Wednesday Cyber SA 21AUG2013 – TREMENDOUS Amount of News!

Good Wednesday Morning Fans of Cyber Mania News…

Lots of cyber related news out of the People’s Republic of China today – ENISA & NIST sound off, Islamic Republic of Iran has some noteworthy items and of course the token Russia Cyber story for the cyber fan from Leeds, UK…enjoy!

People’s Republic of China denies role in cyber-attacks on United States; Claim themselves victim of hacking – The Economic Times
http://economictimes.indiatimes.com/tech/internet/china-denies-role-in-cyber-attacks-on-united-states-claim-themselves-victim-of-hacking/articleshow/21931101.cms
Beijing’s Rising Hacker Stars…How Does Mother China React?
http://fmso.leavenworth.army.mil/documents/Beijings-rising-hackers.pdf

People’s Republic of China monitors online chatter as users threaten state hold on the internet
http://www.theguardian.com/world/2013/aug/20/china-internet-listening-citizens-views
Chinese lawyers targeted as Xi Jinping tightens control – Telegraph
http://www.telegraph.co.uk/news/worldnews/asia/china/10254632/Chinese-lawyers-targeted-as-Xi-Jinping-tightens-control.html
Xue Manzi: How Chinese social media can be a force for good
http://www.danwei.com/xue-manzi-how-chinese-social-media-can-be-a-force-for-good/

Chinese Man Who Offered To Install “Hacker” software is arrested 男子给网吧提供“黑客”软件 获刑三年罚金十万-资讯-黑基安全网
http://www.hackbase.com/news/2013-08-20/116340.html

Conflict Breeds Cyber Attacks | Analysis Intelligence
http://analysisintelligence.com/cyber-defense/conflict-breeds-cyber-attacks/?
Mapped: The 7 Governments the U.S. Has Overthrown – By J. Dana Stuster
http://www.foreignpolicy.com/articles/2013/08/19/map_7_confirmed_cia_backed_coups?page=full

PLA (中國人民解放軍)advancing laser weapons program|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130820000102&cid=1101
中國人民解放軍 (PLA) Lanzhou MAC organizes confrontation training – People’s Daily Online
http://english.people.com.cn/90786/8370233.html
More college students applying for entry into the military, Zhao Shengnan reports in Beijing.
http://english.peopledaily.com.cn/90786/8368846.html
Hagel, Chinese Defense Minister Commit To Cooperation But Tensions Clear
http://breakingdefense.com/2013/08/19/hagel-pla-leader-commit-to-cooperation-but-tensions-clear/?
People’s Republic of China, U.S. agree on new steps to enhance military cooperation – People’s Daily Online
http://english.peopledaily.com.cn/90786/8370788.html
US, People’s Republic of China (中華人民共和國) agree on new ways to enhance military cooperation|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130820000123&cid=1101
Advance toward new type of China-U.S. mil-to-mil relations – People’s Daily Online
http://english.peopledaily.com.cn/90786/8370960.html
Chinese professor warns of “democracy trap” – Xinhua | English.news.cn
http://news.xinhuanet.com/english/indepth/2013-08/20/c_132646879.htm

People’s Republic of China, U.S. Ink Deal to Counter Illicit Atomic Trafficking | GSN | NTI
http://www.nti.org/gsn/article/us-inks-multiple-deals-counter-illicit-atomic-trafficking/
Chinese shipbuilder reveals breakthrough technology – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/20/c_132646180.htm
CNOOC Gas undertakes China’s first floating LNG project – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132633910.htm
People’s Republic of China’s Huawei And Security: The Bigger Picture
http://www.crn.com/news/networking/240160101/huawei-and-security-the-bigger-picture.htm?
People’s Republic of China’s Huawei Exec: We Need To Be A Better Communicator
http://www.crn.com/news/networking/240160097/huawei-exec-we-need-to-be-a-better-communicator.htm?

3 reasons Baidu is aiming high in Indonesia
http://www.techinasia.com/3-reasons-why-baidu-expanding-indonesia/?

Business Insider’s Reporting on the (中華人民共和國) People’s Republic of China
http://blog.hiddenharmonies.org/2013/08/business-insiders-reporting-on-china/
JPMorgan Chase Hit With China Bribery Probe
http://www.thenewamerican.com/economy/sectors/item/16360-jpmorgan-chase-hit-with-china-bribery-probe

Apple iPad market share plummets in China as domestic vendors grow
http://www.computerworld.com/s/article/9241731/Apple_iPad_market_share_plummets_in_China_as_domestic_vendors_grow?
Apple said to be close to 4G deal with China Mobile|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1204&MainCatID=12&id=20130816000097
Commentary: Well-behaved int’l firms welcomed in the People’s Republic of China – Xinhua | English.news.cn
http://news.xinhuanet.com/english/indepth/2013-08/19/c_132643309.htm
Xinhua Insight: Police reveal details of GSK China’s alleged violations – Xinhua | English.news.cn
http://news.xinhuanet.com/english/indepth/2013-07/26/c_132574386.htm

Why is China so Afraid of a Small Protest?
http://thediplomat.com/china-power/why-is-china-so-afraid-of-a-small-protest/?
With Bo Xilai on Trial, China Adopts Chongqing Model
http://thediplomat.com/china-power/with-bo-xilai-on-trial-china-adopts-chongqing-model/?

Russia Setting up Cyber Warfare Unit Under Military
http://www.ibtimes.co.uk/articles/500220/20130820/russia-cyber-war-hack-moscow-military-snowden.htm#!

Iran Trains Students to Target Drones |
http://defensetech.org/2013/08/19/iran-trains-students-to-target-drones/
Three Major Al-Qaida Forums Disrupted by DDOS Attack
http://news.softpedia.com/news/Three-Major-Al-Qaida-Forums-Disrupted-by-DDOS-Attack-376443.shtml

Digital Dao: The Cyber Kill Chain: Trademarked by Lockheed Martin?
Lockheed Martin is just angry they did not receive a $ SIX BEEELIION Cyber Contract from Uncle Sam…C’mon guys your background check would have caught the traitor Booz Allen Hamilton gave the world 🙂

http://jeffreycarr.blogspot.com/2013/08/the-cyber-kill-chain-trademarked-by.html

Infosecurity… Major Media Organizations Still Vulnerable Despite High Profile Hacks |
http://www.infosecurity-us.com/view/34043/infosecurity-exclusive-major-media-organizations-still-vulnerable-despite-high-profile-hacks/
Countering Advanced Persistent Threats with Comprehensive Network Security
http://www.infosecisland.com/blogview/23351-Countering-Advanced-Persistent-Threats-with-Comprehensive-Network-Security-.html
Total Defense | Blog | The cyber-attacks transformation
http://www.totaldefense.com/blogs/2013/08/19/the-cyber-attacks-transformation.aspx?
Angry Kitten…Electronic Warfare Development Targets Fully Adaptive Threat Response Technology
http://www.gatech.edu/newsroom/release.html?nid=228881

Thinking Differently: Unlocking the Human Domain in Support of the 21st Century Intelligence Mission | Small Wars Journal
http://smallwarsjournal.com/jrnl/art/thinking-differently-unlocking-the-human-domain-in-support-of-the-21st-century-intelligence

NIST Updates Patching and Malware Avoidance Guides
http://www.infosecurity-us.com/view/34070/nist-updates-patching-and-malware-avoidance-guides/
Thousands affected in US Energy agency breach
http://www.scmagazine.com.au/News/354011,thousands-affected-in-us-energy-agency-breach.aspx?utm_source=feedly
ENISA Report Outlines Incidents Causing Major Outages at Telcos | SecurityWeek.Com
http://www.securityweek.com/enisa-report-outlines-incidents-causing-major-outages-telcos?

Enjoy!

Semper Fi,

謝謝
紅龍

People’s Republic of China Cyber Situation Awareness for 7 AUG 2013

Good day folks;

Today’s edition of the People’s Republic of China Cyber Situation Awareness for 7 AUG 2013 includes some very interesting tidbits on the more claims of Intellectual Property theft by Chinese State Owned Enterprises…Sinovel for example…stay tuned for some interesting analysis regarding the world’s largest wind farm in Panama and the ties to the People’s Republic of China via the good ‘ol USA…

People’s Republic of China SOE SINOVEL, paid insider ‘to kill my company…’ 謝謝您, @zenrandom 紅龍
http://investigations.nbcnews.com/_news/2013/08/06/19566531-chinese-firm-paid-insider-to-kill-my-company-american-ceo-says#comments
Chinese Comment Crew caught taking over a fake Water Plant
http://securityaffairs.co/wordpress/16961/hacking/chinese-comment-crew-caught-taking-over-a-fake-water-plant.html
Flipboard is Now Blocked In China, But Chinese Edition Of App Is Left Unmolested
http://www.techinasia.com/china-great-firewall-blocks-flipboard/?
People’s Republic of China’s evolution on North Korea…”…No more petulance or obstinate behaviour…”
http://koreajoongangdaily.joins.com/news/article/article.aspx?aid=2975673
Is the People’s Republic of China a challenge to the existing international order? |
http://www.opendemocracy.net/openglobalrights/jiangnan-zhu/is-china-challenge-to-existing-international-order
People’s Republic of China funding development of Gwadar Port in Pakistan
http://www.dnaindia.com/india/1871210/report-china-funding-development-of-gwadar-port-in-pakistan-antony
Fighting corruption in the People’s Republic of China backfires by driving resistance
http://www.chinapost.com.tw/commentary/the-china-post/frank-ching/2013/08/07/385770/Fighting-corruption.htm
People’s Republic of China’s Huawei recruiting City workers for new London finance centre
http://www.computerworlduk.com/news/it-business/3462369/huawei-recruiting-city-workers-for-new-london-finance-centre/
China’s People’s Daily continues attack on US constitution
http://www.scmp.com/news/china/article/1294861/peoples-daily-continues-attack-us-constitution

Cybercrime as a Service
http://resources.infosecinstitute.com/cybercrime-as-a-service/

Enjoy Folks!

Semper Fi –

謝謝

紅龍

Cyber Situational Awareness (SA) for 6AUG2013

Good day Folks;

Below are series of very interesting and relevant cyber situational articles for reading and study.

Please pay particular attention to an uptick in the news regarding two of the People’s Republic of China’s significant State Owned Enterprises (SOE) Huawei and Lenovo…

The Diversified Employment of China’s Armed Forces
http://goo.gl/kN10J8
People’s Republic of China’s C919 commercial jet to have maiden flight in 2015|
Hey Airbus & Boeing, these are not the airframe copies you are looking for…

http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130806000083&cid=1102
Wiki reboot: Chinese Wikipedia makes comeback after early censorship
A censorship blackout lost Chinese Wikipedia many of its users. Now a new generation of mainland volunteers is resuscitating the site

http://www.scmp.com/lifestyle/arts-culture/article/1293878/wiki-reboot-chinese-wikipedia-makes-comeback-after-early
Is the People’s Republic of China’s vast Web monitoring actually helping to grow democracy?
http://www.washingtonpost.com/blogs/worldviews/wp/2013/08/05/is-chinas-vast-web-monitoring-actually-helping-to-grow-democracy/
People’s Republic of China’s Ministry of Truth: Worse Than the Soviet Union
WAR IS PEACE • FREEDOM IS SLAVERY • IGNORANCE IS STRENGTH

http://chinadigitaltimes.net/2013/08/ministry-of-truth-worse-than-the-soviet-union/
People’s Daily chief moves to State Council Information Office
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1601&MainCatID=16&id=20130512000014
Lu Wei, People’s Republic of China’s new internet chief
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1601&MainCatID=16&id=20130513000005
‘Father of Great Firewall’ steps down from Beijing university|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130719000080&cid=1601
People’s Republic of China: Internet playing a major role in US military strategy|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1501&MainCatID=15&id=20130620000124
French Gvmt Report Warns of Money Laundering by Chinese, Russians in Wine Deals-Caijing
http://english.caijing.com.cn/2013-08-06/113135788.html
AirSea Battle, A2/AD and the Offense-Defense Balance
http://thediplomat.com/flashpoints-blog/2013/08/06/airsea-battle-a2ad-and-the-offense-defense-balance/?all=true
Decoding Xi Jinping’s ‘China Dream’
http://www.csmonitor.com/World/Asia-Pacific/2013/0726/Decoding-Xi-Jinping-s-China-Dream
People’s Republic of China’s Huawei $44 Million Connection Between Pakistan & China; Will it Be Censored?
http://www.techinasia.com/huawei-lay-44-million-fiberoptic-cableconnecting-pakistan-china/?
Despite spy raps, Filipino DepEd taking China computers from People’s Republic of China’s Huawei
http://technology.inquirer.net/27799/despite-spy-raps-deped-taking-china-computers
India…Foreign vendors (HUAWEI) won’t share design details of telecom equipment
http://www.thehindu.com/news/national/foreign-vendors-wont-share-design-details-of-telecom-equipment/article4993082.ece
US a high-risk place for data theft, second only to People’s Republic of China, say German companies
http://www.wired.co.uk/news/archive/2013-08/06/germany-fears-us-surveillance

Where Hackers and Spooks Mingle
Seeking to Boost Their Ranks, Government-Security Experts Try to Woo Tech-Minded Rebels at Two Vegas Conferences

http://online.wsj.com/article/SB10001424127887323420604578648401799914658.html
Companies ‘not aware’ of being hacked
http://www.news24.com/Technology/News/Companies-not-aware-of-being-hacked-20130802

New cyber range promotes cyber warfare…in Hawaii, closer to the People’s Republic of China…
http://www.kaleo.org/news/new-cyber-range-promotes-cyber-security/article_fea371f2-fd7b-11e2-8312-0019bb30f31a.html

The Future of US Cyber Command
http://rpdefense.over-blog.com/the-future-of-us-cyber-command

NSA Revelations Hurt Collaboration With Hackers Who Now Feel Betrayed
http://www.businessinsider.com/nsa-revelations-hurt-collaboration-with-hackers-who-now-feel-betrayed-2013-8?
XKeyscore a ‘God-terminal’ into Internet | Germany | DW.DE | 03.08.2013
http://www.dw.de/xkeyscore-a-god-terminal-into-internet/a-16994780

Feds Are Suspects in New Malware That Attacks Tor Anonymity | Threat Level |
http://www.wired.com/threatlevel/2013/08/freedom-hosting/

Triangle universities strengthen cybersecurity as hackers grow bolder | Technology |
http://www.newsobserver.com/2013/08/04/3081674/triangle-universities-strengthen.html
Hacker’s Mysterious Death Prompts Concerns About Pacemakers
http://www.wtma.com/common/more.php?m=58&ts=1375709704&article=A5AE5E8FFDCF11E286DEFEFDADE6840A&mode=2
Malicious Bank of America (BofA) ‘Statement of Expenses’ themed emails lead to client-side exploits and malware
http://blog.webroot.com/2013/08/06/malicious-bank-of-america-bofa-statement-of-expenses-themed-emails-lead-to-client-side-exploits-and-malware/
Anatomy of a cryptographic oracle – understanding (and mitigating) the BREACH attack
http://nakedsecurity.sophos.com/2013/08/06/anatomy-of-a-cryptographic-oracle-understanding-and-mitigating-the-breach-attack/?
Freedom Hosting arrest and takedown linked to Tor privacy compromise
http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/?

Inside Japan’s invisible army
http://tech.fortune.cnn.com/2013/08/05/inside-japans-invisible-army/

The Dangers of a Sensationalist Portrayal of Veterans
http://atwar.blogs.nytimes.com/2013/08/05/the-dangers-of-a-sensationalist-portrayal-of-veterans/?src=recg&_r=1&

Enjoy!

Semper Fi;

謝謝
紅龍

Cyber & Information Security Situation Awareness (SA)

Good Monday Morning Folks;

Many cyber situational stories to entertain and tantalize you with this morning!
Pay particular attention to the growing militarism within the People’s Republic of China…in their Naval, Ground and yes, Cyber Forces…
You’ll note also some cybernia news out of the Soviet-bloc…
And lastly, but certainly not least – the American Bar Assoc has a new handbook about cyber…yikes – when lawyer and cyber get mixed together…well you get the picture…

Enjoy today’s cyber news!

PLA (中國人民解放軍) urged to reform, upgrade to fight hi-tech wars in future
http://www.scmp.com/news/china/article/1294071/pla-urged-upgrade-fight-hi-tech-wars-and-tackle-corruption

FIGHT ON UNTIL U.S. IMPERIALISM IS WILLING TO GIVE UP – Mao Tse T’ung 1953解放军报专题
http://english.pladaily.com.cn/special/mao/txt/m5.htm
Long march and unending victories
http://eng.mod.gov.cn/Opinion/2013-08/02/content_4460598.htm

Chinese Hacking Team Caught Taking Over Decoy Water Plant | MIT Technology Review
http://www.technologyreview.com/news/517786/chinese-hacking-team-caught-taking-over-decoy-water-plant/

People’s Republic of China’s Beijing hacking combine exposed
http://www.usatoday.com/story/cybertruth/2013/08/02/beijing-hacking-combine-exposed/2611307/

Why Hating the People’s Republic of China Is Futile
http://www.forbes.com/sites/kenrapoza/2013/08/01/why-hating-china-is-futile/

Beijing launches platform to debunk online rumors
http://www.wantchinatimes.com/news-print-cnt.aspx?MainCatID=11&cid=1103&id=20130803000006

People’s Republic of China will become the world’s largest space power: US professor
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130805000106&cid=1101

Choosing Sides: Who’s Partnered with Who in People’s Republic of China’s Internet War?
http://www.techinasia.com/choosing-sides-in-china-internet-wars/

Chinese telecoms giant Huawei has hit back at allegations by a former CIA chief that the company spies for Beijing, labeling them “defamatory” and “baseless”.
http://www.securityweek.com/huawei-lashes-out-ex-cia-chief-over-spying-claims
People’s Republic of China’s Most Irrelevant Search Engines to Merge? Chinese Government Search Engines|
http://www.techinasia.com/chinas-irrelevant-search-engines-merge-government-takes-swing-search/
If governments ban China-based Lenovo, should companies?
U.S., several other countries have banned computers from Lenovo after finding backdoors in hardware in firmware, report says

http://www.csoonline.com/article/737586/if-governments-ban-china-based-lenovo-should-companies-
False People’s Republic of China’s Lenovo Security Report Only Strengthens World’s Top PC Maker
http://www.computerworld.com/s/article/9241326/False_Lenovo_Security_Report_Only_Strengthens_World_39_s_Top_PC_Maker?

People’s Republic of China stresses its defensive military policy
http://eng.mod.gov.cn/DefenseNews/2013-08/02/content_4460650.htm
Digital Dao: Aviation companies twice as likely to be hacked if they do business in China
Ask me about my Boeing China Aviation Research and their denial – er, response….

http://jeffreycarr.blogspot.com/2013/07/aviation-companies-twice-as-likely-to.html

Meet the NSA’s New Data Centers: Russia, People’s Republic of China, and Venezuela
http://blog.foreignpolicy.com/posts/2013/07/31/meet_the_nsas_new_data_centers_russia_china_venezuela

Attackers turning to legit cloud services firms to plant malware
http://www.computerworld.com/s/article/9241324/Attackers_turning_to_legit_cloud_services_firms_to_plant_malware?

Understanding the Global Risk of Cybercrime
http://www.scl.org/site.aspx?i=ed32886
New ‘Hacked shells as a service’ empowers cybercriminals with access to high page rank-ed Web sites
http://blog.webroot.com/2013/08/02/new-hacked-shells-as-a-service-empowers-cybercriminals-with-access-to-high-page-rank-ed-web-sites/

The Soviet-Era Strategy That Explains What Russia Is Doing With Snowden
Whataboutistm: a rhetorical defense that alleges hypocrisy from the accuser. And it’s going to make it a lot harder to criticize Moscow on human rights.

http://www.theatlantic.com/international/archive/2013/08/whataboutism-the-soviet-era-strategy-that-partly-explains-why-russia-took-snowden/278314/
Russian Cyber Criminals selling hacked websites access in Underground stores
http://thehackernews.com/2013/08/russian-hackers-underground-hacking-websites.html

FBI Has Been Developing Cyber Hacking Tools for Over a Decade to Attack Criminals
http://www.hngn.com/articles/9332/20130804/fbi-developing-cyber-hacking-tools-over-decade-attack-criminals.htm
Disposable Spy Computers Are Disturbingly Easy and Cheap to Make
http://gizmodo.com/disposable-spy-computers-are-disturbingly-easy-and-chea-1014343556
Latvia Refuses To Extradite The Creator Of Gozi Trojan
The country’s Foreign Minister says the 67-year prison term facing hacker Deniss Calovskis is too severe
http://www.techweekeurope.co.uk/news/latvia-refuses-to-extradite-the-creator-of-gozi-trojan-123725?
ABA Cybersecurity Handbook
http://www.lawfareblog.com/2013/08/aba-cybersecurity-handbook/

Semper Fi,

謝謝
紅龍

New threats: Unknown Cyber Threats & APT according to InfoSec Researchers in the Peoples’s Republic of China 新型威胁:未知威胁与APT 中華人民共和國

 New threats: Unknown Cyber Threats & APT according to InfoSec Researchers in the Peoples’s Republic of China 新型威胁:未知威胁与APT 中華人民共和國

 http://www.vulnhunt.com/nextgen/apt/

Good day folks;

Here’s an article about how information security researchers within the People’s Republic of China, 中華人民共和國 define ‘Unknown Cyber Threats & the innocuous Western term “APT”.

Enjoy!

Semper Fi,

謝謝您

紅龍

 

安全威胁近些年来发生巨大的变化,黑客攻击从传统带有恶作剧与技术炫耀性质逐步转变为利益化、商业化。为了突破传统的安全防御方法,一种名为APT的攻击迅速发展起来。APT是advanced persistent threat的缩写,译为高级持续性威胁。它是指近年来,专业且有组织的黑客(甚至可能有国家背景支持),针对重要目标和系统发起的一种攻击手段。

APT的主要特征:

 持续性: 攻击者为了重要的目标长时间持续攻击直到攻破为止。攻击成功用上一年到三年,攻击成功后持续潜伏五年到十年的案例都有。这种持续性攻击下,让攻击完全处于动态发展之中,而当前我们的防护体系都是强调静态对抗能力很少有防护者有动态对抗能力,因此防护者或许能挡住一时的攻击,但随时间的发展,系统不断有新的漏洞被发现,防御体系也会存在一定的空窗期:比如设备升级、应用需要的兼容性测试环境等等,最终导致系统的失守。

终端性: 攻击者虽然针对的是重要的资产目标,但是入手点却是终端为主。再重要的目标,也是由终端的人来访问的。而人在一个大型组织里,是难以保证所有人的安全能力与安全意识都处于一个很高水准之上的。而做好每个人的终端防护比服务器端防护要困难很多。通过SQL注射攻击了WEB服务器,一般也是希望利用他攻击使用这些WEB服务器的终端用户作为跳板渗透进内网。

广谱信息收集性: 攻击者会花上很长的时间和资源,依靠互联网搜集,主动扫描,甚至真实物理访问方式,收集被攻击目标的信息,主要包括:组织架构,人际关系,常用软件,常用防御策略与产品,内部网络部署等信息。

针对性: 攻击者会针对收集到的常用软件,常用防御策略与产品,内部网络部署等信息,搭建专门的环境,用于寻找有针对性安全漏洞,测试特定的木马是否能饶过检测。

未知性: 攻击者依据找到的针对性安全漏洞,特别是0DAY,根据应用本身构造专门的触发攻击的代码。并编写符合自己攻击目标,但能饶过现有防护者检测体系的特种木马。这些0DAY漏洞和特种木马,都是防护者或防护体系所不知道的。

渗透性社工: 攻击者为了让被攻击者目标更容易信任,往往会先从被攻击者目标容易信任的对象着手,比如攻击一个被攻击者目标的电脑小白好友或家人,或者被攻击者目标使用的内部论坛,通过他们的身份再对组织内的被攻击者目标发起0DAY攻击,成功率会高很多。再利用组织内的已被攻击成功的身份再去渗透攻击他的上级,逐步拿到对核心资产有访问权限的目标。

隐蔽合法性: 攻击者访问到重要资产后,往往通过控制的客户端,分布使用合法加密的数据通道,将信息窃取出来,以饶过我们的审计和异常检测的防护。

长期潜伏与控制: 攻击者长期控制重要目标获取的利益更大。一般都会长期潜伏下来,控制和窃取重要目标。当然也不排除在关键时候破坏型爆发。

从以上特性来看,可以获得如下结论

APT攻击的成本很高(专业的团队,长期的信息收集,挖掘0DAY和利用,特马,环境测试,渗透性社工与潜伏,多种检测对抗),因此只适合专业的网络犯罪团伙或有组织和国家支持的特种攻击团队

因此APT攻击是针对有重要价值资产或重要战略意义的目标,一般军工、能源、金融、军事、政府、重要高科技企业等最容易遭受APT攻击。

虽然普通网民不会遭受APT攻击的眷顾,但是如果你是APT攻击目标组织的一名普通员工甚至只是与APT攻击目标组织的一名普通员工是好友或亲戚关系,你依然可能成为APT攻击的中间跳板,当然作为普通个人,APT攻击本身不会窃走你个人什么东西(你本身就是重要人物如组织中的高级管理人员或个人主机里保存有重要资料的除外)。

不要以为你重要的信息资产只在内网甚至物理隔离就能不遭受APT攻击,因为即使物理阻止了网络层流,也阻止不了逻辑上的信息流。RSA被APT攻击利用FLASH 0DAY偷走了在内网严密保护的SECURID令牌种子,震网利用7个0DAY和摆渡成功渗透进了伊朗核设施级的物理隔离网络。

 New threats: unknown threats and APT

Security threats change dramatically in recent years, with a mischievous hacker attacks from the traditional sports and technology gradually changed the nature of the interests and commercialization. In order to break through the traditional method of security and defense, called APT attacks developed rapidly. APT is the advanced persistent threat acronym, translated advanced persistent threats. It refers to recent years, professional and organized hackers (and may even have national context support), an important goal and system for initiating a means of attack.

APT main features:

 

Sustainability: an important target for attackers continued to attack until a long break so far. A successful attack to spend one to three years, a successful attack lurking five to ten years after the last case has. This persistent attack, the attacker completely dynamically evolving, and the current emphasis of our protection system are rarely static protective ability against those who have the dynamic ability to fight, so those who may be able to block the protective moment of attack, but with the time of development, the system constantly new vulnerabilities are discovered, there will still be some defense system window period: for example, equipment upgrades, application compatibility testing environment and so require, eventually leading to the fall of the system.

Terminal resistance: Although the attacker is an important asset for a goal, but starting point is the main terminal. Further important objective, but also by people to access the terminal. And people in a large organization, it is difficult to ensure the safety of all ability and safety awareness are at a very high level above. And do everyone’s terminal protective than the server-side protection to be much more difficult. SQL injection attacks via the WEB server, are generally hoping to use him against the use of these WEB server as a springboard to penetrate into the end-user within the network.

Broad spectrum of information collection: the attacker will take a long time and resources, relying on the Internet to collect, active scanning, and even real physical access, to collect information about the target to be attacked, including: organizational structure, interpersonal relationships, commonly used software, common defense strategy and products, internal network deployment and other information.

Targeted: The attacker will be collected from the commonly used software for commonly used defense strategy and products, internal network deployment and other information, to build a dedicated environment for finding security vulnerabilities targeted to test whether a particular Trojan bypass detection.

Unknown sex: the attacker targeted basis to find security vulnerabilities, especially 0DAY, depending on the application itself is constructed of specialized trigger an attack code. And prepared in line with their targets, but it can bypass the existing system of special protection by detecting Trojans. These 0DAY loopholes and special Trojans, are protective or protective system does not know.

Permeability social workers: the attacker to allow an attacker to target more likely to trust, they tend to start with the easy confidence by attackers target object to proceed, such as attacking a target computer to be attacked by white friends or family, or the attacker targets Using the internal forum, through their identity and then the organization launched by attackers target 0DAY attack, the success rate would be much higher. Re-use within the organization’s identity has been successful attack penetration attacks his superiors to go step by step to get to the core assets have access goals.

Covert Legitimacy: the attacker access to critical assets, often through the control of the client, using the legitimate distribution of encrypted data channel, the information to steal out to bypass our audit and anomaly detection protection.

Long-term potential and control: an attacker to obtain long-term control of the interests of more important goals. Usually long-simmering down, control and steal important goals. Of course, does not rule out sabotage outbreak at a critical time.

From the point of view the above characteristics, the following conclusions can be obtained

APT attack is costly (professional team, long-term information gathering, mining and utilization 0DAY, Tema, environmental testing, permeability and latent social workers, a variety of detection confrontation) is intended only for professional or organized cybercrime gangs and national support team special attack

Therefore APT attacks are of great value for the asset or strategically important objectives, general military, energy, finance, military, government, and other key high-tech enterprise most vulnerable to APT attacks.

While ordinary users will not suffer APT attacks attention, but if you are APT attacks target tissue or even just an ordinary employee organization with APT attack targets a general staff are friends or relatives, you are still likely to be in the middle of APT attack springboard, of course, as an ordinary person, APT attack itself will not steal your personal anything (such as your own is an important figure in the senior management of the organization or individual host inside except the preservation of important data).

Do not think you important information assets are physically isolated from the internal network can not even suffer APT attacks because even if the physical network layer prevents flow logically can stop the flow of information. RSA APT attacks use FLASH 0DAY was stolen including network closely guarded SECURID token seed, Stuxnet and ferry use 7 0DAY successful penetration into the Iranian nuclear facility-level physical isolation network.

http://www.vulnhunt.com/nextgen/apt/

People’s Republic of Cyber Conflict & Operation Middle Kingdom….

Good Monday Morning Friends;

Much cyber conflict news related to the People’s Republic of China’s HUAWEI over the weekend.
Take particular note of both India and the United Kingdom’s leadership being pawned by HUAWEI…
Also worth mentioning is that the former head of the US Central Intelligence Agency knows and is now revealing that the People’s Republic of China’s Huawei so pies for the People’s Republic of China…oh dear no! Really…<>

Enjoy –

How Mao Tse T’ung created the People’s Republic of China’s capitalist revolution [Straits Times]
http://wanderingchina.org/2013/07/27/how-mao-created-chinas-capitalist-revolution-straits-times-risingchina-reform-mao/

Ex-CIA chief accuses People’s Republic of China’s Huawei of industrial espionage – Telegraph
http://www.telegraph.co.uk/technology/news/10191154/Ex-CIA-chief-accuses-Huawei-of-industrial-espionage.html
Why is the former head of the NSA convinced Huawei is a threat to US communication networks? | Digital Trends
http://www.digitaltrends.com/mobile/huawei-threat-to-the-us/
People’s Republic of China’s Huawei in charge of UK TalkTalk’s net filtering
Operation Middle Kingdom…Chinese colonization of United Kingdom near complete as Phase V is accomplished…
http://www.computerworlduk.com/news/security/3460990/huawei-in-charge-of-talktalks-net-filtering/
People’s Republic of China’s Huawei says it ‘shares the same cyber security goals’ as the UK government
Operation Middle Kingdom…Chinese colonization of United Kingdom near complete as Phase V is accomplished…

http://www.pcadvisor.co.uk/news/security/3459981/huawei-says-it-shares-the-same-cyber-security-goals-as-the-uk-government/
People’s Republic of China’s Huawei gets closer to its users by P@WNing India…
Operation Middle Kingdom…Chinese colonization of India near complete as Phase V is accomplished…

http://www.thehindu.com/sci-tech/technology/huawei-gets-closer-to-its-users/article4960652.ece
People’s Republic of China’s Huawei lashes out at spying allegations from former CIA head
http://gigaom.com/2013/07/19/huawei-lashes-out-at-spying-allegations-from-former-cia-head/
People’s Republic of China’s Huawei revenue grows |
http://www.itweb.co.za/index.php?option=com_content&view=article&id=65959:Huawei-revenue-grows&catid=118
Australians ‘should not fear Chinese investment’, especially People’s Republic of Huawei, says Bob Carr
http://www.scmp.com/news/hong-kong/article/1291670/australians-should-not-fear-chinese-investment-says-foreign-minister

Spy agencies ban People’s Republic of China’s Lenovo PCs on security concerns
Recall friends that Lenovo has DIRECT ties to the Chinese Academy of Sciences and the People’s Liberation Army….
http://www.afr.com/p/technology/spy_agencies_ban_lenovo_pcs_on_security_HVgcKTHp4bIA4ulCPqC7SL
Intelligence services fear People’s Republic of China’s Lenovo products due to back-doors
http://www.neowin.net/news/intelligence-services-fear-lenovo-products-due-to-back-doors
Rare Glimpse into a Real-Life Command-and-Control Server | “Dragon Eye – Mini”
http://www.crowdstrike.com/blog/rare-glimpse-real-life-command-and-control-server/index.html

Record malware growth in People’s Republic of China…
http://www.net-security.org/malware_news.php?id=2546

How America’s Top Tech Companies Created the Surveillance State
http://www.nationaljournal.com/magazine/how-america-s-top-tech-companies-created-the-surveillance-state-20130725

Security Vendors: Do No Harm, Heal Thyself — Krebs on Security
Symantec quietly releasedsecurity updates to fix serious vulnerabilities in itsSymantec Web Gateway, a popular line of security appliances designed to help “protect organizations against multiple types of Web-borne malware.”
http://krebsonsecurity.com/2013/07/security-vendors-do-no-harm-heal-thyself/

CreepyDOL…Cheap Monitoring Highlights Dangers Of Internet Of Things — Dark Reading
http://www.darkreading.com/monitoring/cheap-monitoring-highlights-dangers-of-i/240159061

U.K. Ministry of Defence hit by cyberattack, data stolen | ZDNet
http://www.zdnet.com/u-k-ministry-of-defence-hit-by-cyberattack-data-stolen-7000017831/
People’s Republic of China’s Huawei slammed for locking GCHQ personnel out of security cell
http://www.v3.co.uk/v3-uk/news/2283330/huawei-slammed-for-locking-gchq-personnel-out-of-security-cell?

China’s UK censorwall will also block “terrorist content,” “violence,” “circumvention tools,” “forums”
http://boingboing.net/2013/07/26/uk-censorwall-will-also-block.html

Russian hackers got 160 million bank card numbers, but that wasn’t worst part
Federal prosecutors say they’ve blown open the largest hacking ring in US history, indicting four Russians and a Ukrainian. The biggest worry: One of them hacked into NASDAQ.

http://www.csmonitor.com/USA/Justice/2013/0725/Russian-hackers-got-160-million-bank-card-numbers-but-that-wasn-t-worst-part

Semper Fi,

謝謝
紅龍

People’s Republic of China & Operation Middle Kingdom…oh yes, Huawei and the colonization of Africa & India….

Good day my curious friends…much in the cyber news to amuse and entrain, but never alarm you…

Pay particular attention the articles below related to Huawei and their colonization of India via BSNL and Ethiopia via massive telco rollouts. People’s Republic of China & Operation Middle Kingdom…oh yes, Huawei and the colonization of Africa & India….always remember that a significant amount of cyber threat news and alerts will be released on Friday, saturdays and Sundays…when no one is paying attention…

Enjoy –

People’s Republic of Hacking, er…China is stealing intellectual property to boost its economic development…
Don’t let Snowden overshadow the real cyber threat

http://www.ft.com/intl/cms/s/0/d18f1e6a-ef97-11e2-a237-00144feabdc0.html

UK’s Cameron recommended porn filter controlled by People’s Republic of China’s Huawei
http://www.computing.co.uk/ctg/news/2285074/camerons-recommended-porn-filter-controlled-by-huawei

Baidu’s guide to the eight biggest Internet scams in People’s Republic of China
http://www.danwei.com/baidus-guide-to-the-eight-biggest-internet-scams-in-china/

Chinese can be pressured into accepting global cybersecurity norms
http://www.fiercegovernmentit.com/story/lewis-chinese-can-be-pressured-accepting-global-cybersecurity-norms/2013-07-24
Chinese hacker who once targeted the US switches sides to help defend Western companies… |
http://www.abc.net.au/news/2013-07-22/chinese-hacker-switches-from-attack-to-defence/4836572
Chinese hacker to help defend Western companies
http://au.news.yahoo.com/latest/a/-/article/18104751/chinese-hacker-who-once-targeted-the-us-switches-sides-to-help-defend-western-companies/
The Decline of China’s Internet Cafes
http://thediplomat.com/china-power/the-decline-of-chinas-internet-cafes/?
The great firewall of China gets metaphorical
The Chinese government’s increasingly sophisticated approach to censorship demands a new interpretation

http://www.guardian.co.uk/technology/2013/jul/14/china-great-firewall-put-out
Hengqin New Area Aims to Skirt Great Firewall – China Digital Times (CDT)
http://chinadigitaltimes.net/2013/07/hengqin-new-area-aims-to-skirt-great-firewall/?

BSNL to switch to People’s Republic of China’s Huawei’s next generation networks
China’s colonization of India is now complete as Operation Middle Kingdom continues…

http://www.thehindu.com/business/Industry/bsnl-to-switch-to-huaweis-next-generation-networks/article4953441.ece
Huawei Hits 100th 100G Deployment Milestone, Paving an Information Super Highway for the Next Decade
http://www.webwire.com/ViewPressRel.asp?aId=177824
Ethiopia signs $700 mn mobile network deal with People’s Republic of China’s Huawei
Operation Middle Kingdom continues in Africa as People’s Republic of China colonizes with their business development instead of weapon systems…US AFRICOM puzzled by lack of success…

http://nazret.com/blog/index.php/2013/07/25/ethiopia-signs-700-mn-mobile-network-deal-with-china-s-huawei

Find Out Why Apple’s Revenues in China Dropped 43% in Q2
http://www.techinasia.com/apple-china-revenues-drop-q2-2013/
Insight: How Samsung is beating Apple in the People’s Republic of China
http://www.reuters.com/article/2013/07/26/us-samsung-apple-china-insight-idUSBRE96P05F20130726
Apple Developer site hack: doubts cast on Turkish hacker’s claims
Guardian investigation raises questions over claims by Turkish researcher that he hacked into Apple’s Developer portal

http://www.guardian.co.uk/technology/2013/jul/26/apple-developer-site-hack

Japanese Minister Proposes More Active Military Presence in Region
http://www.nytimes.com/2013/07/27/world/asia/japanese-minister-proposes-more-active-military-presence-in-region.html?&pagewanted=all

$300 million Russian cyber crime ring broken by US feds
http://www.scmagazineuk.com/300-million-russian-cyber-crime-ring-broken-by-us-feds/article/304680/
Five Charged in Massive Financial Hacking Case | TIME.com
http://techland.time.com/2013/07/26/five-charged-in-massive-financial-hacking-case/

US Marines Focused at Tactical Edge of Cyber, Commander Says…
http://www.defense.gov/news/newsarticle.aspx?id=120246
USAF pleads with airmen to think about business of cyber…http://www.defense.gov/news/newsarticle.aspx?id=120222

A historical overview of the cyberattack landscape
http://www.net-security.org/secworld.php?id=15284
US Military: Forget cold war — Here comes cyber war
http://www.digitaljournal.com/article/355119
“What Is That Box?” — When The NSA Shows Up At Your Internet Company
http://www.buzzfeed.com/justinesharrock/what-is-that-box-when-the-nsa-shows-up-at-your-internet-comp

Hacked in 276 Seconds – Timely Intelligence Improves Ability to Thwart Cyber Attacks: Survey |
http://www.securityweek.com/hacked-276-seconds-timely-intelligence-improves-ability-thwart-cyber-attacks-survey

KPMG red-faced after being found w/data leak Reverse assessment reveals KPMGs publicly accessible data |
http://www.scmagazineuk.com/exclusive-reverse-assessment-reveals-kpmgs-publicly-accessible-data/article/304295/

Semper Fi,

謝謝
紅龍

HITCON 2013 Concludes…”No, these are not the Chinese Cyberspies You are looking for, move along, move along…”! Red Dragon Returns from Taiwan…

Good Monday Morning from Taipei, Taiwan, Republic of China…

Much in the news to share – take particular note of the growing distrust in the People’s Republic of China’s State Owned Enterprise (SOE) HUAWEI. The United Kingdom is starting to wonder why Huawei’s own employees are reviewing their own telecommunications and networking kit…”No, these are not he Chinese Cyberspies You are looking for, move along, move along…”!

Winning Without Fighting: The Chinese Psychological Warfare Challenge
http://www.heritage.org/research/reports/2013/07/winning-without-fighting-the-chinese-psychological-warfare-challenge

German anxieties over the People’s Republic of China’s rise | Germany | DW.DE | 20.07.2013
http://www.dw.de/german-anxieties-over-chinas-rise/a-16963665?

UK discovers People’s Republic of China’s Huawei UK staff auditing Huawei kit: Govt orders probe •
http://www.theregister.co.uk/2013/07/19/huawei_cybersecurity_centre/

Huawei’s Chinese connection continues to be source of suspicion
http://www.net-security.org/secworld.php?id=15254
People’s Republic of China’s Huawei Tells Accusers ‘Put Up, or Shut Up’ Following Fresh Spying Allegations
http://www.ibtimes.co.uk/articles/492427/20130719/huawei-lashes-out-spying-allegations-cia-uk.htm
Ex-CIA chief Hayden claims People’s Republic of China’s Huawei spies for Chinese state
http://www.scmp.com/news/china/article/1286054/it-goes-without-saying-huawei-spies-china-says-ex-cia-chief
Former CIA boss says aware of evidence Huawei spying for thePeople’s Republic of China
http://www.reuters.com/article/2013/07/19/us-huawei-security-idUSBRE96I06I20130719
Huawei accused of spying for the People’s Republic of China by former CIA boss
http://www.slashgear.com/huawei-accused-of-spying-for-china-by-former-cia-boss-18291022/?
Anatomy of another Android hole – Chinese researchers claim new code verification bypass
http://nakedsecurity.sophos.com/2013/07/17/anatomy-of-another-android-hole-chinese-researchers-claim-new-code-verification-bypass/?

People’s Republic of China’s Huawei denies spying for Chinese government
http://www.digitalspy.co.uk/tech/news/a499762/huawei-denies-spying-for-chinese-government.html?rss
People’s Republic of China’s Huawei says CIA chief’s spy claims were ‘politically inspired and racist corporate defamation’
http://www.computing.co.uk/ctg/news/2283637/huawei-says-cia-chief-s-spy-claims-were-politically-inspired-and-racist-corporate-defamation
People’s Republic of China’s Huawei fends off more spying claims and faces UK security review
http://www.fiercewireless.com/europe/story/huawei-fends-more-spying-claims-and-faces-uk-security-review/2013-07-19?

PRISM Causes China’s Public Campaign Against American Companies
Growing Chinese Animosity Following PRISM Revelations Could Threaten Tech Firms’ Prospects In World’s No. 2 Economy

http://www.ibtimes.com/growing-chinese-animosity-following-prism-revelations-could-threaten-tech-firms-prospects-worlds-no

Good Practices Guide on Non-Nuclear Critical Energy Infrastructure Protection (NNCEIP) from Terrorist Attacks Focusing on Threats Emanating from Cyberspace
http://www.osce.org/atu/103500

US Military to Deploy Units Devoted to Cyber Operations
http://www.acqmagazine.com/military-to-deploy-units-devoted-to-cyber-operations/

Enjoy!

Semper Fi,

謝謝
紅龍

Taiwan & Asia’s Premiere Hacking CON – HITCON 2013 – MicroSolved’s own Red Dragon Rising Keynotes

Good morning from Taiwan & Asia’s Premiere Hacking CON – HITCON 2013
MicroSolved’s own Red Dragon Rising Keynotes on the comparative cyber convict doctrine of the People’s Republic of China, Russia and Iran!
If you are in Taipei please stop by and say ‘hello’!

Today’s cyber threat situational awareness (SA) includes quite a few items about the People’s Republic of China’s Huawei and the companies efforts to support the Communist Regimes efforts to colonize the world via Operation Middle Kingdom (OP Middle Kingdom). You’ll note that the Brit’s are getting wise to Huawei’s investment initiatives as a possible threat to Her Royal Majesty’s National Security. On a similar track is Saudi Arabia’s investment in Huawei…and thus the high tech colonization of the Middle East has begun. India has already been colonized by Huawei as you’ll read about the significant volume of high tech patents Huawei has purchased in the former British colony.

Please enjoy these cyber threat SA items – more to come I’m certain from HITCON 2013 in 台北, 中華民國 ~ Taiepi, Republic of China.

How the U.S. Uses Information Gained From Spying on Foreign Companies

UK reviews People’s Republic of China’s Huawei security center deal (as you would during a low-level cyberwar)

http://gigaom.com/2013/07/18/uk-reviews-huawei-security-center-deal-as-you-would-during-a-low-level-cyberwar/

http://www.theatlanticwire.com/national/2013/07/how-us-uses-information-gained-spying-foreign-companies/67321/
Britain to review People’s republic of China’s Huawei cyber center to allay security fears

http://www.reuters.com/article/2013/07/18/us-security-britain-huawei-idUSBRE96H0GA20130718

People’s Republic of China’s Huawei under investigation from UK government over security foul play | ITProPortal.com

http://www.itproportal.com/2013/07/18/huawei-under-investigation-from-uk-government-over-security-foul-play/

Government to review People’s Republic of China’s Huawei’s UK cyber security centre

http://www.computing.co.uk/ctg/news/2283352/government-to-review-huaweis-uk-cyber-security-centre

Saudia Arabia’s ITC & People’s Republic of Huawei in partnership to upgrade core network
People’s Republic of China’s Operation Middle Kingdom knows no limits as it focuses colonizaton of Saudia Arabia…


http://www.telegeography.com/products/commsupdate/articles/2013/07/18/itc-and-huawei-in-partnership-to-upgrade-core-network/?

People’s Republic of China’s Huawei Invests in 5G Networks IOT begin High Tech colonizing of world

http://blogs.wsj.com/digits/2013/07/17/huawei-invests-in-5g-networks/?

People’s Republic of China’s Huawei also developing an app to clear Other Storage problem

http://wmpoweruser.com/huawei-also-developing-an-app-to-clear-other-storage-problem/?

HTC-Huawei Merger Should Be Considered, Says JP Morgan Analyst | Tech Biz | The Diplomat

http://thediplomat.com/tech-biz/2013/07/17/htc-huawei-merger-should-be-considered-says-jp-morgan-analyst/?

People’s Republic of China’s Huawei reduces focus on U.S. market

http://news.cnet.com/8301-1001_3-57593961-92/huawei-reduces-focus-on-u.s-market/?

People’s Republic of China’s Hong Kong Ranked Asia’s Most Innovative Market

http://thediplomat.com/pacific-money/2013/07/18/hong-kong-ranked-asias-most-innovative-market/?

People’s Republic of China’s Huawei applied for 56K patents, invested $4.8bn in R&D in 2012
OP Middle Kingom successful as the People’s Republic of China’s High Tech colonization of India is complete.


http://www.thehindubusinessline.com/industry-and-economy/info-tech/huawei-applied-for-56k-patents-invested-48bn-in-rd-in-2012/article4924068.ece

Japan paper’s social media accounts ‘blocked in China’

http://phys.org/news/2013-07-japan-paper-social-media-accounts.html

Is North Korea Poised to Launch a Cyber Attack?

http://www.internationalpolicydigest.org/2013/07/13/is-north-korea-poised-to-launch-a-cyber-attack/?

South Korea accuses North of cyber attacks

http://www.reuters.com/article/2013/07/16/net-us-korea-cyber-idUSBRE96F0A920130716

Semper Fi!

謝謝
紅龍

Cyber Threat Situational Awareness for 09JUL2013

Good Day Folks;

Below is a short list of some of the latest stories you need to be aware of to maintain & improve your Cyber Threat Situational Awareness for today,09JUL2013…

矽對海洋和平,帕拉戰爭 or in Latin…Si vis pacem, para bellum…

Talking Cyberthreat With the People’s Republic of China

http://www.nytimes.com/2013/07/10/opinion/global/talking-cyberthreat-with-china.html?_r=0

Traitor Snowden revelations imperil cyber hacking talks with People’s Republic of China |

http://www.intellasia.net/snowden-revelations-imperil-cyber-hacking-talks-with-china-292273

Patriot hacker ‘The Jester’ attacks nations offering Snowden help

http://www.theregister.co.uk/2013/07/04/patriot_hacker_takes_aim_snowden_asylum_candidates/

South Korea Attackers ‘Pierced Military Networks’
Same crew that hit TV stations and banks managed to get malware onto military networks


http://www.techweekeurope.co.uk/news/mcafee-south-korea-attackers-military-hacks-121219?

Dissecting operation Troy: Cyberespionage in South Korea
http://www.net-security.org/article.php?id=1861
How Cybercriminals Operate — Dark Reading
A look at cybercriminal motives, resources, and processes — and how they may affect enterprise defense


http://www.darkreading.com/perimeter/how-cybercriminals-operate/240157738

Iran Planning Cyber Drills
http://english.farsnews.com/newstext.aspx?nn=13920415000930
US agency baffled by modern technology, destroys mice to get rid of viruses
The US Economic Development Administration (EDA) is an agency in the Department of Commerce takes a cyber threat property destruction lesson from the German Government 🙂 “…$170,000 of PCs, printers, keyboards, cameras, and mice destroyed in gross overreaction.”


http://arstechnica.com/information-technology/2013/07/us-agency-baffled-by-modern-technology-destroys-mice-to-get-rid-of-viruses/

Across Europe, Nations Mold Cyber Defenses

http://www.defensenews.com/article/20130709/DEFREG01/307090008/Across-Europe-Nations-Mold-Cyber-Defenses

Enjoy!

Semper Fi…

謝謝紅龍

Sign up for updates from MSI: http://eepurl.com/dk1PE