Tag Archive for: Route

State Looks to Better Assess Vendor Security – Route Fifty



State Looks to Better Assess Vendor Security  Route Fifty

Source…

Crypto an Unlikely Route for Russian Sanctions Evasion, Experts Say


Cyberattack ransoms and cryptocurrency mining are unlikely to generate enough revenue to replace regular business activity in sanctioned nations, digital money experts and former law-enforcement officials told a U.S. Senate hearing Thursday.

The amount of cash needed to operate a major economy far outstrips the ability of crypto markets to handle such volumes, witnesses said in testimony to the Senate’s Committee on Banking, Housing and Urban Affairs.

“You can’t flip a switch overnight and run a G-20 economy on cryptocurrency, there just isn’t enough liquidity,” said

Michael Mosier,

former acting director of the Financial Crimes Enforcement Network, an arm of the U.S. Treasury Department.

The hearing was held as fears grow that Russia may turn to cyberattacks and cryptocurrency to prop up its economy, which has been battered by an array of economic sanctions during its continuing invasion of Ukraine.

On March 11, ratings agency

Moody’s Corp.’s

Investors Service unit warned that banks, crypto platforms and intellectual property could become targets for Russian state-sponsored hackers.

“There is a growing risk that Russian government and nongovernment cyber actors will try to perpetrate cyberattacks on entities across sectors and regions as an illicit means of raising money,” Moody’s said.

At Thursday’s hearing, Sen.

Elizabeth Warren

(D., Mass.) said she was introducing a bill immediately that would authorize the White House and Treasury Department to sanction cryptocurrency firms that do business with already-sanctioned Russian entities. The aim is to close…

Source…

Activating validation services for route origin, TWNIC continues to safeguard Internet routing security with RPKI

People are growingly reliant on the Internet for work, school and daily activities. The impact to people’s life will be unthinkable should the Internet suddenly stop working. Border Gateway Protocol …
internet security – read more

Attackers could use Internet route hijacking to get fraudulent HTTPS certificates

Inherent insecurity in the routing protocol that links networks on the Internet poses a direct threat to the infrastructure that secures communications between users and websites.

The Border Gateway Protocol (BGP), which is used by computer network operators to exchange information about which Internet Protocol (IP) addresses they own and how they should be routed, was designed at a time when the Internet was small and operators trusted each other implicitly, without any form of validation.

If one operator, or autonomous system (AS), advertises routes for a block of IP addresses that it doesn’t own and its upstream provider passes on the information to others, the traffic intended for those addresses might get sent to the rogue operator.

To read this article in full or to leave a comment, please click here

Network World Security