20200720
pdf
keyboard_arrow_up
School
Wichita State University *
*We aren’t endorsed by this school
Course
453
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
6
Uploaded by eras3r98
UNCLASSIFIED
Page 1
20 July 2020
Table of Contents
Hackers Attack Telecom Argentina, Demand USD 7.5m In Monero
Russian Hacker Finally Found Guilty of 2012 LinkedIn Breach
With a new setup, the Air Force hopes to improve information warfare operations
Cloudflare DNS goes down, taking a large piece of the internet with it
Vulnerability Found in Kasa Camera
Twitter confirms 130 accounts were targeted as FBI launches probe on massive hack
Space Force tests compatibility of U.S. secure satcom network with U.K. Skynet
UK 'Confident' Moscow Helped Hackers Target Virus Vaccine
New BlackRock Android malware can steal passwords and card data from 337 apps
Cyber-Attack Downs Alabama County’s Network
Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS Disruption
95% of Brits Unable to Consistently Identify Phishing Messages
Hackers Attack Telecom Argentina, Demand USD 7.5m In
Monero
CryptoNews, 20 Jul 2020:
Telecom S.A., the largest telecommunications company in
Argentina, has suffered a ransomware attack as hackers demand USD 7.5m ir privacy
coin monero (XMR) to be paid until the night of Tuesday, July 21. If the company does
not meet the deadline, the payable amount will rise to USD 15 million (XMR 216,189).
The hackers are not only demanding the ransom to be paid in XMR but also left a
message with links where to buy this privacy coin.
Per the local news outlet, the
attack has not affected users or internet and telephone services provided by Telecom
Argentina. Still, the company has reportedly lost access to Office365 and OneDrive
files. Other affected internal systems include corporate VPN, Citrix, Siebel, Genesys,
the Customer and Field Service virtual machines, and internal users’ PCs.
The attack
has likely come through an attachment in an email, according to speculations on
social media. Twitter user @pablowasserman said that the malware targeted
company’s customer relationship management (CRM) software Siebel, which contains
data from its clients.
According to local reports, the attack had started as early as
Wednesday, when employees began noticing trouble accessing company’s VPN and
other databases. Preliminary estimates indicate that the attack may impact daily
operations of at least 18,000 teams.
The malware used in the attack is REvil
ransomware, also known as Sodinokibi, which was first detected on April 17, 2019.
The malware is used by a financially motivated group GOLD SOUTHFIELD.
Russian Hacker Finally Found Guilty of 2012 LinkedIn Breach
InfoSecurity Magazine, 13 Jul 2020:
A Russian hacker has finally been convicted of
cyber-attacks on LinkedIn, Dropbox and Formspring which breached millions of
customer accounts, after spending years in custody.
Yevgeniy Nikulin, now 32, was
arrested in 2016 in Prague and detained there for over a year while US and Russian
officials submitted extradition requests.
According to a 2016 indictment by US
Purpose
Educate recipients of cyber
events to aid in protecting
electronically stored DoD,
corporate proprietary, and/or
Personally Identifiable
Information from unauthorized
access, theft or espionage
Source
This publication incorporates
open source news articles to
educate readers on cyber
security matters IAW USC Title
17, section 107, Para a. All
articles are truncated to avoid
the appearance of copyright
infringement
Newsletter Team
* SA Sylvia Romero
Albuquerque FBI
* CI Agent Scott Daughtry
Purple Arrow Founder
Subscription/Questions
Click
HERE
to request for your
employer-provided email address
to be added to this product’s
distribution list
Purple Arrow Overview
The Purple Arrow Working Group
was founded in 2009 to address
suspicious reporting originating
from New Mexico (NM) cleared
companies. Purple Arrow is a
subset of the NM CI Working
Group.
