of Pennsylvania will offer a free, one-week GenCyber cybersecurity camp for
Europe to pilot AI ethics rules, calls for participants(TechCrunch) The European Commission has announced the launch of a pilot project intended to test draft ethical rules for developing and applying artificial intelligence technologies to ensure they can be implemented in practice. It’s also aiming to garner feedback and encourage international consensus bu…
Duty of Care: What the new rules will mean for tech firms(The Telegraph) Tens of thousands of tech firms – from social media giants such as Facebook and search engines such as Google to games such as Fortnite, messaging apps such as Snapchat and online forums such asTripadvisor – will be subject to a statutory duty of care to protect their users from online harms.
EU States Test and Strengthen Readiness for Election Cyber Threats(BleepingComputer) EU member states tested their crisis plans and response to potential EU elections cybersecurity incidents during an exercise organized today in collaboration with the European Parliament, the European Commission, and the EU Agency for cybersecurity (ENISA).
Homeland Security Secretary Nielsen has resigned(Federal News Network) President Donald Trump says Homeland Security Secretary Kirstjen Nielsen is leaving her job, amid growing frustration by the administration over the number of southern border crossings…
DHS' Krebs, DOE's Evans detail priorities for addressing emerging threats, election security(Inside Cybersecurity) Christopher Krebs, the director of DHS' Cybersecurity and Infrastructure Protection Agency, stressed his agency's focus on emerging threats involving the supply chain and industrial controls systems on Thursday, while Karen Evans, the top cybersecurity official at the Department of Energy, outlined DOE's major cybersecurity projects currently in the works.
24th, 25th Air Force to Merge This Summer(Air Force Magazine) After mulling the change for about three years, the Air Force announced Thursday its two organizations overseeing cyber, intelligence, electronic warfare, and more will merge to create a new numbered Air Force for information warfare.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
QuBit Conference Prague 2019(Prague, Czech Republic, April 9 - 11, 2019) Over the past 5 years, QuBit has grown to be a leading cyber security community event in CEE region. This year's highlights include: excellent speakers and educational sessions, popular networking events,...
Mississippi College Cybersecurity Summit(Clinton, MIssissippi, USA, April 10, 2019) The 2019 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. It will provide valuable cybersecurity tools and...
SecureWorld Philadelphia(Philadelphia, Pennsylvania, USA, April 10 - 11, 2019) Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements, learning from nationally recognized industry...
ISC West 2019(Las Vegas, Nevada, USA, April 10 - 12, 2019) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...
Maryland Cyber Day(Hanover, Maryland, United States, April 11, 2019) Maryland Cyber Day is a combination of two events, MD Cyber Day Marketplace followed by MD Cybersecurity Awards Celebration. Marketplace features cybersecurity innovation, an expo, technology demos, “Ask...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.