Your new post is loading...
Your new post is loading...
|
Scooped by
Gust MEES
|
Moskau/lngolstadt, 17. Februar 2015 Kaspersky Lab enttarnt die Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.
Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].
|
Scooped by
Gust MEES
|
More than one thousand energy firms are said to have been targeted by internet hackers, with particular interest in compromising industrial control systems.
There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.
How does cyber warfare work? This question was originally answered on Quora by Andy Manoske. Simply put, cyber warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of espionage or sabotage.
|
Scooped by
Gust MEES
|
Sitting in an office in the Australian Security Intelligence Organisation’s Soviet-style building, which mirrors the Orwellian bunker one might imagine, Australia’s most experienced spy master, David Irvine, has a lot on his mind as he gazes over...
|
Scooped by
Gust MEES
|
DARPA postpones release of official solicitation. Officials at the Defense Advanced Research Projects Agency have decided to postpone briefings and the release of solicitation documents for Plan X, a widely-anticipated funding initiative that will lay the foundation for the government’s push into offensive computer warfare operations. “Due to an unanticipated and overwhelming response from industry and academia, DARPA has rescheduled the Plan X Proposers’ Day Workshop,” agency officials announced Sept. 5. Two sessions with researchers and defense contractors—one classified and one non-classified—originally were slated for Sept. 27, but have now been moved to Oct. 15 and 16. “The second day will be a repeat of the first day to accommodate the remaining attendees,” the notice said. The request for proposals, originally scheduled for release at the end of this month, is expected to be published in October instead. The surge of interest highlights a community emerging around offensive security technology. Plan X is a Pentagon initiative to develop computer architecture that monitors damage in “dynamic, contested, and hostile network environments,” adaptively defends against attacks, and performs “weapon deployment,” contracting documents indicate. The program is not funding malware or tools that hunt down vulnerabilities, but the resulting computer architecture will likely serve as the framework for their deployment. Read more: http://www.nextgov.com/defense/2012/09/pentagon-receives-overwhelming-response-plan-x-cyber-offensive/57961/
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites. Taiwan will expand its cyberwar units next year while scaling back military spending due to budget constraints, the Taipei-based Liberty Times reported, citing a 2013 budget plan submitted by the National Security Bureau to parliament for approval. In the six months to June, hackers launched more than one million attacks on the bureau's website, making it one of the most heavily targeted government sites, the paper said. Read more: http://www.securityweek.com/taiwan-step-cyberwar-capabilities-report?utm_source=dlvr.it&utm_medium=twitter
|
Scooped by
Gust MEES
|
The Air Force Life Cycle Management Center (AFLCMC) posted a broad agency announcement [PDF] last week calling on contractors to submit concept papers detailing technological demonstrations of ‘cyberspace warfare operations’ (CWO) capabilities. The Air Force is looking to obtain CWO capabilities falling into a number of categories including: ‘cyberspace warfare attack’ and ‘cyberspace warfare support.’ The broad agency announcement defines ‘cyberspace warfare attack’ capabilities as those which would give them the ability to “destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the adversaries [sic] ability to use the cyberspace domain for his advantage.” Read more: http://threatpost.com.mx/en_us/blogs/air-force-opnely-seeking-cyber-weapons-082812
|
Scooped by
Gust MEES
|
US Air Force Wants to Enhance Its Cyber Warfare Capabilities... The US Military has been successfully using cyber weapons for quite some time now, a speech held by Marine Lieutenant General Richard P. Mills at the AFCEA TechNet Land Forces conference revealed the other day. As it turns out, the US Air Force is also looking to enhance its cyber capabilities. ===> They explicitly say that they’re interested in cyberspace technologies that could help them destroy, deny, degrade, disrupt, deceive, corrupt or usurp the enemy’s ability to “use the cyberspace domain for his advantage.” <=== Read more: http://news.softpedia.com/news/US-Air-Force-Wants-to-Enhance-Its-Cyber-Warfare-Capabilities-288751.shtml?utm_source=dlvr.it&utm_medium=twitter
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
Security expect Mikko Hypponen on how Stuxnet and other targeted cyberattacks are the first steps in a cyber arms race. Stuxnet was obviously a game changer. But what does it mean in the long term? I think we are now seeing the very first steps of a new arms race: The cyber arms race. Just like modern hi-tech research revolutionised military operations over the last 50 years, we are going to see a new revolution, focusing on information operations and cyber warfare. This revolution is underway and it's happening right now. We haven't seen real online warfare yet, of course. This is because thankfully we haven't lately seen wars between technically advanced nations. But any future crisis is likely to have a cyber component as well. Read more "A MUST" to understand the importance about IT-Security and Cyber-Security: http://www.bbc.co.uk/news/technology-18825742#?utm_source=twitterfeed&utm_medium=twitter
|
Scooped by
Gust MEES
|
|
|
Scooped by
Gust MEES
|
Russian hacker spies are attacking energy companies. It's the latest sign the Cold War has gone cyber.
|
Scooped by
Gust MEES
|
Britain is building an army to wage war by hurling computer hackers at its enemies. Defence Secretary Philip Hammond said the country is recruiting "hundreds" of hackers at a cost of up to £500 mil...
|
Scooped by
Gust MEES
|
What is the consequence of cyber warfare slowly becoming increasingly common? The “happy hacker” of the 80s and 90s, he said, is long gone. Instead, we now have to deal with criminals who try to make money from their malware and botnets, hacktivists who try to protest and governments attacking their own citizens and other governments for espionage and full-scale cyber warfare.
