April 2017 Digital Edition
March 2017 Digital Edition
Feb. 2017 Digital Edition
Nov/Dec 2016 Digital Edition
Oct 2016 Digital Edition
VANDENBERG AIR FORCE BASE, Calif., Nov. 18, 2017 -- Today, NASA launched NOAA's next-generation polar satellite, the Joint Polar Satellite System-1, into space. Two Raytheon (NYSE: RTN) weather programs are mission-critical components of the satellite's mission: the JPSS Common Ground System and the Visible Infrared Imaging Radiometer Suite sensor.
JPSS CGS, a global system of ground antennas and high-performance computers, provides the mission planning and command and control once in space. Recently upgraded, the JPSS CGS 2.0 delivers observations to NOAA's National Weather Service almost 50 percent faster than before.
"Every day, thousands of decisions depend on accurate weather forecasting and environmental monitoring," said Matt Gilligan, vice president of Raytheon's Navigation and Environmental Solutions. "Our latest generation Common Ground System has been fully operational since August, and it's ready to support the new JPSS-1's mission as part of the growing polar satellite constellation."
Once in space, Raytheon's VIIRS sensor, one of six on the JPSS-1 satellite, will collect imagery in 22 bands of light—from visible to infrared—allowing scientists to observe emerging weather and climate patterns in unprecedented detail. The sensor's low light imaging day-night band provides invaluable imagery, supporting mission area domain awareness and disaster monitoring and management.
"From 500 miles up in space, VIIRS is changing the way we see Earth," said Robert Curbeam, director of Civil Space programs for Raytheon's Space and Airborne Systems business. "Its value goes well beyond weather forecasting."
The JPSS-1 satellite joins its predecessor, Suomi National Polar-orbiting Partnership satellite, in circling the Earth pole-to-pole 14 times a day, providing full global coverage and contributing data into the U.S. weather forecast models. Those models are the basis for three- to seven-day forecasts that save lives, protect property and decrease the negative impact of severe weather.
Beyond forecasting, VIIRS captures and JPSS CGS processes and distributes measurements of atmospheric temperature and moisture, which are critical to volcanic ash, wildfire, and drought monitoring.
Raytheon works in partnership with NOAA to create a more 'Weather-Ready Nation.' Click here to learn more about our Weather-Ready Nation Training Modules.
Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5ITM products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter.
Information and Intelligence Systems
PRISMA Telecom Testing Exhibits at Milipol Paris 2017 Showcasing EmergencyNET, a Compact Portable Private Mobile Network
PRISMA Telecom Testing, a leading supplier of innovative solutions for the wireless industry, will present the latest developments of its EmergencyNET systems at Milipol Paris 2017, the leading event for homeland security, held on 21-24 November.
A compact plug-and-play portable system offering a complete private mobile network, EmergencyNET can provide reliable connectivity in case of major network breakdowns, enabling swift re-establishment of communications following disaster events.
Thanks to its extremely easy and quick setup, EmergencyNET enables rescuers to connect to any mobile device present in the emergency network area without delay, while victims can communicate their needs and position using standard devices.
A standalone private mobile network (no satellite connection is needed to operate), military certified from a mechanical point of view, EmergencyNET offers incomparable flexibility both in the scope of applications supported (ranging from railway emergency management to maritime operations and in general for critical infrastructure protection) and in terms of sheer scalability (such as number of users, number of calls, data throughput).
EmergencyNET, in its most compact backpack version, offers a complete mobile network for a single technology (GSM/GSM-R, UMTS or LTE). The extended EmergencyNET trolley version supports three different access technologies (GSM/GSM-R, UMTS, LTE) also running in parallel, thus operating as a multiple technology network provider.
PRISMA will exhibit at booth 6J123.
About PRISMA Telecom Testing
PRISMA Telecom Testing is a leading supplier of innovative and flexible performance testing solutions for mobile networks verification. PRISMA's test solutions for 2G/3G/4G/5G mobile networks, both over the wired and the radio interfaces, draw on over 30 years of experience in telecommunications engineering. The largest wireless Network Equipment Manufacturers and Service Providers worldwide rely on PRISMA for complete Radio Access Network testing.
