Transparent Tribe Mounts Ongoing Spy Campaign on Military, Government

Threatpost

The group has added a management console and a USB worming function to its main malware, Crimson RAT. Government Malware Vulnerabilities apt crimson RAT Cyberattacks cyberespionage data theft military targets Spear Phishing spy campaign transparent tribe usbworm

The US Military Buys Commercial Location Data

Schneier on Security

Vice has a long article about how the US military buys commercial location data worldwide. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps, Motherboard has learned.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

Threatpost

The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets. Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […].

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. The government says the men disguised their hacking activity by routing attack traffic through 34 servers located in nearly 20 countries, using encrypted communications channels within Equifax’s network to blend in with normal network activity, and deleting log files daily to remove evidence of their meanderings through the company’s systems. commercial and government interests.

The British government aims at improving its offensive cyber capability

Security Affairs

Britain’s most senior cyber general declared that the UK has implemented an advanced offensive cyberwar capability that could destroy its enemies. Sanders explained that its cyber army was supported by the GCHQ intelligence agency to deliver offensive cyber capabilities.

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

“The data Our team viewed highly sensitive data exposing the personal details of government and military personnel, and their travel arrangements to locations around the world, both past and future.” The list of affected users includes the US government, military, and Department of Homeland Security (DHS). . “For the US government, alarm bells should be ringing. “The greatest risk posed by this leak was to the US government and military.

Maze ransomware operators stole data from US military contractor Westech

Security Affairs

Hackers have stolen confidential documents from the US military contractor Westech, which provides critical support for US Minuteman III nuclear deterrent. “It is unclear if the documents stolen by the criminals include military classified information, but files which have already been leaked online suggest the hackers had access to extremely sensitive data, including payroll and emails.”

EU Council sanctions two Russian military intelligence officers over 2015 Bundestag hack

Security Affairs

The Council of the European Union announced sanctions imposed on Russian military intelligence officers for 2015 Bundestag hack. “This cyber-attack targeted the parliament’s information system and affected its ability to operate for several days.

Germany and the Netherlands agreded to build TEN, the first ever joint military internet

Security Affairs

The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). Government officials from Germany and the Netherlands signed an agreement for the building of the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.”

Chinese Military Wants to Develop Custom OS

Schneier on Security

Citing security concerns, the Chinese military wants to replace Windows with its own custom operating system : Thanks to the Snowden, Shadow Brokers, and Vault7 leaks, Beijing officials are well aware of the US' hefty arsenal of hacking tools, available for anything from smart TVs to Linux servers, and from routers to common desktop operating systems, such as Windows and Mac. It's unclear exactly how custom this new OS will be. Or it could be something completely new.

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

Security Affairs

Chinese threat actors, tracked as Tropic Trooper and KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines. Chinese APT group Tropic Trooper, aka KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines, Trend Micro researchers reported. The threat actor targeted government offices, military, healthcare, transportation, and high-tech industries in Taiwan , the Philippines, and Hong Kong.

Military justice

InfoGovNuggets

A Brigadier General in charge defending the accused at Guantanamo was arrested on the order of a military judge. The General’s crime: allowing other civilian defense attorneys to resign after it was discovered the Government had bugged the room where the attorneys met with their clients. Do military judges have more power than either they think they have or that they should? How do you govern without reliable enforcement? A new oxymoron.

Russian military plans to replace Windows with Astra Linux

Security Affairs

Cyber security seems to subvert the globalization concept, governments are working to develop their own technology fearing possible espionage and sabotage activities of foreign states. The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. It provides data protectionup to the level of “top secret” in Russian classified information grade.”

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates

Security Affairs

Network data collected by the NetBlocks internet observatory confirm that Turkey has blocked access to social media as Idlib military crisis escalates. The access was first blocked via national provider Turk Telecom (AS9121), but later other service providers applied the government restrictions. “Although no broadcast ban has yet been issued to the public, it is understood that the measures are intended to protect details surrounding troop and equipment deployments.”

