Coker: Agencies flooded with cyberattacks, beset with complex problems can’t always innovate

It’s why his Office of the National Cyber Director is taking on challenges like BGP security, he said.

The post Coker: Agencies flooded with cyberattacks, beset with complex problems can’t always innovate appeared first on CyberScoop.

Continue reading Coker: Agencies flooded with cyberattacks, beset with complex problems can’t always innovate

FCC wants rules for ‘most important part of the internet you’ve probably never heard of’

U.S. agencies want to secure the Border Gateway Protocol, but experts question whether their approach could worsen security.

The post FCC wants rules for ‘most important part of the internet you’ve probably never heard of’ appeared first on CyberScoop.

Continue reading FCC wants rules for ‘most important part of the internet you’ve probably never heard of’

‘Cyber Storm’ drill for critical infrastructure focuses on corruption of key IT services

In a drill this week that drew some 2,000 participants, the Department of Homeland Security tested the ability of companies in the health care, manufacturing and other key sectors to withstand hypothetical hacking campaigns that compromise the trust users place in key internet services. The seventh iteration of Cyber Storm, as the biannual exercise is called, focused on what could go wrong when some of the pillars of the internet are corrupted. It is the subtle manipulation of these IT services that advanced hacking campaigns often exploit in the real world. The simulation featured compromised certificate authorities, which deem software trustworthy, attacks on the Border Gateway Protocol, the internet’s basic routing mechanism, and the subversion of domain name system (DNS) records, which help send a user to a website that is not malicious. “Many organizations do not have a full understanding of their reliance on third-party services,” said Brian Harrell, assistant […]

The post ‘Cyber Storm’ drill for critical infrastructure focuses on corruption of key IT services appeared first on CyberScoop.

Continue reading ‘Cyber Storm’ drill for critical infrastructure focuses on corruption of key IT services

Russia Hijacks Traffic of Huge Cloud and CDN Services

Google, Amazon, Facebook and 200 other services had their internet traffic routed through Russia on Wednesday.
The post Russia Hijacks Traffic of Huge Cloud and CDN Services appeared first on Security Boulevard.
Continue reading Russia Hijacks Traffic of Huge Cloud and CDN Services

Protect Your Enterprise From BGP Route Hijacking

BGP does a great job of identifying optimal paths across the internet, but its lack of security controls allows the protocol to be exploited. Whenever someone asks me, “What is border gateway routing protocol (BGP)?” I always use the following analogy… Continue reading Protect Your Enterprise From BGP Route Hijacking

Open-source tool aims to curb BGP hijacking amid Chinese espionage concerns

BGP security is going global. International agencies including the U.S. Department of Homeland Security, the National Science Foundation, the European Research Council and others are funding the Automatic and Real-Time dEtection and Mitigation System (ARTEMIS), in an effort to stop hackers from rerouting internet traffic through malicious networks. Border Gateway Protocol hijacking occurs when attackers redirect web traffic away from its intended destination and instead send those connections somewhere else. Perhaps the best known example of BGP hijacking occurred in November when millions of IP addresses aimed at Google were instead sent to a state-controlled telecom in China, apparently by accident. The issue has become more urgent since nation-state hackers and criminal groups started to utilize this technique for their own gain, Rob Joyce, a senior adviser at the U.S. National Security agency, said in December. ARTEMIS is seeking to resolve this problem with the release of an open-source software […]

The post Open-source tool aims to curb BGP hijacking amid Chinese espionage concerns appeared first on CyberScoop.

Continue reading Open-source tool aims to curb BGP hijacking amid Chinese espionage concerns

Hackers Target US Payment Processors via BGP Hijacking Attacks

Us payment processors report that they are being targeted by hackers using BGP hijacking attacks. This is a complex method used by experienced groups as it requires both resources and knowledge to execute one directly. BGP Hijacking Attacks Used Agains… Continue reading Hackers Target US Payment Processors via BGP Hijacking Attacks

Get Ready for Another Critical Drupal Patch Related to Drupalgeddon2

Developers of the popular Drupal content management system plan to release a critical out-of-band patch April 25 that’s related to the actively exploited Drupalgeddon2 vulnerability fixed late last month. “There will be a security release … Continue reading Get Ready for Another Critical Drupal Patch Related to Drupalgeddon2

Global Traffic to High-Profile Sites Believed Hijacked

Global internet traffic to IP addresses belonging to Google, Facebook, Microsoft, Apple and other high-profile tech companies was rerouted Tuesday through a little-known ISP in Russia. Researchers suspect the traffic was hijacked. The incident lasted f… Continue reading Global Traffic to High-Profile Sites Believed Hijacked