Spyware, Stealer, Locker, Wiper: Lockergoga Revisited
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Candidates Nominated to the Board of Directors in Gjensidige Forsikring ASA
Office translation for information purpose only Appendix 18 Candidates nominated to the Board of Directors in Gjensidige Forsikring ASA Per Andersen Born in 1947, lives in Oslo Occupation/position: Managing Director, Det norske myntverket AS Education/background: Chartered engineer and Master of Science in Business and Economics, officer’s training school, Director of Marketing and Sales and other positions with IBM, CEO of Gjensidige, CEO of Posten Norge and Managing Director of ErgoGroup, senior consultant to the CEO of Posten Norge, CEO of Lindorff. Trond Vegard Andersen Born in 1960, lives in Fredrikstad Occupation/position: Managing Director of Fredrikstad Energi AS Education/background: Certified public accountant and Master of Science in Business and Economics from the Norwegian School of Business Economics and Administration (NHH) Offices for Gjensidige: Member of owner committee in East Norway Organisational experience: Chairman of the Board for all FEAS subsidiaries, board member for Værste AS (regional development in Fredrikstad) Hans-Erik Folke Andersson Born in 1950, Swedish, lives in Djursholm Occupation/position: Consultant, former Managing Director of insurance company Skandia, Nordic Director for Marsh & McLennan and Executive Director of Mercantile & General Re Education/background: Statistics, economy, business law and administration from Stockholm University Offices for Gjensidige: Board member since 2008 Organisational experience: Chairman of the Board of Semcon AB, Erik Penser Bankaktiebolag and Canvisa AB and a board member of Cision AB. Per Engebreth Askildsrud Born in 1950, lives in Jevnaker Occupation/position: Lawyer, own practice Education/background: Law Offices for Gjensidige: Chairman of the owner committee Laila S. Dahlen Born in 1968, lives in Oslo Occupation/position: Currently at home on maternity leave. -
Attacking from Inside
WIPER MALWARE: ATTACKING FROM INSIDE Why some attackers are choosing to get in, delete files, and get out, rather than try to reap financial benefit from their malware. AUTHORED BY VITOR VENTURA WITH CONTRIBUTIONS FROM MARTIN LEE EXECUTIVE SUMMARY from system impact. Some wipers will destroy systems, but not necessarily the data. On the In a digital era when everything and everyone other hand, there are wipers that will destroy is connected, malicious actors have the perfect data, but will not affect the systems. One cannot space to perform their activities. During the past determine which kind has the biggest impact, few years, organizations have suffered several because those impacts are specific to each kinds of attacks that arrived in many shapes organization and the specific context in which and forms. But none have been more impactful the attack occurs. However, an attacker with the than wiper attacks. Attackers who deploy wiper capability to perform one could perform the other. malware have a singular purpose of destroying or disrupting systems and/or data. The defense against these attacks often falls back to the basics. By having certain Unlike malware that holds data for ransom protections in place — a tested cyber security (ransomware), when a malicious actor decides incident response plan, a risk-based patch to use a wiper in their activities, there is no management program, a tested and cyber direct financial motivation. For businesses, this security-aware business continuity plan, often is the worst kind of attack, since there is and network and user segmentation on top no expectation of data recovery. -
The Middle East Under Malware Attack Dissecting Cyber Weapons
The Middle East under Malware Attack Dissecting Cyber Weapons Sami Zhioua Information and Computer Science Department King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia [email protected] Abstract—The Middle East is currently the target of an un- have been designed by the same unknown entity 1. The next precedented campaign of cyber attacks carried out by unknown malware of this lineage was Flame [7] which was discovered parties. The energy industry is praticularly targeted. The in May 2012 by Kaspersky Lab while investigating another attacks are carried out by deploying extremely sophisticated malware. The campaign opened by the Stuxnet malware in piece of malware called Wiper [8]. Flame features very 2010 and then continued through Duqu, Flame, Gauss, and unusual characteristics such as large size, large number of Shamoon malware. This paper is a technical survey of the modules, self adapting, etc. As Duqu, Flame’s objective is attacking vectors utilized by the three most famous malware, data collection and espionnage. Gauss [9] is another data namely, Stuxnet, Flame, and Shamoon. We describe their main stealing malware discovered in June 2012 by Kaspersky Lab modules, their sophisticated spreading capabilities, and we discuss what it sets them apart from typical malware. The focusing on banking information. Flame and Gauss exhibit main purpose of the paper is to point out the recent trends striking similarities and several technical evidences indicate infused by this new breed of malware into cyber attacks. that they come from the same “factories” that produced Stuxnet and Duqu [9]. The latest malware-based attack Keywords-Malwares; Information Security; Targeted At- tacks; Stuxnet; Duqu; Flame; Gauss; Shamoon targeting the middle east was the Shamoon attack on Saudi Aramco [10]. -
Ransoming Government What State and Local Governments Can Do to Break Free from Ransomware Attacks About the Authors
A report from the Deloitte Center for Government Insights Ransoming government What state and local governments can do to break free from ransomware attacks About the authors Srini Subramanian | [email protected] Srini Subramanian is a principal in Deloitte & Touche LLP’s Cyber Risk Services practice and leads the Risk & Financial Advisory practice for the State, Local Government and Higher Education (SLHE) sector. He has more than 30 years of technology experience, and more than 20 years of cyber risk services experience in the areas of information security strategy, innovation, governance, identity, access management, and shared services. Subramanian is a member of the National Association of State CIOs (NASCIO) Security and Privacy subcommittee. He is an active participant in the National Governors Association (NGA) Policy Council for State Cybersecurity formed in February 2013. Subramanian is the coauthor of the biennial Deloitte—NASCIO Cybersecurity Study publication with NASCIO since 2010. The recent two publications include the 2016 Deloitte-NASCIO Cybersecurity Study—State governments at risk: Turning strategy and awareness into progress and the 2018 Deloitte-NASCIO Cybersecurity Study—State governments at risk: Bold plays for change. Pete Renneker | [email protected] Pete Renneker is a managing director in Deloitte & Touche LLP’s Cyber practice and serves as the Technical Resilience Offering leader. In this capacity, his focus is on the development and delivery of cross-industry services which help clients develop the ability to withstand disruptions to critical business technology. This work includes helping clients respond to cyberattacks, accelerate business recovery from these events, and transform cyber and resiliency programs in anticipation of emerging threats. -
Mr. Thorleif Enger Elected New Telenor Chairman
Mr. Thorleif Enger elected new Telenor Chairman The Corporate Assembly of Telenor ASA has elected Mr. Thorleif Enger (59) as new Chairman of the Board. Mr. Enger has been a member of the Board since October 2001. Thorleif Enger has a PhD in Structural Engineering from the University of Colorado, USA and today holds position as Executive Vice President and member of Norsk Hydro Corporate Management, in charge of Hydro Agri, the world's largest fertilizer company. Mr. Enger has been with Norsk Hydro since 1973 and has, among other things, been Project Director for the development of the Oseberg Field in the North Sea and has been responsible for Norsk Hydro's domestic and foreign oil and gas acitivities. From 1970 to 1973 he was employed by Shell Development Company in Houston, Texas. Mr. Thorleif Enger succeeds Mr. Tom Vidar Rygh, who resigned as Chairman in December 2002 when he accepted the position as head of the investment bank Enskilda Securities AB in Sweden. The Board of Telenor ASA after this consist of: Thorleif Enger, Chairman à shild Bendiktsen, Deputy Chairman Hanne de Mora Jørgen Lindegaard Bjørg Ven Einar Førde Per Gunnar Salomonsen (employee representative) Irma Ruth Tystad (employee representative) Harald Stavn (employee representative) A high resolution picture of Mr. Thorleif Enger is available at: http://www.telenor.no/pressesenter/_gfx/trykk_tenger.jpg Telenor Group is one of the world's major mobile operators. We keep our customers connected in our markets across Scandinavia and Asia. Our more than 30,000 employees are committed to responsible business conduct and being our customers' favourite partner in digital life. -
The Supervisory Board of Gjensidige Forsikring ASA
The Supervisory Board of Gjensidige Forsikring ASA Name Office Born Address Occupation/position Education/background Organisational experience Bjørn Iversen Member 1948 Reinsvoll Farmer Agricultural economics, Agricultural Head of Oppland county branch of the Norwegian University of Norway in 1972. Landbrukets Farmers' Union 1986-1989, head of the Norwegian sentralforbund 1972-1974, Norges Kjøtt- og Farmers' Union 1991-1997, chair of the supervisory Fleskesentral 1974-1981, state secretary in board of Hed-Opp 1985-89, chair/member of the board the Ministry of Agriculture 1989-1990 of several companies. Chair of the Supervisory Board and Chair of the Nomination Committee of Gjensidige Forsikring ASA. Hilde Myrberg Member 1957 Oslo Senior Vice President MBA Insead, law degree. Chair of the board of Orkla Asia Holding AS, deputy Corporate Governance, chair of the board of Petoro AS, member of the board of Orkla ASA Renewable Energy Corporation ASA, deputy board member of Stålhammar Pro Logo AS, deputy chair of the board of Chr. Salvesen & Chr Thams's Communications Aktieselskap, member of the boards of Industriinvesteringer AS and CGGVeritas SA. Randi Dille Member 1962 Namsos Self-employed, and Economies subjects. Case officer/executive Chair of the boards of Namsskogan Familiepark, Nesset general manager of officer in the agricultural department of the fiskemottak and Namdal Skogselskap, member of the Namdal Bomveiselskap, County Governor of Nord-Trøndelag, boards of several other companies. Sits on Nord- Namsos national recruitment project manager for Trøndelag County Council and the municipal Industribyggeselskap and the Norwegian Fur Breeders' Association, council/municipal executive board of Namsos Nordisk Reinskinn own company NTN AS from 1999. -
COVID-19 Critical Infrastructure Cyber Threat Brief
Digital Intelligence Securing the Future COVID-19 Critical Infrastructure Cyber Threat Brief CLIENT CONFIDENTIAL Cyjax Purpose This Cyber Threat Brief is intended to help mitigate the risk of cyberattacks against UK critical infrastructure during the coronavirus pandemic. We have defined critical infrastructure as: food supplies, medical supplies, transportation, security services, telecommunications, utilities and financial services. This report provides a broad overview of all relevant coronavirus-related digital threats, alongside more general vulnerabilities that attackers could exploit. We at Cyjax hope this will help organisations and their staff protect themselves from digital threats during this national crisis. If you require any further assistance or advice, please contact us. Overview of malicious cyber activity We have witnessed a significant uptick in cyberattacks exploiting fear of the coronavirus to compromise victims. Notably, however, there has not been a surge in the total number of attacks. Instead, existing cybercriminal operations have been rethemed with COVID-19 lures. Attackers have not gained more resources, but are instead repurposing their existing phishing, ransomware, and malware infrastructure to include COVID-19-themed keywords in a bid to infect more users. [1] All sectors are being targeted with COVID-19-themed attacks, including those operating in the critical infrastructure space. Attacks have ranged from generic “spray and pray” attacks to highly targeted advanced persistent threat (APT) operations. A broad array of nation-state actors have been involved from China, Russia, North Korea and Iran, among others. Sophisticated cybercriminals are also staging coronavirus-themed attacks. Most notably, organised ransomware gangs, who have continued to compromise, encrypt and leak data from a diverse group of organisations. -
0 STATOIL Den Norske Stats Oljeselskap A.S - Statoil - Was Founded in 1972
DEN NORSKE STATS O L J ESE [S K A P A.S ANNUAL REPORT AND ACCOUNTS NINETEEN HUNDRED AND NINETY-FIVE 0 STATOIL Den norske stats oljeselskap a.s - Statoil - was founded in 1972. All its shares are owned by the Norwegian state. The company’s object is, either by itself or through participation in or together with other companies, to car,y out exploration, production, trans portation, refining and marketing of petroleum and petroleum-derived products, as well as other business. Net operating revenue for the group in 1995 totalled NOK 87 billion. At 3’l December, it had some 14 000 employees. Statoil is the leading player on the Norwegian continental shelfand the biggest petrol retail er in Scandinavia. It also ranks as one of the world’s largest net sellers ofcrude oil and is a substantial supplier II of natural gas to continental Europe. The group has pur sued a gradual expansion outside Scandinavia in recent years. Statoil is responsible for managing the govern I ment’s directfinancial interest in partnerships engaged in exploration for as well as development, production and fransport ofpefroleum on the Norwegian continental shelf ‘p. Statoil operates in the following countries: Norway • Sweden • Denmark • Germany • Poland • Estonia Latvia • Lithuania • UK • Ireland • Belgium • Russia • Thailand Vietnam • Malaysia • Singapore • Azerbaijan • Kazakhstan Angola • Namibia • Nigeria • USA • Venezuela • China ______L 1995 Statoil made the biggest oil discovery off Denmark for 18 years as operator on the Sin structure, which is estimated to hold 145 million barrels of commercially-recoverable oil. Statoil took over as production operator on the Heidrun field, which has a daily output of 220 000 barrels of oil. -
Download Bios of Tone H Bachke and Jørgen C. Arentz Rostrup
Tone H. Bachke Tone H. Bachke, born 1972, has more than 20 years of business experience in an international context. In Telenor, she has held the position as SVP and Head of Group Treasury upon joining the company in September 2018. She has a broad range of management positions in several companies and across industries, including CEO of Implenia Norge AS, CFO of Kistefos AS, as well as various management positions in Aker Solutions, including SVP and CFO of Aker Process Systems. She also serves on the Board of Directors for Veidekke ASA. Education: Bachke holds a degree in economics and business administration from Norwegian School of Economics (NHH). Jørgen C. Arentz Rostrup Jørgen Rostrup, born 1966, has more than 20 years’ business experience in an international context. For the past years as CFO for Telenor Group, Jørgen has been instrumental in setting a solid course for the company of growth and modernisation. Through Telenor’s operational excellence measures, a sharper focus on what creates value, and a dedication to uncovering efficiencies over time, the company is today one of the best-positioned global telcos. Prior to joining Telenor Group in 2016 as CFO, he served as President of Yara North America, Inc. Rostrup has held a broad range of management positions in two of Norway’s leading companies, including Country Manager for Yara Ghana Ltd., CFO in Norsk Hydro AS, Executive Vice President Energy in Hydro and CFO for Hydro’s Norwegian oil and gas activity. Rostrup has also served on several boards, including positions within the private equity and investment banking area. -
The Cyberpeace Institute Foreword 2 Acknowledgements 5
March 2021 The CyberPeace Institute Foreword 2 Acknowledgements 5 Part 1: Setting the Scene 7 Disclaimer Introduction 9 The opinions, findings, and conclusions and recommendations in Signposting – How to read the Report 11 this Report reflect the views and opinions of the CyberPeace Institute Key Findings 15 alone, based on independent and discrete analysis, and do not indicate Recommendations 19 endorsement by any other national, regional or international entity. Part 2: Understanding the Threat Landscape 27 The designations employed and the presentation of the material in this publication do not express any opinion whatsoever on the part of the Chapter 1 Background 29 CyberPeace Institute concerning the legal status of any country, territory, 1.1 A convergence of threats to healthcare 29 city or area of its authorities, or concerning the delimitation of its 1.2 Healthcare as a target of choice 30 frontiers or boundaries. 1.3 Cybersecurity in the healthcare sector 32 Copyright Notice Chapter 2 Victims, Targets and Impact 35 2.1 A diversity of victims – the people 36 The concepts and information contained in this document are the 2.2 A typology of targets – healthcare organizations 38 property of the CyberPeace Institute, an independent non-profit 2.3 A variety of impacts on victims and targets 41 foundation headquartered in Geneva, unless otherwise indicated within the document. This document may be reproduced, in whole or in part, Chapter 3 Attacks 51 provided that the CyberPeace Institute is referenced as author and 3.1 Disruptive attacks – ransomware’s evolving threat to healthcare 52 copyright holder. 3.2 Data breaches – from theft to cyberespionage 57 3.3 Disinformation operations – an erosion of trust 59 © 2021 CyberPeace Institute. -
A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi. -
Gothic Panda Possibly Used Doublepulsar a Year Before The
Memo 17/05/2019 - TLP:WHITE Gothic Panda possibly used DoublePulsar a year before the Shadow Brokers leak Reference: Memo [190517-1] Date: 17/05/2019 - Version: 1.0 Keywords: APT, DoublePulsar, China, US, Equation Group Sources: Publicly available sources Key Points Gothic Panda may have used an Equation Group tool at least one year before the Shadow Brokers leak. It is unknown how the threat group obtained the tool. This is a good example of a threat actor re-using cyber weapons that were originally fielded by another group. Summary According research conducted by Symantec, the Chinese threat actor known as Gothic Panda (APT3, UPS, SSL Beast, Clandestine Fox, Pirpi, TG-0110, Buckeye, G0022, APT3) had access to at least one NSA-associated Equation Group tool a year before they were leaked by the Shadow Brokers threat actor. On April 14, 2017, a threat actor called the Shadow Brokers released a bundle of cyber-attack tools purportedly coming from the US NSA, also referred to as the Equation Group. Among the released material there was the DoublePulsar backdoor implant tool, which was used alongside EternalBlue in the May 2017 destructive WannaCry attack. DoublePulsar is a memory-based kernel malware that allows perpetrators to run arbitrary shellcode payloads on the target system. It does not write anything on the hard drive and will thus disappear once the victim machine is rebooted. Its only purpose is to enable dropping other malware or executables in the system. According to Symantec, Gothic Panda used the DoublePulsar exploit as early as in 2016, a full year before the Shadow Brokers release.