Activity Reports from APCERT Members
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Éric FREYSSINET Lutte Contre Les Botnets
THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, CentraleSupélec Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M. Celui qui n’empêche pas un crime alors qu’il le pourrait s’en rend complice. — Sénèque Remerciements Je tiens à remercier mes deux directeurs de thèse. David Naccache, officier de réserve de la gendarmerie, contribue au développement de la recherche au sein de notre institution en poussant des personnels jeunes et un peu moins jeunes à poursuivre leur passion dans le cadre académique qui s’impose. Matthieu Latapy, du LIP6, avec qui nous avions pu échanger autour d’une thèse qu’il encadrait dans le domaine difficile des atteintes aux mineurs sur Internet et qui a accepté de m’accueillir dans son équipe. Je voudrais remercier aussi, l’ensemble de l’équipe Réseaux Complexes du LIP6 et sa responsable d’équipe actuelle, Clémence Magnien, qui m’ont accueilli à bras ouverts, accom- pagné à chaque étape et dont j’ai pu découvrir les thématiques et les méthodes de travail au fil des rencontres et des discussions. -
Governance and the HIV/AIDS Epidemic in Vietnam by Alfred John
Governance and the HIV/AIDS Epidemic in Vietnam by Alfred John Montoya A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Anthropology in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Aihwa Ong, Chair Professor Paul Rabinow Professor Peter Zinoman Spring 2010 Governance and the HIV/AIDS Epidemic in Vietnam © 2010 By Alfred John Montoya For Michael A. Montoya, Elizabeth Alonzo, and Mary Theresa Alonzo. i Acknowledgements First, I‘d like to express my endless gratitude to my family, always with me, in far-flung places. To them I owe more than I can say. This work would not have been possible without the warm mentorship and strong support of my excellent advisors, Aihwa Ong, Paul Rabinow and Peter Zinoman. Their guidance and encouragement made all the difference. I would also like to acknowledge the intellectual and personal generosity of David Spener, Alan Pred, and Nancy Scheper-Hughes who contributed so much to my training and growth. Additionally, this work and I benefitted greatly from the myriad commentators and co-laborers from seminars, conference panels and writing groups. I would specifically like to extend my gratitude to those from the Fall 2004 graduate student cohort in the Department of Anthropology at UC Berkeley, particularly Amelia Moore and Shana Harris, whose friendship and company made graduate school and graduate student life a pleasure. Also, my heartfelt thanks to Emily Carpenter, my friend, through the triumphs and travails of these six years and this project that consumed them. Many thanks to the participants in the Anthropology of the Contemporary Research Collaboratory, at UC Berkeley. -
Symantec White Paper
QUARTERLY REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: QUARTERLY Symantec Intelligence Quarterly July - September, 2009 Published October 2009 Technical Brief: Symantec Enterprise Security Symantec Intelligence Quarterly July - September, 2009 Contents Introduction . 1 Highlights . 2 Metrics. 2 Meeting the Challenge of Sophisticated Attacks . 8 Timeline of a zero-day event . 8 How secure are security protocols?. 11 Why attackers use packers. 14 Protection and Mitigation . 16 Appendix A—Best Practices . 18 Appendix B—Methodologies. 20 Credits . 24 Symantec Intelligence Quarterly July - September, 2009 Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network. More than 240,000 sensors in over 200 countries monitor attack activity through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services and Norton™ consumer products, as well as additional third-party data sources. Symantec also gathers malicious code intelligence from more than 130 million client, server, and gateway systems that have deployed its antivirus products. Additionally, the Symantec distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods. Spam data is captured through the Symantec probe network, a system of more than 2.5 million decoy email accounts, Symantec MessageLabs™ Intelligence, and other Symantec technologies in more than 86 countries from around the globe. Over 8 billion email messages, as well as over 1 billion Web requests, are scanned per day across 16 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors, and more than 50 million consumers. -
Ilomo Botnet a Study of the Ilomo / Clampi Botnet
