{"id":8985,"date":"2013-09-03T12:00:50","date_gmt":"2013-09-03T02:00:50","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=8985"},"modified":"2013-10-01T11:54:53","modified_gmt":"2013-10-01T01:54:53","slug":"cyber-wrap-4","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>In an attack<\/a> linked to pro-Syrian government supporters, the sites of The New York Times<\/i>, Twitter and up to ten other sites were compromised by the Syrian Electronic Army (SEA). Using stolen log-in credentials from Australian IT company hosting the domain names of the affected sites, the SEA is said to have effectively \u2018walked through the front door\u2019 of the websites. The subsequently rerouted traffic to SEA websites and attacked Twitter\u2019s twimg.com domain, used to store image data and styling code. The Pentagon is reportedly<\/a> preparing for a wave of retaliatory cyber attacks against US targets in the event of any US action against the al-Assad government. While the SEA remains a concern in Washington, Syria\u2019s allies in the form of the Iranian Revolutionary Guard, and their state backed hackers, pose a much greater concern to officials.<\/p>\n

Russia\u2019s online marketplace for malicious software, code and stolen credit card details is growing<\/a>. Students and young professionals are taking advantage of Russia\u2019s established online black market in increasing numbers. They will only be encouraged by reports that domestic law enforcement posses little interest in apprehending them. Russia is one of only two Council of Europe Countries not to sign the Convention on Cybercrime<\/a>, and unsurprisingly, the chance of facing prosecution for targeting overseas businesses or individuals remains low.<\/p>\n

Maybe China was onto<\/a> something? In 2011 the United States conducted<\/a> 231 offensive cyber operations targeted towards China, Iran, North Korea and Russia among others. The report also details a $US652 million project code-named \u2018GENIE\u2019 that seeks to place \u2018covert implants\u2019 in foreign machines. This information is part of a wider leaked intelligence budget available here<\/a>.<\/p>\n

Securities regulators are stepping-up<\/a> the cyber scrutiny on financial institutions. No longer happy to leave cyber security standards in the hands of businesses, regulators have introduced new baseline standards.\u00a0 Broker-dealers must now devise and implement cyber preparedness plans covering technical, corporate, employee, and information sharing procedures.<\/p>\n

Jessica Woodall is a cyber analyst at ASPI.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

In an attack linked to pro-Syrian government supporters, the sites of The New York Times, Twitter and up to ten other sites were compromised by the Syrian Electronic Army (SEA). Using stolen log-in credentials from …<\/p>\n","protected":false},"author":133,"featured_media":7591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[480,1],"tags":[391,95,170,274],"class_list":["post-8985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-national-security","category-general","tag-cyber","tag-cyber-security","tag-intelligence","tag-syria"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"In an attack linked to pro-Syrian government supporters, the sites of The New York Times, Twitter and up to ten other sites were compromised by the Syrian Electronic Army (SEA). Using stolen log-in credentials from ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-03T02:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-10-01T01:54:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1130\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"width\":1130,\"height\":425},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/#primaryimage\"},\"datePublished\":\"2013-09-03T02:00:50+00:00\",\"dateModified\":\"2013-10-01T01:54:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"In an attack linked to pro-Syrian government supporters, the sites of The New York Times, Twitter and up to ten other sites were compromised by the Syrian Electronic Army (SEA). Using stolen log-in credentials from ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-09-03T02:00:50+00:00","article_modified_time":"2013-10-01T01:54:53+00:00","og_image":[{"width":1130,"height":425,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","width":1130,"height":425},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/#primaryimage"},"datePublished":"2013-09-03T02:00:50+00:00","dateModified":"2013-10-01T01:54:53+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/8985"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=8985"}],"version-history":[{"count":16,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/8985\/revisions"}],"predecessor-version":[{"id":8998,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/8985\/revisions\/8998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/7591"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=8985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=8985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=8985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}