Guardian of the Galaxy: EU Cyber Sanctions and Norms in Cyberspace

Total Page:16

File Type:pdf, Size:1020Kb

Guardian of the Galaxy: EU Cyber Sanctions and Norms in Cyberspace CHAILLOT PAPER / PAPER CHAILLOT 155 GUARDIAN OF GUARDIAN OF THE GALAXY THE GALAXY GUARDIAN OF THE GALAXY EU cyber sanctions and | EU CYBER SANCTIONS AND NORMS IN CYBERSPACE SANCTIONS EU CYBER norms in cyberspace Edited by Patryk Pawlak and Thomas Biersteker With contributions from Karine Bannelier, Nikolay Bozhkov, François Delerue, Francesco Giumelli, Erica Moret, Maarten Van Horenbeeck CHAILLOT PAPER / 155 October 2019 European Union Institute for Security Studies (EUISS) 100, avenue de Suffren 75015 Paris http://www.iss.europa.eu Director: Gustav Lindstrom © EU Institute for Security Studies, 2019. Reproduction is authorised, provided the source is acknowledged, save where otherwise stated. The views expressed in this publication are solely those of the authors and do not necessarily reflect the views of the EUISS or of the European Union. print ISBN 978-92-9198-849-5 online ISBN 978-92-9198-850-1 CATALOGUE NUMBER QN-AA-19-005-EN-C CATALOGUE NUMBER QN-AA-19-005-EN-N ISSN 1017-7566 ISSN 1683-4917 DOI 10.2815/04457 DOI 10.2815/672270 Published by the EU Institute for Security Studies and printed in Belgium by Bietlot. Luxembourg: Publications Office of the European Union, 2019. Cover image credit: NASA/JPL-Caltech GUARDIAN OF THE GALAXY EU cyber sanctions and norms in cyberspace Edited by Patryk Pawlak and Thomas Biersteker With contributions from Karine Bannelier, Nikolay Bozhkov, François Delerue, Francesco Giumelli, Erica Moret, Maarten Van Horenbeeck CHAILLOT PAPER / 155 October 2019 Acknowledgements This Chaillot Paper is the outcome of several months of reflection and discussions conduct- ed in the framework of the EUISS Task Force on Restrictive Measures Related to Malicious Activities in Cyberspace (hereafter ‘EUISS Task Force on Cyber Sanctions’). The Task Force met on numerous occasions between October 2018 and July 2019 and organised several focus group The editors meetings with representatives of the EU insti- tutions and member states. The content of this Patryk Pawlak heads the Brussels office volume reflects only some of the discussions of the EUISS, where he is responsible for that took place during those meetings. inter-institutional relations and coordination of cyber-related projects. The editors would like to thank the following members of the Task Force for their contri- Thomas Biersteker is Gasteyger Professor of bution to several sections of this publication: International Security and Director of Policy Karine Bannelier (chapter 6), Nikolay Bozhkov Research at the Graduate Institute, Geneva. (chapters 1, 2, 3), François Delerue (chapters 4 and 5), Francesco Giumelli (chapters 1, 3 and 8), Erica Moret (chapters 1, 3 and 8), and Maarten Van Horenbeeck (chapters 1, 5 and 8). The EUISS Chaillot Paper series In addition, we would like to express our grat- The Chaillot Paper series, launched in 1991, itude to all EU and member state officials for takes its name from the Chaillot hill in the their inputs and comments. Finally, this vol- Trocadéro area of Paris, where the Institute’s ume has benefited from the work and input first premises were located in the building oc- of EUISS colleagues: Florence Gaub and Clara cupied by the Western European Union (WEU). Portela provided insightful comments on the The hill is particularly famous for the Palais de text, Gearóid Cronin took care of the language Chaillot which was the site of the signing of the editing, and Christian Dietrich created the info- UN Universal Declaration of Human Rights in graphics. As always, any mistakes or omissions 1948, and housed NATO’s provisional head- are those of the authors alone. quarters from 1952 until 1959. 1 CONTENTS Executive Summary 2 INTRODUCTION CHAPTER 5 The heroine awakens 3 Cosmic dust 52 The EU as a sanctioning power Attribution and evidentiary standards CHAPTER 1 CHAPTER 6 Navigating the stars 13 Laws of gravitation 62 Ten questions to make cyber sanctions more effective Due diligence obligations in cyberspace CHAPTER 2 CHAPTER 7 Cyberspace debris 21 Multiple moons 70 Sanctions and responsible state behaviour Cyber sanctions and the role of the private sector CHAPTER 3 CHAPTER 8 Space exploration 33 Galactic collision 79 Mapping the EU’s cyber sanctions regime Cyber sanctions and real-world consequences CHAPTER 4 CONCLUSIONS Mission controls 43 Escaping the black hole 87 Sanctions under international law Implementation of the EU’s cyber sanctions Abbreviations 100 Notes on the contributors 102 2 Guardian of the Galaxy | EU cyber sanctions and norms in cyberspace EXECUTIVE SUMMARY Cyberspace is not an ungoverned space. Exist- political foundations, suggest that it is not yet ing international law and accepted norms of the time for self-congratulation. responsible behaviour provide clear guidance on what is and what is not permissible in cy- Taking account of the lessons derived from berspace. And yet, states increasingly rely on other sanctions regimes adopted by the EU in cyber operations to achieve their political ob- the past, this Chaillot Paper addresses a number jectives and strategic goals: whether through of key issues relevant for ensuring the max- industrial cyber-espionage to give competitive imum effectiveness of the EU’s cyber sanc- advantage to domestic companies, sophisticat- tions regime: ed operations to steal military secrets, or bla- tant attacks targeting the critical infrastructure 1. Clarity about the logic behind the use of cy- of other states. ber sanctions; 2. Potential impact of the sanctions on the This widespread sense of impunity has driv- EU’s overall bilateral relations, and their in- en the European Union and its member states terplay with other foreign and security poli- to support regional and global efforts to en- cy instruments; sure that the perpetrators of the attacks face 3. Objectives that specific listings aim the consequences and that their victims are to achieve; adequately protected and compensated. The 4. Adequate timing and longevity of the listings; so-called Cyber Diplomacy Toolbox adopted by 5. Understanding of the target; the EU in 2017 provided a significant boost to the 6. Sufficient capabilities and resources; Union’s goal of becoming a ‘forward-looking 7. Mechanisms for coordination and informa- cyber player’. In addition to a number of dip- tion sharing; lomatic and operational measures, the toolbox 8. Cooperation and coordination with interna- proposed the use of sanctions as one of the in- tional partners; struments at the Union’s disposal. 9. Engagement with the private sector; 10. Clear strategic communication. This Chaillot Paper – which uses space ex- ploration as a metaphor to demystify some In tackling these questions, the contributors to of the concepts and challenges linked to this publication provide insights into a num- cyber-related policymaking – focuses on the ber of complicated issues of a political and EU’s cyber sanctions regime as established by legal nature, including the challenges of attri- Council Decision 2019/797 and Council Regu- bution, state responsibility in cyberspace, the lation 2019/796. The EU’s autonomous cyber principle of due diligence or the potential im- sanctions regime – encompassing measures pact of cyber sanctions on the physical world. such as travel bans and asset freezes – repre- The analysis concludes with a set of proposals sents a significant achievement on the EU’s aimed at stimulating the discussion about the path to promote a free, open and secure cyber- implementation of the EU cyber sanctions re- space and defend the rules-based international gime – and which will hopefully lead to con- order. However, the growing complexity of cy- crete actions. ber threats and the proliferation of malicious actors intent on undermining the EU’s global standing, as well as its economic power and 3 INTRODUCTION THE HEROINE AWAKENS The EU as a sanctioning power The Guardians of the Galaxy is an American mov- and the EU do their best to provide security and ie production about the adventures of interga- justice for all by bringing those accountable for lactic superheroes who together fight to protect misdemeanours to justice. the galaxy from planetary threats. They suc- ceed in vanquishing Ronan – a fanatical geno- cidal warlord seeking to undermine the peace Monsters in cyberspace treaty between the Kree Empire and the Nove Empire. They also slay the Abilisk – a Cyberspace is full of malicious computer worms multi-dimensional tentacled monster con- and viruses whose sophisticated names re- suming the power resources of the Sovereign semble those of the villains in sci-fi movies. planet. Despite their different backgrounds, Stuxnet, a multidimensional giant worm first they form a unique alliance to save the galaxy. uncovered in 2010, was respon- sible for causing substantial So what is the link between a n this new era damage to Iran’s nuclear pro- group of intergalactic heroes gramme. In May 2017, a shape- and the European Union? First, a I of interstate shifting villain, WannaCry, strong desire to save their home. competition, the affected more than 200,000 Like the fictional Guardians, the cyber domain is computers in over 150 countries EU understands that ultimate- used by states causing extensive damage esti- ly there is no sanctuary from mated at hundreds of millions of cyber threats. For this reason, as an equaliser euro.1 Several months later, the strengthening your own capaci- for levelling Danish shipping company A.P. ties and those of your partners is the geopolitical Moller-Maersk, among oth- often the best way forward. Like playing field. ers, suffered from an attack by the Guardians, the EU’s strength NotPetya – a mutant version of comes from the qualities and WannaCry – that cost their busi- powers of its individual members – despite dif- ness an estimated €200-300 million. ferent personalities and distinctive individual character traits. Finally, the threats they face Beyond monsters and villains, there are often are constantly evolving – whether travelling powerful puppet masters who are not averse through the galaxy or different jurisdictions of to resorting to cyber tactics to pursue their the sovereign states.
Recommended publications
  • Game Console Rating
    Highland Township Public Library - Video Game Collection Updated January 2020 Game Console Rating Abzu PS4, XboxOne E Ace Combat 7: Skies Unknown PS4, XboxOne T AC/DC Rockband Wii T Age of Wonders: Planetfall PS4, XboxOne T All-Stars Battle Royale PS3 T Angry Birds Trilogy PS3 E Animal Crossing, City Folk Wii E Ape Escape 2 PS2 E Ape Escape 3 PS2 E Atari Anthology PS2 E Atelier Ayesha: The Alchemist of Dusk PS3 T Atelier Sophie: Alchemist of the Mysterious Book PS4 T Banjo Kazooie- Nuts and Bolts Xbox 360 E10+ Batman: Arkham Asylum PS3 T Batman: Arkham City PS3 T Batman: Arkham Origins PS3, Xbox 360 16+ Battalion Wars 2 Wii T Battle Chasers: Nightwar PS4, XboxOne T Beyond Good & Evil PS2 T Big Beach Sports Wii E Bit Trip Complete Wii E Bladestorm: The Hundred Years' War PS3, Xbox 360 T Bloodstained Ritual of the Night PS4, XboxOne T Blue Dragon Xbox 360 T Blur PS3, Xbox 360 T Boom Blox Wii E Brave PS3, Xbox 360 E10+ Cabela's Big Game Hunter PS2 T Call of Duty 3 Wii T Captain America, Super Soldier PS3 T Crash Bandicoot N Sane Trilogy PS4 E10+ Crew 2 PS4, XboxOne T Dance Central 3 Xbox 360 T De Blob 2 Xbox 360 E Dead Cells PS4 T Deadly Creatures Wii T Deca Sports 3 Wii E Deformers: Ready at Dawn PS4, XboxOne E10+ Destiny PS3, Xbox 360 T Destiny 2 PS4, XboxOne T Dirt 4 PS4, XboxOne T Dirt Rally 2.0 PS4, XboxOne E Donkey Kong Country Returns Wii E Don't Starve Mega Pack PS4, XboxOne T Dragon Quest 11 PS4 T Highland Township Public Library - Video Game Collection Updated January 2020 Game Console Rating Dragon Quest Builders PS4 E10+ Dragon
    [Show full text]
  • Internet Infrastructure Review Vol.27
    Internet Infrastructure Vol.27 Review May 2015 Infrastructure Security Increasingly Malicious PUAs Messaging Technology Anti-Spam Measure Technology and DMARC Trends Web Traffic Report Report on Access Log Analysis Results for Streaming Delivery of the 2014 Summer Koshien Inte r ne t In f r ast r uc t ure Review Vol.27 May 2015 Executive Summary ———————————————————3 1. Infrastructure Security ———————————————4 Table of Contents Table 1.1 Introduction —————————————————————— 4 1.2 Incident Summary ——————————————————— 4 1.3 Incident Survey ——————————————————— 11 1.3.1 DDoS Attacks —————————————————————— 11 1.3.2 Malware Activities ———————————————————— 13 1.3.3 SQL Injection Attacks —————————————————— 16 1.3.4 Website Alterations ——————————————————— 17 1.4 Focused Research —————————————————— 18 1.4.1 Increasingly Malicious PUAs —————————————— 18 1.4.2 ID Management Technology: From a Convenience and Security Perspective ————— 22 1.4.3 Evaluating the IOCs of Malware That Reprograms HDD Firmware —————————————————————— 25 1.5 Conclusion —————————————————————— 27 2. Messaging Technology —————————————— 28 2.1 Introduction ————————————————————— 28 2.2 Spam Trends ————————————————————— 28 2.2.1 Spam Ratios Decline Further in FY2014 ————————— 28 2.2.2 Higher Risks Despite Lower Volumes —————————— 29 2.3 Trends in Email Technologies ——————————— 29 2.3.1 The DMARC RFC ————————————————————— 29 2.3.2 Problems with DMARC and Reporting —————————— 30 2.3.3 Use of DMARC by Email Recipients ——————————— 30 2.3.4 Domain Reputation ——————————————————— 31 2.3.5
    [Show full text]
  • Gothic Panda Possibly Used Doublepulsar a Year Before The
    Memo 17/05/2019 - TLP:WHITE Gothic Panda possibly used DoublePulsar a year before the Shadow Brokers leak Reference: Memo [190517-1] Date: 17/05/2019 - Version: 1.0 Keywords: APT, DoublePulsar, China, US, Equation Group Sources: Publicly available sources Key Points Gothic Panda may have used an Equation Group tool at least one year before the Shadow Brokers leak. It is unknown how the threat group obtained the tool. This is a good example of a threat actor re-using cyber weapons that were originally fielded by another group. Summary According research conducted by Symantec, the Chinese threat actor known as Gothic Panda (APT3, UPS, SSL Beast, Clandestine Fox, Pirpi, TG-0110, Buckeye, G0022, APT3) had access to at least one NSA-associated Equation Group tool a year before they were leaked by the Shadow Brokers threat actor. On April 14, 2017, a threat actor called the Shadow Brokers released a bundle of cyber-attack tools purportedly coming from the US NSA, also referred to as the Equation Group. Among the released material there was the DoublePulsar backdoor implant tool, which was used alongside EternalBlue in the May 2017 destructive WannaCry attack. DoublePulsar is a memory-based kernel malware that allows perpetrators to run arbitrary shellcode payloads on the target system. It does not write anything on the hard drive and will thus disappear once the victim machine is rebooted. Its only purpose is to enable dropping other malware or executables in the system. According to Symantec, Gothic Panda used the DoublePulsar exploit as early as in 2016, a full year before the Shadow Brokers release.
    [Show full text]
  • Cyberwar: the ISIL Threat & Resiliency in Operational Technology
    Cyberwar: The ISIL Threat & Resiliency in Operational Technology Thesis Presented to the Faculty of the Department of Information and Logistics Technology University of Houston In Partial Fulfillment of the Requirements for the Degree Master’s of Information Systems Security By Gregory S. Anderson May 2017 Cyberwar: The ISIL Threat & Resiliency in Operational Technology ____________________________________ Gregory S. Anderson Approved: Committee Chair: ____________________________________ Wm. Arthur Conklin, PhD Computer Information Systems and Information System Security Committee Member: ____________________________________ Chris Bronk, PhD Computer Information Systems and Information System Security Committee Member: ____________________________________ Paula deWitte, PhD Computer Information Systems and Information System Security ____________________________________ ____________________________________ Rupa Iyer, PhD Dan Cassler Associate Dean for Research and Graduate Interim Chair for Department of Information Studies, College of Technology and Logistics Technology THIS PAGE INTENTIONALLY LEFT BLANK Acknowledgments First, I would like to thank Dr. Chris Bronk and Dr. Art Conklin for their support and guidance throughout my time at the University of Houston. Their dedication to students is unparalleled for any other professor I have come across during my education. I would also like to thank my family for their ongoing encouragement and love. The fostering environment to peruse knowledge and “never settle for less” has been a constant inspiration throughout my life. Lastly, to my partner of 7 years, Lorelei. None of my achievements these past few years would have come to fruition without her continuous love, support, and willingness to sacrifice for the greater good is deeply appreciated. Thank you for being the most patient and steadfast person I have ever known, I love you.
    [Show full text]
  • Make Technology Great Again
    Make Technology Great Again Michał „rysiek” Woźniak [email protected] Everything is Broken – Quinn Norton https://medium.com/message/everything-is-broken-81e5f33a24e1 "Malicious Word Doc Uses ActiveX To Infect" https://www.vmray.com/blog/malicious-word-doc-uses-activex-infect/ "Word Malware: OLE Exploited in Zero-Day Attack" https://www.vadesecure.com/en/word-doc-malware/ "Dynamic Data Exchange was frst introduced in 1987 with the release of Windows 2.0” https://en.wikipedia.org/wiki/Dynamic_Data_Exchange "As part of the December 2017 Patch Tuesday, Microsoft has shipped an Ofce update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware.” https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word- to-prevent-further-malware-attacks/ "Dynamic Data Exchange was frst introduced in 1987 with the release of Windows 2.0” https://en.wikipedia.org/wiki/Dynamic_Data_Exchange "As part of the December 2017 Patch Tuesday, Microsoft has shipped an Ofce update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware.” https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word- to-prevent-further-malware-attacks/ "Microsoft Ofce macro malware targets Macs" https://blog.malwarebytes.com/cybercrime/2017/02/microsoft-ofce-macro- malware-targets-macs/ "Beware PowerSniff Malware uses Word macros and PowerShell scripts" https://www.grahamcluley.com/beware-powersnif-malware/
    [Show full text]
  • Avengers Dissemble! Transmedia Superhero Franchises and Cultic Management
    Taylor 1 Avengers dissemble! Transmedia superhero franchises and cultic management Aaron Taylor, University of Lethbridge Abstract Through a case study of The Avengers (2012) and other recently adapted Marvel Entertainment properties, it will be demonstrated that the reimagined, rebooted and serialized intermedial text is fundamentally fan oriented: a deliberately structured and marketed invitation to certain niche audiences to engage in comparative activities. That is, its preferred spectators are often those opinionated and outspoken fan cultures whose familiarity with the texts is addressed and whose influence within a more dispersed film- going community is acknowledged, courted and potentially colonized. These superhero franchises – neither remakes nor adaptations in the familiar sense – are also paradigmatic byproducts of an adaptive management system that is possible through the appropriation of the economics of continuity and the co-option of online cultic networking. In short, blockbuster intermediality is not only indicative of the economics of post-literary adaptation, but it also exemplifies a corporate strategy that aims for the strategic co- option of potentially unruly niche audiences. Keywords Marvel Comics superheroes post-cinematic adaptations Taylor 2 fandom transmedia cult cinema It is possible to identify a number of recent corporate trends that represent a paradigmatic shift in Hollywood’s attitudes towards and manufacturing of big budget adaptations. These contemporary blockbusters exemplify the new industrial logic of transmedia franchises – serially produced films with a shared diegetic universe that can extend within and beyond the cinematic medium into correlated media texts. Consequently, the narrative comprehension of single entries within such franchises requires an increasing degree of media literacy or at least a residual awareness of the intended interrelations between correlated media products.
    [Show full text]
  • Star of Malware Galaxy
    Star of Malware Galaxy By GReAT on February 16, 2015. 6:55 pm Download “Equation group: questions and answers” PDF “Houston, we have a problem” One sunny day in 2009, Grzegorz Brzęczyszczykiewicz1 embarked on a flight to the burgeoning city of Houston to attend a prestigious international scientific conference. As a leading scientist in his field, such trips were common for Grzegorz. Over the next couple of days, Mr Brzęczyszczykiewicz exchanged business cards with other researchers and talked about the kind of important issues such high level scientists would discuss (which is another way of saying “who knows?”). But, all good things must come to an end; the conference finished and Grzegorz Brzęczyszczykiewicz flew back home, carrying with him many highlights from a memorable event. Sometime later, as is customary for such events, the organizers sent all the participants a CDROM carrying many beautiful pictures from the conference. As Grzegorz put the CDROM in his computer and the slideshow opened, he little suspected he had just became the victim of an almost omnipotent cyberespionage organization that had just infected his computer through the use of three exploits, two of them being zero-days. A rendezvous with the “God” of cyberespionage It is not known when the Equation2 group began their ascent. Some of the earliest malware samples we have seen were compiled in 2002; however, their C&C was registered in August 2001. Other C&Cs used by the Equation group appear to have been registered as early as 1996, which could indicate this group has been active for almost two decades.
    [Show full text]
  • NEW THIS WEEK from MARVEL... Wolverine #1 Guardians of the Galaxy #2 Fantastic Four #19 Captain America #19 Daredevil #18 New Mu
    NEW THIS WEEK FROM MARVEL... Wolverine #1 Guardians of the Galaxy #2 Fantastic Four #19 Captain America #19 Daredevil #18 New Mutants #7 Captain Marvel #15 Deadpool #3 Marauders #8 Marvels Voices #1 Revenge of Cosmic Ghost Rider #3 (of 5) Conan the Barbarian #13 Amazing Mary Jane #5 Valkyrie Jane Foster #8 2020 Machine Man #1 (of 2) Ghost-Spider #7 Marvels Black Widow Prelude #2 (of 2) Atlantis Attacks #2 (of 5) Runaways #30 True Believers Iron Man 2020 Jocasta ($1) NEW THIS WEEK FROM DC... Batman #89 Dceased Unkillables #1 (of 3) Justice League #41 Flash Forward #6 (of 6) Legion of Super Heroes #4 Nightwing #69 Teen Titans #39 Aquaman #57 Joker Killer Smile #3 (of 3) Low Low Woods #3 (of 6) Wonder Woman Dead Earth #2 (of 4) Superman's Pal Jimmy Olsen #8 (of 12) Wonder Twins #12 (of 12) Titans Burning Rage #7 (of 7) Wonder Woman Giant #3 Lucifer #17 Superman Smashes the Klan #3 (of 3) Dollar Comics New Teen Titans #2 NEW THIS WEEK FROM IMAGE... Plunge #1 (of 6) Undiscovered Country #4 On the Stump #1 American Jesus New Messiah #3 Oblivion Song #24 Spawn #305 Middlewest #15 Bitter Root #6 Deadly Class #43 Family Tree #4 Old Guard Force Multiplied #3 (of 5) Hardcore Reloaded #3 (of 5) Lucy Claire Redemption #3 ALSO NEW THIS WEEK... Red Mother #3 Bang #1 (of 5) Godkillers #1 Skulldigger & Skeleton Boy #3 (of 6) Bloodshot #0 Canopus #1 Five Years #8 Doctor Tomorrow #1 (of 5) Goon #8 Hellboy & the BPRD Return of Effie Kolb #1 (of 2) Heartbeat #4 (of 5) Red Sonja Age of Chaos #2 Adventures of Byron One Shot Black Clover Vol.
    [Show full text]
  • Threat Landscape Report – 1St Quarter 2018
    TLP-AMBER Threat Landscape Report – 1st Quarter 2018 (FINAL) V1.0 – 10/04/2018 This quarterly report summarises the most significant direct cyber threats to EU institutions, bodies, and agencies (EU-I or 'Constituents') in Part I, the development of cyber-threats on a broader scale in Part II, and recent technical trends in Part III. KEY FINDINGS Direct Threats • In Europe, APT28 / Sofacy threat actor (likely affiliated to Russia military intelligence GRU) targeted government institutions related to foreign affairs and attendees of a military conference. Another threat actor, Turla (likely affiliated to Russia’s security service FSB) executed a cyber-operation against foreign affairs entities in a European country. • A spear-phishing campaign that targeted European foreign ministries in the end of 2017 was attributed to a China-based threat actor (Ke3chang) which has a long track record of targeting EU institutions (since 2011). As regards cyber-criminality against EU institutions, attempts to deliver banking trojans are stable, ransomware activities are still in decline and cryptojacking on the rise. Phishing lures involve generic matters (’invoice’, ‘payment’, ‘purchase’, ‘wire transfer’, ‘personal banking’, ‘job application’) and more specific ones (foreign affairs issues, European think tanks matters, energy contracts, EU delegation, EU watch keeper). Almost all EU-I are affected by credential leaks (email address | password) on pastebin-like websites. Several credential- harvesting attempts have also been detected. Attackers keep attempting to lure EU-I staff by employing custom methods such as spoofed EU-I email addresses or weaponisation of EU-I documents. Broader Threats • Critical infrastructure. In the energy sector, the US authorities have accused Russian actors of targeting critical infrastructure (including nuclear) for several years and are expecting this to continue in 2018.
    [Show full text]
  • TV LISTINGS Lake Geneva Regional News
    C6 | THURSDAY, JUNE 3, 2021 TV LISTINGS LAKE GENEVA REGIONAL NEWS THURSDAY EVENING MOVIES JUNE 3, 2021 SUNDAY EVENING MOVIES JUNE 6, 2021 7 PM 7:30 8 PM 8:30 9 PM 9:30 10 PM 10:30 11 PM 11:30 7 PM 7:30 8 PM 8:30 9 PM 9:30 10 PM 10:30 11 PM 11:30 Young United Mom (s) B Positive Clarice Catherine News The Late Show With James The 43rd Annual Kennedy Center Honors: NCIS: New Orleans News Seinfeld Paid Pro- Storm of # WISC Sheldon States (cc) (s) (cc) Martin escapes. (s) Stephen Colbert (s) Corden # WISC Entertainers receive recognition. (N) (s) (cc) “Stashed” (s) (s) (cc) gram (cc) Suspicion Manifest “Duty Free” Law & Order: Special Law & Order: Orga- TMJ4 Tonight Show-J. Seth Mey- (6:00) Gymnastics: America’s Got Talent “Auditions 1” Variety TMJ4 TMJ4 Paid Pro- Paid Pro- $ WTMJ (N) (s) (cc) Victims Unit (N) nized Crime (N) (cc) News Fallon ers $ WTMJ U.S. Championships. acts audition. (s) (cc) News News gram (cc) gram (cc) Beat Shazam “Every- House- Duncan- FOX 6 News at 9 FOX 6 Seinfeld Seinfeld Extra (N) The Simp- The Great The Moodys (N) FOX 6 News at 9 FOX 6 FOX 6 Graham Seinfeld & WITI body Dance Now!” Broken ville (s) (N) (cc) News (cc) (s) (cc) (s) (cc) & WITI sons North (s) (s) (cc) (N) (cc) News Sports Bensinger (s) (cc) Station 19 “Forever Grey’s Anatomy Rebel Lana confronts News at Jimmy Kimmel Live! Nightline Celebrity Family The Chase “We’re To Tell the Truth ABC7 Eyewitness Inside Best of _ WLS and Ever, Amen” (N) (Season Finale) (s) Grady about his past.
    [Show full text]
  • Cyber Security Management: a Review Kouroush Jenab1 and Saeid Moslehpour2
    Business Management Dynamics Vol.5, No.11, May 2016, pp.16-39 Cyber Security Management: A Review Kouroush Jenab1 and Saeid Moslehpour2 Key words: Computer, Cyber, Abstract Security, Attack This paper presents a review of selected literature on cyber security topics. A wide range of topics is looked at that relate to cyber security. Several references Available online are provided. www.bmdynamics.com ISSN: 2047-7031 INTRODUCTION The online IT dictionary Techopedia defines cyber attacks as “…deliberate exploitation of computer systems, technology-dependent enterprises and networks.” “Cyber attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.” (Techopedia online dictionary, n.d.) Cyber attacks are unleashed on corporations and personal computers every day. In a green paper published by the Department of Commerce Internet Policy Task Force (2011), Secretary of Commerce Gary Locke states that, “Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cyber attacks on Internet commerce, vital business sectors and government agencies have grown exponentially. Some estimates suggest that, in the first quarter of this year, security experts were seeing almost 67,000 new malware threats on the Internet every day. This means more than 45 new viruses, worms, spyware, and other threats were being created every minute – more than double the number from January 2009. As these threats grow, security policy, technology and procedures need to evolve even faster to stay ahead of the threats.” (Cybersecurity, innovation and the internet economy, 2011).
    [Show full text]
  • Iranian Cyber-Activities in the Context of Regional Rivalries and International Tensions
    CSS CYBER DEFENSE PROJECT Hotspot Analysis: Iranian cyber-activities in the context of regional rivalries and international tensions Zürich, May 2019 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Iranian cyber-activities in the context of regional rivalries and international tensions Authors: Marie Baezner © 2019 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group Myriam Dunn Cavelty, Deputy Head for Research and Teaching, Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie (2019): Hotspot Analysis: Iranian cyber-activities in context of regional rivalries and international tensions, May 2019, Center for Security Studies (CSS), ETH Zürich. 1 Iranian cyber-activities in the context of regional rivalries and international tensions Table of Contents 1 Introduction 4 2 Background and chronology 5 3 Description 9 3.1 Attribution and actors 9 Iranian APTs 9 Iranian patriotic hackers 11 Western actors 12 3.2 Targets 12 Iranian domestic targets 12 Middle East 12 Other targets 13 3.3 Tools and techniques 13 Distributed Denial of Service (DDoS) attacks 13 Fake personas, social engineering and spear phishing 13
    [Show full text]