[ISN] ‘Aurora’ Cyber Attackers Were Really Running Counter-Intelligence

http://www.cio.com/article/732122/_Aurora_Cyber_Attackers_Were_Really_Running_Counter_Intelligence?taxonomyId=3089 By Kenneth Corbin CIO.com April 22, 2013 NATIONAL HARBOR, Md. — Some of the hackers involved in the infamous Aurora attacks executed from China against dozens of major American companies were believed to be running a counter-intelligence operation probing whether the U.S. government had uncovered the identity of clandestine agents operating in the United States, according to Dave Aucsmith, senior director of Microsoft’s Institute for Advanced Technology in Governments. Aucsmith, speaking last week at a government IT conference Microsoft hosted here at this Washington suburb, outlined a starkly different version of the attacks than the assessment that Google offered in the bombshell revelation it made in January 2010. Google had said that the attackers were trying to infiltrate the Gmail accounts of Chinese human rights advocates, describing “a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google.” The view from Redmond was different. Aucsmith does not challenge Google’s description of the attacks, but says that Microsoft’s analysis concluded that the hackers seeking to infiltrate its systems were apparently working under a motivation that had little if anything to do with the issues of human rights and repression widely associated with the Aurora operation. […] ______________________________________________ Visit the InfoSec News Security Bookstore Best Selling Security Books and More! http://www.shopinfosecnews.org




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] UK government offers SMEs £5,000 to improve their cyber security

http://news.techworld.com/security/3443429/uk-government-offers-smes-5000-improve-their-cyber-security/ By Sophie Curtis Techworld 23 April 2013 The UK government’s Technology Strategy Board has extended its Innovation Vouchers scheme to allow small and medium enterprises (SMEs) to bid for up to £5,000 from a £500,000 pot to improve their cyber security by bringing in outside expertise. “Keeping electronic information safe and secure is vital to a business’s bottom line. Companies are more at risk than ever of having their cyber security compromised, in particular small businesses, and no sector is immune from attack. But there are simple steps that can be taken to prevent the majority of incidents,” said Minister for Universities and Science David Willetts. “The package of support we are announcing today will help small businesses protect valuable assets like financial information, websites, equipment, software and intellectual property, driving growth and keeping UK businesses ahead in the global race.” The news is accompanied by research by the Department for Business, Innovation and Skills (BIS), which found that more small businesses than ever are facing the threat of losing confidential information through cyber attacks. […] ______________________________________________ Visit the InfoSec News Security Bookstore Best Selling Security Books and More! http://www.shopinfosecnews.org


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Fired Reuters Social Media Editor Says He’s Being Threatened

http://nymag.com/daily/intelligencer/2013/04/fired-reuters-editor-says-hes-being-threatened.html By Adam Martin Daily Intelligencer April 22, 2013 Matthew Keys, the Reuters deputy social media editor suspended last month after he was indicted for allegedly helping Anonymous take over the Los Angeles Times website, learned on Monday the company had fired him. But Reuters did not fire Keys for his alleged involvement with Anonymous, he said. Rather, it fired him for tweeting police scanner traffic during the Boston Marathon bombing suspects’ arrest last week, on a stream that identified him as a Reuters employee. Keys and the Newspaper Guild of New York have said he will contest the firing. But now Keys says he’s been receiving threats, and they’re worded much like the foreboding missives Anonymous likes to toss around. Keys’ account of his conversation with Reuters can be found on his Tumblr. He told Politico’s Dylan Byers that his indictment didn’t come up during that phone call but that “they did, however, repeatedly make mention that I had been suspended.” His conclusion: “I assume they were looking for an out.” Now that Keys has been cut loose, choruses of both criticism and support have found him on (where else?) Twitter. But the private messages Keys has been getting have been more aggressive, if also a bit cryptic. He tweeted on Monday night that he’d turned his phone off because he’d been receiving threatening calls. Keys declined to talk about the calls and messages with Daily Intelligencer, but he did post a couple screenshots of texts to his Twitter stream. […] ______________________________________________ Visit the InfoSec News Security Bookstore Best Selling Security Books and More! http://www.shopinfosecnews.org


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] No ‘One Size Fits All’ In Data Breaches, New Verizon Report Finds

http://www.darkreading.com/attacks-breaches/no-one-size-fits-all-in-data-breaches-ne/240153379 By Kelly Jackson Higgins Dark Reading April 22, 2013 If there’s one big theme of the just-released Verizon Data Breach Investigations Report (DBIR), it’s demographics: all sizes of organizations are getting hacked, and different industries are getting hit for different reasons and with different attack methods. “We shouldn’t have a one-size fits all approach,” Jay Jacobs, senior analyst for the Verizon RISK Team, says is one of the biggest takeaways from this year’s report, which was the biggest one yet in terms of data and sources. “There’s a big difference between [attacks hitting] a retailer and financial institutions versus manufacturers or consultants.” The report, which draws from 621 confirmed data breaches and 47,000 reported security incidents and 44 million compromised records worldwide in 2012 from Verizon as well as the US Computer Emergency Response Team and other national CERTs, the U.S. Secret Service, and law enforcement agencies in Europe, shows that 75 percent of all breaches last year were the result of financially motivated cyberattacks, and 20 percent, cyberespionage for stealing intellectual property or other information for competitive purposes. Hacktivism remained steady, but with more distributed denial-of-service (DDoS) attacks than “doxing” or other forms or data theft. Outsiders again reigned as the top attackers, making up 92 percent of the attackers that hit organizations last year. Next were state-sponsored attackers—the majority from China—with 19 percent of the attacks, and 14 percent were executed by insiders. Financial firms were hit the most, with 37 percent of last year’s breaches, followed by retailers and restaurants, 24 percent; manufacturing, transportation, utilities, 20 percent; and information services and professional services, 20 percent. […] ______________________________________________ Visit the InfoSec News Security Bookstore Best Selling Security Books and More! http://www.shopinfosecnews.org


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Syrian Hackers Hijack World Cup Twitter Account

http://mashable.com/2013/04/22/syrian-hackers-world-cup-twitter/ By Lorenzo Franceschi-Bicchierai Mashable.com April 22, 2013 The official Twitter accounts of the World Cup and FIFA’s President Joseph Blatter have been hacked, apparently by Syrian hackers. On Monday afternoon, both @FifaWorldCup and @SeppBlatter started sending weird tweets, hinting that hackers had taken over control of the accounts. And it quickly became clear that the messages posted were not from their real owners. Both accounts started sending tweets about Joseph Blatter allegedly stepping down due to corruption charges stemming from an imaginary FIFA investigation that found that the Emir of Qatar had bribed Blatter to convince FIFA to select Qatar as the host of the 2022 World Cup. Any doubts regarding the veracity of the tweets were finally swept away when the people behind the hack claimed responsibility. […] ______________________________________________ Visit the InfoSec News Security Bookstore Best Selling Security Books and More! http://www.shopinfosecnews.org


Facebooktwittergoogle_plusredditpinterestlinkedinmail