Cyber Attacks, Threats, and Vulnerabilities
Cyber Attack On Ministry Of Justice Website (Sky News) The Government department's site was overloaded by a distributed denial of service attack (DDoS), which left it out of action
Anonymous Ukraine Claims to hack and leak secret email conversations of Vitali Klitschko's UDAR party (HackRead) Activists in Ukraine are fighting a battle on ground, while hacktavists are putting their share online. The Anonymous Ukraine, in an email to us claimed that it has hacked and leaked hundreds of email conversations belonging to Vitali Klitschko's Ukrainian Democratic Alliance for Reform of Vitali Klitschko Party (UDAR). Hackers have uploaded the hacked email
Hacking Team Spyware 'Hits Ethiopian Journalists' (TechWeekEurope) "Lawful intercept" tech allegedly used in attacks on Ethiopian journalists, as civil rights activists fret about abuse of the software
Slides from Kaspersky's 'The Mask' malware presentation (ZDNet) Researchers shared their discovery and research on espionage malware "The Mask" (aka Careto) at the Kaspersky Labs security summit this week. ZDNet took photos of the presentation
'The Mask' malware sets standards hackers are sure to follow (CSO Salted Hash) Malicious software can steal encryption keys used in machine-to-machine communications
Vendor speaks out on Target data breach (FierceRetailIT) It is so unfortunate and strange that Target's (NYSE: TGT) massive data breach can be traced back to one vendor. An HVAC vendor at that. However, that is what investigators found after the months-long investigation into the breach
Target Corp. Breached at Weakest Link (Epoch Times) Target could be fined up to to $1.1 billion in class action suits
Target breach details: Was the retailer PCI DSS compliant? (TechTarget) I've been catching up with the latest Target breach details, and current speculation is that the retailer may not have been complying with PCI DSS regulations in a number of ways. Can you shed any light on the incident? What PCI provisions may have been violated
Cyber attack on bitcoin a big warning to currency's users (Reuters via the Chicago Tribune) A massive cyber attack from unknown sources that has been spamming bitcoin exchanges is highlighting some of the dangers people can encounter when they exchange cash for digital currencies like the bitcoin, experts said on Wednesday
Sands cyber attack raises privacy concerns (Fox5 Vegas) The websites for the Venetian and Palazzo are still down after hackers attacked the Las Vegas Sand Corp. on Monday. The hack seems to be politically motivated. Anti-weapons of mass destruction messages were posted with a picture of Sands Chief Executive Officer Sheldon Adelson with Israel's prime minister
Absolute Computrace anti-theft software can be remotely hijacked (Help Net Security) Kaspersky Lab's security research team published a report confirming and demonstrating that the weak implementation of anti-theft software marketed by Absolute Software can turn a useful defensive utility into a powerful utility for cyberattackers
Online love scams flourish around Valentine's Day (CSO Salted Hash) Online dating and romance sites are obviously popular and because of that, regardless of the millions of admonitions to watch out for con artists, they are also a growing favorite of heartless scammers
In the wild: Phony SSL certificates impersonating Google, Facebook, and iTunes (Ars Technica) Bogus credentials may be enough to ensnare some smartphone apps, researchers say
Linksys Worm Captured (Internet Storm Center) Finally our honeypot did capture something that looks like it is responsible for the scanning activity we see
Oracle Confirms Existence of 30 Security Holes in Java Cloud Service (Softpedia) Security Explorations has informed me that Oracle has confirmed the existence of the 30 Java Cloud Service security issues reported to the company in late January
Malicious campaign relies on rogue WordPress sites, leads to client-side exploits through the Magnitude exploit kit (Webroot Threat Blog) In a cybercrime ecosystem populated by commercially available WordPress brute-forcing and mass vulnerable WordPress installation scanning tools, cybercriminals continue actively capitalizing on the platform's leading market share within the Content Management System's market segment
Embassy Suites Acknowledges Data Breach (eSecurity Planet) Credit card information was illegally obtained 'with a manual device,' according to the hotel
Security Patches, Mitigations, and Software Updates
MS update coming to block MD5 digital certificates (ZDNet) On Patch Tuesday, Microsoft will issue an update that removes support for TLS/SSL and other digital certificates that use MD5 hashes
Cyber Trends
Why hacktivism scares security leader Eugene Kaspersky (CDN) There are a lot of threats in the cyberworld but one that concerns Eugene Kaspersky the most is hacktivism
Cyber security experts face big challenges in wake of Target breach (Phoenix Business Journal) Institutionalizing cyber security standards and certifications. Quantifying economics of cyber defense to companies. Finding ways to automate fraud detection to reduce human capital investment
US Companies Ahead Of Their European Counterparts In Cyber Security Readiness, Survey Reveals (gnomes) Hacktivism and malicious insider threats (intentional leaks) perceived to be on the rise
Marketplace
Lockheed Martin CEO Hewson pushes small business incentives for cyber adoption (Baltimore Business Journal) Lockheed Martin Corp. CEO Marillyn Hewson is pushing incentives for small and midsize businesses to comply with a new cyber security framework announced by the Obama administration Wednesday to lock down the country's most vulnerable computer networks
