ISIL DEFACEMENTS EXPLOITING WORDPRESS VULNERABILITIES (FBI)

Centcom Hack

“Continuous Web site defacements are being perpetrated by individuals sympathetic to the Islamic State in the Levant (ISIL) a.k.a. Islamic State of Iraq and al-Shams (ISIS). The defacements have affected Web site operations and the communication platforms of news organizations, commercial entities, religious institutions, federal/state/local governments, foreign governments, and a variety of other domestic and international Web sites. Although the defacements demonstrate low-level hacking sophistication, they are disruptive and often costly in terms of lost business revenue and expenditures on technical services to repair infected computer systems.”

Read the full text of alert I-040715a-PSA here.

Advertisements

To Catch a Spy (Foreign Policy)

John Brennan CIA

“In the age of iris scans and facial recognition software, biometrics experts like to point out: The eyes don’t lie. And that has made tradecraft all the more difficult for U.S. spies.”

Read the full article here.

Lessons from the new threat environment from Sony, Anthem and ISIS (Brookings)

Featured Image -- 621

Cameron F. Kerry theorizes that:

  • Get ready for the next wave of attacks
  • Cybersecurity is about much more than hardening systems
  • Be careful with system administrators
  • It really comes down to information governance

Read the full article here.

Ex-NSA director: China has hacked ‘every major corporation’ in U.S. (CNN Money)

Centcom Hack

“The Chinese government — seeking to steal valuable secrets — has hacked into the computers at every major American company, according to the nation’s former spy director.

Mike McConnell, who served as director of national intelligence under President George W. Bush, made the comments during a speech at the University of Missouri on Thursday.”

See the full CNN Article here.

Hillary Clinton E-Mail Scandal

Clinton

Hillary Clinton, as Secretary of State, may have breached OPSEC.

Hillary Rodham Clinton exclusively used a personal email account to conduct government business as secretary of state, State Department officials said, and may have violated federal requirements that officials’ correspondence be retained as part of the agency’s record.”

See the full reports:

AP: http://www.washingtonpost.com/business/technology/clinton-ran-own-computer-system-for-her-official-emails/2015/03/04/083c624c-c269-11e4-a188-8e4971d37a8d_story.html

NYT: http://www.nytimes.com/2015/03/03/us/politics/hillary-clintons-use-of-private-email-at-state-department-raises-flags.html?smid=tw-bna&_r=3

WaPo: http://www.washingtonpost.com/blogs/the-fix/wp/2015/03/04/the-hillary-clinton-email-story-just-keeps-getting-worse-for-her/

The Cyber Action Team: Rapidly Responding to Major Computer Intrusions

Centcom Hack

“It can be a company’s worst nightmare—the discovery that hackers have infiltrated their computer networks and made off with trade secrets, customers’ personal information, and other critical data.

When such intrusions happen—and unfortunately, they occur frequently—the FBI can respond with a range of investigative assets, including the little-known Cyber Action Team (CAT). This rapid deployment group of cyber experts can be on the scene just about anywhere in the world within 48 hours, providing investigative support and helping to answer critical questions that can quickly move a case forward.”

See the full press release here.