Understanding the Mirai Botnet
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How to Reform Counterintelligence Outreach to Industry
Protecting Partners or Preserving Fiefdoms? How to Reform Counterintelligence Outreach to Industry BY DARREN E. TROMBLAY | OCTOBER 2017 U.S. industry is increasingly independent of federal government direction It’s time for a new in its creation of new knowledge and capabilities. Nonetheless, the approach to counterintelligence outputs of industry support the United States’ ability to maintain outreach to the elements of its national power. Consequently, industry is in the crosshairs commercial sector— of not only foreign competitors, but also of foreign intelligence services one that focuses more that seek to surreptitiously obtain valuable knowledge and other on recognizing and responding to intellectual property. This is an unfair fight. It is further complicated by indicators of the the fact that both adversaries and allies alike have directed their threat, less on turning intelligence resources against U.S. industry. to investigators once the damage has Although the U.S. government has attempted to partner with the private sector on already been done. counterintelligence (CI) awareness and response, these efforts have been plagued by a limited concept of which industry sectors are at risk, inconsistency in programs, and redundancies across agencies. Moreover, the U.S. intelligence community is already being asked to do more with less. It is time for a new approach to the important function of counterintelligence outreach to the commercial sector. Such an approach must focus more on recognizing and responding to indicators of the threat, less on turning to investigators once the damage has already been done. Counterintelligence—in the theoretical sense—means preventing an adversary’s intelligence services from acquiring an information advantage. -
Stuxnet Under the Microscope
Stuxnet Under the Microscope Revision 1.31 Aleksandr Matrosov, Senior Virus Researcher Eugene Rodionov, Rootkit Analyst David Harley, Senior Research Fellow Juraj Malcho, Head of Virus Laboratory 2 Contents 1 INTRODUCTION ................................................................................................................................. 5 1.1 TARGETED ATTACKS ............................................................................................................................. 5 1.2 STUXNET VERSUS AURORA ..................................................................................................................... 7 1.3 STUXNET REVEALED............................................................................................................................ 11 1.4 STATISTICS ON THE SPREAD OF THE STUXNET WORM ................................................................................ 15 2 MICROSOFT, MALWARE AND THE MEDIA ....................................................................................... 17 2.1 SCADA, SIEMENS AND STUXNET .......................................................................................................... 17 2.2 STUXNET TIMELINE............................................................................................................................. 19 3 DISTRIBUTION ................................................................................................................................. 24 3.1 THE LNK EXPLOIT ............................................................................................................................. -
Applying a Framework to Assess Deterrence of Gray Zone Aggression for More Information on This Publication, Visit
C O R P O R A T I O N MICHAEL J. MAZARR, JOE CHERAVITCH, JEFFREY W. HORNUNG, STEPHANIE PEZARD What Deters and Why Applying a Framework to Assess Deterrence of Gray Zone Aggression For more information on this publication, visit www.rand.org/t/RR3142 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0397-1 Published by the RAND Corporation, Santa Monica, Calif. © 2021 RAND Corporation R® is a registered trademark. Cover: REUTERS/Kyodo Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report documents research and analysis conducted as part of a project entitled What Deters and Why: North Korea and Russia, sponsored by the Office of the Deputy Chief of Staff, G-3/5/7, U.S. -
Announcement
Announcement 100 articles, 2016-02-25 12:01 1 Microsoft introduces Windows 10 for PCs build 14271 and Mobile build 14267.1004 to Fast ring (4) Microsoft released two new Insider builds to the Fast ring today. Windows 10 Mobile build 14267.1004 fixes an issue with Lumia 550 and Windows 10 for PCs build 14271 has other fixes. 2016-02-24 18:16:01+00:00 1KB www.neowin.net 2 Apple plans Siri for Mac as tentpole feature for this fall's OS X 10.12 launch (2) Apple has reportedly been testing Siri for Mac since at least 2012, but even though the digital assistant has already made its way from the iPhone to the Apple Watch and Apple TV, it’s been notably absent from OS X.… 2016-02-25 08:32:48 1KB www.techspot.com 3 MasterCard wants to replace passwords and PINs with selfies In the ongoing search for the successor to unsecure passwords and PINs, financial (2) services giant MasterCard is taking a modern approach to authenticating transactions called MasterCard Identity Check. 2016-02-25 11:17:44 2KB www.techspot.com 4 Docker: Build Use-case-appropriate Containers - Developer.com Docker hits a sweet spot with the default container construction. It provides reasonable (2) defaults without hindering productivity of users. 2016-02-25 00:00:00 5KB www.developer.com 5 Alcatel OneTouch Fierce XL now supported by Windows 10 Insider Preview (2) After releasing Windows 10 for PCs build 14271 and Windows 10 Mobile build 14267.1004 today, Microsoft also announced that the Alcatel OneTouch Fierce XL can now enroll in the Insider Program. -
For More Information Support RAND
CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Browse Reports & Bookstore TERRORISM AND Make a charitable contribution HOMELAND SECURITY For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity. C O R P O R A T I O N Markets for Cybercrime Tools and Stolen Data Hackers’ Bazaar Lillian Ablon, Martin C. -
Society's Genome.Indb
Society’s Genome Genetic Diversity’s Role in Digital Preservation By Nathan Thompson with Bob Cone and John Kranz Copyright © 2016 by Spectra Logic Corporation All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including storage and retrieval systems—except in the case of brief quotations embodied in critical articles or reviews—without permission in writing from Spectra Logic Corporation. All product names, logos, and brands mentioned in this book are the property of their respective owners. Neither the authors nor publisher claim any right of ownership to such names, logos, and brands. Cover design by Kristen Coats Back cover image: Detail of “Ptolemy World Map,” from Ptolemy’s the Geography, redrawn by Francesco di Antonio del Chierco (15th century). Housed in the British Library, London. Image retrieved from https:// commons.wikimedia.org/wiki/File:PtolemyWorldMap.jpg. Published by Spectra Logic Corporation 6285 Lookout Road Boulder, Colorado 80301-3580 Tel.: 1.800.833.1132 Fax: 1.303.939.8844 www.spectralogic.com ISBN: 978-0-9975644-0-2 Second Printing Printed and bound in the United States of America 10 9 8 7 6 5 4 3 2 1 This book is printed on acid-free paper. “We are survival machines—robot vehicles blindly programmed to preserve the selfish molecules known as genes. This is a truth that still fills me with astonishment.” —Richard Dawkins, The Selfish Gene Chapter 6 Wolves at the Door Just a few years after the 9/11 attacks, the digital world began showing signs of sudden, profound change. -
Session Presentation
#CLUS Internet of Things The Mirai Story Dr. Yatish Joshi – Software Engineer @yatishkjoshi DEVNET-1524 #CLUS Agenda • Introduction • Mirai Design & Development • Victims & Aftermath • Demo • Conclusion #CLUS DEVNET-1524 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Cisco Webex Teams Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Live Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#DEVNET-1524 by the speaker until June 16, 2019. #CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 It all started with Minecraft • Second best selling game of all time. • Bought by Microsoft for $2.5 billion • Has sold over 154 million copies by 2018. • 91 million active players/month. • Hosting servers can make $100-$200k/month. #CLUS DEVNET-1524 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 The American Dream The team: Paras Jha, Josiah White Dalton Norman Business 1: • Starts own Minecraft Server. • Gets DDoS attacks on his server. Business 2: • Protraf, a DDoS Mitigation company. • Recruits his friends to launch a new product called Mirai.. #CLUS DEVNET-1524 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Business Plan • DDoS Attack on competing Minecraft servers • Extortion • DDoS as a Service • Click Fraud #CLUS DEVNET-1524 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Mirai Design • Named after Mirai Nikki, a 2011 anime series. -
News Tech Tools Tech Tools
NEWS Tech Tools Tech Tools NVidia Announces Project Shield Gaming Device Large-Scale Elastic NVidia announces Project Shield, a game and imagined a new way to Architecture new portable gaming device for open play,” said Jen-Hsun Huang, co- Data-as-a-Service platforms. The Project Shield device, founder and chief executive officer at Red Hat Inc. recently announced its which features a 5-inch screen and a NVidia. Project Shield features NVidia’s participation in a European Union ini- full-size ergonomic controller, lets new Tegra 4 processor, which delivers tiative to create a Large-scale Elastic users play both Android and PC titles. powerful gaming capacity from its cus- Architecture for Data-as-a-Service As an Android device, Project Shield tom 72-core GeForce GPU and quad- (LEADS) for mining and analyzing data provides access to any game on core Cortex-A15 CPU. According to the published on the entire public web. Google Play, and, as a wireless receiver announcement, the Project Shield de- The LEADS consortium is composed and controller, it can stream games vice combines the NVidia Tegra 4, of universities and research centers, and access titles on its Steam game li- high-bandwidth, ultra- as well as IT corporations with an in- brary from a PC powered by NVidia fast wireless tech- terest in data mining and analysis GeForce GTX GPUs. Project Shield nology, and HD techniques. The objective of LEADS is comes with the latest Android video and audio “to build a decentralized Data-as-a- Jelly Bean operating sys- with a full-size, con- Service (DaaS) framework that runs tem from Google. -
The Cybersecurity Campaign Playbook: European Edition
The Cybersecurity Campaign Playbook European Edition DEFENDING DIGITAL DEMOCRACY MAY 2018 Adapted in partnership with International Republican Institute Defending Digital Democracy Project Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138 www.belfercenter.org/D3P European Version partners: The National Democratic Institute www.ndi.org The International Republican Institute www.iri.org Statements and views expressed in this document are solely those of the authors and do not imply endorsement by Harvard University, the Harvard Kennedy School, or the Belfer Center for Science and International Affairs. Design & Layout by Andrew Facini Cover photo: A Slovenian casts his ballot in a box bearing a European Union crest at a polling station in Grosuplje near Ljubljana, Sunday, Oct. 3, 2004. Nationwide general elections are taking place in Slovenia on Sunday. Slovenia joined the EU and NATO earlier this yea. (AP Photo/Darko Bandic) Copyright 2018, President and Fellows of Harvard College DEFENDING DIGITAL DEMOCRACY MAY 2018 The Cybersecurity Campaign Playbook European Edition Contents Welcome ........................................................................................................3 Authors and Contributors ................................................................................................................... 5 The Playbook Approach ...................................................................................................................... 6 Introduction -
S:\FULLCO~1\HEARIN~1\Committee Print 2018\Henry\Jan. 9 Report
Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. 1 115TH CONGRESS " ! S. PRT. 2d Session COMMITTEE PRINT 115–21 PUTIN’S ASYMMETRIC ASSAULT ON DEMOCRACY IN RUSSIA AND EUROPE: IMPLICATIONS FOR U.S. NATIONAL SECURITY A MINORITY STAFF REPORT PREPARED FOR THE USE OF THE COMMITTEE ON FOREIGN RELATIONS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION JANUARY 10, 2018 Printed for the use of the Committee on Foreign Relations Available via World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PUBLISHING OFFICE 28–110 PDF WASHINGTON : 2018 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5012 Sfmt 5012 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN. 9 REPORT FOREI-42327 with DISTILLER seneagle Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. COMMITTEE ON FOREIGN RELATIONS BOB CORKER, Tennessee, Chairman JAMES E. RISCH, Idaho BENJAMIN L. CARDIN, Maryland MARCO RUBIO, Florida ROBERT MENENDEZ, New Jersey RON JOHNSON, Wisconsin JEANNE SHAHEEN, New Hampshire JEFF FLAKE, Arizona CHRISTOPHER A. COONS, Delaware CORY GARDNER, Colorado TOM UDALL, New Mexico TODD YOUNG, Indiana CHRISTOPHER MURPHY, Connecticut JOHN BARRASSO, Wyoming TIM KAINE, Virginia JOHNNY ISAKSON, Georgia EDWARD J. MARKEY, Massachusetts ROB PORTMAN, Ohio JEFF MERKLEY, Oregon RAND PAUL, Kentucky CORY A. BOOKER, New Jersey TODD WOMACK, Staff Director JESSICA LEWIS, Democratic Staff Director JOHN DUTTON, Chief Clerk (II) VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN. -
The BIT-Jan-Apr 2013
INFORMATION TECHNOLOGY GENERATION CLOUD COMPUTING WIRELESS NETWORK ARCHITECTURE JANUARY-APRILthe 2013 the Bullettin ofBIT Information Technology TECHNOLOGY 4G A Dream from “Always Connected” to “Always Best Connected” PAGE 4 FACULTY CORNER TRAFFIC FAULTY visit ROUTER For Tcp Congestive Loss Control Over Wireless Network PAGE 5 NEW @ IT TRENDING NEW TECHNOLOGIES PAGE 18 http://rajagiritech.ac.in Department of Information Technology Rajagiri School of Engineering & Technology Rajagiri Valley, Kakkand, Kochi HOD’S MESSAGE Way To Excellence – Role Of Alumni Alumni are the ambassadors of an educational institution in society and industry. They are impor- tant stakeholders of college and lifelong family members of an institution working at various fields thethe Bullettin of Information BIT Technology and at wide geographical locations. Alumni can support the institution and its students by giving truthful feedback on design and scope of the courses, promote entrepreneurship, enlarge outreach, promote industrial interaction and research, training to students, placement, scholarship etc. They can give guidance for orga- ON CREATIVE DESK nizing college programs like teaching, research, innovation and technology transfer to meet the present market and industry needs. Alumni support is very important for the growth and prosperity of the college. They can give valu- Editors able and trusted feedback along with newer ideas needed from time to time to keep the insti- Prof. Kuttyamma A.J. tute in top gear ahead of time. The college and its alumni can function together as one family to (HOD- Department of Information Technology) reach excellence. Mariam Varghese Alumni can support the institute in many ways: Assistant Professor • They can contribute to make education quality and cost competitive. -
International CES Final Report
2013 International CES January 6-11, 2013 Final Report presented by THE MEDIA PROFESSIONAL’S INSIDE PERSPECTIVE 2 2013 International Consumer Electronics Show This Report is Made Possible With the Support of our Executive Sponsors www.ETCentric.org © 2013 etc@usc 2013 International Consumer Electronics Show 3 INTRODUCTION The following report is the Entertainment Technology Center’s post show analy- sis of the 2013 International CES. To access the videos and written reports that were posted live during the show, please visit: http://www.etcentric.org/. Over the course of one week, January 6-11, 2013, the Entertainment Technology Center tracked the most interesting and breaking entertainment technology news coming out of this year’s event. The ETC team reported on new product announcements, evolving industry trends and whisper suite demonstrations. Reports were made available via ETC’s collaborative online destination for enter- tainment media news and commentary, ETCentric: The Media Professional’s Inside Exchange; its accompanying email newsletter, The Daily Bullet; and social networks Facebook and Twitter. The result was nearly 100 postings over a 7-day period (in addition to dozens of pre-show posts). Those stories from the site, rounded out with after-show research and observations, formed the basis for this report. We hope you find the reports useful in putting your finger on the pulse of consumer entertainment technology. As always, we are looking for feedback from you on ETCentric and this report. Please send your comments to [email protected].