<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Jim Finkle | Vox</title>
	<subtitle type="text">Our world has too much noise and too little context. Vox helps you understand what matters.</subtitle>

	<updated>2019-03-06T11:25:37+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.vox.com/author/jim-finkle" />
	<id>https://www.vox.com/authors/jim-finkle/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.vox.com/authors/jim-finkle/rss" />

	<icon>https://platform.vox.com/wp-content/uploads/sites/2/2024/08/vox_logo_rss_light_mode.png?w=150&amp;h=100&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[Premera Blue Cross Breached, Medical Information Exposed]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2015/3/17/11560412/premera-blue-cross-breached-medical-information-exposed" />
			<id>https://www.vox.com/2015/3/17/11560412/premera-blue-cross-breached-medical-information-exposed</id>
			<updated>2019-03-06T05:19:48-05:00</updated>
			<published>2015-03-17T15:01:27-04:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Health insurer Premera Blue Cross said on Tuesday it was a victim of a cyber attack that may have exposed medical data and financial information of 11 million customers in the latest case of a health care company reporting a serious breach. It said the attackers may have gained access to claims data, including clinical [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="grapegeek / iStockphoto" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15794193/hacked_screen.0.1537578188.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Health insurer Premera Blue Cross said on Tuesday it was a victim of a cyber attack that may have exposed medical data and financial information of 11 million customers in the latest case of a health care company reporting a serious breach.</p>

<p>It said the attackers may have gained access to claims data, including clinical information, along with banking account numbers, Social Security numbers, birth dates and other data in an attack that began in May 2014 and was uncovered Jan. 29.</p>

<p>It is the largest breach reported to date involving patient medical information, according to Dave Kennedy, an expert in health care security who is chief executive of TrustedSEC.</p>

<p>Breaches over the past year at health insurer Anthem and hospital operator Community Health Systems involved a larger number of records, but those companies said they believe the attackers did not access medical information.</p>

<p>Medical records are highly valuable on underground criminal exchanges where stolen data is sold because the information is not only highly confidential, it can also be used to engage in insurance fraud.</p>

<p>&ldquo;Medical records paint a really personal picture of somebody&rsquo;s life and medical procedures,&rdquo; Kennedy said. &ldquo;They allow you to perpetrate really in-depth medical fraud.&rdquo;</p>

<p>The insurer said it has so far uncovered no evidence to show that member data was &ldquo;used inappropriately.&rdquo;</p>

<p>The attack affected Premera Blue Cross, Premera Blue Cross Blue Shield of Alaska, and affiliate brands Vivacity and Connexion Insurance Solutions.</p>

<p>&ldquo;We at Premera take this issue seriously and sincerely regret the concern it may cause,&rdquo; Chief Executive Jeff Roe said in a statement.</p>

<p>Premera has set up a hot line to field members&rsquo; calls and is offering free credit monitoring. More information is available at www.premeraupdate.com.</p>

<p>&ldquo;As much as possible, we want to make this event our burden, not that of the affected individuals,&rdquo; Rowe said in the statement.</p>

<p>Premera is working with the FBI and FireEye to investigate the matter.</p>

<p>(Reporting by Jim Finkle; Editing by Dan Grebler)</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[Apple, Google Prep Fixes for Newly Uncovered &#8216;Freak&#8217; Security Bug]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2015/3/3/11559786/apple-google-prep-fixes-for-newly-uncovered-freak-security-bug" />
			<id>https://www.vox.com/2015/3/3/11559786/apple-google-prep-fixes-for-newly-uncovered-freak-security-bug</id>
			<updated>2019-03-06T04:51:52-05:00</updated>
			<published>2015-03-03T16:12:02-05:00</published>
			<category scheme="https://www.vox.com" term="Apple" /><category scheme="https://www.vox.com" term="Big Tech" /><category scheme="https://www.vox.com" term="Google" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Apple and Google said on Tuesday that they have developed fixes to mitigate the newly uncovered &#8220;Freak&#8221; security flaw affecting mobile devices and Mac computers. The vulnerability in Web encryption technology could enable attackers to spy on communications of users of Apple&#8217;s Safari browser and Google&#8217;s Android browser, according to researchers who uncovered the flaw. [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="andrey_l / Shutterstock" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15787344/encryption-key.0.1462603300.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Apple and Google said on Tuesday that they have developed fixes to mitigate the newly uncovered &ldquo;Freak&rdquo; security flaw affecting mobile devices and Mac computers.</p>

<p>The vulnerability in Web encryption technology could enable attackers to spy on communications of users of Apple&rsquo;s Safari browser and Google&rsquo;s Android browser, according to researchers who uncovered the flaw.</p>

<p>Apple spokesman Ryan James said the company had developed a software update to remediate the vulnerability, and it will be pushed out next week.</p>

<p>Google spokeswoman Liz Markman said the company had also developed a patch, which it has provided to partners. She declined to say when users could expect to receive those upgrades. Google typically does not directly push out Android software updates. Instead they are handled by device makers and mobile carriers.</p>

<p>The Washington Post reported that the bug left users of Apple and Google devices vulnerable to cyber attack when visiting hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov.</p>

<p>Whitehouse.gov and FBI.gov have been fixed, but NSA.gov remains vulnerable, the paper cited Johns Hopkins cryptographer Matthew D. Green as saying.</p>

<p>A group of nine researchers discovered that they could force Web browsers to use a form of encryption that was intentionally weakened to comply with U.S. government regulations that ban American companies from exporting the strongest encryption standards, according to the paper.</p>

<p>Once they caused the site to use the weaker export encryption standard, they were then able to break the encryption within a few hours. That could allow hackers to steal data and potentially launch attacks on the sites themselves by taking over elements on a page, the newspaper reported.</p>

<p>Markman said that Google advises all websites to disable support for the less-secure, export-grade encryption.</p>

<p>&ldquo;Android&rsquo;s connections to most websites &mdash; which include Google sites, and others without export certificates &mdash; are not subject to this vulnerability,&rdquo; she added.</p>

<p>The group of researchers dubbed the flaw Freak, for &ldquo;Factoring RSA-EXPORT Keys,&rdquo; according to a website where they described the vulnerability.</p>

<p>(Reporting by Jim Finkle; Editing by Christian Plumb, Bernard Orr)</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[Sony Works for Third Day to Restore PlayStation Network After Attack]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2014/12/27/11634048/sony-works-for-third-day-to-restore-playstation-after-attack" />
			<id>https://www.vox.com/2014/12/27/11634048/sony-works-for-third-day-to-restore-playstation-after-attack</id>
			<updated>2019-03-06T05:58:17-05:00</updated>
			<published>2014-12-27T15:46:52-05:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Sony Corp worked for a third day on Saturday to restore services to its PlayStation online gaming network after a Christmas Day cyber attack shuttered access to some customers, including holiday recipients of new game consoles. &#8220;If you received a PlayStation console over the holidays and have been unable to log onto the network, know [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Reuters / Toru Hanai" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15803906/sony-logo-display.0.1537362525.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Sony Corp worked for a third day on Saturday to restore services to its PlayStation online gaming network after a Christmas Day cyber attack shuttered access to some customers, including holiday recipients of new game consoles.</p>

<p>&ldquo;If you received a PlayStation console over the holidays and have been unable to log onto the network, know that this problem is temporary and is not caused by your game console,&rdquo; Sony executive Catherine Jensen said in a Saturday posting on the company&rsquo;s U.S. PlayStation blog.</p>

<p>She said the problems were the result of &ldquo;high levels of traffic designed to disrupt connectivity and online game play,&rdquo; a technique widely known as a distributed denial-of-service, or DDoS.</p>

<p>It was Sony&rsquo;s second recent high-profile encounter with hackers after an unprecedented attack on its Hollywood studio, which Washington has attributed to the North Korean government and linked to the release of the low-brow comedy &ldquo;The Interview.&rdquo;</p>

<p>Sony spokeswoman Jennifer Clark declined to say how many of PSN&rsquo;s 56 millions users could not gain access to the network.</p>

<p>Customer response was mixed to requests from Sony&rsquo;s Twitter support account to be patient.</p>

<p>One person tweeted: &ldquo;You keep repeating this same line like a parrot. WHAT exactly is the team doing?&rdquo;</p>

<p>&ldquo;That&rsquo;s OK. We know you&rsquo;re trying your best,&rdquo; another said via Twitter. &ldquo;We all hate the hackers that did this.&rdquo;</p>

<p>A hacker activist group known as Lizard Squad said it was responsible for the PSN outage as well as delays on Microsoft&rsquo;s Corp&rsquo;s Xbox network; Microsoft quickly fixed the problem.</p>

<p>Mikko Hypponen, chief research officer of security software maker F-Secure, said he knows of no reasonable motive for attacking Sony or Microsoft.</p>

<p>&ldquo;The attackers have no motive whatsoever for their DDoS attacks against Sony or Microsoft,&rdquo; he said.</p>

<p>The group has claimed responsibility for previous cyber attacks, including ones on PSN in early December and August.</p>

<p>The attack in August coincided with a bomb scare on a commercial jet in which Lizard Squad tweeted to American Airlines that it heard explosives were on board a Dallas-to-San Diego flight carrying an executive with Sony Online Entertainment.</p>

<p>Sony has been the victim of some of the most notorious cyber attacks in history. Besides the breach at its Hollywood studio, hackers stole data belonging to 77 million PlayStation Network users in 2011.</p>

<p>(Reporting by Jim Finkle; editing by Stephen Powell and Steve Orlofsky)</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[FBI: Iran Hackers May Target U.S. Energy, Defense Firms]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2014/12/13/11633786/iran-hackers-may-target-u-s-energy-defense-firms-fbi-warns" />
			<id>https://www.vox.com/2014/12/13/11633786/iran-hackers-may-target-u-s-energy-defense-firms-fbi-warns</id>
			<updated>2019-03-06T06:25:37-05:00</updated>
			<published>2014-12-13T12:08:42-05:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[The Federal Bureau of Investigation has warned U.S. businesses to be on the alert for a sophisticated Iranian hacking operation whose targets include defense contractors, energy firms and educational institutions, according to a confidential agency document. The operation is the same as one flagged last week by cyber security firm Cylance Inc as targeting critical [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Reuters/Pawel Kopczynski" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15810618/r.0.1462687833.jpeg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The Federal Bureau of Investigation has warned U.S. businesses to be on the alert for a sophisticated Iranian hacking operation whose targets include defense contractors, energy firms and educational institutions, according to a confidential agency document.</p>

<p>The operation is the same as one flagged last week by cyber security firm Cylance Inc as targeting critical infrastructure organizations worldwide, cyber security experts said. Cylance has said it uncovered more than 50 victims from what it dubbed Operation Cleaver, in 16 countries, including the United States.</p>

<p>The FBI&rsquo;s confidential &ldquo;Flash&rdquo; report, seen by Reuters on Friday, provides technical details about malicious software and techniques used in the attacks, along with advice on thwarting the hackers. It asked businesses to contact the FBI if they believed they were victims.</p>

<p>Cylance Chief Executive Stuart McClure said the FBI warning suggested that the Iranian hacking campaign may have been larger than its own research revealed. &ldquo;It underscores Iran&rsquo;s determination and fixation on large-scale compromise of critical infrastructure,&rdquo; he said.</p>

<p>The FBI&rsquo;s technical document said the hackers typically launch their attacks from two IP addresses that are in Iran, but did not attribute the attacks to the Tehran government. Cylance has said it believes Iran&rsquo;s government is behind the campaign, a claim Iran has vehemently denied.</p>

<p>An FBI official did not provide further details, but said the agency routinely provides private industry with advisories to help it fend off cyber threats.</p>

<p>The Pentagon and National Security Agency had no immediate comment.</p>

<p>Tehran has been substantially increasing investment in its cyber capabilities since 2010, when its nuclear program was hit by the Stuxnet computer virus, widely believed to have been launched by the United States and Israel.</p>

<p>Cyber security professionals who investigate cyber attacks said that they are seeing evidence that Iran&rsquo;s investment is paying off.</p>

<p>&ldquo;They are good and have a lot of talent in the country,&rdquo; said Dave Kennedy, CEO of TrustedSEC LLC. &ldquo;They are definitely a serious threat, no question.&rdquo;</p>

<p>Iranian hackers are increasingly being blamed for sophisticated cyberattacks.</p>

<p>Bloomberg Businessweek on Thursday reported that Iranian hacker activists were responsible for a devastating February 2014 attack on casino operator Las Vegas Sands Corp, which crippled thousands of servers by wiping them with destructive malware. It said the hackers sought to punish Sands CEO Sheldon Adelson for comments he made about detonating a nuclear bomb in Iran.</p>

<p><em>(Reporting by Jim Finkle. Additional reporting by Mark Hosenball and Andrea Shalal in Washington; Editing by Christian Plumb)</em></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[Iran Hackers Targeted Airlines, Energy Firms: Report]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2014/12/2/11633458/iran-hackers-targeted-airlines-energy-firms-report" />
			<id>https://www.vox.com/2014/12/2/11633458/iran-hackers-targeted-airlines-energy-firms-report</id>
			<updated>2019-03-06T06:03:25-05:00</updated>
			<published>2014-12-02T14:46:25-05:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Iranian hackers have infiltrated some of the world&#8217;s top energy, transport and infrastructure companies over the past two years in a campaign that could allow them to eventually cause physical damage, according to U.S. cyber security firm Cylance. Aerospace firms, airports and airlines, universities, energy firms, hospitals, and telecommunications operators based in the United States, [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Reuters / Kacper Pempel" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15805204/hacking-cyber-crime.0.1462687182.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Iranian hackers have infiltrated some of the world&rsquo;s top energy, transport and infrastructure companies over the past two years in a campaign that could allow them to eventually cause physical damage, according to U.S. cyber security firm Cylance.</p>

<p>Aerospace firms, airports and airlines, universities, energy firms, hospitals, and telecommunications operators based in the United States, Israel, China, Saudi Arabia, India, Germany, France, England have been hit by the campaign, the research firm said, without naming individual companies.</p>

<p>A person familiar with the research said U.S. energy firm Calpine Corp, state-controlled oil companies Saudi Aramco and Petroleos Mexicanos (Pemex), as well as flag carriers Qatar Airlines and Korean Air were among the specific targets.</p>

<p>The 87-page report comes as governments scramble to better understand Iran&rsquo;s cyber capabilities, which researchers say have grown rapidly as Tehran seeks to retaliate for Western cyber attacks on its nuclear program.</p>

<p>&ldquo;We believe that if the operation is left to continue unabated, it is only a matter of time before the team impacts the world&rsquo;s physical safety,&rdquo; Cylance said.</p>

<p>The California-based company said its researchers uncovered breaches affecting more than 50 entities and had evidence they were committed by the same Tehran-based group that was behind a previously reported 2013 cyber attack on a U.S. Navy network.</p>

<p>A Pemex spokesman said the company had not detected any attacks from the Iranian groups but was constantly monitoring. Officials at the other companies were not immediately available to comment.</p>

<p>A diplomatic representative for Iran said Cylance&rsquo;s claim was groundless. &ldquo;This is a baseless and unfounded allegation fabricated to tarnish the Iranian government image, particularly aimed at hampering current nuclear talks,&rdquo; said Hamid Babaei, spokesman for Iran&rsquo;s mission to the United Nations.</p>

<p>Reuters was unable to independently vet the research ahead of its publication. Cylance said it has reported the alleged hacking operation to some victims as well as to the U.S. Federal Bureau of Investigation. An FBI spokesman declined comment.</p>

<p>Cylance&rsquo;s research provides a new example of how governments may be using cyber technology as a tool for spying and staging attacks on rival states.</p>

<p>Russian and Chinese hackers have been blamed for a variety of corporate and government cyber attacks, while the United States and Israel are believed to have used a computer worm to slow development of Iran&rsquo;s nuclear program.</p>

<p>Tehran has been investing heavily in its cyber capabilities since 2010, when its nuclear program was hit by the Stuxnet computer virus, widely believed to have been launched by the United States and Israel. Iran has said its nuclear program is intended for the production of civilian electricity, and denies Western accusations it is seeking to build a nuclear bomb.</p>

<p>Cylance said the Iranian hacking group has so far focused its campaign &ndash; dubbed Operation Cleaver &ndash; on intelligence gathering, but that it likely has the ability to launch attacks.</p>

<p>It said researchers who succeeded in gaining access to some of the hackers&rsquo; infrastructure found massive databases of user credentials and passwords, diagrams, and screenshots from organizations including energy, transportation, and aerospace companies, as well as universities.</p>

<p>It would not be the first time Saudi Aramco has been targeted by hackers. In 2012, some 30,000 computers at the oil company were infected by a virus known as Shamoon, in one of the most destructive such strikes conducted against a single business. Some U.S. officials have said they believe Iran was behind that attack.</p>

<p>Cylance said its researchers also obtained hundreds of files apparently stolen by the Iranian group from the U.S. Navy&rsquo;s Marine Corps Intranet (NMCI). U.S. government sources had confirmed that Iran was behind the 2013 NMCI breach, but did not provide further details.</p>

<p>A U.S. defense official said on Monday it took about four months to &ldquo;maneuver the (NMCI) network&rdquo; to ensure that it was free of intruders. The official said that while the incident was officially characterized as a &ldquo;serious intrusion,&rdquo; no networks were damaged as a result of the breach.</p>

<p>Cylance said ten companies targeted in Operation Cleaver were U.S.-based.</p>

<p>Cylance&rsquo;s report is the latest to show evidence of Iranian hacking of U.S. interests. Cyber security firm FireEye Inc in May said that an Iranian hacking group was behind an series of attacks on U.S. defense companies.</p>

<p>The cyber intelligence firm iSight Partners also reported in May that it had uncovered an unprecedented, three-year campaign in which Iranian hackers had created false social networking accounts and a bogus news website to spy on leaders in the United States, Israel and other countries.</p>

<p>(Reporting by Jim Finkle. Additional reporting by Tanya Ashreena, Tova Cohen, Katharine Houreld, Michelle Nichols, Randall Palmer, Euan Rocha, Alwyn Scott, Andrea Shalal, Matthew Smith, Bernie Woodall, and David Alire Garcia; Editing by Richard Valdmanis, Christian Plumb and W Simon)</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[Cyber Ring Stole Secrets for Gaming U.S. Stock Market: FireEye]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2014/12/1/11633408/cyber-ring-stole-secrets-for-gaming-u-s-stock-market-fireeye" />
			<id>https://www.vox.com/2014/12/1/11633408/cyber-ring-stole-secrets-for-gaming-u-s-stock-market-fireeye</id>
			<updated>2019-03-06T06:25:08-05:00</updated>
			<published>2014-12-01T14:15:51-05:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Security researchers say they have uncovered a cyber espionage ring focused on stealing corporate secrets for the purpose of gaming the stock market, in an operation that has compromised sensitive data about dozens of publicly held companies. Cybersecurity firm FireEye, which disclosed the operation on Monday, said that since the middle of last year, the [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Maksim Kabakou / Shutterstock" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15810479/security-lock-maksim-kabakou-shutterstock.0.1462687161.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Security researchers say they have uncovered a cyber espionage ring focused on stealing corporate secrets for the purpose of gaming the stock market, in an operation that has compromised sensitive data about dozens of publicly held companies.</p>

