Cyber Security Roundup for October 2018

Aside from Brexit, Cyber Threats and Cyber Attack accusations against Russia are very much on the centre stage of UK government’s international political agenda at the moment. The government publically accused Russia’s military ‘GRU’ intelligence … Continue reading Cyber Security Roundup for October 2018

New Attacks Reuse Malware Code from Dormant APT1

New attacks against organizations from South Korea, Canada and the United States use a malicious implant that’s based on an old malware program associated with a dormant Chinese APT group known as APT1. According to researchers from antivirus fi… Continue reading New Attacks Reuse Malware Code from Dormant APT1

FireEye denies ‘hack back’ claims detailed in new book

The company that authored a watershed report on how Chinese hackers operate is pushing back against claims in a new book that the research was conducted through the use of illegal offensive hacking techniques. In “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age,”  New York Times national security correspondent David Sanger writes that the U.S.-based cybersecurity firm Mandiant penetrated a Chinese military cyber unit after it hacked into one of its customer’s systems in order to nail down attribution. According to Sanger, while Mandiant observed Chinese hackers breaching a client several years ago, they used it as an opportunity to target the attackers’ systems, which allowed access to a video camera that exposed the hackers’ faces:  [Then CEO Kevin Mandia] was certain the hackers were part of Unit 61398, but he also knew that accusing the Chinese military directly would constitute a huge step for his company. Over seven years, he […]

The post FireEye denies ‘hack back’ claims detailed in new book appeared first on Cyberscoop.

Continue reading FireEye denies ‘hack back’ claims detailed in new book

Security firms sometimes wreck FBI investigations. Here’s how.

Publishing research about hackers can boost a cybersecurity firm’s reputation but muddle the hard work of federal law enforcement agencies — and it appears that the problem is likely to get worse. Some threat intelligence reports from cybersecurity companies are thorough enough (and public enough) that they can completely disrupt government-led cyber investigations, say industry experts, former law enforcement and intelligence officials. The issue comes up at least “every few months,” said James Trainor, a former assistant director for the FBI’s Cyber Division. Trainor and other officials who spoke to CyberScoop declined to name specific companies or incidents, but they agree that the potential for trouble is only increasing. “The industry isn’t privy to classified ops or government investigations, so this happens,” explained Synack co-founder and former NSA analyst Mark Kuhr. “They are asked to hold information sometimes if the government catches wind, but a lot of times the government simply doesn’t know or firms […]

The post Security firms sometimes wreck FBI investigations. Here’s how. appeared first on Cyberscoop.

Continue reading Security firms sometimes wreck FBI investigations. Here’s how.