INTELDROP 22 Feb 2015 [Cyber Threats]



IO General Correspondent – Sam Rosenthal

APT28 Develops Linux Trojan Virus

15 February 2016 (SAN FRANCISCO) – A Russian government-sponsored cyber-espionage group known as ‘Pawn Storm’ or ‘APT28’ created a Trojan program to access Linux based computers.  Most normally view Linux as a highly secure operating system for computers but more hackers are creating malware designed for it.  APT28 is also involved in cyber espionage operations using exploits on Windows systems as well.  APT28 targets NATO members’ militaries, governments, and security organizations.  Source: (Reliability: High)

Russian Cyber Attacks On Syria Increase

19 February 2016

Financial Times (LONDON) ­– Russia is targeting non-governmental organizations and opposition groups in Syria and Turkey to mask its military involvement in Syria.  Russian hacking groups use false websites and emails in order to deceive users into downloading malware.  The malware allows opportunities for hackers to disrupt communication and send false communications and to gather or erase data.  Russian sponsored hacking groups engage in collection and monitoring activities on Syria groups and Russian military forces.  Source: (Reliability: Very High)

ISIS Has Capacity To Strike U.S. Critical Infrastructure

19 February 2016

International Affairs Review (WASHINGTON) – Given the structure and recruitment techniques of ISIS, the organization has the capacity to hack U.S. critical infrastructure and defense systems.  ISIS maintains a capable cyber wing that was responsible for attacks on US based social media sites targeting US military members.  Last month, the pro-Palestinian hacking group AnonGhost pledged their allegiance to ISIS and offered to assist them with personnel and tools.  If ISIS can maintain a steady income, it will pose a threat to US cyber security interests.  Source: (Reliability: Moderate)

DoD Databases: A Prime Target For Cyberattacks

18 February 2016

C4ISR & NETWORKS (SPRINGFIELD) – Network and end-point systems take priority with budget monies leaving databases with less funding.  Database systems, which hold most sensitive data, are high breach risks.  Government database backups pose compromise threats and it is difficult to maintain security standards on these systems.  The amount of IT employees within the DoD creates a human threat of security compromise.  The compromise of user names, passwords and credentials is the primary threat to DoD cyber security and would allow access into databases.

Source: (Reliability: High)

Cheating Site Ashley Madison Popular Within Air Force

18 February 2016

AirForceTimes (SPRINGFIELD) – Profiles leaks on the cheating website “Ashley Madison” exposed thousands of Air Force personnel as members.  The leaks showed high percentages of those living on Air Force bases across the country had profiles on the site at the time.  On average, approximately 10% of the total populations of each of the 15 bases recorded had profiles on the site.  Sheppard Air Force Base, with 16.3% of its population, had the highest percentage of users recorded on the site and Eielson Air Force Base had the lowest with 5.3% of its population on the site.  Source: (Reliability: High)

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s