STE WILLIAMS

This vBulletin vBug is vBad: Zero-day exploit lets miscreants hijack vulnerable web forums

An anonymous bug hunter has publicly disclosed a zero-day flaw in the version 5 of the popular vBulletin forum software than can be exploited over the internet to hijack servers. No patch is known to be available.

The security hole was revealed last night in a post to the Full Disclosure mailing list: the message exactly explains how a simple HTTP POST request can be abused by an attacker to remotely execute commands on the targeted vBulletin server without any authentication. That would allow hackers to commandeer web servers powering the forum software, steal data, tamper with information, launch assaults on other systems, and so on.

It can be done in fewer than 20 lines of Python code. This is a very, very, bad thing.

The zero-day exploit code is verified to work against supported versions of vBulletin from 5.0.0 to the latest 5.5.4 build.

The Register has asked vBulletin for comment on the report, or an estimate on when a fix could be out, but so far we have yet to hear back.

Meanwhile, security professionals are marveling at the simplicity of the exploit and the extent to which vulnerable boards can be owned by the attack.

Websites running vBulletin version 5, first released in 2012, are advised to keep a close eye on their servers and make sure that nobody is attempting to exploit the vulnerability and use it as a springboard for further attacks. Better yet, maybe just pull the plug completely until a fix or mitigation lands.

Unfortunately, as security researchers have noted, vBulletin’s customer base includes a number of large companies, sports teams, and entertainment groups that are likely now exposed until such time as the developer can figure out a fix. ®

Sponsored:
Beyond the Data Frontier

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/09/24/vbulletin_vbug_zeroday/

We finally got one! Russian ‘fesses up to cracking bank servers, netting big bucks

On Monday, Andrei Tyurin, a 35-year-old Russian national, pleaded guilty in New York to charges of computer intrusion, bank and wire fraud, and online gambling in connection with a sustained hacking campaign targeting US financial institutions.

“Andrei Tyurin’s extensive hacking campaign targeted major financial institutions, brokerage firms, news agencies, and other companies,” said Manhattan US Attorney Geoffrey S. Berman in a statement. “Ultimately, he gathered the customer data of more than 80 million victims, one of the largest thefts of US customer data from a single financial institution in history.”

The hacking campaign, which allegedly involved at least three other individuals – Israelis Gery Shalon and Ziv Orenstein and American Joshua Samuel Aaron – spanned from 2012 through mid-2015.

It affected about 100 million customers of US banks, brokerage firms, publishers and other companies, including E-Trade Financial, Fidelity Investments, and Dow Jones Co. In 2014, the four are accused of pwning JP Morgan Chase, resulting in the exposure of person data tied to 83 million accounts – name, street address, phone number and email address.

That particular cyber attack was reportedly made possible by the firm’s failure to activate two-factor authentication on a key JP Morgan server.

Tyurin, according to the Justice Department, participated in this campaign under the direction of Shalon. Tyurin was extradited from the country Georgia in 2018.

priest prison

The priest, the coder, the Bitcoin drug deals – and today’s guilty verdicts

READ MORE

Charges against Tyurin’s associates have been filed separately. Tyurin’s lawyer, Florian Miedel, declined to tell the New York Times whether their client intends to cooperate with US authorities in the prosecution of his associates.

The men, according to the indictment filed against Tyurin, used the personal information they obtained to further a pump-and-dump stock scheme. They’re said to have promoted stocks to investors, prompting victims to buy the stock to raise its selling price so the schemers’ stock positions could then be sold for a quick profit.

Tyurin’s hacking also supported internet gambling operations and international payment processors allegedly run by his associates. These schemes supposedly netted hundreds of millions of dollars.

The six felony counts to which Tyurin pleaded guilty carry maximum sentences ranging from 5 years to 30 years each. He’s scheduled to be sentenced on February 13, 2020. ®

Sponsored:
Beyond the Data Frontier

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/09/25/russian_finance_hacker/

Iranian Government Hackers Target US Veterans

‘Tortoiseshell’ discovered hosting a phony military-hiring website that drops a Trojan backdoor on visitors.

A nation-state hacking group recently found attacking IT provider networks in Saudi Arabia as a stepping stone to its ultimate targets has been spotted hosting a fake website, called “Hire Military Heroes,” that drops spying tools and other malicious code onto victims’ systems.

The so-called Tortoiseshell hacking team, which was called out last week by Symantec for a coordinated and targeted cyber espionage campaign that hops from the networks of several major IT providers in Saudi Arabia to specific customers of the providers, is also known by CrowdStrike as Iranian hacking team Imperial Kitten.

Cisco Talos researchers recently found the group hosting the “Hire Military Heroes” website, with an image from the “Flags of our Fathers” film. The malicious site prompts visitors to download an app, which is actually a downloader that drops the malware and other tools that gather system information, such as drivers, patch level, network configuration, hardware, firmware, domain controller, admin name, and other user account information. It also pulls screen size to determine whether the machine is a sandbox, according to Cisco’s findings.

Source: Cisco Talos

Tortoiseshell deploys a remote access Trojan named “IvizTech,” which matches the code and features Symantec detailed in its report on the backdoor. Neither Symantec nor Cisco would tie Tortoiseshell to a specific nation-state.

It’s unclear exactly how the attackers lure potential victims and whether the site is actively infecting victims at this point. Cisco Talos researchers say the creators thus far have employed weak operations security of their own, leaving behind hard-coded credentials, for instance.

“There is a possibility that multiple teams from an APT worked on multiple elements of this malware, as we can see certain levels of sophistication existing and various levels of victimology,” the researchers wrote in their blog post about the threat today.

Paul Rascagneres, a researcher at Cisco Talos, says he and his team don’t believe the attack is widespread, and the group is still relatively new to the APT scene.

“Tortoiseshell is not well-documented. [The research] shows that this actor is offensive for months, they create fake websites, and they probably use social engineering to send targets on these websites,” he says. “We identified at least two installers, a couple of variants of the same RAT, a keylogger, and few reconnaissance tools. The toolkit of this actor is growing.”

The researchers haven’t pinpointed the initial infection vector, however. “[I]t could be spear-phishing or social media usage such as LinkedIn, as we saw during DNSpionage campaign,” he says, referring to an attack campaign last year that used fake job websites. 

CrowdStrike, meanwhile, had tagged the group as Imperial Kitten, an Iranian nation-state operation that has been operating since 2017. The group has been known to target Saudi Arabian, United Arab Emirates, and Western maritime, IT services, defense, and military veterans, notes Adam Meyers, vice president of intelligence at CrowdStrike. Imperial Kitten supports Iran’s Islamic Revolutionary Guard Corps operations using tactics such as phony job recruitment, social media, and IT service provider attacks, he says.

“We have observed them active as recent as this month,” Meyers says.

The malicious website is a “massive shift” for the hacking group, according to Cisco, as it’s targeting a wider net of victims this way. “Americans are quick to give back and support the veteran population. Therefore, this website has a high chance of gaining traction on social media where users could share the link in the hopes of supporting veterans,” the Talos team wrote in its blog post about the threat. 

Jon DiMaggio, a researcher at Symantec who follows Tortoiseshell, says Tortoiseshell may be employing spear-phishing emails to lure victims.

“Assuming [Cisco Talos’] attribution is correct, it would show that another possible infection vector used by Tortoiseshell may have been spear-phishing emails,” he says. “We identified a Web shell being used by the attacker indicating they may have compromised a Web server to deploy malware onto the victims’ environment in the supply chain attacks, but spear-phishing is very common, and it would not be surprising to see them use more than one infection vector in various campaigns.”

 Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “‘Playing Around’ with Code Keeps Security, DevOps Skills Sharp

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/iranian-government-hackers-target-us-veterans/d/d-id/1335897?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Startup Cowbell Cyber Launches ‘Continuous Underwriting’ Platform

New inside-out approach will give SMBs a way to buy insurance coverage based on a realistic and ongoing assessment of their risk, company says.

Startup Cowbell Cyber wants to give small and midsize businesses (SMBs) a better way to get insurance coverage against cybersecurity threats.

The company formally launched on Tuesday with a continuous underwriting platform that it says will enable SMBs to get cyber insurance tailored to their specific cyber-risks and exposures.

Cowbell’s announcement is one of two cyber insurance-related developments this week targeted at small and midsize organizations. The other is a partnership between security-as-a-service provider Coronet and Slice Labs that offers Coronet’s SMB customers a potential discount for Slice’s on-demand cyber insurance offerings.

The two new offerings are among a growing number of cyber insurance policies targeting organizations of different sizes. A report from A.M. Best this year described premiums for stand-alone and packaged cyber policies as growing 12% from $1.8 billion to just over $2 billion in 2018. Organizations looking to minimize cyber and reputation risk are driving much of the growth. The fact that many insurers have removed cyber coverage from traditional insurance coverage is another factor driving growth of stand-alone cyber insurance, A.M. Best said.

Cowbell’s approach combines data from external sources — such as that pertaining to loss costs, business interruption, regulatory compliance, and the Dark Web — with internal data about an organization’s current and ongoing security posture. It uses artificial intelligence and machine learning techniques to derive a risk score — or Cowbell Factor — for various insurable threats that organizations can then use to select appropriate insurance coverage.

The company says its approach allows organizations to get customized coverage against data breach expenses, extortion threats, loss of business, data replacement losses, fraudulent wire transfers, public relations costs, and other specific insurable risk exposures.

Unlike insurance policies that are based on a static assessment of an organization’s risk exposures, Cowbell’s continuous underwriting platform allows for policies that are based on an understanding of an organization’s specific and ongoing security posture.

Jack Kudale, the CEO and founder of Cowbell Cyber, says insurers typically have a hard time understanding an organization’s real-time exposure to cyber-risk because of a lack of data. “The biggest challenge for insurers is to gain [visibility] into [the] self-protection of an insured’s operation,” he says.

Typically, a set of 50 to 200 questions is currently used to determine an organization’s cyber-risk and to underwrite insurance for it. The data is often subjective and static and does not represent the insured’s current and ongoing internal risk posture, Kudale says. “The real chaos is on the inside he says.”

“[Cowbell’s] inside-out approach connects policyholders to top security aggregators such as AWS Security Hub, Microsoft Azure, or other SIEM platforms to obtain high level summarized information” about their security status, Kudale says.

Ongoing Risk Assessment
Organizations that sign up through Cowbell connect via API to AWS Security Hub or to Azure Security Center so metadata on their security posture can be collected and used in combination with external data to calculate risk scores on an ongoing basis.

“Policyholders do not need to have cloud participation neither will they require SIEM,” Kudale says. But those that do can benefit from more accurate risk ratings and potential pricing benefits as well. “Although it is not necessary for the platform to function, it provides higher efficacy for the risk-ratings factor making the process of risk transfer more actionable,” he says.

Kudale sees organizations with less than $100 million in revenues as, at least initially, the most likely to benefit from Cowbell’s continuous underwriting approach. Companies of this size that purchase cyber insurance often have little idea about their cyber exposure or how much coverage to purchase, he says. Often, they buy such insurance only because the companies they do business with require it. “The broker on the other side has 30 different policies and has a hard time figuring out which product to propose” because of a lack of information, Kudale says.

Meanwhile, Coronet said its new partnership will give SMB customers the potential to sign up for Slice’s cyber insurance at discounted rates. Slice will offer on-demand cyber insurance underwritten by an AXA XL company to Coronet’s small business customers, the vendor said.

“One of the many benefits for SMBs is that this on-demand policy is subscription based,” says Dror Liwer, Coronet’s co-founder CISO. “Many SMBs are seasonal, giving them the flexibility to have a policy in place when they’re in business rather than a conventional, annual policy.”

On-demand cyber insurance is insurance that SMBs can purchase online in minutes. All underwriting and risk assessment is done in real time at time of quote, Liwer notes. SMBs can get coverage for a variety of exposures including cyber extortion threats, credit monitoring, damaged data, reputation, liability coverage, and regulatory penalties, including GDPR, Liwer says.

“Coronet is not the insurance provider — AXA XL through Slice is,” he notes. “The discount is offered because the insurer believes that customers using Coronet are in a better position to deal with a cyberattack.”

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “‘Playing Around’ with Code Keeps Security, DevOps Skills Sharp.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/operations/startup-cowbell-cyber-launches-continuous-underwriting-platform-/d/d-id/1335907?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

YouTube ‘influencers’ get 2FA tokens phished

A wave of hijackings over the weekend whisked accounts out from under high-profile YouTubers, many of them in the auto-tuning and car reviewing community, and some of them despite being protected by two-factor authentication (2FA), ZDNet reported on Monday.

