Showing posts with label cyber security. Show all posts
Showing posts with label cyber security. Show all posts

Thursday, March 29, 2018

Concerned About What Facebook Knows About You? Check Out What Google Knows


Many users have been dropping Facebook, ceasing to use social media, or looking into the data that’s been collected about them.  But if you think that what Facebook knows about you is scary, check out what Google knows about you.


Dylan Curran, an information technology consultant, took a look at just what Google knew about him. Even with his experience as a web developer, he was shocked. “I was really like: ‘Oh, my God. This is preposterous,"” Curran said. When he requested his data from Google, he found that it was constantly tracking his location in the background, including calculating how long it took to travel between different points, along with his hobbies, interests, possible weight, income, data on his apps, and records of files he had deleted.  But that was just the tip of the iceberg.


Although Curran thinks what Google is doing is harmless and not at all malicious (we’ll agree to disagree there), he did say it’s a little unsettling that the tech giant knows so many things about him and he feels uncomfortable now that he knows how closely he’s being tracked.


“It’s wrong to trust any entity that big with so much information,” he said. “They’re just trying to make money,” and at some point, “someone is going to make a mistake.” But this information and revelation definitely struck a chord with some, and they aren’t happy about it. Curran’s original tweet now has 159,000 talking about it.




Google tracked every single place Curran had been, right down to how long he was there and the time he left.




“All Google users are being tracked by default in terms of physically where [they’re] going and located,” Scott J. Shackelford, an associate business professor at Indiana University focusing on cybersecurity law and policy said, according to NBC News. “That is shocking to a lot of people.”


A spokesperson for Google wanted the public to know that everyone needs to be aware of their online privacy choices and review them regularly. “In order to make the privacy choices that are right for them, it’s essential that people can understand and control their Google data,” the spokesperson wrote in an email. “Over the years, we’ve developed tools like My Account expressly for this purpose, and we’d encourage everyone to review it regularly.”


Google has made an array of privacy tools available through the My Account feature. It will allow users see their personal data and tracking history.  It also allows people to turn off tracking mechanisms or delete individual pieces of data they want gone from the archives.


 

Wednesday, November 1, 2017

North Korean Cyber Threat: ‘The Difference Between Theft And Destruction Is Often A Few Key Strokes’

northkoreacyberattack


Global banks are preparing to defend themselves against a potential North Korea hacking attack. Cybersecurity experts worry that North Korea will continue to embolden themselves as the threat of United State military action over the nuclear program looms.


The threat to banking institutions is very real. North Korean hackers have stolen hundreds of millions of dollars from banks during the past three years. A 2016 heist at Bangladesh Bank yielded $81 million, according to Dmitri Alperovitch, chief technology officer at cybersecurity firm CrowdStrike. “We know they attacked South Korean banks,” said security teams in the United States. They added that fears have grown that banks in the United States will be targeted next.


The North Korean government has repeatedly denied accusations of hacking by security researchers and several governments that it has carried out cyber attacks.  But Alperovitch told the Reuters Cyber Security Summit on Tuesday that banks were concerned Pyongyang’s hackers may become more destructive by using the same type of “wiper” viruses they deployed across South Korea and at Sony Corp’s Hollywood studio.


North Korean hackers could use what they have learned through previous cyber heists about financial networks gathered to disrupt banking operations, according to Alperovitch. He also said his firm has conducted “war game” exercises for several banks fearing a North Korean attack.


“The difference between theft and destruction is often a few keystrokes,” Alperovitch said.


John Carlin, a former U.S. assistant attorney general, told the Reuters summit that other firms, among them defense contractors, retailers, and social media companies, were also concerned. “They are thinking ‘Are we going to see an escalation in attacks from North Korea?’” said Carlin, chair of Morrison & Foerster international law firm’s global risk and crisis management team.


Some others say that it is highly unlikely North Korea will use cyber tactics to attack the US because the rogue regime fears retaliation. Jim Lewis, a cyber expert with Washington’s Center for Strategic and International Studies, is one of those persons. He said it is unlikely that North Korea would launch destructive attacks on American banks because of concerns about the reaction from the US.


The concerns appear valid when considering North Korea is defying the sanctions placed on them demanding they abandon their quest to obtain nuclear weapons.

Wednesday, October 11, 2017

Is It Time To Take North Korea’s Cyber Weaponry Seriously?


northkoreacyberattack


Analysts say cyber capabilities have become a key asset in North Korea’s war chest. Pyongyang’s increasingly bold attacks in the virtual space have come in tandem with the hermit nation’s rapidly progressing ballistic missile and nuclear programs and some say that it’s time this is taken very seriously.


The rogue regime has used cyber attacks for a wide range of purposes including hacking adversaries like South Korea and pilfering money. North Korea’s hackers have been accused of carrying out some of the most audacious cyber attacks of the past few years, from siphoning millions of dollars to stealing state secrets.


“North Korea’s cyber weapons are as destructive as its conventional weapons,” Lim Jong-in, a cybersecurity professor at Korea University, told CNN. “Tomahawk missiles can paralyze a major country’s power grid and financial system. So do North Korea’s cyber weapons.” Lim continued, saying: “Cyber experts say North Korea should be ranked among the top 5 in the world. I believe North Korea can steal anything they want through cyber espionage. No country is safe from its cyber espionage.”



In the latest revelation, a member of the South Korean ruling party said Tuesday that North Korea stole classified military documents from a South Korean Defense Ministry database in September 2016. They included a document that included plans to “decapitate” the North Korean leadership.-CNN



But that isn’t all. Cybersecurity firm FireEye said Tuesday that it detected and stopped an attack on US electric companies by people with links to the North Korean government. The skill of these hackers is actually impressive considering they live in a country where the internet is heavily regulated by the government. The citizens living under Kim Jong-Un’s dictatorship only have access to a government-run, heavily censored intranet rather than the full depths of the world wide web. Yet those restrictions have not stopped the hackers from improving their abilities.



“North Korea almost certainly has the capability to conduct disruptive and potentially destructive attacks, as well as more traditional cyber espionage operations,” Bryce Boland, the chief technology officer for Asia-Pacific at FireEye, told CNN. “North Korea has little connectivity and relatively limited reliance on technology, making it less vulnerable to attacks,” he said.


In February 2016, $101 million was fraudulently transferred out of the Bangladesh central bank’s account at the New York Federal Reserve and eventually made its way to the Philippines. Researchers found that the hackers responsible for the theft carefully routed their signal through France, South Korea, and Taiwan to set up their attack server, but made a critical mistake that established a connection to North Korea. Nonetheless, most of the funds have not been recovered.


Analysts also say that North Korea has been preparing similar operations targeting cryptocurrencies like Bitcoin, as international sanctions make it harder for North Korea to use the dollar.


North Korea’s advancements in their weapons is concerning enough, but add in the actual real threat of a cyber attack, and we could experience a major disruption to our way of life.



Click here to subscribe: Join over one million monthly readers and receive breaking news, strategies, ideas and commentary.

Gas Masks, Filters, Body Suits, Anti Radiation Pills

Please Spread The Word And Share This Post






Author: Mac Slavo
Views: Read by 24 people
Date: October 11th, 2017
Website: www.SHTFplan.com


Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to www.shtfplan.com. Please contact us for permission to reproduce this content in other media formats.


Thursday, January 5, 2017

BUSTED: FBI Never Even Examined the DNC Servers Over Allegations of Russian Hacking

According to a report, the FBI has never examined the servers of the Democratic National Committee — not even for the six months during which the bureau claimed to be investigating allegations of Russians compromising cyber networks.


In fact, according to unnamed officials who spoke to Buzzfeed News, “the bureau has still not requested access to the hacked servers, a DNC spokesman said. No US government entity has run an independent forensic analysis on the system.”


While it would seem intuitive for the U.S. Intelligence Community to perform a detailed and methodical analysis of its own, Eric Walker, deputy communications director for the DNC, told Buzzfeed,


“The DNC had several meetings with representatives of the FBI’s Cyber Division and its Washington (DC) Field Office, the Department of Justice’s National Security Division, and U.S. Attorney’s Offices, and it responded to a variety of requests for cooperation, but the FBI never requested access to the DNC’s computer servers.”



Although the FBI declined to comment on the report, it’s notable the bureau has relied solely on third-party technology security company, CrowdStrike — whose controversial report early last year noted Russia-linked hackers penetrated DNC systems — for its analysis and assessment, rather than performing one of its own.


But the official who spoke with Buzzfeed — and expressed confidence Russia coordinated the ostensible ‘widespread hacks’ — didn’t exactly add an air of confidence to the CrowdStrike report, noting,


“CrowdStrike is pretty good. There’s no reason to believe that anything that they have concluded is not accurate.”


Relying on a single, ‘pretty good’ organization to examine a putative breach of national security would seem foolhardy, but the unnamed official confirmed that was the case.


“Beginning at the time the intrusion was discovered by the DNC,” Walker explained, “the DNC cooperated fully with the FBI and its investigation, providing access to all of the information uncovered by CrowdStrike — without any limits.”


Reports indicate the DNC discovered their system had been infiltrated in March 2016, but didn’t summon the tech security firm until May — and although the FBI had been given all relevant information concerning the alleged hack, apparently the bureau never investigated further.


According to the outlet, “BuzzFeed News spoke to three cybersecurity companies who have worked on major breaches in the last 15 months, who said that it was ‘par for the course’ for the FBI to do their own forensic research into the hacks. None wanted to comment on the record on another cybersecurity company’s work, or the work being done by a national security agency.”


But the FBI apparently did not do forensic research of the alleged DNC hack on its own — no matter if that is common practice or not.


A subsequent report from the Washington Post — notorious for publishing Fake News — cited unnamed officials from the CIA claiming the U.S. Intelligence Community concluded Russian government-associated actors had performed the hack and handed over documents for Wikileaks to publish.


However, that article contradicted the unanimity it intimated, stating no formal report would be forthcoming from the Intelligence Community as disagreement that conclusion remained. Further, an unnamed counterintelligence official with the FBI came forward rejecting the unnamed CIA officials’ allegations — despite FBI Director James Comey standing in agreement with the report.



Intelligence officials — most of whom remain anonymous — who share the view Russian State actors hacked systems of the Democrat Party infrastructure have yet to proffer conclusive and unassailable evidence to explain their position. Although they assert the supposed hackers sought to undermine Hillary Clinton’s bid for the White House by swaying the vote in favor of Donald Trump, none have explained why that would be a motivation.


If what Buzzfeed reports is indeed true — and the FBI relied only on CrowdStrike and never performed its own standard forensic examination of DNC systems before Comey concluded The Russians threw the election — than questions about the bureau’s political agenda must be raised.


Again, no evidence has been provided to the public for further scrutiny — except for a rough and disclaimer-emblazoned joint report from the FBI and Department of Homeland Security, since criticized for its lack of content damning to the Russian government. That report — although cited by President Obama prior to imposing sanctions and expelling 35 Russian diplomats — largely focused on defensive methods cybersecurity experts could employ in the future, rather evincing details of the alleged hacks.


And, as even mainstream Buzzfeed points out, “Nowhere in the report does it say that the government conducted its own computer forensics on the DNC servers.”


Corporate media has made a mess of the situation, citing that report as if it were indisputable evidence of Russian hackers infiltrating every computer system in the U.S.


But as Leonid Bershidsky wrote for Bloomberg View,


“The confusion has already begun. Last Saturday, The Washington Post reported that ‘a code associated with the Russian hacking operation dubbed Grizzly Steppe’ was found on a computer at a Vermont utility, setting off a series of forceful comments by politicians about Russians trying to hack the U.S. power grid. It soon emerged that the laptop hadn’t been connected to the grid, but in any case, if PAS was the code found on it and duly reported to the government, it’s overwhelmingly likely to be a false alarm. Thousands of individual hackers and groups routinely send out millions of spearphishing emails, meant for an unsuspecting person to click on a link and thus let hackers into his computer. Now, they have a strong incentive to use Russian-made backdoor software for U.S. targets.”



