Author: rescue@crimefire.in

  • UK strikes seven Russians with first-ever joint cyber crime sanctions – TNW

    Less than 3 weeks until TNW València 🇪🇸 Uncover all things tech in the heart of Spain
    Ioanna is a writer at TNW. She covers the full spectrum of the European tech ecosystem, with a particular interest in startups, sustainabili Ioanna is a writer at TNW. She covers the full spectrum of the European tech ecosystem, with a particular interest in startups, sustainability, green tech, AI, and EU policy. With a background in the humanities, she has a soft spot for social impact-enabling technologies.
    In a coordinated action with US authorities, the UK has imposed sanctions on seven Russian cyber criminals associated with the deployment of the Conti and Ryuk ransomware as well as the Trickbot banking trojan. This follows a thorough investigation led by the National Crime Agency (NCA) and marks the UK’s first-ever joint cyber crime sanctions.
    According to the British government, ransomware is a “tier one national security threat” that’s increasingly used to attack businesses and public sector organisations.
    Ransomware groups known as Conti, Wizard Spider, UNC1878, Gold Blackburn, Trickman, and Trickbot have been responsible for the deployment of ransomware strains including Conti, Ryuk, and Trickbot.
    The groups target organisations they expect would pay the most and time their attacks to cause the maximum damage. Conti and Ryuk alone have affected 149 UK individuals and businesses, extracting at least an estimated £27 million.
    Join us at TNW Conference June 15 & 16 in Amsterdam
    Conti’s recent victims in the UK include the Scottish Environment Protection Agency, food distribution firm Reed Boardall, Cleveland Council, and forensic laboratory Eurofins.

    “These criminals and those that support them are not immune to UK action.
    And although the group was disbanded in May 2022, government reporting suggests that members continue to be involved in threatening UK security with new ransomware strains.
    “The sanctions are the first of their kind for the UK and signal the continuing campaign targeting those responsible for some of the most sophisticated and damaging ransomware that has impacted the UK and our allies,” Graeme Biggar, NCA’s General Director, said in a statement.
    “The United States and the United Kingdom are taking coordinated action targeting cyber criminals who launched assaults against our critical infrastructure,” Antony J. Blinker, US Secretary of State, highlighted in an associated press release. “We will continue to work with the United Kingdom and with other international partners to expose and disrupt cyber crime emanating from Russia.”
    The people sanctioned include the following individuals:
    The seven individuals are now subject to travel bans and asset freezes. In addition, making funds available to them, such as paying ransomware — including crypto assets — has been strictly prohibited.
    The US Treasury Department warned that “any foreign financial institution that knowingly facilitates a significant transaction, or provides significant financial services for any of the individuals or entities designated today could be subject to US correspondent or payable-through account sanctions.”
    Through their collaboration, the UK and US authorities said they will continue to expose cyber criminals associated with the ransomware groups and crack down on their activities, aiming to reinforce their cyber security.
    Get the most important tech news in your inbox each week.
    TNW is coming to València in March, join us now →
    The heart of tech
    Copyright © 2006—2023, The Next Web B.V. Made with <3 in Amsterdam.

    source

  • FCC Seeks Comment on Proposed Updates to TRS Data Breach … – Federal Communications Commission

    Jump to navigation
    Comments Due:  February 22, 2023
    Reply Comments Due: March 24, 2023
    On January 6, 2023, the FCC released a Notice of Proposed Rulemaking that seeks to update and strengthen the Commission’s rules concerning data breaches implicating customer proprietary network information (CPNI), including breaches impacting Telecommunications Relay Service (TRS) providers. On January 23, 2023, a summary of the Notice was published in the Federal Register, which establishes the comment due dates.
    More specifically, with respect to TRS, the item proposes:
    Additionally, the item seeks comment on the following issues as they relate to TRS providers:
    Interested parties may file comments by accessing the Electronic Comment Filing System at https://www.fcc.gov/ecfs/filings.  All filings must reference WC Docket No. 22-21. People with disabilities who need assistance to file comments may request assistance by email to FCC504@fcc.gov
    Links to the item:
    URL:  https://www.fcc.gov/document/fcc-proposes-updated-data-breach-reporting-requirements  
    Text:  https://docs.fcc.gov/public/attachments/FCC-22-102A1.txt
    Word:  https://docs.fcc.gov/public/attachments/FCC-22-102A1.docx  
    PDF:  https://docs.fcc.gov/public/attachments/FCC-22-102A1.pdf
    For general information about CPNI, visit: https://www.fcc.gov/enforcement/areas/privacy.  For specific information about this item, contact Melissa Kirkel, Competition Policy Division, Wireline Competition Bureau, at (202) 418-7958 or melissa.kirkel@fcc.gov.  Individuals who use videophones and are fluent in American Sign Language (ASL) may call the FCC’s ASL Consumer Support Line at (844) 432-2275 (videophone).

    source

  • Maryland to train 100 state workers in cybersecurity – StateScoop

    Emerging Tech: The Future of State Local & Higher ED IT – A StateScoop and EdScoop Special Report

    Data and Analytics – A StateScoop and EdScoop Special Report

    Cyber Protection Starts With Workforce – Presented by Proofpoint
    Cast your votes now for the 2023 StateScoop 50 Awards.
    By

    With recruitment and retention concerns dominating the state-government IT community, Maryland officials said this week that a workforce development program will fund cybersecurity training for up to 100 state technology employees.
    The EARN Maryland program, run by the state Department of Labor, will send selected employees to the Baltimore Cyber Range for basic or advanced cybersecurity courses. The training is being overseen by the Maryland Department of Information Technology, which is aiming to involve more tech workers across state government in incident response or risk assessment and security architecture.
    Chip Stewart, the state’s chief information security officer, told StateScoop he hopes to find 50 candidates each for the two tracks. The more basic track is open to IT workers in any state agency who’ve expressed interest in picking up cyber skills and have at least one year on the job, he said.
    “How do we turn them into a cybersecurity person?” Stewart said. “Not an elite hacker or expert, but someone who can help support cyber operations.”
    Employees on that track will take about four weeks of classes, after which they’ll be able to play support roles in security operations centers. Stewart said it’s urgent that as many IT pros as possible gain security experience.
    “Everyone in IT has to be a cyber person,” he said. “Cybersecurity is a team sport, but it’s so cheesy. Everyone contributes to the posture. If the IT people can be first responders, they can identify if something bad is happening and know how to report effectively. It helps minimize the risk.”
    The more advanced track, Stewart said, is for employees who’ve had at least five years of experience in IT or cybersecurity and want to become Certified Information Systems Security Professionals, an industry credential that requires coursework and an exam.
    “My hope anyone in a technology leadership role would do this,” he said.
    A state CISO survey published earlier this month found many of Stewart’s colleagues nationwide are worrying about their ability to hire new workers. Melissa Leaman, Maryland’s assistant secretary of finance and administration, said recently that in addition to the private sector, the state faces competition in the labor market from the federal government, Virginia and the District of Columbia.
    Stewart said the situation’s not quite as severe in his own office, but that the new training program could fill gaps.
    “I think everyone’s bought into the mission we have,” he said. “You’re protecting the systems that support your home. The next step for us is establishing a program that helps raise the collective cyber capability of the state across the workforce.”
    Stewart said within a day of the training opportunity being announced to state workers, he’d even gotten interest from people working outside of technology.
    “I got a call from a woman who is not an IT worker and was interested,” he said. “I said the first thing you need to do is get into IT. We’re going to get her looking at IT jobs. Let’s get her that first year of experience.”

