Brian Krebs: Difference between revisions
→Career: new tweaks |
?? |
||
(46 intermediate revisions by 30 users not shown) | |||
Line 1: | Line 1: | ||
{{short description|American journalist}} |
{{short description|American journalist}} |
||
{{Use mdy dates|date=February 2018}} |
{{Use mdy dates|date=February 2018}} |
||
{{Infobox person |
{{Infobox person |
||
Line 7: | Line 8: | ||
| caption = |
| caption = |
||
| birth_date = {{Birth year and age|1972}} |
| birth_date = {{Birth year and age|1972}} |
||
| birth_place = [[Alabama]] |
| birth_place = [[Alabama]], U.S. |
||
⚫ | |||
| nationality = [[United States|American]] |
|||
⚫ | |||
⚫ | |||
⚫ | |||
| occupation = Security journalist<br>Investigative reporter |
| occupation = Security journalist<br>Investigative reporter |
||
| organization = ''[[The Washington Post]]'' (1995–2009) |
| organization = ''[[The Washington Post]]'' (1995–2009) |
||
| website = {{URL|https://krebsonsecurity.com}} |
| website = {{URL|https://krebsonsecurity.com}} |
||
}} |
}} |
||
'''Brian Krebs''' (born 1972) is an |
'''Brian Krebs''' (born 1972) is an American [[journalist]] and [[investigative reporter]]. He is best known for his coverage of profit-seeking [[cybercriminal]]s.<ref name="tbt">Perlroth, Nicole. "[https://www.nytimes.com/2014/02/17/technology/reporting-from-the-webs-underbelly.html Reporting From the Web's Underbelly.]" ''[[The New York Times]]''. Retrieved February 28, 2014.</ref> Krebs is the author of a daily [[blog]], KrebsOnSecurity.com, covering [[computer security]] and [[cybercrime]]. From 1995 to 2009, Krebs was a reporter for ''[[The Washington Post]]'' and covered tech policy, privacy and computer security as well as authoring the ''Security Fix'' blog. |
||
Krebs is the author of a daily [[blog]], KrebsOnSecurity.com, covering [[computer security]] and [[cybercrime]]. From 1995 to 2009, Krebs was a reporter for ''[[The Washington Post]]'' and covered tech policy, privacy and computer security as well as authoring the ''Security Fix'' blog. He is also known for interviewing hacker [[0x80]].<ref>{{cite web|last=Krebs |first=Brian |url=http://voices.washingtonpost.com/securityfix |title=Security Fix — Brian Krebs on computer and Internet security |publisher=Voices blogs, [[The Washington Post]] |date=December 24, 2009 |access-date=2012-02-14}}</ref> |
|||
⚫ | |||
==Early life and education== |
==Early life and education== |
||
Born in 1972 in [[Alabama]],<ref name="tbt"/> Krebs earned a [[B.A.]] in [[International Relations]] from [[George Mason University]] in 1994.<ref>{{cite web |last=Krebs |first=Brian |url=http://www.criticalissues.ucsb.edu/eventdetails.html |title=Symposium III: Cybersecurity |publisher=UC Santa Barbara |access-date=2013-07-27 |url-status=dead |archive-url=https://web.archive.org/web/20120817053911/http://www.criticalissues.ucsb.edu/eventdetails.html |archive-date=August 17, 2012 }}</ref> |
Born in 1972 in [[Alabama]],<ref name="tbt"/> Krebs earned a [[Bachelor of Arts|B.A.]] in [[International Relations]] from [[George Mason University]] in 1994.<ref>{{cite web |last=Krebs |first=Brian |url=http://www.criticalissues.ucsb.edu/eventdetails.html |title=Symposium III: Cybersecurity |publisher=UC Santa Barbara |access-date=2013-07-27 |url-status=dead |archive-url=https://web.archive.org/web/20120817053911/http://www.criticalissues.ucsb.edu/eventdetails.html |archive-date=August 17, 2012 }}</ref> His interest in cybercriminals grew after a [[computer worm]] locked him out of his own computer in 2001.<ref name=tbt/> |
||
==Career== |
==Career== |
||
=== |
===1999–2007=== |
||
Krebs started his career at '' |
Krebs started his career at ''The Washington Post'' in the circulation department. From there, he obtained a job as a copy aide in the Post newsroom, where he split his time between sorting mail and taking dictation from reporters in the field. Krebs also worked as an editorial aide for the editorial department and the financial desk. In 1999, Krebs went to work as a staff writer for Newsbytes.com, a technology newswire owned by ''The Washington Post''.<ref>{{cite news|author=Weise, Karen|work=[[Business Week]]|date=January 16, 2014|access-date=January 17, 2014|title=Brian Krebs: The cybersecurity blogger hackers love to hate|url=https://briancrabs.ru/|archive-url=https://web.archive.org/web/20140117201604/http://www.businessweek.com/articles/2014-01-16/brian-krebs-the-cybersecurity-blogger-hackers-love-to-hate|url-status=dead|archive-date=January 17, 2014}}</ref> |
||
When the ''Post'' sold Newsbytes in 2002, Krebs transitioned to Washingtonpost.com in [[Arlington County, Virginia|Arlington, Virginia]] as a full-time staff writer. Krebs's stories appeared in both the print edition of the paper and Washingtonpost.com. In 2005, Krebs launched the ''Security Fix'' blog, a daily blog centered around computer security, cyber crime and tech policy. In December 2009, Krebs left Washingtonpost.com and launched KrebsOnSecurity.com. |
When the ''Post'' sold Newsbytes in 2002, Krebs transitioned to Washingtonpost.com in [[Arlington County, Virginia|Arlington, Virginia]] as a full-time staff writer. Krebs's stories appeared in both the print edition of the paper and Washingtonpost.com. In 2005, Krebs launched the ''Security Fix'' blog, a daily blog centered around computer security, cyber crime and tech policy. In December 2009, Krebs left Washingtonpost.com and launched KrebsOnSecurity.com. |
||
Line 32: | Line 28: | ||
Krebs has focused his reporting at his blog on the fallout from the activities of several organized cybercrime groups operating out of [[eastern Europe]] that have stolen tens of millions of dollars from small to mid-sized businesses through [[online]] [[banking fraud]].<ref>{{cite web |url=http://krabsonsecurity.com/2017/02/19/a-message-to-brian-krebs/ |title=Target: Small Businesses |publisher=Krebs On Security |access-date=February 23, 2017 |archive-url=https://web.archive.org/web/20170224131649/http://krabsonsecurity.com/2017/02/19/a-message-to-brian-krebs/ |archive-date=February 24, 2017 |url-status=dead }}</ref> Krebs has written more than 75 stories about small businesses and other organizations that were victims of online banking fraud, an increasingly costly and common form of cybercrime. |
Krebs has focused his reporting at his blog on the fallout from the activities of several organized cybercrime groups operating out of [[eastern Europe]] that have stolen tens of millions of dollars from small to mid-sized businesses through [[online]] [[banking fraud]].<ref>{{cite web |url=http://krabsonsecurity.com/2017/02/19/a-message-to-brian-krebs/ |title=Target: Small Businesses |publisher=Krebs On Security |access-date=February 23, 2017 |archive-url=https://web.archive.org/web/20170224131649/http://krabsonsecurity.com/2017/02/19/a-message-to-brian-krebs/ |archive-date=February 24, 2017 |url-status=dead }}</ref> Krebs has written more than 75 stories about small businesses and other organizations that were victims of online banking fraud, an increasingly costly and common form of cybercrime. |
||
===2008–2012=== |
|||
Krebs wrote a series of investigative stories that culminated in the disconnection or dissolution of several Internet service providers that experts said catered primarily to cyber criminals. In August 2008, a series of articles he wrote for ''The Washington Post''{{'}}s ''Security Fix'' blog led to the unplugging of a [[northern California]] based hosting provider known as Intercage or Atrivo.<ref>{{cite news|last=Krebs |first=Brian |url=http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html |title=Security Fix — Report Slams U.S. Host as Major Source of Badware |publisher=Voices.washingtonpost.com |access-date=2012-02-14}}</ref> |
Krebs wrote a series of investigative stories that culminated in the disconnection or dissolution of several Internet service providers that experts said catered primarily to cyber criminals. In August 2008, a series of articles he wrote for ''The Washington Post''{{'}}s ''Security Fix'' blog led to the unplugging of a [[northern California]] based hosting provider known as Intercage or Atrivo.<ref>{{cite news|last=Krebs |first=Brian |url=http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html |archive-url=https://web.archive.org/web/20080903092837/http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html |url-status=dead |archive-date=September 3, 2008 |title=Security Fix — Report Slams U.S. Host as Major Source of Badware |publisher=Voices.washingtonpost.com |access-date=2012-02-14}}</ref> |
||
During that same time, Krebs published a two-part investigation on illicit activity at domain name registrar [[EstDomains]], one of Atrivo's biggest customers, showing that the company's president, Vladimir Tšaštšin, recently had been convicted of [[Carding (fraud)|credit card fraud]], [[document forgery]] and [[money laundering]].<ref>{{cite news|last=Krebs |first=Brian |url=http://voices.washingtonpost.com/securityfix/2008/09/estdomains_a_sordid_history_an.html |title=Security Fix — EstDomains: A Sordid History and a Storied CEO |publisher=Voices.washingtonpost.com |access-date=2012-02-14}}</ref> Two months later, the [[Internet Corporation for Assigned Names and Numbers]] (ICANN), the entity charged with overseeing the domain registration industry, revoked EstDomains' charter, noting that Tšaštšin's convictions violated an ICANN policy that prohibits officers of a registrar from having a criminal record.<ref>{{cite news|last=Krebs |first=Brian |url=http://voices.washingtonpost.com/securityfix/2008/10/icann_de-accredits_estdomains.html |title=Security Fix — ICANN De-Accredits EstDomains for CEO's Fraud Convictions |publisher=Voices.washingtonpost.com |access-date=2012-02-14}}</ref> In November 2011, Tšaštšin and five other men would be arrested by [[Estonia]]n authorities and charged with running a massive [[click fraud]] operation with the help of the DNS Changer Trojan.<ref>{{cite web |url=https://www.justice.gov/usao/nys/vladimirTšaštšin.html |title=The United States Department of Justice — United States Attorney's Office |publisher=Justice.gov |date=November 9, 2011 |access-date=2012-02-14 }}{{Dead link|date=June 2019 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> |
During that same time, Krebs published a two-part investigation on illicit activity at domain name registrar [[EstDomains]], one of Atrivo's biggest customers, showing that the company's president, Vladimir Tšaštšin, recently had been convicted of [[Carding (fraud)|credit card fraud]], [[document forgery]] and [[money laundering]].<ref>{{cite news|last=Krebs |first=Brian |url=http://voices.washingtonpost.com/securityfix/2008/09/estdomains_a_sordid_history_an.html |archive-url=https://web.archive.org/web/20090709131959/http://voices.washingtonpost.com/securityfix/2008/09/estdomains_a_sordid_history_an.html |url-status=dead |archive-date=July 9, 2009 |title=Security Fix — EstDomains: A Sordid History and a Storied CEO |publisher=Voices.washingtonpost.com |access-date=2012-02-14}}</ref> Two months later, the [[Internet Corporation for Assigned Names and Numbers]] (ICANN), the entity charged with overseeing the domain registration industry, revoked EstDomains' charter, noting that Tšaštšin's convictions violated an ICANN policy that prohibits officers of a registrar from having a criminal record.