ITU identifies sources of recent cyber attacks

15 Oct

Largest number of attacks coming from US and China.  The International Telecommunication Union (ITU) has identified the people behind the recent high-tech malwares targeting many countries across the world and has spoken to them, Dr Hamadoun L. Toure, secretary general, International Telecommunication Union, told Gulf News in an exclusive interview.

“Most of the attacks have been around the world, not only in the Middle East. Most of the origin and destination of attacks are primarily targeted at two countries — US and China,” he said.  –  Gulf News

——————

Makaseh – a security environment for the web.  Please watch short video on YouTube

2 Responses to “ITU identifies sources of recent cyber attacks”

  1. MIke October 15, 2012 at 7:46 pm #

    Thank you for bringing this one up and provoking some thought, Samuel.

    This story is no great surprise in that we know there is state supported “spyber” and “milber” activity going on.

    There, be it known that MD Butler coined these terms for “spy cyber” and “military cyber”! We will be using the terms more frequently as time goes on so let us start the inevitable abbreviation now to describe inherently nationalistic uses of cyber/hacker (good and bad) personnel and resources.

    Back to the point, this reminds me of something I always try to talk about when I can, freeware tools.

    I am not talking about Google Earth nor Microsoft commercial level complexity here. More like, those IP scanners, DNS list lookup utilities, ARP discovery tools, SNMP front-ends, and so forth.

    Many IT folks use freeware available in the open community to for device discovery/inventory, monitoring, troubleshooting, and manage networks and platforms.

    I recommend using only wares from open source or very well trusted sources. We may find some of them infected as well but in “the wild” we can expect malware imbedded in executable code with either false accompanying or nonexistent source code. It would be best, although perhaps not practical, to analyze the source code and compile it yourself rather than picking up a “set” including source code and exe’s.

    The foreign state supported work has been developing and continuing for many years. Like a spy program they are patient enough to wait for human generations to pass to “germinate their imbedded seeds”.

    Let me close with a recommendation that you THOROUGHLY seek out and even contact if practical the authors of tools that we use every day. Just because an entity has a native sounding domain name does not mean it is of your country.

    * Trace IPs associated with the domains and emails
    * Do whois and search for info on domains
    * Verify and contact software authors
    * Use the “old school” tools that are simpler to verify
    * If you are not using utilities and software “tools”, even if you keep copies, remove them from systems
    * SHARE anything you find in the above processes!

    We have to work together to protect ourselves because protecting anybody on the networks protects us.

    md

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: