{"id":31008,"date":"2017-03-22T12:30:22","date_gmt":"2017-03-22T01:30:22","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=31008"},"modified":"2017-03-22T10:03:39","modified_gmt":"2017-03-21T23:03:39","slug":"cyber-wrap-156","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

The US Department of Justice has charged<\/a> four Russians\u2014two intelligence officers and two private hackers\u2014with over 47 counts of computer crime, fraud and identity theft, for their role in the compromise of over one billion Yahoo! user accounts in August 2013 and 2014. The indictment<\/a> found that the compromise enabled direct unauthorised access to Yahoo! Accounts, targeting the personal information of Russian journalists and opposition politicians, as well as stealing financial information, and conducting mass spam campaigns using the compromised, but otherwise legitimate, e-mails. Perplexingly, one of the Russian intelligence officers charged by the US was arrested last December<\/a> by Russia for undisclosed treasonous actions on behalf of the United States.<\/p>\n

The US has earmarked<\/a> US$1.5 billion for the Department of Homeland Security to build better tools for protecting federal networks and critical infrastructure in its 2018 budget blueprint. The Trump administration isn\u2019t letting other departments off the hook either, developing<\/a> metrics to track federal agencies\u2019 compliance with the NIST cybersecurity framework. The White House has also brought on<\/a> Rob Joyce, previously Chief of the NSA\u2019s offensive \u2018Tailored Access Operations\u2019 team, to manage the federal government\u2019s cybersecurity policy.<\/p>\n

Personal information has continued to drip like a tap this week, with a database from Dun and Bradstreet, a business services company, being released<\/a> by an anonymous source to web security expert Troy Hunt<\/a>, who currently runs the public data breach notification service Have I been pwnd?<\/a><\/em>. The database holds personally identifiable information which includes the names, job titles, emails, phone numbers and work addresses of over 33 million people<\/a>, 101,013 of whom are employees of the US Department of Defense. Jamaica felt the pain of data breaches as well, reporting<\/a> US$100 million lost over 200 reported cases of cybercrime in 2016.<\/p>\n

Here in Australia, Minister for Defence Industry Christopher Pyne launched<\/a> the \u2018Next Generation Technologies Fund<\/a>\u2019 this week, which will allocate $730 million in investments for innovators and researchers working on developing Australia\u2019s future defence capabilities, including in cybersecurity. The fund is part of a wider initiative<\/a> to improve Defence Innovation collaboration and connections. An expanded write-up of that initiative is here<\/a>. Qantas has announced<\/a> a similar approach<\/a> to coaxing innovations from small businesses and start-ups, launching the \u2018Avro\u2019 accelerator program<\/a> and offering 10 start-ups the chance to work with Qantas and other big corporates for 12 weeks, while earning $150,000 along the way.<\/p>\n

Some innovation efforts that took place in the Middle East are also worth making note of. The Israeli Defence Force hosted a Pok\u00e9mon-themed training exercise for IDF cyber cadets to \u2018catch \u2018em all\u2019, with \u201c\u2018em\u201d in this case being malware hidden deep within a network they were assigned to protect. Talk about great news for Israeli Pok\u00e9mon fans who fancy a career in cyber! Or maybe not, with the IDF\u2019s security division banning Pok\u00e9mon Go on-base<\/a>, fearing that the interactive game would lead to the leaking of photographs on-site and base locations.<\/p>\n

The ongoing spat<\/a> between the Netherlands and Turkey regarding the impact of Turkish President Erdogan\u2019s political campaign in the Netherlands\u2019 Turkish communities spilled online<\/a> this week. Several prolific Twitter accounts, including BBC North America and Forbes, were hijacked, having their display pictures switched to the Turkish Flag, and tweeting out swastikas and Turkish hashtags #Nazialmanya<\/a> and #Nazihollanda<\/a>, comparing \u2018Nazi Germany\u2019 with \u2018Nazi Holland\u2019. The accounts were compromised after the third party analytics service, Twitter Counter, was hacked<\/a>, providing a stark reminder<\/a> that an account\u2019s security is only as strong as its chosen third party app\u2019s.<\/p>\n

In other news, the Australian Cyber Security Centre\u2019s 2017 Conference<\/a> wrapped up<\/a> in Canberra this week. Among its all-star line-up, among others, was our favourite @Cyber_Roo<\/a>, as well as the Australian Federal Police\u2019 David McLean hinting<\/a> that \u2018interesting developments\u2019 had taken place in the hunt for perpetrators of DDoS attacks that contributed to #censusfail<\/a>. Strangely enough, the ACSC gig coincided with hacker conference BSides Canberra 2017<\/a>. It\u2019s hard to say which crowd had more fun, but the conference swag game definitely goes to BSides, which handed out fully programmable badges<\/a> with customisable displays<\/a> to its delegates.<\/p>\n","protected":false},"excerpt":{"rendered":"

The US Department of Justice has charged four Russians\u2014two intelligence officers and two private hackers\u2014with over 47 counts of computer crime, fraud and identity theft, for their role in the compromise of over one billion …<\/p>\n","protected":false},"author":608,"featured_media":31010,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1060,391,728,747],"class_list":["post-31008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australian-cyber-security-centre","tag-cyber","tag-hacking","tag-turkey"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The US Department of Justice has charged four Russians\u2014two intelligence officers and two private hackers\u2014with over 47 counts of computer crime, fraud and identity theft, for their role in the compromise of over one billion ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-22T01:30:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-21T23:03:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/faucet-1661337_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Chi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Chi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/faucet-1661337_640.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/faucet-1661337_640.jpg\",\"width\":640,\"height\":426,\"caption\":\"Image courtesy of Pixabay user 3dman_eu.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/#primaryimage\"},\"datePublished\":\"2017-03-22T01:30:22+00:00\",\"dateModified\":\"2017-03-21T23:03:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\",\"name\":\"Michael Chi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"caption\":\"Michael Chi\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The US Department of Justice has charged four Russians\u2014two intelligence officers and two private hackers\u2014with over 47 counts of computer crime, fraud and identity theft, for their role in the compromise of over one billion ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-03-22T01:30:22+00:00","article_modified_time":"2017-03-21T23:03:39+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/faucet-1661337_640.jpg","type":"image\/jpeg"}],"author":"Michael Chi","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Michael Chi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/faucet-1661337_640.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/faucet-1661337_640.jpg","width":640,"height":426,"caption":"Image courtesy of Pixabay user 3dman_eu."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/#primaryimage"},"datePublished":"2017-03-22T01:30:22+00:00","dateModified":"2017-03-21T23:03:39+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-156\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9","name":"Michael Chi","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","caption":"Michael Chi"},"url":"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31008"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/608"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=31008"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31008\/revisions"}],"predecessor-version":[{"id":31011,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31008\/revisions\/31011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/31010"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=31008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=31008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=31008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}