We're pleased to announce our new subscription program, CyberWire Pro, launching early in 2020. For cyber security professionals and others who want to stay abreast of our rapidly evolving industry, CyberWire Pro is a premium news service that will save you time as it keeps you informed. Learn more and sign up to get launch updates here.
AT&T Cybersecurity teamed up with 451 Research to survey organizations on their 5G security plans. Download today and see organizations’ 5G cybersecurity preparedness responses followed by gap analysis on what’s possibly being overlooked plus recommendations for strengthening 5G security efforts.
Criminal2Criminal commodities: Buran and Buer. The Great Cannon opens fire. Trolling in Kaunas.
McAfee offers some updates on the Buran family of ransomware it first described in May. Buran (that is, “Blizzard”) is widely traded in Russophone criminal souks, where it’s flacked as a “stable offline cryptoclocker, with flexible functionality and support 24/7.” The Rig exploit kit is a common delivery mechanism.
Elsewhere in the criminal-to-criminal market, Proofpoint is following “Buer,” which it describes as a new loader. Buer has been distributed through malvertising that redirects to the Fallout exploit kit; it’s also being pushed by phishing, the payload carried in malicious Word document macros. The going price for Buer is $400.
Russian trolls have been active against public opinion in Lithuania, with an uptick in activity noticeable since early September. The target is NATO; the messaging trades on Second World War fears of Germany and Cold War fears of the US, with the now-familiar memes portraying local authorities as untrustworthy. Lithuania’s government is working against the disinformation, but is tight-lipped about specifics on opsec grounds, Nextgov reports.
Today's issue includes events affecting Australia, China, Denmark, Iran, Democratic Peoples Republic of Korea, Lithuania, NATO/OTAN, Russia, Saudi Arabia, United Arab Emirates, and United Kingdom and the United States.
Bring your own context.
A perspective on election risk.
"I am becoming less and less concerned with the actual physical mechanism of voting because, as I mentioned earlier, I think the companies are doing a pretty good job on putting in access controls to those. What I actually am getting more concerned about is what I would consider left of the voting day, and that is the hacking of the voter database rolls, hacking at the DMV because that's connected to the election system. I'm worried about phishing. I'm worried about spoofing of websites on the day of the election, producing false information or misinformation, saying that a particular polling place is closed, or there's an email that looks like it's coming from the election official giving out false information. That's really kind of what I'm starting to become more concerned about than the actual physical day of voting."
—Earl Matthews, chief strategy officer at Verodin, a FireEye company, on the CyberWire Daily Podcast, 12.3.19.
Ward heelers for the 21st Century. Some of them won't be local. And some of their intelligence will be artificial.
A recommendation to our readers.
If you're interested in space and communications (technology, policy, business, and operations), take a look at Cosmic AES Signals & Space. It offers a monthly overview of news in this sector—take a look.
The appearance of new threats and security challenges requires effective tools for their timely identification and in-depth analysis. Without proper contextualization, intelligence is completely useless. Context™ – Cyber Threat Intelligence Platform for enterprises and government agencies delivers cyber threat intelligence harvested from millions of data points from the Deep and Dark Web, combined with data science for objective and actionable insights.
In today's Daily Podcast, out later this afternoon, we speak with our partners at Dragos, as Robert M. Lee discusses the evolution of safety and security in industrial control systems. Our guest, Sean O’Brien from @RISK Technologies, describes how states and cities might prepare for election-targeted cyber attacks.
Hacking Humans is also up. In this episode, "I really wanted that shed," Joe shares the story of a woman losing her life savings to a scammer claiming to be from the FBI. Dave describes the $139 shed scam. The catch of the day is another threat to reveal compromising photos. Carole Theriault speaks with Chris Bush from ObserveIT about security threats from employee burnout.