Back to news

October 29, 2024 | International, C4ISR, Security

Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus

International law enforcement disrupts RedLine and MetaStealer infrastructure, seizing servers and arresting key suspects.

https://thehackernews.com/2024/10/dutch-police-disrupt-major-info.html

On the same subject

  • For DoD cyber, 2019 is the year of doing

    January 31, 2019 | International, C4ISR

    For DoD cyber, 2019 is the year of doing

    By: Mark Pomerleau Following a year of cyberspace strategizing, 2019 will be all about implementing rules and tools, according to the Department of Defense's top uniformed cyber policy adviser. Appearing Jan. 29 before the Senate Armed Services Subcommittee on Cybersecurity, Brig. Gen. Dennis Crall said the department knows where it needs to head following last year's DoD cyber strategy (the first in three years) and now is the time to show results. “This is the year of outcomes and that's what we're focused on — delivering the capabilities and improvements that we've discussed for some time,” he told the committee, adding that the strategy process allowed them to take a look at some departmental gaps and get after them. The strategy actually has actionable lines of effort and there are things they can do to measure progress, he said. The document lays out five objectives and five areas of interest under its strategic approach. The five objectives include: Ensuring the joint force can achieve its missions in a contested cyberspace environment; Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages; Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident; Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and Expanding DoD cyber cooperation with interagency, industry, and international partners. The five areas of interest under the guise of its strategic approach include building a more lethal joint force; competing and deterring in cyberspace; strengthening alliances and attracting new partners; reforming the department; and cultivating talent. The strategy also notes DoD must take action in cyberspace during day-to-day competition to preserve U.S. military advantages and defend U.S. interests. The focus will be on nation states that can pose strategic threats to the United States, namely China and Russia. “We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of crisis or conflict,” the document says. Dana Deasy, the department's chief information officer, told the same committee that the threat from Russia and China is so acute he is briefed weekly from U.S. Cyber Command and the National Security Agency on them. This allows him to understand their offensive and defensive posture relative to the DoD. “Suffice to say that these are very strong, capable adversaries, but at the same time we have some strong, capable abilities ourselves,” he said. Cyber Command has now assembled a full force of cyberwarriors and received limited acquisition authority to start equipping them. However, there is much more work to be done. In fact, aside from individual tools, the force is still in need of a training range where cyberwarriors can do individual and collective training, as well as mission rehearsal, similar to rifle ranges or national training centers in the physical world. The Persistent Cyber Training Environment, being run by the Army for the joint force, will get after this; however, it is still in the prototype phase with a limited capability delivered to users. Additionally, the force needs a large-scale command-and-control platform that will house tools, provide commanders global situational awareness of forces and enable forces to plug into operations from remote locations. This is the goal of Unified Platform, which is also still in the prototype phase, though officials have said a limited product could be delivered as early as the spring. https://www.fifthdomain.com/dod/2019/01/30/for-dod-cyber-2019-is-the-year-of-doing

  • Dutch government to spend billions on military procurement

    October 19, 2022 | International, Other Defence

    Dutch government to spend billions on military procurement

    The Dutch government will invest up to 3.5 billion euros ($3.44 billion) in military procurement, the defence ministry said, in a policy turnaround in the wake of Russia's invasion of Ukraine.

  • Air Force Awards $95M For Cyber Intelligence

    February 9, 2021 | International, C4ISR, Security

    Air Force Awards $95M For Cyber Intelligence

    The investment is a sign of the Air Force's commitment to fighting war effectively across all domains, including cyber and its electronic warfare cousin. By KELSEY ATHERTONon February 08, 2021 at 5:08 PM ALBUQUERQUE: The 16th Air Force, designed to constantly contest the electromagnetic spectrum, has awarded a $95 million contract to support both command and control and service cryptologic element roles. The contract — Full Spectrum Intelligence, Surveillance and Reconnaissance Operational Non-Appropriated Funds Support, or FUSIONS — was awarded to Scientific Research Corp of Atlanta. It will run through February 2026. In a sign that Scientific may have developed a promising approach, this is not the first award to the company for this sort of work. The Navy awarded the company a contract similar in scale and scope in 2018. The 16th Air Force first started soliciting this contract in November 2019, one month after the command was created. The original solicitation emphasized the importance of “delivering timely and relevant intelligence data/products to the war fighter.” The 16th was created by merging an Air Force cyber mission with an Intelligence, Surveillance, and Reconnaissance component. Combining intelligence collection in the same component as one that can launch attacks on computers is a way for the Air Force to show how closely connected cyber attacks are to online espionage. Cyber, like surveillance and activity in the electromagnetic spectrum, can happen below the threshold of a shooting war but can also be used for targeting and to inflict physical damage. The scale of the investment is a sign of the Air Force's commitment to fighting war effectively across all its domains, including cyber. At a Dec. 11 symposium, Air Combat Command chief Gen. Mark D. Kelly said he'd told 16AF commander Lt. Gen. Timothy D. Haugh to “Take all of us, whether we go willingly, or kicking and screaming, into the non-kinetic competition.” Much of the work of delivering data products to the Air Force will involve harnessing information it already has in its databases, and making them useful on a command level. Some of that work, as outlined in the solicitation, involves targeting products. “The contractor shall provide targeting SME support regarding the Joint and Air Force Targeting Enterprise (JTE/AFTE), and kinetic, Electronic Warfare (EW), Information Operations (IO), Space and Cyber targeting,” reads the solicitation. The contract is designed to support the 16th in its role as a “service cryptologic element,” or the formal mechanism by which signals intelligence components of the service work directly with the NSA. Another component of the FUSIONS contract is identifying and recommending “new or unexploited information systems,” as well as “unique friendly, enemy, or neutral information sources,” with the goal of turning that information into relevant and useful intelligence. This means, broadly, looking at new Internet-connected devices, tools, and networks, and making that information something troops at the tactical level can use. Vital to that intelligence collection and sharing is ensuring the data itself can be transmitted over existing DoD networks. https://breakingdefense.com/2021/02/air-force-awards-95-million-for-cyber-intelligence/

All news