Advertisement
Network Forensics
Subscribe to Network Forensics

The Lead

How to Collect Internet Evidence

October 22, 2014 8:00 pm | Articles | Comments

The courts have generally accepted evidence collected from the Internet as long as its authenticity can be established. Commonly accepted digital forensic methodologies can all be used to identify a three-pronged approach to Internet forensics.

Investigator Turns Eyewitness

October 20, 2014 8:21 pm | by Benjamin Wright | Articles | Comments

In today’s world of social media, investigators are taking on a new role; they are becoming a...

Social Media No Help in Bank's Cyber Crime Fight

October 15, 2014 10:47 am | by Steve Slater, Reuters | News | Comments

Banks are fighting an uphill battle to protect themselves and their client accounts from...

Snapsaved.com Claims Hackers Stole Snapchat Images

October 14, 2014 10:25 am | by Reuters | News | Comments

Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.

Mayhem Botnet Takes to Shellshock

October 14, 2014 9:55 am | by Tara Seals, Infosecurity Magazine | News | Comments

The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.                                    

US-based game developer Brianna Wu was driven from her home over the weekend after a troll posted her address online and threatened to rape, kill and mutilate her. This situation came about because of the Gamergate controversy.

Another Game Developer Flees Her Home Following Gamergate Death Threats

October 14, 2014 9:32 am | by Lisa Vaas | Blogs | Comments

US-based game developer Brianna Wu was driven from her home over the weekend after a troll posted her address online and threatened to rape, kill and mutilate her. This situation came about because of the Gamergate controversy.       

Molly Sauter, a doctoral student at McGill University and a research affiliate at the Berkman Center at Harvard ("exploring cyberspace, sharing its study & pioneering its development"), has a paper calling the use of DDOS (distributed denial of service) a

Researcher Makes the Case for DDOS Attacks

October 14, 2014 8:24 am | by Larry Seltzer | Blogs | Comments

Molly Sauter, a doctoral student at McGill University and a research affiliate at the Berkman Center at Harvard ("exploring cyberspace, sharing its study & pioneering its development"), has a paper calling the use of DDOS (distributed denial of service) attacks a legitimate form of activism and protest. This can't go unchallenged.

Advertisement
NTP reflection attacks may be on the wane when it comes to distributed denial of service (DDoS) campaigns, but they’ve been replaced by a surge in Simple Service Discovery Protocol (SSDP) attack, according to new data from Arbor Networks.

SSDP DDoS Attacks on the Rise as NTP Amplification Fades

October 9, 2014 12:52 pm | by Phil Muncaster, Infosecurity Magazine | News | Comments

NTP reflection attacks may be on the wane when it comes to distributed denial of service (DDoS) campaigns, but they’ve been replaced by a surge in Simple Service Discovery Protocol (SSDP) attack, according to new data from Arbor Networks.   

Windows XP Flaws Help Russian 'Qbot' Gang Build 500,000 PC Botnet

Windows XP Flaws Help Russian 'Qbot' Gang Build 500,000 PC Botnet

October 9, 2014 11:21 am | by John Dunn, PC World.in | News | Comments

The Russian gang behind the obscure Qbot botnet have quietly built an impressive empire of 500,000 infected PCs by exploiting unpatched flaws in mainly US-based Windows XP and Windows 7 computers, researchers at security firm Proofpoint have discovered.

With a bug as dangerous as the “shellshock” security vulnerability discovered recently, it takes less than 24 hours to go from proof-of-concept to pandemic.

Hackers Already Using Shellshock Bug to Launch Botnet Attacks

September 26, 2014 9:56 am | by Andy Greenberg, Wired | News | Comments

With a bug as dangerous as the “shellshock” security vulnerability discovered recently, it takes less than 24 hours to go from proof-of-concept to pandemic.                           

A new toolkit known as Spike is living up to its name by fomenting a series of powerful distributed denial of service (DDoS) attacks. Its specialty is helping malicious actors to build bigger DDoS botnets by targeting a wider range of Internet-capable dev

Spike DDoS Kit Driving 'Huge' Multi-Vector Attacks

September 25, 2014 9:13 am | by Tara Seals, Infosecurity Magazine | News | Comments

A new toolkit known as Spike is living up to its name by fomenting a series of powerful distributed denial of service (DDoS) attacks. Its specialty is helping malicious actors to build bigger DDoS botnets by targeting a wider range of Internet-capable devices. And that in turn drives…wait for it…a ‘spike’ in traffic.

Dogs have been trained to pick up the scent for laptops, digital cameras and   those easy-to-conceal USB drives. Devices such as these are often used to   stash illegal materials like child pornography, which the FBI says is growing   fast.

Police Dog Can Smell a Hidden USB Drive

September 24, 2014 10:56 am | by Kristen Schweizer, Bloomberg | News | Comments

Dogs have been trained to pick up the scent for laptops, digital cameras and those easy-to-conceal USB drives. Devices such as these are often used to stash illegal materials like child pornography, which the FBI says is growing fast.     

Advertisement
A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.

High-volume DDoS Attacks on the Rise

September 23, 2014 11:31 am | by Help Net Security | News | Comments

A continuing trend of  are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.               

Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.

Australian Spies Track Terror Threats on Social Media

September 22, 2014 10:12 am | by Philip Dorling, The Sydney Morning Herald | News | Comments

Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.                      

As U.S. military leaders outlined their strategy before Congress to fight Islamic State militants on the battlefield, the National Security Agency chief said he was watching the media-savvy group's cyber capabilities.

NSA Monitoring Tech-savvy Islamic State

September 17, 2014 11:41 am | by Donna Chiacu, Reuters | News | Comments

As U.S. military leaders outlined their strategy before Congress to fight Islamic State militants on the battlefield, the National Security Agency chief said on Tuesday he was watching the media-savvy group's cyber capabilities.      

Large ISP Fights DDoS Attacks

September 11, 2014 11:55 am | by Mirko Zorz, Help Net Security | News | Comments

DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in volumetric attacks in the first half of 2014 with over 100 attacks larger than 100GB/sec reported.

In late May, an international law enforcement effort disrupted the Gameover Zeus (GoZ) botnet, a network of compromised computers used for banking fraud. The crackdown effectively eliminated the threat from Cryptolocker. Yet, ransomware is not dead, two r

Ransomware Going Strong, Despite Takedown of Gameover Zeus

September 8, 2014 12:37 pm | by Robert Lemos, Ars Technica | News | Comments

In late May, an international law enforcement effort disrupted the Gameover Zeus (GoZ) botnet, a network of compromised computers used for banking fraud. The crackdown effectively eliminated the threat from Cryptolocker. Yet, ransomware is not dead, two recent analyses have found. 

Advertisement
In a classic example of a ripple effect, a number of Namecheap’s users’   accounts have now been compromised in a brute-force attack, by hackers using   passwords previously stolen by Russian gang CyberVor.

Russian Gang's Billions of Stolen Credentials Resurface in New Attack

September 3, 2014 11:38 am | by Tara Seals, Infosecurity Magazine | News | Comments

In a classic example of a ripple effect, a number of Namecheap’s users’ accounts have now been compromised in a brute-force attack, by hackers using passwords previously stolen by Russian gang CyberVor.             

Services are up and running again after a denial of service took down Sony's PlayStation Network for much of Sunday, coinciding with a bomb threat on American Airlines flight 362, which carried John Smedley, president of Sony Online Entertainment. The thr

Sony, XBox Victims of DDoS, Hacktivist Threats

August 27, 2014 11:11 am | by Sara Peters | Blogs | Comments

Services are up and running again after a denial of service took down Sony's PlayStation Network for much of Sunday, coinciding with a bomb threat on American Airlines flight 362, which carried John Smedley, president of Sony Online Entertainment. The threats caused the airline to divert the flight.

Websense Security Labs has come across an interesting campaign, targeting Russian nationals, trying to lure them to download and run executables on their computers, under the guise of attacking Western government websites.

Kelihos Botnet Trying to Expand by Harnessing Russian National Sentiments

August 26, 2014 10:11 am | by Editor | Blogs | Comments

Websense Security Labs has come across an interesting campaign, targeting Russian nationals, trying to lure them to download and run executables on their computers, under the guise of attacking Western government websites.       

Digital Clues Leading the Hunt for ISIS Killer

August 22, 2014 9:52 am | by Jill Lawless, Associated Press | News | Comments

The Islamic militant in a video showing the death of American journalist James Foley took great care to disguise his identity, dressing head-to-toe in black, with a mask leaving only his eyes visible. But police and intelligence services in Britain and the United States have a plethora of clues as they scramble to identify him, from image analysis and voice-recognition software to social media postings and testimony from former captives.

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

The NSA MonsterMind Bot Could Wage Cyber War Autonomously

August 14, 2014 10:55 am | by Kim Zetter, Wired | News | Comments

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyberdefense capabilities, too.

In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.

Good Bot, Bad Bot? 23M Twitter Accounts are Automated

August 14, 2014 10:13 am | by Lisa Vaas | Blogs | Comments

In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.           

Thrifty attackers, are you tired of investing your dollars in a botnet that's constantly being disrupted by new anti-virus signatures and bot downtime? A "cloudbot" might be just what you seek.

CloudBot: A Free, Malwareless Alternative to Traditional Botnets

August 12, 2014 10:47 am | by Sara Peters | Blogs | Comments

Thrifty attackers, are you tired of investing your dollars in a botnet that's constantly being disrupted by new anti-virus signatures and bot downtime? A "cloudbot" might be just what you seek.                

Stalking Predators Online Stresses Cyber Cops

July 28, 2014 11:11 am | by Maya Lau, The Times | News | Comments

To string along suspected sex offenders, Bryan Montgomery carries out intimate conversations with them — sometimes lasting a year — while posing as a juvenile on social media. The job brings psychological stress, which Montgomery acknowledges. 

Russia Caught Editing Wikipedia Entry about MH17

July 21, 2014 10:31 am | by Kadhim Shubber, Wired UK | News | Comments

Thanks to a Twitter bot that monitors Wikipedia edits made from Russian government IP addresses, someone from the All-Russia State Television and Radio Broadcasting Company (VGTRK) has been caught editing a Russian-language Wikipedia reference to MH17 in an article on aviation disasters.

The Dangers of Social Media in the Military

July 21, 2014 9:59 am | by Lance Cpl. Tyler Giguere, DVIDS | News | Comments

Common tactics of social media extortionists include relating to a service member’s interests and posting pictures of attractive females to lure them into chats. What may seem like a normal person wanting to video chat or meet with a Marine, can actually be an extortionist trying to deceive him for his money or information.

Senate Hearing Looks to Cybercrime Law to Fight Botnets

July 17, 2014 10:19 am | by Sara Peters, Dark Reading | News | Comments

In the wake of Microsoft's seizure of No-IP servers and domains, private and public sector representatives met to discuss what can be done to address the problem of botnets.                     

Global Law Enforcement, Security Firms Team Up, Take Down Shylock

July 11, 2014 11:21 am | by Sara Peters, Dark Reading | News | Comments

A month after the GameOver ZeuS sting, another bank fraud group's operations has been disrupted by an international collaboration of security firms and law enforcement agencies. The new target is Shylock, a Trojan that has stolen from banks in the U.S., Italy, and especially the United Kingdom.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading