Stuxnet, the government malware believed to have been created by a dual-venture of the US and Israel, and the one used to attack the Iran nuclear enrichment facility, is now believed to have an earlier attack link. It is believed now that sometime in 2008 was when the facility may have been in progress of attacks from Stuxnet.
Iran leaders met in Kazakhstan this week to discuss with members of the UN Security Council the nuclear program. The researchers there announced a new variant of the sophisticated Stuxnet cyberweapon.
Some have noted that the US and Israel may have partnered way before doing similar activities to try to take down the nuclear enrichment program in Iran.
The new variant was designed as a different attack vector against the centrifuges for the uranium enrichment program, versus later versions released. This “new variant” was apparently released in 2007. Here we are six years later, knowing the discovery of such variant. This shows that the current versions of Stuxnet were made in 2009, which means this variant now recognized predated the original code that researchers found. Therefore, its first version may have been in 2007. That tells security experts this: Stuxnet was attacking much earlier than previously thought.
Still to make a rebuttal, Iran is awaiting and planning new cyberwarriors, which can construct cyberattacks and cyberterrorism on the US.
Looking in the code of the 2007 version, it was used for Siemens PLCs, which are used in the Iran nuclear enrichment program in Natanz. It was aimed at sabotaging the valves’ operations, by controlling the flow of uranium.
The list of new information goes on. According to Wired Magazine, the new finding, described in a paper released by Symantec on Tuesday (.pdf), resolves a number of longstanding mysteries around a part of the attack code that appeared in the 2009 and 2010 variants of Stuxnet but was incomplete in those variants and had been disabled by the attackers.
One hacker/malware writer of the DNSChanger malware has pleaded guilty. Only two out of the six have been extradited to the US, so far, to be charged. Valeri Aleksejev, one suspect, has now pleaded guilty and is looking at 25 years in prison, with the possibility of having to pay back up to $7M to victims. Deportation is probable as well.
When hackers change DNS settings, they have the ability to lead the victim(s) to other sites through redirects. Redirects can be used for fraudulent purposes, such as boosting affiliate sales, getting search traffic, etc.
The six suspects in this case effectively manipulated this method and other methods, and “were able to manipulate Internet advertising to generate at least $14 million in illicit fees.”
Eighteen people have been charged in a major credit card fraud scheme. New Jersey federal prosecutors called the fraud one of the largest credit card fraud schemes ever uncovered by the US Department of Justice. This fraudulent act spanned eight countries, as well as 28 US States.
“The defendants are part of a massive international fraud enterprise involving thousands of false identities, fraudulent identification documents, doctored credit reports and more than $200 million in confirmed losses. Due to the massive scope of the fraud, which involved over 25,000 fraudulent credit cards, loss calculations are ongoing and final confirmed losses may grow substantially,” FBI Special Agent James Simpson said in court records.
The criminals charged used greedy means for the stolen money, buying high-end clothing, automobiles, electronics, etc. As well, they stockpiled some in odd places, like an oven in one case.
More information is still up for grabs in this case, once everyone has made their court appearances. It is unknown what the aim was for the criminals, however, it is no surprise the schemes used were for means to make the criminals more wealthy.
Keep your credit card safe with a couple of different tools:
Co-founder with ChronoPay, Pavel Vrublevsky, has decided to plant a lawsuit on Kaspersky Lab. ChronoPay is a large e-payment system in Russia. The lawsuit arises when Vrublevsky accused Kaspersky Lab of publishing defamatory blog posts about him, because of his ongoing trial. His trial is about cybercrime, as he is allegedly believed to have hired the creator of the Festi spam botnet to launch an attack on one of ChronoPay’s competitors.
Apparently, Vrublevsky is known for past campaigns in pharma-scams and other associated cybercrimes. His trial does not come light.
From what it seems like, this situation is a bit out-of-reach for Kaspersky, only because they were just blogging about news that goes on. If the posts were truly defamatory, what tact would Vrublevsky have on them anyway?
The New York Times reported about the damages of the attacks on Saudi Aramco, a Saudi Arabian oil firm. The article stated the following, blaming Iran for the attacks on Saudi Aramco along with supporting evidence:
That morning, at 11:08, a person with privileged access to the Saudi state-owned oil company’s computers, unleashed a computer virus to initiate what is regarded as among the most destructive acts of computer sabotage on a company to date. The virus erased data on three-quarters of Aramco’s corporate PCs — documents, spreadsheets, e-mails, files — replacing all of it with an image of a burning American flag.
United States intelligence officials say the attack’s real perpetrator was Iran, although they offered no specific evidence to support that claim. But the secretary of defense, Leon E. Panetta, in a recent speech warning of the dangers of computer attacks, cited the Aramco sabotage as “a significant escalation of the cyber threat.” In the Aramco case, hackers who called themselves the “Cutting Sword of Justice” and claimed to be activists upset about Saudi policies in the Middle East took responsibility.
Intelligence officials are still investigating the nature of the RasGas hack also, because it is related to this attack, which involved a malware called Shamoon.
The investigations of Saudi Aramco and RasGas, Qatar’s top natural gas firm, are coming together. Most of the cyberattacks this year have been aimed at erasing data on energy companies’ computers. More updates to come.
- How hackers attacked Saudi oil company’s computers (seattletimes.com)
- US Increasingly Convinced Iran Behind Attack On Saudi Aramco (techweekeurope.co.uk)
- Shamoon Virus that Attacked Saudi Aramco is the Most Dangerous to Date (oilprice.com)
The Hongkong and Shanghai Banking Corporation, also known as HSBC, was the next victim of a distributed denial-of-service attack (DDoS), making it impossible for customers to conduct their Internet banking services.
According to a statement posted on its website:
On 18 October 2012 HSBC servers came under a denial of service attack which affected a number of HSBC websites around the world.
This denial of service attack did not affect any customer data, but did prevent customers using HSBC online services, including internet banking.
We are taking appropriate action, working hard to restore service. We are pleased to say that some sites are now back up and running.
We are cooperating with the relevant authorities and will cooperate with other organisations that have been similarly affected by such criminal acts.
We apologise for any inconvenience caused to our customers throughout the world.
The update on its website stated, “HSBC restored all of its websites globally to full accessibility as of 11:00 PM EST time last night. ”
DDoS attacks, conducted by cyber criminals, are a means of controlling a certain number of computers to target a single or group of Internet servers, in attempts to overload them. This in turn, causes the server to shutdown, or discontinue its service until the load wears down.
This is only one of the few latest DDoS attacks on corporations or government entities.
The town of Burlington, Washington fell victim to a recent attack by a band of unknown hackers, stealing $400,000 in the operation. Odds are that taxpayer data was stolen, also.
Burlington officials have warned residents in the city that their private data could have been stolen, and becoming targets for identity theft. A number of billing systems in the town were attacked, notably the online automatic utility billing system, which holds a large amount of resident data. Once these systems were attacked, the band of hackers were able to leak $400,000 out of the city’s funds.
According to Computer World, an alert [that was] issued this morning, city administrator Bryan Harrison said all autopay customers should assume that their name, bank account number and routing number was compromised following an intrusion into a city utility billing system.
Authorities are still investigating this issue, and will provide updates soon.
- Police: Hackers Take $400,000 From Washington City Account (seattle.cbslocal.com)
- Hackers steal $487K from Washington town (kgw.com)