In a move to significantly close the gap between discovery and mitigation of targeted attacks, HBGary, a subsidiary of ManTech International Corporation, unveiled the next-generation version of Responder™ Pro, the de facto industry standard in automated Windows® physical memory analysis. By leveraging Digital DNA™ 3.0, HBGary’s flagship technology, Responder™ Pro…
Author: admini
The Onion reveals how Syrian Electronic Army hacked its Twitter Read more: http://www.itproportal.
At least one employee entered their credentials, allowing the attackers entrance to their account, from which the SEA sent the same email to more Onion staff. The last attack compromised at least two more accounts, one of which was used to control the Twitter account.
One in particular —Syrian Electronic Army Has A Little Fun Before Inevitable Upcoming Deaths At Hands Of Rebels — angered the attacker, who began posting edtorial email addresses on the SEA account.
At the end of the day, at least five Onion accounts were compromised; the company forced a password reset on every staff member’s Google Apps account.
Link: http://www.itproportal.com/2013/05/13/the-onion-reveals-how-syrian-electronic-army-hacked-its-twitter/
Welcome to the red team!
Internet Explorer has been in the press over the years for the number of vulnerabilities that it once had, but nowadays, Java is a prime target for red teams because Java is meant to run on 3 million devices – providing what’s called a large ‘attack surface’.
Attacking the software is getting harder these days, but there’s one component of an organization’s computer system that is always potentially vulnerable – and that’s the people who use the computers. Another technique is to send infected memory sticks to staff, who often plug them in to see what’s on them, and, again, the malware strikes!
Red team members can now use social media to find the names of staff as well as details of their experience, so that e-mails and phone calls from the red team can sound quite legitimate.
The other part of the solution is education of staff so that they don’t insert memory sticks or click on attachments from unknown sources.
The red team could, perhaps, get a piece of malware onto someone’s tablet, which then gets connected to network, which then starts opening security doors all the way to the mainframe.
But most organizations can learn from the types of vulnerability red teams exploit, and take steps to ensure that they are not at risk from them.
Link: http://it.toolbox.com/blogs/mainframe-world/welcome-to-the-red-team-56048
Hackers sell out and go corporate as cyber crime becomes shift work
Online hackers are leaving surprising clues for cyber sleuths based on the time of their attacks — a trail suggesting the computer criminals are punching a clock for shift work. Chinese hackers, for instance, are on a Monday-Friday, 9 a.m. to 5 p.m. schedule, Beijing time, indicating they are likely…
Cyber crime hits most Canadian businesses
Sixty-nine percent of Canadian companies have reported some kind of cyber attack over the past year, indicating that cyber crime is fairly prevalent among Canadian businesses, according to a study released Wednesday.
The study, conducted by The International Cyber Security Protection Alliance, a non-profit organization comprising large national and multi-national companies, was based on 520 small, medium and large Canadian businesses.
About a quarter of those interviewed said that attacks had a considerable impact on their business both in terms of financial loss and reputational damage, with a total of more than 5 million Canadian dollars loss reported.
Large businesses are somewhat better prepared than medium and small ones, but still much remains to be done to prevent and deal with such attacks.
The help of external agencies to assist with cyber crime incidents was reported by 44 percent of affected organizations, with private agencies far more likely to be engaged than those from government.
The study reinforced the need for close collaboration between the public and private sector in fighting cyber crime through the pooling of knowledge and resources, it said.
Link: http://europe.chinadaily.com.cn/world/2013-05/09/content_16487561.htm
Hacking back: Digital revenge is sweet but risky
This law has undergone numerous revisions since it was first enacted in 1986, but Title 18, Sec. 1030 is clear on the point that using a computer to intrude upon or steal something from another computer is illegal. “There is no law that actually allows you to engage in an attack,” says Ray Aghaian, a partner with McKenna Long & Aldridge, and a former attorney with the Department of Justice’s Cyber & Intellectual Property Crimes Section.“
According to Ahlm, the companies tracking the bad guys collect vast amounts of data on Internet activity and can hone in on specific “actors” who engage in criminal activity. “Without touching or hacking the individual, they can tell you how trustworthy they are, where they are, what kind of systems they use,” says Ahlm.
While private companies cannot take offensive action with any such intelligence, they can use it defensively to thwart suspicious actors if they’re found to be sniffing around company data. “Based off your intelligence of who’s touching you,” says Ahlm, “you can selectively disconnect them or greatly slow them down from network access.”
In the grand scheme of fight-back tricks, this is one that causes relatively little harm but does a lot of good,” says Matthew Prince, co-founder and CEO. This company drew raves—as well as criticism—for creating a way to spam back at spammers, clogging their systems and preventing them from sending out more spam.
Hacking back can also have unintended consequences, such as damaging hijacked computers belonging to otherwise innocent individuals, while real criminals remain hidden several layers back on the Internet.
Link: http://www.pcworld.com/article/2038226/hacking-back-digital-revenge-is-sweet-but-risky.html