Top CyberSecurity News For October 5th 2016

  1. Guccifer 2.0 dumps a bunch of Clinton Foundation donor dataFrom Endgadget. Julian Assange’s “October surprise” press conference may have been a bust but his Gilligan, the hacker calling himself Guccifer 2.0, came through on Tuesday, releasing a large database of information reportedly stolen from the Clinton Foundation. The dump includes the names, addresses and emails of both individual and corporate donors as well as their contribution amounts.


Top CyberSecurity News For September 29th 2016

  1. Guccifer 2.0 and Russia’s hidden agendaFrom SC Magazine. 

    Among the routine stream of network compromises and dumped login credentials this year, one attack stands head and shoulders above the rest for intrigue – the Democratic National Committee (DNC) breach. The hack led to political uproar, a high-level resignation, damaging leaks and, in a complete reversal of the norm, the nation state hackers have become more public since being discovered.

    It is worth starting with a recap. The FBI alerted the DNC to the presence of attackers on their network in April this year, but incident response specialists CrowdStrike found that there were two state-sponsored attackers with access to sensitive emails and data. The investigators assessed the network was first breached in the summer of 2015 and established the attackers had stolen large quantities of emails, campaign documents and donor information. Before the hack was publicly disclosed in mid-June, WikiLeaks founder Julian Assange announced the whistle-blowing website had ‘enough evidence’ to indict Hillary Clinton.

Top CyberSecurity News For 17th June 2016

  1. ‘Guccifer 2.0’ Claims Responsibility for DNC Hack, Releases Docs to Prove itFrom Motherboard. A “lone hacker” calling themselves “Guccifer 2.0” has claimed responsibility for hacking the Democratic National Committee and claims reports that the Russian government perpetrated the attack are false. The hacker also says the DNC lied about—or didn’t know the extent of—what was stolen.

  2. ISIS hacker pleads guilty to giving terrorists US military kill listFrom ArsTechnica. A hacker the US authorities have labeled as the leader of an overseas Internet hacking group—the Kosova Hacker’s Security—pleaded guilty Wednesday in federal court to charges of providing material support to the US enemy. It was the first known prosecution of a hacker joining forces with a terror group in a bid to carry out terrorism, the government said.

Top CyberSecurity News For 7th May 2016

  1. Student who hacked into a public transport network and got $18 in free trips is found guilty of fraud after he contacted authorities to warn them about the system’s flaws. From Daily Mail.  A student who hacked into a public transport system to show it had flaws has been been found guilty of fraud after he and a co-convicted got $18 worth of free trips. Jack Carruthers, a student at Perth’s Murdoch University, hacked into the city’s SmartRider transport travel card and later owned up to TransPerth, alerting them to the issues with the system. However, he ended up being charged for his actions after the Public Transport Authority (PTA) noticed what had happened and was eventually found guilty.
  2. Charles Schwab data breach exposed client investment dataFrom SC Magazine.  Charles Schwab informed some of its customers on May 4 that the company had noticed unusual login activity on their account, possibly due to an unauthorized person having obtained their account username and password. In a letter posted on the California Attorney General Office website, the company said the unusual activity began on or after March 25 and that the account sign-on credentials were likely taken from a non-Schwab source and then successfully used to access the customer’s account, possibly exposing the client’s names, account numbers, stock positions and transaction history.

  3. Prince of Persia: Infy Malware Active In Decade of Targeted AttacksFrom Palo Alto Networks. Attack campaigns that have very limited scope often remain hidden for years. If only a few malware samples are deployed, it’s less likely that security industry researchers will identify and connect them together. In May 2015, Palo Alto Networks WildFire detected two e-mails carrying malicious documents from a genuine and compromised Israeli Gmail account, sent to an Israeli industrial organization. One e-mail carried a Microsoft PowerPoint file named “thanks.pps” (VirusTotal), the other a Microsoft Word document named “request.docx”.

  4. Romanian hacker Guccifer: I breached Clinton server, ‘it was easy’. From Fox News. The infamous Romanian hacker known as “Guccifer,” speaking exclusively with Fox News, claimed he easily – and repeatedly – breached former Secretary of State Hillary Clinton’s personal email server in early 2013. “For me, it was easy … easy for me, for everybody,” Marcel Lehel Lazar, who goes by the moniker “Guccifer,” told Fox News from a Virginia jail where he is being held.
  5. Why malware authors keep using the same old Microsoft Office exploitsFrom SophosLabs. SophosLabs Principal Malware Researcher Gabor Szappanoshas closely studied Microsoft Office exploits for the past few years. We’ve previously covered his investigation of the Microsoft Word Intruder exploit creation kit, and his recent paper exploring the most popular Office exploit kits.