Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Extracting Secrets →

March 15, 2018 by Marc Handelman in Artifical Stupidity, Secrets Purloined

Good news for those of you deeply entrenched (also known as enterprise-wide) in deep learning - deep machine learning, that is - when turned on it's artificial head, becomes artificial data loss in the form of secrets extracted... Today's non-secretive Must Read scholarly paper. Oops.

March 15, 2018 /Marc Handelman
Artifical Stupidity, Secrets Purloined

OPM, Le Nouveau Espionnage

July 13, 2015 by Marc Handelman in Information Security, National Security, Secrets Purloined

Michael Hayden, GEN USAF (RET), former Director of the United States Central Intelligence Agency 2006 – 2009, former Director of the United States National Security Agency 1999 – 2005, and First Principal Deputy Director of National Intelligence 2005 – 2006, has detailed the damage wrought with the OPM Breach, and in particular, adds a new, previously unforeseen outcome - the use of the purloined data to recruit spies...

July 13, 2015 /Marc Handelman /Source
Information Security, National Security, Secrets Purloined

SONY Investigation, Federal Bureau of Investigation Update

December 19, 2014 by Marc Handelman in All is Information, Crime, Information Security, Network Security, Secrets Purloined, Web Security

The United States Federal Bureau of Investigation has just issued an update to the Bureaus' ongoing investigation into the SONY [NYSE: SNE] breach, and the miscreants that committed the crime. The gist: North Korea has been implicated in the crime.

  • Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.
  • The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.
  • Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea. - via the Federal Bureau of Investigation, released 19 December 2014
December 19, 2014 /Marc Handelman
All is Information, Crime, Information Security, Network Security, Secrets Purloined, Web Security

MetaSnowden

May 13, 2014 by Marc Handelman in National Security, Cryptography, Espionage, Secrets Purloined

Via bon vivant, prolific speculative fiction author, and polemic poster of Items of Interest, What-Not and Fanciful Futures - Charlie Stross; comes a diatribe of a sort, in which, Serious Import is Conveyed, discussing the oft-described, little understood and illusive, Edward Snowden. Today's Must Read.

May 13, 2014 /Marc Handelman
National Security, Cryptography, Espionage, Secrets Purloined
evil_android.jpg

Android Applications, The Evil Within

May 08, 2014 by Marc Handelman in Security, Secrets Purloined, Information Security, Data Security, Application Security

Well constructed how-to, targeting the detection of evil Google Inc. (NasdaqGS: GOOG) Android applications.

May 08, 2014 /Marc Handelman
Security, Secrets Purloined, Information Security, Data Security, Application Security