[Newsclips] IETF SYN-ACK Newspack 2020-11-02

David Goldstein <david@goldsteinreport.com> Mon, 02 November 2020 10:07 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B73A63A0E60 for <newsclips@ietfa.amsl.com>; Mon, 2 Nov 2020 02:07:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.112
X-Spam-Level: *
X-Spam-Status: No, score=1.112 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_RUURL=3, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QpFuXmsGdzoL for <newsclips@ietfa.amsl.com>; Mon, 2 Nov 2020 02:07:32 -0800 (PST)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A64923A0DF4 for <newsclips@ietf.org>; Mon, 2 Nov 2020 02:07:31 -0800 (PST)
Received: from DGSurfaceBook (unknown [101.184.63.251]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id BBCC7280892 for <newsclips@ietf.org>; Mon, 2 Nov 2020 05:07:27 -0500 (EST)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 101.184.63.251) smtp.mailfrom=david@goldsteinreport.com smtp.helo=DGSurfaceBook
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: "David Goldstein" <david@goldsteinreport.com>
To: <newsclips@ietf.org>
Date: Mon, 2 Nov 2020 21:07:25 +1100
Message-ID: <001101d6b0ff$f8fc1f30$eaf45d90$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0012_01D6B15C.2C6F0830"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Adaw//aD+0KBTBvdQiq3XLT/yN0o3Q==
Content-Language: en-au
X-PPP-Message-ID: <20201102100729.879884.51664@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/xjjByBOAI7rr7OduAHPcnAsVgZY>
Subject: [Newsclips] IETF SYN-ACK Newspack 2020-11-02
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Nov 2020 10:07:46 -0000

The IETF SYNACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Letter from Göran Marby, President & CEO | ICANN, to IETF Trust

Proposed Policy on Rights in IANA Parameter Registry Data

< <https://www.icann.org/en/system/files/correspondence/marby-to-ietf-trust-30oct20-en.pdf> https://www.icann.org/en/system/files/correspondence/marby-to-ietf-trust-30oct20-en.pdf>

 

Jim Schaad (1959–2020): Remembering the August Cellars' founder

James “Jim” Lewis Schaad was born Feb. 2, 1959, in Corvallis. He graduated from Corvallis High School in 1977. While there, he was a member of the First United Methodist Church, earned his Eagle Scout, and ran cross country for CHS. Schaad participated in a 3-2 program between Willamette University and Columbia University in New York City. He graduated in 1983 with a Bachelor of Science in chemistry from Willamette and a Bachelor of Science in metallurgical engineering from Columbia. Schaad subsequently earned his master’s in computer science in 1985 from the University of Washington. Upon graduation, he was hired by a new computer company, Microsoft, where he worked until he was able to retire in 2000. He continued working by freelancing in international computer security, including for the National Security Administration (NSA), traveling all over the world to attend Internet Engineering Taskforce (IETF) conferences and work groups.

< <https://www.oregonwinepress.com/jim-schaad-1959-ndash-2020> https://www.oregonwinepress.com/jim-schaad-1959-ndash-2020>

 

An Experimental Study of IoT Networks Under Internal Routing Attack

Abstract: Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The IETF provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position, attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.

< <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3690813> https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3690813>

 

New IP: ICANN Office of the Chief Technology Officer

Executive Summary: ... New IP is driven by Huawei and its subsidiary, Futurewei. New IP’s relationship to Network 2030 is unclear because New IP proponents tend to use the two names interchangeably. At best, New IP can be seen as a set of desired features to implement the use case described in Network 2030. However, there are no publicly available, definitive, and complete descriptions of what New IP is. As such, it can only be seen at best as “work in progress” and cannot be fully analyzed and compared to a standard such as the TCP/IP protocol suite. Hints can be found in Huawei blogs, a Futurewei Internet Draft submitted to the IETF, slides from a guest talk at an Institute of Electrical and Electronics Engineers (IEEE) conference, and in an ITU-T liaison statement to the IETF.

< <https://www.icann.org/en/system/files/files/octo-017-27oct20-en.pdf> https://www.icann.org/en/system/files/files/octo-017-27oct20-en.pdf>

 

Endress+Hauser establishes internet security standards

The cryptography working group within the IETF standards organization (Internet Engineering Task Force) has chosen the Endress+Hauser-developed CPace protocol as a recommended method for use in internet standards.

< <https://impeller.net/magazin/endresshauser-establishes-internet-security-standards/> https://impeller.net/magazin/endresshauser-establishes-internet-security-standards/>

 

India Internet Engineering Society (IIESoc) receives a prestigious grant from the Information Society Innovation Fund (ISIF Asia) to help with IPv6 Deployment

... The grant was given to the India Internet Engineering Society (IIESoc), a non-profit that brings together different stakeholders from the computer networking community across industry, academia, service providers, and government. It exists to further the adoption of IETF standards and increase awareness and participation in the IETF process from the subcontinent.

< <https://www.devdiscourse.com/article/business/1276166-india-internet-engineering-society-iiesoc-receives-a-prestigious-grant-from-the-information-society-innovation-fund-isif-a> https://www.devdiscourse.com/article/business/1276166-india-internet-engineering-society-iiesoc-receives-a-prestigious-grant-from-the-information-society-innovation-fund-isif-a>

 

U.S. Govt. Willing to Participate in Quant Network MIT ODAP

... Additionally, Quant recently released an IETF RFC proposal for Open Digital Asset Protocol (ODAP). Along with MIT and Intel, Quant is trying to create an open blockchain agnostic protocol. This will be a standard protocol and will enable the interoperability of assets and messages across DLTs. Additionally, it will offer oracle functionality too. The protocol will enable interoperability in a scalable, secure, and compliant way.

< <https://www.altcoinbuzz.io/cryptocurrency-news/finance-and-funding/u-s-govt-willing-to-participate-in-quant-mit-odap/> https://www.altcoinbuzz.io/cryptocurrency-news/finance-and-funding/u-s-govt-willing-to-participate-in-quant-mit-odap/>

 

FRR: The Most Popular Network Router You’ve Never Heard Of

... Beyond the growing feature roadmap, FRR is also starting to act as the location to fulfill the original IETF motto of “rough consensus and running code.” New protocols being proposed through IETF are leveraging the open nature of FRR to create running implementations of the protocol proposals.

< <https://www.nextplatform.com/2020/10/26/frr-the-most-popular-network-router-youve-never-heard-of/> https://www.nextplatform.com/2020/10/26/frr-the-most-popular-network-router-youve-never-heard-of/>

 

First DLMS smart electric meter running over LoRaWAN announced

After water and gas meters, LoRaWAN is now available for smart electric meters. This is made possible thanks to SCHC compression and fragmentation (IETF RFC 8724).

< <https://www.smart-energy.com/industry-sectors/smart-meters/kaifa-and-acklio-announce-first-dlms-smart-electric-meter-running-over-lorawan/> https://www.smart-energy.com/industry-sectors/smart-meters/kaifa-and-acklio-announce-first-dlms-smart-electric-meter-running-over-lorawan/>

 

Internet-Sicherheit im Feld trotz benutzerfreundlicher Passwortlängen [Internet security in the field despite user-friendly password lengths]

Im Zeitalter von Industrie 4.0 rückt die Frage immer mehr in den Vordergrund: Wie lassen sich Feldgeräte und Prozessanlagen bestmöglich vor Cyber-Angriffen schützen? Für den Einsatz von Bluetooth-Kommunikation haben die Security-Experten von Endress+Hauser eine Lösung entworfen, die jetzt von der IETF als empfohlenes Verfahren ausgewählt wurde.

< <https://www.process.vogel.de/internet-sicherheit-im-feld-trotz-benutzerfreundlicher-passwortlaengen-a-975755/> https://www.process.vogel.de/internet-sicherheit-im-feld-trotz-benutzerfreundlicher-passwortlaengen-a-975755/>

 

Damit die Uhr auch richtig tickt [To make the clock tick properly]

Wer einen exakten Zeitstempel benötigt, muss sichergehen, dass Uhren in digitalen Geräten synchron sind. Nun hat die weltweit zuständige Internetorganisation IETF den von der PTB initiierten Standard für eine kryptografisch gesicherte Zeitverbreitung über das Internet zertifiziert. 

< <https://www.zfk.de/digitalisierung/it/artikel/e3a2e83583526d39984d33f55f74e31d/damit-die-uhr-auch-richtig-tickt-2020-10-27/> https://www.zfk.de/digitalisierung/it/artikel/e3a2e83583526d39984d33f55f74e31d/damit-die-uhr-auch-richtig-tickt-2020-10-27/>

 

O que é DHCP: saiba o que é e como funciona! [What is DHCP: Know what it is and how it works!]

... Embora agora você saiba por que o DHCP foi inventado e para que ele é usado, você também pode estar se perguntando como o DHCP surgiu e quem o inventou. Sua história começa em 1984, quando a IETF, que é a autoridade de padrões da Internet, criou um protocolo de rede chamado “Reverse Address Resolution Protocol” (RARP). Dessa forma, o RARP permitia que PCs sem drives de disco (chamados de workstations sem disco – eles inicializavam carregando um SO diretamente de um servidor central) recebessem endereços de IP automaticamente.

< <https://windowsteam.com.br/o-que-e-dhcp-saiba-o-que-e-e-como-funciona/> https://windowsteam.com.br/o-que-e-dhcp-saiba-o-que-e-e-como-funciona/>

 

Vinton Cerf ya co-creó internet para nuestro planeta: ahora quiere crear una internet interplanetaria con el protocolo DTN [Vinton Cerf has already co-created the internet for our planet: now he wants to create an interplanetary internet with the DTN protocol]

... En 2003 Cerf y un equipo de investigadores y desarrolladores crearon el protocolo Delay-Tolerant Networking (DTN) cuya especificaciones se pueden consultar en el sitio web de la IETF.

< <https://www.xataka.com/espacio/vinton-cerf-co-creo-internet-para-nuestro-planeta-ahora-quiere-crear-internet-interplanetaria-protocolo-dtn> https://www.xataka.com/espacio/vinton-cerf-co-creo-internet-para-nuestro-planeta-ahora-quiere-crear-internet-interplanetaria-protocolo-dtn>

 

Vinton Cerf a déjà co-créé Internet pour notre planète: il veut maintenant créer un Internet interplanétaire avec le protocole DTN [Vinton Cerf has already co-created Internet for our planet: he now wants to create an interplanetary Internet with the DTN protocol]

... En 2003, Cerf et une équipe de chercheurs et de développeurs ont créé le Protocole DTN (Delay-Tolerant Networking) Le cahier des charges peut être consulté sur le site Internet de l’IETF.

< <https://45secondes.fr/vinton-cerf-a-deja-co-cree-internet-pour-notre-planete-il-veut-maintenant-creer-un-internet-interplanetaire-avec-le-protocole-dtn/> https://45secondes.fr/vinton-cerf-a-deja-co-cree-internet-pour-notre-planete-il-veut-maintenant-creer-un-internet-interplanetaire-avec-le-protocole-dtn/>

 

Premiers compteurs d’électricité fonctionnant sur LoRaWAN, fruit d’un partenariat gagnant entre Kaifa et Acklio [First electricity meters running on LoRaWAN, the result of a winning partnership between Kaifa and Acklio]

Après les compteurs d’eau et de gaz, LoRaWAN est désormais disponible pour les compteurs d’électricité intelligents. Ceci est rendu possible grâce à la compression et à la fragmentation SCHC (IETF RFC 8724). Cette nouvelle technologie standard initiée par les cofondateurs d’Acklio est au cœur de leur offre logicielle. 

< <https://www.objetconnecte.com/kaifa-premiers-compteurs-electricite-lorawan/> https://www.objetconnecte.com/kaifa-premiers-compteurs-electricite-lorawan/>

 

Пиринговый форум MSK-IX 2020 пройдет онлайн [Peering Forum MSK-IX 2020 will be held online]

... Приглашенные гости: Марко Хохевонинг (менеджер по государственной политике и управлению интернетом RIPE NCC), Михаил Кадер (ведущий консультант по информационной безопасности в России и СНГ, Cisco Systems), Майк Геллер (архитектор кибербезопасности, Radware), Андрей Иванов ("Яндекс.Облако", руководитель направления развития сервисов безопасности), Эрик Винке (IETF, ведущий инженер Cisco), Андрей Робачевский (директор по технологическим программам, Internet Society) и топ-менеджеры MSK-IX.

< <https://nag.ru/news/press-release/107872/piringovyiy-forum-msk-ix-2020-proydet-onlayn.html> https://nag.ru/news/press-release/107872/piringovyiy-forum-msk-ix-2020-proydet-onlayn.html>

< <http://www.iksmedia.ru/events/expo/5698917-Piringovyj-forum-MSKIX-2020.html> http://www.iksmedia.ru/events/expo/5698917-Piringovyj-forum-MSKIX-2020.html>

 

세종대 이종혁 교수 RFC 8818, IETF 표준 문서 제정 [Professor Jong-hyuk Lee of Sejong University RFC 8818, IETF Standard Document]

[대학저널 백슬기 기자] 세종대학교(총장 배덕효) 정보보호학과 이종혁 교수(사진)가 연구한 ‘분산된 이동성 관리에 대한 인터넷 표준 문서(Request for Comments, RFC) 8818’이 인터넷 표준화 기구(IETF)에서 표준 문서로 제정됐다.

< <http://www.dhnews.co.kr/news/articleView.html?idxno=130552> http://www.dhnews.co.kr/news/articleView.html?idxno=130552>

< <https://www.eduinnews.co.kr/news/articleView.html?idxno=36094> https://www.eduinnews.co.kr/news/articleView.html?idxno=36094>

< <https://m.etnews.com/20201030000054> https://m.etnews.com/20201030000054>

 

2020 台灣網路治理論壇年會即將開幕,網路安全、數位經濟、人權及技術議題受關注 [The 2020 Annual Meeting of the Taiwan Network Governance Forum is coming to an end, with attention to cybersecurity, the digital economy, human rights and technology issues]

... 本屆大會邀請多位國內外重要貴賓,透過網路視訊參與多場對話;與會的全球網路治理界重要人士,包括 ICANN 現任董事長、網路技術標準組織 IETF 二位前主席、歐盟前德國議員、活躍於聯合國 ITU、WTO 及國際 WEF 的多位國際學者、亞太網路資訊中心(APNIC)總經理、全球知名 DNS 專家、政務委員唐鳳、台灣 WTO 辦公室、多名法界、經濟、企業人士等專家學者參與。

< <https://www.inside.com.tw/article/21359-igf-2020-conference> https://www.inside.com.tw/article/21359-igf-2020-conference>

 

ZDNS发布国际标准IETFRFC 8897 网络根基安全升级迈出关键一步 [ZDNS launches a critical step in the security upgrade of the international standard IETFRFC 8897 network foundation]

中新网10月27日电 10月26日,在金华网络根基研究中心揭牌仪式上,互联网域名系统国家地方联合工程研究中心(ZDNS)发布了由ZDNS牵头起草的国际标准IETFRFC 8897,并上线了基于RFC8897技术规范自主研发的互联网路由信息控制认证服务平台RPKI-X。

< <http://www.chinanews.com/business/2020/10-27/9323647.shtml> http://www.chinanews.com/business/2020/10-27/9323647.shtml>

 

暗網潛航——DDoS(三):魑魅魍魎(一)[Dark Web Submarine-DDoS (3): Ghosts and Ghosts (1)]

要具體實現一次成功的DDoS攻擊,消耗對方頻寬及網絡資源,直至系統崩潰失效,當中要用到哪些攻擊方法及技巧?其實可以有超過30種以上的入侵方法!讓我向大家慢慢介紹這種易學難精的攻擊手段。網絡上所有通訊都是倚靠不同「網絡協議」及「網絡封包」完成資料及訊息傳遞。這些協議和封包,都是先由「網際網絡工程任務組」(IETF)發佈RFC文檔,收集意見後,再由「網際網絡協會」(ISOC)發行制定。

< <https://hd.stheadline.com/news/columns/1118/20201102/892992/專欄-暗網潛航-DDoS-三-魑魅魍魎-一> https://hd.stheadline.com/news/columns/1118/20201102/892992/專欄-暗網潛航-DDoS-三-魑魅魍魎-一>

 

**********************

SECURITY & PRIVACY

**********************

Security: Adoption of TLS 1.3 for Secure Web Communication Grows

The TLS (Transport Layer Security) 1.3 protocol was officially released in the summer of 2018. It provides secure communication between web browsers and backend servers and is a replacement for SSL. TLS 1.3 supercedes TLS 1.2 and includes newer, more secure cryptography, operates with lower latency, and offers better privacy protection. The new protocol is expected to secure web services against DDoS attacks and data breaches.

< <https://formtek.com/blog/security-adoption-of-tls-1-3-for-secure-web-communication-grows/> https://formtek.com/blog/security-adoption-of-tls-1-3-for-secure-web-communication-grows/>

 

U.S. Strategy for Global Internet Security Needs to Better Leverage the Private Sector

Between the security of the election and the continually evolving saga over TikTok, the video-sharing platform owned by Chinese firm ByteDance, the private sector’s role in digital security remains highly visible—whether tracking, mitigating, or serving as vectors for information operations, cybersecurity threats, and other technological problems.

< <https://www.cfr.org/blog/us-strategy-global-internet-security-needs-better-leverage-private-sector> https://www.cfr.org/blog/us-strategy-global-internet-security-needs-better-leverage-private-sector>

 

98% of industrial firms believe having a Chief Sustainability Officer upgrades their cybersecurity

For some industrial organizations, cyber breaches that affect the health of staff and other people are one of the major cybersecurity challenges they face. Almost all enterprises (98%) are confident that sustainable development strategy and the specific role of Chief Sustainability Officer will improve their cybersecurity. However, organizations seem to have a mixed approach to their sustainability policies. 56% of industrial businesses don’t plan on introducing the role of CSO, but around half either already have, or plan to introduce technical measures (50%) and investments (44%) in this area. These are findings from Kaspersky's ‘The State of Industrial Cybersecurity in the Era of Digitalization’ research.

< <https://www.kaspersky.com/about/press-releases/2020_98-of-industrial-firms-believe> https://www.kaspersky.com/about/press-releases/2020_98-of-industrial-firms-believe>

 

New Report Links Cybersecurity and Sustainability

A vast majority of companies -- 98% -- say sustainability and a new C-suite role play an important role in improving cybersecurity, according to a new Kaspersky study.

< <https://www.darkreading.com/risk/new-report-links-cybersecurity-and-sustainability/d/d-id/1339274> https://www.darkreading.com/risk/new-report-links-cybersecurity-and-sustainability/d/d-id/1339274>

 

DNS Trends by Geoff Huston

We used to think of computer networks as being constructed using two fundamental common infrastructure components: names and addresses. Every connected device had a stable protocol address to allow all other devices to initiate a communication transaction with this device by addressing a data packet too this protocol address.

< <https://www.potaroo.net/ispcol/2020-10/trends.html> https://www.potaroo.net/ispcol/2020-10/trends.html>

 

DNS XL by Geoff Huston and Joao Damas

We’ve written a number of times about the issues of managing packet sizes in packet-switched networks. It’s an interesting space that is an essential part of the design of packet-switched networks, and a space where we still seem to be searching for a robust design. This work has been prompted by the DNS Flag Day 2020, where a number of DNS resolver implementations were altered to set their default EDNS(0) UDP Buffer Size down from 4,096 octets to 1,232 octets.

< <https://www.potaroo.net/ispcol/2020-11/xldns.html> https://www.potaroo.net/ispcol/2020-11/xldns.html>

 

Harnessing the Momentum of Women in Cybersecurity

This week, some of the brightest subject matter experts from across the U.S. and beyond gathered virtually to talk about women in cybersecurity, recognizing that the internet is filled with both opportunities and risks, and that it’s up to all of us to defend, protect and secure critical internet infrastructure.

< <https://blog.verisign.com/security/harnessing-the-momentum-of-women-in-cybersecurity/> https://blog.verisign.com/security/harnessing-the-momentum-of-women-in-cybersecurity/>

 

EU Agency for Cybersecurity launches ISAC in a BOX Toolkit

The EU Agency for Cybersecurity launches today ISAC in a BOX an comprehensive online toolkit to support the establishment, development and evaluation of Information Sharing and Analysis Centres (ISACs).

< <https://www.enisa.europa.eu/news/enisa-news/isac-in-a-box> https://www.enisa.europa.eu/news/enisa-news/isac-in-a-box>

 

Hospitals being hit in coordinated, targeted ransomware attack from Russian-speaking criminals

Russian-speaking cybercriminals in recent days have launched a coordinated attack targeting U.S. hospitals already stressed by the coronavirus pandemic with ransomware that analysts worry could lead to fatalities.

< <https://www.washingtonpost.com/national-security/hospitals-being-hit-in-coordinated-targeted-ransomware-attack-from-russian-speaking-criminals/2020/10/28/e6e48c38-196e-11eb-befb-8864259bd2d8_story.html> https://www.washingtonpost.com/national-security/hospitals-being-hit-in-coordinated-targeted-ransomware-attack-from-russian-speaking-criminals/2020/10/28/e6e48c38-196e-11eb-befb-8864259bd2d8_story.html>

 

Officials Warn of Cyberattacks on Hospitals as Virus Cases Spike

Hundreds of American hospitals are being targeted in cyberattacks by the same Russian hackers who American officials and researchers fear could sow mayhem around next week’s election.

< <https://www.nytimes.com/2020/10/28/us/hospitals-cyberattacks-coronavirus.html> https://www.nytimes.com/2020/10/28/us/hospitals-cyberattacks-coronavirus.html>

 

FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals

On Monday, Oct. 26, KrebsOnSecurity began following up on a tip from a reliable source that an aggressive Russian cybercriminal gang known for deploying ransomware was preparing to disrupt information technology systems at hundreds of hospitals, clinics and medical care facilities across the United States. Today, officials from the FBI and the U.S. Department of Homeland Security hastily assembled a conference call with healthcare industry executives warning about an “imminent cybercrime threat to U.S. hospitals and healthcare providers.”

< <https://krebsonsecurity.com/2020/10/fbi-dhs-hhs-warn-of-imminent-credible-ransomware-threat-against-u-s-hospitals/> https://krebsonsecurity.com/2020/10/fbi-dhs-hhs-warn-of-imminent-credible-ransomware-threat-against-u-s-hospitals/>

 

FBI warns ransomware assault threatens US health care system

Federal agencies warned that cybercriminals could unleash a wave of data-scrambling extortion attempts against the U.S. health care system, an effort that, if successful, could paralyze hospital information systems just as nationwide cases of COVID-19 are spiking.

< <https://apnews.com/article/fbi-ransomware-healthcare-system-7531ca8d2742d855cd374213d111821c> https://apnews.com/article/fbi-ransomware-healthcare-system-7531ca8d2742d855cd374213d111821c>

< <https://www.stuff.co.nz/technology/300144996/fbi-warns-us-hospitals-of-imminent-cybercrime-threat-amid-ransomware-attacks> https://www.stuff.co.nz/technology/300144996/fbi-warns-us-hospitals-of-imminent-cybercrime-threat-amid-ransomware-attacks>

 

Ransomware is the latest threat to the 2020 election. Here are the facts

As the nation careens toward Election Day fears are bubbling up about potential election interference from a fresh source: ransomware.

< <https://edition.cnn.com/2020/10/15/tech/ransomware-2020-election/index.html> https://edition.cnn.com/2020/10/15/tech/ransomware-2020-election/index.html>

 

Ransomware can interfere with elections and fuel disinformation – basic cybersecurity precautions are key to minimizing the damage

Government computer systems in Hall County, Georgia, including a voter signature database, were hit by a ransomware attack earlier this fall in the first known ransomware attack on election infrastructure during the 2020 presidential election. Thankfully, county officials reported that the voting process for its citizens was not disrupted.

< <https://cyberlaw.stanford.edu/blog/2020/10/ransomware-can-interfere-elections-and-fuel-disinformation-–-basic-cybersecurity> https://cyberlaw.stanford.edu/blog/2020/10/ransomware-can-interfere-elections-and-fuel-disinformation-–-basic-cybersecurity>

 

Ransomware Activity Targeting the Healthcare and Public Health Sector

On October 28, 2020, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) released a joint cybersecurity advisory on current ransomware activity and how to prevent and respond to ransomware attacks.

< <https://www.us-cert.gov/ncas/alerts/aa20-302a> https://www.us-cert.gov/ncas/alerts/aa20-302a>

 

Hospitals Targeted in Rising Wave of Ryuk Ransomware Attacks

Yesterday, the CISA, FBI, and HHS issued a warning against ransomware attacks on U.S. hospitals, saying they hold credible information of an increased and imminent cybercrime threat. Check Point Software rarely holds information on future cyber-attacks, especially not in a massive scale and destructive potential. Therefore, we need to act today to avoid real damage over the weekend.

< <https://blog.checkpoint.com/2020/10/29/hospitals-targeted-in-rising-wave-of-ryuk-ransomware-attacks/> https://blog.checkpoint.com/2020/10/29/hospitals-targeted-in-rising-wave-of-ryuk-ransomware-attacks/>

 

New FritzFrog Botnet Breaches Over 500 SSH Servers

A new peer-to-peer (P2P) botnet called FritzFrog has breached over 500 secure shell (SSH) servers, including those operated by a railway company and some well-known educational institutions in the U.S. and Europe.

< <https://securityintelligence.com/news/botnet-fritzfrog-breaches-over-500-servers/> https://securityintelligence.com/news/botnet-fritzfrog-breaches-over-500-servers/>

 

**********************

INTERNET OF THINGS

**********************

IoT From a Network Perspective: Learning to Navigate the New Realms

Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about.

< <http://www.circleid.com/posts/20201027-iot-from-a-network-perspective-learning-to-navigate-the-new-realms/> http://www.circleid.com/posts/20201027-iot-from-a-network-perspective-learning-to-navigate-the-new-realms/>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

HTTP/3: Everything you need to know about the next-generation web protocol

Security researchers have only just gotten their teeth into HTTP/2, but the movers and shakers of the web are already spinning out an update: HTTP/3. The technology offers performance gains and security benefits, but only if we get over the many deployment issues that lie ahead for what one expert tells us is best considered as an evolutionary rather than revolutionary change to how the web works.

< <https://portswigger.net/daily-swig/http-3-everything-you-need-to-know-about-the-next-generation-web-protocol> https://portswigger.net/daily-swig/http-3-everything-you-need-to-know-about-the-next-generation-web-protocol>

 

Node.js 15 Improves Rejection Handling

... Another experimental improvement is support for QUIC. This is a new UDP-based transport protocol that is the underlying transport protocol for HTTP/3. QUIC features inbuilt security with TLS 1.3, flow control, error correction, connection migration, and multiplexing.

< <https://www.i-programmer.info/news/167-javascript/14093-nodejs-15-improves-rejection-handling.html> https://www.i-programmer.info/news/167-javascript/14093-nodejs-15-improves-rejection-handling.html>

 

Quic und HTTP/3 so gut wie fertig

Die IETF hat die letzte Runde für Änderungen an Quic und HTTP/3 eingeläutet. Die Protokolle sind damit so gut wie fertig.

< <https://www.golem.de/news/ietf-quic-und-http-3-so-gut-wie-fertig-2010-151721.html> https://www.golem.de/news/ietf-quic-und-http-3-so-gut-wie-fertig-2010-151721.html>

 

一周大事:微軟要在臺灣蓋雲端資料中心。簡立峰建議企業把握後疫時代5大數位新浪潮 [Big event of the week: Microsoft is building a cloud-based data center in Taiwan. Jane Lifeng suggests that enterprises grasp the five new wave of numbers in the post-epidemic era]

... 現在臉書有超過75%的網際網路流量都使用QUIC(包括QUIC和HTTP/3)協定,臉書提到,QUIC在許多方面都比舊協定表現還要好,包括請求錯誤、長尾延遲以及回應標頭大小等,各種影響用戶使用體驗的指標。

< <https://www.ithome.com.tw/news/140845> https://www.ithome.com.tw/news/140845>

 

Facebook将积极推动Quic和HTTP/3新协议的采用 [Facebook will actively promote the adoption of the new Pac and HTTP/3 protocols]

外媒报道称,在 Quic 和 HTTP / 3 带来的巨大优势面前,社交媒体巨头 Facebook 将致力于新协议的采用。Facebook 工程团队在一篇博客文章指出,在该公司当前的互联网流量中,已有超过 75% 是基于新协议来处理的。不过在具体实施之前,该公司庞大的基础架构、移动 App 和客户端应用程序,仍需在顺利推进前落实一些必要的调整。

< <https://finance.sina.com.cn/tech/2020-10-26/doc-iiznezxr8141507.shtml> https://finance.sina.com.cn/tech/2020-10-26/doc-iiznezxr8141507.shtml>

 

**********************

OTHERWISE NOTEWORTHY

**********************

New IEEE standard will significantly improve performance in switched data center networks

Computing researchers at Rochester Institute of Technology have developed a new loop-avoidance protocol that solves a key challenge faced in switched networks, including many of the data center networks that run our internet and cloud services.

< <https://www.rit.edu/news/new-ieee-standard-will-significantly-improve-performance-switched-data-center-networks> https://www.rit.edu/news/new-ieee-standard-will-significantly-improve-performance-switched-data-center-networks>

 

Statement by President von der Leyen at the roundtable ‘Internet, a new human right' after the intervention by Sir Berners-Lee

Buongiorno, Presidente Sassoli. Thank you very much for the invitation to the European Parliament. And thank you, President Prodi, for the opportunity to discuss this important topic. First, let me say it is fantastic that I can react to Sir Berners-Lee. But it is still a pity we cannot discuss here in person. Professor Berners-Lee is an inspiration to many of us. He stands for an internet that serves humanity. A worldwide web that remains open and free. I remember, when he tweeted ‘this is for everyone'. This was during the opening of the Summer Olympics in London 2012. All spelled out across the huge stadium. This said it all.

< <https://ec.europa.eu/commission/presscorner/detail/en/STATEMENT_20_1999> https://ec.europa.eu/commission/presscorner/detail/en/STATEMENT_20_1999>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home