Archive

Category Archives for "Networking"

Rival gang leaks decryption keys for Chimera ransomware

Aside from the efforts of security researchers and antivirus companies, malware victims can sometimes also benefit from the fighting between rival cybercriminal groups.That happened this week when the creators of the Petya and Mischa ransomware programs leaked about 3,500 RSA private keys allegedly corresponding to systems infected with Chimera, another ransomware application.In a post Tuesday on Pastebin, Mischa's developers claimed that earlier this year they got access to big parts of the development system used by Chimera's creators.As a result of that hack, they obtained the source code for Chimera and integrated some of it into their own ransomware project, according to the Pastebin message.To read this article in full or to leave a comment, please click here

Rival gang leaks decryption keys for Chimera ransomware

Aside from the efforts of security researchers and antivirus companies, malware victims can sometimes also benefit from the fighting between rival cybercriminal groups.That happened this week when the creators of the Petya and Mischa ransomware programs leaked about 3,500 RSA private keys allegedly corresponding to systems infected with Chimera, another ransomware application.In a post Tuesday on Pastebin, Mischa's developers claimed that earlier this year they got access to big parts of the development system used by Chimera's creators.As a result of that hack, they obtained the source code for Chimera and integrated some of it into their own ransomware project, according to the Pastebin message.To read this article in full or to leave a comment, please click here

Pakistan cybercrime bill: Misuse the internet, go to prison for three years

“Misusing the internet”. . . precisely what might that mean? Unfortunately, people in Pakistan may be about to find out as the vague “misusing the internet” would be punishable by up to three years in prison and a fine of one million Pakistani rupees (currently equal to about $9,550); that's according to an overview of the cybercrime bill written by the newspaper Dawn.That was just one example of what is in the controversial Prevention of Electronic Crimes Bill (PECB) [pdf] which was approved by the Senate Standing Committee on Information Technology and Telecommunications. The country’s National Assembly previously approved the bill and it will move on to the Pakistan senate for approval before it is signed into law by President Mamnoon Hussian.To read this article in full or to leave a comment, please click here

Pakistan cybercrime bill: Misuse the internet, go to prison for three years

“Misusing the internet”. . . precisely what might that mean? Unfortunately, people in Pakistan may be about to find out as the vague “misusing the internet” would be punishable by up to three years in prison and a fine of one million Pakistani rupees (currently equal to about $9,550); that's according to an overview of the cybercrime bill written by the newspaper Dawn.That was just one example of what is in the controversial Prevention of Electronic Crimes Bill (PECB) [pdf] which was approved by the Senate Standing Committee on Information Technology and Telecommunications. The country’s National Assembly previously approved the bill and it will move on to the Pakistan senate for approval before it is signed into law by President Mamnoon Hussian.To read this article in full or to leave a comment, please click here

Pakistan cybercrime bill: Misuse the internet, go to prison for 3 years

“Misusing the internet”—precisely what might that mean? Unfortunately, people in Pakistan may be about to find out, as the vague “misusing the internet” would be punishable by up to three years in prison and a fine of one million Pakistani rupees (currently equal to about $9,550). That's according to an overview of the cybercrime bill written by the newspaper Dawn.That was just one example of what is in the controversial Prevention of Electronic Crimes Bill (PECB) [pdf] that was approved by the Senate Standing Committee on Information Technology and Telecommunications. The country’s National Assembly previously approved the bill, and it will move on to the Pakistan senate for approval before it is signed into law by President Mamnoon Hussian.To read this article in full or to leave a comment, please click here

Russian DNC hack – A cybersecurity microcosm

According to ESG research, 31 percent of cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe the threat landscape is much worse today than it was two years ago. While another 36 percent say the threat landscape is somewhat worse today than it was two years ago.Why the cynicism? Look no further than the Russian hack of the DNC as this particular data breach is a microcosm of cybersecurity at large. This one incident illustrates a few important points: All data is at risk. Way back when, state-sponsored cyber attacks were government-on-government affairs, typically focused on military and intelligence.  The cyber theft of design documents for the F-22 and F-35 are perfect examples here. Unfortunately, state-sponsored attacks have gone beyond spooks and soldiers. China went after The New York Times, North Korea breached Sony Pictures, and Russia blew the lid off the DNC. When matched against sophisticated state-sponsored actors, pedestrian cybersecurity defenders are simply fighting out of their weight class. The list of adversaries continues to grow. Beyond China, North Korea and Russia, it’s fair to add Iran, the Syrian Electronic Army, and dozens of other countries investing in offensive cyber operations. There are Continue reading

Russian DNC Hack – A Cybersecurity Microcosm

According to ESG research, 31% of cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe the threat landscape is much worse today than it was 2 years ago while another 36% say the threat landscape is somewhat worse today than it was 2 years ago (note: I am an ESG employee).Why the cynicism?  Look no further than the Russian hack of the DNC as this particular data breach is a microcosm of cybersecurity at large.  This one incident illustrates a few important points:1.      All data is at risk.  Way back when, state-sponsored cyber-attacks were government-on-government affairs, typically focused on military and intelligence.  The cyber-theft of design documents for the F-22 and F-35 are perfect examples here.  Unfortunately, state-sponsored attacks have gone beyond spooks and soldiers.  China went after the NY Times, North Korea breached Sony Pictures, and Russia blew the lid off the DNC.  When matched against sophisticated state-sponsored actors, pedestrian cybersecurity defenders are simply fighting out of their weight class.To read this article in full or to leave a comment, please click here

Fun in the Lab: DMVPN: Per-Tunnel QoS and High Availability

Went on an customer “ride-along” with Advanced Services this week.  Customer’s requirement was that the DMVPN headend have 2 physical interfaces for High Availability.  These 2 interfaces need to be the same subnet because they are going into 2 firewalls: one active/one standby.  So now what?

2fws

Tom Kunath (Advanced Services) thought “Well…. what about using backup interface command?”  Hmmmm that does seem to be the perfect tool in the Cisco CLI toolbox for this very situation.

Time to play in the lab!!!  ?

backup

interfaces

So now let’s try it and see how per-tunnel QoS will work with it.

Class-Maps and Policy-Maps

policy

policy1

NOTE: Snuck these configs from the QoS Chapter of the upcoming CiscoPress IWAN book a super dear friend of mine (David Prall) is co-authoring.

Apply to Tunnels

hote17_tunnel100_qos

hotel16_tunnel100

pt_qos

Okay…. so far so good.  Now let’s run some traffic.  I’ll send EF and AF41.

Send Traffic

hotel17_basic

Kay… so far so good.  I also have both being sent at the same bps from the traffic generator so I wanted to check this also.

Time to Fail Primary Link! 

fail_primary

Before I congest and see if the applied PerTunnel QoS can also drop.  Let’s make sure Continue reading

U.S. cyber incident directive follows DNC hack

One wonders if it took social media to finally motivate the White House to act on cyber incidents.The Democratic National Committee (DNC) was hacked, and the emails, many quite damning of the governance of the DNC, were released by WikiLeaks. Reports link the hack to the Russian government. Debbie Wasserman Schultz, head of the DNC, resigned—one in any number of political and government officials to fall on their swords after security breach exposés.Then on Tuesday morning, President Barack Obama announced a U.S. Cyber Incident Coordination Directive. If the directive is actually followed, expect several agencies to drown in complaints, even though private citizen complaints aren’t included. Commercial and governmental complaints appear to be the only complaints covered by the directive.  To read this article in full or to leave a comment, please click here

Cisco: Potent ransomware is targeting the enterprise at a scary rate

Enterprise-targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits – nearly $34 million annually according to Cisco’s Mid-Year Cybersecurity Report out this week.Ransomware, Cisco wrote, has become a particularly effective moneymaker, and enterprise users appear to be the preferred target.+More on Network World: Security was the HOT topic at Cisco Live+“Defenders are not protecting systems in a way that matches how attackers do their work. Although defenders have evolved their strategies and tools for fighting online criminals, attackers are still permitted far too much unconstrained time to operate,” Cisco wrote.To read this article in full or to leave a comment, please click here

Unregenerate – 20160727

Looking backward at last week or forward into next week. Ir Whatever. unregenerate – adj. not reformed, unreconstructed, obstinate, stubborn   A Better Sound System I’ve been “pining” for a better audio solution for my office and around the house for quite some time. I’ve been eyeing off Sonos product for quite some time but […]

The post Unregenerate – 20160727 appeared first on EtherealMind.

Why Belgium leads the world in IPv6 adoption

Yes, Belgium. Every time you read a story or visit a website devoted to worldwide IPv6 adoption rates, sitting atop the list of highest achievers is Belgium, otherwise better known for chocolate, waffles, beer and diamonds. Google, for example, has worldwide IPv6 adoption at about 12%, Belgium leading at 45%.For an explanation I turned to Eric Vyncke, co-chair of Belgium’s IPv6 Council. I emailed him a half-dozen questions about technology and culture and such that essentially could have been boiled down to one: Why Belgium? Here is his reply:To read this article in full or to leave a comment, please click here

Why Belgium leads the world in IPv6 adoption

Yes, Belgium. Every time you read a story or visit a website devoted to worldwide IPv6 adoption rates, sitting atop the list of highest achievers is Belgium, otherwise better known for chocolate, waffles, beer and diamonds. Google, for example, has worldwide IPv6 adoption at about 12%, Belgium leading at 45%.For an explanation I turned to Eric Vyncke, co-chair of Belgium’s IPv6 Council. I emailed him a half-dozen questions about technology and culture and such that essentially could have been boiled down to one: Why Belgium? Here is his reply:To read this article in full or to leave a comment, please click here

Developers’ conscientiousness key to limiting software bugs, researchers say

University researchers have found that organizations looking to clean up their IT systems need to pay more attention to the moods and personalities of those people working on them."Organizations focus too much on the technical and mechanical aspects of IT errors, rather than the human and environmental aspects of the errors," said Sumantra Sarkar, assistant professor of information systems at Binghamton University’s School of Management, in a statement. "Our study suggests the mood and personality traits of the software development team affect how they report on self-committed errors in IT projects. A minor glitch in design or programming can have devastating consequences."To read this article in full or to leave a comment, please click here

Who Let the Pandas Out? Zeus, Zeus, Zeus, Zeus

A few months ago Proofpoint released a blog post about a new banking trojan called Panda Banker. They credit Fox-IT with the discovery and both companies indicate that it is another variant based on the Zeus banking trojan source code. Under the hood Panda Banker certainly feels Zeus-like, but it has plenty to distinguish itself […]