HPE Software is now Micro Focus
HPE Software is now Micro Focus
Security Research

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – February 19, 2016

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – February 19, 2016


Below, you will find the HPE Security Research key articles of interest for February 19, 2016. These are publically available articles that are provided as a news service only. The intent of this blog post is to share current events related to the cyber security industry.

How white hat hackers stole crypto keys from an offline laptop in another room

In recent years, air-gapped computers, which are disconnected from the internet so hackers can not remotely access their contents, have become a regular target for security researchers. Now, researchers from Tel Aviv University and Technion have gone a step further than past efforts, and found a way to steal data from air-gapped machines while their equipment is in another room.

Hospital pays bitcoin ransom after malware attack

A Los Angeles hospital just paid a ransom equivalent to around $17,000 in bitcoins to get its computer systems back up and running

Cryptopolitik and the Darknet

Encryption policy is becoming a crucial test of the values of liberal democracy in the twenty-first century.

CVP: Delay-based location verification for the Internet

The researchers devise Client Presence Verification (CPV), a delay-based verification technique designed to verify an assertion about a device’s presence inside a prescribed geographic region.

CTO perspectives, part III: Leveraging threat indicator confidence

Author discusses how threat intelligence can boost your confidence in your organization’s security posture.

A look into Fysbis: Sofacy's Linux backdoor

The Linux malware Fysbis is a preferred tool of Sofacy, and though it is not particularly sophisticated, Linux security in general is still a maturing area, especially in regards to malware.

Iranian hackers compromised former IDF chief’s computer

According to Israel’s Channel 10 Iranian hackers succeeded in gaining access last year to the computer database of a retired Israeli army chief of staff.

Stolen card data of 100,000 Britons for sale on the clear web

A website on the clear web is offering for sale stolen card data from more than a million people worldwide including more than 100,000 Britons.

Russian bank licenses revoked for using hackers to withdraw funds

Russian banks have had licences revoked after being suspected of direct participation in using hackers or blaming cyber-attacks to withdraw funds illegally.

Feeling Locky

On the morning of 16 February 2016, a healthcare organization was hit with a zero-day ransomware referred to as Locky. 

Feeling even Locky-er

During our research, using non-invasive methods, we were able to acquire the Locky index,php file along with some additional files, One of the other files we were able to capture for analysis was the administrative panel code, admin.php.

Russian hackers spying on your Linux PC using sophisticated malware Fysbis

A new malware family known as Fysbis (or Linux.BackDoor.Fysbis) is aiming Linux machines by setting up a backdoor that allows the malware’s author to snoop on victims and perform further attacks.

5 exploit trends driving attacks today

As cybercriminals increasingly monetize their malware efforts, enterprise defenders need to recognize that the application layer has become the biggest battlefield in today's IT risk management model. So says the HPE Cyber Risk Report 2016, released today by Hewlett Packard Enterprise (HPE) today, which highlights a number of key statistics in last year's attack patterns.


© 2015 Hewlett Packard Enterprise Development Company, L.P. The information contained herein is subject to change without notice.

  • HPE Security Research
0 Kudos
About the Author


Filter by Labels