Cyber Attacks, Threats, and Vulnerabilities
Hackers attack the IRS 145 million times a year. Now we know they got in (Quartz) Identity thieves pilfered tax records filed by some 100,000 households and tried to steal as many as 100,000 more, according to a statement from the US Internal Revenue Service, the national tax collecting agency
IRS hacker attack puts US tax payers at risk (We Live Security) The IRS, the United States government agency for collecting taxes, has admitted that for more than two months malicious hackers targeted its systems, and managed to gain access to information about more than 100,000 tax payers
IRS discloses breach, attackers used PII to clear security checks (CSO) 100,000 taxpayers affected, criminals used personal information to clear various security checks
IRS: Crooks Stole Data on 100K Taxpayers Via 'Get Transcript' Feature (KrebsOnSecurity) In March 2015, KrebsOnSecurity broke the news that identity thieves engaged in filing fraudulent tax refund requests with the Internal Revenue Service (IRS) were using the IRS's own Web site to obtain taxpayer data needed to complete the phony requests. Today, IRS Commissioner John Koskinen acknowledged that crooks used this feature to pull sensitive data on more than 100,000 taxpayers this year
Iran Says It Foiled US Cyber Attack on Oil Ministry (Al Arabiya) Iran said on Tuesday it had foiled a cyber-attack on the Islamic republic's oil ministry, and that those behind the hacking attempt were based in the United States
Website Of Nepali Embassy In US Hacked, Left With Anti-American Content (HackRead) The official website of embassy of Nepal in Washington was hacked by a group of Moroccan hacker not happy with American invasion of Iraq and what happened afterwards
Researcher Exploit Patched Windows Group Policy Bug (Threatpost) Researchers from Core Security were able to exploit a security vulnerability in Windows Group Policy — MS15-011 — that was patched in February by Microsoft
Moose — the router worm with an appetite for social networks (We Live Security) Moose — the router worm with an appetite for social networks
Exploit Kit Using CSRF to Redirect SOHO Router DNS Settings (Threatpost) Attacks targeting small office and home router DNS settings, long a target for network intruders seeking to redirect web traffic to malicious sites, have for the first time been included in an exploit kit — one that specializes in cross-site request forgery attacks
15,000 spam emails have hit the inboxes of Android users in recent days (Help Net Security) Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware that demands $500 to restore access
Android ransomware poses as FBI smut warning (Register) Call the cops! Erm, actually don't
Chrome Lure Used in Facebook Attack despite Google’s New Policy (TrendLabs Security Intelligence Blog) Just how effective is it for cybercriminals to keep using Google Chrome and Facebook to infect their victims with malware?
Cyber Attack on IDA Server Prompts License Key Replacement (Softpedia) Threat actor keeps low profile, date of the attack unknown
Beacon Health victim of cyber attack, patient information exposed (South Bend Tribune) Beacon Health Systems fell victim to a "sophisticated cyber attack," but the health agency says it hasn't found evidence of information being misused
Is It Possible for Passengers to Hack Commercial Aircraft? (Wired) When security researcher Chris Roberts was removed from a United fight last month after tweeting a joke about hacking the plane's inflight entertainment system, the security community was aghast at the FBI's over-reaction and United's decision to ban him from a subsequent flight
NATS failure down to bug from the 90s and redundant code (ComputerWeekly) A bug present in the National Air Traffic Services (Nats) IT system since the 1990s has been identified as the root cause of the five-hour outage of UK air traffic control on 12 December 2014, according to an independent inquiry
State-Sponsored Cybercrime: A Growing Business Threat (Dark Reading) You don't have to be the size of Sony — or even mock North Korea — to be a target
Profile Of A Cybercrime Petty Thief (Dark Reading) Trend Micro provides peek at methods of amateur, lone-wolf carder
What's it like to be hated by the Russian internet? (Guardian) As online space becomes increasingly toxic, Afisha talks to four prominent figures about managing torrents of personal abuse
Security Patches, Mitigations, and Software Updates
Windows 10: Securing Identity, Information and Devices (eSecurity Planet) Windows 10 includes some goodies for enterprise security professionals
Synology patches serious flaws in its network-attached storage devices (IDG via CSO) Network-attached storage (NAS) manufacturer Synology fixed several vulnerabilities in its devices' software, one of which could allow attackers to compromise the data stored on them
Cyber Trends
Why insider threats are succeeding (Help Net Securiy) Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders
Marketplace
Cybersecurity M&As And VC Investments Roundup (Homeland Security Today) The cybersecurity market is hot and growing fast, with projected growth from $71 billion in 2014 to more than $155 billion by 2019. Along with that, there's a consistent stream of mergers, acquisitions and VC investments activity
Blue Coat acquired for $2.4 billion (ChannelLife) Bain Capital, the private investment firm, has acquired Blue Coat from Thoma Bravo in an all-cash transaction valued at approximately $2.4 billion
EMC plots managed cloud push with $1.2bn deal to acquire Virtustream (ComputerWeekly) EMC is plotting a move into the managed cloud services space by agreeing to acquire enterprise-focused service provider Virtustream for $1.2bn
The Pentagon Is Rethinking a $475 Million Cyber Defense Proposal (Nextgov) Nearly a week after extending the terms of its original proposal, U.S. Cyber Command revoked a 5-year contract offer that aimed to backfill significant staffing shortages
Northrop Grumman CEO Wes Bush pushes back against Pentagon's Silicon Valley fascination (Washington Business Journal) Northrop Grumman Corp. CEO Wes Bush offered some warning to government about neglecting the defense industry as a key source of innovation for national security
Inside the company that can predict the future by analysing every piece of information on the web (Business Insider Australia) For Christopher Ahlberg, predicting the future is as simple as typing a single word into a piece of software
Products, Services, and Solutions
Check Point Delivers SCADA Security Solutions to Protect Industrial Control Systems Against Cyber Threats (Marketwired via CNN Money) New hardened security appliance with most in depth SCADA security for your critical infrastructure
Experian Data Quality launches new self-service email validation tool (PRNewswire) True software-as-a-service offering provides leading bulk email validation for transactional pricing
Developers hope that new gizmo will bring an old idea back into fashion (Ars Technica) South African Security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks. Thinkst's Canary is a simple network appliance and corresponding online monitoring service that makes it easy to set up juicy-looking targets on the corporate LAN that will sound the alarm if any attempt is made to access them
Technologies, Techniques, and Standards
A Threat Intelligence-Sharing Reality-Check (Dark Reading) Many organizations employ sharing one-way (gathering) and mainly for 'CYA,' experts say
The Cost of Bad Threat Intelligence (Active Response) There is no doubt that threat intelligence is now "a thing"
10 Threat Intelligence Goals for Financial Institutions (Recorded Future) Russell Pierce, Vice President of Cyber Security and Threat Intelligence at Regions Financial Corporation recently shared his experiences with building a threat intelligence program, and how Recorded Future contributes to its overall success
Breach detection: Five fatal flaws and how to avoid them (Help Net Security) When the Sarbanes-Oxley Act of 2002 was passed, it fell on corporate security teams to translate its requirements into technical controls. That threw the IT Security function into the deep end of the pool, and it has been sink or swim ever since
How to monitor XSS attacks and other security threats on your website, in real-time (Graham Cluley) Cross-site scripting (XSS) is a form of exploit where an attacker somehow places malicious JavaScript into a webpage
Digital Forensics and the Futuristic Scene-of-Crime (Tripwire: the State of Security) Over the years, I have written multiple articles on the subject of digital or cyber forensics and the importance it serves in supporting the modern world with regards to corporate and government incident response, first responder engagements, and more general aspects of scene-of-crime management in the digital age
CISOs turn to security awareness solutions to change poor employee behaviors (CSO) Fast growing security awareness training market exceeds $1 billion globally
Will Your Contractors Take Down Your Business? (Infosec Island) Do you know how well your vendors, business associates, contracted third parties (who I will collectively call "contractors") are protecting the information with which you've entrusted them to perform some sort of business activity? You need to know
Design and Innovation
7 Bold Tech Ideas That Will Make You Uncomfortable (InformationWeek) Elite tech leaders pushed the boundaries at the InformationWeek Conference. At least one of these ideas should make you squirm and think, "We need to do that"
Research and Development
Crystalline Cipher and cryptography snakeoil (MaldrÛid) Martijn Grooten on Twitter (with his signature sarcastic undertone) posed a weekend challenge for anyone interested in cryptography: have fun with Crystalline Cipher and show that it is fundamentally broken. Now, I've met with Martijn only once, but from that meeting I gathered that he really loves mathematics, at least as much as I do, and has a great understanding of cryptography
Legislation, Policy, and Regulation
Government axes XP for good (CRN) Extended-support agreement will not be renewed
White House: 'Political Ambitions' of Individual Senators 'Have to Come Second to National Security' (National Journal) "At some point, the political ambitions of individual members of the United States Senate are going to have to come second to the national security of the United States," Josh Earnest said Tuesday
An Approach to Ameliorating Press-IC Tensions Over Classified Information (Lawfare) I've been thinking about the exchange over the past couple of weeks — much of which took place on Lawfare — between the New York Times and the intelligence community over the naming of CIA undercover officers in a Times story
After Snowden: The Role Of The Press In National Security (WUNC) In 2013, former National Security Agency employee Edward Snowden released classified documents
Open Letter to the Commerce Department and Legislators, Regarding Wassenaar (Zdziarski's Blog of Things) I am a published and respected forensics expert who pioneered the very first forensic techniques to extract data from the iPhone as early as 2008.. Since then, I have spend several years, and much of my time, assisting numerous law enforcement and military agencies around the world, including our own
Experts Concerned About Effects of Proposed Wassenaar Cybersecurity Rules (SecurityWeek) Adding exploits to Wassenaar is bad for security, says the industry
Should MAD Make its Way Into the National Cyber-Security Strategy? (Infosec Island) Arguably, Mutually Assured Destruction (MAD) has kept us safe from nuclear holocaust for more than half a century
Litigation, Investigation, and Law Enforcement
Target's $19M Data Breach Settlement with MasterCard Collapses (Top Tech News) Retail giant Target thought it was putting its massive 2013 data Relevant Products/Services breach nightmare to bed
Silk Road Prosecutors Ask Judge to 'Send a Message' In Ulbricht Sentencing (Wired) Ross Ulbricht's billion-dollar black market Silk Road was in many ways the first of its kind, blending encryption and online drug sales in a business model that plenty of other online drug lords have since sought to emulate
US senator urges investigation into Cisco's alleged dealings in Russia (Channelnomics) Former presidential candidate brands accusations of sanction-beating measures as 'disturbing'
"Patent troll" with a big verdict against Cisco notches a Supreme Court win (Ars Technica) It takes more than a "good faith belief" to dodge a bruising patent verdict
Using Middle Finger Emoji In UAE: A Crime That Could Land You In Court (HackRead) If you are living in UAE, you should know the dangers of flipping middle finger at someone as it could land you in prison. Nonetheless, legal experts have now also cautioned that sending an 'emoji' finger-flick gesture in a message or on social media could also land you in hot waters