Get your copy of the definitive guide to threat intelligence.
We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.
November 18, 2019.
By the CyberWire staff
India has reassured its Russian partners that the cyber incident at the Kudankulam nuclear power station did not affect safety or operations, the Hindustan Times reports. Atomstroyexport is assisting with construction at Kudankulam, which when complete will have six Russian-supplied VVER-1000 reactors. The two countries have also cooperated on the installation's security.
The New York Times has published two sets of leaked, classified documents, one from China, the other from Iran. The first outlines Chinese surveillance and detention of its Muslim Uighur minority, particularly severe in the Xinjiang province. Foreign Policy says that much of the surveillance technology used in Xinjiang is being built into the smart cities component of the Belt-and-Road initiative, in which authorities in Kazakhstan, Kyrgyzstan, and Uzbekistan are said to be particularly interested in cooperating with Beijing.
The second set of leaked material exposes Iran's role in fomenting domestic unrest in Iraq. Facing its own domestic unrest, Tehran has also begun restricting access to the Internet within Iran, WIRED says.
The US opposes a Russian-led cybercrime treaty proposed in the UN on the grounds that the pact would solidify authoritarian control over the Internet, the Washington Post reports.
Social-change-minded cybercriminal Phineas Fisher is offering a $100 thousand bounty for corporate leaks. Vice notes that the purse was apparently filled by cyber robbery.
Someone claiming to represent the Lizard Squad told the Independent that the group was behind the failed DDoS attack on the UK's Labour Party.
CISA marked the first anniversary of its formation on Saturday.
Today's issue includes events affecting Canada, China, Estonia, European Union, India, Iran, Iraq, Kazakhstan, Kyrgyzstan, Latvia, Lithuania, NATO/OTAN, Russia, Taiwan, Ukraine, United Kingdom, United States, and Uzbekistan.
Bring your own context.
We've heard that a cold call beginning "can I have just ten minutes of your time" is often less than fully successful. What might work, to get a product, solution, or service in front of a CISO?
"So obviously, you know, any salesperson knows that any time you can get one-on-one time in front of a practitioner or security leader, that's of extreme value. And they will pay dearly for that. I mean, there are these exclusive events that many firms put on that they charge a pretty penny to let vendors have access to that kind of information. But there are other organizations like you referenced, local meetup groups. I'll mentioned ISSA, ISACA. These are security groups for which CISOs have repeatedly said, if you bring your smartest people - vendors, speaking of vendors - if you bring your smartest people to volunteer, contribute, provide valuable information, we will deeply remember that. And that is of great value to us."
—David Spark, co-host of the CISO/Security Vendor Relationship Podcast and owner of Spark Media Solutions, on the CyberWire Daily Podcast, 11.15.19.
Get in front of them by getting in front of them, then?
Work with the world’s experts in Dark Web analysis.
Based on years of law enforcement and military experience plus current work with international agencies, ReSecurity’s Hunter Unit pulls and analyzes the best data and delivers it in the most actionable format. We provide human-curated, in-depth analysis layered on top of the most comprehensive, exclusive sets of data from the Deep and Dark Web.
Cyber Security Summits: November 21 in Houston and December 5 in Los Angeles(Houston, Texas, United States, November 21, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The US Department of Homeland Security, The FBI, US Department of Justice, Verizon, Center for Internet Security and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Your full day’s attendance will earn you 6 CPEs / CEUs. Passes are limited, secure yours today: www.CyberSummitUSA.com
More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting(TrendLabs Security Intelligence Blog) The threat group APT33 is known to target the oil and aviation industries aggressively. Our recent findings show that the group uses about a dozen live Command and Control (C&C) servers for extremely narrow targeted malware campaigns against organizations in the Middle East, the U.S., and Asia.
Remounting the Pegasus Named NSO(Beyond Search) Those who care about security will want to check out the article, “Pegasus Spyware: All You Need to Know” from the Deccan Herald. Approximately 1,400 smartphones belonging to activists, lawyers, an…
Ukrainian Railways Uncovers Bitcoin Mining Farm at Lviv Branch(CryptoGlobe) On Friday (November 15), the state-owned Ukrainian Railways (Ukrzaliznytsia) announced that it had found out that its Lviv branch was illegally operating a Bitcoin mining farm powered by the company's electricity (which is paid for by taxpayers in the country).
Beware of the 'Juice Jacking' Scam(NBC Southern California ) Travelers should beware of using public USB power charging stations in hotels, airports and other public places after a warning from the Los Angeles County District Attorney's Office.
How Fraud Stole Christmas(Terbium Labs®) We take a closer look at their growing fears about data loss, fraud, and identity theft – and how these fears could influence their choice of payment methods and impact their loyalty with businesses after their data has been compromised.
75 Percent of German Companies Affected by IT Security Incidents in 2019(Global Security Mag Online) German companies are plagued with an increasing number of cyber-attacks and IT security incidents. According to PreciseSecurity.com research, 75 percent of them have been affected by some sort of IT security incidents in 2019, causing total damage of €102.9 billion this year.
IAEA Conducts Training Course on Protecting Nuclear Facilities from Cyber-Attacks(IAEA) A mock scenario that included adversaries taking control of a nuclear research institute’s physical protection system and implanting malware at a nuclear power plant, to compromise security and cause sabotage, provided for intense learning this month, during an IAEA International Training Course (ITC) on Protecting Computer Based Systems in Nuclear Security Regimes.
Being Cybersecure Is Not Enough, Become Cyber-Resilient Instead(CircleID) Technology, for its immense evolution, has now become a significant driver of the economy – both digital and global. Along with developments and innovations such as cloud-based computing and Internet-connected mobile devices, however, cybercrime lurks in the shadows.
US Govt Recommends Vendor System Configs To Block Malware Attacks(BleepingComputer) The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) today reminded users and system administrators to properly configure their systems to defend against malware that can exploit improper configurations.
Galois to Develop Secure Computing Tech Under IARPA Program(ExecutiveBiz) Galois has received a five-year, $15.2M contract from the Intelligence Advanced Research Projects Activity to develop a software development platform to facilitate secure computation by public and private sector programmers who are not particularly skilled in cryptography.
Information overload: The promise and risk of quantum computing(Bulletin of the Atomic Scientists) Google announced a breakthrough in quantum computing, a perennially just-over-the-horizon technology that promises to dramatically increase the speed at which computers can complete complex tasks. While the technology promises to unlock vast new areas of knowledge, it carries with it national security and other risks.
GCU nationally recognized for cyber defense(Chamber Business News) Grand Canyon University has been recognized as a National Center of Academic Excellence in Cyber Defense by the NSA and Department of Homeland Security.
PNNL hosts third annual CyberForce Competition(NBC Right Now ) College students spent their Saturday at Pacific Northwest National Laboratory in Richland to compete against each other and other students around the country in a simulated cyber attack.
U.S. Said to Extend Reprieve for Huawei(New York Times) The Trump administration is set to extend a license that will allow American companies to continue doing business with the Chinese telecom giant Huawei.
U.S. Struggles to Stem Chinese Efforts to Recruit Scientists(Wall Street Journal) National security officials say universities are at the leading edge of a plan by Beijing to gain scientific expertise and illicitly leapfrog the technology gap with the West, but prosecutors face challenges proving wrongdoing in court, as new allegations in a criminal case in Kansas underscore.
Former Operator of Illegal Booter Services Sentenced for Conspiracy to Commit Computer Damage and Abuse(Department of Justice Office of Public Affairs) An Orland Park, Illinois, resident was sentenced yesterday to 13 months in prison, followed by three years of supervised release on one count of conspiracy to cause damage to internet-connected computers for his role in owning, administering and supporting illegal booter services that launched millions of illegal denial of service, or DDoS, attacks against victim computer systems in the United States and elsewhere.
Booz Allen, CACI Must Face No Poach Class Action(Bloomberg Law) Booz Allen Hamilton Inc., Mission Essential Personnel LLC, and CACI International Inc.—defense contractors that perform intelligence work in England—must face a class action accusing them of violating antitrust rules by agreeing not to hire one another’s workers, an Ohio federal court said.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
CyberCon 2019(Anaheim, California, USA, November 19 - 20, 2019) CyberCon 2019 targets executives, leaders and decision makers from the power and utilities and cybersecurity industries, including CEOs, CFOs, COOs, CSOs and CISOs, as well as national security advisors,...
CyberCon(Anaheim, California, USA, November 19 - 21, 2019) CyberCon is a solutions-based cybersecurity conference connecting executives and decisions makers in the power and utilities sector to cybersecurity experts and industry specific solutions. By attending,...
Infosecurity and ISACA North America Expo and Conference(New York, New York, USA, November 20 - 21, 2019) In November 2019, Infosecurity North America and ISACA will align in the field of security, cybersecurity and risk management to create an incredible experience for attendees in programming, solutions...
PCI SSC 2019 Asia-Pacific Community Meeting(Melbourne, Australia, November 20 - 21, 2019) The PCI Security Standards Council’s 2019 Asia-Pacific Community Meeting is the place to be. We will provide you with the information and tools to help secure payment data. We lead a global, cross-industry...
Cyber Security X Atlanta(Atlanta, Georgia, USA, November 20 - 21, 2019) Cyber Security X Atlanta is part of the fastest growing cyber security event series, providing events that uniquely cover the entire security landscape. The event will offer invaluable security insight...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.