Weekly Security review: NSA, Bitcoin robbers at it again
Quite a few familiar headlines cropped up this week, with Edward Snowden leaking yet more classifying documents detailing the NSA’s cyber-espionage operations. The latest reports indicate that the agency infiltrated tens of thousands of networks around the world using specialized hardware designed from the ground up to collect sensitive information.
A slide dated 2012 outlines the NSA’s use of “Computer Network Exploitation” or CNE throughout more than 50,000 locations worldwide, spanning 20 “Access Programs” and five continents. SiliconANGLE CyberSecurity Editor John Casaretto observed that the agency uses the same tactics employed by hacktivists and cyber criminals to operate digital sleeper cells that can be activated as needed to siphon information from infected end-points.
The NSA has a deep bag of tricks. Besides operating sophisticated command-and-control networks, it also taps fiber-optic connections to eavesdrop major tech companies. Google and Yahoo insiders reportedly believe that the spy agency compromised undersea cabling operated by providers like Verizon Communications and Level 3 Communications to intercept their data center traffic.
While still at the center of the Snowden controversy, the NSA’s spying activities have been overshadowed by the revelation that the whistleblower possesses a “doomsday” cache believed to contain personal information belonging to U.S. and allied intelligence personnel. The highly classified documents that some suspect to be stashed away in the cloud contain names and resumes of employees working for the UK’s Government Communications Headquarters, according to “sources familiar with the matter.”
Over in the Bitcoin ecosystem, hackers stole about $990,000 worth of the crypto-currency from Bitcoin Internet Payment Services (BIPS), one of the largest bitcoin payment processors in Europe. Founding CEO Kris Henriksen gave users a detailed account of the heist, which started with a distributed denial of service that brought BIPS down and enabled the hackers to uncover a vulnerability they would exploit to walk away with 1,295 Bitcoins two days later.
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.