Anonymous ID: dd19f6 Feb. 6, 2019, 7:39 p.m. No.5061844   🗄️.is 🔗kun   >>1915 >>2057 >>2259 >>2337 >>2506

Norwegian software firm Visma to steal client secrets, investigators say

 

 

  • The alleged attack was part of a global effort by China’s Ministry of State Security to steal intellectual property and company secrets, say security experts

  • The claims came after Norway’s police intelligence agency accused Beijing of stealing information via technology provided by telecom tech giant Huawei

 

Hackers working on behalf of Chinese intelligence breached the network of Norwegian software firm Visma to steal secrets from its clients, cybersecurity researchers said, in what a company executive described as a potentially catastrophic attack.

 

The attack was part of what Western countries said in December is a global hacking campaign by China’s Ministry of State Security to steal intellectual property and corporate secrets, according to investigators at cybersecurity firm Recorded Future.

 

China’s Ministry of State Security has no publicly available contacts. The foreign ministry did not respond to a request for comment, but Beijing has repeatedly denied any involvement in cyber-enabled spying.

 

Visma took the decision to talk publicly about the breach to raise industry awareness about the hacking campaign, which is known as Cloudhopper and targets technology service and software providers in order reach their clients.

 

The revelations on Tuesday came after the Norwegian police intelligence agency PST, in its annual security evaluation, accused the Chinese government of stealing information from Norway’s cyber domain through technology provided by Chinese telecom tech giant Huawei. The Chinese embassy in Oslo called the claims “ridiculous”.

 

Cybersecurity firms and Western governments have warned about Cloudhopper several times since 2017 but have not disclosed the identities of the companies affected.

 

Reuters reported in December that Hewlett Packard Enterprise Co and IBM were two of the campaign’s victims, and Western officials caution in private that there are many more.

China and Norway face off over ‘ridiculous’ claims Beijing is using Huawei to spy on Scandinavian host

 

At the time IBM said it had no evidence sensitive corporate data had been compromised, and Hewlett Packard Enterprise said it could not comment on the Cloudhopper campaign.

 

Visma, which reported global revenues of US$1.3 billion last year, provides business software products to more than 900,000 companies across Scandinavia and parts of Europe.

 

The company’s operations and security manager, Espen Johansen, said the attack was detected shortly after the hackers accessed Visma’s systems and he was confident no client networks were accessed.

if I put on my paranoia hat, this could have been catastrophic

Visma security manager Espen Johansen

 

“But if I put on my paranoia hat, this could have been catastrophic,” he said. “If you are a big intelligence agency somewhere in the world and you want to harvest as much information as possible, you of course go for the convergence points, it’s a given fact.”

 

“I’m aware that we do have clients which are very interesting for nation states,” he said, declining to name any specific customers.

 

Paul Chichester, director for operations at Britain’s National Cyber Security Centre, said the Visma case highlighted the dangers organisations increasingly face from cyberattacks on their supply chains.

 

“Because organisations are focused on improving their own cybersecurity, we are seeing an increase in activity targeting supply chains as actors try to find other ways in,” he said.

 

In a report, Recorded Future said the attackers first accessed Visma’s network by using a stolen set of login credentials and were operating as part of a hacking group known as APT 10, which Western officials say is behind the Cloudhopper campaign.

 

The US Department of Justice in December charged two alleged members of APT 10 with hacking US government agencies and dozens of businesses around the world on behalf of China’s Ministry of State Security.

Denmark expels two Huawei workers over work permits, as Norway warns of espionage risk

 

Priscilla Moriuchi, director of strategic threat development at Recorded Future and a former intelligence officer at the US National Security Agency, said the hackers’ activity inside Visma’s network suggested they intended to infiltrate client systems in search of commercially sensitive information.

 

“We believe that APT 10 in this case exploited Visma networks to enable secondary operations against Visma’s customers, not necessarily to steal Visma’s own intellectual property,” she said.

 

“Because they caught it so early they were able to discourage and prevent those secondary attacks.”

 

https://www.scmp.com/news/world/europe/article/2185218/chinese-intelligence-hacked-norwegian-software-firm-visma-steal

Anonymous ID: dd19f6 Feb. 6, 2019, 8 p.m. No.5062095   🗄️.is 🔗kun

U.S. Investigating Saudi Arabia Giving U.S. Weapons to Al-Qaida and Iran in Yemen, Report Says

 

CNN concludes the transactions are 'exposing some of America's sensitive military technology to Tehran and potentially endangering the lives of U.S. troops in other conflict zones'

 

A U.S. Department of Defense official confirmed to CNN that the U.S. is investigating whether or not Saudi Arabia and its coalition members gave al-Qaida, Salafi militias and other factions in Yemen U.S. produced weapons.

 

CNN reported on Monday that U.S. weapons and highly sensitive military secrets sent to the Saudis and Emiratis ended up in the hands of U.S. rivals in Yemen, in violation of U.S.-Saudi coalition arms agreements.

 

The Trump administration's support for the Saudi-led coaltion in Yemen has long been controversial in the U.S. with the Senate voting 56-41 in December to pass a resolution that would withdraw most U.S. forces from Yemen.

 

Local commanders told CNN during its investigation that the Saudis and the United Arab Emirates are using U.S. weapons as currency to buy off different factions and militias in the Yemeni conflict - including Iranian-backed fighters.

 

CNN concluded that the transactions are “exposing some of America's sensitive military technology to Tehran and potentially endangering the lives of U.S. troops in other conflict zones.”

 

The conflict, widely seen in the region as a proxy war between Saudi Arabia and Iran, has been bogged down in a military stalemate for years.

 

A Sunni Muslim Arab coalition led by Saudi Arabia and the United Arab Emirates intervened in Yemen in 2015 to restore the government of Abd-Rabbu Mansour Hadi after it was ousted from power in the capital Sanaa by the Houthis in late 2014.

 

The Houthis control most urban centers in the poorest Arabian Peninsula nation while Hadi's government controls the southern port of Aden and a string of coastal towns.

 

https://www.haaretz.com/middle-east-news/u-s-investigating-saudi-arabia-giving-u-s-weapons-to-al-qaida-and-iran-in-yemen-r-1.6911550

Anonymous ID: dd19f6 Feb. 6, 2019, 8:12 p.m. No.5062231   🗄️.is 🔗kun   >>2246 >>2251 >>2253

Woke Game Community Manager/Streamer Arrested in Child Sex Sting Op

 

Popular Twitch streamer and game community manager Thomas Cheung was arrested on Monday as part of a child sex sting operation conducted by the Georgia Bureau of Investigation.

 

Thomas Cheung, a popular gaming streamer on the Twitch platform, was arrested on Monday after he fell into a child sex sting operation conducted by the Georgia Bureau of Investigation. Cheung was also a community manager for Hi-Rez studios, which publishes the popular online multiplayer game Paladins.

 

The Georgia Bureau of Investigations published a press release on Monday about the operation and its arrests. The sting targeted adults who were using the Internet to “purchase” sex with a minor.

 

https://www.breitbart.com/tech/2019/02/06/woke-game-community-manager-streamer-arrested-in-child-sex-sting-op/