In other words, Russians hacking the election, the DNC, John Podesta, the electrical grid of Vermont, and all other accusations stand hollow and as-yet unproven — making the FBI’s lack of forensic investigation and reliance on a third-party tech security company both alarming and suspicious — and exponentially more so as the lame duck administration repeatedly provokes Moscow in the eleventh hour.


With sanctions in place, diplomats sent packing, and news special forces have been deployed to the Russian border, the public deserves unassailable evidence — conclusive proof — The Russians hacked anything at all.

Tuesday, January 3, 2017

The Russians Hacked A U.S. Power Grid During The Holidays, And Few Noticed

The Russians Hacked A U.S. Power Grid During The Holidays, And Few Noticed

Image source: Pixaby.com



BURLINGTON, Vt. — Malware used by Russian hackers has been detected in a Vermont power company’s computer, and at least one cybersecurity expert says the incident is not “happenstance.”


The concern is that hackers could take down the power grid, either regionally or nationally, with the click of a mouse. Ted Koppel’s 2015 book Lights Out warned that a major cyberattack could leave the power grid down for weeks or months.


“We have been monitoring RIS (Russian civilian and military intelligence Services) activities for some time and what we know is that the Vermont utility hack is part of a sophisticated and ongoing advanced persistent threat campaign by Russian cyber operatives to profile vulnerabilities in the U.S. power grid,” Darin Anderson, the chief executive of the trade group CyberTECH, told The San Diego Tribune.


The unidentified malware was detected in a laptop at the Burlington Electric Department on Dec. 29 following an alert by the Department of Homeland Security (DHS), according to a press release by the utility department. The same malware code has been used by a group of hackers called Grizzly Steppe.


Grizzly Steppe was one of the groups accused of hacking the Democratic National Committee during the presidential campaign.


Are You Prepared For A Downed Grid? Get Backup Electricity Today!


“We acted quickly to scan all computers in our system for the malware signature,” said Mike Kanarick, director of customer care, community engagement and communications with the Burlington Electric Department. “We detected the malware in a single Burlington Electric Department laptop not connected to our organization’s grid systems. We took immediate action to isolate the laptop and alerted federal officials of this finding.”


The Russians Hacked A U.S. Power Grid During The Holidays, And Few Noticed

Image source: Pixabay.com



The code was found just days after suspected Russian hackers managed to shut off one-fifth of the power in Ukraine’s capital city of Kiev.


Todd O’Boyle, chief technology officer of the security firm Percipient Networks in Wakefield, Mass., told the Tribune that “organizations don’t just get targeted based upon happenstance.”


“If this was the Russians, they are there for a reason,” he said. “They want something. Maybe it’s how to build better power grids. Maybe it’s preparing for a catastrophic attack. Maybe the target is a hopping point to their real destination.”


Intelligence officials are so concerned about Russian hacking that they alerted executives from the financial, utility, transportation and other essential industries, The Washington Post reported. The hope was to help industry IT experts detect malware.


“As a security practitioner, one of the top concerns I have is a successful attack against our critical infrastructure such as power grids, water systems, transportation systems, etc.,” Gary Davis of the California-based Intel Security, told the Tribune. “Homeland Security has identified 16 critical infrastructure sectors. A successful attack on any one could have substantial and long-term consequences.”


“We’ve already seen successful cyber-attacks in some developing countries and the closer connected devices come in mass to critical infrastructure the greater the chance of a successful attack,” David said. “In fact, reading the article reminds me of a discussion I had with the United Nations earlier this year. After a presentation I had given there about the threat landscape especially as it relates to the Internet of Things or IoT, a couple of its representatives pulled me aside and told me that several of its member nations biggest concern is that a teenager could take down the country’s critical infrastructure.”


Mark Weatherford, the chief cybersecurity analyst for vArmour, told the newspaper that “if you did a 100-percent sampling of utilities, you would probably find a lot of this activity.”


What is your reaction? Do you believe the Russians are trying to take down the U.S. power grid? Is America prepared? Share your thoughts in the section below:


Are You Prepared For Extended Blackouts? Read More Here.


Wednesday, December 28, 2016

We’ve Been Warned: Russia ‘Has Figured Out How To Crash A Power Grid With A Click’

We’ve Been Warned: Russia ‘Has Figured Out How To Crash A Power Grid With A Click’

Photographer: Dan Nguyen. Flickr / Creative Commons / https://creativecommons.org/licenses/by/2.0/



KIEV, Ukraine — Experts believe that Russian hackers took down a portion of Ukraine’s power grid again earlier this month, and the same experts say similar attacks would be easier and do more damage in the United States.


“It’s very concerning that these same actors, using similar capabilities and tradecraft, are preparing and are getting access to these business networks, getting access to portions of the power grid,” Rob Lee, a former cyberwarfare officer for the U.S. military, told CBS News.


Some power companies in the U.S. have weaker security than the Ukraine, Lee said.


A distribution station that supplies one-fifth of the power to Ukraine’s capital, Kiev, suddenly shut down without warning early Dec. 18, Reuters reported.


Are You Prepared For A Downed Grid? Get Backup Electricity Today!


The hackers used a simple method to infiltrate the power grid: sending emails with infected attachments to employees. That allowed them to steal their logins and cut the circuit breakers at about 60 substations.


“It was illogical and chaotic,” Vasyl Pemchuk, the electric control center manager in Kiev, told CBS. “It seemed like something in a Hollywood movie.”


Lee thinks it could take days or even weeks to restart the U.S. power grid after such an attack.


“We can’t just look at the Ukraine attack and go ‘oh we’re safe against that attack,’” Lee said. “Even if we just lose a portion, right? If we have New York City or Washington, D.C., go down for a day, two days, a week, what does life look like at that point?”


Pemchuk said workers watched their computers being taken over by hackers and could do nothing except film it all with their smart phones.


CBS reported that “Russia has figured out how to crash a power grid with a click.”


Ukrainian security officials believe their nation’s infrastructure has been under cyberattack from Russia for months. The Ukraine is currently locked in civil war with Russian-backed separatists.


On Dec. 23, 2015, hackers cut off power to half the homes in the Ivano-Frankivsk region of the Ukraine.


Do you believe something similar could happen in the U.S.? Is America prepared? Share your thoughts in the section below:


Are You Prepared For Extended Blackouts? Read More Here.

Saturday, November 5, 2016

BREAKING: US Military Just Hacked Into Russia’s Entire Infrastructure Prepping for Massive Cyber Attack

hacked


Russia is demanding answers after a report from an unnamed senior U.S. intelligence official claimed the United States military has successfully hacked into “Russia’s electric grid, telecommunications networks and the Kremlin’s command systems, making them vulnerable to attack by secret American cyber weapons should the U.S. deem it necessary,” according to NBC News.


Speaking to the anonymous intelligence official and after a review of putative top-secret documents, NBC reported it can confirm long-swirling rumors the U.S. has penetrated critical Russian systems and left behind malware operable from afar and on command.


Russia, understandably, has not taken the news with a grain of salt.


“If no official reaction from the American administration follows,” Russian Foreign Ministry spokesperson Maria Zakharova said in a statement, “it would mean state cyberterrorism exists in the US. If the threats of the attack, which were published by the US media, are carried out, Moscow would be justified in charging Washington.”


Indeed in recent months, hotly escalating tensions between the two Cold War foes has reached a fever pitch — with both the United States and Russia having established albeit thin justifications to strike the other first under the ironic premise of offensive self-defense.


Hillary Clinton’s campaign and the Obama administration continue to tout evidence of Russian interference, both in voluminous hacked leaks of damning documents and in the ongoing military conflict in Syria.


In the last few weeks, anti-Russian rhetoric has centered around the wholly unbased prediction Russia is preparing to actively interfere in the U.S. presidential election on Tuesday — even expanding to include altogether laughable accusations Donald Trump has direct and covert dealings with Moscow.



In fact, the latter point comprised the unnamed intelligence official’s rationalization for the military’s alleged malware implantation in Russian infrastructure.


However, none of these assertions from seemingly paranoid American officials have proven unassailably true — and despite hyperbolic claims that, in essence, Russia has in mind to destroy the U.S., no evidence of a legitimate threat, much less outright aggression, has been uncovered.


Asked repeatedly to produce proof to justify allegations Russian state actors were responsible for hacked documents released to Wikileaks and other organizations, U.S. officials have only managed to counter with further bombast.


Although NBC reports such cyber measures penetrating, testing, and gaining an understanding of foreign nations’ electronic infrastructures is considered nearly de rigueur in the modern context, the bold move of publicizing such an exploit constitutes a bit of a veiled threat.


In 2014, according to NBC, National Security Agency Chief Mike Rogers warned Congress adversarial nations had been performing such exploits to assess chemical treatment plants, the electric grid, and other crucial mechanisms in preparation to strike should the need present itself.


“All of that leads me to believe it is only a matter of when, not if, we are going to see something dramatic,” Rogers said at the time.


On a superficial level, by design, the U.S. government could claim such acts of cyber cold-warfare amount to a defensive move — but in light of deteriorating Russian-American relations in recent months, delving into Russia’s infrastructure could be akin, as the Foreign Ministry suggests, to an act of cyberterrorism.


Positioning malware is not the same as simple cyber reconnaissance and intelligence gathering — and publicizing the act implies not only confidence in its success, but, alarmingly, willingness to trigger it as a weapon.


“You’d gain access to a network, you’d establish your presence on the network and then you’re poised to do what you would like to do with the network,” Retired colonel and legal advisor to U.S. Cyber Command, Gary Brown, told NBC News. “Most of the time you might use that to collect information, but that same access could be used for more aggressive activities too.”


In short, the United States military has now readied itself to act to take down parts of Russia’s critical infrastructure if it so chooses — and with politicians and administration officials continuing to claim without evidence Russian agents hacked government and non-government files, justification could come from thin air.


Think about that.


Without proof, state actors have positioned, at least ostensibly, malware that could leave Russian citizens vulnerable if U.S. officials see any intimation of interference in the coming election — and, based on the U.S. history of failing to provide evidence of Russian aggression, the decision could be made on a dime.


Thus far Russian officials have maintained startling cooler heads than their counterparts, and in response to the NBC report, Kremlin spokesman Dmitry Peskov said in a statement Russia had “cybersecurity measures taken at the level proper for the current situation, and the threats voiced against us by officials of other nations.”


Indeed Russian President Vladimir Putin has even dismissed U.S. claims of interference countless times, including during the 13th annual meeting of the Valdai Club in late October, during which he stated,



Another mythical and imaginary problem is what I can only call the hysteria the USA has whipped up over supposed Russian meddling in the American presidential election. The United States has plenty of genuinely urgent problems, it would seem, from the colossal public debt to the increase in firearms violence and cases of arbitrary action by the police.



You would think that the election debates would concentrate on these and other unresolved problems, but the elite has nothing with which to reassure society, it seems, and therefore attempt to distract public attention by pointing instead to supposed Russian hackers, spies, agents of influence and so forth.


I have to ask myself and ask you too: Does anyone seriously imagine that Russia can somehow influence the American people’s choice? America is not some kind of ‘banana republic’, after all, but is a great power. Do correct me if I am wrong.



Early last month, the United States set the stage for electronic warfare in a formal accusation by the Director of National Intelligence and the Department of Homeland Security that held Russia solely responsible for hacking the Democratic National Committee, and subsequent damaging leaks of thousands of documents.


Now, through briskly sharpened posturing, the U.S. has again declared itself ready to commit an act of what it would consider, were the situation reversed, cyberterrorism and electronic warfare.


Whether or not the Obama administration, the U.S. military and intelligence officials, and the Clinton campaign will rein in this precipitous and arrogant scaremongering is yet to be seen — but the consequences of this dangerous game could affect us all.


“Cyber war is undefined,” Brown cautioned about how to consider the muddled gray-area concerning the putative U.S. hack. “There are norms of behavior that we try to encourage, but people violate those.”