Threat Intelligence Blog

This weekly brief highlights the latest threat intelligenceThreat Intelligence: Evidence-based knowledge about an existing hazard designed to help organizations understand the risks common and severe external threats, used to inform decisions regarding the subject’s response. LookingGlass Cyber (n) - Actionable, relevant, and timely information that can help when assessing the security posture of an organization. A little more left. No no, that’s now too far... news to provide insight into the latest threats to various industries.

 

Insurance/Healthcare

“Seven Democratic senators urged the U.S. Justice Department on Wednesday to block two mergers of major health insurance companies, saying that the proposed deals would mean higher premiums and lower-quality healthcare for consumers.

The department is reviewing Aetna Inc.’s $33 billion plan to buy Humana Inc. and Anthem Inc.’s $48 billion proposal to buy Cigna Corp. If approved, the deals, both of which were announced last July, would reduce the number of national health insurance carriers from five to three.

– Insurance Journal

Financial Services

The Anonymous hackingHacking: The using of a computer and/or program in order to gain unauthorized access to data in a computer, system or network. LookingGlass Cyber (n) - not the axe swinging you’re thinking of. This type of hacking is unauthorized access to another computer, or system. collective is ramping up cyberattacks against stock exchanges and financial institutions across the group as part of phase three of its Operation Icarus campaign – currently dubbed Project Mayhem.

The previous phase, launched in May, was originally billed as a month-long attack against central banks that used distributed denial of service (DDoS) techniques to overwhelm servers with traffic. Now, it seems the operation is set to continue.

IB Times

Legal and Regulations

On June 15, in response to feedback from non-federal entities on guidance released in February, the Departments of Homeland Security (DHS) and Justice (DOJ) issued updated guidance for companies about sharing cyber threat indicators and defensive measures with the federal government under the CybersecurityCybersecurity: A set of security techniques that are designed to protect the integrity of computer systems, programs and data from theft and damage to their hardware, software or other information as well as the disruption and misappropriation of their services. LookingGlass Cyber (n) - Professional paid ninjas who protect the cyber world from cyber attacks. Everybody is doing it, but we have the double black belt with the Versace logo. So yeah, we’re really good. Information Sharing Act (CISA). The guidance explains how companies can share such information with the federal government, both through the principal channel created by DHS and through other routes allowed by CISA. The guidance also explains how to identify and share cyber defensive measures. Finally, it recaps the different kinds of legal authorization and liability protection CISA provides for these activities.

– CISA Sharing Guidelines

Law Enforcement

“The Senate rejected legislation Wednesday that would allow the FBI to search Americans’ Internet browsing histories and email records without a warrant.

Supporters invoked the Orlando massacre to push for the measure, saying it would help federal agents identify terrorist suspects and thwart future attacks. But privacy rights advocates said the bill’s sponsors were using the mass shooting as a way to expand government surveillance and get around constitutional protections against unreasonable searches and seizures.

– USA Today

Defense

“Ghost Squad Hackers dumped the data of US military personnel, according to a Facebook post published today.

The data is on a website on the Dark Web but was added to PasteBin after a few hours as well.

Group leaks data for around 3,400 servicemen

Dump #1 contains 433 records. […] Dump #2 contains 232 records. […] Dump #3 contains 2,750 records.”

Softpedia

Additional Posts

Coming at the Right Time: The 8th China/U.S. Strategic and Economic Dialogue

By: Emilio Iasiello, LookingGlass Cyber Threat Intelligence Group In early June, the Eighth Round ...

Weekly Phishing Report: June 27, 2016

PHISHING REPORT: TOP TARGETS Week of June 19 – June 25, 2016 In this week’s phishing report, we ...