STE WILLIAMS

Complex Environments Cause Schools to Struggle for Passing Security Grade

As ransomware attacks surge against school systems, an analysis of 1,200 K-12 institutions in North America shows complex environments and conflicting security controls.

IT environments at primary and secondary schools are complex and full of security gaps, leaving them more vulnerable to attacks such as ransomware and crypto-miners, according to an analysis of 1,200 schools in the US and Canada.

The analysis, conducted by managed security services provider Absolute and released this week, found that the typical school in North America has to manage hundreds of versions of applications across dozens of operating-system builds. Overall, the company found more than 250 versions of major OSes — such as Windows, Mac, Linux, and ChromeOS — and 137,000 unique versions of applications installed on devices managed by the 1,200 schools. 

School districts’ IT teams are hard-pressed to manage such complex environments, says Josh Mayfield, director of security strategy at Absolute. Ransomware attacks against US school systems surged by more than 30% in 2019, driven in part by the difficulty that overworked IT teams have in securing the complex environments, he says.

“The amount of tech complexity in K-12 environments is overwhelming, as their attack surfaces have grown by several orders of magnitude,” he says. “In this new reality, there are too many tangles and limited visibility, leaving gaps open to exploit and space for attackers to camp out, which has set the stage for ransomware.”

With knowledgeable security professionals in short supply and technology proliferating in school systems, the cybersecurity picture for schools continue to grow darker. In the first nine months of 2019, the number of security incidents at K-12 schools jumped to 160, exceeding the number of incidents in all of 2018 by 30%, according to Absolute’s accounting of public data. 

Schools are now the second largest group of victims, behind municipalities, according to cloud security services firm Armor.

“Due to the volume of device types, operating systems, and applications, managing and patching devices is a huge challenge,” Absolute’s report stated. “The potential impact of this cannot be overstated.”

The education sector has always been hard-pressed to protect its networks and systems. School districts’ reliance on public funds means low salaries for IT and IT security workers. Education also relies on the open sharing of information, making stringent security measures not generally possible. 

Little wonder, then, that the educational sector as a whole has received failing grades from ratings firms.

Most school districts — 53% — rely on the default patch management and client controls that ship with the chosen devices and operating systems. But such utilities and controls have a 56% failure rate, with more than a third of devices requiring at least one repair a month, Absolute found.

“Each time that situation arises … it means that the agent not only failed, but that it failed repeatedly due to … complexity and decay … with other tools foreclosing access to machine resources,” Mayfield says.

Rather than add security, each layer of security often added complexity to the detriment of the overall security of the organization, Absolute stated in the report. 

“[E]very additional security tool only increases the probability of failure as agents and controls conflict with one another on the endpoint,” the report stated.

Students also cause significant complexities for IT administrators and security teams. Unlike workers who have an incentive to follow the rules of IT security, students are often incentivized to get around controls and are often more tech-savvy than teachers.

The report found that 42% of students use virtual private networking (VPN) software or Web proxies to get around security controls. Absolute found 319 such applications and services across the 1,200 schools in its dataset. 

“Even if K-12 organizations accounted for the complexity and bolted on maximum strength defenses, they still are left with rogue students swinging open the door to attack and industrious users who simply disable controls,” Mayfield says. 

Students often do not understand the consequences — or are not concerned — when they circumvent security measures. Yet more education is not the answer, he says.

“Turn it into a game. Teach them what attackers do, test them on practical examples, and give each of them a sense of achievement when they win,” Mayfield says. “Let them know what villains may try to do, and challenge them to step up and help stop them. Make them the hero of the cyber-resilience story.”

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How the City of Angels Is Tackling Cyber Devilry

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/security-management/complex-environments-cause-schools-to-struggle-for-passing-security-grade/d/d-id/1335998?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Android 0-Day Seen Exploited in the Wild

The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices.

Researchers with Google’s Project Zero have disclosed a zero-day local privilege escalation vulnerability in its Android mobile operating system that could let an attacker assume control of affected devices. Evidence shows the bug is being exploited in the wild, they report.

