Advertisement
Network Forensics
Subscribe to Network Forensics

The Lead

Large ISP Fights DDoS Attacks

September 11, 2014 11:55 am | by Mirko Zorz, Help Net Security | News | Comments

DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in volumetric attacks in the first half of 2014 with over 100 attacks larger than 100GB/sec reported.

Ransomware Going Strong, Despite Takedown of Gameover Zeus

September 8, 2014 12:37 pm | by Robert Lemos, Ars Technica | News | Comments

In late May, an international law enforcement effort disrupted the Gameover Zeus (GoZ) botnet, a...

Russian Gang's Billions of Stolen Credentials Resurface in New Attack

September 3, 2014 11:38 am | by Tara Seals, Infosecurity Magazine | News | Comments

In a classic example of a ripple effect, a number of Namecheap’s users’ accounts have now been...

Sony, XBox Victims of DDoS, Hacktivist Threats

August 27, 2014 11:11 am | by Sara Peters | Blogs | Comments

Services are up and running again after a denial of service took down Sony's PlayStation Network...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Websense Security Labs has come across an interesting campaign, targeting Russian nationals, trying to lure them to download and run executables on their computers, under the guise of attacking Western government websites.

Kelihos Botnet Trying to Expand by Harnessing Russian National Sentiments

August 26, 2014 10:11 am | by Editor | Blogs | Comments

Websense Security Labs has come across an interesting campaign, targeting Russian nationals, trying to lure them to download and run executables on their computers, under the guise of attacking Western government websites.       

Digital Clues Leading the Hunt for ISIS Killer

August 22, 2014 9:52 am | by Jill Lawless, Associated Press | News | Comments

The Islamic militant in a video showing the death of American journalist James Foley took great care to disguise his identity, dressing head-to-toe in black, with a mask leaving only his eyes visible. But police and intelligence services in Britain and the United States have a plethora of clues as they scramble to identify him, from image analysis and voice-recognition software to social media postings and testimony from former captives.

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

The NSA MonsterMind Bot Could Wage Cyber War Autonomously

August 14, 2014 10:55 am | by Kim Zetter, Wired | News | Comments

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

Advertisement
In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.

Good Bot, Bad Bot? 23M Twitter Accounts are Automated

August 14, 2014 10:13 am | by Lisa Vaas | Blogs | Comments

In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.           

Thrifty attackers, are you tired of investing your dollars in a botnet that's constantly being disrupted by new anti-virus signatures and bot downtime? A "cloudbot" might be just what you seek.

CloudBot: A Free, Malwareless Alternative to Traditional Botnets

August 12, 2014 10:47 am | by Sara Peters | Blogs | Comments

Thrifty attackers, are you tired of investing your dollars in a botnet that's constantly being disrupted by new anti-virus signatures and bot downtime? A "cloudbot" might be just what you seek.                

Stalking Predators Online Stresses Cyber Cops

July 28, 2014 11:11 am | by Maya Lau, The Times | News | Comments

To string along suspected sex offenders, Bryan Montgomery carries out intimate conversations with them — sometimes lasting a year — while posing as a juvenile on social media. The job brings psychological stress, which Montgomery acknowledges. 

Russia Caught Editing Wikipedia Entry about MH17

July 21, 2014 10:31 am | by Kadhim Shubber, Wired UK | News | Comments

Thanks to a Twitter bot that monitors Wikipedia edits made from Russian government IP addresses, someone from the All-Russia State Television and Radio Broadcasting Company (VGTRK) has been caught editing a Russian-language Wikipedia reference to MH17 in an article on aviation disasters.

The Dangers of Social Media in the Military

July 21, 2014 9:59 am | by Lance Cpl. Tyler Giguere, DVIDS | News | Comments

Common tactics of social media extortionists include relating to a service member’s interests and posting pictures of attractive females to lure them into chats. What may seem like a normal person wanting to video chat or meet with a Marine, can actually be an extortionist trying to deceive him for his money or information.

Advertisement

Senate Hearing Looks to Cybercrime Law to Fight Botnets

July 17, 2014 10:19 am | by Sara Peters, Dark Reading | News | Comments

In the wake of Microsoft's seizure of No-IP servers and domains, private and public sector representatives met to discuss what can be done to address the problem of botnets.                     

Global Law Enforcement, Security Firms Team Up, Take Down Shylock

July 11, 2014 11:21 am | by Sara Peters, Dark Reading | News | Comments

A month after the GameOver ZeuS sting, another bank fraud group's operations has been disrupted by an international collaboration of security firms and law enforcement agencies. The new target is Shylock, a Trojan that has stolen from banks in the U.S., Italy, and especially the United Kingdom.

Facebook Helps Cripple Greek Botnet

July 9, 2014 9:49 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

Facebook has revealed details of how it helped derail a little-known botnet operation out of Greece that was used to steal and mine digital currency and spread via Facebook and Lightcoin mining — infecting some 250,000 machines worldwide. 

Operation Tovar: The Latest Attempt to Eliminate Key Botnets

July 8, 2014 4:16 pm | by Meaghan Molloy | Blogs | Comments

Coordinated botnet disruptions have increased in pace and popularity over the last few years as more private companies work with international law enforcement agencies to combat malware infections on a grand scale. Operation Tovar, announced on June 2 2014, is the latest to make headlines.

Police Dog Sniffs Out Child Porn Hard Drives

July 8, 2014 9:54 am | by Katie Mulvaney, Providence Journal | News | Comments

Rhode Island state police, through an Internet task force, are taking a new approach to finding those that traffic in child pornography. The recent arrival of golden Labrador Thoreau makes Rhode Island the second state in the nation to have a police dog trained to sniff out hard drives, thumb drives and other technological gadgets that could contain child pornography.

Advertisement

When Does Virtual Crime Become An Actual Crime?

July 2, 2014 8:18 am | News | Comments

In his mind and online persona, Gilberto Valle left little doubt about the depths of his depravation: In communications over the Internet, he imagined subjecting women he knew to sex-related torture and, in some cases, murder and cannibalism. However, the judge concluded that Mr. Valle’s Internet plotting had been “fantasy role play” and was not evidence of an actual crime.

NASA's Curiosity Rover Brought Earth BUG to Mars

June 30, 2014 5:15 am | by Darren Pauli | News | Comments

A 20 year old bug has been discovered in an algorithm so pervasive it's used in the Mars Curiosity rover, cars, aircraft, Android phones and a string of popular open source wares. The bug can be found in the Lempel-Ziv-Oberhumer (LZO) data compression algorithm created by Markus Oberhumer, who on Wednesday posted a new version 2.07 of the code and revealed the bug.

A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.

Burglar Fails to Log Off Facebook

June 27, 2014 1:17 pm | by Marino Eccher, Pioneer Press | News | Comments

A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.                       

Complaints originating from social media make up "at least half" of calls passed on to front-line officers

Social Media Calls Passed to Front-line Police in UK

June 24, 2014 12:43 pm | by Keith Moore, BBC | News | Comments

Complaints originating from social media make up "at least half" of calls passed on to front-line officers, a senior officer has told the BBC.                               

Network Forensics Makes an Impact at the Army’s NIE

June 23, 2014 8:56 am | by Capt. Ray Ragan | News | Comments

The U.S. Army Electronic Proving Ground traditionally provides expertise in instrumentation for technology-based systems and is the Army’s designated tester for C4ISR systems, as part of the Army Test and Evaluation Command. This year, in addition to supporting with instrumentation, USAEPG brought a network forensics team to the technology-centric field evaluation.

Investigators, lawyers and forensic analysts who handle child-pornography cases

Haunted Digital Investigations

June 19, 2014 12:40 pm | by Jason Nark, Philadelphia Daily News | News | Comments

No matter what they do to decompress, the investigators, lawyers and forensic analysts who handle child-pornography cases say they can't outrun the first image they saw on the job, let alone the thousands of other horrors their eyes and ears have witnessed.

Network investigations can be far more difficult than a typical computer examination

Network Investigations

June 19, 2014 12:16 pm | by Gary C. Kessler and Matt Fasulo | Articles | Comments

Network investigations can be far more difficult than a typical computer examination, even for an experienced digital forensics examiner, because there are many more events to assemble in order to understand the case and the tools do not do as much work for the examiner as traditional computer forensics tools.

The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.

Network Forensics Makes an Impact at Army's NIE

June 17, 2014 1:17 pm | by Capt. Ray Ragan, DVIDS | News | Comments

The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.                 

Evernote and Feedly are Recovering after Sustained Hacker Attacks

June 12, 2014 8:31 am | by Lily Hay Newman | Blogs | Comments

Evernote and Feedly — the popular note-taking app and RSS reader respectively — were both down for many hours on Wednesday because of a sustained hacker attack. Though the sites are starting to restore service, users may have still have intermittent problems.

New Pandemiya Trojan Emerges as Alternative to Zeus-based Variants

June 11, 2014 12:04 pm | by Eli Marcus | Blogs | Comments

Pandemiya is a new commercial Trojan malware application that has recently been promoted in underground forums as an alternative to more widely used Zeus Trojan and its variants. The fraudsters behind Pandemiya are currently advertising it for sale at a price of $1500 USD for the core application, or $2000 USD for the core application including plugins for additional functionality.

Vegas Police Killer's Video and Social Media Investigated

June 11, 2014 11:52 am | by Michelle Rindels and Justin Pritchard, Associated Press | News | Comments

Investigators in Las Vegas are studying YouTube videos and a range of other social media posts by Jerad Miller, as they try to untangle what led him and his 22-year-old wife to gun down two police officers and a civilian before taking their own lives.

Getting Smart about Fighting Cyber Crime

June 11, 2014 11:46 am | by Caitlin Dawson, Simon Fraser Univ. | News | Comments

When Ashleigh Girodat collects her BA in criminology in June she will have already made her mark in the fight against cyber crime. As part of a research team at SFU’s International Cybercrime Research Centre, Girodat analyses data from a web crawler that scans the open web for child-exploitation content.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading