Tag Archives: encryption

10Fold – Security Never Sleeps – 96

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: Russian police have arrested 50 members of an alleged cyber-crime ring that stole more than 3 billion rubles ($45 million) from banks, the country’s biggest ever crackdown on financial hackers. Newly discovered malware ‘IronGate’ is targeting industrial control systems has the researchers who discovered it intrigued and hungry for help from the ICS community to further unravel it. Today, Yahoo became the first company to go public about NSLs it has received without needing to duke it out with the feds in court. Cisco spent $1.4 billion to acquire Jasper in February in its largest acquisition since Robbins took over as CEO. The former Sequoia-backed startup runs the largest commercial network for managing IoT devices.

Russia Detains 50 Suspected Hackers for Malware Bank Attacks – Publication: Bloomberg – Reporter name: Gavin Finch

The gang used malware to create networks of infected computers to launch 18 targeted attacks against Russian banks and state entities over the past year, the Interior Ministry said in a statement on its website.  Police were able to prevent another 2.3 billion rubles of losses, it said. The individual banks weren’t identified.


Shades Of Stuxnet Spotted In Newly Found ICS/SCADA Malware – Publication: Dark Reading – Reporter name: Kelly Jackson Higgins

FireEye researchers today detailed their findings on the so-called Irongate ICS/SCADA malware, which targets a Siemens PLC simulation (SIM) environment—not an operational one—via a man-in-the middle attack on a specific piece of custom PLC SIM code. SIM environments are where engineers test out their PLC code, which means Irongate as-is represents no actual threat to ICS operations, according to FireEye, and there’s been no sign of any attacks or attempts thus far.


Yahoo Publishes National Security Letters After FBI Drops Gag Orders – Publication: WIRED- Reporter name: Kim Zetter

Yahoo received letters in 2013 and 2015 and published redacted versions of them today. Two of the NSLs were sent to Yahoo from a special agent in the bureau’s Dallas office; the third NSL came from an agent in the bureau’s Charlotte, North Carolina office. It’s not clear whether the NSLs involve closed cases or ongoing ones for which disclosure is no longer a problem.  The letters offer no insight into the investigations behind them, and offer little else except a description of the kinds of records the FBI sought. In each case, the FBI wanted the name, address, length of service, activity logs and activity/transaction records for a specific user account.


Cisco is tracking 28 million devices on its IoT network and most of them are cars – Publication: Re/Code – Reporter name: Arik Hesseldahl

And it’s not just cars on Jasper. “It’s robots, it’s EKG machines” and other health care gear, and also robots used in manufacturing. And while the IoT is often criticized for being more hype than useful, Robbins said that Cisco has zeroed in on one significant use: Fixing things before they break. Last year Cisco teamed up with FANUC, a Japanese company building industrial robots, to keep track of how often robots in factories need maintenance. Preventive maintenance on the robots saves money by eliminating costly and unexpected downtime. “It’s turned out to be the killer app” for IoT, he said. “The savings from preventive maintenance is enough to justify the investment.”

10Fold – Security Never Sleeps – 69

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider:  Spear-phishing has increasingly become a tailored attacked vs the traditional method of a the mass attacks. The White House won’t support the anti-encryption bill, but has yet to publically state their position. Karamba Security is now starting to develop malware protection for the computers in cars, which could help the car better prepare for malware attacks. Lastly, a blog written by security research Brian Krebs points out how much money has been lost due to CEO email scams.

Crypto ransomware targets called by name in spear-phishing blast – Publication: Ars Technica – Reporter name: Dan Goodin

For the past decade, spear phishing—the dark art of sending personalized e-mails designed to trick a specific person into divulging login credentials or clicking on malicious links—has largely been limited to espionage campaigns carried out by state-sponsored groups. Since the beginning of the year, that truism has begun to unravel. According to researchers at security firm Proofpoint, a single threat actor, dubbed TA530, has been targeting executives and other high-level employees in an attempt to trick them into installing an assortment of malware—including the CryptoWall ransomware program that encrypts valuable data and demands a hefty fee to undo the damage.


Obama won’t support anti-encryption bill, report says – Publication: CNet – Reporter name: Katie Collins

The White House won’t publicly support proposed legislation that would allow judges to compel tech companies to help law enforcement crack open otherwise secret data and communications, Reuters reported Thursday. It’s an about-face for the White House. Obama said last month that he had come around to the view that the government must find a way to access locked devices. Even though the White House has reviewed the legislation’s text and provided feedback, it is not expected to comment publicly on it. The legislation could be introduced in Congress as early as this week.


Your car’s computers might soon get malware protection – Publication: PC World – Reporter name: Lucian Constantin

Modern cars contain tens of specialized computers that control everything from infotainment functions to steering and brakes. The pressing need to protect these computers from hackers will likely open up a new market for car-related software security products. Karamba Security, a start-up based in Ann Arbor, Michigan, is one of the companies that has stepped up to answer this demand. The company’s anti-malware technology, unveiled Thursday, is designed to protect externally accessible electronic control units (ECUs) found in connected cars.


FBI: $2.3 Billion Lost to CEO Email Scams – Publication: Krebs on Security – Reporter name: Brian Krebs

The U.S. Federal Bureau of Investigation (FBI) this week warned about a “dramatic” increase in so-called “CEO fraud,” e-mail scams in which the attacker spoofs a message from the boss and tricks someone at the organization into wiring funds to the fraudsters. The FBI estimates these scams have cost organizations more than $2.3 billion in losses over the past three years. In an alert posted to its site, the FBI said that since January 2015, the agency has seen a 270 percent increase in identified victims and exposed losses from CEO scams. The alert noted that law enforcement globally has received complaints from victims in every U.S. state, and in at least 79 countries.

10Fold – Security Never Sleeps – 67

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider:  Trump luxury hotels have suffered a potential mass data breach. Details from the Panama Papers investigation revealed that all of the stolen data is now being hosted in the Amazon cloud. The White House, US department of Homeland Security and industry experts created a certification program for IoT devices. Osterman Research consultants revealed that 18% of companies have suffered malware infections because of social networks.

Some Trump hotels hit by data breach: Report– Publication: CNBC – Reporter name: Jacob Pramuk

A line of luxury hotels linked to businessman and Republican presidential contender Donald Trump is investigating a possible credit card breach, Krebs on Security reported Monday, citing sources. The cyber security news site said financial industry sources noticed a string of fraud on customer credit cards used at the Trump Hotel Collection. The activity appeared on cards used in the past two to three months at properties including the Trump International Hotel New York, Trump Hotel Waikiki in Honolulu and the Trump International Hotel & Tower in Toronto, sources told the outlet.


From Encrypted Drives To Amazon’s Cloud — The Amazing Flight Of The Panama Papers – Publication: Forbes – Reporter name: Thomas Fox-Brewster

It was an epic haul. Whoever caused the Panama Papers breach at tax avoidance and offshore company specialist Mossack Fonseca leaked an astonishing 11 million documents and 2.6 terabytes of data, the largest of all time. Where’s all of that data stored now? In an Amazon cloud data center, accessible to anyone who knows the URL and has a password. The journey of those files, from the leaks to the revelations, is an astonishing example of developers working with journalists to keep whistleblowers and the information they supply safe and, just as crucially, usable. With the extra kicker: it was largely done using free, open source technology.


‘CyberUL’ Launched For IoT, Critical Infrastructure Device Security – Publication: Dark Reading – Reporter name: Kelly Jackson Higgins

Internet of Things (IoT) devices and industrial systems used in critical infrastructure networks now have an official UL (United Laboratories) certification program – for cybersecurity. UL today rolled out its anticipated—and voluntary–Cybersecurity Assurance Program (UL CAP), which uses a newly created set of standards for IoT and critical infrastructure vendors to use for assessing security vulnerably and weaknesses in their products. The UL CAP was created in conjunction with the White House, the US Department of Homeland Security, industry, and academia, and falls under President Obama’s recently unveiled Cybersecurity National Action Plan (CNAP) as a way of testing and certifying networked devices in IoT and critical infrastructure.


One out of five businesses are infected by Malware through Social Media – Publication: Panda Security – Reporter name: STAFF

What at first seems an unimportant habit, can have serious repercussions.  Yes, an employee risks the chance of being caught in the act, but what about the company? Osterman Research consultants have confirmed in their latest report that 18% of companies have suffered malware infections because of social networks.  Employees aren’t the only ones using these platforms, though.  Companies often have business profiles which make it more difficult to detect the source of the problem. According to this document, 73% use Facebook for work purposes, 64% use LinkedIn and 56% use Twitter.  Companies are also showing interest in collaborative platforms designed for them such as Microsoft SharePoint, different Cisco products, the Salesforce Chatter software solution and Connections, a platform developed by IBM.

10Fold – Security Never Sleeps – 66

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider:  Leaked documents dubbed the “Panama Papers” revealed financial schemes and offshore financing from some of the world’s most powerful people. The FBI has now promised to help unlock iPhones across the country, although not guaranteeing it will be able to use the same method that successful unlocked the San Bernardino terrorist phone. The investigation into MedStar Health continues as experts look into how to better protect hospitals. A study found that 90 percent of corporate executives said they don’t know how to read a cybersecurity report and 40 said they don’t feel responsible for the repercussions of hacking.

World figures deny wrongdoing as ‘Panama Papers’ turn spotlight on tax evasion – Publication: Reuters – Reporter name: Kylie Maclellan & Elida Moreno

Governments across the world began investigating possible financial wrongdoing by the rich and powerful on Monday following a leak of documents from a Panamanian law firm which allegedly showed how clients avoided tax or laundered money. The documents detailed schemes involving an array of figures from friends of Russian President Vladimir Putin to relatives of the prime ministers of Britain, Iceland and Pakistan and as well as the president of Ukraine, journalists who received them said. While the “Panama Papers” detail complex financial arrangements benefiting the world’s elite, they do not necessarily mean the schemes were all illegal.


FBI will help US agencies with tools to unlock encrypted devices – Publication: CIO – Reporter name: John Riberiro

The FBI has promised to help local law enforcement authorities crack encrypted devices, in a letter that refers to the federal agency’s success in accessing the data on an iPhone 5c running iOS 9 that was used by one of the San Bernardino terrorists. The agency did not, however, explicitly promise investigators that it would deploy the same tool, said to have been developed by an outside organization, on other iPhones.


Under pressure to digitize everything, hospitals are hackers’ biggest new target – Publication: The Washington Post – Reporter name: Carolyn Y. Johnson & Matt Zapotosky

In some ways, health care is an easy target: Its security systems tend to be less mature than those of other industries, such as banking and tech, and its doctors and nurses depend on data to perform time-sensitive, life-saving work. Where a financial-services firm might spend a third of its budget on information technology, hospitals spend only about 2 to 3 percent, said John Halamka, the chief information officer of Beth Israel Deaconess Medical Center in Boston. “If you’re a hacker… would you go to Fidelity or an underfunded hospital?” Halamka said. “You’re going to go where the money is and the safe is easiest to open.”


Execs: We’re not responsible for cybersecurity – Publication: CNBC – Reporter name: Tom DiChristopher

More than 90 percent of corporate executives said they cannot read a cybersecurity report and are not prepared to handle a major attack, according to a new survey. More distressing is that 40 percent of executives said they don’t feel responsible for the repercussions of hackings, said Dave Damato, chief security officer at Tanium, which commissioned the survey with the Nasdaq. The findings come at a time when companies around the world are losing $445 billion due to cybercrime last year, according to an estimate by the Center for Strategic and International Studies.

10Fold – Security Never Sleeps – 20

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider:  Twitter is beginning to warn users of a possible state-sponsored hack. Anonymous has claimed responsibility in the European space agency record breach. Next Tuesday 190 countries will meet to discuss how the internet will be governed for the next ten years. Lastly, an article about the essentials for the everyday encryption technology.

Twitter Warns Over Potential State-Sponsored Hack – Publication: CNBC – Reporter name: Leslie Hook

Twitter has issued its first ever warning about a possible hack by state-sponsored actors, as the social media site steps up its scrutiny of possible security breaches. The alert highlights growing concern over hacking activity backed by foreign governments after a year in which high-profile cyber attacks included the breach of 22m personnel profiles at the US Department of Homeland Security.


European Space Agency Records Leaked For Amusement, Attackers Say – Publication: CSO – Reporter name: Steve Ragan

Claiming the name Anonymous, those responsible for a weekend data breach at the European Space Agency (ESA) said the act was one of pure amusement (lulz) and not part of a larger scheme or protest. The compromised records were discovered on the ESA subdomains targeted by Anonymous, including due.esrin.esa.int, exploration.esa.int, and sci.esa.int. Once the records were copied, they were posted to a public document server and shared among various people online.


The Future Of The Internet Will Be Discussed In New York, This Week. But Nobody Seems To Care – Publication: Forbes – Reporter name: Federico Guerrini

Government officials from more than 190 counties will meet next Tuesday in New York for a two-day discussion (the United Nations’ 10 Year Review of the World Summit on the Information Society, or WSIS+10 Review) that could, in principle, have a huge influence on how the Internet is governed for the next decade. One of them, the crucial one, concerns the choice between two different approaches to Internet governance. The first, usually referred to as the “multistakeholder approach”, and prevailing so far, is based on the involvement of the private sector, the civil society, the international organizations and the academia in all decisions regarding the Internet. The other, the “multilateral”, gives more powers and discretionality to the governments. This might sound like a boring discussion, but is, in fact, fundamental to the future of the Internet. That is, to our future.


Essential Tools For Everyday Encryption – Publication: NetworkWorld – Reporter name: Fahminda Rashid

The best way to stop government from pressing forward with its demands for weakening encryption — and that’s exactly what backdoors would accomplish — is to make encryption ubiquitous and mainstream. If everyone is using encryption, from encrypted chat to encrypted email to encrypted Web surfing and everything in between, then it becomes much harder to argue that encryption protects only the select few who have something to hide.

10Fold – Security Never Sleeps – 7

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: Starwood hotels admits that a data breach has resulted in the theft of customers financial information. Victims of the Patreon site hack are now being subjected to hackers demanding bitcoin in exchange for their personal information not being released to the dark web. Cybercriminals are ramping up to spread holiday malware. Apple’s CEO takes a stand on back doors to encryption communication.

Starwood Hotels Falls Prey To Point-of-Sale Malware – Publication: ZDNet – Reporter name: Charlie Osborne

Starwood has admitted that a security breach taking place at 54 hotels has resulted in the theft of financial data from customers. Last week, the hotel chain admitted that a “limited number” of hotels in the US have become infected with malware, enabling cyberattackers to access financial data belonging to customers.


Extortion Attempt On Victims Of Patreon Site Hack – Publication: BBC – By BBC STAFF

Some members of the crowdfunding website Patreon, which was hacked last month, say they have received emails demanding bitcoin payments in return for the protection of their private data. The data listed in the email includes credit card details, social security numbers and tax identification numbers.


Tis The Season…Of Malware – Publication: CSO – Reporter name: Stu Sjouwerman

Cybercriminals have been preparing for another Black Friday/Cyber Monday. It’s a time for them to make big profits too. Last year’s scams will undoubtedly return and some new tricks will arise. Here are some of the top scams that CSOs should be preparing their company’s users to be aware of.


Apple’s CEO On Encryption: “You Can’t Have A Back Door That’s Only For The Good Guys” – Publication: Forbes – Reporter name: Steve Morgan

There’s a burning debate – bordering on a battle – between the U.S. government and technology companies over encryption. The government asserts that encryption – when it is so strong that the police cannot eavesdrop on communications in their efforts to catch and prosecute criminals – is a bad thing. Some government officials have even suggested that terrorists use encrypted communications to help carry out their acts of malice.