A privately owned company, PRISMA Telecom Testing (formerly PRISMA Engineering) is headquartered in Milan, Italy, with its own offices in France, China, Sweden, the USA and Finland and partners across Europe, Asia and the Americas.
For more information about PRISMA and EmergencyNET: http://www.prismatelecomtesting.com
SOURCE PRISMA Telecom Testing
xG Technology's IMT Vislink Business Awarded $12.5 Million US Army Contract for Hand-Held Intelligence, Surveillance and Reconnaissance Receiver Devices
SARASOTA, Fla., Nov. 20, 2017 -- xG Technology, Inc. ("xG" or the "Company") (Nasdaq: XGTI, XGTIW), a leading provider of wireless video solutions to broadcast, law enforcement and defense markets, and private mobile broadband networks for critical communications, announced today that its IMT Vislink business has been awarded a $12.5 million contract by the U.S Army with an estimated completion date of Sept. 24, 2020 for the supply of hand-held intelligence, surveillance and reconnaissance receiver devices. This represents the third contract received from the Army since 2013 for this same requirement.
Equipment covered by the contract includes ruggedized, lightweight hand-held receivers designed to display real-time video imagery transmitted by aerial assets or frontline surveillance platforms, as well as related accessories.
George Schmitt, Executive Chairman and CEO of xG Technology, said, "We are honored to have been chosen by the U.S. Army to fulfill this important contract. It is a huge game changer that underscores our proven expertise in designing and delivering best-in-class wireless video communications solutions that enhance tactical insights. We will work closely with the Army to ensure they gain maximum effectiveness of our equipment in conducting their operations. We look forward to commencing product deliveries, and have already manufactured 50 units that are ready to ship as needed to our forces overseas."
Mr. Schmitt continued, "Beyond just the value of the contract to us, we are proud to have our technology support our fighting men and women overseas and look forward to supporting our troops in any way we can. This is hopefully the first of many contracts we will be successful in obtaining in the future."
IMT and Vislink have decades-long experience providing secure wireless video communications and mission-critical solutions for law enforcement, defense and homeland security applications around the world. With thousands of digital microwave radio systems deployed, they are the de facto standard in high performance, rapidly deployable systems that meet the most stringent requirements.
About xG Technology, Inc.
xG Technology's brands provide wireless video solutions to broadcast, law enforcement and defense markets, and private mobile broadband networks for use in challenging environments. xG's brand portfolio includes Integrated Microwave Technologies (IMT), Vislink, and xMax.
IMT has pioneered advanced digital microwave systems and is a trusted supplier to broadcast, sports and entertainment, and MAG (Military, Aerospace & Government) markets. Their products are recognized for high levels of performance, reliability, build quality, extended operating ranges and compact form factors. More information about IMT can be found at www.imt-solutions.com. Vislink specializes in the wireless capture, delivery and management of secure, high-quality, live video, and serves broadcast & media and public safety & surveillance markets. More information about Vislink can be found at http://www.vislink.com/.
xMax is a secure, rapid-deploy mobile broadband system that delivers mission-assured wireless connectivity in demanding operating environments. It was designed to serve as an expeditionary and critical communications network for use in unpredictable scenarios and during fluid situations, making it ideal for disaster response, emergency communications, and defense applications. More information about xMax can be found at http://www.xgtechnology.com/system-overview/. In addition to the above business lines, xG has a dedicated Federal Sector Group (xG Federal) focused on providing next-generation spectrum sharing solutions to national defense, scientific research and other federal organizations. Additional information about xG Federal can be found at http://www.xgtechnology.com/technology/xg-federal/.
Based in Sarasota, Florida, xG Technology has over 100 patents and pending patent applications. xG is a publicly traded company listed on the NASDAQ Capital Market (symbol: XGTI) For more information, please visit www.xgtechnology.com.
Cautionary Statement Regarding Forward Looking Statements
Statements contained herein that are not based upon current or historical fact are forward-looking in nature and constitute forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. Such forward-looking statements reflect the Company's expectations about its future operating results, performance and opportunities that involve substantial risks and uncertainties. These statements include but are not limited to statements regarding the intended terms of the offering, closing of the offering and use of any proceeds from the offering. When used herein, the words "anticipate," "believe," "estimate," "upcoming," "plan," "target", "intend" and "expect" and similar expressions, as they relate to xG Technology, Inc., its subsidiaries, or its management, are intended to identify such forward-looking statements. These forward-looking statements are based on information currently available to the Company and are subject to a number of risks, uncertainties, and other factors that could cause the Company's actual results, performance, prospects, and opportunities to differ materially from those expressed in, or implied by, these forward-looking statements.
FOR MORE INFORMATION
SOURCE xG Technology, Inc.
ALBUQUERQUE, N.M., Nov. 15, 2017 -- The U.S. Navy awarded Raytheon Company (NYSE: RTN) a $79 million contract to develop a new advanced telemetry system for the U.S. Navy's Range Support Aircraft. The high-tech plane will replace the Navy's aging telemetry test aircraft, which has been in service since the 1970s.
Based within the Gulfstream G550 airborne early warning airframe, Raytheon's modern solution will offer multi-role capabilities in telemetry data collection, range safety and surveillance, and communications relay.
"It's like replacing your old eight-track tapes with streaming digital music – there's simply no comparison," said Todd Callahan, Raytheon Naval and Area Mission Defense vice president. "Our new Range Support Aircraft will use the latest technology to support advanced weapons testing and other missions for the next 25 years."
To develop and deliver this new capability to the Navy, Raytheon will draw on its wide portfolio of products, proven technology and extensive test and evaluation expertise. Once operational, the Range Support Aircraft will collect and process telemetry data from missiles, aircraft, UAVs and ships.
Raytheon will perform system design, fabrication and aircraft integration. Once integration is complete, the company will conduct flight testing, training and mission operations with the Navy team before delivering the much-needed range support asset.
Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter.
MOORESTOWN, N.J., Nov. 16, 2017 /PRNewswire/ -- Lockheed Martin (NYSE: LMT) completed a rigorous Critical Design Review (CDR) on Sept. 28 with the Missile Defense Agency (MDA) for the Long Range Discrimination Radar (LRDR), demonstrating compliance to all technical performance measures and requirements. The radar system will support a layered ballistic missile defense strategy to protect the U.S. homeland from ballistic missile attacks.
The MDA awarded the $784 million contract to Lockheed Martin in 2015 to develop, build and test LRDR, and the company is on track on an aggressive schedule to deliver the radar to Clear, Alaska in 2020. Teams from Lockheed Martin, MDA Sensors Directorate and the Command and Control, Battle Management, and Communications or C2BMC have worked interfaces closely to ensure seamless integration.
Successfully executing CDR validates that the LRDR system is ready to proceed into fabrication, demonstration, and test and that the hardware and software component have achieved Technology Readiness Level (TRL) 7 and Manufacturing Readiness Level 7.
With the completion of CDR, the program now begins the start of low rate manufacturing which began in October. In preparation for full rate manufacturing starting in mid-2018, Lockheed Martin will be utilizing production hardware in combination with prototype systems, tactical back-end processing equipment as well as tactical software to demonstrate system performance in an operational environment to achieve system TRL 7. Lockheed Martin will be performing a series of tests in the Solid State Radar Integration Site (SSRIS) including a closed loop satellite track test.
"We remain committed to support the MDA's Ballistic Missile Defense and Homeland Defense Missions," said Chandra Marshall, LRDR program director, Lockheed Martin. "I am extremely proud of the team for their dedication and commitment to the successful execution of the LRDR program. This team has achieved every milestone, including this CDR, on schedule since contract award in 2015."
Marshall continued, "I am extremely pleased with the progress the entire LRDR team has made in the two years since contract award. With the success of CDR, LRDR is on track for initial operating capability or IOC in 2020."
In addition to CDR, Lockheed Martin conducted a Facilities Design Review in October for the LRDR equipment shelter design. Lockheed Martin will run a full and open competition for the construction of the equipment shelter in Clear, Alaska and will begin construction of the shelter in the first half of 2019. The MDA team is preparing the site for Radar System Installation and checkout mobilization, constructing the Mission Control Facility and starting the foundation for the LRDR equipment shelter.
Similar to Lockheed Martin's Space Fence radar system, LRDR is a high-powered S-Band radar incorporating solid-state gallium nitride (GaN) components. LRDR adds the capability of discriminating threats at extreme distances using the inherent wideband capability of the hardware coupled with advanced software algorithms.
LRDR is a strategic national asset of the MDA's Ballistic Missile Defense System and will provide 24/7/365 acquisition, tracking and discrimination data to enable defense systems to lock on and engage ballistic missile threats, a capability that stems from Lockheed Martin's decades of experience in creating ballistic missile defense systems for the U.S. and allied governments.
Lockheed Martin is well positioned to provide low risk, scalable radar solutions that address critical homeland defense needs; providing a persistent capability to keep pace with evolving threats, delivering unmatched discrimination capability in the Pacific architecture, and increasing the defensive capability of Ground Based Interceptors.
Work on LRDR is primarily performed in New Jersey, Alaska, Alabama, Florida and New York.
As a proven world leader in systems integration and development of air and missile defense systems and technologies, Lockheed Martin delivers high-quality missile defense solutions that protect citizens, critical assets and deployed forces from current and future threats. The company's experience spans radar and signal processing, missile design and production, hit-to-kill capabilities, infrared seekers, command and control/battle management, and communications, precision pointing and tracking optics, as well as threat-representative targets for missile defense tests.
For more information, visit www.lockheedmartin.com/lrdr.
About Lockheed Martin
SOURCE Lockheed Martin
Global ransomware damage costs predicted to exceed $11.5 billion annually by 2019:Ransomware will attack a business every 14 seconds by end of 2019
MENLO PARK, Calif., Nov. 15, 2017 -- Ransomware — a malware that infects computers (and mobile devices) and restricts their access to files, often threatening permanent data destruction unless a ransom is paid — has reached epidemic proportions globally.
Cybersecurity Ventures predicts there will be a ransomware attack on businesses every 14 seconds by the end of 2019. This does not include attacks on individuals, which occurs even more frequently than businesses.
"Since September 2013 when CryptoLocker, the first weapons-grade ransomware strain appeared, this type of malware has metastasized into a multi-billion dollar criminal business model that is only in its early phases and will continue to increase in sophistication," says Stu Sjouwerman, founder and CEO at KnowBe4, a company that specializes in training employees on how to detect and respond to ransomware attacks.
The big myth around ransomware damages is the costs are limited to ransom payouts. However, the percentage of businesses and individuals who are paying bitcoin to reclaim access to their data and systems in response to ransom demands — is declining (even if the total payout figures are rising due to the sheer volume of new attacks).
"Ransomware costs include damage and destruction (or loss) of data, downtime, lost productivity, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hostage data and systems, reputational harm, and employee training in direct response to the ransomware attacks," says Steve Morgan, founder and Editor-In-Chief at Cybersecurity Ventures.
CIOs, CISOs (Chief Information Security Officers), and IT security teams need to heighten their awareness and response plans around the ransomware threat. Cyber defense needs to cross boundaries so that every IT worker understands exactly what ransomware is, how it infects organizations, and how to combat it.
Cybersecurity Ventures predicts cybercrime will cost the world in excess of $6 trillion annually by 2021, up from $3 trillion in 2015. Ransomware is expected to worsen and make up a proportionately larger share of total cybercrime by 2021.
Cybersecurity Ventures is the world's leading researcher and publisher covering the global cyber economy, and a trusted source for cybersecurity facts, figures, and statistics.
SOURCE Cybersecurity Ventures
SOURCE Cybersecurity Ventures
enSilo, the company that protects endpoints pre- and post-infection to stop data breaches and data disruption in real time, today announced that it has been included in Gartner's Market Guide for Endpoint Detection and Response Solutions (G00321729). A complimentary copy of this Market Guide is available for download here.
According to Gartner, "The EDR market is rapidly converging with the endpoint protection platform market; however, both areas will continue to coexist for the next three years. Security and risk management leaders need platform-based solutions that provide all aspects of adaptive security architecture."
With costly, high-profile data breaches, ransomware disruptions and other attacks increasingly beginning at the endpoint, capabilities for safeguarding organizations' devices and empowering users are essential, including detecting sophisticated attacks, containing the reach of threats by defeating the execution of malware and other intrusions and rapidly remediating endpoints to a pre-infected state. enSilo delivers these features and other advantages in its proven endpoint security platform combining automated, blocking-enabled Endpoint Detection and Response (EDR) capabilities with Threat Hunting, Incident Response, and Virtual Patching features. This integrated approach to protecting devices and employees offers dramatic security advantages and avoids burdening end users and security staff with layered, piecemeal endpoint protection tools.
"We feel that Gartner's inclusion of enSilo in this Market Guide validates our team's vision and innovation," said enSilo CEO and co-founder Roy Katmor. "Malicious infiltrations prevail against traditional defenses by exploiting detection gaps and achieving costly dwell time before they uncovered. enSilo's Next Generation AntiVirus (NGAV) serves as a useful first line of defense, complemented and correlated with our unique blocking-enabled EDR that allows to contain in real-time malicious code and behaviors executing on systems and continually helps security teams revert devices back to known, trusted states. This elimination of dwell time between infiltration and detection is key, it's time for the industry to prioritize protection in EDR. 'Detection' and 'Response' offer little value if they are not real-time and automated."
"Stopping breaches is my number one priority and I am a big proponent for endpoint detection and response tools to help with that goal. When we thoroughly tested and evaluated top notable vendors in the market, enSilo stood out above all the rest," said Randy Potts, CISO at financial services firm Real Time Resolutions. "enSilo has a fundamentally different approach to stopping the post-infection impact of malware in an automated manner. This unique capability allows my team to stop breaches and respond to malware impact immediately and more effectively comparing to other EDR tools that introduce dwell time."
According to Gartner, "Endpoint detection and response is essentially a big data and analytics tool that has all the advantages and drawbacks of this emerging field. However, it's foundational for next-generation endpoint protection solutions, based on more-complex behaviors, and it's extensible to additional problems, such as insider threat and account takeover attacks. EDR tools are capable of reducing the time to detect and respond to hacking and malware incidents. They help correlate events into incidents, but require a sophisticated administrator and API integration with other security tools."
"enSilo strives to offer a robust post-infection approach to endpoint security that enables real-time breach containment and response, allowing zero dwell time and the immediate blocking of data exfiltration and data tampering," Katmor added. "Providing EDR tools is important, however in addition to post-infection evidence collection, the breach must be stopped in real-time, ensuring zero dwell time. It's all about stopping the breach."
Read more about Gartner's latest endpoint detection and response recommendations on enSilo's blog and download your complimentary copy of the Market Guide for Endpoint Detection and Response Solutions here.
Source: Gartner, "Market Guide for Endpoint Detection and Response Solutions," Peter Firstbrook, 9 November 2017.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
enSilo comprehensively secures the endpoint pre- and post-infection. enSilo automates and orchestrates detection, prevention and real-time response against advanced malware and ransomware without burdening cybersecurity staff. enSilo's single lightweight agent includes next generation antivirus (NGAV), application communication control, automated endpoint detection and response (EDR) with real-time blocking, threat hunting, incident response and virtual patching capabilities. Coupled with a patented approach that has full system visibility, enSilo's endpoint security solution stops modern malware with a high degree of precision and intuitive user interface. Cybersecurity staff with enSilo can effectively manage malware threats without alert fatigue, excessive dwell time or breach anxiety. enSilo's cloud management platform is flexible and extensible to meet operational needs that stop malware impact. For more information please visit www.ensilo.com.
SEI Seeks Participants for Cyber Intelligence Study Sponsored by Office of the Director of National Intelligence
PITTSBURGH, Nov. 16, 2017 -- The Emerging Technology Center at the Software Engineering Institute at Carnegie Mellon University today issued a call for organizations to participate in a cyber intelligence study sponsored by the Office of the Director of National Intelligence (ODNI).Cyber intelligence—acquiring and analyzing information about cyber capabilities, intentions, and activities to enhance decision making—is a rapidly changing field. The study, which the SEI will conduct over the next 18 months, will provide ODNI with insight into how organizations across the federal government, industry, and academia conduct cyber intelligence activities, identifying common challenges and best practices.
This study is a follow-up to the SEI's Cyber Intelligence Tradecraft Project, a 2013 study that examined 30 organizations and their approaches to cyber intelligence. The 2013 study has been widely cited and now is the basis of some university courses in cyber intelligence. Key findings from the 2013 study can be found at: https://www.sei.cmu.edu/library/assets/whitepapers/citp-summary-key-findings.pdf
"In 2013, we found areas where organizations struggled and where they were doing well," said Jared Ettinger, SEI cyber intelligence researcher and study technical lead. "Organizations were able to take the report and follow best practices, so now we'd like to see what has changed," he said.
Elements of the new study will include preliminary interviews with selected organizations to identify common themes and then a quantitative questionnaire to gain greater insight on those identified themes from a large number of respondents. The SEI will issue a report based on the study in early 2019.
Organizations participating in the study will benefit by:
understanding their unique cyber intelligence capabilities and challenges in an environment that safeguards participant anonymity
receiving access to study results prior to public release
identifying technology gaps and challenges to influence potential research/prototyping efforts
For more information about the study, see https://www.sei.cmu.edu/about/organization/etc/citp.cfm. Organizations wishing to participate in the study should contact the SEI at [email protected]
About the Carnegie Mellon University Software Engineering Institute
The Software Engineering Institute (SEI) is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI works with organizations to make measurable improvements in their software engineering and cybersecurity capabilities by providing technical leadership to advance the practice of software engineering and security. For more information, visit the SEI website at http://www.sei.cmu.edu.
SOURCE Carnegie Mellon Software Engineering Institute
NEW YORK and DULLES, Va., Nov. 16, 2017 -- Raytheon and MetTel today announced a global security alliance to protect government and commercial communications networks against growing cybersecurity threats, including those that exploit the proliferating Internet of Things (IoT). The companies will provide a range of cybersecurity offerings and support the migration from legacy technologies to ensure cybersecurity is designed into the government's telecom infrastructure.
This alliance is well-positioned to support the Administration's IT modernization and cybersecurity priorities, including the emerging security challenges posed by internet-connected devices, including computers, routers and security cameras.
"Security is foremost on everyone's mind today, especially with the constant emergence of new threat forms compounded by the exploding array of devices and network access points," said Ed Fox, vice president of Network Services for MetTel. "The world needs a network that meets the highest government security standards and together, MetTel and Raytheon are committed to delivering that network."
The MetTel-Raytheon alliance will provide a range of managed security services, professional consulting services and technologies to detect, assess and defeat potential intrusions on MetTel-owned or managed customer networks. The principal elements of the agreement include:
- MetTel and Raytheon will build and operate Managed Trusted Internet Protocol Services for Federal government agencies through the GSA's Enterprise Infrastructure Solutions (EIS) contract. MetTel was named in August 2017 as a vendor for the $50 billion, 15-year award.
- As part of MetTel's team on the EIS contract, Raytheon will offer cybersecurity experts on a contract basis to Federal agencies for custom consultations, including detailed insight and recommendations for incident remediation and vulnerability testing.
- In addition, MetTel will employ Raytheon's Automated Threat Intelligence Platform (ATIP) and other advanced managed security services.
Managed Security Services for Federal Agencies
"As Federal agencies and businesses aggressively pursue digital transformation, this alliance will support the security of their data and systems," said John DeSimone, vice president of Cybersecurity and Special Missions for Raytheon Intelligence, Information and Services. "Raytheon will work with MetTel to leverage our 30 years of experience and significant investment in cybersecurity to hunt, detect and remediate advanced cyber threats on government and commercial networks."
Hardening the Network for MetTel and its Customers
In addition to supporting government customers, MetTel will integrate with Raytheon's Virtual Security Operations Center service to provide advanced threat hunting, intrusion analysis, incident notification and triage to safeguard its 10,000 customer locations worldwide.
"As rogue governments, nation-states and independent cyber criminals increasingly focus their attacks on commercial industry targets, the need becomes apparent for the combined forces of MetTel and Raytheon with our proven success in security and network management," Fox added.
Webinar – "2018 Security Threats: What's next…and will you be ready?"
Join MetTel and Raytheon for a joint webinar on Wednesday, December 6, 2017 @ 2:00pm ET. Register here: http://bit.ly/2zWJVFG
MetTel® is a leading global provider of integrated digital communications solutions for enterprise customers. By converging all communications over a proprietary network, MetTel enables enterprise companies to easily deploy and manage technology-driven voice, data, wireless and cloud solutions worldwide. MetTel's comprehensive portfolio of customer solutions boosts enterprise productivity, reduces costs and simplifies operations. Combining customized and managed communication solutions with a powerful platform of cloud-based software, the company's MetTel Portal enables customers to manage their inventory, usage, spend and repairs from one simple, user friendly interface. For more information visit www.mettel.net, follow us on Twitter (@OneMetTel) and on LinkedIn, or call us directly at 877.963.8663. MetTel. Smart Communications Solutions.™
Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter @Raytheon.
HIDDEN COBRA – North Korean Trojan: Volgmer
Original release date: November 14, 2017 | Last revised: November 15, 2017
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS and FBI identified Internet Protocol (IP) addresses and other indicators of compromise (IOCs) associated with a Trojan malware variant used by the North Korean government—commonly known as Volgmer. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.gov/hiddencobra.
FBI has high confidence that HIDDEN COBRA actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and to further network exploitation. DHS and FBI are distributing these IP addresses to enable network defense and reduce exposure to North Korean government malicious cyber activity.
This alert includes IOCs related to HIDDEN COBRA, IP addresses linked to systems infected with Volgmer malware, malware descriptions, and associated signatures. This alert also includes suggested response actions to the IOCs provided, recommended mitigation techniques, and information on reporting incidents. If users or administrators detect activity associated with the Volgmer malware, they should immediately flag it, report it to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give it the highest priority for enhanced mitigation.
For a downloadable copy of IOCs, see:
NCCIC conducted analysis on five files associated with or identified as Volgmer malware and produced a Malware Analysis Report (MAR). MAR-10135536-D examines the tactics, techniques, and procedures observed. For a downloadable copy of the MAR, see:
MAR IOCs (.stix)
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. Since at least 2013, HIDDEN COBRA actors have been observed using Volgmer malware in the wild to target the government, financial, automotive, and media industries.
It is suspected that spear phishing is the primary delivery mechanism for Volgmer infections; however, HIDDEN COBRA actors use a suite of custom tools, some of which could also be used to initially compromise a system. Therefore, it is possible that additional HIDDEN COBRA malware may be present on network infrastructure compromised with Volgmer
The U.S. Government has analyzed Volgmer’s infrastructure and have identified it on systems using both dynamic and static IP addresses. At least 94 static IP addresses were identified, as well as dynamic IP addresses registered across various countries. The greatest concentrations of dynamic IPs addresses are identified below by approximate percentage:
India (772 IPs) 25.4 percent
Iran (373 IPs) 12.3 percent
Pakistan (343 IPs) 11.3 percent
Saudi Arabia (182 IPs) 6 percent
Taiwan (169 IPs) 5.6 percent
Thailand (140 IPs) 4.6 percent
Sri Lanka (121 IPs) 4 percent
China (82 IPs, including Hong Kong (12)) 2.7 percent
Vietnam (80 IPs) 2.6 percent
Indonesia (68 IPs) 2.2 percent
Russia (68 IPs) 2.2 percent
As a backdoor Trojan, Volgmer has several capabilities including: gathering system information, updating service registry keys, downloading and uploading files, executing commands, terminating processes, and listing directories. In one of the samples received for analysis, the US-CERT Code Analysis Team observed botnet controller functionality.
Volgmer payloads have been observed in 32-bit form as either executables or dynamic-link library (.dll) files. The malware uses a custom binary protocol to beacon back to the command and control (C2) server, often via TCP port 8080 or 8088, with some payloads implementing Secure Socket Layer (SSL) encryption to obfuscate communications.
Malicious actors commonly maintain persistence on a victim’s system by installing the malware-as-a-service. Volgmer queries the system and randomly selects a service in which to install a copy of itself. The malware then overwrites the ServiceDLL entry in the selected service's registry entry. In some cases, HIDDEN COBRA actors give the created service a pseudo-random name that may be composed of various hardcoded words.
Detection and Response
This alert’s IOC files provide HIDDEN COBRA indicators related to Volgmer. DHS and FBI recommend that network administrators review the information provided, identify whether any of the provided IP addresses fall within their organizations’ allocated IP address space, and—if found—take necessary measures to remove the malware.
When reviewing network perimeter logs for the IP addresses, organizations may find instances of these IP addresses attempting to connect to their systems. Upon reviewing the traffic from these IP addresses, system owners may find some traffic relates to malicious activity and some traffic relates to legitimate activity.
Network Signatures and Host-Based Rules
This section contains network signatures and host-based rules that can be used to detect malicious activity associated with HIDDEN COBRA actors. Although created using a comprehensive vetting process, the possibility of false positives always remains. These signatures and rules should be used to supplement analysis and should not be used as a sole source of attributing this activity to HIDDEN COBRA actors.
alert tcp any any -> any any (msg:"Malformed_UA"; content:"User-Agent: Mozillar/"; depth:500; sid:99999999;)
description = "Malformed User Agent"
$s = "Mozillar/"
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $s
A successful network intrusion can have severe impacts, particularly if the compromise becomes public and sensitive information is exposed. Possible impacts include
temporary or permanent loss of sensitive or proprietary information,
disruption to regular operations,
financial losses incurred to restore systems and files, and
potential harm to an organization’s reputation.
DHS recommends that users and administrators use the following best practices as preventive measures to protect their computer networks:
Use application whitelisting to help prevent malicious software and unapproved programs from running. Application whitelisting is one of the best security strategies as it allows only specified programs to run, while blocking all others, including malicious software.
Keep operating systems and software up-to-date with the latest patches. Vulnerable applications and operating systems are the target of most attacks. Patching with the latest updates greatly reduces the number of exploitable entry points available to an attacker.
Maintain up-to-date antivirus software, and scan all software downloaded from the Internet before executing.
Restrict users’ abilities (permissions) to install and run unwanted software applications, and apply the principle of “least privilege” to all systems and services. Restricting these privileges may prevent malware from running or limit its capability to spread through the network.
Avoid enabling macros from email attachments. If a user opens the attachment and enables macros, embedded code will execute the malware on the machine. For enterprises or organizations, it may be best to block email messages with attachments from suspicious sources. For information on safely handling email attachments, see Recognizing and Avoiding Email Scams. Follow safe practices when browsing the web. See Good Security Habits and Safeguarding Your Data for additional details.
Do not follow unsolicited web links in emails. See Avoiding Social Engineering and Phishing Attacks for more information.
Response to Unauthorized Network Access
Contact DHS or your local FBI office immediately. To report an intrusion and request resources for incident response or technical assistance, contact DHS NCCIC ([email protected](link sends e-mail) or 888-282-0870), FBI through a local field office, or the FBI’s Cyber Division ([email protected](link sends e-mail) or 855-292-3937).
November 14, 2017: Initial version
HIDDEN COBRA - North Korean Malicious Cyber Activity
The information contained on this page is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) to provide technical details on the tools and infrastructure used by cyber actors of the North Korean government. The intent of sharing this information is to enable network defenders to identify and reduce exposure to North Korean government cyber activity. The U.S. Government refers to the malicious cyber activity by the North Korean government as HIDDEN COBRA.
For more information, see:
November 14, 2017: Alert (TA17-318A) HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL
November 14, 2017: Alert (TA17-318B) HIDDEN COBRA – North Korean Trojan: Volgmer
August 23, 2017: Malware Analysis Report (MAR-10132963) – Analysis of Delta Charlie Attack Malware
June 13, 2017: Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure