This week in cyber conflict: August 22nd – August 26th

The week opened with more information on the Korean attacks. It seems the number of people may have been larger than some earlier reports. Of course, this is actually more about a breach than it is about an actual attack. A breach being the exposure of information and or information assets and an attack being an action that causes harm and or damage through the information infrastructures. The argument that a breach is an attack is an interesting one, but “if you have no expectation of privacy on the Internet”, and that privacy is violated “then there is no violation” is also a valid argument. I’m not saying I agree but these two positions are an interesting juxtaposition in the discussion of the breach versus attack.

By Tuesday more information on the release of a video by the Chinese showing an attack on a United States University was making the rounds. The Chinese would later take down the video but once on the Internet it was here to stay and copies of the video are still on YouTube. There are a couple of ways to look at the Chinese exposure of an attack on the United States in this manner. It could be argued that it shows a complete lack of comprehension of the ramifications of the issue (clueless) and it could be argued that they simply don’t care (arrogance). It would be interesting to argue that point back and forth based on other incidents that have occurred.

The article by Harry Harrison of BAE systems on the term cyber attack Wednesday is interesting. He bemoans the use of the word cyber attack instead of cyber infiltration. Here I was worried about the use of cyber warfare and trying to kill that off unless there was an article 5 violation and he’s worried about attack which could classify espionage. This is an interesting turn of events for me. To see somebody arguing for a reduction in the threat language and communication style to even less than I normally argue for…

The week closed out with more stories on medical device hacking and the criticism of the “cyber dragon” reports dealing with remote access tools in what McAffee researchers are calling advanced persistent threat scenarios. The remote access tools have been around for a long time and do not show anything new. The volume and character of the organizations that were attacked are interesting from patterns analysis view. All in all it was a pretty quiet week. If you don’t count the DC earthquake, impending hurricane and other associated horribleness like Congress returning to town.

Monday August 22nd

Review: ‘Counterstrike’ details US intelligence agencies’ cyberwar efforts in Iraq
San Jose Mercury News
By Tony Capaccio and Brendan McGarry The US military has hacked and temporarily disabled Iraqi insurgent and terrorist-based websites, a little-known tactic that’s part of a government “counterstrike” capability, according to a new book. 
See all stories on this topic »
Cyber attack affected 350000 customers: Epson Korea
Straits Times
 Korea Communications Commission alleged were from China attacked the Nate Internet portal and the Cyworld blogging site, both run by SK Comms, accessing the personal information of up to 35 million users in the country’s biggest cyber attack so far.
See all stories on this topic »
Businessman charged for hacking Hong Kong stock exchange website
Monsters and Critics.com
The 29-year-old suspect, whose name was not released, was arrested after the cyber attack on the Hong Kong Exchanges and Clearing website, which led to trading in some blue-chip shares including HSBC being suspended for half a day. 
See all stories on this topic »
PMO faces largest strategically targeted cyber attack
Daily News & Analysis
This was perhaps the most strategically targeted cyber attack on India’s key ministries, as officials from the ministries of home affairs, defence, external affairs and the armed forces began to receive similar calls asking them to shut down systems. 
See all stories on this topic »
SOMEONE ELSE’S WINDOWS: IHL and cyber warfare
Minda News
Below is the first installment of the transcript: Q: What do you mean by “cyber warfare” and why is it of concern to the ICRC? CD: The concept of cyber warfare is somewhat nebulous and different people appear to mean different things when they refer to 
See all stories on this topic »
‘Iran to hold cyber security maneuver’
Press TV
The remarks come amid reports that the Israeli military is planning a major cyber waragainst Iran by setting up a military cyber command. The new cyber command, which has been described as central to the “defense capability” of the Israeli regime, 
See all stories on this topic »

Press TV
Security beefed up to save CAO website
Herald.ie
By Cormac Murphy A NEW website security system installed by the CAO will repel any attempted repeat of last year’s cyber attack, it is hoped. Tens of thousands of Leaving Cert students will log on to the site on Monday to see what third-level courses 
See all stories on this topic »
Activists accuse Vietnam of cyber attack
AFP
HANOI — A US-based opposition group labelled “terrorist” by Vietnam on Monday blamed the communist government for a cyber attack that it said had crippled its website. “Beginning on August 13, hackers launched a sustained attack against www.viettan 
See all stories on this topic »

AFP
DNA investigation: PMO fights largest cyber attack
Daily News & Analysis
The attachment, unknown to the mail’s sender and the recipient, was a cyber attack carrying a malware designed to hack into as many systems as possible. As investigators from the National Technical Research Organisation (NTRO), India’s technical 
See all stories on this topic »
SOMEONE ELSE’S WINDOWS: IHL and cyber warfare (Second of two parts)
Minda News
The means and methods of cyber warfare are still incompletely understood, except presumably by the technical experts who develop and apply them. The development of new technologies is frequently classified. That being said, to determine whether and to 
See all stories on this topic »
Exchanges defend against cyber attack
Financial News
In July last year, a cyber attack using an advanced computer code called the Stuxnet worm targeted the Iranian nuclear programme. Security experts said the worm’s design was unprecedented in nature and the European Network and Information Security 
See all stories on this topic »
Hong Kong stock exchange website hacked
Memeburn
By Staff Reporter Honk Kong police have arrested a 29-year old man following a cyber attack on the city’s stock exchange website. The attack, the second in two days, halted the trading of shares in seven different companies. 
See all stories on this topic »
Ron Paul’s birthday ‘money bomb’ nets $1.6 million
Los Angeles Times
This happened despite a cyber-attack on the campaign Website, announced on Paul’s Facebook page, that shut it down for a few hours. A press release quoted campaign chairman Jesse Benton as saying, “Our campaign is surging, and today’s money bomb 
See all stories on this topic »

Tuesday August 23rd

China lets attack slip
iAfrica.com
A Chinese military TV show has inadvertently included a screenshot of a computer engaged in acyber-attack, using a US IP address. The screenshots appear for six seconds as stock footage, showing a cyber-attack against the website of the Falun Gong 
See all stories on this topic »
Has RSA hack sown seeds of token resistance?
Computing
by Stuart Sumner In February this year RSA, the security arm of information infrastructure firm EMC, announced that it had been the victim of a cyber attack and that critical information may have been stolen from its servers. At the time it was thought 
See all stories on this topic »
Cloud computing: If hackers want access, they’ll get it
Director of Finance online
Cloud providers that store client data on shared or virtual servers must ensure that private customer information cannot be accessed in the event of a cyber attack or a server being hacked, according to search specialists, Simplexo. 
See all stories on this topic »
Ron Paul’s website attacked during fundraising drive
Naked Security
However, a statement on Ron Paul’s Facebook page said that the website was under “cyber attack“, and that as a result people had not been able to make donations to the campaign’s war chest. The RonPaul2012.com website is under cyber attack
See all stories on this topic »
McAfee says criminal hackers will sell a million email addresses for $25
VentureBeat
The report also logs important details on the cybercrime underground, such as “price books” that determine the going rate for the purchase of large email address lists, acts of hacktivism, andcyberwar. In the US, a batch of 1 million email addresses 
See all stories on this topic »

Wednesday August 24th

Chinese PLA video shows cyber-attack software
Register
By Richard Chirgwin • Get more from this author It’s being called an accident, but it could also be a show of force: a piece of state propaganda from China shows an attack being launched against Falun Gong computers. New York-based newspaper The Epoch 
See all stories on this topic »
Medical-device users worry they could face cyber-attack | The Republic
The Republic
By Janet Moore Star Tribune (Minneapolis) MINNEAPOLIS — Hundreds of cyber-security geeks watched recently as Jay Radcliffe stood on a Las Vegas stage and hacked into his own insulin pump, disabling its life-saving therapy. 
See all stories on this topic »
Cyber Attack” — Why It’s Not a Great Phrase (But We’re Stuck With It)
Huffington Post
One of the phrases that I’ve been noticing more and more — particularly outside of the security world — is “cyber attack.” For example, in the past week the Chinese cyber security watchdog has claimed China was attacked nearly half a million times 
See all stories on this topic »
Consumer rights limited after cyber attack
WPTV
Copyright 2011 Scripps Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. BOYNTON BEACH, Fla. – Joan Brunswick of Boynton Beach has a problem on her hands. “I don’t know, that’s my problem,” she 
See all stories on this topic »

WPTV
Ron Paul’s website comes under cyber-attack during fund-raiser
100gf | Politics and Computers
Ron Paul’s 2012 presidential campaign website came under cyber-attack at the weekend, coincidentally (or not?) just as he launched a major fund-raising drive. However, Paul still managed to raise $1.8m during the ‘Money Bomb’ weekend, suggesting that 
See all stories on this topic »
HSBC South Korea Hit by Cyber Attack
eSecurity Planet
By eSecurityPlanet Staff A Turkish hacking group called Turkguvenligi recently defaced the Web site of HSBC South Korea. “Judging by the group’s stats in the Zone-H defacement database, it has previously attacked many popular South Korean websites and 
See all stories on this topic »
Geeks are the future of warfare
Defense Systems
Those geeks will be a critical part of the shift to cyber warfare that’s occurring as military forces become more networked. As the opening speaker today after Army CIO Maj. Gen. Susan Lawrence, Viola focused on the need for technologists who can 
See all stories on this topic »

Thursday August 25th

Chinese TV programme shows apparent cyber-attack on US website
The Guardian
Security experts suggested that was likely to be China. Last year the PLA announced it was setting up a special command to handle cyberwar threats, but said that the department was for defensive purposes. The US created a similar centre in 2009.
See all stories on this topic »

The Guardian
China rises: US warns Beijing is expanding its military power
Telegraph.co.uk
China is pouring money into aircraft carriers, missiles, cyber warfare and “space dominance”, a US Pentagon report has claimed. By Peter Foster, Beijing China will have a modern military capable of force-projection and sustained high-intensity combat
See all stories on this topic »

Telegraph.co.uk
Malicious Codes Concealed in Digital Images: Shady RAT Attacks
SPAMfighter News
Symantec researchers explored a massive cyber attack designed behind the “Operation Shady RAT”, where hackers concealed harmful viruses behind digital images and HTML files, reported InformationWeek on August 12, 2011. Operation Shady RAT can be 
See all stories on this topic »
Rival security firm cast doubt on McAfee’s report
Philippine Star
MANILA, Philippines – A rival internet security firm is questioning the credibility of security software company McAfee’ August 3 claim that it has uncovered the biggest, five-year cyber attack against international organizations. 
See all stories on this topic »

Friday August 26th

Experts: China TV programme shows government cyber-attack
The National
BEIJING // Producers of a Saturday evening show on China’s state televison may have inadvertently provided proof that the country’s military engages in cyber-attacks on foreign targets, an accusation that the government has always strenuously denied. 
See all stories on this topic »
Cyber Attack Targets Ron Paul Web Site
eSecurity Planet
By eSecurityPlanet Staff Ron Paul’s campaign Web site was recently targeted by a distributed denial of service attack that interrupted a fundraising drive. “This past weekend’s fundraising drive, organized on his RonPaul2012.com website, was supposed 
See all stories on this topic »
Chinese TV airs clip of cyberattack in progress
TG Daily
A TV program on a channel run by the Chinese government appears to have accidentally shown a military institute launching a cyber attack. The six-second clip was part of a documentary called ‘Military Technology: Internet Storm is Coming’ which was 
See all stories on this topic »

TG Daily
Medtronic insulin pumps vulnerable to hackers
Reuters
But company officials said that the about 200000 diabetes patients who use those devices need not worry about their safety because the risk of a cyber attack is extremely low. “This would have to be a premeditated activity by somebody trying to cause 
See all stories on this topic »
Pentagon warns India of Chinese build-up
Times of India
From deadly long-range nuclear missiles and an expanding blue-water Navy to potent space andcyber warfare abilities, China will have a “modern” military capable of prolonged high-intensity combat operations by the end of this decade. 
See all stories on this topic »
China’s state broadcaster shows 10-year-old army-labelled hacking software: report
Computer Business Review
The US security experts say that if the six-second clip is genuine, it could be a proof that China has been involved in cyber warfare for over 10 years, according to The Guardian. According to the report, CCTV showed the clip as part of a cybersecurity 
See all stories on this topic »
Websense warns small firms of ‘trickle down’ Web attacks
ITBusiness.ca
If you think your business is “too small to fall” victim to hacker techniques such as those used against Google in January 2010, the PlayStation network breach or the recent cyber attack on several Canadian government agencies, think again. 
See all stories on this topic »

ITBusiness.ca
Further reading: enter the Cyber-dragon
Financial Times (blog)
Friday’s best picks from the beyondbrics team: examining how India’s primary education is now on par with Afghanistan and a glimpse at China’s involvement in the raging Cyber-war and why Washington is slow to fight back. bb is the FT’s emerging markets 
See all stories on this topic »

Leave a Reply