WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador

Expertos en informática advierten que un nuevo ataque global con un brote de ransomware es “inminente” y que incluso podría ser lanzado el lunes. BBC Mundo te cuenta los detalles y cómo protegerte de estos virus.

Fuente: WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador


DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian

The cyber-attack that brought down much of America’s internet last week was caused by a new weapon called the Mirai botnet and was likely the largest of its kind in history, experts said.

Fuente: DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian


Cyber attack: hackers ‘weaponised’ everyday devices with malware to mount assault | Technology | The Guardian

The huge attack on global internet access, which blocked some of the world’s most popular websites, is believed to have been unleashed by hackers using common devices like webcams and digital recorders.

Fuente: Cyber attack: hackers ‘weaponised’ everyday devices with malware to mount assault | Technology | The Guardian


Someone Is Learning How to Take Down the Internet – Schneier on Security

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who is doing this, but it feels like a large nation state. China or Russia would be my first guesses.

Fuente: Someone Is Learning How to Take Down the Internet – Schneier on Security


“La ciberguerra sería una forma de terrorismo de Estado”

El libro pretende incentivar la mirada crítica entre el gran público ante los acontecimientos calificados de “ciberguerra” y alertar de la coartada que puede proporcionar el tremendismo sensacionalista en estos temas a quienes pretenden recortar libertades o privacidad.

Fuente: “La ciberguerra sería una forma de terrorismo de Estado”


Ejército alemán contará con una división contra ataques cibernéticos – El Mostrador

El Ejército alemán contará con una división encargada de combatir los ataques cibernéticos, anunció esta semana la ministra de Defensa Ursula von der Leyen.

Fuente: Ejército alemán contará con una división contra ataques cibernéticos – El Mostrador


Malicious attacks account for bulk of data loss – FT.com

Malware and hacking have overtaken employee error as the leading cause of data loss at companies, according to research from Beazley, the insurer. Malicious attacks accounted for a third of data breaches last year, up from 18 per cent in 2014.

Fuente: Malicious attacks account for bulk of data loss – FT.com


EE.UU. ‘quebrantó’ las redes informáticas de Corea del Norte en 2010 – El Mostrador

EE.UU. ‘quebrantó’ las redes informáticas de Corea del Norte en 2010 – El Mostrador.

La Agencia de Seguridad Nacional logró romper las barreras informáticas en 2010 y entrar en los sistemas norcoreanos a través de las redes chinas que conectan a este país con el resto del mundo.

eeuucoreadelnorte

Estados Unidos “quebrantó” las redes informáticas de Corea del Norte en 2010 y por eso supo que el país estaba detrás del ataque a Sony Pictures, reportaron The New York Times y Der Spiegel.

Corea del Norte dedicó dos meses a entrar en los sistemas de Sony después de que la empresa anunciara sus planes para producir una comedia sobre el asesinato del líder de este país, titulada “The Interview”.

La Agencia de Seguridad Nacional logró romper las barreras informáticas en 2010 y entrar en los sistemas norcoreanos a través de las redes chinas que conectan a este país con el resto del mundo.

Corea del Norte ha negado repetidamente su responsabilidad en el ciberataque contra Sony.


Sony hack: sacked employees could be to blame, researchers claim | Film | The Guardian

Sony hack: sacked employees could be to blame, researchers claim | Film | The Guardian.

Sony cancelled the release of the Interview in major cinemas, believing it had been hacked by North Korea in retaliation for the film’s depiction of its leader Kim Jong-un being assasinated Photograph: Veronique Dupont/Getty

Security experts investigating the devastating hack against Sony Pictures appear to be moving away from the theory that the attack was a carried out by North Korea, focusing instead on disgruntled former employees of the firm.

Researchers at Norse cybersecurity claim that six former employees could have compromised the company’s networks, arguing that accessing and navigating selective information would take a detailed knowledge of Sony’s systems.

Norse is not part of the official FBI investigation, but did brief the government on Monday, the company said. Though noting that the findings are “hardly conclusive”, Norse senior vice president Kurt Stammberger told the Security Ledger that nine researchers had begun to explore the theory that an insider with motive against Sony would be best placed to execute a hack.

“The FBI points to reused code from previous attacks associated with North Korea, as well as similarities in the networks used to launch the attacks,” said writer Bruce Schneier. “This sort of evidence is circumstantial at best. It’s easy to fake, and it’s even easier to interpret it wrong. In general, it’s a situation that rapidly devolves into storytelling, where analysts pick bits and pieces of the ‘evidence’ to suit the narrative they already have worked out in their heads.”

 

Schneier also said that diplomatically, it may suit the US government to be “overconfident in assigning blame for the attack” to try and discourage future attacks by nation states.

 

He also pointed to comments by Harvard law professor Jonathan Zittrain, who said Sony might be encouraged to present the hack as an act or terrorism to help fend of likely lawsuits from current and former employees damaged by leaked material.

“If Sony can characterize this as direct interference by or at the behest of a nation-state, might that somehow earn them the kind of immunity from liability that you might see other companies getting when there’s physical terrorism involved, sponsored by a state?” Zittrain told AP.


Las dudas sobre el papel de Corea del Norte en el caso de piratería contra Sony – BioBioChile

Las dudas sobre el papel de Corea del Norte en el caso de piratería contra Sony – BioBioChile.

 

ARCHIVO | Global Panorama (CC) | FlickrARCHIVO | Global Panorama (CC) | Flickr

Publicado por Claudia Miño | La Información es de Agencia AFP
 

Para Barack Obama no hay duda alguna: Corea del Norte y su líder Kim Jong-Un están detrás del acto de piratería de que fue objeto el estudio Sony Pictures. Pero según expertos, el caso no es tan simple.

El régimen comunista niega estar implicado en una operación durante la cual fueron robados los datos personales de 47.000 empleados y colaboradores de Sony, pero ha elogiado a sus autores.

El incidente, revelado el 24 de noviembre, fue reivindicado por el grupo de piratas Guardianes de la Paz (GOP, por sus iniciales en inglés), que exigió a Sony anular el estreno de “The Interview” (La entrevista), una sátira en la que dos periodistas son contactados por la CIA para asesinar a Kim Jong-Un.

El presidente de Estados Unidos no dudó en culpar a Pyongyang y dijo que su país respondería al ataque.

Sin embargo, especialistas en seguridad informática estiman que las pistas que apuntan hacia Corea del Norte pueden ser en este caso muy frágiles.

“Esta afirmación me deja escéptico y estaría aún más sorprendido de que Corea del Norte haya sido capaz de llevar a cabo (el ataque) sola, sin ayuda”, comentó John Dickson, de la empresa Denim Group.

“No hay duda de que (los norcoreanos) tienen ganas de golpearnos, pero no disponen de los recursos que tienen otros estados” y que les permitirían lanzar un ciberataque de esta envergadura, declaró a la AFP.

“En realidad, no sabemos nada”, dijo por su lado Bruce Schneier, de Co3 Systems, una firma especializada en seguridad informática.


FBI warned Year Ago of impending Malware Attacks—But Didn’t Share Info with Sony – The Intercept

FBI warned Year Ago of impending Malware Attacks—But Didn’t Share Info with Sony – The Intercept.

BY JANA WINTER 

Featured photo - FBI warned Year Ago of impending Malware Attacks—But Didn’t Share Info with Sony

Nearly one year before Sony was hacked, the FBI warned that U.S. companies were facing potentially crippling data destruction malware attacks, and predicted that such a hack could cause irreparable harm to a firm’s reputation, or even spell the end of the company entirely.  The FBI also detailed specific guidance for U.S. companies to follow to prepare and plan for such an attack.

But the FBI never sent Sony the report.

The Dec. 13, 2013 FBI Intelligence Assessment, “Potential Impacts of a Data-Destruction Malware Attack on a U.S. Critical Infrastructure Company’s Network,” warned that companies “must become prepared for the increasing possibility they could become victim to a data destruction cyber attack.”

The 16-page report includes details on previous malware attacks on South Korea banking and media companies—the same incidents and characteristics the FBI said Dec. 19th that it had used to conclude that North Korea was behind the Sony attack.

The report, a copy of which was obtained by The Intercept, was based on discussions with private industry representatives and was prepared after the 2012 cyber attack on Saudi Aramco.  The report was marked For Official Use Only, and has not been previously released.

In it, the FBI warned, “In the current cyber climate, the FBI speculates it is not a question of if a U.S. company will experience an attempted data-destruction attack, but when and which company will fall victim.”


Enough with the Sony hack. Can we all calm down about cyberwar with North Korea already? | Trevor Timm | Comment is free | theguardian.com

Enough with the Sony hack. Can we all calm down about cyberwar with North Korea already? | Trevor Timm | Comment is free | theguardian.com.

Yes, the Interview was just a Seth Rogen stoner movie – and, no, privacy, free speech and World War III are not at stake

the interview movie poster
“We will respond proportionally,” Obama said on Friday. Why should the US be responding offensively at all? Photograph: Sony Pictures

The sanest thing anyone said in Washington this week was a reminder, on the Friday before Christmas, when Barack Obama took a break from oscillating between reassuring rationality and understated fear to make an accidental joke:

It says something about North Korea that it decided to mount an all-out attack about a satirical movie … starring Seth Rogen.

It also says something about the over-the-top rhetoric of United States cybersecurity paranoia that it took the President of the United States to remind us to take a deep breath and exhale, even if Sony abruptly scrapped its poorly reviewed Hollywood blockbuster after nebulous threats from alleged North Korean hackers.

Unfortunately, acting rational seems out of the question at this point. In between making a lot of sense about Sony’s cowardly “mistake” to pull a film based on a childish, unsubstantiated threat, Obama indicated the US planned to respond in some as-yet-unknown way, which sounds a lot like a cyberattack of our own.

“We will respond, we will respond proportionally, and in a place and time that we choose,” Obama said at his year-end news conference. Why should we be responding offensively at all? As the Wall Street Journal’s Danny Yadron reported, a movie studio doesn’t reach the US government’s definition of “critical infrastructure” that would allow its military to respond under existing rules, but that didn’t stop the White House from calling the Sony hack a “national security issue” just a day later.

Let’s put aside for a moment that many security experts haven’t exactly been rushing to agree with the FBI’s cut-and-dry conclusion that “the North Korean government is responsible” for the hack. Wired’s Kim Zetter wrote a detailed analysis about why the evidence accusing North Korea is really flimsy, while other security professionals have weighed in with similar research.

But whoever the hackers are, can we stop calling them “cyber-terrorists,”like Motion Picture Association of America chairman Chris Dodd did on Friday? They may be sadistic pranksters, extortionists and assholes, but anonymously posting a juvenile and vague word jumble incorporating “9/11” that has no connection to reality does not make them terrorist masterminds. That’s giving whoever did it way too much credit.


EE UU cree que Corea del Norte está detrás del ataque a Sony | Cultura | EL PAÍS

EE UU cree que Corea del Norte está detrás del ataque a Sony | Cultura | EL PAÍS.


Kim Jong-un, en una ceremonia por el tercer aniversario de la muerte de su padre, el miércoles. / JUNG YEON-JE (AFP)

Enviar a LinkedIn0
Enviar a TuentiEnviar a Eskup

EnviarImprimirGuardar

Estados Unidos ha conseguido finalmente encontrar la conexión entre Corea del Norte y el masivo ataque informático que atenaza a la multinacional Sony Pictures desde hace tres semanas. Fuentes anónimas del FBI citadas por The New York Times, CNN y Associated Press confirmaron por primera vez que Pyongyang está detrás de la brutal represalia contra la compañía por la película La entrevista, una parodia sobre un intento de asesinato del presidente norcoreano, Kin Jong-un.

Los medios estadounidenses afirman que los investigadores harán un anuncio al respecto este jueves. Un portavoz del Consejo de Seguridad Nacional dijo el miércoles por a noche que “el Gobierno de Estados Unidos ha ofrecido a Sony Pictures Entertainment apoyo y asistencia en respuesta al ataque. El FBI lleva la iniciativa en la investigación. EE UU está investigando la autoría y dará información en el momento apropiado”. El organismo afirma que la Casa Blanca “trabaja sin descanso para llevar a los autores de este ataque ante la justicia” y está “considerando varias opciones” de respuesta.


Cines ceden ante amenazas de hackers y suspenden estreno de película sobre Corea del Norte – El Mostrador

Cines ceden ante amenazas de hackers y suspenden estreno de película sobre Corea del Norte – El Mostrador.

En las últimas semanas, se ha especulado con la posibilidad de que Pyonyang esté detrás del hackeo a Sony, ya que hace unos meses el gobierno norcoreano calificó a “The Interview” como “un acto de guerra”.

El estreno de “The Interview” en Nueva York, previsto para el próximo 25 de diciembre, fue suspendido ante el temor generado por las amenazas de ataques contra las salas.

Otros cines de Estados Unidos también decidieron no proyectar ese título para evitar posibles represalias.

Los piratas informáticos detrás del hackeo del mes pasado contra el estudio Sony Pictures, hiceron público este martes un mensaje en el que hacían referencia a los atentados del 11 de septiembre de 2001 y amenazaban con llevar a cabo acciones similares en las salas que exhibieran la película.

La cinta producida por Sony Pictures es una parodia al régimen de Corea del Norte y en ella sus protagonistas -Seth Rogen y James Franco- diseñan un plan para asesinar al líder norcoreano Kim Jong-Un.

En las últimas semanas, se ha especulado con la posibilidad de que Pyonyang esté detrás del hackeo a Sony, ya que hace unos meses el gobierno norcoreano calificó a “The Interview” como “un acto de guerra”.

“Les mostraremos claramente en el momento y en el los lugares en los que se exhiba ‘The Interview’, incluyendo el estreno, el destino amargo al que estarán condenados aquellos que buscan diversión en el terror”, se puede leer en el mensaje que los hackers enviaron en las últimas horas a los medios en Estados Unidos.

“El mundo estará lleno de miedo. Recuerden el 11 de septiembre de 2001. Les recomendamos que se mantengan alejados en ese momento de esos lugares (si su casa está cerca mejor váyanse). Todo lo que suceda en los próximos días es resultado de la avaricia de Sony Pictures Entertainment”, aseguran los piratas que se identifican bajo las siglas de GOP (Guardians of Peace).

Esta es la primera vez que GOP nombra la película “The Interview” en uno de sus mensajes.


Corea del Norte se declara inocente de piratería informática contra Sony Pictures – BioBioChile

Corea del Norte se declara inocente de piratería informática contra Sony Pictures – BioBioChile.

 

Global Panorama (CC) FlickrGlobal Panorama (CC) Flickr

Publicado por Catalina Díaz | La Información es de Agencia AFP
 

Corea del Norte negó este domingo cualquier responsabilidad en el ataque informático masivo contra Sony Pictures, que reveló información confidencial de unas 47.000 personas, entre las cuales figuran algunas personalidades.

La Comisión de defensa nacional norcoreana denunció los “falsos rumores” implicando a Pyongyang en el ataque contra Sony, aunque lo calificó de “acto legítimo”.


Forget North Korea – the real rogue cyber operator lies much closer to home | Technology | The Guardian

Forget North Korea – the real rogue cyber operator lies much closer to home | Technology | The Guardian.

North Korea

 North Korea was implicated in a cyber-attack on Sony Pictures, but the real story of the past two weeks involved further revelations about the spying methods used by GCHQ and the NSA. Photograph: Kim Jae-Hwan/AFP/Getty Images

Were you to measure significance in column inches, the massive cyber-attack on Sony Pictures would appear to be the story of the week.Company executives had to post notices on office entrances telling staff not to log into the network when they reached their desks. The company’s entire network had to be taken offline as it grappled with a ransom demand that threatened to release confidential documents and not-yet-released films unless money changed hands.

The big question was: who was responsible for the attack? Fevered speculation led some people to point the finger at North Korea, on the grounds that one of the forthcoming films, The Interview, poked fun at the country’s leader, Kim Jong-un. This seemed implausible to this columnist: North Korea may be distinctly humourless on the subject of its beloved leader, but seeking a ransom would be uncool even for that nauseating regime.

In the event, no money seems to have changed hands: some confidential documents, eg spreadsheets giving salaries of top Sony executives,made their way online and the embargoed movies began to pop up on piracy sites.

Exciting stuff, eh? But the really big cyber story of the past two weeks is less glamorous but rather more worrying in the longer term. It concerns Regin, a piece of malware that has only recently come to light, although it’s been around for years. The security firm Symantec describes it as “a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customisable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organisations, infrastructure operators, businesses, researchers and private individuals.”

The company goes on to speculate that developing Regin took “months, if not years” and concludes that “capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state”.


Did North Korea's notorious Unit 121 cyber army hack Sony Pictures? | Technology | The Guardian

Did North Korea’s notorious Unit 121 cyber army hack Sony Pictures? | Technology | The Guardian.

Reports have pointed the finger at North Korea for the attack which crippled Sony Pictures and leaked documents and movies online

FBI joins probe into possible North Korea hack of Sony Pictures

Watchful … Kim Jong Un, North Korean leader, is the subject of a spoof film due to be released by Sony Pictures.
Watchful … Kim Jong un, North Korean leader, is the subject of a spoof film due to be released by Sony Pictures. Sony Photograph: KCNA KCNA / Reuters/REUTERS

North Korea has refused to deny involvement in the hack of Sony Pictures, which crippled the studio’s computers this week and leaked current blockbusters and private documents online.

A spokesman for North Korea’s UN mission said: “The hostile forces are relating everything to the DPRK (North Korea). I kindly advise you to just wait and see.”

Sony staff were reduced to using pen, paper and fax machines, unable to use their computers. Some sources said that 70% of files, documents and even film scripts had been deleted.

Ex-employees on whom Sony held data told the Guardian they were worried that some of the leaked data allegedly included personal data. “There’s lots of very personal info: contracts, payroll info, work evaluation. Workers [are] upset they aren’t getting good answers from management,” said one. “The question remains if they actually have the files in question. If they do it’s a huge mess.”

A group calling itself Guardians of Peace (Gop) has claimed responsibility for the hack, though links between Gop and the North Korean authorities have not been confirmed.


Cryptolocker: what you need to know | Technology | theguardian.com

Cryptolocker: what you need to know | Technology | theguardian.com.

What happens when a computer is infected with the malicious software, and what should you do to protect your files?

 

 

Viruses such as Cryptolocker can be attacked by taking down the servers that control them.
Viruses such as Cryptolocker can be attacked by taking down the servers that control them. Photograph: imagebroker/Alamy

 

Cryptolocker is back in the headlines, thanks to a coordinated effort to take down the computers and criminals that run the notorious “ransomware”. But what is it? And how can you fight it?

Cryptolocker is ransomware: malicious software which holds your files to ransom

The software is typically spread through infected attachments to emails, or as a secondary infection on computers which are already affected by viruses which offer a back door for further attacks.

When a computer is infected, it contacts a central server for the information it needs to activate, and then begins encrypting files on the infected computer with that information. Once all the files are encrypted, it posts a message asking for payment to decrypt the files – and threatens to destroy the information if it doesn’t get paid.

The authorities have won users a two-week window of safety

The National Crime Agency (NCA) announced yesterday that the UK public has got a “unique, two-week opportunity to rid and safeguard” themselves from Cryptolocker. The agency didn’t go into more detail, but it seems likely that at least one of the central servers which Cryptolocker speaks to before encrypting files has been taken down.

The NCA has also taken down the control system for a related piece of software, known as GameOver Zeus, which provides criminals with a backdoor into users’ computers. That back door is one of the ways a computer can be infected with Cryptolocker in the first place.

What that means is, until the window is closed – and the virus cycles to new servers – users who are infected with Cryptolocker won’t lose their files to encryption. As a result, these users have the chance to remove the virus before it destroys data, using conventional anti-virus software. In other words, there has never been a better time to update the protection on your computer.

But watch out – while the servers that control Cryptolocker are out of action, it’s possible to be infected with it and not know. If you don’t keep your computer clean, then at the end of the two-week period, you could be in for a nasty surprise.