Archives For cyberattack

missleCyberweapons Are Here – Offensive Strikes From The US?

Does anyone remember S3? A small company out of Florida, about 15 years ago, called on me while I was running security for Dimension Data, North America. Their product offered a way to counterattack anyone who came at them with a cyberattack…The product never took off, simply because our laws don’t allow companies to launch counterattacks.  Yesterday’s WSJ offers some new perspective on where the US Government is  headed with this.

“The U.S. military has spent five years developing advanced cyberweapon and digital capabilities and is likely to deploy them more publicly soon, the head of the Pentagon’s U.S. Cyber Command said Thursday.” – WSJcompliancy group

Some important sound bites on this subject…WSJ

  • “Adm. Rogers (the current NSA Director ) suggested many Americans have become complacent, since they don’t see the rise of cyber armies and cybercriminals affecting their daily lives.” – An understatement from the WSJ!
  • The wakeup call is coming… “Analysts have said these sorts of acts could include attacking a country’s electrical grid or knocking a nation’s financial system offline.”
  • Rogers… “I would argue it’s going to get worse before it gets better.”- Really, do you really see this getting better any time soon?

Read the article if you have access….

Some of the attacks we’ve seen over the past year – OPM, Sony, and others,… they seem to be coming from China, Korea, and other Nation States looking to sift us of our Intellectual capital or create disruptions, as in the case of Sony, we are in fact at war.

© 2016, David Stelzl

PS. Join me on Feb 12th at SecureWorld…I’ll be speaking at 8:30AM – Charlotte NC.

 

 

In today’s WSJ investigators reveal some of the tactics used to compromise and bring down sites in last year’s conflict with Georgia.  They used stolen U.S. credit cards to fund these activities along with modified Microsoft applications to carry out the technical side of this attack!  Here are a few quotes – I’ve liked the entire story below.

  • Identity theft, social networking, and modifying commercial software are all common means of attack, but combining them elevates the attack method to a new level, said Amit Yoran, a former cybersecurity chief at the Department of Homeland Security.
  • The cyberattacks in August 2008 significantly disrupted Georgia’s communications capabilities, disabling 20 Web sites for more than a week. Among the sites taken down last year were those of the Georgian president and defense minister, as well as the National Bank of Georgia
  • “U.S. corporations and U.S. citizens need to understand that they can become pawns in a global cyberwar,”
  • Mr. Bumgarner traced the attacks back to 10 Web sites registered in Russia and Turkey. Nine of the sites were registered using identification and credit-card information stolen from Americans;

 

http://online.wsj.com/article/SB125046431841935299.html?mod=igoogle_wsj_gadgv1&