NSA Offers Guidance on Adopting Encrypted DNS

Data Breach Today

Agency Describes How DoH Can Help Prevent Eavesdropping The NSA has released guidance on how organizations can adopt encrypted domain name system protocols to prevent eavesdropping and manipulation of DNS traffic.

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. military against foreign targets, Barr said the DOJ did so in this case because the accused “indiscriminately” targeted American civilians on a massive scale. The U.S.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

DoJ Blasts Apple on Lack of Encryption Backdoor - Again

Data Breach Today

Law Enforcement Leaders Say Encryption Delayed Terrorist Investigation; Apple Pushes Back Although FBI technicians were able to gain access to data in two iPhones belonging to a Saudi national who killed three U.S.

Maze ransomware operators stole data from US military contractor Westech

Security Affairs

Hackers have stolen confidential documents from the US military contractor Westech, which provides critical support for US Minuteman III nuclear deterrent. Threat actors first compromised the Westech’s network, then stole the documents before encrypting them.

Chinese Cycldek APT targets Vietnamese Military and Government in sophisticated attacks

Security Affairs

China-linked APT group Cycldek is behind an advanced cyberespionage campaign targeting entities in the government and military sector in Vietnam. “Communications with the server can take place either over raw TCP sockets encrypted with RC4, or via HTTPS.

Chinese Military personnel charged with hacking into credit reporting agency Equifax

Security Affairs

The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax. The four members of the Chinese military unit are Wu Zhiyong (???), were members of the PLA’s 54 th Research Institute, a component of the Chinese military.

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe.

GCHQ implements World War II cipher machines in encryption app CyberChef

Security Affairs

UK intelligence agency GCHQ released emulators for World War II cipher machines (Enigma, Typex and The Bombe) that can be executed in the encryption app CyberChef. UK intelligence agency GCHQ, as part of the celebration of its centenary , has released emulators for World War II cipher machines that can be executed in the encryption app CyberChef released for educational purposes. Breaking News Hacking Intelligence CyberChef encryption GCHQ Pierluigi Paganini Security Affairs

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? The disturbing thing is that in North America and Europe more and more arguments are being raised in support of creating and maintaining encryption backdoors for government use. Here are excerpts edited for clarity and space: LW: What’s wrong with granting governments the ability to break encryption?

The Myth of Consumer-Grade Security

Schneier on Security

The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. In his keynote address at the International Conference on Cybersecurity, Attorney General William Barr argued that companies should weaken encryption systems to gain access to consumer devices for criminal investigations. The thing is, that distinction between military and consumer products largely doesn't exist.

Best Enterprise VPN Solutions for 2021

eSecurity Planet

VPNs offer clients an encrypted access channel to remote networks through a tunneling protocol and can obfuscate the client’s IP address. Also Read: Tokenization vs. Encryption: Pros and Cons. One of the earliest protocols Low encryption, faster speeds. for encryption.

Security Vulnerabilities in US Weapons Systems

Schneier on Security

From the summary: Automation and connectivity are fundamental enablers of DOD's modern military capabilities. control cybersecurity departmentofdefense encryption nationalsecuritypolicy operationalsecurity passwords reports vulnerabilities weaponsThe US Government Accounting Office just published a new report: " Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities " (summary here ).

GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

The Last Watchdog

The disclosure that malicious intruders hacked the computer systems of the South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces is not much of a surprise. In today’s environment for commercial business, let alone government security and defense agencies, the de rigueur approach for cyber security necessarily includes end-to-end encryption, single sign-on, and two-factor authentication, at minimum.

Maze Ransomware operators hacked the Xerox Corporation

Security Affairs

Xerox Corporation is the last victim of the Maze ransomware operators, hackers have encrypted its files and threaten of releasing them. Maze ransomware operators have breached the systems of the Xerox Corporation and stolen files before encrypting them.

Crypto AG Was Owned by the CIA

Schneier on Security

The Swiss cryptography firm Crypto AG sold equipment to governments and militaries around the world for decades after World War II. These spy agencies rigged the company's devices so they could easily break the codes that countries used to send encrypted messages.

Cryptic Rumblings Ahead of First 2020 Patch Tuesday

Krebs on Security

military and to other high-value customers/targets that manage key Internet infrastructure, and that those organizations have been asked to sign agreements preventing them from disclosing details of the flaw prior to Jan. Sources tell KrebsOnSecurity that Microsoft Corp.

SolarWinds hackers stole some of Mimecast source code

Security Affairs

Back in December, the SolarWinds supply chain attack made the headlines when a Russian cyber espionage group tampered with updates for SolarWinds’ Orion Network Management products that the IT company provides to government agencies, military, and intelligence offices.

Maze ransomware gang hacked M&A firm Threadstone Advisors LLP

Security Affairs

MAZE ransomware operators have stolen the data of the company before encrypting its systems and threaten to leak it in case the victim will not pay the ransom.

Maze Ransomware operators published data from LG and Xerox

Security Affairs

Maze ransomware operators have also breached the systems of the Xerox Corporation and stolen files before encrypting them. The company did not disclose the cyberattack, but early June the Maze ransomware operators published some screenshots that showed that a Xerox domain has been encrypted.

US Govn contractor Electronic Warfare Associates infected with Ryuk ransomware

Security Affairs

Evidence of the hack is still visible online because Google has cashed the ransom notes and encrypted files. The encrypted files and ransom note are associated with a Ryuk ransomware infection.