    source

  • Top Five Cyber Crimes in 2023 – Modern Diplomacy

    Published
    on
    By
    With the rise of technology, the nature of crime has also transformed. Crime becomes more lethal and untraceable. Cyber security expert warns about the new nature and domain of cybercrime in 2023.
    Cyber Attack on Hospital
    Cyber-attacks on hospital systems can have serious consequences, as they can disrupt the delivery of healthcare and potentially put patients’ lives at risk. Hospitals are often targeted by cybercriminals because they may have valuable personal and financial information about patients and because the consequences of a successful attack can be severe.
    In a cyber-attack on a hospital system, the attacker may try to gain unauthorized access to the hospital’s computer systems and steal or manipulate data, disrupt the operation of medical devices, or disrupt the delivery of healthcare. The attack may also involve ransomware, where the attacker holds the hospital’s data hostage and demands a ransom to restore access.
    It is important for hospitals to have strong cybersecurity measures in place to protect against cyber-attacks. This may include measures such as firewalls, antivirus software, and secure passwords, as well as ongoing training for staff on how to recognize and prevent cyber-attacks.
    Scanning QR Code
    Scanning a QR code has the potential to compromise your personal data if the QR code is linked to a malicious website or if it is used to steal your personal information. It’s important to be cautious when scanning QR codes, especially if they are from unfamiliar sources.
    It’s also a good practice to check the URL of the website that the QR code leads to, to make sure it is a legitimate website and not a phishing site or other type of scam.
    It’s also a good idea to use a QR code scanner app that checks for safety and has some sort of building security checks, also updating your device and QR scanner app on regular basis will make sure you have the latest security patches.
    It’s a good practice to avoid scanning QR codes from untrusted sources and only scan QR codes from sources that you know and trust.
    Cyber-attack on Supply Line
    A cyber-attack on a supply chain can have significant consequences for the affected organizations and their customers. These types of attacks can disrupt the flow of goods and services, leading to delays, lost revenue, and potentially even damage to a company’s reputation.
    In a supply chain cyber-attack, attackers typically target the systems and networks that companies use to manage and track their inventory, orders, and shipments. For example, an attacker might target a company’s enterprise resource planning (ERP) system, which is used to manage inventory and production, or a transportation management system (TMS), which is used to track shipments and deliveries.
    The attacker can gain access to these systems through a variety of methods, such as exploiting vulnerabilities in software, phishing scams, or other forms of social engineering. Once they have access, they can steal sensitive information such as customer data, financial data, and intellectual property, or disrupt the normal operation of these systems. This can lead to delays in deliveries, stakeouts, and unplanned downtime in production.
    It’s important for organizations to take steps to protect their supply chains from cyber-attacks, by implementing measures such as security awareness training for employees, regular security audits and penetration testing, and the use of advanced security technologies such as firewalls, intrusion detection, and prevention systems, and security information and event management (SIEM) tools.
    In addition, organizations should also be proactive in monitoring for signs of an attack and be ready with incident response plans, which can help minimize the damage of a successful attack and help with a faster recovery.
    Cyber-attack on electric cars/vehicle
    A cyber-attack on an electric vehicle (EV) can have serious consequences, potentially compromising the safety and privacy of the vehicle’s occupants, as well as the integrity of the EV’s systems and networks.
    One way that attackers may target an EV is by exploiting vulnerabilities in the vehicle’s electronic control units (ECUs), which are the computer systems that control various aspects of the vehicle, such as the powertrain, brakes, and steering. Attackers could potentially take control of these systems and manipulate the vehicle’s behavior, potentially causing accidents or other dangerous situations.
    Another way attackers may target an EV is by exploiting vulnerabilities in the vehicle’s communication systems, such as the onboard diagnostics (OBD) port, or wireless connectivity systems, such as Bluetooth or cellular networks. This can allow attackers to gain access to the vehicle’s systems and data and potentially steal sensitive information such as location data, driving history, and personal information of the occupants.
    To mitigate the risk of cyber-attacks on EVs, it’s important for manufacturers to design and build vehicles with security in mind. This includes the use of secure coding practices, regular software updates to address known vulnerabilities, and the use of robust security protocols to protect the vehicle’s communication systems.
    It’s also important for EV owners to be aware of the risks and take steps to protect their vehicles. This can include keeping their vehicles’ software up to date, being cautious about connecting their vehicles to unfamiliar networks or devices, and not leaving sensitive information such as personal data in the vehicle.
    As the trend of Electric cars is getting more popular and advancement in technology is increasing, Cybersecurity in Electric cars will be a crucial area to ensure the safety and security of both vehicles and their occupants.
    Cyber-attack on Electric Grid
    A cyber-attack on an electric grid can have serious consequences, potentially causing widespread power outages and disruptions to the electricity supply. Electric grids are complex systems that rely on many interconnected components, including power generators, transmission and distribution systems, and control systems.
    One way that attackers may target an electric grid is by exploiting vulnerabilities in the control systems, such as supervisory control and data acquisition (SCADA) systems and other industrial control systems (ICS) that are used to monitor and control the grid. Attackers can use malware, phishing scams, or other techniques to gain access to these systems and manipulate the grid’s behavior, potentially causing power outages or other disruptions to the electricity supply.
    Another way that attackers may target an electric grid is by exploiting vulnerabilities in the communications systems that are used to transmit data and control signals between different parts of the grid. This could include exploiting vulnerabilities in the networks that connect power plants, substations, and other grid components, or by targeting the systems used to manage the grid’s transmission and distribution systems.
    To mitigate the risks of cyber-attacks on electric grids, it’s important for utilities and grid operators to take a proactive approach to cybersecurity. This includes implementing robust security measures such as firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) tools. Additionally, regular security audits, penetration testing, and employee training on cybersecurity are important.
    It’s also important for government agencies, utilities, and grid operators to work together to share threat intelligence and coordinate incident response efforts. Furthermore, Industry Standards and regulations such as NIST-CIP, IEC62443, and others provide guidelines for protecting industrial control systems like those used in the electric grid.
    Given the critical importance of electric grids to our daily lives, ensuring their cybersecurity is a vital step towards protecting our communities and infrastructure from potential cyber threats.
    The Curious case of Estonian Cyber Capabilities: Lessons for Pakistan
    Is Russia losing the cyber warfare?
    Muhammad Shahzad Akram is a Research Officer at the Center for International Strategic Studies (CISS) AJK. He holds an MPhil degree in International Relations from Quaid I Azam University, Islamabad.
    Maritime Cybersecurity: A Potential Threat to India’s National Security
    Jeffrey Sachs: Who really blew up the Nord Stream 2 pipeline?
    The Iranian Success in Grey Zone Deterrence to counter the U.S.
    The Global Footprint of Chinese Cyber Warfare and Espionage
    Ukrainian Cyber-defense and lessons for Pakistan
    Cyber Security Concerns: A threat to India’s National Security
    Published
    on
    By
    India has a huge coastline of 7516.6km comprising 13 major ports (including one private port) and more than 200 minor ports across the coastline. It is a very known fact that the maritime sector is very crucial for India’s security, stability, economy, and sustainable development. India conducts around 70 percent of its total trade by value through the sea. India is strategically placed in the Indian Ocean, which gives it greater access to trade with the world’s major shipping routes. India’s seaborne trade has grown at a rate that is twice the 3.3% rate experienced globally. India is now focusing on strengthening its maritime sector through the upgradation of safety and security standards at the ports, enhancing port capacity and operations, and automation. It is placing emphasis on automation and technology upgradation through projects like SAGAR and Sagarmala. With digitalization in place in almost all the port operations and in the surveillance of the maritime waters, as shown in figure 1, the maritime domain is vulnerable to cyber threats ashore and afloat. 
    Figure.1 Technology in the Maritime Sector 
    With Information and Communication Technology (ICT) coming into use, increasing reliance on seaways, and the growing importance of the data as a weapon in the hands of the state, all these pave the need for better cybersecurity management systems in the maritime sector. 
    The maritime business, its ships, and its cyber environment are all protected by a variety of tools, policies, security concepts, safeguards, guidelines, risk management techniques, actions, training, best practices, assurance, and technologies. 
    Maritime cyber risk can be referred to as the extent to which the technology in use could be attacked, that could result in the loss or compromise of information.
