{"id":1,"date":"2021-11-30T09:52:00","date_gmt":"2021-11-30T08:52:00","guid":{"rendered":"http:\/\/scpo-cybersecurityassociation.com\/?p=1"},"modified":"2022-02-07T12:39:36","modified_gmt":"2022-02-07T11:39:36","slug":"cyber-monitoring-1-november-2021","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2021\/11\/30\/cyber-monitoring-1-november-2021\/","title":{"rendered":"Cyber Monitoring #2 (November 2021)"},"content":{"rendered":"\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>US and EU joined the Paris Call:&nbsp;<\/strong>Three years after its launch, the United States and the European Union announced plans to join the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=14357367b8&amp;e=9f1453c0d1\" target=\"_blank\">Paris Call for Trust and Security in Cyberspace<\/a>. Established in November 2018 and supported by 80 international states and more than 700 private enterprises, the Paris Call is an international agreement based around nine common principles\u2014from protecting the internet to defending the electoral process\u2014to secure cyberspace.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>New investments for critical infrastructures\u2019 cybersecurity in the US:&nbsp;<\/strong>President Joe Biden formally signed a massive&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=4702dbb2a9&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">infrastructure bill<\/a>&nbsp;that includes $2 billion in new investments in cybersecurity. Local &nbsp; state governments will now be able to apply for large grants to better secure their&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=9320b36411&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">critical infrastructure<\/a>. The bill also includes new rules regarding cryptocurrency transactions in the hopes of slowing down bad actors who use virtual currencies to conduct criminal operations.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>Disinformation in Kenya:<\/strong>&nbsp;A&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=5b1952baae&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">disinformation campaign<\/a>&nbsp;is dampening online outrage about Kenyan President Kenyatta\u2019s alleged corruption detailed in the Pandora Papers, with cheapfakes and astroturfing used to promote pro-Kenyatta narratives and drown out criticism. According to researchers from Mozilla, this illustrates the continued growth of Kenya\u2019s sophisticated disinformation-for-hire industry and Twitter\u2019s inability to counter disinformation in non-Western contexts.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>A spyware hidden inside lifestyle apps:&nbsp;<\/strong>A&nbsp;new Android malware infected nearly 1,000 devices, gaining the ability to record their screen and audio in real-time.&nbsp;The campaign dubbed&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=e61a27f049&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;PhoneSpy&#8221;<\/a>targeted South Korean users through a series of corrupt applications that nestle in compromised devices and quietly exfiltrate data while taking control of the device&#8217;s microphone and camera. The apps disguises themselves as a variety of legitimate applications, including apps to learn yoga, stream television or view and upload their pictures.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>Secretive Chinese committee on tech:&nbsp;<\/strong>In a&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=d3ee22e1b5&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">readout<\/a>&nbsp;of their meeting published two weeks ago, China\u2019s Politburo provided for the first time details on the work of a secretive body whose purpose is to focus on what China called the \u201cmain economic battlefield\u201d of technology. The committee was established around the time that the U.S. leveled sanctions against Chinese telecoms giant ZTE. Self-sufficiency in core technologies has been a watchword in Beijing ever since.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>New joint report released by France and Germany:&nbsp;<\/strong>The French and German Cybersecurity National agencies (ANSSI &amp; BSI) published their 4th&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=2c119c773b&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">joint report<\/a>&nbsp;on the state of cyber threats. This 2021 edition particularly focuses on ransomware. The report draws up an inventory of ransomware groups and of the attacks they may have carried out, including the REvil group which attacked Kaseya, Avaddon, Netwalker or even Egregor. The report also mentions the need for increased bilateral cooperation between the two agencies ie. in the exchange of information between the CERT-Fr and the CERT-Bund).&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>Israel restricts its cyberweapons export:&nbsp;<\/strong>The Israeli government restricted the&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=7064836e74&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">list<\/a>&nbsp;of countries to which local security firms are allowed to sell surveillance and offensive hacking tools by almost two-thirds, cutting the official cyber export list from 102 to 37 entries. The new list only includes countries with proven democracies, such as those from Europe and the Five Eyes coalition. Spyware developed by Israeli companies like Candiru and the NSO Group has been linked in recent years to human rights abuses in tens of countries, with the tools being used by the local governments to spy on reporters, activists, dissidents, and political rivals. The list\u2019s update comes just after Israeli and French officials held a&nbsp;secret meeting&nbsp;to discuss allegations that spyware made by the NSO Group might have been used against French president Macron. The update also came around the same time that the US sanctioned four surveillance vendors,&nbsp;including Israel\u2019s Candiru and NSO Group.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-cyan-bluish-gray-background-color has-cyan-bluish-gray-color is-style-wide\"\/>\n\n\n\n<p><strong>US sanctions quantum computing entities:&nbsp;<\/strong>The US&nbsp;<a href=\"https:\/\/sciencespo.us5.list-manage.com\/track\/click?u=2fd462bf43b63ef48b70f41ee&amp;id=56561833fe&amp;e=9f1453c0d1\" target=\"_blank\" rel=\"noreferrer noopener\">Department of Commerce<\/a>&nbsp;has sanctioned 28 organizations from China, Russia, Pakistan, Japan, and Singapore for helping advance and distribute quantum computing technologies to military and nuclear weapons programs. Quantum computers are considered an evolutional step above supercomputers, using quantum states instead of electrical signals to run mathematical computations millions of times faster than even the world\u2019s most advanced supercomputers. The role of the sanctions list is to forbid US organizations, such as suppliers and customers, from establishing any business connections with the 28 organizations in the hopes of stymying the flow of know-how, financing, and raw materials needed for those companies to continue operating at full capacity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out what happened in the cyberspace during the month of November!<\/p>\n","protected":false},"author":7,"featured_media":273,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":6,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":535,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1\/revisions\/535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/273"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}