As for cyber warfare in general, one thing Hypponen especially stressed is the difference between cyber espionage and cyber warfare. Spying, said Hypponen, is not warfare. “Warfare is something different,” he said. “It’s when you start using malware, viruses and backdoors to target our critical infrastructure.” Today, he argued we are seeing the very first stages of a global cyber arms race. We are now seeing many other governments besides U.S. and Israel jump on the same bandwagon and now that other countries see that these attacks are successful, they want to jump on the bandwagon, too.
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
‘Cyber ecosystem’ could mimic dynamics of the human immune system to isolate and contain threats robotically. The federal government is strategizing to build a virtual community that would prompt computers worldwide to instantly, en mass, suppress cyberattacks, sometimes without humans at the keyboard. ===> The so-called "cyber ecosystem" would take “collective action” to galvanize cooperation among networks, external devices, and consumers, the Obama administration announced today. <=== “Computer systems, devices, applications and users will automatically work together in near real time to anticipate and prevent cyberattacks, automatically respond to attacks while continuing normal operations, evolve to address new threats, limit the spread of attacks across participating devices,” as well as share timely security information, a government research solicitation stated. The Homeland Security Department and National Institute of Standards and Technology are seeking public input on the potential benefits and challenges of the approach before forging ahead with construction. “This information will help DHS and NIST develop future cyber ecosystem security capabilities and an implementation strategy that will strengthen the security of critical infrastructures, federal information systems and the private sector,” the bulletin stated. Read more: http://www.nextgov.com/emerging-tech/2012/09/get-ready-computers-worldwide-automatically-smother-cyber-strikes/57977/
|
Scooped by
Gust MEES
|
Nations are developing disruptive offensive software — at great potential risk. Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals and foreign governments, mainly China. Increasingly, however, the focus is on developing offensive capabilities, on figuring out how and when the United States might unleash its own malware to disrupt an adversary’s networks. That is potentially dangerous territory. Read more: http://www.nytimes.com/2012/09/10/opinion/a-new-kind-of-warfare.html?_r=2
|
Scooped by
Gust MEES
|
Relying exclusively on open source information, task is to assess the relative capabilities of certain countries identified in the literature (China, India, Iran, North Korea, Pakistan, and Russia) to wage an effective cyber attack against an adversary. The words “effective cyberattack” by no means translate into the proverbial “take down” of the Internet; on the contrary,such attacks might involve intrusions into unprotected networks for the purpose of compromising data tables, degrading communications, interrupting commerce, or impairing critical infrastructures (such as transportation or medical and emergency services) in such a way that trust is undermined at the expense of a smoothly running economy and society. Read more: http://cyberwarzone.com/cyberwarfare/cyber-warfare-country-country-analysis
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
While analyzing the Flame malware that we detected in May 2012, Kaspersky Lab experts identified some distinguishing features of Flame's modules. Based on those features, we discovered that in 2009, the first variant of the Stuxnet worm included a module that was created based on the Flame platform. This indicates that there was some form of collaboration between the groups that developed the Flame and Tilded (Stuxnet/Duqu) platforms. Based on the results of a detailed analysis of Flame, we continued to actively search for new, unknown components. A more in-depth analysis conducted in June 2012 resulted in the discovery of a new, previously unknown malware platform that uses a modular structure resembling that of Flame, a similar code base and system for communicating to C&C servers, as well as numerous other similarities to Flame. In our opinion, all of this clearly indicates that the new platform which we discovered and which we called 'Gauss,' is another example of a cyber-espionage toolkit based on the Flame platform. Read more: http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution#1
|
Scooped by
Gust MEES
|
Summary: Defense analyst John Arquilla believes the U.S. should stop prosecuting elite hackers and instead hire them to wage an online war against terrorists as well as other American enemies. He argues if the U.S.should stop prosecuting elite hackers and instead hire them to wage an online war against terrorists as well as other American enemies. He argues if the U.S. played its card rights with hackers, the war on terror would have been long over. Read more: http://www.zdnet.com/defense-expert-us-should-hire-hackers-to-conduct-cyberwarfare-7000000920/
|
Scooped by
Gust MEES
|
|
Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.
Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].