STE WILLIAMS

How Can My Security Team Begin Future-Proofing for Quantum Computing?

Knowing where your digital certificates are is just the start.

Question: How should my security department begin future-proofing for quantum computing?

JD Kilgallin, senior integration engineer at Keyfactor: To future-proof enterprise networks and systems against threats posed by quantum computing, security teams should be prepared to take quick action. At the very least, this requires knowing where your digital certificates are, what cryptographic algorithms their keys are using and what quantum computing means for them, and what systems need to trust those certificates and might experience an outage if the certificate and its chain suddenly change.

It also requires the ability to quickly coordinate changes between entity certificates and the trust anchors of other endpoints that rely on those certificates. Administrators should keep a careful inventory of these keys and certificates and employ automated techniques to securely deploy updates en masse. This can be a large undertaking that administrators should begin preparing for sooner rather than later.

In the meantime, security teams should ensure that all sensitive communications that rely on digital certificates to protect communication confidentiality are employing ciphers that offer forward secrecy, so that stored communications are not disclosed when the key is compromised in the future by quantum computers.

Related Content:

 

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Article source: https://www.darkreading.com/edge/theedge/how-can-my-security-team-begin-future-proofing-for-quantum-computing/b/d-id/1336696?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

6 CISO New Year’s Resolutions for 2020

We asked chief information security officers how they plan to get their infosec departments in shape next year.

(image by Tierney, via Adobe Stock)

It’s that time of year — a chance to take stock of your accomplishments as a security leader in 2019 and decide your priorities for 2020.

First, let’s look back. We know from research that breach rates rose (again) and the cost of one to a business is, on average, $3.92 million — a 1.5% increase over 2018. That’s despite more money being thrown at security. According to the Enterprise Strategy Group, 58% of organizations were forecasted to increase cybersecurity spending this year.

But, hey, new year, new decade, right? It’s time for a new chapter in your efforts to lead security strategy in a fresh and innovative direction. Maybe there’s a new tool or strategy you want to roll out next year. Or a philosophy and process you plan to incorporate. Maybe you just want a happier, healthier outlook for your security team.

We asked CISOs what they are resolving to do in 2020. Here are some of their top goals for the new decade.

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full BioPreviousNext

Article source: https://www.darkreading.com/theedge/6-ciso-new-years-resolutions-for-2020/b/d-id/1336690?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

The Coolest Hacks of 2019

FaceTime, acoustic cyber ‘noise,’ and building system worms were among the targets of resourceful white-hat hackers this year.

In a year punctuated by endless reports of leaky cloud storage buckets, firmware flaws, and the resurgence of ransomware into a full-blown epidemic, security researchers still found innovative hacks to keep one step ahead of cybercriminals and (maybe) nation-states.

They weaponized sound, hijacked building automation systems, and found security holes in the Boeing 787 airplane’s on-board network. Internet of Things devices and mobile apps continued to be a pathetically easy mark for vulnerability hunters, but it was an accidental finding by a 14-year-old Fortnite gamer that rocked the mobile sector: a flaw in Apple iOS’s Group FaceTime app that activated the microphone on an iPhone even if the user doesn’t answer the call.

And in a creepy but creative project on the defender side, security researchers teamed up with a jeweler to develop a wearable ring that stores a user’s “fingerprint” for authenticating to biometric systems.

So take a break from sifting through the false positives and stressing over the elusive needle in the haystack, and peruse some of the most creative hacks by security researchers that we covered this year on Dark Reading.

FaceTime Fail

Grant Thompson was doing what many teenagers do when they game together online: the Tucson, Ariz., 14-year-old was getting his friends together for Fortnite on a group call, using Apple’s Group FaceTime feature. After trying to ring one friend via FaceTime who didn’t pick up and then adding a second friend to the call, he was able to hear the microphone of his first friend, even though the boy hadn’t picked up. He could hear the ringing sound on the first friend’s phone, he told NBC News.

Grant’s mom tried to reach out to Apple support via Twitter and word soon began to spread online of the bug, as well as handy how-to’s on exploiting it. Security experts warned iOS users to immediately disable FaceTime on their devices, and Apple subsequently disabled the Group FaceTime service. The company later issued an update to iOS 12.1.4 and for MacOS Mojave 10.14.3 for the flaw, and gave Thompson an official acknowledgement for his find. Apple described as a logic issue in how Group FaceTime handles calls.

Grant’s opportune catch even earned him the coveted Pwnie Award for Best Client-Side Bug, along with software developer Daven Morris, 27, of Arlington, Texas, who separately reported the bug to Apple a few days after Thomas and his concerned mom did in January. “Exploiting this issue required no heap manipulation or even understanding what a CPU or a buffer is,” the judges said in nominating Thompson and Morris. “Don’t look up how old Grant Thompson was when he found this. It’ll make you insecure,” they added.

Noise Hack

Researcher Matthew Wixey calls them acoustic cyber weapons: the PWC UK researcher wrote custom malicious code that forces Bluetooth and Wi-Fi-connected embedded speakers to emit painfully high-volume sound or even high intensity and inaudible frequency sounds that can possibly produce destructive sound levels to the speakers – and to the ear.

The research was part of his PhD work at UCL, and he described it as an example of cyber-physical malware.

Wixey was able to hack into volume controls for various speaker devices – including a laptop, mobile phone, smart speaker, Bluetooth speaker, and headphones – that could irritate or hurt hearing in humans with just a short exposure period, and even destroy or damage the speakers themselves. He reported his findings to the affected device makers, whose names he didn’t disclose.

No human ears were tested in his research for obvious reasons, but he and his team did find that a component in a smart speaker burnt and ultimately permanently damaged the speaker after just 10 minutes of testing frequencies.

‘Prying Eye’

Just how secure is your online videoconference, anyway? Well, if you forgo passcode protection, you could be inviting trouble.

Researchers from Cosequence discovered a major vulnerability in the wildly popular Cisco Webex and Zoom online meeting platforms that could allow an attacker to scan for and attend videoconference meetings set up without password protection.

The so-called Prying Eye flaw could be exploited to execute an enumeration attack, where it automatically detects numeric or alphanumeric sequences used to identify applications on the public Internet. The researchers created a bot using the Web conferencing platform APIs to find WebEx and Zoom call meeting IDs, and join, view, or listen in.

But the good news is that even if an attacker was able to sneak into the meeting via a Prying Eye attack, he or she would be likely get found out since attendees get announced when they join meetings.

Cisco and Zoom both issued fixes for the issue and provided more stringent password-use settings for online meetings.

Building a Building Worm

For about $12,000 in code development costs and building automation system equipment, researcher Elisa Costante and her team from ForeScout developed an attack framework that included a worm, first infecting an IP camera and then spreading to the PLC that controls building automation system processes. The researchers wanted the malware to be stealthy and untraceable via forensics investigations.

The hack exploited a buffer overflow vulnerability in the Windows-based workstation, and could, for instance, be used by an attacker to open up the restricted physical access to a specific area in a building. But an attacker could well have used any other of 10 different security flaws in popular BAS systems – including protocol gateways, PLCs for HVACS and access control – the team had pinpointed.

Building systems often don’t fit neatly into a cybersecurity strategy, and they rarely get software updates or security checks. Nor does IT typically have access to them. “They’re not behind the firewall or [part of] ICS … and they’re not run by IT. It’s a little group doing their own thing,” said Dale Peterson, CEO of Digital Bond.

It’s typically older equipment with dated software, too. “You still have a lot of [BAS] devices running on old firmware,” Costante said.

‘Mac-O’ Attack

Apple Mac users often harbor a false sense of security. Take code injection attacks: Windows machines are more prone to this breed of attack than the MacOS, where this threat hardly registers on the radar screen. But researchers from Deep Instinct shook the Mac world earlier this year with a hack that employs code injection – using a customized Mach-O loader. Mach-O is the format used by MacOS and iOS for executable files.

Shimon Oren, head of threat research at Deep Instinct, dubbed the attacks as Hook-Inj, named after the remote-process hooking method they employ to run code remotely. There’s no vulnerability in Mach-O per se; the attacks basically abuse its functions and bypass detection by multiple MacOS security tools.

“Right now if an attacker wants to use these mechanisms, there is no solution in the marketplace that can protect against it,” Oren told Dark Reading in April when he went public with his research.

Bad news: there’s no vuln for Apple to patch. “In general, the whole code injection execution area is still somewhere that’s more in the courts of security vendors than in the courts of the operating system vendors,” Oren said.

787

Security researcher Ruben Santamarta was shocked when he came across an exposed Boeing server online last year that contained firmware specifications for Boeing’s 787 and 737 plane networks. Santamarta, who had been studying airplane cybersecurity for years, reverse-engineered the binary code and studied the configuration files. He found that the firmware, a version of VxWorks in a Honeywell network component, harbored multiple security flaws that could give an attacker remote access to the sensitive avionics network on the plane.

But Boeing pushed back hard when Santamarta went public with his findings at Black Hat USA this summer, arguing that its network defenses would block any such attack and potential threat to its avionics system. That, even after Santamarta and his company IOActive had worked closely with Siemens on the disclosure process and analysis of the findings.

Santamarta had framed his research with the caveat that the ultimate effect on the avionics system is unclear without him getting access to an actual 787 aircraft. Even so, he argued, an attacker exploiting the firmware could bypass security controls on the network and reach the avionics network. He or she then could attempt to update firmware of avionics systems, for instance.

Lord of the Ring

Fingerprint biometrics are increasingly becoming more mainstream thanks to Apple’s fingerprint authentication option on some of its iPhones, but security experts worry about privacy and security risks of lost or “lifted” fingerprint data. That’s what inspired researchers at Kaspersky to design a wearable ring with a stone that stores your unique “fingerprint” for authenticating to biometric systems.

The ring, which the security firm co-developed with a 3D accessory designer, is just a prototype aimed at raising awareness of security risks in biometrics. The stone stores a unique fingerprint made from conductive fibers embedded in a rubber compound: a smartphone reads the stone, which is (eek) the shape and texture of a finger.

“That ring can be used to authenticate the user with biometric systems, such as a phone or a smart home door lock. And if the data of the ring fingerprint leaks, the user can block this particular ring and replace it with a new one — and their own unique biometric data won’t be compromised,” the company said in blog post announcing it.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff.”

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/the-coolest-hacks-of-2019/d/d-id/1336682?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Fraud in the New Decade

Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growth

The next decade will be a reckoning for the commercial data economy created over the last 10 years. Our reliance on social media and smart devices has powered large-scale data collection for tech giants dedicated to user surveillance as a primary competitive advantage.

Meanwhile, fraud continues to exploit technology’s double-edged sword: increased data collection enhances customer experience and opens gateways to new authentication methods while simultaneously eroding privacy and security.

At the cusp of 2020, these are the fraud developments of the past decade that will come to fruition in the next 10 years.

Demand for marketing data will fuel complex fraud
The commercial demand for new data types – personal profiles, shopping and browsing habits, micro-targeted political affiliations – offers fraudsters a wealth of opportunities to craft more detailed personas, or to more accurately impersonate a legitimate consumer. 

With authentication shifting toward user behavior identification and biometric profiling, fraudsters will do as they’ve always done – target low-hanging fruit with late adopters, and then bypass gaps in new technology. This process played out during the introduction of credit cards with chips, as criminals exploited the last opportunities for traditional carding schemes before being forced to shift tactics. A sharp uptick in card-not-present fraud followed, as fraudsters migrated to online payment systems.

Account takeover will evolve to account access-as-a-service
The rise of the dark web fraud economy has allowed vendors to offer more specialized goods and services. Instead of merely offering account credentials to fraudulently stream the latest series or major sports event, dark web vendors now offer booking services for travel and hospitality brands to give fraudsters the benefits of accounts with branded “points” or “status” without the hassle of managing account takeover directly.

Selling branded points is not new on the dark web, but these listings indicate a maturing market for illicit vendor services. Whereas previously vendors offered sales on fraudulent loyalty points to beef up the buyer’s existing account, vendors are now taking their value-added offerings a step further by selling off managed account access. Ongoing and managed access to legitimate services provides fraud buyers all the benefits of account takeover, without the risk to access or book services through the account themselves. This account access-as-a-service model could represent new offerings based on ongoing criminal network access, or it could be a developing trend in insider threats, as employees at hospitality brands look for avenues to make money on the side through selling benefits of account access. 

Old breaches will resurface in data compilation
The scale of data exposure has changed. Previous milestone breaches exposed mere tens of thousands of records. Countless recent breaches have impacted hundreds of millions – sometimes billions – of records at once. In addition to retail and finance breaches, healthcare and education exposures, and tech service platforms with unsecured servers, we also saw highly sensitive exposures from sources like the Office of Personnel Management (OPM) and Equifax.

The last two years also brought major marketing firm breaches, at Exactis (340 million records), Verifications.io (809 million records), and most recently, Data People Labs (1.2 billion records). These data aggregators contain tracking and customer profiling data vital to the commercial data economy. Many valuable data sets float freely across criminal marketplaces, making it easy for average cyber criminals to build cross-referenced compendiums, to say nothing of well-resourced state and non-state actors.

While attribution is difficult under the best circumstances, at least one major hack or heist in the next decade will be tied conclusively to compiled data from previous data breaches.

Synthetic identities come home to roost
With constant data exposure, fraudsters seek out fresh data sets. The freshest data belongs to those who’ve only just been born. The demand for child data has risen on the dark web, as vendors sell infant data or information poached from pediatricians. In coming years, countless minors will apply for credit only to discover they’re already in decades of debt.

Due to the 2011 change in how the Social Security Administration issues Social Security numbers, cyber criminals can easily use the SSN of a minor (or an SSN that has not been issued yet) to open fraudulent credit profiles. While tools are in development for banks to validate accounts with the Social Security Administration, the long tail development of that system will provide cyber criminals with another few years, at least, to exploit children.

Where we go from here
Consumers must think critically about the information they share online. Limiting data sharing may limit features and usability, but also decreases opportunities for exposure and profiling by cyber criminals.

Organizations likewise need to take stock of their assets and exposure now, to get a baseline understanding of their existing digital risk. As they add new assets, those assets should likewise be inventoried and monitored to track if and when information becomes exposed.

As new data types become exposed, organizations can track early warning signs of risk area with increased attractiveness for cyber criminals. With ever-increasing data compromise, organizations must take cues not only from developing anti-fraud technology, but also directly from how cyber criminals adapt in the years ahead.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How to Manage API Security.”

Emily Wilson is the VP of Research at Terbium Labs, the leading digital risk protection provider. Emily directs Terbium’s strategic research programs, where she focuses on the dark web, the criminal economy for personal information and stolen payment cards, and the increasing … View Full Bio

Article source: https://www.darkreading.com/application-security/fraud-in-the-new-decade/a/d-id/1336671?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

7 types of virus – a short glossary of contemporary cyberbadness

OK, technically, this article is about malware in general, not about viruses in particular.

Strictly speaking, virus refers to a type of malware that spreads by itself, so that once it’s in your system, you may end up with hundreds or even thousands of infected files…

…on every computer in your network, and in the networks your network can see, and so on, and so on.

These days, however, the crooks don’t really need to program auto-spreading into their malware – thanks to always-on internet connectivity, the “spreading” part is easier than ever, so that’s one attention-grabbing step the crooks no longer need to use.

But the word virus has remained as a synonym for malware in general, and that’s how we’re using the word here.

So, for the record, here are seven categories of malware that give you a fair idea of the breadth and the depth of the risk that malware can pose to your organisation.

To jump to a specific item, click in the list below:

  1. KEYLOGGERS
  2. DATA STEALERS
  3. RAM SCRAPERS
  4. BOTS, aka ZOMBIES
  5. BANKING TROJANS
  6. RATS (Remote Access Trojans)
  7. RANSOMWARE
  8. WHAT TO DO?

1. KEYLOGGERS

Keyloggers are surprisingly simple, and can be implemented in many different ways.

Simply put, they hook into the stream of data that comes from your keyboard, allowing them to tell what you typed and when.

In fact, keyloggers often don’t merely know “you typed F” – they get enough detail to tell that you pressed the left Shift key down, then depressed F, then released F, then let go of the shift.

That means they can even keep track of keystrokes that don’t produce any visible output, such as function keys, backspaces and other key combinations that turn options on or off.

Importantly, keyloggers don’t always need to be implemented down at the operating system level, and they often don’t need administrative or root powers to hook themselves into the keystroke data stream.

For example, JavaScript code inside your browser can monitor (and alter, if it wants) the flow of keystrokes as you browse, meaning that rogue JavaScript injected into a login page could, in theory, recognise and steal your usernames and passwords.

Banking trojans [q.v.] very commonly include a keylogger module so they can try to capture your passwords when they recognise that you’re in the middle of logging in to your bank.

Interestingly, keyloggers also exist in hardware form – a tiny device that’s connected between an external keyboard and the computer port it’s plugged into.

Hardware keyloggers can’t reliably be detected by software (they usually just identify themselves to your computer as a regular keyboard), but they can often be spotted by visual inspection of your normal keyboard or cable.

2. DATA STEALERS

A data stealer is malware that does pretty much what its name suggests: it goes hunting around your hard disk, and perhaps even around your whole network if it can, looking for files that contain data that’s worth money to the crooks.

In the early days of malware, most attacks were true computer viruses, meaning that they spread automatically by theselves, often by spewing out emails containing an infected attachment.

Back then, many viruses included a data-matching toolkit that went through pretty much every file on your computer looking for text strings that matched a pattern such as [spaces][alphanumerics]AT[alphanumerics]DOT[alphanumerics], on the reasonable assumption that this was probably an email adddress.

By deliberately harvesting email addresses from everywhere, not just from your email software, they came up with exensive lists of potential new victims, even people whom you’d never contacted but whose addresses showed up in documents, marketing material, or saved pages from websites.

These days, the crooks are interested in much more than email addresses to steal – anything that can be reduced to a text-matching pattern is surprisingly easy to hunt out and thieve, including bank account details, ID numbers, passport data, credit cards and account passwords.

Data stealers also know how to recognise special files by their name or their internal structure, such as password vaults that contain login details, and browser databases that may contain tell-tale data such as authentication tokens and browsing history.

Many other types of malware, notably bots [q.v.] and banking trojans [q.v.], include data stealing modules as one useful way of extending their criminality.

3. RAM SCRAPERS

Malware can’t always find what it wants in files on your computer, even if the malware itself already has administrator or root level access.

That’s because some data only ever exists temporarily in memory, and then gets scrubbed without ever reaching disk.

One reason for that concerns data security regulations such as PCI-DSS, the Payment Card Industry Data Security Standard, and GDPR, the European General Data Protection Regulation.

Those regulations say that there are some data items you simply aren’t allowed to keep after you’ve finished with them – you should use them only at the moment you need them, and then get rid of them forever.

An obvious example is the CVV number (the short code) on the back of your credit card – that code is used to authorise a transaction but should never be saved to disk or otherwise retained beyond that point.

That’s bad news for cybercrooks, because it means they can’t easily get hold of CVV codes for transactions that have already happened…

…but with RAM scraping malware that keeps an eye on data as it is stored temporarily in memory, the crooks may be able to identify critical data such as CVVs and full credit card information and “scrape” it straight out of RAM.

Other secret data often appears in RAM, albeit briefly, such as decryption keys, plaintext paswords and website authentication tokens, and RAM scrapers can watch for these, too.

4. BOTS, aka ZOMBIES

A bot, short for robot program, is malware that opens a backdoor into your computer so that crooks can send it commands from afar.

A collection of bots is known, in turn, as a botnet, short for robot network, and crooks who control an army of networked bots can command them remotely all at the same time, with much more dramatic results that just having control over one or two computers on the internet.

Bots are also commonly known as zombies, because they act a bit like “sleeper agents” that the crooks can turn against you on demand.

Commands often built into bots include: sending spam in vast quantities, searching locally for files, sniffing out passwords, attacking other people’s websites, and secretly clicking online ads to generate pay-per-click revenue.

One important thing to remember about bots is that they don’t rely on the crooks connecting inwards to your computer to send them commands, so they aren’t automatically blocked by your home router, which usually prevents all incoming network connections.

Most bots work by regularly calling home, only ever making outbound connections – something your home router probably does allow – and downloading the latest list of commands published by the crooks.

Another important fact about bots is that almost every bot ever released includes a command that allows the crooks to upgrade or even to replace it whenever they want.

Sadly, that means it’s hard to predict in advance what damage crooks might do you your computer if you find you’re infected with a bot, because it could have been doing something else yesterday and might move on to a completely new attack tomorrow.

5. BANKING TROJANS

This is the general term for malware that goes after information about your online banking.

As you can imagine, banking trojans typically include a keylogger [q.v.] component, to sniff out passwords as you type them in.

They also often have a data stealer [q.v.] part to trawl through likely files such as browser databases and password vaults in the hope of finding unencrypted passwords or account details.

Another trick widely used by banking trojans is known as web form injection, where the malware sneakily adds extra data fields into forms that are displayed in your browser.

By doing this they hope to trick you into entering additional data, such as your credit card number or date of birth, at a point where you wouldn’t normally be asked such questions.

Perhaps the best known name in the banking trojan scene is Gozi, a large and loosely-defined family of malware that first appeared more than a decade ago.

The original Gozi source code was published online many years ago, and this threat family has proliferated and evolved ever since.

6. RATS

The name RAT is short for Remote Access Trojan, typically the sort of remote access tool that lets creeps spy on you by taking surreptitious screenshots or secretly turning on your webcam.

The best-known RAT is probably Blackshades, which made the headlines a few years ago when a variant of this malware family was used by a cybercriminal called Jared James Abrahams to spy on hundreds of women, including then Miss Teen USA, Cassidy Wolf.

Abrahams ended up with an 18-month prison sentence; the authors and distributors of the Blackshades malware itself were variously arrested and convicted, too.

One question that RATware often raises is, “Can a malware author activate my webcam without the light turning on?”

The answer is, “It depends.”

Some webcams have their LED wired in with the webcam itself, so that it comes on with the webcam no matter what; others have the LED set up so that it can be programmed independently of the webcam, and on this sort of webcam you could, in theory at least, record without any visible sign.

If in doubt, a webcam cover or a tiny piece of electrical tape will provide you with a web shield that malware can’t deactivate!

7. RANSOMWARE

This is probably the most feared sort of malware of the past decade: generally speaking, ransomware scrambles all your files, uploads the one-and-only copy of the decryption key to the crooks, and then offers to sell you back the decryption key so you can unlock your computer and get back to work.

In an ideal world, ransomware wouldn’t work for the crooks at all, because you’d simply wipe your computer clean (handily removing the ransomware at the same time), restore your most recent backup, and be up and running without paying the crooks anything.

But life is seldom that simple, and today’s ransomware crooks maximise their leverage against you in several ways:

  • They usually find a way into your network first, so they can scramble hundreds or even thousands of computers at the same time. Even if you have backups for all of them, reimaging and restoring thousands of computers might take longer than just paying up.
  • They look around for online backups on the network, and wipe them out in advance of the ransomware attack. Unless you have a reliable process of regularly making and keeping offline backups, the crooks may have you over a barrel.
  • They spend time researching your cybersecurity setup first so they can turn off parts that might stop or limit the ransomware. Never ignore anything in your logs that looks like unusual or unexpected changes to network security settings – it might be crooks loosening you up for attack.

Ransomware demands have risen dramatically since 2013, when the Cryptolocker ransomware extorted $300 per computer.

Modern ransomware attacks such as SamSam, Bitpaymer and Ryuk typically take out whole networks and demand anywhere from $50,000 to $5,000,000 to undo the damage across an entire infected network.

8. WHAT TO DO?

  • Patch early, patch often. A lot of attacks start because someone, somewhere, has left a security hole open that the crooks already know how to exploit. Even if you’re using automated updating everwhere, check up on the state of your patching regularly – if you don’t check your own networks, the crooks will do it for you!
  • Look for and act on warning signs in your logs. Many malware attacks last for some time, or follow up on previous attacks or “scouting expeditions” that leave telltale signs in your logs. The unusual creation of new accounts; the use of administration tools where you wouldn’t expect them; and evidence of someone fiddling about with security settings should always be investigated. Authorised staff should know better, and can be counselled accordingly; unauthorised users can be identified and booted off the system sooner rather than later.
  • Go for defence in depth. Look for an anti-virus with behaviour-blocking and web filtering as well as plain file scanning. Most modern malware attacks involve a sequence of small steps. The crooks have to succeed at every step to complete their attack, whereas you can often stop the attack by blocking any one of the stages.

While you’re about it, why not check out and subscribe to our weekly Naked Security podcasts and to our new Naked Security YouTube channel?


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/pb59riwiap0/

Christmas malware uses “Support Greta Thunberg” as a lure

SophosLabs has a seen a variety of Christmas-time spam campaigns that shamlessly hitch a ride on the coat-tails of climate activist Greta Thunberg.

The malware-spreading spams arrive with subject lines such as…

Please help save the planet
Greta
Friends help
Support Greta Thunberg - Time Person of the Year 2019
Greta Thunberg
the biggest demonstration
Demonstration 2019 

…and they urge you to join an upcoming demonstration.

The catch, however, is that the time and place of the alleged demonstration aren’t in the body of the email itself.

To find out more, you need to open a Word document that’s either linked to in the email, or attached to it:

MERRY CHRISTMAS

You can spend Christmas Eve looking for gifts for children. 
They will tell you Thank you only that day.

But the children will thank you all their lives if you come out 
for the biggest demonstration in protest against the inaction
of the government in connection with the climate crisis.

Support Greta Thunberg - Time Person of the Year 2019

I invite you. Time and address are attached in the attached file.

FORWARD this letter to all colleagues, friends and relatives 
RIGHT NOW, until you forget!

Many thanks.

As mentioned, some of the emails didn’t actually have an attached file; instead, they had a link at which you could download the file for yourself.

Fortunately, the links we’ve seen aren’t working at the moment, which means that even if you do click one of them you won’t be inviting malware onto your computer.

Unfortunately, of course, that means we can’t be sure what malware the crooks intended to foist on you, or what malware might suddenly appear at those links in the future.

Where we did receive a booby-trapped document, the process seemed to be geared towards delivering the Emotet malware onto your computer.

As you may know already, Emotet is a widespread malware family that seems to have evolved to fill a very specific cybercrime niche: delivering malware for other crooks.

As Naked Security’s Mark Stockley explained back in January 2019:

Over its five-year life [up to the end of 2018], Emotet has evolved from a Trojan that silently steals victims’ banking credentials into a highly sophisticated and widely deployed platform for distributing other kinds of malware, most notably other kinds of banking Trojan.

Emotet arrives on the back of malicious spam campaigns and serves up whatever malware pays. So far this year that’s meant TrickBot and QBot banking trojans, although it’s also been linked with BitPaymer – a strain of sophisticated ransomware that extorts six-figure payouts.

You have to imagine that the Emotet gang, who seem to have started life using malware to steal end users’ banking credentials, suddenly realised that they could make a living directly from other crooks by providing a malware distribution system…

…using their own malware – a sort of B2B content delivery network for other criminals.

What if you open it?

If you open one of these infected attachments, you will see what looks like an innocent-looking system warning, apparently from Word itself:

Don’t be fooled!

The “warning” is just an image inserted into the document by the crooks to trick you into bypassing Word’s default security settings of blocking active content, such as Word program macros (embedded software code), in the file.

You don’t need to use the [Enable content] button to load Word-format files created by alternative word-processing packages (or, for that matter to open documents from older versions of Word) – if the document is saved in a Word-compatible format then Word will open it; otherwise it won’t.

If you do [Enable content] then macro code inside the Word file will run a Powershell command that will go online to fetch whatever malware comes next – probably Emotet.

Remember that when malware arrives in a multi-step chain, like here, you can never be quite sure what comes next. That’s one reason the crooks like to deliver their final malware payloads via a web download that happens at the time and place that your infection started. That way they can tailor the final malware not only by time, but also by your geolocation and even by what type of computer you’ve got. For example, if your laptop turns out to be a Mac, some crooks will deliberately try to hit you with Mac-specific malware instead of sending you a Windows program that isn’t going to run at all.

What to do?

  • Don’t open attachments you didn’t ask for or expect. Getting unsolicited email is bad enough – so don’t give the spammers yet more time-of-day by opening attachments to help them out even further. If this were a genuine invitation, the time and location would be in plain view in the body of the email, not hidden away in an un-needed, unwanted attachment.
  • Don’t turn off security features because a document tells you to. Microsoft selected [Disable content] as the default to protect you from unscrupulous documents, including unscrupulous documents that tell you to [Enable content].
  • Look for an anti-virus with behaviour-blocking and web filtering as well as plain file scanning. The multi-step approach used by malware like this means the crooks need to get away with less at each stage – the DOC file itself doesn’t need the full and final malware built right in. But that means you can stop the attack by blocking any of the stages, while the crooks have to success at all of them. You gain the upper hand if you have multiple layers of defence.

PS. Sophos Home is 100% free for Windows and Mac. The Premium version, with more features and cover for up to 10 computers (including friends and family), is half-price at the moment.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/TSrHFFcfOs4/

How Should My Security Department Begin Future-Proofing for Quantum Computing?

Knowing where your digital certificates are is just the start.

Question: How should my security department begin future-proofing for quantum computing?

JD Kilgallin, senior integration engineer at Keyfactor: To future-proof enterprise networks and systems against threats posed by quantum computing, security teams should be prepared to take quick action. At the very least, this requires knowing where your digital certificates are, what cryptographic algorithms their keys are using and what quantum computing means for them, and what systems need to trust those certificates and might experience an outage if the certificate and its chain suddenly change.

It also requires the ability to quickly coordinate changes between entity certificates and the trust anchors of other endpoints that rely on those certificates. Administrators should keep a careful inventory of these keys and certificates and employ automated techniques to securely deploy updates en masse. This can be a large undertaking that administrators should begin preparing for sooner rather than later.

In the meantime, security teams should ensure that all sensitive communications that rely on digital certificates to protect communication confidentiality are employing ciphers that offer forward secrecy, so that stored communications are not disclosed when the key is compromised in the future by quantum computers.

Related Content:

 

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Article source: https://www.darkreading.com/edge/theedge/how-should-my-security-department-begin-future-proofing-for-quantum-computing/b/d-id/1336696?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Poll Results: Security Pros Are Not Only Smart — They’re Generous, Too

Altruism is alive and well among Edge readers, who seek to share their security expertise with causes they care about.

(Image: BillionPhotos.com/Adobe Stock)

Those with cybersecurity expertise have two choices: to use their “powers” for good or evil. 

Those who embrace the latter have cost enterprises billions in damage, destruction, business disruption, and recovery. (Think: Capital One, Macy’s, and FEMA, among others.)

Those on the good side of the equation are keeping their organizations as protected as possible from the threats and vulnerabilities, big and small, that surround them. And they have plans in place should anyone break through.

Then we have the “extra good” — those who think beyond the day-to-day and lend their expertise to bigger causes. People like Eva Galperin, “an outspoken advocate for using security for altruistic purposes. To put it simply: hacking for the greater good,” wrote The Edge’s Joan Goodchild, in the late November article “A Cause You Care About Needs Your Cybersecurity Help.”

That article served as the impetus for our December poll, asking readers whether they’re donating their expertise to help others. 

As you can see, the majority of respondents agree giving back is important. Nearly 30% of 134 respondents indicated they are doing cybersecurity-related volunteer work. Another 34% said while they don’t now, they plan to so in 2020.

As for the rest, we get it. There are only so many hours in the day. Know that your work is appreciated.

And if you can spare just a minute, please take The Edge’s new poll.

 

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Article source: https://www.darkreading.com/edge/theedge/poll-results-security-pros-are-not-only-smart----theyre-generous-too/b/d-id/1336698?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Gauging the Cybersecurity Climate

Is climate change impacting your cybersecurity, cyber-risk, or cyber-incident response plans?

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Article source: https://www.darkreading.com/edge/theedge/gauging-the-cybersecurity-climate/b/d-id/1336699?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Defensive Wish List for 2020: Faster Responses to Threats

Security professionals recommend technology to detect attacks that have already infiltrated a network.

As students head home for the holidays, Dan Basile knows they are taking their devices with them, and that worries him. 

The executive director of the security operations center at Texas AM University System, Basile is responsible for keeping students’ systems safe and universities’ networks secure. It’s not an easy job. “My workload skyrockets as the beginning of the semester, because all the students went home, got infected with everything known to man, and then brought it back onto my network,” he says. 

For that reason, Basile’s wish list is focused on detecting threats already inside the networks — a strategy that he highly recommends for businesses, even if they think they are managing every device connecting to their local networks. Detecting threats between machines inside the network — so-called “East-West” traffic — is crucial to being able to respond to threats quickly, he says.

“Having that East-West visibility is golden because the malware is already in the environment,” he says.

As security professionals look to 2020, they have different threat profiles, so also different outlooks on what technologies they want. However, the common theme as the New Year approaches is the ability to react to threats quickly.

The plethora of systems that security analysts have to use is one factor that hampers response, says Richard Rushing, chief information security officer for Motorola Mobility. Security operations centers are currently laboring under the lack of integration between systems, and he sees as a top priority platforms that bring together all the disparate technologies back to a single workstation.

“We should be able to leverage the various APIs to pull all this content together, allowing the data to stay where it needs to stay — no one should need to be doing a massive data lake,” he says. 

Here are some other technologies that made security professionals’ wish lists:

The triad for faster response

While TAMUS’s Basile aims to stop attacks before they infect the network, as the security director in charge of university networks he understands that it is not always possible. Students and professors want freedom to explore — and with that freedom comes risk.

So Basile is mainly focused on implementing two defensive technologies. Traffic inspection systems such as network traffic-analysis and application firewalls allow companies to detect when attacks are coming from systems inside the network perimeter. Endpoint detection and response (EDR) software allows him to quickly see attacks in progress and take steps to blunt any compromise. 

Because Texas AM is helping Texas stand up an analysis and response center for the state, both types of technology are on Basile’s required list for new municipal and county government offices whose security the center will be overseeing.

“As we are bringing on more counties and cities across Texas, we are requiring an EDR or EPP [endpoint protection platform] for every site,” he says. “It gives me a better picture and it lets us respond in real-time to incidents.”

Get the “R” right

Companies need to go beyond endpoint detection and response, says Motorola’s Rushing. The problem is that the actual “R” in EDR and SOAR (security orchestration, automation and response) platforms today is very basic.

“You need to get to the actual R working,” he says. “Generating an e-mail to open up a ticket is not accomplishing what I want it to do. You need to get a better response capability.”

As more automation is being used by defenders, Rushing sees security teams moving away from simple playbooks and moving toward automated, yet managed, responses. While the actual logic is basic — “if this, then that,” would be enough, he says — getting the automated response technology working would be a boon.

Defending against attacker automation

Yet defenders are not the only ones using automation. Attackers are adding automation and machine-learning techniques to their toolboxes, so companies will need to find ways to stymy their operations. 

Bots are one example of a threat that combines the two techniques and which are becoming a staple of attackers — from credential stuffing to advertising fraud, bots help attackers automate their operations. For that reason, bot management services will become a must-have for any company that has Web-facing applications or services, says Sandy Carielli, a principal researcher with business-intelligence firm Forrester Research. 

“Anyone that has a good deal of customer interaction — a static website,  any sort of online store, or if you are relying on advertising traffic — most of the sites on the Internet these days — will need bot management,” she says. 

For companies that are paying for traffic — such as advertising or affiliate services — bot-detection products can remove non-human interactions from the mix, saving them money. Customers that use these services will put pressure on their suppliers, and as incentives change, organizations will pay closer attention to metrics of humanness, Carielli says.

“The interesting thing about bot management is the range of stakeholders,” she says. “Bots attack e-commerce sites. They are doing ad fraud and credential stuffing.”

Related Content

 

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “Disarming Disinformation

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/operations/defensive-wish-list-for-2020-faster-responses-to-threats/d/d-id/1336642?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple