Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Yellow Dots →

June 14, 2017 by Marc Handelman in Espionage, Information Security

The Tale Tell Dot, Leaker Breadcrumbs.

June 14, 2017 /Marc Handelman
Espionage, Information Security

Clouding Up →

June 01, 2017 by Marc Handelman in All is Information, Data Classification, Data Driven Security, Data Leakage, Data Security, Espionage, Government, Information Security, Information Technology, USNGA

via Gizmodo investigative reporter Dell Cameron, comes the astounding news of the systemic incompetence in properly handling secret documents and other artifiacts stored within the cloud (in this case, AWS S3 Buckets) by a well established contractor to the National Geospatial-Intelligence Agency (NGA). Certainly, a first-rate example of an Expanding Cloud of Lethal Stupidity (ECOLS).

Where does the organization in question fall within the Noel Burch Hierarchy of Competence model?. Should the culprits in this scenario be prosecuted? You be the judge. Truly astounding, indeed.

"A cache of more than 60,000 files was discovered last week on a publicly accessible Amazon server, including passwords to a US government system containing sensitive information, and the security credentials of a lead senior engineer at Booz Allen Hamilton, one of the nation’s top intelligence and defense contractors. What’s more, the roughly 28GB of data contained at least a half dozen unencrypted passwords belonging to government contractors with Top Secret Facility Clearance." - via Gizmodo reporter Dell Cameron

June 01, 2017 /Marc Handelman
All is Information, Data Classification, Data Driven Security, Data Leakage, Data Security, Espionage, Government, Information Security, Information Technology, USNGA

33c3, Jessy Campos' 'Visiting The Bear Den' →

January 19, 2017 by Marc Handelman in All is Information, Conferences, Espionage, Information Security, National Security
January 19, 2017 /Marc Handelman
All is Information, Conferences, Espionage, Information Security, National Security

Whom Done It →

January 01, 2017 by Marc Handelman in All is Information, Alternate Attack Analysis, Control Systems, Critical Thinking, Cybersecurity Competence, Defense, Electrical Engineering, Electronic Warfare, Incident Handling, Information Security, Espionage, Cybersecurity

In what wraps up to be a superbly crafted screed penned by Glenn Greenwald, laboring at The Intercept; in which, the Good Mr. Greewald details the perceived falsehoods swirling about the alleged Russian Intelligence Services hacks of the Burlington Vermont electrical generation utility. Today's Must Read.

January 01, 2017 /Marc Handelman
All is Information, Alternate Attack Analysis, Control Systems, Critical Thinking, Cybersecurity Competence, Defense, Electrical Engineering, Electronic Warfare, Incident Handling, Information Security, Espionage, Cybersecurity

Julian's Grounded

October 21, 2016 by Marc Handelman in Accountability, All is Information, Espionage, Information Security, United States of America, National Security

Ecuador's moves imply an effort to protect relations with the United States of America, in their termination of Assanges' internet access, citing attempts to influence elections. Certainly a prudent choice.

 

October 21, 2016 /Marc Handelman
Accountability, All is Information, Espionage, Information Security, United States of America, National Security

Wasn't Us... →

October 08, 2016 by Marc Handelman in All is Information, Attack Analysis, Espionage, Ethics, Feet of Clay, Information Security, Election Fraud, Election Infosecurity

Wasn't Us, Mr. President...

October 08, 2016 /Marc Handelman
All is Information, Attack Analysis, Espionage, Ethics, Feet of Clay, Information Security, Election Fraud, Election Infosecurity

Reportage →

September 15, 2016 by Marc Handelman in Ethics, Espionage, Crime

The House Permanent Select Committee on Intelligence has voted in the affirmative to adopt the investigative report on Edward Snowden... While the full report is classified as SECRET, the unclassified executive summary is not. Read it and Weep.

September 15, 2016 /Marc Handelman
Ethics, Espionage, Crime

Forbidden Research - Snowden's MIT →

August 01, 2016 by Marc Handelman in All is Information, Cryptography, Espionage, Bombast

Anti-espionage bombast? Nothing more than diatribe-like vaporware? You be the judge...

August 01, 2016 /Marc Handelman
All is Information, Cryptography, Espionage, Bombast
fire.jpg

"Unauthorized Code" In Juniper Firewalls, The Decryption Litany →

December 18, 2015 by Marc Handelman in All is Information, Intelligence, Espionage, Malware

via the inimitable Dan Goodin and writing at Ars Technica, wherein the good Mr. Goodin, in a display of remarkable restraint, tells the tale of the discovery of code (in this case not 'authorized') making itself at home in Juniper network componentry. In this case, firewall network componentry. Ooops

December 18, 2015 /Marc Handelman
All is Information, Intelligence, Espionage, Malware

Snowden Annointed, Europe Bends The Knee →

November 04, 2015 by Marc Handelman in All is Information, Information Security, Espionage

Apparently the European Union has nearly canonized Edward Snowden (in a non-binding piece of legislation). That is, of course, if the EU Parliament could annoint sainthood on a living person. Astounding.

November 04, 2015 /Marc Handelman
All is Information, Information Security, Espionage

Satellite Turla

September 17, 2015 by Marc Handelman in All is Information, Espionage, Space Based Attack Vector
September 17, 2015 /Marc Handelman /Source
All is Information, Espionage, Space Based Attack Vector

Blackhat 2015, Peculiarities of Nation-State Malware Research

September 16, 2015 by Marc Handelman in Information Security, Espionage, All is Information, Malware, Research, Security Research
September 16, 2015 /Marc Handelman /Source
Information Security, Espionage, All is Information, Malware, Research, Security Research

Espionage, The Intelligence Files

September 16, 2015 by Marc Handelman in All is Information, Espionage, Information Security, Security Heal Thyself

News, via Lucian Constantin, writing at PCWorld, details the discovery of a targeted group of LinkedIn Corporation (NasdaqGS: LNKD) users (in this case information security professionals) unwittingly involved in a focused intelligence/espionage campaign to garner discrete corporate information. Another case of social networks as the baseline method for intelligence gathering by nations-states and illicit non-governmental organizations. Aye me buckos! A treasure-trove thee awaits!

September 16, 2015 /Marc Handelman
All is Information, Espionage, Information Security, Security Heal Thyself

FireEye Exposed Years-Long APT Attack →

April 13, 2015 by Marc Handelman in All is Information, Espionage, Information Security, Intelligence, Malware

In astonishing (yet unsurprising) news - a discovery by FireEye Labs (and published under the company's Threat Research blog) - of a decade-long espionage campaign by miscreants thereto (in thi case, allegation point to entities in the Peoples Republic of China). FireEye has announced the availability of an indicators download on GitHub here; the full report is available here. Clear proof of why security professionals should be quite concerned, specifically those folks who rely on *deeply flawed and nearly useless enterprise anti-virus and anti-malware products employed throughout most, if not all, enterprise IT environments... Ladies and Gentlemen, Girls and Boys, behold the money quote:

"All of the key findings we examined in the report lead us to conclude that APT 30 is a professional, cohesive threat group with a long-term mission to steal data that would benefit a government, and has been successful at doing so for quite some time. Such a sustained, planned development effort coupled with the group’s regional targets and mission, suggest that this activity is state sponsored." - via FireEye Labs and the FireEye Threat Research blog

April 13, 2015 /Marc Handelman
All is Information, Espionage, Information Security, Intelligence, Malware

Equation Group →

February 23, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Espionage, Hardware Security, Information Security, Vulnerabilities, Malware

Going dark in 2014, the Equation Group's malware command and control servers have reportedly been migrated onto United States soil... This, after a nefariously successful run targeting thousands of victims in at least 40 countries. Focusing on vertical industry segments such as medical, telecom and aerospace sectors, including diplomatic missions, research institutions, military, governments, the Equation Groups' malware is apaprently fostering speculation as to connections between and betwixt US agencies.

"In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency." - via ArsTechnica's Dan Goodin

February 23, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Espionage, Hardware Security, Information Security, Vulnerabilities, Malware

Turing's Bletchley Notes Discovered

February 09, 2015 by Marc Handelman in All is Information, Computation, Cryptography, Espionage, Encryption, United Kingdom, Stuff of Genius

In an astonishing turn of luck, Alan Turing's Banbury Notes have turned up as roof insulation, at Beltchley Park's Hut 6. Reportedly, the notes were discovered during the renovation of the Hut in 2013.

February 09, 2015 /Marc Handelman
All is Information, Computation, Cryptography, Espionage, Encryption, United Kingdom, Stuff of Genius

iOS Espionage Tool Discovered

February 06, 2015 by Marc Handelman in All is Information, Crime, Espionage, Extortion, Hardware Security, Information Security, Malware, Vulnerabilities

In a typically fascinating post, over at TrendLabs, written by Lambert Sun, Brooks Hong (Mobile Threat Analysts) and Feike Hacquebord (Senior Threat Researcher), we learn of a recently  discovered iOS espionage tool. Ladies and Gentlemen, Girls and Boys, behold, the money quote:

"We found two malicious iOS applications in Operation Pawn Storm. One is called XAgent (detected as IOS_XAGENT.A) and the other one uses the name of a legitimate iOS game, MadCap (detected as IOS_ XAGENT.B). After analysis, we concluded that both are applications related to SEDNIT. The obvious goal of the SEDNIT-related spyware is to steal personal data, record audio, make screenshots, and send them to a remote command-and-control (C&C) server. As of this publishing, the C&C server contacted by the iOS malware is live." -  via TrendMicro's TrendLabs blog authors Lambert Sun, Brooks Hong and Feike Hacquebord.

 

February 06, 2015 /Marc Handelman
All is Information, Crime, Espionage, Extortion, Hardware Security, Information Security, Malware, Vulnerabilities

Harvard Data Privacy Symposium, Schneier and Snowden →

January 28, 2015 by Marc Handelman in Cryptography, Data Security, Espionage, Government, Information Security, Intelligence, Encryption
January 28, 2015 /Marc Handelman
Cryptography, Data Security, Espionage, Government, Information Security, Intelligence, Encryption

Winsborrow, Confessions of a Spy Hunter

January 26, 2015 by Marc Handelman in All is Information, Code, Espionage, Intelligence
January 26, 2015 /Marc Handelman
All is Information, Code, Espionage, Intelligence

Bureau Releases Additional Evidence of DPRK Complicity

January 08, 2015 by Marc Handelman in All is Information, Crime, Data Security, Espionage, Extortion, Government, Information Security, Intelligence, National Security, Network Security, Sarcasm

Ah, news outlets are reporting evidence release by the United States Department of Justice's Federal Bureau of Investigation; in this case detailing DPRK complicit activity in the now infamous SONY hack...

January 08, 2015 /Marc Handelman
All is Information, Crime, Data Security, Espionage, Extortion, Government, Information Security, Intelligence, National Security, Network Security, Sarcasm
  • Newer
  • Older