A message from Comodo Hacker – Diginotar Hacker, and Symantec answer

September 8, 2011

http://pastebin.com/74KXCaEZ
And – Symantec answer
Since my last post, the effects of the recent DigiNotar breach have spread across the security industry. Many media outlets recently shared some of the names of the 531 fraudulent certificates created, including Google, Facebook, Skype, Microsoft, as well as each of the major certificate authorities. A hacker has claimed responsibility for the breach and claims to have breached some other Certificate Authorities as well. GlobalSign has ceased issuing certificates as it investigates whether or not it has been breached. Pundits are questioning the strength of SSL. Then, yesterday a Dutch government agency erroneously made a statement that Thawte had been breached. Although the statement was proven false and quickly retracted, it highlights the fear and knee-jerk reactive actions proliferating as a result.
http://www.symantec.com/connect/blogs/diginotar-ssl-breach-update

Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually

September 7, 2011

MOUNTAIN VIEW, Calif. – Sept. 7, 2011 – Symantec Corp. (Nasdaq: SYMC) For the first time a Norton study calculates the cost of global cybercrime: $114 billion annually1. Based on the value victims surveyed placed on time lost due to their cybercrime experiences, an additional $274 billion was lost2. With 431 million adult victims globally in the past year and at an annual price of $388 billion globally based on financial losses and time lost, cybercrime costs the world significantly more than the global black market in marijuana, cocaine and heroin combined ($288 billion).3

Link


Hackers steal SSL certificates for CIA, MI6, Mossad

September 5, 2011

The confirmed count of fraudulently-issued SSL (secure socket layer) certificates now stands at 531, said Gervase Markham, a Mozilla developer who is part of the team that has been working to modify Firefox to blocks all sites signed with the purloined certificates.

Among the affected domains, said Markham, are those for the CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter and Microsoft’s Windows Update service.

Technical details fo the hack to Diginotar

Link

 

 

 

 


If The (Chinese) Government Doesn’t Like It, It Must Be Good

September 4, 2011

The Chinese government has apparently leaned on some of the most prominent hacker groups to advise their members and followers to avoid hacking Chinese targets, and to be more discreet (don’t get caught) when attacking foreign targets.

Link


SSL Certificate Hack Could Result In Raised Security Standard

September 2, 2011

“If you can’t trust the trusted authority, who in the cloud can I trust? If the trusted authority can’t do enough, then how do we rely on anyone else?” asked David Sockol, president of Emagined Security, a security solution provider based in Santa Clara, Calif. “The biggest lesson learned? We can’t really trust anyone, including ourselves, and we need checks and balances.”

Link

 


Diginotar (a Dutch Certificate Authority) Hacked by Black.Spook and Iranian Hackers

September 1, 2011

Somehow, somebody managed to get a rogue SSL certificate from them on July 10th, 2011. This certificate was issued for domain name.google.com.

Link


South Korea believes that the North Korean regime is behind an act of cyber sabotage against a major bank

September 1, 2011

The attack on Nonghyup Bank came through the infected laptop of a contractor. The hackers were able to use the laptop to disseminate viruses throughout the bank’s computer networks, and on April 12, half of its servers suddenly crashed. About 30 million people were unable to make online financial transactions or use the bank’s ATMs, and the bank lost important information

Link