Hundreds of millions of Android phones are vulnerable to CVE-2019-2215 given a patch has not yet been released. Models include the Google Pixel 2 running Android 9 and 10 preview; the Huawei P20, Xiaomi Redmi 5A, Xiaomi Redmi Note 5, Xiaomi A1, Oppo A3, Moto Z3, and Oreo LG phones; and the Samsung S7, S8, and S9 running 8.x releases. Pixel 3 and 3a are not affected.

This issue was patched in December 2017 on earlier Android versions, said Project Zero researcher Maddie Stone in a blog post, but source code review indicates newer versions are vulnerable.

The use-after-free vulnerability is considered a “high-severity” bug on Android, Google’s Tim Willis also wrote. By itself, it requires the target to download a malicious application for potential exploitation. An attacker would have to chain this bug with an additional exploit to remotely infect and control a target device through the Web browser or another attack vector.

“The bug is a local privilege escalation vulnerability that allows for a full compromise of a vulnerable device,” Stone explained. “If the exploit is delivered via the Web, it only needs to be paired with a renderer exploit, as this vulnerability is accessible through the sandbox.”

Data from the Technical Analysis Group and third parties indicate an Android exploit can be attributed to Israel’s NSO Group, which in the past has been known to develop and sell exploits to governments. In February, an exploit seemingly part of NSO Group’s Pegasus spyware program was used to install surveillance software onto target mobile phones via WhatsApp.

Willis says Pixel 1 and 2 devices will be receiving fixes for this bug in the October update. Android partners have been notified and a patch is available on the Android Common Kernel.

Read more details here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How the City of Angels Is Tackling Cyber Devilry.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/android-0-day-seen-exploited-in-the-wild/d/d-id/1335999?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Egyptian government caught tracking opponents and activists through phone apps

The Egyptian government has been targeting and tracking citizens in a sophisticated spying program that allows it to read emails, log contacts and record their location, according to a new report by Check Point.

A wide range of Egyptian citizens, ranging from journalists to politicians, activists and lawyers, have been targeted in the program, the security organization claims, with most of the spying done through apps downloaded onto their smartphones.

Check Point has identified 33 individuals that were specifically targeted and encouraged to download apps that offered useful services but whose real intent was to bug the phone.

Secure Mail was a Gmail add-on that promised greater security but which prodded users to provide their password, which was then used to compromise their accounts. Another, iLoud200%, offered a smart storage solution that would free up storage space on your phone but which bypassed privacy settings and sent location details to outside servers. Another app, IndexY, offered a callerID service but stored and transmitted call logs.

These apps were available through the official Google Play store, giving victims a degree of confidence that they were legitimate but also demonstrating that the apps are sufficiently sophisticated to get past Google’s security review. Each app was also designed and promoted to minimize uncertainty: it would make sense for a Caller ID app, for example, to have access to call logs and contacts.

The data that was pulled off the devices was sent to a range of domain names that included names like “secure” and “verify” as a way of masking their true identity, but Check Point was able to draw connections between the domains, IP addresses and their administration.

Directory

Those behind the system screwed up on one of the domains – maillogin.live – and left its directory accessible online, which the researchers downloaded and reviewed, giving more details over how the spying operation was being conducted.

china hacker

Great. Global internet freedoms take another dive as censorship and fake news proliferate

READ MORE

The researchers believe that may also have uncovered a secure messaging channel on Telegram that advertised itself as supporting protestors of the current Egyptian military administration but is likely under the control of the intelligence services.

Check Point was unable to find definitive proof that it was the Egyptian intelligence services behind the operation but considering those targeted, the clear intent and purpose of the apps, the structure and data downloaded and a number of clues – such as a server registered to the government’s IT ministry and a hardcoded location that corresponds to the HQ of Egypt’s main spy agency – it is almost certain that it was a government-sponsored activity.

“We discovered a list of victims that included handpicked political and social activists, high-profile journalists and members of non-profit organizations in Egypt,” the company wrote in a lengthy post outlining its findings. “The information we gathered from our investigation suggested that the perpetrators are Arabic speakers, and well familiar with the Egyptian ecosystem. Because the attack might be government-backed, it means that we are looking at what might be a surveillance operation of a country against its own citizens or of another government that screens some other attack using this noisy one.”

