STE WILLIAMS

Thank you, your DNA data will help secure your… oh dear, we’ve lost that too

Something for the Weekend, Sir? I have been propositioned at midnight at a hotel door. “What’s your room number?”

Tired, tipsy and momentarily surprised at being accosted at the threshold of my two-night, three-star lodging, I fail to conjure an immediate answer. Am I on the third floor? Something about turning right when exiting the lifts, five or six doors on the left. The room number itself eludes me.

So I ask Mme D who, as luck would have it, is just a few feet away.

I turn back to the night porter: “Three-three-eight. Can we come in now?”

It has been a long while since I last had to ring a bell for re-admittance to a hotel after a late night out. Back in the day, a night porter would arrive with a key and let you in. Tonight, however, we are required to undergo interrogation to establish our guest credentials. One false move or evasive response and we might be wrestled to the faux-marble floor, handcuffed and hauled away to the dungeons beneath the Office of Bottom Correction.

There are no more night porters, you see. The man barring our entrance is night security.

Security, we can all agree, is an ever-growing problem that needs to be taken more seriously than in the past. This hotel’s night security is someone who certainly looks serious. Or grim. Or glum. Anyway, judging from his expression, you don’t want to mess with him if you hope to be permitted to stagger towards the lifts before sunrise.

Unfortunately, this isn’t really security, is it? It’s just a hotel equivalent of a nightclub bouncer who’s looking to enliven his uneventful shift with a little light banter at the door to demonstrate how important he is. Gruffly demanding my room number and then accepting my response didn’t make the hotel any safer from riffraff than if he’d just opened the door and waved us in with a cheery hello.

That said, a cheery hello can be used as an opening gambit to catch the fibber off-guard. For a masterclass in subtle lie detection, I give you Dr Younan Nowzaradan, the Houston-based surgeon at the well-padded centre of hit daytime TV series about overweight burger munchers trying to live beyond their twenties, My 600 lb Life.

He walks into the consulting room, poker-faced and singing “Hello, how y’all doin’?” with a tonal resonance pitched halfway between Mini Mouse and Spongebob Squarepants. Silly man, you think to yourself, I’ll dispense with him in no time. But three minutes later, Dr Now’s verbal scalpel is at your roly-poly throat and he’s surgically removing your bullshit that you weigh 270kg because you snack on the occasional grape.

Since hotels can’t afford to hire highly skilled plastic surgeons to take charge of night security, they make do with blue-collar grumpy men whose expertise lies in being able to clip a large bunch of keys to their belt.

You’d think a hotel’s front door would be more secure overnight if it replaced the human bouncer altogether with a swipe- or touch-card reader at the front door along with a keypad prompt to enter my room number as confirmation. OK, that’s a little bit securer, but not much. Maybe add a 12-character password as well? And a QR Code to generate Authenticator PINs, perhaps? Fingerprint recognition might help too. Oh, and let’s add a retina scan, polygraph test, DNA comparison with the top 10 Most Wanted, armpit temperature check, fine-comb check for nits and a cough-and drop.

The problem with all these measures is that as they incrementally improve the quality of security, they exponentially compound the Bully Factor. Just as the nightclub doorman insists that the next dude in the queue should produce their passport, birth certificate and letters of dispensation from Pope Francis and Patriarch Kirill, it all seems unnecessarily tiresome for the customer. I’ve witnessed bouncers ordering prospective clubbers to recite their birthdate in reverse numbers, pat their head while rubbing their stomachs, and touch their toes three times – no doubt a trick they themselves learnt in prison.

Those of you who suffer plenty of international air travel will be aware that the airport security industry, if we can call it that, underwent a major upheaval a couple of years ago. Realising that almost everybody regarded them not as public protectors so much as voyeuristic bullies with a penchant for rummaging through your pockets while you’re still wearing the trousers, the crotch-probing profession did some soul-searching. This has led to swifter, politer, less humiliating and more expert security processing of humans as they pass into the international departures lounge.

It won’t last: it will have to change again, simply to keep pace with the perps. In our own industry, recent data security scares include reports that show how half of all phishing attacks now take place on websites that feature the browser padlock icon. Increasingly, malicious JavaScript are infecting authentic sites with fake login forms, watering-hole style.

This suggests that there is nothing so suspicious as an outward appearance of security. Paranoia ahoy! The customer puts up with all the bullying for passwords and IDs and shit, only to have their personal info lifted behind the scenes anyway. Or, much much worse (and much much more likely over the next few years), your data is maliciously associated with someone else’s, not to steal your money but to cover their tracks.

This week’s story about alleged farcical facial unrecognition as practised by overconfident Apple Store detectives in the US is a taste of what’s to come. Don’t be surprised if your Gran has her door kicked in at 4:00am by anti-terror police looking for her heroin lab and stash of Islamic State literature. We’ll be reading stories like this as frequently as we do now about massive personal customer data breaches.

I’m not sure that ownership of a flag is illegal, by the way. What matters with a flag is where you put it.

Donald Trump flag on a dog turd

Patriotic flag-waving Chicago-style, as photographed by Mme D this month

I get the impression that the architects of IT security systems continue to model themselves on nightclub bouncers. They present a preening cosmetic shell of security at the front door while the real perps are clambering through the toilet windows round the back and are already roaming the dance floor looking for someone’s data to bottle.

Effective security can no longer be achieved by shaking a fist at the front door. It has to be a continuous process, constantly checking your behaviour once you enter the building. CCTV. Body language. Cultural profiling. Automatic lie-detecting of whatever you type on your keyboard.

Did I mention paranoia?

Youtube Video

Alistair Dabbs
Alistair Dabbs is a freelance technology tart, juggling tech journalism, training and digital publishing. He has now worked himself up into a state of terror, worrying that everything he writes here will be recorded, probed and analysed. We have assured him that there is nothing to worry about, since nobody is likely to read it. @alidabbs

Sponsored:
Becoming a Pragmatic Security Leader

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/04/26/something_for_the_weekend_/

NSA: That ginormous effort to slurp up Americans’ phone records that Snowden exposed? Ehhh, we don’t need that no more

The NSA’s mass-logging of people’s phone calls and text messages, at home and abroad – a surveillance program introduced after the September 11, 2001 terror attacks – is set to end as it’s no longer worth the hassle.

The blanket spying, which hoovered up the metadata for all calls and texts made by US citizens as well as foreigners around the world, has been widely criticized ever since its existence was revealed by whistleblower Edward Snowden. Now intelligence officials are telling the White House that it’s no longer needed, with one whispering this week to the Wall Street Journal that “the candle is not worth the flame.”

The program was authorized by the controversial Section 215 of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act, passed in the month after the 9/11 mass-murders by terrorists on American soil. The NSA has since spent years defending the snooping as essential to national security, though it now appears to have changed its mind, and has been hinting about ditching the thing.

The timing of the leak is very interesting, because Section 215 is up for review in September. Civil liberties campaigners at the EFF and ACLU have been gearing up for a major fight over the legislation, and the NSA may be giving a good excuse for the White House to either drop the section, or to argue that it can stay because it’s not being used by America’s spy nerve-center any more.

The latter case is a possibility because it has been suggested that other agencies, notably the Drug Enforcement Agency, are running similar espionage programs under Section 215. It’s notable that the NSA, the FBI, and the Department of Justice were all quoted in the newspaper report, but not America’s drug warriors.

NSA

Another 45,000 reasons to patch Windows against old NSA exploits

READ MORE

If the NSA ends its Section 215 surveillance, don’t think the agency has given up on keeping an eye on people’s communications. It’s probable that the agency has plenty of other legal tools and mechanisms it can use to surveil folks. There’s also the fact that the growth of encrypted chat app use, in response to the Snowden revelations, have made plain old voice calls and SMS rather redundant. Citizens just aren’t making calls and texting each other through the mobile and wired phone system like they used to, making Section 215 spying not quite worth the effort.

Dropping the blanket surveillance also makes the NSA look good, and the agency has been on a positive PR push to reform its image over the last few years, led by the agency’s cuddly Christmas lights hacker – and the former head of its elite Tailored Access Operations hacking crew – Rob Joyce.

It has released some of its tools to the security community, is speaking at more public events, and now has a chance to remove a key part of its boogeyman image. It might just work. ®

Sponsored:
Becoming a Pragmatic Security Leader

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/04/26/nsa_drops_spying_campaign/

Zuck it up: Facebook hit with triple whammy of legal probes, action in Canada, US, Ireland

Here’s a triple Thursday whammy: Facebook has been accused of breaking Canada’s privacy laws, and is being investigated in the US and Ireland for seemingly mishandling people’s private data.

The Office of the Privacy Commissioner of Canada (OPC) launched an official inquiry into Zuck’s empire in March 2018 following the Cambridge Analytica scandal in which 87 million Facebook profiles were harvested, via a harmless-looking third-party quiz app, for political ad targeting.

Fast forward to this week, and OPC has emitted a report from that investigation: it concludes that Facebook ran roughshod over Canada’s privacy laws by failing to obtain proper consent from its users to ultimately share that profile data with Cambridge Analytica, and failing to protect user information. Now, OPC wants to take Facebook to court to, hopefully, force it to comply with Canadian law.

“Facebook’s refusal to act responsibly is deeply troubling given the vast amount of sensitive personal information users have entrusted to this company,” Daniel Therrien, Privacy Commissioner of Canada, said in a statement. “Their privacy framework was empty, and their vague terms were so elastic that they were not meaningful for privacy protection.

The US tech giant apparently refused to play ball with the Canadian watchdog while it was drawing up its report, snubbing its recommendations and findings, leading to the OPC’s decision to haul the business into court to force it to follow the law. “It is untenable that organizations are allowed to reject my office’s legal findings as mere opinions,” said Therrien.

