When Chinese RATs Attack

Oh, hey, look what China did, again. Isn’t this supposed to be an act of war now?

Massive Global Cyberattack Targeting U.S., U.N. Discovered; Experts Blame China

The world’s most extensive case of cyber-espionage, including attacks on U.S. government and U.N. computers, was revealed Wednesday by online security firm McAfee, and analysts are speculating that China is behind the attacks.

The spying was dubbed “Operation Shady RAT,” or “remote access tool” by McAfee — and it led to a massive loss of information that poses a huge economic threat, wrote vice president of threat research Dmitri Alperovitch.

. . .

Analysts told The Washington Post that the finger of blame for the infiltration of the 72 networks — 49 of them in the U.S. — points firmly in the direction of China.

See also:
Revealed: Operation Shady RAT
McAfee’s Operation Shady RAT exposes national cybersecurity lapses
McAfee discovers massive series of cyber attacks
Hacking Campaign Targets U.S. Government, Signs Point to China
Operation Shady RAT: five-year hack attack hit 14 countries
China Suspected Of Shady RAT Attacks
Q+A: Massive cyber attack dubbed “Operation Shady RAT”
Operation Shady RAT: A frightening web of global cyber-espionage
Operation Shady RAT smells like Chinese hacking
All cursors point to China in global hack attack that threatens nations
China accused of biggest ever global cyber spying attacks
Hackers Based in China Attack UN, Olympic Networks, Security Firms Report
Operation Shady RAT and the cyberhacking
APT Attackers Used Chinese-Authored Hacker Tool To Hide Their Tracks

Why did it take a private security company to uncover the largest case of cyberspying in world history and why aren’t we doing something about it?

/does China have to steal every last piece of sensitive and secret computer data we possess before we start taking this threat seriously?

Advertisements

Life, Liberty, And The Pursuit Of Free Internet Porn

Are you kidding me, internet access is a basic human right? Of course, as long as you have a basic human right to internet access, it follows that you also have a basic human right to a computer, modem, internet service, and hey, you’re going to need a place to plug in and the electricity to make it all work. Can’t afford all that? No problem, it’s a basic human right, demand it all free from your government and, if they can’t or won’t provide it, drag them before the U.N. Human Rights Council for human rights violations!

UN report: Internet access is a basic human right

Access to the Internet, especially during times of political unrest, is a basic human right, says a report released by the United Nations today.

“Facilitating access to the Internet for all individuals, with as little restriction to online content as possible, should be a priority for all States,” says the report, published on May 16 by Frank La Rue, a “special rapporteur” for the UN’s Human Rights Council.

. . .

The report urges states to avoid or amend any laws that “permit users to be disconnected from Internet access.”

. . .

The UN report defines Internet access to include both free information flow as well as access to infrastructure, “such as cables, modems, computers and software, to access the Internet in the first place.”

Read the report:

Report of the Special Rapporteur on the
promotion and protection of the right to freedom
of opinion and expression, Frank La Rue

See also:
Internet should remain as open as possible – UN expert on freedom of expression
United Nations report: Internet access is a human right
UN Declares Internet Access As A Human Right
UN Report: Internet access a human right
United Nations Declares Internet Access a Basic Human Right
United Nations Claims Internet Blackouts Violate Human Rights
UN: Disconnecting File-Sharers Breaches Human Rights
Filesharing laws ‘breach human rights’
United Nations High Commissioner for Human Rights (OHCHR)

And make no mistake, when the report mentions “with as little restriction to online content as possible’, that’s a direct shot at copyright holders and any governmental efforts to protect copyright or otherwise filter internet content. You see, no matter how prurient, vile, subversive, inflammatory, inaccurate, untruthful, or proprietary it is, information and intellectual property just want to be free! It’s a basic human right, damn it!

/so remember boys and girls, if you don’t have access to free internet porn, demand it, along with all the equipment and infrastructure needed to enjoy yourself, it’s your basic human right!

Your Paper’s Ringing, Are You Going To Bend It?

Do cell phones really need to be thinner, smaller, and bendable?

‘Paper iPhone’ could be next mobile revolution

A pocket-sized computer as thin and flexible as a sheet of paper is set to be unveiled next week. While it’s just a prototype, the researchers say the bendy souped-up smartphone could revolutionize the way we interact with computers.

Called PaperPhone, the new device is a flexible version of e-ink, the digital ink screen found in e-readers such as the Amazon Kindle.

“This computer looks, feels and operates like a small sheet of interactive paper,” said lead PaperPhone creator Roel Vertegaal, the director of Queen’s University Human Media Lab. “You interact with it by bending it into a cell phone, flipping the corner to turn pages, or writing on it with a pen.”

See also:
World’s First Flexible Smartphone Invented in Canada
Researchers demonstrate flexible epaper phone
Is your iPhone obsolete? Meet PaperPhone
Flexible phone made from electronic paper to debut
Canadian lab unveils Paperphone: flat, flexible smartphone
First flexible smartphone made of electronic paper to debut [VIDEO]
‘PaperPhone’: Cellphone of the Future?
iPhone to Paper Phone: Smartphone prototype made with interactive paper
The smartphone concept that bends all the rules
Ultra-thin ‘PaperPhone’ bends to user’s will
Queen’s University team designs bendable computer that it sees replacing paper
Paper-thin computer set to redefine industry

This is interesting technology but, in my opinion, it’s a solution looking for a problem. It seems to me that using “bending” commands would require more physical effort than pushing, pinching, or sliding fingers across a touchscreen.

/then again, what do I know, I don’t even own a cell phone

We’re Number One, We’re Number One!

This is why it’s important to keep your computer security up to date.

US Ranks First for Bot-Infected Computers and Spam Output

According to data gathered by Microsoft’s Malicious Software Removal Tool (MSRT), the United States had the highest number of computers infected with botnet malware, during the first half of 2010.

Botnet are armies of infected computers, which connect to remote command and control (C&C) servers and listen to instructions from attackers.

Botnets can serve a variety of criminal activities, but the largest ones are primarily used to send spam.

According to a recent report from Symantec, during the first half of the year, 90% of the daily spam traffic was generated by five to six million compromised computers.

In the latest edition of its Security Intelligence Report (SIR), Microsoft reveals that during Q2, MSRT has cleaned 2,148,169 bot infections from US computers.

That’s four times more than in the second country on the list, Brazil, with 511,002. Spain (485,603), Korea (422,663) and Mexico (364,554) complete the top five.

“Unsurprisingly, the list is dominated by populous locations with large numbers of computer users, led by the United States and Brazil,” says Microsoft.

However, there are at least two regions with large numbers of computers that do not dominate the list – China, which finished 8th, and Russia, 9th.

See also:
Featured Intelligence – Battling Botnets
USA Is Still #1 In Botnets
United States Ranked Number One for Relaying Spam, Sophos Reports
Report: United States is world’s top spammer
US Has Most Botnet-infected PC’s
Microsoft Report: 2 Million US PCs Part of Botnets
Microsoft: Over 2 million U.S. PCs caught in botnets
Millions Of US Computers Completely Pwned By Botnets
Microsoft: Your Computer Could be One of 2.2 Million Infected Botnet PCs
Microsoft: Botnets are the ‘launch pad of cybercrime’

If you’re not sure whether you have an infected computer, run Microsoft’s Malicious Software Removal Tool (MRT). Go to Start/Run and then type in “mrt”.

/if you’re not part of the solution, you’re part of the problem

Weakest Link In The Chain

Who’s running the show here, Microsoft?

Cyber Command chief suggests Pentagon networks are vulnerable

In his first hearing before the House Armed Services Committee, new US Cyber Command head Gen. Keith Alexander offered a troubling window into the threats that Pentagon networks face at the hands of terrorist and criminal syndicates, foreign intelligence organizations, and “hacktivists” intent on infiltrating power grids and financial networks.

These are threats that could hamper the US war effort in Afghanistan. Though the command recently deployed an “expeditionary cybersupport” unit to help to defend US networks in Afghanistan, Alexander on Thursday told the committee: “We’re not where we need to be” in ensuring the security of US military networks there.

In the past, cyberattackers have been able to steal key information from the US troops who rely on sophisticated equipment, including data on convoy supply routes, according to senior US officials.

Every hour, there are some 250,000 attempted attacks on Defense Department networks worldwide, Alexander told the committee. Throughout the Department of Defense, there are more than 15,000 different computer networks, including 7 million computers on some 4,000 military installations, committee chairman Rep. Ike Skelton (D) of Missouri pointed out.

See also:
Cybercom Chief Details Cyberspace Defense
Pentagon Faces Massive Cyber Threats
Military’s cyber defense limited in protection of US, top general says
Gaps in authority hamper military against cyber-attacks
Pentagon: Military networks vulnerable
Cyber Command chief proposes secure network for government, key industries
US reviewing ways to fight cyber attacks: general
Cyberwar Chief Calls for Secure Computer Network
An army of tech-savvy warriors has been fighting its battles in cyberspace
NSA chief envisions ‘secure zone’ on Internet to guard against attacks
White House reviews nation’s cybersecurity

Well, obviously, for starters, you could solve most of these problems by severing all connections between critical defense and infrastructure networks and the public internet. I’m pretty sure they already know that, so I’m not sure why this basic step has yet to be completed.

/today’s U.S. warfighters are so dependent on electronics that I sometimes wonder what would happen if, say an EMP attack disabled all their electronic gear, are they even trained to fight the old fashioned way anymore or would they be helpless?