Daily Intelligence Report: July 16, 2018

The G4S Daily Intelligence Report is a complimentary service provided by G4S. By monitoring and reporting on potential threats for clients based in North America, G4S provides strategic and actionable insight and services to help you identify, mitigate, respond, and recover from risks to your organization. The information included in this Daily Intelligence Report has been collected and reviewed by members of our G4S Global Risk Intelligence Center (GRIC) team, most of whom have extensive Intelligence Community, Law Enforcement and Military backgrounds.

To subscribe to the full Daily Intelligence Report, click here: http://wvw.g4s.us/l/31052/2017-05-04/cbkl3z


Access To Airport Security Systems Sold By Hackers For As Little As $10 – Worldwide

Airport Security Systems

Access to an airport security system can cost as little as $10. That’s what cybersecurity giant McAfee found during its investigation into underground and nefarious hacker marketplaces on the internet, commonly known as the Dark Web. The access rights were sold via a Russian Remote Desktop Protocol (RDP) shop, McAfee’s Advanced Threat Research team discovered. RDP is a proprietary Microsoft protocol that allows an administrator to remotely access a PC. “Something great for solving IT challenges, but potentially devastating if in the wrong hands,” McAfee said in a statement. These RDP “shops” are exploding on the Dark Web via Ultimate Anonymity Service (UAS), a Russian business, McAfee added. Criminals, like the notorious SamSam group that crippled city systems in Atlanta, favor RDP because they don’t need to engage in phishing campaigns or worry about antimalware defenses.

Read the article here: http://wvw.g4s.us/l/31052/2018-07-13/fqn6bg


Man Pleads Guilty To Amtrak-Related Terrorism Charge – Nebraska, United States

Amtrak

A St. Charles man pleaded guilty in federal court in Nebraska on Thursday to a charge of threatening to “wreck, derail, and disable railroad on-track equipment and a mass transportation vehicle” for an incident in October, court records show. Taylor Michael Wilson, 26, was originally indicted Jan. 17 in federal court in Lincoln, Neb., on that charge and one count claiming he attempted “to interfere with, disable, or incapacitate any locomotive engineer or railroad conductor.” That second count will be dismissed as part of the plea. He could be sentenced to up to life in prison. Wilson admitted boarding the train in California with a handgun and ammunition as well as ID. cards “relating to the (National) Socialist Movement,” his plea says. On Oct. 23, in Nebraska, Wilson entered a secured engine compartment, disabled the train and cut the lights to the passenger compartment. Some panicked passengers tried to escape through the train’s windows, particularly when they discovered it was another passenger who had caused the emergency stop.

Read the article here: http://wvw.g4s.us/l/31052/2018-07-13/fqn6bj


Supply Chain Risks Affecting Federal Agencies – United States

Global Supply

Reliance on a global supply chain introduces multiple risks to federal information systems. Supply chain threats are present during the various phases of an information system’s development life cycle and could create an unacceptable risk to federal agencies. Information technology (IT) supply chain-related threats are varied and can include:

  • installation of intentionally harmful hardware or software (i.e., containing “malicious logic”);
  • installation of counterfeit hardware or software;
  • failure or disruption in the production or distribution of critical products;
  • reliance on malicious or unqualified service providers for the performance of technical services; and
  • installation of hardware or software containing unintentional vulnerabilities, such as defective code.

These threats can have a range of impacts, including allowing adversaries to take control of systems or decreasing the availability of materials needed to develop systems. These threats can be introduced by exploiting vulnerabilities that could exist at multiple points in the supply chain. Examples of such vulnerabilities include the acquisition of products or parts from unauthorized distributors; inadequate testing of software updates and patches; and incomplete information on IT suppliers. Malicious actors could exploit these vulnerabilities, leading to the loss of the confidentiality, integrity, or availability of federal systems and the information they contain.

Read the article here: http://wvw.g4s.us/l/31052/2018-07-13/fqn6bl


If you need immediate assistance from G4S Corporate Risk Services or would like to learn more about our services, visit our website, email G4SIntelligence@usa.g4s.com or call 800.275.8310.