- The Strategist - https://www.aspistrategist.org.au -
Cyber wrap
Posted By Michael Chi on July 5, 2017 @ 12:27
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-171/
[1] Petya: https://blog.malwarebytes.com/threat-analysis/2016/04/petya-ransomware/
[2] infecting machines across 65 countries: https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/
[3] publicly stated on Twitter: https://twitter.com/JanusSecretary/status/880156466115743744
[4] variety of names: https://twitter.com/MarceloRivero/status/881936776084017152
[5] NotPetya: https://www.theregister.co.uk/2017/06/28/petya_notpetya_ransomware/
[6] Petna: https://www.bleepingcomputer.com/news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak/
[7] Nyetya: http://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html
[8] SortaPetya: https://twitter.com/z0mbi3/status/880501659171946496?ref_src=twsrc%5Etfw&ref_url=https%3A%2F%2Fblog.barkly.com%2Fpetya-notpetya-faq
[9] GoldenEye: https://www.bitdefender.com/news/massive-goldeneye-ransomware-attack-affects-users-worldwide-3330.html
[10] PetrWrap: https://www.crowdstrike.com/blog/petrwrap-ransomware-technical-analysis-triple-threat-file-encryption-mft-encryption-credential-theft/
[11] most: https://securelist.com/expetrpetyanotpetya-is-a-wiper-not-ransomware/78902/
[12] commentators: https://blog.comae.io/petya-2017-is-a-wiper-not-a-ransomware-9ea1d8961d3b
[13] including NATO Cyber Defence researchers: https://ccdcoe.org/notpetya-and-wannacry-call-joint-response-international-community.html
[14] have: https://krebsonsecurity.com/2017/06/petya-ransomware-outbreak-goes-global/
[15] concluded: https://lawfareblog.com/thoughts-notpetya-ransomware-attack
[16] this version of Petya: https://medium.com/@thegrugq/pnyetya-yet-another-ransomware-outbreak-59afd1ee89d4
[17] is a data wiper in disguise: https://www.itnews.com.au/news/petya-designed-to-destroy-not-ransom-users-466929?utm_source=feed&utm_medium=rss&utm_campaign=iTnews+
[18] The Ukrainian security service: https://ssu.gov.ua/en/news/1/category/21/view/3660#sthash.yYXMclql.dpbs
[19] firmly laid the blame for Petya: http://www.bbc.com/news/world-europe-40471310
[20] hardest hit: https://securelist.com/schroedingers-petya/78870/
[21] pushed across a widely used Ukrainian tax program: https://www.theverge.com/2017/7/3/15916060/petya-medoc-vulnerability-ransomware-cyberattack
[22] considering charging the company: https://apnews.com/8b02768224de485eb4e7b33ae55b02f2
[23] creation of a new, uniformed, ‘Information Warfare Unit’: https://www.itnews.com.au/news/australia-has-created-a-cyber-warfare-unit-467115?utm_source=feed&utm_medium=rss&utm_campaign=iTnews+
[24] found that Queensland’s water service providers: http://www.parliament.qld.gov.au/Documents/TableOffice/TabledPapers/2017/5517T1049.pdf
[25] key weaknesses identified: https://www.itnews.com.au/news/hackers-could-fairly-easily-cripple-qlds-water-system-466610?utm_source=feed&utm_medium=rss&utm_campaign=iTnews+
[26] expressed similar, broader concern: http://www.zdnet.com/article/wa-auditor-general-able-to-guess-database-administrator-passwords/
[27] same common weaknesses: https://audit.wa.gov.au/wp-content/uploads/2017/06/report2017_12-ISAuditReport.pdf
[28] Australian National Audit Office has: https://www.anao.gov.au/work/performance-audit/mygov-digital-services
[29] myGov implementation: https://www.itnews.com.au/news/dhs-gets-auditors-tick-for-mygov-466619?utm_source=feed&utm_medium=rss&utm_campaign=iTnews+
[30] raised concerns about why: http://www.smh.com.au/national/centrelink-hacking-into-fraudsters-phones-20170627-gwzgqc.html
[31] Five-Country Ministerial meeting on National Security in Ottawa has concluded: https://www.pcworld.idg.com.au/article/621268/five-eyes-want-cooperation-from-tech-companies-encryption/
[32] announced that they will be: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/fv-cntry-mnstrl-2017/index-en.aspx
[33] previous: http://www.pm.gov.au/media/2017-06-13/national-security-statement
[34] statements: https://www.attorneygeneral.gov.au/Mediareleases/Pages/2017/SecondQuarter/Tackling-Encryption-and-Border-Security-key-Priorities-at-Five-Eyes-Meeting-in-Ottawah.aspx
[35] issued Google with a landmark: http://europa.eu/rapid/press-release_IP-17-1784_en.htm
[36] favouring Google Shopping in its search results: http://www.reuters.com/article/us-eu-google-antitrust-idUSKBN19I108
[37] being excluded from Google’s search results: http://www.abc.net.au/news/2017-06-27/google-fined-record-$3.57-billion-by-european-union/8657470
[38] every day of non-compliance that passes after that time: https://www.theguardian.com/business/2017/jun/27/google-braces-for-record-breaking-1bn-fine-from-eu
[39] smartphone: http://europa.eu/rapid/press-release_IP-16-1492_en.htm
[40] advertising markets: http://europa.eu/rapid/press-release_IP-16-2532_en.htm
[41] spent up to €10 million for a team: http://www.telegraph.co.uk/technology/2017/06/30/eu-appoints-tech-experts-police-googles-search-results/
[42] fallen short of its lofty goals: https://www.cfr.org/blog-post/development-cyber-norms-united-nations-ends-deadlock-now-what?utm_source=CSIS+All&utm_campaign=0e1c21b41c-EMAIL_CAMPAIGN_2017_06_30&utm_medium=email&utm_term=0_f326fc46b6-0e1c21b41c-145371421
[43] rejected by a small number of states: https://www.justsecurity.org/42768/international-cyber-law-politicized-gges-failure-advance-cyber-norms/
[44] declaring: https://www.state.gov/s/cyberissues/releasesandremarks/272175.htm
[45] published a comprehensive piece: http://business.financialpost.com/feature/the-cryptocurrency-prophet/wcm/faf71b6d-df9b-42dd-9ede-ba35725957c5
[46] provided a retrospective on the development: https://www.bloomberg.com/news/features/2017-06-27/the-chaos-computer-club-is-fighting-to-save-democracy
[47] flagging and removing violent extremist content: https://www.propublica.org/article/facebook-hate-speech-censorship-internal-documents-algorithms