Machete cyber-espionage group targets Latin America military

Security Affairs

Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as Machete has stolen sensitive files from the Venezuelan military. The group has been active since 2010 and hit military organizations and other high-profile targets worldwide.

Alleged cyber attacks caused fire and explosions at nuclear and military facilities in Iran

Security Affairs

The media reported a fire at the Natanz nuclear enrichment site and an explosion at the Parchin military complex near Tehran, the latter is suspected to be a government center for the production of missiles. The Iranian government is attempting to downplay the incidents, government officials declared that the explosion at the Parchin military complex was caused by a gas leak while the fire at the Natanz plant only impacted a warehouse that was under construction.

Their War Too: U.S. Women in the Military During WWII. Part I

Unwritten Record

This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. It is true that millions of women were hired to work in factories and thousands were hired to work on farms through the Women’s Land Army program, but their options did not end there. The size of the global conflict was unprecedented and once the United States entered the war, its citizens had to mobilize quickly. It’s Your War, Too.

From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military

The Security Ledger

government: selling Chinese manufactured cameras and other gear to the U.S. Military, the Department of Energy and other government agencies that it claimed were "Made in the U.S.A". GovernmentA complaint unsealed by the Department of Justice on Thursday alleges a New York firm engineered a years-long scheme to deceive the U.S. Related Stories DoJ Charges Huawei Execs in Broad Indictment Spanning 10 Years of Criminal Activity Episode 165: Oh, Canada!

Another Massive Russian Hack of US Government Networks

Schneier on Security

The press is reporting a massive hack of US government networks by sophisticated Russian hackers. Several said national security-related agencies were also targeted, though it was not clear whether the systems contained highly classified material. […].

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.

Over 6,000 email accounts belonging to Taiwan government agencies hacked by Chinese hacked

Security Affairs

Chinese hackers have hacked thousands of Taiwan Government email accounts belonging at least 10 Taiwan government agencies, officials said. Chinese hackers have gained access to around 6,000 email accounts belonging to at least 10 Taiwan government agencies, officials said.

Texas Government Agencies Hit by Ransomware

Adam Levin

The local governments and agencies from twenty-three Texas towns were hit by a coordinated ransomware campaign last week. . The Texas Department of Information Resources (DIR) became aware of the ransomware campaign after being contacted by the municipal governments of several towns that were unable to access critical files. Although the DIR has released few details about the ransomware campaign, they did confirm that it originated from a single “threat actor.”

OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda

Security Affairs

US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. According to the documents, the US Cyber Command “successfully contested ISIS in the information domain,” its operations had a significant impact on online radicalization and recruitment of the terrorist organization. It was initially approved for a 30-day period in late 2016, but it was later extended.

The Nuremberg Trials, 75 Years Later

Unwritten Record

The International Military Tribunal , more commonly known at the Nuremberg trials , began this week 75 years ago in Nuremberg, Germany. Camera crews recorded practically every aspect of life in Nazi Germany, documenting everything from political rallies to military invasions.

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. The contractor claims the access being auctioned off was to old test systems that do not have direct connections to its government partner networks. “But it was all old stuff [that was] in our own internal test environment, and it is no longer valid.”

IT 190

LUCKY ELEPHANT campaign targets South Asian governments

Security Affairs

The NETSCOUT Threat Intelligence team uncovered a credential harvesting campaign tracked as LUCKY ELEPHANT targeting mostly South Asian governments. Security experts at NETSCOUT Threat Intelligence team uncovered a credential harvesting campaign, tracked as LUCKY ELEPHANT, targeting mostly South Asian governments. It is unclear exactly how effective and widespread this campaign is at gathering credentials, as well as how any compromised credentials are being used.”

Details on Uzbekistan Government Malware: SandCat

Schneier on Security

Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers.

France will not ban Huawei from its upcoming 5G networks

Security Affairs

French President Emmanuel Macron announced that France won’t ban the Chinese giant Huawei from its upcoming 5G telecommunication networks. It’s normal that … we want a European solution” because of the importance of “the security of our communication,” Macron told reporters.

IT 85

It is time to re-evaluate Cyber-defence solutions

Security Affairs

Just where is the Global Cyber-defense Market going, and why is it failing so spectacularly to protect the data assets of the largest and most heavily protected government institutions and corporate companies in the world. 17 th December 2020 – Vietnamese Government Security Authority.

Russian APT groups target European governments ahead of May Elections

Security Affairs

Russian APT groups are targeting European governments for cyber-espionage purposes ahead of the upcoming European elections. According to experts from FireEye, Russia-linked APT28 (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) and Sandworm Team (also TeleBots ) cyberespionage groups are targeting European governments for cyber-espionage purposes ahead of the upcoming European elections.

Turkish Hackers hit Greek Government websites and local stock exchange

Security Affairs

And now it’s threatening the conference on Libya “ The attacks were launched after Khalifa Haftar held talks in Athens, two days ahead of a peace conference in Berlin. Both Hatftar and the head of Tripoli’s UN- recognised government, Fayez al-Sarraj, are expected to attend the conference, while representatives of the Greek government have not been invited to the conference.

US Government is asking allies to ban Huawei equipment

Security Affairs

US Government is inviting its allies to exclude Huawei equipment from critical infrastructure and 5G architectures, reports the Wall Street Journal. The Wall Street Journal reported that the US Government is urging its allies to exclude Huawei from critical infrastructure and 5G architectures. Many countries are going to build 5G infrastructure, but the approach of their governments is completely different.

Google renounces AI weapons; Will still work with military

Information Management Resources

The company said it will keep working with the defense department in other areas, giving its cloud business the chance to pursue future lucrative government deals. Artificial intelligence Machine learning Google

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? The disturbing thing is that in North America and Europe more and more arguments are being raised in support of creating and maintaining encryption backdoors for government use. Here are excerpts edited for clarity and space: LW: What’s wrong with granting governments the ability to break encryption?

Forward Progress: Congress Requires DOD to Digitize DD-214 Military Service Records

Archives Blogs

By requiring the Secretary of Defense to provide veterans and former members of the Armed Services with machine readable and electronically transferable military service records by December 31, 2023, the Fiscal Year 2020 (FY 2020) National Defense Authorization Act (NDAA) supports digitization for one set of records important to Armed Service members, historians and the public interest.

China's AI Strategy and its Security Implications

Schneier on Security

Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government, and military. Gregory C. There are numerous security -- and national security -- implications

UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia

Security Affairs

Britain and the United governments blame Russia for being behind a destructive cyber attack that hit Georgia during 2019. The governments of Britain and the US declared that Russia’s military intelligence service GRU is behind the massive cyber attack that hit Georgia during 2019. The government officials attribute the attack to the nation-state actor tracked as Sandworm , BlackEnergy , Telebots , and VoodooBear. It resulted in a fifth of Kyiv losing power for an hour.

At least 23 Texas local governments targeted by coordinated ransomware attacks

Security Affairs

At least 23 local governments were impacted by a wave of ransomware attacks that according to the experts are the result of a coordinated effort. Texas is the victim of an ongoing wave of ransomware attacks that are targeting local governments. At least 23 local government organizations were impacted by the ransomware attacks, the Department of Information Resources (DIR) is currently investigating them and providing supports to mitigate the attacks.

Poland to establish Cyberspace Defence Force by 2024

Security Affairs

Poland announced it will launch a cyberspace defense force by 2024 composed of around 2,000 soldiers with a deep knowledge in cybersecurity. The Polish Defence Ministry Mariusz Blaszczak has approved the creation of a cyberspace defence force by 2024, it will be composed of around 2,000 soldiers with deep expertise in cybersecurity. The news was reported by AFP, Blaszczak announced that the cyber command unit would start its operations in 2022.

What Role Government?

John Battelle's Searchblog

( image ) As I begin to dig into the work of my next book, I’ve found myself thinking about politics and government far more than I anticipated. For initial thoughts and stats, see Government By Numbers: Some Interesting Insights ). While the body politic was always going to be one of the main pillars of the book , I didn’t expect it to push itself to the foreground so quickly. There, our identity is not managed by the government.