operation’

now browsing by tag

 
 

34 Valley child sex crime suspects arrested in Operation Broken Hearts | #predators | #childpredators | #kids | #parenting | #parenting | #kids

Source: National Cyber Security – Produced By Gregory Evans

(Facebook Photo/Phoenix Police Department)   PHOENIX – Operation Broken Hearts, a multi-agency Phoenix-area sting targeting sexual predators, yielded 34 arrests on a variety of child sex crime charges, authorities said […]

The post 34 Valley child sex crime suspects arrested in Operation Broken Hearts | #predators | #childpredators | #kids | #parenting | #parenting | #kids appeared first on National Cyber Security.

View full post on National Cyber Security

#sextrafficking | Child sex predators arrested during ICE operation in Arizona | #tinder | #pof | #match | romancescams | #scams

The U.S. Immigration and Customs Enforcement participated in a multi-agency operation to “target sexual predators who attempted to lure underage children with the intent of engaging in sexual activity.” After […] View full post on National Cyber Security

#cybersecurity | hacker | Election integrity preserved in fictitious city of Adversaria during Operation Blackout tabletop exercise

Source: National Cyber Security – Produced By Gregory Evans

On a sunny day last week during RSA 2020, a group of
journalists huddled in a vault in the San Francisco Mint, plotting to wreak
havoc and sow doubt on Election Day in the fictitious city of Adversaria.

Despite taking over traffic cameras, the governor’s Facebook account, the mayor’s Twitter account, plotting cyberattacks, developing deepfakes and crafting social media-base disinformation campaigns the Red Team: Kill Organized Systems (K-OS) hacktivist group’s efforts were successfully spurned by a team of competent do-gooders on the Blue Team: Adversaria Task Force, who were also gathered in a vault in the mint.

It was all part of a tabletop exercise organized by
Cybereason, a mini version of the three-hour event the company typically runs in
cities around the world to alert law enforcement, government officials and
first responders – who typically populate the Blue Team – to the many ways
hackers can disrupt elections and prepare them to respond at whatever attacks
might come their way.

“Recent times have seen election tampering by special interest groups and foreign powers in the United States, Europe and Asia. With looming 2020 elections across the world the goal of Operation Blackout California was to examine and advance the organizational responsiveness of government entities to a hacking group’s attempts to undermine democratic institutions and systems of governance in the republic,” said Cybereason CSO Sam Curry, who led the Operation Blackout exercise. “Most election hacking discussions and exercises focus on the mechanics and minutiae of hacking election equipment or contaminating and violating the integrity of voter rolls. Cybereason’s exercise instead focused on everything else in the electoral system.”

The teams took five-minute turns, in which they were allowed
two actions and a development. Actions for the Red Team included gaining access
to city cameras, taking over social media accounts and news broadcasts while
development is a capability the team wants developed out during the course of the
exercise, such as the creation of a bot network to disseminate and amplify
disinformation. On the Blue Team, actions included assigning police officers to
a task; perhaps, deploying them to polling stations. The team’s development
might be spinning out a capability such as gaining assistance from a federal agency.

While the Red Team in the RSA exercise successfully created a troll network as well as disrupted traffic signals, made a plausible threat of a terrorist attack. Effectively used social media and developed deep fake videos showing voting machine malfunctions, the Blue Team countered along the way, shutting down construction sites, deploying police officers to polling stations and reclaiming social media. In the end, the White Team adjudicating the exercise, determined that the Blue Team won the day, thwarting the Red Team’s malicious efforts.

“Overall, the red team of hackers hijacked a news station and took control of other social media channels in the city, but the blue team of law enforcement officials was able to restore order. A press release was issued by the mayor and police chief dispelling fake news and disinformation,” said Curry. “While the red team did create some chaos, however, it wasn’t lasting damage and the blue team successfully defended the elections.”

Original Source link

The post #cybersecurity | hacker | Election integrity preserved in fictitious city of Adversaria during Operation Blackout tabletop exercise appeared first on National Cyber Security.

View full post on National Cyber Security

#nationalcybersecuritymonth | Interpol uncovers cyber crime operation in Indonesia

Source: National Cyber Security – Produced By Gregory Evans

An Interpol-coordinated cyber operation against a strain of malware targeting e-commerce websites has identified hundreds of compromised websites and led to the arrest of three individuals who were allegedly running the malicious campaign from Indonesia.

The malware, known as a JavaScript-sniffer, the online equivalent of a traditional card skimmer, targets online shopping websites. When a website is infected, the malware steals the customers’ payment card details and personal data such as names, addresses and phone numbers, sending the information to command and control (C2) servers controlled by the cyber criminals.

Dubbed Operation Night Fury, the operation was conducted with the support of cyber security firm Group-IB, which provided data on the reach of the malware that has infected websites in various locations, including in Indonesia, Australia, UK, US, Germany and Brazil. Group-IB also supported the investigation with digital forensics expertise to help identify the suspects.

The Interpol’s ASEAN Cyber Capability Desk has since disseminated cyber activity reports to the affected countries, highlighting the threat to support their national investigations. These include C2 servers and infected websites located in six countries in the Association of Southeast Asian Nations (ASEAN) region.

At the request of the Indonesian National Police, the Interpol provided technical and operational support that resulted in the arrest of three individuals suspected of commanding the C2 servers in the country.

The investigation revealed the suspects were using the stolen payment card details to purchase electronic good and other luxury items, then reselling them for a profit. They have been charged with the theft of electronic data, which carries up to a 10-year jail sentence in accordance with Indonesia’s criminal code.

“Strong and effective partnerships between police and the cyber security industry are essential to ensure law enforcement worldwide has access to the information they need to address the scale and complexity of today’s cyber threat landscape,” said Craig Jones, Interpol’s director of cyber crime.

“This successful operation is just one example of how law enforcement is adapting and applying new technologies to aid investigations, and ultimately reduce the global impact of cyber crime,” he added.

In Singapore, local authorities identified and took down two of the C2 servers. Investigations in other ASEAN countries are ongoing, with the Interpol continuing to support police in locating C2 servers and infected websites, and identifying the cyber criminals involved.

The perpetrators behind the latest attack involving the use of JavaScript-sniffers were not new to the world of cyber crime. To access servers that collected stolen data and control their malware, they used virtual private network (VPN) connections to hide their real location and identity. To pay for hosting services and buy new domains, they only used stolen cards, according to Group-IB.

“Thanks to the Indonesian police and Interpol’s prompt actions, Operation Night Fury became the first successful multi-jurisdictional operation against the operators of JavaScript-sniffers in the Asia-Pacific region,” said Vesta Matveeva, head of Group-IB’s cyber investigations team in the region.

“It is a great example of coordinated cross-border anti-cyber crime effort, and we are proud that our threat intelligence and digital forensics expertise helped to establish the suspects. We hope this will set a precedent for law enforcement in other jurisdiction too,” she added.

In a separate incident that took place under a year ago, the payment card information belonging to thousands of customers of Singapore banks was believed to have been compromised by a JavaScript-sniffer and put up for sale on the dark web.

During their analysis of underground card shops, Group-IB’s threat hunting team discovered a spike in the sale of raw data of 4,166 compromised payment cards – including CVV, card number and expiration date – issued by Singapore banks.

Group-IB said the data was uploaded in April 2019, and that the spike took place on 1 April when a database containing data on 1,726 compromised cards was put up. The mean figure from January to August 2019 was 2,379 cards per month.

Source link

The post #nationalcybersecuritymonth | Interpol uncovers cyber crime operation in Indonesia appeared first on National Cyber Security.

View full post on National Cyber Security

#hacking | Hacking the hackers: Russian group hijacked Iranian spying operation, officials say

Source: National Cyber Security – Produced By Gregory Evans

LONDON (Reuters) – Russian hackers piggy-backed on an Iranian cyber-espionage operation to attack government and industry organizations in dozens of countries while masquerading as attackers from the Islamic Republic, British and U.S. officials said on Monday.

FILE PHOTO: A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. Kacper Pempel//File Photo

The Russian group, known as “Turla” and accused by Estonian and Czech authorities of operating on behalf of Russia’s FSB security service, has used Iranian tools and computer infrastructure to successfully hack in to organizations in at least 20 different countries over the last 18 months, British security officials said.

The hacking campaign, the extent of which has not been previously revealed, was most active in the Middle East but also targeted organizations in Britain, they said.

Paul Chichester, a senior official at Britain’s GCHQ intelligence agency, said the operation shows state-backed hackers are working in a “very crowded space” and developing new attacks and methods to better cover their tracks.

In a statement accompanying a joint advisory with the U.S. National Security Agency (NSA), GCHQ’s National Cyber Security Centre said it wanted to raise industry awareness about the activity and make attacks more difficult for its adversaries.

“We want to send a clear message that even when cyber actors seek to mask their identity, our capabilities will ultimately identify them,” said Chichester, who serves as the NCSC’s director of operations.

Officials in Russia and Iran did not immediately respond to requests for comment sent on Sunday. Moscow and Tehran have both repeatedly denied Western allegations over hacking.

GLOBAL HACKING CAMPAIGNS

Western officials rank Russia and Iran as two of the most dangerous threats in cyberspace, alongside China and North Korea, with both governments accused of conducting hacking operations against countries around the world.

Intelligence officials said there was no evidence of collusion between Turla and its Iranian victim, a hacking group known as “APT34” which cybersecurity researchers at firms including FireEye FEYE.O say works for the Iranian government.

Rather, the Russian hackers infiltrated the Iranian group’s infrastructure in order to “masquerade as an adversary which victims would expect to target them,” said GCHQ’s Chichester.

Turla’s actions show the dangers of wrongly attributing cyberattacks, British officials said, but added that they were not aware of any public incidents that had been incorrectly blamed on Iran as a result of the Russian operation.

The United States and its Western allies have also used foreign cyberattacks to facilitate their own spying operations, a practice referred to as “fourth party collection,” according to documents released by former U.S. intelligence contractor Edward Snowden and reporting by German magazine Der Spiegel.

GCHQ declined to comment on Western operations.

By gaining access to the Iranian infrastructure, Turla was able to use APT34’s “command and control” systems to deploy its own malicious code, GCHQ and the NSA said in a public advisory.

The Russian group was also able to access the networks of existing APT34 victims and even access the code needed to build its own “Iranian” hacking tools.

Additional reporting by Vladimir Soldatkin in Moscow and Babak Dehghanpisheh in Geneva; Editing by Frances Kerry

Our Standards:The Thomson Reuters Trust Principles.

Source link

The post #hacking | Hacking the hackers: Russian group hijacked Iranian spying operation, officials say appeared first on National Cyber Security.

View full post on National Cyber Security

Illinois State Police, Illinois Tollway host Operation Kid to keep children safe

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ Memorial Day weekend will be here in less than two weeks. Illinois State Police launched a safety program called “Operation Kid” to help keep children safe as the summer driving season …

The post Illinois State Police, Illinois Tollway host Operation Kid to keep children safe appeared first on Become007.com.

View full post on Become007.com

FBI Arrests Ohio Pastor In Alleged Child Sex Trafficking Operation

An Ohio pastor along with another man have been arrested and charged for sex crimes against children, with one of the known victims as young as 14-years-old.

CBS News reports the FBI arrested Rev. Cordell Jenkins, 46, and Anthony Haynes, 37, Thursday (April 7) after they received information connecting the men to sexual activity with minors. Their investigation lead to an operation that allegedly involved Haynes and another woman recruiting, enticing, harboring those under a 18 in sex acts. The acts go back three years, with Haynes, along with a women introducing the teen to other adults to pay for sex—one of them including Jenkins.

Read More

The post FBI Arrests Ohio Pastor In Alleged Child Sex Trafficking Operation appeared first on Parent Security Online.

View full post on Parent Security Online

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers.   “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.”   The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director )   “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said.   As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them.   The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan.  IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year. appeared first on National Cyber Security.

View full post on National Cyber Security

Operation Trick-or-Treat 2015, Keeping Kids Safe from Sex Offenders

In an ongoing effort to make Halloween safer for the children in our communities, the U.S. Marshals and the Las Vegas Metropolitan Police Department are conducting “Operation Trick-or Treat”, a four day joint law enforcement operation in Clark County, Nevada to ensure compliance with sex offender registration requirements by sex offenders. This is the ninth straight year the U.S. Marshals has spearheaded this very important operation. All the teams are still in the field but based on the information we have so far, we expect to conduct over 400 compliance checks in Clark County.

This is not a one-time operation.

Read More

The post Operation Trick-or-Treat 2015, Keeping Kids Safe from Sex Offenders appeared first on Parent Security Online.

View full post on Parent Security Online

2 west Michigan fugitives added to ICE’s Operation Predator smartphone app to locate accused child sex predators

A west Michigan pair who absconded during a federal child pornography investigation are the latest fugitives to be profiled on the U.S. Immigration and Customs Enforcement (ICE) smartphone app, seeking public tips about at-large and unknown child predator suspects. The suspects are the targets of an investigation by ICE’s Homeland Security Investigations (HSI).

Normann Pittelkow, 42, and Nicole Jacob, 35, were charged by criminal complaint Oct. 23 for producing and conspiring to produce child pornography. Following a Sept. 27 search of the pair’s Albion, Michigan, residence in connection with the probe, officers seized several computers and mobile devices.

According to state court records, the couple is accused of producing images and video of material involving the sexual abuse of minors.

Read More

The post 2 west Michigan fugitives added to ICE’s Operation Predator smartphone app to locate accused child sex predators appeared first on Parent Security Online.

View full post on Parent Security Online