Cyber Attacks, Threats, and Vulnerabilities
Al Qaeda seeks to incite violence after US recognizes Jerusalem as Israel's capital (FDD's Long War Journal) Al Qaeda's general leadership and regional branches have released statements denouncing the US decision to recognize Jerusalem as Israel's capital.
Unmasked: Anonymous Historian Leaked Islamic State Secrets (Voice of America) He led a secret double life as the blogger Mosul Eye, documenting Islamic State’s atrocities for the world. Now in Europe on Dec. 5, 2017, Omar Mohammed no longer wants to remain anonymous.
Cybersecurity Expert: Iranian Hacking is a “Coordinated, Probably Military, Endeavor” (The Tower) On the heels of a report this week documenting Iran’s increasingly aggressive hacking attacks around the globe, a cybersecurity expert assessed that the advanced nature of the attacks suggests a “coordinated, probably military, endeavor,” CyberScoop an online industry news site reported Thursday.
Malware-free attacks on the rise as line between cybercrime and nation states blurs (SC Media US) Malware-free or fileless, attacks are on the rise as the lines between nation-state sponsored attack groups and eCrime threat actors are blurred.
Malwarebytes sees New Mafia launching cyber-attacks (Enterprise Times) Malwarebytes releases a report looking at the rise of the New Mafia as cybercrime creates new gangs of criminals, including those with government support
Dark web’s key to success nothing sexy, it’s just ‘good customer service’ (VIDEO) (RT International) .Jamie Bartlett, author of The Dark Net, spoke to RT about the dark web and protecting yourself online
Untangling the Patchwork Cyberespionage Group (TrendLabs Security Intelligence Blog) Patchwork is a cyberespionage group known for targeting diplomatic and government agencies that has since added businesses to their list of targets.
HP laptops found to have hidden keylogger (BBC News) A researcher finds more than 460 models have the hidden software pre-installed.
Researcher finds keylogger on HP laptops (Computing) Laptops exposed through Synaptics Touchpad driver
MoneyTaker group: Group-IB uncovered a cyber gang attacking banks in the USA and Russia (Security Affairs) Group-IB spotted the operations of a Russian-speaking cyber gang tracked as MoneyTaker group that stole as much as $10 million from US and Russian banks.
Windows 10: UK's GCHQ found out how to hack Windows Defender to own your PC (ZDNet) And it didn't keep the vulnerability to itself.
Is source code inspection a security risk? Maybe not, experts say (CSO Online) Some information security insiders raised a red flag when Russian requests to review security software code became known. The controversy may be a tempest in a teapot.
1.4 Billion Clear Text Credentials Discovered in a Single Database (Medium) A Massive Resource for Cybercriminals Makes it Easy to Access Billions of Credentials.
Android Flaw Allows Attackers to Poison Signed Apps with Malicious Code (Threatpost) An Android vulnerability called Janus allows attackers to inject malicious code into signed Android apps.
Android vulnerability allows attackers to modify apps without affecting their signatures (Help Net Security) Among the many Android vulnerabilities patched by Google this December is one that allows attackers to modify apps without affecting their signatures.
Secure Apps Exposed to Hacking via Flaws in Underlying Programming Languages (BleepingComputer) Research presented this week at the Black Hat Europe 2017 security conference has revealed that several popular interpreted programming languages are affected by severe vulnerabilities that expose apps built on these languages to attacks.
Orcus RAT Campaign Targets Bitcoin Investors (Security Week) In an attempt to benefit from the recent spike in the value of Bitcoin, the authors of a remote access Trojan have started targeting Bitcoin investors with their malicious software, Fortinet has discovered.
P[0]rnographic malspam pushes coin miner malware (SANS Internet Storm Center) On Saturday 2017-12-09 and Sunday 2017-12-10, I came across a wave of malicious spam (malspam) with links to a Bitcoin miner disguised as p[0]rnographic material.
Phishing Attacks on Bitcoin Wallets Intensify as Price Goes Higher and Higher (BleepingComputer) It was only natural that the Internet's cyber-criminal element would turn its gaze towards the Bitcoin ecosystem after the cryptocurrency's price has surged from $11,000 on Monday to almost $17,500 earlier today.
