SpamGourmet & Fiddler

If you don’t use SpamGourmet or a similar service I highly recommend them.  They allow you to create unlimited e-mail forwarding addresses that can be created on-the-fly — allowing you to easily detect which websites are giving out your information.  Definitely get an account if you don’t have such a tactic already!


Fiddler, a great Windows (web) proxy gave out e-mail address.  I’m sure it was in their terms of service that I didn’t bother reading.  Still disappointing.

U.S. Cyber Signaling to North Korea

Interesting article in CFR about a DDOS attack that President Trump authorized United States Cyber Command to conduct against North Korea’s Reconnaissance General Bureau (RGB).  In all likelihood, the DDOS attack against North Korea’s intelligence agency, coupled with a leak of its occurrence and a post-hoc claim of responsibility by the U.S. government, represented an attempt by the Trump administration to send a costly signal of resolve to Pyongyang……This may account for why a member of the Trump administration chose to leak information about a DDOS attack, rather than a more costly attack that would require the United States to maintain persistent access North Korean networks……..If a state is seeking to send a signal via cyber means, how can it ensure the signal is received by the adversary and properly attributed? It could couple a cyber signal with other instruments of power, especially private diplomatic channels or public statements. This may account for the Trump administration’s “leak”—it is possible that it was intentional to ensure that North Korea was able to attribute the DDOS attack, after the fact, to the United States. 

….given the covert nature of state cyber operations, there are almost certainly things the public doesn’t know, necessitating reasoned hypothesizing about this case. That said, the available evidence suggests that this was a poor attempt at cyber signaling. Even beyond the inherent difficulties associated with signaling in cyberspace, the difference between the President’s tweets and DDOS could only muddy the waters. This example only confirms that cyber is not an ideal signaling tool, and this particular signal may have done more harm than good.

 

HT: Lost in Cyber Translation? U.S. Cyber Signaling to North Korea

Kaspersky

There was a great article from the Council on Foreign Relations regarding the hypocrisy surrounding Kaspersky since the U.S. government earlier this month banned federal agencies from using Kaspersky Lab software.  Best Buy is getting in on the action and will stop selling Kaspersky products because of possible(?) ties to the Russian government.  Why doesn’t Best Buy get rid of some of the other shit-for-security products on its shelves as well if it’s so concerned about security?

The U.S. House Science Committee received a classified briefing Tuesday related to Kaspersky.  I’d really wish some more details over the alleged collusion between Kaspersky and the Russian government would see the light of day.

And what would a Kaspersky post be without an RT link!?  ‘It’s crazy’: Kaspersky Lab attacked in US only for being Russian, says founder

Russians give up!

Roskomnadzor, Russia’s internet regulator, decided to end its blogger registry because it has become inefficient. In 2014, Russia passed a regulation requiring bloggers to register which would monitor their blogs for content deemed illegal. The regulation’s intent was to eliminate anonymous blogging and to curtail libel and defamation, but bloggers believed “the goal [was] to kill off the political blogosphere,” according to a popular anti-Putin blogger.

HT: https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=https%3A%2F%2Fwww.vedomosti.ru%2Fpolitics%2Farticles%2F2017%2F08%2F01%2F727388-roskomnadzor-reestr-blogerov&edit-text=

You did these all right?

All of these settings can be controlled via Group Policy / Local Security Policy:

1. Rename the Local Administrator Account

2. Disable the Guest Account

3. Disable LM and NTLM v1

4. Disable LM hash storage

5. Minimum password length

6. Maximum password age

7. Event logs

8. Disable anonymous SID enumeration

9. Don’t let the anonymous account reside in the everyone group

10. Enable User Account Control

HT: http://www.csoonline.com/article/3212948/windows/the-10-windows-group-policy-settings-you-need-to-get-right.html

Army Halt Use of Chinese-Made DJI Drones

Citing a worry over “cyber vulnerabilities,” the U.S. Army this week ordered that all drones built by China-based DJI, the world’s biggest drone maker, be immediately removed from Army service. The order comes following a classified study of the issue completed in May by the Army Research Laboratory, and the simultaneous release of a Navy memorandum titled “Operational Risks with Regards to DJI Family of Products.”

He says NASA and the Department of Energy have already stopped using DJI products. When Egan looked into why, he says they weren’t allowed to use the drones “because they are Chinese.”

HT: http://www.airspacemag.com/daily-planet/us-army-stops-using-chinese-made-dji-drones-180964324/