Daily Cyber Digest

Share this post
Pentagon, FBI, DHS to jointly expose a North Korean hacking effort | Munich security conference and 5G chatter | Google redraws the borders on maps depending on who’s looking
aspiicpc.substack.com

Pentagon, FBI, DHS to jointly expose a North Korean hacking effort | Munich security conference and 5G chatter | Google redraws the borders on maps depending on who’s looking

ASPI Cyber Policy
Feb 16, 2020
Comment
Share

Senetas.com

Follow us on Twitter. The Daily Cyber Digest focuses on the topics we work on, including cyber, critical technologies & strategic issues like foreign interference.

  • The Pentagon, FBI, and Department of Homeland Security have publicly identified a North Korean hacking campaign as part of a broad information sharing program intended to warn industry against adversarial hacking, CyberScoop has learned. The public disclosure includes details about at least seven different malware samples linked with North Korean hacking efforts. CyberScoop

  • The U.S. delegation in Munich toned down intelligence-sharing threats and built its message on Huawei around privacy, trade secrets and human rights. POLITICO

  • Google’s corporate mission is “to organize the world’s information,” but it also bends it to its will. From Argentina to the United Kingdom to Iran, the world’s borders look different depending on where you’re viewing them from. That’s because Google — and other online mapmakers — simply change them. The Washington Post

The World

Google redraws the borders on maps depending on who’s looking
The Washington Post
@gregbensinger
Google’s corporate mission is “to organize the world’s information,” but it also bends it to its will. From Argentina to the United Kingdom to Iran, the world’s borders look different depending on where you’re viewing them from. That’s because Google — and other online mapmakers — simply change them.

Australia

Leaked Huawei discussions prompt British diplomatic rebuke of Australian politicians
ABC News
@AndrewBGreene
Diplomatic tensions over Britain's decision to allow Chinese telco Huawei into its 5G network have boiled over after confidential discussions with Australia about the policy were leaked. The ABC can reveal the UK's High Commissioner has taken the rare step of writing to the heads of two federal parliamentary committees to formally protest that details of sensitive talks involving Britain's visiting Foreign Secretary became public.

China

How China spies on Uyghurs in Turkey 
Coda Story
@JM_Beck
It was May 2018 when the man first asked Nur to spy for him. The message came, as usual, via WhatsApp and was assiduously polite. Nur seemed like a good citizen, it said, but as a Uyghur living in Turkey, he must do more to prove his loyalty to China. “We see you as an educated and important person,” the next message read. “So we have chosen you for a special job.”

USA

Pentagon, FBI, DHS to jointly expose a North Korean hacking effort
CyberScoop
@shanvav
The Pentagon, FBI, and Department of Homeland Security have publicly identified a North Korean hacking campaign as part of a broad information sharing program intended to warn industry against adversarial hacking, CyberScoop has learned. The public disclosure includes details about at least seven different malware samples linked with North Korean hacking efforts.

Twitter avatar for @USCERT_govUS-CERT @USCERT_gov
See @CISAgov’s Malware Analysis Reports at
go.usa.gov/xdRxb for new information on malware used by the North Korean government. #Cyber #Cybersecurity #InfoSec #HIDDENCOBRA

February 14th 2020

121 Retweets140 Likes

U.S., Huawei Clash at Global Security Conference
WSJ
Tensions between Huawei Technologies Co. and U.S. officials flared at a global security gathering Friday, a day after American prosecutors charged the company with racketeering and conspiracy to steal trade secrets.

US's Pelosi urges countries to steer clear of Huawei for 5G
AP
@gmoulson
House Speaker Nancy Pelosi appealed Friday to an audience in Germany for countries to steer clear of Chinese tech giant Huawei as they build their next-generation cellular networks, adding her voice to pressure from the Trump administration.

Mike Bloomberg's Sponcon Memelords Won't Be Subject To Facebook's Political Ad Regulations 
Buzzfeed
@broderick
The announcement comes two days after dozens of meme accounts promoted Democratic presidential candidate Michael Bloomberg’s campaign.

Opinion | Mike Bloomberg Is Hacking Your Attention
The New York Times 
@cwarzel
Shamelessness and conflict equal attention. Attention equals power.

How the suspected Equifax hackers covered their tracks
CyberScoop
@jeffstone500
Even for U.S. law enforcement, the Equifax hack was different. Unlike in previous examples of apparent Chinese government-backed cyber-operations, the hackers behind the Equifax breach stymied police for months. After the Office of Personnel Management hack in 2015, and the Marriott breach which was disclosed in 2018, investigators were confident enough that China was involved to tell the Wall Street Journal and New York Times about their suspicions soon afterward.

Target's Delivery App Workers Describe a Culture of Retaliation and Fear
Vice
@LaurenKGurley
The Target-owned grocery delivery company Shipt is rolling out a new algorithmic pay model that is already draining paychecks. And workers are terrified to speak out.

