Mueller Report – Iconix Comments

On March 24, 2019, Attorney General Barr released his summary of the Mueller Report. While there has been a lot of coverage of the report, this passage about Russian interference has received little attention in the media: The second element involved the Russian government's efforts to conduct computer hacking operations designed to gather and disseminate information to influence the election. The Special Counsel found that Russian government actors successfully hacked into computers and obtained emails from persons affiliated with the Clinton campaign and Democratic Party organizations, and publicly disseminated those materials through various intermediaries, including WikiLeaks. Based on these activities, [...]

Spearphishers Attack MH17 Investigators

ThreatConnect has posted an excellent item detailing how somebody (Russia???) is using spearphising to undermine Bellingcat, an open source research firm that contributed to the MH17 investigation.   MH17 is the Malaysian Airlines airliner that someone shot down over the Ukraine on July 17, 2014, killing all 283 passengers and 15 crew on board. If you visit the Bellingcat website you will see why the Russians would not be pleased with its content. Knowing the details of how bad guys use spearphishing emphasizes the need to identify and avoid evil emails.

Cyberattack Evolution

Social engineering cyberattacks target people. The objective of these cyberattacks is to trick people into compromising their systems. In a recent webinar (registration required), Proofpoint demonstrated how the Dridex attackers modified their malicious attachment to improve its performance. For this attack to work, the user must activate scripts. The user interaction process evades malware detection over 99% of the time -- but it depends upon the user taking the required steps. How can the attacker convince the victim to enable scripts in the face of the system generated warning? The first generation attack in October 2014 presented only the system generated warning. [...]

2017-01-07T17:35:09-05:00December 22nd, 2015|Cybersecurity - General, spear phishing, Uncategorized|

Molerats Attack

FireEye is reporting on several new Molerats attacks which are targeting at least on major US financial institution and several European government organizations.  FireEye has linked these attacks to what it calls the "Gaza Hackers Team."  Spearphising bait used in the attacks uses items of interest to theMiddle East region, such as this biography of the new Egyptian President  Abdel Fattah el-Sisi:     FireEye reports that the Molerats are expanding their target list beyond Israeli and Palestinian targets. Targets now include: Palestinian and Israeli surveillance targets Government departments in Israel, Turkey, Slovenia, Macedonia, New Zealand, Latvia, the U.S., and the UK [...]

2017-01-07T17:35:15-05:00June 17th, 2014|SP Guard, spear phishing, Uncategorized|

19 Amazing Hacks

We thought we would end the year looking beyond the world of APT  and spearphishing.  Chris Poulin of IBM has assembled a list of 19 hacks that will keep you up nights.  Hacks of pacemakers, yachts, ATM's, insulin pumps and our favorite -- cars. In Comprehensive Experimental Analyses of Automotive Attack Surfaces the researchers discuss how: We discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft. From Comprehensive Experimental Analyses of Automotive Attack Surfaces, this  is [...]

2017-01-07T17:35:17-05:00December 31st, 2013|Uncategorized|

Phishing – Favorite Tool of State Affiliated Espionage

Verizon recently released their 2013 Data Breach Investigations Report. We encourage everyone who cares about network security to read the report. One statistic stands out from the rest: The bad guys need credentials to do their dirty work. The most effective way to get credentials is to steal them using spearphishing. At Iconix we are dedicated to offering a real solution to this problem. That solution is SP Guard.

2017-01-07T17:35:20-05:00May 3rd, 2013|SP Guard, spear phishing, Uncategorized|

The Importance of Being Current

The widely report attacks on banks in South Korea provide a strong lesson in the importance of using up-to-date software. As the Los Angeles Times reports, the attack was not technically sophisticated.  Nevertheless, as the New York Times reports, the attack was extremely effective in causing havoc in South Korea. Avast! has determined that this attack exploited non-current versions of Internet Explorer.   If the users had been using correctly configured versions of current software, instead of being damaged, the attack would have been stopped by the browser.

2017-01-07T17:35:20-05:00March 22nd, 2013|Uncategorized|

Director of National Intelligence warns US Senate — Cyber Is First On His List

Yesterday, March 12, James R. Clapper, the Director of National Intelligence, provided the United States Senate with the annual US INTELLIGENCE COMMUNITY WORLDWIDE THREAT ASSESSMENT.   The first threat in the report is Cyber. While we think it is important to read the entire discussion of Cyber, we think this excerpt provides a good summary of the situation: Foreign intelligence and security services have penetrated numerous computer networks of US Government, business, academic, and private sector entities. Most detected activity has targeted unclassified networks connected to the Internet, but foreign cyber actors are also targeting classified networks. Importantly, much of the nation’s [...]

2017-01-07T17:35:20-05:00March 13th, 2013|Uncategorized|