Last Week In Cyber Security - 10-16-17
10/05/2017 – Russia is hacking the phones of NATO Soldiers
Russia is hacking the phones and social media accounts of NATO soldiers as, according to officials, a method of intimidation. Beneath the surface, those attacks also provide insight into troop levels at Baltic state bases, and could potentially serve as Trojan horses if the device then connects to a secure network.
10/05/2017 – Global Orgs Plan Data Migration Ahead of GDPR
Nearly half of global organizations intend to move their data in response to regulations like GDPR. However, the move toward stricter data regulations is thought to be beneficial to both the end customer and the organization’s bottom line. 74% of respondents to McAfee’s Beyond GDPR report believe that those companies that properly invest in data security and apply laws appropriately will attract additional customers.
Last week, a hacking gang designed and deployed malware on a Taiwanese bank’s servers and then utilized the SWIFT banking network to shift $60 million dollars to scattered bank accounts. While the majority of the funds have been recovered, this incident shows us that criminals are willing to take the time to customize bespoke malware to more effectively achieve their objectives. As with any cyber attack the most important step for criminals is effective reconnaissance and mapping of the targets infrastructure and defensive posture.
Due to its asymmetrical nature and the minimal opportunity for meaningful retaliation, cyber-warfare is quickly becoming the weapon of choice for North Korea. Used not only as a political and tactical strike tool, experts estimate that North Korean cyberheists may bring in more than $1 billion a year, or more than a 1/3 of the value of the nation’s exports. The danger of a paralyzing attack only increases as North Korean sophistication escalates their attack capabilities to a cyber-nuclear equivalent. North Korea has also shown us that nation-state attacks are currently being carried out and will continue to be carried out against private sector targets.
Information regarding the KRACK WPA2 vulnerability was publicly released by the attack vector’s discoverer, Mathy Vanhoef. Given the widespread use of WPA2, you and your business are at risk and need to update your wireless clients (computers, phones, IoT devices) and routers immediately. This article provides additional details about what you can do to protect yourself, and what exactly is at risk in the meantime. For full details on the attack vector from a technical perspective, check out the author’s website at the link below. Full findings here: