Moore Decl.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Moore Decl.Pdf I, Pamela Moore, declare as follows: 1. I am the Senior Vice President, Administrative Services and Chief Financial Officer of The Electronic Payments Association (“NACHA”). I make this declaration in support of Plaintiffs’ Application For An Emergency Temporary Restraining Order And Order To Show Cause Re Preliminary Injunction. I make this declaration of my own personal knowledge and, if called as a witness, I could and would testify competently to the truth of the matters set forth herein. 2. In my role at NACHA, I have worked with forensic investigators supporting NACHA and have conducted an assessment regarding the financial and business impact of the phishing e-mails falsely purporting to be from or associated with NACHA and tied to the Zeus Botnets. The Zeus Botnets have caused, and continue to cause, extreme damage to NACHA and its members, which, if allowed to continue, will be compounded as the case proceeds. NACHA AND THE ACH NETWORK 3. NACHA is a non-profit association which manages the development, administration, and governance of the ACH Network, the backbone for the electronic movement of money and data. NACHA represents more than 10,000 financial institutions via 17 regional payments associations and direct membership. In 2011, over 16.2 billion ACH payments were processed between financial institutions on behalf of their customers, via an ACH operator. As many as 145 million Americans use Direct Deposit via ACH to receive their pay or government benefits. As administrator of the ACH Network, NACHA’s primary function is to write the rules for the ACH Network and it does not technically operate the ACH Network infrastructure. INJURY TO NACHA CAUSED BY THE ZEUS BOTNETS 4. Since November of 2009, under cover of emails that falsely purport to be from or associated with NACHA, the defendants have orchestrated a pernicious, growing and costly phishing scam (“Account Takeover Scam”) that has touched or affected millions of people, and countless computers and networks around the globe. 2 5. I have reviewed the Declaration of Mark Debenham, which sets forth facts establishing that the emails in the Account Takeover Scam, which misuse NACHA’s name and trademarks, are designed to infect victims’ computers with malicious software referred to as the Infected Tier and to make those computers part of one or more botnets, known as the Zeus Botnets. Once infected and part of the Zeus Botnets, the defendants use the malicious software to steal the victims’ account credentials and to steal funds from the victims’ accounts. The Declaration of Mark Debenham also sets forth facts that the defendants in this case are responsible for the Account Takeover Scam and the Zeus Botnets. 6. Despite the best efforts of NACHA to mitigate the devastating effects of this phishing scam, the Account Takeover Scam has grown at a dramatic and alarming pace since February 2011, and continues to rapidly grow and evolve in ways that cannot be sufficiently addressed by NACHA or the Account Takeover Scam’s victims without aggressive intervention. A. An Overview – from Phishing Email to Botnet to Stolen Information 7. Although technical aspects of the Account Takeover Scam continue to rapidly and cunningly evolve, each new attack begins with an unsolicited email which falsely purports to be from NACHA, or in some way associated with NACHA or the ACH transactions for which NACHA sets standards. Recipients duped into clicking a falsified link embedded in a scam email are then connected to a series of malicious servers, the purpose of which is to download malicious software (often called “malware”) onto the victim’s computer. Once downloaded, that malware hijacks the victim’s computer and makes it part of the Zeus Botnets. The defendants may then steal banking and other information via, for example, keystroke logging software and thereby are able to “takeover” the accounts for fraudulent reasons. 8. Over time, the Account Takeover Scam has expertly evolved, including the methods of implementation (e.g., from offering false .pdf files to drive-by-download), delivery (from php file to .jar file), obfuscation and payload (e.g., from Zeus botnet, to Zeus variant to Blackhole rootkit). Based upon the work of forensic investigators supporting NACHA, and upon information and belief, technical aspects of the Account Takeover Scam are outlined in detail 3 below. B. The Immense Scale of the Attacks: Hundreds of Millions of Emails 9. Although the attacks began on a relatively small scale sometime in November of 2009, by February 2011 they had begun to increase substantially. In August of 2011, the number of attacks started to skyrocket on an unprecedented scale, and have continued on a worryingly steep upward trajectory ever since. Although monthly averages for Account Takeover Scam emails are in the