Apple let a knockoff version of one of the world’s biggest crypto wallets into the App Store (TechCrunch) An app masquerading as MyEtherWallet.com, one of the internet's most popular services for storing ETH and other crypto coins, has made its way to the top of..
Bitcoin futures are now tradable on the CBOE (TechCrunch) Bitcoin futures trading on CBOE, the world's largest futures exchange, just launched at 5pm CT. Within a minute of the launch bitcoin spiked about 10% from..
How to Explain the current surge in the Bitcoin price? (Bankless Times) Bitcoin has demonstrated phenomenal growth - and many are asking how and why this has happened? There are several factors which are immediate visible on th
Will bitcoin go bust as it tops $17,000? Maybe, says Raleigh attorney and cryptocurrency evangelist (WRAL TechWire) Blockchain evangelist John Fallone, an attorney and entrepreneur in Raleigh, thinks this "bitcoin crash" so speculated upon will be something we can ride out - if it happens at all.
The cryptocurrency conundrum (The Statesman) Cryptocurrency is the term used to denote a set of currencies which are a subset of digital currencies using the technique of cryptography and which exist only on the digital platform. As of July 2017, there are 900 digital currencies in existence. Bitcoin is best known of such currency formats and is based on the …
00Bitcoin! British Spy Agency to Review Potential Bitcoin Risks (Bitcoinist.com) The UK is calling upon its spy agency, the GCHQ, to review the potential risks that Bitcoin can bring and share that information with other government depa
Blackbook: Another Darknet Social Media Site Hacked (DarkOwl) While shoppers were off searching for the best Black Friday deals the day after Thanksgiving, users of Blackbook, commonly considered the "Facebook of Tor," were in for a shock when their regular login screen was replaced with an ominous image and a message alerting users that Blackbook ha
The Cumulative Effect of Major Breaches: The Collective Risk of Yahoo & Equifax (Security Week) Until quite recently, people believed that a dizzying one billion accounts were compromised in the 2013 Yahoo! breach… and then it was revealed that the real number is about three billion accounts.
Think twice before buying a connected toy (The Verge) Lots of kids will be gifted connected toys this holiday season, and while I'm all for spoiling children, I also suggest thinking about the risks that come with an internet-connected plaything. Many...
Security Patches, Mitigations, and Software Updates
HPSBHF03564 rev 1 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality (HP Customer Support) Notice:: The information in this security bulletin should be acted upon as soon as possible.
Microsoft Patches Two Critical Defender Bugs (Infosecurity Magazine) Microsoft Patches Two Critical Defender Bugs. RCE flaws spotted by UK’s National Cyber Security Centre
Cyber Trends
Welcome to the age of digital warfare. Here's what the future holds. (Futurism) These battles are more pernicious and less visible than the typical.
Exposing Russian Interference - The Value of Real-Time Forensics (The Cipher Brief) Russian President Vladimir Putin has sought to exploit open and free U.S. cyberspace, which serves as a force multiplier for commerce and freedom of expression, with hacking and discoverable influence operations. Conducting all-source forensics following these Russian attacks on our democratic process, U.S. social media networking sites are in the incident response phase ...
What’s the military’s role in fighting fake news? (C4ISRNET) Understanding today's information warfare is key to U.S. training and operations to achieve superiority or dominance in cyberspace, Department of Defense officials agree.
Fake news, cybercrimes to gain more ground in 2018 – cybersecurity experts (Rappler) Global losses through business email compromise scams are expected to increase to $9.1 billion in 2018
Tech Companies' Transparency Efforts May Be Inadvertently Causing More Censorship (Motherboard) When should American companies comply with government censorship requests?
'Nature' Editorial Juxtaposes FOIA Email Release With Illegal Hacking (Motherboard) One of science's most important publications assumes science journalists don't know how to do their jobs.
Centrify predicts how to turn the cybersecurity tide in 2018 (Impress) Centrify, a leader in securing hybrid enterprises through the power of identity services, has identified seven trends that will shape enterprise security in Australia and New Zealand during 2018.
Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now (Security Intelligence) The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
The State of Cybersecurity in the Legal Industry: Are Things Improving? (Law.com) ALM Intelligence’s third annual cybersecurity study of law firms and law departments has found that law firms and law departments are increasingly being tasked by C-Suite and management to take the lead on cybersecurity. Yet, both law firms and law departments continue to struggle with their preparation and response to the cyber threat.
How Email Open Tracking Quietly Took Over the Web (WIRED) You give up more privacy than you might think each time you open an email.
Marketplace
WannaCry and NotPetya Had Little Impact on Security Spend (Infosecurity Magazine) WannaCry and NotPetya Had Little Impact on Security Spend. Security teams still underfunded and under-appreciated, says AlienVault
Post-Breach Carnage: Worst Ways The Axe Fell in 2017 (Dark Reading) Executive firings, stock drops, and class action settlements galore, this year was a study in real-world repercussions for cybersecurity lapses.
Ukroboronprom head: Ukraine’s military industrial complex during hybrid warfare (Defense News) Hybrid war in the east of Ukraine forced us – taking into account combat experience – to develop unmanned equipment for performing various tasks on the battlefield without putting our soldiers’ lives at risk.
Menlo Security secures $40 million Series C to keep malware at bay (TechCrunch) Menlo Security, a startup with a unique approach to protecting your company from malware and phishing attacks, announced a $40 million Series C round today...
Security Technology Startup Closes Series C Funding (NewsCenter.io) Contrast Security announced the close of a new round of Series C financing from AXA Strategic Ventures and Microsoft Ventures. Contrast Security’s technolo
3 Top Cybersecurity Stocks to Consider Buying Right Now (The Motley Fool) The threat posed by hackers will only grow, which means the opportunities for Palo Alto Networks, Fortinet and Cyberark will too.
$322M NGA cyber contract trains war fighters, protects their eye in the sky (Fifth Domain) NGA provides intelligence on geospatial imagery and mapping information, which is used by the U.S. military for planning and response for national disasters, combat, terrorist attacks and other events. But those assets are being threatened by cyberattacks as nation-states and non-nation actors attempt to disrupt or intercept that information.
Start-ups see opportunity in tackling fake news (Financial Times) Fighting misinformation on social media has proved lucrative for some companies
Betamore CEO departs for cybersecurity firm (Baltimore Sun) Betamore CEO Jen Meyer will become ZeroFox vice president
Skybox Security names Uri Levy as new VP of Worldwide Channels (ANI) Global leader in cybersecurity management Skybox Security has announced Uri Levy as the new Vice President of Worldwide Channels to lead the growth of the company's global reseller network.
Sydney security startup LMNTRIX hires former Symantec & CA exec (Security Brief) Vic Mankotia is now LMNTRIX's new vice president of Strategic Alliances.
Products, Services, and Solutions
New chat bot targeting New Zealand's cybercrime issue (New Zealand Herald) Netsafe has unleashed a new weapon aimed at beating scammers at their own game.
VMware partners with Carbon Black for security in virtual data centre (The Stack) VMware and Carbon Black have finalised a new security product that uses smart whitelisting for software-defined data centres.
How to Encrypt All of the Things (WIRED) Want to keep outsiders from listening in on your chats, phone calls, and more? Encrypt them. All of them.
SafeDNS Tackles Wi-Fi Router Security (eSecurity Planet) The web filtering specialists is working with Wi-Fi router vendors to help keep users safe on the internet.
LeClairRyan Launches Technology and Innovations Practice Team (PRNewswire) LeClairRyan has launched a new cross-office, cross-disciplinary practice team...
Technologies, Techniques, and Standards
NIST Publishes Second Draft of Cybersecurity Framework (Security Week) The National Institute of Standards and Technology (NIST) announced this week that it has published a second draft of a proposed update to the “Framework for Improving Critical Infrastructure Cybersecurity,” better known as the NIST Cybersecurity Framework.
Severe cybersecurity attacks need stronger response plans, 9/11 investigator warns (CSO) Companies are getting better at detecting breaches – but must be prepared to mount large-scale crisis responses as increasing sophistication amongst cybercriminals blurs the distinction between nation-state attacks and malicious intruders.
Fighting Automation with Automation (Security Week) Disruptions caused by autonomous malware could have devastating implications
A layered approach to modern identity (Help Net Security) The modern identity is changing fast, but many organizations are slow to adopt new security approaches due to the negative impact on user experience.
Physical Measures to Amp Up Your Digital Security (WIRED) Not every digital problem requires a software solution. For an added layer of safety, look to these real-world reinforcements.
Using Machine Learning Concepts and Applying to Cryptography (Infosecurity Magazine) How three AI networks adversely interacted together to learn how to protect their communications.
How to Rip the Mics Out of Your MacBook and iPhone (WIRED) One way to make sure no one's listening in on your private conversations? Drop the mics. Literally.
Take These 7 Steps Now to Reach Password Perfection (WIRED) Admit it: Your passwords aren't great. But if you fix them up, you'll have a solid first-line digital defense.
Resist Phishing Attacks with Three Golden Rules (WIRED) They're preying on your emotions. Don't get stuck on their digital hooks.
The A-B-C’s of Keeping Your Kids Safe Online (WIRED) You can't lock your offspring out of the internet forever. But you can prepare them to navigate it properly.
Tips for keeping your phone safe from cyber threats while travelling (Channel News Asia) Travelling these days is made much easier with technology. But mobile devices could also ruin your vacation, if you become a victim of cybercrime overseas.
CrowdStrike compiles 'casebook' of cybersecurity's important lessons (Security Brief) The casebook found that attack trends towards fileless malware, such as those that execute code from memory, made up 66% of all attacks.
Design and Innovation
Blockchain vs. Bitcoin: In 2018, Will We Finally Get the Difference? - RTInsights (RTInsights) What will 2018 bring in the world of edge technologies? Will we finally get that blockchain isn't (just) Bitcoin? Will self-driving cars get a conscience?
Microsoft has set up an internal AI University to try and get around the skills shortage (Business Insider) The company is competing with Google, Amazon, Facebook and others for the best minds.
Research and Development
Google AI teaches itself ‘superhuman’ chess skills in four hours (Naked Security) Move aside, ugly, giant bags of mostly water, the computers are teaching themselves now
Academia
Louisiana Tech opens Cyber Training Center (News@Tech) A ribbon-cutting ceremony Thursday morning at the National Cyber Research Park in Bossier City commemorated Louisiana Tech’s most recent step toward delivering both greater college and career opportunities to Shreveport-Bossier, and greater cyber support and training to both the area’s students and the nation’s military.
Legislation, Policy, and Regulation
Will IoT botnets catapult the industry toward security regulation in 2018? (Help Net Security) The next attack will be larger than the DDoS attack caused by Mirai and that it will create enough impact to trigger government regulation of IoT.
Cybersecurity is a challenge we must push up the political agenda (Times) Michel Barnier, the EU’s chief Brexit negotiator, has announced that the UK will be no longer be a member of Europol once it leaves the EU. Yet the nature of modern-day organised crime knows no...
NO DEAL: How Secret Talks With Russia to Prevent Election Meddling Collapsed (BuzzFeed) With the 2018 midterms on the horizon, Moscow proposed a sweeping noninterference agreement with the United States, US officials tell BuzzFeed News. The Trump administration said no.
New rule coming for US names mentioned in spy reports (Statesman) President Donald Trump's national intelligence director next month will tighten rules for providing...
Here’s how Ellen Lord will reduce acquisition time by 50 percent (Defense News) The Pentagon’s top acquisition official plans to cut the time for early lead procurement by 50 percent, with a future goal of compressing the timeline of request for proposals to contract on major defense acquisition programs from two and a half years down to about 12 months.
How US Army Cyber Command plans to increase employee morale (Fifth Domain) Despite a rocky start in its inaugural year being assessed by the Partnership for Public Service, U.S. Army Cyber Command is taking steps to help create a healthier work environment for the future.
Coast Guard Cyber Command 'just as important as cutters and aircraft' (FederalNewsRadio.com) The Coast Guard's Cyber Command has to balance its identity as a military service with its role as a component of the Homeland Security Department.
Essye Miller named acting CIO at the Department of Defense (Fedscoop) The Department of Defense announced on Friday that it has found a new acting CIO — none other than Pentagon CISO and Deputy CIO Essye Miller. Miller steps into a role left open when President Donald Trump named John Zangardi CIO of the Department of Homeland Security back in October. Zangardi had been filling the role since …
Qiliho calls to regulate cyber space (Fiji Times) Police Commissioner Brigadier General Sitiveni Qiliho has called for the regulation of cyber space.
Victims of cybercrime must be better informed on methods of protection - Miriam Dalli (MaltaToday) The Labour MEP stressed the need for people learning to protect themselves against negative consequences, including reputational damage
Stefanik talks cybersecurity improvements, challenges (Watertown Daily Times) U.S. Rep. Elise M. Stefanik, R-Willsboro, spoke Thursday to the Times about recent efforts to improve the nation’s cybersecurity strategy.
Guide to Section 702 Value Examples (IC on the Record) Set forth below is a guide to officially released information on the value of information collected under Section 702 of the Foreign Intelligence Surveillance Act (FISA).
No right answer yet to ‘privacy vs security’ parley (The Hindu) Expect one in 3-5 years, says Huawei’s cybersecurity chief, who is also impressed with the massive scale of Aadhaar
This is the future if net neutrality is repealed; the creeping, costly death of media freedom (TechCrunch) When a country lacks an open internet, the government (and companies friendly with said government) are able to do anything from simply blocking or banning..
Litigation, Investigation, and Law Enforcement
Report: Bangladesh asks NY Fed to join lawsuit for cyber heist (TheHill) Officials from Bangladesh's central bank encouraged counterparts from the New York Federal Reserve last month to join a lawsuit against Manila-based Rizal Commercial Banking Corp (RCBC) for its role in routing stolen funds in an $81 million cyber heist
PlexCoin Scam Founder Sentenced to Jail and Fined $10K (Motherboard) The Canadian scam made international headlines.
Is Bulgaria sitting on $3.5 BILLION worth of Bitcoin seized from criminals? (Graham Cluley) Bulgarian police say criminals planted of malware on customs' computer networks to slip shipments through without paying tax... but what happened to the Bitcoins?
Governments Using Crypto as a Reason to Spy on Us (Cointelegraph) Are governments trying to use cryptocurrencies as another reason to spy on us?
Lawsuits Lurk if Foreign Surveillance Law Not Reauthorized (Bloomberg Law) Communications providers ordered to assist government efforts to monitor foreigners abroad may bring court challenges if the government proceeds with surveillance without Congress renewing the underlying law, former […]
Experts Look For Lessons in FDA's Pacemaker Cybersecurity Recall (Regulatory Affairs Professional Society) In a paper in JAMA this week, two experts highlight lessons that could be learned from the US Food and Drug Administration's (FDA) first major cybersecurity-related recall for a permanent implantable medical device.
ABA Warns Judges of Ethical Problems Over Benches’ Internet Research (New York Law Journal) A formal opinion issued Friday from the ABA's ethics committee outlines when judges should or shouldn’t use the internet for their own research.
The Trump-Russia Probe Is About to Get Uglier (Bloomberg) Unpleasant facts are spilling out. Republicans don't want to know them.
The U.S. Media Suffered Its Most Humiliating Debacle in Ages: Now Refuses All Transparency Over What Happened (The Intercept) How did ”multiple sources” all innocently feed the same false information to multiple media outlets? The refusal of CNN and MSNBC to say only compounds the damage they caused.
Bias allegations in Robert Mueller's probe offer Trump allies a new counterargument (Washington Examiner) White House officials received a gift from special counsel Robert Mueller’s team this week in the form of revelations about questionable beh...
The FBI Is No Friend of Liberty and Justice (Reason) The FBI's handling of the Michael Flynn case is disturbing.
The Unsolved Mystery of Michael Flynn’s Plea Deal (Foreign Policy) It might be a dramatic breakthrough in the investigation of Donald Trump — or a revelation of Robert Mueller’s weak hand.
Uber settles lawsuit with woman who accused executives of obtaining medical records after she was raped (TechCrunch) Uber has settled its lawsuit with a woman (Jane Doe) who accused its now-former CEO Travis Kalanick, president of business in Asia Eric Alexander and SVP of..
Judge orders man to serve 29 months after he pleads guilty to online fraud (Ars Technica) DOJ cracks down on online scammers who trick people on eBay and other sites.