Tag Archive for: Attendees

Global Cybersecurity Expert Eric Botts Tells Attendees “We Are at War”


HOUSTON, TX — On Dec. 7, 2021, the audience at a World Affairs Council of Greater Houston event was listening intently to what Global Cybersecurity expert Eric Botts had to say at his latest talk, “The Geopolitics of Cybersecurity.” The cautionary bottom line from the director of the Global Cybersecurity Program at the University of St. Thomas was “We are at war.” However, since the heavily consequential conflict is taking place within cyberspace, Botts pointed out that the war is invisible.

Addresses World Affairs Council of Greater Houston

Cyber Warfare’s Place in the History of Conflict

The assistant professor of UST courses in cyberwarfare, cyberethics, enterprise cybersecurity and digital governance outlined a brief history of the evolution of human conflict. First, he journeyed from the two-dimensional plane (land and sea) to the three-dimensional (air and space) to the fifth domain, cyberspace. Then, Botts set the stage for the conflict, explaining that there are three tier-one powers—the U.S., China and Russia. Tier-two powers would include Israel, Iran, North Korea, and others, such as the U.K. and American allies like Australia, Canada, Japan, France and Germany.

The Global Players and Their Tactics

“Concerning China and Russia, they have distinct targeting strategies and employ different tactics, techniques and procedures,” Botts explained. “China’s strategy follows the basic tenets of Sun Tzu’s Art of War. Their cyber operations focus on intellectual property theft and data exfiltration from governments, industry, civil society, educational institutions and private research and development all in an effort to ‘know your enemy as you know yourself.’

Russia’s efforts focus on disinformation, influencing operations, internet trolling and supply chain attacks. In addition, Russia often utilizes cyber mercenaries to leverage their state-sponsored intelligence assets.”

Botts also discussed ransomware attacks and their negative impact on the global economy. He touched on the business costs caused by intellectual property theft.

Leaders Joining the Conversation

Given the growing awareness of this “war,” he shared that a robust international…

Source…

Iranian Hackers Targeted International Conference Attendees for Intelligence Collection


Microsoft says Iranian hackers targeted high profile international conference attendees for intelligence collection purposes. The company reported that the Iranian advanced persistent threat (APT) group impersonated conference organizers and sent fake invitations using spoofed emails.

Microsoft has tracked the threat actor since 2013, accusing it of targeting journalists, political dissidents, activists, defense industry workers, prominent Iranians living abroad, and others in the Middle East.

The group has also targeted politicians, including U.S. presidential hopefuls. Microsoft reported that several high-ranking officials’ accounts were compromised.

Iranian hackers on intelligence collection mission

The hacking attempts implicated Iranian hackers identified as Phosphorus, APT35, or Charming Kitten.  Microsoft’s security chief, Tom Burt, confirmed that “Phosphorus is engaging in these attacks for intelligence collection purposes.”

The hackers targeted over 100 high profile individuals expected to attend the Munich Security Conference and Think 20 Summit in Germany and Saudi Arabia.

Attendees of the Munich Security Conference details include Canadian Prime Minister Justin Trudeau, French President Emmanuel Macron, the U.S. Secretary of State Mike Pompeo, and Speaker Nancy Pelosi (D-Calif.). It’s unclear whether the Iranian hackers targeted any of these individuals.

Microsoft disclosed that the attacks were successful in compromising several victims, including former ambassadors and other senior policy experts who help shape global agendas and foreign policies in their home countries. However, the company did not disclose the nationalities of the affected individuals during the intelligence collection campaign.

Phosphorus also attempted to dupe former government officials, policy experts, and academics in its intelligence collection efforts.

Microsoft noted that the Iranian hackers crafted the emails “in perfect English” to dupe the high-profile individuals.

The hackers provided details such as the available remote sessions and travel logistics. The attackers would then trick the victims into entering their login details into a fake login…

Source…

Microsoft says Iranian hackers targeted security conference attendees


“We believe Phosphorus is engaging in these attacks for intelligence collection purposes,” said Tom Burt, Microsoft’s security chief, in a prepared statement. “The attacks were successful in compromising several victims, including former ambassadors and other senior policy experts who help shape global agendas and foreign policies in their respective countries.”

Source…

IBM Gifts Computer Security Expo Attendees With Virus-Filled USB Sticks – Gizmodo Australia

You’d think IBM would’ve been extra careful when handing out complimentary USB sticks at a computer security expo in Australia. But noooo. According to IBM, “some of these USB keys contained malware”, with all sticks suspected to be affected. Oh, the irony. As IBM took to the stage …
Read more