Japan Defense industry body target of cyber-attack

October 17, 2011

A cyber-attack was launched on an organization of defense contractors in an attempt to steal confidential information on the nation’s defense industry, according to sources.

A hacker stole e-mail addresses from the Society of Japanese Aerospace Companies (SJAC), which lists executives of defense contractors as its directors, and then retrieved the contents of e-mails from Kawasaki Heavy Industries Ltd., the sources said.

http://www.yomiuri.co.jp/dy/national/T111015002242.htm

 


Computer Virus Hits U.S. Drone Fleet

October 8, 2011

Computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.

http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/

 


US: Defending against cyber threats

October 6, 2011

The U.S. military suffered perhaps its first deeply damaging cyber attack three years
ago. A flash drive with a malicious computer code was inserted into a laptop at a
U.S. military base in the Middle East. The surreptitious worm infiltrated a U.S. Central
Command (CENTCOM) computer network, collected classified and unclassified data,
and shunted it to the servers of a foreign intelligence agency.
That attack, reportedly Russian in origin, was the realization of “our worst fear...

http://www.aerospaceamerica.org/Documents/Aerospace_America_PDFs_2011/October-2011/Feature-Cyber-Threats-AA-Oct2011.pdf


Gambling giant Betfair loses millions of customers’ credit card details to cyber attack

October 4, 2011

Online gambling firm Betfair today admitted it had not told its customers about a major cyber attack 18 months ago where millions of credit card details were stolen.

More than 3.1 million account names with encrypted security questions, 2.9 million usernames, and nearly 90,000 account usernames with bank account details were stolen.

http://www.dailymail.co.uk/news/article-2043750/Betfair-loses-millions-customers-credit-card-details-covers-up.html

 


U.S. military drafts the iPad

October 2, 2011

For soldiers in the 21st century, iPads, iPhones, Androids and other smart devices could eventually be as common on the battlefield as helmets, canteens and rifles.

These devices are being tested across all branches of the military. Seeing an opportunity, software companies and defense contractors are developing mobile applications that will enable soldiers to pass along intelligence, view reconnaissance images or even pilot small drones by remote control.

Link


Verizon and us secret service 2011 data breach cyber report

September 30, 2011

361 million >> 144 million >> 4 million. Thus goes the tally of total records compromised across the combined caseload of Verizon and the United States Secret Service (USSS) over the last three years. After four years of increasing losses culminating in 2008’s record-setting 361 million, we speculated whether 2009’s drop to 144 million was a fluke or a sign of things to come. 2010’s total of less than four million compromised records seems to suggest it was a sign. But of what? And is it a permanent change in direction or a temporary detour? To help us answer that, we are very glad to have the United States Secret Service (USSS) back with us for the 2011 DBIR. Additionally, we have the pleasure of welcoming the Dutch National High Tech Crime Unit (NHTCU) to the team. Through this cooperative effort, we had the privilege—and challenge—of examining about 800 new data compromise incidents since our last report (with 761 of those for 2010). To put that in perspective, the entire Verizon-USSS dataset from 2004 to 2009 numbered just over 900 breaches. We very nearly doubled the size of our dataset in 2010 alone! It is fascinating from a research standpoint that the all-time lowest amount of data loss occurred in the same year as the alltime highest amount of incidents investigated. In addition to being the largest caseload ever, it was also extremely diverse in the threat agents, threat actions, affected assets, and security attributes involved. We witnessed highly automated and prolific external attacks, low and slow attacks, intricate internal fraud rings, country-wide device tampering schemes, cunning social engineering plots, and much more. Some of the raw statistics may seem to contradict this claim of diversity (e.g., the percent of breaches attributed to external agents is more lopsided than ever), but one must consider the change in scale. Whereas “10%” used to mean approximately 10-15 breaches across an annual caseload averaging 100-150, it now means 75 breaches

in the context of the 2010 caseload. Consider that fact as you digest and ponder results from this year’s report

http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf

Operation b79 : Microsoft Neutralizes Kelihos Botnet

September 28, 2011

Richard Domingues Boscovich Senior Attorney, Microsoft Digital Crimes Unit:
Building on the recent successes of the Rustock andWaledac botnet takedowns, I’m pleased to announce that Microsoft has taken down the Kelihos botnet in an operation codenamed “Operation b79” using similar legal and technical measures that resulted in our previous successful botnet takedowns.

http://blogs.technet.com/b/microsoft_blog/archive/2011/09/27/microsoft-neutralizes-kelihos-botnet-names-defendant-in-case.aspx

 


Trend Micro uncovers Lurid APT attacks on thousands of computers in former USSR

September 25, 2011

Researchers at Trend Micro have uncovered yet another large-scale, sophisticated and ongoing series of targeted attacks that have compromised nearly 1,500 computers in 61 countries.

http://www.v3.co.uk/v3-uk/news/2111303/trend-micro-uncovers-lurid-apt-attacks-thousands-computers-ussr

http://blog.trendmicro.com/trend-micro-exposes-lurid-apt/

http://blog.trendmicro.com/lurid-attribution-isnt-easy/


Hackers break SSL encryption used by millions of sites

September 20, 2011

Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that’s passing between a webserver and an end-user browser.

Link


Japan’s defence industry hit by its first cyber attack

September 19, 2011

Mitsubishi Heavy Industries Ltd said on Monday its computers had been hacked into, with one newspaper saying the target was Japan’s biggest defence contractor’s factories for submarines, missiles and nuclear power plant components.

http://www.reuters.com/article/2011/09/19/mitsubishiheavy-computer-idUSL3E7KJ0BD20110919