    Pirates and opposing nations have been a menace to the maritime transportation business for thousands of years, but as the sector has developed and technology has been more thoroughly integrated for enhanced efficiency, so too has the magnitude of possible cyber threats. Now, even using something as simple as a USB flash drive, or even an unsecured Wi-Fi, the hacker can get access to the critical systems of the vessel, thereby obstructing the entire port operations. For example, a suspected ransomware attack on the Management Information System (MIS) crippled the operations of the Jawaharlal Nehru Port, Mumbai, in 2017 and again in 2022. 
    Though the primary motive behind cyber threats is profiteering, there are several aspects that motivate a cybercriminal to conduct a cyberattack on the port or vessel operations. This includes espionage, activism, terrorism, warfare, and others. 
    The various kinds of cyberattacks on the maritime sector involves malware, trojans, botnets, advanced persistent threats, ghost shipping attack, cryptocurrency hijacking, and other. In addition to these cyber threats, the maritime domain is vulnerable to cyber terrorism as well. The awareness in the maritime sector over cyber terrorism is very minimal or negligible, with very little emphasis given to it. Chinese cyber activity is a major security threat to India. China is also using cyber technology in its South China Sea AntiAccess/Area Denial (A2/AD) strategy. The A2/AD strategy denies freedom of movement and navigation to rival powers by increasing defense systems that threaten their ships/submarines. 
    The technologies like the Automatic Identification System (AIS), ECDIS, GPS, information systems, Industrial Control Systems, and other operational technologies have played a crucial role in enhancing the efficiency of port and vessel operations. Nevertheless, these technologies are of no exemption to cyberattacks as every technology comes up with its own loopholes. For example, the adoption of AIS is compulsory for any vessel to ensure its safe navigation, but as it is unencrypted and unauthenticated, the maritime sector is vulnerable to spoofing, water holing, social engineering, and other cyberattacks. It is also important to identify the human role in operating such technologies, as it is noted that human error and equipment flaws are primary reasons behind the success of these cyberattacks. 
    Maintaining the integrity of supporting systems, protecting ship systems from physical assault, and making the maritime sector resilient to both internal and external threats are all critical. Protection from various cyberattacks is necessary to prevent a breach of the network and its systems. Proper countermeasures and in-depth defense strategies must be deployed for each attack to prevent an attack from taking advantage of a flaw or vulnerability in the technology. 
    Primarily, it is important to promote awareness among the staff or the crew to identify cyber threats and on responding to such threats and, for example, alerting the officials if any malicious or unusual mail or notification is identified in the system. 
    Block chain technology can be an efficient solution as it allows for a continuous monitoring system and provides real-time status on the ship’s security. It also enables secure communication and storage of data in the control centers. It helps in avoiding loss of data and data modifications by unauthorized users. 
    The AIS and GNSS systems must adopt encryption and authentication measures which are given zero attention to this date.
    With the vast coastline, it is not possible for India to secure the coastline through manpower. Israel based startups, in order to effortlessly secure the maritime IoT ecosystem, Cydome Security offers a cyber solution to handle this precise problem. The company’s solution is intended for systems with links to coastal infrastructure as well as guidance, sensors, control, and command. 
    Fighting fire with fire is one way that organizations can aid in stopping such intrusions: AI-driven security systems can successfully foresee and thwart AI-driven threats in real-time with appropriate data.
    It is crucial to note right away that there is no magic solution for marine cybersecurity. An interconnected era has been retrofitted with a history of outdated shipboard equipment, leading to a shattered and vulnerable maritime environment. 
    It is in India’s interest to take a leading role in negotiations and developments with global countries, given its crucial position in the Indian Ocean Region and the need to protect itself against China’s growing threat in that region. In order to take shipping on to the next level of connectedness, strong cybersecurity is imperative. 
    Published
    on
    By
    I Doubt Therefore I Survive”- Michael Richard Daniell Foot, British Intelligence Historian.
    Since world war US always had upper hand in conducting sub/ unconventional warfare especially Covert Psyops, Americans have always heavily invested in sinister designs- the famous MKultra progaramme of using high psychotic drugs- LSD to psychologically weaken Human’s mental state and force confessions out of them. Also, Its aim was to develop mind-controlling drugs for use against the Soviet bloc. The project attempted to produce a perfect truth drug for interrogating suspected Soviet spies during the Cold War, and to explore other possibilities of mind control. CIA’s Subversion techniques and plans into the Soviet’s camp and other communist camps are also one of the greatest security headache for Soviets. The problem was that Soviets espionage/ Intelligence temperament was not that ruthless, hard and developed as CIA’s. Eventually, this became a reason of how and why US’s psychological operations substantially harmed Russian/Soviets’ influence too much. If we leave Vietnam, the scores of US in espionage circles, activities of de-installing regimes and squeezing Soviets sphere of influence and even now squeezing Russia’s sphere of influence are much higher than of Russia. Further, this also becomes a strong reason why Russians were not able to swiftly retort to these activities in a fashion in which US does or the tit for tat temperament was not proactively seen from the Russian or Soviet’s side. In other words, they struggled to match and register covert successes in countering US’s influence in substantial sense.  A story of one of the greatest female speies and phenomenal covert operations led by US and west which set the stage rolling for “espionage” in global politics.
    We mostly idealize male as spies, because of their endurance and the tradition or culture of talking only about male spies, the amount of glorification/popularization  which a male spy gets is somewhere reduced to less when the story of female spy comes in. Though the mindset is now changing and people are now equally focusing on both the cases, However, it has been observed that stories of female spies are still struggling to get glorified or talked about in some parts of the world. The tides changed their directions when a female spy- Virginia Hall, regarded as one of the greatest female spy whose contribution led to Allied Forces Victory in World War-II. In America she is regarded as one of America’s greatest heroes.
    The Past
    She was born on 6th April 1906  in Maryland,  attended Roland Park country school, later for her higher studies she went to Barnard College(Columbia University)  where she learned French, Italian and German and later moved to Geroge Washington University to peruse Economics.  Virginia Hall’s life was filled with roller coaster rides with dramatic twists and turns. She had a dream to become the first female Ambassador of the United States. She even started to work towards her dream by taking up the job of a clerk at the consular office in Warsaw Poland and later in Turkey. She didn’t know that a major setback is still waiting for her. In an accident she lost her left leg, However, this accident didn’t slow down Hall’s dream, She was firm and determined to achieve her dreams and serve for her country.
     Making of A Spy
    Later, She applied for Foreign Services and her application in the foreign services was turned down because of disability and her gender(Females were rarely hired at that time). Repeatedly her applications were turned down over and over. However as usual her determination and refusal to comprise with her dreams were fueling/ not letting her dreams die. Later she moved to France for employment, where During World War-II in February 1940 (the early period of war) she become an ambulance driver for France Army, after the defeat of French she again moved to Spain for employment where she accidentally met British Intelligence Official name Geroge Bellows. Bellows got amazed by her communication and thinking skills and gave her the number of a “friend” who was working in Special Operations Executive(SOE), United Kingdom secret operations unit in World War-II. After getting in touch with “friend” she joined the SOE in April 1941.
    The First Job
    She gets the training in SOE and sent to France by France Section of SOE. She was given a cover of a reporter/ journalist for New York Post which enabled her to interview people, gather information from surroundings which can be useful for intelligence/ military officials of Allied Forces. Gradually she became an expert and learned how to arrange contacts, logistics, and who to bribe to get information and get the required work done. She also learned how to distribute and supervise wireless sets among agents and the network of SOE.   Despite the French occupation by the Germans, she managed a long tenure as a spy-transmitting information to London about German which highlights her operational brilliance and. She also sensed danger and refused to attend a meeting of SOE Agents and later French Police raided the meeting place and SOE agents got arrested.
    The Journey with Americas
