ISIL DEFACEMENTS EXPLOITING WORDPRESS VULNERABILITIES (FBI)

Centcom Hack

“Continuous Web site defacements are being perpetrated by individuals sympathetic to the Islamic State in the Levant (ISIL) a.k.a. Islamic State of Iraq and al-Shams (ISIS). The defacements have affected Web site operations and the communication platforms of news organizations, commercial entities, religious institutions, federal/state/local governments, foreign governments, and a variety of other domestic and international Web sites. Although the defacements demonstrate low-level hacking sophistication, they are disruptive and often costly in terms of lost business revenue and expenditures on technical services to repair infected computer systems.”

Read the full text of alert I-040715a-PSA here.

Advertisements

Lessons from the new threat environment from Sony, Anthem and ISIS (Brookings)

Featured Image -- 621

Cameron F. Kerry theorizes that:

  • Get ready for the next wave of attacks
  • Cybersecurity is about much more than hardening systems
  • Be careful with system administrators
  • It really comes down to information governance

Read the full article here.

Ex-NSA director: China has hacked ‘every major corporation’ in U.S. (CNN Money)

Centcom Hack

“The Chinese government — seeking to steal valuable secrets — has hacked into the computers at every major American company, according to the nation’s former spy director.

Mike McConnell, who served as director of national intelligence under President George W. Bush, made the comments during a speech at the University of Missouri on Thursday.”

See the full CNN Article here.

The Cyber Action Team: Rapidly Responding to Major Computer Intrusions

Centcom Hack

“It can be a company’s worst nightmare—the discovery that hackers have infiltrated their computer networks and made off with trade secrets, customers’ personal information, and other critical data.

When such intrusions happen—and unfortunately, they occur frequently—the FBI can respond with a range of investigative assets, including the little-known Cyber Action Team (CAT). This rapid deployment group of cyber experts can be on the scene just about anywhere in the world within 48 hours, providing investigative support and helping to answer critical questions that can quickly move a case forward.”

See the full press release here.

N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say (NYT)

James Clapper, DNI, courtesy of the NYT

James Clapper, DNI, courtesy of the NYT

 

This article contends that the National Security Agency gained access to North Korea internet connections through China as early as 2010. Moreover, the information gained from this act led the Federal Bureau of Investigation and President Barack Obama to blame North Korea for the Sony hack.  Moreover Director of National Intelligence James Clapper blamed the commander of the Reconnaissance General Bureau, Kim Yong-chol, whom he had dinner with in Pyongyang, as the leader behind the hacking attack,

See the full report at: http://www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html?_r=0

OSINT – Syrian Electronic Army (SEA)

SEA Pages:

Ello: https://ello.co/syrianelectronicarmy

Instagram: @Official_SEA2

Pinterest: OfficialSEA.

Twitter: @Official_SEA16

VK: vk.com/syrianelectronicarmy

Web: http://sea.sy/index/en

Youtube: SEAOfficialChannel.https://www.youtube.com/user/SEAOfficialChannel/feed

Government:

Department of Homeland Security. “Syrian Electronic Army.” Accessed January 19, 2015.

State Department. “Syrian Electronic Army.” Accessed January 19, 2015.

Think Tanks / Academic:

AEI. “Syrian Electronic Army.” Accessed January 15, 2015.

Brookings. “Syrian Electronic Army.” Accessed January 15, 2015.

CFR. “Syrian Electronic Army.” Accessed January 15, 2015.

CRS. “Geopolitical and Cyber Risks to Oil and Gas.” November 14, 2013. Accessed January 15, 2015.

CRS. “Cyber Operations in DOD Policy and Plans: Issues for Congress.” January 5, 2015. Accessed January 15, 2015.

CSIS. “Syrian Electronic Army.” Accessed January 15, 2015.

CTC. “Syrian Electronic Army.” Accessed January 15, 2015.

  1. Understanding the Syrian Electronic Army (SEA).” April 24, 2013. Accessed January 18, 2015.

ICG. “Syria.” Accessed January 15, 2015.

Infowar Monitor. “The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army.” May 30, 2011. Accessed January 18, 2015.

TRAC. “Syrian Electronic Army.”  Accessed January 15, 2015.

Global Media:

Al Jazeera. Syrian Electronic Army.” Accessed January 15, 2015.

BBC. Syrian Electronic Army” Accessed January 15, 2015.

BBC. “Who is the Syrian Electronic Army?” April 25, 2013. Accessed January 18, 2015.

CNN. Syrian Electronic Army.” Accessed January 18, 2015.

CNN. What is the Syrian Electronic Army?” August 28, 2013. Accessed January 18, 2015.

Foreign Policy. “Syrian Electronic Army.” Accessed January 18, 2015.

The Guardian. “Syrian Electronic Army.” Accessed January 18, 2015.

NPR. Syrian Electronic Army.” Accessed January 18, 2015.

NPR. Outage Summer: What To Know About The Syrian Electronic Army.” August 27, 2013. Accessed January 18, 2015.

NYT. Hunting for Syrian Hackers’ Chain of Command.” May 17, 2013. Accessed January 18, 2015.

NYT. Syrian Electronic Army.” Accessed January 19, 2015.

Reuters. Syrian Electronic Army.” Accessed January 19, 2015.

VICE News. “Syrian Electronic Army.” Accessed January 19, 2015.

VOA. Syrian Electronic Army.” Accessed January 19, 2015.

WaPo. “Syrian Electronic Army.” Accessed January 19, 2015.

Wired. Syrian Electronic Army.” Accessed January 19, 2015.