Verizon and us secret service 2011 data breach cyber report

September 30, 2011

361 million >> 144 million >> 4 million. Thus goes the tally of total records compromised across the combined caseload of Verizon and the United States Secret Service (USSS) over the last three years. After four years of increasing losses culminating in 2008’s record-setting 361 million, we speculated whether 2009’s drop to 144 million was a fluke or a sign of things to come. 2010’s total of less than four million compromised records seems to suggest it was a sign. But of what? And is it a permanent change in direction or a temporary detour? To help us answer that, we are very glad to have the United States Secret Service (USSS) back with us for the 2011 DBIR. Additionally, we have the pleasure of welcoming the Dutch National High Tech Crime Unit (NHTCU) to the team. Through this cooperative effort, we had the privilege—and challenge—of examining about 800 new data compromise incidents since our last report (with 761 of those for 2010). To put that in perspective, the entire Verizon-USSS dataset from 2004 to 2009 numbered just over 900 breaches. We very nearly doubled the size of our dataset in 2010 alone! It is fascinating from a research standpoint that the all-time lowest amount of data loss occurred in the same year as the alltime highest amount of incidents investigated. In addition to being the largest caseload ever, it was also extremely diverse in the threat agents, threat actions, affected assets, and security attributes involved. We witnessed highly automated and prolific external attacks, low and slow attacks, intricate internal fraud rings, country-wide device tampering schemes, cunning social engineering plots, and much more. Some of the raw statistics may seem to contradict this claim of diversity (e.g., the percent of breaches attributed to external agents is more lopsided than ever), but one must consider the change in scale. Whereas “10%” used to mean approximately 10-15 breaches across an annual caseload averaging 100-150, it now means 75 breaches

in the context of the 2010 caseload. Consider that fact as you digest and ponder results from this year’s report

http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf

Operation b79 : Microsoft Neutralizes Kelihos Botnet

September 28, 2011

Richard Domingues Boscovich Senior Attorney, Microsoft Digital Crimes Unit:
Building on the recent successes of the Rustock andWaledac botnet takedowns, I’m pleased to announce that Microsoft has taken down the Kelihos botnet in an operation codenamed “Operation b79” using similar legal and technical measures that resulted in our previous successful botnet takedowns.

http://blogs.technet.com/b/microsoft_blog/archive/2011/09/27/microsoft-neutralizes-kelihos-botnet-names-defendant-in-case.aspx

 


Trend Micro uncovers Lurid APT attacks on thousands of computers in former USSR

September 25, 2011

Researchers at Trend Micro have uncovered yet another large-scale, sophisticated and ongoing series of targeted attacks that have compromised nearly 1,500 computers in 61 countries.

http://www.v3.co.uk/v3-uk/news/2111303/trend-micro-uncovers-lurid-apt-attacks-thousands-computers-ussr

http://blog.trendmicro.com/trend-micro-exposes-lurid-apt/

http://blog.trendmicro.com/lurid-attribution-isnt-easy/


Hackers break SSL encryption used by millions of sites

September 20, 2011

Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that’s passing between a webserver and an end-user browser.

Link


Japan’s defence industry hit by its first cyber attack

September 19, 2011

Mitsubishi Heavy Industries Ltd said on Monday its computers had been hacked into, with one newspaper saying the target was Japan’s biggest defence contractor’s factories for submarines, missiles and nuclear power plant components.

http://www.reuters.com/article/2011/09/19/mitsubishiheavy-computer-idUSL3E7KJ0BD20110919

 

 


US Energy Department Sets Roadmap For Secure Cyberattack Infrastructure

September 17, 2011

Agency outlines strategies for developing energy-delivery systems that are resilient even in the face of cyberattack.

http://energy.gov/sites/prod/files/Energy%20Delivery%20Systems%20Cybersecurity%20Roadmap_finalweb.pdf

http://www.informationweek.com/news/government/security/231601606


Russia: Cold War bunker nurtures new cyber-warriors

September 15, 2011

Gathered at a Cold War bunker, a yet-unnamed Russian youth organization is being conjured into life. Its mission? To launch an online information war to prevent an Arab Spring-type uprising in Russia.

On Wednesday, the project’s participants came together at Moscow’s Cold War Museum – also known as Bunker-42 – hidden 65 meters under Taganka, reports the Nezavisimaya Gazeta (NG) newspaper.

http://rt.com/politics/secret-organization-information-war-623/

 


GlobalSign resumes issuing security certificates

September 14, 2011

Another CA ? The company is still investigating whether bogus certificates were created in its name. Had that happened, cyber criminals would have been able to spy on users accessing supposedly secure sites.

http://www.bbc.co.uk/news/technology-14879998


Google Web History vulnerable to new Firesheep hack

September 11, 2011

New Research :
With the success of Web applications, most of our data is
now stored on various third-party servers where they are pro-
cessed to deliver personalized services. Naturally we must
be authenticated to access this personal information, but
the use of personalized services only restricted by identi-
cation could indirectly and silently leak sensitive data. We analyzed Google Web Search access mechanisms and found that the current policy applied to session cookies could be used to retrieve users' personal data. We describe an at-
tack scheme leveraging the search personalization (based on
the same sid cookie) to retrieve a part of the victim's click
history and even some of her contacts. We implemented a
proof of concept of this attack on Firefox and Chrome Web
browsers and conducted an experiment with ten volunteers.
Thanks to this prototype we were able to recover up to 80%
of the user's search click history.
http://arxiv.org/PS_cache/arxiv/pdf/1108/1108.5864v1.pdf

Spammers, Hackers Prepare Round of Attacks For Sept. 11

September 9, 2011

As millions of people around the world pause to remember the heart-wrenching moments of Sept. 11, 2001, hundreds of hackers, spammers and cyber-criminals are launching their own 9/11 assaults – on computers, web sites and social networks worldwide. And next week may bring on the largest wave of 9/11 hacks and scams ever.

http://www.malwarecity.com/blog/spammers-hackers-prepare-round-of-attacks-for-sept-11-1134.html