Mystic Stealer malware: evasive, and with a feedback loop in the C2C market. Read More
The CyberWire
The all in one place for non-profit security aid.
Mystic Stealer malware: evasive, and with a feedback loop in the C2C market. Read More
The CyberWire
A phishnet for the C-suite. Rootkit delivered by typosquatting. Stream-jacking in YouTube. Risk management. Hybrid war, and the laws thereof.
EvilProxy phishes for executives. Typosquatting to deliver a rootkit. Stream-jacking on YouTube. A global look at risk management. Assistance from a diverse set of international partners. In our Solution Spotlight segment, Simone Petrella speaks with Diane Janosek, Executive Director of Capitol Technology University’s Center for Women in Cyber, about paths to cybersecurity and ways to address cybersecurity workforce intelligence through education. Dave Bittner previews the 3rd annual SOC Analyst Appreciation Day with Kayla Williams of Devo. And some guidelines for hacktivists engaged in hybrid war. Read More
The CyberWire
Florida Man Arrested For Selling Fake Cisco Device To U.S. Military
[[{“value”:”
Onur Aksoy, a forty-year-old resident of Florida and dual citizen of Turkey and the United States, was found guilty of running a large-scale, multi-year fraud scheme to traffic in fake and counterfeit Cisco networking equipment.
The counterfeit computer networking equipment that Aksoy sold for hundreds of millions of dollars found its way into extremely sensitive military and other governmental systems, hospitals, schools, and platforms supporting advanced U.S. fighter jets and military aircraft.
Low-quality networking equipment from China and Hong Kong is flooded into the supply chain by criminals, endangering American companies, endangering public health and safety, and compromising national security.
“This case—one of the largest counterfeit trademark cases ever prosecuted in the United State— demonstrates the Criminal Division’s commitment and capacity to prosecute the most complex counterfeiting schemes and bring the perpetrators to justice”, said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division.
Document
Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:
Real-time Detection
Interactive Malware Analysis
Easy to Learn by New Security Team members
Get detailed reports with maximum data
Set Up Virtual Machine in Linux & all Windows OS Versions
Interact with Malware Safely
If you want to test all these features now with completely free access to the sandbox:
The Department of Justice stated that Aksoy established and managed one of the biggest counterfeit-trafficking enterprises ever through a complex, multi-year plan.
His operation brought tens of thousands of low-quality, counterfeit devices trafficked from China into the U.S. supply chain, endangering users in the public and private sectors.
According to court records and evidence, Aksoy operated at least 19 firms registered in Florida and New Jersey, along with around 15 Amazon storefronts and at least 10 eBay stores (collectively, the Pro Network Entities).
Tens of thousands of low-quality, modified computer networking devices with fake Cisco labels, stickers, boxes, documentation, and packaging were imported by Pro Network Entities from suppliers in China and Hong Kong.
These devices were all covered in counterfeit trademarks that were registered and owned by Cisco, giving the false impression that the goods were brand-new, authentic, and high-quality devices made and approved by Cisco.
The devices were valued at hundreds of millions of dollars at retail.
On-Demand Webinar to Secure the Top 3 SME Attack Vectors: Watch for Free.
Through the fraud, the Pro Network Entities made over $100 million in revenue, and Aksoy personally made millions of dollars.
Chinese counterfeiters altered the equipment that the Pro Network Entities imported from China and Hong Kong to look like authentic copies of new, improved, and more costly Cisco equipment.
These devices were usually older, lower-model goods, some of which had been sold or thrown away.
Such components sometimes included ways to get around technological safeguards Cisco applied to the software to verify hardware authenticity and check for compliance with software licenses.
Products that were sold by the Pro Network Entities that were fraudulent or counterfeit had multiple issues with performance, operation, and safety.
The items frequently malfunctioned or failed to function at all, seriously harming the networks and operations of its users.
Governmental organizations, schools, and hospitals were among the clients of Aksoy’s products. The U.S. Army, U.S. Navy, and U.S. Air Force also detected the devices in both combat and non-combat operations.
These activities included platforms that supported the F-15, F-18, and F-22 fighter jets, the AH-64 Apache attack helicopter, the P-8 maritime patrol aircraft, and the B-52 Stratofortress bomber aircraft.
Customs and Border Protection (CBP) intercepted about 180 shipments of fake Cisco devices from China and Hong Kong to the Pro Network Entities between 2014 and 2022.
In response to a few of these seizures, Aksoy gave fake reports to CBP using the fictitious name “Dave Durden,” which he also used to speak with other Chinese conspirators.
Cisco wrote seven letters to Aksoy between 2014 and 2019, pleading with him to stop dealing in fake goods. In response to at least two of these letters, Aksoy had his attorney send Cisco fake documentation.
Around 1,156 counterfeit Cisco gadgets worth over $7 million were seized by agents in July 2021 after they carried out a search warrant at Aksoy’s warehouse.
Aksoy was given a six-year, six-month prison sentence for managing a massive, multi-year scheme to traffic in fake and counterfeit Cisco networking equipment.
He agreed to the destruction of millions of dollars’ worth of counterfeit items that were taken from his businesses, as well as to pay restitution of $100 million to Cisco and sums to other victims that would be decided by the court at a later time.
Is Your Network Under Attack? – Read CISO’s Guide to Avoiding the Next Breach – Download Free Guide
The post Florida Man Arrested For Selling Fake Cisco Device To U.S. Military appeared first on Cyber Security News.
“}]] Read More
Cyber Security News
University of Manchester confirms data theft in recent cyberattack
The University of Manchester finally confirmed that attackers behind a cyberattack disclosed in early June had stolen data belonging to alumni and current students. […] Read More
BleepingComputer