Tuesday, January 8, 2013
Complete DHS Daily Report for January 8, 2013
• A massive raw sewage release of around 300,000 gallons spilled into the Spring Valley Creek in Kalamazoo due to a blockage in a sewer pipe. – WKZO 590 AM Kalamazoo
15. January 5, WKZO 590 AM Kalamazoo – (Michigan) Huge raw sewage spill on Kalamazoo’s east side triggers health concerns. A massive raw sewage release of around 300,000 gallons spilled into the Spring Valley Creek in Kalamazoo due to a blockage in a sewer pipe. This is the second major spill in the past 12 months; 600,000 gallons of sewage overflowed in spring 2012. Source: http://wkzo.com/news/articles/2013/jan/05/huge-raw-sewage-spill-on-kalamazoos-east-side-triggers-health-concerns/
• A businessman from Atlanta was indicted for fraud, conspiracy, and other charges relating to losses of $23.8 million from the investments of a Pontiac, Michigan, and two Detroit pension funds. – Oakland Press
20. January 5, Oakland Press – (Michigan) Atlanta businessman accused of defrauding Pontiac, Detroit pension funds. A businessman from Atlanta was indicted for fraud, conspiracy, and other charges relating to losses of $23.8 million from the investments of a Pontiac, Michigan, and two Detroit pension funds. Source: http://www.theoaklandpress.com/articles/2013/01/05/news/local_news/doc50e89c763925b048600977.txt?viewmode=fullstory
• Researchers have tied ‘Paunch’, the author of the Blackhole exploit kit, to the Cool Exploit Kit, and noted that Paunch has been updating both kits with newly-purchased, undisclosed exploits. – Krebs on Security See item 26 below in the Information Technology Sector
• A flash mob at the Mall of Louisiana in Baton Rouge involving some 200 juveniles ended in a fight January 5 that closed the mall for the rest of the evening. – Baton Rouge Advocate
29. January 7, Baton Rouge Advocate – (Louisiana) Undeterred mall shoppers back day after teen brawl. A flash mob at the Mall of Louisiana in Baton Rouge involving some 200 juveniles and organized through social media Web sites ended in a fight January 5. Authorities arrested six juveniles from the group and closed the mall down for the rest of the evening. Source: http://theadvocate.com/news/4851684-123/undeterred-mall-shoppers-back-day
Banking and Finance Sector
2. January 7, Softpedia – (International) Algerian hacker wanted in the US arrested by Thai police. An Algerian man wanted in the U.S. for allegedly hacking into over 200 bank and financial institution accounts was arrested by police in Thailand as he was attempting to travel from Malaysia to Egypt. He will be extradited to the State of Georgia, where an arrest warrant was filed. Source: http://news.softpedia.com/news/Algerian-Hacker-Wanted-in-the-US-Arrested-by-Thai-Police-319099.shtml
3. January 5, Elyria Chronicle-Telegram – (Ohio) Avon Lake man indicted in $11M scheme. A man from Avon Lake was indicted on charges that he allegedly received $11 million via fake businesses that he used to skim money from loans issued by St. Paul Croatian Federal Credit Union, leading to the credit union’s collapse. Source: http://chronicle.northcoastnow.com/2013/01/05/avon-lake-man-indicted-in-11m-scheme/
4. January 4, Associated Press – (Arizona) ‘Dynomite’ Bandit uses fake explosives to rob Arizona banks, FBI says. The FBI said that the “Dynomite Bandit” robbed one bank and attempted to rob two others in the Phoenix area using fake explosives. He was given the misspelled moniker due to his explosive devices being fakes. Source: http://www.huffingtonpost.com/2013/01/05/dynomite-bandit-bank-robbery-arizona_n_2415213.html
5. January 4, Ashbury Park Press – (New Jersey) Owner of Manalapan mortgage company admits $7.5M fraud. A co-owner of Hawthorne Capital, a Manalapan mortgage company, pleaded guilty to a Ponzi scheme that defrauded more than 40 individuals of $7.5 million. Source: http://www.app.com/article/20130104/NJNEWS14/301040093/Owner-of-Manalapan-mortgage-company-admits-7-5M-fraud
Information Technology Sector
26. January 7, Krebs on Security – (International) Crimeware author funds exploit buying spree. Researchers have tied ‘Paunch’, the author of the Blackhole exploit kit, to the Cool Exploit Kit, and noted that Paunch has been updating both kits with newly-purchased, undisclosed exploits. Source: http://krebsonsecurity.com/2013/01/crimeware-author-funds-exploit-buying-spree/
27. January 4, Threatpost – (International) Researchers bypass Microsoft Fix It for IE zero day. Exodus Intelligence researchers reported their discovery of a way to work around the temporary fix that Microsoft posted to address a zero day exploit in Internet Explorer (IE) used in recent watering hole attacks. Source: http://threatpost.com/en_us/blogs/researchers-bypass-microsoft-fix-it-ie-zero-day-010413
28. January 6, Dearborn Patch – (Michigan) Cut cable line in Dearborn leaves WOW! customers with no cable, Internet Sunday. WOW! customers in Dearborn and Dearborn Heights lost cable, Internet, and phone service January 6 due to a severed cable line. Source: http://dearborn.patch.com/articles/cut-cable-line-in-dearborn-leaves-wow-customers-with-no-cable-internet-sunday
Department of Homeland Security (DHS)
DHS Daily Open Source Infrastructure Report Contact Information
About the reports - The DHS Daily Open Source Infrastructure Report is a daily [Monday through Friday] summary of open-source published information concerning significant critical infrastructure issues. The DHS Daily Open Source Infrastructure Report is archived for ten days on the Department of Homeland Security Web site: http://www.dhs.gov/IPDailyReport
Content and Suggestions: Send mail to firstname.lastname@example.org or contact the DHS Daily Report Team at (703)387-2314
Subscribe to the Distribution List: Visit the DHS Daily Open Source Infrastructure Report and follow instructions to Get e-mail updates when this information changes.
Removal from Distribution List: Send mail to email@example.com.
To report physical infrastructure incidents or to request information, please contact the National Infrastructure
Coordinating Center at firstname.lastname@example.org or (202) 282-9201.
To report cyber infrastructure incidents or to request information, please contact US-CERT at email@example.com or visit their Web page at www.us-cert.go v.
Department of Homeland Security Disclaimer
The DHS Daily Open Source Infrastructure Report is a non-commercial publication intended to educate and inform personnel engaged in infrastructure protection. Further reproduction or redistribution is subject to original copyright restrictions. DHS provides no warranty of ownership of the copyright, or accuracy with respect to the original source material.