Texas Government Agencies Hit by Ransomware

Adam Levin

The DIR has yet to identify the affected government entities and is currently working with the Texas Military Department as well as the Texas A&M Cyberresponse and Security Operation Center to investigate the attack and restore critical services where possible. . The ransomware deployed is known is.JSE and typically works by encrypting files and appending the suffix “.jse.”.JSE

Russia-linked Gamaredon group targets Ukraine officials

Security Affairs

Russia-linked Gamaredon cyberespionage group has been targeting Ukrainian targets, including diplomats, government and military officials. Russia linked APT group tracked as Gamaredon has been targeting several Ukrainian diplomats, government and military officials, and law enforcement.

Supply-Chain Security

Schneier on Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. Even al-Qaeda was concerned; ten years ago, a sympathizer released the encryption software Mujahedeen Secrets , claimed to be free of Western influence and backdoors. Members of the military, and everyone else, can still buy the phones. They just can't buy them on US military bases.

UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia

Security Affairs

The governments of Britain and the US declared that Russia’s military intelligence service GRU is behind the massive cyber attack that hit Georgia during 2019. The APT28 group has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide.

Your Work Email Address is Your Work's Email Address

Troy Hunt

Sidenote: there's a whole other discussion about active interception of encrypted communications that may also give an employer access to this.) When the Ashley Madison data breach occurred in 2015, it made headline news around the world.

Security Affairs newsletter Round 253

Security Affairs

Kr00k Wi-Fi Encryption flaw affects more than a billion devices. Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates. A new round of the weekly newsletter arrived! The best news of the week with Security Affairs.

Platinum APT and leverages steganography to hide C2 communications

Security Affairs

In June 2018, experts at Kaspersky were investigating attacks against government and military entities in South and Southeast Asian countries, The experts tracked the campaign as EasternRoppels, they speculate it may have started as far back as 2012. “In June 2018, we came across an unusual set of samples spreading throughout South and Southeast Asian countries targeting diplomatic, government and military entities.

Russia-linked APT28 targets govt bodies with fake NATO training docs

Security Affairs

The Excel file (XLS) is corrupted and cannot be opened by Microsoft Excel, it contains information about military personnel involved in the military mission “African Union Mission for Somalia,” but researchers were not able to determine if the information contained in the file is legitimate or not.

Promising Infusions of Cash, Fake Investor John Bernard Walked Away With $30M

Krebs on Security

Ben said Davies’ crew was even able to stop traffic in the downtown area in what was described as a quasi military maneuver so that Davies’ vehicle could proceed unobstructed (and presumably without someone following his car).

NEW TECH: Silverfort extends ‘adaptive multi-factor authentication’ via key partnerships

The Last Watchdog

Silverfort is the brainchild of a band of colleagues who toiled together in the encryption branch of Unit 8200 , the elite cybersecurity arm of the Israeli military. That was the problem company Co-Founder and CEO Hed Kovetz, and his fellow military compatriots set out to solve in the commercial arena upon discharge from Unit 8200 a few years ago.

Companies need CASBs now more than ever — to help secure ‘digital transformation’

The Last Watchdog

FedEx discovered this when an unsecured Amazon Simple Storage Service (S3) server — configured for public access — exposed thousands of FedEx customer records, including civilian and military ID cards, resumes, bills, and more. . CipherCloud’s founders, for instance, came from an encryption services background. The vendor has built a broad portfolio of CASB services around this encryption core. “We

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. Russia explicitly recruits folks already engaged in criminal activities, and once recruited, they are contracted and connected to military organizations for direction and oversight,” Bort told me.

Maze ransomware gang leaked Canon USA’s stolen files

Security Affairs

Maze ransomware operators have also breached the systems of the Xerox Corporation and stolen files before encrypting them. Maze ransomware operators have leaked online the unencrypted files allegedly stolen from Canon during a recent ransomware attack.

Did Maze ransomware operators steal 10 GB of data from Canon?

Security Affairs

Maze ransomware operators have also breached the systems of the Xerox Corporation and stolen files before encrypting them. An internal memo confirms that the prolonged outage suffered by Canon last week was caused by a ransomware infection, Maze operators took credit for it.

Crypto AG was spied for US, German intelligence agencies for decades

Security Affairs

Swiss authorities are investigating into allegations the company Crypto AG, a Switzerland-based maker of encryption devices, was a front company for the CIA and German intelligence.

The Dangers of Using Unsecured Wi-Fi Networks

Security Affairs

Data that travels over a public hotspot network is rarely encrypted. The answer is a virtual private network (VPN) which creates a private tunnel between your device and the internet and encrypts your data. BullGuard VPN for instance uses military grade encryption which would take more than a lifetime to crack. Isn’t public Wi-Fi great? If you’re having a tea or coffee in a cafe or restaurant you can check your emails and social media.

US administration requests $9.8B for cyber 2021 budget for the Department of Defense

Security Affairs

The amount requested for the Department of Defense in the “ DOD Releases Fiscal Year 2021 Budget Proposal ” is nearly the same one as last year for cyber operations that the US military will conduct in 2020. The US administration requested $9.8

Maze Ransomware gang breached the US chipmaker MaxLinear

Security Affairs

MaxLinear restored some of the systems using its backups, despite Maze Ransomware threatened to leak over 1TB of data allegedly stolen before encrypting the infected systems.

List of data breaches and cyber attacks in March 2020 – 832 million records breached

IT Governance

Randleman Eye Center says some files were encrypted in cyber attack (unknown). Medical and military contractor Kimchuk hit by ransomware (unknown). Financial companies embroiled in massive data leak after failing to encrypt info (500,000).

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

European Parliament votes to tighten up rules for the sale and export of surveillance and encryption technology. The term “ dual-use ” refers to technology that can be used for both peaceful and military aims.

Sales 86