Category Archives: Cyber Security

Russian hacker group ‘CyberBerkut’ returns to public light with allegations against Clinton

CyberBerkutCyberBerkutA Twitter account tied to a group that the Defense Intelligence Agency¬ recently described as¬†‚ÄúRussian hackers ‚Ķ supporting Russia‚Äôs military operations‚ÄĚ returned to the spotlight Wednesday by posting a message that alleges Ukrainian government officials and businessmen laundered money and sent it to Hillary Clinton by making donations to the Clinton Foundation.

These allegations, a vague and loosely defined set of financial connections described in a single graphic and related¬ blog post, could not be confirmed. The blog post alludes to an inappropriate relationship between Ukrainian billionaire Victor Pinchuk and the Clinton family. But emails that were supposedly stolen and posted in this blog post do not prove that such a conspiracy occurred. An attempt to contact the group went unanswered.

The Tweet posted Wednesday by this ‚ÄúCyberBerkut‚ÄĚ group is the first such message posted publicly since January after the account shared an image of a redacted email it claims revealed plans by the U.S. government to doctor evidence to suggest that Russian hackers had interfered in the 2016 U.S. election.

Read More Here.

Russian hacker group ‘CyberBerkut’ returns to public light with allegations against Clinton

CyberBerkut

 

A Twitter account tied to a group that the Defense Intelligence Agency¬ recently described as¬†‚ÄúRussian hackers ‚Ķ supporting Russia‚Äôs military operations‚ÄĚ returned to the spotlight Wednesday by posting a message that alleges Ukrainian government officials and businessmen laundered money and sent it to Hillary Clinton by making donations to the Clinton Foundation.

These allegations, a vague and loosely defined set of financial connections described in a single graphic and related¬ blog post, could not be confirmed. The blog post alludes to an inappropriate relationship between Ukrainian billionaire Victor Pinchuk and the Clinton family. But emails that were supposedly stolen and posted in this blog post do not prove that such a conspiracy occurred. An attempt to contact the group went unanswered.

The Tweet posted Wednesday by this ‚ÄúCyberBerkut‚ÄĚ group is the first such message posted publicly since January after the account shared an image of a redacted email it claims revealed plans by the U.S. government to doctor evidence to suggest that Russian hackers had interfered in the 2016 U.S. election.

HACKING TRIDENT: A Growing Threat

This 38 page paper reviews the growing potential for cyber-attack on the UK’s operational fleet of Vanguard-class submarines armed with nuclear-tipped Trident II D-5 ballistic missiles, and some of the implications for strategic stability. http://www.basicint.org/sites/default/files/HACKING%20UK%20TRIDENT.pdf

Malware injection during manufacturing, mid-life refurbishment or software updates and data transmission interception allow potential adversaries to conduct long-term cyber operations. BASIC has already highlighted the future potential for emerging technologies to deliver high confidence in global detection of submarines.1 Future weaponized underwater drones may facilitate close proximity kinetic and cyber-attacks on ballistic missile submarines (SSBNs).

The report concludes that the vulnerability to cyber attacks is real. It can be reduced by significant, vigilant and continuous cyber protection, but cannot be eliminated. It is therefore essential that in addition to significant investment in cyber defense, those responsible also need to consider strategies that build resilience within the systems, and to incorporate this threat into broader assessments relevant to the choice of weapon systems, platforms and broader defense and security strategies

For more information on this cyber threat, visit the article: https://www.linkedin.com/pulse/hacking-nuclear-submarines-matthew-rosenquist

The Applied Technology Institute (ATI) offers courses in cyber security to help government and private facilities worldwide from learning how to mitigate or prevent such occurrences. Among the courses ATI offers in cyber security is Cyber Leadership Course (CLC) with the following upcoming dates in Hanover, Maryland:

http://www.aticourses.com/Cyber_Leader_Course.htm
September 6‚Äď7 2017 and October 1‚Äď2 2017.

In addition, ATI offers Tactical Digital Forensics from December 4‚Äď15 2017, also in Hanover, MD.

For more information or to view ATI’s schedule of courses, visit aticourses.com or contact us at (410) 956-8805.

Protecting Against the Cyber Insider Threat

This is a good article on protecting against the cyber insider threat. I quote below the action items, but you should read the full article for more insight.

https://www.linkedin.com/pulse/cyber-insider-threat-mellisa-wagner?trk=prof-post

What you can do

There are ways you can protect your organization’s (and your customer’s) data. It’s not difficult, but it will require diligence.

  1. On-board your employees in a consistent manner that properly trains them in cyber vulnerabilities
  2. Maintain this training regularly
  3. Assess your organization’s and employee’s weakness so you can better mitigate cyber vulnerabilities and risks
  4. Understand cyber risks

Your IT professionals aren‚Äôt the true gatekeepers ‚Äď your employees are!¬

ATIcourses offers several practical cyber security training programs that can help with the ongoing need for cyber technical training.¬

Cyber Leadership Course(CLC)

Cyber Security -Practical Boot Camp

Cyber Security, Communications & Networking courses