STE WILLIAMS

T-Mobile US megahack cost Experian $20m, class actions coming

Experian has claimed the megahack of its own systems, compromising 15 million T-Mobile US customers’ data, has cost it $20m so far, with several class action lawsuits also on the horizon.

The Dublin-based credit services company said the enormous breach of T-Mobile US information was a result of its own systems being hacked, rather than T-Mobile’s.

The company held information on T-Mob US customers as it processed credit applications to the company.

“One off” costs of $20m (£13.2m) had little impact to the company, according to its half-yearly financial report. However, it has warned that it’s received “a number of class actions” and was unsure of the effect following the legalities, as well as regulatory and government actions.

Pre-tax profit dropped by 14 per cent, from $534m to $458m year-on-year, and revenue fell by six per cent from $2.39bn to $2.24bn. Investors were quite happy to disregard this however, with an early slump being completely forgotten after an 11 per cent surge from Monday’s closing price of 1102p to 1233p, when the market opened on Wednesday.

T-Mobile US eventually got rid of Experian for credit checks following the hack, telling The Register that TransUnion’s CSID service would offer ID theft and credit monitoring instead.

Analysis of the breach at the time noted that despite Experian being at fault, reputational damage will still fall upon T-Mobile.

“Ultimately, T-Mobile’s customers aren’t going to care where and how the breach occurred – the bottom line is they trusted T-Mobile with their sensitive data and now that trust is broken,” Luke Brown, VP at data loss prevention firm Digital Guardian told The Register. ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/11/tmobile_megahack_cost_experian_20m_with_class_actions_to_come/

F-Secure makes SENSE of smart home IoT insecurities

F-Secure is looking to go that extra mile in consumer security with the launch of an anti-hacker appliance for the Internet of Things.

The device, dubbed SENSE, works as a secure gateway, policing traffic to devices that might be insecure and generating alerts. For example, it will warn consumers if their router is running with default settings, and therefore with a more easily hackable password.

Credential-spewing iKettles, insecure hubs and potentially snoopy smart TVs are characteristic of the generally lamentable state of IoT security.

SENSE won’t fix problems such as weak crypto or default passwords directly, but it will mitigate against the risk of malware-infected hubs on a home network attempting to contact botnet control servers. The kit will also offer control over UPnP.

“Patching light bulbs is not going to happen,” said F-Secure chief exec Christian Fredrikson. “With SENSE you don’t have to worry if you smart TV is secure or not.”

Samu Konttinen, F-Secure’s executive veep, consumer security, added: “We’ve seen footage from nanny cams streamed online without people’s knowledge or consent, and it’s been proven that intruders can use something as simple as a connected light bulb to get access to people’s homes.”

F-Secure is well known for its mobile security software, where it has successfully used operators to sell on its security suites. The Finnish firm plans to use the same network of 200 operators, alongside other channels including its own website, to sell SENSE. The kit is due to ship in Spring 2016.

The technology, which is designed for ease of set-up and use, is designed to protect smart homes, and combines unique hardware and software to offer a single source of protection for all of the devices in homes – including PCs, tablets and smartphones, as well as newer IoT products.

The product uses F-Secure’s Security Cloud to secure internet traffic going in and out of homes, and lets people manage the security of their network and devices with a simple mobile app.

VPN technology will not feature is the first version of the kit but is on the product development roadmap.

In response to a moribund consumer security software market, F-Secure is moving on from selling consumers downloads to protect computers and smartphones individually to selling a unified home security appliance, with recurring revenues through subscription to software update services.

The hardware and software, as well as a 12-month subscription to the service, is priced at EUR99. Monthly subscriptions can be renewed for 8EUR per month.

The tech was launched during a keynote at the Slush startup conference in Helsinki, Finland on Wednesday. ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/11/f_secure_iot_smart_home_security_sense/

Ex-GCHQ chief: Bulk access to internet comms not same as mass surveillance

IPB A specially convened, one-off chinwag about the so-called “tech issues” in the UK government’s latest draft super-snoop bill failed to get to the nitty-gritty on Tuesday afternoon.

