March 15th, 2014
Two weeks of diverse -attacks in Israeli space
Since the start of the month, Israeli companies are experiencing numerous DDoS attack hitting their services. Wix has a defense system allowing them to deal with -attacks; nevertheless, the magnitude of this -attack made a variety of Wix sites go offline. The consulting company, Hat, reported the spread of the Cryptolocker malware in some Israeli companies, which is a ransomware deployed to a company network by phishing and encrypts files onto the company servers. The original email from Cryptolocker comes with a ransom note demanding payment of 400 Euros through Bitcoin currency in return for the decrypting files.-attacks. One of the companies, Wix, which provides a platform for building html5 sites, reported a
The increase of Anonymous operation-attacks co-exists with the
#OpIsraelBirthday, which is scheduled to take place April 4th and is meant to erase Israel from the Internet. #OpIsrael is being led by members of AnonGhost, which held a previous #OpIsrael operation in April, 2013. AnonGhost is known as a prevalent player behind Mauritania Attacks. The first phase of the Twitter to spread malware coded programs for those wishing to participate, with a blog including a YouTube video and a countdown to April 4th. According to The Amman Group disclosed, an Israeli security firm, as the date of #OpIsraelBirthday approaches, more Israeli websites are being compromised, with databases exposed. operation was held on March 10th, but except for a few personal files published, there was no report of a major damage. AnonGhost uses social media networks like Facebook and
SEA claims to have succeeded in hacking CENTCOM
Syrian Electronic Army (SEA) breached the United States Central Command (CENTCOM), enabling them to access hundreds of confidential documents. SEA tweeted they targeted CENTCOM. In response to doubt, SEA posted a screen shot of the information on Twitter depicting a military system in the US Air Force and Army Knowledge Online (AKO) with folders directing to command units. However, it appeared that the screenshot was of unclassified information only. AKO, a sharing network for military members to confidentially access unclassified and FOUO information, was slow to respond to the attack, and CENTCOM denied the breach. SEA expressed the attack was because of President Obama’s decision to attack SEA through warfare. Additionally, SEA threatens more information will be published.
Vice Adm. Michael Rogers, elected Director of NSA, offered a grim assessment of the growing threat against the United States and their abilities to overcome the risks. He stated that enemies may consider the U.S. “an easier mark” because the procedures and requirements facing a response to -attacks “lead the adversary to believe, rightly or wrongly, that we do not have the will to respond in a timely or proportionate manner.” Rogers added improvements to staffing and resources will be made to the Command will be one of the responses.
Russian citizens called for terrorist activities on social networks
Because of the continued in the Ukraine, which began in November, 2013 that led to the invasion of Russian troops to the Crimea peninsula, news and media source, Dojd TV, reported the Office of the General Russia Federation Prosecutor appealed to the FSB (Russian Federal Security Service) to block community and social media networks. Prosecutors found the appeal to “address the Russian citizens with direct appeals to carry out terrorist activities and to participate in unsanctioned public events.” After the removal of illegal information, some community networks were again unblocked. It is still unclear how the operation was executed.
Kuwait urges Arab countries to unite against security challenges
In a meeting held in Marrakech, Morocco, on March 11, Kuwait’s Deputy Prime Minister and Minister of Interior, Sheikh Mohammad Khaled Al-Hamad Al-Sabah, appealed to Arab countries to unite in the face of security challenges, while pushing forward with economic developments. At the Arab Interior Ministers’ meeting held in March, Sheikh Mohammad underlined Kuwait’s support to uniform Arab positions and addressed security challenges the Arab region is facing in the coming year. The Kuwaiti official explained that Arab countries need to double the efforts in the face of rumors spreading through social media networks of violent behavior, money laundering, counterfeiting, drugs, organized crimes, and crimes.
Kenya’s ministry of transport website hacked
A Turkish Muslim group named Ayyildiz Tim, hacked the Kenyan Ministry of Transport website, accusing the Kenyan government of disrespecting Islam. The hackers published the following message on the government website: “All the Muslims are together. The CYBER-WAR will be appeared all the Countries which not respecting Islam. Ayyildiz promises that they will visit your areas too…” Ayyildiz Tim supports terrorist organizations and threatens a surge of -attacks hitting Kenya since the incursion into Somalia to fight Al Shabaab, a terrorist organization.
Iran and Russia partnering to launch -attacks
Former chairman of the House’s Permanent Select Committee on Intelligence, Rep. Peter Hoekstra, stated in a lecture in front of lawmakers that the Iranian regime is emerging as a “world class” threat, mainly due to its close ties to Russia and cooperation between the two states will only increase in the coming months. According to Hoekstra, “Iran and Russia will develop a much closer relationship… Russia and Iran have so much to gain from more significant cooperation, and the immediate impacts will be profound.” This cooperation is becoming more significant given Russia’s continued aggressive stance toward the USA.
China and APAC
New Chinese stealth fighter aircraft created because of -spying operation
For several years espionage became the specialty of China, which has many espionage operations against the U.S. defense industry to catch up on their industrial delay. The latest evidence of the intensive espionage activity is the launch of a new stealth fighter jet constructed with stolen plans through a -espionage operation conducted several years ago against the F-35 Lightning II from Lockheed Martin. Proof of the stolen plans was confirmed through a Chinese military forum. Pictures were published of a recently developed version of the J-20 stealth jet, a twin aircraft under development by the Chinese People Liberation’s Army.
According to the Washington Free Beacon, the initial J-20 prototype was revealed in 2011 through a video showing the aircraft equipped with new electro-optical targeting system assisting the aircraft to hide from radars. According to the Pentagon, a Chinese military group known as Technical Reconnaissance Bureau based in the Chengdu province stole the data. The information was passed to the Aviation Industry Corporation (AVIC), which transferred the stolen plans to the Chengdu Aircraft Industry Group, incorporating the information into the new design.
UK expanding training to children
The UK government intends to train children ages 11-14 in security in an effort to prepare future generations in the UK for threats, technological skills, and economic growth by providing the necessary materials to take part in advanced understanding of such topics through apprenticeships. This concept is part of the “ Security Skills: Business Perspectives and Government Next Steps,” which was published with feedback directly from businessmen in the private and public sector. Children interested can sign up for the Massive Open Online Course, as well as be part of the Secure Futures provided in certain cities in England. Sire David Pepper, part of the Security Skills Alliance stated: “It is clear from this and our own research that the national shortage of skills is a key issue for businesses and government in the fight against the growing threat from crime.”
NATO websites targeted by Ukrainian -attack
On March 15th, several NATO websites were targeted by a -attack related to the Russian-Ukrainian conflict. A group of hackers called ” Buerkout” claimed the attack was carried out by Ukrainian patriots unhappy about the way NATO is dealing within their country. The Berkout, the anti-riot Ukrainian police, was disbanded. The police were accused of killing dozens of protesters in the days leading up to the impeachment of President Viktor Yanukovych on February 22. Berkout Groups already attacked several Ukrainian websites in the past weeks, according to computer security experts. hacktavists, Anonymous, have also assisted in the cause with #OpRussia leaking state documents. This is one example of warfare being conducted in the Crimea against government websites and officials. Networks all over the Ukraine have been infected with malicious software performing surveillance, access personal data, and DoS and DDoS attacks. Many malware and breaches have been traced back to Russia such as the malware Snake. The aggression has been performed on both sides.
Latvia establishing new Defense Unit
Latvia launched a new defense unit, which has become an extension of the National Guard of Latvia. It will be composed of 13 cyber security experts coming from both the private and public sector. Among them will be Eric Dobelis, a computer expert running an IT consulting company in Riga. In case of serious cyber-attacks on Latvia’s critical infrastructures, the cyber unit will cooperate with Latvia’s Computer Security Incident Response Team charged with responding to cyber-attacks. Moreover, the new cyber unit operates under the authority of the Latvia’s Ministry of Defense and has access to more than 600 IT experts working for the government. According to Ministry of Defense, people applying to join the Defence Unit are checked for security clearance before receiving classified information. The intention is to expand the unit to a 100 guardsmen in the coming years. Additionally, they envision creating a similar team consisting of teenage IT security experts. Like Hungry, Lithuania, Poland, and Slovakia, Latvia is part of the NATO cyber defence cooperation and has cyber soldiers working at the NATO cooperative Defence of Excellence.