BlogCon 1: Global Ransomware Attack in Progress

Time to batten down the cyber hatches!

Companies across the globe are reporting that they have been struck by a major ransomware cyber-attack.

British advertising agency WPP is among those to say its IT systems have been disrupted as a consequence.

Ukrainian firms, including the state power company and Kiev’s main airport, were among the first to report issues.

The Chernobyl nuclear power plant has also had to monitor radiation levels manually after its Windows-based sensors were shut down.

The international police organisation Interpol has said it is “closely monitoring” the situation and liaising with its member countries.

Experts suggest the malware is taking advantage of the same weaknesses used by the Wannacry attack last month.

“It initially appeared to be a variant of a piece of ransomware that emerged last year,” said computer scientist Prof Alan Woodward.

The NY Times has a break down of what is and is not known.

Known:

• Cybersecurity researchers first said that the new ransomware appeared to be a variation of a well-known ransomware strain called Petya. One researcher from the Moscow-based cybersecurity firm Kaspersky Lab reported the new ransomware was a strain of Petya first identified in March 2016. Kaspersky found evidence that the latest strain had been created on June 18, suggesting it has been hitting victims for more than a week. But Kaspersky also said it was still investigating the attack and that it could be a new type of ransomware that has never been seen before.

• Kaspersky reported that approximately 2,000 computer systems had been affected by the new ransomware so far.

• Symantec, a Silicon Valley cybersecurity firm, confirmed that the ransomware was infecting computers through at least one exploit, or vulnerability to computer systems, known as Eternal Blue.

Unkown:

• Who is behind the ransomware attack. The original Petya ransomware was developed and used by cybercriminals, and variations have been sold through dark web trading sites, which are accessible only by using browsers that mask a user’s identity, making it difficult for cybersecurity researchers to track.

• Why it is spreading as quickly as it is. Cybersecurity researchers believe that like WannaCry, the ransomware infects computers using vulnerabilities in the central nerve of a computer, called a kernel, making it difficult for antivirus firms to detect. It is not yet known if the new ransomware uses any new vulnerabilities, or variants of the vulnerabilities, made public by the group known as the Shadow Brokers.

• It’s unclear if systems protected against WannaCry can still be affected by the new ransomware attack.



Cyber Strategy – Different From A Shooting War

Big hack of pretty much everything in Ukraine this morning: internet, power plants, government. I wrote this post before that happened, but it applies.

The Obama administration was in an extremely difficult position after learning about Russian hacking of last year’s election. Several factors came into play: the difficulty of dealing with international cyber attacks, intransigent Republican partisanship, and the decaying relationship with Russia. I’m going to break down those factors into at least two posts.

Cyber attacks present a national security problem different from any encountered before. Lumping them into a designation of “cyberwar” projects assumptions of conventional war onto them and distorts the difficulties and possibilities. I haven’t seen much analysis of these differences and how they affect strategy. Please point me to them, if they exist. Most punditry assumes that cyber attacks can be equated to war, and numerous opinion articles have referred to the Russian hacks as a form of war. In this post, I will consider only that part of last fall’s situation. A later post will consider the political ramifications. Read more



Something Strange is Happening on Twitter

Or as we call it around here it is a day ending in day!

More seriously Twitter seems to be deluged by bots signing up to follow the President’s personal and/or official accounts and, at least for now doing nothing. There are also widespread reports of people who are not following the President being signed up to follow the President’s personal and/or official accounts without their permission. They are also apparently following other elites and notables like Secretary Clinton, President Obama, even Ellen Degeneres.

From the white hat hacker known as the Jester.

No one is quite sure what it means or what is going on (after the jump). Read more



Breaking: Ongoing Ransomware Cyber Attack

There is an ongoing cyber attack, specifically a ransomware attack, ongoing across Europe, the US, and Asia.

The BBC reports:

A massive ransomware campaign appears to have infected a number of organisations around the world.

Computers in thousands of locations have apparently been locked by a program that demands $300 (£230) in Bitcoin.

There have been reports of infections in as many as 74 countries, including the UK, US, China, Russia, Spain, Italy and Taiwan.

Many security researchers are linking the incidents together.

The UK’s National Health Service (NHS) was also hit by a ransomware outbreak on the same day and screenshots of the WannaCry program were shared by NHS staff.

One cyber-security researcher tweeted that he had detected many thousands of cases of the ransomware – known as WannaCry and variants of that name – around the world.

“This is huge,” said Jakub Kroustek at Avast.

Another, at cyber-security firm Kaspersky, said that the ransomware had been spotted cropping up in 74 countries and that the number was still growing.

Several experts monitoring the situation have linked the infections to vulnerabilities released by a group known as The Shadow Brokers, which recently claimed to have dumped hacking tools stolen from the US National Security Agency (NSA).

A patch for the vulnerability was released by Microsoft in March, but many systems may not have had the update installed.

 



Google Docs Phishing

If you get an email containing a link to a Google Doc, don’t click. Check with the person who sent it before opening. There’s a phishing scam going around that seems to be widespread.

Otherwise, open thread!








Late Night Open Thread: Big Mouth, Tiny Thumbs

Trump’s 10 most-engaged Twitter followers over the past 30 days include five confirmed robots and three accounts that appear to be bots, according to audience data collected by Social Rank. Trump’s most prolific respondent, @Trump2016_Fan, has posted more than 18,000 times in the past year, mostly all-caps messages of support for the 45th president. The account appears to be automated and did not respond to a request for an interview.

But there are plenty of humans in the 20,000 or so replies generated by a typical Trump tweet. These are piled like building blocks beneath each tweet, a tower of typos, insults, and encouragement that stretches on and on. Scrolling through the replies to a single Trump message is enough to test the fortitude of any reader; getting to the last reply is the sort of task it’s hard to imagine any human doing voluntarily. Yet the replies bundled nearest to @realDonaldTrump—in a sorting determined by Twitter’s mysterious algorithm—are likely to be seen by hundreds of thousands of users. If Trump is the most powerful and visible user of Twitter, the replies appearing closest to his messages must occupy some of the most influential real estate on the internet.

… According to beta content-analysis software used by Social Rank, 19 percent of Trump’s followers are women. Among Trump’s 20 most-engaged followers, only two had traditionally female names—and both of those accounts appear to be automated…



Reality Conforms to My Expectations: Today’s Wikileaks Release

Earlier today a couple of you asked me what I thought of the Wikileaks release. I wrote the following in two related comments. I’m highlighting the relative parts and I’ve edited the non-essential portions out from the original comments.

First:

Wikileaks is a distro arm, and has been for a while, of the Russian government. Given that some of what was dropped – and please remember I am, like everyone else with a clearance, not allowed to actually look at anything Wikileaks posts because I don’t need to know it whether its spilled onto the unclassified Internet or not, so I’m working off of other people’s reporting – claims that the CIA has the ability to make its cyber activities look like Russian Intelligence’s cyber activities. And that this is the stuff being pushed heavily by the known Russian governmental propaganda outlets, their fellow travelers, and sites/individuals that seek to shield the President from all criticism… It is important to remember that there is a remarkable amount of overlap, in terms of time and language, between what is reported and tweeted and distroed by other social media by RT and Sputknik towards the US on this stuff, what is then reported and tweeted/retweeted and distroed by other social media by FOX News personalities (Hannity, the Fox and Friends lack of brains trust), right wing radio talkers (Levin, Hewitt, etc), Breitbart, WND, etc, and then, ultimately the President and a number of folks in and around his inner circle. This pattern has been going on and remarked on for months and is quite bizarre.

And:

I think what you’re going to see, and I want to clarify from above, that the claim will be that the CIA did the hacking into the DNC and RNC on Obama’s request, but made it look like Russia and made it looked like Russia was helping the President’s campaign. That’s the only reason you start talking about the CIA having the ability to make its hacking tools and malware look like Russia’s. This will be in order to discredit the charges of Russian hacking and a Russian campaign of active measures in support of the President’s campaign.

Hopefully that makes more sense.

Lo and behold:

 

I don’t think any of this comes as any great surprise to anyone, but its always nice when reality conforms to one’s expectations of it.