Malware Intelligence of Modern Crimeware

Computer/online security, Cyberscams, malware, spam, Methods & Process, Privacy, Technologies
website

MalwareIntelligence is a site dedicated to the investigation of crimes committed using the Internet as the main channel of attack. Also, anything that involves maneuvering and criminal activities in this area, covering a wide spectrum in the field of computer criminology.

The mission is to work in a completely disinterested in the continuous improvement in prevention to security incidents that allow for timely contingency threats.

Thus MalwareIntelligence behind is a group of professionals in research, intelligence and information security, which fuse the various processes involved in these disciplines to offer exclusive content, quality and high value for the resolution of computer crime.

MalwareIntelligence currently has two divisions:

MalwareDisasters is devoted to analyzing malicious code from a purely involved in intelligence processes. The content expressed in this division refers mainly to activities “visual” of malware.

SecurityIntelligence channels information on information security, also from the standpoint of intelligence processes, resulting in a high-value content to understand the need to merge Intelligence in Information Security.

Thanks to Alexander Heid's talk at the Next Hope called “Modern CrimeWare Tools and Techniques: An Analysis of Underground Resources– Download Audio: 16kbps or 64kbps

Google, MSoft, IBM, HP, Oracle, Intel (chips), National Security and Perceived Internet Threats

04 Education, 04 Inter-State Conflict, 10 Security, Commerce, Computer/online security, Cyberscams, malware, spam, Government, Military, Misinformation & Propaganda, Secrecy & Politics of Secrecy, Technologies
  • U.S. Strategy: Control The World By Controlling The Internet
    A Chinese Perspective, by Chen Baoguo, August 24, 2010
    In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation. In January 2010, Google, the company which owns the largest Internet information resources, declared that in order to establish a more open Internet environment, they had to abandon the Chinese market.What is even more worrying is that Senator Joseph Lieberman, chairman of US Homeland Security Committee, recently presented to the US Senate a bill titled “Protecting Cyberspace as a National Asset. “To control the world by controlling the Internet has been a dominant strategy of the US.From the network infrastructure protection of the Clinton era to the network anti-terrorism of the Bush era and to the “network deterrence” of the Obama era, the national information security strategy of the US has evolved from a preventative strategy to a preemptive one.Meanwhile, the methodology has moved from trying to control Internet hardware to control of Internet content.

  • Video: “The cyber-threat has been grossly exaggerated” debate between Marc Rotenberg & Bruce Schneier VERSUS Mike McConnell & Jonathan Zittrain

  • China Cyber-army Talk Pulled from Black Hat
    By: Brian Prince 2010-07-15
    A presentation on Chinese state-sponsored hacking has been pulled from the Black Hat security conference due to pressure from the Taiwanese government. The talk, titled “The Chinese Cyber Army: An Archaeological Study from 2001 to 2010,” was to be held by Wayne Huang, CTO of Web application security firm Armorize Technologies.

South America #1, Africa #2, Asia #3 Safest Continents for Web

08 Wild Cards, Computer/online security, Cyberscams, malware, spam, Technologies
Source article (WhiteAfrican.com)

Africa: The 2nd Safest Continent to Surf the Web

by HASH on August 23, 2010

Here’s an interesting study by AVG on internet security, asking “Where in the World are you most likely to be hit by a malicious computer attack or virus?”.

Apparently, and surprisingly to me, the answer is “not Africa” or South America.

“During the last week of July, AVG researchers compiled a list of virus and malware attacks by country picked up by AVG security software. This means we have compiled data from over 127 million computers in 144 countries to determine the incidence rates of virus attacks by country.”

Dirk Singer, of AVG sent over the list of African countries, here they are country-by-country. As you can see, sub-saharan Africa is compatively ‘safe’ compared to other areas of the World. Your chances of being attacked while surfing the web in each country are:

North Africa

  • Egypt 1 in 62.4
  • Algeria 1 in 86.9
  • Libya 1 in 87.7
  • Mauritania 1 in 92.4
  • Tunisia 1 in 110.7
  • Morocco 1 in 112.1

Continue reading “South America #1, Africa #2, Asia #3 Safest Continents for Web”

Google = King of Malware

Computer/online security, Corporations, Cyberscams, malware, spam, Technologies

See the report

New Report Findings from Barracuda Labs: The ‘King Of Malware’ at Midyear 2010, Google

Matt McGee writes on Search Engine Land:

Google has twice as much malware in its search results as Yahoo, Bing, and Twitter combined. That’s one of the findings in the Barracuda Labs 2010 Midyear Security Report, which will be presented tomorrow at the DEFCON 18 hacking conference tomorrow in Las Vegas.

Barracuda Labs says it studied the four search engines for about two months and reviewed more than 25,000 trending topics and almost 5.5 million search results.

The article also includes a pie chart (on page 60 showing malware percentages from Google 69%, Bing 12%, Yahoo 18%, and Twitter 1%) as well as a table showing the percentage of accounts Twitter suspends each month.

[It] was 1.67% for the first half of 2010, with a high of 2.38% in June.

Access the Complete Article, Charts, and Graphs at Search Engine Land

Also see:
+ Barracuda Labs 2010 Midyear Security Report (Free; 83 pages; PDF)
+ Researcher ‘Fingerprints' The Bad Guys Behind The Malware (June 22, 2010)
+ Vulnerabilities in Adobe Acrobat/Reader & MS Word being used to install malware

Journal: Consumer Group Calls for Hearings on Google Relations with NSA and CIA, Google’s Global Street-Level Survey of Wi-Fi Packet Interceptability

07 Other Atrocities, 09 Justice, 11 Society, Commerce, Computer/online security, Corruption, Cyberscams, malware, spam, Government, InfoOps (IO), Methods & Process, Military, Misinformation & Propaganda, Mobile

Group Calls for Hearings Into Google’s Ties to CIA and NSA

Prisonplanet.com
July 20, 2010

More information has emerged about Google’s relationship with the government and spook agencies (see PR Newswire below). The revelations should come as no surprise.

FULL STORY ONLINE

Consumer Watchdog, formerly the Foundation for Taxpayer and Consumer Rights is a nonprofit, nonpartisan consumer advocacy organization with offices in Washington, DC and Santa Monica, Ca.  Consumer Watchdog’s website is www.consumerwatchdog.org. Visit our new Google Privacy and Accountability Project website: http://insidegoogle.com.

Phi Beta Iota: Goggle has accomplished a great deal, aided in part by CIA and NSA, but also in part by being able to get away with stealing Yahoo's search engine in the early days and hiring the Alta Vista people when HP foolishly killed off that offering.  They have emulated Microsoft in achieving first-rate marketing with second-rate services, and continue to spend $10 million in fantasy cash for every dollar they actually earn.  They are now the Goldman Sachs of the software industry, and that is not a compliment.  It is not possible to understand Google without reading the three deep analytic books on Google by Stephen E. Arnold:

Book One: The Google Legacy–How Google's Internet Search is Transforming Application Software

Book Two:  Google Version 2.0–The Calculating Predator

Book Three:   Google: The Digital Gutenberg

All three books (all downloadable pdfs) are available in The Google Trilogy at a very special price.

Journal: Dana Priest Strikes Again…

Budgets & Funding, Corruption, Cyberscams, malware, spam, Government, InfoOps (IO), Intelligence (government), Methods & Process, Misinformation & Propaganda, Money, Banks & Concentrated Wealth, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Reform, Secrecy & Politics of Secrecy, Technologies
Marcus Aurelius Recommends

On Deadline (USAToday.com)
July 16, 2010

By Michael Winter

The nation's spy world is anxiously — certainly not eagerly — anticipating a Washington Post series looking at CIA and Pentagon contractors, according to insider reports. And the intelligence community has been preparing for an expected offensive by plotting its defense.

Politico says in “Jitters over WaPo intel series – Explosions rock Iranian mosque – What's Petraeus thinking? – McChrystal's retirement – ‘Monkey Terrorist' update,” that the series, by Dana Priest, is scheduled to appear “in the next few days and that public affairs officers have been preparing how to handle the resulting media onslaught.

The Atlantic has posted a memorandum, “Internal Memo: Intelligence Community Frets About Washington Post Series,” sent by Art House, the media manager for the Director of National Intelligence. He outlines what he thinks the series will say about the “IC” (intelligence community) and offers talking points for press aides.

Here are some of the highlights of the memo:

Themes

While we can't predict specific content, we anticipate the following themes:

*The intelligence enterprise has undergone exponential growth and has become unmanageable with overlapping authorities and a heavily outsourced contractor workforce.

*The IC and the DoD have wasted significant time and resources, especially in the areas of counterterrorism and counterintelligence.

*The intelligence enterprise has taken its eyes off its post-9/11 mission and is spending its energy on competitive and redundant programs.

Management of Responses

We do not know which agencies will receive attention, and each agency will need to manage its own responses. …

It might be helpful as you prepare for publication to draw up a list of accomplishments and examples of success to offer in response to inquiries to balance the coverage and add points that deserve to be mentioned. In media discussions, we will seek to garner support for the Intelligence Community and its members by offering examples of agile, integrated activity that has enhanced performance. We will want to minimize damage caused by unauthorized disclosure of sensitive and classified information. …

House's conclusion: “This series has been a long time in preparation and looks designed to cast the IC and the DoD in an unfavorable light. We need to anticipate and prepare so that the good work of our respective organizations is effectively reflected in communications with employees, secondary coverage in the media and in response to questions.”

Keep your eyes peeled for this blockbuster.

Phi Beta Iota: Panetta had a chance to get it right and blew it.  Clapper will finish the job of destroying whatever integrity is left in the US Intelligence Community.  This is not news, but the Washington Post has finally caught up with the rest of us.

See Also:

2000 ON INTELLIGENCE: Spies and Secrecy in an Open World (AFCEA, OSS, EIN)

2002 THE NEW CRAFT OF INTELLIGENCE: Personal, Public, & Political (OSS, EIN)

2003 PEACEKEEPING INTELLIGENCE: Emerging Concepts for the Future (OSS, EIN)

2006 INFORMATION OPERATIONS: All Information, All Languages, All the Time (OSS, EIN)

2006 THE SMART NATION ACT: Public Intelligence in the Public Interest (OSS, EIN)

2008 COLLECTIVE INTELLIGENCE: Creating a Prosperous World at Peace (OSS, EIN)

2009 Intelligence for Peace (PKI Book Two) Finalizing (OSS,EIN)

2010 INTELLIGENCE FOR EARTH (OSS, EIN)

And Reviews of Books by Others:

Congress (Failure, Reform) (108)

Empire, Sorrows, Hubris, Blowback (160)

Executive (Partisan Failure, Reform) (156)

Intelligence (Government/Secret) (292)

NSA To Monitor Critical Computer Networks Looking For Imperfect Citizens

Civil Society, Commerce, Computer/online security, Corporations, Cyberscams, malware, spam, Government, Secrecy & Politics of Secrecy
article link

(IEEE Spectrum) By: Robert Charette // Thu, July 08, 2010

There is a story in the Wall Street Journal about a new, $100+ million, classified program being run out of the National Security Agency (NSA) that will monitor critical commercial and government infrastructure systems such as electricity grids, nuclear power plants, air traffic control systems and the like in order to detect cyber attacks.

Dubbed “Perfect Citizen,” the NSA hopes the program will hep it fill in what the WSJ calls the “big, glaring holes” in knowledge about exactly how massive, coordinated cyber attacks might negatively affect the US.

The Journal story goes on to quote from an internal email from US defense contractor Raytheon, the program's prime contractor, as saying:

“The overall purpose of the [program] is our Government…feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security.”

“Perfect Citizen is Big Brother.”

Full article here