Failed Obamacare website-maker scored $6 billion Homeland Security contract weeks before flop went live (Daily Caller) The company that botched the Obamacare website landed a five-year, $6 billion contract with the Department of Homeland Security (DHS) less than a month before the Obamacare site disastrously went live
Trend Micro targets 35% revenue growth in 2014 (The Sun Daily) Security software company Trend Micro Malaysia Sdn Bhd is targeting 35% growth in revenue this year, driven by its consumerisation, cloud and virtualisation as well as cyber threat solutions
FireEye Still Operating at a Loss, Despite Revenue Growth (eSecurity Planet) Enterprise security firm FireEye grows revenue by 94 percent in 2013. But that increase wasn't enough for it to turn a profit
Why FireEye, Inc. Shares Plunged (The Motley Fool) Although we don't believe in timing the market or panicking over market movements, we do like to keep an eye on big changes — just in case they're material to our investing thesis. What: Shares of FireEye (NASDAQ: FEYE ) plunged 11% Wednesday after the cyber-security specialist beat expectations with its fourth-quarter results, but followed with disappointing forward guidance
RedSeal Networks Appoints Board Chairman Ray Rothrock Chief Executive Officer (Fort Mill Times) RedSeal Networks, the leader in network infrastructure security management, today announced that Ray Rothrock, chairman of the board of directors, is appointed chief executive officer
Christian Mezger Promoted to CFO at Ciber (GovConWire) Christian Mezger, formerly senior vice president of finance at information technology consulting company Ciber (NYSE: CBR), has been promoted to chief financial officer
Michelle Hertz Promoted to General Counsel at CGI Federal (GovConWire) Michelle Hertz — who joined CGI Federal as managing counsel in 2010 and is also a vice president and corporate secretary there — has been promoted to general counsel, GovCon Wire has learned
Products, Services, and Solutions
Richard Clarke: Context Relevant, Good Harbor Team to Help Target Cyber Threats (GovConWire) Good Harbor Security Risk Management and big data analytics software developer Context Relevant have forged a cybersecurity alliance that will work to help customers counter threats
Carahsoft to Offer ReversingLabs Products on GSA Schedule; Michael Shrader Comments (ExecutiveBiz) Carahsoft Technology has added cyber threat product provider ReversingLabs to its General Services Administration schedule as part of a partnership on bringing ReversingLabs' solutions to public-sector customers
Bitdefender Wins AV-TEST #1 Spot in Protection and Performance (Broadway World) Bitdefender, the innovative provider of antivirus software solutions, was confirmed as the global leader in its field after winning awards for both protection and performance in 2013's independent home user trials by AV-TEST. Bitdefender earned perfect scores for protecting users against malware and zero-day attacks and maintaining the lowest possible impact on the system
Wombat Security Technologies Adds Automation to Security Awareness and Training to Significantly Improve Employee Response to Potential Cyber Attacks (CEN) Wombat Security Technologies (Wombat) today announced a market innovation in security awareness training that automates educational programs to dramatically improve employee engagement in, and completion of, cyber security training
HP says server security and safety updates will remain free (Help Net Security) The news that starting on February 19, HP will provide firmware updates for its servers only to customers with a valid warranty, Care Pack Service or support agreement, has hit like a ton of bricks those who haven't and don't intend to pay for the service
Technologies, Techniques, and Standards
Feds Launch Cyber Security Guidelines For US Infrastructure Providers (InformationWeek) The White House on Wednesday released the first version of its cyber…the Department of Homeland Security is also launching a voluntary Critical
Framework for Improving Critical Infrastructure Cybersecurity (NIST) The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation's security, economy, and public safety and health at risk. Similar to financial and reputational risk, cybersecurity risk affects a company's bottom line. It can drive up costs and impact revenue. It can harm an organization's ability to innovate and to gain and maintain customers
NIST Roadmap for Improving Critical Infrastructure Cybersecurity (NIST) This companion Roadmap to the Framework for Improving Critical Infrastructure Cybersecurity ("the Framework") discusses NIST's next steps with the Framework and identifies key areas of development, alignment, and collaboration. These plans are based on input and feedback received from stakeholders through the Framework development process particularly on the "Areas for Improvement"
section of the Preliminary Framework, which has been moved to this document
Cybersecurity framework released with incentives unfinished and privacy appendix gone (FierceGovIT) The federal government today released a framework for cybersecurity meant for voluntary adoption within the private sector while acknowledging that work remains to be done in constructing incentives for adoption, and within the framework itself
White House Unveils Cybersecurity Plan For Big Firms, Looks To Silicon Valley Next (TechCrunch) The Obama administration unveiled Wednesday a long-awaited plan for bolstering the cybersecurity of critical-infrastructure providers — including big information technology and communications companies — and is gearing up to try to enlist smaller Silicon Valley shops in its battle against hackers
Verizon Comments on NIST Cyber Framework (Wall Street Journal) President Obama on Wednesday (Feb 12) released the National Institute of Standards and
AWWA Releases Cybersecurity Guidance Document (EP Magazine) The association notes that the FBI, the Department of Homeland Security, and the National Intelligence Agency agree cybersecurity is … available guidance document to help water utilities reduce their vulnerability to cyber attacks
How Big Data Could Help the U.S. Predict the Next Snowden (Defense One) National Intelligence Director James Clapper, at Tuesday's Senate Armed Services Committee hearing, asserted (again) that malevolent insiders with access to top secret material, like Edward Snowden, constituted a top threat to our nation's national security. The lawmakers agreed and pressed Clapper to explain how he was changing the practices within his office and across the intelligence community to prevent another Snowden-scale data breach. One key step that Clapper outlined: our nation's top intelligence folks will become subject to much more surveillance in the future
PayPal chief says his staff should remember their PayPal passwords. I say he's wrong (Graham Cluley) A bigwig at PayPal says staff can clear off if they can't remember their passwords. But, I say he's wrong. It's a good thing if you can't remember your passwords
Revamping an old technology to jam the GPS jammers (Naked Security) Illegal GPS jammers, sold cheap online, can endanger space stations and ship navigation, not to mention potentially preventing emergency calls or keeping rescue teams from homing in on injured people. But recently, a new version of an old, longwave technology, eLORAN, is showing great promise in
Biometric authentication adds layers of IT security, one blood vessel at a time (TechTarget) Google most common passwords 2013, and you'll find that 123456 has nudged out password for the No. 1 spot. Yep, those easy-to-remember and oh-so-easy-to-hack favorites are still in play. (Cue the collective CIO sigh.) But there's good news on the not-so-distant horizon
How PCI 3.0 changes the PCI DSS penetration testing requirement (TechTarget) I saw that the PCI DSS 3.0 preview made penetration testing a requirement for everyone, including SMBs. Could you detail what exactly is required out of PCI DSS penetration tests to achieve compliance? What do you think would be the cheapest method for SMBs to meet this requireme
How Windows XP end of life conflicts with PCI DSS requirement 6.2 (TechTarget) I work for a regional retailer, and we still utilize Windows XP machines throughout most of the organization. Our IT team has tried to convince higher-ups of the need to migrate to newer OSes, but they frankly don't seem to care, as long as the machines they have are still functioning. We process millions of card transactions a year, so we're obviously subject to PCI DSS requirements. I'm curious how Windows XP reaching end-of-life status will impact our PCI compliance status. Will it matter to a QSA that we're running XP machines, and if so, is there a way to stay compliant, particularly after XP updates end in 2014
Academia
NU announces collaboration with Indian institute (SFGate) The University of Nebraska says it's collaborating with the Indian Institute of Technology Delhi to study information assurance and cyber security
Legislation, Policy, and Regulation
On NSA surveillance, privacy panel presents divided front (CBS News) Internal divisions were on full display Wednesday as the panel of privacy experts that reviewed the National Security Agency's mass surveillance program testified before a Senate committee
NSA Surveillance Proponent Unsure if Program Will Continue (Defense News) A vocal proponent among US Senate liberals for controversial National Security Agency (NSA) surveillance efforts says the program could be shut down, and experts are unsure how many Americans' phone numbers have been gathered
A Coalition Unites To Fight NSA Overreach (TRNS) TRNS spoke with Linda Schade, the Communications Director for Defending Dissent, about what this call for action means and what those concerned with the invasion of privacy want
Lawmakers want to see the 'black budget' (The Hill) Dozens of House lawmakers want the Obama administration to release the secret "black budget" used to fund intelligence agencies
Litigation, Investigation, and Law Enforcement
Joint Statement by Director of National Intelligence James Clapper and Attorney General Eric Holder on the Declassification of Additional Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act February 12, 2014 (IC on the Record) On Jan. 3, 2014, the Director of National Intelligence declassified and disclosed publicly that the U.S. government had filed an application with the Foreign Intelligence Surveillance Court seeking renewal of the authority to collect telephony metadata in bulk, and that, on Jan. 3, 2014, the court renewed that authority. The Director of National Intelligence also announced that the Administration was undertaking a declassification review of the court's Jan. 3 primary order
US senator sues President Obama to stop NSA metadata dragnet (Ars Technica) Class action suit wants to nix NSA programs, but some say it's a hopeless case
Spy Agencies Send Congress Faulty Contractor Data: GAO (Bloomberg) Civilian U.S. intelligence agencies have provided unreliable and incomplete reports to Congress since 2011 on the use of private contractors who perform core functions, according to a new congressional audit
Silk Road-alike "Utopia" dark-net market seized by Dutch police (Naked Securirty) It was meant to rival Silk Road, which the US FBI shut down in October and which sold the same type of merchandise: drugs, firearms, stolen bank account information and forged identity documents
European press chief to UK: Ease up on Guardian over Snowden leaks (Reuters) Europe's main media freedom watchdog told Britain on Wednesday it believed political pressure applied to the Guardian newspaper over its handling of leaked intelligence data could have a "chilling effect" on independent journalism