النتائج (
العربية) 2:
[نسخ]نسخ!
حالات من آسيا Case1 شبكة أرامكو يعيد السعودية بعد شمعون البرامج الضارة هجوم فيروس أعلنت شركة أرامكو السعودية يوم الاحد انها استعادت شبكة كاملة الوصول إلى أجهزة الكمبيوتر بعد هجوم البرمجيات الخبيثة، التي بدأت في وقالت الشركة ان لديها وصول المعوقين بشكل استباقي الشبكة لجميع أجهزة الكمبيوتر المصابة، فضلا عن أي الوصول عن بعد إلى شبكات الشركة، وحتى يوم السبت، عندما أكملت المتعلقة جهود التنظيف مجموعة الناشط الذي يصف نفسه، قطع السيف العدل، وادعى مسؤوليتها عن الهجوم ضد شركة أرامكو السعودية وقد أطلق خبراء أمن البرمجيات الخبيثة التي استخدمت في الهجوم ووفقا لخالد الفالح، الرئيس والرئيس التنفيذي لشركة أرامكو السعودية، وكان رد فعل الشركة بسرعة بمجرد أن رصدت إصابة وقال في بيان وعلى الرغم من البرمجيات الخبيثة الهجوم بعد إصابة بنجاح ولكن واحدا على الأقل من مواقع الشركة، وقد وعدت شركة أرامكو السعودية لمزيد من لحوم البقر الامن واضاف إذا قطع السيف العدل هو في الحقيقة عصابة من " " وبالإضافة إلى ذلك، يبرز الهجوم كيفية الدول القومية ليست بالضرورة وراء كل البنية التحتية الحيوية أو أنواع أخرى من الهجمات المتقدمة واضاف Cases From Asia
Case1
Saudi Aramco Restores Network After Shamoon Malware Attack
Hacktivist-launched virus takes out 75% of state-owned oil company's workstations, signals the growing power of attackers with social or political agendas.
Saudi Aramco announced Sunday that it had restored full network access to PCs after a malware attack, launched on Aug. 15, infected approximately 30,000 of the organization's workstations. The company said it had proactively disabled network access for all infected PCs, as well as any remote access to the company's networks, until Saturday, when it completed related clean-up efforts.
A self-described activist group, Cutting Sword of Justice, claimed credit for the attack against Saudi Aramco--the state-owned national oil company of Saudi Arabia, as well as the world's largest exporter of crude oil--before it was launched. Security experts have dubbed the malware used in the attack "Shamoon," and said that it can exfiltrate data from infected systems and erase their hard drives.
According to Khalid A. Al-Falih, president and CEO of Saudi Aramco, the company reacted quickly once it spotted the infection. "We addressed the threat immediately, and our precautionary procedures--which have been in place to counter such threats--and our multiple protective systems have helped to mitigate these deplorable cyber threats from spiraling," he said in a statement.
Despite the malware attack having successfully infected 75% of the company's workstations, Al-Falih insisted that the company's exploration, producing, exports, sales, distribution, and financial and human resources systems, including related databases and industrial control systems, hadn't been breached, which he said was due to their having been placed on isolated networks.
But at least one of the company's websites, www.aramco.com--which had been taken offline after the attack--remained offline Monday.
Saudi Aramco has promised to further beef up its security--which is wise, given that a single virus was able to infect so many of its PCs. "We will ensure that we will further reinforce our systems with all available means to protect against a recurrence of this type of cyber-attack," said Al-Falih.
If Cutting Sword of Justice really is a band of hacktivists--as opposed to an operation sponsored by a country that has a poor relationship with Saudi Arabia, such as Israel--then the Shamoon malware represents a first on the hacktivism front, given that groups such as Anonymous and LulzSec have typically targeted known Web application vulnerabilities or used distributed-denial-of-service (DDoS) attacks. "This is the first significant use of malware in a hacktivist attack," said Imperva's Rob Rachwald, director of security strategy, and Barry Shteiman, a principal security engineer, in a blog post. "In the past ... most hacktivist attacks were primarily application or DDoS attacks."
In addition, the attack highlights how nation states aren't necessarily behind all critical infrastructure or other types of advanced attacks. "In the last couple of years, it became very popular to single out the Chinese, U.S., and Israeli governments for cyber-warfare ... [but] this time it was hacktivists working for a political and social cause," said Rachwald and Shteiman. "A group of hobbyists and hacktivists with several very strong minded developers and hackers achieved results similar to what we have allegedly seen governments accomplish. Does this mean that the power of the hacktivism has become so strong that it can compete with government cyber warfare organizations?
GulfNews
Aramco cyber attack was from external sources
Incident was designed to disrupt the Saudi economy, says spokesman
Dhahran, Saudi Arabia: An investigation into a computer virus that affected about 30,000 workstations at state-owned oil giant Saudi Arabian Oil Co. in August has found the attack originated from outside the kingdom and involved so called “spear phishing”, the Saudi interior ministry and Aramco said on Sunday.
No employee of Saudi Aramco, or related contractors, were involved in the cyber attack, Abdullah Al Sa’adan, Saudi Aramco’s vice president for corporate planning, told reporters at a press conference at the company’s headquarters in Dhahran. The incident was “not only targeting Aramco as an entity but was designed to disrupt the whole economy and was aimed at halting the flow of oil and gas.”
“Not a drop of oil was lost and the company was able to restore productivity in record time,” Al Sa’adan added.
Spear phishing typically involves a spoof email to trick users into clicking through to a website where a hacker can install malicious software or gain control of another computer.
The Aramco virus, which originated from external sources, forced the world’s largest oil producer to isolate all its electronic systems from outside access, but left the company’s operations unaffected. That attack, wielding a virus called ‘Shamoon’, destroyed data on 30,000 computers. A group calling itself ‘Cutting Sword of Justice’ claimed responsibility for the attack, which US investigators told the Wall Street Journal in October was tied to Iran.
Small section affected
Saudi Aramco said on Sunday only a small section of its vast network was affected and the cost of the attack was “limited to replacing the affected discs” and the time that IT staff spent in restoring connectivity.
Saudi interior ministry spokesman Major General Mansour Al Turki said he expects the number of cyber attacks to increase in the future. As a result, the kingdom is in the process of establishing a national centre to prevent such incidents.
“We are trying to upgrade our capabilities to the level required to combat such incidents,” Al Turki said.
http://www.darkreading.com/attacks-and-breaches/saudi-aramco-restores-network-after-shamoon-malware-attack/d/d-id/1105991?
http://gulfnews.com/news/gulf/saudi-arabia/aramco-cyber-attack-was-from-external-sources-1.1116621
Case2
UAE loses $422m due to cybercrime in past year
Cybercriminals are changing tactics to target fast-growing mobile platforms and social networks
Dubai: More than 1.5 million people in the UAE have fallen prey to cybercrime in the past 12 months, suffering $422 million in direct financial losses, said an industry expert.
“On average, $283 per person was suffered in direct cost by cybercrime during the last year as adoption and evolution of new technologies have impacted people’s security,” said Johnny Karam, regional director, Middle East and French speaking Africa.
He said every second, 18 adults become a victim of cybercrime, resulting in more than one-and-a-half million cybercrime victims each day on a global level.
According to the latest Norton Cybercrime 2012 report, 46 per cent of the UAE’s social networking users have fallen victim to cybercrime on social networking platforms.
Of the social networking users, 31 per cent adults have been a victim of social or mobile cybercrime in the UAE compared to the 21 per cent globally.
The report calculates the direct costs associated with global consumer cybercrime at $110 billion over the past 12 months.
In the past 12 months, an estimated 556 million adults across the world experienced cybercrime, more than the entire population of the European Union.
This figure represents 46 per cent of online adults who have been victims of cybercrime in the past 12 months, on par with the findings from 2011 at 45 per cent.
About 15 per cent of social network users reported someone had hacked into their profile and pretended to be them.
While 75 per cent believe that cybercriminals are setting their sights on social networks, less than half (44 per cent) actually use a security solution which protects them from social network threats and only 49 per cent use the privacy settings to control what information they share, and with whom.
“Cybercriminals are changing their tactics to target fast growing mobile platforms and social networks where consumers are less aware of security risks,” said Tamim Taufiq, head of consumer sales at Symantec Mena.
He said about 40 per cent of adults do not know that malware can operate in a discreet fashion, making it hard to know if a computer has been compromised, and more than half (55 per cent) are not certain that their computer is currently clean and free of viruses.
“Cybercriminals’ methods have evolved; they want to avoid detection as long as possible. This year’s results show that nearly half of internet users believe that unless their computer crashes or malfunctions, they’re not 100 per cent sure they’ve fallen victim to such an attack,” Karam said.
With people sending, receiving, and storing everything from personal photos to work-related correspondence and documents to bank statements and passwords for other online accounts, those email accounts can be a “potential gateway for criminals looking for personal and corporate information,” he said
http://gulfnews.com/business/sectors/technology/uae-loses-422m-due-to-cybercrime-in-past-year-1.1086337
Case3
Eight charged in US over $45 million cyber crime on UAE and Oman banks
An international crime gang has stolen US$45 million from RAKBank and BankMuscat, in one the biggest cyber frauds to hit the Middle East.
Eight alleged members of the syndicate’s cell in New York have been charged in the US with conspiracy to commit fraud and money laundering.
The crime network hacked into the systems of banks around the world, removed maximum limits for withdrawal at ATMs and stole details of pre-paid debit cards, said the US attorney’s office for the eastern district of New York.
“The stolen card data was then … used in making fraudulent ATM withdrawals on a massive scale across the globe,” the office said.
Prepaid cards are like debit cards, but instead of being linked to a bank account they have their own funds that are topped up like a prepaid mobile phone account.
The eigh
يجري ترجمتها، يرجى الانتظار ..