Yahoo Data Theft linked to Blackhat Group In Eastern Europe
In a recent report released by InfoArmor, Yahoo Data Theft has been linked to a group of hackers code name “Group E”. InfoArmor says the group apparently ex-filtrated the data via a remote attack.
When asked to explain the cause of the attack that led to the compromise of 500 Million User Accounts, Yahoo had previously fingered state sponsored organ linked to the Russian federation.
Full details of InfoArmor investigation can be downloaded here
A Real-world Assessment of Organization’s Defense-in-Depth Model: Snippets from FireEye Recent Data Analysis
- Nearly all (97 percent) organizations had been breached, meaning at least one attacker had bypassed all layers of their defense-in-depth architecture.
- More than a fourth of all organizations experienced events known to be consistent with tools and tactics used by advanced persistent threat (APT) actors.
- Three-fourths of organizations had active command-and-control communications, indicating that attackers had control of the breached systems and were possibly already receiving data from them.
- Even after an organization was breached, attackers attempted to compromise the typical organization more than once per week (1.59) on average.
Extensive update on this report can be downloaded from fireEye website
Eleven people in the United States, the UK and Vietnam have been arrested and accused of running a $200m worldwide credit card fraud ring, US and UK law enforcement officials said…
Read more: http://www.fin24.com/Economy/200m-credit-card-hacking-ring-busted-20130606
South African Banking Risk Information Centre (SABRIC) a trusted crime information centre leverages on public and private partnerships, delivers measurable value through a team of energetic specialists who consistently provide high quality support services and products;they contribute to the reduction of bank related crime through effective collaboration… learn more http://youtu.be/1OL6F5sUt-A?t=39s
A report, which was sponsored by Internet security and software firm McAfee, is one of the first reports of its kind that was done to quantify the monetary costs of activities such as cybercrime and cyberespionage. The astounding figure derived from the estimate, issued by the Center for Strategic and International Studies, is much lower than the $1 trillion that was cited by the White House, but still elevates illegal cyber activities to the same levels as drug trafficking and is more than likely to attract criminal elements.
Read more at http://guardianlv.com/2014/06/cybercrime-estimated-to-cost-more-than-455-billion-annually/#2bCi91BqaO2KjqUg.99
A Russian man has pleaded guilty to conspiracy charges in a federal court in Atlanta on Tuesday for developing and distributing a malicious banking malware ‘SpyEye’ that infected more than 1.4 million computers worldwide since 2009. Aleksandr Andreevich Panin, a 24 year old programmer…
Read more: 24-year-old Russian Hacker and Developer of SpyEye Banking Trojan pleads guilty.
RAM Scraping Malware was an integral part of a number of recent prominent data breaches that resulted in the theft of many tens of millions of credit card numbers. This type of malware typically installs itself into Point of Sale (PoS) terminals and steals data directly from it. Examples of such malware include Dexter, Alina, BlackPoS, and Kaptoxa.
Find more chalk talks here: http://sfi.re/Chalk_Talks