Parliament’s science and technology committee faced down industry bods, the former boss of GCHQ and a number of academics to try to better understand some of the technical concerns that have been raised following the draft legislation’s arrival last week.

But – despite some good questions from Labour MPs Stella Creasy and Valerie Vaz – much of the discussion drifted too readily into a debate about being for or against Home Secretary Theresa May’s proposed law to extend the surveillance powers of Britain’s spooks and cops.

Inevitably, one-time GCHQ chief Sir David Omand was animated about supporting the government’s bid to massively ramp up snooping on Brits’ online activity.

When quizzed about technical improvements, he told MPs: “I would have gone slightly further than internet connection records. Having a full weblog would be far better.”

The trouble is that such a strategy “is not thought to be saleable” at present.

“The volumes of data are enormous on the internet,” Omand added. “This bill will not eliminate the difficulties of encryption … but it will help the authorities manage their level of risk.”

Fuzzy definitions

Earlier in the session, Internet Service Providers’ Association chair James Blessing had warned MPs that many of the technical demands in the draft legislation were “fuzzy”.

Omand countered that claim, however.

“The communications data definitions are actually not fuzzy at all, they’re actually quite precise. What is not defined in the bill is metadata,” he said.

“The position under the existing legislation is if it’s not ‘who, what, where or how’ then it’s content. So some of the fancy things you can do with metadata require a secretary of state to warrant. Now I’m very comfortable with that, as I know intelligence agencies are.”

He added that communications data was the “gold dust” information needed by spooks and cops to monitor crims and terrorists.

Omand then went on to claim that metadata (the aforementioned gold dust) was less sensitive than the content – a comment repeatedly trotted out by g-men who attempt to justify the drag net surveillance of netizens.

On encryption, he said “I’m not mandating backdoors” and claimed that there was “a lot of nuisance” being written about the government’s stance on crypto tech, which just so happened to chime with similar claims coming out of the GCHQ camp on Tuesday.

He also claimed that bulk access to internet communications was the same as mass surveillance.

Request filters, anyone? Anyone? Hello …

Among other things, the panel failed to discuss the contentious request filters mentioned in the draft bill.

Last week, the Home Office confirmed to The Register that the system would be used by public authorities to make a “complex request for communications data”. Which, put another way, is a database query.

But – if you obey Whitehall – no one is allowed to use the word “database”. Indeed, it’s not mentioned once in May’s proposed law. ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/11/ex_gchq_chief_bulk_access_to_internet_comms_not_same_as_mass_surveillance/

Former parking ticket bloke turns out to be cybersecurity genius

Ross Bradley, who spent the last 15 years processing car parking fines for Newcastle City Council, is set to become one of the UK’s top cyber professionals after achieving one of the highest ever scores in the internationally recognised GIAC cyber security qualifications.

The SANS Cyber Academy, which aims to fill the cyber skills shortage by finding those with “cyber aptitude, but not necessarily experience” and transforming them into functioning professionals, put 31 “high potential students” through a two month course of “rigorous cyber training.”

The students were selected from more than 25,000 candidates.

“That someone who has never worked in the profession has such potential is proof that the cyber professionals we need are out there, but the current system is failing to find and nurture them” said Steve Jones, UK Managing Director of SANS.

Bradley said he was “wary of quitting my job and starting the academy, especially when I saw that people working in forensics and with degrees were going. I thought to myself, ‘I don’t have a degree, I just work for the council’, but I’m glad I went. I wasn’t expecting to do so well but I knew I had to work extremely hard. I put a lot of work in and I’m glad it paid off.”

Another winner, Kate Booth, left her job as a university lecturer and was offered a place at the academy due to her excellent strong aptitude test score. She said the course was “great because it includes people of all ages and backgrounds that haven’t followed the usual route to cyber security and doesn’t just look at existing skills but also capability and potential.”

It’s a great model for supporting women into the industry, avoiding traditional routes which can be quite male-centric. Half the population are women so we are missing the talents of a lot of people.

Booth said “I was always interested in maths and science when I was at school and my parents gave me a lot of encouragement to do what I was interested in, but we need to do more as a country to support women into cyber security. There is still a way to go, but initiatives like this can really help women to break through.” ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/11/newcastle_parking_clerk_cybersecurity_genius_sans_academy/

T-Mobile megahack cost Experian $20m, class actions coming

Experian has claimed the megahack of its own systems, compromising 15 million T-Mobile customers’ data, has cost it $20m so far, with several class action lawsuits also on the horizon.

The Dublin-based credit services company said the enormous breach of T-Mobile information was a result of its own systems being hacked, rather than T-Mobile’s.

The company held information on T-Mobile customers as it processed credit applications to the company.

“One off” costs of $20m (£13.2m) had little impact to the company, according to its half-yearly financial report. However, it has warned that it’s received “a number of class actions” and was unsure of the effect following the legalities, as well as regulatory and government actions.

Pre-tax profit dropped by 14 per cent, from $534m to $458m year-on-year, and revenue fell by six per cent from $2.39bn to $2.24bn. Investors were quite happy to disregard this however, with an early slump being completely forgotten after an 11 per cent surge from Monday’s closing price of 1102p to 1233p, when the market opened on Wednesday.

T-Mobile eventually got rid of Experian for credit checks following the hack, telling The Register that TransUnion’s CSID service would offer ID theft and credit monitoring instead.

Analysis of the breach at the time noted that despite Experian being at fault, reputational damage will still fall upon T-Mobile.

“Ultimately, T-Mobile’s customers aren’t going to care where and how the breach occurred – the bottom line is they trusted T-Mobile with their sensitive data and now that trust is broken,” Luke Brown, VP at data loss prevention firm Digital Guardian told The Register. ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/11/tmobile_megahack_cost_experian_20m_with_class_actions_to_come/

Cops gain access to phone location data

Police in some states can now access your phone location data without a warrant, following a Supreme Court decision not to hear the appeal of an armed robber.

Quartavious Davis, 23, was convicted of taking part in a string of robberies in the Miami area after police used cell tower data to link him to the sites where and when the crimes took place. They obtained 11,606 location records from MetroPCS – an average of 173 location points each day – and the data was instrumental in Davis’ conviction.

Police grabbed the records under the 1986 Stored Communications Act, which states such records are available to the police if they have reasonable grounds to be suspicious of someone.

Davis’ lawyer argued however that this kind of information needs to meet a standard of “probable cause” and so require a warrant to be accessed. The Florida courts disagreed and the case was appealed all the way up to the Supreme Court. However, the Court decided Monday not to hear the case.

That means Davis has run out of appeals and will face his full sentence of 161 years in prison for the robberies, despite being a first offender and not injuring any of his victims.

It is not the end of the case as it relates to cellphone data however. While the Fifth and Eleventh Courts of Appeals have decided that the right standard is “reasonable suspicion”, earlier this year the Fourth Circuit decided that “probable cause” was needed.

As a result, many expected the Supreme Court to take up the case as a way of resolving the differences. Instead, it appears that the Court is waiting to see if there will be a full in banc review of the Fourth Circuit’s full 11 judges. If the full court also decides that “probable cause” is the right standard, then the case is likely to head to the Supreme Court where, presumably, it will hear it.

Tell me more about Quartavious

Quartavious Davis was one of six men involved in the robberies, but the others cut plea deals and received sentences ranging from nine to 22 years. Davis, who says he has learning disabilities, claimed he wasn’t offered a plea deal.

The case was one of the inspirations for the Geolocation Privacy and Surveillance Act (GPS Act), introduced to Congress in January by Senator Ron Wyden (D-OR) and Representative Jason Chaffetz (R-UT). The legislation seeks to ban the seizure of geolocation data without a warrant.

“It’s clear the courts won’t resolve this question any time soon, so Congress needs to step up and make sure that Americans’ cell phones aren’t being used as warrantless government GPS trackers,” Wyden said, following the Supreme Court’s decision.

“My GPS Act with Congressman Chaffetz cuts through the mess of legal opinions and relies on the Fourth Amendment. There shouldn’t be any question: The government needs to get a warrant whenever it wants to track Americans electronically, be it by phone, Stingray, or any other device.” ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/10/phone_location_data_open_to_us_police/

Edge joins Explorer in bumper crop of security patches

It’s Patch Tuesday the second day of the week in the month of November and Microsoft and Adobe have pushed out their security updates. Joining the perennial favorites Flash and Internet Explorer comes new kid on the block, Edge.

Top line news: no zero days this month but there are four critical updates and eight important ones from Microsoft, four of which cover security holes that have already been publicly revealed, so it’s time to get patching.

Most Microsoft updates are for Windows but also Office and Skype (for Business). One (MS15-113) covers the new Edge browser on Windows 10. This will need to be applied after the “fall refresh” for Windows 10, which is expected this Thursday.

As a quick overview, here is a handy graphic from Shavlik.

Those patches in full:

MS15-112. Critical. Remote Code Execution. Internet Explorer. A bundle of fixes; the worst allows for remote code execution giving same rights as user if you visit a specifically designed webpage.

MS15-113. Critical. Remote code execution. Edge. Another bundle. Same problem as 112 above.

MS15-114. Critical. Remote code execution. Windows Journal. Remote code execution if you open a special Journal file.

MS15-115. Critical. Remote code execution. Windows. Opening a special document or visiting a specific webpage (embedded fonts).

MS15-116. Important. Remote code execution. Office. Opening a special file. User-level access.

MS15-117. Important. Increased access level. Windows NDIS. Attacker can increase access level if logged in and able to run a special application.

MS15-118. Important. Increased access level. .NET. Attacker can increase access level if visit specific webpage or open special email.

MS15-119. Important. Increased access level. Winsock.

MS15-120. Important. Denial of Service. Windows. Attacker needs to be logged in but can take server offline.

MS15-121. Important. Spoofing. Schannel. Man-in-the-middle attack.

MS15-122. Important. Bypass security. Kerberos/BitLocker. Attacker needs physical access but could get passed Kerberos authentication and decrypt BitLocker drives.

MS15-123. Important. Info leak. Skype for Business. Inviting target to IM session can cause an information leak through Javascript insertion.

Adobe

As usual, there are plenty of Flash updates: 17 in fact. Many are “priority 1,” which means patch them as soon as possible. And expect some plug-in updates as a result for IE, Firefox, and Chrome.

The holes could allow an attacker to take control of the affected system. The CVE-listed vulnerabilities are: CVE-2015… 7651 to 7663 and 8042 to 8046. ®

Sponsored:
Data Loss Prevention Data Theft Prevention

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/11/edge_explorer_flash_patches/

Comcast resets 200k cleartext passwords, hacker claims breach

A hacker has tried to sell 200,000 valid cleartext Comcast credentials he claims he stole in 2013 from the telco’s then-vulnerable mailserver.

The telco has reset passwords for the affected accounts after news surfaced of the credentials being sold on the Python Market hidden marketplace.

Of the total pool of 590,000 accounts for sale for US$1,000, the company says around a third were accurate.

It told the Chicago Tribune the data was probably obtained through phishing, malware, or a breach of a third party site.

But the hacker responsible for the selling of the credentials, known as Orion, told Vulture South he obtained the credentials when he popped a Comcast mail server in December 2013.

He said the breach yielded 800,000 Comcast credentials of which 590,000 contained cleartext passwords.

Comcast has been contacted for comment.

“So in 2013 December the f****s at NullCrew came across an exploit for Zimbra which Comcast used at this domain *****.comcast.net ,” Orion says.

“NullCrew only got [about] 27k emails with no passwords lol while I got 800k with only 590k users with plaintext passwords.”

The credentials for sale.

The credentials for sale. 📷 Darren Pauli / The Register.

Comcast said it had “no evidence” of the December breach in which the then Zimbra directory traversal vulnerability (CVE-2013-7091) was exploited to gain access to the credentials.

A discussion on Reddit has focused on Comcast’s apparent use of cleartext passwords, something regarded as a grand failure in security circles.

Orion claims the pinched passwords were stored as cleartext. ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/11/comcast_passwords_leak/

JP Morgan Breach Only One Piece Of Vast Criminal Enterprise, Indictments Reveal

Three men at the head of ‘diversified criminal conglomerate’ used hacking to commit and enhance their securities fraud, illegal online gambling, illegal Bitcoin exchange, and illegal payment processing businesses, 23-count indictment alleges.

A 23-count indictment unsealed today shows that the 2014 JP Morgan Chase breach — which resulted in the theft of 83 million customers’ data — wasn’t just the work of talented cyber attackers. The breach was just one of the myriad illegal activities conducted by a “diversified criminal conglomerate” fueled by hacking.

The charges against Israeli citizens Gery Shalon and Ziv Orenstein, arrested in July, and U.S. citizen Joshua Samuel Aaron, who is still at large, include hacking, securities fraud, wire fraud, identity theft, illegal Internet gambling, and conspiring to commit money laundering. In a separate but related indictment unsealed today, Florida resident Anthony Murgio was charged for operating an unlicensed Bitcoin exchange services. The maximum sentences for the charges against Shalon alone, who is considered the “ringleader,” add up to over 200 years in prison.

“The charged crimes showcase a brave new world of hacking for profit,” said Manhattan U.S. Attorney Preet Bharara in a statement. “It is no longer hacking merely for a quick payout, but hacking to support a diversified criminal conglomerate. This was hacking as a business model.”

Cybercrime was used to commit, support, or enhance all of the group’s other illegal endeavors.

Between 2012 and 2015, Shalon and Aaron stole personally identifiable information from JP Morgan Chase, and eight other businesses operating within the financial services sector. They then used that stolen data to “artificially manipulate” the price of certain stocks, by marketing those stocks to the customer lists in a “deceptive and misleading manner,” according to the Department of Justice release. 

“The alleged conduct also signals the next frontier in securities fraud,” said Bharara, “sophisticated hacking to steal nonpublic information, something the defendants discussed for the next stage of their sprawling enterprise. Fueled by their hacking, the defendants’ criminal schemes allegedly generated hundreds of millions of dollars in illicit proceeds.”

The attackers owned and operated unlawful Internet gambling businesses, and used cybercrime to protect those shadowy companies’ interests. Shalon broke into the networks of software providers the gambling businesses used, and monitored the emails of those software companies’ executives, to make sure their work with other gambling businesses didn’t compromise Shalon’s.

They owned and operated payment processors, IDPay and Todur, for illegal businesses — taking cuts of the profits from illegal pharmaceutical suppliers, malware distributors, and unlawful online casinos. They used cybercrime to protect that operation as well. Shalon and his co-conspirators hacked into an organization that monitors merchants and payment processors for trading in unlawful goods and services. The criminals then monitored that organization’s emails and detection efforts in order to prevent their own payment processors’ illicit activity from being detected.

All told, 14 companies were breached.

Idan Tendler, CEO of FortScale and former commander of the 8200, the cyberwarfare division of the Israeli Defense Forces, says “The shocking size and reach of this cyber breach underscores the sophistication of today’s cyber criminal enterprises and shows what security teams across all industries are up against. Today’s hackers aren’t necessarily looking for a quick payday. Once the initial data theft is completed, there are countless opportunities for cyber criminals to conduct targeted campaigns.”

“The theft of data from [JP Morgan Chase] and the breaches at financial news outlets provided the ingredients to execute a very scalable and very profitable cyber crime operation,” says Fred Kost, SVP at HyTrust. “Stolen information such as that from JPMC and other financial institutions is not only valuable to cybercriminals as the identity of an individual, but they can also use it in many different second order actions to provide context for more elaborate attacks and schemes for financial gain. It was as if they were running diversified lines of business, all well orchestrated and vertically integrated.”

Philip Lieberman, president of Lieberman Software, says that part of the trouble lies in whether financial services companies and stock exchanges can change their culture to adapt to new risks. “Changing a ship designed for commerce into one suitable for both trade and warfare takes time and wisdom,” says Lieberman. “The challenge is not the change in technology, but with the behavior of all involved. Those charged with movement of goods tend to obstruct the need to arrive safety by depending on their knowledge and behaviors obtained long before the warfare began.”

Shalon, Aaron, and Orenstein evaded authorities as long as they did by filtering their proceeds through 75 shell companies, banks and brokerages across the world, and by using aliases — between the three of them they used over 200 fake identities, and over 30 false passports purporting to be issued by the United States and 16 other countries.

“While we continue to see breaches go undetected for long periods of time, it’s unlikely operations of this magnitude will become commonplace. They are harder to carryout undetected,” says Kost. Nevertheless, “We will likely see more of these creative ways of monetizing stolen information in the future as attackers evolve and look for newer ways to profit from hacking.”

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/jp-morgan-breach-only-one-piece-of-vast-criminal-enterprise-indictments-reveal/d/d-id/1323084?_mc=RSS_DR_EDT

Comcast resets 200,000 passwords offered for sale on Dark Web

Comcast email accounts breached

Comcast says it wasn’t hacked, but hundreds of thousands of its customers may have been, forcing the cable giant to reset passwords to email accounts of about 200,000 customers.

The forced password reset came after an independent security researcher spotted an ad on a Dark Web marketplace offering 590,000 Comcast subscriber email addresses and plaintext passwords for $1000 in bitcoins.

A Comcast representative said the company acquired the list of email addresses and discovered that only 200,000 of them were active, and is “working to get this fixed for those customers who may have been impacted,” according to the Washington Post.

The researcher, @Flanvel, posted an image of the dark forum ad on Twitter and tipped off writer Steve Ragan, whose story on CSO became the top-trending topic on Twitter on Monday (9 November).

@Flanvel discovered the ad on a Dark Web forum called Python Market, at a .onion address on the Tor network, he told me via direct message on Twitter.

The self-described “Hacker | Autodidact | Researcher,” @Flanvel’s real name is Corey Wells, a 20-year-old from West Virginia.

Wells spends a portion of his time searching for data breaches on Dark Web markets, either manually or using an automated tool he wrote.

“I came across this specific breach just browsing the market for new posts,” Wells told me via DM.

Wells told me he doesn’t want to speculate about how the vendor offering the Comcast data obtained it, but the vendor was claiming it was from a breach of Comcast and has several other listings on the Python Market.

Wells tweeted a screenshot showing other listings from the same vendor, and a link to a Pastebin post from the vendor saying Comcast hasn’t reset all of the passwords, and that “many of them still work just fine.”

However, the sale price of the Comcast data had been dropped to $200.

Comcast denied that it was breached and said the email account details were likely stolen in one of many recent data breaches, or the individuals had their account details stolen by phishing or malware attacks.

A Comcast spokeswoman told USA Today that there is “no evidence” of a breach.

Anyone with access to a Comcast customer’s email address and password could use those credentials to log into the account to watch streaming video or make purchases using stored credit card information (credit card details would not be accessible however), reports USA Today.

If you’re a Comcast customer, it’s a good idea to change your password regardless of whether or not your email address was on the list.

And if you use the same password on any other accounts (please don’t do that!), change those too.

→ Can’t view the video on this page? Watch directly from YouTube. Can’t hear the audio? Click on the Captions icon for closed captions.

Image of email symbols courtesy of Shutterstock.com.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/iTjPoy5FyMI/