Pandalabs Annual Report 2018 Panda Security | Pandalabs Annual Report 2018

Total Page:16

File Type:pdf, Size:1020Kb

Pandalabs Annual Report 2018 Panda Security | Pandalabs Annual Report 2018 November, 2018 PandaLabs Annual Report 2018 Panda Security | PandaLabs Annual Report 2018 1. Introduction 3. Cyber-news 2018 2. PandaLabs: Threat Data in 2018 4. Data breaches - Pre-execution detections 5. Cybersecurity predictions 2019 - Examples of cases investigated by the laboratory - Malware incidents escalated to PandaLabs - The “Threat Mitigation Funnel” Panda Security | PandaLabs Annual Report 2018 Introduction: The State of Cybersecurity Panda Security | PandaLabs Annual Report 2018 4 Introduction: the State of Cybersecurity 2017 was the year when the word ransomware Most successful types of stopped being a term exclusive to cybersecurity attacks against companies experts and IT departments. The enormous media attention that attacks such as WannaCry and in 2018 Petya/GoldenEye received turned this type of threat into one of the key trends for businesses last year. However, as professionals in the sector know, highly publicized events must never serve as a risk indicator, nor influence on any security related decision. In this annual report, we at PandaLabs, Panda Security’s anti-malware laboratory, have reviewed the threat data gathered in the laboratory from our sensor sources. We include here data from endpoint security solutions deployed on our clients’ Prevalence of devices; the trends observed by our analysts whilst malware attacks they were providing file classification and threat hunting services; as well as the most relevant cybersecurity incidents reported around the world. And the information compiled in 2018 continues to reflect the prevalence of malware attacks, with 9 million malicious URLs and 2.4 million attacks blocked per million endpoints per month. 20.7% of machines studied experienced at least one malware attack during the period analyzed. Attacks utilizing RDP PandaLabs can state that the threats of file- based malware is not a problem for Panda Security, with infections trending to zero. This is due to the adoption of the model of 100% classification of all executable processes on systems, which can block any program that is unknown to Panda Security from running until it has been classified. In return, cybercriminals are evolving towards more insidious attacks, abusing existing software tools once they B manage to make their way onto the network. This leads us to believe that this kind of attack will increase in the future. Boom of cryptojacking and Ransomware as a Service Panda Security | PandaLabs Annual Report 2018 5 While traditional techniques – phishing, It is no surprise, therefore, that given this ransomware, business email compromise – seem to budgetary limitation, most corporate endpoints be as fruitful as ever, the boom of attacks utilizing are still protected by “traditional” technologies, RDP, combined with other social engineering which are not suitable for the cybersecurity techniques, is consolidated as an entry vector challenges of today. for attackers. If we add to this the boom of cryptojacking and Ransomware as a Service that Neither is it surprising how successful many we have seen this year, we have the three main attackers are, given that on average it takes them attack types that have successfully undermined much less time to compromise systems than company networks in 2018. it takes for them to be discovered. This lack of balance, along with a chronic lack of professionals The main target for attackers is still the endpoint. in the sector, will, once again, continue to This is where the most sensitive information is represent the main challenges for organizations stored, and where they can abuse credentials that when it comes to cybersecurity. allow them to carrying out lateral movements and attacking other networks and systems. However, the security budget for endpoint protection is approximately one third of that provided for network security. -Source: Gartner- Google trends: This chart confirms the fact that the GDPR has probably been the topic that has been of most interest in terms of search volume. GDPR Cambridge Analytica Meltdown y Spectre Panda Security | PandaLabs Annual Report 2018 PandaLabs: Threat Data in 2018 Panda Security | PandaLabs Annual Report 2018 7 PandaLabs: Threat Data in 2018 However, most malware is stopped from running signatures (specific and generic), heuristics, on the endpoint because phishing emails and behavior/context-based analysis, in-memory anti- URLs related to malware, the most common entry exploit, and the 100% Attestation and Threat vectors, are stopped by Panda Security. Hunting and Investigation services. These layers of protection are delivered both locally and from the In this report, we will present the threat data cloud. Figure 1 represents the set of techniques corresponding to the most significant layers of used depending on the attack method protection, as reported by our installed base of endpoint-based corporate products, which are: Figure 1. Protection technologies, attack methods and phases Pre-execution detections Most malware detected on protected endpoints On average, over 2.4 million malware files were in companies is identified using signatures and detected and over 9 million malware-related URLs heuristics. However, most malware is stopped from were blocked monthly per million endpoints. Most running on the endpoint because phishing emails of them were only seen once. and URLs related to malware are blocked. While the total amount of malware files that arrive at Analyzing the malware, the attack vectors and the endpoint is constantly growing (over 60% malicious codes on the rise in 2018, we can see from the start to the end of the period), the risk that the prevalence of the malware categories that file-based threats pose for our clients has detected in this stage hasn’t changed much over reduced dramatically, to marginal levels. This is the last year. Trojans and ransomware represent due to the efficiency of the integrated services, most of these threats. Relative to this, the via products and services, and in particular due blocking of Malware-related URLs (through direct to the “100% attestation” approach that Panda web interactions or through embedded URLs in Security has taken, which, by default, prevents emails) happens at over 3.7 times the rate of the execution of unknown executables until they malware file detections, representing the biggest are classified by PandaLabs. vector of entry for threats to the endpoint, together with brute-force attacks against RDP, an attack vector predicted at the start of the year. Panda Security | PandaLabs Annual Report 2018 8 Malware URLs blocked every Malware month per million 2,4 files 9 MILLION endpoints, per MILLION month We believe Internet-facing RDP connectivity Pre-execution classifications. represents a growing risk today for many organizations, which are unaware of their exposure. Since new types of malware are created and Falling victim to this attack technique means published more quickly than detection capabilities continually being scanned by cybercriminals are added, there is always a detection gap. This in search of easy opportunities to get onto generates inevitable infections of some “patient the company’s networks. The data recorded zero” users who don’t have a more robust or by PandaLabs corroborates the fact that complete protection. approximately 40% of our mid to large clients are subject to this kind of RDP attack every month. In order to close that gap and minimize infection risk for customers, in 2015, Panda Security As for the most common entry vectors and introduced a “100% Attestation Service”, which malicious codes this year, email continues to ensures that all Portable Executable (PE) files be one of the most popular vectors for attack trying to execute on the endpoints must be campaigns, although many of them end up in the classified as trusted by PandaLabs before being spam folder before they get to the endpoint. Users, allowed to run. This security service acts as the particularly when using mobile devices, are more last line of defense against file-based malware. exposed to malicious URLs or infected websites. In the period January-November, a monthly In this regard, websites infected with Coinhive average of approximately 5.8 million different code are becoming a more pervasive threat, as a executable files were observed per million less aggressive form of cryptomining. Coinhive, endpoints. While most of the files are repeated initially designed to allow website owners to earn from month to month, approximately 20% of them extra income without running advertisements, each month were unknown the first time they has emerged as a leading threat this year, with tried to run. 100% (99.98%) of these files were its code being installed on hacked sites without automatically classified, and an average of 1.3% the knowledge of the owners. This unauthorized were classified as malware. cryptomining service drains CPU cycles and power from devices for as long as the user visits the infected site. In fact, cryptomining has grown 3.5 times more than during the same period last year, whereas ransomware grew 2.5 times in the PandaLabs same period. In 2018, Monero miners represent Identified almost 70% of the total number of cryptominers identified. 5,8 MILLION per month Executable files Per million endpoints Panda Security | PandaLabs Annual Report 2018 9 Detection of attacks through behavioural The behavioural and contextual analysis and contextual analysis module The behavioral analysis module, which blocks blocked actions based on their context of execution, can recognize hundreds of combinations of processes, process relationships, actions, etc., which are indicative of early stage attacks of various types (ransomware, miners, script-based attacks, among 15 others). Paradoxically, due to the early prevention Thousand/month of the threat, it is impossible for us to determine the final nature of the threat, given that attackers Malicious actions may also use a combination of techniques Per million within the same attack. The introduction of endpoints these prevention techniques represented a major success in the fight against dangerous threats for our customers, such as ransomware.
Recommended publications
  • View Final Report (PDF)
    TABLE OF CONTENTS TABLE OF CONTENTS I EXECUTIVE SUMMARY III INTRODUCTION 1 GENESIS OF THE PROJECT 1 RESEARCH QUESTIONS 1 INDUSTRY SITUATION 2 METHODOLOGY 3 GENERAL COMMENTS ON INTERVIEWS 5 APT1 (CHINA) 6 SUMMARY 7 THE GROUP 7 TIMELINE 7 TYPOLOGY OF ATTACKS 9 DISCLOSURE EVENTS 9 APT10 (CHINA) 13 INTRODUCTION 14 THE GROUP 14 TIMELINE 15 TYPOLOGY OF ATTACKS 16 DISCLOSURE EVENTS 18 COBALT (CRIMINAL GROUP) 22 INTRODUCTION 23 THE GROUP 23 TIMELINE 25 TYPOLOGY OF ATTACKS 27 DISCLOSURE EVENTS 30 APT33 (IRAN) 33 INTRODUCTION 34 THE GROUP 34 TIMELINE 35 TYPOLOGY OF ATTACKS 37 DISCLOSURE EVENTS 38 APT34 (IRAN) 41 INTRODUCTION 42 THE GROUP 42 SIPA Capstone 2020 i The Impact of Information Disclosures on APT Operations TIMELINE 43 TYPOLOGY OF ATTACKS 44 DISCLOSURE EVENTS 48 APT38 (NORTH KOREA) 52 INTRODUCTION 53 THE GROUP 53 TIMELINE 55 TYPOLOGY OF ATTACKS 59 DISCLOSURE EVENTS 61 APT28 (RUSSIA) 65 INTRODUCTION 66 THE GROUP 66 TIMELINE 66 TYPOLOGY OF ATTACKS 69 DISCLOSURE EVENTS 71 APT29 (RUSSIA) 74 INTRODUCTION 75 THE GROUP 75 TIMELINE 76 TYPOLOGY OF ATTACKS 79 DISCLOSURE EVENTS 81 COMPARISON AND ANALYSIS 84 DIFFERENCES BETWEEN ACTOR RESPONSE 84 CONTRIBUTING FACTORS TO SIMILARITIES AND DIFFERENCES 86 MEASURING THE SUCCESS OF DISCLOSURES 90 IMPLICATIONS OF OUR RESEARCH 92 FOR PERSISTENT ENGAGEMENT AND FORWARD DEFENSE 92 FOR PRIVATE CYBERSECURITY VENDORS 96 FOR THE FINANCIAL SECTOR 96 ROOM FOR FURTHER RESEARCH 97 ACKNOWLEDGEMENTS 98 ABOUT THE TEAM 99 SIPA Capstone 2020 ii The Impact of Information Disclosures on APT Operations EXECUTIVE SUMMARY This project was completed to fulfill the including the scope of the disclosure and capstone requirement for Columbia Uni- the disclosing actor.
    [Show full text]
  • The Cyber Threat to UK Business 2016/2017 Report Page 1
    The cyber threat to UK business 2016/2017 Report Page 1 Contents Foreword (Ciaran Martin - NCSC) ..................................................................................................................................... 2 Foreword (Donald Toon - NCA) ........................................................................................................................................ 3 Executive summary ........................................................................................................................................................... 4 What is the threat? ........................................................................................................................................................... 5 The year in review: pivotal incidents of 2016 ................................................................................................................ 10 Horizon scanning: future threats .................................................................................................................................... 13 Fighting back: what can business do? ............................................................................................................................ 15 Case studies illustrating UK LEA and industry joint protect work ................................................................................. 19 Debate: can we stop the Internet from being used for crime? .................................................................................... 20 Page 2 The
    [Show full text]
  • Cyber Threats Facing America: an Overview of the Cybersecurity Threat Landscape
    S. Hrg. 115–298 CYBER THREATS FACING AMERICA: AN OVERVIEW OF THE CYBERSECURITY THREAT LANDSCAPE HEARING BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS FIRST SESSION MAY 10, 2017 Available via the World Wide Web: http://www.fdsys.gov/ Printed for the use of the Committee on Homeland Security and Governmental Affairs ( U.S. GOVERNMENT PUBLISHING OFFICE 27–390 PDF WASHINGTON : 2018 COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS RON JOHNSON, Wisconsin, Chairman JOHN MCCAIN, Arizona CLAIRE MCCASKILL, Missouri ROB PORTMAN, Ohio THOMAS R. CARPER, Delaware RAND PAUL, Kentucky JON TESTER, Montana JAMES LANKFORD, Oklahoma HEIDI HEITKAMP, North Dakota MICHAEL B. ENZI, Wyoming GARY C. PETERS, Michigan JOHN HOEVEN, North Dakota MAGGIE HASSAN, New Hampshire STEVE DAINES, Montana KAMALA D. HARRIS, California CHRISTOPHER R. HIXON, Staff Director GABRIELLE D’ADAMO SINGER, Chief Counsel COLLEEN BERNY, Professional Staff Member MARGARET E. DAUM, Minority Staff Director JULIE KLEIN, Minority Professional Staff Member LAURA W. KILBRIDE, Chief Clerk BONNI DINERSTEIN, Hearing Clerk (II) C O N T E N T S Opening statements: Page Senator Johnson ............................................................................................... 1 Senator McCaskill ............................................................................................ 2 Senator Lankford .............................................................................................. 15 Senator Daines
    [Show full text]
  • Hack Para Big Time 2019 New Inazuma Eleven GO 2K19 Mini Forum, Answers, Tips, Tricks and Glitches
    hack para big time 2019 New Inazuma Eleven GO 2K19 Mini Forum, Answers, Tips, Tricks and Glitches. Ask a Question or Help other Players by Answering the Questions on the List Below: Rate this app: More details. For Android: 4.0 and up Guide: New Inazuma Eleven GO 2K19 cheats tutorial When updated: 2019-06-30 Star Rating: 4.1952863 Name: New Inazuma Eleven GO 2K19 hack for android Extension: Apk Author: NGmer File Name: inazuma.newtips.eleventips.soccerguide Current Version: 2.1 User Rating: Everyone Downloads: 1000- Version: mod, apk, unlock System: Android Type: Education. Share New Inazuma Eleven GO 2K19 Cheats Guides Hints And Tutorials - Best Tactics from Users below. New Inazuma Eleven GO 2K19 Tricks and Codes: Add your tips. Hints and Tips: Glitches: Codes: Guide: Easter Eggs: Advice for new users: Please wait 10 seconds. New Inazuma Eleven GO 2K19 Hack Cheats Codes Tips Tricks Advices for New Users and Q&A! Add your questions or answers. Q: How to get the best score? Q: What is your favourite trick in this game/app? Q: What is your strategy? Watch New Inazuma Eleven GO 2K19 videoreviews, gameplays, videoinstructions, tutorials, guides, tips and tricks recorded by users, pro players and testers. New Inazuma Eleven GO 2K19 Gameplay, Trailers and Related Videos. Watch Inazuma Eleven Go Strikers 2013 Raimon GO 2.0 Vs Inazuma Legend Japan Wii 1080p (Dolphin/Gameplay) video. Watch NBA 2K19 ► MY PRO PLAYER #19 - ON LES EXPLOOOOSE video. Watch Mashup || Inazuma Eleven GO opening 2 VS Sincara WWE || video. Watch Inazuma Eleven Go Strikers 2013 Part3 video.
    [Show full text]
  • État Des Malwares 2019
    État des malwares 2019 Préparé par ÉTAT DES MALWARES EN 2019 Table des matières Résumé ��������������������������������������������������������������������������� 3 Arnaques notables ������������������������������������������������������ 29 Méthodologie �����������������������������������������������������������������3 Pratiques commerciales exploitables ����������������� 29 Les 10 enseignements clés ����������������������������������������� 4 Ciblage d’informations d’identification personnelle ��������29 Palmarès des menaces détectées en 2018 ��������������� 6 Sextorsion �������������������������������������������������������������������� 29 Affaiblir l'ennemi ��������������������������������������������������������� 30 Menaces détectées chez les consommateurs ����6 Pour voir plus loin ������������������������������������������������������ 30 Menaces détectées dans les entreprises �������������7 Prévisions 2019 ������������������������������������������������������������ 31 Menaces régionales �����������������������������������������������������8 Menaces par pays ����������������������������������������������������� 10 Conclusion �������������������������������������������������������������������� 33 Menaces par secteur ������������������������������������������������ 11 Contributeurs ��������������������������������������������������������������� 33 Malwares notables ������������������������������������������������������ 13 Programmes de minage de cryptomonnaies���������������� 13 Chevaux de Troie �������������������������������������������������������
    [Show full text]
  • Bashe Attack Global Infection by Contagious Malware 2
    CyRiM Report 2019 Bashe attack Global infection by contagious malware 2 About CyRiM About Cambridge Centre for Risk Studies Cyber risks are emerging risk with new complexities that The Centre for Risk Studies is a world leading centre for call for insurers and risk managers to jointly develop the study of the management of economic and societal innovative solutions and tools, and enhance awareness risks. The Centre’s focus is the analysis, assessment, and underwriting expertise. and mitigation of global vulnerabilities for the The Cyber Risk Management (CyRiM) project is led by advancement of political, business, and individual NTU-IRFRC in collaboration with industry partners and decision makers. academic experts. CyRiM is a pre-competitive research project that aims to foster an efficient cyber risk The Centre provides frameworks for recognizing, insurance market place through engaging industry and assessing, and managing the impacts of systemic academic experts guided by government and policy level threats. The research programme is concerned with research. The CyRiM project will help Singapore to catastrophes and how their impacts ripple across an become an industry centre of excellence on cyber risk increasingly connected world with consequent effects on and grow the cyber risk insurance market by promoting the international economy, financial markets, firms in the both the demand and the supply of insurance coverage. financial sectors, and global corporations. To test research outputs and guide new research agendas, the For more information about CyRiM please visit Centre engages with the business community, http://irfrc.ntu.edu.sg/Research/cyrim/Pages/Home.aspx government policy makers, regulators, and industry bodies.
    [Show full text]
  • Cyber Crime the Threat to Small and Medium Sized Businesses Cyber Crime: What Does It Mean for You?
    Cyber Crime The threat to small and medium sized businesses Cyber Crime: What does it mean for you? Technology is at the core of our cyber criminals to gain control over It’s critical that you are up-to-speed everyday lives, so much so that for the computer systems of a large on what criminals are doing and – many of us it’s difficult to remember entertainment corporation while more importantly – what you can a time without mobile phones, hackers were able to gain access do to minimise the likelihood of computers, email and the internet. to millions of a global eCommerce becoming the victim of these types company’s customer records. of attacks. To that end, we also focus These innovations have changed the on educating our customers, which is way we connect with one another, What might be surprising, however, why, in addition to online resources1 both on a personal and business is that in their most recent Internet we’ve developed this overview to level. Technology has played a key Security Threat Report, Symantec give you a snapshot of the cyber role in how the world economy found that 60% of all targeted crime landscape in general, as well has evolved over the course of attacks were levelled against as in terms of specific threats to the last decade, but it’s also given small and medium-sized (SME) small and medium sized businesses criminals new tools for gaining businesses. One reason for this is like yours. In the pages that follow access to information and funds.
    [Show full text]
  • 2018 Midyear Security Roundup: Unseen Threats, Imminent Losses DATA
    Unseen Threats, Imminent Losses 2018 Midyear Security Roundup TREND MICRO LEGAL DISCLAIMER Contents The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The 04 information contained herein may not be applicable to all situations and may not reflect the most current situation. Serious vulnerabilities discovered in Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the hardware make patching even more particular facts and circumstances presented and nothing challenging herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. 09 Translations of any material into other languages are intended solely as a convenience. Translation accuracy Cryptocurrency mining detections more is not guaranteed nor implied. If any questions arise than doubles while ransomware remains related to the accuracy of a translation, please refer to the original language official version of the document. Any an enterprise threat discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 14 Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro Mega breaches rise even as GDPR makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree penalties loom that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied.
    [Show full text]
  • Information Assurance MELANI
    Federal IT Steering Unit FITSU Federal Intelligence Service FIS Reporting and Analysis Centre for Information Assurance MELANI www.melani.admin.ch/ INFORMATION ASSURANCE SITUATION IN SWITZERLAND AND INTERNATIONALLY Semi-annual report 2016/II (July – December) 20 APRIL 2017 REPORTING AND ANALYSIS CENTRE FOR INFORMATION ASSURANCE MELANI https://www.melani.admin.ch 1 Overview/content 1 Overview/content .............................................................................................. 2 2 Editorial ............................................................................................................. 5 3 Key topic: internet of things ............................................................................ 6 3.1 Definition ............................................................................................................. 6 3.2 The unsecure internet of things? ....................................................................... 7 3.3 Consequences for the future .............................................................................. 7 3.4 Guidelines and precautionary measures ........................................................... 8 4 Situation in Switzerland ................................................................................... 9 4.1 Espionage ............................................................................................................ 9 4.1.1 Switzerland as an indirect target of possible espionage activity ................................... 9 4.2 Data leaks .........................................................................................................
    [Show full text]
  • United Kingdom Threat Landscape
    United Kingdom Threat Landscape 1 © 2018 Anomali, Inc. All rights reserved. General Inormation Government: Parliamentary constitutional monarchy; a Commonwealth realm Capital: London Chief of State: Prime Minister Theresa May Natural Resources: Coal, petroleum, natural gas, iron ore, lead, zinc, gold, tin, limestone, salt, clay, chalk, gypsum, potash, silica sand, slate, arable land Societal Grievances: Brexit, gay marriage, LGBT rights, forced deportation, racism, surveillance, gender workplace diversity, women’s rights, future of the NHS, US President Trump APT Groups: APT3, Lazarus, APT10, APT17, Comment Crew, Axiom, Night Dragon, APT15, FIN4, APT28 Hacktivist Groups: Anonymous, Null Hacking Crew, Lizard Squad, Syrian Electronic Army, TurkHackTeam, AnonGhost, Lulzsec Extremist Groups: New IRA1, ISIS, National Action (NS131/Scottish Dawn), Al-Qaeda Criminal Groups: Albanian Mafia, Tottenham Mandem, Rathkeale Rovers Malware Families: Ramnit, Dridex, Trickbot, Carbanak, Odinaff, WannaCry, Dyre International Threat Landscape Libya and again operations over Iraq and Syria.”8 The UK’s decision to leave the European Union has caused The United Kingdom (UK) is a permanent member of the concern amongst foreign policy analysts that believe the 2 United Nations Security Council , a founding member UK’s global diplomatic influence will decline because the 3 of the North Atlantic Treaty Organization (NATO) , the UK will no longer vote on decisions impacting the EU9. Council of Europe, the Organization for Security and Co-operation in Europe (OSCE), the Organisation for The UK has contributed to the war against ISIS in Iraq Economic Co-operation and Development (OECD), and and Syria and is home to a number of individuals who the World Trade Organisation (WTO), among others.
    [Show full text]
  • Informe De Tendències - 2N Trimestre 2018
    Informe de Tendències - 2n Trimestre 2018 1 Informe de Tendències - 2n Trimestre 2018 El contingut d’aquesta guia és titularitat de la Fundació Centre de Seguretat de la Informació de Catalunya i resta subjecta a la llicència de Creative Commons BY-NC-ND. L’autoria de l’obra es reconeixerà a través de la inclusió de la menció següent: Obra titularitat de la Fundació Centre de Seguretat de la Informació de Catalunya. Llicenciada sota la llicència CC BY-NC-ND. Aquesta guia es publica sense cap garantia específica sobre el contingut. Aquesta llicència té les particularitats següents: Vostè és lliure de: Copiar, distribuir i comunicar públicament l’obra. Sota les condicions següents: Reconeixement: S’ha de reconèixer l’autoria de l’obra de la manera especificada per l’autor o el llicenciador (en tot cas, no de manera que suggereixi que gaudeix del suport o que dóna suport a la seva obra). No comercial: No es pot emprar aquesta obra per a finalitats comercials o promocionals. Sense obres derivades: No es pot alterar, transformar o generar una obra derivada a partir d’aquesta obra. Avís: En reutilitzar o distribuir l’obra, cal que s’esmentin clarament els termes de la llicència d’aquesta obra. El text complet de la llicència es pot consultar a https://creativecommons.org/licenses/by-nc-nd/4.0/deed.ca 2 Informe de Tendències - 2n Trimestre 2018 Índex Introducció ..................................................................................................................... 5 Visió general .................................................................................................................
    [Show full text]
  • Cyber-Terrorism Activities Report No. 14 July – September 2015
    ICT Cyber-Desk PERIODIC REVIEW Cyber-Terrorism Activities Report No. 14 July – September 2015 International Institute for Counter Terrorism (ICT) Additional resources are available on the ICT Website: www.ict.org.il Highlights This report covers the period of July - September 2015 and covers two main subjects: cyber- terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse) and cyber- crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report: Islamic State supporters continued to publish and distribute guidebooks and informational materials on the topic of information security and maintaining anonymity online: “personal computer security”, “smart phone security”, how to post informational material on Twitter using several accounts simultaneously, how to inspect files and links infected with viruses, how to open a Twitter account without a cell phone number, how to use encrypted email, and more. During this period, we continued to see cooperation between players affiliated with the Islamic State, such as Cyber Caliphate, IS Hacking Division and ISIS Cyber Army, and hacker groups that began to identify with the organization. For instance, it was reported that a hacker named Ardit Ferizi stole personal details about US army and government personnel that he sent to members of the organization, who then leaked the information under the name “Cyber Caliphate”. Members and supporters of the Islamic State continued to hack Web sites and social networks, and leak the information obtained. During this period, we witnessed a “spam campaign” – a virtual campaign that called on Islamic State supporters to report Twitter accounts belonging to opponents of the organization as spam in order to have them closed.
    [Show full text]