Ransomware via a phishing attack was sent to Israel Electric Authority, not the power grid, as was heavily reported in mainstream media today. According to a cyber analyst in Israel (Eyal Sela) the media reporting so far is misleading with regards to the context around the incident, reports Robert M. Lee of SANS Institute.
On Nov. 30 and Dec. 1, several of the Internet Domain Name System's root name servers received high rate of suspicious queries, reaching as high as 5 million queries per second, according to a report released by the Root Server System Advisory Council. The incident has been categorized as a unique type of DNS amplification attack.
Real-Time Entertainment (streaming video and audio) traffic is now responsible for over 70% of North American downstream traffic in the peak evening hours on fixed access networks, according to a new report from Sandvine. Five years ago, video and audio streaming accounted for less than 35%.
United States and China are in negotiation to establish a cyberattack agreement, according to reports. If successful, it "could become the first arms control accord for cyberspace, embracing a commitment by each country that it will not be the first to use cyberweapons to cripple the other's critical infrastructure during peacetime," reports David Sanger in the New York Times.
Ubiquiti Networks Inc., a San Jose based maker of networking technology, has disclosed that cyber criminals stole $46.7 million via a "business email compromise fraud involving employee impersonation."
The Internet Society has released an announcement setting out its views on the development of policy to address the balance between security and privacy. From an Internet perspective and in the context of the growing threat vector from hacking, targeted cyber attacks on networks and individuals, and surveillance, the Internet Society's approach to the development of cyber security policy initiatives is based on the following key considerations.
Doug Madory, Director of Internet Analysis at Dyn, is reporting that the Russian Internet traffic (including domestic traffic) was re-routed out of the country due to routing errors by China Telecom.
The Internet Association -- a trade group that represents 36 companies including Google, Netflix, Amazon, Facebook, Twitter, eBay, Yahoo, and PayPal -- submitted comments (PDF) to the Federal Communications Commission on Monday to formally oppose a proposal to let Internet service providers charge content providers for priority access in their networks. The FCC is currently weighing a proposal to establish guidelines to protect the open Internet.
A new coalition of public and private entities was launched today with the mission to support the rights of local communities to make their own decisions regarding broadband Internet networks - "unhindered by state laws or other policies that attempt to stifle or preclude local innovation and investment."
Mozilla says that the FCC shouldn't look at an Internet line only as a relationship between an Internet provider and a subscriber. Regulators should formally recognize that there's a third party involved: Content providers such as websites, apps, gaming and more, Mozilla says.
Earl Zmijewski from Renesys reports: Yesterday, Indosat, one of Indonesia’s largest telecommunications providers, leaked large portions of the global routing table multiple times over a two-hour period. This means that, in effect, Indosat claimed that it “owned” many of the world’s networks. Once someone makes such an assertion, typically via an honest mistake in their routing policy, the only question remaining is how much of the world ends up believing them and hence, what will be the scale of the damage they inflict?
Sarah Reedy reporting in LightRading: Mobile operators suffer from an average of five network outages or degradations that impact subscribers each year, costing them around $15 billion annually, according to new Heavy Reading research. Put another way, that's about one outage every other month. More than 80 percent of those outages affect just one or a subset of networks or services.
Google Ideas in collaboration with Arbor Networks has released a data visualization that maps daily, global DDoS attacks. The tool shows anonymous data linked to these attacks, allowing users to explore historical trends and make the connection to related news events. "The data is updated daily, and historical data can be viewed for any country worldwide." By surfacing this data and providing insights on the global patterns of DDoS attacks, the companies hope that more informed decisions can be made that can reduce the threat of digital attacks.
In support of National Cyber Security Awareness Month, DDoS Awareness Day is a virtual, global event focused on raising awareness and education around the threat of DDoS attacks. Hosted by Neustar with and exclusive media partner CSO, DDoS Awareness Day brings together top experts in global security to share their views, technical tips and from-the-trenches experience. Attendees will also be given access to a wealth of DDoS materials: white papers, surveys, presentations, best practices and more.
Symantec has disabled part of one of the world's largest networks of infected computers, according to reports today. About 500,000 hijacked computers have been taken out of the 1.9 million strong ZeroAccess botnet. The zombie computers were used for advertising and online currency fraud and to infect other machines. Security experts warned that any benefits from the takedown might be short-lived.