Information Security News
by Chanel Bags Prices
by Karen Millen Usa
by Cyrus Farivar
Citing unnamed sources, Finnish television channel MTV3 reports (Google Translate) that the Finnish Ministry of Foreign Affairs was penetrated by malware over a period of four years. The malware specifically targeted communications between Finland and the European Union. MTV3 adds that the breach was discovered earlier this year and that the Finnish government suspects Russian or Chinese intelligence agencies to be behind the breach.
Ari Uusikartan, the director general of the information and documentation division at Finland’s Ministry for Foreign Affairs, told national broadcaster YLE (Google Translate) that the breach appears to involve the Red October malware. Uusikartan also said the activity is part of a “large spy network.”
Earlier this year, Ars reported how Red October is the “Swiss Army knife of malware.”
Infosec bod reports ONGOING ATTACK at RSA securo-confab
RSA Europe 2013 Problems logging into VPN networks left delegates even more twitchy than normal at the RSA Conference Europe this week. The conference, staged in London, for the previous six years, has moved to Amsterdam and the massive RAI ...
Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn't know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.
In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet's next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux.
"We were like, 'Okay, we're totally owned,'" Ruiu told Ars. "'We have to erase all our systems and start from scratch,' which we did. It was a very painful exercise. I've been suspicious of stuff around here ever since."
Give young infosec boffins more cash or BAD THINGS will happen – RSA boff
RSA Europe 2013 Declining support for young science and technology researchers from the US government could hurt technology innovation in the long term, a top computer scientist has warned. Robert Griffin, chief security architect at information ...