FIREEYE THREAT INTELLIGENCE CYBER THREATS TO THE NORDIC REGION MAY 2015 SECURITY REIMAGINED
|
|
|
- Ethan Dawson
- 10 years ago
- Views:
Transcription
1 R E P O R T FIREEYE THREAT INTELLIGENCE CYBER THREATS TO THE NORDIC REGION MAY 2015 SECURITY REIMAGINED
2 CONTENTS 1 Key Findings 3 Key Sectors Facing Cyber Threats 4 The Nordic Region In the Crosshairs of Targeted Threat Actors 5 Detecting Threat Activity Towards Our Nordic Clients 6 APT and Targeted Malware Prevalent in the Nordic Region 8 Industry Breakdown of APT and Targeted Malware Alerts 8 Crimeware in the Nordic Region 9 Targeting Key Industries for Economic Espionage 10 Threatening Nordic Organizations That Promote Transparency and Free Speech 12 Russia-based APT Group Conducts DDoS Attack on Controversial Chechen News Site 11 Hacktivists Protesting Cartoon Depiction of Muhammad Deface Danish Websites 11 Stealing Nordic Countries Political and Military State Secrets 13 China-Based APT Group Uses Spear Phishing s Referencing Putin to Collect Diplomatic and Military Intelligence 13 Finnish Ministry of Foreign Affairs Reports Multi-Year Cyber Espionage Campaign 13 Russia Based APT Group Appears to Target Nordic Country s Military 13 Targeting the Nordic Energy Industry for Destructive Activity and Computer Network Attack 14 Eyeing Nordic Healthcare and Personal Information for Cyber Crime 15 Conclusion 16 Appendix A 17 2
3 The nordic region is extolled for its rich natural resources, innovations in renewable energy and healthcare, and transparency in government. These traits also make the region a prime target of cyber threat groups. Threat actors have targeted strategic industries and government and defense agencies searching for valuable economic, political, and military intelligence. Their goal: capitalize on Nordic countries robust economies and gain an upper hand in the region s distinct geopolitical concerns. This report details some of cyber threat activity we have observed against Denmark, Finland, Iceland, Norway, and Sweden. We explore motivations of the cyber threat and factors that could trigger future activity in the region. KEY FINDINGS State-sponsored threat actors pose the greatest risk to Nordic governments and industries. These threat actors want state secrets, sensitive personal and financial data, and intellectual property from key industries. State-sponsored threat actors most likely seek to use any information that they obtain to benefit their government s decision makers and industries. Nordic companies and governments are likewise vulnerable to cyber criminals looking to cash in on stolen data. Malware used in these attacks could pose an incessant burden to network defenders. State-sponsored threat actors could conduct computer network attacks against strategic Nordic assets if tensions increase or conflict arises between the sponsoring government and victim country. 3
4 KEY SECTORS FACING CYBER THREATS Nordic countries robust aerospace and defense, energy, healthcare and pharmaceutical, shipping, and governments are prime targets for cyber threat actors in search of valuable economic, political, or military intelligence. SECTOR Aerospace and Defense INTEREST OF ADVANCED PERSISTENT THREAT GROUPS APT groups target and steal intellectual property and other sensitive data from regional aerospace and defense organizations. KEY INDUSTRIES Aerospace and defense manufacturing Commercial space vehicles, rockets, satellites, aircraft Science R&D Military aircraft, missiles, rockets, satellites Energy The energy sector is a strategic industry, with implications for countries economic development, military security, sovereignty, and political influence. This sector is particularly relevant in the Nordic region, given Norway s resources and role as a top supplier to the EU. Oil and gas exploration, production and distribution Green energy development Industrial control systems Healthcare and Pharmaceuticals Multiple APT groups target this sector globally, most likely to obtain intellectual property to provide their own indigenous companies with an economic advantage. The Nordic region Denmark in particular is known for its innovations in the healthcare and pharmaceutical industry. Pharmaceuticals Biotechnology Medical equipment Hospitals Healthcare providers Health insurance Shipping The shipping industry probably faces threats from both APT groups and cyber criminals, given its economic importance and handling of valuable goods and equipment. Shipping Retail/delivery Harbor/port management Shipbuilding Governments APT groups frequently pursue governments and militaries to steal intelligence. Nordic countries interests in the Arctic Circle and proximity to Russia make them targets for military and political espionage. Foreign ministries Militaries 4