    After successfully planning an escape of the SOE agents from jail, when Hall returned, she was declined  to serve in France because she and SOE networks were almost compromised, and sending her again would be too much risk. After this, Hall got in the contact with OSS(predecessor of CIA) and joined American Intelligence at the low rank. She was sent to France again by OSS. This time she was given a cover of poor peasant women, she used to roam around the various places and often changed her disguise to a milkmaid and prepared Cheese and sold cheese to German Soldiers. Hall was tasked to prepare resistance force known as Maquis and set up Anti- Nazi The environment in France, which would help Allied Forces during Invasion. Hall continued to gather information about German Soldier’ locations and finance Maquis and help to set up resistance force which later helped Allied Forces in planning effective Invasions- Operation Jedburgh. No doubt with an artificial leg, she ruled the helm of Spy Networks, and in those times when females were rarely hired for jobs. German described her as “Most Dangerous Allied Spy” She successfully established Anti Nazi resistance which eventually led to the collapse of the Nazi and victory of Allied Forces, It was Hall with whom help Allied Forces were victories over the Axis Powers effectively. Hall broke all the stereotypes in the spying network who believe that Females are not that smart witted to survive in the Intelligence Word. She was awarded Distinguished Service Cross in 1945 and earlier she was also awarded prestigious British Medal. Later She becomes the first female to work in CIA, she was given desk jobs in CIA and due to her age she couldn’t perform well in the tests which were mandatory in CIA and after a brief period of time she resigned and took retirement at the age of 60. She lived with her husband Paul  Barnesville, Maryland, until her death in 1982. She always refused to talk/write about her World War-II or in-field experience which led to the curiosity of many. The way she believed in her instincts, intuition, and with the brilliant skill set despite one leg has made her one of the greatest spies of all time.
    Published
    on
    By
    Turning the pages of history concerning the gradual progress of humankind, right from the ancient to the modern world, a common connecting link can be found. It is called War. But what makes this fact more interesting is the perpetually changing nature of war. It is an expression of numerous variables of history and their complex combination in which war plays a major role that cannot be undermined.
    Theoretically, the epistemological framework of wars has been categorised into five generations. The present-day modern world is witnessing 5th-generation warfare. It relies heavily on the weaponisation of cyberspace and the magnanimous data generated by various States. Every imaginable fact that can be noted, quantified and stored digitally can be considered potential data. This all-encompassing and pervasive nature makes data a crucial asset of a state. This asset, if compromised due to a lack of security, can cause severe damage.
    Cyberwarfare, in this regard, is a phenomenon that uses this cyberspace which is primarily a realm of data, by states and non-states actors to spy or block access to critical data stored online. This is followed by demanding a ransom from the victim for access to data, often compromising the confidentiality, privacy and security of individuals and states.
    China is a prominent actor in world politics that has significantly used cyberwar as an instrument of state policy. It follows in letter and spirit the philosophical ideas shared by Sun Tzu in his famous book ‘The Art Of War‘ as a road map to achieve political gains. The strategic approach of China is dovetailed with the core philosophy of Sun Tsu. He says in his book, “To win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme of skill.” China is striving to inflict maximum damage to its adversaries by facing minimum or no loss on its part through the strategic application of cyber war.
    The dual task of frequent cyber attacks and espionage by the Chinese is materialised through a state-sponsored hacking group institutionalised by Bejing. It is called the APT41. The alleged group works hands and gloves with the Chinese Ministry of State Security. The group is accused of unauthorised access to protected computers, stealing highly confidential information and data from government and private enterprises, money laundering, and theft of identity. The Chinese have followed a worldwide approach to targeting major countries across the globe. This article discusses five such countries.
    India.
    The recent cyber attack on AIIMS Delhi is an emblematic expression of China’s desperate move to inflict harm on its adversaries. The origin of the attack was traced to Hong Kong. In this attack, out of the 100 servers, 40 were physical, and 60 were virtual. The hackers were able to penetrate five servers. The servers were rendered dysfunctional by the hackers. Fortunately, it was reported that the data was recovered. The CERTin has instigated a thorough investigation on this issue along with NIA.
    In a similar instance, the Galwan clash vis-a-vis India and China and the Mumbai blackout that took place in October 2020 are also profoundly linked. It was found that the blackout was a case of cyber attack induced by China as a strategic response to the Galwan Valley incident. China, through this measure, attempted to send a clear signal of its cyber capabilities to India. It was a warning that if India ups the ante in border clashes, then its major cities could come to a standstill.
    The United States
    A recent disclosure by the US government found that a whopping $20 million was stolen by hackers that had close affiliations with the Chinese government. This money was associated with the U.S . Covid relief benefit and is one of the first pandemic frauds that was initiated by the Chinese as an instrument of state policy.
    The U.S. has also been a witness to the Microsoft exchange cyber attack by China. The incident was a testimonial to the fact that how the Chinese government is following the realist approach to world politics. This incident was condemned by the UK, Canada and NATO in unison.
    The issue of cyber espionage as a long-term goal of the Chinese government shows the gravity of the situation. Beijing has resorted to these measures to gain leverage in the changing geopolitical scenarios. It strongly considers the U.S. as a major hurdle to achieving its political leverage at the international level.
    Russia
    Despite being a strong partner and sharing a deep relationship with Russia, China has attempted cyberspying on Russia. The Israeli-American cybersecurity firm named Check Point made a remark in this regard. Emails containing malware were sent to prominent scientists of major military research institutes in Russia to gain access to technology and information.
    The Xi era in China has witnessed a sharp rise in cyber espionage, theft of information and intellectual property with the use of highly sophisticated technology by the Chinese. The state-sponsored nature of these acts further complicates the issue. The prime motive of the Chinese is to gain a strategic advantage in the realms of data and military capabilities.
    The U.K.
    The Chinese government’s exploitation of the technological ecosystem to gain a strategic advantage is not new. This is rightly addressed by the director of GCHQ, Jeremy Fleming, in a rare public speech at the Royal United Service, a prominent think tank. He states that China’s rise is increasingly becoming a major security issue.
    The conventional ideas of war have been challenged, and the battleground has shifted to cyberspace. Due to its technical clout, China has become a significant threat to other states in cyberspace due to increasing cyber espionage activities. This issue is addressed in the latest report by NCSC, which warned that Chinese state-sponsored hackers are the biggest security threat to the U.K.
    Australia
    Following a global approach, the Chinese have also placed their malicious virtual footprint in Australia. The quest was to seek vital information about the Australian defence and energy.
    Proofpoint, an American cyber security firm, unfolded about the “Red Ladon” (TA423) group linked to China that was involved in a fake Australian publication. The group infected the employees’ computers with malware to snoop into confidential information.
    A phishing scam was reported, and it was found that the Chinese government were striving to decipher information related to the South China Sea in areas of defence, navy and energy. With the desire to keep itself abreast of the strategic changes, the Chinese have tried to gain access to sensitive information.
    Conclusion
    Carl Von Clausewitz states, “War is not merely a political act but a real political instrument, a continuation of political intercourse, a carrying out of the same by other means.” The Chinese have used cyberspace to carry out political intercourse through other means.
    Undoubtedly, China is following a panoramic approach worldwide concerning cyberspace. Its footprint is prominently visible across the globe, covering most of the major states that are key players in the international forum. The increasing weaponisation of data and cyberspace by China is certainly a major threat to India’s national security on multiple fronts.
    The use of espionage and cyberspace for prospective cyberwar shows the critical importance of protecting data rapidly turning into a nation’s strategic asset. The swift-changing nature of war with the prime focus on data emphasises how the vulnerabilities in the protection and management of it can be used as a loophole left to be easily exploited by other states to gain strategic advantage. This stands very specific with respect to China and its approach to exploiting cyberspace.
    Music gives a soul to the universe, wings to the mind, flight to the imagination, and life to everything. —…
    International cooperation, discussion and agreements are needed to ensure safe, secure and peaceful outer space. At present, there are more…
    US-China rivalry will affect various states, which have good relations with both (China and U.S). After the disintegration of the…
    Chinese-style modernisation has given a shot in the arm of the maxim “The Socialist Road is the broadest of all”…
    An alternative approach of development stemming from the cosmo-visions of the Quechua peoples of the Andes’s sumak kawsay, the Aymara…
    During the course of the conflict in Russia-Ukraine, Ankara has managed to preserve its strategic autonomy and has avoided siding…
    In his recent landmark address to Russia’s parliament, President Vladimir Putin cited the war in Ukraine and US/NATO involvement in the…
    Germany inspects Lithuania
    Russian invasion: Why collective responsibility is not so “collective”?
    Perpetual Presence: How 5G will Change the Digital Marketing Landscape Forever
    Takeaways from the sixth Quad ministerial hosted by India
    Human Trafficking: A Global Security Concern
    Beyond Froyd: Crafting a Love Story between Humanity and Tech
    A Western option in the South Caucasus after the Russian invasion of Ukraine
    Bangladesh’s paramilitary capabilities and future prospects
    Copyright © 2023 Modern Diplomacy