ZDNet’s Catalin Cimpanu posted links to a few dozen posts from YouTube creators who’ve taken to Twitter, Instagram and/or YouTube support to fume or to ask for help. Here’s one such: an Instagram post from the creator of Built, a YouTube channel that as of Monday afternoon had blinked out of existence in the wake of what appears to be a coordinated campaign.

According to a YouTube video posted by Life of Palos over the weekend, 100K or so creators in the YouTube car community received a phishing email that’s believed to be the first stage of this attack.

This was no spray and pray operation

This apparently wasn’t a random attack. The crooks who took over the accounts went after those with high follower counts – in other words, high-value accounts that they can sell on forums devoted to trafficking hacked accounts.

ZDNet talked to a hacker named Askamani, active on OGUsers, an internet forum known for trafficking hacked accounts. The hacker said that it sounds like “someone got their hands on an email list with addresses from a specific sector,” and that it was stuffed with the details of such “influencers.”

My money is on someone hacking into one of those social media influencer databases.

If there’s a spike in complaints, as you said, then someone got their hands on a real nice database and [they’re] now getting a bang for their buck.

Modus operandi

The account takeovers were apparently accomplished with a phishing campaign that lured users to sites where victims were prompted to log in with their YouTube account credentials.

YouTube staff reportedly told one channel owner that this is how the attacks went down:

  1. Phishing emails tricked content creators into visiting fake Google login pages, where the attacker(s) snared their victims’ account credentials.
  2. The attackers broke into the victims’ Google accounts.
  3. Next, they re-assigned popular channels with large followings to new owners.
  4. Finally, the crooks changed vanity URLs, giving the original account owner and their followers the impression that the purloined accounts had been deleted.

At least some of the YouTubers involved said that they had 2FA enabled.

The Google account phishing scenario described by victims is reminiscent of what researcher Piotr Duszyński showed could be done with the pen testing tool Modlishka he published in January 2019, which led some, like YouTube channel Life of Palos, to suggest his creation was used to carry out this attack.

Modlishka, a reverse proxy-based phishing toolkit, is capable of automating the phishing of one-time passcodes (OTPs) commonly used for 2FA. It’s certainly not the only way to capture the SMS or app-generated codes though, and successful attacks against 2FA pre-date its release.

In December 2018, within days of each other and before Modlishka had been released, we saw two separate reports of attacks where phishing was successfully used to obtain OTPs as part of targeted campaigns.

The first was against high-value US targets including US government officials, nuclear scientists, journalists, human rights campaigners, and think tank employees.

The next such attack was documented by Amnesty International as having been part of a campaign to break into the email accounts of over 1,000 human rights campaigners.

As we reported when Modlishka was released, on one level, it’s simply a tool that sits on the same server as a phishing site, capturing any credentials and 2FA tokens the user can be tricked into entering.

But instead of cloning the phished site – Gmail, for example, though it would work just as well in an attack against any service where the same authentication is in use – it behaves like a reverse proxy, cleverly feeding the user content from the real site to make an attack look more convincing.

To a user, it looks like they’re interacting with the real site because they are, albeit on a different domain.

Perhaps a more important question than “was it Modlishka” is this: If you can’t count on 2FA to protect you from phishing, what can you count on? This is an important question. As Life of Palos pointed out, there are YouTube creators whose livelihoods are at stake, here. Life of Palos talked to the owner of Built, for example: a man who recently quit his job to devote himself full time to his channel – a channel that’s been stolen, lock, stock and barrel.

What to do?

Two-factor authentication that relies on a manually-entered code offers a lot of security bang for your buck but it is primarily a defence against stolen, reused or easily guessed passwords rather than against phishing.

Successfully phishing credentials that include a 2FA OTP code is harder than just capturing a username and password, but it is not impossible. The difficulty for attackers is that OTP codes have a very short shelf life and can’t be stockpiled for later use. So, to succeed, an attacker has to find a way to grab and use the OTP code within a 30-second window.

There is a form of two-factor authentication that is much more resistant to phishing though: hardware tokens based on the FIDO U2F or WebAuthn specifications, such as Yubico’s Yubikey or Google’s own Titan.

Similarly, if you rely on a password manager (software that will create, remember and enter your passwords for you) it won’t enter your password into the wrong site, no matter how convincing it is.

(Watch directly on YouTube if the video won’t play here.)

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/G-FEjS09n3I/

Can you code a way to foil online terrorist vids? The Home Office might just have £600K for you

UK prime minister (at time of writing) Boris Johnson announced to the UN Security Council today a plan to block the sharing of violent videos on social media after terrorist attacks.

The announcement specifically references the attack in March on a mosque in Christchurch, New Zealand, which killed 51 people. The attacker live-streamed his actions, leading to hundreds of versions rapidly spreading across online platforms. Facebook alone had to remove more than 1.5 million uploads in what was largely a complex and time-consuming search-and-delete operation.

The Home Office is to make £600,000 available to develop “industry-wide technology” for automatically identifying online videos containing not just the original violent content but copies that have been edited to evade filters.

“UK data-science experts, supported by the Home Office, will use the new funding to create an algorithm which any technology company in the world can use, free of charge, to improve the way that they detect violent and harmful videos and prevent them being shared by their users,” read the announcement.

It turns out these “data-science experts” have yet to be appointed. The Home Office confirmed to The Reg that the £0.6m fund is being dangled as a prize that will be opened to competitive bids from UK tech companies later this year.

“We’re hoping to deliver the funding by 15 March 2020,” a spokesperson told us. “That’ll be the anniversary of the Christchurch attacks.”

In an official statement, Home Secretary Priti Patel said: “The UK has a track record of showing that state-of-the-art technology can be developed, in partnership with industry, at relatively low cost and this is just the latest example of our commitment to working with industry to tackle our shared challenges and respond to the ever evolving threats which we face.”

Those considering making a bid should be aware that it is the government’s intention that whatever method is devised to block the violent viral videos can be plugged into software from other tech companies as part of a concerted worldwide effort to stop the problem. In Paris back in May, world leaders signed up to a Christchurch Call to Action to tackle terrorist use of the internet, and there is a feeling that their shared commitment should produce sharable results.

The Home Office admitted that the research might also be used to help spot other types of harmful content such as child sexual abuse.

But will chucking £600,000 at the problem be enough? Bigger sums have been spent on achieving less and, despite Patel’s bluster, the UK government’s track record on outsourcing successful IT projects at low cost has been less than glowing.

Commenting on the announcement, Paul Bischoff, privacy advocate at Comparitech.com, said: “The sceptic in me thinks this is just a gesture of goodwill and not a serious attempt at censoring terrorist videos.

“Even if you don’t think Facebook does a good enough job, it still has a huge advantage in that it’s been working on this problem for some time, has massive amounts of data to test with, and has a business incentive to get it right.

“I think we should also question the efficacy of censorship. The fear is that these videos will influence other potential terrorists into taking action. But I think it’s equally valid to say that such videos will incite anti-terrorism sentiment as well.

“Government censorship is a slippery slope that can lead to totalitarianism, so we must tread carefully.” ®

Sponsored:
How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/09/24/can_you_code_a_way_to_foil_terrorist_vids_on_social_media_the_home_office_might_just_have_600k_for_you/

DoH! Mozilla assures UK minister that DNS-over-HTTPS won’t be default in Firefox for Britons

Firebox builder Mozilla has confirmed to UK Culture Secretary Nicky Morgan that Britons won’t be getting DNS-over-HTTPS (DoH) by default once the feature is included in the next run of browser updates.

In a letter to the Secretary of State for Digital, Culture, Media and Sport, Mozilla’s global policy veep Alan Davidson said his Silicon Valley org “has no plans to turn on our DoH feature by default in the United Kingdom and will not do so without further engagement with public and private stakeholders.”

The letter, which was conveniently shown to The Guardian today, also confirmed that DoH would be the default for folks in the US.

This repeats and cements Mozilla’s position expressed earlier this year, when a spokesman said “we are currently exploring potential DoH partners in Europe to bring this important security feature to other Europeans more broadly.”

As we previously reported, DoH is all about shifting domain-name queries – which try to match domain names with server IP addresses – over a secure, encrypted HTTPS connection to a DNS server, rather than via an unprotected, unencrypted bog-standard DNS connection. That should protect DNS lookups from tampering or snooping by your ISP, though whoever is providing the DNS server can obviously see your queries.

Mozilla’s DoH-by-default plans stirred up the ire of the British establishment because it was thought that widespread adoption would largely break ISPs’ government-mandated content blocking systems.

Nonetheless, DoH is billed as helping stop third parties (ISPs, government agencies, police forces, any of the random handful of British state organs allowed by law to help themselves to your browsing history, etc) from viewing what you’re viewing – or, in the case of criminals looking to defraud you, hijacking your DNS requests.

DNS

Mozilla Firefox to begin slow rollout of DNS-over-HTTPS by default at the end of the month

READ MORE

An unholy alliance between a UK ISPs’ lobbying association, social conservatives across Parliament and the civil service, the Internet Watch Foundation and selected small-c conservative national newspapers combined to screech blue murder earlier this year at Mozilla.

The browser-maker played the game and merely pronounced itself “surprised and disappointed” at ISPA’s antics. Nonetheless, the company has since backed down from what it says is a privacy and security-enhancing tech rollout.

Google, of course, is also about to roll an imminent deployment of DoH into its Chrome browser, although for its part, Google has promised it won’t override your choice of DNS provider.

We have asked Mozilla if it wishes to comment and will update this article if it responds.

A Parliamentary question about what discussions the current government had had with Mozilla went unanswered thanks to the (now unlawful) prorogation of Parliament by Prime Minister Boris Johnson.

Not enabling DoH by default seems like a compromise option intended to soothe state-backed data sniffers and social conservatives alike. Exploiting the well-known tendency of end users not to do or enable anything to help themselves, Mozilla presumably hopes that’ll be enough to put Britain’s creeps back in their boxes.

Instructions on enabling or disabling DoH in Firefox can be found here.

While the public messaging on DoH is mostly focused on security, child abuse content or terrorists, it’s wise to take a wider view. As we reported a few days ago, Paul Vixie of Farsight Security opined (at the end of this article) that the ultimate victor if the Google and Mozilla position prevails may be the tech companies resolving encrypted DNS queries, who will then have a much broader sight of what people are browsing than anyone else. Or so they hope. ®

Sponsored:
How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/09/24/mozilla_backtracks_doh_for_uk_users/

Microsoft Defender Bug Fixed with Emergency Patch

A second out-of-band patch issued this week addresses a denial-of-service vulnerability in Microsoft Defender.

Microsoft this week released two emergency security patches: one to fix a zero-day remote code execution flaw in Internet Explorer (CVE-2019-1367), and another to address a denial-of-service (DoS) vulnerability in Microsoft Defender, which was not previously known or exploited.

The latter, CVE-2019-1255, was discovered by Charalampos Billinis of F-Secure Countercept and Wenxu Wu of Tencent Security Xuanwu Lab. A vulnerability exists when Microsoft Defender, an anti-malware feature built into Windows, improperly handles files. An attacker could exploit this to prevent legitimate accounts from executing legitimate system binaries, Microsoft says. To exploit the DoS vulnerability, an attacker would first require execution on the target system.

This week’s patch alters the way Microsoft Defender handles files. The last affected version of the Microsoft Malware Protection Engine is Version 1.1.16300.1, and the first version with the vulnerability addressed is Version 1.1.16400.2. Since the Malware Protection Engine is automatically updated, Microsoft says no action is required to install the latest update. Users who don’t want to wait for the update can manually update their anti-malware software.

Read more details here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “‘Playing Around’ with Code Keeps Security, DevOps Skills Sharp.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/microsoft-defender-bug-fixed-with-emergency-patch/d/d-id/1335894?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

4 Cybersecurity Best Practices for Electrical Engineers

Most electrical engineering firms are targeted by threat actors of opportunity because of two necessary ingredients: people and computers. These four tips will help keep you safer.

Threat actors have increased their focus on supply chain attacks since 2017, with 73% of engineering firms reporting a supply chain attack in 2018. In the first quarter of 2019, Operation Shadowhammer was revealed to have compromised the software update mechanism of a major PC manufacturer. According to eSentire, 44% of firms have suffered a significant supply chain breach through a vendor.

