CyberSecurity Pulse 2016-06-16
|“It requires a very unusual mind to undertake the analysis of the obvious.”|
|Alfred North Whitehead|
Online Gaming, a Path to Cybercriminality?
In order to explain who is most likely to be targeted and according to NCCU, individuals involved in illegal activity can be classified as being members of groups within the different layers of a pyramid. At the top of it and as the smallest group, the most serious cyber criminals stay. A second level would include malware developers and senior hacking forum members. Lower levels of the pyramid include RAT or Stresser users, with the lowest groups in the pyramid being compounded by members of hacking forums as well as, and this is curious, gaming enthusiasts who may be experimenting with hacking.
It is clear that not all cybercriminals start in gaming platforms, while not all passionate about game become cybercriminals. Those who are trying to monetize cybercrime know perfectly the ways that internet offers to do so having little to do with being passionate about online gaming.
NSA Interested in Exploiting Internet-connected Medical Devices
The NSA is looking for ways to exploit the Internet of Things and connected biomedical devices in order to monitor targets and collect foreign intelligence. At the Defense One Tech Summit on Friday, NSA Deputy Director Richard Ledgett said, "We're looking at it sort of theoretically from a research point of view right now". If that involves hackers from the NSA's Office of Tailored Access Operations (TAO), it's practically a done deal when you consider the wide range of devices previously pwned and listed in the ANT division catalog of exploits. It surely wouldn't be too difficult for the group, since IoT and wireless medical devices are notoriously insecure.
ISIS Radicalises Lone Wolves Through Strong Social Media Presence
ISIS lone wolves are being activated in cities across the globe by one of the strongest cyber-physical combination of guerilla attack ever introduced in modern warfare. Hours after the 13 June 2016 attack on the Pulse nightclub in Orlando (Florida), ISIS claimed responsibility for Omar Mateen's actions, which killed 49 individuals and injured at least 53 more in the worst act of terrorism on American soil since the 11 September attacks in 2001. Although the authorship has not been confirmed yet, it is a fact that this group is using its strong social media presence to heavily recruit "lone-wolves" to offer a sense of belonging and radical ideology to these social outcasts.
Rest of the Week´s News
Hackers Invade Democrats' Servers, Steal Entire Trump Opposition File
A hack on the Democratic National Committee has given attackers access to a massive trove of data, including all opposition research into presidential candidate Donald Trump and almost a year's worth of private e-mail and chat messages, according to a report published on The Washington Post.
Corporate Shared Folders in Cloud Filled With Malware, Research Finds
Microsoft Buys LinkedIn for $26.2 Billion
Microsoft Corp. snapped up LinkedIn Corp. for $26.2 billion in the largest acquisition in its history, betting the professional social network can rev up the tech titan's software offerings despite recent struggles by both companies. "It's really the coming together of the professional cloud and the professional network", Chief Executive Satya Nadella said in an interview on Monday.