Purple Arrow Members
Our membership includes
representatives from these New
Mexico-focused agencies:
902nd
MI, AFOSI, DOE, DCSA, DTRA, FBI,
HSI and NCIS
Disclaimer
Viewpoints, company names, or
products within this document
are not necessarily the opinion
of, or an endorsement by, the FBI
or any member of the Purple
Arrow Working Group or NM CI
Working Group
Distribution
You may freely forward this
product to U.S. person
co-workers or other U.S. agency /
U.S. company managed email
accounts
Personal Email/Foreigners
The FBI will
not
send Purple
Arrow products to a non-United
States employer-provided email
account (e.g. Hotmail, Gmail)
UNCLASSIFIED
Page 2
prosecutors [
link
], Nikulin hacked LinkedIn, Dropbox and Formspring back in 2012.
The attacks are subsequently revealed to have hit 117 million LinkedIn accounts, 69
million Dropbox users and 28 million Formspring accounts.
He’s alleged to have used
many of the stolen log-ins to launch subsequent attacks on individuals.
In the first
case to be held in the Northern California district since the start of the pandemic, it
took a jury just a few hours to convict Nikulin.
He now faces up to 10 years in prison
for each count of selling stolen usernames and passwords and installing malware onto
computers, and up to five years for each count of conspiracy and computer hacking.
There’s also a two-year stretch potentially awaiting for identity theft.
Sentencing will
be handed down on September 29.
With a new setup, the Air Force hopes to improve information
warfare operations
Defense News, 19 Jul 2020:
The Air Force is realigning the cyber mission force teams
it provides to U.S. Cyber Command as a way to have intelligence personnel work
more closely with cyber operators.
In the past, Air Forces Cyber was made up of
cyber and intelligence personnel from 24th Air Force and 25th Air Force, respectively.
However, the arrangement created difficulties with command relationships and
oversight of teams since the intelligence operators served beneath a separate Air
Force command with a separate commander.
But in October, the Air Force decided
to merge 24th and 25th Air Force into 16th Air Force/Air Forces Cyber, placing cyber,
intelligence, surveillance and reconnaissance, electronic warfare and weather
capabilities under one commander, and creating the Air Force’s first information
warfare entity. The new organization also serves as the Air Force’s component to
Cyber Command.
The new organization of teams moves intelligence forces from the
70th Intelligence, Surveillance and Reconnaissance Wing to the 67th Cyber
Operations Wing.
“We looked at the intelligence squadron and focused on the
position descriptions that really were supporting the cyber mission force … so that we
can merge those intelligence professionals into the cyber operations squadron in
order to build the mission elements that supported the combatant command
requirements,” Col. Lauren Courchaine, commander of the 67th Cyberspace
Operations Group, told C4ISRNET in an interview.
Specifically, these teams are
combat mission teams – the teams that conduct cyber operations on behalf of
combatant commands mostly in the offensive sphere – and cyber support teams,
which provide intelligence, mission planning and other necessary support work for
combat mission team.
This new structure - with cyber operators, developers and
intelligence forces in the same room and read in on the same missions - provides a
tighter mission thread, Courchaine said. In the past, she said, when cyber operators
needed intelligence support, they’d have to ask their intelligence teammates who
weren’t always privy to the mission or technical context, which created gaps.
The
final realignment package is still at the Air Staff awaiting final approval with details
Incident Reporting
- Cleared Company: notify your
Defense Counterintelligence and
Security Service representative. If
the event compromised DoD
information, you must also
initiate the
DIBNET
process.
-
Financial Scam/Fraud:
submit a
complaint to the FBI’s Internet
Crime Complaint Center (
IC3
)
- Children:
if a child has been
targeted via the Internet, contact
your state’s Attorney General via
their web site. They likely have
an Internet Crimes against
Children task force that
specializes in this crime category
Cyber investigations are likely to
require the original offending
email (to obtain the email
headers) and/or log files that are
generated/maintained by an IDS,
router or firewall. Ensure your IT
office preserves this information
should law enforcement request
them for analysis.
Newsletter Archival
We do not maintain a formal
archive of this newsletter. Your
company/agency may archive
Purple Arrow products on its
internal network. This product
may NOT be altered in any way.
