Playing the blame game: Breaking down cybersecurity attribution

Attributing the adversary behind a cyber attack ranks as perhaps the hardest challenge in all of cyber security, well beyond securing networks from intrusions, for the simple reason that bits are simply bits and do not belong to any single person. In other words, I can flawlessly copy any digital content including malware and other attack exploits and re-use it without leaving behind my personal fingerprints. Furthermore, I can leverage existing infrastructure or other people’s … More Continue reading Playing the blame game: Breaking down cybersecurity attribution

Yahoo breach was not state-sponsored, researchers claim

The massive 2014 Yahoo breach isn’t the work of state-sponsored hackers as the company has claimed to believe, say researchers from identity protection and threat intelligence firm InfoArmor. Instead, the breach was effected by a group of professional blackhats believed to be from Eastern Europe. Group E: Masterminds of the attack InfoArmor researchers have dubbed them “Group E”, and according to the firm’s knowledge, they have been hacking databases for years now, and were the … More Continue reading Yahoo breach was not state-sponsored, researchers claim

Leaked hacking tools can be tied to NSA’s Equation Group

The batch of data released by the Shadow Brokers, an entity that claims to have hacked the Equation Group, contains attack tools that can be tied to the group. Equation Group is a threat actor that is believed to be linked with the National Security Agency (NSA), and is believed to have been involved in the creation of Stuxnet, Flame and Duqu. The Shadow Brokers announced on Saturday that they will be auctioning off the … More Continue reading Leaked hacking tools can be tied to NSA’s Equation Group

Author of potentially malicious OS X Pirrit adware discovered

An unnamed web developer working for Israeli marketing and advertising company TargetingEdge is the creator of the Pirrit adware targeting Mac machines, Cybereason security researcher Amit Serper has discovered. Pirrit is not a typical piece of adware. Its main goal is to deliver specific ads, but it also shows some capabilities typical of malware: it creates hidden user accounts, and can obtain root access to the infected machine. It could be used to steal valuable … More Continue reading Author of potentially malicious OS X Pirrit adware discovered

SWIFT warns of new attacks, Bangladesh Bank heist linked to Sony hack

SWIFT, the organization that provides banks with a secure network for sending and receiving information about financial transactions, has sent out a warning about a malware attack against another bank. They believe that its customers are facing “a highly adaptive campaign targeting banks’ payment endpoints.” In the earlier case – the heist at Bangladesh’s central bank – the attackers compromised the bank’s environment, obtained valid operator credentials that allowed them to submit fraudulent SWIFT messages, … More Continue reading SWIFT warns of new attacks, Bangladesh Bank heist linked to Sony hack