    source

  • The top 10 data breaches of 2022 – Security Magazine

    Image via Getty Images
    The global average cost of a data breach increased 2.6% from $4.24 million in 2021 to $4.35 million in 2022 — the highest it’s been in the history of IBM Security’s “The Cost of a Data Breach Report.”
    While the financial costs associated with a data breach are certainly high, the real impact on businesses run much deeper: reputational loss, legal liability and loss of business and consumer trust. Cyberattacks and data breaches are not going away —  if anything, they are only increasing both in frequency and severity. It’s vital that organizations create and test incident response playbooks to increase cyber resilience

    A breach involving several widely used Android VPN services — SuperVPN, GeckVPN and ChatVPN — led to 21 million users having their information leaked. Full names, usernames, country names, billing details, email addresses and randomly generated password strings were among the information available.  

    In a high-profile cyberattack, the Conti ransomware gang breached the Costa Rican government. The threat group accessed the government’s systems, stole highly valuable data and demanded $20 million, forcing the Central American government to declare a state of emergency. A total of 670GB of data — or 90% of data accessed — was posted to a leak site weeks after. 

    In July, a database containing account information for 69 million users of the popular game Neopets was posted for sale on an online forum. Names, email addresses, zip codes, genders and birth dates were among the available information. 

    An investigation revealed that attackers had access to the Neopets IT systems from January 3, 2021 until July 19, 2022, a total of 18 months. 

    Twitter suffered a data breach that affected 5.4 million accounts, including phone numbers and email addresses. According to several reports, the data was collected in December 2021 using a Twitter API vulnerability disclosed in a bug bounty program that allowed people to submit phone numbers and email addresses into the API to retrieve the associated Twitter ID. Using this ID, the threat actors could then retrieve public information about the account to create a user record containing both private and public information.

    While the data breach occurred in 2016 and was revealed in 2017, Uber admitted it covered up a data breach that affected 57 million users. The rideshare company paid $100,000 to the threat actors to ensure the information wasn’t made public. 

    The security breach is highly significant — Joe Sullivan, Uber’s former chief security officer, was found guilty of actively hiding the breach from the U.S. Federal Trade Commission (FTC) and concealing a felony. According to the Department of Justice (DOJ), Sullivan took several steps to prevent the FTC from finding out and arranged to pay off the hackers in exchange for them signing non-disclosure agreements. 

    It is the first time an executive faces criminal prosecution for charges related to a data breach, and this could affect data breach reporting compliance.

    U.S. messaging giant Twilio confirmed in August that cybercriminals accessed data that belonged to 125 customers after a phishing attack. The attackers tricked company employees into handing in login credentials by masquerading as IT department workers. Current and former employees recently reported receiving text messages purporting to be from the IT department. Typical text bodies suggested that the employee’s passwords had expired, their schedule had changed, and they needed to log in to a URL the attacker controls. 

    According to Twilio, other companies confirmed that they were subject to similar attacks and have coordinated a response to the threat actors, including collaborating with carriers to stop the malicious messages, registrars and hosting providers to shut down the malicious URLs. 

    The company confirmed that 209 customers — out of a total customer base of over 270,000 — and 93 Authy end users — out of approximately 75 million total users — had accounts that were impacted by the incident. There is no evidence that the malicious actors accessed Twilio customers’ console account credentials, authentication tokens, or API keys, the company said.

    In August, food delivery giant DoorDash confirmed a data breach 4.9 million customers, workers and merchants that exposed personal information. In a blog post, the company, a third-party vendor, was the target of a sophisticated phishing campaign and certain personal information maintained by DoorDash was affected.

    DoorDash said the attackers accessed the names, email addresses, delivery addresses and phone numbers of DoorDash customers. For a “smaller subset” of users, hackers accessed partial payment card information, including card type and the last four digits of the card number.

    In September, Australian telecommunications company Optus, which has 9.7 million subscribers, suffered a massive data breach that exposed names, dates of birth, phone numbers and email addresses. A group of customers may have had physical addresses and personally identifiable information (PII) like driving licenses and passport numbers leaked. 

    According to several reports, state-sponsored hacking groups or criminal organizations breached the company’s firewall to obtain sensitive information. 

    Russian-speaking hacking group Vice Society leaked 500GB of information from The Los Angeles Unified School District (LAUSD) after the U.S.’s second-largest school district failed to pay an unspecified ransom by October 4th. The data contains personal identifying information, including passport details, Social Security numbers and tax forms, contact and legal documents, financial reports with bank account details, health information, conviction reports and psychological assessments of students. 

    Medibank Private Ltd, one of the largest health insurance providers in Australia, confirmed that data belonging to 9.7 million past and present customers, including 1.8 million international customers, had been accessed by an unauthorized party. 

    Medibank said it would not pay the ransom demands, saying, “We believe there is only a limited chance paying a ransom would ensure the return of our customers’ data and prevent it from being published.”

    *Editor’s note: All care is taken to provide up-to-date information with the aim of publishing accurate and relevant information. 
    Subscribe to Security Magazine

    You must have JavaScript enabled to enjoy a limited number of articles over the next 30 days.
    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.
    ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 
    The John F. Kennedy Center for the Performing Arts is home to some of the nation’s largest events, from the Kennedy Center Honors to the Mark Twain Prize and high-caliber theatrical and symphonic performances.
     Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 
    Copyright ©2023. All Rights Reserved BNP Media.
    Design, CMS, Hosting & Web Development :: ePublishing

    source

  • Cybersecurity experts see uses and abuses in new wave of AI tech – Axios

    Illustration: Aïda Amer/Axios
    Cybersecurity experts are cautiously optimistic about the new wave of generative AI innovations like ChatGPT, while malicious actors are already leaping to experiment with it.
    Cyber leaders see multiple ways generative AI can help assist organizations' defense: reviewing code for efficiency and potential security vulnerabilities; exploring new tactics that malicious actors might employ; and automating recurring tasks like writing reports.
    Reality check: The idea of using chatbots to review or write secure code has already been called into question by some experts and researchers.
    Using generative AI to review code strikes some experts as particularly dangerous.
    Meanwhile, hackers and malicious actors, always on the prowl for ways to speed up their operations, have been quick to incorporate generative AI into attacks.
    The bottom line: Shattuck maintains that organizations exploring AI usage should see through the larger hype and "understand the limitations, like truly understand where it's at."
    Read the rest of Axios' AI Revolution series:

    source

  • Top 12 cyber crime trends to watch for in 2023 – The National

    The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA
    The global cyber security market’s size is expected to expand at a compound annual growth rate of 12 per cent from 2022 to 2030, from $184.93 billion last year, according to the US company Grand View Research.
    The growing number of cyber attacks and the fast proliferation of online shopping platforms, increased adoption of cloud solutions and rapid expansion of smart machines and connected devices are some of the factors driving the market growth.
    As the industry evolves at a prolific pace, The National looks at the top 12 cyber security threats and trends of the year ahead.
    If you have ever seen the sci-fi movie “The 6th Day”, we are on the same path for having replicas of our digital selves.
    In 2023, deep fakes will become so authentic that not only will we see our digital identities being stolen, but also digital versions of our DNAs will be at risk, according to industry experts. Exposing our digital DNA on the internet will enable deep fakes to replicate and create digital humans.
    Illustrations of video avatars created by Synthesia, an AI video platform that creates digital humans. Reuters
    A deep fake is a human impersonation created with advanced technologies, including artificial intelligence and machine learning.
    Humans sync their physical lives on social media with constant uploads of photos, videos, audio and personal preferences with enough data points and some enhanced algorithms, said Joseph Carson, chief security scientist at California-based security firm Delinea.
    “It is only a matter of time before attackers can create lifelike digital avatars of anyone, and it will be incredibly difficult to identify the difference without sophisticated technology to analyse the source data,” Mr Carson said.
    Smart home and Internet of Thing (IoT) devices are increasingly being targeted by cyber criminals as the most vulnerable entry points to any home or business security network.
    The typical cyber attack moves from hacker to device, but 2023 may bring cyber offensives that jump between smart devices, including wearable devices, voice-controlled assistants, smartphones and temperature-control equipment at home, experts said.
    Humans sync their physical lives on social media with constant uploads of photos, videos, audio and personal preferences. AP
    Factors such as extensive connectivity, widespread sharing of data among devices and reliance on weak security networks will rapidly orchestrate such attacks.
    The scope of threats related to supply chains has never been higher.
    Attackers now have more resources and tools at their disposal to disrupt supply chains that are crucial to maintain adequate supply of goods and services, especially during the pandemics such as Covid-19.
    The standard diligence and security assessments that chief security officers have performed on third parties are no longer adequate given the escalating frequency and impact of supply chain attacks, experts said.
    Regulations, such as the EU Network and Information Security Directive 2.0, are forcing companies to conduct more frequent and dynamic assessments of their supply chain risk and to better control the access third parties have to their networks.
    Don’t let your camera’s viewfinder deceive you.
    The camera on the mobile devices is a powerful tool for documenting memories and daily lives. These cameras have been augmented with software algorithms to recognise AI tools to enhance the quality of pictures and videos.
    “In 2023, [we] expect to see the first of many exploits that challenge smart cameras and the technology embedded within to leverage vulnerabilities,” said Brian Chappell, chief security strategist at cyber security firm BeyondTrust for Europe, Middle East, Africa and Asia Pacific.
    Smartphone camera technology can itself become exploitable for malware execution, experts said. Bloomberg
    “The technology may itself become exploitable for malware execution. This malicious behaviour … can obfuscate sensitive information, provide misinformation, embed malware or perform some other form of misdirection based on the content.”
    A QR code is a machine-readable code used for storing information for reading by a smart device. It is just like a digital business card that usually has various details such as phone number, email and home address.
    When you scan a compromised QR code, it could send your location coordinates to a geolocation-enabled application and can also automatically redirect you to a malicious website.
    With more organisations aiming to buy cyber insurance as a financial safety net to protect their businesses from serious financial exposure resulting from data breaches and ransomware attacks, the need to get a solid cyber strategy in place will be mandated to get insurance.
    “The days of cheap and easy are over,” said Mr Carson.
    As of the second quarter of 2022, the US cyber-insurance prices increased 79 per cent over the prior year, according to Marsh global insurance market index.
    “The truth is, it is becoming downright difficult to obtain quality cyber insurance at a reasonable rate. In 2023, more businesses will face the stark realisation that they are not cyber insurable,” said Mr Chappell.
    The growth of non-password-based primary authentication could finally spell the end of the personal password in 2023 and in the years to come, experts said.
    More applications, not just the operating system itself, will start using advanced non-password technologies, such as biometrics, either to authenticate directly or leverage biometric technology, like Microsoft Hello, Apple FaceID or TouchID, to authorise access.
    More applications will start using advanced non-password technologies, such as biometrics, experts said. EPA
    “Personal accounts are still commonly backed by passwords as the ultimate fallback, but the need to remember, retrieve and type passwords is going to dwindle rapidly as the technology to reliably recognise us improves,” Mr Chappell said.
    The use of ransomware has picked up pace and became more dangerous in 2022. It will continue its rapid rise next year and its variations will increase with the frequency of attacks.
    A recent report by security firm Cybereason found that 73 per cent of organisations suffered at least one ransomware attack in 2022, compared with just 55 per cent in 2021.
    “With ransomware continuing to adapt with different enhancements, we must always be flexible to change,” Mr Carson said.
    As electric vehicles and autonomous technology aim to become mainstream, they also carry the threat of increased cyber attacks.
    Threat actors could disable vehicle’s display screens, entertainment, navigation, climate controls, and even the ability to call for help using the car’s system. This could be more dangerous when autonomous driving truly goes mainstream.
    “Expect to see everything from custom displays to malware using car resources for crypto mining. In the next decade, this will be a risk surface and viable commercial market no one should ignore,” said Morey J Haber, chief security officer at BeyondTrust for Europe, Middle East, Africa and Asia-Pacific.
    An increase in the number of cyber attacks on energy production and distribution networks will lead to power outages, fuel shortages and heating or cooling resource depletion.
    While a fault in any energy source can drive prices higher, the threat of an intentional disruption could leave people out in the cold or completely disrupt electronic transaction processing, said Mr Haber.
    “Threat actors recognise this weakness, and we should expect nation-states and opportunistic cyber-organised crime syndicates to refine their methods to target energy sectors.”
    In 2022, threat actors, such as Lapsus$, exposed the shortcomings of multi-factor authentication. The terms MFA bombing, MFA bypass, and MFA fatigue all leapt into the cyber security lexicon.
    In 2023, experts expect a new round of attack vectors that target and successfully bypass MFA strategies.
    Lapsus$ bypasses MFA framework using techniques such as spamming original account holders. This year, some of its victims included Microsoft, T-Mobile and Nvidia.
    Cyber criminals could weaponise operational technology environments to harm or kill humans, the Connecticut-based technology research and consulting company Gartner has said.
    The use of ransomware has picked up pace and became more dangerous in 2022. Reuters
    The OT is a type of computing and communication system – including both hardware and software – that controls industrial operations, mainly focusing on the physical devices and processes they use. It is used to gather and analyse data in real time, which is further used to monitor a manufacturing unit or to control equipment.
    Various industries, such as telecoms and oil and gas, use OTs to ensure different devices work in co-ordination.
    “OT that once had a single function and purpose is now becoming smarter, leveraging commercial operating systems and applications to perform expanded missions. As these devices expand in scope, their design is susceptible to vulnerabilities and exploitation,” Mr Chappell said.

    source

  • Optus data breach: everything we know so far about what happened – The Guardian

    Who is the attacker? How was the data accessed? What was taken? Digital security experts explain
    In the week since Optus announced it had been the subject of a massive data breach with as many as 10 million customer accounts exposed, solid information about what actually happened has been scarce.
    Here’s what we know so far.
    Optus has said it was the target of a “sophisticated attack”.
    The only person to come forward since then, claiming to have the data is a user called “Optusdata” on a data breach forum. The alleged attacker threatened to sell the data unless Optus paid US$1m in cryptocurrency.
    The user later posted what they alleged was 10,000 customer records, before deleting the posts and apologising.
    Nothing is known about this person beyond what was on the forum.
    It is not clear whether “Optusdata” is the person responsible for the attack, or whether they are the only person who has access to the data.
    In their apology, “Optusdata” claimed they had deleted the only copy they had of the data.
    Sign up to receive an email with the top stories from Guardian Australia every morning
    There is no way to verify this. Other attackers could have accessed the data via the same vulnerability, and the data may not have actually been deleted.
    “That’s a valid concern as all we have to go on at present is the word of a criminal who had no hesitation to dump more than 10,000 records publicly,” cyber security expert and founder of the website HaveIBeenPwned, Troy Hunt, said.
    “Plus, the vulnerability as it’s been described is so trivial it’s entirely possible it was exploited by other parties as well.”
    That also remains unclear. Optus has said it did not pay the ransom.
    Hunt lists data breaches on his website to allow people to check whether their personal information has been compromised. He said ransom demands were not unusual for large data breaches such as that suffered by Optus, but the alleged attacker’s change of heart was unexpected.
    “Seeing the hacker back down, apologise and promise to delete the data is very rare. I suspect the amount of exposure the incident received plus the AFP involvement and commentary from high-level politicians spooked them,” he said.
    Reports suggest Optus had an application programming interface (API) available online that did not require authorisation or authentication to access customer data.
    “In the instance, where a public API endpoint did not require authentication, anyone on the internet with knowledge of that endpoint [URL] could use it,” said senior manager of cyber security consulting for Moss Adams, Corey J Ball.
    Sign up to Guardian Australia's Morning Mail
    Our Australian morning briefing email breaks down the key national and international stories of the day and why they matter
    after newsletter promotion
    “If that endpoint was used to access customer data, then anyone on the internet could have used that endpoint to gather customer data.
    “Without technical controls for authentication and authorisation in place, any user could have requested any other user’s information. The attacker likely scripted the process to repeat requests from the endpoint until they had collected millions of instances of personally identifiable information.
    Optus still hasn’t confirmed how the data was accessed. It maintains the attack was sophisticated, but the home affairs minister, Claire O’Neil, has said the vulnerability was akin to Optus leaving a window open.
    Optus says the stolen data includes names, email addresses, postal addresses, phone numbers, dates of birth, and for a portion of the affected customers, identification numbers including passport numbers, driver’s licence numbers and Medicare numbers.
    The dump of records released by the forum user contained all this information.
    “Unfortunately, it can be pretty common,” Josh Lemon, a digital forensics and cyber incident expert at SANS Institute, said.
    But he said attackers tended to not target a single organisation. They usually scan across the internet looking for known vulnerabilities and exploiting those vulnerabilities all at once, he said.
    “So for a threat actor to specifically just go after [one company] is a little bit unique in that sense.”
    Optus customers have been urged to stay vigilant for signs their data has been compromised. State and federal governments are making it easier for those affected to replace identity documents that may have been accessed.
    While the alleged attacker has dropped the ransom threat, the criminal investigation is ongoing. The Australian federal police are working with law enforcement authorities overseas, including the Federal Bureau of Investigation in the US, to locate whoever obtained the data, and who tried to sell it.
    The federal government is looking at urgent reform in this area, including making it easier to alert banks to which of their customers may have been compromised. It is also considering large fines for companies that allow such a breach to occur.

    source

  • Cyber and Intellectual Property Crimes Section – Department of Justice

    The Cyber and Intellectual Property Crimes Section investigates and prosecutes high-tech crimes, including both cyber-based attacks on the nation’s electronic infrastructure and economic crimes committed using computers, as well as intellectual property crimes, such as theft of intellectual property and economic espionage. The Central District is home to sensitive government computer installations, a significant high-tech industry, and the motion picture and recording industries, among many others. Protecting the security of these industries is a priority of the United States Attorney’s Office, with particular emphasis on investigating and prosecuting sophisticated attacks on computer systems and intellectual property offenses. The Section also prioritizes cyber threats to individuals including cyber stalking, online threats, “sextortion,” and similar crimes.
    As a part of the National Security Division, Cyber AUSAs work in conjunction with attorneys from the Terrorism and Export Crimes Section on all matters dealing with National Security, including hacking and economic espionage done at the behest of foreign powers. The prosecutors in all of our cases, of course, rely on the incredible dedication and expertise of cyber investigators at the FBI, the Department of Homeland Security, the U.S. Secret Service, and other law enforcement partners.  In addition, the Section also provides guidance to prosecutors throughout the Office on technological trends.
    Because of the global nature of cyber threats, investigating and prosecuting cybercrime poses unique jurisdictional and technical challenges: cybercriminals operating in one foreign jurisdiction might use infrastructure in a second to victimize businesses or individuals located in other countries—all the while employing sophisticated technical methods to both magnify their capability for crime and shield them from law enforcement. Cybercrime is global and, thus, we attack it globally, working closely with foreign governments to address this global problem.
    Click here for more information about the Office’s Cybersecurity Program.
    Cameron L. Schroeder was appointed Chief of the Cyber and Intellectual Property Crimes Section in 2020, after previously serving as Deputy Chief of the section.  Ms. Schroeder joined the Office in 2007, quickly moving into the Office’s Organized Crime and Drug Enforcement Task Force section.  While there, she prosecuted numerous gang-related drug-trafficking organizations around the District, including in the cities of Los Angeles, Monterey Park, Chino, Oxnard, and Indio.  Her trials in this area included an unusual “Continuing Criminal Enterprise” prosecution of a high-profile Mexican Mafia associate and leading member of a Ventura County gang.  She won a California Lawyer Attorney of the Year Award in 2013 for her work on the RICO prosecution of several members of the 18th Street Gang, who were responsible for numerous violent acts, including the murder of an infant and the attempted murder of a street vendor whom the gang was extorting.
    After several years of gang and drug prosecutions, Ms. Schroeder moved into national security work, particularly supporting the work of the FBI in investigating Sunni extremist and Al Qaeda-affiliated groups and individuals.  She then became a supervisor in the Office’s General Crime section, supervising new AUSAs prosecuting a wide variety of federal crimes.  While in that role, Ms. Schroeder was selected to supervise the reinstitution of the Office’s Complaints Unit, where almost all reactive federal cases in the District are now charged.  
    Since joining the Cyber and Intellectual Property Crimes Section, Ms. Schroeder’s casework has included a variety of both core “cyber” cases and copyright and trademark infringement matters.  On the cyber-crime side, she has investigated and prosecuted developers, administrators, and customers of complex malware, and individual perpetrators of network attacks and computer intrusions, as well as individuals and groups offering computer-crime-as-a-service, such as DDoS-for-hire services.  On the IP side, she has prosecuted large-scale copyright infringement matters, such as the data theft and sale of pre-release blockbuster films, and consumer electronics trademark infringement cases, with an emphasis on public safety and large-scale fraud.  She also continues to support the FBI in its national security cyber missions, including around election security and nation-state or cross-border threats.  
    Ms. Schroeder earned her J.D. from Harvard Law School and her B.A. in Russian Regional Studies from Barnard College.  She previously worked at the New York offices of Debevoise & Plimpton, LLP, where she specialized in international arbitration, complex commercial litigation, and internal investigations; she also performed extensive pro bono work on criminal defense matters, asylum cases, first amendment litigation, and transgender and women’s rights litigation.  She has lived abroad in several countries, including the United Kingdom, the Czech Republic, South Africa, and Russia, and applies that international perspective to much of her work in the cyber and IP arenas.
    October 25, 2022
    Press Release
    West L.A. Man Sentenced to 18 Years in Federal Prison for Harassment Campaign Targeting Female Doctors at VA Facilities
    September 16, 2022
    Press Release
    Former Marine Sentenced to 5 Years in Prison for Cyberstalking Young Women in ‘Sextortion’ Campaign While on Active Duty
    August 31, 2022
    Press Release
    Chatsworth Man Pleads Guilty to Stalking Charges for Sending Two Sisters Death Threats and Harassment Campaign Against Teenager
    August 1, 2022
    Press Release
    Former Owner of T-Mobile Retail Store in Eagle Rock Found Guilty of Committing $25 Million Scheme to Illegally Unlock Cellphones
    July 18, 2022
    Press Release
    West L.A. Man Found Guilty of Stalking Charges for Longtime Harassment Campaign Against Female Doctors at VA Facilities
    The United States Attorney’s Office
    Central District of California
    Attn: Cyber and Intellectual Property Crimes Section
    312 N. Spring St., 15th Floor
    Los Angeles, CA 90012
    Individuals who wish to report activity that they believe may be related to terrorism should call the FBI at (310) 477-6565.
    Justice 101

    source