HP Security Research OSINT (OpenSource Intelligence) articles of interest--August 1, 2014

Below, you will find the HP Security Research key articles of interest for August 1, 2014. These are publically available articles that are provided as a news service only. The intent of this blog post is to share current events related to the cyber security industry. 

 

How hackers could slam on your car’s brakes
A report shared exclusively with CNNMoney shows that the 2014 Jeep Cherokee, 2015 Cadillac Escalade and 2014 Toyota Prius were the most ‘hackable’ of 20 car models reviewed by automotive security researchers. The 2014 Dodge Viper and 2014 Audi A8 were the least hackable.

BadUSB: Big, bad USB security problems ahead
Everyone knows that USB thumb-drives can spell security trouble, but a German security group has found new and nasty ways to use USB devices to wreak havoc on computers.

Chinese cyberattack hits Canada’s National Research Council
A “highly sophisticated Chinese state-sponsored actor” recently managed to hack into the computer systems at Canada’s National Research Council, according to Canada’s chief information officer, Corinne Charette.
The attack was discovered by Communications Security Establishment Canada.

JULY 2014 unified threat intelligence report
Overall, the month of July 2014 has been fraught with new malware campaigns against various entities and this has been the trend since approximately 2010. Malware today is the pivot point for attacks and these campaigns are initiated with emails (phishing), as well as other attacks.

 

Energetic Bear—Crouching Yeti
Energetic Bear/Crouching Yeti is an actor involved in several Advanced Persistent Threat (APT) campaigns that have been active since at least the end of 2010.

 

Operation Dragonfly imperils industrial protocol
Recent headlines may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. Recent reports about Operation Dragonfly, however, appear to be focused on espionage (at least for now), and the scope of the attack appears to be considerably broader than that of Stuxnet.

 

Threat Group–3279 targets the video game industry
Based upon Portable Executable (PE) compile dates, domain name registrations, collection dates of tools, the threat actors’ activity on message boards, and activity observed by Dell SecureWorks Counter Threat Unit™ (CTU) researchers during incident response engagements, TG–3279 appears to have been active since 2009.

 

The information contained in this blog post is from publicly available sources. Avoid suspicious links and advertisements. These articles do not represent HP’s view or position on any of the topics listed. 

Labels: HPSR
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.