STE WILLIAMS

Bitcoin flaw could have allowed dreaded 51% takeover

In the nick of time, the elders of Bitcoin have patched a security flaw that could have allowed an attacker to launch a much-feared “51% attack” on the world’s biggest virtual currency for as little as $80,000.

The scenario that might have led to this was always deeply hypothetical but the fact such a thing was even possible until this week has left some in the Bitcoin community feeling alarmed.

What’s the beef?

The flaw was in Bitcoin Core, the client software upon which the whole Bitcoin blockchain depends, but also affects at least one other important fork that uses the same codebase, Litecoin (LTC).

Details are sparse, but the full release notes for the patched version mention a denial-of-service vulnerability (CVE-2018-17144) that dates back to versions 0.14.0 that first appeared in March 2017, running through to 0.16.2 released earlier this year.

Says the summary:

It was discovered that older versions of Bitcoin Core will crash if they try to process a block containing a transaction that attempts to spend the same input twice.

In effect, an attacker could have created an invalid or ‘poisoned’ block by attempting to spend the same Bitcoins twice, which would have spread at high speed around almost the entire network of more than 9,000 Bitcoin Core nodes, causing them to crash.

The cost of doing this would mean losing the block containing the malformed transaction, equivalent to 12.5 Bitcoins with a current value of $80.000. With large numbers of nodes offline, the attacker might then potentially control enough of the miners remaining to control the network’s consensus mechanism – the so-called 51% attack.

Normally, this wouldn’t be possible – trying to spend the same coins twice should be rejected by consensus – but flaws this serious show how the rules can be subverted.

It’s reminiscent of an incident earlier this year that appeared to how another virtual currency, Verge, might be susceptible to the same 51% scenario.

The flaw has been patched in version 0.16.3 but questions remain about how such a simple flaw ended up in the Bitcoin Core 0.14.0 and remained undetected for so long.

It’s also stirred up a Reddit debate about whether a currency as large as Bitcoin should depend so heavily on one reference client, as well as the exposure of possibly dozens of small currency forks using the same codebase that will also need to be patched.

Tweeted respected cryptocurrency expert and Cornell University professor, Emin Gün Sirer:

To Bitcoin’s sceptics, this week’s incident will be seized upon as another example of the danger of resting a $100 billion platform on a lot of untested assumptions.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/moR0gf1r62c/

Scottish brewery recovers from ransomware attack

Staff at Arran Brewery were locked out of its computer systems this week following a ransomware attack.

The attack against the Isle of Arran-based Scottish beer maker appears to have been a targeted strike. Prior to the infection, adverts for an already filled finance post at the brewery were placed on recruitment sites worldwide. This, in turn, resulted in an influx of CVs.

Amidst this, hackers appear to have sent a booby-trapped email message featuring a ransomware payload carried within a PDF file. When an Arran Brewery staffer opened this contaminated email, its systems were infected.

Cybercriminals demanded 2 bitcoin (£10,227/$13,448 at the time of publication) to hand over the encryption keys needed to recover data. The Scots firm declined to cave into extortion, even though the decision meant accepting the loss of three months worth of sales data from one infected server, the BBC reported.

The brewery has drafted in an external IT consultant to help to clean up its network and, where possible, restore data.

The Scottish Sun added that the brewery is back up and running.

A worker at the brewery confirmed the attack to The Reg while asking us to put follow-up questions to its managing director by email. We’ll update this story as more information comes to hand.

Barry Shteiman, VP of research and innovation at Exabeam, said that businesses hit by ransomware are faced with a difficult choice.

“While many security experts warn about paying ransoms or entering into negotiations, the answer in reality comes down to simple economics. If the downtime caused by data being unavailable, or by the backup restoration process, is more expensive than paying the ransom, then organisations should pay.

“Equally, if giving up on the encrypted data has a higher cost in lost revenue or intellectual property than remediation, then you can also see why an organisation would pay the ransom. Of course, this is a last resort, if all other options have been exhausted,” he added. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/09/21/arran_brewery_ransomware/

Enigma message crack honours pioneering Polish codebreakers

The Bombe team at The National Museum Of Computing (TNMOC) has succeeded in breaking an Enigma-encrypted message in a live Poland-to-England demo.

The demonstration was described by TNMOC as a tribute to Polish cryptographers and wartime Bletchley Park staff.

The reconstructed Turing-Welchman Bombe at TNMOC in Bletchley Park found the settings and key needed to break an Enigma message. The techniques used were the same as those used by the WWII codebreakers.

Ruth Bourne, a wartime Bombe operator, was at hand to verify the authenticity of the exercise. The reconstructed Bombe was “clean and new” as opposed to the “battered and chipped” drums that Bourne remembers from her wartime service.

Nonetheless the authenticity was there. “I could operate it now and could plug it up,” Bourne told El Reg about the reconstructed machine. “It’s all very familiar.”

The TNMOC Bombe Team identified the decryption key of an English language Enigma-encrypted message sent from the World Computer Congress in Poznan, Poland during a live exercise today. The exercise took place alongside regular conference proceedings, which are being live-streamed, and featured presentations on cryptography, the Bombe and famous codebreaker Alan Turing.

The exercise on Friday demonstrated all the key phases of breaking an intercepted Enigma-encrypted message: from working out the wheel settings of machines used to send the message all the way through to the production of the plain text of encrypted messages. During WWII the German army changed the wheel settings and plug board settings every day. More advanced four- and five-wheel machines came into service as hostilities progressed.

Work by Polish mathematicians on early three-wheel versions of the Enigma laid the groundwork for the celebrated efforts of Turing and Gordon Welchman at Bletchley Park. It was the Poles who first broke the Enigma before the war began. Improved OpSec by Germany after hostilities broke out meant Wehrmacht telegram operators stopped sending the preamble to messages twice, so the crib needed for the device to work on Enigma-encrypted messages was no longer available.

The Bombe created at Bletchley Park was named in tribute to the less advanced Polish Bomba, a somewhat similar electro-mechanical device developed by Poland to crack German Army versions of the Enigma. The Turing-Welchman Bombe partially automated the decryption of Enigma-encrypted messages during WWII.

Banksy-style graffiti image of Alan Turing

Turing notes found warming Bletchley Park’s leaky ceilings

READ MORE

The reconstructed Bombe was a labour of love put together by the team of enthusiast engineers using scavenged and spare parts that took more than eight years to build – longer than World War II itself – and completed in 2007, Bombe team member Paul Kellar told The Reg. The model contains 36 Enigma equivalents, each with three drums and wired to mimic the same enciphering process as real Enigma cipher machine motors.

The reconstructed Bombe was moved to The National Museum of Computing earlier this year following a successful crowdfunding effort and has been open to public viewing in a gallery since June. The museum also features a reconstruction of the wartime code-breaking Colossus, the forerunners of which were used to break the Lorenz cipher used by German High Command. ®

Bootnote

A new book by Alan Turing’s nephew, Dermot Turing, called X, Y and Z: The Real Story of How Enigma Was Broken, covers the sometimes overlooked by crucial role of Polish codebreakers in cracking the Enigma. The author was a guest speaker at the World Computer Congress.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/09/21/enigma_live_crack_honours_poles/

Executive Branch Makes Significant Progress As DMARC Deadline Nears

The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.

Nearly a year ago, the Department of Homeland Security issued Binding Operation Directive 18-01, which requires all domains in the executive branch of the federal government to protect websites and email with HTTPS, TLS, and DMARC. The deadline for implementation? Oct. 16, 2018. With less than a month to go before that deadline, where are the departments, bureaus, and agencies in their efforts toward compliance? The news, as of late September, is, perhaps, surprisingly good.

The latest progress report published by Agari, which has worked with the DHS to monitor progress toward the deadline, shows that 83% of executive branch domains have enabled DMARC (Domain-based Message Authentication, Reporting, and Conformance). The protocol, which is used to prevent domain spoofing, has three implementation levels: basic monitoring, “p=none”; intermediate containment, “p=quarantine”; and blocking, “p=reject.” As of Sept. 14, 64% of the 1,144 executive branch domains have implemented the strongest “p=reject” level, which the directive requires, ahead of the deadline, Agari reports.

Phil Reitinger, president and CEO of the Global Cyber Alliance, which has created a set of resources for agencies still working to reach compliance, says that the directive is an important step in protecting communications from within the civilian departments of the federal executive branch. “I’m very encouraged by the progress that’s been made and very supportive of DHS stepping forward to impose these sorts of requirements to increase the security of both the government and the people who live in the United States and receive government e-mail,” he says.

As laudable as protecting citizens may be as a goal for the directive, there’s more to the protection than reassuring those outside the government. “It’s not just ordinary citizens – it’s other governments, it’s from agency to agency, and from government to its private-sector partners where DMARC is critical,” Reitinger says. “It’s a key way to stop the very worst kind of phishing and email-based attacks in their tracks.”

Those attacks continue to be a significant threat to individuals and organizations. According to the “2018 Q1 Email Fraud Landscape,” released by Valimail, 6.4 billion fake emails (with fake “From:” addresses) are sent worldwide every day, with the US the primary source of those fake messages.

DMARC is a form of protection already common to nongovernmental email. “If you use Google, or Microsoft, or Yahoo Web mail, then you’re going to get a screen for DMARC,” Reitinger says. “About 85 percent of consumer inboxes are protected by this.”

One difference between the DMARC implemented by consumer email providers and that required by BOD 18-01 is that the consumer providers were likely to have been able to budget for the deployment process – a luxury not afforded the executive IT departments. And there are serious consequences for making mistakes in that deployment. “If, for example, the Social Security Administration deployed DMARC and they did it wrong, then they wouldn’t be able to send an email to anybody,” Reitinger explains. “For at least 85% of consumers in the United States, the mail would go straight to trash or be marked as spam. So you have to do it right.”

Whatever the final expenditures turn out to be, Reitinger is confident that the investment will be worthwhile. “I would say it’s a low investment for the benefit provided,” he says. “One of the cool things about DMARC is, the more broadly it’s deployed, the more powerful it is.” At a certain critical mass of deployment, systems could automatically mark as spam any mail from a domain not deployed as DMARC.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/application-security/executive-branch-makes-significant-progress-as-dmarc-deadline-nears/d/d-id/1332863?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Data Manipulation: How Security Pros Can Respond to an Emerging Threat

Industry leaders are scrambling to address the issue, which will take new thinking to overcome.

This year, the US government paid out its largest bug bounty yet — during the government run “Hack the Air Force” program — for a vulnerability in its software. The flaw, if not proactively found, would have allowed hackers to run malicious code on its systems and manipulate data. It’s the latest example of an emerging threat that has industry leaders scrambling and requires new thinking from security professionals.

Former national intelligence chief James Clapper warned as early as 2015 that “the next push of the envelope” in cyber warfare was likely to involve data manipulation. Now, financial services companies, healthcare organizations, and other industries in which data integrity is critical to business are running cyber war games to figure out how to prepare for such threats.

Unlike attacks that try to steal data or those that hold it hostage with ransomware, data manipulation attacks can be hard to detect. Hackers can make small changes to information that are easy to miss but can have potentially catastrophic effects down the road.

Two years ago, a hacktivist group with ties to Syria reportedly infiltrated a water utility’s control system and changed the levels of chemicals being used to treat water. It’s not hard to imagine a similar attack perpetrated against a pharmaceutical company, creating a digital equivalent of the Tylenol scare of the 1970s.

At a time when nation-state hacking is on the rise, data manipulation can also be used to disrupt the economy and undermine confidence in critical national systems. An attack targeting stock market data, for example, could spark chaos for financial markets.

It’s hard to gauge how widespread such attacks are, but security professionals should be thinking about measures to guard against this type of incident. To do so, it’s helpful to think about the phases that comprise a “typical” breach: penetration, pathway mapping, lateral movement, and destruction or alteration of target data.

One reason that attacks on data integrity are so hard to detect is that attackers don’t need to exfiltrate data. That means all the tools and techniques security teams typically rely on to detect files being removed from a network become unhelpful.

The penetration phase, which typically involves compromising a low-value asset within the organization, is extremely hard to prevent for any type of attack. During this phase, malicious attackers weaponize a payload and take advantage of a vulnerability to deliver malware into the target’s environment, which includes its data centers, endpoints, clouds, and third-party applications that are authorized to access its systems. Organizations can employ multiple techniques and tools to detect attacks and secure its perimeter and endpoints, such as IDS/IPS systems, perimeter and web-application firewalls, anti-phishing tools, and more. 

In the pathway mapping phase, the malicious payload activates scanning tools to scan and discover the systems in the network that an infected host or device can access. Organizations can detect malicious scanning and mapping tools by turning all their hosts — bare metal, VMs, cloud, load balancers, and switches — into sensors so that the entire computing infrastructure acts as a distributed detection platform. This distributed detection platform will also have the ability to learn normal behavior through a baselining process, and trigger anomalies when connections and traffic flows are against policy or deviate from the baseline. An organization using microsegmentation and anomaly detection techniques will be able to detect and prevent malicious scanning and mapping activities from infected hosts.  

Following the pathway mapping phase, lateral movement occurs where attackers move throughout networks to locate data they want to delete or alter. To secure its environment, organizations should start by building an application dependency map so it can identify the high-value assets and their legitimate connections and dependencies and create its micro-segmentation strategy. Microsegmentation via well-defined whitelisting policies that limit and control connections across and access to systems and applications is an effective enforcement mechanism. Whitelisting should follow the best practice of least privilege not just for user-to-machine traffic, where it is more commonly used, but also for all machine-to-machine traffic, which is growing more critical with the rise of IoT devices. In addition, monitoring and detection of failed attempts also function as high-quality signals of malicious actors attempting to move laterally across the network. 

Since the attacks are hard to detect, being able to identify when data has been modified is also critical, and various data integrity tools help with this. For example, file integrity monitoring tools have the ability to send alerts and run data integrity checks. Once unauthorized changes are detected, organizations need a way to confidently restore data to a legitimate previous state.

Motives for data manipulation attacks vary, but short-term profit is rarely the appeal. Campaigns involving data manipulation can take months or years to play out and could be part of a broader cyber sabotage effort. For example, attackers could subtly alter the blueprints of a commercial airliner, which will result in a nonfatal aircraft component failure years in the future. The goal would be to put an airline or an aircraft manufacturer out of business or bring the aviation industry into disrepute. Ultimately, air travel represents one of many pursuits that rely on consumer confidence in the provider in order to be successful, so subtle nefarious changes to data can be ruinous for an entire industry.

Given the lack of financial incentive, coupled with the opportunity to cause widespread disruption or panic, nation-states and terrorist groups are the most likely actors in data manipulation attacks. That’s why the military and intelligence services are taking them seriously.

This is still an emerging type of threat, but security professionals should be thinking now about how to respond. New attack types can spread, and when new attack types emerge quickly, it pays to be prepared.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

As chief technology officer and founder, PJ is responsible for Illumio’s technology vision and platform architecture. PJ has 20 years of experience in engineering, with a focus on addressing the complexities of data centers. Prior to Illumio, PJ was CTO at Cymtec. He also … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/data-manipulation-how-security-pros-can-respond-to-an-emerging-threat/a/d-id/1332844?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

US Approves Cyber Weapons Against Foreign Enemies

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

The Trump administration has authorized the use of “offensive cyber operations” against foreign enemies, officials confirmed in a news briefing this week.

Its announcement aligns with a new, broader policy to relax the rules governing US use of cyber weapons to deter adversaries. The White House is worried about foreign governments targeting US networks, specifically around the November elections. Its latest strategy includes a presidential instruction that replaced a previous order from the Obama administration.

Now, the US military and government agencies can use cyber operations to protect the nation’s systems and networks. National security advisor John Bolton, who confirmed the strategy this week, did not share the specifics of these operations or the attacks they are meant to deter.

Overall, the presidential directive allows the military to use tactics that fall below the “use of force” or those that would lead to “death, destruction or significant economic impacts,” according to a Washington Post report. The government’s strategy is very similar to the Obama administration’s national cybersecurity action plan, which was introduced in 2016.

While some officials don’t believe the new strategy is forceful enough, it does follow a series of cybersecurity-related efforts from the government this week. The Pentagon released a new strategy this week highlighting Russia and China as top US adversaries.

Read more details here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/us-approves-cyber-weapons-against-foreign-enemies/d/d-id/1332866?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

6 Security Training Hacks to Increase Cyber IQ Org-Wide

Move beyond generic, annual security awareness training with these important tips.PreviousNext

Image Source: Adobe Stock (F8studio)

Image Source: Adobe Stock (F8studio)

Some of security’s toughest nuts to crack are the vulnerabilities introduced by the human element. Users are duped by phishers every day. IT operations staff configure infrastructure insecurely over and over again. Developers repeatedly write code in the same insecure fashion. Executives are tricked by business email compromises into wiring large sums of money directly to crooks. And IT security staff is asked to carry out near impossible feats of digital protection because they themselves are poorly trained to set up the tools and practices they need to keep up with attackers.

Clearly something has got to give. Security pundits agree that if organizations are going to make a real dent on cyber-risk, they need to start taking security training to the next level. Here are six suggestions for moving beyond generic annual awareness training and truly increasing cybersecurity IQ across the entire organization.

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full BioPreviousNext

Article source: https://www.darkreading.com/endpoint/6-security-training-hacks-to-increase-cyber-iq-org-wide/d/d-id/1332864?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Warning issued as Netflix subscribers hit by phishing attack

Netflix phishing scammers are at it again – sending emails that try to steal sensitive details from subscribers.

Late last week, Action Fraud – a joint initiative between the City of London Police and the National Fraud Intelligence Bureau – warned Netflix subscribers about a new spate of phishing emails. The scammers are urging victims to enter their Netflix account information and payment details.

Like many phishing scammers, this group let itself down with poorly-worded language. Below a headline which reads ‘Update your payment information!’ the phishing mail says…

We face some difficulties with the current billing information of your own. We will try again, but please at the same time you update your payment details.

At the foot of the mail is a button urging recipients to update their accounts.

Netflix, which has 130m global subscribers, is a popular target for phishers. Back in January we wrote up a similar scam which also targeted Netflix users.

Australians found themselves targeted in June, and in the same month training organization SANS warned of an uptick in Netflix-targeted phishing emails that were using TLS-certified sites.

But why go to the trouble? Netflix accounts themselves aren’t that valuable.

Sadly, many people still use the same passwords for multiple accounts, meaning that if attackers successfully steal a Netflix login, they can try it on other accounts, including email and online banking logins.

What to do?

  • Never click on a login link or an account verification link in an email.
  • Check for the HTTPS padlock.
  • If there is a padlock, check the name of the site. If it’s not exactly what you expect, close the site down.
  • Don’t ignore telltale signs such as spelling and grammar errors.
  • One password, one site. If you’re worried about remembering them all, consider using a password manager.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/1pGu2wvvM2U/

Never mind Brexit. UK must fling more £billions at nuke subs, say MPs

The Ministry of Defence has too many bigshots and not enough grunts – or cash – to reliably keep Britain’s nuclear deterrent hiding beneath the ocean waves, according to Parliament’s Public Accounts Committee.

“At a time when, across the Enterprise, major organisational and governance changes have still to take full effect, the Department needs to bridge a £2.9bn affordability gap, ensure it fills identified skills gaps, sustain its supply chain, and make important decisions on significant, high–profile projects,” warned the PAC, which scrutinises government spending.

While the Dreadnought nuclear missile submarine project is under way, the idea being to build four new boats to replace the ageing Vanguard class submarines currently in service, the PAC warned that “the [MoD] has not met many previous promises and past [submarine] programmes have slipped,” citing the other big British submarine project, the Astute programme, to build seven new attack boats. This is running slightly more than two years late and several million pounds over budget.

Skills shortages, including problems with “attracting and retaining the range of skills they need” has also continued to dog the MoD’s submarine doings, with the PAC saying this is a wider national problem that also affects the civilian nuclear industry.

Also lurking in the background is the small problem of every single previous British nuclear submarine still needing to be safely scrapped. All of them are moored in British naval dockyards, with the MoD having constantly kicked the issue into the long grass in the hope nobody would tell it to foot the hideously expensive bill for dismantling the boats and their nuclear reactors.

This is now a problem because the MoD “does not have enough berthing space at HM Naval Base Devonport to maintain and defuel submarines”, the PAC said.

Over the next ten years some £51bn will be spent on Britain’s nuclear deterrent, according to the PAC, of which £13bn will go on the actual missiles and warheads. £23bn of the sum is being spent on the submarines to carry the deterrent.

While the committee was grudgingly positive about the state of the “nuclear enterprise” (the term for the whole project, from submarines at sea through to companies such as Rolls-Royce, who build the nuclear reactors), it did not identify any safety problems, these being outside its scope.

Lest readers think they can sleep peacefully in their beds, however, it is important to note that the Atomic Weapons Establishment stores at least some of its data on the public cloud. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/09/21/nuclear_submarine_spending_pac_report/

Guilty: The Romanian ransomware mastermind who infected Trump inauguration CCTV cams

A Romanian woman has admitted running a ransomware operation from infected Washington DC’s CCTV systems just days before President Trump was sworn into office in the US capital.

Eveline Cismaru, 28, pled guilty this week to one count of conspiracy to commit wire fraud, and one count of conspiracy to commit computer fraud, after hacking into 123 of the 187 high-tech CCTV cameras dotted around the city. The hijacked devices, used by DC’s Metropolitan Police Department, then spammed up to 180,000 email addresses with ransomware-laden messages.

Police figured out something was wrong after checking CCTV systems ahead of the swearing in of America’s 45th president in January 2017. Each of their CCTV units consists of a camera attached to a Microsoft Windows-powered computer, and the cops noticed that these machines weren’t acting as they should. When they probed one device, they could it was running multiple unexpected applications, and had browser tabs open.

According to district court documents [PDF] the computers were not just spreading ransomware via email, they were infected themselves with variants of the Cerber and Dharma file-scrambling nasties, which demanded $60,800 in Bitcoin to regain control of the 100+ camera network. The extortion notices appeared in the open browser windows.

hacker

No, the Mirai botnet masters aren’t going to jail. Why? ‘Cos they help Feds nab cyber-crims

READ MORE

The plod found on one diseased machine a list of 179,616 email addresses in the US that were being bombarded with spam containing the malware. The infection was cleaned up within five days – then the Secret Service decided to take an interest in the network intrusion.

“This case was of the highest priority due to its impact on the Secret Service’s protective mission and its potential effect on the security plan for the 2017 Presidential Inauguration,” the US Department of Justice said in a statement to The Register.

“Due to the rapid response by investigators and MPD’s Chief Technology Office, the overall security of the 2017 Inauguration was not impacted by this event. The Secret Service and MPD quickly ensured that the surveillance camera system was secure and operational prior to the Inauguration and continued to investigate the criminal offenses.”

Fortunately for the investigators, Cismaru and her accused accomplices weren’t the sharpest tools in the box. They used personal Gmail accounts to orchestrate their campaign, and had accessed them from one of the infected CCTV controller PCs. A forensic analysis of the device revealed these addresses. When the Feds, ahem, brought these to Google’s attention, the web giant agreed to help, and handed over enough account information to lead investigators back to Cismaru and Mihai Alexandru Isvanca, 25.

Both were arrested on December 15 last year, and Cismaru was quickly extradited to the US from Romania. Her compadre is still in that nation for the moment. If convicted, she is looking at a maximum of 25 years behind bars. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/09/21/cctv_ransomware_trump_washington_dc/