skip navigation

More signal. Less noise.

How can industrial organizations stay ahead of ICS adversaries and proliferating threats?

Dragos identified the most dangerous threat to ICS, XENOTIME (the activity group behind TRISIS), has expanded its targeting beyond oil and gas--illustrating a trend that will likely continue for other ICS-targeting adversaries. Learn more about how taking an intelligence-driven approach to ICS cybersecurity can help organizations stay ahead of the latest threats to ICS environments. 

Daily briefing.

President Trump has agreed to permit Huawei to buy some US products ("boring kit," as CRN puts it). Reuters reports that the White House says there's no diminution of concern about Huawei as a security risk. Forbes says Huawei applauds what the company calls a u-turn.

In an interview with Ars Technica, US CISA Director Krebs repeats warnings of expected Iranian cyberattacks against US targets.

Iran has taken down two big cryptocurrency mining farms run from disused factories. Authorities say the activity was sufficiently power hungry to have rendered portions of the grid "unstable," with consumers of electricity noticing problems, according to Radio Free Europe/Radio Liberty.

Not a cyberattack, but an incident worth considering in the light of concerns about the power grid, is a recent power-failure induced disruption of manufacturing. A thirteen-minute outage at Toshiba Memory disrupted flash memory production, a disclosure from Western Digital said last week. The accident destroyed some six exabytes of product. Production is expected to return to normal in the middle of July. Significant "fluctuations" in flash prices are expected to follow, CRN notes. 

The ransomware attack at aviation components manufacturer Asco remains only partially fixed. Things are improving, AIN says, but Asco doesn't yet have a projected time for full recovery.

Australia is leading a voluntary international agreement in which governments would swiftly take down "abhorrent" content posted online, CRN reports.

Axios writes that strong interest in Facebook's projected Libra cryptocurrency has already led to a scramble by scammers to register Libra-sounding domains.


Today's issue includes events affecting Australia, Canada, Estonia, European Union, Finland, India, Iran, Israel, Republic of Korea, NATO/OTAN, Russia, United States.

Bring your own context.

To protect an enterprise against ransomware, it's important to back up files. But there's a craft to doing so effectively.

"And a lot of times people will put those backups on network-attached storage devices, on FTP servers, things like that. You know, what happens then if those files are then encrypted? What happens when your backups become encrypted? What do you do then? I think in that case it's obviously a good idea to have a ransomware playbook. Backing up your data is not going to be the only thing that you should do."

—Harrison Van Riper from Digital Shadows, on the CyberWire Daily Podcast, 6.27.19.

Not all backups are equal. And do have a plan (a good plan).

And a note to our readers: the CyberWire won't publish on July 4th, 5th, or 6th, as we observe the Independence Day weekend. Enjoy the holiday.

Are you centralizing all security-related data from across the business?

Is there a challenge with your security data you haven’t been able to wrangle? Devo enabled one their customers – a top five US retail manufacturer – to move fast enough to outpace malicious bots by reducing query time from 5 hours to 5 minutes. That was something they couldn’t do with anyone else.

See how Devo can modernize your approach to security analytics in this report by ESG.

In today's podcast, out later this afternoon, we speak with our partners at Accenture, as Justin Harvey describes ways attackers are bypassing two-factor authentication on mobile devices. Our guest is Gretel Egan from Proofpoint, and she discusses the shift toward human-centric security. 

Cyber Security Summits: DC on July 16 and in Chicago on August 27 (Washington, DC, United States, July 16, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, The U.S. DOJ, Verizon, Center for Internet Security, IBM and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Passes are limited, secure yours today.

RSA Conference 2019 Asia Pacific & Japan (Singapore, Republic of Singapore, July 16 - 18, 2019) Join industry leaders and peers at the region’s leading cybersecurity event. Learn the latest issues and solutions, stay on top of new regulations, demo cutting-edge products, expand your skills and grow your personal network. Register now.

Wicked6 Cyber Games (Las Vegas, Nevada, United States, August 6, 2019) Wicked6 is a fundraiser and cybersecurity exhibition in a thrilling esports arena in Las Vegas on August 8, 2019. It’s a week when cybersecurity leaders from around the world come to Las Vegas, and all are welcome to come by to experience this exciting and unique cyber competition as a player, sponsor, or avid fan. Wicked6 will raise funds for the Women’s Society of Cyberjutsu, a national 501(c)(3) nonprofit that promotes training, mentoring and more to advance women and girls in cybersecurity careers.

