Comments - Proliferation of Cyber Hacking Tools in Pakistan - PakAlumni Worldwide: The Global Social Network 2024-03-29T07:01:24Zhttp://www.pakalumni.com/profiles/comment/feed?attachedTo=1119293%3ABlogPost%3A120393&xn_auth=noIgnite Conducts Karachi Quali…tag:www.pakalumni.com,2022-12-04:1119293:Comment:4150512022-12-04T04:10:25.043ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p>Ignite Conducts Karachi Qualifier Round of Digital Pakistan Cybersecurity Hackathon 2022<br></br><br></br><a href="https://propakistani.pk/2022/12/02/ignite-conducts-karachi-qualifier-round-of-digital-pakistan-cybersecurity-hackathon-2022/" target="_blank">https://propakistani.pk/2022/12/02/ignite-conducts-karachi-qualifier-round-of-digital-pakistan-cybersecurity-hackathon-2022/</a><br></br><br></br><br></br>Ignite National Technology Fund, a public sector company with the Ministry of IT & Telecom,…</p>
<p>Ignite Conducts Karachi Qualifier Round of Digital Pakistan Cybersecurity Hackathon 2022<br/><br/><a href="https://propakistani.pk/2022/12/02/ignite-conducts-karachi-qualifier-round-of-digital-pakistan-cybersecurity-hackathon-2022/" target="_blank">https://propakistani.pk/2022/12/02/ignite-conducts-karachi-qualifier-round-of-digital-pakistan-cybersecurity-hackathon-2022/</a><br/><br/><br/>Ignite National Technology Fund, a public sector company with the Ministry of IT & Telecom, conducted the qualifier round of Digital Pakistan Cybersecurity Hackathon 2022 in Karachi on 1st December 2022 after conducting qualifier rounds at Quetta and Lahore.<br/><br/>The Cybersecurity Hackathon aims to improve the cybersecurity readiness, protection, and incident response capabilities of the country by conducting cyber drills at a national level and identifying cybersecurity talent for public and private sector organizations.<br/><br/>Dr. Zain ul Abdin, General Manager Ignite, stated that Ignite was excited about organizing Pakistan’s 2nd nationwide cybersecurity hackathon in five cities this year. The purpose of the Cyber Security Hackathon 2022 is to train and prepare cyber security experts in Pakistan, he said.<br/><br/>Speaking on the occasion, Asim Shahryar Husain, CEO Ignite, said, “The goal of the cybersecurity hackathon is to create awareness about the rising importance of cybersecurity for Pakistan and also to identify and motivate cybersecurity talent which can be hired by public and private sector organizations to secure their networks from cyberattacks.”<br/><br/>“There is a shortage of 3-4 million cybersecurity professionals globally. So this is a good opportunity for Pakistan to build capacity of its IT graduates in cybersecurity so that they can boost our IT exports in future,” he added.<br/><br/>Chief guest, Mohsin Mushtaq, Additional Secretary (Incharge) IT & Telecommunication, said, “Digital Pakistan Cybersecurity Hackathon is a step towards harnessing the national talent to form a national cybersecurity response team.”<br/><br/>“Ignite will continue to hold such competitions every year to identify new talent. I would like to congratulate CEO Ignite and his team for holding such a marathon competition across Pakistan to motivate cybersecurity students and professionals all over the country,” he added.<br/><br/>Top cybersecurity experts were invited for keynote talks during the occasion including Moataz Salah, CEO Cyber Talents, Egypt, and Mehzad Sahar, Group Head InfoSec Engro Corp, who delivered the keynote address on Smart InfoSec Strategy.<br/><br/>Panelists from industry, academia, and MoITT officials participated in two panel discussions on “Cyber Threats and Protection Approaches” and “Indigenous Capability & Emerging Technologies” during the event.<br/><br/>The event also included a cybersecurity quiz competition in which 17 teams participated from different universities. The top three teams in the competition were awarded certificates.<br/><br/>41 teams competed from Karachi in the Digital Pakistan Cybersecurity Hackathon 2022.<br/><br/>The top three teams shortlisted after the eight-hour hackathon were: “Team Control” (Winner); “Revolt” (1st Runner-up); and “ASD” (2nd Runner-up).<br/><br/>These top teams will now compete in the final round of the hackathon in Islamabad later this month.</p>
<p class="comment-timestamp"></p> National Center for Cyber Sec…tag:www.pakalumni.com,2022-07-07:1119293:Comment:4090782022-07-07T14:51:47.607ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p><span>National Center for Cyber Security For Cyber Threats</span><br></br><span>Becoming an anonymous personality is a super easy task in the online space. All that one needs to do is hide the IP. The IP address makes it easier to trace online activities. You can find your IP address on What Is My IP. However, just because cyber threats exist, it does not mean one can prevent oneself from engaging in online activities. With proper digital hygiene along with government efforts, a country can…</span></p>
<p><span>National Center for Cyber Security For Cyber Threats</span><br/><span>Becoming an anonymous personality is a super easy task in the online space. All that one needs to do is hide the IP. The IP address makes it easier to trace online activities. You can find your IP address on What Is My IP. However, just because cyber threats exist, it does not mean one can prevent oneself from engaging in online activities. With proper digital hygiene along with government efforts, a country can mitigate cyber threats.</span><br/><br/><span><a href="https://nation.com.pk/2022/07/07/the-role-of-national-center-for-cyber-security-in-pakistan/" target="_blank">https://nation.com.pk/2022/07/07/the-role-of-national-center-for-cyber-security-in-pakistan/</a></span><br/><br/><br/><span>In 2018, the Government of Pakistan established the National Centre for Cyber Security or NCCS. It was a joint initiative of the Planning Commission and Higher Education Commission. The body currently works in cybercrime forensics, smart devices, and network security.</span><br/><br/><br/><br/><span>New ways of committing cyber crimes are emerging with each passing year. Therefore, research and development are critical in fighting different cyber crimes. It is where the role of the National Center for Cyber Security comes in. NCCS deals with both applied and theoretical areas for fighting cybercrime.</span><br/><br/><br/><br/><span>It is known for its research on areas like Cyber Reconnaissance, Cybercrime Investigations, Blockchain Security, Digital Forensics, IoT Security, Intrusion Detection Systems, Mobile Phone Security, Internet Security and Privacy, Critical Infrastructure Security and Malware Analysis.</span><br/><br/><span>Cyber Security Policy Of Pakistan Is Evolving</span><br/><span>In addition to bodies like NCCS, it is also important to have a solid cybersecurity policy. The Government of Pakistan recently approved a new cybersecurity policy to fight electronic crime. The policy will prove to be helpful for both the public and private institutions in fighting cybercrime. The policy will birth a secure cyber ecosystem in the country with the help of new governance and institutional framework. It will additionally support a computer emergency response team and a security operations centre at the institutional, sector and national level.</span><br/><br/><br/><br/><span>Further, the Government of Pakistan will work on improving general awareness of cyber security amongst the passes through public awareness campaigns, skill development and training programs.</span><br/><br/><span>Why Is Cyber Security Knowledge Important?</span><br/><span>Security awareness is important in all sectors, including the domain of cyber security too. The interconnected system is essential to survive in the current digitised world. However, it comes with a risk a cyber security knowledge can mitigate. Without proper cyber security knowledge, it is easy to fall prey to online crime. The result will be that people will start losing their trust in the digital world, which can prove dangerous for any country in the digital age of digitisation.</span><br/><br/><br/><br/><span>Further, it is not enough to ensure the technology and infrastructure required to support it. Government should inform the people about the risks and help them fight it. Only through these methods can a country lay a strong foundation for further digitisation of the country.</span><br/><br/><br/><br/><span>Pakistan’s ranking on the Global CyberSecurity Index is disappointing. Therefore, the newly brought cyber security policy was a much-needed change to improve its ranking in future studies. With strong cyber security laws, Pakistan can promote easy socio-economic development. Thankfully, the Government of Pakistan is working towards it. For instance, a cyberattack on any Pakistan institution under the new policy will be considered an act of aggression against national sovereignty. The government will take all the necessary steps to punish the offender for dealing with it.</span></p> Mr. Modi has used the Israeli…tag:www.pakalumni.com,2022-01-29:1119293:Comment:4063232022-01-29T18:40:23.266ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p><span>Mr. Modi has used the Israeli spyware to not only spy on his critics at home but also his perceived enemies abroad. Pakistani Prime Minister Imran Khan is among the most prominent targets of the Modi government's cyber attacks, according to a recently released Project Pegasus report. The Indian government has neither confirmed nor denied the report. The focus of the report is the use of the Israeli-made spyware by about a dozen governments to target politicians, journalists and…</span></p>
<p><span>Mr. Modi has used the Israeli spyware to not only spy on his critics at home but also his perceived enemies abroad. Pakistani Prime Minister Imran Khan is among the most prominent targets of the Modi government's cyber attacks, according to a recently released Project Pegasus report. The Indian government has neither confirmed nor denied the report. The focus of the report is the use of the Israeli-made spyware by about a dozen governments to target politicians, journalists and activists. The users of the Pegasus software include governments of Bahrain, Morocco, Saudi Arabia, India, Mexico, Hungary, Azerbaijan, Togo and Rwanda.</span><br/><br/><span><a href="http://www.riazhaq.com/2022/01/ny-times-modi-bought-israeli-pegasus.html" target="_blank">http://www.riazhaq.com/2022/01/ny-times-modi-bought-israeli-pegasus.html</a></span></p> Facebook says hackers in Paki…tag:www.pakalumni.com,2021-11-16:1119293:Comment:4044052021-11-16T15:54:43.814ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p><span>Facebook says hackers in Pakistan targeted Afghan users amid government collapse</span><br></br><br></br><span><a href="https://www.reuters.com/world/asia-pacific/exclusive-facebook-says-hackers-pakistan-targeted-afghan-users-amid-government-2021-11-16/" target="_blank">https://www.reuters.com/world/asia-pacific/exclusive-facebook-says-hackers-pakistan-targeted-afghan-users-amid-government-2021-11-16/</a></span><br></br><br></br><span>Hackers from Pakistan used Facebook to target people in Afghanistan…</span></p>
<p><span>Facebook says hackers in Pakistan targeted Afghan users amid government collapse</span><br/><br/><span><a href="https://www.reuters.com/world/asia-pacific/exclusive-facebook-says-hackers-pakistan-targeted-afghan-users-amid-government-2021-11-16/" target="_blank">https://www.reuters.com/world/asia-pacific/exclusive-facebook-says-hackers-pakistan-targeted-afghan-users-amid-government-2021-11-16/</a></span><br/><br/><span>Hackers from Pakistan used Facebook to target people in Afghanistan with connections to the previous government during the Taliban's takeover of the country, the company's threat investigators said in an interview with Reuters.</span><br/><br/><span>Facebook (FB.O) said the group, known in the security industry as SideCopy, shared links to websites hosting malware which could surveil people's devices. Targets included people connected to the government, military and law enforcement in Kabul, it said. Facebook said it removed SideCopy from its platform in August.</span><br/><br/><span>The social media company, which recently changed its name to Meta, said the group created fictitious personas of young women as "romantic lures" to build trust and trick targets into clicking phishing links or downloading malicious chat apps. It also compromised legitimate websites to manipulate people into giving up their Facebook credentials.</span><br/><br/><span>"It's always difficult for us to speculate as to the end goal of the threat actor," said Facebook's head of cyber espionage investigations, Mike Dvilyanski. "We don't know exactly who was compromised or what the end result of that was."</span><br/><br/><br/><span>Major online platforms and email providers including Facebook, Twitter Inc (TWTR.N), Alphabet Inc's (GOOGL.O) Google and Microsoft Corp's (MSFT.O) LinkedIn have said they took steps to lock down Afghan users' accounts during the Taliban's swift takeover of the country this past summer. read more</span><br/><br/><span>Facebook said it had not previously disclosed the hacking campaign, which it said ramped up between April and August, due to safety concerns about its employees in the country and the need for more work to investigate the network. It said it shared information with the U.S. State Department at the time it took down the operation, which it said had appeared "well-resourced and persistent."</span></p> Pakistan-linked hackers targe…tag:www.pakalumni.com,2021-06-29:1119293:Comment:4008052021-06-29T14:54:31.896ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p><span>Pakistan-linked hackers targeted Indian power company with ReverseRat</span><br></br><br></br><span><a href="https://thehackernews.com/2021/06/pakistan-linked-hackers-targeted-indian.html" target="_blank">https://thehackernews.com/2021/06/pakistan-linked-hackers-targeted-indian.html</a></span><br></br><br></br><span>A threat actor with suspected ties to Pakistan has been striking government and energy organizations in the South and Central Asia regions to deploy a remote access trojan on compromised…</span></p>
<p><span>Pakistan-linked hackers targeted Indian power company with ReverseRat</span><br/><br/><span><a href="https://thehackernews.com/2021/06/pakistan-linked-hackers-targeted-indian.html" target="_blank">https://thehackernews.com/2021/06/pakistan-linked-hackers-targeted-indian.html</a></span><br/><br/><span>A threat actor with suspected ties to Pakistan has been striking government and energy organizations in the South and Central Asia regions to deploy a remote access trojan on compromised Windows systems, according to new research.</span><br/><br/><span>"Most of the organizations that exhibited signs of compromise were in India, and a small number were in Afghanistan," Lumen's Black Lotus Labs said in a Tuesday analysis. "The potentially compromised victims aligned with the government and power utility verticals."</span><br/><br/><span>Some of the victims include a foreign government organization, a power transmission organization, and a power generation and transmission organization. The covert operation is said to have begun at least in January 2021.</span><br/><br/><span>The intrusions are notable for a number of reasons, not least because in addition to its highly-targeted nature, the tactics, techniques, and procedures (TTPs) adopted by the adversary rely on repurposed open-source code and the use of compromised domains in the same country as the targeted entity to host their malicious files.</span><br/><br/><span>At the same time, the group has been careful to hide their activity by modifying the registry keys, granting them the ability to surreptitiously maintain persistence on the target device without attracting attention.</span><br/><br/><span>Explaining the multi-step infection chain, Lumen noted the campaign "resulted in the victim downloading two agents; one resided in-memory, while the second was side-loaded, granting threat actor persistence on the infected workstations."</span><br/><br/><span>The attack commences with a malicious link sent via phishing emails or messages that, when clicked, downloads a ZIP archive file containing a Microsoft shortcut file (.lnk) and a decoy PDF file from a compromised domain.</span><br/><br/><span>The shortcut file, besides displaying the benign document to the unsuspecting recipient, also takes care of stealthily fetching and running an HTA (HTML application) file from the same compromised website.</span><br/><br/><span>The lure documents largely describe events catering to India, disguising as a user manual for registering and booking an appointment for COVID-19 vaccine through the CoWIN online portal, while a few others masquerade as the Bombay Sappers, a regiment of the Corps of Engineers of the Indian Army.</span></p> IISS: Cyber Capabilities and…tag:www.pakalumni.com,2021-06-28:1119293:Comment:4008972021-06-28T16:32:11.499ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p><span>IISS: Cyber Capabilities and National Power: A Net Assessment</span><br></br><br></br><span>London-based THE INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES</span><br></br><br></br><br></br><span><a href="https://www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power" target="_blank">https://www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power</a></span><br></br><br></br><span>India has frequently been the victim of cyber attacks, including on its critical infrastructure,…</span></p>
<p><span>IISS: Cyber Capabilities and National Power: A Net Assessment</span><br/><br/><span>London-based THE INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES</span><br/><br/><br/><span><a href="https://www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power" target="_blank">https://www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power</a></span><br/><br/><span>India has frequently been the victim of cyber attacks, including on its critical infrastructure, and has attributed a significant proportion of them to China or Pakistan. CERT-In reported, for example, that there were more than 394,499 incidents in 2019,44 and 2020 saw an upsurge in attacks from China.45 Of particular concern to the Indian government are cyber attacks by North Korea that use Chinese digital infrastructure.46 The vast major- ity of the cyber incidents flagged by CERT-In appear to have been attempts at espionage,47 but they could also have resulted in serious damage to the integrity of</span><br/><span>Indian networks and platforms. In 2020, India had the second-highest incidence of ransomware attacks in the world48 and the government banned 117 Chinese mobile applications because of security concerns.49</span><br/><br/><span>---------</span><br/><span>Public statements by Indian officials and other open- source material indicate that India has developed rela- tively advanced offensive cyber capabilities focused on Pakistan. It is now in the process of expanding these capabilities for wider effect.</span><br/><span>India reportedly considered a cyber response against Pakistan in the aftermath of the November 2008 terror- ist attacks in Mumbai, with the NTRO apparently at the forefront of deliberations.67 A former national security advisor has since indicated publicly that India pos- sesses considerable capacity to conduct cyber-sabotage operations against Pakistan,68 which appears credible</span><br/><br/><span>--------------------</span><br/><span>Overall, India’s focus on Pakistan will have given it useful operational experience and some viable regional offensive cyber capabilities. It will need to expand its cyber-intelligence reach to be able to deliver sophisti- cated offensive effect further afield, but its close collab- oration with international partners, especially the US, will help it in that regard.</span><br/><br/><span>----------------</span><br/><span>Raj Chengappa and Sandeep Unnithan, ‘How to Punish Pakistan’, India Today, 22 September 2016, https://www. indiatoday.in/magazine/cover-story/story/20161003-uri- attack-narendra-modi-pakistan-terror-kashmir-nawaz-sharif- india-vajpayee-829603-2016-09-22.</span></p> IISS Report: #India has some…tag:www.pakalumni.com,2021-06-28:1119293:Comment:4008022021-06-28T14:04:00.902ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p><span>IISS Report: #India has some #cyber-intelligence & offensive cyber capabilities but they are focused on #Pakistan. #Delhi is building new capability with the help of key international partners – including #US, #UK & #France. #Cyberwar…</span></p>
<p><span>IISS Report: #India has some #cyber-intelligence & offensive cyber capabilities but they are focused on #Pakistan. #Delhi is building new capability with the help of key international partners – including #US, #UK & #France. #Cyberwar <a href="https://indianexpress.com/article/india/focused-on-pakistan-rather-than-china-india-in-tier-3-as-cyberpower-report-7378610/" target="_blank">https://indianexpress.com/article/india/focused-on-pakistan-rather-than-china-india-in-tier-3-as-cyberpower-report-7378610/</a> via @IndianExpr</span><br/><br/><span>Cyberpower, in the study, is measured on seven parameters: from strategy to cybersecurity. India’s reform in cyber governance has been slow. It should better harness its digital start-up ecosystem, says the study.</span><br/><br/><span>Greg Austin, who leads the IISS programme on Cyber, Space and Future Conflict and played a leading role in the preparation of the report, told The Indian Express Sunday: “India has some cyber-intelligence and offensive cyber capabilities but they are regionally focused, principally on Pakistan. It is currently aiming to compensate for its weaknesses by building new capability with the help of key international partners – including the US, the UK and France – and by looking to concerted international action to develop norms of restraint.”</span><br/><br/><span>The report said that India’s approach towards institutional reform of cyber governance has been “slow and incremental”, with key coordinating authorities for cyber security in the civil and military domains established only as late as 2018 and 2019 respectively.</span><br/><br/><span>These work closely with the main cyber-intelligence agency, the National Technical Research Organisation.</span><br/><br/><span>“India has a good regional cyber-intelligence reach but relies on partners, including the United States, for wider insight”, the report said.</span><br/><br/><span>It said that the strengths of the Indian digital economy include a vibrant start-up culture and a very large talent pool. “The private sector has moved more quickly than the government in promoting national cyber security.”</span><br/><br/><span>The country is active and visible in cyber diplomacy but has not been among the leaders on global norms, preferring instead to make productive practical arrangements with key states, the report said.</span><br/><br/><span>“India is a third-tier cyber power whose best chance of progressing to the second tier is by harnessing its great digital-industrial potential and adopting a whole-of-society approach to improving its cyber security,” the report said.</span><br/><br/><span>The report also assessed China’s cyber power as clearly inferior to that of the US, and substantially below the combined cyber power of the US network of alliances.</span><br/><br/><span>The countries covered in this report are US, United Kingdom, Canada and Australia (four of the Five Eyes intelligence allies); France and Israel (the two most cyber-capable partners of the Five Eyes states); Japan (also an ally of the Five Eyes states, but less capable in the security dimensions of cyberspace, despite its formidable economic power); China, Russia, Iran and North Korea (the principal states posing a cyber threat to Western interests); and India, Indonesia, Malaysia and Vietnam (four countries at earlier stages in their cyber-power development). It is an ongoing study, which will cover a total of 40 countries, including Germany, Singapore, Nigeria among others.</span><br/><br/><span>India has been put in the third tier meant for countries that have strengths or potential strengths in some of these categories but “significant weaknesses” in others. Also in this category are: Japan, Iran, Indonesia, Vietnam, Malaysia and North Korea.</span><br/><br/><span>In the second tier, with world-leading strengths in “some” categories are: Australia, Canada, China, France, Israel, Russia and the United Kingdom.</span></p> The ransomware pandemic
https…tag:www.pakalumni.com,2021-05-15:1119293:Comment:4004002021-05-15T03:05:02.950ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<h1 class="font-regular leading-tight mb-0 text-h5 sm:text-h3">The ransomware pandemic…</h1>
<div class="flex items-center caption"><div class="w-20 h-20 mr-6 sc-6usfji-0 lbJFqa"><div class="dm9ls1-0 bIqTEE"></div>
</div>
</div>
<h1 class="font-regular leading-tight mb-0 text-h5 sm:text-h3">The ransomware pandemic</h1>
<div class="flex items-center caption"><div class="w-20 h-20 mr-6 sc-6usfji-0 lbJFqa"><div class="dm9ls1-0 bIqTEE"><a href="https://www.axios.com/colonial-pipeline-energy-oil-gas-ransomware-265fb398-4ff6-48a2-a49c-9ae43e745049.html" target="_blank">https://www.axios.com/colonial-pipeline-energy-oil-gas-ransomware-265fb398-4ff6-48a2-a49c-9ae43e745049.html</a></div>
</div>
</div>
<p></p>
<p></p>
<p><strong>Why it matters:</strong><span> </span><a class="gtm-content-click" href="https://www.axios.com/colonial-pipeline-cyberattack-oil-what-know-9b7cd4ac-a6b8-41dc-b081-e57fde475a41.html" target="_self">Crippling</a><span> a major U.S. oil pipeline this weekend initially looked like an act of war — but it's now looking like an increasingly normal crime, bought off-the-shelf from a "ransomware as a service" provider known as DarkSide.</span></p>
<p></p>
<div class="b0w77w-0 jhsJV mt-12 mb-20 sm:mt-20 gtm-story-text p"><p>"We are on the cusp of a global pandemic," said Christopher Krebs, the first director of the Cybersecurity and Infrastructure Security Agency,<span> </span><a class="gtm-content-click" href="https://homeland.house.gov/imo/media/doc/2021-05-05-CIPI-HRG-Testimony-Krebs.pdf" target="_blank" rel="noopener">told Congress</a><span> </span>last week. The virus causing the pandemic isn't biological, however. It's software.</p>
<p><strong>Why it matters:</strong><span> </span><a class="gtm-content-click" href="https://www.axios.com/colonial-pipeline-cyberattack-oil-what-know-9b7cd4ac-a6b8-41dc-b081-e57fde475a41.html" target="_self">Crippling</a><span> </span>a major U.S. oil pipeline this weekend initially looked like an act of war — but it's now looking like an increasingly normal crime, bought off-the-shelf from a "ransomware as a service" provider known as DarkSide.</p>
<p><strong>Driving the news:<span> </span></strong>Colonial runs the largest refined products pipeline in the country, transporting over 100 million gallons per day. It was shut down on Friday in response to a ransomware attack, and will be reopened in "an incremental process" over the course of this week, per a corporate<span> </span><a class="gtm-content-click" href="https://www.colpipe.com/news/press-releases/media-statement-colonial-pipeline-system-disruption" target="_blank" rel="noopener">statement</a>.</p>
<ul>
<li><strong>That's faster</strong><span> </span>than the market expected — energy prices fell after the statement was released, after rising on the initial shutdown news.</li>
</ul>
<p><strong>The big picture:<span> </span></strong><a class="gtm-content-click" href="https://www.axios.com/the-rise-and-rise-of-ransomware-c2f03afc-cd7d-423e-b29a-bcda9572bfac.html" target="_self">No company is safe</a><span> </span>from ransomware, and often the lines between criminals and state actors can be fuzzy. Preventing even bigger future attacks will require a so-far elusive degree of coordination between the public and private sectors in dozens — if not hundreds of countries.</p>
<ul>
<li><strong>Threat level:</strong><span> </span>Very high. "Cybersecurity will be the issue of this decade in terms of how much worse it is going to get," IBM CEO Arvind Krishna told reporters Monday.</li>
<li><strong>Currently,</strong><span> </span>per Forrester analyst Allie Mellen, companies' main strategy is to pay up if hit — and to try to be slightly less vulnerable to attack than their competitors. "What do security pros do right now to lower their risk in the face of future ransomware attacks? Outrun the guy next to you,” Mellen says.</li>
</ul>
<p><strong>Between the lines:<span> </span></strong>If anything, Colonial Pipeline was lucky that it is so important to the functioning of the American economy. Its systemic status helped to mobilize the full resources of the U.S. government, and even elicited an<span> </span><a class="gtm-content-click" href="https://www.bloomberg.com/news/articles/2021-05-10/white-house-creates-task-force-to-deal-with-pipeline-breach?sref=vuYGislZ" target="_blank" rel="noopener">apology</a>, of sorts, from DarkSide.</p>
<ul>
<li><strong>“Our goal is to make money<span> </span></strong>and not creating problems for society," said the group in a statement on the dark web. "From today, we introduce moderation and check each company that our partners want to encrypt to avoid social consequences.”</li>
</ul>
<p><strong>What they're saying:<span> </span></strong>"There is no silver bullet for solving this challenge," concludes a major<span> </span><a class="gtm-content-click" href="https://securityandtechnology.org/wp-content/uploads/2021/04/IST-Ransomware-Task-Force_Final_Report.pdf" target="_blank" rel="noopener">report</a><span> </span>on combating ransomware from the Institute for Security + Technology. "No single entity alone has the requisite resources, skills, capabilities, or authorities to significantly constrain this global criminal enterprise."</p>
<ul>
<li><strong>The fight will require</strong><span> </span>the active involvement of the National Security Council, says the report, as well as much more regulation of cryptocurrency, which is invariably used to pay the ransom.</li>
<li>It will also require a major upgrade of technology systems at the state and local level, very few of which have been migrated to cloud-based systems that can try to keep one step ahead of the bad guys.</li>
</ul>
<p><strong>The bottom line:</strong><span> </span>The Colonial Pipeline attack was so big that it couldn't help but make headlines. But most attacks are quietly paid off with no fanfare and no publicity, making it extremely difficult to gauge the true scale of the problem.</p>
</div>
<div class="flex mb-20"><div class="gtm-content-click h-16 relative w-16 b9rgys-0 gtcdvV"></div>
</div> Suspected Pakistani spies use…tag:www.pakalumni.com,2021-05-15:1119293:Comment:4002752021-05-15T02:58:02.146ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p><span>Suspected Pakistani spies use catfishing, stealthy hacking tools to target Indian defense sector</span><br></br><br></br><span><a href="https://www.cyberscoop.com/pakistan-india-hacking-cyber-catfishing/" target="_blank">https://www.cyberscoop.com/pakistan-india-hacking-cyber-catfishing/</a></span><br></br><br></br><br></br><span>For years, suspected Pakistani hackers have sought to pry their way into Indian government computer networks as part of broader dueling cyber-espionage campaigns between the…</span></p>
<p><span>Suspected Pakistani spies use catfishing, stealthy hacking tools to target Indian defense sector</span><br/><br/><span><a href="https://www.cyberscoop.com/pakistan-india-hacking-cyber-catfishing/" target="_blank">https://www.cyberscoop.com/pakistan-india-hacking-cyber-catfishing/</a></span><br/><br/><br/><span>For years, suspected Pakistani hackers have sought to pry their way into Indian government computer networks as part of broader dueling cyber-espionage campaigns between the rival nations.</span><br/><br/><span>Over the last 18 months, a spying group known as Transparent Tribe has expanded its use of a hacking tool capable of stealing data and taking screenshots from computers, according to research published Thursday by Talos, Cisco’s threat intelligence unit. Hackers also are going after additional targets beyond Indian military personnel, including defense contractors and attendees of Indian government-sponsored conferences.</span><br/><br/><span>Talos did not mention Pakistan in its research, but multiple security researchers told CyberScoop the Transparent Tribe group is suspected of operating on behalf of the Pakistani government. Similarly, research from email security firm Proofpoint has previously linked a Pakistan-based company to the development of the group’s malicious code.</span><br/><br/><span>Talos’ findings reflect a relentless appetite for defense-related secrets among hacking groups with suspected links to Pakistan and India, two nuclear-armed neighbors prone to territorial disputes.</span><br/><br/><span>Transparent Tribe’s improved capabilities are also a case study in how governments not known for their hacking prowess can evolve. While U.S. officials regularly name China, Russia, Iran and North Korea as the most capable of cyber actors, governments the world over appear to be buying off-the-shelf hacking kits or developing their own tools.</span><br/><br/><span>A 2019 study backed by the Department of Homeland Security and the Office of the Director of National Intelligence found that countries such as Vietnam and the United Arab Emirates had made sharp advances in their hacking capabilities in recent years.</span><br/><br/><span>“A proliferation and commodification of cyber offensive capabilities is reshaping the cyber balance of power, enabling an expanded array of actors to use cyber for geopolitical impact or economic gain,” said the study, whose authors included government and private-sector executives.</span><br/><br/><span>Asheer Malhotra, a Talos threat researcher, said that Transparent Tribe “has become more and more aggressive in terms of targeting, expanding operations and evolving their tactics.”</span><br/><br/><span>For example, the group has recently used breached websites to deliver its malicious code to victims, rather than simply embedding the code in an email, according to Talos. That makes the intrusion attempts harder to detect. As of this week, the hackers were using a website that mimics an Indian government benefits portal to try to infect government employees, Malhotra said.</span><br/><br/><span>Transparent Tribe has also made a habit of appealing to their targets’ romantic desires. The hackers in 2019 and 2020 sent malware-laced photos of alluring women to targets, according to Talos. India’s defense minister warned about Pakistan’s alleged use of that broader tactic in 2019, and said that young military recruits were trained to spot the subterfuge.</span><br/><br/><span>Hackers with suspected ties to India have also repeatedly gone after Pakistani targets. In February, mobile security firm Lookout uncovered a years-long hacking campaign that aligned with Indian interests and sought to bug the phones of people in Pakistan and elsewhere. Among the suspected targets was a job candidate at the Pakistan Atomic Energy Commission.</span><br/><br/><span>“This is business as usual from an espionage perspective,” Malhotra said when asked if there was any fluctuation in digital spying that coincided with a spike in tensions between India and Pakistan. “There have always been military and political tensions between the two states since their inception.”</span></p> Indian cyber-spy ‘Confucius’…tag:www.pakalumni.com,2021-02-11:1119293:Comment:3885912021-02-11T21:32:22.900ZRiaz Haqhttp://www.pakalumni.com/profile/riazul
<p><span>Indian cyber-spy ‘Confucius’ targets #Pakistan, #Kashmir: #Indian hackers using #malware to target Pakistani military officials, Pak's top #nuclear regulator and #Indian election officials in #Indian Occupied Kashmir, says San Francisco-based Lookout Inc.…</span><br></br></p>
<p><span>Indian cyber-spy ‘Confucius’ targets #Pakistan, #Kashmir: #Indian hackers using #malware to target Pakistani military officials, Pak's top #nuclear regulator and #Indian election officials in #Indian Occupied Kashmir, says San Francisco-based Lookout Inc.</span><br/><span><a href="https://www.smh.com.au/world/asia/indian-cyber-spy-confucius-targets-pakistan-kashmir-security-report-20210211-p571q3.html" target="_blank">https://www.smh.com.au/world/asia/indian-cyber-spy-confucius-targets-pakistan-kashmir-security-report-20210211-p571q3.html</a></span><br/><br/><span>Oakland, California: A hacking group with ties to the Indian military adopted a pair of mobile surveillance tools to spy on geopolitical targets in Pakistan and Kashmir amid persistent regional tensions between the nuclear-armed neighbours, according to a report from a cyber security company.</span><br/><br/><span>The group is known for commandeering legitimate web services in South Asia and embedding surveillance tools or malware inside apps and services to conduct espionage. Since 2017, and as recently as December, the hackers have relied on spyware to target Pakistani military officials, the country’s top nuclear regulator and Indian election officials in the disputed state of Kashmir, according to the report released by San Francisco-based Lookout Inc on Thursday.</span><br/><br/><span>The campaign appears to be just the latest example of hackers targeting sensitive security targets with social engineering tactics - luring victims to download malicious files disguised as benign applications. What’s unique about attacks by the group, dubbed Confucius, is the extent to which its operators go to veil their efforts, experts say.</span><br/><br/><span>Using knock-off web applications disguised as Google security tools and popular regional chat and dating applications, Confucius managed to access 156 victims’ devices in a trove of data recently discovered by the research team. The files and related logs were found in unsecured servers used by the attack group, according to the report. Most of the users who recently accessed those servers were based in Northern India.</span><br/><br/><span>Once the attackers penetrate a device, they scrape it for data, including call logs, contacts, geolocation, images and voice notes. In some cases, the hackers took screen shots of the devices and recorded phone calls. In at least one instance, intruders got inside the device of a Pakistani Air Force service member and viewed a contact list filled with other Air Force officials, said Apurva Kumar, Lookout’s staff security intelligence engineer.</span><br/><br/><span>“While their technical tools and malwares might not be that advanced, the Confucius threat actor invests human time to gain trust from their targets,” said Daniel Lunghi, threat researcher at the cyber security firm, Trend Micro. “And in certain sensitive fields where people are more cautious, it might be what makes the difference.”</span><br/><br/><span>In two cases, researchers discovered that hackers stole the contents of WhatsApp chat conversations from 2017 and 2018 between officials at the Pakistan Nuclear Regulatory Authority, Pakistan Atomic Energy Commission and unknown third-parties. Then in April 2019, in the midst of India’s latest national election, the attackers burrowed into the device of an election official in the Pulwama region of Kashmir, where months earlier an Indian security convoy was attacked by a Pakistan-based Islamic terrorist in a deadly explosion.</span><br/><br/><span>Kumar said she couldn’t disclose the details of the stolen data.</span><br/><br/><span>Her research indicates the espionage campaign ramped up in 2018 after unknown hackers breached the commercial surveillance-ware provider, Retina-X Studios. Hornbill, one of the malware tools used by the attackers, shares code similarities with Retina-X’s Mobile Spy products. Another piece of malicious software called Sunbird, which is capable of remotely commandeering a user’s device, appears to be rooted in code for a stalkerware service called, BuzzOutLoud, based in India.</span></p>