Home Tags Cryptocurrency
Key members of a suspected cyber criminal gang specialising in distributed denial of service (DDoS) extortion have been arrested following a joint operation by police forces across Europe. Law enforcement agencies from the UK, Austria, Bosnia and Herzegovina, and Germany were all involved in the operation, dubbed Operation Pleiades, against cyber-crime group DD4BC (Distributed Denial of Service for Bitcoin). DD4BC has been responsible for a number of bitcoin extortion campaigns since the middle of 2014. It has mostly targeted the online gambling industry, but the group has also broadened its activity to target financial services, the entertainment sector and other high-profile industries. Key members of the gang were identified in Bosnia by the UK Metropolitan Police Cyber Crime Unit (MPCCU), which shared information with other police forces across the world, including Australia, France, Japan, Romania and the US. The operation was also supported by Interpol. "Law enforcement and its partners have to act now to ensure that the cyberspace affecting nearly every part of our daily life is secure against new threats posed by malicious groups," said Wil van Gemert, Europol's deputy director of operations. He warned that companies that don't report DDoS attacks, especially where demands are involved, are putting others at risk of similar cyber crime activity. "These groups employ aggressive measures to silence the victims with the threat of public exposure and reputation damage. Without enhanced reporting mechanisms, law enforcement is missing vital means to protect companies and users from recurring cyber-attacks," he said. "Police actions such as Operation Pleiades highlight the importance of incident reporting and information sharing between law enforcement agencies and the targets of DDoS and extortion attacks," van Gemert added. Authorities often cite how collaboration is key when it comes to dealing with cyber crime. Paul Gillen, head of operations for Europol's European Cyber Crime Centre, has argued that it's essential for private and public organisations to work together to fight the threat. "This is the way to go, this is what we're going to have to do from now on. We're going to have to perfect this model and perfect it to maintain operational secrecy," he said. Paul Nicholson, director of product marketing at cyber security specialist A10 Networks, welcomed the arrest but warned that it won't stop cyber criminals from trying to extort ransoms. "This isn't the last we've heard of DDoS attacks for the purpose of ransom. Distributed denial of service attacks are easier to pull off than ever, which is why we are seeing them increasingly used as a means of gaining leverage over businesses that are highly reliant on the Internet," he said. "For organisations such as banks, financial institutions and even gambling websites, network downtime is equated with an immediate loss of revenue, which can lead them to give in to demands. Fortifying defences must be these organisations' top priority," Nicholson added.
Reports say Australian Craig Wright is "Satoshi Nakamoto", has $400 million worth.
SEC: Josh Garza and GAW Miners "robbed one investor to pay another."
AEP’s KeyperPlus HSM (hardware security module) can now be used in a broader range of cryptographic applications and deployment scenarios, including “lights-out” data centres.LOUDWATER, UK (28th October 2015) Ultra Electronics AEP, the provider of trusted security, announces major enhancements to its Ultra Safe KeyperPlus HSM. The new version 3 firmware, available as an upgrade to existing users, includes a secure remote management capability and support for additional cryptographic algorithms to address wider markets, including emerging BitCoin applications.KeyperPlus is the world’s most trusted general-purpose HSM, providing the ultimate in security for key generation, key storage and key management across a broad range of application and infrastructure security requirements, including digital identity, public key infrastructure (PKI), domain name system security (DNSSEC), code/document signing, SSL/TLS authentication, database encryption and digital rights management (DRM). It offers a broad range of algorithms, including the latest Suite B and elliptic curve cryptography (ECC) algorithms, in a flexible and simple-to-use appliance with a compact physical footprint, providing Gigabit Ethernet interfaces supporting IPv4 and IPv6. The new secure remote management capability enables the KeyperPlus HSM to be housed in a remote data centre with operators able to perform essential operations from anywhere in the world. To maintain the level of security that users expect and demand, remote operations employ the same strong, two-factor, “m of n” role-based authentication as used for local operations, verified within the HSM’s security boundary.The new firmware also adds support for the secp256k1 elliptic curve and RIPEMD-160 hashing algorithm for BitCoin applications, the SEED block cipher algorithm widely used in South Korea and Brainpool elliptic curves that are commonly used as an alternative to NIST curves for e-Passport applications around the world.Rob Stubbs, Product Director at AEP, commented “The KeyperPlus HSM continues to evolve to address emerging requirements without compromising the level of security it is famous for, helping our clients defend against the growing threats to intellectual property, high-value information assets and corporate reputation”.KeyperPlus is the latest in a long line of Keyper™ HSMs going back over 15 years that incorporate AEP’s own cryptographic modules validated to FIPS 140-1 and FIPS 140-2 Overall Security Level 4, the highest internationally-recognised cryptographic certification in the industry. It is currently in use with many of the world’s largest technology companies, and is also used by ICANN to secure the root of the global DNS security system for the Internet.# ENDS #About Ultra Electronics AEPAEP provides trusted security everywhere and develops high-assurance security and communication technologies, securing data regardless of device, environment or location, tested and accredited to industry security standards, including FIPS, Common Criteria and CAPS. Trusted by businesses, governments and the defence sector, its extensive portfolio of products and solutions protect the integrity of very sensitive data and are extremely reliable, survivable and resilient. AEP is a business unit of Ultra Electronics, an internationally successful defence & aerospace, security & cyber, transport and energy company with a long, consistent track record of development and growth. Ultra businesses constantly innovate to create solutions to customer requirements that are different from, and better than, those of its competitors. For more information, please visit www.ultra-aep.com.EnquiriesJohn Bailey, Marketing Manager01628 642600Source: RealWire
Former Arcadia Mayor John Wuo named as defendant in Gemcoin civil suit.
SEC says Gemcoin is nothing more than "a fraudulent pyramid scheme."
Mark Karpeles arrested in Japan, accused of falsifying bitcoin account data.
By hacking targets' systems, grabbing their wallet files and waiting for victims to enter passwords, Hacking Team eliminated the anonymity cryptocurrency users seek. Hacking Team, the creator of a digital remote-access and surveillance platform, had specifically targeted Bitcoin and other cryptocurrencies to allow government officials and law-enforcement agencies (LEAs) to follow the money, according to email messages stolen from the company in a breach earlier this month. The messages, posted publicly by Wikileaks, indicated that the company's platform for compromising and monitoring targets' computers, known as the Remote Control System, gained new functionality in 2014 to track the use of Bitcoin, LiteCoin, Feathercoin and Namecoin. The software update allowed the copying of the target's wallet, transaction history and contact information. Hacking Team focused on Bitcoin and three other cryptocurrencies as tools criminals used to launder money, despite efforts to foster legitimate markets for the digital money. "Cryptocurrencies are a way to make untraceable transactions, and we all know that criminals love to easily launder, move and invest black money," Daniele Milan, operations manager for Hacking Team, stated in one email hosted by Wikileaks. "LEAs, by using our Intelligence module combined with this new capability, can correlate the usage of cryptocurrencies, defeating the financial opacity they provide." In early July, hackers took control of the Milan, Italy-based Hacking Team's Twitter feed, announcing that they had breached the company's network and stolen 400 gigabytes of sensitive business communications and email messages. The company decried the attack, calling it a criminal act. "Make no mistake about it, what happened earlier this summer in the attack on our company was a reckless and vicious crime," David Vincenzetti, CEO of Hacking Team, said in a statement on July 14. "We have reported it to Italian authorities who are investigating, and we expect the authorities of other nations to be involved as well." The company developed a module, dubbed "Money," for its platform that could search for cryptocurrency data on a compromised system, according to emails. The inclusion of cryptocurrency tracking functionality in the software is unsurprising, given law enforcement's interest in Bitcoin, Andrew Conway, a research analyst with messaging security firm Cloudmark, told eWEEK. "Drug purchases, illegal goods purchases, unlicensed gambling, and one we see all the time, ransomware, is facilitated by Bitcoin," he said. "Obviously, if you are in law enforcement, you are interested in these transactions, because Bitcoin is an annoyance and will end up being more than an annoyance." The most interesting fallout from the Hacking Team breach is the sudden disclosure of a handful of highly critical vulnerabilities: three in Adobe Flash, one in Internet Explorer and another in Oracle's Java. The company that brokered the sale of one of the Adobe Flash vulnerabilities to Hacking Team shut down its program for buying and selling vulnerabilities following the revelation that Hacking Team had done business with Sudan and Egypt. "The Hacking Team breach proved that we could not sufficiently vet the ethics and intentions of new buyers," Adriel Desautels, CEO of Netragard, said in a blog post. "Hacking Team unbeknownst to us until after their breach was clearly selling their technology to questionable parties, including but not limited to parties known for human rights violations." Desautels argued that the market for zero-day vulnerabilities needs to be held to a legal standard in which each company that buys or sells the information is accountable for the use of the technology. "It's important that the regulations do not target zero-days specifically but instead target those who acquire and use them," he said.
Leaked e-mails brag HT could see "who got that money (DEA: anyone interested? :P )"
Bryan Micon gets probation and fine after running afoul of gambling authorities.
Lawyer: "That’s one of the dangers of lending money over the Internet."
Boy also radicalized another teen, helping him get to Syria to fight with ISIL.