Thursday, 28 March 2013

Cyber Threat at Top of Transnational Threat List; James R. Clapper, the director of national intelligence,




Clapper Places Cyber at Top of Transnational Threat List




By Jim Garamone
American Forces Press Service
WASHINGTON, March 12, 2013 

Ten years ago, the idea that cyber posed a leading threat against the United States would be laughed at. But no one is laughing any more. James R. Clapper, the director of national intelligence, testified before the Senate Select Committee on Intelligence today, and cyber led off his presentation of transnational threats.
Threats are more diverse, interconnected and viral than at any time in American history, the director said.



“Attacks, which might involve cyber and financial weapons, can be deniable and unattributable,” he said in his prepared testimony. “Destruction can be invisible, latent and progressive.”

In such a world, the role of intelligence grows, and finding ways to increase the efficiency of the intelligence community becomes paramount, Clapper said. “In this threat environment, the importance and urgency of intelligence integration cannot be overstated,” he added. “Our progress cannot stop. The intelligence community must continue to promote collaboration among experts in every field, from the political and social sciences to natural sciences, medicine, military issues and space.”



Clapper explained that cyber threats are broken into two terms: cyberattacks and cyberespionage. Cyberattacks aim at creating physical effects or to manipulate, disrupt or delete data. “It might range from a denial-of-service operation that temporarily prevents access to a website to an attack on a power turbine that causes physical damage and an outage lasting for days,” he said. Cyber espionage refers to stealing data from a variety of sources.
The threat is growing, Clapper said, but is not here just yet. “We judge that there is a remote chance of a major cyberattack against U.S. critical infrastructure systems during the next two years that would result in long-term, wide-scale disruption of services, such as a regional power outage,” Clapper said.




State actors with the skills to do this, such as Russia and China, are unlikely to launch such an attack, he said, and other states or organizations do not have these skills.
“However, isolated state or nonstate actors might deploy less sophisticated cyberattacks as a form of retaliation or provocation,” he added. “These less advanced but highly motivated actors could access some poorly protected U.S. networks that control core functions, such as power generation, during the next two years, although their ability to leverage that access to cause high-impact, systemic disruptions will probably be limited.”
A number of attacks already have taken place, including numerous denial-of-service attacks against U.S. banks. In August, someone attacked the Saudi oil company Aramco, rendering 30,000 computers unusable.

Belgium NATO Afghanis Balt Cyber attacks, new frontier for Iran   U.S. relations?
United States Secretary of Defense Leon Panetta during a media conference after a meeting of NATO Defense Ministers Wednesday, Oct. 10, 2012. A former U.S. government official says American authorities firmly believe that Iranian hackers, likely supported by the Tehran government, were responsible for recent cyber attacks against oil and gas companies.  (AP Photo/Virginia Mayo)

A more insidious cyber threat comes from foreign intelligence and security services that have penetrated numerous computer networks of U.S. government, business, academic and private-sector entities, Clapper said. “Most detected activity has targeted unclassified networks connected to the Internet, but foreign cyber actors are also targeting classified networks,” he said. “Importantly, much of the nation’s critical proprietary data are on sensitive, but unclassified, networks -- and the same is true for most of our closest allies.”
Cyber thieves and spies are targeting and collecting sensitive U.S. national security and economic data, almost certainly allowing adversaries to close the military technological gap, Clapper said.
“It is very difficult to quantify the value of proprietary technologies and sensitive business information and, therefore, the impact of economic cyber espionage activities,” he acknowledged. “However, we assess that economic cyber espionage will probably allow the actors who take this information to reap unfair gains in some industries.”

U.S, intelligence agencies track cyber developments among terrorist groups, activist hackers and cyber criminals, the intelligence director said. “We have seen indications that some terrorist organizations have heightened interest in developing offensive cyber capabilities,” he added, “but they will probably be constrained by inherent resource and organizational limitations and competing priorities.”

Activist hackers -- known as “hacktivists,” -- target a wide range of companies and organizations in denial-of-service attacks, but intelligence professionals have not observed a significant change in their capabilities or intentions during the last year, Clapper said.
“Most hacktivists use short-term denial-of-service operations or expose personally identifiable information held by target companies, as forms of political protest,” he said, adding that this could change.
Cyber criminals also threaten U.S. economic interests. “They are selling tools, via a growing black market, that might enable access to critical infrastructure systems or get into the hands of state and non-state actors,” the director said. Some companies abet these groups, he told the panel, selling computer intrusion kits to all comers.

Biographies:
James R. Clapper
http://www.defense.gov/news/newsarticle.aspx?id=119500
_________________________________




History of Cyber Wars 
http://samuelezerzercyberspacethenewfrontier.blogspot.ca/2013/03/history-of-cyber-terrorism-its-global.html

Internet Scam Alert and Phishing Alert From Cyber Center Department of Defense And DoD Cyber Crime Center





Alert From Cyber  Center Department of Defense And DoD Cyber Crime Center
The Department of Defense Cyber Crime Center (DC3) sets standards for digital evidence processing, analysis, and diagnostics for any DoD investigation that requires computer forensic support to detect, enhance, or recover digital media, including audio and video. 





The center assists in criminal, counterintelligence, counterterrorism, and fraud investigations of the Defense Criminal Investigative Organizations (DCIOs) and DoD counterintelligence activities. It also supports safety investigations and Inspector General and commander-directed inquiries. DC3 aids in meeting intelligence community document exploitation objectives from a criminal law enforcement forensics and counterintelligence perspective. 




DC3 provides computer investigation training to forensic examiners, investigators, system administrators, and any other DoD members who must ensure Defense information systems are secure from unauthorized use, criminal and fraudulent activities, and foreign intelligence service exploitation. DC3 remains on the leading edge of computer technologies and techniques through research, development, testing, and evaluation applied to digital evidence processing and computer forensic analysis; and by partnering with governmental, academic, and private industry computer security officials.


Internet Scam Alert and Phishing Alert From Department of Defense


Internet Scam Alert

The Defense Department is aware of an internet scam that improperly uses official DoD seals, to include those of U.S. Cyber Command and the Defense Cyber Crime Center, to scam innocent persons into paying a 'fine' to unlock a personal device. DoD is in no way affiliated with this internet scam. If you are affected by this scam, please visit the FBI to learn more or file a complaint: http://www.fbi.gov/scams-safety/e-scams

Spear Phishing Alert

DC3 advises caution in responding to any email describing a promotional offer indicating the recipient has been selected to receive a $1,000 Visa gift card from either the "United States Air Force" or the "Defense Cyber Crimes Center." The body of the email attempts to lure the recipient to a malicious website to claim a Visa gift card.

Sunday, 24 March 2013

Cyber Threat at Top of Transnational Threat List; James R. Clapper, the director of national intelligence,






Clapper Places Cyber at Top of Transnational Threat List




By Jim Garamone
American Forces Press Service
WASHINGTON, March 12, 2013 







Ten years ago, the idea that cyber posed a leading threat against the United States would be laughed at. But no one is laughing any more. James R. Clapper, the director of national intelligence, testified before the Senate Select Committee on Intelligence today, and cyber led off his presentation of transnational threats.
Threats are more diverse, interconnected and viral than at any time in American history, the director said.

“Attacks, which might involve cyber and financial weapons, can be deniable and unattributable,” he said in his prepared testimony. “Destruction can be invisible, latent and progressive.”

In such a world, the role of intelligence grows, and finding ways to increase the efficiency of the intelligence community becomes paramount, Clapper said. “In this threat environment, the importance and urgency of intelligence integration cannot be overstated,” he added. “Our progress cannot stop. The intelligence community must continue to promote collaboration among experts in every field, from the political and social sciences to natural sciences, medicine, military issues and space.”



Clapper explained that cyber threats are broken into two terms: cyberattacks and cyberespionage. Cyberattacks aim at creating physical effects or to manipulate, disrupt or delete data. “It might range from a denial-of-service operation that temporarily prevents access to a website to an attack on a power turbine that causes physical damage and an outage lasting for days,” he said. Cyber espionage refers to stealing data from a variety of sources.
The threat is growing, Clapper said, but is not here just yet. “We judge that there is a remote chance of a major cyberattack against U.S. critical infrastructure systems during the next two years that would result in long-term, wide-scale disruption of services, such as a regional power outage,” Clapper said.




State actors with the skills to do this, such as Russia and China, are unlikely to launch such an attack, he said, and other states or organizations do not have these skills.
“However, isolated state or nonstate actors might deploy less sophisticated cyberattacks as a form of retaliation or provocation,” he added. “These less advanced but highly motivated actors could access some poorly protected U.S. networks that control core functions, such as power generation, during the next two years, although their ability to leverage that access to cause high-impact, systemic disruptions will probably be limited.”
A number of attacks already have taken place, including numerous denial-of-service attacks against U.S. banks. In August, someone attacked the Saudi oil company Aramco, rendering 30,000 computers unusable.

Belgium NATO Afghanis Balt Cyber attacks, new frontier for Iran   U.S. relations?
United States Secretary of Defense Leon Panetta during a media conference after a meeting of NATO Defense Ministers Wednesday, Oct. 10, 2012. A former U.S. government official says American authorities firmly believe that Iranian hackers, likely supported by the Tehran government, were responsible for recent cyber attacks against oil and gas companies.  (AP Photo/Virginia Mayo)

A more insidious cyber threat comes from foreign intelligence and security services that have penetrated numerous computer networks of U.S. government, business, academic and private-sector entities, Clapper said. “Most detected activity has targeted unclassified networks connected to the Internet, but foreign cyber actors are also targeting classified networks,” he said. “Importantly, much of the nation’s critical proprietary data are on sensitive, but unclassified, networks -- and the same is true for most of our closest allies.”
Cyber thieves and spies are targeting and collecting sensitive U.S. national security and economic data, almost certainly allowing adversaries to close the military technological gap, Clapper said.
“It is very difficult to quantify the value of proprietary technologies and sensitive business information and, therefore, the impact of economic cyber espionage activities,” he acknowledged. “However, we assess that economic cyber espionage will probably allow the actors who take this information to reap unfair gains in some industries.”

U.S, intelligence agencies track cyber developments among terrorist groups, activist hackers and cyber criminals, the intelligence director said. “We have seen indications that some terrorist organizations have heightened interest in developing offensive cyber capabilities,” he added, “but they will probably be constrained by inherent resource and organizational limitations and competing priorities.”

Activist hackers -- known as “hacktivists,” -- target a wide range of companies and organizations in denial-of-service attacks, but intelligence professionals have not observed a significant change in their capabilities or intentions during the last year, Clapper said.
“Most hacktivists use short-term denial-of-service operations or expose personally identifiable information held by target companies, as forms of political protest,” he said, adding that this could change.
Cyber criminals also threaten U.S. economic interests. “They are selling tools, via a growing black market, that might enable access to critical infrastructure systems or get into the hands of state and non-state actors,” the director said. Some companies abet these groups, he told the panel, selling computer intrusion kits to all comers.

Biographies:
James R. Clapper
http://www.defense.gov/news/newsarticle.aspx?id=119500
_________________________________




History of Cyber Wars 
http://samuelezerzercyberspacethenewfrontier.blogspot.ca/2013/03/history-of-cyber-terrorism-its-global.html


HISTORY OF CYBER-TERRORISM ;ITS A GLOBAL CYBER WAR OUT THERE



ITS A WAR PERIOD !







David Irvine,“cold cyberwar”
"Irvine, the director-general of ASIO, knows Australian business and the government are engaged in a new, and irreversible, “cold cyberwar”, which the Americans have designated as the fifth and most uncertain defence domain."




President Obama cyberattacks should proceed
“Should we shut this thing down?” Mr. Obama asked, according to members of the president’s national security team who were in the room.
President Said  it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.




Kaspersky Lab "Red October"
Employees of anti-virus program developer Kaspersky Lab work at their company's offices in Moscow on March 10, 2011. Kaspersky Lab said Monday it had identified a new computer virus it dubbed "Red October" targeting eastern European countries that appeared to be collecting classified files using NATO and EU encryption. Kaspersky Lab said Monday it had identified a new computer virus it dubbed "Red October" targeting eastern European countries that appeared to be collecting classified files using NATO and EU encryption.





Leon Panetta "cyber-Pearl Harbor" 
Former U.S. Defense Secretary Leon Panetta  sounded the alarm. Panetta asserts that critical civilian infrastructure is vulnerable to cyber-attack by foreign or non-state actors.
Panetta pushed the issue forcefully, invoking a "cyber-Pearl Harbor" to illuminate the threat. While name dropping China, Russia and Iran, Panetta is quoted as saying "They could derail passenger trains… They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country." 





The Shamoon Attacks "Recommendations" Symantec Security Response




Symantec | United States

Writeup By: Symantec Security Response

Discovered:
August 16, 2012
Updated:
August 22, 2012 2:07:45 AM
Also Known As:
WORM_DISTTRACK.A [Trend], TROJ_WIPMBR.A [Trend]







SHAMOON DEADLIEST VIRUS SO FAR; 

Type:
Worm
Infection Length:
Varies
Systems Affected:
Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

You may have arrived at this page either because you have been alerted by your Symantec product about this risk, or you are concerned that your computer has been affected by this risk. 

Before proceeding further we recommend that you run a full system scan. If that does not resolve the problem you can try one of the options available below. 

A new line of attack. Image Source

FOR NORTON USERS 
If you are a Norton product user, we recommend you try the following resources to remove this risk. 

Removal Tool 
Run Norton Power Eraser (NPE)
Norton Power Eraser did not remove this risk

If you have an infected Windows system file, you may need to replace it using the Windows installation CD. 


How to reduce the risk of infection 
The following resources provide further information and best practices to help reduce the risk of infection. 
Operating system updates to fix vulnerabilities
File sharing protection
Disable Autorun (CD/USB)
Best practices for instant messaging
Best practices for browsing the Web
Best practices for email


FOR BUSINESS USERS 
If you are a Symantec business product user, we recommend you try the following resources to remove this risk. 

Identifying and submitting suspect files 
Submitting suspicious files to Symantec allows us to ensure that our protection capabilities keep up with the ever-changing threat landscape. Submitted files are analyzed by Symantec Security Response and, where necessary, updated definitions are immediately distributed through LiveUpdate™ to all Symantec end points. This ensures that other computers nearby are protected from attack. The following resources may help in identifying suspicious files for submission to Symantec. 
Locate a sample of a threat
Submit a suspicious file to Symantec


Removal Tool 
Run the Symantec Power Eraser with the Symantec Endpoint Protection Support Tool
Symantec Power Eraser Overview
Symantec Power Eraser User Guide 

If you have an infected Windows system file, you may need to replace it using the Windows installation CD. 


How to reduce the risk of infection 
The following resource provides further information and best practices to help reduce the risk of infection. 
Protecting your business network 



MANUAL REMOVAL 
The following instructions pertain to all current Symantec antivirus products. 

1. Performing a full system scan 
How to run a full system scan using your Symantec product 


2. Restoring settings in the registry 
Many risks make modifications to the registry, which could impact the functionality or performance of the compromised computer. While many of these modifications can be restored through various Windows components, it may be necessary to edit the registry. See in the Technical Details of this writeup for information about which registry keys were created or modified. Delete registry subkeys and entries created by the risk and return all modified registry entries to their previous values.






Recommendations
1.Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

2.Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.


3.Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.


4.Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.


5.Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.


6.Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.


7.Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.


8.If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.


9.Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.


10.Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.


11.Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.


12.Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.


13.If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device's visibility is set to "Hidden" so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to "Unauthorized", requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.


For further information on the terms used in this document, please refer to the Security Response glossary.


How The Shamoon Attacks Computers ; Deadliest Cyber Virus on Earth





The Shamoon Attacks
Updated: 16 Aug 2012 | Translations available: 日本語
Symantec Security Response
Also read up on recomandation on how to protect from SHAMOON
http://samuelezerzercyberspacethenewfrontier.blogspot.ca/2013/03/writeup-by-symantec-security-response.html





W32.Disttrack is a new threat that is being used in specific targeted attacks against at least one organization in the energy sector.  It is a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable.

W32.Disttrack consists of several components:

Dropper—the main component and source of the original infection. It drops a number of other modules.
Wiper—this module is responsible for the destructive functionality of the threat.
Reporter—this module is responsible for reporting infection information back to the attacker.


Dropper Component

The Dropper component performs the following actions:

Copies itself to %System%\trksvr.exe

Drops the following files embedded into resources:
A 64-bit version of the dropper component: %System%\trksrv.exe (contained in the “X509” resource)

Reporter component: %System%\netinit.exe (contained in the "PKCS7" resource)

Wiper component: %System%\[NAME SELECTED FROM LIST].exe (contained in the "PKCS12" resource)

Note: The name of the component is selected from the following list:
caclsrv
certutl
clean
ctrl
dfrag
dnslookup
dvdquery
event
extract
findfile
fsutl
gpget
iissrv
ipsecure
msinit
ntx
ntdsutl
ntfrsutil
ntnw
power
rdsadmin
regsys
routeman
rrasrv
sacses
sfmsc
sigver
smbinit
wcscript

Copies itself to the following network shares:
ADMIN$
C$\\WINDOWS
D$\\WINDOWS
E$\\WINDOWS

Creates a task to execute itself

Creates the following service to start itself whenever Windows starts:
Service name: TrkSvr
Display name: Distributed Link Tracking Server
Image path: %System%\trksvr.exe


Wiper Component

The Wiper component includes the following functionality:

Deletes an existing driver from the following location and overwrites it with another legitimate driver:

%System%\drivers\drdisk.sys

The device driver is a clean disk driver that enables user-mode applications to read and write to disk sectors. The driver is used to overwrite the computer’s MBR but may be used for legitimate purposes.

The file is digitally signed
Executes the following commands that collect file names, which will be overwritten and writes them to f1.inf and f2.inf:




Files from the f1.inf and f2.inf will be overwritten with the JPEG image shown below. Overwritten files are thus rendered useless.


Figure 1. Image used to overwrite files

Finally, the component will overwrite the MBR so that the compromised computer can no longer start
The following string that points to the location of debug symbols was left in the Wiper component of this threat and gives an idea of where the component was located on the developer’s computer:
C:\Shamoon\ArabianGulf\wiper\release\wiper.pdb



Reporter Component

The Reporter component is responsible for sending infection information back to the attacker. Information is sent as a HTTP GET request and is structured as follows:
http://[DOMAIN]/ajax_modal/modal/data.asp?mydata=[MYDATA]&uid=[UID]&state=[STATE]

The following data is sent to the attacker:

[DOMAIN]—a domain name
[MYDATA]—a number that specifies how many files were overwritten
[UID]—the IP address of the compromised computer
[STATE]—a random number
Threats with such destructive payloads are unusual and are not typical of targeted attacks. Symantec Security Response is continuing to analyze this threat and will post more information as it becomes available. Symantec customers are protected from this threat, which our security products detect as W32.Disttrack.






Discovered:
August 16, 2012
Updated:
August 22, 2012 2:07:45 AM
Also Known As:
WORM_DISTTRACK.A [Trend], TROJ_WIPMBR.A [Trend]
Type:
Worm
Infection Length:
Varies
Systems Affected:
Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
W32.Disttrack is a worm that spreads through network shares. It also drops malicious files and overwrites existing files. 

Antivirus Protection Dates

  • Initial Rapid Release version August 16, 2012 revision 001
  • Latest Rapid Release version February 19, 2013 revision 016
  • Initial Daily Certified version August 16, 2012 revision 002
  • Latest Daily Certified version September 12, 2012 revision 021
  • Initial Weekly Certified release date August 22, 2012
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Threat Assessment

Wild

  • Wild Level: Low
  • Number of Infections: 0 - 49
  • Number of Sites: 0 - 2
  • Geographical Distribution: Low
  • Threat Containment: Easy
  • Removal: Easy

Damage

  • Damage Level: High
  • Payload: Drops malicious files.
  • Deletes Files: Overwrites existing files.

Distribution

  • Distribution Level: Low
  • Shared Drives: Spreads through network shares.
Writeup By: Symantec Security Response



"Shamoon Virus" Most Lethal and Destructive Cyber Virus that Virtually can Bankrupt Companies; Former Defence Leon Panetta


"Shamoon Virus" Most Dangerous and Destructive Cyber Virus that Virtualy can Bankrupt Companies; Former Defence Leon Panetta
http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136






recomandation on how to protect from SHAMOON VIRUS
http://samuelezerzercyberspacethenewfrontier.blogspot.ca/2013/03/writeup-by-symantec-security-response.html

 In recent weeks, as many of you know, some large U.S. financial institutions were hit by so-called Distributed Denial of Service attacks.  These attacks delayed or disrupted services on customer websites.  While this kind of tactic isn't new, the scale and speed with which it happened was unprecedented. 


           
 But even more alarming is an attack that happened two months ago when a very sophisticated virus called Shamoon infected computers in the Saudi Arabian State Oil Company Aramco.  Shamoon included a routine called a ‘wiper’, coded to self-execute.  This routine replaced crucial systems files with an image of a burning U.S. flag.  But it also put additional garbage data that overwrote all the real data on the machine.  More than 30,000 computers that it infected were rendered useless and had to be replaced.  It virtually destroyed 30,000 computers. 



            Then just days after this incident, there was a similar attack on RasGas of Qatar, a major energy company in the region.  All told, the Shamoon virus was probably the most destructive attack that the private sector has seen to date.

            Imagine the impact an attack like that would have on your company or your business. 

            These attacks mark a significant escalation of the cyber threat and they have renewed concerns about still more destructive scenarios that could unfold. 


            For example, we know that foreign cyber actors are probing America's critical infrastructure networks.  They are targeting the computer control systems that operate chemical, electricity and water plants and those that guide transportation throughout this country. 

            We know of specific instances where intruders have successfully gained access to these control systems. 

            We also know that they are seeking to create advanced tools to attack these systems and cause panic and destruction and even the loss of life. 



            Let me explain how this could unfold.  An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches.  They could, for example, derail passenger trains or even more dangerous, derail trains loaded with lethal chemicals.  

            They could contaminate the water supply in major cities or shutdown the power grid across large parts of the country. 

            The most destructive scenarios involve cyber actors launching several attacks on our critical infrastructure at one time, in combination with a physical attack on our country.  Attackers could also seek to disable or degrade critical military systems and communication networks. 

            The collective result of these kinds of attacks could be a cyber Pearl Harbor; an attack that would cause physical destruction and the loss of life.  In fact, it would paralyze and shock the nation and create a new, profound sense of vulnerability. 

            As director of the CIA and now Secretary of Defense, I have understood that cyber attacks are every bit as real as the more well-known threats like terrorism, nuclear weapons proliferation and the turmoil that we see in the Middle East. 

            And the cyber threats facing this country are growing.  With dramatic advances, this is an area of dramatic developments in cyber technology.  With that happening, potential aggressors are exploiting vulnerabilities in our security.  But the good news is this, we are aware of this potential.  Our eyes are wide open to these kinds of threats and we are a nation that, thank God, is on the cutting edge of this new technology.  We are the best and we have to stay there. 

Online Security Threats for Customers and how you can protect yourself from a Cyber Attacks with Adam Sculthorpe



Radio Shalom 1650AM, Money and Business Show
Samuel Ezerzer 
February, 5, 2013
http://samuelezerzer.blogspot.ca/




“Online Security Threats for Customers and how you can protect yourself from a Cyber Attacks with Adam Sculthorpe, Founder of bitVelocity
(226) 821-4443 



http://www.radio-shalom.ca/mp3/Programs/1042/MoneyAndBusiness_OnlineSecurity200213.mp3
listen to radio show archive

Cyber attacks that stole information from 141 targets in the US and other countries have been traced to a Chinese military unit in a drab office building in the outskirts of Shanghai, a US security firm alleged Tuesday. 



China dismissed the report as ”groundless.” 
The report by the Virginia-based Mandiant Corp. is the most explicit suggestion yet by a Western security company that China’s military might be directly linked to a wave of cyber spying against American and other foreign companies and government agencies.
As well Three US news organizations -- The New York Times, The Wall Street Journal and The Washington Post -- say Chinese hackers have infiltrated their company's computers to track their coverage of China.  Some experts say this has been an on-going problem for more than five years. 




These cyber attacks are different than most because of the danger to individuals.
These newspapers are not alone. Experts think nearly every media outlet has been attacked -- they either don't know it or don't report it. Hacking hits here, too, at the Voice of America.


picture courtesy by the hackers media

Chinese hackers breached the online defenses of the U.S. Chamber of Commerce last year, accessing information about its 3 million members and stealing thousands of e-mails. It was one of the boldest infiltration ever.
Cyber attacks like this one cost the U.S. economy billions every year.



My name is Samuel Ezerzer, your host to the Money & Business show on Radio Shalom, CJRS 1650 AM. Thank you for tuning in live with our Business studios headquarters in Montreal, the financial capital and the home to the greatest hockey team, the Montreal Canadians. We have another great show for you today and as always, you can call if you have any questions, comments, or criticisms on today's topic. Please call us direct at 514 738 4100 ext 200 or email me at moneyandbusinessshow@gmail.com if you have any inquiries. You can also visit our website athttp://www.radio-shalom.ca/ – all our shows are
archived there


Today’s topic of discussion: “Online Security Threats for Customers of Financial Institutions: Buyer Beware”



biography


Adam Sculthorpe

BitVelocity
Adam is a visionary leader in the IT security world with a career spanning more than 25 years.  Adam’s first experiences in security was with the Royal Anglian Regiment of the British Army as a signals specialist and then went on to build an IT career.



In the late 1990’s Adam became the sole UK distributor of the first PC Firewall developed by Signal9 Solutions in Kanata, Ontario and then went to work for TNT Worldwide as their first security specialist.  He then went on to work for Internet Security Systems (ISS) as a senior security consultant providing services to numerous financial, government, military and corporate clients including Goldman Sachs, Bank of America, Citi Bank and The London Stock Exchange. 


After leaving ISS Adam worked at UBS investment Bank before relocating to Canada.  In 2004 he pioneered click fraud detection software and services solutions and his research and client stories were featured in The New Scientist, The New York Times, The Register and on National TV and Radio.  Adam is currently Founder of a start up called bitVelocity where he is developing cloud-based web hosting solutions that improve search ranking.  Adam is also developing privacy testing solutions and internet encryption software.




small talk 

Adam on the weekend , you went over to fix someonees computer because it was  acting weird and they asked me to look at it, they thought they had protection but it turned out that Rogers Online Security? 

(had failed them and they had been infected by a trojan keylogger and other nasties for probably around 3 years.)



It's called digital espionage.

Chinese hackers breached the online defenses of the U.S. Chamber of Commerce last year, accessing information about its 3 million members and stealing thousands of e-mails. It was one of the boldest infiltrations ever.
Cyber attacks like this one cost the U.S. economy billions every year. On American Morning this morning, "Popular Mechanics" senior news editor Joe Pappalardo talks about the magazine's cover story on hacks from foreign countries and explains what the possible motivations could be behind these attacks.



American companies

https://www.youtube.com/watch?v=TTIfh-z0Cn4
0.27-0.57---1.18-1.33--1.50-2.14----2.27-2.50----3.13-3.38
continuous please 

what are chinese hackers or companies looking for in American companies?



http://www.bbc.co.uk/news/world-asia-china-21502088


The BBC's John Sudworth was detained while filming the reported hub of the hacking operation

Continue reading the main story.
A secretive branch of China's military is probably one of the world's "most prolific cyber espionage groups", a US cyber security firm has said.



BBC reporter Mandiant said Unit 61398 was believed to have "systematically stolen hundreds of terabytes of data" from at least 141 organisations around the world.

The White House said it has taken its concerns about cyber-theft to the highest levels of China's government.




How difficult is it to determine the origin or the source of the cyber attack? 


notes

The firm said it had traced the hacking activities of APT1 to the site of 12-storey building in the Pudong area of Shanghai. It said that Unit 61398 of the People's Liberation Army "is also located in precisely the same area" and that the actors had similar "missions, capabilities and resources".

Among the findings about APT1 in the report were that it:


-is staffed by hundreds, possibly thousands, of proficient English speakers with advanced computer security and networking skills

-has hacked into 141 companies across 20 industries, 87% based in English-speaking countries, and is able to steal from dozens of networks simultaneously
-has stolen hundreds of terabytes of information including blueprints, business plans, pricing documents, user credentials, emails and contact lists
-stayed inside hacked networks for an average of 356 days, with the longest lasting 1,764 days
-targeted industries identified by China as strategically important under its Five Year Plan for economic growth

Most hacked or targeted companies are 












-information technology 
-Aerospace industry
-3rd on the list is public administration ?
-energy
-satellite and telecom
-scientific research

http://www.bbc.co.uk/news/world-us-canada-21510193

0.00-0.44---0.57-1.26----1.44-2.24---2.34-3.21

Mandiate said that there is two possible conclusion 

1. that  the Chinese government behind these attacks 
2. Or they are aware of these attacks

Are they looking the other way specially that china has a controlled infrastructure?


segments




https://www.youtube.com/watch?v=xImFkBSjah0

Anonymous #OpIsrael

Greetings Citizens of the world, this is Anonymous. It has come to our attention that the Israeli government has ignored repeated warnings about the abuse of human rights, shutting down the internet in Israel and mistreating its own citizens and those of its neighboring countries. November 2012 will be a month to remember for the Israeli defense forces and internet security forces. We will strike any and all websites that we deem to be in Israeli Cyberspace in retaliation for the mistreating of people in Gaza and other areas. Anonymous has been watching you, and you have received fair warning of our intent to seize control of your cyberspace in accordance with basic humanitarian rights of free speech and the right to live. As of 9:00 AM Pacific Standard Time, the number of attacked Israeli websites is approximately 10,000. The further assault on the people of Gaza, people of Palestine or any other group will be treated as a violation of the Anonymous Collectives intent to protect the people of the World. Israel, it is in your best interest to cease and desist any further military action or your consequence will become worse with each passing hour. This is a message from Anonymous Op Israel, Danger Hackers, Anonymous Special Operations and the Anonymous Collective of the entire planet. We will treat each additional death as a personal attack on Anonymous and you will be dealt with swiftly and without warning. Our hearts are with the women, children and families that are suffering at this very moment, as a direct result of the Israeli Governments misuse of its military. Brothers and sisters of Anonymous, we urge you to protest the Israeli Government and any associated hostile forces. Now is the time for anonymous to help the people that are hurting. Help the people that are being taken advantage of. Help the ones that are dying and it will further the collective as a whole and we can help bring a peace within the Gaza region to those people that so desperately need it. We call on the Anonymous Collective to hack, deface, docks, hijack, database leak, admin takeover, four oh four and DNS terminate the Israeli Cyberspace by any means necessary. 

To the Israeli Government, Anonymous has grown tired of your bullying, and now you will see the result of your actions. Cyber war has been declared on Israel cyber space and you will see exactly what we are capable of. Israel, the angel of death has been called to your cyberspace. We are Anonymous. We are legion. Expect us and Respect us.


personal online security?


What are the most common reasons online attacks are successful against individuals?

What does the malware / trojan virus typically do?

Are some people more vulnerable than others?
What steps should people take to properly protect themselves?