Welcome to the Cyveillance Weekly Trends Report
Since threat intelligence is constantly evolving, we publish this weekly report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.
- For more than two years, pro-Iranian hackers penetrated some of the world’s most sensitive computer networks, including those operated by a US-based airline, auto maker, natural gas producer, defense contractor, and military installation. In many cases, “Operation Cleaver,” as the sustained Hacking: The using of a computer and/or program in order to gain unauthorized access to data in a computer, system or network. LookingGlass Cyber (n) - not the axe swinging you’re thinking of. This type of hacking is unauthorized access to another computer, or system. campaign is being dubbed, has attained the highest levels of system access of targets in 16 countries, researchers say. Compromised systems in the ongoing attacks include Active Directory Domain: A specified location where a set of activity or knowledge exists. For instance, an Internet domain is synonymous with a website address or URL where information can be made available. LookingGlass Cyber (n) - A fancy name for a URL or website. controllers that store employee login credentials, servers running Microsoft Windows and Linux, routers, switches, and virtual private networks. With more than 50 victims that include airports, hospitals, telecommunications providers, chemical companies, and governments, the Iranian-backed hackers are reported to have extraordinary control over much of the world’s critical infrastructure.
- A recent email phishing scam is targeting numerous organizations, including healthcare companies. More than 100 organizations have been attacked by cybercriminals for over a year, according to a report from security firm FireEye. FireEye calls the online attackers FIN4, and explains that they don’t infect their victims with Malware: A generic term for a software that is designed to disable or otherwise damage computers, networks and computer systems LookingGlass Cyber (n) - another type of cold that can destroy a computer by latching on to destroy other programs., but instead capture usernames and passwords to victims’ email accounts. From there they can read private email exchanges, and could use the information gleaned from this for trading stocks.
Legal and Regulations
- Federal District Judge Paul Magnuson has ruled that banks that issued credit and debit cards to customers whose data was stolen in the December 2013 Target data breach could continue to litigate claims against Target for negligence and violation of Minnesota’s Plastic Security Card Act (“MPCSA”), Minn. Stat. § 325E.64.
- Researchers at Trend Micro have come across a sample of a new point-of-sale (PoS) malware that appears to be under development. Designated by the security firm as TSPY_POSLOGR.K, the threat relies on multiple components to carry out its mission, which makes it similar to a recently discovered variant of the notorious BlackPoS malware (TSPY_MEMLOG.A).
- The FBI is warning businesses about a new hacking threat in the wake of a vast attack on Sony Pictures last week. The threat comes from the same type of malicious software that infected Sony’s computer systems, a law enforcement official told CNN.
- “Operation death click” is an advanced persistent threat targeting the US defense industry. It uses social engineering, malvertising and real-time bidding as its main tools to compromise victims’ computers, and uses digital advertising targeting technology to find victims. ODC is also defined as “micro-targeted malvertising” — a combination of malvertising with targeted attacks.
- The Department of Justice is creating a dedicated cybersecurity unit within its Criminal Division which will serve as a central hub for law enforcement officials. It will provide legal guidance regarding the criminal electronic surveillance statutes that cover complex cyber investigations. The unit is intended to ensure that law enforcement’s electronic surveillance tools are effectively used, while also protecting the privacy of Americans.
Cyveillance clients get access to the entire Weekly Trends Report, covering all of the above topics and much more. Contact us to find out how we can help your organization. And don’t forget to register for our upcoming webinar, Making the Business Case for Threat Intelligence.