Cyber Blitz 10 Juni 2020 Af

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Blitz 10 Juni 2020 Af RABU 10 JUNE 2020 Cyber Blitz ~ AFTERNOON Post PUSAT OPERASI KEAMANAN SIBER NASIONAL - BADAN SIBER DAN SANDI NEGARA CRITICAL URGENT IMPORTANT Informasi yang berkaitan Informasi yang perlu Informasi yang perlu dengan hal yang harus 0 untuk dipertimbangkan 3 menjadi perhatian / 3 segera ditindaklanjuti untuk ditindaklanjuti informasi aktual GENERAL INFORMATION HACK NEWS Facebook melabeli 'media yang dikontrol negara' Dark-Hack-For-Hire Group Menargetkan Ribuan Rusia, Cina, dan Iran Kelompok peretasan, yang disebut Dark Basin, telah keluar setelah menargetkan ribuan individu dan organisasi di seluruh dunia - Ini merupakan salah satu dari banyak upaya menjelang pemilihan termasuk kelompok advokasi dan jurnalis, pejabat pemerintah senior presiden AS tahun 2020, karena untuk menanggulangi serangan asing y dan terpilih selama tujuh tahun. Dark Basin melakukan spionase ang terlihat di tahun 2016. Beberapa hari setelah pengumuman Oktober, komersial atas nama klien mereka, terhadap lawan pelanggan yang Facebook mengatakan bahwa mereka telah menarik jaringan berita hoax terlibat dalam acara publik yang terkenal, kasus kriminal, transaksi yang terhubung ke Rusia dan Iran. https://nakedsecurity.sophos.com/2020/06/09/facebook-labels-state- keuangan, berita dan advokasi, menurut para peneliti di Citizen Lab. controlled-russian-chinese-iranian-media/ https://threatpost.com/dark-basin-hack-hire-group/156407/ Important Urgent Grup Spionase Menyerang Utilitas AS Perusahaan Hack-for-Hire Terhubung dengan Serangan APT yang dikenal sebagai TA410 telah menambahkan trojan akses Kelompok Dark Basin di belakang ribuan serangan phishing dan malware jarak jauh modular (RAT) ke gudang spionase, yang digunakan untuk kemungkinan merupakan perusahaan “ethical hacking" yang berbasis di melawan target Windows di sektor utilitas Amerika Serikat. Menurut India yang bekerja atas nama klien komersial. Sebuah perusahaan yang para peneliti di Proofpoint, RAT, yang disebut FlowCloud, dapat berbasis di India yang memiliki slogan "keinginan Anda, kami lakukan" mengakses aplikasi yang diinstal dan mengontrol keyboard, mouse, telah meluncurkan serangan cyber terhadap ribuan individu dan layar, file, layanan dan proses dari komputer yang terinfeksi, dengan organisasi di seluruh dunia sebagai bagian dari operasi spionase besar kemampuan untuk mengeksfiltrasi informasi ke perintah-dan-kontrol yang didanai pemerintah dan komersial, menurut University of Toronto (C2 ) pemberi. Tampaknya terkait dengan serangan sebelumnya yang CitizenLab, sebuah multiorganizational tim peneliti. memberikan malware LookBack. https://www.darkreading.com/attacks-breaches/hack-for-hire-firm- connected-to-attacks-on-nonprofits-journalists/d/d-id/1338030? https://threatpost.com/espionage-group-utilities-spy-tool/156425/ _mc=rss_x_drr_edt_aud_dr_x_x-rss-simple Urgent Important Florence, Ala Diserang Ransomware Selama 12 Hari Pada akhir Mei, KrebsOnSecurity memberi tahu banyak pejabat di Florence, Ala, bahwa sistem teknologi informasi mereka telah disusupi VULNERABILITY INFORMATION oleh peretas yang menyebarkan ransomware. Namun demikian, pada hari Jumat, 5 Juni, para penyusup melancarkan serangan mereka, mengerahkan ransomware dan menuntut bitcoin senilai hampir $ Kerentanan Kritikal pada Adobe 300.000. Pejabat kota sekarang mengatakan mereka berencana Adobe merilis pembaharuan untuk empat kerentanan kritikal pada Flash untuk membayar permintaan tebusan, dengan harapan menjaga data pribadi warga mereka dari internet. Terletak di sudut barat laut Player dan pada pengolah dokumen Framemaker sebagai bagian dari Alabama, Florence adalah rumah bagi sekitar 40.000 penduduk. Ini pembaruan yang dijadwalkan secara berkala. Bug, jika dieksploitasi, adalah bagian dari daerah metropolitan quad-city yang mungkin dapat mengaktifkan code-execution. Pada pembaruan keamanan Adobe paling terkenal untuk Muscle Shoals Sound Studio yang merekam bulan Juni hari Selasa, kelemahan kritis yang terkait dengan tiga CVE nada-nada kecil dari banyak pertunjukan musik terkenal di tahun ditambal dalam Adobe Framemaker, yang merupakan aplikasi Adobe 1960-an dan 70-an. yang dirancang untuk menulis dan mengedit dokumen besar atau https://krebsonsecurity.com/2020/06/florence-ala-hit-by-ransomware-12- kompleks. days-after-being-alerted-by-krebsonsecurity/ https://threatpost.com/adobe-warns-critical-flaws-flash-player-framemaker/ 156417/ Urgent Important KONTAK KAMI Phone Email (021) 788 33610 [email protected] Website www.idsirtii.or.id Alamat Jl. Harsono RM No. 70, Kel. Ragunan, Kec. Pasar Minggu, Jakarta Selatan, 12550.
Recommended publications
  • Bibliography
    Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens,
    [Show full text]
  • Magazine 2/2017
    B56133 The Science Magazine of the Max Planck Society 2.2017 Big Data IT SECURITY IMAGING COLLECTIVE BEHAVIOR AESTHETICS Cyber Attacks on Live View of the Why Animals The Power Free Elections Focus of Disease Swarm for Swarms of Art Dossier – The Future of Energy Find out how we can achieve CO2 neutrality and the end of dependence on fossil fuels by 2100, thus opening a new age of electricity. siemens.com/pof-future-of-energy 13057_Print-Anzeige_V01.indd 2 12.10.16 14:47 ON LOCATION Photo: Astrid Eckert/Munich Operation Darkness When, on a clear night, you gaze at twinkling stars, glimmering planets or the cloudy band of the Milky Way, you are actually seeing only half the story – or, to be more precise, a tiny fraction of it. With the telescopes available to us, using all of the possible ranges of the electromagnetic spectrum, we can observe only a mere one percent of the universe. The rest remains hidden, spread between dark energy and dark matter. The latter makes up over 20 percent of the cosmos. And it is this mysterious substance that is the focus of scien- tists involved in the CRESST Experiment. Behind this simple sounding name is a complex experiment, the “Cryogenic Rare Event Search with Superconducting Thermometers.” The site of the unusual campaign is the deep underground laboratory under the Gran Sasso mountain range in Italy’s Abruzzo region. Fully shielded by 1,400 meters of rock, the researchers here – from the Max Planck Institute for Physics, among others – have installed a special device whose job is to detect particles of dark matter.
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 116 CONGRESS, FIRST SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 116 CONGRESS, FIRST SESSION Vol. 165 WASHINGTON, THURSDAY, MARCH 14, 2019 No. 46 House of Representatives The House met at 9 a.m. and was Pursuant to clause 1, rule I, the Jour- Mr. HARDER of California. Mr. called to order by the Speaker pro tem- nal stands approved. Speaker, this week, the administration pore (Mr. CARBAJAL). Mr. HARDER of California. Mr. released its proposed budget, and I am f Speaker, pursuant to clause 1, rule I, I here to share what those budget cuts demand a vote on agreeing to the actually mean for the farmers in my DESIGNATION OF THE SPEAKER Speaker’s approval of the Journal. home, California’s Central Valley. PRO TEMPORE The SPEAKER pro tempore. The Imagine you are an almond farmer in The SPEAKER pro tempore laid be- question is on the Speaker’s approval the Central Valley. Maybe your farm fore the House the following commu- of the Journal. has been a part of the family for mul- nication from the Speaker: The question was taken; and the tiple generations. Over the past 5 WASHINGTON, DC, Speaker pro tempore announced that years, you have seen your net farm in- March 14, 2019. the ayes appeared to have it. come has dropped by half, the largest I hereby appoint the Honorable SALUD O. Mr. HARDER of California. Mr. drop since the Great Depression. CARBAJAL to act as Speaker pro tempore on Speaker, I object to the vote on the Then you wake up this week and hear this day.
