{"id":29836,"date":"2016-12-07T12:35:22","date_gmt":"2016-12-07T01:35:22","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=29836"},"modified":"2016-12-07T12:35:22","modified_gmt":"2016-12-07T01:35:22","slug":"cyber-wrap-146","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

The infamous botnet infrastructure \u2018Avalanche\u2019<\/a> used by cyber crooks to launch their malware campaigns and phishing attacks was taken down<\/a> last week in a historic victory for international cooperation against cybercrime. After four years of work, a coalition<\/a> of law enforcement partners and private sector companies from 40 countries orchestrated multiple arrests, seized servers and sinkholed<\/a> or blocked more than 800,000<\/a> malicious web domains. Check out this advice<\/a> from US-CERT to make sure your computer isn\u2019t infected with Avalanche malware.<\/p>\n

International cyber cooperation continued this week, with India and Qatar inking<\/a> a new cybersecurity agreement. Along with four other pacts, Indian PM Narendra Modi and Qatari Sheikh Abdullah bin Nasser bin Khalifa Al Thani committed<\/a> to deepening technical cooperation on cybercrime, specifically joint operations to combat terrorist financing and money laundering. South Korea\u2019s Internet & Security Agency has also offered to share its cybersecurity expertise in the training<\/a> of policymakers, law enforcement and military to help build cyber capacity and boost digital economy development in the Central African state of Gabon.<\/p>\n

Australia is establishing a new Cyber Security Growth Centre, announced<\/a> Minister for Industry, Innovation and Science Greg Hunt and the Minister Assisting the PM for Cyber Security Dan Tehan on Monday. Part of the National Innovation and Science Agenda<\/a> released last December, the industry-led not-for-profit Growth Centre and associated Cyber Security Growth Network will receive $31.9 million over the next three years to boost the success of Australia\u2019s digital products and services industry. Atlassian\u2019s Director of Security Craig Davies will take the helm<\/a> as CEO of this organisation, which is expected to open its doors early next year.<\/p>\n

The Saudi government has confirmed<\/a> that its General Authority of Civil Aviation suffered a major cyber incident in November that resulted in the loss of important data and brought operations to a standstill for several days. The attack was executed via Shamoon, the same malware used in the infamous compromise of Saudi oil company Aramco in 2012<\/a>. The aviation agency was reportedly targeted as part of a broader effort<\/a> against several Saudi government agencies and Saudi fingers are unofficially pointed at Iran.<\/p>\n

Cybercriminals made away with more than two billion Roubles<\/a> (AU$42 million) from Russia\u2019s Central Bank earlier this year, according to the bank\u2019s annual report released on Friday. The hackers used fraudulent client credentials to compromise correspondent accounts and although the bank managed to recover three of the five billion roubles<\/a> initially stolen, the heist represents a trend of high-value cyber thefts following the US$81 million loss<\/a> from Bangladesh\u2019s central bank in February. In an unrelated comment, Russia\u2019s Federal Security Service announced on Friday that it had thwarted a foreign spy agency misinformation plot<\/a> designed to undermine the confidence in Russia\u2019s banking sector through a series of cyber attacks accompanied by fake news<\/a> of a national financial crisis and rampant bankruptcies on social media.<\/p>\n

Over in the US, the House of Representatives has passed<\/a> a bill that would establish an interagency intelligence committee to combat Russia\u2019s misinformation operations and restrict the movement of Russian diplomats within the US to a 25 mile radius around their official posts unless cleared by the FBI. The bill, which comes in the wake of the US Director of National Intelligence officially calling out<\/a> the Kremlin for meddling in the US election, is expected to be passed by the Senate before the end of the year.<\/p>\n

Obama\u2019s Commission on Enhancing National Cybersecurity<\/a>, created by executive order earlier this year, also released its final report last Thursday. The Report on Securing and Growing the Digital Economy<\/em><\/a> puts forward a series of recommendations on topics such as network security, innovation, and cyber workforce. The Commission\u2019s last words are designed to be a helpful handover document<\/a> on US cyber policy for Trump, with Obama affirming<\/a> that \u2018it is time for the next Administration to take up this charge and ensure that cyberspace can continue to be the driver for prosperity innovation and change\u2019. Hopefully that advice will be integrated into Trump\u2019s existing cybersecurity efforts, which include promising<\/a> a Defense review of critical infrastructure cybersecurity and appointing three Republican cyber leaders<\/a> to his transition team.<\/p>\n

And finally, ICPC has got your back if you\u2019re in need of a couple of longer cyber security reads this week. A survey of more than 500 security professionals helped produce the 2016 Global Cybersecurity Assurance Report Card<\/em><\/a>, which profiles the security confidence, risk assessment competence and threat mitigation strategies of IT professionals by both country and industry. Accenture\u2019s new report, The State of Cybersecurity and Digital Trust 2016<\/em><\/a>, offers an assessment of cyber threats and maps trends in corporate attitudes to online trust, cybersecurity budgets and organisational structure. And lastly, PwC\u2019s 2016 Global Economic Crime Survey<\/em><\/a> reveals that cyber attacks on Chinese corporations have increased by almost 1,000% over the last two years in light of the spread of IoT tech. Happy reading!<\/p>\n","protected":false},"excerpt":{"rendered":"

The infamous botnet infrastructure \u2018Avalanche\u2019 used by cyber crooks to launch their malware campaigns and phishing attacks was taken down last week in a historic victory for international cooperation against cybercrime. After four years of …<\/p>\n","protected":false},"author":390,"featured_media":29837,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,1819,728,31],"class_list":["post-29836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-gabon","tag-hacking","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The infamous botnet infrastructure \u2018Avalanche\u2019 used by cyber crooks to launch their malware campaigns and phishing attacks was taken down last week in a historic victory for international cooperation against cybercrime. After four years of ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-07T01:35:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/16298862869_08bec05526_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"488\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/16298862869_08bec05526_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/16298862869_08bec05526_z.jpg\",\"width\":640,\"height\":488,\"caption\":\"Image courtesy of Flickr user frankieleon.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/#primaryimage\"},\"datePublished\":\"2016-12-07T01:35:22+00:00\",\"dateModified\":\"2016-12-07T01:35:22+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The infamous botnet infrastructure \u2018Avalanche\u2019 used by cyber crooks to launch their malware campaigns and phishing attacks was taken down last week in a historic victory for international cooperation against cybercrime. After four years of ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-12-07T01:35:22+00:00","og_image":[{"width":640,"height":488,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/16298862869_08bec05526_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/16298862869_08bec05526_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/12\/16298862869_08bec05526_z.jpg","width":640,"height":488,"caption":"Image courtesy of Flickr user frankieleon."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/#primaryimage"},"datePublished":"2016-12-07T01:35:22+00:00","dateModified":"2016-12-07T01:35:22+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-146\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29836"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=29836"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29836\/revisions"}],"predecessor-version":[{"id":29838,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29836\/revisions\/29838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/29837"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=29836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=29836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=29836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}