Cybersecurity Training
All employees must understand
cyber threats and think
defensively every time they use
automated systems. Many
intrusions occur because a single
employee failed basic
cybersecurity practices and
clicked on a hostile hyperlink or
opened a malicious file
attachment. The Defense
Counterintelligence and Security
Agency (formerly known as DSS)
offers free cyber training via its
Center for Development of
Security Excellence (CDSE)
website. Click
HERE
for info
UNCLASSIFIED
Page 3
regarding new units still to be determined, to include a new group activated under the 67th Cyberspace Wing
and three new squadrons.
Cloudflare DNS goes down, taking a large piece of the internet with it
TechCrunch, 17 Jul 2020:
Many major websites and services were unreachable for a period Friday afternoon
due to issues at Cloudflare's 1.1.1.1 DNS service. The outage seems to have started at about 2:15 Pacific time
and lasted for about 25 minutes before connections began to be restored.
Google issued a statement via
email emphasizing that this was not an attack on the system.
"This afternoon we saw an outage across some
parts of our network. It was not as a result of an attack," the company said in a statement. "It appears a router
on our global backbone announced bad routes and caused some portions of the network to not be available.
We believe we have addressed the root cause and monitoring systems for stability now. We will share more
shortly—we have a team writing an update as we speak."
Discord, Feedly, Politico, Shopify and League of
Legends were all affected, giving an idea of the breadth of the issue. Not only were websites down but also
some status pages meant to provide warnings and track outages. In at least one case, even the status page for
the status page was down.
A DNS, or Domain Name System, is an integral part of the web, connecting
domains (like TechCrunch.com) to their IP addresses (such as 152.195.50.33). If the one you or a site use goes
down, it doesn't matter whether a website's own servers are working or not — users can't even reach them in
the first place. Internet providers usually have their own, but they're often bad, so alternatives like Google's
have existed for many years, and Cloudflare launched its service in late 2018.
Update: Cloudflare at 2:46 says
"the issue has been identified and a fix is being implemented." CEO Matthew Prince explains that it all came
down to a bad router in Atlanta.
Vulnerability Found in Kasa Camera
InfoSecurity Magazine, 10 Jul 2020:
Midwesterner Jason Kent purchased a Kasa camera to help identify
whatever creature it was that had been eating his cucumber plants. In addition to uncovering the antics of a
groundhog, Kent was alarmed to discover an account takeover (ATO)/credential stuffing vulnerability in the
security device.
Kent said: “Upon installation I realized the mobile application was connecting directly over
the network to the camera, and if I wasn’t on the network, I still could see the images from my camera on the
mobile app. As a security professional, this concerned me.”
Kent, who is hacker-in-residence at Cequence
Security, said the cybersecurity flaw he found in the device could allow a bad actor to spy on a user's home
and change the camera’s settings.
Through further investigation, Kent discovered that although the Kasa’s
mobile application uses SSL, the SSL certificate wasn’t pinned. This made it “easy to open it up and look at the
transactions.”
“I also found that the authentication is simply BASE64 encoded username:password being
passed under SSL,” said Kent. Of equal concern to Kent was the finding that the authentication to the web
platform was giving “very verbose” API error messages included phrases such as “password incorrect.” Kent
posits that this could leave users who set up their username as their email address vulnerable to cyber-attack.
Kent reported his concerns to TP-LINK, parent company of the Kasa brand, in March 2020.
At time of
publication, the flaw had still not been remedied.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
UNCLASSIFIED
Page 4
Twitter confirms 130 accounts were targeted as FBI launches probe on massive
hack
ABC News, 17 Jul 2020:
Twitter confirmed that approximately 130 accounts were targeted in the massive hack
that has sent the social media company reeling and now has the attention of the Federal Bureau.
On
Wednesday, the Twitter accounts of a handful of prominent users including Joe Biden, Barack Obama, Elon
Musk, Bill Gates and Kanye West were apparently compromised by a hacker asking users to send funds to a
Bitcoin account.
At the time, the social media company said in a statement that attackers "successfully
targeted some of our employees with access to internal systems and tools" and temporarily suspended the
ability of all verified Twitter accounts from posting.
In an update Thursday evening, the company revealed
more details about the reach of the cyberattacks, saying approximately 130 accounts were targeted and for a
"small subset" of those accounts, "the attackers were able to gain control of the accounts and then send
Tweets from those accounts."
Twitter said it has disabled downloading personal Twitter data for all accounts
while the investigation continues.
Space Force tests compatibility of U.S. secure satcom network with U.K. Skynet
SpaceNews, 19 Jul 2020:
A cyber-secure operating system developed for U.S. military communications
satellites also works with the United Kingdom’s Skynet satellites, the U.S. Space Force said in a news release
July 17.
The U.S. Space Force Space and Missile Systems Center and the U.K. Ministry of Defence on July 13
conducted a demonstration of the Protected Tactical Waveform over the Skynet satellite system, according to
the announcement [
link
].
The Protected Tactical Waveform, known as PTW, has been in development for
several years and will run over the U.S. military Wideband Global Satcom (WGS) communications satellites. It
was designed to mitigate the effects of jamming on tactical communications networks.
UK 'Confident' Moscow Helped Hackers Target Virus Vaccine
AFP, 20 Jul 2020:
British Foreign Secretary Dominic Raab said on Sunday he was "absolutely confident" in
allegations by the UK and its allies that Russia targeted labs conducting coronavirus research, branding the
behavior "outrageous and reprehensible."
Britain, the United States and Canada on Thursday accused a
hacking group called APT29 of spearheading the online attacks on various organizations involved in Covid 19
vaccine development.
They said the collective is "almost certainly" linked to Russian intelligence, and
intended to steal information and intellectual property.
Raab reiterated that the trio's conclusions were based
on assessments by Britain's National Cyber Security Centre (NCSC) and its counterparts in the U.S. and Canada.
"We're absolutely confident that the Russian intelligence agencies were engaged in a cyber attack on research
and development efforts in organizations in this country and internationally with a view either to sabotage or
to profit," he told Sky News.
"At the time that the world has come together to try and tackle Covid-19... I think
it's outrageous and reprehensible that the Russian government is engaged in this activity."
Raab said Thursday
that perpetrators in Russia had circulated leaked trade documents between Britain and the United States, in a
bid to sow greater division in the contest.
UNCLASSIFIED
Page 5
New BlackRock Android malware can steal passwords and card data from 337
apps
ZD Net, 16 Jul 2020:
A new Android malware strain has emerged in the criminal underworld that comes
equipped with a wide range of data theft capabilities allowing it to target a whopping 337 Android
applications.
Named BlackRock, this new threat emerged in May this year and was discovered from mobile
security firm ThreatFabric.
Researchers say the malware was based on the leaked source code of another
malware strain (Xerxes, based itself on other malware strains) but was enhanced with additional features,
especially on the side that deals with the theft of user passwords and credit card information.
The trojan will
steal both login credentials (username and passwords), where available, but also prompt the victim to enter
payment card details if the apps support financial transactions.
Per ThreatFabric, the data collection takes
place via a technique called "overlays," which consists of detecting when a user tries to interact with a
legitimate app and showing a fake window on top that collects the victim's login details and card data before
allowing the user to enter the intended legitimate app.
In a report shared with ZDNet this week prior to
publication, ThreatFabric researchers say the vast majority of BlackRock overlays are geared towards phishing
financial and social media/communications apps. However, there are also overlays included for phishing data
from dating, news, shopping, lifestyle, and productivity apps. The full list of targeted apps is included in the
BlackRock report.
To show the overlays, BlackRock isn't that unique, and, under the hood, BlackRock works
like most Android malware these days and uses old, tried, and tested techniques.
Once installed on a device, a
malicious app tainted with the BlackRock trojan asks the user to grant it access to the phone's Accessibility
feature.
Currently, BlackRock is distributed disguised as fake Google update packages offered on third-party
sites, and the trojan hasn't yet been spotted on the official Play Store.
However, Android malware gangs have
usually found ways to bypass Google's app review process in the past, and at one point or another, we'll most
likely see BlackRock deployed in the Play Store.
Cyber-Attack Downs Alabama County’s Network
InfoSecurity Magazine, 9 Jul 2020:
A suspected ransomware attack has caused the temporary closure of an
Alabama county’s computer network.
Chilton County implemented a shutdown after being targeted by a
suspected ransomware attack on the morning of July 7. County Commission Chairman Joseph Parnell
announced the incident on the social media network Facebook.
“The incident has caused a temporary
disruption to the County’s computer records systems including the tag office and probate court records,”
wrote Parnell. “Persons needing services provided by our various departments should check with the clerks in
the particular department before coming to the courthouse to ensure that needed records are accessible.”
As
a result of the attack, local records required by the courthouse in the performance of its regular services have
been rendered unavailable. In a phone interview with the Clanton Advertiser, Parnell said an investigation was
underway to determine the severity of the cyber-incident. The county servers and computers in several
departments have been closed in a bid to limit the spread of any malware infection that may have occurred.
Employees reported the discrepancies to the local IT team, which then shut down the county’s internal
network.
“We have a cyber-policy in place and have hired a firm of professional IT people out of New York
that is going to come in and assess the system,” Parnell said.
The cyber-branch of the FBI and the Alabama
Attorney General’s Office have been notified of the incident.
UNCLASSIFIED
Page 6
Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS Disruption
SecurityWeek, 9 Jul 2020:
Honeywell says it has seen a significant increase over the past year in USB-borne
malware that can cause disruption to industrial control systems (ICS). Honeywell Industrial Cybersecurity this
week published its 2020 USB Threat Report. The report is based on data collected over a period of 12 months
by the company’s Secure Media Exchange (SMX) USB security platform from oil and gas, energy, chemical,
food, shipping, building, aerospace, pulp and paper, and manufacturing companies across 60 countries in the
Americas, Europe and Asia. An analysis of the data showed that SMX blocked at least one threat at 45% of
industrial sites using the product, up from 44% in the previous report [
link
], which the company published in
2018. While only 11% of the malware found on USB drives was specifically designed to target industrial
systems — this represents a slight drop compared to the 14% identified in 2018 — 59% of the detected
threats could cause significant disruption to industrial systems, compared to only 26% in 2018. On the other
hand, that 11% becomes 28% if ransomware, which has increasingly targeted operational technology (OT)
systems, is also taken into consideration. These pieces of malware can launch DoS attacks, cause loss of view
to operations management networks, and damage or disrupt key assets, Honeywell says. The most prevalent
threats observed by the company were RATs, backdoors and droppers. “This makes logical sense: in industrial
environments, where network access is difficult, gaining a foothold via USB to then establish remote access
and download new malware is a sound strategy for an attacker,” the company said in its report [
link
]. “While
ransomware can be effective via USB, establishing a persistent backdoor with command and control, more
coordinated attacks can be attempted in these otherwise elusive environments.”
95% of Brits Unable to Consistently Identify Phishing Messages
InfoSecurity Magazine, 9 Jul 2020:
Just 5% of Brits are able to recognize all scam emails and texts, a study from
Computer Disposals Limited [
link
] has found.
Scam emails purporting to be from Facebook were shown to be
most likely to trick people. Additionally, participants found it harder to spot scams via SMS messages
compared to emails.
For the study, Computer Disposals created a quiz comprised of genuine recreated
messages and emails from organizations including the UK government, Amazon, Disney Plus and Netflix
alongside scam texts and emails that included the exact tactics being used by hackers to gain access to users’
accounts and personal details. They then asked 1000 individuals to try and distinguish between those that
were genuine or fake.
The findings are especially concerning in light of a rise in phishing attacks during the
COVID-19 pandemic, as cyber-criminals play on people’s economic and health fears during the crisis.
The
respondents were observed to be naturally suspicious of all communications, however, with just 44% able to
identify the genuine messages and emails.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help