Tag Archives: cyber warfare

UK: Regime blames Russia for crippling cyberattack

Source: CNN

“The British government says that Russia was behind a massive global cyberattack that hit major companies in June 2017. Foreign Office minister Tariq Ahmad said in a statement on Thursday that the Russian military was responsible for the attack, which initially targeted computers in Ukraine but quickly spread beyond its borders. The attack — called NotPetya — hit companies including British advertising group WPP (WPP), Oreo maker Mondelez (MDLZ), U.S. drugmaker Merck (MRK) and global shipping company FedEx (FDX). ‘The destructive attack masqueraded as ransomware, but its purpose was principally to disrupt,’ the U.K. government said in a statement.” (02/15/18)


Kaspersky Lab sues over second federal ban


Source: Axios

“Cybersecurity firm Kaspersky Lab has filed a lawsuit targeting the second of two federal bans on its wares. The latest suit goes after language in a defense law explicitly blocking the purchase of Kaspersky products. An earlier suit targets a Homeland Security directive doing the same. … At the center of the Kaspersky bans are [alleged, but thus far evidenceless] fears Russia could use its products in espionage operations.” (02/13/18)


Report: US, UK government web sites infected withy crypto-mining malware

Source: Reuters

“Thousands of websites, including ones run by U.S. and UK government agencies, were infected for several hours on Sunday with code that causes web browsers to secretly mine digital currencies …. More than 4,200 sites were infected with a malicious version of a widely used tool known as Browsealoud from British software maker Texthelp, which reads out webpages for people with vision problems, according to The Register.” (02/11/18)


Equifax says more private data was stolen in 2017 breach than first revealed

Source: ZDNet

“Hackers stole more data from Equifax in a breach last year than initially thought. In September, the Atlanta, GA-based credit giant revealed a huge data breach, including names, social security numbers, birth dates, home addresses, and in some cases driver’s license numbers. It was later confirmed over 145 million were affected, primarily Americans, but also some Canadians and British citizens. The hack became the largest single data breach reported in 2017. But documents seen by members of the Senate Banking Committee suggest the types of data stolen were wider than the company first reported.” (02/10/18)


You hack us, we nuke you

Source: WendyMcElroy.com
by Brad

“I am on record as saying that opposition to Trump must focus on his policies, not his personality. So I’m thankful to gdp on the forum for providing me with an excellent example: ‘Pentagon Suggests Countering Devastating Cyberattacks With Nuclear Arms’ …. Now, the insane stupidity of this is manifold. First, a competent cyberattack is very difficult to attribute. And it’s very easy to fake the origin of a cyberattack. … Then there is the problem that a cyberattacker is not a big concentrated target like an airbase or a weapons dump. How do you use a nuclear weapon against some guy operating from a remote basement? (Or a bunch of guys in widely scattered basements?) Basically this policy is threatening non-combatants: if you hack us, we’ll nuke a city. Finally, consider the incentives it creates.” (01/24/18)


Report: Pentagon idiots mull nuclear response to cyber attacks

Source: The Hill

“A Pentagon report outlining an updated U.S. nuclear strategy suggests using nuclear weapons to respond to non-nuclear attacks on the U.S., according to The New York Times. The newspaper reported Wednesday that the draft document, the Nuclear Posture Review, provides for possible nuclear responses to devastating cyberattacks on U.S critical infrastructure. The suggestion marks a dramatic expansion of what the U.S. believes warrants a first use of nuclear weapons, the Times noted. Only in narrow cases, such as in the event of a biological attack on the U.S., has Washington suggested that it could respond with nuclear force.” (01/17/18)


The WannaCry cyberattack: What the evidence says and why the Trump administration blames North Korea

Source: CounterPunch
by Gregory Elich

“The centerpiece of the claim of North Korean culpability is the similarity in code between the Contopee malware, which opens backdoor access to an infected computer, and code in an early variant of WannaCry. Contopee has been linked to the Lazarus group, a cybercrime organization that some believe launched the Sony hack, based on the software tools used in that attack. Since North Korea is widely considered to be behind the cyberattack on Sony, at first glance that would appear to seal the argument. It is a logical argument, but is it founded on valid premises? Little is known about Lazarus, aside from the operations that are attributed to it. The link between Lazarus and North Korea is a hypothesis based on limited evidence. It may or may not be true, but the apparent linkage is far weaker than mainstream media’s conviction would have one believe.” (01/03/18)


Snowden’s new app turns your spare Android phone into a pocket-sized security system

Source: Gizmodo

“NSA whistleblower Edward Snowden has helped create a new way to protect you from potential snoops. Snowden joined with the Freedom of the Press Foundation to create an open-source Android app called Haven, which turns your phone into a pocket-sized security system. All you need is a spare phone and a healthy dose of paranoia. … The problem Haven aims to address is known as an ‘evil maid’ attack. Basically, many of the precautions you might take to protect your cybersecurity can go out the window if someone gains physical access to your device. If that happens without your knowledge, a malicious actor could have eyes and ears on all your private files and you’re none the wiser. Haven’s primary purpose, then, is to guard your laptop or other devices against anyone who might try to tamper with them. But the app can be helpful in other scenarios as well.” (12/22/17)


Trump regime blames North Korea for WannaCry


Source: CNBC

“The Trump administration has publicly blamed North Korea for unleashing the so-called WannaCry cyber attack that crippled hospitals, banks and other companies across the globe earlier this year. ‘The attack was widespread and cost billions, and North Korea is directly responsible,’ Tom Bossert, homeland security adviser to President Donald Trump, wrote in a piece published on Monday night in the Wall Street Journal. … North Korean government representatives could not be immediately reached for comment. The country has repeatedly denied responsibility for WannaCry and called other allegations about cyber attacks a smear campaign.” [editor’s note: I wonder if the Trump regime will offer any more evidence for this claim than its opponents have offered for “Russian election meddling?” – TLK] (12/18/17)


ROBOT exploit from 1998 resurrected, leaves top websites’ crypto vulnerable

Source: ZDNet

“A number of the most popular websites and services online, including Facebook and PayPal, are vulnerable to an exploit which has resurfaced from 1998. The security flaw, dubbed ROBOT, was first discovered almost two decades ago by Daniel Bleichenbacher. PKCS #1 1.5 padding error messages produced by secure sockets layer (SSL) servers allow for an adaptive-chosen ciphertext attack which ‘fully breaks the confidentiality of TLS when used with RSA encryption,’ according to researchers Hanno Bock and Juraj Somorovsky from Hackmanit GmbH, Ruhr-Universitat Bochum, and Tripwire VERT’s Craig Young. The server implementation bug could be used to perform RSA decryption and key signing in order to decrypt traffic. ‘We discovered that by using some slight variations this vulnerability can still be used against many HTTPS hosts in today’s Internet,’ the team says.” (12/13/17)