Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

NETSEC Archives

Date Prev | Date Next | Date Index | Author Index | Historical [Netsec] SANS NewsBites Vol. 13 Num. 49 : Copyright Lawsuits Now In Doubt; BitCoin Exchange Attacked; Arrest in Lulzsec case in the UK?

  • From: The SANS Institute
  • Date: Tue Jun 21 15:21:08 2011

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A few hours ago Version 3 of the 20 Critical Security Controls was
released for public comment. This document matters right now because it
provides the underlying validation for the new FISMA continuous
monitoring reporting requirements mandated on June 1 for FY2011, as well
as the methodology that informed the U.S. State Department's hugely
successful cyber risk reduction initiative. It also provides the key
performance metrics agencies and companies are adopting to test the
effectiveness of their security controls. The new version is
cross-mapped with Australia's 35 Top Mitigation Strategies as well as
the NIST 800-53 controls. The 20 Critical Controls will be one of the
key forces shaping the future of cybersecurity management, so it is
probably worth taking the time to read it and send your suggestions.

Review and comment at http://www.sans.org/critical-security-controls/

                                   Alan
**************************************************************************
SANS NewsBites                  June 21, 2011            Vol. 13, Num. 049
**************************************************************************
TOP OF THE NEWS    
  LulzSec Member Allegedly Arrested
  Judge Casts Doubt on Righthaven's Legal Standing to Bring Copyright Lawsuits
  SCADA Vulnerabilities in Chinese Weapon Control Systems
  MTGox Bitcoin Exchange Suffers Attack
  Attackers Exploiting Just-Patched IE Flaw
THE REST OF THE WEEK'S NEWS 
    Flash Flaw is Being Actively Exploited
    Sega Acknowledges Customer Data Stolen
    UK Student Facing Extradition for Running Site With Links to Pirated Movies
    Virgin Media Warns Users Infected With Spy Eye Trojan
    Man Indicted in Domain Name Extortion Scheme
    Prison Sentence for Cyber Extortion Scheme

************  SPONSORED BY Raytheon Trusted Computer Solutions ***********

OS hardening doesn't need to take hours or even days to complete.
Instead of locking down your systems manually, try Security Blanket, the
'one click' hardening tool for Linux and Solaris.  Whether you follow
prescribed hardening guidelines like DISA STIGs or PCI, or use a custom
configuration, Security Blanket has you covered.  Free demo available!
http://www.sans.org/info/80039

***************************************************************************
TRAINING UPDATE
 -- SANS Rocky Mountain 2011, Denver, CO, June 25-30, 2011
7 courses.  Bonus evening presentations include SANS Hacklab and Why
End Users are Your Weakest Link
http://www.sans.org/rocky-mountain-2011/
 -- SANSFIRE 2011, Washington, DC, July 15-24, 2011
41 courses.  Bonus evening presentations include Ninja developers:
Penetration testing and Your SDLC; and Are Your Tools Ready for IPv6?
http://www.sans.org/sansfire-2011/
 -- SANS Boston 2011, Boston, MA, August 8-15, 2011
13 courses.  Bonus evening presentations include Cost Effectively
Implementing PCI through the Critical Controls; and More Practical
Insights on the 20 Critical Controls
http://www.sans.org/boston-2011/
 -- SANS Virginia Beach 2011, August 22- September 2, 2011
11 courses.   Bonus evening presentations include SANS Hacklab;
Offensive Countermeasures; and Evolving VoIP Threats
http://www.sans.org/virginia-beach-2011/
 -- SANS Ottawa 2011, Ottawa, Ontario, August 28- September 2, 2011
6 courses.   Bonus evening presentations include DNS Sinkhole: Peer
Into Your Network While You Sleep; and I See What You Did There:
Forensic Time Line Analysis
http://www.sans.org/ottawa-2011/
 -- SANS Network Security 2011, Las Vegas, NV, September 17-26, 2011
45 courses.   Bonus evening presentations include Securing the Kids;
Who is Watching the Watchers?; and Emerging Trends in the Law of
information Security and Investigations
http://www.sans.org/network-security-2011/
 -- Looking for training in your own community?
http://sans.org/community/ Save on On-Demand training (30 full
courses) - See samples at
http://www.sans.org/ondemand/discounts.php#current
Plus Canberra, Melbourne and Tokyo all in the next 90 days.
For a list of all upcoming events, on-line and live: www.sans.org

****************************************************************************
TOP OF THE NEWS
 --LulzSec Member Allegedly Arrested
(June 21, 2001)
A 19 year old UK man named Ryan Clery was arrested in a "pre-planned,
intelligence-led" operation. According to the e-crimes unit of Scotland
Yard, the raid was linked to the recent intrusion attacks on the
websites of the CIA and Britain's Serious Organised Crime Agency (Soca).
A Scotland Yard spokesman said: "The arrest follows an investigation
into network intrusions and distributed denial of service attacks
against a number of international business and intelligence agencies by
what is believed to be the same hacking group."
http://www.theregister.co.uk/2011/06/21/alleged_hacker_held/
http://www.scmagazineuk.com/teenager-arrested-in-essex-in-relation-to-lulzsec-attacks/article/205753/
http://www.bbc.co.uk/news/technology-13859868
[Editor's Note (Honan): This comes in the wake of groups Anonymous and
Lulzsec banding together to form the "Anti-sec" movement and target
computer systems of governments, banks and large corporations.  Last
night the website of SOCA was offline as a result of a DDOS attack
http://www.bbc.co.uk/news/technology-13848510 ]

 --Judge Casts Doubt on Righthaven's Legal Standing to Bring Copyright Lawsuits
(June 20, 2011)
Righthaven, a company that has attempted to make a name for itself by
suing people for online copyright infringement, is finding the ground
crumbling beneath its legal feet. US District Judge Philip Pro has ruled
that the reposting of an article did not violate copyright law.  The
case in question was brought against a man who posted an article from
the Las Vegas Review-Journal in its entirety; Righthaven was seeking up
to US $150,000 in damages. The company argued that the posting reduced
the number of visitors to the original publication's site. Judge Pro
also found that Righthaven did not have legal standing to bring the
lawsuit. This is not the first time that Righthaven's legal standing to
bring a copyright lawsuit has been questioned.
http://www.wired.com/threatlevel/2011/06/fair-use-defense/
http://www.vegasinc.com/news/2011/jun/20/righthaven-hit-third-fair-use-loss-over-r-j-materi/
[Editor's Note (Schultz): I would not be at all surprised if a varient
of Stuxnet that targets these vulnerabilities in these systems surfaces
sometime in the future.]

 --SCADA Vulnerabilities in Chinese Weapon Control Systems
(June 20, 2011)
The US Department of Homeland Security (DHS) has warned that supervisory
control and data acquisition (SCADA) systems used to operate Chinese
weapons systems are vulnerable to attacks. The warning appeared in an
advisory from the DHS Industrial Control Systems Cyber Emergency
Response Team (ISC-CERT). The vulnerabilities affect Sunway ForceControl
and pNetPower SCADA/HMI applications. The vulnerabilities were
discovered by NSS Labs researcher Dillon Beresford.
http://www.eweekeurope.co.uk/news/chinese-weapon-systems-vulnerable-to-scada-hack-32020
http://www.h-online.com/security/news/item/Critical-vulnerability-in-industrial-control-software-1263040.html
[Editor's Note (Honan): These Scada systems are also used in other
industries and not just in Chinese weapon control systems.  It is also
worth noting that the ICS-CERT "co-ordinated with the researcher, China
National Vulnerability Database (CNVD), and Sunway to ensure full
remediation of the reported vulnerabilities.]

 --MTGox Bitcoin Exchange Suffers Attacks
(June 20, 2011)
Bitcoin virtual currency exchange MTGox was the target of a cyber attack
that compromised usernames, email addresses and hashed passwords of more
than 61,000 traders. The information was posted to the Internet. The
price of Bitcoin crashed early on Monday, June 20, when an unusually
large sell order was placed from a compromised account. MTGox plans to
roll back all transactions that occurred after the fraudulent sell
order.
The Internet Storm Center posted Lenny Zeltser's terrific explanation of the attack:
http://isc.sans.edu/diary.html?storyid=11059
http://www.scmagazine.com.au/News/261016,bitcoin-exchange-hacked-61000-accounts-published.aspx
http://www.wired.com/threatlevel/2011/06/gox/
http://arstechnica.com/tech-policy/news/2011/06/bitcoin-price-plummets-on-compromised-exchange.ars
http://www.zdnet.com/blog/security/bitcoin-market-flash-crash-and-database-leak-from-mtgox/8811
http://www.pcmag.com/article2/0,2817,2387279,00.asp
http://www.theatlantic.com/national/archive/2011/06/after-the-crash-whats-next-for-bitcoin/240696/
http://blogs.forbes.com/timworstall/2011/06/20/so-thats-the-end-of-bitcoin-then/
[Editor's Comment (Northcutt): Hmmm, I thought the whole premise is that
you can't roll back a transaction? Anyway, this reminds me of Digicrash,
er uh, Digicash. It is amazing, but the SecondLife Linden Exchange seems
to be the most stable of these systems so far.
http://cryptome.org/jya/digicrash.htm (Honan): This story about $500,000
being stolen from a hacked Windows PC may also have had an impact on the
values.
http://www.pcworld.com/article/230377/worlds_first_virtual_heist_bitcoin_user_loses_500000.html]

 --Attackers Exploiting Just-Patched IE Flaw
(June 17, 2011)
One of the vulnerabilities Microsoft patched in a security bulletin on
Tuesday June 14 is now being actively exploited. The fix for the Timed
Interactive Multimedia Extensions memory corruption flaw was included
in a cumulative fix for Internet Explorer (IE). The flaw affects IE 6,
7 and 8, but the exploit detected in the wild appears to affect just IE 8.
http://www.scmagazineus.com/exploits-begin-for-patched-internet-explorer-bug/article/205558/

***************************  SPONSORED LINKS  ******************************
1) Download the Symantec Endpoint Protection 12 Beta for unrivaled
security and blazing performance.  http://www.sans.org/info/80044

2) Learn how to secure your network during the IPv6 transition at the
Security Impact of IPv6 Summit July 15th in Washington DC and take
advantage of the post-Summit IPv6 Essentials course July 16th.
http://www.sans.org/info/80049

3) Sign up for SANS Webcast:Practical Use of the Next-Generation
Firewall to Control Advanced Malware sponsored by Palo Alto Networks.
Go to http://www.sans.org/info/80054
****************************************************************************

THE REST OF THE WEEK'S NEWS
 --Flash Flaw is Being Actively Exploited
(June 20, 2011)
Attackers are actively exploiting a vulnerability in Flash Player for
which Adobe issued a patch last week. The flaw is being exploited
through drive-by attacks on legitimate websites as well as through spear
phishing attacks. The attacks infiltrate users' computers "in the
background," leaving them unaware that their machines have been infected
with malware. Adobe's director of product security and privacy Brad
Arkin acknowledged that attackers are likely targeting Flash because of
its ubiquity. Adobe has been focusing on getting out-of-cycle fixes
released quickly when attacks exploiting zero-day flaws are detected in
the wild.
http://www.computerworld.com/s/article/9217758/Attackers_exploit_latest_Flash_bug_on_large_scale_says_researcher?taxonomyId=17

 --Sega Acknowledges Customer Data Stolen
(June 19 & 20, 2011)
Sega, the video game company, says one of its databases has been hacked,
exposing sensitive personal information of 1.3 million Sega customers.
The Sega Pass website database contains customers' names, dates of
birth, email addresses and encrypted passwords. Sega has notified
affected customers of the breach. Payment information appears to be
unaffected by the attack. Because of the information compromised,
customers were warned to be on the lookout for suspicious communications
seeking more personal data. The Sega pass website has been temporarily
disabled while Sega investigates the incident; the company has reset all
user passwords.
Internet Storm Center: http://isc.sans.edu/diary.html?storyid=11065
http://www.computerworld.com/s/article/9217747/Reports_Sega_customer_database_hacked?taxonomyId=17
http://www.bbc.co.uk/news/technology-13829690
http://www.scmagazineuk.com/lulzsec-says-it-was-not-responsible-for-sega-hack-as-it-marks-1000-tweets-with-mission-statements/article/205644/

 --UK Student Facing Extradition for Running Site With Links to Pirated Movies
(June 17 & 20, 2011)
A UK student who allegedly ran a website that contained links to other
sites hosting pirated content is facing extradition to the US to face
charges of conspiracy to commit copyright infringement and criminal
copyright infringement. A British court granted Richard O'Dwyer bail,
the terms of which prohibit him from entering airports and other ports
and from applying to register new domain names. If he is extradited and
convicted of the charges in the US, O'Dwyer could face a five year
prison sentence. O'Dwyer's lawyer says the extradition demands violate
his client's human rights. O'Dwyer's website was hosted in the UK and
UK laws pertinent to the situation already exist. If he is extradited,
O'Dwyer would face harsher penalties.
http://www.scmagazine.com.au/News/261008,student-faces-us-copyright-extradition.aspx
http://www.zdnet.co.uk/news/regulation/2011/06/16/student-faces-extradition-to-us-for-hosting-links-40093132/?tag=mantle_skin;content
http://www.telegraph.co.uk/technology/8580390/Expert-British-law-has-allowed-linking-to-pirated-material.html
http://www.guardian.co.uk/law/2011/jun/17/student-file-sharing-tvshack-extradition

 --Virgin Media Warns Users Infected With Spy Eye Trojan
(June 17, 2011)
Internet service provider (ISP) Virgin Media has warned about 1,500
customers that their computers have been infected with the SpyEye Trojan
horse program. Virgin has provided the customers with advice from the
UK's Serious Organised Crime Agency (SOCA) for cleaning their computers.
http://www.scmagazineuk.com/virgin-media-warns-customers-about-spyeye-trojan-as-1500-users-found-to-be-part-of-botnet/article/205509/
http://www.infosecurity-magazine.com/view/18785/virgin-media-works-with-soca-on-1500-spyeye-infections-/
http://www.eweekeurope.co.uk/news/virgin-media-warns-customers-of-spyeye-infection-31982
[Editor's Comment (Northcutt): ISPs helping to notify their users may
be the only way we can start to manage SpyEye, Sunspot etc.
(Honan): Well done to Virgin Media for taking this proactive step in
reducing the amount of infected PCs on the Internet, hopefully other
ISPs will follow their example.]

 --Man Indicted in Domain Name Extortion Scheme
(June 17, 2011)
A federal grand jury in San Jose, California has indicted an Indian man
on charges of computer hacking and extortion for allegedly breaking into
and taking over the MyDomain.com account of oDesk.  Chetan Suresh
Bendale allegedly changed the passwords and administrative contact for
the Redwood City, California-based technology staffing company and
threatened to expose the company's information unless he was paid US $1
million. US authorities plan to seek extradition.
http://www.mercurynews.com/breaking-news/ci_18292674?nclick_check=1
http://www.computerworld.com/s/article/9217739/Man_charged_with_1M_extortion_hack_at_oDesk?taxonomyId=17

 --Prison Sentence for Cyber Extortion Scheme
(June 17, 2011)
A German man has been sentenced to nearly three years in prison for his
role in a cyber extortion scheme against six gambling websites prior to
last year's World Cup tournament. The unnamed man was also ordered to
pay 350,000 Euros (US $502,000). He reportedly hired a botnet and
threatened to launch distributed denial-of-service (DDoS) attacks
against the gambling sites unless they paid him 2,500 Euros (US $3,600).
He collected a total of 5,000 Euros from three of the sites; the other
sites did not give in to his demands.
http://www.theregister.co.uk/2011/06/17/german_bookmaker_ddoser_jailed/
http://www.net-security.org/secworld.php?id=11174


************************************************************************
The Editorial Board of SANS NewsBites

Eugene Schultz, Ph.D., CISM, CISSP, GLSC is CTO of Emagined Security and
the author/co-author of books on Unix security, Internet security,
Windows NT/2000 security, incident response, and intrusion detection and
prevention. He was also the co-founder and original project manager of
the Department of Energy's Computer Incident Advisory Capability (CIAC).

John Pescatore is Vice President at Gartner Inc.; he has worked in
computer and network security since 1978.

Stephen Northcutt founded the GIAC certification and is President of
STI, The Premier Skills-Based Cyber Security Graduate School,
www.sans.edu.

Dr. Johannes Ullrich is Chief Technology Officer of the Internet Storm
Center and Dean of the Faculty of the graduate school at the SANS
Technology Institute.

Ed Skoudis is co-founder of Inguardians, a security research and
consulting firm, and author and lead instructor of the SANS Hacker
Exploits and Incident Handling course.

William Hugh Murray is an executive consultant and trainer in
Information Assurance and Associate Professor at the Naval Postgraduate
School.

Rob Lee is the curriculum lead instructor for the SANS Institute's
computer forensic courses (computer-forensics.sans.org) and a Director
at the incident response company Mandiant.

Rohit Dhamankar is a security professional currently involved in
independent security research.

Tom Liston is a Senior Security Consultant and Malware Analyst for
Inguardians, a handler for the SANS Institute's Internet Storm Center,
and co-author of the book Counter Hack Reloaded.

Dr. Eric Cole is an instructor, author and fellow with The SANS
Institute. He has written five books, including Insider Threat and he
is a founder with Secure Anchor Consulting.

Ron Dick directed the National Infrastructure Protection Center (NIPC)
at the FBI and served as President of the InfraGard National
Members Alliance - with more than 22,000 members.

Mason Brown is one of a very small number of people in the information
security field who have held a top management position in a Fortune 50
company (Alcoa).  He is leading SANS' global initiative to improve
application security.

David Hoelzer is the director of research & principal examiner for
Enclave Forensics and a senior fellow with the SANS Technology
Institute.

Mark Weatherford, Chief Security Officer, North American Electric
Reliability Corporation (NERC).

Alan Paller is director of research at the SANS Institute.

Marcus J. Ranum built the first firewall for the White House and is
widely recognized as a security products designer and industry
innovator.

Clint Kreitner is the founding President and CEO of The Center for
Internet Security.

Brian Honan is an independent security consultant based in Dublin, Ireland.

David Turley is SANS infrastructure manager and serves as production
manager and final editor on SANS NewsBites.

Please feel free to share this with interested parties via email, but
no posting is allowed on web sites. For a free subscription, (and for
free posters) or to update a current subscription, visit
http://portal.sans.org/


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
Comment: GPGTools - http://gpgtools.org

iEYEARECAAYFAk4A3jQACgkQ+LUG5KFpTkbIUQCdHTaNz0a1WIK9vKEVXJcLFrrM
u/UAnAioqqOq2jk0OpmfNbUQHztHaVNj
=Yj24
-----END PGP SIGNATURE-----




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.