{"id":20945,"date":"2015-06-10T12:30:10","date_gmt":"2015-06-10T02:30:10","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=20945"},"modified":"2015-06-10T11:00:13","modified_gmt":"2015-06-10T01:00:13","slug":"cyber-wrap-74","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Cyber<\/a><\/p>\n

In what\u2019s believed to be potentially the largest compromise<\/a> of US government employee information ever, the US Office of Personnel Management (OPM) was recently breached by hackers. The Department of Homeland Security announced that malicious software was detected on OPM\u2019s system in April, and by May they had established the scale of the data compromise, with roughly 4 million workers \u2018likely affected\u2019. \u00a0The attack targeted both the OPM\u2019s IT network and its offsite data at the Department of the Interior\u2019s shared facility for government agencies, though there\u2019s been no word as of yet if any other departments were compromised.<\/p>\n

The motives behind the attack are numerous. Names, dates of birth and social security numbers, can be used in identity theft and financial crime, but officials<\/a> are concerned this information will also \u2018help hackers test potential passwords to other sites\u2019 that government workers have access to.<\/p>\n

Speaking<\/a> at a G7 press conference about the breach, President Obama wouldn\u2019t confirm which country the attacks originated from and called on Congress to pass stalled cyber legislation to help address \u2018significant vulnerabilities\u2019. Jim Langevin, the ranking Democratic member of the House Subcommittee on Emerging Threats and Capabilities was somewhat more explicit<\/a> when laying blame:<\/p>\n

We know that the attack occurred from somewhere in China, but we don’t know whether it was an individual or a group or a nation-state attack.<\/p><\/blockquote>\n

Turning now to Asia, the Indian government has put its money where its mouth is, freeing<\/a> up funds to set up its National Cyber Coordination Centre. Indian Communications and IT Minister Ravi Shankar Prasad made the announcement that Rs 770 crore (about AU$157 million) will be allocated to set up the new centre. The government has also approved the establishment of a Botnet Cleaning and Malware Analysis Centre to the tune of Rs 90.5 crore (over AU$18 million). The new centre will co-ordinate cyber activities among India\u2019s intelligence agencies and spearhead responses to major events. The body is also set to work with Indian ISPs to access metadata, creating concerns<\/a> that the body will become an \u2018Indian cyber snooping agency.\u2019<\/p>\n

Indonesia has made public<\/a> its own plans for a national cyber body, with Coordinating Political, Legal and Security Affairs Minister Tedjo Edhy Purdijatno telling a recent symposium that the government was hoping to put aside funds for the body in next year\u2019s budget. Tedjo explained that each of the country\u2019s defence and law enforcement bodies had a cybercrime unit, \u2018but they lacked coordination and were slow to pick up on new technologies\u2019. The new body would bring together representatives \u2018from the National Police, the military (TNI), the National Intelligence Agency (BIN) and the Communications and Information Ministry among others\u2019. Indonesian cyber expert, and advisor to Mr. Purdijanto, Yono Reksoprodjo, carried out a short Q&A with the Wall Street Journal<\/em> about the Centre which you can find here<\/a>.<\/p>\n

Regular readers may recall the Bundestag hacking attempt mentioned previously<\/a> in Cyber wrap. Officials within the German government have reportedly<\/a> managed to read parts of source-code used in the hack, which has led them to believe that it was a state-backed Russian infiltration attempt. The Trojan Malware was very similar in nature to one used in an earlier attack on a German data network, helping investigators to make the link.<\/p>\n","protected":false},"excerpt":{"rendered":"

In what\u2019s believed to be potentially the largest compromise of US government employee information ever, the US Office of Personnel Management (OPM) was recently breached by hackers. The Department of Homeland Security announced that malicious …<\/p>\n","protected":false},"author":133,"featured_media":20946,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,713,69,8,31],"class_list":["post-20945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-cyberattack","tag-india","tag-indonesia","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"In what\u2019s believed to be potentially the largest compromise of US government employee information ever, the US Office of Personnel Management (OPM) was recently breached by hackers. The Department of Homeland Security announced that malicious ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-10T02:30:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-06-10T01:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/15855653380_74bb9bbf33_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/15855653380_74bb9bbf33_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/15855653380_74bb9bbf33_z.jpg\",\"width\":640,\"height\":534},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/#primaryimage\"},\"datePublished\":\"2015-06-10T02:30:10+00:00\",\"dateModified\":\"2015-06-10T01:00:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"In what\u2019s believed to be potentially the largest compromise of US government employee information ever, the US Office of Personnel Management (OPM) was recently breached by hackers. The Department of Homeland Security announced that malicious ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-06-10T02:30:10+00:00","article_modified_time":"2015-06-10T01:00:13+00:00","og_image":[{"width":640,"height":534,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/15855653380_74bb9bbf33_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/15855653380_74bb9bbf33_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/15855653380_74bb9bbf33_z.jpg","width":640,"height":534},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/#primaryimage"},"datePublished":"2015-06-10T02:30:10+00:00","dateModified":"2015-06-10T01:00:13+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-74\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/20945"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=20945"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/20945\/revisions"}],"predecessor-version":[{"id":20947,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/20945\/revisions\/20947"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/20946"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=20945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=20945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=20945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}