[OPLIN 4cast] OPLIN 4Cast #236: Security forces endanger cloud security

Editor editor at oplin.org
Wed Jun 29 10:33:30 EDT 2011


Email not displaying correctly? View it in your browser. 
<http://www.oplin.org/4cast/>
OPLIN 4Cast

OPLIN 4Cast #236: Security forces endanger cloud security
June 29th, 2011

<http://www.oplin.org/4cast/wp-content/uploads/2011/06/cloud_security2.png>A 
week ago on Tuesday (June 21), the FBI raided 
<http://www.fbi.gov/news/pressrel/press-releases/department-of-justice-disrupts-international-cybercrime-rings-distributing-scareware> 
a data center in Virginia run by a Swiss hosting company, DigitalOne. 
The FBI was looking for evidence of international cyber crime rings that 
have been distributing "scareware," a false alert that appears on 
people's computers telling them their security software must be 
updated/repaired and then sends them to a link that loads malware on 
their machine. This would not have been particularly noteworthy, except 
that the FBI took machines containing servers for completely legitimate 
and legal businesses, and thus had possession of data that should be 
private. As a result, some people wonder about the wisdom of putting 
their data in the "cloud," i.e., using servers hosted in large data 
centers.

    * FBI busts two scareware, fake AV gangs in global operation
      <http://www.eweek.com/c/a/Midmarket/FBI-Busts-Two-Scareware-Fake-AV-Gangs-in-Global-Operation-187749/>
      (eWeek/Fahmida Y. Rashid) "The FBI seized three racks of servers
      from the hosting facility, causing several Websites and services,
      including Curbed, Eater, Instapaper and Pinboard, to go offline.
      'The global reach of the Internet makes every computer user in the
      world a potential victim of cyber-crime,' said U.S. Attorney B.
      Todd Jones of the District of Minnesota. The FBI worked with
      police in Cyprus, Germany, Latvia, Ukraine, France and Romania as
      well as with Canada's Mounted Police and London's Met Police."
    * Sites rebuild after F.B.I. raid on data center
      <http://bits.blogs.nytimes.com/2011/06/22/sites-rebuild-after-f-b-i-raid-on-data-center/>
      (New York Times/Verne G. Kopytoff) "The agents, who were seeking
      the servers of a single client, nevertheless seized three
      enclosures filled with servers for 'tens of clients,' the company
      said. Sergej Ostroumow, DigitalOne's chief executive, declined to
      name the client that was the target of the investigation. He said
      he did not know the reason for the raid. In an e-mail on
      Wednesday, Mr. Ostroumow said he was working to restore his
      company's Web site, which was also taken offline by the raid, but
      added that 'we have e-mail and the hope that we will receive all
      servers back very soon.'"
    * The FBI stole an Instapaper server in an unrelated raid
      <http://blog.instapaper.com/post/6830514157> (Instapaper
      Blog/Marco Arment) "Possibly most importantly, though, the FBI is
      now presumably in possession of a complete copy of the Instapaper
      database as it stood on Tuesday morning, including the complete
      list of users and any non-deleted bookmarks. [...] Instapaper
      stores only salted SHA-1 hashes of passwords, so those are
      relatively safe. But email addresses are stored in the clear, as
      is the saved content of each bookmark saved by the bookmarklet."
    * FBI seizes servers in brute force raid
      <http://www.tgdaily.com/security-features/56793-fbi-seizes-servers-in-brute-force-raid>
      (TG Daily/Trent Nouveau) "While most Americans probably don't
      really care about a few downed sites, the brute force raid
      executed by the Feds surely doesn't bode well for the future. One
      can't help but wonder what comes next: mass Gmail seizures, Amazon
      cloud server confiscations, or perhaps entire data centers carted
      off in FBI trucks? Clearly, U.S. law enforcement officials must
      learn how to minimize 'collateral damage' to neutral civilian
      infrastructure during cyber-related raids."

*/Bounty fact:/*

Microsoft has been offering a $250,000 bounty since early 2009 for 
information leading to the arrest and conviction of those responsible 
for launching the sophisticated Conflicker worm, which was apparently 
the delivery mechanism for this scareware.
------------------------------------------------------------------------
The */OPLIN 4cast/* is a weekly compilation of recent headlines, topics, 
and trends that could impact public libraries. You can subscribe to it 
in a variety of ways, such as:

    * *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
      subscribing to the following URL:
      http://www.oplin.org/4cast/index.php/?feed=rss2.
    * *Live Bookmark.* If you're using the Firefox web browser, you can
      go to the 4cast website (http://www.oplin.org/4cast/) and click on
      the orange "radio wave" icon on the right side of the address bar.
      In Internet Explorer 7, click on the same icon to view or
      subscribe to the 4cast RSS feed.
    * *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
      OPLINlist and OPLINtech) by subscribing to the 4cast mailing list
      at http://mail.oplin.org/mailman/listinfo/OPLIN4cast.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.oplin.org/pipermail/oplin4cast/attachments/20110629/c737d33e/attachment-0001.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: kubrickheader.jpg
Type: image/jpeg
Size: 38379 bytes
Desc: not available
Url : http://lists.oplin.org/pipermail/oplin4cast/attachments/20110629/c737d33e/kubrickheader-0001.jpg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: cloud_security2.png
Type: image/png
Size: 25805 bytes
Desc: not available
Url : http://lists.oplin.org/pipermail/oplin4cast/attachments/20110629/c737d33e/cloud_security2-0001.png


More information about the OPLIN4cast mailing list