TOPIC: HACKERS


 

SOURCE:  cyberdefensemagazine.com

Security experts from ESET security firm have spotted an espionage toolkit dubbed SBDH that was used by threat actors in hacking operations targeting government organizations in Europe.

The research observed infections in many countries, including the Czech Republic, Hungary, Poland and Slovakia, and Ukraine.

The SBDH toolkit was designed to steal sensitive data from victim’s machines, experts from ESET have already detected other sample of the toolkit over the past year, hackers exploited it in attacks against government and public institutions.

Threat actors targeted organizations focused that specialize in economic growth and cooperation.

“Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit. Using powerful filters, various methods of communication with its operators and an interesting persistence technique, it aims to exfiltrate selected files from governmental and public institutions, which are mostly focused on economic growth and cooperation in Central and Eastern Europe.” reported ESET in a blog post.

TOPIC: OH, SO COOL!

 

 

 

SOURCE:  defenseone.com

Analysts are using what they call a ’tangible landscape' to predict the path of everything from forest fires and floods to movement of adversaries in war games.

The Defense Department is playing around with a shape-shifting, color-changing sandbox to limit the carnage from the next deadly flood, wildfire or other catastrophe. 

That is the promise behind the “Tangible Landscape.” 

Made up of kinetic sand, a toy that feels like the stuff on the beach but has the consistency of Silly Putty, the system’s miniature bridges, lakes and other structures morph—or disappear—when a finger crushes critical infrastructure. 

Our goal is to provide planners with an intuitive, collaborative tool to design more resilient environments, identify and better understand where the critical, high-risk locations are,” said Helena Mitasova, associate director of geovisualization at North Carolina State University.

NC State supplied the Tangible Landscape system that now sits inside the military’s spy mapping agency. The university’s free GRASS computer program combines changes in the playdough with sets of geospatial data, like population density and pipeline locations, to predict a change’s influence on surroundings.

TOPIC: HACKING & MALWARE

 

 

 

SOURCE: threatpost.com

Ransomware called Zepto is raising concerns with security experts because of its close ties to the more mature and prolific Locky ransomware. Zepto was spotted about a month ago but a recent wave of spam containing Zepto-laced attachments detected on June 27 is heightening fears of widespread infections.

“We are watching Zepto very carefully. It’s closely tied to Locky, sharing many of the same attributes,” said Craig Williams, senior technical leader and global outreach manager at Cisco Talos.  “There is still a lot to learn about Zepto. As far as we can tell, it’s either a new variant of Locky or an entirely new ransomware with many copycat Locky features,” he said. Related Posts 655,000 Healthcare Records Being Sold on Dark Web June 28, 2016 , 10:00 am New CryptXXX Can Evade Detection, Outsmart Decryption Tools June 27, 2016 , 11:24 am Threatpost News Wrap, June 24, 2016 June 24, 2016 , 9:00 am

Cisco Talos, which published its findings on the ransomware Thursday, said 137,731 spam messages have been found this week that contain the Zepto malicious attachment. The Zepto name comes from the .zepto suffix used as the extension for encrypted files.

Technical details of Zepto are similar to Locky in many ways, said Warren Mercer, security researcher for Cisco Talos. Comparisons include the type of RSA encryption keys used by Locky, the types of files Zepto and Locky leave behind and similarities to the ransom text.

“We are moving quickly and pulling apart as many samples as we can to understand if this is still Locky or something unique,” Mercer said.

TOPIC: CYBERSECURITY


 


SOURCE:  militaryaerospace.com (courtesy of Artemus FAN, Steve Jones)

How much do you trust and rely on your personal GPS satellite navigation device to tell where you are or how to get to where you're going? It may be subject to GPS jamming.

If you depend on GPS a lot, then there's a good chance your trust is misplaced -- and that's just for finding a friend's house, a restaurant, or the newest trendy bar.

Experts are starting to delve into how well the Global Positioning System (GPS) satellite navigation network resists the effects of electronic jamming -- intentional or accidental. The emerging answer is not very well.

RF and microwave experts at Spirent Communications plc in Crawley, England, have been looking into electronic disruption to GPS signals for the past year and have come to some startling conclusions.

"We have been looking for disruptions to GPS around the world, and have found quite a lot of interference events -- and some deliberate ones as well," says Guy Buensel, PNT technologist at Spirent, a multinational telecommunications test and measurement company.