5 REPORT THE NORDIC REGION In the Crosshairs of Targeted Threat Actors T able 1 lays out key economic and political risk factors for Nordic states. These strategic industries and geopolitical interests place commercial and government organizations in the crosshairs of targeted threat groups. We cannot definitively say if these threat actors work for their governments, but their operations are often aligned with their government s objectives. Russia-based threat groups are known to target Nordic governments and industries that compete with Russia in the European energy market. Russia and its Arctic Circle neighbors have overlapping territorial claims and conflicting interests in the region. China-based groups also have targeted Nordic countries. These groups are likely looking to steal economic information and intelligence about Nordic governments plans and interests in the Artic. These include research, trade, and access to shipping routes and natural resources. n Norway probably has the greatest risk of being targeted by China-based groups. Relations between Oslo and Beijing have been tense since 2010, when the Norwegian Nobel Committee awarded the Peace Prize to an imprisoned Chinese human rights activist. In 2012 and 2013, Norway considered blocking China s attempts to gain observer status in the Artic Council. And in January 2015, Norway expelled two Chinese students over national security concerns.1 5
6 Table 1: Key Nordic Economic and Political Risk Factors COUNTRY DENMARK FINLAND ICELAND NORWAY SWEDEN PARTICIPATION IN REGIONAL ORGANIZATIONS EU X X X NATO X Bilateral partner increasing participation in NATO operations amid Western tensions with Russia. X X Bilateral partner increasing participation in NATO operations amid Western tensions with Russia. OSCE X X X X X Arctic Council X X X X X KEY ECONOMIC TRAITS Intellectual property, research and development, particularly in healthcare High-tech innovations, telecommunications High-tech and software development, biotechnology innovations Oil and gas reserves, investment in renewable energy Large manufacturing (cars, machinery, and industrial equipment) SECURITY CONCERNS VIS-À-VIS RUSSIA In March 2015, Russia suggested that Denmark s navy could become a nuclear target after Denmark proposed it would host NATO s missile defense shield on its frigates. 2 Denmark does not currently host the missile shield. Denmark and Russia also have conflicting territorial claims in the Arctic Circle. Russia has grown increasingly concerned about Finland s cooperation with NATO and has reopened a military base near the Finnish border. 3 In response, Finland has sought to strengthen defense cooperation with Sweden, another non-aligned NATO partner that is not covered by Article V, NATO s mutual assistance doctrine. 4 Iceland is the only NATO member without a standing military, and is reliant on its multilateral partners for defense. 5 Since 2007, Russian strategic bombers have flown occasional training sorties near Iceland s air defense zone. 6 In 2009 a crossparty parliamentary committee identified the rearmament of military forces in the Artic and cyber security as top security vulnerabilities. 7 Norway has Europe s largest oil and natural gas reserves and is the EU s top energy supplier after Russia. 8 In a conflict, an adversary might attempt to disrupt Norway s production to cut off Europe s energy supply. Sweden has contended with several recent instances of Russian aggression, including suspected submarine activity off its coast, an unannounced mock nighttime bombing raid over Stockholm, and repeated airspace violations. 6
7 REPORT DETECTING THREAT ACTIVITY Towards Our Nordic Clients F ireeye products continue to assist clients in the Nordic region to identify malware that advance persistent threat (APT) groups and other targeted actors use when attempting to access their networks. The statistics in this section are generated from clients that have opted to share anonymized data through the FireEye Dynamic Threat Intelligence (DTI) network. The data provides a glimpse into cyber threats facing the region. FINLAND 3% DENMARK 36% NORWAY 47% SWEDEN 14% Figure 1: APT and Targeted Malware Alerts in the Nordics: Breakdowns by Country 7
8 Figure 2: APT and Targeted Malware Infections: Nordic Region APT and Targeted Malware Targeting the Nordic Region LV (NjRAT), XtremeRAT, and Gh0stRAT were the most prevalent malware families that FireEye products detected among our clients in the region. LV alone constituted half of targeted malware detections. 2% 2% 2% 2% 2% 3% 3% 4% 4% 5% 50% LV (NjRAT) XtremeRat Gh0STRAT Blackshades SpyNet PINGBED Adwind 9002 (HOMEUNIX) Kaba (SOGU) 10% ADDTEMP 11% RunBack WITCHCOVEN Other Figure 3: Targeted Malware Alerts By Industry: Nordic Region Industry Breakdown of APT and Targeted Malware Alerts More than a third of the APT and targeted malware FireEye detected originated from clients in the services and consulting sector. (Note: These statistics do not account for the number of appliances at a client site or the number of FireEye clients in a specific industry.) 2% 8% 5% 12% 9% 9% 2% Chemicals, Manufacturing and Mining Education Energy and Utilities Financial Services Healthcare High-Tech Manufacturing 10% 37% Other Services Consulting 6% Telecom 8
9 Figure 4: Crimeware Infections Among FireEye's Nordic Clients Crimeware in the Nordic Region Our Nordic clients also faced threat activity associated with cyber crime. Though distinct from APT group activity, cyber crime can still have serious ramifications. Crimeware variants including botnets, Trojans, and ransomware can consume an organization s computing power, steal and expose sensitive information, and enable financial theft. Of the crimeware variants affecting our clients in the region, FireEye most frequently detected Zbot (Zeus), followed by Nymiam, Hardcore, and DarkComet, among others. The majority of the crimeware variants that we identified were so-called infostealers designed to collect credentials and other private user information. 4% 4% 4% 5% 5% 6% 7% 16% 8% 8% 22% 33% Trojan Zbot (Zeus) Nymaim HardCore Darkcomet Asprox Fareit ZeroAccess Dridex Kulouz Cridex Other InfoStealer 58% 10% Remote Access Trojan 10% Ransomware Figure 5: Types of Crimeware Prevalent Among FireEye Clients in the Nordic Region 9
10 TARGETING KEY INDUSTRIES for Economic Espionage Many times, we have investigated cases in which government-backed APT groups, particularly those from China and Russia, have compromised and stolen data from clients in the Nordic states. These threat actors often target their victims most sensitive information, including executive s, financial data, and intellectual property. They probably hand the data over to support the sponsor government s economic, military, and political goals. Governments can use this information to boost domestic industries. By stealing foreign competitors goods and technologies, they can undercut competing suppliers on the global market and gain the upper hand in negotiations with foreign counterparts. Table 2 highlights several regional industries we believe are particularly interesting to APT groups. Table 2: APT Groups' Economic Interests and Likely Targets SECTOR INTERESTS OF APT GROUPS RECENT CASES Aerospace and Defense Energy APT groups target and steal IP and other sensitive data from aerospace and defense organizations in multiple countries. The sector is particularly valuable for statesponsored actors, given its importance to Nordic military forces, defense industries, and global arms trade. The energy sector is a strategic industry that greatly affects countries economic development, military security, sovereignty, and political influence. This sector is particularly relevant in the Nordic region, given Norway s resources and role as a top supplier to the EU. Norway has sought to increase the amount of gas that it supplies to the EU and Baltic states amid concerns about their dependence on Russian energy following the crisis in Ukraine and resulting tension between Russia and Europe. 12 In providing an alternative to Russian gas, Norway is also undercutting one of Russia s key sources of leverage. The sensitivity surrounding this effort is not lost on Norway s police, who claim that Russia is increasing its intelligence collection with regards to Norway s energy sector, possibly for sabotage purposes. 13 We investigated an incident in 2011 where a Chinabased threat group compromised the network of a Nordic aerospace equipment manufacturer. The group stole several file directories containing: Corporate communications Aerospace presentations Sales, marketing, and facility-management information This group had already compromised and stolen data from numerous US defense firms and other victims. In August 2014, Norway s National Security Authority (NSM) announced threat actors had compromised as many as 50 Norwegian oil companies, including its largest, state-owned oil firm Statoil. The NSM advised 250 other energy companies to check their networks for evidence of malicious activity. This activity affected several clients in the energy industry. In one case, threat actors sent a phishing with a malicious attachment to a high-ranking employee in the procurement division at a Nordic energy company. The purported to be from the company s human resources team and threatened the employee with dismissal. Threat actors also sent phishing s to several other company employees, including two in the legal and procurement departments. These phishing s appeared to be from human resources representatives and contained malicious PDF attachments. We believe this activity is associated with the suspected Russian actors behind the Fertger/ Havex malware family, which other researchers refer to as Energetic Bear or Dragonfly. MOST LIKELY CORPORATE TARGETS Aerospace and defense manufacturing Commercial space vehicles, rockets, satellites, aircraft, Science R&D Military aircraft, missiles, rockets, satellites Oil and gas exploration, production and distribution Green energy development Industrial control systems 10
11 Table 2: APT Groups' Economic Interests and Likely Targets SECTOR INTERESTS OF APT GROUPS RECENT CASES Healthcare and Pharmaceuticals The Nordic region Denmark in particular is known for its innovations in the healthcare and pharmaceutical industry. 14 We have seen multiple APT groups target this sector globally most likely to obtain intellectual property to provide their own indigenous companies with an economic advantage. The industry is also emerging as a prime target for both state actors and cyber criminals looking to steal personally identifiable information. Just this past year, several American healthcare providers suffered high profile breaches resulting in the large-scale theft of patient information. The high level of digitalization in the region Denmark and Sweden rank among the highest in terms of Internet connectivity and integration of the EU countries has raised concerns about the security of citizens sensitive data, and permission for its collection In 2014, the Danish public became aware of a government-mandated healthcare data collection program compiling citizens sensitive medical data in a privately hosted database available to publicly and privately funded researchers. 17 The ensuing controversy highlighted the public s unease about the collection of sensitive data, as well as concerns over its security. While accidental exposures of such data most likely will embarrass and threaten the privacy of those affected, threat groups may also attempt to steal such data for identity theft (including medical identity theft), or to profile patients, or facilitate other targeting and espionage efforts. MOST LIKELY CORPORATE TARGETS Pharmaceuticals Biotechnology Medical equipment Hospitals Healthcare providers Health insurance Shipping The shipping industry probably faces threats from both APT groups and cyber criminals, given its economic importance and handling of valuable goods and equipment. APT groups have compromised shipping companies in the past, stealing: Blueprints for new ship models Internal s Financial records Files related to business plans, production, sales, and services Cyber criminals have also targeted shipping records to facilitate the theft or transport of illegal cargo. Nordic shipping companies would most likely be at risk of financial loss and reputational damage as a result of cyber criminal activity. A shipping company experienced a similar situation in 2013 at a port in Antwerp, Belgium, when police found that international drug cartels had used cyber criminals to breach the company s networks to help them send and receive illegal drugs. 18 The cyber criminals used their access to alter shipment records and obtain security codes for retrieving the cargo from the port. Belgian and Danish police estimate that this activity helped the cartels transfer as much as two tons of cocaine and heroin during a two-year period. Shipping Retail/delivery Harbor/port management Shipbuilding 11
12 THREATENING NORDIC ORGANIZATIONS That Promote Transparency and Free Speech We have frequently observed these actors stealing data, which the sponsoring government most likely uses to monitor activities it perceives as controversial or sensitive. Efforts to promote free speech and transparency probably makes Nordic nonprofits, minority groups, and media agencies a target of APT groups, whose sponsoring governments view those issues as a threat to their legitimacy and domestic stability. 19 We have frequently observed these actors stealing data, which the sponsoring government most likely uses to monitor activities it perceives controversial or sensitive. Russia-based APT Group Conducts DDoS Attack on Controversial Chechen News Site For several years, a Swedish Internet service provider hosted The Kavkaz Center, a controversial Chechen news site that critics claim promotes extremism. The Russian government tried to pressure Sweden into taking the site offline, and threat actors have targeted the site. Over the course of two months in 2012, threat actors launched sustained distributed denialof-service (DDoS) attack. In 2002, Kavkaz spokespersons alleged the Russian government was involved in taking the site offline during security forces highly controversial Moscow theater raid in Hacktivists Protesting Cartoon Depiction of Muhammad Deface Danish Websites In 2006, a Danish newspaper printed a controversial cartoon that critics said insulted the Prophet Muhammad. 21 In response, hacktivists defaced an estimated 1,000 Danish websites with messages condemning the image and its publication. Firms monitoring the defacements stated that individuals, some from as far as the Middle East and Asia, coordinated their activity through online forums. 22 Many of the affected sites belonged to smaller companies vulnerable because of their limited security awareness and resources
13 STEALING NORDIC COUNTRIES POLITICAL and Military State Secrets China-Based APT Group Uses Spear Phishing s Referencing Putin to Collect Diplomatic and Military Intelligence In mid-march 2015, a China-based APT group sent spear phishing s to Nordic security and defense organizations. The threat group used lures referencing Russian President Vladimir Putin s then-recent absence from public view, an event that had prompted media speculation over the state of his health and hold on power. 24 The s contained Word documents one containing a news article from a UK newspaper exploiting the CVE vulnerability. It dropped a newly compiled variant of a malware family popular among known and suspected China-based threat groups. This activity most likely was part of an effort to collect diplomatic and military intelligence. Finnish Ministry of Foreign Affairs Reports Multi-Year Cyber Espionage Campaign Finland's Ministry of Foreign Affairs announced in November 2013 that it had been the victim of cyber espionage and data theft of political intelligence for approximately four years. 25 The Finnish Foreign Minister notified other EU states, which the Minister said had encountered similar cyber espionage activity. According to another Ministry official, the activity in Finland was "similar to, and more sophisticated" than the Red October cyber espionage campaign, which reportedly has been targeting similar data from European governments since Finland's official statement did not identify any suspects. But some security analysts speculate that Russian or Chinese actors were behind the activity. Russia Based APT Group Appears to Target Nordic Country s Military In October 2014, we released a report on APT28, 1 a suspected Russian threat group that has systematically targeted Western and European governments and military organizations, including a military in the Nordic region. APT28 primarily relies on phishing s and spoofed login pages to collect credentials and compromise victims. The group has also been observed using zeroday exploits. We believe this group seeks political and military intelligence, which it steals from its victims through implants configured to send data out of the network. APT28 often tries to mask its activity from network administrators by using spoofed domains that mimic those of legitimate websites web users at the targeted entity would normally visit. For example, one of APT28 s spoofed domains mimicked a website belonging to a Nordic country s military, suggesting that this military was one of APT28 s targets. 1 APT28 A Window Into Russia s Cyber Espionage Operations is available at 13
14 TARGETING THE NORDIC ENERGY INDUSTRY for Destructive Activity and Computer Network Attack Espionage is not the only concern facing organizations in the Nordic region; organizations may also be at risk of politically motivated destructive activity or computer network attacks. This concern is particularly relevant for the energy industry, whose strategic importance makes it a target for destructive actors worldwide. Norway is a top energy supplier for the EU and has publicly warned of potential threats from state actors. Ongoing tensions between Russia and the West over Ukraine have underscored Russia s control of Europe s energy supply and its ability to disrupt it. In the past year, researchers identified two malware families that suspected Russian actors have used to target critical infrastructure in the Nordic region. Norway s NSM officially stated that the Havex/ Fertger malware found in the networks of Norwegian oil companies were most likely part of an espionage operation. But the threat actors may well have been conducting reconnaissance for later destructive activity. 27 In February, Kaspersky Labs reported on another suspected Russian tool, BlackEnergy2, found on industrial control system (ICS) networks, including that of an organization in Sweden. The malware can overwrite data and was most likely intended for sabotage. 14
15 EYEING NORDIC HEALTHCARE and Personal Information for Cyber Crime Enterprise like cyber criminal groups also go after Nordic organizations and steal data for financial gain. APT groups are not the only threat actors eyeing potential victims in the region. Enterprise like cyber criminal groups also go after Nordic organizations and steal data for personal gain. These threat actors search for data they can easily monetize, such as personally identifiable information or financial account data. Some actors use this stolen information to steal victims identities, withdraw funds, and make fraudulent purchases. Others sell the information on underground markets. In addition to potential threats to healthcare and personal information, cyber criminals pose a threat to other Nordic industries. In one case, we found three different types of crimeware in the network of an industrial equipment manufacturer. During an investigation at a telecommunications company, we found that threat actors had tried to change server routing tables, most likely to leverage the firm s infrastructure for further operations. 15
16 CONCLUSION Nordic organizations will face persistent threats because of the region s strong industries, intellectual property, insider data, and geopolitical interests. While we anticipate that Nordic countries will experience mostly consistent threats, certain events may trigger spikes in activity. For example, threat actors engaged in economic espionage most likely will increase their targeting activity against organizations that have identified a potentially lucrative new innovation. They might seek to steal designs for a newly developed product. Or they may want to gain the upper hand for their sponsor in trade deals or negotiations. Threat actors searching for political and military intelligence, in turn, will almost certainly increase their targeting tempo during strategic negotiations or increased tension between their sponsor and targeted government. Geopolitical tensions, such as Arctic territorial disputes, NATO operations, and the ongoing crisis in Ukraine, will most likely influence targeting as rival parties seek to advance their goals with valuable intelligence. And if tensions escalate or devolve into outright conflict organizations in the Nordic region may also be at an increased risk of destructive activity or computer network attacks meant to damage or destroy key infrastructure. ABOUT FIREEYE FireEye protects the most valuable assets in the world from those who have them in their sights. Our combination of technology, intelligence, and expertise reinforced with the most aggressive incident response team helps eliminate the impact of security breaches. We find and stop attackers at every stage of an incursion. With FireEye, you ll detect attacks as they happen. You ll understand the risk these attacks pose to your most valued assets. And you ll have the resources to quickly respond and resolve security incidents. FireEye has over 3,100 customers across 67 countries, including over 200 of the Fortune
17 APPENDIX A ENDNOTES 1 Baker, Benjamin David. From China with Love: China, Norway, and Espionage. The Diplomat. 14 Feb Web. 14 April Russian Ambassador Warns Denmark Over NATO Missile Shield. Agence France-Presse via Defense News. 22 March Web. 25 March Bender, Jeremy. Russia is Constructing an Arctic Stronghold 30 Miles from the Finnish Border. Business Insider. 14 Jan Web. 25 March Harress, Christopher. Scared by Russia, Sweden and Finland Make War Pact. International Business Times. 19 Feb Web. 25 March U.S. Relations with Iceland. Bureau of European and Eurasian Affairs, U.S. Department of State. 21 Jan Web. 13 April Benedictsson, Einar. At Crossroads: Iceland s Defense and Security Relations, US Army Strategic Studies Institute, the US Army War College.18 August Web. 11 May Summary of the Findings of an Interdisciplinary Commission Appointed by the Icelandic Foreign Minister. A Risk Assessment for Iceland: Global, Societal, and Military Factors. Icelandic Ministry of Foreign Affairs. March Norway can Slightly Boost Gas Supply to EU. The Local. 26 Sept Web. 12 March Nordenman, Magnus. Sweden s Mysterious Submarine Hunt and its Significance for Nordic-Baltic Security. The Atlantic Council. 20 Oct Web. 25 March Cenciotti, David. Russia Simulated a Large-Scale Aerial Night Attack on Sweden. Business Insider. 23 April Web. 12 April Mohsin, Saleha. Russia Threat Prompts Nordic Governments to prepare for Worst. 15 Nov Web. 11 March Norway can Slightly Boost Gas Supply to EU. The Local. 26 Sept Web. 12 March Norway Intelligence Claims Russian Intelligence Intensifies Monitoring Norwegian Energy Activities. The Nordic Page. 24 March Web. 24 March The Pharmaceutical Market: Denmark. Espicom, Business Monitor International. 20 Dec Web. 25 March Denmark. Digital Agenda for Europe: A Europe 2020 Initiative. European Commission. 24 Feb Web. 21 April Sweden. Digital Agenda for Europe: A Europe 2020 Initiative. European Commission. 24 Feb Web. 21 April Degett, Jens. One Step Too Far for Legendary Danish Transparency. EuroScientist. 25 March Web. 21 April Pasternack, Alex. To Move Drugs, Traffickers are Hacking Shipping Containers. Motherboard, Vice. 21 Oct Web. 2 April Tatlow, Didi Kristen. Smale, Alison. China Loses Ground in Transparency International Report on Corruption. The New York Times. 3 Dec Web. 20 April Sturgeon, Will. Russia accused of waging cyber-war on Chechnya. ZDNET. 14 Nov Web 30 April Ward, Mark. Anti-Cartoon Protests Go Online. The BBC. 8 Feb Web. 30 April Ward, Mark. Anti-cartoon protests go online. The BBC. 8 Feb Web. 30 April Ward, Mark. Anti-cartoon protests go online. The BBC. 8 Feb Web. 30 April
18 24 Keating, Joshua. Putin is Back! Gives No Explanation for His 10-Day Disappearance. Slate. 16 March Web. 9 April Pohranpalo, Kati. Viita, Kasper. Finland Probes Hacking of Foreign Ministry Network. Bloomberg LP. 1 Nov Web. 9 April Farivar, Cyrus. Finland s Foreign Ministry Gets Pwned by Worse-Than-Red October Malware. Ars Technica, Conde Nast. 31 Oct Web. 9 April Hackers attack Norway s oil, gas, and defence business. The BBC. 18 November Web. 30 April Baumgartner, Kurt. Garnaeva, Maria. BE2 Extraordinary Plugins, Siemens Targeting, Dev Fails. Securelist. Kaspersky Labs. 17 Feb Web. 10 April Baumgartner, Kurt. Garnaeva, Maria. BE2 custom Plugins, Router Abuse, and Target Profiles. SecureList. Kaspersky Labs. 3 Nov Web. 9 April
19 To download this or other FireEye Threat Intelligence reports, visit: FireEye, Inc McCarthy Blvd. Milpitas, CA FIREEYE ( ) FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. R.CTNR.EN-US
FIREEYE THREAT INTELLIGENCE SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE SECURITY REIMAGINED MARCH 2015
S P E C I A L R E P O R T FIREEYE THREAT INTELLIGENCE SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE MARCH 2015 SECURITY REIMAGINED CONTENTS MARCH 2015 Introduction 3 Key Findings 4 Detecting Targeted
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
The Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
Home Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
SPEAR-PHISHING ATTACKS
SPEAR-PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM WHITE PAPER RECENTLY, THERE HAS BEEN A RAPID AND DRAMATIC SHIFT FROM BROAD SPAM ATTACKS TO TARGETED EMAIL-BASED-PHISHING CAMPAIGNS THAT
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Threat Landscape. Threat Landscape. Israel 2013
Threat Landscape Threat Landscape Israel 2013 Document Control Document information Version Title Creation Date Revision Date 1.4 Threat Intelligence / Israel 2013 17 January 2014 27 January 2014 Contact
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
The Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
MEMORANDUM OF UNDERSTANDING
MEMORANDUM OF UNDERSTANDING BETWEEN THE GOVERNMENT OF THE KINGDOM OF SWEDEN AND THE MINISTRY OF DEFENCE OF THE KINGDOM OF DENMARK ON THE ENHANCED DEFENCE COOPERATION WITHIN THE AIR AND MARITIME DOMAIN
NEW ZEALAND S CYBER SECURITY STRATEGY
Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Dragonfly: Energy Companies Under Sabotage Threat Symantec Security Response
Dragonfly: Energy Companies Under Sabotage Threat Symantec Security Response Dragonfly: Western Energy Companies Under Sabotage Threat 1 What is Dragonfly? Ongoing cyberespionage campaign Targeting the
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
EY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011
Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011 Notes abstracted from Desmond Ball, China s Cyber Warfare Capabilities, Security Challenges, Vol. 7, No. 2, Winter 2011, pp. 81-103).
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
Identifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
18th Annual Space & Missile Defense Symposium IAMD Evolution and Integration/Key Topic: Predictive Cyber Threat Analysis Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)
Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
NATO & Cyber Conflict: Background & Challenges
NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented
How To Protect Your Business From A Cyber Attack
Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
Research Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
DATA SHEET. What Darktrace Finds
DATA SHEET What Darktrace Finds Darktrace finds anomalies that bypass other security tools, due to the uniqueness of the Enterprise Immune System, capable of detecting threats without reliance on rules,
Viewpoint: Implementing Japan s New Cyber Security Strategy*
Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
INDUSTRY OVERVIEW: FINANCIAL
ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
Incident Response. Proactive Incident Management. Sean Curran Director
Incident Response Proactive Incident Management Sean Curran Director Agenda Incident Response Overview 3 Drivers for Incident Response 5 Incident Response Approach 11 Proactive Incident Response 17 2 2013
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
How do we Police Cyber Crime?
How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges
China s Economic Espionage
China s Economic Espionage Stealing, Not Destroying Reema Hibrawi This paper seeks to examine the economic espionage threat to the national security of the United States from the Chinese government in
Big Threats for Small Businesses
White Paper Big Threats for Small Businesses Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals White Paper Contents Introduction 3 Today s Attacks Target Small and Midsize
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Advanced Cyber Threats in State and Local Government
RESEARCH SURVEY Advanced Cyber Threats in State and Local Government January 2014 SHUTTERSTOCK UNDERWRITTEN BY: Section 1: Executive Overview In the past, scattershot, broad-based attacks were often more
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
Federal Bureau of Investigation
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
Advanced Persistent Threats
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE
CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE November 2004 Revised December 2004 Charles Billo Welton
Declaration on the 20th Anniversary of the Barents Euro-Arctic Cooperation. (Kirkenes, Norway, 3 4 June 2013)
1 Declaration on the 20th Anniversary of the Barents Euro-Arctic Cooperation (Kirkenes, Norway, 3 4 June 2013) Prime Ministers and other high-level representatives of the members of the Barents Euro- Arctic
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015
UNCLASSIFIED Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI June 15th, 2015 This document was prepared by The Institute for National Security Studies (INSS) Israel and The Cyber Security Forum
IBM Security Systems Trends and IBM Framework
IBM Security Systems Trends and IBM Framework Alex Kioni CISSP, CISM, CEH, ITILv3 Security Systems Lead Technical Consultant Central, East & West Africa Region 1 Agenda IBM X-Force 2013 Mid Year Trend
Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
