Posts tagged “Malware”

Trouble in cybercity: what Canada can do

“We have seen the future of the Internet, and it isn’t very pretty.

When WikiLeaks founder Julian Assange announced the release of sensitive U.S. government documents, he also sparked a vigilante war reminiscent of the Wild West. Just before the release, the WikiLeaks site was shut down briefly by denial-of-service attacks. In return, ‘hacktivist’ groups attacked U.S. government sites, as well as those of Amazon, PayPal and MasterCard that had distanced themselves from WikiLeaks.”

From The Globe and Mail

2010 and Beyond

From cyber attacks on Google, to the Distributed Denial of Service attacks on Wikileaks, Nart Villeneuve has put together an extensive review of the prominent cyber crime incidents of 2010. This year, Villeneuve was one of the lead researchers on the malicious Shadow Network and the Facebook botnet “Koobface”, both research projects of the Citizen Lab’s Information Warfare Monitor. Describing trends of politically and economically motivated cyber attacks, Villeneuve provides his expert analysis.

Read Villeneuve’s 2010 Cyber Crime Review here

‘SMS of Death’ Attacks Can Crash the Simplest of Phones

“Malicious text messages can crash many types of mobile phones, including devices by Samsung, Sony Ericsson, Motorola and LG, according to a presentation given at the Chaos Communication Congress hacking conference this week in Berlin.

Nicknamed ‘SMS of Death,’ the attacks were outlined by Collin Mulliner, a security researcher at the Technical University in Berlin and his colleague, Nico Golde.”

From Threat Post

New Data Stealing Trojan For Android Has Botnet Capabilities

“Security researchers say they have discovered a new Trojan horse program that targets mobile phones running Google’s Android operating system that may be the first to attempt to create a so-called ‘botnet’ of infected mobile devices.

The new malware, dubbed ‘Geinimi’ raises the bar on mobile malware, according to a post on the blog of mobile phone security firm Lookout Security. The malware, which has not been detected outside of China, is being packaged with repackaged versions of popular Android applications and pushed through unregulated, third party application exchanges, Lookout said.”

From Threat Post

Is the idea of a safe, global Internet in jeopardy?

What kind of threats does the global Internet face today? CTV News engages Professor Ron Deibert, Director of The Canada Centre for Global Security Studies and The Citizen Lab on the highly profitable and political world of cyber crime and and cyberwar.

From CTV News

The Next Battlefield

The Citizen Lab and the Information Warfare Monitor are featured in the December 2010 issue of Sharp Magazine. The dynamic emergence of information warfare and cyber espionage are up for examination in this investigative piece which refers to Information Warfare Monitor reports such as “Breaching Trust” and “Shadows in the Cloud” and includes interviews with Citizen Lab researchers.

From Sharp Magazine

Stuxnet computer virus ‘in hands of criminal gangs’

“The Stuxnet worm first came to the attention of security experts in June, who believe it may have been designed to target critical infrastructures and computer systems, such as sanitation plants and food distribution networks.

The virus is thought to have been used to disrupt Iran’s nuclear power stations. However, Government sources denied reports on Sky News that there was evidence the virus had already been obtained by criminals.”

From The Telegraph

Worm Was Perfect for Sabotaging Centrifuges

“Experts dissecting the computer worm suspected of being aimed at Iran’s nuclear program have determined that it was precisely calibrated in a way that could send nuclear centrifuges wildly out of control.

Their conclusion, while not definitive, begins to clear some of the fog around the Stuxnet worm, a malicious program detected earlier this year on computers, primarily in Iran but also India, Indonesia and other countries.

From The New York Times

Attacker That Sharpened Facebook’s Defenses

The cyber security spotlight is currently on the Koobface worm. Koobface is a malicious software that infects the computers of Facebook users by exploiting the website’s vulnerable social network interactions. The joint Citizen Lab and Sec Dev research group, Information Warfare Monitor, has just published a report on the malware network entitled “Koobface: Inside a Crimeware Network”. Citing the Information Warfare Monitor researchers Rafal Rohozinski, Ron Deibert and Nart Villeneuve, The New York Times discusses the lack of law enforcement protocol required to press charges on malware creators. The article also features what steps Facebook is taking to mitigate the malicious effects of Koobface.

From The New York Times

Tracking Koobface: The untouchable hackers of St. Petersburg

Ron Deibert and Rafal Rohozinski, principal investigators of the Information Warfare Monitor, have co-authored an op-ed in the Globe and Mail. The researchers explore Koobface: a crimeware network that thrives on popular social-networking Web sites such as Facebook. Deibert and Rohozinski discuss the global policy complications of cybercrime.