How will the Merck settlement affect the insurance industry?

A major shift in how cyber insurance works started with an attack on the pharmaceutical giant Merck. Or did it start somewhere else? In June 2017, the NotPetya incident hit some 40,000 Merck computers, destroying data and forcing a months-long recovery process. The attack affected thousands of multinational companies, including Mondelēz and Maersk. In total, […]

The post How will the Merck settlement affect the insurance industry? appeared first on Security Intelligence.

Continue reading How will the Merck settlement affect the insurance industry?

Merck Settles NotPetya Insurance Claim, Leaving Cyberwar Definition Unresolved

In a landmark case that blurs the lines between cyber and kinetic warfare, Merck reached a settlement with insurers over a $1.4 billion claim stemming from the NotPetya malware attack.
The post Merck Settles NotPetya Insurance Claim, Leaving Cyberwar … Continue reading Merck Settles NotPetya Insurance Claim, Leaving Cyberwar Definition Unresolved

How Morris Worm Command and Control Changed Cybersecurity

A successful cyberattack requires more than just gaining entry into a victim’s network. To truly reap the rewards, attackers must maintain a persistent presence within the system. After establishing communication with other compromised network devices, actors can stealthily extract valuable data. The key to all this is a well-developed Command and Control (C2 or C&C) […]

The post How Morris Worm Command and Control Changed Cybersecurity appeared first on Security Intelligence.

Continue reading How Morris Worm Command and Control Changed Cybersecurity

Insurance giant settles NotPetya lawsuit, signaling cyber insurance shakeup

Cyber insurance have already started to find other ways to avoid covering losses related to cyberattacks linked to nation-state hackers.

The post Insurance giant settles NotPetya lawsuit, signaling cyber insurance shakeup appeared first on CyberScoop.

Continue reading Insurance giant settles NotPetya lawsuit, signaling cyber insurance shakeup

US offers $10 million reward for information about Russian military hackers implicated in NotPetya attack

The United States has made it $10 million harder to keep your mouth shut, if you happen to have any information about the Russian military hackers who masterminded the notorious NotPetya cyber attack.

Read more in my article on the Hot for Security … Continue reading US offers $10 million reward for information about Russian military hackers implicated in NotPetya attack

State Department announces $10M bounty for Russian intelligence hackers behind NotPetya

The State Department is offering $10 million for the location of six Russian intelligence officers in the Sandworm unit.

The post State Department announces $10M bounty for Russian intelligence hackers behind NotPetya appeared first on CyberScoop.

Continue reading State Department announces $10M bounty for Russian intelligence hackers behind NotPetya

Actions Target Russian Govt. Botnet, Hydra Dark Market

The U.S. Federal Bureau of Investigation (FBI) says it has disrupted a giant botnet built and operated by a Russian government intelligence unit known for launching destructive cyberattacks against energy infrastructure in the United States and Ukraine. Separately, law enforcement agencies in the U.S. and Germany moved to decapitate “Hydra,” a billion-dollar Russian darknet drug bazaar that also helped to launder the profits of multiple Russian ransomware groups. Continue reading Actions Target Russian Govt. Botnet, Hydra Dark Market

Ukraine conflict spurs questions of how to define cyberwar

Legal scholars and cybersecurity experts are closely watching events in Ukraine with an eye on how the Russian invasion may redefine the laws of war for the cyber era. Many agree that Ukraine’s conflict with Russia — an established cyber superpower that isn’t hesitant about flexing its muscle aggressively — could test the rules of war in new and unexpected ways. Some say it already has. Exactly how these rules might be redefined is the subject of significant debate. In recent days, authorities as disparate as the president of Microsoft and the chairman of the Senate Intelligence Committee have weighed in on how NATO’s Article 5 provision for “collective defense,” the Geneva Convention’s protections for civilian targets and other legal frameworks for armed conflict may be challenged in the coming weeks. On Monday, Sen. Mark Warner, D-Va. and the chairman of the Select Committee on Intelligence, said at a Washington […]

The post Ukraine conflict spurs questions of how to define cyberwar appeared first on CyberScoop.

Continue reading Ukraine conflict spurs questions of how to define cyberwar

Researchers find similarities between NotPetya, attacks on Ukrainian government websites

The malware that wiped dozens of government computer systems in Ukraine starting on Jan. 13 shares some strategic similarities to to the NotPetya wiper that was used to attack Ukraine in 2017 and ended up causing nearly $10 billion in damages worldwide, researchers said Friday. The analysis, from Cisco’s Talos threat intelligence division, says that the NotPetya episode should serve as warning that any organization with connections to Ukraine should “carefully consider how to isolate and monitor those connections to protect themselves from potential collateral damage.” The warning comes as the military buildup along the Ukraine border with Russia continues and worries that Russia is planning to invade its neighbor, a claim the Russian government denies. On Jan. 14 roughly 80 Ukrainian government agencies’ websites were defaced, garnering headlines around the world. Although that attack was relatively simple and the sites were restored in short order, malware known as WhisperGate […]

The post Researchers find similarities between NotPetya, attacks on Ukrainian government websites appeared first on CyberScoop.

Continue reading Researchers find similarities between NotPetya, attacks on Ukrainian government websites

Cyber experts question Biden’s tit-for-tat approach with Russia

President Joe Biden said this week that the U.S. government could respond to Russian cyberattacks on Ukraine “the same way, with cyber.” The answer may have been a standard U.S. government response about responding in-kind, especially in the context of a deteriorating security situation on the border between Ukraine and Russia, with Biden predicting a Russian invasion. National security experts, foreign leaders and Biden’s domestic political opponents criticized his overall remarks on the potential Western response to any Russian incursion, but the cyber-specific comments got their own round of questions from cybersecurity experts as well. To some, Biden’s words reflected dated and misguided thinking that sounds good and tough but makes no sense in the real world. “Tit-for-tat cyber has always been a fantasy for policymakers,” tweeted Jacquelyn Schneider, a Hoover Fellow at Stanford University and expert in cyber policy and national security. She pointed to the difficulty that the […]

The post Cyber experts question Biden’s tit-for-tat approach with Russia appeared first on CyberScoop.

Continue reading Cyber experts question Biden’s tit-for-tat approach with Russia