Category Archives: Internet Security

Govt employees asked not to use third-party VPN, Google Drive and Dropbox – Business Standard

Indian government employees are advised not to use third-party virtual private networks (VPN) and cloud services like Google Drive and Dropbox, according to a 24-point "cyber security donts" issued by the states National Informatics Centre (NIC).

The NICs 10-page guideline asks employees not to use third party toolbars, like download manager or weather tool bar in internet browsers, or external email services for "official communication".

"Dont use any 3rd party anonymization services (ex: Nord VPN, Express VPN, Tor, Proxies, etc.), says the eighth point of donts. That advisory comes weeks after NordVPN, ExpressVPN, Surfshark, and Tor pulled out of India after the countrys Computer Emergency Response Team (CERT-Ins) asked all VPN service providers to store user data for five years.

All government employees, including temporary, contractual, and outsourced resources, are required to strictly adhere to the guidelines mentioned in this document. Any non-compliance may be acted upon by the respective CISOs/Department heads, said the NIC document labeled "restricted" and available on the highways ministrys website.

The increasing adoption and use of ICT has increased the attack surface and threat perception for the government due to a lack of proper cyber security practices followed on the ground. In order to sensitise the government employees and contracted/outsourced resources and build awareness amongst them on what to do and what not to do from a cyber security perspective, these guidelines have been compiled, the note added.

BusinessLine website reported that a senior NIC official confirmed the guidelines but declined to give details.

The NIC document has a 25-point list of "security dos", asking employees to use authorised software and report suspicious mails.

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

Go here to see the original:
Govt employees asked not to use third-party VPN, Google Drive and Dropbox - Business Standard

ConnectNationwide.com Helping Thousands of Customers Get Connected – Digital Journal

Compare and shop for Home and Business Internet, TV, Phone, Security and Solar Services

In a world where digital technologies and innovations have created a significant change in the way people live and communicate, having the right TV, Internet, and phone service provider is crucial. With the variety of service providers available today, it is easy to get overwhelmed and confused as to what company suits ones needs the best. AtConnectNationwide.com, they make the selection process convenient by bringing all possible options in just one platform shop, compare, and save on Internet, TV, Phone, and Home Security services in just a few clicks.

ThroughConnectNationwide.coms services, residential and business owners have access to the easiest way of getting connected to the best service provider in their area. All they need to do is request a personalized pricing quote with a home connection specialist. It is a hassle-free service that one can do right at the comfort of their homes.

ConnectNationwide.comcovers different types of service providers for every connection request. For instance, they carry various kinds of high-speed Internet services such as Cable Internet, DSL, Fiber, and Satellite. Lets say a household does not have a telephone line, so the best recommendation for them is to get a Cable Internet provider, while those who are keen to maintain a budget can opt to avail of a DSL service provider since its one of the less expensive options. This kind of information and more will be provided byConnectNationwide.comin every quote, making it easier to differentiate what service is worth it for ones needs. Additionally, they also make sure to include the best promotions in the chosen location. No wonder their clients are not just able to stay connected and save time, but they get to save money as well.

Since its founding in 2009,ConnectNationwide.comhas already helped thousands of customers find the right connection for their household or business. They pride themselves on their excellent customer service through their reliable billing and technical support, guaranteeing that every transaction with them is worthwhile.

Those who are looking to set up Internet, TV, phone, or home security service will not regret choosingConnectNationwide.com. Currently, their service locations cover towns and cities across the United States.

For some information and news,ConnectNationwide.comalso has some technology blogs up on their website. This is their way of raising awareness among their customers about the benefits of the technologies that service providers have these days.

Stay connected the easy way. Visithttps://connectnationwide.comto learn more.

AboutConnectNationwide.com

ConnectNationwide.comis a company that helps residential and business owners to find TV, Internet, Security, and Phone Service providers.

Media ContactCompany Name: ConnectNationwide.comContact Person: Jason RawsonEmail: Send EmailPhone: 1-865-518-6190Country: United StatesWebsite: https://connectnationwide.com/

Go here to see the original:
ConnectNationwide.com Helping Thousands of Customers Get Connected - Digital Journal

Goodbye Internet Explorer. You won’t be missed (but your legacy will be remembered) – The Conversation

After 27 years, Microsoft has finally bid farewell to the web browser Internet Explorer, and will redirect Explorer users to the latest version of its Edge browser.

As of June 15, Microsoft ended support for Explorer on several versions of Windows 10 meaning no more productivity, reliability or security updates. Explorer will remain a working browser, but wont be protected as new threats emerge.

Twenty-seven years is a long time in computing. Many would say this move was long overdue. Explorer has been long outperformed by its competitors, and years of poor user experiences have made it the butt of many internet jokes.

Explorer was first introduced in 1995 by the Microsoft Corporation, and came bundled with the Windows operating system.

To its credit, Explorer introduced many Windows users to the joys of the internet for the first time. After all, it was only in 1993 that Tim Berners-Lee, the father of the web, released the first public web browser (aptly called WorldWideWeb).

Providing Explorer as its default browser meant a large proportion of Windowss global user base would not experience an alternative. But this came at a cost, and Microsoft eventually faced multiple antitrust investigations exploring its monopoly on the browser market.

Still, even though a number of other browsers were around (including Netscape Navigator, which pre-dated Explorer), Explorer remained the default choice for millions of people up until around 2002, when Firefox was launched.

Microsoft has released 11 versions of Explorer (with many minor revisions along the way). It added different functionality and components with each release. Despite this, it lost consumers trust due to Explorers legacy architecture which involved poor design and slowness.

It seems Microsoft got so comfortable with its monopoly that it let the quality of its product slide, just as other competitors were entering the battlefield.

Even just considering its cosmetic interface (what you see and interact with when you visit a website), Explorer could not give users the authentic experience of modern websites.

On the security front, Explorer exhibited its fair share of weaknesses, which cyber criminals readily and successfully exploited.

While Microsoft may have patched many of these weaknesses over different versions of the browser, the underlying architecture is still considered vulnerable by security experts. Microsoft itself has acknowledged this:

[Explorer] is still based on technology thats 25 years old. Its a legacy browser thats architecturally outdated and unable to meet the security challenges of the modern web.

These concerns have resulted in the United States Department for Homeland Security repeatedly advising internet users against using Explorer.

Explorers failure to win over modern audiences is further evident through Microsofts ongoing attempts to push users towards Edge. Edge was first introduced in 2015, and since then Explorer has only been used as a compatibility solution.

In terms of market share, more than 64% of browser users currently use Chrome. Explorer has dropped to less than 1%, and even Edge only accounts for about 4% of users. What has given Chrome such a leg-up in the browser market?

Chrome was first introduced by Google in 2008, on the open source Chromium project, and has since been actively developed and supported.

Being open source means the software is publicly available, and anyone can inspect the source code that runs behind it. Individuals can even contribute to the source code, thereby enhancing the softwares productivity, reliability and security. This was never an option with Explorer.

Moreover, Chrome is multi-platform: it can be used in other operating systems such as Linux, MacOS and on mobile devices, and was supporting a range of systems long before Edge was even released.

Meanwhile, Explorer has mainly been restricted to Windows, XBox and a few versions of MacOS.

Microsofts Edge browser is using the same Chromium open-source code that Chrome has used since its inception. This is encouraging, but it remains to be seen how Edge will compete against Chrome and other browsers to win users confidence.

We wont be surprised if Microsoft fails to nudge customers towards using Edge as their favourite browser. The latest stats suggest Edge is still far behind Chrome in terms of market share.

Also, the fact Microsoft took seven years to retire Explorer after Edges initial release suggests the company hasnt had great success in getting Edges uptake rolling.

Web browsers play a vital role in establishing privacy and security for users. Design and convenience are important factors for users when selecting a browser. So ultimately, the browser that can most effectively balance security and ease of use will win users.

And its hard to say whether Chromes current popularity will be sustained over time. Google will no doubt want it to continue, since web browsers are significant revenue sources.

But Google as a corporation is becoming increasingly unpopular due to massive data gathering and intrusive advertising practices. Chrome is a key component of Googles data-gathering machine, so its possible users may slowly turn away.

As for what to do about Explorer (if youre one of the few people that still has it sitting meekly on your desktop) simply uninstall it to avoid security risks.

Even if youre not using Explorer, just having it installed could present a threat to your device. No one wants to be the victim of a cyber attack via a dead browser!

Read the original post:
Goodbye Internet Explorer. You won't be missed (but your legacy will be remembered) - The Conversation

Another family scammed after logging into Cook County court hearing on Zoom – CBS Chicago

CHICAGO (CBS) -- Families keep getting ripped off when they log on to Cook County court hearings through Zoom. Loved ones think they're paying to get inmates released from custody, only to discover con artists have scammed them out of thousands of dollars.

Some of those who have been duped told CBS 2's Jermont Terry what they want done.

Scam victims want some accountability from those here at the Leighton Criminal Courthouse. They can't understand how scammers are still able to log on and rip people off.

In one recent case, scammers posed as an assistant state's attorney.

"It's hurtful. It's like a knife has been stuck in my heart," Sushi Staples said.

She and her brother-in-law are furious to know they fell victim to a scam.

"I told my husband he was coming home, and he's not," Staples said.

In May, her husband was in Cook County court for an appeals hearing. After logging, on she realized their paid attorney was a no-show. That's when she got a message in the chatroom.

"An assistant state's attorney messaged me on zoom, and said, 'Hey, what case are you here for?'" she said.

She believed she was messaging with someone from the Cook County State's Attorney's.

She said she felt comfortable "because the assistant state's attorney's picture was there. His name was there."

"He said, 'Well, here's the lawyer that's stepping in for him. Log off. Call this number, and he'll be able to assist you with case," Staples added.

When she called number, the person on other end was convincing.

"They knew that he was on his post-conviction and he was up for appeal," Staples said.

The caller convinced her that, after 15 years behind bars for murder, Keith Pikes was getting out. Receipts show she sent money via Zelle for just over $6,000 for release that never happened.

Last month, another woman lost $500 at a bond hearing, when someone using the same Zelle account scammed her.

"I just thought it was just us, and then I saw your story, and it was somebody else," said Keith Pikes' brother, Johnell.

Now this family is left wondering why and how is this still going on.

The office of Cook County Chief Judge Timothy Evans oversees the Zoom links, and said a warning on its web page makes it clear never to pay via online apps, and warns of the scam. But is that enough?

"They defiantly need better internet security if they gonna keep the zoom," Johnell Pikes said.

"How many times does it have to happen for them to do something about it? Why are still in Zoom anyways?" Staples said.

They question if the courts care about the toll the scam is having on everyone.

"The inmates are only losing they're getting emotional damage. Their families are getting financial and emotional damage," Johnell Pikes said.

Jermont Terry joined the CBS 2 team in October 2019. He's born and raised on Chicago's South Side. He's happy to return home to report on his community after 18 years of uncovering stories across the country.

Read this article:
Another family scammed after logging into Cook County court hearing on Zoom - CBS Chicago

The Internet Society and Quad9 Partner to Deliver Advanced DNS Security to Cities at the Edge – PR Web

WASHINGTON & ZRICH (PRWEB) June 15, 2022

The Internet Society (ISOC) and Quad9 today announced the completion of their first successful partnership for the expansion of DNS-based privacy and security services. ISOC is working with Quad9 to deploy servers and network connectivity in four new locations to further expand the global reach of their recursive DNS platform. Quad9 and ISOCs 2022 installment of cities at the edge brings Quad9s free protective DNS services to four new locations:

Quad9 is seeing over 10M threat blocks per day across these new locations. These numbers will only increase as more threat intelligence providers are integrated and more users join the service in these regions. The Internet Society works with communities worldwide to fund and build sophisticated networks and trains people with the skills needed to run and maintain their own Internet infrastructure.

Since Quad9 is a not-for-profit, we can focus on emerging markets that have slower service, less reliability, and more opportunity for interception or manipulation of their Internet traffic, said John Todd, General Manager of Quad9. We share the values of ISOC and look forward to partnering with them on further expansion to promote the open development, evolution, and use of the Internet for the benefit of all people throughout the world.

Quad9 is a DNS recursive resolver that is freely available to anyone, offering protection to end-users or network operators against a wide variety of malicious activities while offering exceptional privacy guarantees. Quad9 is a non-profit based in Switzerland, with servers in hundreds of locations worldwide to bring these services closer to end-users in emerging markets as well as well-established internet hubs.

Quad9s objectivesto protect and empower global Internet users at the DNS levelare in close alignment with the Internet Societys own vision that the Internet is for everyone and that it should be open, globally-connected, secure, and trustworthy, said Michuki Mwangi, Distinguished Technologist, Internet Society. Creating an accessible and safe Internet requires cooperation and contributions from multiple stakeholders, working together to support and promote the development of the Internet globally.

ISOC is providing Quad9 with the technical infrastructures that enable a safer and more reliable Internet experience. This will enable the Internet user community in these four new countries to tap into the global Internet economy by creating a safer and more private experience for Internet users, opening a world of possibilities with minimal investment.

About Internet SocietyFounded in 1992 by Internet pioneers, the Internet Society is a global non-profit organization working to ensure the Internet remains a force for good for everyone. Through its community of members, special interest groups, and 120+ chapters around the world, the organization defends and promotes Internet policies, standards, and protocols that keep the internet open, globally connected, and secure. For more information, please visit: Internetsociety.org.

About Quad9Quad9 is a free service that replaces your default ISP or enterprise Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious hostnames from an up-to-the-minute list of threats. This blocking action protects your home or business network, mobile device, or IoT systems against a wide range of threats such as malware, phishing, spyware, and botnets. It can improve performance and greatly enhance privacy. Quad9 Foundation is a Swiss-based organization whose mission is to provide a safer and more robust Internet for everyone. Quad9 is a not-for-profit organization whose operational budget comes entirely from sponsorships and donations. For more information on how to sponsor Quad9, please visit https://www.quad9.net.

Media Contact: Teena Touch for Quad9415-310-3125press@quad9.net

Share article on social media or email:

See the original post:
The Internet Society and Quad9 Partner to Deliver Advanced DNS Security to Cities at the Edge - PR Web

Cyber-attack impacting county’s operations – Seguin Today

(Seguin) Guadalupe County officials are responding to a cyber-attack that has impacted the countys overall operations network. County Judge Kyle Kutscher says the incident started over the weekend.

What we have experienced at the county starting on Saturday early morning June 11 was a data security incident. Its not considered a breach at this point because there is no information out there that makes us believe any personal information has been obtained by the outside parties. Our IT director was called early Saturday morning just with basically concerns of disruption with our email and some of our systems at the county, said Kutscher.

Kutscher says their information technology (IT) staff prepares for these kinds of challenges as best they can, and they immediately began their response once they were notified.

We have a process in place because we have backup servers, everything encrypted. A lot of systems are very very safe but there are protocols in place if we do have any disruption like this to enlist or get the services of third party investigators to look at these items and through those efforts, those third party investigators, forensic auditors basically that deal with cyber security let us know that there was an incident that occurred that controlled some of our emails, locked some of our computers, did not obtain any information but again still had an impact in ultimately disrupting operations in the county, said Kutscher.

Its not clear who is responsible for the attack, but Kutscher says once they were notified about the incident, they worked to begin to neutralize the incident. They then called for outside cyber security to help assess the situation.

Once we were notified of a possible disruption or problem from an outside source, we locked everything down, cut off all of the servers and everything to the outside world and used basically our IT resources within the county and the higher group of the third party to go ahead and start sweeping our servers, all of our systems. We have certain things that in house and certain systems that sit on the cloud environment really just going through making sure that all of that was safe and started rebuilding some of those things in a safe environment to scan for any threats to them basically turn back on for county access but during this initial assessment phase it was just shut everything down, find out what is safe and then slowly start turning things on to utilize them for county services, said Kutscher.

Judge Kutscher says at this time it does not appear that there was a data breach, and no personal information appears to have been lost. He says if that changed, the public will be immediately notified.

At this point, we have no information that indicates any personal information has been released to any outside party or any outside agency other than the county. We do have an obligation and responsibility if we do find that out in the future at anytime. We will notify the media, the public as soon as we knew that and let the individuals who might been affected know that. So, at this point, I hope everybody knows that we are committed to being as safe as possible. We understand that we have a lot of individuals information. We are trying to be as careful as possible but if we do find out that something has been released, we will definitely let everyone know that, said Kutscher.

The attack has impacted the countys ability to provide some services. Kutscher says they are getting regular updates from the outside cyber security firm as they work with the countys IT staff to safely rebuild the local network.

This incident has definitely impacted county operations because in this day and age, just like many entities, we are tied to internet, to servers, to a number of different functions that require computers and systems so when we found out it was an issue and shut everything down, it has definitely impacted every single operation that the county has in some form or fashion. Its going to take us some time to get back to full operation to make sure that we are completely safe but we are finding ways to be able to still provide central services to the public but again, yes, we have been definitely impacted and I hope everybody can be patient and we appreciate that patience as we work through these challenges, said Kutscher.

Kutscher says a special email address has been set up for people who need to contact the county, or who might have questions about the cyber incident that is currently being investigated. The email address is guadcoinfo@gmail.com.

Originally posted here:
Cyber-attack impacting county's operations - Seguin Today

Cybersecurity in the Pacific: how island nations are building their online defences – The Conversation

Leaders of several Pacific nations met in Fiji last week to strengthen ties and promote unity in the region.

The Pacific faces numerous challenges, such as the threat of climate change and major powers jostling for influence in the region. Against these adversities, Pacific countries have shown determination to preserve their own (and the regions) identity and sovereignty.

One less-appreciated aspect of Pacific security is cybersecurity. Some cyber threats are financially motivated, such as ransomware or phishing attacks, but others aim at critical infrastructure. Still other attacks threaten society and democratic processes through spreading misinformation and disinformation.

We are working with Pacific governments to assess their current cybersecurity situations and make recommendations for a path forward.

In 2018, the 18 member states of the Pacific Islands Forum signed the Boe Declaration on Regional Security. After noting climate change as the single greatest threat, the declaration lays out an expanded concept of security which includes cybersecurity.

The declaration set the scene for cybersecurity as a shared priority for the region. The response to the COVID-19 pandemic has raised the stakes even further, as online services and remote work have rapidly increased.

Cybersecurity will be necessary to enable continued economic development amid natural disasters, changes in the global security situation, and worldwide economic upheavals.

The countries of the Pacific depend on fragile undersea cables for broadband internet access. Bringing government processes online, modernising digital infrastructure, and promoting e-commerce will introduce further security risks.

At the same time as securing their digital spaces, Pacific nations may wish to maintain sovereign control of their data. Often, digitisation means data is controlled outside the country.

Read more: Undersea internet cables connect Pacific islands to the world. But geopolitical tension is tugging at the wires

Introducing digital currencies and mobile payments may also reduce a countrys control over money-related policies.

Working with overseas suppliers for cybersecurity may mean the country has to hand over the keys to sensitive data, networks, and systems.

At the invitation of Pacific island nations, we and our colleagues at Monash University and the Oceania Cyber Security Centre (OCSC) are working to help countries understand and strengthen their cybersecurity situation.

Using the University of Oxfords Cybersecurity Capacity Maturity Model for Nations (CMM) and our own research, we help countries assess their current situation, identify their priorities and determine how to strengthen local capacity and sovereign capability.

These assessments are a crucial first step. Each nation is different. Tailored approaches to cybersecurity that consider the local culture, context and preservation of national sovereignty are needed.

So far, eight of these reviews have been conducted in the Pacific. Seven of these where conducted by the OCSC. Worldwide, more than 87 nations have worked through similar reviews.

In the Federated States of Micronesia, for example, the OCSC completed an assessment in collaboration with the Asia-Pacific Telecommunity in 2020.

After the assessment, we worked with the Federated States of Micronesia in 2021 to co-develop a National Cybersecurity Roadmap. The roadmap sets a path to build local capacity and sovereign capability to protect the countrys national interests and citizens who are most at risk from cyber harms.

Read more: Fight for control threatens to destabilize and fragment the internet

In 2019 we conducted an assessment in Vanuatu. Since then, Vanuatu has strengthened its cybersecurity in several ways, including:

We and our colleagues are in the process of developing a regional framework for island state cybersecurity. It will help Pacific countries build effective emergency response teams, strengthen cyber resilience, and ensure data sovereignty.

As well as assistance with assessments and planning, Pacific nations will also need funding including from countries like Australia to address their own identified priorities.

As the Boe Declaration underlines, we are all on the journey to developing digital resilience. If we work together, the whole Pacific family can strengthen regional security while maintaining sovereignty.

Read more: What skills does a cybersecurity professional need?

Link:
Cybersecurity in the Pacific: how island nations are building their online defences - The Conversation

CISA Recommends Organizations Update to the Latest Version of Google Chrome – DARKReading

The US Cybersecurity and Infrastructure Agency (CISA) Friday urged users and administrators to update to a new version of Chrome that Google released last week to fix a total of seven vulnerabilities in its browser.

In an advisory, Google described four of the flaws three of which were reported to the company by external researchers as presenting a high risk for organizations. The company said it had decided to restrict access to bug details until most users have updated to the new version of Chrome (102.0.5005.115).

One of the vulnerabilities is a so-called use after free issue in the WebGPU application programming interface for functions such as computation and rendering on a Graphics Processing Unit. The bug (CVE-2022-2007) is remotely exploitable and can have an impact on the confidentiality, integrity, and availability of affected systems, according to a description of the flaw on vulnerability database VulDB. "No form of authentication is needed for exploitation. It demands that the victim is doing some kind of user interaction," VulDB noted.

Google awarded $10,000 to the security researcher who reported the flaw to the company in May. VulDB estimated the price for an exploit for the flaw to be between $5,000 and $25,000 currently, though that could go up soon, it noted.

The second flaw is an out-of-bounds memory access use in the WebGL API for rendering 2D and 3D graphics. Two researchers from Vietnamese firm VinCSS Internet Security Services reported the bug (CVE-2022-2008) in April. VulDB described the flaw as being remotely exploitable but requiring at least some user interaction by the victim. The flaw appears to be easily exploitable and requires no authentication, VulDB said. Google's advisory noted the reward for disclosing the vulnerability had yet to be determined.

The third high-severity vulnerability that the new Chrome version addresses (CVE-2022-2010) is an out-of-bound read issue in compositingor in rendering Web page content. A security researcher with Google's own Project Zero bug hunting team discovered the vulnerability in May. Like the other two flaws, this one also affects the confidentiality, integrity, and availability of affected systems, VulDB said.

The fourth high severity vulnerability that Google disclosed is a use-after-free issue that an external security researcher reported to the company in May. The flaw (CVE-2022-2011) exists in ANGLE, a function that Google describes as an "almost native Graphics Layer engine" in Chrome. The memory corruption vulnerability has a near identical impact as the other three, based on VulDB's description of the issue.

CISA urged organizations to review Google's Chrome release note and apply the update to mitigate risk. "Google has released Chrome version 102.0.5005.115 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system," it said.

The seven flaws that Google addressed with its latest Chrome version is considerably smaller in number than some other recent Chrome-related bug disclosures from the company. A Chrome update that Google released on May 24 included fixes for 32 flaws, one of which was rated as being of critical severity while seven others were rated as being highly critical. Another update, also in May, contained fixes for 13 flaws, eight of which the company rated as being of high severity.

See the original post here:
CISA Recommends Organizations Update to the Latest Version of Google Chrome - DARKReading

Downthem DDoS-for-Hire Boss Gets 2 Years in Prison Krebs on Security – Krebs on Security

A 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against hundreds of thousands of Internet users and websites.

The user interface for Downthem[.]org.

Matthew Gatrel of St. Charles, Ill. was found guilty for violations of the Computer Fraud and Abuse Act (CFAA) related to his operation of downthem[.]org and ampnode[.]com, two DDoS-for-hire services that had thousands of customers who paid to launch more than 200,000 attacks.

Despite admitting to FBI agents that he ran these so-called booter services (and turning over plenty of incriminating evidence in the process), Gatrel opted to take his case to trial, defended the entire time by public defenders. Gatrels co-defendant and partner in the business, Juan Severon Martinez of Pasadena, Calif., pleaded guilty just before the trial.

After a nine-day trial in the Central District of California, Gatrel was convicted on all three counts, including conspiracy to commit unauthorized impairment of a protected computer, conspiracy to commit wire fraud, and unauthorized impairment of a protected computer.

Prosecutors said Downthem sold subscriptions allowing customers to launch DDoS attacks, while AmpNode provided bulletproof server hosting to customers with an emphasis on spoofing servers that could be pre-configured with DDoS attack scripts and lists of vulnerable attack amplifiers used to launch simultaneous cyberattacks on victims.

Booter and stresser services let customers pick from among a variety of attack methods, but almost universally the most powerful of these methods involves whats known as a reflective amplification attack. In such assaults, the perpetrators leverage unmanaged Domain Name Servers (DNS) or other devices on the Web to create huge traffic floods.

Ideally, DNS servers only provide services to machines within a trusted domain such as translating an Internet address from a series of numbers into a domain name, like example.com. But DNS reflection attacks rely on consumer and business routers and other devices equipped with DNS servers that are (mis)configured to accept queries from anywhere on the Web.

Attackers can send spoofed DNS queries to these DNS servers, forging the request so that it appears to come from the targets network. That way, when the DNS servers respond, they reply to the spoofed (target) address.

The bad guys also can amplify a reflective attack by crafting DNS queries so that the responses are much bigger than the requests. For example, an attacker could compose a DNS request of less than 100 bytes, prompting a response that is 60-70 times as large. This amplification effect is especially pronounced if the perpetrators query dozens of DNS servers with these spoofed requests simultaneously.

The government charged that Gatrel and Martinez constantly scanned the Internet for these misconfigured devices, and then sold lists of Internet addresses tied to these devices to other booter service operators.

Gatrel ran a criminal enterprise designed around launching hundreds of thousands of cyber-attacks on behalf of hundreds of customers, prosecutors wrote in a memorandum submitted in advance of his sentencing. He also provided infrastructure and resources for other cybercriminals to run their own businesses launching these same kinds of attacks. These attacks victimized wide swaths of American society and compromised computers around the world.

The U.S. and United Kingdom have been trying to impress on would-be customers of these booter services that hiring them for DDoS attacks is illegal. The U.K. has even taken out Google ads to remind U.K. residents when they search online for terms common to booter services.

The case against Gatrel and Martinez was brought as part of a widespread crackdown on booter services in 2018, when the FBI joined law enforcement partners overseas to seize 15 different booter service domains.

Those actions have prompted a flurry of prosecutions, with wildly varying sentences when the booter service owners are invariably found guilty. However, DDoS experts say booter and stresser services that remain in operation continue to account for the vast majority of DDoS attacks launched daily around the globe.

View original post here:
Downthem DDoS-for-Hire Boss Gets 2 Years in Prison Krebs on Security - Krebs on Security

Russia Is Taking Over Ukraines Internet – WIRED

Russia is also trying to control mobile connections. In recent weeks, a mysterious new mobile company has popped up in Kherson. Images show blank SIM cardstotally white with no brandingbeing sold. Little is known about the SIM cards; however, the mobile network appears to use the Russian +7 prefix at the start of a number. Videos reportedly show crowds of citizens gathering to collect the SIM cards. The Russian forces realize they're at a disadvantage if they keep using Ukrainian mobile networks, says Cathal Mc Daid, the chief technology officer at mobile security company AdaptiveMobile. The company has seen two separatist mobile operators in Donetsk and Luhansk expanding the territory they are covering to newly occupied areas.

Who controls the internet matters. While most countries place only limited restrictions on the websites people can view, a handful of authoritarian nationsincluding China, North Korea, and Russia, severely limit what people can access.

Russia has a vast system of internet censorship and surveillance, which has been growing in recent years as the country tries to implement a sovereign internet project that cuts it off from the rest of the world. The countrys System for Operative Investigative Activities, or SORM, can be used to read peoples emails, intercept text messages, and surveil other communications.

Russian networks are fully controlled by the Russian authorities, Malon, the Ukrainian telecom regulator, says. The rerouting of the internet in occupied Ukrainian areas, Malon says, has the goal of spreading Kremlin propaganda and making people believe Ukrainian forces have abandoned them. They are afraid that the news about the progress of the Ukrainian army will encourage resistance in the Kherson region and facilitate real activities, Zohora says.

At the heart of the rerouting is Miranda Media, the operator in Crimea that appeared following the regions annexation in 2014. Among partners listed on its website are the Russian security service known as the FSB and the Russian Ministry of Defense. The company did not respond to a request for comment.

In many ways, Crimea may act as an example of what happens next in newly occupied areas. Only in 2017, Crimea was completely disconnected from Ukrainian traffic. And now, as far as I know, it's only Russian traffic there, says Ksenia Ermoshina, an assistant research professor at the Center for Internet and Society and an affiliated researcher at the Citizen Lab. In January last year, Ermoshina and colleagues published research on how Russia has taken control of Crimeas internet infrastructure.

After it annexed Crimea in 2014, Russian authorities created two new internet cables running along the Kerch Strait, where they connect with Russia. This process took three years to completesomething Ermoshina calls a soft substitution model, with connections transferring slowly over time. Since then, Russia has developed more advanced internet control systems. The power of the Russian censorship machine changed in between [2014 and 2022], Ermoshina says. What I'm afraid of is the strength of Russian propaganda.

Its likely that rerouting the internet in Kherson and the surrounding areas is seen by Russian authorities as a key step in trying to legitimize the occupation, says Olena Lennon, a Ukrainian political science and national security adjunct professor at the University of New Haven. The moves could also be a blueprint for future conflicts.

Alongside internet rerouting in Kherson and other regions, Russian officials have started handing out Russian passports. Officials claim a Russian bank will soon open in Kherson. And the region has been moved to Moscows time zone by occupying forces. Many of the steps echo what previously happened in Crimea, Donetsk, and Luhansk. Russia is making it clear that they're there for a long haul, Lennon says, and controlling the internet is core to that. They're making plans for a long-term occupation.

See the article here:
Russia Is Taking Over Ukraines Internet - WIRED