CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016

CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016

In the ever-changing landscape of CyberSecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. Today, I sit down with Dennis Skarr to recap the recent events of the cybersecurity world.

Global Hacker Groups

  • According to the U.S. Intelligence Community’s 2015 “Worldwide Threat Assessment” report, Russia and China are the “most sophisticated nation-state actors” in the new generation of cyber warfare.
  • The military’s most expensive program, the stealthy F-35 Joint Strike Fighter, has been hacked, and the stolen data used by China.
  • The Democratic National Committee (DNC) hired a computer security firm, CrowdStrike, to investigate the breach. It has publicly attributed the operation to two known hacker groups connected to the Russian government that it dubs Cozy Bear and Fancy Bear.
  • Iranian hackers were accused of hitting the banks with distributed-denial-of-service attacks on a near-weekly basis. These attacks occurred from 2011 to 2013.
  • Iranian hackers were accused of hitting the banks with distributed-denial-of-service attacks on a near-weekly basis. These attacks occurred from 2011 to 2013.
  • Iranian hackers gained unauthorized remote access to a computer controlling the Bowman Avenue Dam in Rye, New York, for about three weeks beginning in 2013.
  • The seven accused were believed to have been working on behalf of Iran’s government and the Islamic Revolutionary Guard.
  • NSA leaker Edward Snowden, provided classified information that the Obama administration’s growing ranks of cyber warriors infiltrate and disrupt foreign computer networks.

Analyzing the Hacks used in Mr. Robot (SPOILER ALERT)

  • Cafe Wifi Attack – The scene here is pretty real as the Elliot systematically went through the process by utilizing The Onion Router (Tor) Exit Nodes are the gateways where encrypted Tor traffic hits the Internet. This means an exit node can be abused to monitor Tor traffic.
  • USB Attacks: Elliot drops a stack of USB flash drives in front of the police department in hopes to get access to their data. While the scene seemed pretty outlandish in terms of the character throwing USB flash drives in front of cops, this tactic has been used many times in the real world. The University of Illinois dropped 297 drives on the school’s campus last year. The success rate of being plugged in fell between 45% and 98%. In the episode Elliot’s USB strategy actually fails so he decides to spoofs the cop cars Bluetooth connection. This is also a very realistic scenario and we did post earlier on WiFi hacks and how you can secure your wife which you can see here.

Black Hat USA 2016

  • Dennis and our Lead Trainer Timber Wolfe will both be at Black Hat 2016. Be on the lookout for our coverage via our social channels including Facebook and Twitter.
CyberTraining 365 is a comprehensive library of cybersecurity classes which enable practical application while allowing the student to control their learning pace and absorption rate. With interactive labs and a responsive community, CyberTraining 365 provides solutions for a variety of learning styles while covering an array of imperative, relevant and current topics and certifications surrounding cybersecurity. Our LMS is also ideal for training use by enterprise, government and educational organizations.

2 thoughts on “CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016

Leave a Reply

Your email address will not be published. Required fields are marked *