hundred million range, those emails spiked as high as 167 million phishing emails in a single twenty-four hour period during August 2011. By contrast to this enormous volume of Account Takeover Scam emails, NACHA’s normal volume for authentic outbound e- mail messages is only 1,500 emails per day. 10. NACHA is able to estimate and track the scale of the email phishing component of the Account Takeover Scam because, naturally, it is the mail exchange (MX) authority for the “nacha.org” domain. As a result, all spam for that domain gets bounced back to NACHA’s servers, including emails that spoof nacha.org emails. In addition, NACHA uses various other sources and metrics to estimate the number of Account Takeover Scam phishing emails, including security policies and reports from security and spam vendors. 11. For example, in the week from September 12, 2011 through September 19, 2011, over 19 million emails purporting to be from the “nacha.org” domain name were sent from over 217,000 servers. In fact, there is only one authentic NACHA server for e-mails, illustrating the scale of the fraud. Attached as Exhibit A is a true and correct copy of a report by Agari Data, Inc., formerly known as Authentication Metrics, Inc. demonstrating these facts. Notably, because the report only tracks emails purporting to be from “nacha.org,” and not from any of the many other domain names used by the defendants to trick Account Takeover Scam victims, such as “nachas.org,” the report necessarily underestimates the actual number of Account Takeover Scam emails. 12. Attached as Exhibit B are true and correct copies of reports from Agari Data, Inc., formerly known as Authentication Metrics, Inc. These reports, from September through 4 November of 2011, show the number of malicious Account Takeover Scam e-mails sent from various IP addresses during that period. The reports typically show at least one IP address sending over three hundred thousand emails. In addition to the strain which such high numbers of phishing emails place on NACHA, the speed of the Internet, third party mail servers and the like, it is important to focus on the fact that a certain percentage of the intended targets actually open those emails and, hence, become malware victims whose financial and other personal information are put at risk. Assuming one percent of the twenty million or so phishing messages from the week starting September 12, 2011 were successfully delivered through spam filters (i.e., 200,000) and that a mere one percent of those who received the Account Takeover Scam e-mails after their spam filters failed them opened the emails and clicked on the link (i.e., 2,000), this estimate results in two thousand infections during a single week. 13. Starting in February 2011, NACHA began to combat these Account Takeover Scam attacks by asking service providers to take down URLs used in association with the Account Takeover Scam. As shown below in Figure 1, the number of those requests grew rapidly in 2011. For example, in November of 2011 alone, NACHA requested that 555 suspected sites be shut down. Given that the number of requests in July 2011 was 10, this amounts to an astronomical 5,550% increase in requests in a four month period. 5 14. As illustrated in Figure 2, by November 2011 NACHA was requesting takedowns of an average of more than 18 URLs every day. 15. The evolution of the Account Takeover Scam and actions taken by NACHA as tracked by NACHA’s customer service calls and inquiries to [email protected] is reflected in a true and correct report attached as Exhibit C. A true and correct copy of a detailed log with all take downs initiated by NACHA in 2011 is attached as Exhibit D. 16. NACHA maintains an e-mail address in which consumers and businesses can forward potential spam e-mails at [email protected]. These reports are used for analysis of attacks against NACHA and for forensics and for reporting malicious URLs in the hope of receiving voluntary assistance by domain registries and registrars. However, these voluntary efforts are not sufficient to disrupt the attacks, as informal assistance regarding malicious URLs are piecemeal and cannot be coordinated across the entirety of the malicious infrastructure. The scale of the Account Takeover Scam attacks is beyond the ability of NACHA to deal with them alone. The assistance of the Court is desperately needed to dismantle large portions of the infrastructure in a coordinated manner. 17. NACHA is extremely concerned that the notoriety of the Account Takeover Scam may soon inspire other criminals to engage in copycat or similar tactics to obtain consumer information, hence further complicating NACHA’s battle against the existing perpetrators. The 2011 Account Takeover Scam was publicly reported in a February 25, 2011 article which 6 discussed the fact that “ACH Transaction Rejected” emails were linked to the Zeus botnet.
Recommended publications
  • Fact Sheet: Designation of Election Infrastructure As Critical Infrastructure
    Fact Sheet: Designation of Election Infrastructure as Critical Infrastructure Consistent with Presidential Policy Directive (PPD) 21, the Secretary of Homeland Security has established Election Infrastructure as a critical infrastructure subsector within the Government Facilities Sector. Election infrastructure includes a diverse set of assets, systems, and networks critical to the administration of the election process. When we use the term “election infrastrucure,” we mean the key parts of the assets, systems, and networks most critical to the security and resilience of the election process, both physical locations and information and communication technology. Specficially, we mean at least the information, capabilities, physical assets, and technologies which enable the registration and validation of voters; the casting, transmission, tabulation, and reporting of votes; and the certification, auditing, and verification of elections. Components of election infrastructure include, but are not limited to: • Physical locations: o Storage facilities, which may be located on public or private property that may be used to store election and voting system infrastructure before Election Day. o Polling places (including early voting locations), which may be physically located on public or private property, and may face physical and cyber threats to their normal operations on Election Day. o Centralized vote tabulation locations, which are used by some states and localities to process absentee and Election Day voting materials. • Information
    [Show full text]
  • DNS-OARC Status and Fall Workshop Report
    DNS-OARC Status and Fall Workshop Report Keith Mitchell 31st CENTR Technical Workshop November 2014 OARC's Mission Statement The Domain Name System Operations Analysis and Research Center (DNS-OARC) is a non-profit, membership organization that seeks to improve the security, stability, and understanding of the Internet's DNS infrastructure. DNS-OARC's mission is: to build relationships among its community of members and facilitate an environment where information can be shared confidentially to enable knowledge transfer by organizing workshops to promote research with operational relevance through data collection and analysis to increase awareness of the DNS's significance to offer useful, publicly available tools and services OARC's Functions Facilitate co-ordination of DNS operations community – 77 members: registries, operators, vendors Ongoing data gathering Operate community info-sharing resources Mailing lists, jabber, website, trust vetting Maintain/host DNS software tools Outreach via external and shared meetings OARC Members Comcast Afilias (.org, .info) .SE KISA/KRNIC ARI Registry Services ISC Dyn Mark Monitor Bluecat Minds+Machines Microsoft Google CentralNic NIC Chile (.cl) Verisign (.com) ICANN CIRA (.ca) NIC-Mexico (.mx) AFRINIC Cloudmark Nominet (.uk) Nominum AFRINIC CNNIC (.cn) Rightside Norid (.no) CAIDA CORE Cogent NZRS RIPE NCC CZ.NIC dotua Orange DK Hostmaster Eesti Internet DNS.PT RESTENA LACNIC AFNIC Measurement Factory DNSpod RTFM NASA Ames Akamai Sky Donuts Netnod APNIC dotBERLIN SWITCH (.ch) NLnet Labs
    [Show full text]
  • 2020 Activity Report
    Activity Report 2020 Facts | Data | Figures 2 3 2020 In Retrospect 4 Market & Business Development 16 .de Report 30 2021 Prospects 46 Business Continuity Management .de: Distinctive Growth, Surge in Demand DENIC in the Digital Policy Debate‘s Discourse under Covid-19 Conditions on the German Market DNS Services Level of Digitisation and Internet Use in Germany DENIC – the Networkers 34 Sources Registration Services Competitors in the Social Media Segment DENIC in Coordination and DENIC Data (DENIC eG, DENIC Services GmbH & Co. KG) Standardisation Organisations Delivery Line Infrastructure Competitors in the gTLD Segment CENTRstats Cooperation with State Institutions DESTATIS (Statistisches Bundesamt) Contents Emerging Products/Markets The Niche Sector of ENUM Dotzon: Studie Digitale Unternehmensmarken 2020 Cooperation with Academic Institutions Eurostat Information Security & Risk Management Solidary Contribution to Enhanced Internet Security ICANN New gTLD Stats Contents for Many: DNS Infrastructure Services DENIC in Associations Organisational Development Initiative D21: D21 Digital-Index 2020/2021 Multiplied Customer Numbers, Significant Increase DENIC Events NapoleonCat Stats Sustainability Management & in Market Shares: Data Escrow Services nTLDStats Corporate Social Responsibility Sponsoring Partnerships Verisign Domain Name Industry Brief 5 The drastic impacts of the Covid-19 pandemic that operation of the name service for .de as a critical infra- affected all areas of life of the entire global com- structure and DENIC as its operator were more important munity at an unprecedented scale made 2020 an than ever in 2020. That people spent more time in the exceptional year in every respect. Not only health digital space in the Covid-19 situation, is also reflected in care systems but also the private economy, govern- the rise of annual average DNS queries to the .de name ments, the cultural sector and consumers all over servers.
    [Show full text]
  • Understanding and Analyzing Malicious Domain Take-Downs
    Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs Eihal Alowaisheq1,2, Peng Wang1, Sumayah Alrwais2, Xiaojing Liao1, XiaoFeng Wang1, Tasneem Alowaisheq1,2, Xianghang Mi1, Siyuan Tang1, and Baojun Liu3 1Indiana University, Bloomington. fealowais, pw7, xliao, xw7, talowais, xm, [email protected] 2King Saud University, Riyadh, Saudi Arabia. [email protected] 3Tsinghua University, [email protected] Abstract—Take-down operations aim to disrupt cybercrime “clean”, i.e., no longer involved in any malicious activities. involving malicious domains. In the past decade, many successful Challenges in understanding domain take-downs. Although take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. domain seizures are addressed in ICANN guidelines [55] Although it plays an important role in fighting cybercrime, the and in other public articles [14, 31, 38], there is a lack of domain take-down procedure is still surprisingly opaque. There prominent and comprehensive understanding of the process. seems to be no in-depth understanding about how the take-down In-depth exploration is of critical importance for combating operation works and whether there is due diligence to ensure its cybercrime but is by no means trivial. The domain take-down security and reliability. process is rather opaque and quite complicated. In particular, In this paper, we report the first systematic study on domain it involves several steps (complaint submission, take-down takedown. Our study was made possible via a large collection execution, and release, see SectionII). It also involves multiple of data, including various sinkhole feeds and blacklists, passive parties (authorities, registries, and registrars), and multiple DNS data spanning six years, and historical WHOIS informa- domain management elements (DNS, WHOIS, and registry tion.
    [Show full text]
  • The Regional Organisations an Introduction to CENTR
    The regional organisations An introduction to CENTR Giovanni Seppia CENTR General Manager [email protected] Geneva, 26 September 2005 The ccTLDs regional organisations What is the objective of a regional organisation? z To support and advance the interests of its members z To act as an advocate to private or public bodies on issues of concern to members z To foster co-operation on issues of mutual concern to members; and z To formulate policies, strategies, best practices, common positions that have the support of the membership ccTLDs workshop Geneva, 26 September 2005 ccTLDs regional organisations z NATLD for the North American region z LACTLD for the Latin America and Caribbean region z CENTR for the European region z AFTLD for the African region z APTLD for the Asia-Pacific region ccTLDs workshop Geneva, 26 September 2005 Introducing CENTR What is CENTR? z Council of European National Top Level Domain Registries z Forum for TLD managers – Primarily ccTLDs z Also includes gTLDs – Mainly European z Membership from 5 continents z Developed and emerging TLD markets, like .AF, .IR z Open to all Top Level Domain Registries in the world ccTLDs workshop Geneva, 26 September 2005 CENTR’s Membership z 3 Members categories – Full Members – Associate Members – Observers z Members vote on admission of new members ccTLDs workshop Geneva, 26 September 2005 CENTR’s Membership z AFGNIC Afghanistan (.af) •LITNET NOC Lithuania (.lt) z STA Andorra (.ad) •RESTENA DNS-LU Luxembourg (.lu) z ISOC.AM Armenia (.am) •NIC Malta Malta (.mt) z NIC.AC Ascension Is. (.ac), Diego Garcia (.io), St •NIC-Mexico Mexico (.mx) Helena (.sh) •MoldData Moldova (.md) z NIC.AT Austria (.at) •SIDN Netherlands (.nl) z DNS Belgium Belgium (.be) •ISOCNZ New Zealand (.nz) z Digital Systems Bulgaria (.bg) •NORID Norway (.no), Bouvet Is.
    [Show full text]
  • Enom Plug-In Configuration Guide Parallels Plesk Automation Billing Revision 1.1
    eNom Plug-in Configuration Guide Parallels Plesk Automation Billing Revision 1.1 Copyright © 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH. Vordergasse 59 CH8200 Schaffhausen Switzerland Tel: + 41 526320 411 Fax: + 41 52672 2010 www.parallels.com Copyright © 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.parallels.com/trademarks Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Mac is a registered trademark of Apple, Inc. All other marks and names mentioned herein may be trademarks of their respective owners. Contents Preface ....................................................................................................................... 4 Documentation Conventions ............................................................................................. 4 Typographical Conventions ............................................................................................... 4 Feedback .......................................................................................................................... 5 About Domain Registrars .......................................................................................... 6 Domain Registrar Configuration
    [Show full text]
  • Free Ssl Certificate for Tk Domain
    Free Ssl Certificate For Tk Domain Avi renegotiating libidinously. Compassable Simmonds jounces or scribes some mystagogues garishly, however itchier Anders miscues supposedly or outdrove. Kit espy ethereally. Having ssl certificate warning should review and free to see indication in apache includes virtual hosts, free ssl certificate for tk domain provider is installed and online should take you tk domain name? Read messages and qas can really wants to? This free domain users its exemplary customer and a lua powered by themselves. This done better is on my trust store, and assisted us in. Make security and not have you tk domain? Enabling private key element is keeping track of http profile to making it is your project speed of free ssl certificate for tk domain. Why do this free forum is fully automatically answer to free ssl certificate for tk domain? If you can begin with as below on, a trust in order to automatically trusted by your subdomains for email, hostinger offers for ssl is? For all free ssl certificate for tk domain? Xmb forum will help, this error of all the website to work properly can save tk domain ssl for free certificate in a private. If you tk domain name of free ssl certificate for tk domain names for cream of such as easy to ssl certificate? Which are following command this tutorial it has an encryption everywhere changes that the internet communication or request? Host supplier for free ssl certificate verisign began publicly shaming sites to free ssl certificate for tk domain. Since google apps to you tk domain name to the nginx configuration whenever a personal preference on growing crime in the domain can buy a little lock.
    [Show full text]
  • General Terms and Conditions of Domain Name Registration
    General Terms and Conditions of Domain Name Registration Last Updated August 1, 2014 – Version 1.0 These General Terms and Conditions of Domain Name Registration (“Domain Name Contract” or “Agreement”) constitutes a binding agreement between Gandi US, Inc., a Delaware corporation (“Gandi”, “We”, ”Our”, or “Us”), and any person or entity registering as a user and electing to register, transfer, renew or restore a domain name through the online portal available at www.gandi.net (your “Gandi Account”) or any person or entity with access to your Gandi Account (such as the administrative, technical and billing contact on the domain name) ("Customer", "You", or "Your"). By using our services, you agree at all times during your use to abide by this Domain Name Contract and any additions or amendments. Please read this Agreement carefully. This is just one of a number of agreements that govern our relationship. This Agreement is a supplement to Gandi's General Service Conditions, Gandi’s pricing information, Gandi’s Privacy Policy and the respective contractual conditions applicable to any other services offered by Gandi that you purchase, activate, subscribe to, restore or renew via your Gandi Account (collectively, the “Gandi Contracts”). This Agreement has an annex concerning the contractual conditions pertaining to the "Private Domain Name Registration" service, an optional service that allows You to opt to limit the publication of Your contact information in the public databases (Annex 1). The Gandi Contracts may be viewed at any time at https://www.gandi.net/contracts in an electronic format that allows them to be printed or downloaded for your records.
    [Show full text]
  • ("Agreement"), Is Between Tucows Domains Inc
    MASTER DOMAIN REGISTRATION AGREEMENT THIS REGISTRATION AGREEMENT ("Agreement"), is between Tucows Domains Inc. ("Tucows") and you, on behalf of yourself or the entity you represent ("Registrant"), as offered through the Reseller participating in Tucows' distribution channel for domain name registrations. Any reference to "Registry" or "Registry Operator" shall refer to the registry administrator of the applicable top-level domain ("TLD"). This Agreement explains Tucows' obligations to Registrant, and Registrant's obligations to Tucows, for the domain registration services. By agreeing to the terms and conditions set forth in this Agreement, Registrant agrees to be bound by the rules and regulations set forth in this Agreement, and by a registry for that particular TLD. DOMAIN NAME REGISTRATION. Domain name registrations are for a limited term, which ends on the expiration date communicated to the Registrant. A domain name submitted through Tucows will be deemed active when the relevant registry accepts the Registrant's application and activates Registrant's domain name registration or renewal. Tucows cannot guarantee that Registrant will obtain a desired domain name, even if an inquiry indicates that a domain name is available at the time of application. Tucows is not responsible for any inaccuracies or errors in the domain name registration or renewal process. FEES. Registrant agrees to pay Reseller the applicable service fees prior to the registration or renewal of a domain. All fees payable here under are non-refundable even if Registrant's domain name registration is suspended, cancelled or transferred prior to the end of your current registration term. TERM. This Agreement will remain in effect during the term of the domain name registration as selected, recorded and paid for at the time of registration or renewal.
    [Show full text]
  • Télécharger Un Extrait
    LE RÔLE CENTRAL DES NOMS DE DOMAINE DAVID CHELLY Naming Start-up Référencement Nommage 1 Avant-propos Il est d’usage de démarrer un ouvrage en adressant ses remerciements à ses proches, puis d’inviter une ou plusieurs personnes de référence du secteur à écrire la préface, c’est-à-dire à passer la pommade à l’auteur pour son formidable travail. Cet ouvrage vous épargne ces conventions à l’utilité relative et vous invite dès à présent à un voyage dans l’étonnant monde des noms de domaine. Dans l’écosystème de l’internet, les noms de domaine occupent une place transversale. Ils sont utilisés par une multitude d’acteurs, depuis les webmasters indépendants jusqu’aux informaticiens, juristes et marketeurs dans les entreprises, en passant par les bureaux d’enregistrement, les agences web et les investisseurs en noms de domaine. C’est à l’ensemble de ces professionnels que s’adresse ce livre, avec l’ambition d’offrir une vision globale et transdisciplinaire des possibilités offertes par les noms de domaine. Cette problématique est particulièrement d’actualité, puisque l’on est passé en quelques années de moins de deux cent cinquante extensions de noms de domaine disponibles à plus de mille cinq cents aujourd’hui, ce qui pose une multitude de questions en termes de protection juridique, de référencement et de branding. Les étudiants spécialisés dans l’internet, les chercheurs d’emploi et les personnes en reconversion professionnelle pourront également trouver un intérêt à la lecture de cet ouvrage, dans le sens où les opportunités d’emploi sont considérables dans ce secteur en fort essor, mais peu abordé dans les programmes des formations académiques.
    [Show full text]
  • AP II 2012.Pdf
    We’re there for you NEW NEWTEC M6100 BROADCAST SATELLITE MODULATOR TECHNOLOGIES THAT HELP YOU GO FURTHER Newtec technologies allow billions of people to connect to the world, their families and each other. You can find our innovations and technologies anywhere. Whether we work for government agencies or private companies, we always see innovation as a way to reduce your costs and optimize your efficiency. Our global experience in multiple markets helps us in achieving our ultimate goal: taking care of your satellite communications while you can focus on your core activities. We’re there for you. Always and everywhere. Visit us at www.newtec.eu BELGIUM – USA – SINGAPORE – DUBAI – CHINA – BRAZIL BROADCAST GOVERNMENT AND DEFENCE IP TRUNKING BUSINESS AND CONSUMER VSAT All articles are available for download at www.connect-world.com CONTENTS Cloud opportunities Improving business fluidity with the Cloud 5 by Andrew Dobbins, Verizon’s vice president of Asia-Pacific 5 7 10 12 From video-communication to machine-to-machine - Cloud turns to business 7 by Karim Taga, managing partner and global practice leader, TIME, Arthur D. Little Enterprise adoption of Cloud computing: The next five years for IT 10 15 17 19 22 by Bernard Golden, CEO, HyperStratus Shore to shore: IT, the fifth utility 12 by Jim Fagan, VP and managing director, Rackspace Asia-Pacific Cloud security 24 26 29 31 Spear phishing in the Cloud 15 by GOH Hock Beng, vice president, Channel Sales Asia, TrustSphere Who Owns Security In The Cloud? 17 by Jim Reavis, founder and executive director, Cloud security Alliance; and Dave 33 36 39 42 Asprey, vice president of Cloud security, Trend Micro Data breach and risk in the Cloud - the legal response 19 by Thomas J.
    [Show full text]
  • May 2017 M&A and Investment Summary
    May 2017 M&A and Investment Summary Table of Contents 1 Overview of Monthly M&A and Investment Activity 3 2 Monthly M&A and Investment Activity by Industry Segment 8 3 Additional Monthly M&A and Investment Activity Data 42 4 About Petsky Prunier 55 Securities offered through Petsky Prunier Securities, LLC, member of FINRA. This M&A and Investment Summary has been prepared by and is being distributed in the United States by Petsky Prunier, a broker dealer registered with the U.S. SEC and a member of FINRA. 2 | M&A and Investment Summary May 2017 M&A and Investment Summary for All Segments Transaction Distribution . A total of 520 deals were announced in May 2017, of which 323 were worth $44.6 billion in aggregate reported value . Software was the most active segment with 189 deals announced — 123 of these transactions reported $10.0 billion in value . Digital Media/Commerce was also active with 117 transactions announced, of which 94 were worth a reported $14.1 billion in value . Strategic buyers announced 203 deals (49 reported $14.9 billion in value) . VC/Growth Capital investors announced 291 transactions (262 reported $15.7 billion in value) . Private Equity investors announced 26 deals during the month (12 reported $13.9 billion in value) May 2017 BUYER/INVESTOR BREAKDOWN Transactions Reported Value Strategic Buyout Venture/Growth Capital # % $MM % # $MM # $MM # $MM Software 189 36% $9,977.8 22% 59 $2,328.8 10 $4,845.0 120 $2,804.0 Digital Media/Commerce 117 23% 14,126.0 32% 36 2,027.4 2 1,500.0 79 10,598.6 Marketing Technology 85
    [Show full text]