Ilomo A study of the Ilomo / Clampi botnet Ilomo Botnet A study of the Ilomo / Clampi Botnet by Alice Decker: Network Analysis David Sancho: Reverse Engineering Max Goncharov: Network Analysis Robert McArdle: Project Coordinator Release Date: 20 August 2009 Classification: Public Ilomo A study of the Ilomo / Clampi botnet Table of Contents Introduction ........................................................................................................................................................... 3 Ilomo Analysis ....................................................................................................................................................... 4 Stage 1: Dropper ....................................................................................................................................... 4 Stage 2: Main Executable ........................................................................................................................ 7 Stage 3: Injected Code ............................................................................................................................ 12 VMProtect Obfuscator ........................................................................................................................................ 17 Background Information .......................................................................................................................... 17 Technical Information ............................................................................................................................. -
Ronald L. Chichester*
30990-txb_44-1 Sheet No. 4 Side A 02/01/2012 14:53:16 ZOMBIES (DO NOT DELETE) 10/27/2011 12:39 PM SLAYING ZOMBIES IN THE COURTROOM:TEXAS ENACTS THE FIRST LAW DESIGNED SPECIFICALLY TO COMBAT BOTNETS Ronald L. Chichester* I. INTRODUCTION ............................................................................................... 2 II. WHAT IS A BOTNET? ...................................................................................... 2 III. ZOMBIFICATION—CREATING THE BOTNET ............................................ 3 IV. OTHER CURRENT COMPUTER MISUSE STATUTES ................................. 4 V. A SHORT DESCRIPTION OF THE FIRST ANTI-BOTNET STATUTE ........ 6 VI. UTILIZING S.B. 28—THE CAUSE OF ACTION ............................................ 8 VII. GATHERING THE EVIDENCE ........................................................................ 9 VIII. FINDING THE PERPETRATOR(S) .................................................................. 9 IX. CONCLUSIONS ............................................................................................... 10 X. APPENDIX A ................................................................................................... 10 30990-txb_44-1 Sheet No. 4 Side A 02/01/2012 14:53:16 * Ron Chichester is an attorney, a certified computer forensic examiner, and an Adjunct Professor at the University of Houston Law Center, where he teaches “Digital Transaction” (www.digitaltransactions.info). Ron is admitted to practice in the State of Texas, the U.S. Courts for the Southern District of -
A Decision-Making Framework to Select a Public-Private Partnership Scheme for Infrastructure Development in Vietnam
A DECISION-MAKING FRAMEWORK TO SELECT A PUBLIC-PRIVATE PARTNERSHIP SCHEME FOR INFRASTRUCTURE DEVELOPMENT IN VIETNAM A thesis submitted in fulfilment of the requirement for the degree of Doctor of Philosophy Minh Hang VU BConstEc, University of Transport and Communications, Vietnam MBA, La Trobe University, Australia School of Engineering College of Science, Engineering and Health RMIT University October 2019 DECLARATION I certify that, except where due acknowledgment has been made; the work is that of the author alone. The work has not been submitted previously, in whole or in part, to qualify for any other academic award. The content of the thesis is the result of work, which has been carried out since the official commencement date of the approved research program. Any editorial work, paid or unpaid, carried out by a third party is acknowledged; and ethics procedures and guidelines have been followed. I acknowledge the support I have received for my research through the provision of an Australian Government Research Training Program Scholarship. Date: 17/10/2019 Name: Minh Hang Vu ABSTRACT Public-Private Partnership (PPP) is recognised as a procurement strategy for governments to mobilise capital, skills and expertise of the private sector to deliver key infrastructures. A growing number of PPP schemes, as of a contract arrangement between public and private sectors such as Build- Operate-Transfer (BOT) and Design-Build-Operate-Maintain (DBOM), have been formed and used worldwide to deliver public services. Within the broad spectrum of PPP arrangements, several variations of PPP schemes have been developed and are on the increase. Every PPP scheme has its own pros and cons and application, however understanding of different PPP schemes varies. -
Water Supply and Sanitation in Vietnam
Service Delivery Assessment December 2014 Public Disclosure Authorized Water Supply Public Disclosure Authorized and Sanitation in Vietnam Turning Finance into Services for the Future Public Disclosure Authorized Public Disclosure Authorized This report is the product of extensive collaboration and information sharing between many government agencies at national and provincial level, and development partners in Vietnam. A core team drawn from the Ministry of Construction and Ministry of Agriculture and Rural Development has been lead partners with the Water and Sanitation Program in this assessment sector. The authors acknowledge their valuable contribution as well as the information sharing and contributions during workshops by other sector stakeholders, including development partners. The Task Team Leader for the Service Delivery Assessment (SDA) in East Asia and the Pacific is Susanna Smets. The fol- lowing World Bank staff and consultants have provided valuable contributions to the service delivery assessment process and report: Jeremy Colin, U-Prime Rodriguez, Vinh Quang Nguyen, Iain Menzies, Hang Diem Nguyen, Almud Weitz, Sandra Giltner, Nguyen Trong Duong and Nguyen Danh Soan. The report was peer reviewed by the following World Bank staff and sector colleagues: Parameswaran Iyer, Lead Water and Sanitation Specialist, Lilian Pena Pereira Weiss, Sr. Water and Sani- tation Specialist, Sing Cho, Urban Specialist and Lalit Patra, Chief WASH section, UNICEF Vietnam. The SDA was carried out under the guidance of the World Bank’s Water and Sanitation Program and local partners. This re- gional work, implemented through a country-led process, draws on the experience of water and sanitation SDAs conducted in more than 40 countries in Africa, Latin America, and South Asia. -
Improving the Effectiveness of Behaviour-Based Malware Detection
Improving the Effectiveness of Behaviour-based Malware Detection Mohd Fadzli Marhusin BSc. Information Studies (Hons) (Information Systems Management) UiTM, Malaysia Master of Information Technology (Computer Science) UKM, Malaysia A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy at the School of Engineering and Information Technology University of New South Wales Australian Defence Force Academy Copyright 2012 by Mohd Fadzli Marhusin PLEASE TYPE THE UNIVERSITY OF NEW SOUTH WALES Thesis/Dissertation Sheet Surname or Family name: MARHUSIN First name: MOHD FADZLI Other name/s: Abbreviation for degree as given in the University calendar: PhD (Computer Science) School: School of Engineering and Information Technology (SEIT) Faculty: Title: Improving the Effectiveness of Behaviour-based Malware Detection Abstract 350 words maximum: (PLEASE TYPE) Malware is software code which has malicious intent but can only do harm if it is allowed to execute and propagate. Detection based on signature alone is not the answer, because new malware with new signatures cannot be detected. Thus, behaviour-based detection is needed to detect novel malware attacks. Moreover, malware detection is a challenging task when most of the latest malware employs some protection and evasion techniques. In this study, we present a malware detection system that addresses both propagation and execution. Detection is based on monitoring session traffic for propagation, and API call sequences for execution. For malware detection during propagation, we investigate the effectiveness of signature-based detection, anomaly-based detection and the combination of both. The decision-making relies upon a collection of recent signatures of session-based traffic data collected at the endpoint level. -
Monthly Report on Online Threats in The
MONTHLY REPORT ON ONLINE THREATS REPORTING PERIOD: IN THE BANKING SECTOR 19.04–19.05.2014 One of the main events during the reporting period was the leakage of payment credentials belonging to eBay users. Details of the incident and other detected threats can be found in the section ‘Key events in the online banking sphere’ below. Overall statistics During the reporting period, Kaspersky Lab solutions blocked 341,216 attempts on user computers to launch malware capable of stealing money from online banking accounts. This figure represents a 36.6% increase compared to the previous reporting period (249,812). This increase in banking malware activity is most likely related to the onset of the vacation season, when customers actively use their payment data to make all types of purchases online. 24 001 - 78 000 16 001 - 24 000 7101 - 16 000 2101 - 7100 1 - 2100 Number of users targeted by banking malware The number of users attacked using these types of programs during the reporting period is shown in the diagram below (Top 10 rating based on the number of users attacked, in descending order): 77,412 27,071 21,801 22,115 13,876 15,651 17,333 5417 6883 7347 France Vietnam Austria India Germany United USA Russian Italy Brazil Kingdom Federation © 1997-2014 Kaspersky Lab ZAO. All Rights Reserved. The table below shows the programs most commonly used to attack online banking users, based on the number of infection attempts: Total notifications of Verdict* Number of users Number of notifications attempted infections by Trojan-Spy.Win32.Zbot 198 -
