eState Hacks


China / Huawei

  • Huawei wants to license its 5G tech to US telecoms.  [Engadget]
  • Germany will not bar Huawei from its 5G networks.  [BBC News]  [PocketNow]
  • Chinese spy trains.  [Schneier]  [NYT]
  • US will 'reassess' info sharing with NZ if Huawei allowed into 5G upgrade.  [Voxy]  [YouTube]
  • Chinese tech firm Huawei says it was hacked by the United States.  [Graham Cluley]
  • Huawei allegedly developed a spy-friendly phone network for North Korea.  [Engadget]
  • China distributes spyware at its border and beyond.  [Wired]
  • The Netherlands are not banning Huawei from 5G rollout.  [PocketNow]
  • Telegram reports China is behind DDoS.  [Wired]
  • Huawei’s export ban is wider in scope than most people imagine.  [Ars Technica]  [BBC News]  [PocketNow]  [The Verge]
  • Google: cutting Huawei off from Android actually threatens US security.  [The Verge]  [Ars Technica]  [Engadget]
  • Facebook is stopping Huawei from pre-installing its apps.  [The Verge]  [BBC News]  [Wired]  [Engadget]
  • Huawei can’t officially use microSD cards in its phones going forward.  [The Verge]  [Engadget]
  • China warns of investment blow to UK over Huawei 5G ban.  [BBC News]
  • The case against Huawei, explained.  [The Verge]
  • Huawei working with Google to respond to ban.  [PocketNow]
  • ARM cuts ties with Huawei, threatening future chip designs.  [The Verge]  [Ars Technica]  [ExtremeTech]  [BBC News]  [The Register]  [Android Police]
  • Huawei’s US ban: A look at the hardware and software supply problems.  [Ars Technica]
  • US government warns China may have access to drone data.  [Engadget]  [ExtremeTech]  [DPReview]
  • Chinese customers are firmly supporting Huawei after Google pulls Android license.  [The Verge]
  • Lawmakers applaud Google for revoking Huawei’s Android license.  [The Verge]
  • US spy chiefs used classified info to warn tech execs about doing business with China.  [The Verge]
  • Seven questions we still have about Huawei’s US blacklisting.  [The Verge]
  • Google revokes Huawei's Android software license.  [HEXUS]  [ExtremeTech]  [Engadget]
  • Intel, Qualcomm, Broadcom, and Xilinx all move to cut off Huawei.  [ExtremeTech]  [DC Knowledge]  [Engadget]
  • US may soften ban on Huawei to help existing users.  [Engadget]
  • White House cracks down on Huawei equipment sales with executive order.  [The Verge]  [Engadget]  [EETimes]  [Ars Technica]
  • Huawei willing to sign no-spy agreements with governments.  [PocketNow]
  • FCC denies China Mobile's bid to provide services in the US.  [Engadget]
  • Huawei had unauthorised access to people's computers.  [Stuff]
  • Bloomberg: 'Hidden backdoors’ were found in Huawei equipment.  [The Verge]
    • Secret Huawei enterprise router snoop 'backdoor' was Telnet service.  [The Register]
  • NYT investigates China’s surveillance-state exports.  [The Verge]  [NYT]
  • Huawei will help build Britain’s 5G network, despite security concerns.  [The Verge]  [NZ Herald]  [Stuff]  [PocketNow]  [BBC News]  [HEXUS]  [Engadget]
  • CIA: China’s security agencies provided funds for Huawei.  [The Verge]  [Engadget]
  • FCC proposes blocking China-owned telecom from US phone market.  [Ars Technica]
  • Huawei piles pressure on Govt with ads and sponsorship, security experts say.  [Stuff]
  • FCC chairman wants to keep China Mobile out of the US.  [Engadget]  [The Register]  [Android Police]
  • China and Huawei Marine spying on undersea Internet cables.  [Schneier]  [Bloomberg]
  • Huawei WiFi modules were pulled from Pakistan CCTV system.  [BBC News]
  • Huawei's 'shoddy' work prompts talk of a Westminster ban.  [BBC News]  [NZ Herald]
  • Huawei’s security troubles are hardening into a fight between the US and China.  [The Verge]
  • The real reason Huawei shouldn't be in 5G networks.  [NZ Herald]
  • Huawei's role in NZ runs way deeper than 5G.  [NZ Herald]  [ITP Techblog]
  • Huawei NZ boss outlines two possible ways back in.  [NZ Herald]
  • NSA-inspired vulnerability found in Huawei laptops.  [Schneier]  [Ars Technica]
  • Huawei's problem isn't Chinese backdoors -- it's buggy software.  [Wired]  [NZ Herald]
  • GCHQ delivers scathing assessment of security risks posed by Huawei.  [Stuff]  [NZ Herald]  [ExtremeTech]  [Engadget]  [PocketNow]
  • No European nation has banned Huawei.  [PocketNow]  [The Verge]  [PocketNow]
  • Debate around Huawei espionage fears in UK is not clear.  [The Register]
  • US cranks pressure on UK over Huawei and 5G.  [PocketNow]
  • Is Huawei a security threat?  [The Verge]
  • The Huawei case signals the new US-China cold war over tech.  [Wired]
  • US tells Germany to stop using Huawei equipment or lose some intelligence access.  [The Verge]  [Engadget]  [The Register]
  • UK government's worries over backdoors in Huawei’s 5G tech castle.  [BBC News]
  • Huawei is suing the US government.  [Engadget]  [The Verge]  [BBC News]  [PocketNow]  [NZ Herald]  [The Register]
  • Experts: U.S. anti-Huawei campaign likely exaggerated.  [Stuff]
  • History of Huawei's legal woes in the U.S.  [EETimes]
  • Huawei promises it will not create backdoors for Chinese government.  [Android Police]
  • US senators want Chinese equipment out of national electricity grid.  [The Register]
  • Could Huawei threaten the Five Eyes alliance?  [BBC News]
  • UK NCSC: Huawei hasn't yet fixed its security vulns.  [The Register]
  • Germany may use Huawei hardware for its 5G networks.  [Engadget]
  • Huawei founder denies sharing secrets with China.  [Stuff]
  • Huawei founder: “There’s no way the US can crush us.”  [Engadget]  [PocketNow]
  • Huawei risk can be managed.  [BBC News]  [Engadget]  [PocketNow]  [NZ Herald]
  • Chinese telecommunications hardware is about to be banned by executive order.  [HardOCP]  [TechSpot]  [ExtremeTech]
  • Can we trust Huawei with 5G?  [The Verge]
  • FBI allegedly ran sting operation on Huawei at CES.  [ExtremeTech]
  • A simple guide to why Huawei is in trouble.  [BBC News]
  • French minister: Europe should act as one regarding Huawei.  [PocketNow]
  • Vodafone puts Huawei rollout in core networks on hold.  [BBC News]  [PocketNow]
  • Huawei deemed "viable and reliable" by Canada's Telus.  [PocketNow]
  • Germany considers locking Huawei out of its network.  [PocketNow]
  • Huawei founder comments amidst tumult on security, US relationship.  [PocketNow]
  • Huawei's year off to a rocky start.  [ITP TechBlog]
  • Taiwanese research institute joins banhammer club.  [The Register]
  • Poland spy arrest: China telecoms firm Huawei sacks employee.  [BBC News]
  • Norway considers banning Huawei from building 5G infrastructure.  [PocketNow]
  • Are Huawei products unsafe or insecure?  [EtherealMind]
  • Huawei hits roadblocks in Europe after US fight.  [NZ Herald]  [BBC News]
  • The US is warning other countries against using Huawei's 5G tech.  [Engadget]
  • Huawei's biggest problem is China.  [NZ Herald]

Stuxnet

  • Remember Stuxnet? Time to patch vulnerable Siemens industrial kit.  [The Register]
  • Israel silent as Iran hit by computer virus more violent than Stuxnet.  [The Times of Israel]  [Ars Technica]
  • Alex Gibney on Stuxnet and why we need to talk about cyberwar.  [Engadget]
  • Stuxnet was the opening shot of decades of non-stop cyber warfare.  [The Register]
  • GCHQ intel used to develop Stuxnet, claims new documentary.  [The Register]
  • Super Stuxnet's SCADA slaves: security is atrocious.  [The Register]
  • US tried Stuxnet variant on N. Korean nuke program, failed.  [Ars Technica]  [BoingBoing]  [Reuters]  [The Register]  [Wired]  [Engadget]  [Gizmodo]  [Graham Cluley]  [HardOCP]  [Schneier]
  • Win 95 code gaffe nearly made Stuxnet Suxnet, say infosec blokes.  [The Register]
  • Stuxnet leak probe stalls for fear of confirming US-Israel involvement.  [Ars Technica]
  • Microsoft fixes Stuxnet bug, again.  [Krebs]  [The Register]  [Graham Cluley]  [Engadget]
  • Stuxnet worm infected high-profile targets before hitting Iran nukes.  [Ars Technica]  [Engadget]
    • Iranian contractor named as Stuxnet 'patient zero'.  [The Register]
  • An unprecedented look at Stuxnet, the world’s first digital weapon.  [Wired]  [Gizmodo]  [Symantec]
  • Stuxnet 2 in the works, claims Iranian news agency.  [The Register]
  • Recommended reading: Stuxnet's more dangerous precursor, fake memories and more  [Engadget]
  • More on Stuxnet.  [Schneier]  [Foreign Policy]  [Langner PDF]
    • PDF attached below: Stuxnet - to kill a centrifuge.pdf
  • Stuxnet's earlier version much more powerful.  [Dark Reading]  Gizmodo]  [The Register]  [BoingBoing]  [Foreign Policy]
  • Stuxnet infected Russian nuke power plant.  [The Register]  [The Register]  [Gizmodo]
  • Snowden: US and Israel did create Stuxnet attack code.  [The Register]
  • Former high-ranking US general reportedly being targeted in Stuxnet leak investigation.  [The Verge]  [Ars Technica]  [The Register]
  • Did Stuxnet actually improve Iran's nuclear capabilities?  [WSJ ATD]  [The Register]
  • UN manual on cyberwar says Stuxnet may have been 'armed attack'.  [The Register]
  • Symantec reports early Stuxnet variants first went live in 2005.  [The Register]  [Ars Technica]  [Wired]  [Reuters]  [Voxy]  [Engadget]  [Stuff]  [Schneier]  [Symantec]
  • Iran raised its cyberwar game after Stuxnet, US general says.  [WSJ ATD]
  • Stuxnet infected Chevron's IT network.  [WSJ ATD]
  • Kaspersky plans secure OS to combat Stuxnet.  [Wired]  [Nota Bene]  [Engadget]  [HardOCP]  [Kaspersky]  [THG]
  • Another Stuxnet post.  [Schneier]  [IEEE Spectrum]
  • Stuxnet: moral crime or proportionate response?  [The Register]
  • Stuxnet thwarted by control code update.  [BBC News]
  • A weapon we can't control.  [NYT]
  • Professor casts doubt on Stuxnet's accidental "great escape" theory.  [The Register]
  • NSA built Stuxnet, but real trick is building crew of hackers.  [BoingBoing]  [US News]
  • Flame and Stuxnet link found.  [BBC News]  [Ars Technica]  [The Register]
  • How to put "Stuxnet author" on your CV.  [The Register]
  • Stuxnet expert calls US the "good guys" in cyber-warfare.  [Ars Technica]
  • Stuxnet: US can launch cyberattacks but not defend against them, experts say.  [Huffington Post]
  • US officials confirm Stuxnet was a joint US-Israeli op.  [The Register]  [HardOCP]  [VentureBeat]  [Schneier]  [BoingBoing]  [NYT]
    • Stuxnet admission likely to have foreign policy consequences.  [Ars Technica]
    • Report: Obama ordered Stuxnet to continue after bug caused it to spread wildly.  [Wired]  [Gizmodo]  [Engadget]
      • How Obama was dangerously naive about Stuxnet and cyberwarfare.  [Technology Review]
    • Why antivirus companies like mine failed to catch Flame and Stuxnet.  [Wired]  [Ars Technica]
  • Stuxnet worm reportedly planted by Iranian double agent using memory stick.  [Ars Technica]  [ISSS]
  • Richard Clarke on who was behind the Stuxnet attack.  [Smithsonian]
  • Stuxnet worm revisited by 60 Minutes.  [HardOCP]  [WSJ ATD]  [CBS News]
  • Another piece of the Stuxnet puzzle.  [Schneier]  [Digital Bond]
  • Serious security holes found in Siemens control systems targeted by Stuxnet.  [Ars Technica]  [Wired]
  • Stuxnet clones may target critical US systems, DHS warns.  [The Register]
  • How digital detectives deciphered Stuxnet, the most menacing malware in history.  [Wired]  [Ars Technica]
  • Stuxnet deconsructed shows one scary virus.  [Gizmodo]
  • Iran says it has detected a second cyber attack.  [Reuters]  [Gizmodo]
  • Iran lays blame for Stuxnet worm on Siemens.  [The Register]
  • Iran confirms massive Stuxnet infection of industrial systems.  [ComputerWorld]
  • Is Stuxnet the 'best' malware ever?  [ComputerWorld]
  • Stuxnet malware is 'weapon' out to destroy Iran's Bushehr nuclear plant?  [CS Monitor]
  • Stuxnet false flag launched for web takeover.  [InfoWars]
  • Pentagon accused of launching supervirus attack on Iranian nuclear plant.  [Gizmodo]
  • Mystery lingers over stealthy Stuxnet infection  [The Register]
  • Iranian power plant infected by Stuxnet, allegedly undamaged.  [Ars Technica]
  • Stuxnet worm can reinfect PCs even after disinfection.  [The Register]
  • The secret code inside the supervirus attacking Iran's nuclear power.  [Gizmodo]
  • Stuxnet worm slithers into China, heralds alien invasion.  [The Register]
  • Stuxnet worm could have been inside job.  [V3]
  • Stuxnet Q&A.  [F-Secure]
  • Iran boasts of Stuxnet "nuclear spies" arrests.  [The Register]  [BBC News]
  • Stuxnet.  [Schneier]
  • Stuxnet a game changer for malware defence.  [The Register]
  • Stuxnet heralds new generation of targeted attacks.  [Dark Reading]
  • Clues suggest Stuxnet virus was built for subtle nuclear sabotage.  [Wired]
  • Missing piece completes Stuxnet puzzle.  [The Register]
  • Clues suggest Stuxnet virus was built for subtle nuclear sabotage.  [Ars Technica]
  • Stuxnet attacks could move beyond Iranian nuclear plants.  [Ars Technica]
  • Code clues point to Stuxnet maker.  [BBC News]
  • Stuxnet news.  [Schneier]
  • Stuxnet 'hit' Iran nuclear plans.  [BBC News]
  • Could Stuxnet mess with North Korea's new uranium plant?  [Wired]
  • Stuxnet code leak to cause cyber-apocalypse now!  [The Register]
  • Stuxnet apparently as effective as a military strike.  [Ars Technica]
  • Stuxnet may have destroyed 1000 centrifuges at Natanz.  [Jerusalem Post]
  • Report strengthens suspicions that Stuxnet harmed Iran's nuke plant.  [Ars Technica]
  • Stuxnet worm used against Iran was tested in Israel.  [NYT]  [Schneier]
  • Did a US government lab help Israel develop Stuxnet?  [Wired]
  • Lame Stuxnet worm "full of errors" says security consultant.  [The Register]
  • Duck!  Security experts warn of Stuxnet boomerang effect.  [Gizmodo]
  • Report: Stuxnet hit 5 gateway targets on its way to Iranian plant.  [Wired]
  • Stuxnet blitzed five Iranian factories over 10-month period.  [The Register]
  • Ralph Langner: cracking Stuxnet, a 21st-century cyber weapon.  [TED]
  • Symantec PDF report on Stuxnet (attached below): Symantec-Stuxnet-Update-Feb-2011.pdf

Regin


Mask


Flame

  • New version of Flame malware discovered.  [Schneier]  [Motherboard]
  • Flame Windows Update attack could have been repeated in 3 days, says Microsoft.  [Wired]
  • Flame Q&A.  [Kaspersky]
  • US fingered for Flame attack on Elysee Palace.  [The Register]
  • New spying program linked to Flame authors.  [Stuff]
  • Flame espionage weapon linked to more mystery malware.  [The Register]  [Ars Technica]  [Engadget]  [Reuters]  [SecureList]  [Symantec]
    • Kaspersky: Flame has three unidentified malware siblings.  [THG]
  • Flame worm's makers fail to collect Epic 0wnage award.  [The Register]
  • Microsoft kills more code-signing certs to stop Flame-like attacks.  [Ars Technica]
  • Sometimes it's hard to get rid of an old Flame.  [Juniper]  [SecurityWeek]
  • US accused of using Flame to try to cripple Iran's economy.  [DailyTech]
  • Unique insight into Flame malware.  [OpenDNS Blog]
  • Flame was scout ahead of Stuxnet attack on Iran nukes -- US spooks.  [The Register]
  • Report: US and Israel behind Flame espionage tool.  [Wired]
  • Windows updated with better checking for bad digital certs after Flame malware incident.  [Engadget]
  • Flame's crypto attack may have needed $200k worth of compute power.  [Ars Technica]
  • Flame and Stuxnet link found.  [BBC News]  [Ars Technica]  [The Register]
  • Crypto-breakthrough shows Flame was designed by world-class scientists.  [Ars Technica]
  • Flame gets suicide command.  [The Register]  [HardOCP]  [ZDNet]
  • Flame's "god mode cheat mode" wielded to hijack Windows 7, Server 2008.  [Ars Technica]
  • Flame hijacks Microsoft Update to spread malware disguised as legit code.  [Gizmodo]
  • Flame malware wielded rare "collision" crypto attack against Microsoft.  [Ars Technica]
  • Flame.  [Schneier]
  • Why antivirus companies like mine failed to catch Flame and Stuxnet.  [Wired]  [Ars Technica]
  • Microsoft certification authority signing certificates added to Untrusted Certificate Store.  [Microsoft]
  • 'Super-powerful' Flame work actually boring bloatware.  [The Register]
  • Super-powerful Flame worm could take years to dissect.  [The Register]
  • Meet 'Flame', the massive spy malware infiltrating Iranian computers.  [Wired]
  • Info-stealing malware takes Flame war to new level of cyber weapon.  [ComputerWorld]
  • Global wave of Flame cyber attacks called staggering.  [phys.org]
  • Flame: massive cyber attack discovered, researchers say.  [BBC News]
  • Complex cyberwar tool 'Flame' found all over Middle East.  [The Register]

Related / Useful Articles

  • New reductor nation-state malware compromises TLS.  [Schneier]  [Kaspersky]
  • Russian hackers modify Chrome and Firefox to track secure web traffic.  [Engadget]
  • New research into Russian malware.  [Schneier]  [ZDNet]
  • Supply chain security and trust.  [Schneier]
  • Russians hack FBI comms system.  [Schneier]  [Yahoo News]
  • New advanced malware, possibly nation sponsored, is targeting US utilities.  [Ars Technica]
  • Hackers broke into a contractor for Russia's spy agency.  [Engadget]  [Schneier]  [ZDNet]
  • US took down Iranian drone using new jammer technology.  [Engadget]
  • Microsoft warns 10,000 customers they’re targeted by nation-sponsored hackers.  [Ars Technica]
  • Mobile networks hacked by probably nation-state attackers.  [Schneier]  [TechCrunch]
  • US Cyber Command: Iran hitting Outlook email flaw.  [The Register]
  • Iranian state hackers reload their domains, release off-the-shelf RAT malware.  [Ars Technica]
  • US Cyber Command has reportedly been aggressively targeting Russia’s electrical grid.  [The Verge]  [Engadget]
  • Triton hackers behind dangerous oil and gas intrusions are probing US power grids.  [Ars Technica]  [Wired]
  • Google confirms that advanced backdoor came preinstalled on Android devices.  [Ars Technica]
  • Iranian cyberespionage tools leaked online.  [Schneier]  [ZDNet]
  • Triton malware targets industrial control systems.  [Schneier]  [MIT Technology Review]
  • GCHQ: Chinese tech 'threats' must be understood.  [BBC News]
  • Australian political parties hit by 'state actor' hack.  [BBC News]  [NZ Herald]  [The Register]  [The Verge]
  • State-sponsored cyber attacks on the rise.  [Stuff]
  • US will map and disrupt North Korean botnet.  [Engadget]  [Ars Technica]
  • China's APT10.  [Schneier]  [Wired]
  • GSCB: Chinese commercial espionage reaches into NZ.  [NZ Herald]
  • How scammers in China manipulate Amazon and its shoppers.  [HardOCP]  [WSJ, YouTube]
  • Chinese hackers are targeting U.S military contractors.  [HardOCP]  [WSJ]
  • NSA official: China is preparing for possible high-profile hacks.  [Engadget]
  • Russian hackers haven't stopped probing the US power grid.  [Wired]
  • How did Iran find CIA spies?  They Googled it.  [Ars Technica]  [The Register]
  • Chinese spies orchestrated massive hack that stole aviation secrets.  [Ars Technica]  [Engadget]
  • China's hacking of BGP.  [Schneier]  [USF]  [HardOCP]  [NZ Herald]
  • Russia hacks Saudi oil and gas plant.  [The Register]
  • Chinese supply chain hardware attack.  [Schneier]  [Bloomberg]  [Android Police]  [ExtremeTech]  [The Verge]  [DC Knowledge]
  • How Russian spies infiltrated hotel WiFi to hack victims up close.  [Wired]  [Ars Technica]
  • North Korea turns to APT hack attacks for cash.  [The Register]
  • Russia's elite hackers have a clever new trick that's very hard to fix.  [Wired]
  • Researchers find Russian “VPNfilter” malware was a Swiss Army hacking knife.  [Ars Technica]
  • CIA network exposed through insecure communications system.  [Schneier]  [Foreign Policy]
  • Former NSA top hacker names the filthy four of nation-state hacking.  [The Register]
  • State governments warned of malware-laden CD sent via snail mail from China.  [Krebs]  [Engadget]
  • Kremlin hackers 'jumped air-gapped networks' to own US power utilities.  [The Register]
  • New report on Chinese intelligence cyber-operations.  [Schneier]  [401 TRG]
  • China-based hackers burrow inside satellite, defense, and telecoms firms.  [Ars Technica]  [Wired]
  • US Government warns of more North Korean malware attacks.  [Graham Cluley]
  • Chinese hackers stole undersea warfare data from US Navy contractor.  [Engadget]  [The Verge]
  • Russia appears to be 'live testing' cyber attacks.  [The Register]
  • FBI seeks to thwart cyber-attack on Ukraine.  [BBC News]
    • Ukraine claims it blocked VPNFilter attack at chemical plant.  [The Register]
  • Chinese government is behind a decade of hacks on software companies.  [Ars Technica]  [Engadget]
  • US and UK warn that Russia has been hacking routers worldwide.  [Engadget]  [Graham Cluley]  [The Register]  [Graham Cluley]  [Voxy]  [Dark Reading]  [HardOCP]  [The Hill]  [Ars Technica]  [Krebs]  [ExtremeTech]
  • Guccifer 2.0’s schoolboy error reveals he’s hacking from Moscow.  [Graham Cluley]  [Wired]
  • Russia hacked the Olympics and tried to pin it on North Korea.  [Engadget]  [The Verge]  [Schneier]
  • APT37: the toolset of an elite North Korean hacker group.  [Wired]
  • NSA sent coded messages through Twitter.  [Engadget]
