CyberSecurity Pulse 2016-06-16

CyberSecurity Pulse 2016-06-16

“It requires a very unusual mind to undertake the analysis of the obvious.”
Alfred North Whitehead

Analyst Insight

Online Gaming, a Path to Cybercriminality?

Recent events have provided evidence of the extent to which young people can become involved in cybercrime. In September 2015 representatives from CREST member companies, a non profit organization, met the National Crime Agency's National Cyber Crime Unit (NCA NCCU) at a workshop conceived to assist the NCCU's efforts to prevent young people being tempted to participate in illegal online activities.

CyberSecurity Pulse 2016-06-16In order to explain who is most likely to be targeted and according to NCCU, individuals involved in illegal activity can be classified as being members of groups within the different layers of a pyramid. At the top of it and as the smallest group, the most serious cyber criminals stay. A second level would include malware developers and senior hacking forum members. Lower levels of the pyramid include RAT or Stresser users, with the lowest groups in the pyramid being compounded by members of hacking forums as well as, and this is curious, gaming enthusiasts who may be experimenting with hacking.

It is clear that not all cybercriminals start in gaming platforms, while not all passionate about game become cybercriminals. Those who are trying to monetize cybercrime know perfectly the ways that internet offers to do so having little to do with being passionate about online gaming.

» Más información en CREST

Top Stories

NSA Interested in Exploiting Internet-connected Medical Devices

CyberSecurity Pulse 2016-06-16The NSA is looking for ways to exploit the Internet of Things and connected biomedical devices in order to monitor targets and collect foreign intelligence. At the Defense One Tech Summit on Friday, NSA Deputy Director Richard Ledgett said, "We're looking at it sort of theoretically from a research point of view right now". If that involves hackers from the NSA's Office of Tailored Access Operations (TAO), it's practically a done deal when you consider the wide range of devices previously pwned and listed in the ANT division catalog of exploits. It surely wouldn't be too difficult for the group, since IoT and wireless medical devices are notoriously insecure.

» More information at Computerworld

ISIS Radicalises Lone Wolves Through Strong Social Media Presence

CyberSecurity Pulse 2016-06-16ISIS lone wolves are being activated in cities across the globe by one of the strongest cyber-physical combination of guerilla attack ever introduced in modern warfare. Hours after the 13 June 2016 attack on the Pulse nightclub in Orlando (Florida), ISIS claimed responsibility for Omar Mateen's actions, which killed 49 individuals and injured at least 53 more in the worst act of terrorism on American soil since the 11 September attacks in 2001. Although the authorship has not been confirmed yet, it is a fact that this group is using its strong social media presence to heavily recruit "lone-wolves" to offer a sense of belonging and radical ideology to these social outcasts.

» More information at SCMagazine UK

Rest of the Week´s News

Hackers Invade Democrats' Servers, Steal Entire Trump Opposition File

A hack on the Democratic National Committee has given attackers access to a massive trove of data, including all opposition research into presidential candidate Donald Trump and almost a year's worth of private e-mail and chat messages, according to a report published on The Washington Post.

» More information at The Washington Post

Corporate Shared Folders in Cloud Filled With Malware, Research Finds

In a study based on data collected from millions of users over the first three months of 2016, cloud security company Netskope found that 11 percent of enterprises have sanctioned cloud apps with malware. These figures more than doubled up from just 4.1 percent in the previous quarter's data.The malware discovered included JavaScript exploits, droppers used to spread other malware applications, malicious embedded macros in document files, backdoor-oriented malware, spyware, and adware.

» More information at Ars Technica UK

Microsoft Buys LinkedIn for $26.2 Billion

Microsoft Corp. snapped up LinkedIn Corp. for $26.2 billion in the largest acquisition in its history, betting the professional social network can rev up the tech titan's software offerings despite recent struggles by both companies. "It's really the coming together of the professional cloud and the professional network", Chief Executive Satya Nadella said in an interview on Monday.

» More information at The Wall Street Journal

Further Reading

North Korean Hackers Steal Thousands of Military Files From S. Korea

» More information at The Hacker News

"Our Systems Have Not Been Breached", Twitter Said

» More information at Ars Technica UK

Scammers Have Already Started Trying to Exploit Orlando Shooting for Bitcoins

» More information at Ars Technica UK