STE WILLIAMS

PHP team fixes nasty site-owning remote execution bug

The PHP development team has fixed a bug that could allow remote code execution in some setups of the programming language, possibly allowing attackers to take over any site running the code remotely.

PHP is a common programming language used to run dynamic websites. It operates everything from online forums to ecommerce systems. The bug, found in version 7 of PHP, only affects instances running the PHP FastCGI Process Manager (PHP-FPM), which is an alternative implementation of a standard PHP module called FastCGI. It lets an interpreter outside the web server execute scripts. The process manager version includes some extra features to support high-volume websites.

For the bug to work, the website must also be running the Nginx web server, which runs on around one in every three websites, according to W3techs.

When calling a script, the PHP language failed to check that its path was correct. The researcher used this to manipulate a variable within PHP that developers use to configure it. The researcher explained:

Using this technique, I was able to create a fake PHP_VALUE fcgi variable and then use a chain of carefully chosen config values to get code execution.

The team acknowledged the bug and began working on a patch, publishing an untested one on 6 October on its own forum so that its developers could test it. They also collaborated with the researcher to help prepare the patch for testing.

After some wrangling with the PHP team over a disclosure window, the researcher finally published the exploit code on 22 October after the developers had tested and committed the fix to the master repository.

The team fixed the bug in several point releases of PHP. Version 7.1 users should download PHP 7.1.33. Version 7.2 users need PHP 7.2.24, while version 7.3 users should opt for 7.3.11. As with all security releases, the PHP team urged users of the latest full release to upgrade to the latest point version.

The flaw also affected the default software configuration of Nextcloud, a company that publishes self-hosted content collaboration software. In a blog post explaining the issue, it advised users to upgrade, and also suggested making two changes in their Nginx configuration file before restarting the web server. It also promised updates to its Docker container when new PHP-FPM versions become available.

What if you can’t patch your PHP software because of some other dependency? Stanislav Malyshev, a member of the PHP team who helped fix the bug, told us:

Fortunately, at least for people running Nginx, several workarounds have been suggested, which all involve ensuring that request with broken PATH_INFO is not passed to PHP-FPM.

Readers could try one of the following, he said:

  1. Adding the following line to the into the Nginx configuration file:

try_files $fastcgi_script_name =404;

  1. Ensuring that the PATH_INFO value in PHP is not empty by changing the PATH_INFO line to:

fastcgi_param PATH_INFO $fastcgi_path_info if_not_empty;

He also explained that this configuration listed on the Nginx site is not vulnerable to the issue.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/r_X-vIvi4pg/

Gradient “celebrity matching” photo app sparks privacy fears

If you’ve been following trendy news sites over the past week, you’ve probably heard of a new – or at least a newly popular – app called Gradient.

Gradient pitches itself as “the next big thing in the world of mobile photo editing”, heavily promoting a new feature that supposedly lets you:

Find what famous person do [sic] you look like with our brand new AI feature! Our precise technology powered by artificial intelligence will amaze you with an accurate result. Don’t forget to share it with your friends as a post or a story!

Despite the “photo editor” category being a crowded field on both Google Play and in Apple’s App Store. The company that produces the app, Ticket to the Moon, Inc. (TttM) has hit the publicity jackpot in the last few days, splashing out on celebrity advertising on social media sites such as Instagram.

Apparently, three of the Kardashian sisters have recently posted paid endorsements for the Gradient’s You Look Like… feature, with Kourtney claiming the app matched her to Audrey Hepburn, Kim looking like Elizabeth Taylor, and Khloe coming up as the doppelgänger of the late Anna Nicole Smith.

 

We tried You Look Like… ourselves, and the results were rather less accurate than we expected from “precise technology powered by artificial intelligence.”

For example, we fed in a picture of the office carpet…

…and were confidently told that it looked liked Nelson Mandela.

If you don’t like the first celebrity you get, there’s a ‘next’ button that lets you try again.

We fed the Sophos Mobile Security shield icon into the Who’s Your Twin feature and were twinned variously with actress Vanessa Hudgens and psychonaut Aldous Huxley, which seemed a fascinatingly unlikely pair of matches.

The following day, Gradient paired up exactly the same shield with famous footballer David Beckham and US founding father James Madison.

Harmless fun?

In short, the app looks more like a bit of passingly harmless fun than a serious facial recognition system…

…and that has got people wondering why an unknown company would spend a massive amount of marketing money – perhaps millions of dollars – on an app that feels unlikely to be a lasting and commercially viable phenomenon.

The burning question online, therefore, has been, “Is the app safe?”

If you remember the FaceApp privacy scare back in June 2019 – that was the app that claimed to show you what you’d look like in the future by applying an ageing algorithm – then you won’t be surprised to hear people voicing the same concerns over Gradient.

In particular, people are wondering, “What on earth are they going to do with the pictures that get uploaded?”

Like FaceApp before it, Gradient has terms of use stating [2019-10-28T14:50Z] that:

You hereby grant to Gradient a non-exclusive, fully paid and royalty-free, transferable, sub-licensable, worldwide license to use Your Content to provide our Service, subject to the Privacy Policy.

But, as we pointed out when FaceApp was all the rage, this sort of licence is neither unusual nor surprising, and many image processing and social media sites have similar terms and conditions.

A much bigger concern over Gradient, in our opinion, is the fact that although it’s technically a free app, it could end up costing you more than you thought.

The app’s Google Play Store page claims that the monthly fee is just $3.99, with $19.99 buying you a full year:

But the app itself says otherwise.

The in-app signup offered us a weekly subscription, with no free trial period, at $4.99 a week, or a monthly subscription at $19.99, which is the only way to get your three free days:

In fact, if you don’t cancel your subscription “at least 24 hours before the end of current period” [sic], then you will automatically be billed for the next period.

In other words, if you don’t go back into your Google Play or your Apple App Store account within 48 hours of signing up – which effectively makes the free trial period just two days rather than three – then you are going to be $20 out of pocket.

For this, and for any other subscription-based app you may be tempted by, take careful note of the fact that the subscription, and the recurring fees, is handled by your Google or Apple account, not the app itself, so simply uninstalling it will not cancel your subscription and will not stop you being billed every week or month.

We’ve written about apps with short trial periods and high price tags before, dubbing them “fleeceware” because of the astonishing prices they demand, and because trying-but-deleting the app doesn’t cancel the trial.

The developers of Gradient would probably argue that, unlike the fleeceware apps we highlighted back in September 2019, the Gradient app doesn’t bill you $100 or more in one go, and isn’t quite as elementary as some of the apps we described last time, such as a basic QR code reader costing €104.99.

Google and Apple seem to agree, because both companies are happy to host apps like Gradient – and are happy to take their cut of the subscription fee that these apps charge.

So, for now at least, our advice is old-fashioned caveat emptor, better known as “buyer beware”.

While we’re about it, we also urge you to do the right thing by your friends when it comes to apps like FaceApp and Gradient – abide by the terms and conditions that require you to have the right to upload images in the first place.

It’s tempting, and it feels like innocent fun, to upload photos of people you know in the hope of getting amusing results that you can share with your social media circle.

Please don’t do it – let your friends choose for themselves what to share, and where to share it.

What to do?

When it comes to in-app purchases:

  • Read the small print. Be certain that you know what you are signing up for, when billing starts, and how to unsubscribe from recurring charges.
  • Don’t assume that uninstalling an app ends your contract with the vendor. Check your Google or Apple account, and unsubscribe from there.
  • Don’t mistake paid endorsements for product reviews! Sure, the Kardashians love the Gradient app – but, unlike you, they’re being paid to use it.
  • If in doubt, leave it out. Don’t install an new app just because everyone else is using it – make sure there’s something you

Perhaps it would be better, if a little less lucrative, for online app markets like Google Play and the App Store to require that apps with “free trials” should require a opt-in subscription confirmation at the end of the trial period?

That way, free trials really would be free, and you’d get to choose whether you actually wanted to buy the app after you’d tried it, rather than before.

What do you think? Have your say in the comments below…

LEARN MORE ABOUT GRADIENT – WATCH NAKED SECURITY LIVE NOW

(Watch directly on YouTube if the video won’t play here.)

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/cKna-7UcJBE/

UK Ministry of Justice brags about new digital forensics unit to thwart tech-savvy jailbirds

The UK Ministry of Justice is setting up a digital forensics lab to probe mobile phones seized from prisoners.

The department claims that with increased security, more contraband has been snatched, and inmates are “using advanced technology to access the dark web, encrypt their messages and use social media in jail”.

The lab, replete with “cutting-edge technology”, aims to identify more people using phones while behind bars as well as provide improved digital evidence to make convictions more likely once phones have been seized. It will also provide intelligence on how phones are being used and their role in wider criminal activity outside prisons.

The canned statement from prisons minister Lucy Frazer said: “We know that the ways in which criminals conduct their business is advancing – with prisoners harnessing new technology and the dark web to further their operations behind bars.

“Bolstering our powers to detect and disrupt this kind of crime is a key element of our £100m investment in prison security. Alongside airport-style scanners, metal detectors and phone blockers, we will crack down on those who continue to commit crime and wreak havoc in our jails.”

We asked for a clarification on what is meant by “phone blockers” – an attractive if impractical solution to the problem.

With prisons being in towns and next to roads, a wide-ranging signal blocker could raise as many issues as it solves.

But a ministry spokesman told us that all the information we needed was in the statement and it would not be providing any other details.

The government had originally ditched the phone-blocker idea in favour of detecting and identifying mobiles used within prisons and getting networks to disconnect them. This would remove the need to physically seize the handset or SIM card.

A pilot of a version of the US Stingray device, which acts as a honeypot for phones in order to grab their International Mobile Subscriber Identity (IMSI) number, fell rather flat. As The Reg exclusively revealed, prisoners in Scotland beat the system using bits of tinfoil.

The money is coming from the budget of £100m to improve prison security. An additional £2.5bn is being spent on increasing prison capacity by an extra 10,000 places and to “create modern, efficient jails that rehabilitate offenders, reduce reoffending…”

Over 20,000 phones and SIM cards are seized from British prisons every year and one in three of those are now smartphones. There are about 80,000 men and 3,000 women in UK prisons. ®

Sponsored:
What next after Netezza?

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/29/digital_forensics_go_after_prison_mobes/

Huawei with you! FCC’s American Pai proposes rip-and-replace of scary Chinese comms kit

Ajit Pai, chairman of the US Federal Communications Commission (FCC), has devised a two-part scheme to erase Chinese hardware from American telecoms networks.

Firstly under the proposal, telcos would be forbidden from using any money from Universal Service Funds (USF) – a system of telco subsidies and fees overseen by the FCC – to buy hardware or services from “companies posing a national security threat, like the Chinese companies Huawei Technologies Co. and ZTE Corp”.

Networks could continue to use any equipment already in place, but not make new purchases or spend USF dollars to maintain or improve that equipment.

The second part of the proposal would see some telcos, which receive USF money, remove equipment from networks. The proposal would “seek comment on how to provide financial assistance to these carriers to help them transition to more trusted suppliers”.

It would also collect information to see just how much kit from Huawei and ZTE is already being used by US networks and how much it would cost to rip it out and replace it. It is believed that Huawei kit is mostly used by smaller, rural wireless providers because of its lower cost.

The FCC would then reimburse the networks at least some of the cost. The US government is also considering other ways of paying networks for the rip-and-replace scheme.

Only two companies – Huawei and ZTE – have been designated so far but the FCC may add other companies in the future that it considers a threat.

Chairman Pai issued the following statement:

When it comes to 5G and America’s security, we can’t afford to take a risk and hope for the best. We need to make sure our networks won’t harm our national security, threaten our economic security, or undermine our values. The Chinese government has shown repeatedly that it is willing to go to extraordinary lengths to do just that. And Chinese law requires all companies subject to its jurisdiction to secretly comply with demands from Chinese intelligence services. As the United States upgrades its networks to the next generation of wireless technologies – 5G – we cannot ignore the risk that that the Chinese government will seek to exploit network vulnerabilities in order to engage in espionage, insert malware and viruses, and otherwise compromise our critical communications networks.

The USF distributes about $8.5bn a year to improve access to telecoms services, especially in rural areas. The money is raised by taxing the telcos’ revenues from interstate and international calls.

The FFC will vote on the proposals at its November 19 meeting.

We’ve yet to hear back from Huawei but the company has in the past repeatedly denied it poses any security threat to the US. ®

Sponsored:
What next after Netezza?

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/29/us_wants_all_huawei_and_zte_kit_ripped_out/

What Do You Do When You Can’t Patch Your IoT Endpoints?

The answer, in a word, is segmentation. But the inconvenient truth is that segmentation is hard.

Question: What do you do when you can’t patch your IoT endpoints?

Dr. Mike Lloyd, CTO of RedSeal: Internet of Things devices are great because they aren’t as complicated as phones, laptops, or servers. General-purpose computers cause headaches. Unfortunately for security, IoT devices are also a curse for the same reason – precisely because they aren’t flexible. The security toolchain and ecosystem we’ve built up assumes we can put stuff on network endpoints, but IoT “things” are different. Agents? Scanning? Patching? Antivirus? None of that works in the new world of IoT widgets. Worse, many of these devices are built en masse by companies focused on price point, with no intention of supporting patching.

The answer, in a word, is segmentation. You have to treat these fragile endpoints like the boy in the bubble: They have a compromised immune system, so isolate them from the digital germs being cooked up continually around the Internet.

Do your smart lightbulbs really need open access to your databases?  Probably not. Industrial networks know this; they were traditionally air-gapped (although that has broken down over time). Segmentation is easy in principal – just separate the network you use for X for the one you use for Y. The reason to do so is clear: You want to limit the blast radius. But the inconvenient truth is that segmentation is hard. Defenders have to map out their zones and ensure the as-built matches the as-designed. This requires diligence, but it’s a great job for automation. Software can be taught to find any defensive gaps.

Do you have questions you’d like answered? Send them to [email protected].

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Dr. Mike Lloyd, CTO of RedSeal, has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike was CTO at RouteScience … View Full Bio

Article source: https://www.darkreading.com/edge/theedge/what-do-you-do-when-you-cant-patch-your-iot-endpoints/b/d-id/1336196?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

What a bunch of dopes! Fancy Bear hackers take aim at drug-testing orgs

The Russian hacking crew known as Fancy Bear is thought to be actively targeting anti-doping sports agencies.

This according to the team at Microsoft, who have long been tracking the group also known as APT28 or Strontium.

Redmond says that the attacks began in mid-September on the eve of new reports that the World Anti-Doping Agency (WADA) had found Russia’s main sport testing labs to be missing key databases chronicling the outcome of tests on Russian athletes.

“At least 16 national and international sporting and anti-doping organizations across three continents were targeted in these attacks which began September 16,” Microsoft corporate VP of customer security and trust Tom Burt explained.

“Some of these attacks were successful, but the majority were not. Microsoft has notified all customers targeted in these attacks and has worked with those who have sought our help to secure compromised accounts or systems.”

Redmond notes that this isn’t the first time the Fancy Bear crew has taken aim at anti-doping groups. The 2018 US court indictment of the group’s members was handed down in response to Fancy Bear’s successful efforts earlier that year to steal and post correspondence from anti-doping investigators who handled the 2016 Russian doping scandal, a case that led to Olympic bans for athletes from the former Soviet Union.

malware_security_648

Russian sports doping whistleblower fears for safety after hack

READ MORE

Like that hack, these latest efforts involve a range of both sophisticated attacks like custom malware and exploits, low-tech methods like password brute-forcing, and non-technical social engineering tricks like spear-phishing.

Because Fancy Bear is believed to work hand-in-hand with the Russian government in choosing its targets and carrying out attacks, Microsoft says these attacks on anti-doping bodies are particularly important to note.

When they are not looking to punish doping officials for penalizing Russia, the Fancy Bear crew have looked to influence US politics and spy on Russia’s neighbors.

“We think it’s critical that governments and the private sector are increasingly transparent about nation-state activity so we can all continue the global dialogue about protecting the internet,” said Burt.

“We also hope publishing this information helps raise awareness among organizations and individuals about steps they can take to protect themselves.” ®

Sponsored:
Beyond the Data Frontier

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/29/fancy_bear_hacking_doping_bods/

Is Voting by Mobile App a Better Security Option or Just ‘A Bad Idea’?

Security experts say voting by app adds another level of risk, as mobile-voting pilots expand for overseas military and voters with disabilities.

Paper ballots and risk-limiting audits — the manual sampling of votes — have become the new best practices for protecting US elections in the aftermath of Russia’s election meddling and hacking of voter registration databases during the 2016 presidential campaign.

Adding a paper trail to electronic voting to ensure ballots get accurately counted in the digital age may seem, well, a bit counterintuitive. But while some election officials and system security experts double down on old-school practices of paper and manual ballot counts to ensure election integrity, a hotly debated movement also is underway for casting votes via personal mobile devices.

Election jurisdictions in several states have tested mobile app-based voting for state, federal, county, and municipal elections — mainly military and civilian residents stationed overseas to cast votes from their smartphones and tablets in lieu of traditional email, fax, and paper methods. West Virginia offered mobile voting for both state and federal elections in 2018; Utah County, Utah and Denver County, Colo., offered it for their municipal elections this year. In all, 29 counties across five states have tested Voatz’s mobile-voting app in official elections.

The underlying goal of mobile voting, its organizers say, is to encourage more voter participation by making the process easier and more accessible. Oregon’s Jackson and Umatilla counties, as well as Utah County, recently extended their mobile-voting pilots for municipal general elections to include civilian stateside voters with disabilities.

Critics argue that this method of voting is inherently risky and insecure: Vulnerabilities are regularly unearthed in both Android and iOS, and cybercriminals and nation-state actors increasingly are waging mobile exploits to target their victims.

Mobile voting is “a bad idea,” says Ibrahim Baggili, who is the founder and co-director of the Cyber Forensics Research and Education Group and an associate professor at the University of New Haven. “Until we can have secure devices for every voter, I don’t think it’s worth it,” he says.

More Secure Than the Status Quo?
But proponents of mobile-voting maintain that the apps and process are more secure and private than the standard practice of sending PDF-based ballots via unencrypted email to military personnel overseas.

Some mobile-voting technology contains built-in security and vetting functions: The Voatz app used in Colorado, Oregon, Utah, and West Virginia, for example, comes with three layers of user authentication, and its blockchain distributed-ledger technology encrypts the data and provides privacy and an audit trail, its proponents say. The app also scans the voter’s device for malware and proper Apple or Google digital certificates before allowing the voter to cast his or her ballot.

Sheila Nix, president of Tusk Philanthropies, the nonprofit that’s funding the Voatz-based mobile-voting pilots in the four states, says she’s well aware of security concerns about mobile voting, which is why the group has hired outside security experts to test and evaluate the security of the technology.

“My overall theory is we don’t want to promote something that’s not secure. Then our goal backfires,” she says.

Snake Oil?
Mobile voting seems like a natural progression for a society of users who already bank, shop, share, and communicate via their smartphones. Some experts believe its adoption, in some form, may be inevitable in the future despite the current misgivings about its security. But mobile technology is fraught with vulnerabilities, and blockchain security remains a big question mark, opponents say.

Among the critics of mobile voting is DEF CON Voting Village organizer Harri Hursti, who believes mobile voting won’t survive beyond the pilot phase.

“It’s going to be fizzled out after all the money has been milked [from it],” he says. “It’s truly profitable for companies promoting this. The whole idea of snake oil always [sells] well.”

Hursti was one of the first researchers in the world to hack voting machines. As part of a 2006 project organized by a nonprofit election watchdog group called Black Box Voting, Hursti, along with Hugh Thompson, found major security vulnerabilities in Diebold voting machines. The project was profiled in the HBO documentary Hacking Democracy.

He says he worries about the risk of voter coercion in mobile voting; merely having your smartphone as your personal voting machine leaves a voter vulnerable to pressures from other individuals. And smartphones are far too prone to malware and other cyberthreats to be considered a reliable voting tool, he says.

“Just because Apple improved security doesn’t mean you’re secure as a user,” he says.

Security services and consulting firm ShiftState Security has been analyzing the Voatz mobile platform on behalf of Tusk. Jason Truppi, co-founder of ShiftState and a former FBI cybersecurity agent, says there’s no such thing as unbreakable security, and he definitely gets why critics are wary of mobile voting.

“I’ve seen all the threats,” says Truppi, referring to his past work investigating nation-state and cybercrime breaches while with the FBI and in the security field the past two decades. “So if you want to talk skeptical, I’m as skeptical as the industry itself.”

But Truppi also believes voting methods are gradually changing. “It’s hard to imagine a world that’s still going to the [physical] polls 10 to 15 years from now,” he says. “Mobile voting is an eventuality. Why not solve some of the [security] problems now?”

Coming into Focus
It wasn’t until the past three years that the security of voting and elections received much public attention at all. That changed dramatically after the 2016 presidential election and was punctutated by the DEF CON hacking conference’s maiden Voting Village event in 2017, where it took just 90 minutes for the first two security researchers to hack voting machines using flaws they discovered.

Marian Schneider, president of nonprofit Verified Voting, told attendees at a presentation during the 2019 Voting Village this past August in Las Vegas that mobile device vulnerabilities could be abused in the voting process — and voters’ personal information could be exposed.

“I understand the worthy desire to increase voter participation and to remove a barrier to voting,” Schneider said. “But voting with my mobile app is not the way to do it. It’s opening the door to the county and state to an attack.”

She noted that when the mobile app sends the vote back to the voter to ensure its accuracy, this also opens up privacy holes to the voter. “How is the app developer not able to see it,” as well as the biometric and other data provided by the user, she argued.

Schneider’s organization has been one of the leaders in pushing for paper ballots in elections as a way to validate vote counts, and one of its board members in May co-authored a report calling out Voatz for a lack of transparency in providing the details of its blockchain implementation. 

A researcher who was one of the first to hack voting machines in the Voting Village in 2017 also considers mobile voting too risky. “It’s a good first step, but there are a lot of things missing,” such as a privacy layer atop the blockchain, says Carsten Schuermann, an academic expert in election security who has been studying election security for a decade.

Schuermann, a computer scientist at the IT University of Copenhagen in Denmark, compromised a WinVote voting machine on the Wi-Fi network at the 2017 Voting Village, exposing real election and voting data that was still stored on it.  

{STORY CONTINUES ON PAGE 2}

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full BioPreviousNext

Article source: https://www.darkreading.com/edge/theedge/is-voting-by-mobile-app-a-better-security-option-or-just-a-bad-idea/b/d-id/1336152?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Pwn2Own Adds Industrial Control Systems to Hacking Contest

The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January.

Vulnerability research competition Pwn2Own is expanding to include industrial control system (ICS), giving researchers an opportunity to hunt for bugs in popular ICS software and protocols.

This is the first time Trend Micro’s Pwn2Own, now in its twelfth year, has added ICS tech to its lineup. The Vancouver-based contest started out challenging ethical hackers to find flaws in Web browsers; since then, it has expanded to include virtualization software and enterprise applications. This past March, PWn2Own participants hacked into a Tesla Model 3’s infotainment system.

Its first ICS security competition will take place at the January S4 conference in Miami Beach. The decision to have ICS Pwn2Own at S4 was mutual, says Dale Petersen, founder of S4 Events and Digital Bond. When he approached Trend Micro’s Zero-Day Initiative (ZDI) back in the spring to propose bringing ICS Pwn2Own to S4x20, they had already been thinking about it. In 2018, ZDI purchased 224% more zero-day vulnerabilities in ICS software compared with the previous year, demonstrating a growing need to research bugs in industrial control software.

One challenge has been finding the right time to introduce a hacking contest for ICS technology, which as Peterson points out, has long lagged behind in terms of security. “The industry wasn’t ready for it,” he says. Pwn2Own could have held an offensive security contest, but it would have been relatively easy for researchers to break into systems. Now, systems’ protections are stronger, he explains. Today’s ICS technology, while not perfect, gives researchers a challenge.

Brian Gorenc, director of Zero-Day Initiative, says S4 is the “perfect location” to launch an ICS-focused Pwn2Own. “Those products control many pieces of critical infrastructure but are often overlooked by researchers,” he explains. The goal of Pwn2Own Miami is to build on the security of existing ICS technology by discovering vulnerabilities and providing the research to vendors.

This kind of competition presents a host of logistical challenges, he continues. Are products easily available for organizers and researchers? How are they configured? Can all the necessary equipment be shipped to the conference location?

“With ICS, we obviously can’t ship a centrifuge to a hotel, and researchers are unlikely to have pump controllers sitting around for them to test,” Gorenc adds. “However, we were able to work with our industry contacts to find readily available, software-based ICS products that make sense to include in the contest.”

Organizers reached out to several people and firms in the ICS sector, says Peterson, and technologies were considered with two key factors in mind. First was the footprint, or how widely used the system is. Second was its relevance to researchers and the ICS community. Rockwell Automation, for one, is providing virtual machines with their products for the contest.

ICS Pwn2Own will be broken down into five categories: Control Server, OPC Unified Architecture (OPC UA) Server, DNP3 Gateway, Human Machine Interface (HMI)/Operator Workstation, and Engineering Workstation Software (EWS).

“We chose these categories based on the conversations we had with those in the ICS sector and based on what we could logistically accomplish,” he continues. “These five categories provide a broad look at different aspects of ICS and provide a wide set of targets for researchers.

EWS is a hot target for attackers as it directly communicates and can configure primary control equipment like PLCs, Gorenc says. The HMI category is similar: attackers target the HMI as it often has Web server components and can definitely be affected by Web-based exploits. “Highly deployed ICS software is often locked behind a paywall and not easily accessible to researchers,” he says. Pwn2Own aims to remove these barriers to let researchers evaluate security.

The Contest

How it works: targets will be announced three months before the competition, giving Pwn2Own contestants a window of time to develop an exploit, Peterson explains. At the show, they have three five-minute attempts to exploit the target. If a denial of service, information disclosure, or remote code execution exploit works, the successful researcher, Pwn2Own team, and ICS vendor (if they choose to participate) will meet to discuss the details. The vendor will verify if it’s a true zero-day; if so, it follows ZDI’s disclosure policy allowing the vendor 120 days to fix it.

Pwn2Own has allocated more than $250,000 in cash and prizes for eight targets across these five categories, Gorenc writes in a blog post on the news. The contest will usually buy many successful exploits for a target, a tactic meant to encourage participation from more researchers.

Is the ICS community ready for a competition like this? There will be people who don’t like it, Peterson says, though he believes it’s a positive step forward for the industry. In his view, the organizations that don’t update their systems put the industry at greater risk than researchers looking for vulnerabilities in them. Gorenc notes the overall reaction has been positive.

“There is definitely some trepidation, but Pwn2Own has a history of working with vendors to get bugs fixed before they are used in active attacks,” he says.

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/pwn2own-adds-industrial-control-systems-to-hacking-contest/d/d-id/1336191?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Fortinet Bolsters Endpoint Security with enSilo Acquisition

As companies reduce their vendor count, consolidation will likely continue to accelerate in the next year.

Network and software security firm Fortinet (NASDAQ: FTNT) has acquired privately held endpoint detection and response firm enSilo in an effort to push its security solutions to the edge of corporate IT environments, Fortinet announced on October 28.

The deal, whose terms were not disclosed, will allow Fortinet to offer agent-based software and services aimed at automating real-time threat detection, speeding response, and secure Internet of Things (IoT) devices, according to the company’s statement. The acquisition also continues the consolidation in the cybersecurity industry driven by companies’ need to simplify. 

Businesses are seeing more complex threat landscapes and need simpler ways of securing their networks and endpoints, Ken Zie, CEO and founder of Fortinet, said in a statement. “As businesses become more networked and operations extend from the cloud to the edge and Internet of Things, the digital attack surface has expanded exponentially and has become more complex to secure,” he said. “Manual threat hunting or point security solutions are ineffective when managing or securing these new environments.”

The purchase of enSilo comes as the endpoint security industry has already begun to consolidate. In 2019, Gartner listed 20 companies in its 2019 Magic Quadrant for Endpoint Protection Products, and some of those companies already have been acquired. HP hooked Bromium in September, VMware collected Carbon Black in August, BlackBerry bought Cylance in November 2018, and Thoma Bravo tossed Sophos a $3.9 billion bone this month. 

Behind the acquisitions are companies’ desires to reduce the number of cybersecurity vendors on which they have to rely. In 2019, the share of companies that had reduced the number of vendors to 10 or fewer increased to 63%, from 54% in 2018, according to Cisco’s “CISO Benchmark Study”. One key factor is the desire to reduce the number of alerts produced by different products, the report stated.

“It’s no surprise that alert management continues to pose challenges,” Steve Martino, senior vice president, and chief information security officer of Cisco, said in a February 2019 blog post on the report. “That’s often because organizations are using multiple disparate security products that don’t share alert data or help prioritize alerts via limited dashboards.”

The survey of CISOs is not the only report to find that organizations are having more trouble responding to proliferating threats and complex IT security environments. Business analyst firm Enterprise Strategy Group estimates that three-quarters of firms find threat detection and response more difficult today than two years ago, primarily because of too many security tools that do not work together.

Fortinet pointed to such issues as a primary reason for its acquisition of enSilo. The problem, the firm maintained, is that as companies faced more threats, they bought more tools to the detriment of their security posture.

“The response by too many organizations … has been to deploy multiple, siloed security products, the bulk of which is focused on prevention,” the company said in a blog post announcing the enSilo acquisition. “But the truth is, 100% prevention is not possible. The result is a fragmented, complicated security architecture that can actually make detection and response more difficult.”

The acquisition will allow Fortinet to target IoT environments, a growing market, the company said in the post. With operational technology increasingly being incorporated into enterprise networks, these devices need to be secured against online threats. 

“The hallmark of the modern network is the rapid expansion of the network edge,” the company said. “New IoT and endpoint devices, bolstered by high performance, robust functionality, and new business applications, have expanded the potential attack surface. This in turn has raised the bar for having a fully integrated security solution that no longer operates in isolation and can extend visibility out to these emerging edges.”

Related Content

 

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/endpoint/fortinet-bolsters-endpoint-security-with-ensilo-acquisition/d/d-id/1336193?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Adobe database exposes 7.5 million Creative Cloud users

Adobe has become the latest company to be caught leaving an Elasticsearch database full of customer data exposed on the internet.

Discovered on 19 October by data hunter Bob Diachenko and security company Comparitech, the unsecured database contained the email addresses of nearly 7.5 million customers of Adobe’s Creative Cloud, plus the following:

  • Account creation date
  • Adobe products used
  • Subscription status
  • Whether the user is an Adobe employee
  • Member IDs
  • Country
  • Time since last login
  • Payment status

That’s the email addresses of around half of Creative Cloud’s customer base although not, importantly, any of their passwords or payment information. Nevertheless, said Comparitech, spelling out the risk of phishing attacks:

Fraudsters could pose as Adobe or a related company and trick users into giving up further info, such as passwords, for example.

Judging from clues in the data, Diachenko believes it might have been exposed for around a week. It’s not possible to tell whether anyone else accessed the data during this time.

You’ve heard this before

Adobe secured the database on the same day it was told and has since issued a brief statement admitting the security error:

Late last week, Adobe became aware of a vulnerability related to work on one of our prototype environments. We promptly shut down the misconfigured environment, addressing the vulnerability.

And by way of scant reassurance:

This issue was not connected to, nor did it affect, the operation of any Adobe core products or services.

That sounds like Adobe’s way of saying that the operation of user accounts was not affected.

Resetting an Adobe account on the basis of this breach is probably not necessary and wouldn’t in any case protect against subsequent phishing attacks.

A better idea is to make sure that extra authentication has been enabled in the account settings by going to Change Password Two-step verification. Choose from SMS text messages or an app-generated code).

Diachenko and Comparitech has a track record of uncovering exposed databases, including in August a MongoDB database belonging to a Mexican publisher, another in May containing the records of 275 million Indians, and an Elasticsearch database in November 2018 containing details of 57 million Americans.

It all goes to show that while the data hackers are a known risk, the companies whose job it is to tend data can be just as big a problem.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/LwUOs6-beVw/