{"id":1184,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail159-atl121-mcsv-net\/"},"modified":"2021-12-30T11:38:54","modified_gmt":"2021-12-30T11:38:54","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail159-atl121-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail159-atl121-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail159.atl121.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>RIGGING COMPROMISE &#8211; RIG EXPLOIT KIT<br \/>\nExploit Kits are one of the biggest threats that affects users, both inside and outside the enterprise, as it indiscriminately compromises simply by visiting a web site, delivering a malicious payload.<br \/>\nOne of the challenges with exploit kits is at any given time there are numerous kits active on the Internet.<br \/>\nRIG is one of these exploit kits that is always around delivering malicious payloads to unsuspecting users.<br \/>\nRIG first appeared in our telemetry back in November of 2013, back then we referred to it as Goon, today it&#8217;s known as RIG.<br \/>\nWe started focusing on RIG and found some interesting data similar to what we found while analyzing Angler.<br \/>\nThis post will discuss RIG, findings in the data, and what actions were taken as a result.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fb4d16aa9d&#038;e=20056c7556<\/p>\n<p>Eight arrested in eastern Europe over ATM malware attacks<br \/>\nEuropol has announced the takedown of an international criminal group believed to be behind a series of ATM malware attacks dating back to at least 2014.<br \/>\nSaid to be one of the first operations of this type in Europe, it resulted in multiple house searches and arrests in Romania and the Republic of Moldova.<br \/>\nUsing malware dubbed Tyupkin, the suspects were allegedly able to empty cash from ATM machines on demand following the successful installation of a trojan.<br \/>\nCalled \u201cATM jackpotting\u201d, the exploit allowed attackers to empty infected machines by issuing commands via the machine&#8217;s pin pad.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5feffb1402&#038;e=20056c7556<\/p>\n<p>Trend Micro: Internet scum grab Let&#8217;s Encrypt certs to shield malware<br \/>\nUpdated It was inevitable.<br \/>\nTrend Micro says it has spotted crooks abusing the free Let&#8217;s Encrypt certificate system to smuggle malware onto computers.<br \/>\nThe security biz&#8217;s fraud bod Joseph Chen noticed the caper on December 21.<br \/>\nFolks in Japan visited a website that served up malware over encrypted HTTPS using a Let&#8217;s Encrypt-issued cert.<br \/>\nThe site used the Angler Exploit Kit to infect their machines with the software nasty, which is designed to raid their online bank accounts.<br \/>\nThe use of encryption shields the malware from network security scanners while in transit, and the certificate helps legitimize the malicious site.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d88818e8fa&#038;e=20056c7556<\/p>\n<p>Daimler selects OT to connect its cars securely<br \/>\nDaimler AG (Xetra:DAI.DE), a large producer of premium cars and a manufacturer of commercial vehicles, and Oberthur Technologies (OT), a provider of embedded security software products, services and solutions, announced on Wednesday a new partnership to connect Mercedes-Benz passenger cars with OT&#8217;s embedded remotely programmable SIM.<br \/>\nReportedly, this disruptive embedded connectivity solution will be implemented in Daimler&#8217;s vehicles starting with the new Mercedes-Benz E-class from March 2016.<br \/>\nAccording to the companies, with OT&#8217;s automotive-graded eUICC called DIM DakOTa Auto and OT&#8217;s M-Connect solution, Daimler will simplify the integration and management of the Mobile Network Operator (MNO) subscriptions in the cars during their entire life cycle.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d6a9ecabd9&#038;e=20056c7556<\/p>\n<p>5 things hackers love to see you share on social media<br \/>\nTo help you play it safe, here&#8217;s a list of things you should never share on social media.<br \/>\n1) Your Phone Number\u2028<br \/>\n2) Your Home Address<br \/>\n3) Your New Credit Card<br \/>\n4) Hacker-Targeted Hashtags<br \/>\n5) Where You&#8217;ve Checked In<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b196e334d7&#038;e=20056c7556<\/p>\n<p>Common pins an easy target for thieves and hackers<br \/>\nPresident of DataGenetics.com Nick Berry completed a study of almost 3.4 million leaked four digit passwords to discover what the most common and least common personal identification numbers were.<br \/>\nUnsurprisingly he found the most common was 1234, with 10.713 per cent of people using that number.<br \/>\n1111 came next with more than six per cent of people sticking to ones.<br \/>\nOther common codes included 0000, 1010, 6666 and 4321.<br \/>\nOn the other end of the scale, 8086 was the least common PIN with only 25 occurrences in 3.4 million.<br \/>\n\u201cNAB advises customers to help minimise fraud by keeping their PIN a secret,\u201d spokeswoman Elise Huck said.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0cc303cad0&#038;e=20056c7556<\/p>\n<p>Cyber security takes centre stage at Security &#038; Counter Terror Expo 2016<br \/>\nDavid Thompson, Security &#038; Counter Terror Expo Event Manager, said: \u201cThe threat posed by terrorists is now multi-faceted with groups utilising technology as a key weapon in their arsenal.<br \/>\nTargets are becoming more diverse, as are the methods employed by those that seek to do us harm.<br \/>\nSecurity &#038; Counter Terror Expo will reflect these developments, showcasing cutting-edge technology while exploring the latest cyber security strategies.<br \/>\nThe event has an increased focus on uniting domestic and international professionals, and will include a host of features that benefit those working in the public and private sectors.<br \/>\nAlongside the exhibition, leading figures will discuss the latest solutions and strategies at the Cyber Threat Intelligence Conference.<br \/>\nPresented by techUK, the representative body for the UK\u2019s technology industry, the sessions will bring together all those who work to prevent cyber terrorism and crime.<br \/>\nAmong the topics to be discussed will be an overview of global cyber security threats and how to mitigate against them.<br \/>\nKey speakers will include Chris Gibson, Director at CERT-UK; Richard Parris, Chairman and Chief Executive of Intercede; Prof.<br \/>\nChris Hankin, Director at the Institute for Security Science and Technology; and representatives from the National Crime Agency\u2019s National Cyber Crime Unit.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=97929d1eea&#038;e=20056c7556<\/p>\n<p>Figuring Out What Happened After a Data Breach<br \/>\nAs management consultant Peter Drucker once said, the only thing that\u2019s inevitable in the life of the leader is the crisis.<br \/>\nOnce a security incident or confirmed breach unfolds, you\u2019re in the spotlight.<br \/>\nIt\u2019s your testing time to see what you\u2019re really made of.<br \/>\nWhy not start working on making yourself look good today?<br \/>\nApplying this to security incidents and data breaches, you can step back and take a look at the bigger picture of what\u2019s going on and what it\u2019s going to take to resolve the challenge by asking the following questions:<br \/>\n\u2022 What has actually happened?<br \/>\n\u2022 How did it happen?<br \/>\n\u2022 What was impacted?<br \/>\n\u2022 Who\/what information was involved?<br \/>\n\u2022 Who else needs to be on the response team?<br \/>\n\u2022 What are the next steps?<br \/>\nFigure out what the worst thing is that could happen, do everything within reason to make sure that it doesn\u2019t happen and then have a plan to minimize the impact of any residual risks.<br \/>\nIt\u2019s really as simple as that.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1dc165f693&#038;e=20056c7556<\/p>\n<p>Does a data breach really affect your firm\u2019s reputation?<br \/>\nOne thing is clear; a data breach is a PR and financial disaster.<br \/>\nCompanies often spot the intrusion too late, and respond inadequately, resulting in falling (temporary) sales and journalist outrage.<br \/>\nIt\u2019s true to say that customer loyalty damage is done in the event of a breach, and that sales do take a nose-dive.<br \/>\nTarget\u2019s sales fell by 46 percent year-on-year in the fourth quarter of 2013 to $520 million (or 81 cents a share), while eBay (breached mid 2014) admitted declining user activity impacted its quarterly net revenue.<br \/>\nThere are other financial costs to bear, including additional security (pen testers, consultants, security vendors, PRs and lawyers), litigation and fines by data protection authorities.<br \/>\nReputational damage sees a differing of opinion, though.<br \/>\nInfoSec folk largely agree that breaches impact on the bottom line, but that \u2013 managed and responded to adequately \u2013 it can become business as usual (BAU).<br \/>\nStock prices recover, and stake holders are appeased.<br \/>\nData protection authorities can be held off at arm\u2019s length.<br \/>\nEarlier this year, Ponemon Institute\u2019s &#8220;The Aftermath of a Mega Data Breach: Consumer Sentiment,&#8221; revealed that data breaches was up there with poor customer service and environmental disasters for impacting brand reputation.<br \/>\nElsewhere and the Forbes Insights report, \u2018Fallout: The Reputational Impact of IT Risk\u2019, indicated that 46 percent of organizations had suffered damage to their reputations and brand value as a result of a breach.<br \/>\nAnother 19 percent of organizations suffered reputational and brand damage as a result of a third-party security breach or IT system failure.<br \/>\n\u201cWhat C-levels want from a CISO is a risk metric and a value in terms of cost.<br \/>\nThey want to understand exactly what their liability will be if such an event were to take place.<br \/>\nCISOs need to be able to give C-level execs a definitive answer on this, yet often it\u2019s hard as asset registers are missing, digital footprints are unknown, risk models are complex and claim forms are dubious.<br \/>\nIt\u2019s clear then that breaches do result in damaged trust, to a degree brand reputation, and bottom line.<br \/>\nTarget and JP Morgan pledged to spend additional $100 million and $500 million on security post-breach, while Target also had to pay back card issuers, and lost $236 million in breach-related costs ($90 million of which was offset by insurance).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4ab1f96f20&#038;e=20056c7556<\/p>\n<p>Higher fines for privacy breaches and data breach notification duty enter into force on 1 January 2016<br \/>\nRecently the Dutch Senate passed the bill on data breach notifications and sanctions.<br \/>\nThis bill introduces higher fines for non-compliance with the Dutch Data Protection Act.<br \/>\nIn addition, companies will be obliged to notify the Dutch Data Protection Authority (\u201cDPA\u201d) immediately of any data breach.<br \/>\nDepending on the exact circumstances, data subjects will also have to be notified if their data are compromised.<br \/>\nNon-compliance with privacy laws can lead to an administrative fine for each violation, the amount of which can be up to a maximum of EUR 810,000 or 10% of the company\u2019s annual net turnover.<br \/>\nThe new legislation will enter into force on 1 January 2016.<br \/>\nThe new amendments to the Dutch Data Protection Act will allow the DPA to impose fines for the violation of a large number of general obligations (see the amended Article 66 of the Dutch Data Protection Act).<br \/>\nThese fines vary from a minimum of EUR 20,250, for relatively minor violations, to a maximum of EUR 810,000, for deliberate or repeated violations.<br \/>\nFor legal entities, the amount of the fine is not fixed: if the highest fine category is not sufficiently punitive, the violation can be sanctioned by a fine equal to 10% of the company\u2019s annual net turnover.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6f62776c14&#038;e=20056c7556<\/p>\n<p>The secure GC: Data breach preparedness through auditing<br \/>\nWhen a data breach occurs, the immediate hours after are both chaotic and critical to an effective response.<br \/>\nPreparation is therefore essential.<br \/>\nOne component of executing an effective breach response is a solid understanding of the contractual contours between contributing or impacted third parties.<br \/>\nScouring a contract management system, or worse, a file cabinet of paper contracts to understand relevant third party relationships and obligations in the heat of a breach could therefore result in the organization spinning its wheels when it should be implementing its data breach response plan.<br \/>\nAuditing, extracting key provisions, and organizing those provisions before a breach occurs can therefore be a valuable tool in responding to an incident or full-scale data security crisis.<br \/>\nBut, how can inside counsel be secure in her belief that she\u2019s cataloged the most relevant provisions to a breach response.<br \/>\nCollecting and understanding the following provisions in third party agreements is a good starting point for preparedness when a breach occurs.<\/p>\n<p>-Security-Related Service Responsibilities<br \/>\n-Governance<br \/>\n-Breach Notification Obligations<br \/>\n-Data Encryption Provisions<br \/>\n-Audit Provisions<br \/>\n-Insurance Coverage<br \/>\n-Expense Reimbursement<br \/>\n-Termination Rights<\/p>\n<p>Controlling the chaos of a breach response is more than half the battle.<br \/>\nBy taking the time to audit, consolidate, and organize the key contractual provisions with third parties related to data security management before a breach, inside counsel will take a significant step toward a successful data breach response.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=09f3d386d0&#038;e=20056c7556<\/p>\n<p>Samsung Portable SSD T3 offers increased data security and portability<br \/>\nSamsung announced the Samsung Portable SSD T3, a palm-sized, external SSD that offers multi-terabyte storage capacity.<br \/>\nDesigned specifically for today\u2019s mobile lifestyle, the Portable SSD T3 is compact, lightweight and durable.<br \/>\nThe drive is smaller than an average business card and weighs a mere 50 grams approximately (less than two ounces), allowing users to easily carry large amounts of data with them anywhere.<br \/>\nThe drive has a simple set-up process for users, with one user-set password.<br \/>\nThe drive is equipped with AES 256-bit hardware encryption for the high level of security and protection across Windows, Mac and Android OS based devices.<br \/>\nEven if the drive should fall into the wrong hands, the data stored on it would be inaccessible.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bd65430077&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=dca6476ccf)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: RIGGING COMPROMISE &#8211; RIG EXPLOIT KIT Exploit Kits are one of the biggest threats that affects users, both inside and outside the enterprise, as it indiscriminately compromises simply&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1184","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1184"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1184\/revisions"}],"predecessor-version":[{"id":3671,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1184\/revisions\/3671"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}