Tag Archives: responsible

Who should be responsible for cybersecurity?

The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout become increasingly familiar: broken trust, ruined brands, class-action lawsuits, and prolonged periods of finger pointing.

In September 2017, news broke that consumer credit reporting agency Equifax had suffered a catastrophic breach the preceding May. Hackers gained access to the personal data of nearly 150 million American citizens – roughly two thirds of the country’s population – including full names, Social Security numbers, addresses, and dates of birth. The swiftly unfolding scandal sent the company’s stock plummeting 33%, a market value loss of approximately ten billion dollars. Currently, three Equifax C-Suite managers are under federal investigation for allegedly dumping stock prior to disclosing the breach.

The digital sphere has always been rife with pathogens. Elk Cloner ravaged Apple IIs by way of contaminated floppy

Read more at: https://www.csoonline.com/article/3248824/data-protection/who-should-be-responsible-for-cybersecurity.html

Update 2: UK & US blame North Korea for WannaCry – ‘directly responsible’

Update 2: UK US blame North Korea for WannaCry – ‘directly responsible’

North Korea was behind the WannaCry ransomware that blazed a destructive path around the world last spring, wreaking havoc on hospitals, the financial sector, FedEx, and companies of all stripes, a high-ranking adviser in the US Trump administration said Monday.

Then today (19/12/2018) the UK Foreign Office Minister Lord Ahmad of Wimbledon backed up the assertions, also attributing the WannaCry ransomware incident to North Korean actors the Lazarus Group. “The decision to publicly attribute this incident sends a clear message that the UK and its allies will not tolerate malicious cyber activity,” said the government release.

After the UK National Health service was severely impacted by Wannacry, the UK led the international investigation, and within weeks, in May 2017, the UK National Cyber Security Centre (NCSC) attributed the attack to North Korea.

The WannaCry ransomware incident impacted

Read more at: https://www.scmagazineuk.com/news/update-2-uk-us-blame-north-korea-for-wannacry--directly-responsible/article/719499/

North Korea is ‘directly responsible’ for global WannaCry attack, according to US

Britain has publicly named the shadowy North Korea cyber crime group it believes was responsible for the WannaCry ransomware attack which crippled parts of the NHS.

The Foreign Office said the National Cyber Security Centre had assessed that it was “highly likely” the attack in May was the work of cyber criminals known as the Lazarus Group.

Security minister Ben Wallace has previously said the Government believed “quite strongly” that a foreign state was behind the attack, naming North Korea as the main suspects.

In the latest statement, Foreign Office minister Lord Ahmad of Wimbledon

Read more at: http://home.bt.com/tech-gadgets/tech-news/wannacry-north-korea-us-cyberattack-nhs-11364238021418

US: North Korea `directly responsible´ for global WannaCry attack that hit NHS

Press Association

Britain has publicly named the shadowy North Korea cyber crime group it believes was responsible for the WannaCry ransomware attack which crippled parts of the NHS.

The Foreign Office said the National Cyber Security

Read more at: http://www.dailymail.co.uk/wires/pa/article-5193635/US-North-Korea-directly-responsible-global-WannaCry-attack-hit-NHS.html

GTA V PC mod responsible for spreading Monero mining malware

Rockstar’s Grand Theft Auto V is a modders dream on the PC, allowing gamers to drastically alter the base game; but it also means hackers can cause havoc.

One Russian-speaking mod maker is busy spreading malware into GTA 5 mods to secretly hijack a victim’s computer power to mine the Monero cryptocurrency.

The ‘Arbuz’ GTA V mod was identified by researchers at cyber security company Minerva Labs as the source of the malware spread. They discovered that mod-maker ‘Anton’ was using malware dubbed WaterMiner which uses and altered version of the legitimate open-source XMRig miner to craftily harvest Monero coins without a mod user knowing it.

WaterMiner, which gets its name from Arbuz meaning watermelon in Russian, also evades monitoring tools and can hide from the Windows Task Manager and other services that monitor the use of a computer’s resources. If it detects that a PC monitoring tool is searching for it

Read more at: http://www.trustedreviews.com/news/gta-v-pc-mod-malware-3311243

GTA 5 PC mod responsible for spreading Monero mining malware

Rockstar’s Grand Theft Auto V is a modders dream on the PC, allowing gamers to drastically alter the base game; but it also means hackers can cause havoc.

One Russian-speaking mod maker is busy spreading malware into GTA 5 mods to secretly hijack a victim’s computer power to mine the Monero cryptocurrency.

The ‘Arbuz’ GTA V mod was identified by researchers at cyber security company Minerva Labs as the source of the malware spread. They discovered that mod-maker ‘Anton’ was using malware dubbed WaterMiner which uses and altered version of the legitimate open-source XMRig miner to craftily harvest Monero coins without a mod user knowing it.

WaterMiner, which gets its name from Arbuz meaning watermelon in Russian, also evades monitoring tools and can hide from the Windows Task Manager and other services that monitor the use of a computer’s resources. If it detects that a PC monitoring tool is searching for it

Read more at: http://www.trustedreviews.com/news/gta-v-pc-mod-malware-3311243

Expert Skeptical ‘Dark Overlord’ Responsible For Flathead Cyber Attack

“Cyber terrorism is an emerging threat that has become all too real in Montana.”

That’s Senator Steve Daines talking to FBI Director Chris Wray about last month’s cyber threats that shook the Flathead Valley.

Hackers breached Columbia Falls school district servers September 13th, stealing personal information belonging to students and staff, demanding payment of a digital currency called bitcoin in exchange for its safe return.

The culprits then proceeded to threaten physical violence against several targets including Flathead Valley Schools.

“This forced the closure of over 30 schools across multiple school districts and affected over 15,000 Montana school children,” Daines said. “It’s unprecedented. We’ve not seen that before in my home state of Montana. The culprit’s been identified as the ‘Dark Overlord’, an overseas criminal organization.” 

But cyber security expert Nick Bilogorskiy isn’t convinced Dark Overlord really was behind the attack.

Bilogorskiy was Facebook’s chief malware expert before leaving to start a California-based anti-malware company called

Read more at: http://mtpr.org/post/expert-skeptical-dark-overlord-responsible-flathead-cyber-attack

NICTA CEO urges responsible ICT use

This reminder was made by NICTA CEO, Charles Punaha, when discussing the Cybercrime Code Act passed in 2016.

Punaha said there’s still a lot of improper use but the onus is on the users of the service to be responsible. 

“The ICT services are there for good use but people are abusing it. When they use it not for the intended purpose, that’s when the problem comes in,” he said.

He urged all users of the social media to be responsible and accountable for what you do

“Once we build up capacity within NICTA and the law enforcement agencies, we will get whoever is doing this,” he said.

The Cybercrime Code Act 2016 criminalises many activities including:

Hacking, cyber bullying, child online grooming, unlawful advertising, cyber harassment (which includes, cyber stalking and the use of profanities), electronic fraud (covering bank fraud), forgery, gambling by children, identity theft, unlawful disclosure (the unlawful publication of private and confidential

Read more at: http://www.looppng.com/png-news/nicta-ceo-urges-responsible-ict-use-65956

NICTA CEO urges responsible ICT use | Loop PNG

This reminder was made by NICTA CEO, Charles Punaha, when discussing the Cybercrime Code Act passed in 2016.

Punaha said there’s still a lot of improper use but the onus is on the users of the service to be responsible. 

“The ICT services are there for good use but people are abusing it. When they use it not for the intended purpose, that’s when the problem comes in,” he said.

He urged all users of the social media to be responsible and accountable for what you do

“Once we build up capacity within NICTA and the law enforcement agencies, we will get whoever is doing this,” he said.

The Cybercrime Code Act 2016 criminalises many activities including:

Hacking, cyber bullying, child online grooming, unlawful advertising, cyber harassment (which includes, cyber stalking and the use of profanities), electronic fraud (covering bank fraud), forgery, gambling by children, identity theft, unlawful disclosure (the unlawful publication of private and confidential

Read more at: http://www.looppng.com/png-news/nicta-ceo-urges-responsible-ict-use-65956

Ransomware attacks: Putin says Russia is not responsible – live updates

As things stand, there is no indication of a second surge of cases here in the UK. But that doesn’t mean there won’t be one.

We’re trawling through huge amounts of data associated with the attack and identifying patterns.

The NCA is leading the criminal investigation into the attack, but for operational reasons we cannot give a running commentary.

Because of the quantity of data involved and the complexity of these kinds of enquiries we need to be clear that this is an investigation which will take time

But I want to reassure the public that investigators are working round the clock to secure evidence and have begun to forensically analyse a number of infected computers.

Specialist cyber-crime officers from the NCA and our partner regional organised crime units are speaking directly with victims.

That includes visiting NHS sites to help protect victims and secure and preserve evidence. Those visits are continuing.

More than 150

Read more at: https://www.theguardian.com/technology/live/2017/may/15/ransomware-attacks-uk-government-defends-investment-in-security-live