Cyber Attacks, Threats, and Vulnerabilities

US cyber attack on Iran exploited flaw in heavily-guarded network, experts say (Times of Israel) Assault that crippled Revolutionary Guard missile system result of massive investment in cyber warfare by American military, likely took extensive preparation

The U.S. and Iran are Already at War Online (Time) It's notoriously difficult to trace attacks in digital conflict

The Bitcoin Bite: Iran Says Power Grid Hit By Cryptocurrency-Mining Surge (RadioFreeEurope/RadioLiberty) Iranian authorities are blaming the mining of cryptocurrencies, such as Bitcoin, for a big increase in the country's monthly electricity usage, with digital-currency miners reportedly using mosques and schools for their cheap electricity.

Possible U.S. Cyber Attack on Power Grid in Russia; Is Cyber Warfare on the Table? (CPO Magazine) Russia has been making news for hacking utility systems in other nations and for a change, news has emerged that U.S. is conducting cyber attack on power grid in Russia by planting malicious code.

Hackers target Russia’s defense, nuclear power industry secrets (TASS) According to a cyber security official, the United States is the main source of threat to information security

Alleged Cyber Attack on Russia's Yandex Used Malware Tied to Western Intelligence (Gizmodo) Hackers believed to be working for Western intelligence agencies “broke into Russian internet search company Yandex from October to November 2018,” deploying a malware variant called Regin that is “known to be used by the ‘Five Eyes’ intelligence-sharing alliance of the United States, Britain, Australia, New Zealand and Canada,” Reuters reported on Friday, citing four people with knowledge of the incident.

Russia denies role in Israeli airport GPS jamming (Sporaw) Russia has denied Israeli suggestions that it is behind disruption of GPS signals at Israel's Ben Gurion airport.

Cryptocurrency phish dials back the fear, cranks up the politeness (Naked Security) Spammers and scammers are getting better at spelling and grammar – so make sure you aren’t relying on language alone to spot phishes…

Microsoft Confirms New Cumulative Update Bug Hitting Windows 10 Version 1903 (softpedia) RASMAN service might stop working, it says

New Exploit Kit Spelevo Carries Bag of Old Tricks (BleepingComputer) A new exploit kit that researchers named Spelevo has emerged recently targeting a certain category of victims and infect their computer systems with two banking trojans.

New Dridex malware strain avoids antivirus software detection (ZDNet) When the new banking Trojan strain first appeared, very few traditional software products recognized it.

An Analysis of Godlua Backdoor (360 Netlab Blog) On April 24, 2019, our Unknown Threat Detection System highlighted a suspicious ELF file which was marked by a few vendors as mining related trojan on VT. We cannot confirm it has mining related module, but we do see it starts to perform DDoS function recently.

The Curious Case of Silexbot (Decipher) The Silexbot malware is compromising IoT devices and destroying their file systems and rebooting them, in an apparent attempt to stop botnet controllers from owning them.

Electronic Arts Origin gaming client hit by vulnerabilities, says Check Point Research (Tech News) Check Point and CyberInt strongly advise users to enable two-factor authentication and only use the official website when downloading or purchasing games.

Scammers flock to buy Libra web domains (Axios) Facebook's new cryptocurrency lead to a flurry of web registrations, some trying to trick consumers.

Report: Orvibo Smart Home Devices Leak Billions of User Records (vpnMentor) vpnMentor's research team found a leak in Orvibo's user database. Our expert cybersecurity research team, led by Noam Rotem and Ran Locar, ...

Wipro Attackers Breach PCM And Hit ServiceNow, Others: Reports (CRN) The attacks were the latest in a string of five attacks over the last two years related to gaining money from gift card providers.

Summa Health has potential data breach of more than 500 patient records, other sensitive information (Akron Beacon Journal) More than 500 patient medical records and other sensitive information were exposed in potential data breaches at Summa Health in August and March.Summa

Medtronic recalls vulnerable MiniMed insulin pumps (Help Net Security) Medtronic has issued a recall of its MiniMed 508 and Paradigm series insulin pumps because they can be tampered with by attackers.

All the countries where someone managed to shut down the entire internet — and why they did it (Business Insider) Taking down an entire country's internet service is easier than you think.

Bot Fraud Grows Across All Mobile Businesses And Now Threatens Apps (Forbes) A massive battle is looming on mobile and apps as bots become more sophisticated and harder to detect. Adjust, a mobile measurement and anti-fraud company, is taking a different approach, focusing on the data that bots can’t fake, such as the pressure on the screen and the motion of the device.