These high-profile breaches have either been used to deploy ransomware or steal the intellectual property produced by engineers. As engineers create and access intellectual property such as CAD designs or manufacturing data, achieving persistence in an engineering firm gives a threat actor unparalleled insight into upcoming product designs and manufacturing processes.

Much of the media focus has been on the financial damage from supply chain breaches, the nation-state actors behind the breaches, and the ill-defined “supply chain” itself. But surprisingly, despite the overheated media coverage, most electrical engineering (EE) firms are not the targets of a bear, kitten, or panda, which are frequently cited as advanced persistent threat groups behind the attacks. Most EE firms are targeted by threat actors of opportunity because they have two necessary ingredients: people and computers. This article lays out four best practices for individual EEs to help protect their firms.

1. Don’t Click That Link NOW NOW NOW
Threat actors base phishing emails on two primary motivations: fear or wanting to be helpful. A staggering majority of breaches are traced back to someone who has clicked a link that arrived by email. Whether it was from the “IT Depirtment” about a password reset or an unexpected invoice that’s suddenly due tomorrow, threat actors want you to panic and act irrationally. The best practice before replying to or clicking a link in an email is to take a minute. Get a coffee. That intentional pause will give you the ability to think clearly and unemotionally before responding or clicking. Because mobile screens make it difficult to determine where a link goes without clicking it, you might have to wait to take action until you get to a bigger screen. And if it is a suspicious email, send it to your security department so that it can spot larger trends.

2. Stop Using the Same Password
The second way that threat actors compromise EE firms is weak passwords. This goes beyond them guessing your Windows password; the password you’re using to access your printed circuit board design software can be more of a risk because threat actors can then access your work. If you’re not using a password manager, pick one and start using it. Then ask your management team to consider getting everyone in the firm a password manager. It’s a minimal cost to reduce a massive threat.

3. Let Your IT Team Install Updates
The third way that threat actors break into companies is by attacking old and out-of-date software. This can be both run-of-the-mill software but also discipline-specific software. This is a particularly thorny issue because often the supply chain depends on everyone using the same version of a software package. However, the longer a piece of software has been around, the longer threat actors have had time to break it. So, if your IT team asks you to reboot your computer and you aren’t working on a critical deadline, schedule the time to reboot. If you are working on a critical deadline, let them know and ask for a short exception.

4. Check in Your Work Regularly
Successful cyberattacks frequently depend on destroying or encrypting files on a user’s workstation, hoping there are no backup systems in place. By checking in your work regularly, you’ll make it easier for your project team to stay up to date, upgrades will be easier, and you’ll be helping to defend your company against dangerous cyber weapons.

Following these best practices individually will help manage the risk of a cyberattack, and following these as a team will further reduce the risks. If you have an opportunity to talk to your security team or chief information security officer, ask them what else you can do to help. They’ll appreciate your having asked as security is a team sport.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “‘Playing Around’ with Code Keeps Security, DevOps Skills Sharp.”

Kayne McGladrey is a national cybersecurity expert, IEEE member, and the Director of Security IT at Pensar Development. He has 20-plus years of experience blending information technology and management acumen to cultivate and build cybersecurity best practices. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/4-cybersecurity-best-practices-for-electrical-engineers/a/d-id/1335844?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Wyoming Hospital the Latest to Be Hit With Ransomware Attack

A attack has had a significant impact on the operations of Wyoming’s Campbell County Memorial Hospital.

A hospital in Wyoming has become one of the latest ransomware victims, courtesy of an attack that began last Friday and continues to disrupt operations. 

Details of the attack against Campbell County Memorial Hospital, including ransomware type and ransom demands, have not been made public. Meanwhile, residents of Gillette, Wyoming, have been able to check on the hospital’s IT status via the organization’s Facebook page. Regular updates since the attack began have shown departments and services coming back online while IT staff works to fully restore data and functionality.

Campbell County Memorial Hospital joins more than 30 governments, healthcare organizations, and schools to be targeted by ransomware in the past 12 months. 

Read more here and here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “‘Playing Around’ with Code Keeps Security, DevOps Skills Sharp.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/wyoming-hospital-the-latest-to-be-hit-with-ransomware-attack/d/d-id/1335895?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple