Posts Tagged ‘usa’

Information Regarding Server Issues for VyprVPN Customers in China | Golden Frog

Friday, January 23rd, 2015

We are aware of recent network issues affecting our VyprVPN customers in China. If you are in China and are having trouble connecting to several different VPN server locations, including US and Australia servers, please use the following locations:

Netherlands

Hong Kong

Connections to these locations have been successful, but may not have a 100% success rate. In the event one of those locations fails, please try another.

Thank you for your patience in this matter. We are investigating the issue and will provide you with an update once we have additional information.

via Information Regarding Server Issues for VyprVPN Customers in China | Golden Frog.

Banks to launch new tool to fight hackers | Reuters

Tuesday, November 4th, 2014

The lobby of JPMorgan headquarters is photographed through its front doors in New York May 11, 2012.   REUTERS/Eduardo Munoz

A group of cybersecurity firms funded by big banks plan to launch a platform that will allow financial companies to communicate faster about potential cyber breaches, the Wall Street Journal reported.

The move follows cybersecurity attacks on some big banks last month, where JPMorgan Chase & Co’s computer systems were hacked exposing the contact details of 73 million households and 7 million small businesses.

The group gathered funds from 16 banks including JPMorgan, Citigroup Inc , BB&T Corp and U.S. Bancorp, to help lead the effort, the newspaper said.

The product, called ‘Soltra Edge’, is being launched by Financial Services Information Sharing Analysis Center (FS-ISAC) and the Depository Trust & Clearing Corp (DTCC). It has been in works for more than a year and is expected to be out next month, the report said.

Earlier this year, JP Morgan said it expects to spend more than $250 million on cyber security, with about 1,000 people working on that area, after being warned by U.S. regulators about the threat of rising cyber attacks on bank machines.

A pilot version of Soltra was used in spreading the information received by FS-ISAC from JPMorgan after the breach, the Journal said, citing sources.

Soltra, which offers a free edition as well as a paid one, will help track threat information within seconds, a spokesman for Soltra told Reuters.

FS-ISAC and DTCC could not be reached immediately for comments outside regular U.S. business hours.

via Banks to launch new tool to fight hackers: WSJ | Reuters.

APT28 — State Sponsored Russian Hacker Group

Monday, November 3rd, 2014

 

APT28 Hacker Group — Cyber Espionage Attacks Tied to Russian Government

Nearly a decade-long cyber espionage group that targeted a variety of Eastern European governments and security-related organizations including the North Atlantic Treaty Organization (NATO) has been exposed by a security research firm.

The US intelligence firm FireEye released its latest Advanced Persistent Threat (APT) report on Tuesday which said that the cyber attacks targeting various organisations would be of the interest to Russia, and “may be” sponsored by the Russian government.

The Report entitled “APT28: A Window Into Russia’s Cyber Espionage Operations” published by FireEye has “evidence of long-standing, focused operations that indicate a government sponsor – specifically, a government based in Moscow.”

“Despite rumours of the Russian government’s alleged involvement in high-profile government and military cyber attacks, there has been little hard evidence of any link to cyber espionage,” Dan McWhorter, FireEye vice president of Threat Intelligence, wrote in a blog post discussing the report.

“FireEye’s latest APT report sheds light on cyber espionage operations that we assess to be most likely to be sponsored by the Russian government, long believed to be a leader among major nations in performing sophisticated network attacks.”

The cyber-espionage group believed to have been operating since at least 2007 in order to steal political and state secrets from businesses and foreign governments. The group launched a cyber attack on government in Georgia, Eastern Europe, as well as NATO and the Organisation for Security and Co-operation in Europe, according to the report.

Whereas the Russian cyber criminal groups are known for conducting massive cyber campaigns aimed at stealing money and financial information, but APT28 focuses on “privileged information related to governments, militaries and security organizations.”

“This group, unlike the China-based threat actors we track, does not appear to conduct widespread intellectual property theft for economic gain,” FireEye stated in the report. “Nor have we observed the group steal and profit from financial account information.”

The security firm analyzed that the malware used by APT28 features a consistent use of the Russian language. Moreover, more than 96 percent of malware samples analyzed by the researchers were compiled between Monday and Friday, between 8AM and 6PM in the time zone paralleling working hours in Moscow and St. Petersburg. This regularity in the work suggests that the hackers were in Moscow, the report argues.

APT28 Hacker Group — Cyber Espionage Attacks Tied to Russian Government

The APT28 group has constantly updated their software and made the resulting binaries difficult to reverse engineer. It used a downloader tool that FireEye dubbed “SOURFACE”, a backdoor labelled “EVILTOSS” that gives hackers remote access and a flexible modular implant called “CHOPSTICK” to enhance functionality of the espionage software.

Infection is usually achieved via a spear phishing email with a relevant lure and the malware hidden in the attachment. The hacker group has also created a number of fake domains for UK-based defence events, including the Counter Terror Expo, as part of the operation to gather intelligence on attendees.

Together with the help of above mentioned tools, the group gained access to the file system and registry; enumerate network resources; create processes; log keystrokes; access stored credentials; execute shellcode, and encrypt exfiltrated data uploaded with an RSA public key.

via APT28 — State Sponsored Russian Hacker Group.

‘Internet Speeds by State’ map is out. How did your state fare? : Tech Times

Monday, August 11th, 2014

is almost always the first thing that’s compromised when major providers would intentionally throttle speed and concerned individuals would openly debate on net neutrality.In the U.S., Internet speed varies in every state. One state has managed to stand out with the highest average internet speed recorded.Among all the states and territories in the U.S., it is Virginia that tops the list. With an average Internet speed of 13.7 megabits per second, Virginia becomes the state with the speediest Internet access.The information is based on the recent annual State of the Internet report by Akamai, a cloud services provider. Its clients would include some of the world’s largest corporations. In order to have a visual representation, Broadview Networks, another cloud services provider, produced a map by pulling the state by state data from the report. The top 10 states, ranked according to Internet speed in megabits are: 1. Virginia 13.7; 2. Delaware 13.1; 3. Massachusetts 13.1; 4. Rhode Island 12.9; 5. District of Columbia 12.8; 6. Washington 12.5; 7. New Hampshire 12.3; 8. Utah 12.1; 9. Michigan 11.8; and 10. Connecticut 11.7.

via 'Internet Speeds by State' map is out. How did your state fare? : PERSONAL TECH : Tech Times.

China puts Microsoft under official investigation

Monday, July 28th, 2014

BEIJING — Government investigators visited Microsoft offices in four Chinese cities Monday, according to a company spokeswoman.
msft china
However, the reason for the visits was not immediately clear.Microsoft, like other U.S. technology giants in recent months, has been under fire from Chinese media for its perceived role in helping the U.S government conduct cyberhacking against China.On Monday, investigators from China’s State Administration for Industry and Commerce SAIC — the nation’s main business authorities — visited Microsoft offices in Beijing, Shanghai, Guangzhou and Chengdu. Microsoft said the purpose of the visit was to begin an official investigation. It did not elaborate further.Microsoft China spokeswoman Joan Li said the company would "actively cooperate" with the government, reported the South China Morning Post, a Hong Kong-based newspaper.The SAIC also provided no further detail about the investigation.Microsoft enjoys huge sales in China but like many Western companies has also suffered attacks by state media, which have fanned nationalist sentiment against the adoption of U.S. technology in the wake of Edward Snowden’s revelations about U.S. government cyberspying.

via China puts Microsoft under official investigation.

Microsoft fights US warrant for customer data stored overseas – CNET

Wednesday, June 11th, 2014

In the latest challenge to the reach of law enforcement in the digital age, Microsoft and its Web-based email service are pushing back against a US government search warrant for customer emails stored in a data center overseas.In court papers made public Monday, Microsoft’s attorneys list their objections to a judge’s order that the company comply with a warrant issued in December for a customer’s email account data stored in Dublin, Ireland.”The government takes the extraordinary position,” the filing reads, “that by merely serving such a warrant on any US-based email provider, it has the right to obtain the private emails of any subscriber, no matter where in the world the data may be located, and without the knowledge or consent of the subscriber or the relevant foreign government where the data is stored.”

via Microsoft fights US warrant for customer data stored overseas – CNET.

China Bans Microsoft Windows 8 for Government Computers

Wednesday, May 21st, 2014

 

 

China Windows 8
While US government is always prohibiting the purchase of Huawei products due to suspected backdoors from the Chinese government, China also keep itself totally apart from the US productions.
China is a bit famous for using its own operating systems, smartphone application services and lots more, rather than using the US developed Operating Systems, and now China has reportedly banned the installation of Microsoft Corporation’s latest operating system, Windows 8 on any of its government computers.
The Central Government Procurement Center issued a notice that was posted on its website last week prohibiting the use of Microsoft’s latest operating system and the reason behind it is to support the use of energy-saving products, the report said.
But the state news agency ‘Xinhua’ pointed out a different reason for the ban saying the country wants to avoid any further losing of the support for an operating system like it did recently by pulling out its support from the oldest operating system Windows XP, which was widely used in China and is still estimated to be used on as much as half of the Chinese desktop market, the Chinese news agency claimed.
In the beginning of last month, Microsoft stopped providing the support for its longest running and most successful 13 year old Operating system, Windows XP, despite the fact that it has been used widely across the world than any other OS.
China

According to China’s Central Government Procurement Center, all the desktops, laptops, and tablets used by central state agencies must run on an OS other than Windows 8. “All computer products are not allowed to install [the] Windows 8 operating system,” reads the post on the center’s website.

The ban applies only to the government offices, however the market of personal computers remains unaffected. Till now, Microsoft didn’t respond to comment on the issue.

via China Bans Microsoft Windows 8 for Government Computers.

FBI double agent linked to overseas hacks against Iranian and Syrian governments | ITProPortal.com

Friday, April 25th, 2014

hackerhead

Having turned informant for the FBI, the hacker, real name Hector Xavier Monsegur, aided the agency in tracking down and identifying other prominent members of the Anonymous network.

Now, documents uncovered by The New York Times have revealed that he may have been painting a target on other government’s websites, particularly those of Iran, Pakistan and Syria.

The new documents show that Monsegur had been recruiting Anonymous members to do the US government’s work for it, though it is unclear if this was at the FBI’s request. The target list supplied by Monsegur to his recruits, according to The New York Times, contained more than 2,000 internet domains.

While working for the FBI he played a major role in the Anonymous attack on intelligence company Stratfor, his testimony secured a 10-year prison sentence for fellow hacktivist Jeremy Hammond.

via FBI double agent linked to overseas hacks against Iranian and Syrian governments | ITProPortal.com.