State Hacks


China / Huawei

  • Huawei piles pressure on Govt with ads and sponsorship, security experts say.  [Stuff]
  • FCC chairman wants to keep China Mobile out of the US.  [Engadget]  [The Register]  [Android Police]
  • China and Huawei Marine spying on undersea Internet cables.  [Schneier]  [Bloomberg]
  • Huawei WiFi modules were pulled from Pakistan CCTV system.  [BBC News]
  • Huawei's 'shoddy' work prompts talk of a Westminster ban.  [BBC News]  [NZ Herald]
  • Huawei’s security troubles are hardening into a fight between the US and China.  [The Verge]
  • The real reason Huawei shouldn't be in 5G networks.  [NZ Herald]
  • Huawei's role in NZ runs way deeper than 5G.  [NZ Herald]  [ITP Techblog]
  • Huawei NZ boss outlines two possible ways back in.  [NZ Herald]
  • NSA-inspired vulnerability found in Huawei laptops.  [Schneier]  [Ars Technica]
  • Huawei's problem isn't Chinese backdoors -- it's buggy software.  [Wired]  [NZ Herald]
  • GCHQ delivers scathing assessment of security risks posed by Huawei.  [Stuff]  [NZ Herald]  [ExtremeTech]  [Engadget]  [PocketNow]
  • No European nation has banned Huawei.  [PocketNow]  [The Verge]  [PocketNow]
  • Debate around Huawei espionage fears in UK is not clear.  [The Register]
  • US cranks pressure on UK over Huawei and 5G.  [PocketNow]
  • Is Huawei a security threat?  [The Verge]
  • The Huawei case signals the new US-China cold war over tech.  [Wired]
  • US tells Germany to stop using Huawei equipment or lose some intelligence access.  [The Verge]  [Engadget]  [The Register]
  • UK government's worries over backdoors in Huawei’s 5G tech castle.  [BBC News]
  • Huawei is suing the US government.  [Engadget]  [The Verge]  [BBC News]  [PocketNow]  [NZ Herald]  [The Register]
  • Experts: U.S. anti-Huawei campaign likely exaggerated.  [Stuff]
  • History of Huawei's legal woes in the U.S.  [EETimes]
  • Huawei promises it will not create backdoors for Chinese government.  [Android Police]
  • US senators want Chinese equipment out of national electricity grid.  [The Register]
  • Could Huawei threaten the Five Eyes alliance?  [BBC News]
  • UK NCSC: Huawei hasn't yet fixed its security vulns.  [The Register]
  • Germany may use Huawei hardware for its 5G networks.  [Engadget]
  • Huawei founder denies sharing secrets with China.  [Stuff]
  • Huawei founder: “There’s no way the US can crush us.”  [Engadget]  [PocketNow]
  • Huawei risk can be managed.  [BBC News]  [Engadget]  [PocketNow]  [NZ Herald]
  • Chinese telecommunications hardware is about to be banned by executive order.  [HardOCP]  [TechSpot]  [ExtremeTech]
  • Can we trust Huawei with 5G?  [The Verge]
  • FBI allegedly ran sting operation on Huawei at CES.  [ExtremeTech]
  • A simple guide to why Huawei is in trouble.  [BBC News]
  • French minister: Europe should act as one regarding Huawei.  [PocketNow]
  • Vodafone puts Huawei rollout in core networks on hold.  [BBC News]  [PocketNow]
  • Huawei deemed "viable and reliable" by Canada's Telus.  [PocketNow]
  • Germany considers locking Huawei out of its network.  [PocketNow]
  • Huawei founder comments amidst tumult on security, US relationship.  [PocketNow]
  • Huawei's year off to a rocky start.  [ITP TechBlog]
  • Taiwanese research institute joins banhammer club.  [The Register]
  • Poland spy arrest: China telecoms firm Huawei sacks employee.  [BBC News]
  • Norway considers banning Huawei from building 5G infrastructure.  [PocketNow]
  • Are Huawei products unsafe or insecure?  [EtherealMind]
  • Huawei hits roadblocks in Europe after US fight.  [NZ Herald]  [BBC News]
  • The US is warning other countries against using Huawei's 5G tech.  [Engadget]
  • Huawei's biggest problem is China.  [NZ Herald]

Stuxnet

  • Israel silent as Iran hit by computer virus more violent than Stuxnet.  [The Times of Israel]  [Ars Technica]
  • Alex Gibney on Stuxnet and why we need to talk about cyberwar.  [Engadget]
  • Stuxnet was the opening shot of decades of non-stop cyber warfare.  [The Register]
  • GCHQ intel used to develop Stuxnet, claims new documentary.  [The Register]
  • Super Stuxnet's SCADA slaves: security is atrocious.  [The Register]
  • US tried Stuxnet variant on N. Korean nuke program, failed.  [Ars Technica]  [BoingBoing]  [Reuters]  [The Register]  [Wired]  [Engadget]  [Gizmodo]  [Graham Cluley]  [HardOCP]  [Schneier]
  • Win 95 code gaffe nearly made Stuxnet Suxnet, say infosec blokes.  [The Register]
  • Stuxnet leak probe stalls for fear of confirming US-Israel involvement.  [Ars Technica]
  • Microsoft fixes Stuxnet bug, again.  [Krebs]  [The Register]  [Graham Cluley]  [Engadget]
  • Stuxnet worm infected high-profile targets before hitting Iran nukes.  [Ars Technica]  [Engadget]
    • Iranian contractor named as Stuxnet 'patient zero'.  [The Register]
  • An unprecedented look at Stuxnet, the world’s first digital weapon.  [Wired]  [Gizmodo]  [Symantec]
  • Stuxnet 2 in the works, claims Iranian news agency.  [The Register]
  • Recommended reading: Stuxnet's more dangerous precursor, fake memories and more  [Engadget]
  • More on Stuxnet.  [Schneier]  [Foreign Policy]  [Langner PDF]
    • PDF attached below: Stuxnet - to kill a centrifuge.pdf
  • Stuxnet's earlier version much more powerful.  [Dark Reading]  Gizmodo]  [The Register]  [BoingBoing]  [Foreign Policy]
  • Stuxnet infected Russian nuke power plant.  [The Register]  [The Register]  [Gizmodo]
  • Snowden: US and Israel did create Stuxnet attack code.  [The Register]
  • Former high-ranking US general reportedly being targeted in Stuxnet leak investigation.  [The Verge]  [Ars Technica]  [The Register]
  • Did Stuxnet actually improve Iran's nuclear capabilities?  [WSJ ATD]  [The Register]
  • UN manual on cyberwar says Stuxnet may have been 'armed attack'.  [The Register]
  • Symantec reports early Stuxnet variants first went live in 2005.  [The Register]  [Ars Technica]  [Wired]  [Reuters]  [Voxy]  [Engadget]  [Stuff]  [Schneier]  [Symantec]
  • Iran raised its cyberwar game after Stuxnet, US general says.  [WSJ ATD]
  • Stuxnet infected Chevron's IT network.  [WSJ ATD]
  • Kaspersky plans secure OS to combat Stuxnet.  [Wired]  [Nota Bene]  [Engadget]  [HardOCP]  [Kaspersky]  [THG]
  • Another Stuxnet post.  [Schneier]  [IEEE Spectrum]
  • Stuxnet: moral crime or proportionate response?  [The Register]
  • Stuxnet thwarted by control code update.  [BBC News]
  • A weapon we can't control.  [NYT]
  • Professor casts doubt on Stuxnet's accidental "great escape" theory.  [The Register]
  • NSA built Stuxnet, but real trick is building crew of hackers.  [BoingBoing]  [US News]
  • Flame and Stuxnet link found.  [BBC News]  [Ars Technica]  [The Register]
  • How to put "Stuxnet author" on your CV.  [The Register]
  • Stuxnet expert calls US the "good guys" in cyber-warfare.  [Ars Technica]
  • Stuxnet: US can launch cyberattacks but not defend against them, experts say.  [Huffington Post]
  • US officials confirm Stuxnet was a joint US-Israeli op.  [The Register]  [HardOCP]  [VentureBeat]  [Schneier]  [BoingBoing]  [NYT]
    • Stuxnet admission likely to have foreign policy consequences.  [Ars Technica]
    • Report: Obama ordered Stuxnet to continue after bug caused it to spread wildly.  [Wired]  [Gizmodo]  [Engadget]
      • How Obama was dangerously naive about Stuxnet and cyberwarfare.  [Technology Review]
    • Why antivirus companies like mine failed to catch Flame and Stuxnet.  [Wired]  [Ars Technica]
  • Stuxnet worm reportedly planted by Iranian double agent using memory stick.  [Ars Technica]  [ISSS]
  • Richard Clarke on who was behind the Stuxnet attack.  [Smithsonian]
  • Stuxnet worm revisited by 60 Minutes.  [HardOCP]  [WSJ ATD]  [CBS News]
  • Another piece of the Stuxnet puzzle.  [Schneier]  [Digital Bond]
  • Serious security holes found in Siemens control systems targeted by Stuxnet.  [Ars Technica]  [Wired]
  • Stuxnet clones may target critical US systems, DHS warns.  [The Register]
  • How digital detectives deciphered Stuxnet, the most menacing malware in history.  [Wired]  [Ars Technica]
  • Stuxnet deconsructed shows one scary virus.  [Gizmodo]
  • Iran says it has detected a second cyber attack.  [Reuters]  [Gizmodo]
  • Iran lays blame for Stuxnet worm on Siemens.  [The Register]
  • Iran confirms massive Stuxnet infection of industrial systems.  [ComputerWorld]
  • Is Stuxnet the 'best' malware ever?  [ComputerWorld]
  • Stuxnet malware is 'weapon' out to destroy Iran's Bushehr nuclear plant?  [CS Monitor]
  • Stuxnet false flag launched for web takeover.  [InfoWars]
  • Pentagon accused of launching supervirus attack on Iranian nuclear plant.  [Gizmodo]
  • Mystery lingers over stealthy Stuxnet infection  [The Register]
  • Iranian power plant infected by Stuxnet, allegedly undamaged.  [Ars Technica]
  • Stuxnet worm can reinfect PCs even after disinfection.  [The Register]
  • The secret code inside the supervirus attacking Iran's nuclear power.  [Gizmodo]
  • Stuxnet worm slithers into China, heralds alien invasion.  [The Register]
  • Stuxnet worm could have been inside job.  [V3]
  • Stuxnet Q&A.  [F-Secure]
  • Iran boasts of Stuxnet "nuclear spies" arrests.  [The Register]  [BBC News]
  • Stuxnet.  [Schneier]
  • Stuxnet a game changer for malware defence.  [The Register]
  • Stuxnet heralds new generation of targeted attacks.  [Dark Reading]
  • Clues suggest Stuxnet virus was built for subtle nuclear sabotage.  [Wired]
  • Missing piece completes Stuxnet puzzle.  [The Register]
  • Clues suggest Stuxnet virus was built for subtle nuclear sabotage.  [Ars Technica]
  • Stuxnet attacks could move beyond Iranian nuclear plants.  [Ars Technica]
  • Code clues point to Stuxnet maker.  [BBC News]
  • Stuxnet news.  [Schneier]
  • Stuxnet 'hit' Iran nuclear plans.  [BBC News]
  • Could Stuxnet mess with North Korea's new uranium plant?  [Wired]
  • Stuxnet code leak to cause cyber-apocalypse now!  [The Register]
  • Stuxnet apparently as effective as a military strike.  [Ars Technica]
  • Stuxnet may have destroyed 1000 centrifuges at Natanz.  [Jerusalem Post]
  • Report strengthens suspicions that Stuxnet harmed Iran's nuke plant.  [Ars Technica]
  • Stuxnet worm used against Iran was tested in Israel.  [NYT]  [Schneier]
  • Did a US government lab help Israel develop Stuxnet?  [Wired]
  • Lame Stuxnet worm "full of errors" says security consultant.  [The Register]
  • Duck!  Security experts warn of Stuxnet boomerang effect.  [Gizmodo]
  • Report: Stuxnet hit 5 gateway targets on its way to Iranian plant.  [Wired]
  • Stuxnet blitzed five Iranian factories over 10-month period.  [The Register]
  • Ralph Langner: cracking Stuxnet, a 21st-century cyber weapon.  [TED]
  • Symantec PDF report on Stuxnet (attached below): Symantec-Stuxnet-Update-Feb-2011.pdf

Regin


Mask


Flame

  • New version of Flame malware discovered.  [Schneier]  [Motherboard]
  • Flame Windows Update attack could have been repeated in 3 days, says Microsoft.  [Wired]
  • Flame Q&A.  [Kaspersky]
  • US fingered for Flame attack on Elysee Palace.  [The Register]
  • New spying program linked to Flame authors.  [Stuff]
  • Flame espionage weapon linked to more mystery malware.  [The Register]  [Ars Technica]  [Engadget]  [Reuters]  [SecureList]  [Symantec]
    • Kaspersky: Flame has three unidentified malware siblings.  [THG]
  • Flame worm's makers fail to collect Epic 0wnage award.  [The Register]
  • Microsoft kills more code-signing certs to stop Flame-like attacks.  [Ars Technica]
  • Sometimes it's hard to get rid of an old Flame.  [Juniper]  [SecurityWeek]
  • US accused of using Flame to try to cripple Iran's economy.  [DailyTech]
  • Unique insight into Flame malware.  [OpenDNS Blog]
  • Flame was scout ahead of Stuxnet attack on Iran nukes -- US spooks.  [The Register]
  • Report: US and Israel behind Flame espionage tool.  [Wired]
  • Windows updated with better checking for bad digital certs after Flame malware incident.  [Engadget]
  • Flame's crypto attack may have needed $200k worth of compute power.  [Ars Technica]
  • Flame and Stuxnet link found.  [BBC News]  [Ars Technica]  [The Register]
  • Crypto-breakthrough shows Flame was designed by world-class scientists.  [Ars Technica]
  • Flame gets suicide command.  [The Register]  [HardOCP]  [ZDNet]
  • Flame's "god mode cheat mode" wielded to hijack Windows 7, Server 2008.  [Ars Technica]
  • Flame hijacks Microsoft Update to spread malware disguised as legit code.  [Gizmodo]
  • Flame malware wielded rare "collision" crypto attack against Microsoft.  [Ars Technica]
  • Flame.  [Schneier]
  • Why antivirus companies like mine failed to catch Flame and Stuxnet.  [Wired]  [Ars Technica]
  • Microsoft certification authority signing certificates added to Untrusted Certificate Store.  [Microsoft]
  • 'Super-powerful' Flame work actually boring bloatware.  [The Register]
  • Super-powerful Flame worm could take years to dissect.  [The Register]
  • Meet 'Flame', the massive spy malware infiltrating Iranian computers.  [Wired]
  • Info-stealing malware takes Flame war to new level of cyber weapon.  [ComputerWorld]
  • Global wave of Flame cyber attacks called staggering.  [phys.org]
  • Flame: massive cyber attack discovered, researchers say.  [BBC News]
  • Complex cyberwar tool 'Flame' found all over Middle East.  [The Register]

Related / Useful Articles


Ċ
Robert Larsen,
4 Jan 2012, 13:57