— The cybersecurity community during the COVID-19 emergency
InfoStealers Weaponizing COVID-19 (Lastline) Coronavirus, or COVID-19, continues to dominate the headlines and the cybersecurity landscape. The contagion has sadly infected over 3 million people globally, and nearly 250,000 people have died at the time of this writing. Unsurprisingly, a
U.S. to Accuse China of Trying to Hack Vaccine Data, as Virus Redirects Cyberattacks (New York Times) Iran and other nations are also looking to steal data and exploit the pandemic with attacks on infrastructure, officials say.
Gilead Sciences Targeted By Hackers Linked To Iran: Report (Forbes) The attacks on Gilead reflect a growing trend of state-backed hackers targeting intelligence related to a treatment for coronavirus.
Exclusive: Iran-linked hackers recently targeted coronavirus drugmaker Gilead - sources (Reuters) Hackers linked to Iran have targeted staff at U.S. drugmaker Gilead Sciences Inc in recent weeks, according to publicly-available web archives reviewed by Reuters and three cybersecurity researchers, as the company races to deploy a treatment for the COVID-19 virus.
China asked the WHO to cover up coronavirus outbreak: German intelligence service (Taiwan News) Delay cost world 4 to 6 weeks: BND
Report says data suggests shutdown at China lab, but experts skeptical (NBC News) U.S. and U.K. intel agencies are reviewing the private report, but intel analysts examined and couldn't confirm a similar theory previously.
Uncovering A Pro-Chinese Government Information Operation On Twitter and Facebook: Analysis Of The #MilesGuo Bot Network - bellingcat (bellingcat) An ongoing information operation is using a network of bots made up of newly created and stolen accounts to target a businessman, exiled from China, who has spoken critically of China’s response to COVID-19. Yet identifying the network has revealed a much larger operation amplifying content across multiple languages, platforms, countries, and topics, with links...
Germany’s Angst Is Killing Its Coronavirus Tracing App (Foreign Policy) Berlin’s floundering tells an ominous story about Europe’s technological leadership during the pandemic—and afterward.
Privacy advocates raise new concerns with COVIDSafe app (The Sydney Morning Herald) Civil liberties groups want the government to change the design of the contact tracing app to ensure personal data is not stored on a central database.
Northern Irish residents may be forced to download two contact-tracing apps, Stormont admits (The Telegraph) The difficulty of getting the UK's app to work with Ireland's could be too great
Health Officials Say 'No Thanks' to Contact-Tracing Tech (Wired) Silicon Valley companies have proposed automating the arduous task of identifying people potentially exposed to Covid-19. They're finding few takers.
Global contact-tracing apps take divergent routes to beat Covid-19 (ComputerWeekly) Telecoms will play a key role in controlling the Covid-19 coronavirus through contact-tracing mobile apps that can mitigate its spread. But that will only be the case if population masses actually use the apps – and that’s not guaranteed for a variety of reasons.
Lifting lockdown: the emerging role of the contact tracing app (Computing) The NHSX contact tracing app is currently being trialled on the Isle of Wight, but has the government picked the best approach for privacy and effectiveness?
Singapore turns to businesses to bolster contact tracing efforts (ZDNet) With its contact tracing app shoring up just 1.4 million downloads, Singapore is now making a new digital check-in system compulsory -- from May 12 -- at selected locations including workplaces, schools, supermarkets, and healthcare facilities.
How covid-19 conspiracy theorists are exploiting YouTube culture (MIT Technology Review) Covid-19 conspiracy theorists are still getting millions of views on YouTube, even as the platform cracks down on health misinformation.
US government plans to urge states to resist 'high-risk' internet voting (the Guardian) Department of Homeland Security draft guidelines say practice allows attackers to alter votes and imperil integrity of elections
Analysis | The Cybersecurity 202: Internet-based voting is the new front in the election security wars (Washington Post) DHS and the FBI are warning about the dangers of online balloting.
Risk Management for Electronic Ballot Delivery, Marking, and Return (CISA) Some voters face challenges voting in-person and by mail. State and local election officials in many states use email, fax, web portals, and/or web-based applications to facilitate voting remotely for groups like military and overseas voters and voters with specific needs.
COVID-19 survivor's blood on dark web costs 3 times more than hiring a hitman (Atlas VPN) According to data compiled by Atlas VPN, the blood of recovered coronavirus patients costs over three times more than hiring a hitman. Fake vaccines and cures, including blood from allegedly recovered COVID-19 patient, cost 16 thousand dollars; meanwhile you can commission a murder for 5 thousand dollars.
Zoom Agrees to Security Measures After NY Attorney General Investigation (New York Law Journal) A surge in users revealed security flaws in Zoom's platform, according to New York Attorney General Letitia James' office, and the company had an increase in the sensitivity of the data passing via its network.
House of Commons set to dump Zoom as it considers British alternative (The Telegraph) The lower house of Parliament is exploring other alternatives to the US firm including one Watford-based provider
Zoom is being outflanked by Microsoft and Google as it attempts to overcome security concerns (Business Insider) Although Zoom maneuvered quickly to address privacy concerns, Microsoft and Google have positioned themselves to steal Zoom's market share.
Zoom fights back for top spot (Telegraph India) The app is still popular because it has the best interface among competitors
OCR Shares COVID-19 Privacy and Security Threat Resources (HealthITSecurity) OCR recently shared a list of privacy and security resources for the healthcare sector in light of a spike in COVID-19 cyber threats targeting providers and medical researchers during the pandemic.
Cyber attack disrupts virtual OCU graduation (KOKH) According to Oklahoma City University's President Martha A. Burger, OCU's virtual graduation was disrupted on Saturday by a "hate-filled attack" from an unknown source. The person was able to bypass the system and display racist and offensive language. "I want to be clear, OCU stands against racism and racist behavior," said Burger in a letter to the students. "Although we took safety precautions, unfortunately the digital platform we used to connect has become a target. "
Coronavirus: Tech lessons learned (ComputerWeekly) Since the lockdown began on March 24, UK tech workers have shown that they can adapt and develop new processes very quickly to enable many people to remain productive during the Coronavirus ...
Technology Sector Shed Record Number of Jobs in April (Wall Street Journal) Employers in the U.S. information technology sector shed a record 112,000 jobs in April, erasing a year’s worth of hiring gains, IT trade group CompTIA reported Friday.
April Unemployment Rate Rose to a Record 14.7% (Wall Street Journal) The unemployment rate rose to a record as employers shed millions of jobs, evidence of the economic destruction wrought by the coronavirus pandemic.
Expert On Research: One Third Of Businesses Axe IT Staff Due To Covid-19 Cost Concerns (Information Security Buzz) New global poll from Leonne International of over 1,000 business decision-makers reveals that over one third of companies have axed IT staff and half have cut IT Budgets due to Covid-19 concerns – despite an increase in data security concerns. 37 per cent of companies have made members of their IT staff redundant or placed …
Companies Hit Pause on Digital Transformation Despite Spending More on Cloud (Wall Street Journal) Corporate spending on cloud computing surged in the first three months of the year as companies scrambled to support remote-work, analysts say.
Survey: Most Firms Not Adding to Cyber Training During Pandemic (MeriTalk) Most businesses are not providing additional security training during the COVID-19 pandemic despite greater numbers of employees teleworking, cybersecurity services provider CrowdStrike said this week.
Another military official infected with coronavirus, cyber command on high quarantine alert (Korea Herald) The South Korean military's cyber command said Sunday another senior officer has tested positive for the coronavirus after contacting a patient serving at the unit in a case presumed to be linked with a new cluster of infections in the bustling Seoul district of Itaewon. The military is conducting coronavirus tests, based on polymerase chain reaction (PCR), on all the members of the Cyber Operations Command under th...
Chief of Naval Operations quarantined; head of National Guard tests positive for COVID-19 (Task & Purpose) Neither Gilday nor Lengyel attended a meeting at the White House on Saturday with President Donald Trump and senior military leaders.
As the world weathers a pandemic, Nintendo may just be recession-proof (Washington Post) Why, in moments of crisis, does everyone want to shelter in place in the House of Mario?
Defcon Is Canceled (Wired) For real this time. Its sister conference, Black Hat, has also been called off.
Cyber Attacks, Threats, and Vulnerabilities
Foreign intelligence officials say attempted cyberattack on Israeli water utilities linked to Iran (Washington Post) The April incident targeting two water districts was quickly thwarted and caused no damage but the incident raises fears of escalation.
Scoop: Israeli security cabinet held secret meeting on unusual Iranian cyberattack (Axios) Israeli officials say the government sees the attack as a major escalation by the Iranians.
Israel Mulls Response to Alleged Iranian Cyber Attack That Breaks 'All the Codes of War' - Report (Sputnik News) Tel Aviv has accused Tehran of targeting Israel in cyber attacks "on a daily basis", despite Iran denying the accusations and insisting that the country "does not...
Iran blamed for April cyber attack on Israel's civilian water system (Jewish Telegraphic Agency) The attack is viewed as crossing a line by Israel since it targeted civilian installations.
Chinese Military Cyber Spies Just Caught Crossing A ‘Very Dangerous’ New Line (Forbes) Here's how China's elite threat groups slipped the security net for years—a warning for all.
Top WA department in 'China cyber attack' (Eden Magnet) Western Australia's government has defended its security protocols after an employee was targeted in a cyber attack reportedly linked to the Chinese military.
WA Premier Mark McGowan's office in 'China cyber attack' (The New Daily) The office of Western Australian Premier Mark McGowan has reportedly been targeted in a cyber attack linked to the Chinese military.
More crypto-stealing Chrome extensions swatted by Google (Naked Security) Google deleted more malicious extensions from the Chrome Web Store after they were found to be phishing cryptocurrency users.
Hacker group floods dark web with data stolen from 11 companies (BleepingComputer) A hacking group has started to flood a dark web hacking marketplace with databases containing a combined total of 73.2 million user records over 11 different companies.
“Shiny Hunters” Hacker Group Keep 73 Mn User Records on Darknet (CISO MAG | Cyber Security Magazine) Hacking group “Shiny Hunters” is alleged to have compromised 73.2 million user records from over 11 companies.
Blox Tales #4: Vendor Email Fraud + Office 365 Credential Phishing (Armorblox) A few days ago, we saw a unique credential phishing email attempt to land in a customer inbox. This email was sent from a compromised vendor account and claimed to contain important invoice information.
Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking (Wired) The so-called Thunderspy attack takes less than five minutes to pull off with physical access to a device, and it affects any PC manufactured before 2019.
US Marshals Service exposed prisoner details in security breach (ZDNet) Security breach took place in December 2019 and was discovered by the DOJ's JSOC team.
US Marshals says prisoners’ personal information taken in data breach (TechCrunch) Current and former prisoners were notified of the breach on May 1.
Attackers Offer Data on Four Million Dating App Users (Infosecurity Magazine) MobiFriends was apparently breached back in January 2019
Sodinokibi ransomware can now encrypt open and locked files (BleepingComputer) The Sodinokibi (REvil) ransomware has added a new feature that makes it easier to encrypt all files, even those that are opened and locked by another process.
REvil ransomware threatens to leak A-list celebrities' legal docs (BleepingComputer) The Sodinokibi ransomware group threatens to release hundreds of gigabytes of legal documents from a prominent entertainment and law firm that counts dozens of international stars as their clients.
Ransomware Attack Allegedly Hits NYC Law Firm To Superstar Musicians Including Lady Gaga and Elton John | LawSites (LawSites) A New York City law firm that represents superstar musicians such as Lady Gaga, Elton John and Madonna has allegedly been hit with a ransomware attack
Child Porn Sextortion Scammers Pretending to be Microsoft Tech Support (Techlicious) Beware a new twist on an old scam – emails claim you were caught watching child porn and your Windows license is suspended until you call Microsoft Support.
Who’s Viktor? Tracking down the XTC/Polaris Botnets. (Radware Blog) Even though Hoaxcalls reuses code from botnets such as Tsunami, Gafgyt and Mirai, the tactics and methods leveraged by the operators warrants a review.
Zeus Sphinx Back in Business: Some Core Modifications Arise (Security Intelligence) With Zeus Sphinx back in the financial cybercrime arena, IBM X-Force is providing a technical analysis of the Sphinx Trojan's current version, which was first released in the wild in late 2019.
Rail vehicle manufacturer Stadler hit by cyberattack, blackmailed (BleepingComputer) International rail vehicle construction company, Stadler, disclosed that it was the victim of a cyberattack which might have also allowed the attackers to steal company and employee data.
Cyberattack seeks to extort money from Stadler (Railway Gazette International) Stadler's IT network has been the subject to a malware attack which has 'most likely' led to a data leak, the rolling stock manufacturer said on May 7. It assumes the incident was 'a professional attack from unknown offenders', with the motive to 'extort a large ...
The Kashmir Walla was targeted in a coordinated cyber attack (The Kashmir Walla) On Wednesday, 6 May 2020, evening, a cyber attack was launched on our server immediately after we published stories about a gunfight.
BJC HealthCare Responds to Data Breach (Alton Daily News) While a statement from BJC Healthcare states there appears to be no evidence that any information has been misused at this point, the company is continuing to investigate what
Security Patches, Mitigations, and Software Updates
Microsoft adds protection against Reply-All email storms in Office 365 (ZDNet) Redmond adds protection against massive "Reply-All" email storms after suffering two internal incidents in 2019 and 2020.
VPN provider Hide My Ass promises no more user logging (Security Brief) We see taking such steps as important for us to maintain our fight against censorship.
The difference that a decade makes (New Statesman) Over the past ten years cyber security has transitioned from a jargon-filled topic considered the preserve of IT departments to one of the key pillars of an increasingly digitised society.
People Think They're Too Smart to Fall for Phishing Scams (Nextgov.com) That means they underestimate their own risk.
Ransomware on the rise, companies prioritizing disaster recovery (Help Net Security) The rampant rise of ransomware persists, with 100% of IT pros reporting that their company experienced a ransomware attack in the last 12 months.
Are Women Better At Cybersecurity Than Men? What A Study Showed About Password Security And More (International Business Times) Yet only 24% of cybersecurity professionals are women.
AXA Ventures Leads $5M Investment in Cyber-Security Startup Hub Security (Insurance Journal) Hub Security, a startup that offers military-grade cyber-security solutions for fintech, cloud, blockchain and data storage, announced it has closed a $5
Raytheon Technologies Is Posturing To Be The Pentagon’s Top Cyber Supplier—Both Offensive And Defensive (Forbes) The company has a broad market presence in all facets of cybersecurity and information warfare.
Data company that 'helped locate Osama Bin Laden' recruits former Labor MP Mike Kelly (ABC News) A United States tech giant with close links to Western intelligence agencies appoints former Federal Labor MP Mike Kelly to help drive its rapidly expanding operations in Australia.
Eric Schmidt, who led Google's transformation into a tech giant, has left the company (CNET) Schmidt exited as a technical advisor at Google parent company Alphabet in February.
Products, Services, and Solutions
Alert Logic Extends MDR Security to IBM Cloud Customers (MSSP Alert) IBM Cloud customers can now leverage Alert Logic's managed detection & response (MDR) security services, the two technology companies say.
CPAmerica Adds World’s Largest Provider of Security Awareness Training and Simulated Phishing Platform (The Chestnut Post) CPAmerica, Inc. is proud to welcome KnowBe4, Inc. as a new preferred provider for the association. This new relationship gives
Qualys provides vulnerability management for customers of Azure Security Center (Help Net Security) Qualys Container Security is immediately available and Qualys Vulnerability Management will be available within a month in Microsoft Azure Security Center.
Telos announces Xacta for Microsoft Azure, accelerating security compliance for regulated industries (Telos Corporation) Telos' Xacta for Microsoft Azure brings customers faster cyber risk management and cloud compliance.
RISC-V International and GlobalPlatform Partner to Enhance Security Design of IoT Devices (GlobalPlatform) Collaboration will help accelerate the development of open standards for the hardware design of embedded components in connected devices for the IoT
Technologies, Techniques, and Standards
Why data security is a big part of the recycling process (Recycling International) Sims Lifecycle Services (SLS) plays a critical role in helping businesses and data centres manage the profound shifts in how and where technology is
4 Reasons Why Confusing AppSec With InfoSec Is a Big Mistake (ZeroNorth) Application security (AppSec) and information security (InfoSec) are two terms that are often conflated. Sure, there's plenty of crossover.
How to Set Your Social Media to Control Who Sees What (Wired) Pick who sees your tweets, Facebook posts, and Instagram stories—and choose what you want to see, too.
How Law Firms Can Demonstrate Strong Cybersecurity Practices (CISO MAG | Cyber Security Magazine) Clients are increasingly asking law firms to prove their security in a variety of ways. Law firms complete long security questionnaires and allow third-party auditors into their offices because providing proof that their client data will be secured is not nice to have, it is required.
How To Build A Business Case For Endpoint Security (Forbes) Think of building a business case for endpoint security as the checkup every company needs to examine and identify how every threat surface can be improved.
Research and Development
New threats to our old data (Scilog) Cryptologist Daniel Slamanig is investigating how today’s encryption methods can be rendered fit to ward off future attacks. Not even powerful quantum computers should be able to harm them. It is the nightmare of every company dealing with sensitive information: an encryption technology that was considered secure gets cracked and all of a sudden corporate …
Roosevelt High students top field in national cyber competition (San Antonio Business Journal) The CyberPatriot competition is doing much to boost the cybersecurity workforce.
Legislation, Policy, and Regulation
Making Cyberspace Safe for Democracy: The New Landscape of Information Competition (Foreign Affairs) With the 2020 U.S. presidential campaign underway, stories of Russian interference are again in the headlines.
Canada should stand up to China, ex-Australia PM says (The Globe and Mail) Turnbull, who banned Huawei from Australia’s next-generation 5G mobile networks, said he would be surprised if Trudeau is getting different advice than he did on the risks of giving the Chinese telecom giant access
White House said to be in talks with Intel, TSMC for US chip factories (Engadget) The White House reportedly hopes to reduce its dependence on Asia for processors by having Intel and TSMC set up US factories.
Securing the U.S. Power Grid: President and Commerce Department Sound the Alarm (JD Supra) President Donald Trump signed Executive Order 139201 on May 1, 2020, declaring a national emergency in order to secure the nation's bulk-power system....
Opinion | FISA needs reform. Our amendment would do that — and protect constitutional rights. (Washington Post) Additional reforms are necessary to protect Americans’ privacy and the Fourth Amendment before FISA should be reauthorized.
Commissions lobby for cyber reforms in the defense policy bill (Federal Times) Three commissions wrote a letter to members of Congress urging them to include several cyber workforce recommendations in this year's defense policy bill.
Commissions lobby for cyber reforms in the defense policy bill (Federal Times) Three commissions wrote a letter to members of Congress urging them to include several cyber workforce recommendations in this year's defense policy bill.
An Unlikely Partner to Counter Cyberattacks (Wired) To combat increasing ransomware attacks on US cities, the National Guard needs help from Cybersecurity and Infrastructure Security Agency.
Lawmakers demand information from FCC on Ligado fight (C4ISRNET) Thirteen Democrats and nine Republicans have teamed up to ask for information from the FCC.
Acting DNI Grenell Announces ODNI Organizational Changes (Office of the Director of National Intelligence) Acting Director of National Intelligence Richard Grenell today announced several organizational changes to the Office of the Director of National Intelligence (ODNI).
Acting DNI Richard Grenell Announces Formation of Intell Community Cyber Executive Post (GovCon Wire) Richard Grenell, acting director of national intelligence, has announced the establishment of an int
FDA joins GSA’s modernization program (Federal Times) FDA becomes the ninth partner for the modernization initiative and the second agency to join this week.
Litigation, Investigation, and Law Enforcement
Who Is Dmitry Badin, The GRU Hacker Indicted By Germany Over The Bundestag Hacks? (Bellingcat) On 5 May 2020, German media reported that Germany’s Federal Prosecutor has issued an arrest warrant against Russian citizen Dmitry Badin, the main suspect in the 2015 hacking of the German Bundestag. What Was The 2015 Bundestag Hack? In April 2015, members of the German parliament as well as members of Merkel’s Bundestag office, received...
Fears over Chinese satellite raid as stricken OneWeb appeals for rescue (The Telegraph) OneWeb has also received interest from Amazon and France's Eutelsat
House Intelligence Committee transcripts provide new insight, fuel old divisions (CBS News) The transcripts, 57 in total, include testimony from a spectrum of witnesses, including top officials from the Clinton and Trump campaigns, as well as Obama administration officials.
FBI Got Everything It Asked for in DNC Investigation, Refuting ‘Missing Server’ Myth (Defense One) New transcripts released by the House intelligence committee shed light on Russia’s interference in 2016 election.
Former acting AG says Flynn decision was 'just,' blames Comey for bad culture at FBI (Fox News) Former Acting Attorney General Matthew Whitaker defended the Justice Department's decision to dismiss its case against former National Security Adviser Michael Flynn, arguing that a corrupt FBI culture led to Flynn's entrapment.
Cisco Owes Up To $557M For Infringing Patents, Judge Told (Law360) Cisco Systems owes between $445 million to $557 million for infringing five cybersecurity patents, Centripetal Networks said Thursday during a bench trial being held over Zoom due to the pandemic, while Cisco claimed it is being bilked by a startup that can't succeed in the market.
As Lobbyist for Huawei, Las Vegas Radio Station May Have Broken Law (Washington Free Beacon) A local Las Vegas radio station broke federal communications laws when it failed to disclose its partnership with Chinese telecom giant Huawei, according to a former official of the Federal Communications Commission.