IBM pulls out of RSA over coronavirus fears
Protocol
Just days after MWC organizers canceled its Barcelona trade show, another major tech conference is in flux over coronavirus fears. IBM on Friday said that it is pulling out of RSA, one of the cybersecurity industry's largest events that's set to take place in San Francisco from Feb. 24 to 28.

Senior Huawei Official Acknowledges Ability to Clandestinely Access Mobile Networks
Lawfare
While everyone was distracted with Justice Department controversies and the New Hampshire primary, a senior Huawei official has conceded that the company can clandestinely access users’ mobile networks.

No, This Is Not A Pete Buttigieg Campaign Sockpuppet Account
BuzzFeed News
The man who runs the account confirmed to BuzzFeed News that he is its genuine owner and a supporter of the South Bend mayor’s candidacy.

North Asia

Taiwan News Publishes COVID-19 Misinformation as Epidemic Spreads | New Bloom Magazine
New Bloom Magazine
@brianhioe
In the midst of a worsening epidemic, credulously publishing unsubstantiated rumors and misinformation poisons the well of public discourse, and performs a disservice to society.

Pacific Islands

Fibre Optic Cable session for businesses
Solomon Star News
The Solomon Islands Chamber of Commerce and Industry (SICCI) on Wednesday hosted an Information Session on the Fibre Optic Cable for its members of the business community.

South Asia

Emerging Cyber warfare threats to Pakistan
Modern Diplomacy
Pakistan’s cyber space too is insecure for many reasons because Pakistan is dependent on others for technology. According to leading global cyber security firms such as Symantec, Pakistan is among the ten most targeted countries in the world. Main targets include Pakistan’s nuclear and other critical installations

UK

Senior US delegation to fly to London to urge government to change its position on Huawei
The Telegraph
In what will be seen as a sign of strain in UK-US relations, the delegation is expected to deliver a “b-----king” to British officials.

Huawei paid for Cambridge study ‘to launder reputation’
thetimes.co.uk
Huawei has been accused of “reputation laundering” after it emerged that it funded a Cambridge University college study on global governance reforms in communications and technology.

Europe

Munich 5G chatter — AI in cyber agency cross hairs — Schrems vs. Facebook in Vienna
POLITICO
The U.S. delegation in Munich toned down intelligence-sharing threats and built its message on Huawei around privacy, trade secrets and human rights.

Twitter avatar for @noahbarkinNoah Barkin @noahbarkin
The US will be rolling out Pompeo, Esper & Graham at ⁦@MunSecConf⁩ to lecture the Europeans on 5G (again). Please tell them 1) lecturing is counterproductive at this point 2) Europe sees intel sharing threat as bluff 3) this trio has a cred problem
Opinion | The U.S. and Europe are headed for a showdown on China in MunichTensions over telecom infrastructure will be on display at an upcoming international conference.washingtonpost.com

February 13th 2020

15 Retweets40 Likes

4Chan trolls target Scandinavian Airlines with racist harassment campaign
Mother Jones
@alibreland
Much of the online harassment directed at a major European airline in recent days appears to have come from users of a controversial 4chan message board, according to a review by Mother Jones.

Twitter avatar for @maartenvhbMaarten Van Horenbeeck @maartenvhb
A bit unfortunate the excellent investigative report by Fox-IT on the @MaastrichtU ransomware attack is only available in Dutch. Wonderful example of beneficial transparency. Here are their key preventive recommendations (1/7)

February 14th 2020

3 Retweets8 Likes

To Bolster Cybersecurity, the US Should Look to Estonia
The tiny European nation has come a long way after crippling cyberattacks in 2007. Now it offers key lessons in attracting tech talent and educating citizens.

Misc

Alex Stamos on the Hard Tradeoffs of the Internet — The Lawfare Podcast
overcast.fm
In this episode of Lawfare’s Arbiters of Truth series on disinformation, Evelyn Douek and Kate Klonick spoke with Alex Stamos, the director of the Stanford Internet Observatory. Prior to joining Stanford, Alex served as the chief security officer at Facebook, and before that, as the chief information security officer at Yahoo. They talked about Alex’s experience at Facebook handling 2016 election interference, as well as his work on cybersecurity, disinformation, and end-to-end encryption.

Research

Supply Chain Security in the Cyber Age: Sector Trends, Current Threats and Multi-Stakeholder Responses
UNIDIR
This report aims to assess how normative responses to ICT-related challenges to supply chain security could be further advanced and operationalized. As norms reflect shared expectations, or standards, of appropriate behaviour, identifying opportunities for improving their operationalization requires looking beyond norms themselves and contextualizing them in the wider ecosystem of responses to supply chain security challenges to identify gaps and areas for improvement.

CommentComment
ShareShare

Create your profile

0 subscriptions will be displayed on your profile (edit)

Skip for now

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.

TopNewCommunity

No posts

Ready for more?

© 2022 ASPI Cyber Policy
Privacy ∙ Terms ∙ Collection notice
Publish on Substack Get the app
Substack is the home for great writing