The Best Choice In Property Agent 2013 Awarded by Indonesian Government
New Products
Tampilkan postingan dengan label NATO. Tampilkan semua postingan
Tampilkan postingan dengan label NATO. Tampilkan semua postingan

Rabu, 30 Januari 2013

Kaspersky Labs Researcher to Present Operation Red October at Suits and Spooks DC

I'm very pleased to announce that Kaspersky Labs researcher Roel Schouwenberg, a senior malware researcher with Kaspersky Lab's Global Research & Analysis Team, will be presenting at Suits and Spooks DC on February 8-9, 2013. His presentation will cover:

  • Earliest variants of the malware (2007)
  • Victim profiles
  • C&C domains and servers
  • Mobile malware components: known and unknown
  • An overview of +1000 malware plugins discovered during the research
  • Possible links with other campaigns
I've suggested in the past that Red October may have been run by a NATO member country, which makes it an ideal topic for the Suits and Spooks conference. I'm particularly happy that with the inclusion of Kaspersky Labs to our other international speakers, that Suits and Spooks is rapidly acquiring a global reputation as a unique, security event that's not to be missed. We are rapidly approaching standing-room only capacity so register today.
Add to Cart View detail

Selasa, 06 Desember 2011

How Iran May Have Captured An RQ-170 Stealth Drone


On December 4th, the Iranian FARS news agency announced that the electronic warfare group of the Iranian military took over the operations of a very sophisticated, un-manned RQ170 Stealth Sentinel drone along the border between Afghanistan and Iran. NATO acknowledged that operators lost control of a drone in that area one week ago but that doesn’t necessarily mean that Iran was responsible. Iran has lied about drone captures before and they may be lying this time, but there are at least four good reasons why they may have succeeded.
  1. Through my company’s work in this area, I know that Un-manned Aerial Vehicle (UAV) technology is actively being targeted and acquired via acts of cyber-espionage. This includes research in the Narrowband spectrum which is how UAVs receive their commands.

  2. It’s not enough to know that Narrowband technology is used. An adversary would need to know the specific frequency in order to assume control of the vehicle. That obstacle may have been solved in October with the discovery of “credential-stealing” malware infecting the Ground Control Stations at Creech AFB. If the UAV operators (or pilots) entered the narrowband frequencies used to control their drones on a keyboard, and that keyboard was infected with a keylogger, that information would be captured and delivered to a command and control server and then collected by whomever was responsible for the attack.

  3. The RQ170 Stealth Sentinel along with the Reaper and Predator drones are all operated by pilots manning ground control stations at Creech AFB. The Air Force has not been forthcoming with details of the malware attack nor its remediation and the information that it has provided has been vague and misleading.

  4. Thanks to Stuxnet, Iran is spending a lot of money to ramp up its cyber warfare capabilities, and it's highly motivated to obtain some "get-back" against the U.S. since it believes that the U.S. and possibly Israel are responsible for the Stuxnet attack.

No one will know for sure if Iran successfully launched a cyber attack against “The Beast of Kandahar” (as the RQ170 is called) unless Iran presents proof, but its intent to do so is real; the theft of related technology is real; the lapse in cyber-security at Creech AFB was very real and the Air Force would be well-advised to take this threat seriously and re-evaluate the vulnerabilities that exist today in its UAV fleet.

RELATED:
Danger Room - Wired.Com: Iran Probably Did Capture A Secret U.S. Drone
Was Iran's Downing of an RQ-170 Related to the Malware Infection at Creech AFB?
U.S. Air Force Demonstrates How Not To Report A Malware Attack
Add to Cart View detail

Most View Product

Contact Online

Support : Copyright © 2011. Demo Template AGC - All Rights Reserved
Template Clone Script ID