STE WILLIAMS

Weak Admin Password Enabled Gentoo GitHub Breach

Had the attacker been quieter, breach may not have been discovered immediately maintainers of popular Linux distribution said.

A weak administrator password allowed an unknown attacker to gain access to the Gentoo Linux distribution’s GitHub account and lock developers out of it, the maintainers of the popular open source software said this week.

In the June 28 attack, the intruders also modified the content of Gentoo’s repositories and added malicious code to it that among other things was apparently designed to wipe end user content. But various technical safeguards in place would have prevented that particular eventuality, Gentoo maintainers said in a report summarizing findings from their investigation of the incident.

The attack prompted Gentoo to declare all of its code on GitHub as being compromised and resulted in its developers being unable to use GitHub for about five days. Gentoo has since regained control of the Gentoo GitHub Organization, reverted all bad code commits to a known good state and corrected defaced content, the report noted.

Gentoo’s investigation shows that the intruder or intruders gained access to an administrator password and used that to take control.

Gentoo’s GitHub repository is only a backup of its code. The main repositories are stored on Gentoo hosted infrastructure and do not appear to have been impacted or at risk from the attack, the report said. The primary key that Gentoo uses to digitally sign code changes in the main repository also appears to have been untouched. So future digital signatures with the key can be trusted, the Gentoo administrators said.

Paul Ducklin, senior technologist at Sophos, points to at least three big takeaways from the Gentoo breach.

“The first is that a prompt notification goes an awful long way,” he says. “Gentoo didn’t beat around the bush or waste time trying to work a marketing spin into the initial report.” Instead by fully disclosing what it knew and did not know about the incident up front, the breach got considerable attention and community help quickly.

Secondly, the breach is another reminder of the well-documented risks of using weak, default and easily guessable passwords. Increasingly, threat actors have been using stolen, phished and brute-forced credentials to break into corporate networks and steal data. In many cases attackers using such credentials have been able to remain undetected on victim networks for months while they have moved laterally in search of high-value targets.

Even with the Gentoo breach for instance, the compromise was only discovered because the attack was loud. If the threat actors had not blocked all access to Gentoo’s GitHub repositories, the outcome might have been different.  

The takeaway here—like it is for many recent breaches—is to pick proper passwords, Ducklin says. “It seems that the user whose password was guessed had fallen into the trap of using different but obviously similar passwords on multiple sites,” he notes.

For example using a core password and then adding small tweaks and suffixes to the password to make it unique for different sites is not good enough. Crooks will figure out your pattern soon enough, Ducklin notes. “Use a password manager and let it choose a totally different password for each site.”

Incidents like this also highlight the need for multi-factor authentication. Data breaches involving compromised user credentials are very hard to stop given the implicit trust that most current security approaches confer on users and devices inside the corporate network. So practices like strong authentication are vital to establishing user trust.

“Two factor authentication is your friend,”Ducklin says. “One-time codes for each login make it harder for the crooks.”

Related Content:

  

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/weak-admin-password-enabled-gentoo-github-breach/d/d-id/1332225?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Windows 10’s defences are pretty robust these days, so of course folk are trying to break them

Hackers have been experimenting with a newly discovered technique to commandeer Windows 10 boxes.

The approach, revealed at the start of June, relies on abusing Windows Settings files (.SettingContent-ms), an XML file type introduced in Windows 10. The technology allows users to create “shortcuts” to various Windows settings pages.

SpecterOps security researcher Matt Nelson flagged up the technology as a possible mechanism for hackers to plant malware with minimal user interaction through the DeepLink element of the XML schema, which takes any binary with parameters and executes it.

Malware slingers are in dire need of a new approach because Microsoft is getting better at thwarting long-established techniques.

Office 2016 started default blocking all of the “dangerous” file formats from being embedded via OLE (Object Linking and Embedding). The SettingContent-ms file format, however, is not included in that list.

Microsoft also introduced Attack Surface Reduction (ASR) rules into Windows 10, which further cut back the scope for mischief, at least from prevalent hacker techniques such as “Block Office applications from creating child processes”.

Nelson discovered that there is no “open” prompt when double-clicking a SettingContent-ms file, Windows just executes the command. As such, the file format potentially allows shell command execution via a file open, if delivered to an unwitting user via the internet. In the video below, Nelson uses the method to open the thankfully benign Windows calculator app.

Youtube Video

Penetration testers have begun experimenting with proof-of-concept code in attempts to exploit Windows Settings. Samples of these efforts are being uploaded onto VirusTotal.

FireEye security researcher Nick Carr has been keeping tabs on these uploads, which are so far mostly confined to experiments by both miscreants and security researchers.

“Scale = lots of tinkering, very little in-the-wild usage due to small attack surface. Have seen 10 weaponized, non-POC #DeepLink files uploaded publicly and 5 delivered in-the-wild (I understand they were red teams),” Carr told El Reg in an exchange on Twitter.

The experimentation on both sides may call into question the ethics of publishing offensive hacking techniques. The prevailing view is that “security through obscurity” only helps hackers in the long term.

It’s better to think like a hacker and anticipate likely attack scenarios so that defences and countermeasures can be prepared ahead of the need to use them. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/05/ms_win10_setting/

UK Banks Must Produce Backup Plans for Cyberattacks

Financial services firms in Britain have three months to explain how they would stay up and running in the event of an attack or service disruption.

The Bank of England and Financial Conduct Authority have given UK financial services firms three months to produce backup plans explaining how they would respond to cyberattacks and avoid technical shutdowns, Reuters reports.

Financial services organizations are particularly vulnerable to cybercrime, as recently indicated by issues with Visa and UK bank TSB, where an April outage prevented customers from accessing online accounts. Regulators say the risk reflects a failure among banks and insurers to upgrade their systems, and demand they have strategies in place if systems are disrupted.

Businesses have until October 5, 2018 to produce their backup plans. If they fail to do so, or if their plans fall short of regulators’ standards, they may be required to increase their capital levels or invest in their systems’ resilience to cyberattacks.

Read more details here.  

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/uk-banks-must-produce-backup-plans-for-cyberattacks/d/d-id/1332220?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

New Malware Variant Hits With Ransomware or Cryptomining

A new variant of old malware scans a system before deciding just how to administer pain.

A long-known ransom Trojan has added new tactics and a new talent, according to research released by Kaspersky Labs. The Trojan-Ransom.Win32.Rakhni family has been around since 2013, but a new variant does a search of files on the victim’s system and decides whether to launch ransomware — or simply use the computer to mine cryptocurrency.

Researchers identified a new variant of the remote execution downloader that queries the victim’s system on a number of factors, from the existence of Bitcoin storage to the presence of certain virtual machine managers, before downloading either an encryption payload or one that begins mining Monero coins.

So far, the vast majority (over 95%) of those targeted by the new variant have been in the Russian Federation, with smaller numbers of victims in Kazakhstan, Ukraine, Germany, and India.

For more, read here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/new-malware-variant-hits-with-ransomware-or-cryptomining/d/d-id/1332221?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

WEF: 217 More Years Until Women and Men Reach Economic Equality

Progress toward economic parity is in reverse for the first time since 2006, but cybersecurity can help change the game.

It could be 217 years before women achieve global economic parity with men, reports the World Economic Forum (WEF), whose data indicates a bleak future for financial equality.

This is the first time the “Global Gender Gap Report” showed gender parity is shifting into reverse since WEF began compiling its index in 2006. Researchers annually evaluate 144 countries on their progress toward equality across four categories: educational attainment, health and survival, economic participation and opportunity, and political empowerment.

Progress has been strong for the first two sectors, where countries on average have closed 95% and 96% of the gap, respectively. However, it has been comparatively weak for the latter two, where the average gap closure is 58% and 23%, respectively. WEF researchers estimate it will take 168 years to close the gender gap in North America.

The equality numbers aren’t much better in the subsector of cybersecurity. In a recent survey, researchers from the Cyentia Institute and Cybrary polled 2,973 women in IT and security. They found 63% are not paid equally to men, and 55% say their employers don’t actively recruit women.

Why Women Fall Behind
Part of the problem is a lack of experience among female candidates and organizations’ unwillingness to educate them, says Cybrary COO Kathie Miley. The majority of women Cybrary surveyed have less than three years of experience in security, and 53% say their employers don’t offer cybersecurity or certification training.

“We have a huge disparity in hiring [and] allowing women to enter the cyber workforce [so they can] gain the requisite experience their male counterparts have,” she says. “It’s a catch-22: We’re not hiring women enough to allow them to develop, and [businesses] can’t pay them the equivalent to a man who has more experience.”

While cybersecurity curricula has only begun to emerge at universities within the past decade, Miley believes the disparity starts earlier. “We haven’t done a good job at all as a country, as a global citizenship, of nurturing women into technology and mathematics,” she says. Men often start building their tech experience earlier than women and continue accelerating ahead.

Businesses hiring security pros generally don’t have diversity top-of-mind either, Miley continues. They’re primarily interested in experience. It’s understandable, of course, to want to hire security pros with backgrounds to do the job – but an unwillingness to train employees in a field as rapidly changing as cyber puts both candidates and businesses at a disadvantage, especially at a time when most organizations struggle to recruit and retain skilled employees.

“Most people with five to 10 years of experience are already in positions and not looking to change,” she explains. “We have to move forward and look for people who don’t fit that traditional profile and bring them in and pay them properly.”

It’s Time for Women To Take the Wheel
If we want to accelerate on the track toward equality, women need to take the driver’s seat.

“Women tend to take a softer voice in executive boardrooms and management meetings, where males dominate the conversation and women don’t speak up and make themselves head,” Miley says. “[They] need to have good conversation without feeling intimidated.”

WEF teamed with LinkedIn to explore hiring trends around women in IT. They found industries with strong gender parity, such as corporate services, take a larger-than-average proportion of hires from the female talent pool. Women make up 23% of all LinkedIn users with computer science degrees but 32% of computer science degree holders in corporate services.

Sectors with poor gender parity, such as manufacturing, hire a lower-than-average proportion of female employees. Experts suggest a dual approach to close the economic gender gap. At an educational level, they say, we need to rebalance degree specialization choices. At a workplace level, we need to avoid exacerbating the imbalance that already exists.

Miley echoes their sentiments. It’s time to stop pretending women aren’t interested in cyber, she explains, and provide the tools all employees need to build their skills and stay ahead.

Women are pursuing cybersecurity education, she adds, citing data from e-learning platform Cybrary. The top five courses women take are CompTIA A+, Ethical Hacking, CompTIA Security+, Cisco CCNA, and CISSP. She points out that women generally pursue less technical topics, which are more accessible for those with career backgrounds outside the tech field.

