STE WILLIAMS

How Much Security Is Enough? Practitioners Weigh In

Most IT and security pros surveyed say they could afford some, but not all, of the minimum security needed to protect themselves.

How much security do you need to effectively protect your organization’s infrastructure? Most (84% of) IT decision-makers say they can’t afford the minimum amount, according to new study from Cisco.

Researchers with Cisco surveyed 80 IT decision-makers on security budgeting and planning and found that more than half (56%) had experienced a significant security event – a breach, intrusion, or malware infection – in the past year, and 94% admit they have further to go to implement effective security practices.

There is a silver lining in that most companies know where they need help: 95% of respondents say they can identify which data and systems in the business require the most protection. The problem is that it’s not just money holding them back. Expertise, capability, and influence, along with budget, all play a role in security, says Wendy Nather, Cisco’s head of advisory CISOs.

Some organizations have a lot of money and expertise, so they know what they need to do. Some have the influence to communicate their security needs to vendors, partners, and other third parties who can fulfill their requests. But budget, expertise, and influence don’t guarantee capability if the organization operates in a heavily regulated industry, for example, she adds.

“It’s not that they’re incapable, but they have constraints in that environment they might not be able to get around,” she says. An airplane manufacturer has influence, Nather continues, but new technology will have to be carefully tested, in one airplane at a time, before it’s rolled out. In the public sector, it’s difficult to justify upgrading equipment when everything works fine. Public sector technology is designed to maximize taxpayer’s dollars, not keep up with security.

“Because there are four factors, if you don’t have any one of them, that can really hamper your program,” she says. Influence, for one, can make a big difference: 86% of organizations with 10,000+ employees learn of security vulnerabilities and incidents that affect them from affected vendors or partners, compared with just 60% of businesses with fewer than 1,000 employees.

Breaking Down Budgets

Among mid-market organizations (250-999 employees), 46% spend under $250,000 on security each year and 43% spend $250,000 to $999,999. Among enterprise organizations (1,000-9,999 employees), 57% spend between $250,000 and $999,999, 23% spend less than $250,000, and 20% spend at least $1 million. Half of large enterprises (more than 10,000 employees) spend $1 million or more on security each year and 43% spend between $250,000 and $999,999.

To an extent, more money drives confidence: 27% of organizations spending at least $1 million on security say they can afford the minimum level of protection they need, compared with only nine percent of those spending $250,000 to $999,999. However, the smallest organizations reported greater confidence in their security measures than midmarket firms spending more.

“What interests me is the midrange organizations – not so much in how much they’re spending, but what effect that spending has or doesn’t have,” says Nather. “They most often reported feelings of not doing enough … most often the ones to say they couldn’t spend as much as they needed.” Nineteen percent of the smallest businesses said they could afford the minimum amount of security they needed, compared with seven percent of midmarket organizations.

Could it be that smaller companies don’t perceive themselves as targets and aren’t as worried? Possibly, Nather notes, but organizations of all sizes can appear on attackers’ radar because of their operation or business function; not necessarily for their size. If a business swaps to a new ecommerce platform known to be vulnerable, attackers can take aim no matter how big it is.

Seeking Security Skills

Budget isn’t the only factor challenging midrange organizations, Cisco researchers report. Among organizations with 1,000-9,999 employees, only 23% rely most heavily on internal staff for security expertise, compared with 37% of respondents overall. And while it’s good businesses feel they can use external resources for help, they should be able to use internal staff for help with critical topics like user experience, process design, risk analysis, and incident response.

“Security talent, especially senior talent, is very hard to find,” Nather says. “Unfortunately, a lot of organizations are in the position of competing with security vendors for that talent.”

The percentage of those depending on external resources could be admitting there is a limit to how much an organization can know about security, she explains. After all, a business with the expertise to know what it needs to do for security may not have the talent to execute on it. Many companies outsource responsibilities that are hard to hire for, and hard to sustain with skilled workers: security operations monitoring is one example; incident response is another.

Even outsourcing has its limitations, Nather points out. “There won’t be anything you can completely outsource because your outsourcer will come back to you and say, ‘we don’t know what this means,’ and ‘we need to talk to someone internally who can take care of this.'”

Security Tech: What Do You Really Need?

The report lists 15 different security technologies used among respondents. Some organizations listed four tools they rely on, Nather says, while others listed more than 30 products. On the final list, firewalls and security policy management fall into first place, followed by email security and network malware protection. Of course, not every organization can afford all 15 tools, let alone the expertise needed to configure, maintain, and monitor all of them.

“Whether you have what you need, and whether you’re using it right, that’s the other big thing to remember,” she continues. “You might have a firewall, but if you’re letting everything in, it’s not a very useful firewall.”

Are there technologies an organization must have to achieve strong security? There is no standard blueprint, Nather says, as each business has different needs and different resources. CISOs don’t have a one-size-fits-all answer for the type of technologies they need; right now, the closest they have are compliance standards for tightly scoped risk cases like PCI-DSS.

“If we as professionals can’t agree on what organizations need, how are they supposed to know?” Nather asks. When you don’t know the risks you’re trying to manage, it’s tough to come up with a specific shopping list. Businesses may need to conduct extensive research and perform a security audit to determine exactly what they need and can afford.

“They should look at where they have better capabilities, and where they have lesser capabilities, and design security accordingly,” Nather advises.

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/operations/how-much-security-is-enough-practitioners-weigh-in/d/d-id/1336138?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Just a friendly reminder there were no at-the-time classified secrets on Clinton’s email server. Yes, the one everyone lost their minds over

The US State Department has delivered its report [PDF] into Hillary Clinton’s use of a personal email system and, amazingly enough, there wasn’t anything scandalous nor classified on it at the time.

But for the private server, Clinton’s tenure as Secretary of State would have been exemplary and her presidential run calmer. However, the mind-boggling furor in the media over the system in the months and days before the 2016 election put a significant dent in all that. It gave Donald Trump and his supporters the rallying cry of “Lock her up,” and it was a spilled tank of gasoline ignited by a match in the form of James Comey’s bombshell letter reopening an FBI probe into her emails.

The acres of coverage given to the email system alone didn’t swing it for reality TV star Trump, but it sure helped. In reality, the system was boring: there were no super serious state secrets just waiting for hackers to pick off, as some feared.

“A typical security violation involves pre-marked classified information discovered contemporaneously with the incident,” the report, sneaked out on Friday evening, read. “None of the emails at issue in this review were marked as classified.”

The best Senator Chuck Grassley (R-IA) could come up with was this criticism:

“The investigation concluded that Clinton’s use of a personal email server to conduct official business increased the risk of unauthorized disclosures and security compromises,” he noted.

So, in short, Clinton was cleared of any criminal or serious wrongdoing, and her IT provider won’t face any sanctions – although there was some wrist slapping in the report. Look, it wasn’t smart to run an external system handling official business, but it wasn’t the end of the nation as some screamed.

The State Department’s internal investigators’ probe “resulted in the adjudication of 91 valid violations attributable to 38 individuals.” Translation: setting up an unclassified personal email system external to the department’s protected IT infrastructure, and using this system for official business, broke 91 internal rules on best practices. Nothing criminal, just dumb. After all, the whole thing about the deleted emails was cock-up rather than conspiracy.

Donald Trump and Vlad Putin

We’ve read the Mueller report. Here’s what you need to know: ██ ██ ███ ███████ █████ ███ ██ █████ ████████ █████

READ MORE

There were also “497 valid violations where no individual was found to bear culpability, resulting in a ‘valid, but not culpable’ determination,” according to the report.

“While there were some instances of classified information being inappropriately introduced into an unclassified system in furtherance of expedience, by and large, the individuals interviewed were aware of security policies and did their best to implement them in their operations,” the dossier continued.

In other words, the people running the external email system at least tried to keep the thing secure. And “classified information” here means information that was later classified; at the time Clinton and her aides handled the info, it was considered unclassified.

The low-key release of the report indicates Clinton ought to be in the clear. In the current political climate, if there was any serious malfeasance, the State Department would be shouting it from the rooftops.

Then again, it could just be embarrassed on behalf of the Republican National Committee, which ran its own private email servers for years until discovered in 2007, whereupon it wiped millions of emails before investigators could check them out. ®

Sponsored:
Beyond the Data Frontier

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/22/clinton_email_report/

Avast lobs intruders into the ‘Abiss’: Miscreants tried to tamper with CCleaner after sneaking into network via VPN

On Monday, security biz Avast said it believes some of its credentials were stolen and abused in an unsuccessful attempt to subvert CCleaner, a file cleanup utility that it acquired in 2017.

Jaya Baloo, CISO at Avast Software, said in a blog post that the security shop spotted suspicious behavior on its network last month and began working with outside security groups, including the Czech intelligence agency, Security Information Service (BIS), to investigate the incident.

Following its acquisition of CCleaner two years ago, Avast acknowledged that it had distributed a compromised version of the software that contained nefarious code. Back then, the malware was believed to have infected about 2.27 million PCs.

This time, the vandalism attempt appears to have been thwarted. Forensic data drew attention to malicious activity by someone using an internal IP address that resides within the company’s VPN address range.

“The user, whose credentials were apparently compromised and associated with the IP, did not have domain admin privileges,” said Baloo. “However, through a successful privilege escalation, the actor managed to obtain domain admin privileges.”

PHP, image via Shutterstock

Avast urges devs to secure toolchains after hacked build box led to CCleaner disaster

READ MORE

Further analysis revealed the attacker, connecting from a public IP address hosted in the UK, had made multiple attempts to access Avast’s network since at least May 14 this year. The attack was able to use compromised credentials through a temporary VPN profile that had been activated by mistake and didn’t have two-factor authentication enabled.

Avast left that VPN profile in place to gather further data as its investigation proceeded. While planning mitigation measures, the company also worked on shoring up its product build environment and release system.

According to Baloo, the company suspended all CCleaner releases to review current and past versions of the software for malicious code and re-signed a scrubbed version of the software as an automatic update on October 15 while revoking the previous signing certificate and resetting all internal credentials.

Baloo described the attack as “extremely sophisticated” and said the attacker was acting cautiously to avoid detection. “We do not know if this was the same actor as before and it is likely we will never know for sure, so we have named this attempt ‘Abiss,'” said Baloo. ®

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/21/avast_ccleaner_intrusion/

Row erupts over who to blame after NordVPN says: One of our servers was hacked via remote management tool

Analysis NordVPN spent today attempting to downplay a security breach in which someone sneaked into one of its servers for purposes unknown.

Here’s what we know: miscreants were able to exploit a poorly secured remote-management system, built into the server and understood to be iLO or iDRAC, to gain control of the box in March 2018. They were able to gain access to the LXC containers running on the machine, and its OpenVPN software files and cryptography keys, it is claimed. The TLS certificate, since expired, for the nordvpn.com website was also stolen from the system.

This means whoever broke in may have snooped on NordVPN subscribers’ non-HTTPS web traffic, DNS lookups, and similar unprotected connections, running through that particular compromised machine. Up to about 200 people may have used the node; NordVPN doesn’t know for sure because it doesn’t log the activities of its users. Meanwhile, the TLS certificate could have been used to create a spoof nordvpn.com website to capture usernames and passwords in a classic miscreant-in-the-middle attack.

For the uninitiated, NordVPN is a rather popular VPN provider: roughly 12 million netizens route their internet traffic via NordVPN’s 3,000 or so servers, which are scattered across the planet. The users’ connections to websites and other services thus appear to originate from the VPN provider’s boxes. It’s useful for getting around web filters – for example, if you want to access content that’s limited to just the US, you can make your connections appear from systems in America – and give yourself a little extra privacy. The connections between your computer or phone and NordVPN’s nodes are encrypted.

Two execs in a server room. Has to have happened some time heh. Photo by Shutterstock

Can we talk about the little backdoors in data center servers, please?

READ MORE

Over the weekend, the VPN biz tweeted a now-deleted boast that “Ain’t no hacker can steal your online life. (If you use VPN).” In response, a hacker group calling itself KekSec revealed that some other miscreants had broken into one of the company’s boxes, and leaked various files, including an OpenVPN configuration and associated private key. A spokesperson for NordVPN confirmed the hacked server was indeed an exit node in its network, and that whoever was lurked on the machine could have snooped on packets flowing out of it.

“Even if a hacker could have viewed the traffic while being connected to the server, he could only see what an ordinary ISP would see, but in no way, it could be personalized or linked to the particular username or email,” NordVPN’s PR person told us.

“Historical VPN traffic could not be monitored.”

According to NordVPN’s official statement on the affair, the server was rented and based in a data center in Finland. Someone was able to gain control of the Linux-powered box via an unprotected remote management interface provided by the server’s owner: it is alleged this interface was effectively kept secret from the VPN provider, meaning it had no way of knowing this box was at risk. This management interface gives whoever wields it full control of the system: think of it as God mode.

“The attacker gained access to the server by exploiting an insecure remote management system left by the data center provider while we were unaware that such a system existed,” NordVPN’s Daniel Markuson claimed in the aforementioned statement, emitted on Monday.

“The server itself did not contain any user activity logs; none of our applications send user-created credentials for authentication, so usernames and passwords couldn’t have been intercepted either.

“Once we found out about the incident, we immediately launched a thorough internal audit to check our entire infrastructure. We double-checked that no other server could possibly be exploited this way and started creating a process to move all of our servers to RAM, which is to be completed next year. We have also raised the bar for all data centers we work with. Now, before signing up with them, we make sure that they meet even higher standards.”

The server at the heart of this brouhaha was spun up in January 2018, we’re told. The insecure remote management interface was spotted and disabled by the server’s owners on March 20 “without notifying” NordVPN, according to Markuson. The VPN provider’s techies became aware of the server compromise at that time, though kept quiet about the security hole – apparently to carry out that “thorough internal audit.” The server was also disabled, and the hosting contract canceled. It is believed the break-in occurred once sometime in March 2018, before the 20th of that month. The leaked configuration files and keys are now invalid.

“To recap, in early 2018, one isolated data center in Finland was accessed without authorization,” Markuson added. “That was done by exploiting a vulnerability of one of our server providers that hadn’t been disclosed to us. No user credentials have been intercepted. No other server on our network has been affected. The affected server does not exist anymore and the contract with the server provider has been terminated.”

Not so fast

NordVPN did not identify the data center server host in question, though we understand it to be Finnish outfit Creanova, which rents out Dell and HP machines. Its CEO Niko Viskari told The Register the blame lays squarely with NordVPN for not locking down the remote management interface, which NordVPN was apparently aware of: “They even used this tool sometimes,” the chief exec claimed.

“Yes, we can confirm they were our clients,” Viskari continued. “And they had a problem with their security because they did not take care of it themselves.

“All servers we provide have the iLO or iDRAC remote access tool, and as a matter of fact this remote access tool has security problems from time to time, as almost all software in the world. We patched this tool as new firmware was released from HP or Dell.

“We have many clients, and some large VPN service providers among them, who take care of their security very strongly. They pay more attention to this than NordVPN, and ask us to put iLO or iDRAC remote-access tool inside private networks or shut down access to this tool until they need it. We bring [iLO or iDRAC] ports up when we get requests from clients, and shut them down when they are done using this tools. NordVPN seems it did not pay more attention to security by themselves, and somehow try to put this on our shoulders.”

Oh, those accounts

As we were preparing to publish this article, NordVPN got back to us and clarified that while it was aware of remote-management interfaces, it wasn’t aware of an insecure account created by Creanova in the management system of the server it was renting – an account exploited by miscreants to hack the box.

“We have intrusion-detection systems, but unfortunately, we didn’t know about undisclosed accounts used to access the remote server management system left by [Creanova],” NordVPN’s PR person told us. “One such account was used to access our server by a malicious actor. It’s not that we didn’t know about the solution; we never knew about additional accounts that have been created and then deleted.”

We’re told that this is what NordVPN saw in its logs:

"19779","Informational","03/20/2018 07:25","03/20/2018 07:25","1","User support deleted by creanova.",
"19778","Informational","03/20/2018 07:25","03/20/2018 07:25","1","User admin deleted by creanova."

NordVPN was thus apparently unaware of these management accounts, allegedly created by Creanova, and at least one was seized by hackers to break into its system, we’re told. Meanwhile, NordVPN is working to set up a bug bounty, to reward those who privately disclose security flaws in its gear. ®

Hat tip to TechCrunch for first reporting the server compromise.

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/21/nordvpn_security_issue/

ATTK of the Pwns: Trend Micro’s antivirus tools ‘will run malware – if its filename is cmd.exe’

Video A flaw in the Trend Micro Anti-Threat Toolkit can be exploited by hackers to run malware on victims’ Windows computers.

