Advertisement
Network Forensics
Subscribe to Network Forensics

The Lead

A month after rebranding from Telecom to Spark, the leading New Zealand ISP had received collateral damage from the conflict between Russia and Ukraine. Fights there have never really been toe-to-toe, but, on Friday evening, September 5, Spark engineers a

Spark DNS Bounces DDoS Attack

November 21, 2014 4:58 pm | by Debbie Fletcher | Articles | Comments

A month after rebranding from Telecom to Spark, the leading New Zealand ISP had received collateral damage from the conflict between Russia and Ukraine. Fights there have never really been toe-to-toe, but, on Friday evening, September 5, Spark engineers announced that a layer-3 DDoS attack was causing an overload of its DNS servers.

12-year-old's Online Life Leads to Abduction

November 21, 2014 11:00 am | by Sean Gallagher, Ars Technica | News | Comments

On November 10, a 12-year-old girl left her home in the Baltimore suburb of Nottingham at 7:30am...

Botnet Infects Android, Infiltrates Corporate Networks

November 20, 2014 12:17 pm | by Doug Drinkwater, SC Magazine | News | Comments

Mobile security firm Lookout has discovered a more sophisticated variant of the...

DDoS Attacks Shrinking, Switching to Mobile

November 19, 2014 9:34 am | by Black Lotus | News | Comments

Attackers will continue to resort to non-amplification attacks when there are not enough...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.

Open Whisper Systems Helps WhatsApp Achieve End-to-end Encryption

November 18, 2014 12:22 pm | by Zeljka Zorz, Help Net Security | News | Comments

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.   

ISIS members have proven exceptionally difficult to track due a proper use of technology tools, like application for encryption, social media platforms and encrypted instant messaging platforms. Recently the media announced that ISIS has released a manual

ISIS Keeps Getting Better at Avoiding US Surveillance

November 18, 2014 12:14 pm | by Pierluigi Paganini | Blogs | Comments

ISIS members have proven exceptionally difficult to track due a proper use of technology tools, like application for encryption, social media platforms and encrypted instant messaging platforms. Recently the media announced that ISIS has released a manual for its militants, titled “How to Tweet Safely Without Giving out Your Location to NSA," that explain how avoid surveillance.

In its statement on Monday night, Anonymous explained that through the Klan's Twitter account, it obtained large amounts of information on multiple white supremacists, and "members of Anonymous who seized the account are continuing to debate if the identi

Anonymous Statement: KKK is a Terrorist Group, KKK Responds Poorly

November 18, 2014 11:48 am | by Violet Blue | Blogs | Comments

In its statement on Monday night, Anonymous explained that through the Klan's Twitter account, it obtained large amounts of information on multiple white supremacists, and "members of Anonymous who seized the account are continuing to debate if the identities of the people associated with the Klan's account should be released to the public."

Advertisement
With the recent streak of widely publicized breaches of well-known companies, many organizations are examining their incident response (IR) capabilities. SANS conducted a survey earlier this year to explore what IR teams are up against – what types of att

2014 SANS Incident Response Survey Results

November 17, 2014 11:35 am | by Garrett Gross | Blogs | Comments

With the recent streak of widely publicized breaches of well-known companies, many organizations are examining their incident response (IR) capabilities. SANS conducted a survey earlier this year to explore what IR teams are up against — what types of attacks are most common, what defenses are most widely used, and what challenges IR teams face in their response efforts. 

Investigators recently set out to consider whether homicides involving social networking sites were unique and worthy of labels such as 'Facebook Murder', and to explore the ways in which perpetrators had used such sites in the homicides they had committe

Is there such a thing as 'Facebook Murder'?

November 14, 2014 11:37 am | by Wiley | News | Comments

Investigators recently set out to consider whether homicides involving social networking sites were unique and worthy of labels such as "Facebook Murder," and to explore the ways in which perpetrators had used such sites in the homicides they had committed.

Distributed Denial of Service (DDoS) attacks against Hong Kong websites increased a whopping 111 percent from September to October as pro-democracy protests in the Special Administrative Region of China took hold, according to Arbor Networks.

Hong Kong Sites Hit by 111% Rise in DDoS Attacks

November 12, 2014 9:40 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

Distributed Denial of Service (DDoS) attacks against Hong Kong websites increased a whopping 111 percent from September to October as pro-democracy protests in the Special Administrative Region of China took hold, according to Arbor Networks.  

Most online account hijacking capers are carried out using automated bots, but not all. In fact, some of the most effective and damaging heists result from targeted, carefully staged, manual attacks, a new study by Google shows.

Google: Manual Account Hijacks Much More Dangerous than Bot Takeovers

November 7, 2014 10:16 am | by Jai Vijayan | Blogs | Comments

Most online account hijacking capers are carried out using automated bots, but not all. In fact, some of the most effective and damaging heists result from targeted, carefully staged, manual attacks, a new study by Google shows.      

As the pro-democracy movement in Hong Kong has continued to mount a series of protests, attackers believed to be China-backed have launched a series of distributed denial of service attacks (DDoS) against websites promoting the movement there.

Chinese APT Actors Linked to DDoS against Hong Kong's Protesters

November 4, 2014 11:09 am | by Tara Seals, Infosecurity Magazine | News | Comments

As the pro-democracy movement in Hong Kong has continued to mount a series of protests, attackers believed to be China-backed have launched a series of distributed denial of service attacks (DDoS) against websites promoting the movement there. 

Advertisement
Twitter and Facebook are so important to militant groups that the U.S. technology giants should give security services greater access to allow Western governments to foil attacks, the head of Britain's eavesdropping agency said.

UK Spy Chief Says Terrorists Grow Networks with Social Media

November 4, 2014 10:22 am | by Guy Faulconbridge, Reuters | News | Comments

Twitter and Facebook are so important to militant groups that the U.S. technology giants should give security services greater access to allow Western governments to foil attacks, the head of Britain's eavesdropping agency said.      

We regularly write about "bots," or "zombies," malicious programs that let cyber criminals take over your computer from afar. Some malware is pre-programmed for one specific criminal act, but most bots or zombies are kitted out with a wide range of "featu

How Bots and Zombies Work, and Why You Should Care

October 31, 2014 9:30 am | by Paul Ducklin | Blogs | Comments

We regularly write about "bots," or "zombies," malicious programs that let cyber criminals take over your computer from afar. Some malware is pre-programmed for one specific criminal act, but most bots or zombies are kitted out with a wide range of "features."

How to Collect Internet Evidence

October 22, 2014 8:00 pm | Articles | Comments

The courts have generally accepted evidence collected from the Internet as long as its authenticity can be established. Commonly accepted digital forensic methodologies can all be used to identify a three-pronged approach to Internet forensics.

Investigator Turns Eyewitness

October 20, 2014 8:21 pm | by Benjamin Wright | Articles | Comments

In today’s world of social media, investigators are taking on a new role; they are becoming a form of eyewitness. As the eyewitness, an investigator observes evidence that might not be visible to any other available investigator. The investigator is wise to create a record of what he or she sees at any particular point in time, including print outs of screenshots.  

Social Media No Help in Bank's Cyber Crime Fight

October 15, 2014 10:47 am | by Steve Slater, Reuters | News | Comments

Banks are fighting an uphill battle to protect themselves and their client accounts from cyber attacks, and the sometimes careless use of social media by customers and staff isn't making the fight any easier.           

Advertisement

Snapsaved.com Claims Hackers Stole Snapchat Images

October 14, 2014 10:25 am | by Reuters | News | Comments

Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that hackers had breached its servers and made off with some 500 megabytes of photographs.                     

The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.

Mayhem Botnet Takes to Shellshock

October 14, 2014 9:55 am | by Tara Seals, Infosecurity Magazine | News | Comments

The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.                                    

US-based game developer Brianna Wu was driven from her home over the weekend after a troll posted her address online and threatened to rape, kill and mutilate her. This situation came about because of the Gamergate controversy.

Another Game Developer Flees Her Home Following Gamergate Death Threats

October 14, 2014 9:32 am | by Lisa Vaas | Blogs | Comments

US-based game developer Brianna Wu was driven from her home over the weekend after a troll posted her address online and threatened to rape, kill and mutilate her. This situation came about because of the Gamergate controversy.       

Molly Sauter, a doctoral student at McGill University and a research affiliate at the Berkman Center at Harvard ("exploring cyberspace, sharing its study & pioneering its development"), has a paper calling the use of DDOS (distributed denial of service) a

Researcher Makes the Case for DDOS Attacks

October 14, 2014 8:24 am | by Larry Seltzer | Blogs | Comments

Molly Sauter, a doctoral student at McGill University and a research affiliate at the Berkman Center at Harvard ("exploring cyberspace, sharing its study & pioneering its development"), has a paper calling the use of DDOS (distributed denial of service) attacks a legitimate form of activism and protest. This can't go unchallenged.

NTP reflection attacks may be on the wane when it comes to distributed denial of service (DDoS) campaigns, but they’ve been replaced by a surge in Simple Service Discovery Protocol (SSDP) attack, according to new data from Arbor Networks.

SSDP DDoS Attacks on the Rise as NTP Amplification Fades

October 9, 2014 12:52 pm | by Phil Muncaster, Infosecurity Magazine | News | Comments

NTP reflection attacks may be on the wane when it comes to distributed denial of service (DDoS) campaigns, but they’ve been replaced by a surge in Simple Service Discovery Protocol (SSDP) attack, according to new data from Arbor Networks.   

Windows XP Flaws Help Russian 'Qbot' Gang Build 500,000 PC Botnet

Windows XP Flaws Help Russian 'Qbot' Gang Build 500,000 PC Botnet

October 9, 2014 11:21 am | by John Dunn, PC World.in | News | Comments

The Russian gang behind the obscure Qbot botnet have quietly built an impressive empire of 500,000 infected PCs by exploiting unpatched flaws in mainly US-based Windows XP and Windows 7 computers, researchers at security firm Proofpoint have discovered.

With a bug as dangerous as the “shellshock” security vulnerability discovered recently, it takes less than 24 hours to go from proof-of-concept to pandemic.

Hackers Already Using Shellshock Bug to Launch Botnet Attacks

September 26, 2014 9:56 am | by Andy Greenberg, Wired | News | Comments

With a bug as dangerous as the “shellshock” security vulnerability discovered recently, it takes less than 24 hours to go from proof-of-concept to pandemic.                           

A new toolkit known as Spike is living up to its name by fomenting a series of powerful distributed denial of service (DDoS) attacks. Its specialty is helping malicious actors to build bigger DDoS botnets by targeting a wider range of Internet-capable dev

Spike DDoS Kit Driving 'Huge' Multi-Vector Attacks

September 25, 2014 9:13 am | by Tara Seals, Infosecurity Magazine | News | Comments

A new toolkit known as Spike is living up to its name by fomenting a series of powerful distributed denial of service (DDoS) attacks. Its specialty is helping malicious actors to build bigger DDoS botnets by targeting a wider range of Internet-capable devices. And that in turn drives…wait for it…a ‘spike’ in traffic.

Dogs have been trained to pick up the scent for laptops, digital cameras and   those easy-to-conceal USB drives. Devices such as these are often used to   stash illegal materials like child pornography, which the FBI says is growing   fast.

Police Dog Can Smell a Hidden USB Drive

September 24, 2014 10:56 am | by Kristen Schweizer, Bloomberg | News | Comments

Dogs have been trained to pick up the scent for laptops, digital cameras and those easy-to-conceal USB drives. Devices such as these are often used to stash illegal materials like child pornography, which the FBI says is growing fast.     

A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.

High-volume DDoS Attacks on the Rise

September 23, 2014 11:31 am | by Help Net Security | News | Comments

A continuing trend of  are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.               

Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.

Australian Spies Track Terror Threats on Social Media

September 22, 2014 10:12 am | by Philip Dorling, The Sydney Morning Herald | News | Comments

Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.                      

As U.S. military leaders outlined their strategy before Congress to fight Islamic State militants on the battlefield, the National Security Agency chief said he was watching the media-savvy group's cyber capabilities.

NSA Monitoring Tech-savvy Islamic State

September 17, 2014 11:41 am | by Donna Chiacu, Reuters | News | Comments

As U.S. military leaders outlined their strategy before Congress to fight Islamic State militants on the battlefield, the National Security Agency chief said on Tuesday he was watching the media-savvy group's cyber capabilities.      

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading