Security Research
Showing results for 
Search instead for 
Do you mean 

HP Security Research OSINT (OpenSource Intelligence) articles of interest--August 1, 2014

SR-FI_Team on ‎08-01-2014 10:40 AM

Below, you will find the HP Security Research key articles of interest for August 1, 2014. These are publically available articles that are provided as a news service only. The intent of this blog post is to share current events related to the cyber security industry. 


How hackers could slam on your car’s brakes
A report shared exclusively with CNNMoney shows that the 2014 Jeep Cherokee, 2015 Cadillac Escalade and 2014 Toyota Prius were the most ‘hackable’ of 20 car models reviewed by automotive security researchers. The 2014 Dodge Viper and 2014 Audi A8 were the least hackable.

BadUSB: Big, bad USB security problems ahead
Everyone knows that USB thumb-drives can spell security trouble, but a German security group has found new and nasty ways to use USB devices to wreak havoc on computers.

Chinese cyberattack hits Canada’s National Research Council
A “highly sophisticated Chinese state-sponsored actor” recently managed to hack into the computer systems at Canada’s National Research Council, according to Canada’s chief information officer, Corinne Charette.
The attack was discovered by Communications Security Establishment Canada.

JULY 2014 unified threat intelligence report
Overall, the month of July 2014 has been fraught with new malware campaigns against various entities and this has been the trend since approximately 2010. Malware today is the pivot point for attacks and these campaigns are initiated with emails (phishing), as well as other attacks.


Energetic Bear—Crouching Yeti
Energetic Bear/Crouching Yeti is an actor involved in several Advanced Persistent Threat (APT) campaigns that have been active since at least the end of 2010.


Operation Dragonfly imperils industrial protocol
Recent headlines may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. Recent reports about Operation Dragonfly, however, appear to be focused on espionage (at least for now), and the scope of the attack appears to be considerably broader than that of Stuxnet.


Threat Group–3279 targets the video game industry
Based upon Portable Executable (PE) compile dates, domain name registrations, collection dates of tools, the threat actors’ activity on message boards, and activity observed by Dell SecureWorks Counter Threat Unit™ (CTU) researchers during incident response engagements, TG–3279 appears to have been active since 2009.


The information contained in this blog post is from publicly available sources. Avoid suspicious links and advertisements. These articles do not represent HP’s view or position on any of the topics listed. 

About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
1-3 December 2015
Discover 2015 London
Discover 2015 in London, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
November 2015
Software Online Expert Days
Join us online to talk directly with our Software experts.
Read more
View all