March GMR 2018.Pdf
MARCH 201 8 Global Foot - and - Mouth Disease Situation March 201 8 Foot - and - Mouth Disease Situation Food and Agriculture Organization of the United Nations Monthly Report March 2018 Guest Editor: Donald King: WRLFMD, Pirbright # I N F O R M A T I O N S O U R C E S U S E D: Databases: OIE WAHID World Animal Health Information Database FAO World Reference Laboratory for FMD (WRLFMD) FAO Global Animal Disease Information System (EMPRES - i) Other sources: FAO/EuFMD supported FMD networks FAO/EuFMD projects and field officers The sources for information are referenced by using superscripts. The key to the superscripts is on the last page. Please note that the use of information and boundaries of territories should not be considered to be the view of the U.N. Please, always refer to the OIE for official information on reported outbreaks and country status. 1 Global Foot - and - Mouth Disease Situation March 201 8 Contents I. GENERAL OVERVIEW ................................ ................................ ................................ ................................ 4 II. HEADLINE NEWS ................................ ................................ ................................ ................................ ....... 5 III. DETAILED POOL ANALYSIS ................................ ................................ ................................ ......................... 7 A. POOL 1 – Southeast Asia/Central Asia/East Asia ................................ ................................ ........................ 7 B. POOL 2 – South -
Security Testing Is a Popular, but Often Misunderstood Concept
As lowering temperatures signal the last days of summer, many of you are already behind your workstations tackling new threats and looking fondly back at the days at the beach. Youʼre not alone, the security landscape is evidently waking up, as both black hats and white hats are back at their keyboards. During the past few months weʼve been sorting through a significant number of article submissions. The result is another issue of (IN)SECURE we think youʼll enjoy. While wrapping up on this issue, we finalized our travel plans to attend ENISAʼs Summer School on Network and Information Security in Greece, SOURCE Conference in Barcelona and BruCON in Brussels. This means weʼll be seeing many of you during September and listening to a myriad of inspiring talks. Itʼs going to be an stimulating month! Mirko Zorz Editor in Chief Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Editor in Chief - [email protected] News: Zeljka Zorz, News Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright (IN)SECURE Magazine 2010. www.insecuremag.com The dramatic increase of vulnerability disclosures Vulnerability disclosures are increasing dramatically, having reached record levels for the first half of 2010, according to IBM. Overall, 4,396 new vulnerabilities were documented by the X-Force team in the first half of 2010, a 36% increase over the same time period last year. -
A Multilevel Analysis of Data from Global Youth Tobacco Use Data (GYTS) 2014
J Glob Health Sci. 2019 Jun;1(1):e3 https://doi.org/10.35500/jghs.2019.1.e3 pISSN 2671-6925·eISSN 2671-6933 Original Article Smoking susceptibility among school children aged 13–15 in Vietnam: a multilevel analysis of data from Global Youth Tobacco Use data (GYTS) 2014 Van Minh Hoang ,1,* Juhwan Oh ,2,* Thi Tu Quyen Bui ,1 Thi Hoang Lan Vu ,1 Tu Hoang Le ,1 Thuy Linh Nguyen ,1 Bao Giang Kim ,3 Ngoc Minh Luu ,4 Quang Cuong Le ,5 Ngoc Hoat Luu 4 1Department of Epidemiology and Biostatistics, Hanoi University of Public Health, Hanoi, Vietnam 2JW LEE Center for Global Medicine of Seoul National University College of Medicine, Seoul, Korea 3Department of Health Education and Promotion, Institute for Preventive Medicine and Public Health, Hanoi Medical University, Hanoi, Vietnam Received: Mar 26, 2019 4Department of Biostatistics and Medical Informatics, Institute for Preventive Medicine and Public Health, Accepted: May 5, 2019 Hanoi Medical University, Hanoi, Vietnam 5Department of Neurology, Hanoi Medical University, Hanoi, Vietnam Correspondence to Van Minh Hoang Department of Epidemiology and Biostatistics, Center for Population Health Sciences, Hanoi ABSTRACT University of Public Health, 1A Duc Thang Street, North Tu Liem, Hanoi 10119, Vietnam. Background: We aim to assess the prevalence of smoking susceptibility and identify factors E-mail: [email protected] at school and individual levels that are associated with individual susceptibility to smoking Juhwan Oh among school children aged 13–15 years in Vietnam. JW LEE Center for Global Medicine of Seoul Methods: Data came from Vietnam Global Youth Tobacco Survey (GYTS) 2014.