<p>Cybersecurity firm FireEye, which disclosed the operation on Monday, said that since the middle of last year, the group has attacked email accounts at more than 100 firms, most of them pharmaceutical and healthcare companies.</p>

<p>Victims also include firms in other sectors, as well as corporate advisors including investment bankers, attorneys and investor relations firms, according to FireEye.</p>

<p>The cybersecurity firm declined to identify the victims. It said it did not know whether any trades were actually made based on the stolen data.</p>

<p>Still, FireEye Threat Intelligence Manager Jen Weedon said the hackers only targeted people with access to highly insider data that could be used to profit on trades before that data was made public.</p>

<p>They sought data that included drafts of U.S. Securities and Exchange Commission filings, documents on merger activity, discussions of legal cases, board planning documents and medical research results, she said.</p>

<p>&ldquo;They are pursuing sensitive information that would give them privileged insight into stock market dynamics,&rdquo; Weedon said.</p>

<p>The victims ranged from small to large cap corporations. Most are in the United States and trade on the New York Stock Exchange or Nasdaq, she said.</p>

<p>An FBI spokesman declined comment on the group, which FireEye said it reported to the bureau.</p>

<p>The security firm designated it as FIN4 because it is number 4 among the large, advanced financially motivated groups tracked by FireEye.</p>

<p>The hackers don&rsquo;t infect the PCs of their victims. Instead they steal passwords to email accounts, then use them to access those accounts via the Internet, according to FireEye.</p>

<p>They expand their networks by posing as users of compromised accounts, sending phishing emails to associates, Weedon said.</p>

<p>FireEye has not identified the hackers or located them because they hide their tracks using Tor, a service for making the location of Internet users anonymous.</p>

<p>FireEye said it believes they are most likely based in the United States, or maybe Western Europe, based on the language they use in their phishing emails, Weedon said.</p>

<p>She said the firm is confident that FIN4 is not from China, based on the content of their phishing emails and their other techniques.</p>

<p>Researchers often look to China when assessing blame for economically motivated cyber espionage. The United States has accused the Chinese government of encouraging hackers to steal corporate secrets, allegations that Beijing has denied, causing tension between the two countries.</p>

<p>Weedon suspects the hackers were trained at Western investment banks, giving them the know-how to identify their targets and draft convincing phishing emails.</p>

<p>&ldquo;They are applying their knowledge of how the investment banking community works,&rdquo; Weedon said.</p>

<p>(Editing by Eric Walsh)</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[U.S. Government Probes Medical Devices for Possible Cyber Flaws]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2014/10/22/11632130/u-s-government-probes-medical-devices-for-possible-cyber-flaws" />
			<id>https://www.vox.com/2014/10/22/11632130/u-s-government-probes-medical-devices-for-possible-cyber-flaws</id>
			<updated>2019-03-06T06:22:53-05:00</updated>
			<published>2014-10-22T01:39:21-04:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cyber security flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters. The products under review by the agency&#8217;s Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Reuters / Brian Losness" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15809969/medtronic-insulin-pump.0.1462686466.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cyber security flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters.</p>

<p>The products under review by the agency&rsquo;s Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, include an infusion pump from Hospira and implantable heart devices from Medtronic and St. Jude Medical, according to other people familiar with the cases, who asked not to be identified because the probes are confidential.</p>

<p>These people said they do not know of any instances of hackers attacking patients through these devices, so the cyber threat should not be overstated. Still, the agency is concerned that malicious actors may try to gain control of the devices remotely and create problems, such as instructing an infusion pump to overdose a patient with drugs, or forcing a heart implant to deliver a deadly jolt of electricity, the sources said.</p>

<p>The senior DHS official said the agency is working with manufacturers to identify and repair software coding bugs and other vulnerabilities that hackers can potentially use to expose confidential data or attack hospital equipment. He declined to name the companies.</p>

<p>&ldquo;These are the things that shows like &lsquo;Homeland&rsquo; are built from,&rdquo; said the official, referring to the U.S. television spy drama in which the fictional vice president of the United States is killed by a cyber attack on his pacemaker.</p>

<p>&ldquo;It isn&rsquo;t out of the realm of the possible to cause severe injury or death,&rdquo; said the official, who did not want to be identified due to the sensitive nature of his work.</p>

<p>Hospira, Medtronic and St. Jude Medical declined to comment on the DHS investigations. All three companies said they take cyber security seriously and have made changes to improve product safety, but declined to give details.</p>

<p>ICS-CERT&rsquo;s mandate is to help protect critical U.S. infrastructure from cyber threats, whether they are introduced through human error, virus infections or through attacks by criminals or extremists.</p>

<p>According to the senior DHS official, the agency started examining health care equipment about two years ago, when cyber security researchers were becoming more interested in medical devices that increasingly contained computer chips, software, wireless technology and Internet connectivity, making them more susceptible to hacking.</p>

<p>The U.S. Food and Drug Administration, which regulates the sale of medical devices, recently released guidelines for manufacturers and health care providers to better secure medical devices and is holding its first public conference on the topic this week.</p>

<p>&ldquo;The conventional wisdom in the past was that products only had to be protected from unintentional threats. Now they also have to be protected from intentional threats too,&rdquo; said William Maisel, chief scientist at the FDA&rsquo;s Center for Devices and Radiological Health. He declined to comment on the DHS reviews.</p>

<p>The senior DHS official said the two dozen cases currently under investigation cover a wide range of equipment, including medical imaging equipment and hospital networking systems. A DHS review does not imply the government thinks a company has done anything wrong &mdash; it means the agency is looking into a suspected vulnerability to try to help rectify it.</p>

<p>One of the cases involves an alleged vulnerability in a type of infusion pump, a piece of hospital equipment that delivers medication directly into a patient&rsquo;s bloodstream. Private cyber security researcher Billy Rios said he discovered the alleged bug but declined to identify the manufacturer of the pump. Two people familiar with his research said the manufacturer was Hospira.</p>

<p>Rios said he wrote a program that could remotely force multiple pumps to dose patients with potentially lethal amounts of drugs. He submitted his analysis to the DHS.</p>

<p>&ldquo;This is a issue that is going to be extremely difficult to patch,&rdquo; said Rios, a former Marine platoon commander who has worked for several Silicon Valley technology firms and recently founded security startup Laconicly.</p>

<p>Reuters was not able to independently review his research or identify the type of pump Rios studied from Hospira&rsquo;s line, which includes multiple models.</p>

<p>Hospira spokeswoman Tareta Adams, while declining to comment on specifics, said the company is working to improve the security of its products.</p>

<p>&ldquo;Hospira has implemented software adjustments, distributed customer communications and made a commitment to evaluate other changes going forward, while ensuring we are not adversely impacting the ability of our devices to meet hospital and patient needs, and maintain compliance with FDA product requirements,&rdquo; Adams said in the statement.</p>

<p>Hospital security officers say there is increasing awareness about cyber threats, and medical centers around the country have been shoring up networks to better defend against hackers.</p>

<p>At the University of Texas M.D. Anderson Cancer Center, all medical devices will soon need to be tested to make sure they meet security standards before they can be put on the hospital&rsquo;s network, according to Lessley Stoltenberg, the center&rsquo;s chief information security officer.</p>

<p>&ldquo;I&rsquo;m pretty concerned,&rdquo; said Stoltenberg. &ldquo;Coming out of the block, medical devices don&rsquo;t really have security built into them.&rdquo;</p>

<p>The DHS is also reviewing suspected vulnerabilities in implantable heart devices from Medtronic and St. Jude Medical, according to two people familiar with the matter.</p>

<p>They said the probe was based in part on research by Barnaby Jack, a well-known hacker who died in July 2013. Jack had said he could hack into wireless communications systems that link implanted pacemakers and defibrillators with bedside monitors.</p>

<p>Medtronic spokeswoman Marie Yarroll said in an email that the company has &ldquo;made changes to enhance the security&rdquo; of its implantable cardiac devices, but declined to give specifics &ldquo;in the interest of patient safety.&rdquo;</p>

<p>St. Jude Medical spokeswoman Candace Steele Flippin also declined to discuss specific products but said the company has &ldquo;an ongoing program to perform extensive security testing on our medical devices and networked equipment. If a risk is identified, we will issue patches for any known issues.&rdquo;</p>

<p>Experts said it is important that security vulnerabilities in medical devices are exposed so manufacturers can fix them, but many said there was no need for patients to panic.</p>

<p>&ldquo;It&rsquo;s very easy to sort of sensationalize these problems,&rdquo; said Kevin Fu, who runs the Archimedes Research Center for Medical Device Security at the University of Michigan.</p>

<p>Still, worries about cyber security have made some individuals wary of medical devices with wireless and Internet connections.</p>

<p>In 2007, then-U.S. Vice President Dick Cheney ordered some of the wireless features to be disabled on his defibrillator due to security concerns. When asked if he would recommend other patients do the same, Cheney said not necessarily.</p>

<p>&ldquo;You&rsquo;ve got to look at all eventualities and do whatever you have to safeguard the capabilities of the individual,&rdquo; Cheney told Reuters on Tuesday. &ldquo;In terms of how it would affect others, I think the president and vice president are in relatively unique circumstances.&rdquo;</p>

<p>Cyber researcher Jay Radcliffe used to be among the hundreds of thousands of diabetics relying on computerized insulin pumps. He said he stopped using his Medtronic pump after he found that he could hack into its wireless communications system and potentially dump fatal doses of insulin into his body.</p>

<p>&ldquo;I don&rsquo;t feel safe wearing these devices,&rdquo; said Radcliffe, who works for Rapid7, a security software maker. &ldquo;It&rsquo;s better for me to stick myself with a needle.&rdquo;</p>

<p>Medtronic said it has made security improvements to its insulin pumps, though the company declined to give specifics.</p>

<p>George Grunberger, who has led the insulin pump management task force of the American Association of Clinical Endocrynologists, said he believes the benefits of pumps far outweigh any cyber risks, so he would not advise patients to follow Radcliffe&rsquo;s example.</p>

<p>(Reporting by Jim Finkle; Editing by Tiffany Wu)</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[&#8220;Bash&#8221; Software Bug May Pose Bigger Threat Than &#8220;Heartbleed&#8221;]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2014/9/24/11631262/bash-software-bug-may-pose-bigger-threat-than-heartbleed" />
			<id>https://www.vox.com/2014/9/24/11631262/bash-software-bug-may-pose-bigger-threat-than-heartbleed</id>
			<updated>2019-03-06T06:00:04-05:00</updated>
			<published>2014-09-24T17:16:04-04:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[A newly discovered security bug in a widely used piece of Linux software, known as &#8220;Bash,&#8221; could pose a bigger threat to computer users than the &#8220;Heartbleed&#8221; bug that surfaced in April, cyber experts warned on Wednesday. Bash is the software used to control the command prompt on many Linux computers. Hackers can exploit a [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Sergey Nivens / Shutterstock" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15804336/computer-security.0.1543128458.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>A newly discovered security bug in a widely used piece of Linux software, known as &ldquo;Bash,&rdquo; could pose a bigger threat to computer users than the &ldquo;Heartbleed&rdquo; bug that surfaced in April, cyber experts warned on Wednesday.</p>

<p>Bash is the software used to control the command prompt on many Linux computers. Hackers can exploit a bug in Bash to take complete control of a targeted system, security experts said.</p>

<p>The &ldquo;Heartbleed&rdquo; bug allowed hackers to spy on computers, but not take control of them, according to Dan Guido, chief executive of cyber security firm Trail of Bits.</p>

<p>&ldquo;The method of exploiting this issue is also far simpler. You can just cut and paste a line of code and get good results,&rdquo; he said.</p>

<p>Guido said he is considering taking his company&rsquo;s non-essential servers offline to protect them from being attacked by the Bash bug until he can patch the software.</p>

<p>Tod Beardsley, an engineering manager at cyber security firm Rapid7, warned that the bug was rated a &ldquo;10&rdquo; for severity, meaning it has maximum impact, and rated &ldquo;low&rdquo; for complexity of exploitation, meaning it is relatively easy for hackers to launch attacks.</p>

<p>&ldquo;Using this vulnerability, attackers can potentially take over the operating system, access confidential information, make changes, etc.,&rdquo; Beardsley said. &ldquo;Anybody with systems using Bash needs to deploy the patch immediately.&rdquo;</p>

<p>&ldquo;Heartbleed,&rdquo; discovered in April, is a bug in an open-source encryption software called OpenSSL. The bug put the data of millions of people at risk as OpenSSL is used in about two-thirds of all websites. It also forced dozens of technology companies to issue security patches for hundreds of products that use OpenSSL.</p>

<p>(Reporting by Jim Finkle; Editing by Tiffany Wu)</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jim Finkle</name>
			</author>
			
			<title type="html"><![CDATA[Hackers Can Tap USB Devices, Researcher Warns]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2014/7/31/11629394/hackers-can-tap-usb-devices-researcher-warns" />
			<id>https://www.vox.com/2014/7/31/11629394/hackers-can-tap-usb-devices-researcher-warns</id>
			<updated>2019-03-06T06:18:47-05:00</updated>
			<published>2014-07-31T12:31:23-04:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[USB devices such as keyboards, thumb-drives and mice can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher revealed on Thursday. Karsten Nohl, chief scientist with Berlin&#8217;s SR Labs, noted that hackers could load malicious software onto tiny, low-cost computer [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Reuters / Thomas Peter" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15808962/karsten-nohl-sr-labs.0.1467743348.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>USB devices such as keyboards, thumb-drives and mice can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher revealed on Thursday.</p>

<p>Karsten Nohl, chief scientist with Berlin&rsquo;s SR Labs, noted that hackers could load malicious software onto tiny, low-cost computer chips that control functions of USB devices but which have no built-in shields against tampering with their code.</p>

<p>&ldquo;You cannot tell where the virus came from. It is almost like a magic trick,&rdquo; said Nohl, whose research firm is known for uncovering major flaws in mobile phone technology.</p>

<p>The finding shows that bugs in software used to run tiny electronics components that are invisible to the average computer user can be extremely dangerous when hackers figure out how to exploit them. Security researchers have increasingly turned their attention to uncovering such flaws.</p>

<p>Nohl said his firm has performed attacks by writing malicious code onto USB control chips used in thumb drives and smartphones. Once the USB device is attached to a computer, the malicious software can log keystrokes, spy on communications and destroy data, he said.</p>

<p>Computers do not detect the infections when tainted devices are inserted because anti-virus programs are only designed to scan for software written onto memory and do not scan the &ldquo;firmware&rdquo; that controls the functioning of those devices, he said.</p>

<p>Nohl and Jakob Lell, a security researcher at SR Labs, will describe their attack method at next week&rsquo;s Black Hat hacking conference in Las Vegas, in a presentation titled: &ldquo;Bad USB &ndash; On Accessories that Turn Evil.&rdquo;</p>

<p>Thousands of security professionals gather at the annual conference to hear about the latest hacking techniques, including ones that threaten the security of business computers, consumer electronics and critical infrastructure.</p>

<p>Nohl said he would not be surprised if intelligence agencies, like the National Security Agency, have already figured out how to launch attacks using this technique.</p>

<p>Last year, he presented research at Black Hat on breakthrough methods for remotely attacking SIM cards on mobile phones. In December, documents leaked by former NSA contractor Edward Snowden demonstrated that the U.S. spy agency was using a similar technique for surveillance, which it called &ldquo;Monkey Calendar.&rdquo;</p>

<p>An NSA spokeswoman declined to comment.</p>

<p>SR Labs tested the technique by infecting controller chips made by a major Taiwanese manufacturer, Phison Electronics, and placing them in USB memory drives and smartphones running Google&rsquo;s Android operating system.</p>

<p>Alex Chiu, an attorney with Phison, told Reuters via email that Nohl had contacted the company about his research in May.</p>

<p>&ldquo;Mr. Nohl did not offer detailed analysis together with work product to prove his finding,&rdquo; Chiu said. &ldquo;Phison does not have ground to comment (on) his allegation.&rdquo;</p>

<p>Chiu said that &ldquo;from Phison&rsquo;s reasonable knowledge and belief, it is hardly possible to rewrite Phison&rsquo;s controller firmware without accessing our confidential information.&rdquo;</p>

<p>Similar chips are made by Silicon Motion Technology Corp and Alcor Micro Corp. Nohl said his firm did not test devices with chips from those manufacturers.</p>

<p>Google did not respond to requests for comment. Officials with Silicon Motion and Alcor Micro could not immediately be reached.</p>

<p>Nohl believed hackers would have a &ldquo;high chance&rdquo; of corrupting other kinds of controller chips besides those made by Phison, because their manufacturers are not required to secure software. He said those chips, once infected, could be used to infect mice, keyboards and other devices that connect via USB.</p>

<p>&ldquo;The sky is the limit. You can do anything at all,&rdquo; he said.</p>

<p>In his tests, Nohl said he was able to gain remote access to a computer by having the USB instruct the computer to download a malicious program with instructions that the PC believed were coming from a keyboard. He was also able to change what are known as DNS network settings on a computer, essentially instructing the machine to route Internet traffic through malicious servers.</p>

<p>Once a computer is infected, it could be programmed to infect all USB devices that are subsequently attached to it, which would then corrupt machines that they contact.</p>

<p>&ldquo;Now all of your USB devices are infected. It becomes self-propagating and extremely persistent,&rdquo; Nohl said. &ldquo;You can never remove it.&rdquo;</p>

<p>Christof Paar, a professor of electrical engineering at Germany&rsquo;s University of Bochum who reviewed the findings, said he believed the new research would prompt others to take a closer look at USB technology, and potentially lead to the discovery of more bugs. He urged manufacturers to improve protection of their chips to thwart attacks.</p>

<p>&ldquo;The manufacturer should make it much harder to change the software that runs on a USB stick,&rdquo; Paar said.</p>

<p>(Additional reporting by Michael Gold in Taipei; Editing by Richard Valdmanis, Richard Chang and Bernadette Baum)</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
	</feed>