In recent months, ongoing tensions within Egypt have grown and the government has arrested a number of prominent opposition leaders in response to growing anti-government protests. ®

Sponsored:
How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/04/egypt_smartphone_spying/

Kaspersky warns of encryption-busting Reductor malware

Kaspersky says it has uncovered a new malware infection that is able to decode encrypted TLS traffic without the need to intercept or manipulate it.

Known as Reductor, the malware was spotted in April of this year and is believed to be the work of an espionage-focused hacking crew known as Turla. The malware is thought to be connected to an earlier trojan called ‘COMpFun’.

What makes Reductor unique, says Kaspersky’s team, is its ability to manipulate TLS certificates. This, in turn allows the infection to present other malware installers as legitimate software.

“Besides typical RAT functions such as uploading, downloading and executing files, Reductor’s authors put a lot of effort into manipulating digital certificates and marking outbound TLS traffic with unique host-related identifiers,” Kaspersky explains.

“Reductor spreads by either infecting popular software distributions (Internet Downloader Manager, WinRAR, etc. and, for at least one victim, through a popular warez website over HTTP); or its decryptor/dropper is spread using COMpfun’s ability to download files on already infected hosts.”

Rather than try to man-in-the middle traffic or steal keys, the Kaspersky team found that the Reductor malware works by infecting the browser (either Chrome or Firefox) itself.

“The solution that Reductor’s developers found to mark TLS traffic is the most ingenious part,” Kaspersky explained.

“They don’t touch the network packets at all; instead developers analyzed the Firefox source code and Chrome binary code to patch the corresponding pseudo random number generation (PRNG) functions in the process’s memory.”

By compromising the random number generator, the malware’s operators would know ahead of time how the traffic will be encrypted when the victim establishes a TLS connection, and have the ability to mark that traffic for later use. From there, the malware can easily decode the traffic and see what the transmitted data is, then send anything of interest back to the command server.

Web browsers 2015

Header aches in Firefox, Tor, Brave and Chrome as HTTP opens new security holes

READ MORE

Because this data can be decoded, the attacker has no need to actually tamper with the traffic while it is in transit, and thus is able to function without alerting security tools or administrators that something is amiss.

“We haven’t seen malware developers interacting with browser encryption in this way before,”Kaspersky’s Global Research and Analysis Team member Kurt Baumgartner said of the malware.

“It is elegant in a way and allowed attackers to stay well under the radar for a long time. The level of sophistication of the attack method suggests that the creators of Reductor malware are highly professional, which is quite common among nation-state backed actors.”

Fortunately, for now the tactic appears to be limited to the highly-targeted espionage operations of this specific group. Should the components make their way onto other malware packages, however, they could pose a danger to the larger internet. ®

Sponsored:
Technical Overview: Exasol Peek Under the Hood

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/03/kaspersky_reductor_malware/

FBI softens stance on ransomware: it’s (sort of) okay to pay off crims to get your data back

The FBI is easing up a bit on its hardline stance against paying ransomware demands.

The Bureau has posted an updated version of the guidance it offers for companies on how to handle ransomware demands with a section discussing the option of paying the hackers to get data decrypted.

In short, the FBI still says that companies should not cave to hacker demands and pay to have their data unlocked, but the bureau acknowledges that paying is an option.

“Paying ransoms emboldens criminals to target other organizations and provides an alluring and lucrative enterprise to other criminals,” the FBI’s guidance reads.

“However, the FBI understands that when businesses are faced with an inability to function, executives will evaluate all options to protect their shareholders, employees, and customers.”

The common advice for companies when it comes to ransomware is never to pay the demand. The thinking, as the FBI notes, is that paying a ransom will encourage and embolden criminal hackers, and as studies have shown, you’re likely to not even get your data back even if you do pay.

More recently, however, another school of thought has arisen suggesting that, in some cases, a company might be better off paying the ransom demand.

First, as experts have pointed out, the idea that paying will encourage attacks is rather antiquated at this point.

After years of successful attacks, cybercriminals know full well that there is money to be made in ransomware, even if most marks don’t cave. We’re well past the point of scaring off the crooks by not coughing up cryptocoins, ransomware is here to stay.

In some cases companies are being advised to at least entertain the idea of meeting the ransom demand, but only as a last resort and via a consultant or security professional who is able to verify that the decryption keys will work and the malware infection can be thoroughly purged after.

Consumer ransomware insurance? You could be painting a target on us all for avaricious crims

READ MORE

This reality seems to have reached the FBI, who says that while it still doesn’t condone paying, it understands that in some cases the victim will opt to meet the hackers demand, and it still wants those people to report the incident.

“Regardless of whether you or your organization have decided to pay the ransom, the FBI urges you to report ransomware incidents to law enforcement,” the kinder, gentler Feds offer.

“Doing so provides investigators with the critical information they need to track ransomware attackers, hold them accountable under US law, and prevent future attacks.”

In other words; it’s not advisable to pay ransomware demands, but you won’t get in any trouble if you do. ®

Sponsored:
Technical Overview: Exasol Peek Under the Hood

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/03/fbi_softens_stance_on_ransomware/

Life’s certainties: Death, taxes, and Cisco patching more serious vulnerabilities

Cisco has issued an update to address security flaws in three of its networking and security offerings.

Switchzilla’s latest security bundle includes fixes for 18 CVE-listed vulnerabilities in the firmware for the Adaptive Security Appliance, Firepower Management Center, and Firepower Threat Defense lines.

Administrators are advised to test and install the updates as soon as possible.

Among the most serious of the vulnerabilities is the pack of eight CVE-listed SQL injection flaws in the Firepower Management Center.

In each case, a baddie would be able to send and execute arbitrary SQL commands via the web management console. The SQL commands would be able to do everything from view data on the device to modify files and even send commands to the operating system.

Firepower Management Center was also found to contain a separate command injection attack (CVE-2019-12690) and three remote code execution vulnerabilities (CVE-2019-12687, CVE-2019-12688, CVE-2019-12689.)

For Adaptive Security Appliance, each of the vulnerabilities describe denial of service flaws. While DoS is normally not a particularly major concern, when you’re talking about a dedicated security appliance it means a complete breakdown in protection for other devices, and thus is a very significant danger.

patch

Hot patches for ColdFusion: Adobe drops trio of fixes for three serious flaws

READ MORE

Among the five CVE-listed bugs for ASA, the most serious appear to be CVE-2019-12673, CVE-2019-15256, and CVE-2019-12678. All three bugs can be triggered remotely by sending specially-crafted data packets to the vulnerable device.

Also of note was CVE-2019-12677, a flaw that lets a remote aggressor block SSL/TLS connections, and CVE-2019-12676, a flaw that lets a bad actor already on the local network order a restart of the device.

Finally, for Firepower Threat Defense, Cisco has issued patches that clean up a pair of container escape bugs (CVE-2019-12675, CVE-2019-12674) that would allow a black hat to break out of FTD’s sandbox and execute commands on the host machine with root clearance.

Least an admins want to put these updates off until next week, keep in mind that on Tuesday Microsoft, Adobe, and SAP are all due to deliver their monthly Patch Tuesday update bundles. ®

Sponsored:
Technical Overview: Exasol Peek Under the Hood

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/04/cisco_patches/

Common Pitfalls of Security Monitoring

We need technology, but we can’t forget the importance of humans working methodically to make it effective.

No matter how much we invest in defense and how many new solutions hit the market every year, we still face an onslaught of highly successful cyberattacks. Hackers are savvy and persistent, and our failure to keep pace is leading to a problem projected to eclipse $3 billion in losses, according to 2018 data.

Particularly as the cyber arms race has ratcheted up over the years, I have seen a fixation on technology and consistently poor investment in people and process to operate it. We absolutely need the technology, but we can’t forget or overstate the importance of humans working methodically to make it effective, especially for security monitoring.

I have long seen organizations of all kinds fail to approach security monitoring with the same discipline and rigor they afford to other business programs. For cyber defenses to be effective, we must begin to view and manage security monitoring as an essential business service.

Here are the common pitfalls I see, and how to overcome them.

Inadequate Resourcing
When a business function is regarded as critical, it is resourced with the time and talent it requires. Could a security breach render your organization helpless? If you answered yes, security monitoring is more than just a “nice-to-have.”

I routinely see organizations task folks with security monitoring duties while still expecting them to drive other IT initiatives and work on a myriad of unrelated issues. This best-effort approach lacks the experience, training, focus, and proper staffing necessary to run an effective monitoring program. Tasking even your most skilled generalist with security monitoring is the equivalent of asking a sales rep to take over an entire marketing function. They may have dabbled, but they need expertise, a team, and ample time to do it right.

Your monitoring analysts need to know what they’re looking for and looking at. It’s a tough role to fill, and analyst burnout is a thing. That makes developing this team one of the more difficult challenges for a security leader. However, taking the time to recruit and retain good analysts will pay dividends in threat detection and ultimately business risk reduction. Moreover, as team members begin to perform a deeper analysis of environment activity, they will likely arm you with valuable insights about the implementation and efficacy of your broader security infrastructure investments and overall program.  

Failure to Identify and Drive Toward Outcomes
There’s an assumption that security analysts inherently know what constitutes an “incident” and how to find it, and to some extent this is true. But if the organization hasn’t defined and prioritized the kinds of incidents that might cripple or cost the business, there’s a good chance that important events will never even cross the analysts’ radar.

Consider a business with an e-commerce presence. Should the security monitoring program be extended to the applications and infrastructure delivering that service? Let’s assume it should. Does the monitoring program look for traditional network-based attacks? Application-level attacks? Insider activity? Account takeovers? Compliance-impacting events? You see where this is going.

Each one of these monitoring use cases is supported by special telemetry and processes, and some may warrant special service-level agreements. Without careful planning and prioritization, it’s quite likely that the monitoring team doesn’t even have visibility into some of these events, let alone the ability to deliver consistent outcomes the business requires.

Make sure your monitoring program has clearly defined and prioritized service deliverables, then be sure to establish the telemetry and processes necessary to fulfill these essential business objectives.

Forgetting the Basics
We invest in security infrastructure with the hope of becoming less penetrable or better equipped to detect and respond to those events that warrant our attention. Unfortunately, many businesses make major technology purchases, then fail to get those technologies fully integrated into the environment and the business operations they serve.

Take firewalls, for instance — a basic, decades-old technology that is synonymous with network security. They remain a table-stakes infrastructure investment in every organization with a modicum of cybersecurity concern. At the same time, firewall management practices are straight from the Wild West in many, many organizations.

Time and time again, I have encountered organizations, even enterprise environments, that have no semblance of configuration standards, porous rule sets, and unenabled features. In many of these organizations, each firewall configuration looks like a complete one-off. In the rush to next-gen devices, many implementation efforts were declared complete immediately after performing a like-for-like migration of outdated Cisco Adaptive Security Appliance policies.

What does this have to do with monitoring? Everything.

Firewalls are just one example of monitoring telemetry. When telemetry is not implemented correctly, consistently, and completely, your monitoring effort will have visibility gaps. When these gaps are the result of inconsistent implementations, they may go undetected for some time, all the while leaving you with a false sense of security. Your telemetry (all that security technology you’ve invested in), where it’s placed, how it’s configured, and how it’s managed is critical to your monitoring program success.  

Conclusion
People, process, technology: We all know how important these are, yet we often lose sight of that fact. Hopefully, these insights help you to maintain the balanced view required to monitor your environment effectively.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How the City of Angels Is Tackling Cyber Devilry.”

Aaron Sierra, Sr. Security Architect at Alagen cybersecurity services firm, is a passionate cybersecurity leader and consultant with nearly two decades of developing, leading, and advising diverse security programs. Leveraging this deep experience, Aaron advises security … View Full Bio

Article source: https://www.darkreading.com/risk/common-pitfalls-of-security-monitoring/a/d-id/1335929?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

American Express Insider Breaches Cardholder Information

The ex-employee accessed names, Social Security numbers, card numbers, and more in an attempt to commit fraud.

Data breaches don’t always involve cracked passwords and criminal outsiders. American Express is proving this with its notice to certain cardholders that an employee accessed personal information in an attempt to commit fraud.

According to the company, this employee was able to look at information including full name, physical and/or billing address, Social Security number, birth date, and credit card number.

American Express says that the individual, who is no longer employed by the company, is now under criminal investigation. In the notice sent to affected cardholders, American Express offered two years of free credit monitoring through Experian Identity Works.

For more, read here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How the City of Angels Is Tackling Cyber Devilry.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/american-express-insider-breaches-cardholder-information/d/d-id/1335988?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Researchers Link Magecart Group 4 to Cobalt Group

Their findings demonstrate how Group 4 is likely conducting server-side skimming in addition to client-side activity.

Security researchers have discovered a link between Magecart Group 4 and Cobalt Group, a well-known, financially motivated group in operation since 2015. Findings indicate Group 4 is not only conducting client-side skimming but was, and likely still is, doing the same server-side.

Magecart is an umbrella term for at least seven cybercriminal groups responsible for installing skimmers onto e-commerce websites with the goal of lifting payment data. The threat quickly gained notoriety as groups planted skimmers on websites including British Airways and Ticketmaster.

Researchers across cybersecurity have been ramping up efforts to connect Magecart operators with known attack groups. This initiative started with RiskIQ and Flashpoint’s Inside Magecart research; more recently, IBM publicly connected Group 6 with FIN6. Now researchers with Malwarebytes and security firm HYAS have found patterns linking Group 4 with Cobalt Group.

Group 4 is one of the more advanced groups. Its operators use sophisticated techniques to blend into normal traffic — for example, registering domain names seemingly connected with analytic providers or advertisers. The group also seems to have a history in banking malware, the same area of expertise as Cobalt Group, otherwise known as FIN7 and Carbanak Group.

“We knew that Group 4 was different from other groups based on their skill level,” says Jerome Segura, head of threat intelligence at Malwarebytes. “We knew it was not just an average threat actor that decided one day to do some skimming.”

Given its expertise and track record with banking malware, the researchers’ attention turned to APT groups to find a connection. They reached out to HYAS, which reported it had also linked Magecart to an APT group.

Malwarebytes had been tracking the different Magecart groups and trying to find a trail, Segura continues. Researchers looked for pieces of infrastructure used by Magecart groups, as well as connections between domain registrations and IP locations. They used indicators of compromise, domain registration, and code from TTPs (tactics, techniques, and procedures) to conclude that Cobalt Group may have shifted to Web skimming.

Both the client-side and server-side skimmer domains were registered to a protonmail address that RiskIQ researchers had linked to Group 4. Researchers checked their exfiltration gates and connected these domains to other registrant emails. They noticed the email addresses used to register Magecart domains for Group 4 followed a certain pattern of [firstname] [initial] [lastname] – the same pattern Cobalt Group had recently adopted with protonmail accounts. In addition to the same email service, Cobalt Group was also using the same privacy protection.

“Given the use of privacy services for all the domains in question, it is highly unlikely that this naming convention would be known to any other actor besides those who registered both the Cobalt Group and Magecart infrastructure,” researchers said in a writeup of their findings. What’s more, 10 of the seemingly separate accounts only reused two of the same IP addresses.

Server-Side Skimming
While checking infrastructure related to Group 4, Malwarebytes identified a PHP script they think was mistakenly served as JavaScript. It’s the type of source code you’re not supposed to see unless you have access to the server, and it’s a script that exclusively skims server-side.

“It’s invisible to any scanner or crawler because everything happens on the actual compromised server,” Segura explains. Magecart reports typically focus on browser-side skimmers; server-side skimmers aren’t often covered because many companies don’t have visibility into the back-end servers of compromised websites. “These are much harder to detect,” he points out.

Client-side skimming is easier for attackers to do and for defenders to detect. The malicious JavaScript skimmer usually loads at one of two points: when a shopper heads to checkout or when they transmit their banking details. At either of these points, security software can jump in and stop the malicious script from loading. Most tools can block domain names, IP addresses, or malicious code because the activity is always happening within the browser, Segura explains.

In server-side skimming, there is no JavaScript loaded into the broader; data exfiltration happens entirely in the server. For defenders who want to block malicious activity on a machine, there is nothing to see. If the server has been compromised, it’s already too late.

As far as Web skimming goes, most of the discussion revolves around client-side activity because the skimmers are available for purchase online and are easier to customize. Attackers can track their activities and automate and scale. It’s “fairly easy” to rent a skimmer kit, buy some exploits to compromise sites, and start skimming, which explains the recent increase of newcomers in the space, Segura says. Server-side skimming, in comparison, involves more effort to customize and maintain each skimmer for every e-commerce website targeted, he adds.

Over time, as this activity continues to mature, Segura says he anticipates we’ll see more players and a greater spectrum of sophistication as advanced attackers specialize in areas of expertise. It’s already happening, he says. Some groups are going after high-value targets, foregoing smaller sites in favor of plug-in providers, analytics providers, and other parts of the supply chain.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How the City of Angels Is Tackling Cyber Devilry.”

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/researchers-link-magecart-group-4-to-cobalt-group/d/d-id/1335990?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Facebook Patches Critical WhatsApp Security Flaw

Bug gives attackers a way to use GIF images to steal data from Android devices running the message app.

A security researcher this week posted details on a new remotely exploitable vulnerability in WhatsApp that attackers could leverage via a malicious GIF image to steal messages, video, audio, and other content from devices running the app.

The disclosure on GitHub, by a researcher using the handle “Awakened,” is the second critical vulnerability involving WhatsApp in recent months, suggesting that secure messaging apps are not as secure as many users might perceive. In May, Facebook, which owns WhatsApp, warned about an attacker — thought to be a private company working on behalf of a government — exploiting a security flaw on WhatsApp to spy on human right organizations.

In the latest case, the bug impacts WhatsApp for Android versions 2.19.230 and before on devices running Android 8.1 and 9.0 devices. Facebook has acknowledged the issue and patched it in the latest WhatsApp version 2.19.244.

The bug does not exist in WhatsApp itself but rather in an open source library that the application uses to parse media files. The so-called double-free vulnerability (tracked as CVE-2019-11932) stems from how memory is allocated when GIF images are parsed in WhatsApp. A double-free vulnerability involves an app calling the same memory space on a device twice, resulting in a memory leak.

Ashlee Benge, threat researcher at ZeroFox, says one likely exploitation scenario involves an attacker sending a potential victim a malicious GIF file.

If the attacker’s phone number is in the recipient’s contacts — which could happen via social engineering, for instance — the GIF file could be downloaded to the recipient’s device without any kind of user interaction, Benge says. “Then, when the recipient goes to open the WhatsApp Images folder, like if they were sending an image in a message, the exploit will be triggered,” she explains.

If the sender was not a contact, the recipient would have to be tricked into saving the image prior to the exploit being triggered, Benge says.

Not Easy to Exploit
The new vulnerability in WhatsApp is not especially easy to exploit, adds Jonathan Knudsen, senior security strategist at Synopsys. “It’s not like the old Ping of Death or the more recent bug where a malformed message would cause an iPhone to fail,” he says. The WhatsApp  vulnerability requires the attacker already have another toehold on the target’s device. Only then could the attacker be able to deliver a crafted GIF that would take control. An attacker that exploited the flaw would be able to do anything on the device that WhatsApp has permission to access, he says. 

“Successful exploitation of this could trigger the application crashing or, in worst-case scenarios, grant the attacker the ability to execute arbitrary code on a victim’s device,” Benge says. It could allow attackers to access the WhatsApp message database and other sensitive files on the user device.

The most troubling part about the vulnerability is that it exists in a software component that other application developers are likely using as well. So the threat is not confined just to WhatsApp but to any app using the vulnerable open source media library. There’s no telling how many apps use the same library and are similarly vulnerable, Knudsen says.

In a brief statement, a Facebook spokeswoman said the issue was reported to the company and quickly addressed last month. “We have no reason to believe this affected any users, though, of course, we are always working to provide the latest security features to our users.”

Awakened, the security researcher who disclosed the bug, is urging WhatsApp uses to update to the latest version of the messaging apps to stay safe from potential attacks.

“From a user perspective, the most important takeaway is being vigilant about updates,” Knudsen says. “Vulnerabilities happen all the time, so the best a user can do is keep software current so that known vulnerabilities are addressed.”

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How the City of Angels Is Tackling Cyber Devilry

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/facebook-patches-critical-whatsapp-security-flaw/d/d-id/1335993?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple