Cyberattack

Cyberattack / Most Viewed

U.S. Slammed as Major Host for Cybercrime

While Russia and Ukraine are generally regarded as today's main cybercrime hubs, "a lot of their infrastructure is housed in the west, in the United States to be precise," writes Vincent Hanna of Spamhaus Project. "Without exception, all of the major security organizations on the Internet we know of agree that the 'Home' of cybercrime in the western world is a place known as Atrivo/Intercage. We ourselves have not come to this conclusion lightly but from many years of dealing with criminal operations hosted by Atrivo/Intercage, gangs of cybercriminals -- mostly Russian and East European but with several US online crime gangs as well -- whose activities always lead back to servers run by Atrivo/Intercage..." more

Reports of Possible Cyberattack in Palestine

According to reports today, hackers have attacked Palestinian servers, cutting off phone and Internet service across the West Bank and Gaza. Foreign governments are accused to be behind the attack. "Since this morning all Palestinian IP addresses have come under attack from places across the world," said the Palestinian communications minister today. Reneys reports these outages are the largest observed all year for this country, which normally has a fairly stable Internet. more

Obama, Xi Reach 'Common Understanding' on Curbing Cyber Espionage

resident Obama announced today that he has reached a "common understanding" with Chinese President Xi Jinping on curbing economic cyber espionage, but threatened to impose U.S. sanctions on Chinese hackers who persist with cyber crimes. more

UK's Utility Companies and Large Financial Firms Facing Major Cyber Espionage Attacks

Industrial espionage probes are being waged on companies that provide UK's national infrastructure and on similar organizations across Europe, security experts have warned. Mark Oram, head of information security knowledge department at the Centre for the Protection of National Infrastructure (CPNI), said the instances of political, economic and technical spying were more common than cyber-terrorism attacks. "We see frequent attacks on organizations for the purpose of intellectual property theft that we would not obviously classify as an attack on infrastructure," he said. more

Phishing Attacks Surpass Viruses and Trojans

Phishing attacks have outnumbered emails infected with viruses and Trojan horse programs for the first time, according to security experts.

...The difference in the ratio of phishing to virus attacks is partly due to virus attacks becoming more targeted and no longer occurring as one large outbreak. This includes the recent Storm Worm and Warezov attacks, according to MessageLabs. more

US Racing on Multiple Fronts to Plug the Holes in Cyber Defenses

The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new technologies, according to officials familiar with the plans, as a recent wave of cyber attacks boosts concerns about U.S. vulnerability to digital warfare. The twin efforts show how President Barack Obama's administration is racing on multiple fronts to plug the holes in U.S. cyber defenses... more

Security Researchers Uncover Cyber Espionage Network Invloving 103 Countries

A report released over the weekend by Information Warfare Monitor along with an exclusive story by the New York Times, revealed a 10-month investigation of a suspected cyber espionage network (dubbed GhostNet) of over 1,295 infected computers in 103 countries. 30% of the infected computers are labeled as high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. Greg Walton, editor of Information Warfare Monitor and a member of the Toronto academic research team that is reporting on the spying operation, writes... more

Newly Launched Cyber Secure Institute Says Constant Hack and Patch Not the Answer

The Cyber Secure Institute has recently announced its launch with the mission to raise awareness and pressure on addressing issues related to cyber threats faced by the U.S., companies, and individuals. The Institute is unique in that it is not a trade association or industry group. Rob Housman, the Institute's Executive Director, said "We formed the Cyber Secure Institute because this is a critical time for cybersecurity. ... However, we can't address this threat through cybersecurity as we now know it -- endless after-the-fact struggles to close gaps exposed in inherently insecure technologies. If we continue this constant cycle of hack and patch we will never be secure." more

Code Released by 'Shadow Brokers' Raises Alarming Concerns on Whether NSA Was Hacked

The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America's own elite operatives have been hacked and their methods revealed. more

22,000 New Malware Samples Detected Every Day in 2008, Says New Report

Security firm PandaLabs reports today that it received more malware in the first eight months of 2008 than in the previous 17 years combined -- Trojans being the leading cause of malware infections. In 2008, Panda Security's malware analysis and detection laboratory states that it found an average of 35,000 malware samples each day, 22,000 of which were new infections. By the year's end, the total count of malware threats detected exceeded 15 million. more

New York’s Department of Financial Services Issues Cybersecurity Proposal

New York state is proposing new rules requiring banks and insurance companies to establish cybersecurity programs and designate an internal cybersecurity officer. more

Data Breaches Up Almost 50 Percent in 2008 as Compared to 2007

Businesses, governments and educational institutions reported nearly 50 percent more data breaches last year than in 2007, exposing the personal records of at least 35.7 million Americans, according to a nonprofit group that works to prevent identity fraud. Identity Theft Resource Center of San Diego is set to announce today that some 656 breaches were reported in 2008, up from 446 in the previous year. Nearly 37 percent of the breaches occurred at businesses, while schools accounted for roughly 20 percent of the reported incidents. more

Defense Science Board: Cyber Security the Achilles' Heel of US Military Might

Robert O'Harrow of the Washington Post reporting: "Everybody knows by now that cyber security is something of an annoyance, if not a big deal... What most of us fail to appreciate is how big a deal all this really is. That's one of the subtexts of a new report from congressional researchers [PDF] that came Government Inc.'s way. Going by the dry title 'Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations,' the report underscores in a compelling way the fact that the nation's cyber vulnerabilities continue to grow, and fast." more

France Preparing for Future Cyberwars, Says President

French President Nicolas Sarkozy announced major military reforms involving an in-depth change in strategic priorities and is gradually preparing France for the fights of future. Plans include expanding the range of weapons arsenal in terms of computer warfare, said the president in his announcement this week. France is not alone to be deeply worried about the issue of crippling cyber attacks. In mid-May, the Atlantic Alliance, which brings together dozens of Northern America, Western and Eastern European countries, launched what has come to be known as the "NATO Excellence Center for Cybernetics Defense" in Tallinn, Estonia. more

Malware Authors, Distributors Increasingly Using Social Networks

Security experts warn the "clickjacking" attack on Twitter service last week is part of growing trend of social engineering attacks via social networks. VP of security firm RSA, Sam Curry, calls the social networking attacks "orthogonal attacks." As users have become aware of phishing attacks and other efforts to get at their personal data, hackers have turned to social networks and "brand attacks," like the recent CNN.com-spoofing Cease-Fire Trojan to spread malware that goes after the same information once installed on the victim's computer. more

Industry Updates

Domain Intelligence Shows Cybercriminals May Abuse Video-Conferencing Services' Brand Names

How Cyber Threat Intelligence Feeds Can Support MSSPs

Brand Monitor and Typosquatting Data Feed: Two Assets to Support Spear-Phishing Prevention

What Cyber Threat Intelligence Tools Can Reveal about a Targeted Attack

MarkMonitor Releases New gTLD Quarterly Report for Q1 2020

3 Ways a DNS Lookup Tool Can Help Prevent DNS Attacks

How a Passive DNS Database Can Help Improve Cyber Resilience

How to Build an Attack Profile with WHOIS Database Download as a Starting Point

How IP Geolocation Lookups Help Thwart Cyber Attacks

Fight Against Phishing: Email Address Verification as a Cybersecurity Process

How to Avoid IP Spoofing with a Reverse IP Address Lookup Service

DNS Hijacking: The Iranian Cybersecurity Threat That May Be Overlooked

Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API

Mobile Apps Take the Lead, Scammers Follow

The Louisiana State Ransomware Attack: Enhancing Cyberdefense with Reverse IP Address Lookup