Monday, July 13, 2015

Hacking is Not that Hard ..

Hacking is Not that Hard 

▫ More than 90% of successful breaches required only the most basic techniques.
▫ Only 3% of breaches were unavoidable without difficult or expensive actions.
▫ Outsiders with insiders help of or with gross negligence  of insiders were responsible for most breaches.
▫ 85% of breaches took months to be discovered; the average time is five months.
▫ 96% of successful breaches could have been avoided if the victim had put in place simple or intermediate controls.
▫75% of attacks use publicly known vulnerabilities in commercial software that could be prevented by regular patching.
▫ One study found that antivirus software missed as much of 95% of malware in the first few days after its introduction.
▫ Another study found that 25% of malware is not detected by current techniques.

Chinese Cyber attacks History from 1995

Ø  1995 – Major General Wang Pufeng describes attacking via Internet
Ø  1997 – Major General Wang Baocun’s 10 Features of Chinese InfoWar
Ø  1997 – “War Beyond Limits” (Unrestricted Warfare) is written by 2 Senior Chinese Colonels
Ø  May 03, 2001 China warns of massive hack attacks
Ø  2002 - “informatisation” campaign begins Chinese Communist Party (CCP) General Secretary and Central Military Commission (CMC) Chairman Jiang Zemin, a speech before the 16th Party Congress
Ø  2003 - Titan Rain US DoD & Government websites targeted
Ø  2004 – Japan targeted by Chinese over disputed Daiyu Islands
Ø  2007 – GhostNet Global CnC network with IP addresses in People’s Republic of China  
Ø  2008 – Byzantine Hades - targeted cyber operations against the U.S. government using social engineering and malicious attachments and links in e-mail messages. 
Ø  2008 - MI5 writes to more than 300 senior executives at banks, accountants and legal firms warning them - the Chinese army is using Internet spyware to steal confidential information
Ø  2009 - Operation Aurora International Energy Industry targeted
Ø  2009 – Night Dragon Global multinationals attacked via Internet
Ø  2010 – Article - Should we be afraid of Chinese hackers?...Or lost cyber war?
Ø  2011 -US needs to get better at preventing foreign access to advanced technology
-          GAO watchdogs find holes in high-tech access, licensing rules
Ø  2011 – Chinese military CCTv-7 demonstrates GUI Hacking of University of Alabama
Ø  2011 – Office of the National Counterintelligence Executive (ONCIX)  Report indicates both China & Russia target corporate intellectual property
Ø  2011 – Operation Shady RAT FIVE year campaign of economic & intelligence data ex-filtration
      2012 – “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage” NORTHRUP GRUMMAN March 7, 2012
Ø  2012 – Chinese Technology Policy & Cyber Offensive Operations - April
Ø  2012 – China & Philippines engage in mutual cyberattacks over Scarborough Shoals – April
Ø  2013 - U.S. Blames China’s Military Directly for Cyberattacks
-          China has said it has suffered its "biggest ever" cyber-attack(DDoS Attacks), causing many websites based in the country to go temporarily offline.
-          Uses North Korea to launch cyber attacks
Ø  2014 - Senate Armed Services Committee's probe found : Hackers associated with the Chinese government have repeatedly infiltrated the computer systems of U.S. airlines, technology companies and other contractors involved in the movement of U.S. troops and military equipment
-          China linked to cyberattacks on Taiwan exploiting Windows vulnerability.
-          5 in China Army Face U.S. Charges of Cyberattacks.
-          China’s cooperation seeked to crack down on North Korea’s cyber-warfare operations, as the country’s telecommunications run through Chinese-operated networks.
Ø  2015 - China is close to developing another cyber weapon capable of unplugging internet jack from an entire nation’s infrastructure.
-          China Reveals Its Cyberwar Secrets, A first acknowledgement
-          China in focus as cyber attack hits millions of U.S. federal workers


FIR : All you want to know about in a criminal case

FIR - What is?  The first information report is a report giving information of the commission of a cognizable crime,  which may be made by t...