{"id":14205,"date":"2014-06-04T12:30:19","date_gmt":"2014-06-04T02:30:19","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=14205"},"modified":"2014-06-10T20:43:36","modified_gmt":"2014-06-10T10:43:36","slug":"cyber-wrap-29","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>Cyber law enforcement has been on a roll as of late. After a busy May indicting Chinese hackers and combating the Blackshades<\/a> Remote Access Tool, an international team including the Federal Bureau of Investigation, Europol, and UK\u2019s National Crime Agency launched Operation Tovar<\/i><\/a>. <\/i>The operation has bought infected Windows users a two week<\/a> window to secure themselves against the GameoverZeus botnet and Cryptolocker malware (US-CERT has some advice on that front here<\/a>). The US Department of Justice<\/a> identified Russian national, Evgeniy Bogachev as one of the administrators of the botnet, a move that sees (un)Lucky1234<\/a> become the newest member of the FBI\u2019s Cyber\u2019s Most Wanted List.<\/p>\n

Although it\u2019s unlikely Russia will come in to bat for Mr Bogachev, China\u2019s response to the last round of DOJ cybercrime indictments continues to unfold. Although the more immediate response saw the release of a <\/span>report<\/a> that accused the US of \u2018unscrupulous\u2019 cyber surveillance and hit out against US <\/span>consulting firms<\/a>, China seems to have toned down rhetoric through its <\/span>Xinhua News Agency<\/a> which wrote \u2018the row between China and the United States over cyber security should not become a rift to undermine the two sides\u2019 cooperation on other issues of common concern\u2019. For its part, the US <\/span>Department of Defense<\/a> is also looking to play nice, hoping to minimise damage to military-to-military relations. Despite those overtures, it\u2019s clear from the Shangri-La Dialogue that the relationship will remain cool for quite some time. For Australia however, our own Kl\u00e9e Aiken suggests that there may be <\/span>signs of life under the cyber ice<\/a>.<\/span><\/p>\n

It was <\/span>revealed<\/a> this week that Iranian hackers had successfully undertaken a three-year online espionage campaign that infiltrated the machines of over 2000 US citizens. Worryingly, the Iranians employed a level of online social engineering usually reserved for nations with more advanced cybercriminals such as China and Russia. The hackers used the identities of real life US political and government figures to gain the trust of targets online, then used the message and chat functions of those sites to encourage them to enter their details into a third-party website from where they were subsequently stolen. One of the high-profile figures who was impersonated during the attack was former UN ambassador John Bolton.<\/span><\/p>\n

But Bolton took the increased attention on the chin telling the <\/span>Daily Beast<\/a><\/p>\n

I am honoured to be selected by the Ayatollahs for this distinction \u2026 maybe I should create a fake Iranian LinkedIn account and offer to give away the country\u2019s nuclear weapons secrets. I will try to get to John Kerry first.<\/span><\/p><\/blockquote>\n

With nine days to go \u2018til the World Cup, the Brazilian government has more than protests, unfinished stadiums, and the Olympics to worry about. Latest reports show the government has fallen <\/span>victim<\/a> to a phishing campaign targeting its internal diplomatic communications network. The attack breached the email and unclassified document exchange network of Brazil\u2019s External Relations Ministry and its network of embassies and missions overseas. It\u2019s unknown what information may have been gathered by the infiltrators, but the breach was deemed serious enough to pull the system temporarily offline and an investigation has been launched by the Federal Police and the Institutional Security Cabinet.<\/span><\/p>\n

Turning closer to home, last week CERT Australia released its annual Cyber Crime and Security Survey Report<\/a><\/i>. The report gives an insight into the cyber issues that are of most concern to business, the number of cyber incidents they have experienced, and the measures they have in place to deal with those events and issues. The report was based on 135 responses from businesses and has helped organisations to identify where gaps and vulnerabilities may lie within their systems. The report is available on the CERT Australia website.<\/p>\n

Finally, keep your eyes open for news from the United Nations Regional Centre for Peace and Disarmament in the Asia and the Pacific <\/span>International Workshop on Information and Cyber Security<\/a> on 5-6 June, hosted by the Chinese Ministry of Foreign Affairs. It\u2019ll be interesting to see how this will play with the host country\u2019s decision to crackdown on <\/span>instant messaging<\/a> and <\/span>Google<\/a> in the lead up to the 25th Anniversary of Tiananmen Square.<\/span><\/p>\n

Kl\u00e9e Aiken and Jessica Woodall are analysts in ASPI’s International Cyber Policy Centre.<\/em><\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Cyber law enforcement has been on a roll as of late. After a busy May indicting Chinese hackers and combating the Blackshades Remote Access Tool, an international team including the Federal Bureau of Investigation, Europol, …<\/p>\n","protected":false},"author":153,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1,531],"tags":[17,771,52,391,749,728,247,825,31],"class_list":["post-14205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-cyber-security-2","tag-australia","tag-brazil","tag-china","tag-cyber","tag-cyber-espionage","tag-hacking","tag-iran","tag-phishing","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Cyber law enforcement has been on a roll as of late. After a busy May indicting Chinese hackers and combating the Blackshades Remote Access Tool, an international team including the Federal Bureau of Investigation, Europol, ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-04T02:30:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-06-10T10:43:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/#primaryimage\"},\"datePublished\":\"2014-06-04T02:30:19+00:00\",\"dateModified\":\"2014-06-10T10:43:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Cyber law enforcement has been on a roll as of late. After a busy May indicting Chinese hackers and combating the Blackshades Remote Access Tool, an international team including the Federal Bureau of Investigation, Europol, ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-06-04T02:30:19+00:00","article_modified_time":"2014-06-10T10:43:36+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/#primaryimage"},"datePublished":"2014-06-04T02:30:19+00:00","dateModified":"2014-06-10T10:43:36+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-29\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14205"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=14205"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14205\/revisions"}],"predecessor-version":[{"id":14279,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14205\/revisions\/14279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=14205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=14205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=14205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}