Posted September 1, 2015
We publish this weekly threat intelligence brief keep you informed on the latest security incidents and threats. For security news throughout the day, follow us on Twitter. Subscribe to our blog to stay up-to-date on findings from our analyst research reports!
Indiana Attorney General Greg Zoeller said data breaches impacting medical information pose challenging and growing threats to the public. Medical identity theft can be very difficult to detect and correct, and is costly and potentially dangerous, he said. Zoeller warned about the risk of medical identity theft following the recent breach at Fort Wayne-based Medical Informatics Engineering (MIE) and its subsidiary NoMoreClipboard, which compromised medical and financial information of an estimated 1.5 million Hoosiers and 3.9 million people nationwide.
Researchers warned companies to stop using the Tor anonymizing network and completely block it from corporate networks to avoid being vulnerable to increasing Ransomware: A type of malicious software designed to block access to a computer system until a sum of money is paid. and distributed denial of service (DDoS) attacks. The researchers said that targeted ransomware is on the rise and that cybercriminals are increasingly making use of the Tor network to mask the origina of the Malware: Software that is intended to damage or disable computers and computer systems..
Legal & Regulations
“On August 25, 2015, the U.S. Department of Defense (DoD) issued interim rule DARS-2015-0039 (Rule), which impacts and relates to the security and reporting of cyber-attacks that affect cloud computing services contracted for by the DoD. While the Rule only impacts the DoD-specific Defense Federal Acquisition Regulation Supplement (DFARS) and not the overall Federal Acquisition Regulation (FAR), the FAR Council often adopts the DoD’s regulatory guidance. Therefore, it is likely that we soon will see a larger, broader expansion and adoption of this DFARS Rule.”
“Agora, a Dark Web marketplace used by nefarious actors to exchange drugs, weapons, and other illegal products, has decided to temporarily shut down due to a security weakness in the Tor anonymization network. The weakness in question was discovered by researchers at MIT and the Qatar Computing Research Institute (QCRI), and allows third-parties to deanonymize Tor traffic using malicious nodes added to the network, all with an 88% accuracy percentage.”
“PayPal has patched a serious vulnerability that could have been exploited by malicious actors to trick users into handing over their personal and financial details.The vulnerability, discovered by Egypt-based researcher Ebrahim Hegazy, was caused by a stored cross-site scripting (XSS) bug in the SecurePayments.PayPal.com domain. The domain is used for PayPal’s hosted solution, which enables online shop owners to allow buyers to pay with a payment card or their PayPal account, eliminating the need to capture or store sensitive payment information.”
– Security Week
The raid of former Subway pitchman Jared Fogle’s house in early July highlighted a growing trend in law enforcement: electronic sniffing dogs. During the raid, the FBI enlisted the help of a 2-year-old black Labrador named Bear, who is specially trained to sniff out electronics. Bear detects chemical compounds emitted from memory-storage devices like memory sticks and SD cards, and point them out to his handlers. In Fogle’s house, he helped find evidence related to the child-pornography charges.