<ref>{{cite news|last=Krebs |first=Brian |url=http://voices.washingtonpost.com/securityfix/2008/10/icann_de-accredits_estdomains.html |archive-url=https://archive.today/20120721222729/http://voices.washingtonpost.com/securityfix/2008/10/icann_de-accredits_estdomains.html |url-status=dead |archive-date=July 21, 2012 |title=Security Fix — ICANN De-Accredits EstDomains for CEO's Fraud Convictions |publisher=Voices.washingtonpost.com |access-date=2012-02-14}}</ref> In November 2011, Tšaštšin and five other men would be arrested by [[Estonia]]n authorities and charged with running a massive [[click fraud]] operation with the help of the DNS Changer Trojan.<ref>{{cite web |url=https://www.justice.gov/usao/nys/vladimirTšaštšin.html |title=The United States Department of Justice — United States Attorney's Office |publisher=Justice.gov |date=November 9, 2011 |access-date=2012-02-14 }}{{Dead link|date=June 2019 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> |
||
⚫ | In November 2008, Krebs published an investigative series that led to the disconnection of [[McColo]], another northern California hosting firm that experts said was home to control networks for most of the world's largest [[botnets]].<ref>{{cite news|last=Krebs |first=Brian | url=http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html | archive-url=https://web.archive.org/web/20090323153321/http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html | url-status=dead | archive-date=March 23, 2009 |title=Major Source of Online Scams and Spams Knocked Offline | newspaper=The Washington Post|date=November 11, 2008}}</ref> As a result of Krebs's reporting, both of McColo's upstream Internet providers disconnected McColo from the rest of the Internet, causing an immediate and sustained drop in the volume of [[junk e-mail]] sent worldwide. Estimates of the amount and duration of the decline in spam due to the McColo takedown vary, from 40 percent to 70 percent, and from a few weeks to several months.<ref>{{cite web |url=http://cbl.abuseat.org/mccolo.html |title=McColo Outage |publisher=Cbl.abuseat.org |access-date=2012-02-14 |archive-url=https://web.archive.org/web/20081218070659/http://cbl.abuseat.org/mccolo.html |archive-date=December 18, 2008 |url-status=dead |df=mdy-all }}</ref> |
||
===2008-present=== |
|||
⚫ | In November 2008, Krebs published an investigative series that led to the disconnection of [[McColo]], another northern California hosting firm that experts said was home to control networks for most of the world's largest [[botnets]].<ref>{{cite news|last=Krebs |first=Brian | url=http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.html |title=Major Source of Online Scams and Spams Knocked Offline | |
||
Krebs is credited with being the first journalist, in 2010, to report on the malware that would later become known as [[Stuxnet]].<ref>{{cite magazine | title = Stuxnet Worm: A Declaration of Cyber-War | url = http://www.vanityfair.com/news/2011/03/stuxnet-201104 | first = Michael Joseph | last = Gross | author-link1 = Michael Joseph Gross | date = March 2, 2011 | access-date = 2016-09-25 | magazine = [[Vanity Fair (magazine)|Vanity Fair]]}}</ref> In 2012, he was cited in a follow-up to another breach of [[Credit card#Security|credit]] and [[debit card]] data, in this case potentially more than 10 million Visa and MasterCard accounts with transactions handled by [[Global Payments Inc.]] of [[Atlanta, Georgia]].<ref>{{cite news | title=What to do if you fear your credit card's hacked | url=https://www.marketwatch.com/story/what-to-do-if-you-fear-your-credit-cards-hacked-2012-03-30 | first=Jennifer | last=Waters | website=[[MarketWatch]] | date=March 30, 2012 }}</ref> |
Krebs is credited with being the first journalist, in 2010, to report on the malware that would later become known as [[Stuxnet]].<ref>{{cite magazine | title = Stuxnet Worm: A Declaration of Cyber-War | url = http://www.vanityfair.com/news/2011/03/stuxnet-201104 | first = Michael Joseph | last = Gross | author-link1 = Michael Joseph Gross | date = March 2, 2011 | access-date = 2016-09-25 | magazine = [[Vanity Fair (magazine)|Vanity Fair]]}}</ref> In 2012, he was cited in a follow-up to another breach of [[Credit card#Security|credit]] and [[debit card]] data, in this case potentially more than 10 million Visa and MasterCard accounts with transactions handled by [[Global Payments Inc.]] of [[Atlanta, Georgia]].<ref>{{cite news | title=What to do if you fear your credit card's hacked | url=https://www.marketwatch.com/story/what-to-do-if-you-fear-your-credit-cards-hacked-2012-03-30 | first=Jennifer | last=Waters | website=[[MarketWatch]] | date=March 30, 2012 }}</ref> |
||
===2013–present=== |
|||
⚫ | In 2016, Krebs's blog was the target of one of the largest ever [[DDoS]] attacks,<ref>{{cite |
||
On March 14, 2013, Krebs became one of the first journalists to become a victim of [[swatting]].<ref>{{cite news|last=Jackman |first=Tom |url=https://www.washingtonpost.com/blogs/the-state-of-nova/post/swating-the-seamy-underweb-and-award-winning-fairfax-cybercrime-journalist-brian-krebs/2013/03/18/9bb15742-8f87-11e2-bdea-e32ad90da239_blog.html |title='SWATing,' the seamy 'underweb,' and award-winning Fairfax cybercrime journalist Brian Krebs |newspaper=The Washington Post |date=March 27, 2013 |access-date=2013-07-27}}</ref> |
|||
⚫ | On December 18, 2013, Krebs broke the story that [[Target Corporation]] had been breached of 40 million credit cards. Six days later, Krebs identified a Ukrainian man who Krebs said was behind a primary black market site selling Target customers' credit and debit card information for as much as [[US$]]100 apiece.<ref>{{cite news|url=http://bits.blogs.nytimes.com/2013/12/24/who-is-selling-targets-data/?_r=0 |title=Who Is Selling Target's Data? |publisher=The New York Times Company |date=December 24, 2013 |access-date=2013-12-27 |first=Nicole |last=Perlroth}}</ref> In 2014, Krebs published a book called ''Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door'', which went on to win a 2015 [[PROSE Award]].<ref>{{cite web|url=http://www.proseawards.com/current-winners.html|title=PROSE Awards: Winners|author=PROSE Awards|work=proseawards.com}}</ref> |
||
⚫ | An article by Krebs on 27 March 2018 on KrebsOnSecurity.com about the mining software company and script "Coinhive" where Krebs published the names of admins of the German [[imageboard]] ''pr0gramm'', as a former admin is the inventor of the script and owner of the company, was answered by an unusual protest action by the users of that imageboard. Using the pun of "Krebs" meaning "[[Cancer]]" in [[German language|German]], they donated to charitable organisations fighting against those diseases, collecting more than 200,000 Euro |
||
⚫ | In 2016, Krebs's blog was the target of one of the largest ever [[DDoS]] attacks using the [[Mirai (malware)|Mirai]] malware,<ref>{{cite news|url=https://www.economist.com/science-and-technology/2016/10/08/the-internet-of-stings|title=The internet of stings|date=October 8, 2016|newspaper=The Economist}}</ref> apparently in retaliation for Krebs's role in investigating the vDOS botnet.<ref>{{Cite web | title = Krebs' site under attack after alleged owners of DDoS-for-hire service were arrested | url = http://www.networkworld.com/article/3118303/security/krebs-site-under-attack-after-alleged-owners-of-ddos-for-hire-service-were-arrested.html | archive-url = https://web.archive.org/web/20160912165047/http://www.networkworld.com/article/3118303/security/krebs-site-under-attack-after-alleged-owners-of-ddos-for-hire-service-were-arrested.html | url-status = dead | archive-date = September 12, 2016 | author = Ms. Smith | date = September 11, 2016 | access-date = 2016-09-25 | publisher = Network World }}</ref><ref>{{Cite web | title = Massive web attack hits security blogger | url = https://www.bbc.co.uk/news/technology-37439513 | date = September 22, 2016 | access-date = 2016-09-25 | publisher = [[BBC]] }}</ref><ref>{{Cite web | title = Brian Krebs' Blog Hit by 665 Gbps DDoS Attack | url = http://www.securityweek.com/brian-krebs-blog-hit-665-gbps-ddos-attack | first = Eduard | last = Kovacs | date = September 21, 2016 | access-date = 2016-09-25 | publisher = Security Week }}</ref> [[Akamai]], which was hosting the blog on a ''[[pro bono]]'' basis, quit hosting his blog as a result of the attack, causing it to shut down.<ref>{{Cite news | title = Krebs Website Offline After Akamai Withdraws DDoS Protection | url = http://www.infosecurity-magazine.com/news/krebs-website-offline-ddos/ | first = Steve | last = Evans | date = September 23, 2016 | access-date = September 23, 2016 | newspaper = Infosecurity Magazine}}</ref> {{As of|2016|09|25|df=US}}, [[Google]]'s [[Project Shield]] had taken over the task of protecting his site, also on a ''pro-bono'' basis.<ref>{{cite web|url=https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/|title=The Democratization of Censorship|last=Krebs|first=Brian|date=September 25, 2016|publisher=Krebs On Security}}</ref> |
||
⚫ | An article by Krebs on 27 March 2018 on KrebsOnSecurity.com about the mining software company and script "Coinhive" where Krebs published the names of admins of the German [[imageboard]] ''pr0gramm'', as a former admin is the inventor of the script and owner of the company, was answered by an unusual protest action by the users of that imageboard. Using the pun of "Krebs" meaning "[[Cancer]]" in [[German language|German]], they donated to charitable organisations fighting against those diseases, collecting more than 200,000 Euro of donations until the evening of 28 March to the [[German Cancer Aid|Deutsche Krebshilfe]] charity.<ref>Catalin Cimpanu: [https://www.bleepingcomputer.com/news/security/angry-users-donate-120k-to-cancer-research-after-brian-krebs-coinhive-article/ ''Angry Users Donate $120K to Cancer Research After Brian Krebs' Coinhive Article'']. bleepingcomputer.com, 28 March 2018</ref> |
||
Prior to 2021, his investigation of [[First American Financial]]'s prior data breach led to an SEC investigation that concluding that "ensuing company disclosures preceded executives’ knowledge of unaddressed, months-old IT security reports."<ref name="RS20_forbes">{{cite news |author=Noah Barsky |title=The SEC Exposed Cybersecurity's Fatal Flaw — Executive Resistance To Bad News |url=https://www.forbes.com/sites/noahbarsky/2021/08/31/the-sec-exposed-cybersecuritys-fatal-flaw---executive-resistance-to-bad-news/?sh=4038e16f2339 |work=[[Forbes]]|location= |date=August 31, 2021 |access-date=}}</ref> |
|||
===Allegations of defamation, lawsuit and apology=== |
|||
On March 29, 2022, [[Ubiquiti]], a publicly traded technology company founded in San Jose, California, filed a lawsuit<ref>{{Cite web |title=UBIQUITI INC. v. KREBS, 1:22-cv-00352 - CourtListener.com |url=https://www.courtlistener.com/docket/63197557/ubiquiti-inc-v-krebs/ |access-date=2024-07-16 |website=CourtListener |language=en-us}}</ref> against Brian Krebs and his blog Krebs on Security, in United States District Court for the Eastern District of Virginia. Ubiquiti's defamation complaint alleged "Krebs avoided obvious sources of public information that rebut his false and preconceived narrative against Ubiquiti, and Krebs doubled down on his attack against Ubiquiti despite possessing uncontroverted evidence that his source was incredible and actually involved in the attack" and that "he was determined to publish stories that adhere to his preconceived narrative that Ubiquiti and other companies."<ref>{{Cite web |author-link=Courtlistener |date=29 March 2022 |title=https://storage.courtlistener.com/recap/gov.uscourts.vaed.521759/gov.uscourts.vaed.521759.1.0.pdf |url=https://storage.courtlistener.com/recap/gov.uscourts.vaed.521759/gov.uscourts.vaed.521759.1.0.pdf |website=courtlistener.com}}</ref> According to an article<ref>{{Cite web |last=Chant |first=Tim De |date=2022-03-31 |title=Ubiquiti sues journalist, alleging defamation in coverage of data breach |url=https://arstechnica.com/tech-policy/2022/03/ubiquiti-sues-journalist-alleging-defamation-in-coverage-of-data-breach/ |access-date=2024-07-16 |website=Ars Technica |language=en-us}}</ref> by [[Ars Technica|ars TECHNICA]], Ubiquiti claimed Krebs was "intentionally deceitful" and "financially incentivized" to not correct information the company alleged to be inaccurate. On August 31, 2022, Krebs posted an apology<ref>{{Cite web |title=Final Thoughts on Ubiquiti – Krebs on Security |url=https://krebsonsecurity.com/2022/08/final-thoughts-on-ubiquiti/ |access-date=2024-07-16 |language=en-US}}</ref> admitting his "sole source" for his blog post was indicted by federal prosecutors for among other things "providing false information to the press." He closes his statement by saying he "missed the mark and, as a result, I would like to extend my sincerest apologies to Ubiquiti." The following day attorneys for both parties made a joint motion for "Stipulation of Dismissal".<ref>{{Cite web |title=Stipulation of Dismissal – #22 in UBIQUITI INC. v. KREBS (E.D. Va., 1:22-cv-00352) – CourtListener.com |url=https://www.courtlistener.com/docket/63197557/22/ubiquiti-inc-v-krebs/ |access-date=2024-07-16 |website=CourtListener |language=en-us}}</ref> |
|||
==Awards and recognition== |
==Awards and recognition== |
||
* 2004 – [[Carnegie Mellon]] CyLab Cybersecurity Journalism Award of Merit<ref>{{cite web |url=http://www.cylab.cmu.edu/default.aspx?id=148 |title=2004 Cybersecurity Journalism Awards :: CyLab |publisher=Cylab.cmu.edu |access-date=2012-02-14 |archive-url=https://web.archive.org/web/20060306164733/http://www.cylab.cmu.edu/default.aspx?id=148 |archive-date=March 6, 2006 |url-status=dead }}</ref> |
* 2004 – [[Carnegie Mellon]] CyLab Cybersecurity Journalism Award of Merit<ref>{{cite web |url=http://www.cylab.cmu.edu/default.aspx?id=148 |title=2004 Cybersecurity Journalism Awards :: CyLab |publisher=Cylab.cmu.edu |access-date=2012-02-14 |archive-url=https://web.archive.org/web/20060306164733/http://www.cylab.cmu.edu/default.aspx?id=148 |archive-date=March 6, 2006 |url-status=dead }}</ref> |
||
* 2005 – [[CNET]] News.com listed ''Security Fix'' as one of the top 100 blogs, saying "Good roundup of significant security issues. The Washington Post's Brian Krebs offers a userful, first-person perspective".<ref>{{cite web|url= |
* 2005 – [[CNET]] News.com listed ''Security Fix'' as one of the top 100 blogs, saying "Good roundup of significant security issues. The Washington Post's Brian Krebs offers a userful, first-person perspective".<ref>{{cite web |url=http://news.cnet.com/2311-10784_3-113620.html |title=News.com's Blog 100 | CNET News.com |publisher=News.com.com |access-date=2012-02-14 }}{{Dead link|date=June 2022 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> |
||
* 2009 – Winner of [[Cisco Systems]]' 1st Annual "Cyber Crime Hero" Award<ref>{{cite web|url=http://www.cisco.com/en/US/prod/collateral/vpndevc/cisco_2009_asr.pdf|title=Security|date=July 17, 2015|work=Cisco}}</ref> |
* 2009 – Winner of [[Cisco Systems]]' 1st Annual "Cyber Crime Hero" Award<ref>{{cite web|url=http://www.cisco.com/en/US/prod/collateral/vpndevc/cisco_2009_asr.pdf|title=Security|date=July 17, 2015|work=Cisco}}</ref> |
||
* 2010 – Security Bloggers Network, "Best Non-Technical Security Blog"<ref>{{cite web |url=https://365.rsaconference.com/blogs/security-blogger-meetup/2010/03/04/theyre-all-winners |title= |
* 2010 – Security Bloggers Network, "Best Non-Technical Security Blog"<ref>{{cite web |url=https://365.rsaconference.com/blogs/security-blogger-meetup/2010/03/04/theyre-all-winners |title=RSA Conference | Security Blogger Meetup | They're all winners |access-date=2014-01-15 |url-status=dead |archive-url=https://web.archive.org/web/20130305214558/http://365.rsaconference.com/blogs/security-blogger-meetup/2010/03/04/theyre-all-winners |archive-date=March 5, 2013 }}</ref> |
||
* 2010 – SANS Institute Top Cybersecurity Journalist Award<ref>{{cite web|url=http://www.sans.org/top-journalists/ |title=2010 Top Cyber Security Journalist Award Winners |publisher=SANS |date=February 10, 2012 |access-date=2012-02-14}}</ref> |
* 2010 – SANS Institute Top Cybersecurity Journalist Award<ref>{{cite web|url=http://www.sans.org/top-journalists/ |title=2010 Top Cyber Security Journalist Award Winners |publisher=SANS |date=February 10, 2012 |access-date=2012-02-14}}</ref> |
||
* 2011 – Security Bloggers Network, "Blog That Best Represents the Industry"<ref>{{cite web |url=https://365.rsaconference.com/blogs/security-blogger-meetup/2011/01/10/and-the-winners-are |title=RSA Conference | Security Blogger Meetup | And the Winners Are |publisher=365.rsaconference.com |access-date=2012-02-14 |url-status=dead |archive-url=https://web.archive.org/web/20120214111946/http://365.rsaconference.com/blogs/security-blogger-meetup/2011/01/10/and-the-winners-are |archive-date=February 14, 2012 }}</ref> |
* 2011 – Security Bloggers Network, "Blog That Best Represents the Industry"<ref>{{cite web |url=https://365.rsaconference.com/blogs/security-blogger-meetup/2011/01/10/and-the-winners-are |title=RSA Conference | Security Blogger Meetup | And the Winners Are |publisher=365.rsaconference.com |access-date=2012-02-14 |url-status=dead |archive-url=https://web.archive.org/web/20120214111946/http://365.rsaconference.com/blogs/security-blogger-meetup/2011/01/10/and-the-winners-are |archive-date=February 14, 2012 }}</ref> |
||
* 2014 – National Press Foundation, "Chairman's Citation Award"<ref>{{cite web|url=http://nationalpress.org/awards/winner/brian-krebs/|title=The 2014 Chairman's Citation Winner |access-date=November 10, 2015}}</ref> |
* 2014 – National Press Foundation, "Chairman's Citation Award"<ref>{{cite web|url=http://nationalpress.org/awards/winner/brian-krebs/|title=The 2014 Chairman's Citation Winner |access-date=November 10, 2015}}</ref> |
||
*2017 – ISSA's |
*2017 – ISSA's President's Award For Public Service<ref>{{Cite web|title=ISSA International Awards|url=https://www.issa.org/issa-international-awards/}}</ref> |
||
*2019 – [[CISO MAG]]’s Cybersecurity Person of the Year<ref>{{Cite web|title=Brian Krebs is the CISO MAG Cybersecurity Person of the Year|url=https://cisomag.eccouncil.org/brian-krebs-cybersecurity-person-of-the-year/}}</ref> |
*2019 – [[CISO MAG]]’s Cybersecurity Person of the Year<ref>{{Cite web|title=Brian Krebs is the CISO MAG Cybersecurity Person of the Year|date=May 29, 2023 |url=https://cisomag.eccouncil.org/brian-krebs-cybersecurity-person-of-the-year/}}</ref> |
||
==Media appearances== |
|||
Krebs is a frequent speaker on computer security and cybercrime topics. |
|||
==See also== |
|||
In October 2011, he gave keynote addresses at |
|||
Topics of Krebs's work: |
|||
* {{Interlanguage link multi|GOVCERT.NL|nl}} in [[Rotterdam]]<ref>{{cite web|url=http://www.govcert.nl/symposium/Symposium+2011/Programme/day1.html |title=Govcert.nl |publisher=Govcert.nl |access-date=2012-02-14}}</ref>{{Primary source inline|date=March 2021}} |
|||
*[[Intuit#Lawsuits|Intuit]] |
|||
* Secure 2011 in [[Warsaw]], [[Poland]]<ref>{{cite web |url=http://www.secure.edu.pl/en/agenda.php |title=SECURE 2011 |publisher=Secure.edu.pl |access-date=2012-02-14 |url-status=dead |archive-url=https://web.archive.org/web/20120311071500/http://www.secure.edu.pl/en/agenda.php |archive-date=March 11, 2012 }}</ref>{{Primary source inline|date=March 2021}} |
|||
*[[mSpy]] |
|||
* SecTor 2011, in [[Toronto|Toronto, Ontario]], [[Canada]]<ref>{{cite web |url=http://sector.ca/schedule.htm |title=Security Conference Toronto Canada — Sector 2012 | Schedule |publisher=Sector.ca |access-date=2012-02-14 |url-status=dead |archive-url=https://web.archive.org/web/20120307215814/http://sector.ca/schedule.htm |archive-date=March 7, 2012 }}</ref>{{Primary source inline|date=March 2021}} |
|||
*[[Russian Business Network]] |
|||
* FIRST 2011 in [[Vienna]], [[Austria]]<ref>{{cite web|url=http://conference.first.org/2011/program/index.aspx"|title=23rd Annual FIRST Conference \\ Vienna, Austria \\ 12-17 June 2011|work=first.org}}</ref>{{Primary source inline|date=March 2021}} |
|||
*[[BlueLeaks]] |
|||
*[[Dark0de]] |
|||
==References== |
==References== |
||
Line 69: | Line 74: | ||
==External links== |
==External links== |
||
* {{official|https://krebsonsecurity.com/ }} |
* {{official website|https://krebsonsecurity.com/ }} |
||
* [https://krebsonsecurity.com/2012/03/aghast-at-avasts-iyogi-support/ Aghast at Avast’s iYogi Support] |
* [https://krebsonsecurity.com/2012/03/aghast-at-avasts-iyogi-support/ Aghast at Avast’s iYogi Support] |
||
* [http://news.cnet.com/2311-10784_3-113620.html CNET News.Com "Blog 100" review] |
* [http://news.cnet.com/2311-10784_3-113620.html CNET News.Com "Blog 100" review]{{Dead link|date=June 2022 |bot=InternetArchiveBot |fix-attempted=yes }} |
||
* {{C-SPAN| |
* {{C-SPAN|95936}} |
||
{{Authority control}} |
{{Authority control}} |
Latest revision as of 17:16, 4 October 2024
Brian Krebs | |
---|---|
Born | 1972 (age 51–52) Alabama, U.S. |
Education | B.A. in International Relations, George Mason University, 1994 |
Occupation(s) | Security journalist Investigative reporter |
Organization | The Washington Post (1995–2009) |
Known for | Coverage of profit-seeking cybercriminals |
Website | krebsonsecurity |
Brian Krebs (born 1972) is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals.[1] Krebs is the author of a daily blog, KrebsOnSecurity.com, covering computer security and cybercrime. From 1995 to 2009, Krebs was a reporter for The Washington Post and covered tech policy, privacy and computer security as well as authoring the Security Fix blog.
Early life and education
[edit]Born in 1972 in Alabama,[1] Krebs earned a B.A. in International Relations from George Mason University in 1994.[2] His interest in cybercriminals grew after a computer worm locked him out of his own computer in 2001.[1]
Career
[edit]1999–2007
[edit]Krebs started his career at The Washington Post in the circulation department. From there, he obtained a job as a copy aide in the Post newsroom, where he split his time between sorting mail and taking dictation from reporters in the field. Krebs also worked as an editorial aide for the editorial department and the financial desk. In 1999, Krebs went to work as a staff writer for Newsbytes.com, a technology newswire owned by The Washington Post.[3]
When the Post sold Newsbytes in 2002, Krebs transitioned to Washingtonpost.com in Arlington, Virginia as a full-time staff writer. Krebs's stories appeared in both the print edition of the paper and Washingtonpost.com. In 2005, Krebs launched the Security Fix blog, a daily blog centered around computer security, cyber crime and tech policy. In December 2009, Krebs left Washingtonpost.com and launched KrebsOnSecurity.com.
Krebs has focused his reporting at his blog on the fallout from the activities of several organized cybercrime groups operating out of eastern Europe that have stolen tens of millions of dollars from small to mid-sized businesses through online banking fraud.[4] Krebs has written more than 75 stories about small businesses and other organizations that were victims of online banking fraud, an increasingly costly and common form of cybercrime.
2008–2012
[edit]Krebs wrote a series of investigative stories that culminated in the disconnection or dissolution of several Internet service providers that experts said catered primarily to cyber criminals. In August 2008, a series of articles he wrote for The Washington Post's Security Fix blog led to the unplugging of a northern California based hosting provider known as Intercage or Atrivo.[5]
During that same time, Krebs published a two-part investigation on illicit activity at domain name registrar EstDomains, one of Atrivo's biggest customers, showing that the company's president, Vladimir Tšaštšin, recently had been convicted of credit card fraud, document forgery and money laundering.[6] Two months later, the Internet Corporation for Assigned Names and Numbers (ICANN), the entity charged with overseeing the domain registration industry, revoked EstDomains' charter, noting that Tšaštšin's convictions violated an ICANN policy that prohibits officers of a registrar from having a criminal record.[7] In November 2011, Tšaštšin and five other men would be arrested by Estonian authorities and charged with running a massive click fraud operation with the help of the DNS Changer Trojan.[8]
In November 2008, Krebs published an investigative series that led to the disconnection of McColo, another northern California hosting firm that experts said was home to control networks for most of the world's largest botnets.[9] As a result of Krebs's reporting, both of McColo's upstream Internet providers disconnected McColo from the rest of the Internet, causing an immediate and sustained drop in the volume of junk e-mail sent worldwide. Estimates of the amount and duration of the decline in spam due to the McColo takedown vary, from 40 percent to 70 percent, and from a few weeks to several months.[10]
Krebs is credited with being the first journalist, in 2010, to report on the malware that would later become known as Stuxnet.[11] In 2012, he was cited in a follow-up to another breach of credit and debit card data, in this case potentially more than 10 million Visa and MasterCard accounts with transactions handled by Global Payments Inc. of Atlanta, Georgia.[12]
2013–present
[edit]On March 14, 2013, Krebs became one of the first journalists to become a victim of swatting.[13]
On December 18, 2013, Krebs broke the story that Target Corporation had been breached of 40 million credit cards. Six days later, Krebs identified a Ukrainian man who Krebs said was behind a primary black market site selling Target customers' credit and debit card information for as much as US$100 apiece.[14] In 2014, Krebs published a book called Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door, which went on to win a 2015 PROSE Award.[15]
In 2016, Krebs's blog was the target of one of the largest ever DDoS attacks using the Mirai malware,[16] apparently in retaliation for Krebs's role in investigating the vDOS botnet.[17][18][19] Akamai, which was hosting the blog on a pro bono basis, quit hosting his blog as a result of the attack, causing it to shut down.[20] As of September 25, 2016[update], Google's Project Shield had taken over the task of protecting his site, also on a pro-bono basis.[21]
An article by Krebs on 27 March 2018 on KrebsOnSecurity.com about the mining software company and script "Coinhive" where Krebs published the names of admins of the German imageboard pr0gramm, as a former admin is the inventor of the script and owner of the company, was answered by an unusual protest action by the users of that imageboard. Using the pun of "Krebs" meaning "Cancer" in German, they donated to charitable organisations fighting against those diseases, collecting more than 200,000 Euro of donations until the evening of 28 March to the Deutsche Krebshilfe charity.[22]
Prior to 2021, his investigation of First American Financial's prior data breach led to an SEC investigation that concluding that "ensuing company disclosures preceded executives’ knowledge of unaddressed, months-old IT security reports."[23]
Allegations of defamation, lawsuit and apology
[edit]On March 29, 2022, Ubiquiti, a publicly traded technology company founded in San Jose, California, filed a lawsuit[24] against Brian Krebs and his blog Krebs on Security, in United States District Court for the Eastern District of Virginia. Ubiquiti's defamation complaint alleged "Krebs avoided obvious sources of public information that rebut his false and preconceived narrative against Ubiquiti, and Krebs doubled down on his attack against Ubiquiti despite possessing uncontroverted evidence that his source was incredible and actually involved in the attack" and that "he was determined to publish stories that adhere to his preconceived narrative that Ubiquiti and other companies."[25] According to an article[26] by ars TECHNICA, Ubiquiti claimed Krebs was "intentionally deceitful" and "financially incentivized" to not correct information the company alleged to be inaccurate. On August 31, 2022, Krebs posted an apology[27] admitting his "sole source" for his blog post was indicted by federal prosecutors for among other things "providing false information to the press." He closes his statement by saying he "missed the mark and, as a result, I would like to extend my sincerest apologies to Ubiquiti." The following day attorneys for both parties made a joint motion for "Stipulation of Dismissal".[28]
Awards and recognition
[edit]- 2004 – Carnegie Mellon CyLab Cybersecurity Journalism Award of Merit[29]
- 2005 – CNET News.com listed Security Fix as one of the top 100 blogs, saying "Good roundup of significant security issues. The Washington Post's Brian Krebs offers a userful, first-person perspective".[30]
- 2009 – Winner of Cisco Systems' 1st Annual "Cyber Crime Hero" Award[31]
- 2010 – Security Bloggers Network, "Best Non-Technical Security Blog"[32]
- 2010 – SANS Institute Top Cybersecurity Journalist Award[33]
- 2011 – Security Bloggers Network, "Blog That Best Represents the Industry"[34]
- 2014 – National Press Foundation, "Chairman's Citation Award"[35]
- 2017 – ISSA's President's Award For Public Service[36]
- 2019 – CISO MAG’s Cybersecurity Person of the Year[37]
See also
[edit]Topics of Krebs's work:
References
[edit]- ^ a b c Perlroth, Nicole. "Reporting From the Web's Underbelly." The New York Times. Retrieved February 28, 2014.
- ^ Krebs, Brian. "Symposium III: Cybersecurity". UC Santa Barbara. Archived from the original on August 17, 2012. Retrieved July 27, 2013.
- ^ Weise, Karen (January 16, 2014). "Brian Krebs: The cybersecurity blogger hackers love to hate". Business Week. Archived from the original on January 17, 2014. Retrieved January 17, 2014.
- ^ "Target: Small Businesses". Krebs On Security. Archived from the original on February 24, 2017. Retrieved February 23, 2017.
- ^ Krebs, Brian. "Security Fix — Report Slams U.S. Host as Major Source of Badware". Voices.washingtonpost.com. Archived from the original on September 3, 2008. Retrieved February 14, 2012.
- ^ Krebs, Brian. "Security Fix — EstDomains: A Sordid History and a Storied CEO". Voices.washingtonpost.com. Archived from the original on July 9, 2009. Retrieved February 14, 2012.
- ^ Krebs, Brian. "Security Fix — ICANN De-Accredits EstDomains for CEO's Fraud Convictions". Voices.washingtonpost.com. Archived from the original on July 21, 2012. Retrieved February 14, 2012.
- ^ "The United States Department of Justice — United States Attorney's Office". Justice.gov. November 9, 2011. Retrieved February 14, 2012.[permanent dead link ]
- ^ Krebs, Brian (November 11, 2008). "Major Source of Online Scams and Spams Knocked Offline". The Washington Post. Archived from the original on March 23, 2009.
- ^ "McColo Outage". Cbl.abuseat.org. Archived from the original on December 18, 2008. Retrieved February 14, 2012.
- ^ Gross, Michael Joseph (March 2, 2011). "Stuxnet Worm: A Declaration of Cyber-War". Vanity Fair. Retrieved September 25, 2016.
- ^ Waters, Jennifer (March 30, 2012). "What to do if you fear your credit card's hacked". MarketWatch.
- ^ Jackman, Tom (March 27, 2013). "'SWATing,' the seamy 'underweb,' and award-winning Fairfax cybercrime journalist Brian Krebs". The Washington Post. Retrieved July 27, 2013.
- ^ Perlroth, Nicole (December 24, 2013). "Who Is Selling Target's Data?". The New York Times Company. Retrieved December 27, 2013.
- ^ PROSE Awards. "PROSE Awards: Winners". proseawards.com.
- ^ "The internet of stings". The Economist. October 8, 2016.
- ^ Ms. Smith (September 11, 2016). "Krebs' site under attack after alleged owners of DDoS-for-hire service were arrested". Network World. Archived from the original on September 12, 2016. Retrieved September 25, 2016.
- ^ "Massive web attack hits security blogger". BBC. September 22, 2016. Retrieved September 25, 2016.
- ^ Kovacs, Eduard (September 21, 2016). "Brian Krebs' Blog Hit by 665 Gbps DDoS Attack". Security Week. Retrieved September 25, 2016.
- ^ Evans, Steve (September 23, 2016). "Krebs Website Offline After Akamai Withdraws DDoS Protection". Infosecurity Magazine. Retrieved September 23, 2016.
- ^ Krebs, Brian (September 25, 2016). "The Democratization of Censorship". Krebs On Security.
- ^ Catalin Cimpanu: Angry Users Donate $120K to Cancer Research After Brian Krebs' Coinhive Article. bleepingcomputer.com, 28 March 2018
- ^ Noah Barsky (August 31, 2021). "The SEC Exposed Cybersecurity's Fatal Flaw — Executive Resistance To Bad News". Forbes.
- ^ "UBIQUITI INC. v. KREBS, 1:22-cv-00352 - CourtListener.com". CourtListener. Retrieved July 16, 2024.
- ^ "https://storage.courtlistener.com/recap/gov.uscourts.vaed.521759/gov.uscourts.vaed.521759.1.0.pdf" (PDF). courtlistener.com. March 29, 2022.
{{cite web}}
: External link in
(help)|title=
- ^ Chant, Tim De (March 31, 2022). "Ubiquiti sues journalist, alleging defamation in coverage of data breach". Ars Technica. Retrieved July 16, 2024.
- ^ "Final Thoughts on Ubiquiti – Krebs on Security". Retrieved July 16, 2024.
- ^ "Stipulation of Dismissal – #22 in UBIQUITI INC. v. KREBS (E.D. Va., 1:22-cv-00352) – CourtListener.com". CourtListener. Retrieved July 16, 2024.
- ^ "2004 Cybersecurity Journalism Awards :: CyLab". Cylab.cmu.edu. Archived from the original on March 6, 2006. Retrieved February 14, 2012.
- ^ "News.com's Blog 100 | CNET News.com". News.com.com. Retrieved February 14, 2012.[permanent dead link ]
- ^ "Security" (PDF). Cisco. July 17, 2015.
- ^ "RSA Conference | Security Blogger Meetup | They're all winners". Archived from the original on March 5, 2013. Retrieved January 15, 2014.
- ^ "2010 Top Cyber Security Journalist Award Winners". SANS. February 10, 2012. Retrieved February 14, 2012.
- ^ "RSA Conference | Security Blogger Meetup | And the Winners Are". 365.rsaconference.com. Archived from the original on February 14, 2012. Retrieved February 14, 2012.
- ^ "The 2014 Chairman's Citation Winner". Retrieved November 10, 2015.
- ^ "ISSA International Awards".
- ^ "Brian Krebs is the CISO MAG Cybersecurity Person of the Year". May 29, 2023.
External links
[edit]- 1972 births
- Living people
- Anti-spam
- American business and financial journalists
- American male journalists
- Writers about computer security
- American crime reporters
- American investigative journalists
- The Washington Post journalists
- American online journalists
- American activist journalists
- George Mason University alumni