As of the time of writing, the three bitcoin wallets associated with the WannaCry ransomware have received a combined total of about 53.8 BTC – just shy of USD 500,000 at current conversion rates . This is despite the “kill switch” and other implementation flaws that impeded its early propagation. It also flies in the face of the numerous articles circulating in the security community that cast doubt on whether it is even possible for WannaCry victims to consistently get their files back.Continue reading
The State of Israel has developed exceptional cyber capabilities that surpass all other nations within the MENA region. In January 2017, Prime Minister Benjamin Netanyahu declared that Israel had become one of the top five global cyber powers. Israel conducts covert cyber operations that are strictly classified and rarely formally acknowledged. So, beyond the infamous Stuxnet virus, what do publicly available sources reveal about state-sponsored hackers within Israel?Continue reading
If you examine the history of cyber breaches, you will find that the most newsworthy are usually attributed to Russia, China, Iran, and more recently North Korea. This may, or may not be true, but to echo the words of Eugene Kaspersky: the reality is that everyone hacks everyone. Friends attack foes, but friends also attack friends… secretly of course.Continue reading
On 7th December 1941, a surprise raid was launched by the Imperial Japanese naval air force against the United States Pacific fleet while at anchor in Pearl Harbor, Hawaii. This devastating attack formally precipitated the entry of the United States into World War Two, shaping the course of history. A cataclysmic event of comparable magnitude has been anticipated within the cyber domain for more than two decades, encapsulated by the analogy: “Cyber Pearl Harbor”.Continue reading
Regional conflict almost invariably brings with it consequences beyond its initial cause. The surrounding countries and regions suffer in a multitude of ways – from the massive and immediate human misery to ongoing political, economic and civil instability, and more long term diplomatic tensions and wounds that take time to heal.Continue reading
Our historical understanding of protest as a means of political upheaval tends to be rooted in the idea of direct conflict between two clearly defined agendas or ideologies – between grassroots activism and state apparatus, for instance. We imagine crowds marching and holding placards, voicing their dissent in unison.
However, as we become increasingly interconnected and conduct more of our lives online, technology is changing our conceptions of protest and direct action altogether.Continue reading
It may seem to some that China and America are experiencing a rapprochement of sorts in the cyber realm. Compared to previous years, today there are are markedly fewer headlines about breaches of American public and private institutions by the hands of Chinese hackers. Overall, there are fewer indictments being thrown at members of the People’s Liberation Army (PLA) and the level of political and economic sanctions being prepared against Chinese organisations and individuals has fallen since 2014/2015.Continue reading
On the 23rd October 2015, it became public knowledge that 156,959 TalkTalk customers had their personal data exposed due to the insecure retention of customer records.
The breach dealt a major reputational blow to the telecommunications provider, and for many, the company has joined a growing list of brands that are now synonymous with a major breach of personal data.Continue reading
You can’t study covert communications for long without coming across steganography. It’s been used in different forms throughout the largest wars in recorded history to convey information between allies without arousing suspicion among the enemy.Continue reading
Threat actors do not exist in a cyber vacuum. Hackers, organised criminal gangs, and nation states all operate within the same cyberspace and have access to the same systems and vulnerabilities. Whilst the tactics, techniques and procedures (TTPs) vary between different threat actor categories (in terms of method, capability and sophistication), the infection vectors they target remain the same.Continue reading