MalwareIntelligence is a site dedicated to the investigation of crimes committed using the Internet as the main channel of attack. Also, anything that involves maneuvering and criminal activities in this area, covering a wide spectrum in the field of computer criminology.
The mission is to work in a completely disinterested in the continuous improvement in prevention to security incidents that allow for timely contingency threats.
Thus MalwareIntelligence behind is a group of professionals in research, intelligence and information security, which fuse the various processes involved in these disciplines to offer exclusive content, quality and high value for the resolution of computer crime.
MalwareIntelligence currently has two divisions:
MalwareDisasters is devoted to analyzing malicious code from a purely involved in intelligence processes. The content expressed in this division refers mainly to activities “visual” of malware.
SecurityIntelligence channels information on information security, also from the standpoint of intelligence processes, resulting in a high-value content to understand the need to merge Intelligence in Information Security.
Thanks to Alexander Heid's talk at the Next Hope called “Modern CrimeWare Tools and Techniques: An Analysis of Underground Resources” – Download Audio: 16kbps or 64kbps
U.S. Strategy: Control The World By Controlling The Internet
A Chinese Perspective, by Chen Baoguo, August 24, 2010
In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation. In January 2010, Google, the company which owns the largest Internet information resources, declared that in order to establish a more open Internet environment, they had to abandon the Chinese market.What is even more worrying is that Senator Joseph Lieberman, chairman of US Homeland Security Committee, recently presented to the US Senate a bill titled “Protecting Cyberspace as a National Asset. “To control the world by controlling the Internet has been a dominant strategy of the US.From the network infrastructure protection of the Clinton era to the network anti-terrorism of the Bush era and to the “network deterrence” of the Obama era, the national information security strategy of the US has evolved from a preventative strategy to a preemptive one.Meanwhile, the methodology has moved from trying to control Internet hardware to control of Internet content.
China Cyber-army Talk Pulled from Black Hat
By: Brian Prince 2010-07-15
A presentation on Chinese state-sponsored hacking has been pulled from the Black Hat security conference due to pressure from the Taiwanese government. The talk, titled “The Chinese Cyber Army: An Archaeological Study from 2001 to 2010,” was to be held by Wayne Huang, CTO of Web application security firm Armorize Technologies.
Here’s an interesting study by AVG on internet security, asking “Where in the World are you most likely to be hit by a malicious computer attack or virus?”.
Apparently, and surprisingly to me, the answer is “not Africa” or South America.
“During the last week of July, AVG researchers compiled a list of virus and malware attacks by country picked up by AVG security software. This means we have compiled data from over 127 million computers in 144 countries to determine the incidence rates of virus attacks by country.”
Dirk Singer, of AVG sent over the list of African countries, here they are country-by-country. As you can see, sub-saharan Africa is compatively ‘safe’ compared to other areas of the World. Your chances of being attacked while surfing the web in each country are:
Google has twice as much malware in its search results as Yahoo, Bing, and Twitter combined. That’s one of the findings in the Barracuda Labs 2010 Midyear Security Report, which will be presented tomorrow at the DEFCON 18 hacking conference tomorrow in Las Vegas.
Barracuda Labs says it studied the four search engines for about two months and reviewed more than 25,000 trending topics and almost 5.5 million search results.
The article also includes a pie chart (on page 60 showing malware percentages from Google 69%, Bing 12%, Yahoo 18%, and Twitter 1%) as well as a table showing the percentage of accounts Twitter suspends each month.
[It] was 1.67% for the first half of 2010, with a high of 2.38% in June.
More information has emerged about Google’s relationship with the government and spook agencies (see PR Newswire below). The revelations should come as no surprise.
Consumer Watchdog, formerly the Foundation for Taxpayer and Consumer Rights is a nonprofit, nonpartisan consumer advocacy organization with offices in Washington, DC and Santa Monica, Ca. Consumer Watchdog’s website is www.consumerwatchdog.org. Visit our new Google Privacy and Accountability Project website: http://insidegoogle.com.
Phi Beta Iota: Goggle has accomplished a great deal, aided in part by CIA and NSA, but also in part by being able to get away with stealing Yahoo's search engine in the early days and hiring the Alta Vista people when HP foolishly killed off that offering. They have emulated Microsoft in achieving first-rate marketing with second-rate services, and continue to spend $10 million in fantasy cash for every dollar they actually earn. They are now the Goldman Sachs of the software industry, and that is not a compliment. It is not possible to understand Google without reading the three deep analytic books on Google by Stephen E. Arnold:
The nation's spy world is anxiously — certainly not eagerly — anticipating a Washington Post series looking at CIA and Pentagon contractors, according to insider reports. And the intelligence community has been preparing for an expected offensive by plotting its defense.
The Atlantic has posted a memorandum, “Internal Memo: Intelligence Community Frets About Washington Post Series,” sent by Art House, the media manager for the Director of National Intelligence. He outlines what he thinks the series will say about the “IC” (intelligence community) and offers talking points for press aides.
Here are some of the highlights of the memo:
Themes
While we can't predict specific content, we anticipate the following themes:
*The intelligence enterprise has undergone exponential growth and has become unmanageable with overlapping authorities and a heavily outsourced contractor workforce.
*The IC and the DoD have wasted significant time and resources, especially in the areas of counterterrorism and counterintelligence.
*The intelligence enterprise has taken its eyes off its post-9/11 mission and is spending its energy on competitive and redundant programs.
Management of Responses
We do not know which agencies will receive attention, and each agency will need to manage its own responses. …
It might be helpful as you prepare for publication to draw up a list of accomplishments and examples of success to offer in response to inquiries to balance the coverage and add points that deserve to be mentioned. In media discussions, we will seek to garner support for the Intelligence Community and its members by offering examples of agile, integrated activity that has enhanced performance. We will want to minimize damage caused by unauthorized disclosure of sensitive and classified information. …
House's conclusion: “This series has been a long time in preparation and looks designed to cast the IC and the DoD in an unfavorable light. We need to anticipate and prepare so that the good work of our respective organizations is effectively reflected in communications with employees, secondary coverage in the media and in response to questions.”
Keep your eyes peeled for this blockbuster.
Phi Beta Iota: Panetta had a chance to get it right and blew it. Clapper will finish the job of destroying whatever integrity is left in the US Intelligence Community. This is not news, but the Washington Post has finally caught up with the rest of us.
(IEEE Spectrum) By: Robert Charette // Thu, July 08, 2010
There is a story in the Wall Street Journal about a new, $100+ million, classified program being run out of the National Security Agency (NSA) that will monitor critical commercial and government infrastructure systems such as electricity grids, nuclear power plants, air traffic control systems and the like in order to detect cyber attacks.
Dubbed “Perfect Citizen,” the NSA hopes the program will hep it fill in what the WSJ calls the “big, glaring holes” in knowledge about exactly how massive, coordinated cyber attacks might negatively affect the US.
The Journal story goes on to quote from an internal email from US defense contractor Raytheon, the program's prime contractor, as saying:
“The overall purpose of the [program] is our Government…feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security.”