Related Content:

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/careers-and-people/wef-217-more-years-until-women-and-men-reach-economic-equality/d/d-id/1332224?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

7-year-old’s avatar sexually assaulted on “family-friendly” Roblox

Roblox, a gaming site for kids and teens, says it’s the largest user-generated online gaming platform. It calls itself “a family-friendly, immersive, 3D environment.”

A North Carolina mother is calling it something else entirely after she watched her 7-year-old’s avatar being “violently gang-raped on a playground” by two male players’ avatars… And then witnessing the female avatar of an onlooker jump on her daughter’s avatar when the virtual rapists were through.

Amber Petersen said in a 28 June Facebook post that she and her husband had thought they had done due diligence when they allowed their daughter to play the game. She noted that Roblox is rated Pan European Game Information (PEGI) 7: PEGI being a European video game content rating system that assigns age recommendations and content descriptions. Hence, a PEGI 7-rated game such as Roblox should be appropriate for those children who are at least 7 years old.

The game has a multiplayer online gaming platform in which users can create their own personal avatar and their own adventures, similar to Minecraft. Then, players can interact with each other in virtual reality.

Of particular interest to parents such as Petersen and her husband: Roblox has security settings that allow parents to block outside conversations and invitations. Moderators and automatic filters also block potentially inappropriate content.

Excellent: crank up the security! From Petersen’s post:

When my husband and I decided to allow our daughter to play this game, we adjusted the security settings to maximum privacy. Or at least we THOUGHT we did…

… but what security settings are there to prevent players from fashioning penises and using them to rape other players? Petersen, who took screen captures of what she witnessed (available in comments on her post), said that she was lying in bed with her daughter, reading aloud, while her daughter played her favorite game on her iPad.

All of a sudden, she stopped me from reading and showed me her screen.

At first, I couldn’t believe what I was seeing.

When the three avatars finished attacking her daughter’s avatar, they ran off, “leaving my daughter’s avatar laying on her face in the middle of the playground,” Petersen said.

Now, amidst feelings of shock, disgust and guilt, Petersen is urging other parents to delete the app, take another look at their devices and security settings, and, “better yet,” challenge their children to…

PUT AWAY THEIR SCREENS….AND READ!!! Books cannot be hacked, but sadly, I’ve learned the hard way that a child’s innocence can be just at the touch of a button.

Roblox has responded to the incident by cracking down even harder on potential “bad actors.” From a statement sent to Dailymail.com:

We were outraged to learn that Roblox’s community policies and Rules of Conduct were subverted.

We have identified how this bad actor created the offending action and are putting additional safeguards in place to reduce the possibility of this happening again in the future.

In addition, the offender was identified and has been permanently banned from the platform and we have suspended the game.

We have zero tolerance for this behavior. Our work to ensure a safe platform is always evolving and remains a top priority for us.

According to the Daily Mail, this isn’t the first time that safety on Roblox has come into question. Last month, an Australian mother reported that she saw her 6-year-old daughter invited into a virtual room to have virtual sex. Numerous pairs of avatars were having sex in the room. That mother, “Peggy,” immediately took the game away from her daughter but recorded the sexual act so that she could warn other parents.

Petersen says she too was able to shield her daughter from seeing the entire rape scene, but she says she’s shuddering to think that other kids could be exposed to this type of thing.

As such cases clearly show, protecting kids online gets tougher and tougher. Parents, unfortunately, it looks like this is just the latest in an evolving landscape, which already contains eavesdropping cuddly toys, games that double as child-stalking apps, and predators who’ll hide behind photos of your kid’s favorite celebrity, pretending to be Justin Bieber or whoever else they think will gain a child’s trust.

Got any tips for how you’re keeping your kids safe? Does it involve books and blank screens, by any chance? Do tell.


Image courtesy of Roblox.com

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/yOW1Ux-hzUw/

Tor-linked nonprofit raided by police

On 20 June, at 6:00 a.m., German police knocked on the doors at the homes of three members of the board of directors for Zwiebelfreunde: a non-profit organization whose name, in English, translates as “Onion Friends” and which operates Tor services for Torservers.net.

On Wednesday, the group said on its blog on Torservers.net – which is one part of a large, decentralized network of Tor nodes – that police seized most of the group’s electronic storage equipment: disks, laptops, PCs, GnuPG Smartcards/Yubikeys, and mobile phones.

In a coordinated set of raids, police also ransacked the group’s registered headquarters in Dresden – which is the group’s lawyer’s office – and the home of a previous board member.

Der Spiegel reported on Wednesday that police also seized a number of documents, including paper receipts identifying donors and membership lists for previous years. Police also raided the Augsburg headquarters of the Chaos Computer Club (CCC).

Well, so much for striving to promote anonymity, privacy and security on the internet.

As Der Spiegel notes, Onion Friends has for years been collecting donations on behalf of alternative and non-commercial providers whose confidential communication services are used by social movements worldwide.

That, obviously, is “the only reason why the German investigators went so far against the club,” the newspaper said.

The raids were reportedly sparked by the Munich Attorney General’s search for the authors of a left-wing blog, Krawalltouristen, which translates to “riot tourists.” Police claim that the blog called for violent protests aimed at the annual convention of the right-wing Alternative for Germany (AfD) party, the largest opposition party in the German parliament.

But German police didn’t bother to go after the email provider behind that email address, which was Riseup.net. As Zwiebelfreunde tells it, the group has a partnership with Riseup Labs, a US non-profit focused on technological research, development, and education for the purpose of furthering social justice and supporting social movements. Onion Friends manages donations to Riseup Labs and says the two groups collaborate to spend the money on software development, travel reimbursements and Riseup’s Tor infrastructure.

From Onion Friends’ post:

None of us had even heard of [the riot tourists] blog before!

In lieu of raiding Riseup Labs offices all the way across the pond, German police went after people associated with Zwiebelfreunde, the group says.

When police rang the doorbell at the apartment of Onion Friends co-founder and board member Moritz Bartl, they told him that they wanted to find out the identities of the riot tourists blog authors. But as ZDNet reports, besides taking the computer equipment and storage devices, plus the paper documents revealing donors’ names, they also seized unrelated property, including Bartl’s wife’s unencrypted Android tablet with personal photographs and emails and an external hard drive storing photographs.

This is the list of things that Onion Friends believes was not affected by the raids:

  • any Torservers related infrastructure: Tor relays, mail servers, web servers.
  • any of Riseup’s infrastructure (Onion Friends has nothing to do with that, it says).
  • cryptoparty.in or other cryptoparty related infrastructure.
  • PGP keys, SSH keys, OTR keys, etc.

Police seized mobile phones, but Onion Friends said that even if investigators manage to break into the devices, the phones don’t contain login data or anything else affecting the group’s infrastructure or communications. Still, Onion Friends revoked its shared contact PGP key and intends to replace more keys and passphrases over time.

Here’s the list of what was affected by the raids:

  • Documents related to the group’s Riseup bank account (which police also seized from its bank), starting from January 2018.
  • All printed documents relating to its own and partner projects since the inception of the association in 2011. That includes the “highly sensitive” personal data of donors, the’ identities of activists who received reimbursements or payments, and a list of its members.

The upshot, according to Onion Friends:

If you have ever donated to Torservers, or Tails or Riseup via a European bank transaction, your data (IBAN account number, name of account holder, amount and date) is very likely now in the hands of the German police.

The group’s lawyers tried to get Onion Friends’ equipment back, including equipment that it doesn’t even own itself. Police refused, the group said. Zwiebelfreunde is taking the police to court over that and other issues, including a claim that police didn’t adhere to seizure of specific items mentioned in a warrant.

From the group’s post:

We argue that even the original warrants and seizures were clear overreach, and that this was used as an excuse to get access to member data and donor data. We have nothing to do with Riseup’s infrastructure. During the raids, the police forces clearly gave the impression that they knew we had nothing to do with either Riseup or the “ruckus tourist” blog. None of us had even heard of that blog before!

Bartl isn’t a defendant in the case; rather, he’s a witness. He told Der Spiegel that he and others at Onion Friends have been unable to return to work since the raids:

Normal work has not been possible since then.

I had to take a vacation. We are still trying to process what happened.

German police declined to comment on the case when contacted by Der Spiegel. As far as the office of the Munich Attorney General goes, staffers told the newspaper that the people affected by the search weren’t suspicious, and that law enforcement is still evaluating the confiscated computers and data media.

Der Spiegel also reports that the raid on Bartl’s project, OpenLab, in Augsburg produced a bag of seized items that included an item created by a 3D printer. It wound up in a bag of seized evidence, labelled as “causing explosive explosions.” You can see it in all its nonexplosive non-explosion action on YouTube as it launches plastic rockets across the room.

You can see how police figured they shouldn’t take any chances when it comes to heading off terrorist acts: its inventors dubbed that cute gadget “OpenLab F-Bomb Launcher.”

Do the raids reek of prosecutorial overreach? Were they reasonable acts for investigators trying to prevent violence? Are they yet another assault on people’s attempts to maintain privacy, anonymity and security? …or are they all of the above? Readers, your thoughts are welcome, as always.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/NwynLlfwLNY/

Serious Security: How to cut-and-paste your way to Bitcoin riches

Thanks to Glyn Kennington of SophosLabs for his help with this article.

Let’s say you wanted to vanish into the ether with a whole load of other people’s bitcoins – or, for that matter, a whole load of a whole load of different cryptocurrencies.

You could start a currency exchange, where customers give you money to buy cryptocoins for them, and later on announce that – pof! – all the coins had vanished.

You could hack into someone else’s cryptocoin exchange and loot the database, leaving them to announce – pof! – that all the coins had vanished.

You could announce a brand new cryptocurrency, invite early adopters to invest by handing over existing digital currency and then – pof! – cut and run.

Well, here’s another way – a cryptocurrency crime that can be carried out via the clipboard.

Malware that uses this trick isn’t new, but the sample we’re looking at here is a great reminder of how careful you need to be when you copy and paste text.

Whether it’s cryptocurrency addresses, payment card details, ID numbers or other snippets of personal information, malware that sneakily changes data in the clipboard as you work online can trick you into paying the wrong people.

It’s almost as though you end up stealing from yourself!

How cryptocurrency addresses work

When you send cryptocurrencies such as bitcoins to someone else, there’s a point at which you need to enter a unique identifier that denotes the address of the recipient.

Very greatly simplified, the address is derived from a public encryption key (the sender uses this to denote that the payment is meant for you) for which you have the corresponding private encryption key.

The fact that you have the relevant private key is what establishes you as the current owner of the relevant cryptocoin and allows you to spend it in turn.

You don’t need to prove you hold the private key to receive a cryptocoin to a given address. You only need the private key when you want to sign that cryptocurrency amount over to someone else, i.e. to spend it. Cryptocoins for which the private key has been lost can never be spent – they still exist, but they’re marooned, dead-ends in the chain of ownership that can never be passed on.

Anyone can create a new public/private keypair at any time, in a fraction of a second, thus simultanously generating a new address at which to receive payments, and possessing the needed private key to sign the cryptocoin over to the next owner in the chain.

Here’s how it works for Bitcoin transactions:

  • Generate a good-quality random number (128 bits or more).
  • Use it to generate a 256-bit elliptic curve private key.
  • Extract the corresponding public key.
  • Generate a cryptographic hash of it to serve as this transaction’s identifier.
  • Encode this identifying hash into alphanumeric characters to form a Bitcoin address.

That’s where the curious strings of characters that denote Bitcoin addresses come from – we’ve included a script below demonstrating bulk address generation.

Encoding addresses into letters and digits

There are various formats for cryptocoin addresses.

Ethereum, for example, encodes its 20-byte addresses into hexadecimal characters, so you need two characters for every byte.

This type of string, often called Base16 encoding, is usually preceded by 0x, which is a common programming notation to denote that what follows is in hexadecimal (base 16), giving Ethereum addresses a 42-character text representation like this:

   0x1F20A3A67470FD643E3EA04B9F2577EC95C93C06

Bitcoin and numerous other currencies use 25-byte addresses.

To encode these addresses more compactly than in hexadecimal, Bitcoin and others use Base58, based on 58 different “digits” consisting of the upper and lower case English letters plus the digits (26+26+10 = 62 choices), but omitting the easily-confused characters ell, EYE, OH and zero (62-4 = 58):

   Base58 character set: abcdefghijk mnopqrstuvwxyzABCDEFGH JKLMN PQRSTUVWXYZ 123456789

For many cryptocurrencies with Base58 address encoding, the first few bits of each address are standardised so that they always encode to the same character, acting as a memory aid like this:

   1NWMWpz1bkksMPobsTK9mSgGppdiH5QFeK  -- Bitcoin 
   36SPv3cTg6SB174c2QRLZ3Tg7TxZfeP9wP  -- Bitcoin 
   DJnpuZ9RafbechwbAxbL9wLFLXYuVoGth5  -- Dogecoin
   LJ3EVYaro3nUqsjBq8yfWnpNCv2e7EhY8b  -- Litecoin
   XEKxPRbEHTd8vxogY132byxbxn6RyQZSWW  -- Dash 
   NA9C3MYMTYzPoPiMUZLLLuzw82wdtYFpnC  -- Namecoin 
   tQ2GpzYLRW4tpn7UJ958hVVDs2dCB3bxmx  -- Zcash
   PQ3YsuyJb7dsfnQDmxn3yNsF2UbNFjUN4   -- Peercoin

We chose the currencies mentioned here because they’re the ones targeted by the malware described below. The addresses shown here are fictitious – we created them directly from a pseudorandom generator instead of formally from a public key.

Using cryptocoin addresses

Loosely speaking, cryptocoin addresses are no more memorable that random strings of letters and numbers, which is almost what they are.

So, in the list above, apart from the tell-tale characters at the start to denote the cryptocurrency concerned, there’s no discernible pattern; no “muscle memory” you can call upon when typing them in; and no easy way to check that you typed correctly other than to read back each character one-by-one.

As a result, the way you usually choose whom to pay is by copying a bitcoin address from a message someone has sent you, or from their web page…

…and pasting it into some sort of payment app or another web page.

In other words, crooks can steal bitcoins without cracking your passwords, reading your local cryptocurrency wallets, copying your private keys, hacking into online currency exchanges, or even having a network connection at all.

All they need is to implant malware that scans your clipboard every so often, watches out for text that looks like a cryptocurrency address, and rewrites it with a similar text string that is an address they generated for themselves.

If you don’t notice the last minute substitution, you might end up paying the cryptocoins out to an imposter – and the anonymity and unregulated nature of crytocurrencies means that the chance of getting your money back is essentially zero.

And, by design, thanks to the lack of a central authority in the cryptocurrency ecosystem, anyone who wants to make a raft of new cryptocoin addresses for use in an attack can do so quickly and easily.

To make 10 bitcoin addresses, for example, you could use the open source tool Bitcoin Explorer (BX) as follows, assuming you’re at a bash command prompt:

$  for i in $(seq 10); do   # 10 times in sequence...
      bx seed |             # Generate pseudorandom bits
      bx ec-new |           # Use this to generate a new Bitcoin-style private key
      bx ec-to-public |     # Get the public key that matches it
      bx ec-to-address      # And then hash-and-Base58-encode it
   done

   16UWdpxxxxxxxxxxxxxxxxxxxxxxxDj4ff
   1CydjVkxxxxxxxxxxxxxxxxxxxxxx2wfDF
   1NDegbXxxxxxxxxxxxxxxxxxxxxxxzxmL9
   1oEXB8XxxxxxxxxxxxxxxxxxxxxxxSLpm
   18Aq6m3xxxxxxxxxxxxxxxxxxxxxxAcieu
   1EshvunxxxxxxxxxxxxxxxxxxxxxxeY8jU
   1NB4f2exxxxxxxxxxxxxxxxxxxxxxLYfyM
   13bhwubxxxxxxxxxxxxxxxxxxxxxx3aMEn
   1FxNKCGxxxxxxxxxxxxxxxxxxxxxxgpmSN
   13ghPwwxxxxxxxxxxxxxxxxxxxxxxmwM84
$  

We’ve messed up the output to invalidate these addresses so they can never be used, whether by mistake or design. The command sequence we used above doesn’t keep the private keys from which the addresses were derived, so that sending funds to these addresses would be a one-way trip consigning the associated bitcoinage to digital oblivion. Valid addresses can receive funds, but without the matching private key, the funds become unspendable – they can never be signed over to anyone else.

Cooking the clipboard

As mentioned above, clipboard-tweaking malware isn’t new, but this sample, blocked by Sophos products as Troj/Agent-AZHF, is an excellent reminder of how easily you can be tricked.

The Agent-AZHF malware is packaged as a DLL, a special sort of Windows program that is usually intended to play a supporting role when it is loaded into other apps, rather than to act as an app in its own right.

However, Windows comes with a built-in utility called RUNDLL32 – a general-purpose wrapper that loads DLLs into memory, for example for testing.

As a result, DLL-based malware can’t be self-contained – it needs a script or a regular program to issue the relevant RUNDLL32 command in the first place.

Nevertheless, crooks sometimes install malware components as DLLs because the name of the running process then shows up as rundll32.exe, allowing the DLL itself to hide in plain sight, as it were:

When Agent-AZHF is loaded for the first time, it copies itself into the AppData folder, using the same name under which it arrived on your hard disk.

It then sets an autorun entry in the Windows registry so that it gets reloaded every time you logon, so that it survives reboots:

Once active, the malware examines the contents of the clipboard four times a second, testing to see if the contents match any of these patterns:

   (^| )[13][a-km-zA-HJ-NP-Z0-9]{26,33}($| )     -- Bitcoin
   (^| )D[a-km-zA-HJ-NP-Z0-9]{33}                -- Dogecoin 
   (^| )L[a-km-zA-HJ-NP-Z0-9]{33}                -- Litecoin
   (^| )X[a-km-zA-HJ-NP-Z0-9]{33}                -- Dash
   (^| )0x[a-fA-F0-9]{40}                        -- Ethereum blockchain 
   (^| )(N|M)[a-km-zA-HJ-NP-Z0-9]{33}($| )       -- Namecoin
   (^| )t[a-km-zA-HJ-NP-Z0-9]{34}($| )           -- Zcash
   (^| )P[a-km-zA-HJ-NP-Z0-9]{33}($| )           -- Peercoin

The patterns above are what’s known as regular expressions (known as REs or regexps), a popular form of string matching toolkit that provides more flexibility than just looking for specific words or numbers.

Don’t worry too much if you aren’t a regular expression expert; all you need to know above is that:

  • (^| ) matches a space or the start of a line.
  • ($| ) matches a space or the end of a line.
  • Characters not in [square brackets] or {squiggly brackets} match themselves.
  • Characters in [squares] match any of the ranges listed.
  • A number in {squiggles} means you need that many repeats of the previous match.
  • Two numbers listed as {min,max} need between min and max repeats.

The first expression, for example, says to look for a 1 or a 3, followed by anywhere from 26 to 33 Base58 characters, with the whole string set off as if it were a word on its own.

The Base58 regexps above are not, in fact, quite right. There are 59 different characters in the ranges specificed inside the [square brackets], including the digit 0. But zero is one of the four alphanumerics (along with I,O and l), that aren’t used in Base58.

If the malware finds a regexp match in the clipboard text, it replaces the matched text with a different address for the same cryptocurrency.

For everything but Bitcoin, the search-and-replace has a single replacement address, presumably one owned by the crooks, but for Bitcoin transactions, the criminals have tried to be a bit more subtle.

The malware includes a list of more than 2,000,000 bitcoin addresses, from 111224... to 1zzzmm..., and tries to find the closest match to the address it’s replacing, presumably to make it less likely that you’ll notice the switch.

Amusingly, it seems there’s a bug in the matching algorithm that means it doesn’t check correctly after the first four characters, so that the malware only ever chooses from about 125,000 of the 2 million entries in the list…

…but it’s easy, nevertheless, to miss the difference when a bitcoin address is rewritten with one that’s at least passingly similar.

Another bug means that if the regular expression matches a cryptocoin address that’s in the middle of a sentence, set off by spaces, the spaces vanish during the substitution:

   BEFORE: A text line with 0x0123456789012345678901234567890123456789 in the middle of it.

                     --- is mis-converted with the spaces chopped out: ---

   AFTER:  A text line with0x1Fd3xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx7474in the middle of it.

Has it worked?

Here’s a modest silver lining: as far as we can tell, the crooks haven’t made a fortune out of this scam yet.

Firstly, even though we’ve seen a few reports of this malware from numerous countries, it’s still, fortunately, not widespread.

Secondly, it looks as though cryptocoin users are in the habit of double-checking the destination addresses they use when copying-and-pasting digital currency addresses.

We trawled through the blockchain looking at the 125,000 or so bitcoin addresses used in clipboard substitutions by this malware, and found that only 28 had received any incoming payments:

     BTC in                 Address                 US$ [*]
   ----------  ----------------------------------  --------
   0.23000000  16Bxxxxxxxxxxxxxxxxxxxxxxxxxxxx7A1  $1495.00
   0.20000000  1Hpxxxxxxxxxxxxxxxxxxxxxxxxxxxx2YE  $1300.00
   0.09965000  1GnxxxxxxxxxxxxxxxxxxxxxxxxxxxxU1C  $ 647.73
   0.09300000  1Gxxxxxxxxxxxxxxxxxxxxxxxxxxxxxeq8   $604.50
   0.08213189  1HMxxxxxxxxxxxxxxxxxxxxxxxxxxxx9B9   $533.86
   0.06729385  1CPxxxxxxxxxxxxxxxxxxxxxxxxxxxxbcf   $437.41
   0.05761015  14PxxxxxxxxxxxxxxxxxxxxxxxxxxxxSd2   $374.47
   0.03461311  1DNxxxxxxxxxxxxxxxxxxxxxxxxxxxx29X   $224.99
   0.03000000  1RExxxxxxxxxxxxxxxxxxxxxxxxxxxxsF    $195.00
   0.02542576  15LxxxxxxxxxxxxxxxxxxxxxxxxxxxxeNf   $165.27
   0.02481600  1DSxxxxxxxxxxxxxxxxxxxxxxxxxxxxJSk   $161.30
   0.02298632  1P1xxxxxxxxxxxxxxxxxxxxxxxxxxxxUGf   $149.41
   0.01500000  1EcxxxxxxxxxxxxxxxxxxxxxxxxxxxxFQL    $97.50
   0.01012877  1syxxxxxxxxxxxxxxxxxxxxxxxxxxxx6t     $65.84
   0.00983754  15SxxxxxxxxxxxxxxxxxxxxxxxxxxxxCzr    $63.94
   0.00666000  1BMxxxxxxxxxxxxxxxxxxxxxxxxxxxx9yP    $43.29
   0.00384886  19axxxxxxxxxxxxxxxxxxxxxxxxxxxxsvP    $25.02
   0.00357381  1K1xxxxxxxxxxxxxxxxxxxxxxxxxxxxUNH    $23.23
   0.00326711  18nxxxxxxxxxxxxxxxxxxxxxxxxxxxxo5x    $21.24
   0.00306284  15dxxxxxxxxxxxxxxxxxxxxxxxxxxxxNkS    $19.91
   0.00297362  1KtxxxxxxxxxxxxxxxxxxxxxxxxxxxxjzJ    $19.33
   0.00288710  1LBxxxxxxxxxxxxxxxxxxxxxxxxxxxxVdE    $18.77
   0.00215836  15HxxxxxxxxxxxxxxxxxxxxxxxxxxxxaCe    $14.03
   0.00155748  16Cxxxxxxxxxxxxxxxxxxxxxxxxxxxx5fz    $10.12
   0.00043966  13ixxxxxxxxxxxxxxxxxxxxxxxxxxxxEiu     $2.86
   0.00023008  1H2xxxxxxxxxxxxxxxxxxxxxxxxxxxxhGy     $1.50
   0.00002000  1Pbxxxxxxxxxxxxxxxxxxxxxxxxxxxx4dh     $0.13
   0.00000546  112xxxxxxxxxxxxxxxxxxxxxxxxxxxxTim     $0.04
   ----------                                      --------
   1.03317777                                      $6715.66
   
      ([*] Using 2018-07-05T11:20Z rate of BTC1=USD6500)

On second thoughts, perhaps that’s not a silver lining at all, if we assume that all the transactions showing up in our list are directly due to this malware.

After all, $6715.66 of stolen, largely untracable, unrefundable digital cash is not an amount to be trivialised, even if we’ve grown accustomed to cryptocurrency disasters with millions or hundreds of millions of dollars’ worth of losses.

What to do?

  • When using copy-and-paste for data that’s hard to type, don’t blindly trust the result. Even in the absence of clipboard-hacking malware like this, it’s easy to paste in stale data, especially if you are in a hurry and didn’t hit Ctrl-C (Command-C on a Mac) properly, invisibly leaving the previously copied text in the clipboard instead. This is a serious risk if you paste private data, such as a password, into a data field that’s meant to be public, such as a twitter post!
  • Keep your anti-virus active and up-to-date. DLLs and various other file types sometimes seem harmless because they can’t easily be launched by mistake, given that they need some sort of helper app to load them. But a good anti-virus will identify and dispose of risky DLLs anyway, even if they don’t get loaded immediately.
  • Patch early, patch often. The slower you patch, the greater the chance that crooks will be able to sneak malware onto your network in the first place.
  • Review your email filtering policy. Make sure you have DLL files included on your list of email-borne undesirables.
  • Don’t rely on a network firewall alone to catch data exfiltration. As this example shows, crooks can sneak out your precious cryptocurrency without needing to make any unauthorised network connections of their own. Pasting a bogus recipient address into an intentional online transaction means that the crooks essentially get you to do the exfiltration for them in a legitimate-looking connection.

When it comes to online transactions, check three times, click once…


Note for researchers. This sample was: 48b66dd0­2a336eb0­49a784b3­fd1beb53­12fb8c07­8b3729d4­9e92e3e9­86c98e91.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/59bWvn_fE_0/

Your smartphone can watch you if it wants to, study finds

Internet users have grown used to the idea that they can be tracked and profiled as they browse the web, but what about the specific risks of smartphones?

With an array of sensors, GPS, cameras, and microphones, if any device could be used to monitor a person’s life, surely it would be the smartphone.

According to a study conducted by researchers at Northeastern University in Boston – titled Panoptispy just to make its readers feel uneasy as they’re reading it – the truth of smartphone surveillance turns out to be a little more complicated.

The report looked at data from 17,260 Android apps from Google Play (plus Chinese app stores Ap-pChina, Mi.com, and Anzh). The researchers then used an automated tool to identify a subset of at least 9,100 that might leak data after doing things like accessing the camera or microphone.

One cause for confusion is that even when an app developer has no interest in monitoring its users through media APIs, that doesn’t mean that third-party libraries embedded in those apps for advertising or other purposes don’t set out to do that. Plus, confusingly, apps can also request media permissions when they’re installed without ever using them, possibly because they needed this in older app versions, but developers never changed that setting.

Not to mention that:

The mapping between Android permissions and their associated API is surprisingly poorly documented, potentially leading to developer confusion.

From this you start to get some idea as to why this sort of detailed study into what our apps get up is tough to carry out – if the developers don’t even know what they’re asking for, working out how permissions and APIs are being abused becomes trickier.

The good news is that of the more than 17,000 apps analysed, in only “a few instances” were apps found to be recording video, images or sound covertly (that is unexpectedly and without the user being aware) and sending them back to the app’s maker or a third party.

Even apps that do this appear to do so out of a misplaced understanding of privacy rather than any maliciousness – for example a delivery app called GoPuff was discovered to be sending screen recordings in order to better understand how users were interacting with it.

Another included an API, TestFairy, that took 45 screenshots without permission, supposedly to aid beta testing not disclosed to anyone installing it.

Less positive: the analysis uncovered the chaotic nature of what app and API developers can get away with if they want to, and how poorly regulated this is via Android’s permissions architecture:

We also find that there is poor correlation between the permissions that an app requests and the permissions that an app needs to successfully run its code.

Google might argue that it’s working on the issue, but we’re now nearly a decade into Android’s commercial existence and the issue remains unresolved (the analysis didn’t look at iOS, which will be analysed in a separate study).

In conclusion, it’s all a bit of a mess. Arguably one of the platform maker’s own making – a legacy of the ‘build it quickly and they will come’ philosophy that for too long has seen privacy as a retrospective bolt on that could come later.

Are apps secretly watching you for nefarious purposes? On the basis of this study, no. Are they watching you in lots of other ways that are incredibly hard in some cases even for them to track? Yes.

Just adding more permissions and controls won’t solve the problem as it’s incredibly hard for any user to keep up across dozens of smartphone apps. Not that this is the answer of course – rather than passing the problem to the smartphone user to grapple with, more accountability is needed at the developer and API level.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/spOtiQYch_g/

Cyberboffins drill into World Cup cyber honeypot used to lure Israeli soldiers

Security researchers have unpicked mobile apps and spyware that infected the mobile devices of Israeli military personnel in a targeted campaign which the state has claimed Hamas was behind.

Earlier this week, Israeli military security officials revealed that hackers whom they claim were Hamas-affiliated* had installed spyware on Israeli soldiers’ smartphones.

The officials didn’t say how it was determined that the Gaza ruling party was behind the malware lure.

About 100 individuals fell victim to the attack that came in the form a malicious World Cup score tracking app and two fake online dating apps. The snoopy mobile code had been uploaded to the official Google Play Store.

The bogus apps have reportedly been removed from the Google Play Store. Google has yet to respond to a request from El Reg to discuss the incident.

“Golden Cup,” the bogus World Cup app, actually bundled functionality to provide live scores as well as full spectrum snooping.

Israeli military officers told Reuters that “Hamas operatives, using false identities, contacted soldiers on social media and encouraged them to download the apps”.

Scores of soldiers were duped – a number the military said was “under 100”. All had since either self-reported the issue or been given a tap on the shoulder – victims of the infection were tracked down by security analysts in the US military. “We know of no damage that was done,” one of the Israeli military officers said.

How bad was it?

Once the apps were installed onto the victims’ phones, the spyware was then able to carry out a number of malicious activities including, but far from limited to, recording a user’s phone calls. The software nasty was also capable of stealing a user’s contacts, SMS messages, images and videos stored on the mobile device alongside information on where they were taken.

Other exploits – including taking a picture when the user receives a call and capturing the user’s GPS location – were also on the menu once a user installed the mobile spyware. The malicious software was also capable of taking recordings of the user’s surroundings.

“This attack involved the malware bypassing Google Play’s protections and serves as a good example of how attackers hide within legitimate apps which relate to major popular events and take advantage of them to attract potential victims,” according to security researchers at Check Point, the Israeli software security firm.

Check Point is due to publish its research today.

The mobiles of dozens of soldiers were compromised by malicious code posing as dating apps after hackers posed as attractive young women in a similar incident back in January last year.

Botnote

*Standard disclaimers about the difficulties of attribution in cyberspace apply. The attack in play made use of clever social engineering attacks, a hallmark of malware from the Middle East in general.

The IDF regards Hamas as a proxy for Iran, its principal enemy both on the ground and in cyberspace.

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/07/05/world_cup_mobile_malware_trick/