08/31/11

Google says Gmail attack focused on Iranian targets – Computerworld

IDG News Service – Google said late Sunday that an attack mounted against its Gmail service targeted users primarily located in Iran, although the company has taken steps to block further interception attempts.

Google discovered that attackers had acquired a Secure Sockets Layer (SSL) certificate valid for any website in the google.com domain. The SSL certificate is used to vouch for the authenticity of websites and protect against security threats such as “man-in-the-middle” attacks.

via Google says Gmail attack focused on Iranian targets – Computerworld.

08/25/11

Bit and Bytes Can Be As Destructive As Bullets and Bombs | US Cyber Strategy 2011

This is the state were it’s at today. Define the actors and players in this mirror land of bit’s and bytes and you have a war. Establishing culpability for cyber attacks is one of the most daunting technical tasks in the cyber domain. When Russian hackers shut down Estonian websites, some of their attacks came from servers within the United States. Under NATO rules, does that make the United States responsible for attacking its own ally?

These are the challenges that we face today. This is the attitude of our government today.  The new Cyber Security Dogma. Deputy Defense Secretary William Lynn said that the Defense Department has responsibility to protect national infrastructure and reserves the right to respond to serious attack. But currently, the Pentagon is only authorized to defend military networks. It lacks legal authority to extend its defenses elsewhere, in part because of concerns of civil libertarians and private industry about government domination of the Internet.

 

Cyberspace knows no geography, as cyber warfare matures, technical and policy issues will arise that planners haven’t yet thought of, Masso said. But like all warfare, the enduring challenge will be one of imagination, of outthinking the enemy, he said. Failure to do so could result in a digital equivalent of the Maginot Line — France’s costly, supposedly impregnable border defense built after the first World War that Germany simply bypassed in 1940, attacking from a different direction.

 

The U.S. Defense Department new 5 tier [1]cyber security plan.

 

  1. First pillar is that you need to treat cyberspace as a domain. — that is, you need to be able to operate, train and equip our forces to be able to operate and defend our networks.
  2. Second, we need a defense in depth. We need accurate defenses. We can’t rely on a simply imaginary-line approach to protecting our networks. Cyber defenses need to be much more dynamic than that.
  3. Third, we need an approach internationally that embraces collective security. We need to use our allies to understand the threat, to be able to respond more quickly to the threat and to share intelligence about the threat.
  4. Fourth, we need to ensure that we can extend protections beyond just the military networks to critical infrastructure — our power grid, our transportation network, our financial networks — because our military is dependent on those networks as well. For those, we are working with the Department of Homeland Security.
  5. Fifth, we need to invest in research and development. In particular, we should focus on evening the balance between the attacker and defender. Currently on the Internet, the attacker has all the advantages.

 

 

Cyberspace and the technologies that enable it allow people of every nationality, race, faith and point of view to communicate, cooperate and prosper like never before,” President Barack Obama said in an introduction to the new cyber strategy report.

 

“Citizens across the globe,” he added, “are being empowered with information technologies to help make their governments more open and responsive.” Cyber Deterrence is an important concept. In some cases, your adversaries are not going to have very many assets to retaliate against — you need to emphasize a deterrence regime that emphasizes denial.

 

You try to deny benefits from the attack, you try to impose costs on the attacker for any incursions they undertake. In cyberspace, because of the difficulties in attribution everything is on the table and everything is a go.

 

Reference:

[1]http://www.c4isrjournal.com/story.php?F=7194228

 

08/23/11

DailyTech – China Brazenly Brags About Internet Attacks on U.S. in Leaked Video

Despite “smoking gun” U.S. is unlikely to act as it has a long history of tolerating China’s abuse

It seemed like just another Chinese propaganda video, designed to promote the fighting spirit of soldiers in China’s People’s Liberation Army and rouse anti-American sentiments.  The Chinese narrator boldly proclaimed, “America is the first country to propose the concept of a cyberwar, and the first country to implement it in a real war.”

I. Proof of Chinese Government Cyber-Attacks

But, as first noted by TheEpochTimes, the Chinese government unwittingly dropped a bomb shell when it used a clip of what it must have thought was stock footage.

Between 12:57 and 13:05 in the video, the B-roll clip rolled, revealing what is most westerners’ first glimpse at a live Chinese cyber-attack on the U.S.  Videographic proof that recent cyber-attacks were indeed the work of the Chinese government had never been found — until now.

At the start of the clip the reflection of a PLA officer in uniform can be seen.  We’re not sure what the text up top or below says, but if you speak Chinese please let us know…

 

The officer quickly leaves that screen, using a keyboard shortcut…. 

 

…and fires up an application whose creator is identified in GUI text as the Electrical Engineering University of China’s People’s Liberation Army.  The GUI panel contains the text “Choose Attack Target” and offers the user a choice of what reportedly are multiple Falun Gong websites (a forbidden Chinese spirtual movement) (feel free to chime in if you can read this…).

 

 

The “attack” button is pressed in the lower left-hand corner, and the video fades out, as presumably a distributed denial of service attack (possibly botnet assisted) is carried out.

 

So there it is — straight from the horse’s mouth, as they say, proof that China is indeed attacking entities in the U.S. online.


The video is available here, beware the rewind capability seems to be messed up, so just skip to around 10 minutes if you want to see the good part.

II. U.S. is Too Afraid to Stand up For Itself

We’re guessing President Barack Obama’s (D) response to this video will fall somewhere between “silence” and  ”sweeping it under the rug”.  After all, while the U.S. talked tough of physical retaliation for cyberattacks, it continues to let China bully it online.

China controls a great deal of U.S. debt and rare earth metals – a critical component to high-performance electronic devices.  The U.S. also deeply depends on China for its manufacturing needs, having done away with its own capacity to produce most products decades ago.

Likewise there’s a sort of grim complacency in the corporate world.  Google, Inc. (GOOG) claims to have its source code stolen by Chinese hackers, but has been forced into silence by the Chinese government.  The message is clear — put up with abuse, or get out of the world’s biggest market.

Similarly, antivirus firm McAfee last month aired a report on the world’s largest series of cyber-attacks dubbed “ShadyRAT”, which it said were perpetrated by a nation state.  However, when faced with the overwhelming public assumption that the attacker was China, McAfee equivocated refusing to confirm that the attacks came from China.

What reason would McAfee have for keeping the identity of the attacker in history’s most financially damaging cyberattack a secret?  Well, its parent company, Intel Corp. (INTC) has invested much in research and development and production facilities in China — facilities it doesn’t want to lose by alienating the local government.

The few people and organizations who do speak out are largely ignored.

Recent attacks on American advocacy site Change.org, who launched a campaign to free imprisoned Chinese artist Ai Weiwei, led to Secretary of State Hillary Clinton admonishing China.  But at the end of the day no decisive action was taken by the executive branch or Congress.

In short, China is reportedly gaining advanced intelligence on the U.S. military and its technological secrets; is infiltrating U.S. utilities; and stealing hundreds of millions of dollars of corporate secrets, but the U.S. has thus far kept its mouth shut.

For that reason we don’t hold much hope that this “smoking gun” will change much of anything in the way U.S. business and the U.S. government bow down to their Chinese abusers.

via DailyTech – China Brazenly Brags About Internet Attacks on U.S. in Leaked Video.

08/23/11

Nokia’s Developer site hacked-defaced

Nokia’s Developer site was recently defaced by Indian Hacker “pr0tect0r AKA mrNRG”. He wasn’t there to steal data, instead he just just wanted to point out how little security Nokia was using. In a statement on the site, he says:

 

The news was reported by Aleksi Moisio of Helsingin Sanomat, a Finnish publication. He was told by a Nokia spokesperson that they are “currently evaluating the security practices of websites that are hosted externally” after admitting to the attack on Monday. Now considering this website was “hosted externally”, meaning that Nokia was outsourcing the hosting to someone else who was in charge of all the bits and bobs associated with IT administration, you shouldn’t be worried about attacks to the servers hosting Nokia’s Ovi Store, better known as the servers that have your credit card data. Those are maintained by Nokia themselves, and they’ve got some of the best IT guys on the planet.

The news was reported by Aleksi Moisio of Helsingin Sanomat, a Finnish publication. He was told by a Nokia spokesperson that they are “currently evaluating the security practices of websites that are hosted externally” after admitting to the attack on Monday. Now considering this website was “hosted externally”, meaning that Nokia was outsourcing the hosting to someone else who was in charge of all the bits and bobs associated with IT administration, you shouldn’t be worried about attacks to the servers hosting Nokia’s Ovi Store, better known as the servers that have your credit card data. Those are maintained by Nokia themselves, and they’ve got some of the best IT guys on the planet.

 

via Nokia’s Developer site hacked, defaced with image of Homer Simpson.

08/23/11

Egyptian hacker defaces Israeli PM’s website – Technology – GMA News Online – Latest Philippine News

For several minutes last Sunday, the official website of Israeli Prime Minister Benjamin Netanyahu was defaced in a hack attack, with the hackers placing an image of Egyptian soldiers raising the Egyptian flag in Sinai in 1973.

The hack came days after Israeli solders shot and killed five Egyptian soldiers across the border, International Middle East Media Center.

According to the IMEMC, the hacker even wrote “Anti Zionism” on the webpage, which was taken offline and eventually restored.

via Egyptian hacker defaces Israeli PM’s website – Technology – GMA News Online – Latest Philippine News.

08/23/11

China Caught With Evidence of Cyberwarfare Against U.S. | TheBlaze.com

It was supposed to be just another piece of Chinese propaganda. It ended up as a major “oops,” revealing that a Chinese military university is engaged in cyberwarfare against the U.S.

The Epoch Times reports that the film, screened in mid-July, included a screenshot that it calls a “damaging revelation.” Here’s the screenshot:

 

 

And here‘s why it’s so damaging, according to the Times:

The screenshots appear as B-roll footage in the documentary for six seconds—between 11:04 and 11:10 minutes—showing custom-built Chinese software apparently launching a cyber-attack against the main website of the Falun Gong spiritual practice, by using a compromised IP address belonging to a United States university.

via China Caught With Evidence of Cyberwarfare Against U.S. | TheBlaze.com.

08/22/11

Pentagon Worried About Chinese Hackers – Softpedia

Every year, the annual report on China’s military power that the Pentagon presents before the U.S. Congress is met with criticism by the Asian country, and every year the US say that they are worried by the advancement level the rival power has achieved. That’s the backbone of what has been going on, the meat on the bones is, however, changed every year with various details.

via Pentagon Worried About Chinese Hackers – Softpedia.

08/22/11

Louise Mensch MP claims Anonymous threatened her children | Naked Security

Had some morons from Anonymous /Lulzsec threaten my children via email. As I’m in the States, be good to have somebody from the UK police advise me where I should forward the email. To those who sent it; get stuffed, losers.

Oh and I’m posting it on Twitter because they threatened me telling me to get off Twitter. Hi kids! ::waves::

I’ve contacted the police via the House of Commons and the email is with them now. I don’t bully easily, kids. Or in fact at all.

via Louise Mensch MP claims Anonymous threatened her children | Naked Security.

08/22/11

Cyber Global Self Interested Corporations and Governments

Global cooperation, self interested corporations and governments are the reason for the real cyber-espionage crimes that steals technology, information and financial data. It was The SUN who hacked dead people phones and made tons of money $$$. The SUN even had top UK Police and Interpol officials corrupted. You want the legal crooks guarding the outcome of the bad crooks. It’s a conflict of intrest for the legal good guys.

If your going after hacktivist that deface websites, cause cyber mayhem but if you look at their release of email and passwords and other data they released. Do you know how much money they could of made $$$ ( follow the money ), but the fact is they didn’t ( ZERO-nada-  $$$ ). The analysis of the cyber attack data shows us “hay your security is weak – fix it or else…” it also means “…people like The SUN (the real legal international corporation hackers (made BIG $$$ )” -may hack you ask Hugh Grant the actor ( News Corp empire of media mogul Rupert Murdoch-phone-hacking scandal in the UK hacked Mr. Hugh Grants Phone )

CyberSpace belong to all of US -not the powerful and influential.  Hacker Moto:-be hidden, be silent, listen and don’t get DOX. 

gatoMalo_at_usCyberLabs_dot_com

 

08/22/11

Cyber Threat Vector

Cyber Threat Vector:

  • Economic Targets
  • Military Targets
  • Infrastructure Targets
  • Supply Chain Targets
  • Media Targets
  • Industrial Base Targets
  • The Patent Process and Bureau
  • The Financial Systems (Stock Exchanges and Banking systems)
  • Political Targets
  • Financial Targets