9.2.18

Global cybercrime behemoth busted, 36 people indicted




US authorities have pressed charges against no fewer than 36 people from 17 countries for their alleged involvement in maintaining an international cybercrime behemoth enterprise that is believed to have caused losses of $530 million to both private individuals and businesses over a period of seven years.
Thirteen of those charged have been apprehended, including five in the United States and the rest in Australia, the United Kingdom, France, Italy, Kosovo and Serbia, according to a statement by the US Department of Justice. The US government is reportedly seeking the extradition of those from outside the country.
The investigators believe that the sprawling network, known as the ‘Infraud Organization’, is guilty of various flavors of nefarious business, including “the large-scale acquisition, sale, and dissemination of stolen identities, compromised debit and credit cards, personally identifiable information, financial and banking information, computer malware, and other contraband”.

Among the three dozen charged, most of which are in their 20s and 30s, is the network’s alleged creator – Svyatoslav Bondarenko from Ukraine. He remains at large, while a purported co-founder and administrator, Sergey Medvedev of Russia, is among those arrested. Medvedev is believed to have also operated an escrow service for the organization’s members, facilitating illegal digital currency transactions among them.
Opening shop in October 2010, the enterprise operated as an online discussion board under the tagline “In Fraud We Trust”. “Members of the Infraud Organization used the forum to coordinate and conduct online criminal activities that included identity theft, bank fraud, wire fraud and computer crimes,” Deputy Assistant Attorney General David Rybicki is quoted as saying.
According to US authorities, the enterprise aimed at becoming the premier destination for the buying and selling of stolen payment card data and forged identification documents. It is believed that the losses that the Infraud Organization had intended to cause were north of $2.2 billion.
The organization “directed traffic and potential purchasers to the automated vending sites of its members, which served as online conduits to traffic in stolen means of identification, stolen financial and banking information, malware, and other illicit goods”, said the Department of Justice.
“Today’s indictment and arrests mark one of the largest cyberfraud enterprise prosecutions ever undertaken by the Department of Justice … The Department of Justice refuses to allow these cybercriminals to use the perceived anonymity of the Internet as a shield for their crimes. We are committed to working closely with our international counterparts to identify, investigate, and bring to justice the perpetrators of these crimes, wherever in the world they operate,” said Acting Assistant Attorney General John Cronan.
The illicit proceeds are believed to have been laundered via digital currencies, including Bitcoin and the defunct service Liberty Reserve, whose founder, Arthur Budovsky, is currently serving a sentence for money laundering.
The ring’s pecking order is said to have included a number of clear-cut roles, specifically administrators, “super moderators”, moderators, vendors, VIP members, and regular members. The network had nearly 11,000 rank-and-file members as of March 2017.
The latest crackdown, called the “Operation Shadow Web”, brings back memories of similar busts. The 2013 takedown of the dark web-based drug marketplace Silk Road and its mastermind, Ross Ulbricht aka ‘Dread Pirate Roberts’, has since become somewhat of the stuff of legend. Its successor, Silk Road 2.0, met a similar fate a little over a year later. In June 2017, another sting operation took down AlphaBay and Hansa, two of the largest dark markets at the time.
Senior US officials, including former FBI head James Comey and Attorney General Jeff Sessions have said before that not even flocking to anonymizing services such as Tor can help cybercriminals escape detection.
Speaking after the latest crackdown, Acting Executive Associate Director Derek N. Benner of US Immigration and Customs Enforcement’s Homeland Security Investigations echoed their views, noting that “cyberspace is not a refuge from justice”.

8.2.18

L’InterSystems IRIS Data Platform™ disponible dès à présent



La nouvelle plate-forme de données polyvalente pour le développement et le déploiement d’applications riches en données évolutives, interopérables et analytiques


InterSystems, leader mondial en plates-formes informatiques  destinées au secteur des soins de santé, au monde des affaires et aux applications gouvernementales vient d’annoncer la disponibilité de l’InterSystems IRIS Data Platform™, la première plate-forme de données qui en un seul produit permet une gestion des données multi-modèles et multi-charges de travail, une interopérabilité native et une plate-forme analytique ouverte.

InterSystems IRIS est une plate-forme de données unifiée complète qui permet de développer plus rapidement et plus facilement des applications en temps réel riches en données. Elle permet aux organisations de combiner les données événementielles et transactionnelles avec des gros volumes de données historiques et autres afin de capturer des opportunités  inexploitées et d’accroître l’efficacité opérationnelle. InterSystems IRIS rend l’entreprise numérique d’aujourd’hui plus intelligente, plus rapide et plus flexible.

L’InterSystems IRIS Data Platform:

·         Permet un traitement  transactionnel et analytique simultané et supporte de multiples présentations de données – y compris des modèles relationnels et non-relationnels, toujours synchronisés, dans une seule base de données ;

·         Offre une gamme complète de possibilités d’interopérabilité permettant d’intégrer des données et des applications disparates et de créer en temps réel des processus métiers en toute transparence ;

·         Comprend des capacités de traitement tant pour les informations métier structurées (BI) et non structurées  en langage naturel, ainsi qu’une plate-forme analytique ouverte qui permet d’intégrer facilement les meilleures applications analytiques tierces grâce à des connecteurs dédiés et des normes du secteur ;

·         Supporte un déploiement flexible en environnements cloud public ou privé ainsi que sur site ou en environnement hybride.

InterSystems IRIS procure une combinaison unique entre évolutivité horizontale et verticale, afin de fournir des performances élevées, efficaces et fiables permettant de faire face à des charges de travail avec des gros volumes de transactions simultanées et des activités de requêtes BI.

En même temps que la disponibilité générale d’IRIS, InterSystems a lancé InterSystems IRIS Experience, une nouvelle expérience utilisateur qui permet un accès guidé et ouvert à InterSystems IRIS Data Platform afin d’explorer ses impressionnantes fonctionnalités.  Cette expérience permet aux utilisateurs de résoudre des défis et de développer des solutions en utilisant des ensembles de données réels.

Avec des scenarios convaincants, tels que les analytics big data et les prévisions en matière de fraude financière , les développeurs et les organisations peuvent directement se rendre compte de la puissance d’ InterSystems IRIS Data Platform.

“InterSystems partage un engagement en matière d’innovation avec ses clients et ses partenaires et nous avons créé InterSystems IRIS Data Platform pour accélérer le développement de nouvelles applications plus robustes  et plus riches en données ,” explique Paul Grabscheid, vice- président Stratégie chez InterSystems. “InterSystems IRIS permet aux organisations innovantes d’être réellement pilotées par les données, en utilisant les données qui dorment dans les silos et en les transformant en idées exploitables qui génèrent de meilleurs décisions au niveau de l’entreprise  ainsi qu’une meilleure expérience client. ”   

“InterSystems IRIS est conçue pour gérer et optimiser des charges de travail mixtes et des applications riches en données à l’échelle dans le cloud, sur site ou environnements hybrides tout en fournissant la sécurité, la fiabilité et le support intégrés, ” selon les analystes d’Enterprise Strategy Group (ESG), spécialisés en recherche, validation  et stratégie. “Plutôt qu’une approche de stockage traditionnelle, InterSystems IRIS offre une plate-forme unique avec une représentation sous-jacente de données capable de projections multiples des mêmes données, permettant aux organisations de mieux répondre aux processus métiers actuels.”
  
Comme tout nouveau membre de la famille de plates-formes InterSystems, InterSystems Iris rejoint  Caché , la base de données multi-modèles hautes performances et Ensemble, le moteur d’intégration d’applications. Les solutions  soins de santé d’InterSystems comportent HealthShare , la plate-forme d’interopérabilité pour la coordination collaborative des soins.

Le 14 février prochain, avec Mike Leone et Steve Duplessie, analystes de ESG, InterSysrems sera co-organisateur du webinar intitulé “Building Smarter, Faster, and Scalable Data-Rich Applications for Businesses that Operate in Real-Time.” Pour plus d’information, visitez la page de l’événement registration page.
Le rapport de recherche fait par ESG qui accompagne cet événement peut être téléchargé sur le site d’InterSystrems InterSystems website.


7.2.18

UK-led police operation quashes Luminosity Link RAT



A hacking tool that was able to give full remote control of a victim’s computer to anyone with nefarious intentions has been taken down in an international law-enforcement operation, according to announcements by the United Kingdom’s National Crime Agency (NCA) and by Europol.
The remote access Trojan (RAT), called Luminosity Link, was peddled on a dedicated website for as little as £30. It claimed to offer a trifecta of “surveillance, security and administration”, purporting to be a legitimate system administration utility, a client-monitoring tool, and, wait for it, an “anti-malware solution”.

The insidious RAT, once installed undetected, gave digital crooks free rein on the victim’s machine. They were able to “disable anti-virus and anti-malware software, carry out commands such as monitoring and recording keystrokes, steal data and passwords, and watch victims via their webcams”, said the NCA. Obviously all of that could be done without the victim’s knowledge.
The investigation showed that the tool, which required little technical knowledge to deploy, had over 8,600 users in 78 countries. Victims are believed to be in the thousands.
Forensic analyses have found a range of evidence of stolen personal details, passwords, private photographs, video footage and data. However, the amount of evidence is “expected to rise significantly as seized devices are examined”, said the NCA, which has confiscated more than 100 “exhibits” during the UK operation.
“Through our work with forces and international partners the RAT is no longer available for sale and no longer works,” said senior investigating officer David Cox of the NCA’s National Cyber Crime Unit.
Coordinated by the NCA and supported by Europol, the investigation also involved law-enforcement agencies across 13 countries in Europe, Australia and North America. The crackdown itself took place during a “week of action” in September of 2017, with authorities across the UK and Europe working together to target the RAT’s purchasers. The probes have resulted in a number of search warrants, arrests, and cease-and-desist notifications across Europe, Australia and the US.
Citing “operational reasons”, the authorities didn’t disclose the information about the clampdown until earlier this week.
Luminosity Link was initially found on the computer of an alleged offender in the southwestern English city of Bristol, who was nabbed in September 2016 on suspicion of computer misuse offenses in an unrelated investigation, said the NCA.
“Through such strong, coordinated actions across national boundaries, criminals across the world are finding out that committing crimes remotely offers no protection from arrests. Nobody wants their personal details or photographs of loved ones to be stolen by criminals. We continue to urge everybody to ensure their operating systems and security software are up to date”, Steven Wilson, head of Europol’s European Cybercrime Centre, is quoted as saying.

6.2.18

Think you have a tracker on your phone? Learn how to make your device more resilient




If you’re reading this article, it’s likely that you’re hoping for quick tips on what to do if you suspect there’s spyware or a tracker on your phone. If that is the case, you’re likely to be disappointed; there are no quick lists of things to identify or remove to make you safe again. But that doesn’t mean there is nothing you can do. While it will require a determined effort, the good news is that you can make your devices more resilient against a wide variety of different security threats including spyware.
Increasing complexity = no quick fix
If you’re wondering why there is no quick fix, a brief look into the past can give the answer. As the popular maxim goes: “History doesn’t repeat itself but it often rhymes.” In technology, as in so many areas of life, we often see recurring patterns of threats. But there’s always a twist, as the underlying technology evolves. Such is the case with spyware and other threats on mobile phones.
Desktop computers have had malware for many decades, and those threats changed over time. Early malware was both simple and so rare as to be popularly considered an “urban legend”; the entire instruction set for finding and removing all known malicious code used to fit on a floppy disk, and this only needed to be updated for new threats on a quarterly basis. Now, anti-malware products find and remove so many threats that counts cease to have practical meaning, and updates for new threats must be delivered well-nigh constantly. As a result, where we could once say, “look for A, B or C files to see if you’re infected”, or “do X, Y and Z to clear your device”, now we can’t realistically give such simplistic advice.
Likewise, threats targeting mobile phones have grown in both quantity and complexity. Where we used to be able to give a short list of things to look for to see if you’ve been affected by specific malware programs, that’s no longer realistic. If you’re reading this because you think someone might have installed spyware on your phone, it’s probably best to proceed as if your suspicions are correct.
Mobile phones, aka “the computer in your hand”
As we moved from the early days where threats were few and new ones appeared infrequently, to the present situation of having a practically uncountable number of threats, malware researchers tried to find some way to help people figure out which threats are of greatest concern. One such method was to include a rating for the “severity” of the threat, meaning how much potential there was for harm to an affected user. In one threat-rating model, spyware and backdoors were considered to have “infinite” damage potential because there was almost no limit to how much harm attackers could cause if they could quietly sit on your machine and passively watch your every action or manipulate your computer as if they were sitting at your desk.
Now most of us carry powerful computers with us wherever we go, and those computers are equipped with receivers that identify our location at all times. As a result, someone who’s watching us on our phones has even more capability to monitor our activities, as our computers are likely within arm’s reach all day and night.
Time to get thorough
Rather than trying to scare you with my previous description of the damage that could be done, I’m hoping historical context will give you an idea of the sort of changes that will need to be made if you believe you’re being tracked.
If you’ve ever had to go through the process of replacing a stolen credit card, or of changing your legal name for marriage, you’ll have a good sense of how much it can help to sit down and create an exhaustive list before proceeding. In order to do that with a clear head, you will need to get yourself out of harm’s way first.
·         Start with your phone
If you suspect your device is being tracked, you must consider the affected device “untrusted” from here on out, as even restoring it to factory settings may not completely clear a tracker. The microphone or camera functionality of your phone may be in use by the tracker, so be mindful of what is happening around your device. As unintuitive as this may sound, you may not want to power your phone off, as this may compromise data or evidence on your phone. Do turn off network connectivity immediately; put the device in Airplane Mode, and make sure this has disabled Wi-Fi and Bluetooth connectivity as well.
In order to preserve evidence or have an expert check your device, you’ll need to act promptly and carefully, as there are still ways malware could affect data stored on your device, even without access to a network connection. Put your phone out of earshot, and leave it there while you get to a safe place. When you are ready to forward your phone to an expert, put it into a Faraday Bag before interacting with it again.
“Keep in mind that SMS text messages are not encrypted”
While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.
Once you are out of physical proximity of the mobile device being tracked, you can begin to take a more thorough assessment of your situation and start bolstering your defenses.
·         Check your other devices
While it is entirely possible that any tracking is limited to one device, it’s a good idea to check any desktop, laptop, tablet, or cellphones that you use. Keep potentially-compromised devices out of your safe space so that they cannot report this location to the person tracking you. If you’ve forwarded your mobile device to an expert for analysis, they may also need you to provide access to these additional devices.
Once you determine that devices are safe, you should bolster your overall security precautions. Make sure you have updated security software including anti-malware and firewall functionality. Update your software including your operating system, Internet browsers and plugins. Change your passwords: choose ones that are strong, memorable and unique for each device and account. Do not re-use passwords for different accounts or devices. Going forward, once you have determined that your devices are clean, you may decide to encrypt data stored on your devices and communications sent over the network, such as via email or instant messaging. Keep in mind that SMS text messages are not encrypted.
·         Check online accounts and services
Most of us use our phones to access a variety of online resources; this may include online banking, social media, online review sites, etc. Many sites will allow you to de-authorize devices: if that option is available, remove the compromised devices.
Now is a good time to improve security for every account you have accessed on your phone and any other affected devices. Delete accounts you no longer use. Once again, change your passwords, and make sure your choices are strong, memorable and unique. Wherever it’s available, enable two-factor authentication but do not send keys via SMS, or to email accounts that are linked to devices that are being tracked, as this will mean your attacker can use also use these keys to access your accounts. You should also set up login notification, so that you will be alerted if unauthorized devices try to get into your accounts.
·         Leave the backup
If you’re in the habit of taking regular backups, you might be inclined to start pulling files from your online or offline backup sources. As it can be hard to know at what point tracking began, it is safer to assume that backups are compromised, especially if the backup was accessible to a device you suspect has been tracked. If you want to recover your valid data files while leaving suspicious files behind, you may need to employ an expert.
·         Get a “burner” phone
Until you can be fairly certain that your situation is resolved, you may want to get a temporary, prepaid “burner” phone that is limited to emergency contacts. Do not log onto online accounts or services from this device, and do not contact anyone who might give the number to the person you suspect is tracking you.
“You should also set up login notification, so that you will be alerted if unauthorized devices try to get into your accounts”
Any other steps you might need to take will depend on who is tracking you: for example, if you live in the same house with the person, you’ll need to get yourself to a safe location as soon as possible. Once you’ve extricated yourself from immediate danger, there are a number of other things you can and should do to protect yourself. If the person tracking you is an acquaintance or someone entirely unknown to you, they may be more interested in your assets, or in your absence from a location rather than your presence.
When you’re ready to get a new phone, be sure to secure it well. Set a password to lock your device, rather than a less-secure numeric PIN or pattern-lock. Install a mobile security product, if you’re using an Android device. You may want to set your device to automatically install updates, so they’re applied promptly. You can also set your device to only allow the installation of apps from reputable app stores, but your caution should not end there: be judicious about checking that apps are well (and positively) reviewed, and consider if the permissions it’s requesting seem reasonable for the purpose of the software. And finally, be vigilant about clicking links in email – it’s better to err on the side of typing a website directly into your browser rather than clicking a link that may send you somewhere unexpected and potentially dangerous.
Each situation is different, and your specific needs will necessarily vary. You should consider consulting with a lawyer or a social worker, who can help you make a thorough plan to keep yourself safe.