DOD contractor Electronic Warfare Associates hit with Ryuk ransomware

Electronic Warfare Associates (EWA), a government contractor that works with the Department of Defense, Department of Justice, and Department of Homeland Security, has been hit with a ransomware attack, CyberScoop has learned. EWA’s CEO and president, Carl Guerreri, confirmed the infection in a Thursday interview with CyberScoop, but wouldn’t reveal further details. He declined to comment on how much of the company’s network was currently down, when the initial ransomware infection had taken place, what the initial infection vector was, or when EWA notified law enforcement. “I don’t want to give out any details for security reasons,” Guerreri told CyberScoop. “We’re coordinating with law enforcement.” The company was hit with Ryuk ransomware, according to security researchers who spoke with ZDNet, which first reported the infection. Guerreri doesn’t know how much money attackers are demanding, but said EWA has no plans to pay a ransom. “I had no intention of paying anything so I didn’t even […]

The post DOD contractor Electronic Warfare Associates hit with Ryuk ransomware appeared first on CyberScoop.

Continue reading DOD contractor Electronic Warfare Associates hit with Ryuk ransomware

Army Cyber Command is trying to become an information warfare force

U.S. Army Cyber Command could soon have a new identity. Commander Lt. Gen. Stephen Fogarty said this week he wants his military outfit, dedicated to electronic warfare and information operations, to be renamed as the “Army Information Warfare Command.” The rechristening would better represent a new military mission, he said, and come at a time when Army cyber personnel increasingly deal with troll farms on social media, disrupt ISIS operations, and work to confuse international adversaries’ understanding of U.S. military units’ location. “The intent is to provide a proposal that will change us from Army Cyber Command to Army Information Warfare Command because we believe that is a more accurate descriptor of what I am being asked to do on a daily basis,” Fogarty said at the AFCEA TechNet conference in Augusta, Georgia this week. But this change, which Fogarty said he intends to push internally at the Department of Defense over the next two months, is more than just a new […]

The post Army Cyber Command is trying to become an information warfare force appeared first on CyberScoop.

Continue reading Army Cyber Command is trying to become an information warfare force

Jeremy Hong: Weaponizing the Radio Spectrum

Jeremy Hong knows a secret or two about things you shouldn’t do with radio frequency (RF), but he’s not sharing.

That seems an odd foundation upon which to build one’s 2018 Hackaday Superconference talk, but it’s for good reason. Jeremy knows how to do things like build GPS and radar jammers, which are federal crimes. Even he hasn’t put his knowledge to practical use, having built only devices that never actually emitted any RF.

So what does one talk about when circumspection is the order of the day? As it turns out, quite a lot. Jeremy focused on how the …read more

Continue reading Jeremy Hong: Weaponizing the Radio Spectrum

The Sanger Attestation, ‘The Age of Cyberwar is Here…’

via David E. Sanger (author of ‘The Perfect Weapon’) comes this frank discussion of the true nature of war – in this case, cyber-war) and the effect (some might say ‘affectation’) of certain population groups (whether dis- or en- franchised) therein. … Continue reading The Sanger Attestation, ‘The Age of Cyberwar is Here…’

The Next Battleground

via Rob Knake, writing at the Council on Foreign Relations’ online outlet: Foreign Affairs and in the Snapshot section, comes this astute examination of the co-called cyberwarfare space’s soft underbelly – power generation. Fear, Uncertainty and Doubt… Continue reading The Next Battleground

The Best Strategy for Cyber-Conflict May Not Be a Cyber-Strategy

Terrific post at War On The Rocks, with an intriguing theory: The Best Strategy for Cyber-Conflict May Not Be A Cyber-Strategy, via Benjamin Runkle, . There’s that pesky ‘Cyber’ thing again… At any rate, the discussion in this case, revolves aroun… Continue reading The Best Strategy for Cyber-Conflict May Not Be a Cyber-Strategy

North Korean Dingus of Mass Disruption

Erudite write-up by Adam Meyers (opining at 38North) in which, Adam details the cyberweapons of mass destruction (in this case the primary weapons discussed are WannaCry, the Wiper Attack and who-can-forget the electronic Bonnie-and-Clyde aka the 2016… Continue reading North Korean Dingus of Mass Disruption