Posts Tagged ‘ cyber warfare ’

Report: NSA hijacked app stores to hack phones

May 22, 2015
posted by

The Hill The Hill    

"The National Security Agency planned to infiltrate the Google and Samsung app stores to plant spying software on smartphones, according to new documents published from files leaked by Edward Snowden. The Intercept and CBC News jointly published the documents Thursday, which outline the snooping efforts designed by the U.S. and its 'Five Eyes' alliance -- Canada, the United Kingdom, New Zealand and Australia. ... agents sussed out smartphone Internet traffic by browsing through its Web traffic database created under the XKeyscore program. They would then track down those phones' connections to an app marketplace. Once identified, agents could hijack that connection to the app store and use it as a delivery system to plant spyware on the device." (05/21/15)

http://tinyurl.com/ks9zo65  

No Comments »

“Logjam” crypto bug could be how the NSA cracked VPNs

May 21, 2015
posted by

The Register [UK]    

"A team led by Johns Hopkins crypto researcher Matthew Green thinks they might have an explanation for how the NSA attacked VPN services: flaws in how TLS implements Diffie-Hellman crytography. In what's bound to be the next big branded bug, Green says servers that support 512-key 'export-grade' Diffie-Hellman (DH) can be forced to downgrade a connection to that weak level. The server -- and therefore the client -- will both still believe they're using stronger keys such as 768-bit or 1024-bit. Like so many things -- including the similar FREAK flaw -- the bug is ancient: a 20-year-old SSL bug that was inherited by TLS." (05/20/15)

http://tinyurl.com/o4v5qyj  

No Comments »

St. Louis Fed hit with hack

May 20, 2015
posted by

CNN Money    

"Visitors to parts of the St. Louis Federal Reserve's website last month were sent to phony sites that could be used to steal their personal information. The hack targeted the St. Louis Fed's Web servers -- not the Fed branch itself or its website. This kind of 'domain name server hack' sends a person to a different site, often laced with malware or phishing software." (05/19/15)

http://money.cnn.com/2015/05/19/technology/st-louis-fed-hack/  

No Comments »

Who hacked the White House?

April 27, 2015
posted by

Justin Raimondo Antiwar.com
by Justin Raimondo  

"Okay, so let's summarize the evidence we’re given in this piece pointing to the Russians: 1) The culprits are 'sophisticated actors.' 2) It can't be the Chinese because they only care about money -- so it must be the Russians, because the targets were political. Besides, the Russians 'hide their tracks better.' 3) The timing: 'it happened at a moment of renewed tension with Russia.' Is it really necessary to debunk this pallid ghost of an argument? To begin with, there are plenty of 'sophisticated actors' in the hacking world, not all of whom are acting on behalf of a state." (04/27/15)

http://tinyurl.com/o7g558d  

No Comments »

Estonia: NATO to hold major cyber defense drill

April 22, 2015
posted by

Albany Democrat-Herald    

"About 400 computer experts will participate in a major cybersecurity drill in Estonia this week as part of NATO's efforts to upgrade its capability to counter potentially debilitating hacker attacks. Teams from 16 nations will take part in the Locked Shields 2015 exercise at NATO's cyberdefense center in Tallinn. The annual drill is one of the largest of its kind." (04/21/15)

http://tinyurl.com/kwfswtz  

No Comments »

Sony hack: Wikileaks publishes more than 30,000 documents

April 17, 2015
posted by

Wikileaks The Hollywood Reporter    

"On Thursday, WikiLeaks published more than 30,000 documents and 170,000 emails from Sony Pictures, obtained from a hack that has been sourced to North Korea in anticipation of the studio's release of The Interview. The Julian Assange website noted in a press release that 'whilst some stories came out at the time, the original archives, which were not searchable, were removed before the public and journalists were able to do more than scratch the surface.' In a move that could trigger another round of embarrassing prying into Sony affairs, WikiLeaks has now published those documents in a searchable format." (04/16/15)

http://tinyurl.com/pyh7ea4  

No Comments »

France: Television network hacked by Islamic State group

April 10, 2015
posted by

Christian Science Monitor Christian Science Monitor    

"Hackers claiming allegiance to the Islamic State group seized control of a global French television network, simultaneously blacking out 11 channels and taking over the network's website and social media accounts. The attack appeared to be an unprecedented step in the extremist group's information warfare tactics. The hackers briefly cut transmission of 11 channels belonging to TV5 Monde and took over its websites and social media accounts starting Wednesday night. The channel's director, Yves Bigot, said the attack was continuing Thursday. He told RTL radio that the network has restored its signal but can only broadcast recorded programs." (04/09/15)

http://tinyurl.com/o5kk4od  

No Comments »

Report: Russia behind 2014 attack on White House computer system

April 8, 2015
posted by

Fox News Fox News    

"Russian hackers last year were able to breach a White House computer system after a successful cyber-attack on the State Department, a news report said Tuesday. The report by CNN says the hackers were able to get sensitive information, including non-public details about President Obama's schedule. White House officials responded by saying the attack last year was made public and that no classified information was compromised. And they declined to comment on CNN's assertion that Russia was the culprit." (04/07/15)

http://tinyurl.com/nand9kc  

No Comments »

Hackers hit Israeli websites after Anonymous threats

April 7, 2015
posted by

USA Today USA Today    

"Pro-Palestinian [Arab] hackers disrupted Israeli websites on Tuesday, following threats from the Anonymous hacking collective that it would carry out an 'electronic Holocaust,' though Israeli cyber experts said the coordinated attacks caused little damage. The hacking campaign, which has taken place every April 7 since 2013, is meant to be in protest of Israeli policies toward the Palestinian[ Arab]s. In 2013, the hackers first waged the coordinated campaign, dubbed OpIsrael, on the eve of Israel's annual Holocaust remembrance day." (04/07/15)

http://tinyurl.com/m28jv8k  

No Comments »

Security theater: Obama claims “national emergency,” issues sanctions decree

April 1, 2015
posted by

ABC News ABC News    

"Cyber-attacks against the U.S. have become so bad that President Obama today declared it a 'national emergency' and announced the first ever sanctions program designed specifically to go after foreign hackers. ... The order calls for a sanctions program not unlike those used in counter-proliferation or counter-terrorism programs that can target 'individuals or entities that engage in significant malicious cyber-enabled activities' that harm the U.S. -- including attacks on critical infrastructure, denial of service attacks or cyber espionage, according to the White House." (04/01/15)

http://abcn.ws/1IQGn2H  

No Comments »

Cyber Armageddon is a myth

March 23, 2015
posted by

CounterPunch CounterPunch
by Bill Blunden  

"Over the past several years mainstream news outlets have conveyed a litany of cyber doomsday scenarios on behalf of ostensibly credible public officials. Breathless intimations of the End Times. The stuff of Hollywood screenplays. However a recent statement by the U.S. intelligence community pours a bucket of cold water over all of this. Yes, Virginia, It turns out that all the talk of cyber Armageddon was a load of bunkum. An elaborate propaganda campaign which only serves as a pretext to sacrifice our civil liberties and channel an ocean of cash to the defense industry." (03/23/15)

http://www.counterpunch.org/2015/03/23/cyber-armageddon-is-a-myth/  

No Comments »

CA: LAPD members get “doxxed” after shooting of homeless man

March 4, 2015
posted by

CBS News CBS Los Angeles    

"After the fatal shooting of a homeless man on Skid Row, the LAPD confirms at least two members of the force are victims of what authorities called 'doxxing.' Someone posted the officers' private information online, including names, addresses and details about their kids' schools. CBS2/KCAL9 is not reporting that information. The LAPD would not confirm if the officers targeted were involved in Sunday's fatal shooting at Union Rescue Mission after a struggle during which, officers say, the shooting victim went for one of their guns." (03/03/15)

http://tinyurl.com/leltexj  

No Comments »

A pretext for cyber COINTELPRO?

February 26, 2015
posted by

CounterPunch
by Eric Draitser  

"In its ever expanding war against Syria, now under the broader pretext of 'fighting ISIS,' the US Government has employed a variety of tactics. From arming terrorists whom it dishonestly labels 'moderates,' to encouraging Turkey and Jordan to host jihadi training centers, to the CIA working with the Muslim Brotherhood to funnel weapons and fighters into Syria, the US and its allies have demonstrated the multi-faceted approach they're taking to fighting ISIS, extremism, and the Syrian Government. The war, once believed to be relegated solely to Syria and Iraq, has now been broadened to a regional, and indeed, a global war with no geographical boundaries or time limits. And now, the Obama administration has announced that its war will also be waged in cyberspace. " (02/26/15)

http://www.counterpunch.org/2015/02/26/a-pretext-for-cyber-cointelpro/  

No Comments »

Attackers protesting Superfish debacle hijack Lenovo e-mail, spoof website

February 26, 2015
posted by

Ars Technica Ars Technica    

"Almost a week after revelations surfaced that Lenovo preinstalled dangerous ad-injecting software on consumer laptops, attackers took complete control of the company's valuable Lenovo.com domain name, a coup that allowed them to intercept the PC maker's e-mail and impersonate its Web pages. ... People who visited the site during the attack saw a slide show that mainly featured a girl or young woman with dark hair sitting in what appeared to be a bedroom. When clicked, the images led to a Twitter account that sharply criticized Lenovo for preloading some of its computers with ad-injecting software that completely broke encrypted connections to HTTPS-protected websites." (02/25/15)

http://tinyurl.com/l7ekoze  

No Comments »

EU police operation takes down malicious computer network

February 25, 2015
posted by

ABC News ABC News    

"European police have taken down a computer network that used malicious software to infect more than 3 million computers worldwide and steal personal data, banking details and passwords. European Union police coordination agency Europol said in a statement Wednesday that the network, known as the Ramnit botnet, was dismantled in an operation Tuesday by cybercrime experts coordinated from Europol's headquarters in The Hague." (02/25/15)

http://tinyurl.com/kotg2ut  

No Comments »

The US government’s cyber-go-round

February 19, 2015
posted by

Cato Institute
by Patrick G Eddington  

"Official Washington's response to perceived major crises generally follows a pattern: a serious security threat is proclaimed that requires vast new resources and legal authorities to defeat. A 'czar' may be appointed to help coordinate the federal response, or even an entirely new military command will be established to meet the challenge. When those efforts fail, a reorganization of the national security apparatus will be the next proposed step. The end result is usually more bureaucratic and policy failure. The U.S. government has effectively done all of these things in response to the increase in online threats, hacking, and 'cyber warfare.'" (02/17/15)

http://tinyurl.com/obzzh8m  

No Comments »

Newsweek Twitter, others hacked by CyberCaliphate

February 10, 2015
posted by

CNN CNN    

"CyberCaliphate, a group claiming ties to ISIS, appears to have hacked multiple twitter accounts and the breaking news system of a Maryland television station. The Twitter feeds of Newsweek and veterans' group Military Spouses of Strength were hacked Tuesday morning by a group identifying itself as CyberCaliphate, the same organization that was confirmed to have hacked the twitter account for U.S. Central Command earlier this year. According to Newsweek, IBTimes.com, the website of the International Business Times, was also hacked." (02/10/15)

http://tinyurl.com/kjd9zv8  

No Comments »

Anthem hacked in “sophisticated” attack on customer data

February 5, 2015
posted by

Bloomberg    

"Anthem Inc., the second biggest U.S. health insurer by market value, said hackers obtained data on tens of millions of current and former customers and employees in a sophisticated attack that has led to a Federal Bureau of Investigation probe. The information compromised includes names, birthdates, Social Security numbers, street and e-mail addresses and employee data, including income, Anthem said in an e-mail. The company will notify customers who were affected and provide credit and identify-theft monitoring services for free, Chief Executive Officer Joseph Swedish said in a letter to members." (02/04/15)

http://tinyurl.com/ppoflau  

No Comments »

Western spy agencies secretly rely on hackers for intel and expertise

February 4, 2015
posted by

Glenn Greenwald The Intercept
by Glenn Greenwald  

"The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. 'Hackers are stealing the emails of some of our targets ... by collecting the hackers' 'take,' we ... get access to the emails themselves,' reads one top secret 2010 National Security Agency document." (02/04/15)

http://tinyurl.com/oykysln  

No Comments »

Kim Dotcom’s Mega launches Skype competitor MegaChat

January 22, 2015
posted by

CNet News CNet News    

"The controversial Mega, a storage locker for online content, on Thursday launched MegaChat, a communication platform designed to compete with the likes of Skype. According to Mega founder Kim Dotcom, the new platform allows users to engage in end-to-end encrypted video and audio communication. ... Given the existing controversy surrounding Kim Dotcom, it may not be long before MegaChat faces the onslaught of governments fearing that criminals will turn to the company's new platform to communicate privately. For his part, Dotcom didn't shy away from that potential onslaught, as he thanked his development team in a tweet Thursday 'for conspiring to provide secure and private file storage and communications solutions to the world.'" (01/22/15)

http://tinyurl.com/pfooy94  

No Comments »

Officials: NSA hacked North Korea before North Korea hacked Sony

January 19, 2015
posted by

New York Times    

"The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth. Spurred by growing concern about North Korea’s maturing capabilities, the American spy agency drilled into the Chinese networks that connect North Korea to the outside world, picked through connections in Malaysia favored by North Korean hackers and penetrated directly into the North with the help of South Korea and other American allies, according to former United States and foreign officials, computer experts later briefed on the operations and a newly disclosed N.S.A. document." (01/18/1)

http://tinyurl.com/m8z8egg  

No Comments »

The myth of a secure military

January 15, 2015
posted by

Robert P. Murphy Free Advice
by Robert P Murphy  

"On NPR today they were talking about cybersecurity. The host made a throwaway remark along the lines that with private businesses, you couldn't expect a full-throated response to the threats his expert guests were discussing, because they responded to the profit motive and it 'wasn't like Los Alamos.' Here the host was referring to the famous lab where physicists and other scientists worked on the atomic bomb during World War II, and then continued to work on nuclear weaponry. His point, of course, was that the military engaged in state-of-the-art security to protect such critical secrets, whereas you couldn't expect Visa to do the same thing for its customers. ... The Soviets did steal the secrets to the atomic bomb, and one of their spies was at Los Alamos." (01/15/15)

http://tinyurl.com/k4grdh5  

No Comments »

Security theater: France hit by “unprecedented” wave of cyber attacks

January 15, 2015
posted by

CBS News CBS News    

"Hackers have targeted about 19,000 French websites since a rampage by Islamic extremists left 20 dead last week, a top French cyberdefense official said Thursday .... 'What's new, what's important, is that this is 19,000 sites -- that's never been seen before,' [Adm. Arnaud Coustilliere, head of cyberdefense for the French military] said. 'This is the first time that a country has been faced with such a large wave' of cyberattacks. ... Military authorities have launched round-the-clock surveillance to protect the government sites still coming under attack." [editor's note: On the one hand, I am skeptical of screeches from the usual suspects that the Charlie Hebdo attacks were a "false flag." On the other hand, I suspect that the cyberattack claim is 100% bullshit fabricated to keep up the scare and help justify the developing wave of added state authoritarianism that the Hebdo attacks are being used to put over - TLK] (01/15/15)

http://tinyurl.com/kwxjwm9  

No Comments »

Arrgh! Pirates rule the high IPs!

January 14, 2015
posted by

Students For Liberty Students For Liberty
by Elias Garcia  

"Let me be the first to lament the ‘fall’ of The Pirate Bay, a service that, statistically speaking, there’s a decent chance you use. On December 9th, Swedish officials decided to raid the facilities that contained the servers that TPB was hosted on, effectively shutting the site down. While TPB has remained ‘offline,’ it’s search engine and catalog no longer available to those who access the site, it’s probably a good time to realize that this is not the end. Nor has it ever been. Or will be." (01/13/15)

http://tinyurl.com/pdwp6yw  

No Comments »

Security theater: Obama to push law protecting companies from liability for assisting government spies

January 14, 2015
posted by

United Press International    

"President Barack Obama plans to announce legislation to protect companies from lawsuits for sharing data with the government for help in preventing cyberattacks. ... Critics of legislation of this type are concerned that it allows the government too much access to people's data with immunity from any legal action." (01/13/15)

http://tinyurl.com/nfwbdx8  

No Comments »

Our Sponsors





Making a living off your Drupal site?

Drupal Managed Hosting

Fed up with Maintenance and Hosting companies?