Bug-hunter John “hyp3rlinx” Page took credit for uncovering CVE-2019-9491, an arbitrary code execution flaw in the security tool.

In short, the Trend software can be tricked into executing any old piece of software under the sun, including malware, when it is scanned, provided the filename is cmd.exe or regedit.exe. No, really.

“Trend Micro Anti-Threat Toolkit (ATTK) will load and execute arbitrary .EXE files if a malware author happens to use the vulnerable naming convention of ‘cmd.exe’ or ‘regedit.exe'” hyp3rlinx explained on Saturday.

“And the malware can be placed in the vicinity of the ATTK when a scan is launched by the end user.”

The Catholic Church's erosary

Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope’s Click to Pray eRosary app

READ MORE

In other words, your Trend antivirus software can be tricked into running a virus. That’s… not good. It means if you can save a file on someone’s PC as cmd.exe or regedit.exe, via a download or email or something like that, and they’re running ATTK, you can now run malicious code on their machine.

“Since the ATTK is signed by verified publisher and therefore assumed trusted any MOTW security warnings are bypassed if the malware was internet downloaded, also it can become a persistence mechanism as each time the Anti-Threat Toolkit is run so can an attackers malware,” the flaw-finder added.

Needless to say, remote code execution flaws are not a good thing in a security tool. The software you want to protect your machine can be tricked into executing malware. Don’t believe us? Here’s a proof of concept video of the attack in action:

Youtube Video

The bug is no secret, either. According to hyp3rlinx, Trend was warned of the flaw back on September 9, and confirmed the bug on the 25th of that month.

The Register asked Trend Micro for comment on the report, and to confirm a patch has been issued, but have yet to hear back at the time of publication. ®

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/21/flaw_trend_micro/

Avast Foils Another CCleaner Attack

‘Abiss’ attackers used an older VPN profile to get into Avast’s network and targeted its CCleaner utility.

Two years after cyber-espionage actors infected the CCleaner utility with malware designed to infiltrated certain companies, Avast’s security team has foiled a second attack targeting the widely used system-maintenance program.

The company detected signs of the attack on Sept. 23, when suspicious network behavior tipped off its security team. The attackers gained access through compromised VPN credentials that used an old profile not requiring two-factor authentication. The attackers were able to compromise two separate accounts and access the internal network, Avast said in a statement on its site today.

The attack failed to advance beyond the early stages, says Jaya Baloo, Avast’s chief information security officer, who started on Oct. 1 as the investigation kicked off.

“The worst-case scenario was that they could try to do what they did before: Get code-signing keys, be able to push out malware, and send [malicious code] using valid updates,” she says. “So we looked for that, but we didn’t find it. We assumed nothing and looked at all the old versions of stuff we released in the last six months. … We checked and rechecked.”

The incident could have ended much worse, as it did two years ago. In July 2017, attackers managed to infiltrate the network of Piriform, maker of CCleaner, following Avast’s acquisition of the company, and pushed out malware-infected updates to 2.27 million users. The company was not a target of opportunity. The attackers pushed secondary infections to just 20 victims machines, targeting companies including Microsoft, Google, Sony, Cisco, and Akamai.

“From the insights we have gathered so far, it is clear that this was an extremely sophisticated attempt against us that had the intention to leave no traces of the intruder or their purpose, and that the actor was progressing with exceptional caution in order to not be detected,” Avast stated in the most recent blog post. “We do not know if this was the same actor as before and it is likely we will never know for sure, so we have named this attempt ‘Abiss’.”

After initially detecting the suspicious access on Sept. 23, the company found a second user account had also been used by the attackers. Tracking back the history of suspicious activity, the company found the first attempts by the attacker to infiltrate the system dated back to May 14.

The company then tracked the known compromised user accounts. While the original user account did not have administrative access, the attackers used a privilege-escalation exploit to gain greater permissions on the network, Avast stated. The attacker was able to replicate the Active Directory, a step toward attempting to retrieve additional credentials, but did not advance further, the company said.

The attack required that Baloo jump in with both feet into her new role. While she was hired earlier in the summer, she still had not left her previous job and was traveling when she got the call.

“The first order of business was to …. figure out where the bathroom is and examine all those logs,” she says.

As part of its response, Avast collaborated with the Czech intelligence agency, known as the Security Information Service (BIS), the cybersecurity section of the local Czech police, and a third-party incident response and forensics team.

Avast has a very technical team, who had learned a great deal from the attack two years ago, Baloo says. Yet there are still lessons to be learned from this time around.

The first is to better analyze the data the company is collecting. The initial alert had been detected by the company, but was deemed a false positive — not a threat. While many companies can cut out noisy data sources, Avast needs to analyze as much data possible because that is the company’s business, she says.

“This is really challenging, especially in a company whose business it is to look for the bad guys,” she says. “You have a lot of data, and so you have two different extremes — having a lot of data but not using it or being crippled by the immense amount of data you are getting.

The company also needs to better segment its permissions, which is difficult because everyone in the company is quite technical and wants to do as much on his or her own as possible, she says.

“The people are capable and have hands-on credibility, so they have a lot of leeway to ask for a lot of privileges on the network because they can handle it,” Baloo says. “But nothing is better for security than segmentation, isolation, and asking people to jump through a few more hoops before giving them access to the crown jewels.”

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/operations/avast-foils-another-ccleaner-attack/d/d-id/1336132?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft Aims to Block Firmware Attacks with New Secured-Core PCs

Partnerships with Intel, Qualcomm, and AMD will bring a new layer of device security that alters the boot process to detect firmware compromise.

Microsoft is teaming up with Windows device manufacturers to tighten firmware security in a new initiative called Secure-Core PCs, which are built to defend against firmware-level attacks.

Its announcement arrives as attackers take greater aim at firmware, the level of software that is closest to the hardware and controls the functions of devices and systems. Firmware is an appealing target because it has a higher level of access and privilege than the operating system kernel and hypervisor. The National Vulnerabilities Database reports 414 firmware bugs have been reported in 2019, compared with 476 in 2018, 401 in 2017, and seven in 2016.

“Firmware is the most privileged software running on the device,” says David Weston, partner director of OS security at Microsoft. “You can basically do anything.” Because firmware isn’t always centrally updated, he continues, it’s more likely to be outdated and vulnerable.

When firmware vulnerabilities are exploited by sophisticated groups such as Strontium/APT28, which has been spotted using this type of attack, the infection is difficult to detect and remove. Firmware attacks can weaken security functionalities like Windows’ Secure Boot; because many endpoint detection and response (EDR) tools have limited visibility at the firmware level, it’s easier for attackers to slip past them. If the firmware is assumed breached, the security of the whole machine is potentially at risk.

Secure Boot is a feature designed to make sure that when a device boots up, it’s only using software trusted by the OEM. When a computer starts, the firmware checks the signature of each component in the boot software. If the signatures are valid, the machine starts running. Secure Boot assumes firmware can be trusted – a major problem if it has been compromised. On its own, the secure measure doesn’t protect against malware that exploits firmware bugs.

New security requirements in Secured-Core PCs are intended to help users boot securely, protect devices from firmware flaws, and prevent unauthorized access to devices and data. Secured-Core PCs remove the need to trust firmware as part of the bootup process. Instead, they place the root of trust at the CPU level with new chipsets from AMD, Intel, and Qualcomm.

“System Guard uses the Dynamic Root of Trust for Measurement (DRTM) capabilities that are built into the latest silicon from AMD, Intel, and Qualcomm to enable the system to leverage firmware to start the hardware and then shortly after re-initialize the system into a trusted state by using the OS boot loader and processor capabilities to send the system down a well-known and verifiable code path,” Weston writes in a blog post on today’s news. If the CPU decides the firmware was compromised, it can transmit a signal to indicate foul play.

This limits the trust placed in firmware, protects against firmware attacks, and maintains the integrity of the virtualization-based security (VBS) functionality, implemented by the hypervisor. Securing VBS is critical, Weston says, because it’s used in key OS security capabilities like Windows Defender Credential Guard and Hypervisor-protected Code Integrity (HVCI), which ensures a code integrity policy is enforced and kernel code is verified.

The extra layer of security will arrive in new Windows 10 devices, starting with the Surface Pro X. Other devices will follow from Dell, HP, Lenovo, Panasonic, and Dynabook. Most of the Secured-Core devices launching are laptops, says Weston, with the exception of Surface Pro X.

While anyone can buy a Secured-Core PC – a sticker will inform them whether it meets the security requirements – Weston notes these are specifically designed for people who work in verticals like government or financial services, where sensitive information is often targeted.

“If you think about who is likely to suffer a really advanced, targeted firmware attack, it’s going to be people in those highly targeted verticals,” he adds.

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/operations/microsoft-aims-to-block-firmware-attacks-with-new-secured-core-pcs/d/d-id/1336136?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Russian Hackers Using Iranian APT’s Infrastructure in Widespread Attacks

New advisory from the UK’s NCSC and the NSA throws fresh light on activity first revealed by Symantec in June.

A new report from the United Kingdom’s National Cyber Security Center (NCSC) shows that the Russia-backed cyber espionage group Turla has carried out more attacks than previously thought using infrastructure and malware hijacked from Iranian threat group APT34.

The NCSC recently analyzed data pertaining to Turla’s use of three malware tools — Neuron, Nautilus, and an ASPX-based backdoor — in attacks targeted at UK organizations. The tools are designed for attackers to steal data and maintain persistence on Windows networks.

The NCSC has previously noted Turla’s use of these tools in intelligence-gathering operations targeting organizations in the technology, military, energy, and government sectors. But it had not until now connected the tools to APT34 (aka OilRig, Crambus) – though Symantec did so in a report back in June.

In a joint advisory with the National Security Agency (NSA) published Monday, the NCSC said its analysis of the malware — based on data from multiple-sources — shows Neuron and Nautilus are”very likely Iranian in origin.” The data shows that Turla not only hijacked APT34’s tools but also its command and control infrastructure to deliver malware and additional payloads on compromised systems, the NCSC said.  

Symantec in June reported that it had observed Waterbug (the security vendor’s name for Turla) using APT34’s malware and infrastructure in one targeted attack against an organization in the Middle East. The NCSC and NSA advisory, however, makes clear the Russian threat group used APT34’s malware and infrastructure in attacks on multiple targets, especially in the Middle East.

“Those behind Neuron or Nautilus were almost certainly not aware of, or complicit with, Turla’s use of their implants,” the NCSC said. “While Neuron and Nautilus tools were Iranian in origin, Turla were using these tools and accesses independently to further their own intelligence requirements.”

This is believed to be the first publicly known instance of one state-backed APT group hijacking and using a rival nation-state actor’s attack infrastructure to expand victim targeting. “Although this type of activity has been discussed as a hypothetical tactic within the cybersecurity industry, it has rarely been publicly identified as being used operationally,” says Alexandrea Berninger, senior cyber intelligence analyst at Symantec.

Like the NCSC, Symantec has found no evidence that the Iranian threat group knew it had been compromised or that another group was using its attack infrastructure to target the same victims. “The identification of Waterbug using Crambus’ infrastructure in our report in June was the first time Symantec has observed one targeted attack group seemingly hijack and use the infrastructure of another group,” Berninger notes.

According to the NCSC, Turla used APT34’s hijacked tools both on networks the latter had already compromised as well as on additional victim networks. The data showed that Turla scanned for networks across 35 countries, many in the Middle East, for the presence of the Iranian ASPX backdoor associated with APT34. When it found these networks, the threat group attempted to leverage APT34’s hijacked malware and infrastructure to establish its own separate presence on the same networks.

In some instances, APT34 would first deploy its implant on a victim network – only to have Turla access it later. The Russian group’s ability to remotely connect with APT34’s malware tools and get the tools to execute commands suggests that Turla had access to relevant cryptographic keys and controllers belonging the Iranian group, NCSC said.

Somewhat ironically, even as APT34 was busy distributing its malware on target networks, Turla quietly deployed its own implants on the Iran’s group’s APT infrastructure and used this to expand access into it.

More Attack Options

Avihai Ben Yossef, CTO of Cymulate, says Turla’s strategy could provide the Russian group with more data and options to attack. Breaking into APT34 infrastructure could provide them with a network of already compromised machines or databases from which to build out attacks. “This type of activity isn’t at all common, as usually APT groups knows how to protect their infrastructure and data,” he says.

Turla/Waterbug also may be using the stolen infrastructure to throw defenders and security, says Berninger. Turla/Waterbug has a history of false flag operations and deceptive tactics. So the group’s takeover of another group’s network would fit into that pattern, she says.

Alternatively, the data also suggests that the Russian threat actor may be using Crambus/APT34’s infrastructure to gain initial access to a victim network. “Waterbug is a sophisticated actor and likely has the capability to gain initial access via other means,” Berninger notes.

But threat actors tend to be opportunistic. If they get a chance to break into a network without having to put the work into it, they are likely to take the opportunity. “Gaining access to another APT groups’ infrastructure could provide Waterbug access to multiple victims they have interest in and would allow Waterbug to drop additional tools onto those networks to maintain access and execute their objectives,” she says.

Turla’s strategy of riding on Crambus’ back can complicate matters for targeted organizations, Berninger says. Because attribution becomes harder, defenders could end up deploying the wrong response to an attack, she notes.

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/russian-hackers-using-iranian-apts-infrastructure-in-widespread-attacks/d/d-id/1336134?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Trend Micro would like you to fall in line and become a victim of Cloud Conformity

Infosec giant Trend Micro is buying Australian compliance biz Cloud Conformity for $70m to help customers check the configuration of their fluffy white services – one of the major causes of cloud security breaches.

Trend Micro CEO Eva Chen said: “As more enterprises move to the cloud, our customers feel they’re operating amid a wild-west approach to cloud implementations that leave them with unmanaged risk.

“Cloud Conformity understands these implementations and the risks,” the exec added.

The complexity of typical multi-cloud environments can make assessing security and risk profiles and checking configurations and permissions much more difficult and time-consuming.

Gartner research from January estimates that 99 per cent of successful hacks on cloud platforms and services are down to customer errors of misconfiguration or mismanagement.

Seemingly, not a month goes by without some large corporate or other falling foul of misconfigured clouds, whether that be storage or something else.

Cloud Conformity is billed as being able to identify and fix cloud configuration problems as well as ensuring compliance with regulatory standards like GDPR in Europe. It currently provides services on AWS with Azure in Beta and ones on Google Cloud Platform coming.

Real-time threat monitoring is sold for $99 per month by the company, CloudFormation Template Scanning starts at $149 per month and the company has also developed cost optimisation and management services for AWS.

Cloud Conformity was founded down under in Sydney in 2016 and launched a year later. The business is headquartered in the US. Financial terms of the buy were not disclosed. ®

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/21/trend_micro_cloud_conformity/

No one would be so scummy as to scam a charity, right? UK orgs find out the hard way

UK charities are misjudging the risks of fraud, according to research from the Charity Commission and the Fraud Advisory Panel.

The results showed a mismatch between practical anti-fraud protections and charities’ belief in the strength of their defences: while 85 per cent believe they are doing all that they can to counter fraud, almost half have inadequate practice protections in place.

Researchers blamed charities’ culture of trust as making them more susceptible to fraud, but no definitive figures exist.

The charitable sector in England and Wales spends about £80bn a year, so represent a tasty target to those of a less charitable disposition.

Yet only 30 per cent of charities surveyed have a whistleblower policy in place, which could help identify internal fraud, and only 9 per cent have fraud awareness training for staff. Mandate and CEO fraud are the most common kinds reported – accounting for 18 per cent of the total – and 4 per cent of charities admitted to suffering some sort of fraud in the last two years.

One large charity was scammed out of £845,000 by employing a treasurer without adequate background checks. They turned out to be a serial fraudster with 15 previous convictions. The charity only discovered there was an issue when a £2m discrepancy in their accounts was spotted.

Some charities are victims of quite sophisticated spear-phishing attacks. One lost £55,000 when it acted on a fake email requesting the transfer of funds which appeared to be from its finance director while she was at an international conference. The email arrived on the day the she was due to give her presentation, which had been promoted on social media, and referred to a joint aid project supposedly agreed at the conference. The money was never recovered.

The majority of frauds are committed by insiders – staff, volunteers or trustees. Only 13 per cent were carried out by beneficiaries. Most frauds were small scale and picked up quite quickly by financial control systems. Stronger audit and financial systems, coupled with whistleblower protections, would go a long way to reducing many of these issues.

Some 3,300 organisations answered questions – almost one in four of a representative sample of 15,000 UK charities.

Charities are urged to follow eight principles of counter-fraud practice and ensure they have measures in place which are commensurate with the charity’s size and risk profile. Being a charity is not a defence against fraudsters. ®

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/21/charity_fraud/