Friday, July 5, 2013




Daily Report

Top Stories

 • Research revealed details of the stolen financial and user information markets, showing the going rate for bank login details and other products and services available in underweb communities. – The Register See item 5 below in the Banking and Finance Sector

 • A chemical fire began after a train car carrying butane caught fire at a transfer station near Rapho Township, Pennsylvania, prompting an evacuation in the area for about 23 hours. – WGAL 8 Lancaster

12. July 2, WGAL 8 Lancaster – (Pennsylvania) 23 hours later, Rapho Township fire is out. A chemical fire began after a train car carrying 30,000 gallons of butane caught fire at a transfer station. Authorities were prompted to force the evacuation in the area near Rapho Township in Lancaster County for about 23 hours. Source: http://www.wgal.com/news/susquehanna-valley/lancaster/lancaster-county-train-car-fire-forces-evacuations/-/9704306/20801988/-/k7ka4vz/-/index.html

 • The Porcine Epidemic Diarrhea virus was found at a sow farm and at a finishing farm in North Carolina. – Reuters

18. July 2, Reuters – (North Carolina) Virus deadly to piglets spreads to North Carolina’s hog farms. The director of Livestock Health Programs for the North Carolina Department of Agriculture and Consumer Services stated that the Porcine Epidemic Diarrhea virus was found at a sow farm and at a finishing farm in the State. Source: http://www.reuters.com/article/2013/07/02/us-usa-sw

 • Arizona’s Dean Peak Fire burned 900 acres by July 1 with zero containment, prompting an evacuation order for two communities in Mohave County. – Lake Havasu City News-Herald 

26. July 2, Lake Havasu City News-Herald – (Arizona) Mohave County orders mandatory evacuation of Pine Lake and Hualapai Mountain Park communities. Arizona’s Dean Peak Fire burned 900 acres by July 1 with zero containment as the Mohave County Sheriff’s Office ordered a mandatory evacuation of all residents in the Pine Lake and Hualapai Mountain Park communities. Source: http://www.havasunews.com/news/mohave-county-orders-mandatory-evacuation-of-pine-lake-and-hualapai/article_93e66922-e26f-11e2-ac45-001a4bcf887a.html

Details

Banking and Finance Sector

5. July 2, The Register – (International) Crimelords: Stolen credit cards…keep ‘em. It’s all about banking logins now. Research by McAfee revealed details of the stolen financial and user information markets, showing the going rate for bank login details, credit card information, user account information, and other products and services available in underweb communities. Source: http://www.theregister.co.uk/2013/07/02/mcafee_cybercrime_exposed/

6. July 2, Pleasantville-BriarcliffManor Patch – (New York) Federal charges filed in Pleasantville skimming case. Federal charges were filed against a former waiter at the Don Juan Mexican Restaurant in Pleasantville for allegedly skimming customers’ credit cards and stealing more than $180,000. Source: http://pleasantville.patch.com/groups/politics-and-elections/p/federal-charges-filed-in-pleasantville-skimming-case

7. July 1, U.S. Attorney’s Office, Northern District of Georgia – (Florida; California) Hotel financier pleads guilty to conspiring to bribe a bank loan officer. A Florida hotel financier pleaded guilty to bribing a loan officer at Integrity Bank in order to obtain loans totaling more than $40 million. Source: http://www.fbi.gov/atlanta/press-releases/2013/hotel-financier-pleads-guilty-to-conspiring-to-bribe-a-bank-loan-officer

For another story, see item 36 in the Information Technology Sector

Information Technology Sector

32. July 3, Threatpost – (International) Ubisoft urges password changes following hack. Ubisoft warned users to reset their passwords following an attack on some of their online systems that exposed usernames, email addresses, and encrypted passwords. Source: http://threatpost.com/ubisoft-urges-password-changes-following-hack/

33. July 3, Softpedia – (International) Microsoft experts warn of “System Doctor 2014” fake antivirus. Researchers warned that the creators behind the Rogue:Win32/Winwebsec fake antivirus malware are now spreading a new form of malware called System Doctor 2014 that shares some similarities with its predecessor. Source: http://news.softpedia.com/news/Microsoft-Experts-Warn-of-System-Doctor-2014-Fake-Antivirus-365199.shtml

34. July 2, Threatpost – (International) njRAT espionage malware targets Middle Eastern governments, telecoms and energy. Fidelis reported a surge in activity involving the njRAT cyberespionage remote access trojan (RAT) targeting energy and telecoms companies based or operating in the Middle East, as well as governments in the region. Source: http://threatpost.com/njrat-espionage-malware-targets-middle-eastern-governments-telecoms-and-energy/

35. July 2, Dark Reading – (International) Fake Twitter accounts remain multimillion-dollar business. Research from Barracuda Labs found that the market for fake Twitter accounts to sell as followers has grown, and that the accounts utilize various methods to avoid abuse detection by Twitter and users. Source: http://www.darkreading.com/vulnerability/fake-twitter-accounts-remain-multimillio/240157696

36. July 2, Network World – (California) California’s first data-breach report finds 131 incidents hit 2.5 million citizens. California’s first State data breach report reported a total of 131 data breach incidents affecting 2.5 million individuals in 2012. Source: https://www.networkworld.com/news/2013/070213-california-data-breach-271488.html

37. July 2, Threatpost – (International) Skype vulnerability can lead to Android lockscreen bypass. A vulnerability in the Skype app for Android can allow an attacker to bypass the target device’s lockscreen using a second device. Source: http://threatpost.com/skype-vulnerability-can-lead-to-android-lockscreen-bypass/

For another story, see item 5 above in the Banking and Finance Sector

Communications Sector

See item 34 above in the Information Technology Sector


Department of Homeland Security (DHS)
DHS Daily Open Source Infrastructure Report Contact Information

About the reports - The DHS Daily Open Source Infrastructure Report is a daily [Monday through Friday] summary of open-source published information concerning significant critical infrastructure issues. The DHS Daily Open Source Infrastructure Report is archived for ten days on the Department of Homeland Security Web site: http://www.dhs.gov/IPDailyReport

Contact Information

Content and Suggestions: Send mail to cikr.productfeedback@hq.dhs.gov or contact the DHS Daily Report Team at (703)387-2314

Subscribe to the Distribution List: Visit the DHS Daily Open Source Infrastructure Report and follow instructions to Get e-mail updates when this information changes.

Removal from Distribution List:     Send mail to support@govdelivery.com.


Contact DHS

To report physical infrastructure incidents or to request information, please contact the National Infrastructure
Coordinating Center at  nicc@dhs.gov or (202) 282-9201.

To report cyber infrastructure incidents or to request information, please contact US-CERT at  soc@us-cert.gov or visit their Web page at  www.us-cert.go v.

Department of Homeland Security Disclaimer

The DHS Daily Open Source Infrastructure Report is a non-commercial publication intended to educate and inform personnel engaged in infrastructure protection. Further reproduction or redistribution is subject to original copyright restrictions. DHS provides no warranty of ownership of the copyright, or accuracy with respect to the original source material.