Cyber Attacks, Threats, and Vulnerabilities
ISIS Threat at Home: FBI Warns US Military About Social Media Vulnerabilities (ABC News) The FBI on Sunday issued the strongest warning to date about possible attacks by the ISIS terrorist group against the U.S. military inside the homeland, officials tell ABC News
Iran May Escalate Cyberattacks if Deal on Nukes Falls Through (Dark Matters) House Intelligence Committee chairman Mike Rogers believes that Iran could escalate the number of cyber attacks targeting U.S. critical infrastructure should there be a failure to reach an accord over the nation's controversial nuclear program
Hackers Using Lingo of Wall St. Breach Health Care Companies' Email (New York Times) For more than a year, a group of cybercriminals has been pilfering email correspondence from more than 100 organizations — most of them publicly traded health care or pharmaceutical companies — apparently in pursuit of information significant enough to affect global financial markets
FireEye Report Identifies Highly-Sophisticated Cyber Threat Group Aiming to Cheat Wall Street (FireEye) FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today released a comprehensive intelligence report that assesses that a financially motivated advanced threat group has been carrying out ongoing attacks against publicly traded companies in a likely attempt to play the stock market
Hackers Targeted Companies' Merger Talks (Wall Street Journal) Computer-security firm says health-care, pharmaceutical firms in hackers' cross-hairs
Did Hackers Gain an Edge on Wall Street? (Wall Street Journal) Computer-security firm FireEye FEYE -0.63% has told the Federal Bureau of Investigation that a group of cyberthieves may be attempting to gain an edge on Wall Street by targeting chief financial officers, advisory firms and others involved in mergers, acquisitions and other market-moving events
Sony Pictures hacking: North Korea cryptic over cyber leak (International Business Times) North Korea has refused to deny that it was involved with the large scale hacking of Sony Pictures that led to at least five new movies being shared online illegally
FBI Warns US Firms of Destructive Malware Attacks (Infosecurity Magazine) The FBI has been forced to issue a confidential flash warning to US firms claiming they are at risk of a new destructive malware campaign designed to wipe corporate data, in a move which may have been presaged by the attack on Sony Pictures last week
10 deadliest differences of state-sponsored attacks (CSO) There are some key differences about attacks that originate with foreign governments, and ignoring these differences could prove deadly
Cyber criminals target telcos in India, other nations with Regin (Economic Times) Cyber criminals are using a new malware — Regin — to penetrate and monitor GSM networks in India and other countries including Pakistan, Brazil, Germany and Russia, security researchers have said
Spies listening to Island's communications (Royal Gazette) Bermuda's undersea communications cables are monitored by UK and US security services, according to documents leaked by former National Security Agency (NSA) contractor Edward Snowden
Postal Service has no Annual Financial Statement Because of Hack (Nextgov) The U.S. Postal Service is not filing its required yearly financial report because management does not know if business data was altered during a recent data breach, USPS officials said
XSS Vulnerability Found in Alcatel-Lucent Carrier-Grade Switches (SecurityWeek) A reflected cross-site scripting (XSS) vulnerability has been identified in the management interface of the Alcatel-Lucent 1830 Photonic Service Switch, but the vendor doesn't plan on fixing it any time soon
Why is Facebook Flaw Still Unpatched? (GovInfoSecurity) Researcher paid a bounty, but exploit remains
Browser fingerprints — the invisible cookies you can't delete (Naked Security) Dear reader, it seems that you are causing headaches in dark corners of the web
Dridex Phishing Campaign uses Malicious Word Documents (Internet Storm Center) During the past few months, Botnet-based campaigns have sent waves of phishing emails associated with Dridex. Today, we'll examine a wave that occurred approximately 3 weeks ago. The emails contained malicious Word documents, and with macros enabled, these documents infected Windows computers with Dridex malware
Tens of thousands web servers backdoored via pirated CMS themes and plug-ins (Help Net Security) Over 23,000 websites set up with the help of Joomla, WordPress and Drupal content management systems have been compromised and used for illegal search engine optimization by an attacker who managed to social-engineer site administrators to install a backdoor on their servers
Operation DeathClick (Infosec Institute) The era of spear phishing and the waterhole attack, which uses social engineering, has come to an end. Hackers are now moving their tricky brains towards targeted Malvertising — a type of attack that uses online advertising to spread malware. A recent campaign termed "Operation death click" displays a new form of cyber-attack focused on specific targets. The attack is also defined as micro targeted malvertising. In this newly targeted variation of malvertising, the hackers are attacking their victims using micro targeting techniques and real time bidding — a recent technology that helps to post ads based on user interests
Point-of-Sale systems breached at major US parking garage operator (Naked Security) Been swiping your payment card to pay for parking in the US?
Cyber Attack Monday in City of Fort Lauderdale (Fort Lauderdale Sun-Sentinel) Cyber Monday became Cyber Attack Monday as the hacker group Anonymous made good on a threat to crash the city's website because of recent laws the city has passed regulating homeless behavior
'Cyber Attack' Means No Digital Access to Supervisors' Agendas (Lost Coast Outpost) If you're someone who checks Humboldt County Board of Supervisors agendas Monday nights to decide whether or not to attend the Tuesday meetings, well, first of all, that's kinda weird, but secondly, we have bad news. The company that makes those agendas available online "was hit by a cyber attack today," according to the county, so the agenda for tomorrow's meeting is not available through the Internet tubes
Cheapest tablets pose biggest security risks (CSO) The super-cheap Android tablets everyone bought on Black Friday and Cyber Monday could pose problems for enterprises when they arrive at the workplace after the holidays
Yahoo Mail bounces back after 11 days of downtime (Inquirer) But service unlikely has many users left
The hackers' bounty — how much do cybercriminals make from innocent users? (BizTechAfrica) Cybercriminals could be raking in profits twenty times greater than the cost of their attacks, according to figures compiled by Kaspersky Lab experts
The 10 Biggest Bank Card Hacks (Wired) The holiday buying season is upon us once again. Another event that has arrived along with the buying season is the season of big box retailer data breaches
8 holiday scams and mistakes to avoid (CSO) You're not the only one feeling merry and bright this holiday season — so are the criminals! This time of year provides them with plenty of opportunities for Scrooge-worthy scams. Here's how to ensure all they'll get is coal in their stocking
Security Patches, Mitigations, and Software Updates
Firefox releases version 34 with SSLv3 fixes, Firefox Hello (ZDNet) Mozilla has disabled SSLv3 support and added Firefox Hello to its latest version of Firefox
OpenVPN Versions Released Since 2005 Affected by DoS Flaw (SecurityWeek) The developers of OpenVPN have released a new version of the open-source virtual private network software to address a critical denial-of-service (DoS) vulnerability that can be exploited to cause servers to crash
Cyber Trends
Experian Data Breach Resolution Releases Its Second Annual Data Breach Industry Forecast (The Street) Preventing and managing data breaches have become two of the highest priorities facing businesses today. To help executives plan ahead, Experian Data Breach Resolution announces the release of its second annual Data Breach Industry Forecast, a white paper outlining key issues and trends to watch for in 2015
The persistent threat of data breaches (Help Net Security) Preventing and managing data breaches have become two of the highest priorities facing businesses today. Many evolving factors such as new threats, regulatory changes and technological advances make the data breach landscape difficult to navigate
Data Management: Brace for the Breach (Medical Marketing and Media) The specter of a massive hack is haunting the healthcare industry. As it turns out, that might not necessarily be a bad thing for everyone involved
Data loss and downtime costs enterprises $1.7 trillion (Help Net Security) Data loss and downtime cost enterprises $1.7 trillion in the last twelve months, or the equivalent of nearly 50% of Germany's GDP. Data loss is up by 400% since 2012 while, surprisingly, 71% of organizations are still not fully confident in their ability to recover after a disruption, according to EMC Corporation
Companies Struggle to Monitor for Security Threats (IT Business Edge) Where does your business stand on security readiness?
Cyber attacks impact purchasing behavior (Help Net Security) As U.S. consumers head to malls and retail websites this holiday season, they do so increasingly concerned about the safety and security of their personal information. In fact, according to KPMG, more than half of consumers are either unsure or not confident at all in the security of their personal information when shopping both in-store (58 percent) and online (63 percent)
Marketplace
Hewlett-Packard Company (HPQ)'s Only Hope is A Miracle Acquisition: Daniel Ives (Insider Monkey) Hewlett-Packard Company (NYSE:HPQ)'s CEO Margaret Whitman promised the company's investors that she is going to turn her company around with moves that perhaps do not have a parallel
The KEYW Holding Corporation (KEYW) Drops 5.18% on December 01 (Equities) The KEYW Holding Corporation (KEYW) was one of the Russell 2000's biggest losers for Monday December 01 as the stock slid 5.18% to $10.25, a loss of $-0.56 per share. Starting at an opening price of $10.75 a share, the stock traded between $10.25 and $10.91 over the course of the trading day. Volume was 202,788 shares over 1,742 trades, against an average daily volume of 302,449 shares and a total float of 37.59 million
Intel acquires digital identity manager PasswordBox (Help Net Security) Intel acquired PasswordBox, a provider of a cross-platform identity management service that gives users a way to log into all of their websites and applications from any device without having to type or remember passwords
German government says "ja" to BlackBerry's acquisition of Secusmart (Ars Technica) To get approval to buy Düsseldorf firm, BlackBerry had to sign "no-spy" deal
Raytheon establishes UK Cyber Innovation Centre (CNN Money) New cyber research, development and testing centre brings jobs to UK and extends the reach of Raytheon's network of cyber centres
ForeScout widens net for enterprise push (Channel Pro) ForeScout looks to recruit well known SIs and VARs in "aggressive" large enterprise push
Senate Explores Outsourcing Security Services (InformationWeek) The US Senate might outsource core cyber security support to a managed security service. Candidate tasks include network security monitoring, threat analysis, incident reporting, vulnerability analysis, and security engineering and research
Former Sourcefire CFO Todd Headley Joins LogRhythm's Board of Directors (BusinessWire) Security industry leader to help guide LogRhythm's rapid growth
Products, Services, and Solutions
WatchGuard launches next-gen firewalls (Trade Arabia) WatchGuard Technologies, a leader in multi-function firewalls, has launched next-generation firewall (NGFW) and unified threat management (UTM) appliances specifically engineered for mid-size and distributed enterprises
TrustPipe's Breakthrough Marker-Based Security Technology Helps Make Computers and Devices Virtually Hack-Proof (Broadway World) TrustPipe's Breakthrough Marker-Based Security Technology Helps Make Computers and Devices Virtually Hack-Proof After two years of testing in real-world deployments and at West Coast Labs, digital security vendor TrustPipe emerged from stealth mode today to introduce its breakthrough, marker-based security technology — offering a superior alternative to signature- and heuristic-based security, and helping to make computers and other devices virtually hack-proof
Susan Davis International Launches Cyber Risk Communications Practice (Fort Mill Times) Noted cyber security expert Frank Cilluffo to lead high profile team serving corporate boards and C Suite
CuckooAutoInstall — Auto Installer Script for Cuckoo Sandbox (Kitploit) What is Cuckoo Sandbox? In three words, Cuckoo Sandbox is a malware analysis system
SANS to host advanced InfoSec training in Dubai (Trade Arabia) A leading InfoSec training event is set to offer three intensive training courses on hacker techniques, web app penetration testing and reverse-engineering of malware in Dubai, UAE next month
Technologies, Techniques, and Standards
NSA Opens Up Data Automation Software For Public Use (Forbes) The Apache APA -0.44% Software Foundation (ASF) has worked with the National Security Agency (NSA) on the release of Niagarafiles (or Nifi, to the initiated) technology designed to "automate data flows" among multiple computer networks. The software is free and open source (so is available to the public) through the Apache Software Foundation. But why is automating data flows important?
Researcher Releases Database of Known-Good ICS and SCADA Files (Threatpost) A prominent security researcher has put together a new database of hundreds of thousands of known-good files from ICS and SCADA software vendors in an effort to help users and other researchers identify legitimate files and home in on potentially malicious ones
Bitcrypt: Encrypted Messages in the Blockchain (Cryptocoins News) The Bitcoin blockchain has been the scene of quite a bit of innovation beyond its currency application. There are passports, applications for fiat currency banking, and there is even talk of artificial intelligence based on the technology
5 Tips for Fighting Email Security Threats (eSecurity Planet) Email is one of a hacker's favorite tools, so companies must be smart about thwarting email-generated cyber attacks
Do you create stupid users? (CSO) Most security awareness failings are actually failings of security programs
Design and Innovation
Breaking the Code: The Role of Visualization in Security Research (Dark Reading) In today's interconnected, data rich IT environments, passive inspection of information is not enough
Research and Development
Cybersecurity concept for unmanned systems (Help Net Security) The University of Virginia School of Engineering and Applied Science Department of Systems and Information Engineering announced the success of an early-stage demonstration to improve defenses for unmanned aerial vehicles against cyber attacks. U.Va.'s System-Aware Cybersecurity concept and Secure Sentinel technology were tested in collaboration with Georgia Tech Research Institute through a series of live flight cyber-attack scenarios
Legislation, Policy, and Regulation
UN Committee Adopts Resolution on Right to Privacy in the Digital Age (Council on Foreign Relations) On November 25, 2014, the third committee of the UN General Assembly adopted a resolution that calls on states to "respect and protect the right to privacy" in the digital age. The resolution is the follow-up to a very similar motion that Germany and Brazil sponsored last year in response to the Snowden revelations. Germany and Brazil led the adoption of this year's resolution and secured over thirty-five cosponsors including Cuba and Russia, countries not necessarily known as beacons of online privacy
EU panel says 'right to be forgotten' should be worldwide right (FierceBigData) Google is under fire again with Europe at the trigger. The European Union issued new guidelines to extend the 'right to be forgotten' privacy protection for European citizens beyond European search sites. This clarification aims to push Google and other search engines to take down links across all their sites and services, without exception
Leahy, Cornyn Oppose CIA-Proposed Email Retention Regime (Roll Call) Two senior senators came out strongly Monday against a CIA plan to purge most of its email
Computers and a need for defense (Lompoc Record) As folks in the Northeast were shoveling their way out of 7 feet of snow — a month before winter's official start — and while politicians in Washington sniveled about Obamacare and immigration, the chief of America's intelligence community explained how foreign hackers could take out the U.S. electric power grid
DNI Clapper Establishes the National Counterintelligence and Security Center (Office of the Director of National Intelligence) Director of National Intelligence James R. Clapper announced today the establishment of the National Counterintelligence and Security Center. National Counterintelligence Executive William "Bill" Evanina will assume the additional role as the NCSC Director
Editorial: A full-time cyberdefense (Albany Times Union) The Issue: New York's U.S. senators want to enlist the National Guard in defense against cyber attacks. The Stakes: The threat is legitimate, but ensuring cyber security is a full-time job
The president seems ready to make big concessions to a company that can't be said to be suffering without them (ComputerWorld) The president seems ready to make big concessions to a company that can't be said to be suffering without them
How the Pentagon plans to bolster cloud security (FCW) The latest installment in the Defense Department's quest to find the right blend of security and affordability in the commercial cloud came in the form of a report released by the DOD CIO's office. The report offers "cradle-to-grave" guidance for commercial cloud providers and DOD customers, acting DOD CIO Terry Halvorsen wrote in a prefacing memo
Commerce takes bigger oversight role in its bureaus' cybersecurity (Federal News Radio) For the first time ever, the Commerce Department is building a real-time view of its overall cybersecurity posture. And with that information, it's taking on a greater oversight role over the 14 different agencies within its purview
U.S. Justice Department names new counterespionage chief (Reuters) The U.S. Department of Justice has named an experienced former federal prosecutor to oversee its counterespionage efforts, part of a broad restructuring of the national security prosecution team to deal with cyber attacks and the threat of sensitive technology ending up in the wrong hands
Litigation, Investigation, and Law Enforcement
Feds want Apple's help to defeat encrypted phones, new legal case shows (Ars Technica) Prosecutors invoke 18th-century All Writs Act to get around thorny problem
The Supreme Court is about to tackle online threats for the first time (The Verge) A case about violent Facebook posts could change how internet speech is prosecuted
'Counterfeit' domains seized by Europol (BBC) Police forces across Europe have seized 292 web domains that were being used to sell counterfeit goods, according to Europol
Cricket to pay feds $2.1M after allegations it charged too much for wiretaps (Ars Technica) Case also settles accusations that AT&T subsidiary overbilled for pen registers
Airport busts for 118 credit card fraudsters (Naked Security) A global operation to tackle online fraud led to 118 arrests across 80 airports last week, Europol has revealed
Sandia scientist gets prison term for taking DOE laptop to China (Federal Times) A former scientist at Sandia National Laboratories in New Mexico was sentenced Monday to one year and one day in prison after pleading 'guilty' to bringing restricted government equipment along on a trip to China