  • Numbers stations: The 'spy radio' that anyone can hear.  [BBC News]
  • North Korea is barely wired, so how did it become a global hacking power?  [NZ Herald]
  • How Dutch intelligence spied on the Russian hackers attacking the DNC.  [Graham Cluley]  [ExtremeTech]  [NZ Herald]
  • What would really happen if Russia attacked submarine cables.  [Wired]
  • German spy agency warns of Chinese LinkedIn espionage.  [BBC News]
  • Symantec discovers new cyber espionage group targeting governments.  [Voxy]
  • Stuxnet-style code signing is more widespread than anyone thought.  [Ars Technica]
  • Iran blamed for cyberattack on UK parliament.  [Engadget]
  • North Korean hackers allegedly probing US utilities for weaknesses.  [The Register]
  • US pressured North Korea by overwhelming hackers with data traffic.  [Engadget]  [Ars Technica]
  • New ESET research uncovers Gazer, the stealthy backdoor that spies on embassies.  [Graham Cluley]  [The Register]
  • Spyware deployed in state-sponsored attacks against India and Pakistan.  [Graham Cluley]
  • A guide to Russia’s high tech tool box for subverting US democracy.  [Wired]
  • Attack on Ireland’s state-owned power provider blamed on state-sponsored hackers.  [Graham Cluley]
  • Wired's guide to Russia's infrastructure hacking teams.  [Wired]
  • Russian hackers target the US nuclear industry.  [Engadget]  [HardOCP]  [NYT]
  • Obama reportedly ordered implants to be deployed in key Russian networks.  [Ars Technica]
  • US: North Korea' Hidden Cobra group behind eight years of hacks.  [Stuff]  [Gizmodo]  [Engadget]  [The Register]  [THG]
    • NSA believes North Korea was responsible for WannaCry ransomware attacks.  [The Verge]  [BBC News]  [Schneier]
    • North Korea's sloppy, chaotic cyberattacks also make perfect sense.  [Wired]
    • US-CERT Warns North Korea Has Stepped Up Cyberattacks.  [ExtremeTech]
  • “Crash Override” malware that triggered Ukrainian power outage.  [Ars Technica]  [The Register]  [NZ Herald]  [Stuff]  [HardOCP]  [WeLiveSecurity]  [Dragos]
    • Watch hackers take over the mouse of a power-grid computer.  [Wired]
  • Where Russian spies hide their control servers.  [Ars Technica]
  • North Korean cyberwar capabilities.  [Schneier]  [Reuters]  [NZ Herald]  [Stuff]
  • We are not done with state-sponsored hacking.  [Russ White]  [Monday Note]
  • Criminals getting closer to state actors.  [Russ White]  [Halbheer]
  • Attack vs defense in nation-state cyber operations.  [Schneier]  [Cornell]
  • Malware 'disguised as Siemens firmware drills into 10 industrial plants'.  [The Register]
  • The US has been conducting offensive cyberattacks against North Korea.  [Schneier]  [NYT]
  • Duqu malware techniques used by cybercriminals.  [Schneier]  [SecureList]  [Ars Technica]
  • Definitely not another Stuxnet, researchers claim as they demo industrial control rootkit.  [The Register]
  • Yet another government-sponsored malware.  [Schneier]
  • Stuxnet-like "Irongate" malware discovered.  [Schneier]  [FireEye]  [Motherboard]  [Dark Reading]
  • Air-gapping SCADA systems won't help you, says man who knows.  [The Register]
  • Inside the unprecedented hack of Ukraine’s power grid.  [Wired]
  • Massive US-planned "Nitro Zeus" cyberattack against Iran went well beyond Stuxnet.  [Ars Technica]
    • 'Nitro Zeus' was a massive cyber attack plan aimed at Iran if nuclear negotiations failed: report.  [Jalopnik]
  • Kaspersky Lab reveals Duqu 2.0 attack on itself during Iran nuke talks.  [The Register]  [THG]  [Wired]  [Graham Cluley]  [HardOCP]  [BBC News]  [Schneier]
    • Duqu 2.0: 'Terminator' malware that pwned Kaspersky could have come from Israel.  [The Register]
    • Duqu 2.0‬ malware buried into Windows PCs using 'stolen Foxconn certs'.  [The Register]  [Ars Technica]  [Wired]
  • A cyberattack has caused confirmed physical damage for the second time ever.  [Wired]  [Gizmodo]  [Schneier]
  • Active malware operation let attackers sabotage US energy industry.  [Ars Technica]  [Gizmodo]  [Symantec]
    • Dragonfly hackers target 1000 Western energy firms, industrial control systems.  [Graham Cluley]  [DailyTech]
  • Attackers fling Stuxnet-style RATs at critical control software in Europe.  [The Register]
  • New cyber-attack model helps predict timing of the next Stuxnet.  [Ars Technica]
  • SCADA security is better and worse than we think.  [The Register]
  • Decade-old espionage malware found targeting government computers.  [Ars Technica]  [ThreatPost]
  • SCADA honeypots attract swarm of international hackers.  [The Register]
  • Gauss.  [Schneier]  [Ars Technica]
  • Eugene Kaspersky and Mikko Hypponen talk Red October and the future of cyber warfare.  [TechCrunch]
  • 'Red October' cyber attack found by Russian researchers.  [BBC News]  [Gizmodo]  [Kaspersky]  [TrustedReviews]  [THG]
  • Iranian computers targeted by new malicious data wiper program.  [Ars Technica]  [WSJ ATD]
    • Iran responds to new "Stuxnet-like" cyber attack.  [WSJ ATD]  [HardOCP]  [AP]
  • Malware spy network targeted Israelis, Palestinians.  [Krebs]
  • A Stuxnet future?  Yes, offensive cyber-warfare is already here.  [ISN]
  • DDoS attacks on major US banks are no Stuxnet -- here's why.  [Ars Technica]
  • More malware targeting Iran could yet be discovered.  [BBC News]
  • The perfect crime: is Wiper malware connected to Stuxnet, Duqu?  [Ars Technica]  [Wired]
  • New virus linked to Stuxnet found.  [HardOCP]  [STL Today]  [Ars Technica]  [Wired]
  • Siemens squashes Stuxnet-like bugs in SCADA kit.  [The Register]
  • New Mahdi strain of spyware targets Iran and Israel.  [ReadWriteWeb]
    • Move over, Flame: new Messiah-themed malware targets Iran and Israel.  [Ars Technica]
  • The failure of anti-virus companies to catch military malware.  [Schneier]  [Wired]  [The Register]
  • Stuxnet expert calls US the "good guys" in cyber-warfare.  [Ars Technica]
  • Stuxnet ≠ cyberwar, says US Army cyber command officer.  [The Register]
  • Researchers show how easy a new Stuxnet-like attack can be.  [WSJ ATD]
  • There's a new version of the Stuxnet-esque Duqu trojan floating around and nobody knows what it does.  [Gizmodo]
  • Duqu trojan used 'unknown' programming language: Kaspersky.  [CBR]
    • Duqu mystery language solved with the help of crowdsourcing.  [Wired]
  • A Valentine's Day present for SCADA companies: new exploit tools.  [Ars Technica]
  • Stuxnet weapon has at least 4 cousins: researchers.  [Reuters]
  • From the man who discovered Stuxnet, dire warnings one year later.  [CS Monitor]
  • US reveals Stuxnet-style vuln in Chinese SCADA 'ware.  [The Register]
  • Kaspersky claims 'smoking code' linking Stuxnet and Duqu.  [The Register]
  • Microsoft squashes Duqu threat with Windows patch.  [Ars Technica]
  • Microsoft airs temporary fix to defeat Duqu worm.  [DailyTech]
  • Nasty 'Duqu' worm exploits same Microsoft Office bug as Stuxnet.  [DailyTech]  [Ars Technica]
  • Researchers warn of new Stuxnet worm.  [BBC News]
  • New malware: Duqu.  [Schneier]
  • Son of Stuxnet discovered.  [The Register]  [Wired]

Ċ
Robert Larsen,
4 Jan 2012, 13:57