The Hotel Hackers Are Hiding in the Remote Control Curtains (Bloomberg Businessweek) Back doors to your personal data can be found in everything from smart fish tanks to Wi-Fi pineapples.

Opinion | The Worm That Nearly Ate the Internet (New York Times) It infected 10 million computers. So why did cybergeddon never arrive?

$50 DeepNude app undresses women with a single click (Naked Security) “I’m not a voyeur, I’m a technology enthusiast,” says the creator, who combined deepfake AI with a need for cash to get ka-CHING!

‘The world is not yet ready for DeepNude’: Creator kills app that uses AI to fake naked images of women (Washington Post) The app was live just four days before a viral backlash and high interest prompted the shutdown.

Security Patches, Mitigations, and Software Updates

Cisco steps up fix for critical DNA Center flaw (CRN Australia) Adds non-upgrade fix to unauthenticated attacker bypass.

EA fixes cloud flaw that could have left user accounts at risk (ZDNet) Tech security companies said a "chain of vulnerabilities", now fixed, could have left accounts vulnerable to attack.

Tripwire Patch Priority Index for June 2019 (The State of Security) Tripwire's June 2019 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Oracle, and Adobe.

Cyber Trends

Consumers believe privacy is not possible, leading to a change in online behavior (Help Net Security) New survey highlights a growing belief among consumers that privacy is not possible, leading to a personal choice to change their online behavior.

As cyber attacks increase, Indian IT clients seeks stricter contracts, more audits ( Clients typically had broad language in their contracts to ensure they were protected but increasing attacks by hackers have shown that more is needed..

3 challenges facing the national security community in the information age (C4ISRNET) The current information environment is different than anything the intelligence community has faced before, and the United States will have to adapt in order to meet the changing threat.


TrapX Secures $18 Million in Series C Financing Round (TrapX) Global Leader in Cyber Deception Technology Expands Operations and Doubles Down on Innovation with New Financing

Huawei allowed to buy American again, for boring kit (CRN Australia) Purchase ban lift should keep products coming.

Huawei Welcomes Trump 'U-Turn' On U.S. Supplier Ban After Xi Meeting At G20 (Forbes) As anticipated, Huawei blacklist concessions were on the cards at the G20 summit when Trump met Xi, and the U.S. President told the media afterward that Huawei would now be allowed to buy from U.S. companies after all.

Google gets nod to license Android for Huawei ( With US President Donald Trump providing reprieve to Huawei, less than a month after blacklisting the Chinese telecom giant, American tech titan Googl..

Six exabytes of Flash destroyed by brief blackout (CRN Australia) 13-minute outage at Toshiba plant could spike prices.

Asco Sees Progress In Restoring Production after Cyber Attack (Aviation International News) A large-scaled ransomware attack beset Belgian manufacturer Asco Industries on June 7.

Nokia Hurriedly Disowns Its CTO's Scathing Comments On Huawei Security Flaws (Forbes) Nokia has issued a public statement to distance itself from the comments made by its CTO to the BBC over Huawei's security issues—those comments followed a U.S. security report suggesting major flaws in the Chinese company's equipment, including potential backdoors.

Activist Investor Dan Loeb Opposes Raytheon Deal. United Technologies Pushes Back. (Barron's) The activist investor said he would prefer a focus on commercial aerospace, rather than defense as well.

Better Buy: Palo Alto Networks vs. FireEye (The Motley Fool) There's one clear winner between these two cybersecurity plays.

Okta: If You Have To Ask, You Can't Afford It (Seeking Alpha) Okta is a leader in identity management solutions with 53% YoY revenue growth. As with most high-growth companies, valuation is lofty, but in the case of Okta, valuation is extreme.

Outgoing FBI cyber official joins Accenture’s incident response team (CyberScoop) Eric Welling has left his position as deputy assistant director of the FBI’s Cyber Division to join consulting giant Accenture, a company spokesperson confirmed.

Products, Services, and Solutions

Horne Cyber debuts Threat Runner, a malware emulation tool (Accounting Today) Threat Runner emulates an authentic malware infection on an organization’s network, exposing vulnerabilities in need of remediation without encrypting files and sensitive data.

The new AWS services unveiled at re:Inforce 2019 (CRN Australia) Cloud giant's new security conference had a handful of announcements.

Thales launches Gemalto Instant Connect to simplify the connection of eSIM-enabled devices (Help Net Security) Thales announces the launch of Gemalto Instant Connect, a connectivity solution to simplify the connection of eSIM-enabled devices on a mobile network.

Fortinet extends application security on Amazon Web Services (Channel Life) Fortinet to secure applications on AWS with FortiWeb Cloud WAF-as-a-Service while protecting applications and APIs and addressing compliance requirements.

Secureworks puts McLaren in pole position with holistic solution (Intelligent CIO Europe) The McLaren Group has deployed a Secureworks solution to secure its data across multiple locations and assess threats in real-time, helping the high-performance car manufacturer stay competitive on…

CyberX Enhances Industrial Threat Intelligence with Automated Threat Extraction Platform - Virtual-Strategy Magazine (Virtual-Strategy Magazine) Leverages Machine Learning to Identify APT Campaigns Targeting Industrial and Critical Infrastructure Organizations

New infosec products of the week: June 28, 2019 (Help Net Security) Elastic SIEM: Speed, scale, and analytical power drive your security operations and threat hunting The initial launch of Elastic SIEM introduces a new set

Technologies, Techniques, and Standards

EU to run war games to prepare for Russian and Chinese cyber-attacks (the Guardian) Ministers to be put in fictional scenarios after series of hacking incidents

Finnish presidency to war-game hybrid threat response (EUobserver) The Finnish presidency will draw up scenarios on hybrid attacks, for EU home affairs and finance ministers to practice decision-making when facing acute threats.

Combatting Cyber Threats: CSE Releases New Baseline Cybersecurity Controls - Security - Canada (Mondaq) On April 5, 2019, the Canadian Centre for Cyber Security released the Baseline Cyber Security Controls for Small and Medium Organizations intended to assist small and medium organizations Canada Security Torkin Manes LLP 28 Jun 2019

Understanding & Defending Against Polymorphic Attacks (Dark Reading) Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here's why.

Design and Innovation

Mozilla’s bizarre robo-surfer project demonstrates ad snooping (Naked Security) In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that you’re someone else.

A Second Update on Our Civil Rights Audit (Facebook Newsroom) We want to make sure we’re advancing civil rights on our platform, and we’re sharing a second report that details our efforts.

Wikipedia Has Been A Safe Haven From The Online Culture Wars. That Time May Be Over. (BuzzFeed News) The once-derided open-source encyclopedia is the closest thing the internet has to an oasis of truth. Now a single-user ban has exposed the deep rifts between Wikipedia's libertarian origins and its egalitarian aspirations, and threatened that stability.

YouTube looks to demonetization as punishment for major creators, but it doesn’t work (The Verge) Steven Crowder’s case is a perfect example

Opinion | I Shouldn’t Have to Publish This in The New York Times (New York Times) The way we regulated social media platforms didn’t end harassment, extremism or disinformation. It only gave them more power and made the problem worse.

Facebook to hire banking expert to run 'Libra' ( Facebook is looking to hire a seasoned executive to run its digital coin 'Libra' project who has the know-how of the complex government and central ba..

Curious new theory links Bitcoin’s inventor to Estonia (Yahoo) An Estonian multinational and the founder of MIT’s Media Lab are the focus of a new hunt for the mysterious Satoshi Nakamoto.

Research and Development

US government is working on mysterious malware detection project (TechRadar) MalSee is able to detect malware faster than current methods

The Pentagon has a laser that can identify people from a distance—by their heartbeat (MIT Technology Review) The Jetson prototype can pick up on a unique cardiac signature from 200 meters away, even through clothes.

Legislation, Policy, and Regulation

Trump Allows U.S. Sales to Huawei as Trade Talks Resume (Wall Street Journal) President Trump and his Chinese counterpart agreed to a cease-fire in their trade battle, as Mr. Trump said he would allow American firms to sell high-tech equipment to Huawei and China would start buying U.S. farm products.

Trump: US companies can sell to Huawei as long as deals don't pose national security threat ( Trump backtracks on Huawei sanctions after talks with Chinese president Xi Jingping,Hardware,Security ,President Donald Trump,Huawei trade ban,US Entity List,Chinese President Xi Jingping,Marco Rubio

Trump Bows to Xi Jinping's Huawei Demands at G20 (The Daily Beast) Selling American chips to a company branded as a security risk was only one of the areas where Trump gave ground.

Trump 'not backing off' Huawei as security threat: Kudlow (Reuters) National Economic Council chairman Larry Kudlow says President Trump's decision to allow new sales to China's Huawei does not mean he's 'backing off' the telecommunications giant as a national security threat. Rough Cut (no...

Kudlow: US sales to Huawei won't imperil national security (ABC News) White House economic adviser Larry Kudlow says President Donald Trump won't back off national security concerns after agreeing to allow U.S. companies to sell some components to Chinese telecommunications giant Huawei

Trump Leaves Huawei’s South Korean Suppliers Hanging (Wall Street Journal) In a speech to South Korea’s largest conglomerates after he eased the toughest U.S. measures against Huawei, President Trump provided no direction on how they should proceed with the Chinese tech giant.

Analysis | The Cybersecurity 202: Trump’s Huawei reversal is outraging Republicans (Washington Post) Sen. Marco Rubio vowed Congress will reinstate all restrictions.

The 70-Year Spy Alliance the U.S. Says It May Cut Off (Bloomberg Businessweek) Born out of World War II, it’s the world’s deepest and most comprehensive collaboration among spy services.

DoD, NATO turn to collective defense against cyber attacks (Federal News Network) Ian West, the cybersecurity chief of the NATO Communications and Information Agency, said the launch of a new encrypted workspace lets five countries test how they can share secure video, voice…

Estonian minister: Cybersecurity cooperation of Estonia, US has reached a new level (Baltic Times) Cooperation between Estonia and the United States in cybersecurity has been fruitful through the years and has now reached a new level...

US-Iran Tensions: What Indian Cyber Commanders Can Learn (The Quint) In the US-Iran standoff, the ‘escalatory matrix’ is shuttling between cyber & kinetic military options.

Race to militarize cyberspace poses challenge for Just War theory (Crux) Recent press reports have noted an increase in “cyberwar” capabilities, with the New York Times running a story on a U.S. project to place malware in Russian power networks, in retaliation for similar activity by Russia-backed hackers.

Australia to test social media content takedowns (CRN Australia) ‘Simulation exercise’ follows G20 declaration on free flows of data.

“We need to up our game”—DHS cybersecurity director on Iran and ransomware (Ars Technica) Talking with Ars, Christopher Krebs shares the to-do list: Iran, ransomware—and elections.

Senate Has Spoken: Smart Crowdsourced Security Testing Puts American Security First (BusinessWire) Synack commends the United States Senate for passing the NDAA for 2020 and declaring crowdsourced security as a best practice.

Election Administration and Voting Survey (US Election Assistance Commission) Since 2004, the Election Assistance Commission (EAC) has conducted the Election Administration and Voting Survey (EAVS) following each federal general election.

Three states responsible for half of all paperless e-voting machines in 2018, survey finds (FCW) Policymakers and experts know that paperless DRE voting machines are confined to a small number of states, but new survey results demonstrate just how concentrated the problem is.

Litigation, Investigation, and Law Enforcement

Fraudsters Spoof to Steal $27M in Cryptocurrency (BleepingComputer) Law enforcement agencies in Europe arrested a group of six individuals for emptying cryptocurrency wallets of at least 4,000 victims by setting up a website that impersonated

Former Equifax executive sentenced to prison for insider trading prior to data breach (The Verge) Four months of jail time

Sydney IT consultant sentenced to three years for insider trading (CRN Australia) Accessed buy reports for listed companies before they were published.

Gay dating app Jack’d settles complaint over exposing private photos (The Verge) Company left private photos exposed for a year

Bulgarian IT expert arrested after demoing vulnerability in kindergarten software (ZDNet) Vulnerability allowed him to download data of over 235,000 Bulgarian citizens.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

RuhrSec 2020 (Bochum, Nordrhein-Westfalen, Germany, May 5 - 8, 2020) Since 2016, RuhrSec is the annual English speaking non-profit IT security conference with cutting-edge security talks by renowned experts. RuhrSec provides academic and industry talks, the typical University...

Upcoming Events

INTERPOL World 2019 (Singapore, July 2 - 4, 2019) INTERPOL World is a global co-creation opportunity which engages the public and private sectors in dialogue, and fosters collaboration to counter future security and policing challenges. INTERPOL World...

Minneapolis Cybersecurity Conference (Minneapolis, Minnesota, USA, July 11, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Insider Threat Program Development - Management Training Course (Mountain View, California, USA, July 15 - 16, 2019) The Insider Threat Defense Group will hold our highly sought after Insider Threat Program (ITP) Development - Management Training Course, in Mountain View, California, on July 15-16, 2019. This comprehensive...

Raleigh Cybersecurity Conference (Raleigh, North Carolina, USA, July 18, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Cybertech Midwest 2019 (Indianapolis, Indiana, USA, July 24 - 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.