Hello from DayCon!

I have spent some time this week at DayCon in Dayton, Ohio. This is a small hacker conference, with attendance by invitation only. This year the event was focused on attack sources, emerging trends and new insights into the cutting edge of dealing with cyber-crime across many vertical markets and countries.

I speak later today, and I am focusing on the history of cyber-crime, the crime stream, the criminal value chain and how information coalesces before an attack. I look forward to my talk, especially given how engaged the crowd has been thus far with the other speakers. The hallway conversations have been great! 

Lots of variety in the speakers here, with professors, researchers, hackers and even some ICS/SCADA folks in attendance. Lots of good insights floating around and even a few new product ideas!

I’d highly suggest you check out DayCon next year.

PS – Also, looking at the calendar, we are prepping for DerbyCon next week. Come out and see us there. I will be speaking on the Stolen Data Impact Model (SDIM) project and other topics. Plus, as usual, we will be haunting the halls and swinging from the rafters! 🙂 See you in Louisville! 

Ask The Experts: Favorite HoneyPoint Component

This time around, we got a question from a client where HoneyPoint was being demoed for the experts.

Q: “What is your favorite component of HoneyPoint and why? How have you used it to catch the bad guys?”

Jim Klun started off with:

My favorite component is the simplest: HoneyPoint Agent. 

It’s ease of deployment and the simple fact that all alerts from an agent are of note – someone really did touch an internal service on a box where no such service legitimately exists – makes it attractive. 
No one will argue with you about meaning. 

I have recently seen it detect a new MSSQL worm (TCP 1433) within a large enterprise – information obtained from my own laptop. The Agent I had deployed on the laptop had a 1433 listener. It captured the payload from an attacking desktop box located in an office in another US state. 

The HoneyPoint Agent info was relayed to a corporate team that managed a global IPS. They confirmed the event and immediately updated their IPS that was – ideally – protecting several hundred thousand internal machines from attack. 

Honeypoint Agent: It’s simple, it works.

Adam Hostetler added his view:

I’m a simple, no frills guy, so I just like the regular old TCP listener component built into Agent. We have stood these up on many engagements and onsite visits and picked up unexpected traffic. Sometimes malware, sometimes a misconfiguration, or sometimes something innocuous (inventory management). I also find it useful for research by exposing it to the Internet.

John Davis closed with a different view:

My favorite HoneyPoint is Wasp. Watching how skilled attackers actually compromise whole networks by initially compromising one user machine gives me the shivers! Especially since most networks we see aren’t properly enclaved and monitored. If I were a CISO, knowing what is on my network at all times would be of primary importance; including what is going on on the client side! Wasp gets you that visibility and without all the traditional overhead and complexity of other end-point monitoring and white listing tools.

Have a question about HoneyPoint? Want to talk about your favorite component or use case scenario? Hit us on Twitter (@lbhuston or @microsolved). We can’t wait to hear from you. Feel free to send us your question for the experts. Readers whose questions we pick for the blog get a little surprise for their contribution. As always, thanks for reading and stay safe out there! 

Infosec, The World & YOU Episode 3 is Out!

Our newest episode is out, and this time we are joined by a very special guest, @TSGouge who discuss social engineering for companies and on the nation state scale. Victoria reveals her new plans to take over the world and Brent tries to keep up with these gals, who are straight up geniuses. We also pontificate on Syria and the potential for cyber-fallout from the action going on over there.

Check it out here

Have a global real world/cyber issue you want us to tackle? Observed an odd event that ties to a real world cause in the Internets? Drop us a line ~ we’d love to hear about it or get you on the show! 

You can find Brent on Twitter at @lbhuston and Victoria stars as @gisoboz. Get in touch! 

CMHSecLunch is Monday August 9th

This month’s CMHSecLunch is Monday, August 9th, 2013 at 11:30am. The location for this month is the Easton Mall food court. You can register here, or just show up. ADMISSION IS FREE!!!!!

Imagine hanging out with your infosec bestys, or meeting a new infosec connection that takes your career to the next level. Ever wondered what infosec experts eat, drink or why some of them only wear pastel shirts? This is YOUR chance to find out! 

We hope to see you there! 

Cyber SA from the Queensland Police Cyber Crime & Fraud Symposium…

Good day from Queensland Australia;

Today your are receiving Cyber SA from the 2013 Queensland Police Cyber Crime & Fraud Symposium…

Heard a variety of scintillating cyber fraud case histories from international law enforcement today as the 2013 Queensland Police Cyber Crime & Fraud Symposium Day One kicked off…other topics presented included data breach handling and online reputation remediation suggestions from some of Australia’s cyber duty experts in the field…

Enjoy today edition, albeit abbreviated, of Cyber Situational Awareness!

People’s Republic of Corruption Control…Discipline bodies launch website Globaltimes.cn |
The Central Commission for Discipline Inspection (CCDI) of the Communist Party of China (CPC) and theMinistry of Supervision on Monday jointly opened an official website, offering the public a new online channel to report corrupt officials
http://www.globaltimes.cn/content/808182.shtml#.UiWHQmSG1JE
People’s Republic of China’s quest for world-beating brand held back by regime
http://wanderingchina.org/2013/09/03/chinas-quest-for-world-beating-brand-held-back-by-regime-guardian-risingchina-branding/
Jiang Jiemin removed from office: authority – People’s Daily Online
http://english.peopledaily.com.cn/90785/8387285.html
Yahoo Kills Chinese Services
http://www.techweekeurope.co.uk/news/yahoo-pulling-out-of-china-126178
Targeted Attacks Deliver Disassembled Malware |
http://www.symantec.com/connect/blogs/targeted-attacks-deliver-disassembled-malware

Chinese look for greater influence in UK nuclear programme
http://www.powerengineeringint.com/articles/2013/09/chinese-look-for-greater-influence-in-uk-nuclear-programme.html
People’s Republic of China’s Lenovo CEO to Share $3 Million Bonus With 10,000 Employees The Diplomat |
http://thediplomat.com/tech-biz/2013/09/03/lenovo-ceo-to-share-3-million-bonus-with-10000-employees/
People’s Republic of China-Russia Ties Deepen
http://thediplomat.com/china-power/china-russia-ties-deepen/

Citadel Makes a Comeback, Targets Japan Users |
http://blog.trendmicro.com/trendlabs-security-intelligence/citadel-makes-a-comeback-targets-japan-users/
Fraud and ATM attacks hit Germany hard
http://www.net-security.org/secworld.php?id=15495
Learning From One of the Most Successful Industry Verticals — Cybercrime
http://hacksurfer.com/amplifications/253-learning-from-one-of-the-most-successful-industry-verticals-8212-cybercrime

The TAO of NSA
http://www.net-security.org/secworld.php?id=15500&
NSA tops up exploit pool with $25m in ‘grey market‘ vulnerabilities
http://www.cso.com.au/article/525241/nsa_tops_up_exploit_pool_25m_grey_market_vulnerabilities_/
Cyber Warfare: Government-Endorsed Surveillance
http://www.ibtimes.co.uk/special-reports/3338/cyber-warfare-government-endorsed-surveillance.html
More illegal NSA spying activities leaked – Xinhua | English.news.cn
http://news.xinhuanet.com/english/world/2013-09/02/c_132684366.htm

Semper Fi,

謝謝,
紅龍!

Cyber SA ~ Queensland, Australia 2400Z1SEP2013

Good day from Queensland , Australia…

Today’s cyber SA greeted the Red Dragon with a notification that his name had been used in a targeted hacking attack…data breach and data loss resulted…and BTW ‘check your travel arrangements for compromise’ as your records were violated digitally…yikes!

Nonetheless – much more in today’s issue of Cyber SA for you to enjoy…

US cyber attacks ‘targeted Russia, People’s Republic of China, Iran and North Korea’
http://www.news.com.au/technology/us-cyber-attacks-targeted-russia-china-iran-and-north-korea-according-to-washington-post/story-e6frfro0-1226708363415?f

Taiwan probes HTC staff over theft of trade secrets…destination: People’s Republic of China
http://www.scmp.com/news/china/article/1300866/taiwan-probes-htc-staff-over-secrets-theft
Cyber Kleptomaniacs: Why the People’s Republic of China Steals Our Secrets
http://www.worldaffairsjournal.org/article/cyber-kleptomaniacs-why-china-steals-our-secrets
Three HTC Employees Suspected Of Selling Design Secrets To People’s Republic of China
http://www.businessinsider.com.au/three-htc-employees-suspected-of-selling-design-secrets-to-china-2013-8?
“People’s Republic of China actively engaging in kinetic & directed -energy based weapons systems…

China Studying as US launches new rocket carrying spy satellite – SCI_TECH – Globaltimes.cn
http://www.globaltimes.cn/content/807212.shtml#.UiPF_2SG1JE
China Studies: US sends new military satellite into orbit – SCI_TECH – Globaltimes.cn
http://www.globaltimes.cn/content/802482.shtml#.UiPGEmSG1JE

People’s Republic of Cyber Espionage … Xi’an Couple Jailed for Selling Hi-Technology State Secrets
http://www.militaryy.cn/html/52/n-93052.html

People’s Republic of China’s War On Online Gossip Is Starting To Get Scary
http://www.businessinsider.com.au/china-is-waging-a-war-on-online-rumors-2013-8?
People’s Republic of China’s “seven base lines” for a clean internet
http://cmp.hku.hk/2013/08/27/33916/
Canadian fellow tracks China’s censored words
http://www.cbc.ca/news/canada/toronto/story/2013/08/29/toronto-university-munk-school-sina-weibo-censor.html
Netizens & companies behind People’s Republic of China’s $39 billion search engine market (INFOGRAPHIC)
http://www.techinasia.com/china-39-billion-dollar-search-engine-market-in-2013/?
Chinese “black PR” firm controlled hundreds of verified Weibo users, raked in millions
http://www.techinasia.com/chinese-black-pr-firm-controlled-hundreds-verified-weibo-users-raked-millions/?
An Inside Look at the People’s Republic of China’s Censorship Tools
http://blogs.wsj.com/chinarealtime/2013/08/30/an-inside-look-at-chinas-censorship-tools/?
Top microbloggers must well handle discourse power – People’s Daily Online
http://english.peopledaily.com.cn/90782/207872/8385107.html

Beijing security expert calls for greater openness and transparency in Xinjiang
Says Chinese Government should stop information blockades…

http://www.scmp.com/news/china/article/1301450/beijing-security-expert-calls-greater-openness-and-transparency-xinjiang
Attack on rumours a step backwards for transparency in People’s Republic of China
http://www.scmp.com/news/china/article/1301448/attack-rumours-step-backwards-transparency

China investigating corruption allegations against state asset regulator Jiang Jiemin
A move to bring down Zhou Yongkang, the widely-feared former head of China’s security apparatus, has claimed the scalp of one of his senior lieutenants, the former chairman of the giant oil monopoly China National Petroleum Company (CNPC)

http://www.telegraph.co.uk/news/worldnews/asia/china/10278672/China-investigating-corruption-allegations-against-state-asset-regulator-Jiang-Jiemin.html
People’s Republic of China’s Army Day Coverage Stresses Winning Battles with “Dream of a Strong Military”
http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=41300&cHash=d9441328a6f257f9f39db71ae6815333#.UiOh3WSG1JE

Mesh networks can help Asia avoid censorship and recover from disasters
http://www.techinasia.com/mesh-networking-asia-avoid-censorship-recover-disasters/?

First free, public malware database launched in Taiwan|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130831000004&cid=1103

People’s Republic of China’s Huawei spokesman tells Intelligence Committee chair to ‘stow it’
http://www.bizjournals.com/sanjose/news/2013/08/30/huawei-spokesman-tells-intelligence.html
People’s Republic of China’s ZTE steps up lobbying after spy fears block US contracts
http://www.scmp.com/business/china-business/article/1300810/zte-steps-lobbying-after-spy-fears-block-us-contracts
EXCLUSIVE TEST: People’s Republic of China’s Huawei switch: Good first effort
http://www.itworld.com/networking/371054/exclusive-test-huawei-switch-good-first-effort
People’s Republic of China’s quest for world-beating brand held back by regime
OP Middle Kingdom…

http://www.theguardian.com/business/2013/sep/01/chinese-brands-thinking-west
Corrupt, anonymous and in thrall to the party – People’s Republic of China is not the new Japan
http://www.theguardian.com/world/2013/sep/01/china-japan-corrupt-anonymous-party
People’s Republic of China Pakistan pledge to further boost military ties Lastupdate:- Sun, 1 Sep 2013 18:30:00
http://www.greaterkashmir.com/news/2013/Sep/1/china-pakistan-pledge-to-further-boost-military-ties-68.asp
Policy resolves foreigners’ visa extension issue: China
http://www.chinapost.com.tw/china/national-news/2013/09/01/387847/Policy-resolves.htm
People’s Republic of China Moves to Isolate Philippines, Japan
http://thediplomat.com/the-editor/2013/08/30/china-moves-to-isolate-philippines-japan/

An American Cyberoperations Offensive
http://www.nytimes.com/2013/09/01/world/americas/documents-detail-cyberoperations-by-us.html?
Feds plow $10 billion into “groundbreaking” crypto-cracking program
Consolidated Cryptologic Program has 35,000 employees working to defeat enemy crypto.
http://arstechnica.com/security/2013/08/feds-plow-10-billion-into-groundbreaking-crypto-cracking-program/
US Intelligence Community: The World’s 4th Largest Military?
http://thediplomat.com/flashpoints-blog/2013/08/30/us-intelligence-community-the-worlds-4th-largest-military/

Iran plays key role in global campaign against terrorism: intelligence minister
http://www.tehrantimes.com/politics/110416-iran-plays-key-role-in-global-campaign-against-terrorism-intelligence-minister
Why the U.S. Should Use Cyber Weapons Against Syria
http://www.defenseone.com/technology/2013/08/why-us-should-use-cyber-weapons-against-syria/69776/
Drums of cyber war grow louder
http://www.arabnews.com/news/463050
Syria’s largest city just dropped off the Internet
http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/30/syrias-largest-city-just-dropped-off-the-internet/
Syrian Electronic Army: If U.S. Attacks ‘We Will Target All of It’
http://mashable.com/2013/08/30/syrian-electronic-army-interview/
Attacking Syria may lead to missile strikes, cyber warfare and terror attacks on US soil, warn military experts
http://www.dailymail.co.uk/news/article-2405362/Attacking-Syria-lead-terror-attacks-cyber-warfare-missile-attacks-US-soil-warn-military-experts.html

Report: Spy Agencies’ ‘Black Budget’ Reveals Intelligence Gaps : NPR
http://www.npr.org/blogs/thetwo-way/2013/08/29/216873944/report-spy-agencies-black-budget-reveals-intelligence-gaps?f
These are the companies alleged to have links to the NSA surveillance scandal
http://gigaom.com/2013/08/30/these-are-the-companies-alleged-to-have-links-to-the-nsa-surveillance-scandal/
Exclusive: Army Admits To Major Computer Security Flaw
Army’s Deputy of Cybersecurity says a security failure can allow unauthorized access to computer files. Instead of fixing it, they are telling soldiers to be more careful.

http://www.buzzfeed.com/justinesharrock/exclusive-army-admits-to-major-computer-security-flaw
NSA misused PRISM – Spied on Al Jazeera, bugged UN headquarters and used for personal spying
http://thehackernews.com/2013/08/nsa-misused-prism-spied-on-al-jazeera.html

Semper Fi ~

謝謝,
紅龍!

Ask The Experts: New Device Check Lists

This time around on Ask The Experts, we have a question from a reader and it got some great responses from the team:

 

Q: “I need a quick 10 item or less checklist that I can apply to new devices when my company wants to put them on our network. What kinds of things should I do before they get deployed and are in use around the company?”

 

Bill Hagestad started us off with:

The Top 10 checklist items a CISO/or equivalent authority should effectively manage before installing, configuring and managing new devices on a network includes the following;

 

1)Organize your staff and prepare them for the overall task of documenting and diagramming your network infrastructure – give them your commander’s network management intent;

2)Create a physical and logical network map – encourage feedback from your team regarding placement of new hardware and software;

3)Use industry standards for your network including physical and logical security, take a good look at NIST Special Publication SP 800-XX Series;

4)Make certain that you and your team are aware of the requisite compliance standards for your business and industry, it will help to ensure you are within legal guidelines before installing new devices or perhaps you may discover the hardware or software you are considering isn’t necessary after all;

5)Ensure that after you have created the necessary network maps for your infrastructure in Step 2) above, conduct a through inventory of all infrastructure which is both critical and important to your business, then document this baseline;

6)Create a hardware/software configuration change procedure; or if you already have his inlace, have your team review it for accuracy; make certain everyone on the team knows to document all changes/moves/additions on the network;

7)Focus not only on the correlation of newly implemented devices on the internal networks but also look at the dependencies and effects on external infrastructure such as voice/data networks – nothing worse than making an internal change to your network and having your Internet go down unnecessarily;

8)Ensure that new network devices being considered integrate gracefully into your existing logging and alerting mechanisms; no need to install something new only to have to recreate the proverbial wheel in order to monitor it;

9)Consider the second & third order effects of newly installed devices on the infrastructure and their potential impact on remote workers and mobile devices used on the network;

10)Install HoneyPoint Security Server (HPSS) to agentlessly & seamlessly monitor external and potential internal threats to your newly configured network….

 

Of course a very authoritative guide is published by the national Security Agency called appropriately “Manageable Network Plan” and available for download @:

 

http://www.nsa.gov/ia/_files/vtechrep/ManageableNetworkPlan.pdf


Jim Klun added:

1. Make sure the device is necessary and not just a whim on the part of management.   Explain that each new device increases risk. 

2. If the device’s function can be performed by an existing internal service, use that service instead. 

3. Inventory new devices by name, IP addresses, function and – most importantly – owners.  There should be a device owner and a business owner who can verify continued need for the device.  Email those owners regularly,   querying them about continued need. Make sure that these folks have an acknowledged role to support the application running on the devices and are accountable for its security. 

4. Research the device and the application(s) its support.  Have no black boxes in your datacenter.  Include an abstract of this in the inventory. 

5. Make sure a maintenance program is in place – hold the app and device owner accountable. 

6. Do a security audit of the device wehn fully configured. Hit it with vulnerability scanners and make sure that this happens at least quarterly. 

7. Make sure monitoring is in place and make very sure all support staff are aware of the device and any alerts it may generate. Do not blind-side the operations staff. 

8. If the device can log its activities ( system and application ) to a central log repository, ensure that happens as part of deployment. 

9. Make sure the device is properly placed in your network architecture. Internet-exposed systems should be isolated in an Internet DMZ.  Systems holding sensitive data should similarly be isolated. 

10. Restrict access to the device as narrowly as possible. 

 

Finally.. if you can, for every device in your environment, log its network traffic and create a summary of what is “normal” for that device.  

Your first indication of a compromise is often a change in the way a system “talks”. 

 

Adam Hostetler chimed in with: 

Will vary a lot depending on device, but here are some suggestions

 

1. Ensure any default values are changed. Passwords, SNMP strings, wireless settings etc.

2. Disable any unnecessary services

3. Ensure it’s running the latest firmware/OS/software

4. Add the device to your inventory/map, catalog MAC address, owner/admin, etc.

5. Perform a small risk assessment on the device. What kind of risk does it introduce to your environment? Is it worth it?

6. Test and update the device in a separate dev segment, if you have one.

7. Make sure the device fits in with corporate usage policies

8. Perform a vulnerability assessment against the device. 

9. Search the internet for any known issues, vulnerabilities or exploits that might effect the device.

  1. Configure the device to send logs to your logging server or SEIM, if you have one.

 

And John Davis got the last word by adding: 

From a risk management perspective, the most important thing a CISO needs to ensure is in place before new devices are implemented on the network is a formal, documented Systems Development Life Cycle or Change Management program. Having such a program in place means that all changes to the system are planned and documented, that security requirements and risk have been assessed before devices have purchased and installed, that system configuration and maintenance issues have been addressed, that the new devices are included in business continuity planning, that proper testing of devices (before and after implementation on the network) is undertaken and more. If a good SDLC/Change Management program is not in place, CISOs should ensure that development and implementation of the program is given a high priority among the tasks they wish to accomplish.

 

Whew, that was a great question and there is some amazing advice here from the experts! Thanks for reading, and until next time, stay safe out there! 

 

Got a question for the experts? Give us a shout on Twitter (@microsolved or @lbhuston) and we’ll base a column on your questions!

Yo, MSI Raps Podcast Episode 1

This is the latest version of Yo, MSI Raps. We have decided to make these episodes open to public finally, so we will start with this one.

This is an open round table discussion between members of the MSI Technical Team. It is candid, friendly and, we hope, interesting. 🙂

This time around, the team talks about privacy, the news around the NSA collection of data and impacts of surveillance on liberty. 

You can check out the podcast here!

Look for these sessions to be released more frequently and on topics that are in the news. We hope you enjoy them, and feel free to give us feedback via Twitter (@lbhuston or @microsolved) and/or via the comments section.

Thanks for listening!

CYBER SA ~ 1300Z27AUG2013

Good Morning Cyber SA Fans;

Relentless reports from many countries regarding the largest DDoS attack to hit the Internet in the People’s Republic of China…say don’t they have the Cisco-powered Great Firewall? Lots of cyber SA to enjoy this Tuesday the 27th of August 2013…relish in today’s cyber news…there’s more waiting on you for tomorrow!

Enjoy!

中国互联网络信息中心 National Nodes DNS DDOS attacks suffered in the history of the largest
http://www.cnnic.net.cn/gjymaqzx/aqgg/aqggaqsj/201308/t20130826_41325.htm

People’s Republic of China Internet hit by ‘largest ever’ attack…uh oh, let loose the dogs of war…
http://www.france24.com/en/20130827-china-internet-hit-largest-ever-attack
Chinese internet hit by largest ever DDoS attack
http://www.v3.co.uk/v3-uk/news/2290946/chinese-internet-hit-by-largest-ever-ddos-attack
Chinese Internet Hit by Attack Over Weekend
http://blogs.wsj.com/chinarealtime/2013/08/26/chinese-internet-hit-by-attack-over-weekend/
People’s Republic of China’s internet hit by the country’s “largest ever” attack
http://gigaom.com/2013/08/26/chinas-internet-hit-by-the-countrys-largest-ever-attack/

Emerging markets drive Chinese browser firm UCWeb’s global expansion – Xinhua | English.news.cn
http://news.xinhuanet.com/english/sci/2013-08/24/c_132658921.htm

PLA Cavalry: Use the Beidou satellite system to good effect -…
http://english.peopledaily.com.cn/90786/8378444.html
Chinese satellite movements alarm experts
http://www.i24news.tv/en/news/international/asia-pacific/130820-chinese-satellite-movements-baffle-experts
PLA stresses goal of stronger military – People’s Daily Online
http://english.peopledaily.com.cn/90786/8377139.html
PLA command confrontation drill concludes – People’s Daily Online
http://english.peopledaily.com.cn/90786/8373718.html

Chinese shipbuilder reveals breakthrough technology – People’s Daily Online
http://english.peopledaily.com.cn/202936/8370062.html

Sina, People’s Republic of China’s answer to Twitter, enters the mobile messaging battle with its own app
http://thenextweb.com/asia/2013/08/26/sina-chinas-answer-to-twitter-enters-the-mobile-messaging-battle-with-its-own-app/
People’s Republic of China’s ‘new relationship’ trap
http://www.washingtontimes.com/news/2013/aug/26/fisher-chinas-new-relationship-trap/?
People’s Republic of China Bans a Law Professor From Classroom | Inside Higher Ed
http://www.insidehighered.com/quicktakes/2013/08/26/china-bans-law-professor-classroom
Kenya and People’s Republic of China sign $5bn deals
http://www.bbc.co.uk/news/world-africa-23768488
Australia’s mining boom rolls on for Chinese entrepreneur in the outback
http://www.reuters.com/article/2013/08/25/us-australia-mining-idUSBRE97O03R20130825
European Equipment Suppliers Win Third Of £2bn China Mobile 4G Contract
http://www.techweekeurope.co.uk/news/china-mobile-4g-european-equipment-125662?
People’s Republic of China launches its first air-to-air missile from helicopter – The Times of India
http://timesofindia.indiatimes.com/world/china/China-launches-its-first-air-to-air-missile-from-helicopter/articleshow/22063826.cms
45 Signs That the People’s Republic of China Is Colonizing America
http://wanderingchina.org/2013/08/25/45-signs-that-china-is-colonizing-america-the-american-dream-online-risingchina-colonizingamerica/

U.S. spied on UN: German weekly – Xinhua | English.news.cn
http://news.xinhuanet.com/english/world/2013-08/26/c_125242562.htm

DPRK offers mobile internet access for foreigners – Xinhua |
http://news.xinhuanet.com/english/world/2013-02/25/c_132191596.htm

Koobface worm-flinging gangster linked to pharma spam ops • The Register
http://www.theregister.co.uk/2013/08/26/koobface_carder_pharma_spam_tieup/

MoleRats Hackers Hitting Israeli Government With Poison Ivy Malware
http://www.techweekeurope.co.uk/news/molerats-attacks-israel-egypt-125668?

Semper Fi;

謝謝
紅龍

Cyber SA for 1302Z26AUG2013

Good Monday Morning Fans!

Extraordinary amount of Cyber Situational Awareness (SA) news from around the globe today!

The People’s Republic of China suffers a massive DDoS attack; Chinese military modernization of information warfare doctrine circa 2000 & 2008 – There are also stories about Russian Cybercrime; India’s cyber architecture and much other relevant good stuff to share in the variety of news posts below!

Enjoy!

People’s Republic of China suffers major DDoS attack on .cn domain
http://www.pcworld.com/article/2047427/china-suffers-major-ddos-attack-on-cn-domain.html#
People’s Republic of China’s Internet hit by biggest cyberattack in its history
http://money.cnn.com/2013/08/26/technology/china-cyberattacks/index.html?

Information Defense: An Important Part of Information Warfare…解放军报网络版-军事沙龙
This is Chinese Military (中國人民解放軍) Information Warfare (信 息战争) Doctrine Circa 2000

http://www.pladaily.com.cn/item/vote/houqing/content/7-015.htm
Chinese Military Networks also Need to Relate To Battle Strategies…网络攻防战也需讲谋略
This is Circa 2007 – 中國人民解放軍信 息作战

http://www.chinamil.com.cn/site1/xwpdxw/2007-11/06/content_1007865.htm
Cyber Warfare & the People’s Republic of China…Has the Wolf Come Yet?网络战,狼真的来了吗
This is Circa 2007 – 中國人民解放軍信 息作战

http://www.chinamil.com.cn/site1/xwpdxw/2007-11/01/content_1002668.htm
Chinese Military Active Defense: Target Enemy Critical Infrastructure信息防卫–信息化战争的重要一环
This is Chinese Military (中國人民解放軍) Information Warfare (信 息战争) Doctrine Circa 2008

http://www.chinamil.com.cn/site1/2008b/2008-06/17/content_1320115.htm

U.S., China and an unthinkable war
Both have planned for a conflict they hope to avoid.
http://www.latimes.com/opinion/commentary/la-oe-gompert-kelly-war-china-u-s–20130826,0,6126914.story?
US Navy seeks more cooperation with China in counter-piracy exercise
http://www.stripes.com/news/navy/us-navy-seeks-more-cooperation-with-china-in-counter-piracy-exercise-1.237354?
John McCain, China Trade Barbs Over Senkaku Islands
http://thediplomat.com/the-editor/2013/08/26/john-mccain-china-trade-barbs-over-senkaku-islands/?
China’s worried elites
Not since Mikhail Gorbachev began speaking of ‘Glasnost’ and ‘Perestroika’ has there been such a ferment among policy intellectuals.

http://www.upi.com/Top_News/Analysis/Walker/2013/08/26/Walkers-World-Chinas-worried-elites/UPI-48771377490260/

China IP Rights. The Lackey View.
http://www.chinalawblog.com/2013/08/china-ip-rights-the-lackey-view.html

Sinopec profits surge as China eases pricing rules
http://www.bbc.co.uk/news/business-23838922
China to investigate vice president of oil firm CNPC
http://uk.reuters.com/article/2013/08/26/uk-china-oil-cnpc-idUKBRE97P01V20130826?
China’s Military Says Pacific Rim Is American Propaganda
http://kotaku.com/chinas-military-says-pacific-rim-is-american-propagand-1196612758
PH, Vietnam hold talks to boost defense amid China tension

PH, Vietnam hold talks to boost defense amid China tension

Top Japanese firms’ classified info leaked on People’s Republic of China’s Baidu
http://www.japantimes.co.jp/news/2013/08/08/national/leading-japanese-firms-confidential-documents-leaked-on-chinese-website/

People’s Republic of China Wants to Rise Peacefully, But So What?
http://thediplomat.com/flashpoints-blog/2013/08/22/china-wants-to-rise-peacefully-but-so-what/?

The Pervasiveness of Foreign Collection Efforts via Cyber Espionage
http://ci.speartip.com/blog/bid/329389/The-Pervasiveness-of-Foreign-Collection-Efforts-via-Cyber-Espionage
Cybersecurity Expert: Assume You’re Being Attacked Right Now
http://www.crn.com/news/security/240160280/cybersecurity-expert-assume-youre-being-attacked-right-now.htm

Local man Taiwanese gets suspended sentence spying the People’s Republic of China
http://www.chinapost.com.tw/taiwan/national/national-news/2013/08/23/387135/Local-man.htm
Chinese mainland’s Internet speed ranks 98th |Industries |chinadaily.com.cn
http://www.chinadaily.com.cn/business/2013-08/16/content_16898964.htm

People’s Republic of China’s Huawei, ZTE win bulk of China Mobile’s $3 billion 4G bonanza: sources
http://www.reuters.com/article/2013/08/23/us-chinamobile-4g-idUSBRE97M02020130823
Is Taiwan’s HTC about to get acquired by People’s Republic of China’s ZTE, Lenovo or Huawei?
http://www.networkworld.com/news/2013/082213-android-roundup-273111.html
Electric carmaker Tesla hits roadblock in People’s Republic of China over trademark
Tesla will pay dearly for not havinf read of Apple’s dillemma regarding IP & Trademark registration within the People’s Republic of China…but I’m certain they hired only the best to get them to this point 🙂

http://www.reuters.com/article/2013/08/23/us-china-autos-tesla-idUSBRE97M0D920130823
Despite denials, docs show McAuliffe company asked feds to fast-track visa for investor tied to spy list
MAKING CONNECTIONS: Chinese telecommunications company like Huawei Technologies Co. “provide a wealth of opportunities for Chinese intelligence agencies to insert malicious hardware or software implants into critical telecommunications components and systems,”

http://sayanythingblog.com/entry/despite-denials-docs-show-mcauliffe-company-asked-feds-to-fast-track-visa-for-investor-tied-to-spy-list/?
Africa’s Big Brother Lives in Beijing – Is Huawei wiring Africa for surveillance? Or just for money?
http://www.foreignpolicy.com/articles/2013/07/30/africas_big_brother_lives_in_beijing_huawei_china_surveillance?page=full
U.S. Fears People’s Republic of China’s Huawei Backed Spy Network In Africa (Update) –

U.S. Fears Huawei Backed Spy Network In Africa (Update)


People’s Republic of China’s Huawei Secures $1.5 Billion Equivalent 5-year Term Loan
http://www.cellular-news.com/story/61663.php?
People’s Republic of China’s ZTE to post third quarterly profit due to cost cuts
http://www.reuters.com/article/2013/08/21/us-zte-results-idUSBRE97K0XB20130821
People’s Republic of China’s Baidu buys majority stake in group buying site Nuomi | PCWorld
http://www.pcworld.com/article/2047322/chinas-baidu-buys-majority-stake-in-group-buying-site-nuomi.html

Multinationals in China…Guardian warriors and golden eggs
The state’s crackdowns on big firms are not all about bashing foreigners

http://www.economist.com/news/business/21584045-states-crackdowns-big-firms-are-not-all-about-bashing-foreigners-guardian-warriors-and?
Volvo building two additional assembly plants in People’s Republic of China
http://www.leftlanenews.com/volvo-to-build-assembly-plants-in-china.html
Foreign Executives Need to Exercise Due Care in the People’s Republic of China
http://www.china-briefing.com/news/2013/08/23/foreign-executives-need-to-exercise-due-care-in-china.html

Xiaomi’s new funding round skyrockets valuation to $10B
http://venturebeat.com/2013/08/22/xiaomis-new-funding-round-skyrockets-valuation-to-10b/
People’s Republic of China arrests activist who campaigned about leaders’ wealth | Reuters
http://in.reuters.com/article/2013/08/23/china-dissident-idINDEE97M05520130823

Review of US surveillance programs to be led by panel of intelligence insiders
http://www.theguardian.com/world/2013/aug/22/nsa-surveillance-review-panel-insiders
US intelligence services go ‘on the record’ with new Tumblr blog
http://www.theguardian.com/world/2013/aug/22/us-intelligence-community-tumblr-surveillance
If You’ve Ever Traveled to a “Suspicious” Country, This Secret Program May Target You

If You’ve Ever Traveled to a “Suspicious” Country, This Secret Program May Target You


How an Idealistic President Embraced Cyber Espionage
http://www.huffingtonpost.com/nikolas-kozloff/how-an-idealistic-preside_b_3799193.html

Exclusive: UK’s secret Mid-East internet surveillance base is revealed in Edward Snowden leaks
http://www.independent.co.uk/news/uk/politics/exclusive-uks-secret-mideast-internet-surveillance-base-is-revealed-in-edward-snowden-leaks-8781082.html
New Study: Senior U.S. Military Schools Struggle to Include Cyber Education in Curricula
http://pellcenter.salvereginablogs.com/files/2013/08/JPME-Cyber-Leaders-Final.pdf
http://pellcenter.salvereginablogs.com/new-study-senior-u-s-military-schools-struggle-to-include-cyber-education-in-curricula/

New figures reveal extent of cybercrime risk to UK population
http://phys.org/news/2013-08-figures-reveal-extent-cybercrime-uk.html
www.cyber.kent.ac.uk/Survey1.pdf

Nasdaq outage resembles political hacker attacks – These are not the Hackers you are looking for…

Nasdaq outage resembles political hacker attacks

Serious cyber attack hits Belgian military intelligence service
http://www.mo.be/en/article/serious-cyber-attack-hits-belgian-military-intelligence-service

FEATURE-Ex-Soviet hackers play outsized role in cyber crime world
http://www.reuters.com/article/2013/08/22/russia-cybercrime-idUSL6N0G61KM20130822

German IT officials reportedly deem Windows 8 too ‘dangerous’ to use
http://bgr.com/2013/08/21/microsoft-windows-8-nsa-back-door/

Govt to chart road map to safeguard India’s cyber security…
http://www.dnaindia.com/india/1879193/report-govt-to-chart-road-map-to-safeguard-india-s-cyber-security-architecture

Semper Fi;

謝謝
紅龍