A LEGISLATIVE UPDATE: The Senate Energy and Natural Resources Committee will hold a hearing Thursday morning on the cybersecurity of U.S. energy infrastructure. The hearing will feature testimony from government officials as well as private sector representatives, and will aim to assess "private sector and government challenges and opportunities to promote the cybersecurity and resiliency of our nation's critical energy infrastructure," according to the committee. The witness list includes Bruce Walker, an assistant secretary in the Energy Department's Office of Electricity Delivery and Energy Reliability, as well as Robert Lee, chief executive officer at Dragos, an industrial network cybersecurity firm. A REPORT IN FOCUS: IRANIAN HACKING GROUP EXPANDS OPERATIONS: An Iranian hacking group has expanded its international operations and tool kit to carry out attacks, according to new research, a sign of its growing ambitions and capabilities. Over the past year, the Iran-based hacker group dubbed "Chafer" has moved from focusing its surveillance operations on domestic targets to those located in other countries in the Middle East, according to new research published by Symantec. Symantec first identified the group in 2015, though they believe Chafer's activity dates back to at least July 2014. "It shows that Chafer in the years of existence has expanded their own mandate," Vikram Thakur, Symantec's security response technical director, told The Hill. "We don't think that Chafer is going to be ceasing their operations or attacks anytime soon." Chafer has orchestrated attacks against organizations located in Israel, Jordan, the United Arab Emirates, Saudi Arabia and Turkey. The group began using seven new tools and targeting nine new organizations in its operations in 2017, according to the research published late Tuesday. Symantec also said it observed evidence of the hackers attempting to attack an airline in Africa and an international travel reservations firm last year. Chafer's targets span a number of sectors, including aircraft services, IT companies, telecoms providers and engineering consultancies. While researchers have no definitive evidence linking the group to Iran's government, Thakur observed that the information they are targeting in spy operations -- such as airline manifests -- would be more valuable to the public sector than the private sector. "The information they're seeking is more likely to be usable by the government," Thakur said. "Whether they are working on behalf of the government or they're doing it on their own accord with plans to sell the information to a third party, we have no idea." Symantec has not yet tracked Chafer operations against organizations in the United States, but Thakur said that the group could look to target organizations in western countries in the future. To read the rest of our piece, click here. A LIGHTER CLICK: Will A.I. soon be pouring your morning cup of coffee? It's possible. (Technology Review) WHAT'S IN THE SPOTLIGHT: THE VA: The alleged hacking of a former top aide at the Department of Veterans Affairs (VA) was unrelated to the travel scandal she was embroiled in and was limited to "relatively unsophisticated 'spoofing,'" according to a government watchdog. At issue is the VA inspector general's allegation that Vivieca Wright Simpson, who has since resigned as chief of staff, doctored an email in order to gain approval to use taxpayer dollars to pay for VA Secretary David Shulkin's wife to accompany him on a trip to Europe. Shulkin has said Wright Simpson showed him evidence backing up her denial that she sent the email in question and has suggested the email was sent by hackers looking to undermine him. In a letter released Wednesday by the top Democrat on the House Veterans' Affairs Committee, the VA's Office of Inspector General (OIG) says it secured Wright Simpson's VA-issued computers and mobile devices in consultation with the FBI and Department of Justice (DOJ), but that it does not believe a forensic analysis is warranted. "In the nearly two weeks since the release of our report, the nature of the alleged compromise of Ms. Wright Simpson's VA email account has become clearer," Inspector General Michael Missal wrote in the letter. "The OIG now believes that the allegations of 'hacking' are limited to unrelated and relatively unsophisticated 'spoofing' of Ms. Wright Simpson's identity through messages sent from an external, non-VA email address." The evidence Wright Simpson showed Shulkin was an email sent Feb. 14 to a VA finance employee seeking to obtain payment on a purchase order, Missal said. The email was marked "external" and was sent from a comcast.net email address using "Vivieca Wright Simpson" as the display name. "Given the 'external' markings and the comcast.net email domain, it is obvious from the face of the 'Vivieca Wright Simpson' email that it did not originate from the VA email system," Missal wrote. The VA's information technology (IT) staff also told the inspector general that it has no evidence Wright Simpson's actual VA email account was compromised, Missal said. IT staffers have, however, identified a phishing attack where a VA employee is impersonated in order to get another employee to reveal private information or to get a fraudulent payment. "VA IT staff appear to be keeping VA employees informed and advised of actions they should take in response to such efforts," Missal wrote. "We will continue to work with the department to monitor the alleged phishing/spoofing and stand ready to investigate all credible allegations of email and computer hacking or other violations at VA if additional evidence is developed." Shulkin told the inspector general he "did not mean to imply" to reporters that Wright Simpson's VA account was hacked. To read the rest of our piece, click here. IN CASE YOU MISSED IT: Links from our blog, The Hill, and around the Web. Armed Services chairman on Russian meddling: 'There has to be a price to be paid.' (The Hill) Hope Hicks is resigning from the White House, one day after meeting with the House Intelligence Committee. (The Hill) Manafort trial date set for Sept. 17. (The Hill) State Dept. expects Kushner to continue work on Middle East peace initiatives despite loss of top-secret security clearance. (The Hill) Special Counsel Robert Mueller has started asking about hacked Democratic emails. (NBC) Data from Capital One was left exposed on an Amazon server. (Gizmodo) A new Smartphone features a wallet for cryptocurrency. (NextGov) If you'd like to receive our newsletter in your inbox, please sign up here. |
沒有留言:
張貼留言