    [Show full text]
  • 8-30-16 Transcript Bulletin
    FRONT PAGE A1 Buffaloes bowl over Cowboys in rival game See B1 TOOELETRANSCRIPT SERVING TOOELE COUNTY BULLETIN SINCE 1894 TUESDAY August 30, 2016 www.TooeleOnline.com Vol. 123 No. 26 $1.00 Local suicides declined in 2015 JESSICA HENRIE are working. STAFF WRITER “I’m anxious to see how this Numerous suicide pre- year’s numbers compare,” she Tooele County Resident Suicides 2009-2015 vention programs in Tooele said. “I don’t want to be too Source: Tooele County Health Department Vital Statistics Office 20 County may be seeing some quick to say what we’re doing 20 results. is working. And there are so The suicide rate in the many factors — some people county was down last year, might have a terminal illness 14 according to the Tooele County or are under the influence.” 15 13 Health Department’s annual Bate added, “Even one death report for 2015. is too many, so it’s going to be 10 Last year, 13 county resi- a problem we’ll focus on until 10 9 9 dents died from suicide. That’s people get the help they need. seven fewer deaths than in People can be suicidal … and 2014, said Amy Bate, public never be suicidal again if they 5 information officer for the get the help they need. They 5 department. can lead a really happy life.” FILE PHOTO However, Bate will wait Suicide by the numbers Tawnee Griffith and Daniell Ruppell release a lantern into the sky as part of until 2016’s numbers come Suicide statistics on the 0 the Tooele County Health Department’s “With Help Comes Hope” suicide in before saying for sure the 2009 2010 2011 2012 2013 2014 2015 prevention event on May 14.
    [Show full text]
  • Informe De Tendències De Ciberseguretat - La Nova Normalitat Cibernètica
    Informe de tendències de ciberseguretat - La nova normalitat cibernètica Informe de tendències de ciberseguretat 2n semestre de 2020 La nova normalitat cibernètica 1 Informe de tendències de ciberseguretat - La nova normalitat cibernètica El contingut d’aquesta guia és titularitat de l’Agència de Ciberseguretat de Catalunya i resta subjecta a la llicència de Creative Commons BY-NC-ND. L’autoria de l’obra es reconeixerà a través de la inclusió de la menció següent: Obra titularitat de l’Agència de Ciberseguretat de Catalunya. Llicenciada sota la llicència CC BY-NC-ND. Aquesta guia es publica sense cap garantia específica sobre el contingut. Aquesta llicència té les particularitats següents: Vostè és lliure de: Copiar, distribuir i comunicar públicament l’obra. Sota les condicions següents: Reconeixement: S’ha de reconèixer l’autoria de l’obra de la manera especificada per l’autor o el llicenciador (en tot cas, no de manera que suggereixi que gaudeix del suport o que dona suport a la seva obra). No comercial: No es pot emprar aquesta obra per a finalitats comercials o promocionals. Sense obres derivades: No es pot alterar, transformar o generar una obra derivada a partir d’aquesta obra. Avís: En reutilitzar o distribuir l’obra, cal que s’esmentin clarament els termes de la llicència d’aquesta obra. El text complet de la llicència es pot consultar a https://creativecommons.org/licenses/by-nc-nd/4.0/deed.ca L’informe inclou recursos gràfics, com imatges i icones, subministrades des de plataformes de continguts gratuïts de lliure difusió. Menció específica a: https://www.iconfinder.com, https://pixabay.com.
    [Show full text]
  • POL211H1F: Intelligence, Disinformation, and Deception— Challenges of Global Governance in the Digital Age
    POL211H1F: Intelligence, Disinformation, and Deception— Challenges of Global Governance in The Digital Age University of Toronto, Department of Political Science Fall 2020 Online delivery (Quercus, Zoom) Instructors: ● Professor Jon R. Lindsay, [email protected] ○ Office hour: Thursday 2p, Zoom ● Professor Janice G. Stein, [email protected] ○ Office hour: Monday 4p, Zoom Teaching assistants: ● Head TA: Jasmine Chorley Foster, [email protected] ○ Office hour: Thursday 10-11am, Zoom ● Milan Ilnyckyj, [email protected] ● Steven Loleski, [email protected] ○ Office hour: Wednesday 6-7pm, Zoom Contents Description ................................................................................................................................. 2 Course Organization .................................................................................................................. 3 Assignments .............................................................................................................................. 4 Schedule .................................................................................................................................... 7 Introduction (Week 1 - Mon. 21 Sept.) .................................................................................... 7 1. Course organization ................................................................................................. 7 Part I: Intelligence ..................................................................................................................
    [Show full text]
  • Informationssicherung MELANI
    Nationales Zentrum für Cybersicherheit NCSC Nachrichtendienst des Bundes NDB Melde- und Analysestelle Informationssicherung MELANI https://www.melani.admin.ch/ INFORMATIONSSICHERUNG LAGE IN DER SCHWEIZ UND INTERNATIONAL Halbjahresbericht 2020/I (Januar – Juni) 29. OKTOBER 2020 MELDE- UND ANALYSESTELLE INFORMATIONSSICHERUNG MELANI https://www.melani.admin.ch/ 1 Übersicht / Inhalt 1 Übersicht / Inhalt .............................................................................................. 2 2 Editorial ............................................................................................................. 4 3 Schwerpunktthema: COVID-19 ........................................................................ 6 3.1 Gelegenheit für Social Engineering ................................................................... 6 3.1.1 Verbreitung von Schadsoftware .................................................................................... 7 3.1.2 Phishing ......................................................................................................................... 8 3.1.3 Abofallen ........................................................................................................................ 9 3.2 Angriffe auf Websites und –dienste ................................................................... 9 3.3 Angriffe gegen Spitäler ..................................................................................... 10 3.4 Cyber-Spionage ................................................................................................
    [Show full text]
  • Digital Warfare Or Organized Crime
    Breakfast Seminars in Information Security Digital warfare or organized crime (Professional Master in Information Security) Dr. Anders Carlsson, ([email protected]) Anders Carlsson 25y Royal Swedish Navy ÖrlKn (Lt Cmd) Submarines < 20year in BTH teacher & researcher Phd in Cyber Security from National University of Radio Electronics Kharkiv Ukraine last years www.engensec.eu to develop a Msc in Cyber Security EU + Ukraine + Russia agenda - The last year’s changed threat against the countries, companies and organizations. - PROMIS general information - Courses - How to apply Actors then threat opponent…… Coalition Coalition Nation Nation Organization Organization Group Group Individual Individual From Hacktivism organized crime that make BIG money using Hybrid War to overtake a country I managed to take over Georgia 2008, Crimea 2014 and manipulate US-election 2016, nobody stop me Threat Report, Survey, from shows a dramatically increase in ransomware attack against: • CrowdStrike • companies • municipal • ESET • governments and • agencies • KasperskyLab • healthcare providers • EMISOFT A town in Florida has paid $500,000 (£394,000) to hackers after a ransomware attack Lake City voted to pay hackers in $??? In Bitcoin after two weeks downed computer Coastal suburb Riviera Beach recently paid hackers $600,000 following a similar incident that locked municipal staff out of important files. The cyber-attack that sent an Alaskan community back in time US-Security reports shows that during 2019 966 government agencies, educational establishments and healthcare providers at a potential cost in excess of $7.5 billion. 113 state and municipal governments and agencies. 764 healthcare providers. 89 universities, colleges A town in Florida has paid $500,000 (£394,000) to hackers after a ransomware attack Lake City voted to pay hackers in $??? In Bitcoin after two weeks downed computer Coastal suburb Riviera Beach recently paid hackers $600,000 following a similar incident that locked municipal staff out of important files.
    [Show full text]
  • Rowing Field Right Now and There Is No Sign of Stopping Anytime Soon
    WEEKEND CHRONICLE A MESSAGE FROM CHIEF EDUCATION OFFICER’S DESK Dear Readers, “Develop a passion for learning. If you do, you will never cease to grow.” We live today in a world that is so very different from the one we grew up in, the one we were educated in. The world today is moving at such an enhanced rate and we as educationalists need to cause and reflect on the entire system of education. On-line learning provides new age technology to widen the educational scope. It prepares students to succeed in an increasing technology driven global economy. Technology makes life much easier, most of all it saves time and energy. It is one of the fastest growing field right now and there is no sign of stopping anytime soon. It is indeed a great moment for all of us to bring forth this weekly E-Periodical “Weekend Chronicle”. We are sure this E-Periodical will help to acquire knowledge and skills, build build character and enhance employability of our young talented students to become globally competent. There is something for everyone here, right from the fields of Business, Academics, Travel and Tourism, Science and technology, Media and lot more. The variety and creativity of the articles in E-Periodical will surely add on to the knowledge of the readers. I am sure that the positive attitude, hard work, continued efforts and innovative ideas exhibited by our students will surely stir the mind of the readers and take them to the fantastic world of joy and pleasure. Dr. Mala Kharkar Chief Education Officer (Patkar-Varde College) WEEKEND CHRONICLE A MESSAGE FROM THE PRINCIPAL’S DESK Dear Readers, As we know, “An Investment in knowledge pays the best interest.” Hence in this regard the E-Periodical Weekend Chronicle is playing a vital role in providing a platform to enhance the creative minds of our students of BMS Department.
    [Show full text]
  • The Fourth Industrial Revolution and the Recolonisation of Africa; The
    The Fourth Industrial Revolution and the Recolonisation of Africa This book argues that the fourth industrial revolution, the process of accelerated automation of traditional manufacturing and industrial practices via digital technology, will serve to further marginalise Africa within the international community. In this book, the author argues that the looting of Africa that started with human capital and then natural resources, now continues unabated via data and digital resources looting. Developing on the notion of “Coloniality of Data”, the fourth industrial revolution is postulated as the final phase which will con- clude Africa’s peregrination towards (re)colonisation. Global cartels, networks of coloniality, and tech multinational corporations have turned big data into capital, which is largely unregulated or poorly regulated in Africa as the con- tinent lacks the strong institutions necessary to regulate the mining of data. Written from a decolonial perspective, this book employs three analytical pillars of coloniality of power, knowledge, and being. Highlighting the crippling continuation of asymmetrical global power relations, this book will be an important read for researchers of African studies, politics, and international political economy. Everisto Benyera is Associate Professor of African Politics at the University of South Africa. Routledge Contemporary Africa Series The Literature and Arts of the Niger Delta Edited by Tanure Ojaide and Enajite Eseoghene Ojaruega Identification and Citizenship in Africa Biometrics, the
    [Show full text]
  • Elife-58511-V1.Pdf (4.597Mb)
    RESEARCH ARTICLE Transmission of West Nile and five other temperate mosquito-borne viruses peaks at temperatures between 23˚C and 26˚C Marta S Shocket1,2*, Anna B Verwillow1, Mailo G Numazu1, Hani Slamani3, Jeremy M Cohen4,5, Fadoua El Moustaid6, Jason Rohr4,7, Leah R Johnson3,6, Erin A Mordecai1 1Department of Biology, Stanford University, Stanford, United States; 2Department of Ecology and Evolutionary Biology, University of California Los Angeles, Los Angeles, United States; 3Department of Statistics, Virginia Polytechnic Institute and State University (Virginia Tech), Blacksburg, United States; 4Department of Integrative Biology, University of South Florida, Tampa, United States; 5Department of Forest and Wildlife Ecology, University of Wisconsin, Madison, United States; 6Department of Biological Sciences, Virginia Polytechnic Institute and State University (Virginia Tech), Blacksburg, United States; 7Department of Biological Sciences, Eck Institute of Global Health, Environmental Change Initiative, University of Notre Dame, South Bend, United States Abstract The temperature-dependence of many important mosquito-borne diseases has never been quantified. These relationships are critical for understanding current distributions and predicting future shifts from climate change. We used trait-based models to characterize temperature-dependent transmission of 10 vector–pathogen pairs of mosquitoes (Culex pipiens, Cx. quinquefascsiatus, Cx. tarsalis, and others) and viruses (West Nile, Eastern and Western Equine Encephalitis, St. Louis Encephalitis, Sindbis, and Rift Valley Fever viruses), most with substantial transmission in temperate regions. Transmission is optimized at intermediate temperatures (23–26˚ *For correspondence: C) and often has wider thermal breadths (due to cooler lower thermal limits) compared to [email protected] pathogens with predominately tropical distributions (in previous studies).
    [Show full text]
  • The Project Gutenberg Ebook of the Hawaiian Archipelago, by Isabella L
    The Project Gutenberg EBook of The Hawaiian Archipelago, by Isabella L. Bird (#5 in our series by Isabella L. Bird) Copyright laws are changing all over the world. Be sure to check the copyright laws for your country before downloading or redistributing this or any other Project Gutenberg eBook. This header should be the first thing seen when viewing this Project Gutenberg file. Please do not remove it. Do not change or edit the header without written permission. Please read the "legal small print," and other information about the eBook and Project Gutenberg at the bottom of this file. Included is important information about your specific rights and restrictions in how the file may be used. You can also find out about how to make a donation to Project Gutenberg, and how to get involved. **Welcome To The World of Free Plain Vanilla Electronic Texts** **eBooks Readable By Both Humans and By Computers, Since 1971** *****These eBooks Were Prepared By Thousands of Volunteers!***** Title: The Hawaiian Archipelago Author: Isabella L. Bird Release Date: October, 2004 [EBook #6750] [Yes, we are more than one year ahead of schedule] [This file was first posted on January 22, 2003] Edition: 10 Language: English Character set encoding: ASCII *** START OF THE PROJECT GUTENBERG EBOOK, THE HAWAIIAN ARCHIPELAGO *** This etext was produced by Les Bowler, St. Ives, Dorset. THE HAWAIIAN ARCHIPELAGO. SIX MONTHS AMONG THE PALM GROVES, CORAL REEFS, AND VOLCANOES OF THE SANDWICH ISLANDS. BY ISABELLA L. BIRD. "Summer isles of Eden lying In dark purple spheres of sea." To my sister, to whom these letters were originally written, they are now affectionately dedicated.
    [Show full text]