STE WILLIAMS

VirusTotal invites Apple fans to play in updated Mac malware sandpit

Google’s VirusTotal will begin executing Mac apps to test for malicious activity following an uptick in reports of malware targeting Apple’s desktop operating system.

The virus scanner is popular with black hats, white hats and everyday users and tries to determine if antivirus mechanisms will flag malware. The service’s sandbox execution provides greater behavioural insight into Mac malware. That modus operandi makes the service a closer indication of true antivirus accuracy since scanning alone will not catch malware that is more noticeable on execution.

VirusTotal boffin Karl Hiramoto (@karlhiramoto) says Mach-O executables, DMG and ZIP files can now be analysed.

But many capable malware variants sport anti-analysis tricks as the endless cat-and-mouse game between VXers and researchers plays out.

Smart malware writers will write in capabilities to detect common sandboxes and analysis tools that researchers and the likes of VirusTotal may use.

If malware finds it is being executed in a sandbox, it may either shut down or launch benign actions to throw researchers off the scent.

It is unknown how such malware will fare in the VirusTotal environment.

Malware fans can upload their suspect applications for execution through the VirusTotal uploader or through the API. ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/19/virustotal_invites_apple_fans_to_play_in_updated_mac_malware_sandpit/

Criminal are mostly hacking-by-numbers with exploit kits

Exploit kits are dominating the criminal hacking industry, but even though code fiends prefer colour-by-numbers cracking kits that isn’t stopping them from assembling a vast command and control army domain name servers linked to popular kits are up 75 percent in the third quarter compared to 2014, according to a report.

It could lead to a flood of attacks should web scum take advantage of the available command and control infrastructure

Angler was the worst offender among exploit kits while the Matsnu domain generation algorithm played the biggest hand in the new command and control infrastructure.

Magnitude, Neutrino, and the popular Nuclear exploit kits helped bump the figures along in what was an increase on last year but a slight fall on the second quarter of 2015.

“The Infoblox DNS Threat Index in 2015 continues to remain well above the average for the previous two years, indicating that cybercriminals are continuing to expand their infrastructures,” say the authors of the Infoblox and IID report.

“Exploit kits and phishing remain significant components of the index because these techniques have been successful for malicious actors.”

The cost of buying into the exploit game has dropped from more than US$10,000 to about $1000 or less, depending on the kit.

As this reporter noted in June, security bods at Trustwave reckon web crims can clear a whopping US$84,000 a month for a paltry US$5400 outlay through the use of exploit kits to deliver malware and ransomware.

Crims would need to shell out US$3,000 for the ransomware, US$1800 for a hacked high traffic site, US$500 for an exploit kit like RIG and US$600 for anti-anti-virus fuzzers over a month to hit their profit targets. ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/19/exploit_kits_up_75percent_infoblox/

Edgy online shoppers face Dyre Christmas as malware mutates

VXers have cooked up Windows 10 and Edge support for the nasty Dyre or Dyreza banking trojan.

The banking bomb has ripped untold fortunes from victims and passed them into the hands of its authors. In at least one instance alone IBM says more than one million dollars was plundered from an organisation.

At present it has infected some 80,000 machines with that number expected to rise.

It can also target Mozilla Firefox, Google Chrome, and of course Internet Explorer.

While Dyre is highly capable and among the worst banking trojans in existence, it is unclear how it will fare against Microsoft’s new and harder Edge browser which has received laudable security upgrades of late.

Heimdal Security’s Andra Zahria says the new Dyre variant can hook Edge and kill unnamed security software on victim machines.

“The cyber criminals behind Dyreza often spread the malware via spray-and-pray spam campaigns, which are sent to random recipients,” Zahria says.

” … Dyreza is also a crime-as-a-service network” that anyone can buy into [and attack] a group of targets in the code configuration file [which] are typically online banking websites.”

Targeted users risk having bank accounts drained and machines botted.

Dyre authors have also added support for both 32-bit and 64-bit Windows systems. ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/19/edgy_online_shoppers_face_dyre_christmas/

UK joins US financial institutions for industry resilience tests

The UK teamed up with US authorities to run a banking industry resilience exercise, dubbed Operation Resilient Shield, last week.

The paper-based transatlantic exercise focused on improving information sharing and planning in the context of a cyber attack rather than fending off Red Team hackers.

Leading (but unnamed) global financial firms were also involved in the joint US/UK table-top exercise which aimed at enhancing “cooperation and ability to respond effectively to a cyber-incident in the finance sector.”

Resilient Shield omitted any test of individual financial firms or financial systems. Instead the exercise focused on improving understanding across the two governments and industry in three main areas: information sharing, incident response handling and public communications. The exercise did not “amount to a ‘cyber war game’ or include live play”, as a HM Treasury statement on Resilient Shield emphasises.

Testing the actions of law enforcement or the security and intelligence agencies was likewise outside the scope of the operation.

Participants from the UK included CERT-UK, the UK Financial Authorities (HM Treasury, the Bank of England and the Financial Conduct Authority), Cabinet Office, the National Crime Agency, the Office of Cyber Security Information Assurance and UK intelligence (not named but doubtless GCHQ was involved). Participants from the US included representatives from the White House National Security Council, the Department of the Treasury, the Department of Homeland Security, the FBI, the US Secret Service, several reserve banks and other financial sector organisations.

One of the main aims of Resilient Shield was to exchange best practices domestically and between the US and UK on a government-to-government and government-to-financial sector basis. Understanding of each country’s cyber security information sharing processes and incident response coordination structures, including scenarios that may call for a coordinated response and public communications, was also part of the rationale for running Operation Resilient Shield.

Boosting “cyber security cooperation by “enhancing processes and mechanisms for maintaining shared awareness of cyber security threats between US and UK governments and the private sector” was another goal in the (frankly rather bureaucratic and seemingly focused on paper shuffling) exercise.

The operation follows earlier cyber-attack drills testing the resilience of the UK banking sector, including Operation Waking Shark and Waking Shark II. Waking Shark II, which took place in November 2013, was more focused on testing how investment banks and financial institutions held under a sustained assault by hackers.

Working on communications and pooling best practice was also involved but Waking Shark II also involved stress-test exercises and simulated attacks, unlike Resilient Shield. Waking Shark II tested how merchant banks and city institutions might react under a combination of DDoS attack and wiper-style malware assault from a nation-grade state adversary that was hell bent on causing chaos on financial markets.

Resilient Shield might seem tame, even bureaucratic, but independent security experts quizzed by El Reg agreed it was still worthwhile.

“One of the key elements in IR [incident response] is knowing who to contact and how,” independent infosec consultant Brian Honan, the founder and head of Ireland’s CERT, told El Reg. “These type of exercises are good at identifying gaps.”

Experienced infosec consultant and banking sector alumni Stephen Bonner added that exercises such as Resilient Shield are a “cost effective way to break down barriers/build links”.

In a statement, Mark Carney, governor of the Bank of England, praised the Resilient Shield exercise, which he argued ought to be regularly repeated.

“It is vital that the financial sector continues to develop its resilience in the face of ever-evolving cyber threats,” Carney said. “The Bank has a particular interest in this given its role along with HM Treasury and the Financial Conduct Authority to ensure that firms can continue to provide critical services that are important for the functioning of the financial sector, and the Financial Policy Committee’s remit to monitor and address non-financial as well as financial risks to the system.”

“Regular exercises such as this play an important role in helping the financial sector and the authorities plan a coordinated response to a cyber event, and the Bank of England has been pleased to provide the technical expertise to facilitate this exercise,” he added. ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/19/resilient_shield/

Hacking group Strontium dogs NATO and government targets

There’s a new hacking team out there that’s proving surprisingly good at getting into government systems using social engineering tactics coupled with zero-day attacks in assaults that can last as long as a year.

Dubbed Strontium by researchers at the Microsoft Malware Protection Center, the hackers have been active since 2007, but this year have been particularly determined going after servers in government bodies, diplomatic institutions, and military forces and installations in NATO member states and certain Eastern European governments.

The group spends a lot of time researching their targets on social media and email lists, trying to find people with access to a system they want to penetrate. Microsoft researchers say several thousand people have been subject to attack.

The first stage in an intrusion is carried out using phishing emails, typically a password reset email that looks convincing. To trick the unwary, the group sends them from domains that are similar to the proper address, such as accounts.g00gle.com or electronicfrontierfoundation.org.

Once in, the hackers search through email logs and system information to find people who have admin access to the target server. They then send a second round of emails, usually linked to current events, to encourage the target to click on a URL containing malware.

Strontium were quick to exploit the zero-day flaws exposed when the Hacking Team got its servers pwned, and also to reverse-engineer patches to exploit security flaws within days of their release. Adobe Flash Player, the Oracle Java Runtime Environment (JRE), Microsoft Word, Internet Explorer, and some components of the Windows kernel are popular choices with the group.

The attackers use custom malware that not only installs a Trojan on the system, but also writes itself into the registry files to make cleanup more difficult. The software has many modules that include key logging, email address and file harvesting, information gathering about the local computer, and remote communication with command and control servers.

The malicious code can communicate back to the hackers via HTTP, SMTP, and POP3. The coders were smart in masking the system, typically having it communicate with legitimate-sounding addresses like softupdates.info and malwarecheck.info.

“Strontium is a very challenging adversary for a targeted institution to defend against: it possesses a broad range of technical exploitation capabilities, significant access to resources such as previously undiscovered zero-day exploits, and the determination to keep up an attack for months or years until it succeeds,” Microsoft said in its report.

Redmond doesn’t say who the attackers might be, but given the amount of time they are willing to spend on an attack, the choice of targets, and the sophistication of its software, a nation state hacking team seems likely. ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/18/hacking_group_strontium_dogs_nato_and_government_targets/

Tor wars: CMU says FBI came not with cash, but a subpoena

Carnegie-Mellon University has fired back in the TOR war, saying that it wasn’t paid by the FBI to reveal its de-anonymisation research outputs.

The university’s statement on the matter is here and includes the following:

“There have been a number of inaccurate media reports in recent days regarding Carnegie Mellon University’s Software Engineering Institute work in cybersecurity.

“Carnegie Mellon University includes the Software Engineering Institute, which is a federally funded research and development center (FFRDC) established specifically to focus on software-related security and engineering issues. One of the missions of the SEI’s CERT division is to research and identify vulnerabilities in software and computing networks so that they may be corrected.

“In the course of its work, the university from time to time is served with subpoenas requesting information about research it has performed. The university abides by the rule of law, complies with lawfully issued subpoenas and receives no funding for its compliance.”

The statement almost says, but not quite, that it was complying with a subpoena in relation to its 2014 discovery that TOR could be attacked in a way that discovered user IP addresses.

TOR’s interim CEO Roger Dingledine set the hounds running last week when he accused the University of taking the FBI’s cash to crack TOR.

At the time, the university denied receiving payment, but didn’t deny handing over data.

That has opened an ethical can of worms: the researchers spent some time on their de-anonymisation work without telling the TOR Project what was going on.

The IP addresses s the researchers collected have been implicated as helping the FBI make arrests associated with Silk Road 2 and a child exploitation images case. ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/19/tor_wars_cmu_says_fbi_came_not_with_cash_but_a_subpoena/

VMware warns of info leaks flowing from Apache-Adobe mess

VMware has warned users of its vCenter, vCloud Director and Horizon products that they need to patch a flaw in Flex BlazeDS.

The flaw, CVE-2015-3269, means Apache Flex BlazeDS “allows remote attackers to read arbitrary files via an AMF message containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.” The Apache software creates problems when “used in flex-messaging-core.jar in Adobe LiveCycle Data Services”. The CVE notice we’ve linked to above explains the many versions of the Adobe software that has the problem.

There’s a silver lining in this bug for VMware, as vCenter 6.0 is immune to it. Users of 5.x need to implement a fix, so perhaps some will go all the way and just go to version 6.0 while they’re at it. Horizon View 6.0 users and those running the current version of vCloud Director (5.6) aren’t so lucky: they can either download the updates VMware suggests or leave themselves exposed to the risk that “A specially crafted XML request sent to the server could lead to unintended information be disclosed.” ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/19/vmware_warns_of_info_leaks_flowing_from_apacheadobe_mess/

Microsoft gets Edge on blocking ad injectors

Microsoft has nixed the ability for its Edge browser to run unsigned dynamic link libraries (DLLs) in a move that will make life hard for dodgy extensions and ad injector merchants.

Edge senior program manager Crispin Cowan says the update was dropped last week in the latest Windows 10 update and follows Redmond’s plan to harden its web browsing asset.

Last May Microsoft killed ActiveX and Browser Helper Objects making Edge faster and more stable, Cowan says.

“Web browsers are an attractive target, because in-browser advertisements can be a significant source of revenue,” Cowan says.

“Developers who are determined to tamper with the user’s settings may resort to injecting DLLs into the Edge process, bypassing the built-in interfaces for settings controls.

“This is a common reason why some users end up with toolbars installed or third party content injected on pages without their intent or consent.”

Cowan says advertising injectors will pull down extra malicious content leading to thorough hosing of browsers and at best an increase in attack surface.

Microsoft isn’t the only browser baron that hates ad injectors. In April Google killed nearly 200 extensions and prevented users installing those outside its sanctioned store.

The update makes the browser the only one with that type of security protection.

Edge also remains the only browser which inexplicably lacks the bog-standard feature to open all folder bookmarks in tabs, a deal-breaker for this reporter. ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/19/ms_edge_ad_injectors_squashed/

BadBIOS is back – this time on your TV

The Federal Trade Commission (FTC) is the offical consumer watchdog in the USA.

As you can imagine, the FTC is particularly interested in dodgy marketing practices.

These days, that doesn’t only involve accuracy and fairness, but also covers issues such as how personal information about potential customers is collected and used.

For example, in recent months, the FTC has acted against a range of online activities that it has deemed devious, deceptive or dishonest, such as:

Where next?

Today, the FTC is holding a workshop in Washington DC entitled Cross-Device Tracking.

Tracking you via your browser, or by means of a mobile app, is fairly straightforward, for example by setting a browser cookie, or using a unique identifier in the app.

Even if marketers don’t know who you are, they can target you more effectively with ads (or so that say, at any rate) if they know something about your interests and your product preferences.

And if they can feed you ads that are more likely to work, they can charge their customers more, and everyone is happier, including you (or so they say).

But tying together those identifiers between different devices is altogether more difficult.

You might have a cookie code of LNT67QT­ABZID in Firefox on your Windows laptop, but an advertising identifier of 13N5TSD­FFYHT on your mobile phone.

To an online marketing company, that’s effectively two people – unless and until they figure out that the same person is denoted by both those codes.

Once they’ve done that, each code can stand in for the other, so both your laptop and your mobile activities can be tied back to you from then on.

Obviously, if you login to the same service as the same user on two different devices, that lets a service provider associate both those devices to you.

Likewise, a company might offer you a free service such as Wi-Fi, redemeed via a code that is SMSed to your phone, which lets them tie your laptop and phone together in future.

The FTC refers to this as deterministic tracking, because there is an explicit element to it, and there is at least some opportunity for you to give informed consent.

Probabilistic tracking

More worrying is so-called probabilistic tracking, where what you do and how you do it – such as device type, operating system version, screen resolution and IP number – is used to infer which devices probably have a common user.

As the FTC points out:

Such “probabilistic” tracking is generally invisible to consumers and, unlike tracking through cookies, the consumer has no ability to control it. Accordingly, this practice raises a number of privacy concerns and questions.

Inaccuracy is perhaps as much of an issue in systems of this sort.

A company could use all sorts of measurements, such as how you move your mouse, the way you type, and many other digital flourishes, as if they offered identification, not merely supposition.

And then, of course, they could sell on these unreliable “identifications” to third-party companies, where they might end up working against you in an almost Kafkaesque way.

BadBIOS is back

One of the most intriguing – and perhaps the most outlandish – technique for cross-device tracking is mentioned in the public comment submitted to the FTC’s workshop by the DC-based Center for Democracy and Technology (CDT).

The CDT makes reference to an Indian company that claims to offer a TV-to-smartphone tracking system that works, if you can believe it, using ultrasound.

Just like the BadBIOS controversy from late 2013, which was supposed to be hardware-level malware that could steal data even across a so-called network “air gap,” such as the one that exists between the average TV and smartphone.

The idea is that you can use regular audio waves to transmit data between two computers that have no other sort of network connection.

In the early days of modems, this technique was quite common, using an acoustic coupler that played modem tones directly into the mouthpiece of a regular telephone to transmit data from a remote site.

But BadBIOS introduced a new twist: unlike a landline voice telephone, modern devices have loudspeakers and microphones that are capable of producing and recording sounds at frequencies beyond the range of a normal human ear.

In theory, then, or at least in the laboratory, a even a computer (or a TV) with no LAN connection, no Bluetooth and no Wi-Fi, could produce sounds that a co-operating device nearby could receive and interpret as data, and you wouldn’t be able to tell.

Unlike the telltale tones of a modem connection, such as you can hear in the jingle at the start of every Sophos Security Chet Chat podcast, high-frequency sounds may be “audible” to a mobile phone’s microphone, but undetectable to the human ear.

Ultrasound tracking

The company described in the CDT’s documents claims that its mobile app framework can detect ultrasonic data codes that you embed in the soundtrack of your TV ads.

The idea is that if a viewer’s phone is turned on, and in range of the TV, and they have one of your apps installed and running, you will be able to tell whether they saw your commercial.

You’ll even be able to tell whether they switched channels during the commercial, or fast-forwarded through it.

If they didn’t skip the commercial, of course, you still won’t know whether they actually watched it or not.

Unless – and who can say? – you have another app that can keep track of the viewer’s smart home devices and monitor water usage (e.g. a toilet flush) or power consumption (e.g. a kettle activation) to help you guess whether they used the commercial break for other households tasks.

As the CDT notes, the insidious aspects of this sort of tracking are that:

[The tracking company’s] policy is to not “divulge the names of the apps the technology is embedded,” meaning that users have no knowledge of which apps are using this technology and no way to opt-out of this practice.

There’s nothing fundamentally wrong with tracking TV viewers’ habits, whether by explicit network feedback from a smart TV, or by audio feedback from a non-networked TV, provided that they know it’s happening, have agreed to it, and know they can withdraw that agreement at any time.

But just the mention of ultrasound, even without its memories of the BadBIOS story, and of mobile apps that secretly use your microphone to detect inaudible content, does have a whiff of deceit about it.

If mainstream apps – we’re thinking of Skype, Facebook and others – are willing to come clean about whether they use this sort of technology or not, we’ll be able to defeat this sort of tracking by deciding which apps we trust with our microphone.

So we await the outcome of the FTC’s workshop with interest!

Will it actually work? Can inaudible ultrasonic frequencies make it to a viewer via the compression used by digital TV, for example? Audio compression relies on saving bandwidth by throwing out parts of the audio signal that don’t affect its clarity much, or even at all. Obviously, ultrasonic frequencies can unexceptionally be discarded altogether, because they have no effect on what a listener will hear. So broadcasters would, presumably, need to co-operate by using non-standard transmission encodings. We’re sceptical about the practicability of this system, but it is at least theoretically possible, and thus well worth considering at the FTC’s workshop, if only because it raises important issues about consent.

💡 LEARN MORE: BadBIOS malware explained ►

💡 LEARN MORE: Security and privacy on your phone ►

💡 FREE TRIAL: Sophos Mobile Control ►

Horror TV image courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/OgYDKlSmwCU/

Google VirusTotal – now with autoanalysis of OS X malware

Back in April 2015, at the RSA conference, Google did a strange thing.

The makers of Android as good as denied the existence Android malware by re-defining it into a category called PHAs, or Potentially Harmful Applications.

In any case, said Google, PHAs were hardly worth worrying about because “less than 1% of devices have a PHA installed.” [Shouldn’t that be “fewer”?Ed.]

Of course, 1% of of more than 1 billion devices still adds up to more than 10,000,000 PHA-infected Androids in the wild at any time.

And with PHAs lumped into subcategories including spyware, backdoor, call_fraud, sms_fraud, phishing, DDoS and ransomware…

…it certainly sounds as though most of us would be happy with the word malware as shorthand for Potentially Harmful Application. (Ironically, Google even lists generic_malware as a named subcategory of PHAs.)

In fact, Google probably agrees with us, because its own online malware processing service, VirusTotal, will accept Android malware samples.

VirusTotal attempts to analyse and classify malware automatically by scanning incoming samples with a battery of security products, which helps to match up which products use what names.

The service also runs certain sample types in a controlled research environment often called a sandbox.

If a suspicious new file is spotted that isn’t yet known to the security research community, samples of the file can quickly be distributed to those with a need to know.

Malware sandboxing isn’t for the faint-hearted. Don’t be tempted to get started in anti-virus research simply by grabbing some malware samples and running them in a virtual machine (VM) on a spare computer at home to see what happens. If you aren’t careful, the malware could end up attacking other people’s networks. For example, if you deliberately run spam zombie malware in a VM to monitor what it does, you don’t want any of its spam to escape and reach innocent users. If that happens, you become part of the problem, not the solution!

Loosely speaking, the malware types that VirusTotal itself knows how to analyse are those most likely to be encountered in real life, and fretted about, by users around the world.

Automatic processing of Windows programs (known in the trade as PE files, short for Portable Execution format, even though they’re Windows-specific) was added to Virus Total in 2012, and of Android programs in 2013.

And now – don’t shoot the messenger – Google has added OS X apps to VirusTotal’s capabilities.

You can upload:

  • DMGs. (Mac disk images, commonly used for distributing Mac apps.)
  • Mach-O files. (Mach-O is the OS X equivalent of a PE file – the native executable binary format.)
  • A zipped-up Mac app. (Most officially-installed Mac apps exist as a self-contained directory tree stored in /Applications.)

We’ll be quite frank, and say that your risk of malware infection on a OS X is very much lower than on a Windows or Linux computer.

Infected Linux servers are depressingly common these days, and the main motivation that crooks have for infecting them is to pass malware on in bulk to Windows users.

YOU MIGHT ALSO LIKE:

Malware on Linux – When Penguins Attack

(Audio player not working? Download MP3, listen on Soundcloud, or read the transcript.)

So, with Windows and Linux locked in an unhealthy “cybercrime symbiosis,” it’s easy to assume that the risk of OS X malware, or of Mac-specific phishing, or any other Apple-directed cybercriminality, is low enough to be written off as zero.

We think that’s a dangerous assumption, and we’re not just saying that because we have Mac threat protection software to sell you.

(Actually, for home use, Sophos Anti-Virus for Mac is 100% free, but that’s still not why we’re saying that Mac malware is worth taking seriously.)

It’s the other way around: we think Mac malware is worth taking seriously, and that’s why we have Sophos Anti-Virus for Mac.

But don’t ask us if there really is Mac malware out there…ask Google :-)

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/1VEyNiVvuI0/