Uncategorized Archive

A former aide of the ruling Grand National Party lawmaker, Choi Gu-sik, has confessed to the charges, of hacking into the National Election Commission website, on the day of the October by-election.
According to the National Police Agency, the suspect, identified by his surname “Gong,” took sole responsibility, for carrying out a distributed denial of service, or DDoS, attack on the website, adding that, he was NOT ordered to do so by any high-ranking officials.
He confessed that, he wanted to help the GNP win the Seoul mayoral race, and thought the best way to do so, was to hack into the site to keep young voters from voting for the opposition candidate, Park Won-soon.
The cyber attack on election day, made information on voting locations inaccessible.

Analysis: The FBI just took down a criminal botnet that hijacked more 4 million PCs worldwide. Is your PC among those haunted by Ghost Click?

Yeah, I know: you just can’t get enough news about Herman Cain, Joe Paterno, and that aircraft carrier-sized asteroidthat just went whizzing by our planet. But you may have missed a story that is in many ways more important: Operation Ghost Click.

Earlier this week the FBI and international law authorities took down the biggest criminal botnet yet – some 4 million zombie PCs, all controlled by a band of Estonian cyber thieves doing business as an allegedly legitimate company called Rove Digital (no relation to Karl).

Rove performed all kinds of digital malfeasance — including the sale of fake antivirus software, distribution of malware, replacing legitimate ads on Web sites with their own, and generating fake clicks to pull in ad revenue – while pretending to be a real IT firm.

They did it by distributing malware that took over the Domain Name System (DNS) settings on PCs and network routers. DNS servers translate URLs (like www.itworld.com) into IP addresses (like66.77.79.139) that can be read by Internet routers. Change the DNS table to match a legit URL with an illegitimate IP address, and you can do all kinds of nasty things to the computers that visit that Web site.

To maximize their reach, Rove hijacked popular sites like iTunes, Netflix, and IRS.gov. The FBI estimates they made at least $14 million through these deeds. But that’s only the money they could find. The actual proceeds are likely an order of magnitude higher.

The Feds estimate that 500,000 of the zombie PCs were located in the US, affecting everyone from individuals to government agencies like NASA.

(I’m pretty sure that at one time I had a computer that was infected with this particular type of malware, known as DNS-Changer. I used to get some insanely strange redirects – like typing Facebook.com into my browser and getting sent to Yahoo instead. Fortunately, that machine has since passed onto the great digital boneyard in the sky.)

How do you know if your machine is one of them? TrendMicro, which aided the FBI in its investigation and had been tracking the activities of Rove and its assorted subsidiaries for more than five years, offers some tips in its CounterMeasures blog.

First, you’ll need to determine the IP address of your DNS server. And yes, it affects Macs as well as Windows machines, so Apple fanboys should pay heed as well. Per TrendMicro’s Rik Ferguson:

On a PC, open the Start menu by clicking the Start button or the Windows icon in the lower left of your screen, in the Search box type “cmd” and hit return (for Windows 95 users, select “Start“, then “Run“).This should open a black window with white text. In this window type “ipconfig /all” and hit return. Look for the entry that reads “DNS Servers” and note down the numeric addresses that are listed there.

On a Mac …click on the Apple icon in the top left of your screen and select “System Preferences“, from the Preferences panel select the “Network” icon. Once this window opens, select the currently active network connection on the left column and over on the right select the DNS tab. note down the addresses of the DNS servers that your computer is configured to use.

You’ll then need to plug that IP address into the FBI’s online database of compromised DNS settingsto find out if yours is among them. If it was (unlucky you) the Feds would like you to fill out a victim’s report. You’ll then need to do a virus scan to find and destroy the malware, then contact your ISP to restore the correct DNS settings.

You can do a quick (and free) online virus scan at Trend Micro’s HouseCall service or PC Pitstop.

For my money, keeping cyber criminals out of my PC (and my life) is more important than who’s running for president or coaching Penn State. As for Asteroid Armageddon? Well, maybe not.

Aggressive action by large IT infrastructure and platform providers helped drive down the volume of phishing attacks over the past summer, but new threats continue to emerge and grow, according to recent threat trend reports.

“It does feel like squeezing a balloon,” said Lars Harvey, CEO of Internet Identity. “The problem is really big and we don’t have that many resources fighting against it.”

But the trend by large stakeholders such as Microsoft and Google of going after bad actors is encouraging, Harvey said. “We’re trying to get control of our infrastructure.”

The presidential and defense websites slipped offline, Internet communications were down, and major media were inaccessible. While the Georgian government tried to cope with the country falling into darkness, Russia launched a physical assault with soldiers and tanks.

One of the main weapons of choice in the 2008 cyberwar was a botnet—a network of infected computers sometimes referred to as “zombie armies,” which work as slaves to a master computer. The main attack from a botnet can take websites offline by overloading them, known as a distributed denial of service (DDoS) attack.

There was something unique about this particular botnet though. “When Russia rolled into Georgia they hired a botnet to shut down the country,” Matthew Jonkman, president of the Open Information Security Foundation, said in a phone interview.

“That was years ago and they’ve gotten even better,” Jonkman said.

The hacker underground has grown since the 2008 attacks. Hackers can now be hired through underground forums using anonymous payment methods like BitCoins, botnets can be rented for as little as $5 an hour, and nearly any target can be taken offline or compromised for the right price.

“Cyber attacks designed to knock Web sites off line happen every day, yet shopping for a virtual hit man to launch one of these assaults has traditionally been a dicey affair,” states Brian Krebs on his popular cybersecurity blog, Krebs on Security.

“That’s starting to change: Hackers are openly competing to offer services that can take out a rival online business or to settle a score,” Krebs states.

Hackers for Hire

The Russia-Georgia cyberwar, as well as the Estonia-Russia cyber conflict of 2007, are often referenced as examples of what cyberwar is capable of. Although the attacks on Estonia—one of the world’s most wired countries—did not involve physical attack, virtually the whole country came to a standstill as banks, communications, and government fell victim to cyberattacks.

Even in 2007, however, much of the world was still ignorant of the devastating potential of cyberwar. The risks only came to the forefront after hacker group Anonymous Operations began its “Operation Payback” attacks on companies including Mastercard and PayPal in 2010, retaliating against government actions on information-leaking website WikiLeaks.

Their attacks, and the highly publicized attacks from hacker group LulzSec that came later, highlighted the rise of a new kind of threat. With that, the eyes of the world opened to the flimsy foundation that much of the Internet is built on—one riddled with holes that can be stopped on little more than a whim.

Among the terrible truths of the attacks by Anonymous and LulzSec is that neither group is necessarily skilled when compared to the hacker elite. The majority of them use software or pre-written scripts to launch their attacks—hackers refer to them as “script kiddies,” unworthy of being called hackers. Thus, the companies that have fallen victim to their attacks, often fell to some of the most basic attacks there are—highlighting again the despondent state of digital security.

While these groups have garnered the most attention, the real concern is about the groups that are lesser known—terrorist organizations, state-affiliated hacker groups like the Chinese Honker Union and the Russian Business Network, and the underground elite (“leet”) of the hacker world.

In September, Secretary of the Department of Homeland Security (DHS) Janet Napolitano stated “The U.S. has become ‘categorically safer’ since 9/11, but cyber-terrorism now tops the list of security concerns.”

Cyber jihadists are already springing up around the Web, while many, like the Tariq bin Ziyad digital terrorist organization, even offer to train new members who know little or nothing about hacking.

The added threat, however, is that these groups could pull from the same resources as Russia did during their attack on Georgia—weaponizing a botnet, or going to the hired guns on the digital front. “Just as organized crime groups have hired hackers, it is possible that nation states could hire or distantly support jihad networks and launch cyber-attacks through them,” states an April 17 report from Project Cyber Dawn, part of The Cyber Security Forum Initiative.

Meanwhile, concern over groups like Anonymous and lesser-skilled yet active groups like the Iranian Cyber Army are less about where they are now, and much more about what they could become.

The DHS posted a bulletin on Oct. 17 warning that Anonymous may be planning attacks on critical infrastructure, including energy companies and industrial control systems. It adds that while the group seems to lack the ability to hit such targets currently, they may develop the skill.

But the poor state of today’s cybersecurity leaves major gaps. “What we have is in a very fragile state, so anybody who does get organized and goes after it could cause serious damage,” Jonkman said.

He added that a lot of groups, like the Iranian Cyber Army, launch many of their attacks for bragging rights—maybe defacing someone’s website with their logo and a statement. The concern though is that the lesser skilled groups could also pull from the more elite guns-for-hire.

“The ones we should worry about are the ones we don’t know about, and the state-sponsored stuff. Now, these groups can make a lot of noise or be hired by an organization or country to do something,” Jonkman said.

“It could pose a very significant threat, more than the overall threat in general,” he said.

With an increased focus on better patient outcomes and reduced costs, the healthcare industry is slowly but surely moving towards digitisation and healthcare organisations today are increasingly using IT for diagnosis and care. The availability and use, of sophisticated diagnosis techniques like teleradiology (where the attending physician remotely interprets the patient condition using biomedical devices), means that paperlessness is becoming the order of the day. The growth of concepts like Telemedicine and Telehealth (including m-health which uses mobile technology for diagnosis and care) indicates that the boundary of the hospital is expanding and the number of points of care treatments are increasing rapidly.

Ironically though, while enabling medical practitioners reach out to their patients in much better ways, technology has made the delivery of healthcare more complex. As patients and doctors become increasingly mobile, healthcare stakeholders need to follow the right process, provide information where and when needed, collate data from and to a variety of devices. All of this increases the likelihood of security breaches and loss of patient health data. Therefore, healthcare organisations today are under intense pressure and scrutiny, for security, privacy and compliance.

According to a Healthcare Information Management Systems Society (HIMSS) 2009 survey, the top three security concerns for Healthcare CIOs are around the areas of internal breach, regulatory compliance, and inadequate deployment of technology. Solutions that help meet regulatory requirements, mitigate security threats and streamline risks are increasingly being sought after.

Being compliant helps healthcare organisations to reduce patient risk and increases patient confidence. It prevents the resulting damage to the reputation of the organisation and costly fines/ penalties for the organisation and its executives. Compliance prevents loss in revenue and reduces the likelihood of professional damage to healthcare workers. It also enables doctors to easily work with any hospital across any geography using standards based tools for diagnosis and care.

In emergency situations, the use of standards based tools ensures for example, that an ambulance moving on the road easily interfaces with any nearby hospital. Use of standardised tools also provides alarms and warnings like temperature changes within a lab or chemical spills and increases patient safety within a hospital. On a larger scale it helps the government in disease surveillance.

Becoming Compliant

As governments across the world and the general public insist that healthcare organisations take appropriate steps to ensure the proper use, and protection of personal information, leaders in healthcare, business, technology, and information security need to collaborate and adopt standards that help reduce inconsistencies, inefficiencies and high costs associated with the exchange of health information.

The process of gaining compliance calls for the coming together of IT functions is in the areas of data confidentiality, integrity, availability, and auditability. Compliance can be obtained through mandated standards by bodies like the National Accreditation Board for Hospitals & Healthcare Providers (NABH) or the Health Insurance Portability and Accountability Act (HIPAA).

Helping ensure a regulatory compliance however’ poses a great challenge for IT managers. Most regulations do not specifically state what they require from an IT perspective; often different regulations apply to a given organisation making it difficult for IT managers to know what they must do to meet their compliance goals.

Although some vital differences exist among the various regulations, there is a substantial amount of overlap because they all deal with the fundamental issues of data security and privacy. An optimal way to address regulations is to first understand the potential threats and vulnerabilities of the data and network, and then create an effective and secure technology solution built on a well-designed infrastructure. This helps to easily deal with any new regulation that becomes law.

Categorising Vulnerabilities

By grouping protection techniques and vulnerabilities into categories as under confidentiality, integrity, availability and auditability, IT managers can create a common baseline for establishing guidelines that help achieve compliance. This process scales with the evolving landscape of new threats and new security measures can be incorporated easily.

Maintaining the confidentiality of healthcare data, which is continually exchanged between people, and across networks is critical. In the event of interception, it is important to make sure that data cannot be read or used by unauthorised parties. By providing for authentication through unique user IDs and strong authentication processes; access control, wherein access privileges are granted strictly on a need-to-know basis; and privacy, which relies on strong encryption of data in transit and at rest, it is possible to ensure data protection.

Firewalls, VPNs, intrusion prevention systems (IPSs), authentication, authorisation, and endpoint protection along with encryption are important for ensuring confidentiality of data in transit across the internet, wireless networks and hotspots, unsecured network areas, and areas providing guest access to the network.

In addition to confidentiality, it is also important to protect data against improper alteration or destruction and ensure its integrity ie., ensure data and information are accurate, complete and inviolably preserved. Specific threats to data integrity include data theft, copying, saving, modification, deletion and unauthorised access. To protect from these threats it is best to use a firewall and IPS in the network and on the endpoints.

Within the realm of regulatory compliance it is critical to ensure that authorised users have access to regulated data at all times while unauthorised users never access data. Compliance also means that an organisation addresses availability within the context of business continuity and disaster recovery. Availability is a critical function of security control because it ensures that no legitimate users are barred from accessing the data they need. Some specific, active threats to availability include viruses and worms and denial-of-service (DoS) attacks besides natural disasters, power outages, and a variety of emergency situations.

A broad range of options are available for healthcare organisations to implement strategies that strengthen business continuity controls, improve network and application resilience and reduce operating expenses. For starters, mission-critical applications can be identified and classified and a minimum amount of bandwidth established for them. They can then be policy routed and marked for preferential treatment. Non-critical applications can similarly be classified, policed, or blocked, as required.

Auditability is critical from a compliance perspective because it provides proof, in the form of an audit trail, that a healthcare company is following the steps necessary to satisfy specific regulations and secure sensitive information. When each security action that a company takes is tracked and audited, it is possible to demonstrate compliance and allow incident investigation.

Network and Automation

While seeking regulatory compliance, network operators must understand how the network is behaving, including its response to changes. Using solutions for security, monitoring, analysis and response helps provide intelligence to the network infrastructure, receive alerts and notifications from firewalls, IPSs and wireless applications, identify the threat, determine where it is occurring, to effectively stop it and protect data. By logging all the information and actions, it is possible to prepare incident response reports and compliance audits.

Because it touches every aspect of the extended organisation and connects all business processes, the network plays a fundamental role in regulatory compliance. With the inclusion of remote workers, healthcare organisations today need an end-to-end, system-based approach that is integrated and adaptive to manage their network security risks and addresses compliance requirements. Deploying or migrating to new technology platforms can help companies achieve regulatory compliance, lower costs and reduce overall security risks. Healthcare organisations also need to adopt best practices and technologies that have proven successful in other industries to enforce security.

Healthcare organisations who use IT resources to continuously track everything on the network must invest in solutions that automatically maintain a real-time inventory of these assets and how they are changing because new assets, new applications, and configuration changes can introduce vulnerabilities that attackers look to exploit. Automation is the key to implementing and maintaining effective security and complying with regulatory requirements.

With threats to the network becoming faster, smarter, more prevalent, and more elusive than ever before, people cannot be as vigilant as they need to be to watch for policy violations or to flag abnormal network behaviours. Therefore healthcare organisations should adopt solutions that reduce their effort not only to install and configure the technology, but also automatically monitor and enforce organisational network security policies, including compliance rules and lists. Smart technologies that can provide automation in the areas of tuning, alert routing, policy enforcement, and remediation are critical. When evaluating security products, healthcare organisations should focus efforts on identifying technology that offers more than a single feature because such solutions are cost-effective and require fewer IT security staff resources to maintain on an ongoing basis.

In addition to the above, the use of standardised nomenclatures and code sets to describe clinical problems, procedures medications, and allergies, clinical summaries, prescriptions etc help to establish a common, predictable, secure communication protocol between systems and meet regulatory compliance within a healthcare setup. Authentication, access control, and transmission security that relate to, and span across all of the other types of standards add to the benefit.

Adopting Standards

Network-based applications have transformed virtually every industry, and healthcare is no exception. Solutions that allow access to Electronic Health Records (EHRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions are becoming commonplace in wireless, wired, and mobile scenarios. Since all data on patients need to be kept secure and private, both wired and wireless security is a significant part of the overall security strategy of any healthcare facility.

Generally, a combination of standard wireless/wired security standards should be considered to meet regulatory requirements. As regulatory audits become more frequent, there is an increased need to enforce data security, and organisations handling electronic health data need to implement measures for controlling access to confidential medical information and protecting it against compromise and misuse.

Healthcare organisations must establish a policy for how the institution manages risk on the network so that the key properties are maintained. They must put in place a process for applying risk management throughout the life cycle of the network. They need to assign people who can execute the risk management process, provide the necessary resources, specify the criteria by which risk is determined to be acceptable and approve the results of the risk management process. In order to meet regulatory requirements, healthcare organisations that maintain and operate networks with medical devices are urged to consult and implement regulatory recommendations to minimise the risk involved in operating such networks.

Deploying for example, the Cisco Medical-Grade Network (MGN) architecture can be a good option to obtain compliance because it is not just a set of firewalls at the perimeter of the network, nor does the protection end when the information is written to disk or sent to an offsite vault. The architecture has all the industry best practices applied to the entire healthcare environment and provides care providers and vendors the ability to interact with the network and its related clinical systems, seamlessly. Wireless, virtual private network (VPN), and collaborative technologies extend benefit further. The network provides fundamental mechanisms and services for interaction in a highly secure manner and enables compliancy with regulatory guidelines and best practices.


Architectural attributes that respond to the changing clinical requirements help the rapid deployment and secure use of various systems for efficient healthcare delivery while also responding to new security demands, maintaining uptime, serviceability, and adherence to regulatory changes. Robustly designed architectures which are scalable add to the benefit.

Healthcare organisations that approach compliance using a solid security foundation coupled with comprehensive technology solutions that use proven IT control frameworks, best practices, and threat modeling processes will have a defensible position when their networks are subjected to compliance reviews. They will be able to ready themselves for compliance challenges not only of the present but the future as well.