“Anonymous” Hacktivist Group Unmasked

A total of 16 people with ties to the “hacktivist” group “Anonymous” were arrested by the FBI on Monday. Fourteen of them were charged in connection with an attack on PayPal, which was targeted by “Anonymous” because the website suspended the account of WikiLeaks after it released classified State Department cables.

An affidavit from an FBI special agent reveals how the bureau tracked down 21-year-old Arciszewski of Florida, who is accused of attacking the Tampa Bay Infraguard website. First, they got the IP address of the individual who attacked the website with the account “AntiSecTest” on June 21. Then they used info on the Twitter account voodooKobra which posted a “bitly” link to the vulnerability he allegedly created with the phrase “Infraguard Tampa has one hell of an exploit.”

Based on the twitter info associated with the Twitter account, they visited his website at kobrascorner.com and did a Google search for his “VoodoKobra” screenname. They turned up his Wikipedia user page, which listed his real name as Scott Arciszewski. They compared his drivers license photo to the avatar on his account on hackforums.net and on his Facebook profile.

From TalkingPointsMemo: http://idealab.talkingpointsmemo.com/2011/07/fbi-arrests-college-students-cashiers-and-a-landscaper-for-anonymous-hacks.php

Pictures of the hackers themselves: http://media.talkingpointsmemo.com/slideshow/anonymous-mugshots-unmasked/1-213620

Posted in Cybersecurity Memo - Insiders Edition | Tagged | Leave a comment

U.S. Internet Service Providers Are Hijacking Customers’ Searches!

Several internet service providers across the United States are using an online service to secretly spy on, and redirect their subscribers’ online searches, according to a group of researchers at the International Computer Science Institute in Berkeley, California.

The ISPs are monitoring, intercepting, and redirecting the searches that their subscribers are performing through the search boxes in their browsers, say the researchers.

“Instead of returning a legitimate address for search.yahoo.com, www.bing.com, and (sometimes) www.google.com, these ISPs returned the address of proxy servers,” Nick Weaver, one of the researchers, told TPM.

“These proxy servers impersonate the legitimate search engine by transparently forwarding requests to the legitimate search engine, but have the ability to both monitor all queries and change the results.”

From TPM IdeaLAB: http://idealab.talkingpointsmemo.com/2011/08/researchers-us-internet-service-providers-are-hijacking-customers-searches.php

Posted in Cybersecurity Memo - Insiders Edition | Tagged , | Leave a comment

Operation Shady RAT: five-year hack attack hit 14 countries

The governments of the United States, Canada, and South Korea, as well as the UN, the International Olympic Committee, and 12 US defense contractors were among those hacked in a five-year hacking campaign dubbed “Operation Shady RAT” by security firm McAfee, which revealed the attacks. Many of the penetrations were long-term, with 19 intrusions lasting more than a year, and five lasting more than two. Targets were found in 14 different countries, across North America, Europe, India, and East Asia.

The infiltration was discovered when McAfee came across a command-and-control server, used by the hackers for directing the remote administration tools—”RATs,” hence the name “Operation Shady RAT”—installed in the victim organizations, during the course of an invesigation of break-ins at defense contractors. The server was originally detected in 2009; McAfee began its analysis of the server in March this year. On the machine the company found extensive logs of the attacks that had been performed. Seventy-two organizations were positively identified from this information; the company warns that there were likely other victims, but there was not sufficient information to determine what they were.

The attacks themselves used spear-phishing techniques that are by now standard. Apparently legitimate e-mails with attachments are sent to organization employees, and those attachments contain exploit code that compromise the employee’s system. These exploits are typically zero-day attacks. With a PC now compromised, the hackers can install RAT software on the victim PCs, to allow long-term monitoring, collection of credentials, network probing, and data exfiltration.

http://arstechnica.com/security/news/2011/08/operation-shady-rat-five-year-hack-attack-hit-14-countries.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss

Posted in Cybersecurity Memo - Insiders Edition | Tagged | Leave a comment

Pentagon unveils its cyberspace strategy

The Pentagon has released its cyberspace strategy, which recognizes cyberspace as “an operational domain to organize, train, and equip.”

“It is the first DoD (Department of Defense) unified strategy for cyberspace and officially encapsulates a new way forward for DoD’s military, intelligence and business operations,” the Pentagon said in a statement.

“This allows DoD to organize, train, and equip for cyberspace as we do in air, land, maritime, and space to support national security interests,”

The document characterizes active defense as the Pentagon’s “synchronized, real-time capability to discover, detect, analyze, and mitigate threats and vulnerabilities.”

The Pentagon will be introducing new security mechanisms on its networks, including sensors, software, and signatures to detect and guard against malicious code.

This document will resonate worldwide, as privacy advocates grapple with the DOD’s militarization of cyberspace and dominance in what is considered a new battle zone.

Check it out. The link to the document is here: http://www.defense.gov/news/d20110714cyber.pdf

Posted in Cybersecurity Memo - Insiders Edition | Tagged | Leave a comment

The world’s first real cyber-weapon

In June of 2009, someone silently unleashed a sophisticated and destructive digital worm that began slithering its way through computers in Iran with just one aim — to sabotage the country’s uranium enrichment program and prevent President Mahmoud Ahmadinejad from building a nuclear weapon.

But it would be nearly a year before inspectors would learn of this. The answer would come only after dozens of computer security researchers around the world would spend months deconstructing what would come to be known as the most complex malware ever written (Stuxnet) — a piece of software that would ultimately make history as the world’s first real cyberweapon.

From Wired Magazine: http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1

Posted in Cybersecurity Memo - Insiders Edition | Leave a comment

Debriefing on the different “hacktivist” groups making the news these days

The Internet has never been a safe place, and since its inception, and introduction to consumers, privacy and security have been a major concern. Of course, now that the average person’s computer skills are many times over what they used to be, that only amplifies the problem. Couple this with the fact that millions and millions of people are uploading mass amounts of personal and sensitive data and you’ve got a recipe for some serious cyber-insecurity. The advent of hackers with a conscience has exacerbated the situation while also putting a new twist on Web ethics.

Anonymous and LulzSec have become household names, and their Internet antics have captured the attention of just about everyone, including the CIA. But as identities and opponents merge, the cyberwar landscape has become confusing. Here’s an introductory course on the “who’s who” of hackers.

From Digital Trends: http://www.digitaltrends.com/computing/identifying-the-hacktivists-of-the-emerging-cyberwar/

Posted in Cybersecurity Memo - Insiders Edition | Leave a comment

Hackers capture and release personal data from former British PM Tony Blair


A hacker group has published what appears to be the address book and other private data of former British Prime Minister Tony Blair. The leak includes the names, phone numbers and addresses of numerous British politicians and personal contacts, as well as Blair’s National Insurance number, the equivalent of a Social Security Number in the US.

The data, published to Pastebin.com around 6:30pm EST Friday, was originally stolen “via a private exploit” in December 2010, according to the Team Poison post. The group says that they “still have access to the mail server.” According to a Blair spokesman, however, the data was not obtained from Blair himself, but rather the personal email account of a former staffer.

“This information has not been obtained from Tony Blair or any of his office systems,” the spokesman said in an email to CNN. “This appears to be information from the personal email account of a former member of staff from a few years ago.”

Team Poison member “TriCk” rebutted the claims, saying on Twitter that “Blairs [sic] sheep are lying about how we got the info.”

TriCk says that the leak is retribution for Blair’s role in the “War on Terror” and his support of the US-led war in Iraq. “Tony Blair is a war criminal, he should be locked up,” writes TriCk.

From Digital Trends: http://www.digitaltrends.com/computing/teamp0ison-hackers-hit-former-british-pm-tony-blair-leak-address-book

Posted in Cybersecurity Memo - Insiders Edition | Leave a comment

How to pick a password that’s hard to hack

Most hacker victims use email passwords that are easy to decipher. A good password doesn’t have to be impossible to remember. Here are tips for protecting your accounts.

From the Los Angeles Times: http://www.latimes.com/business/la-fi-techsavvy-passwords-20110626,0,3456346.story

Posted in Cybersecurity Memo - Insiders Edition | Leave a comment

SPECIAL REPORT: US Government takes steps to secure “the cloud”

WASHINGTON (Reuters) – The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new technologies, according to officials familiar with the plans, as a recent wave of cyber attacks boosts concerns about U.S. vulnerability to digital warfare.

The twin efforts show how President Barack Obama’s administration is racing on multiple fronts to plug the holes in U.S. cyber defenses.

Notwithstanding the military’s efforts, however, the overall gap appears to be widening, as adversaries and criminals move faster than government and corporations, and technologies such as mobile applications for smart phones proliferate more rapidly than policymakers can respond, officials and analysts said.

A Reuters examination of American cyber readiness produced the following findings:

* Spin-offs of the malicious code dubbed “agent.btz” used to attack the military’s U.S. Central Command in 2008 are still roiling U.S. networks today. People inside and outside the U.S. government strongly suspect Russia was behind the attack, which was the most significant known breach of military networks.

* There are serious questions about the security of “cloud computing,” even as the U.S. government prepares to embrace that technology in a big way for its cost savings.

* The U.S. electrical grid and other critical nodes are still vulnerable to cyber attack, 13 years after then-President Bill Clinton declared that protecting critical infrastructure was a national priority.

* While some progress has been made in coordinating among government agencies with different missions, and across the public-private sector gap, much remains to be done.

* Government officials say one of the things they fear most is a so-called “zero-day attack,” exploiting a vulnerability unknown to the software developer until the strike hits.

That’s the technique that was used by the Stuxnet worm that snarled Iran’s enriched uranium-producing centrifuges last summer, and which many experts say may have been created by the United States or Israel. A mere 12 months later, would-be hackers can readily find digital tool kits for building Stuxnet-like weapons on the Internet, according to a private-sector expert who requested anonymity.

From TPM IdeLab at: http://idealab.talkingpointsmemo.com/2011/06/special-report-government-in-cyber-fight-but-cant-keep-up.php#more

Posted in Cybersecurity Memo - Insiders Edition | Leave a comment

Internet Service Providers Partnering With NSA On Web Security

Three U.S. Internet service providers are working with the National Security Agency to filter the Internet traffic flowing to 15 defense contractors in an effort to block hacker attacks, according to The Washington Post.

The pilot program began last month on a voluntary basis and uses the high-tech spying agency’s data sets to identify malicious programs that hackers try to send to infect the contractors’ networks.

The network providers are AT&T, Verizon, and CenturyLink.

The defense contractors participating in the project include CSC, Lockheed Martin, Northrop Gruman and SAIC.

The Post quotes Deputy Defense Secretary William J. Lynn III as saying that he hopes that the program will be extended to protect other parts of critical U.S. infrastructure.

The program took a year to launch because both the NSA and the contractors had to work through privacy and national security issues.

Both sides say they had to make sure that the system complied with privacy concerns. The NSA was worried about classified information “getting in the hands of adversaries.”

The prime concern of civil liberties’ advocates and private sector companies is that a project focusing on monitoring networks for malicious code could be used as a surveillance program for other network traffic.

From TPM IdeaLab: http://idealab.talkingpointsmemo.com/2011/06/internet-providers-partnering-with-nsa-to-launch-massive-anti-virus-like-program.php?ref=fpb

Posted in Cybersecurity Memo - Insiders Edition | Leave a comment