Facebook, on the other hand, claimed it had cooperated with the regulator, and was in negotiations to settle the matter before it got to court.

It’s not the only battle that Facebook will have to face. Over in America, the New York Attorney General Letitia James announced that her office will be launching a probe into a separate Facebook fracas.

Last week, Zuck’s bunch admitted siphoning contacts books from 1.5 million people’s email accounts without permission, snaring potentially hundreds of millions of netizens’ contact details as a result. Folks signing up to use the social network were asked to hand over their email account passwords so the site could verify automatically that the accounts were valid, during which it also hoovered up all the contacts’ details it could from those inboxes.

Facebook CEO Mark Zuckerberg

Facebook: We’re just putting $3bn profit aside for an FTC privacy fine

READ MORE

Meanwhile, across the Pond, Ireland’s Data Protection Commission declared an investigation into Facebook’s practices to see whether they violate Europe’s GDPR. And what’s more, it’s for a separate incident: logging hundreds of millions of user account passwords in plain text in its servers.

“The Data Protection Commission was notified by Facebook that it had discovered that hundreds of millions of user passwords, relating to users of Facebook, Facebook Lite and Instagram, were stored by Facebook in plain text format in its internal servers,” the Emerald Isle’s watchdog said in a statement.

“We have this week commenced a statutory inquiry in relation to this issue to determine whether Facebook has complied with its obligations under relevant provisions of the GDPR.”

Facebook’s latest financial figures showed it was stowing away at least $3bn of its profits, half of its net income for the first quarter of the year, for a hefty fine from the Federal Trade Commission, America’s privacy watchdog. However, after Thursday’s bombshells, it looks as though $3bn may not be enough.

A spokesperson for Facebook, which has been hiring loads of digital privacy experts recently to fight its corner, was not available for comment. ®

Sponsored:
Becoming a Pragmatic Security Leader

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/04/26/facebook_sued_again/

Microsoft: Yo dawg, we heard you liked Windows password expiry policies. So we expired your expiry policy

Microsoft has finally decided to get rid of password expiration policies in Windows because forcing people to reset their passwords periodically harms security.

Word arrived from Redmond via Wednesday’s draft release of the security configuration baseline settings for Windows 10 version 1903. The release, available as a zipped download of spreadsheets, configuration files, and other documents, includes a variety of changes to the foundational security settings from the previous versions of Windows 10 and Windows Server 2019.

The draft changes include tweaks like adding an App Privacy setting that prevents users from interacting with applications using speech when the system is locked. Microsoft is also dropping specific BitLocker drive encryption method and cipher strength settings, which had required 256-bit encryption and will now default to 128-bit, because “our crypto experts tell us that there is no known danger of its being broken in the foreseeable future.”

Finally, some password sense

But the most welcome Windows change is likely to be abandoning periodic password resets, a requirement that annoys just about everyone. To explain its shift, Microsoft cites recent research that casts doubt on the efficacy of password expiration policies.

The cloud-and-bits biz may be referring to a 2010 study from researchers from the University of North Carolina at Chapel Hill which showed that password expiration policies lead to weaker security because new passwords tends to be based on old ones.

The study also demonstrated that human-chosen passwords are typically too weak to survive brute force cracking attacks. But that’s a separate issue about the general inadequacy of passwords, one that has only recently begun to be addressed through hardware authentication keys.

kings college london

King’s College London internal memo cops to account ‘compromise’ as uni resets passwords

READ MORE

In any event, Microsoft has finally recognized that password expiration policies do more harm than good.

“When humans are forced to change their passwords, too often they’ll make a small and predictable alteration to their existing passwords, and/or forget their new passwords,” explains Aaron Margosis, principal consultant with Microsoft’s cybersecurity group, in a post to Microsoft’s Security Guidance blog.

That’s not to say Microsoft will prevent companies from implementing a password expiration policy. Windows customers can still do so, pointless and irritating though that may be. But by removing password expiration from the Windows baseline, compliance audits will no longer flag deviations from the expected baseline.

“Periodic password expiration is an ancient and obsolete mitigation of very low value, and we don’t believe it’s worthwhile for our baseline to enforce any specific value,” said Margosis.

“By removing it from our baseline rather than recommending a particular value or no expiration, organizations can choose whatever best suits their perceived needs without contradicting our guidance.”

Don’t tell the US government, which advises, “Change passwords monthly.” ®

Sponsored:
Becoming a Pragmatic Security Leader

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/04/25/microsoft_password_expiration/

Enterprise Trojan Detections Spike 200% in Q1 2019

Cybercriminals see greater ROI targeting businesses, which have been slammed with ransomware attacks and Trojans.

Enterprise cyberattacks mean big bucks for cybercriminals, who targeted businesses with a wave of Trojans and ransomware attacks throughout 2018 into the first quarter of this year.

Trojan detections on business endpoints in the first quarter of 2019 increased more than 200% from the fourth quarter of 2018, and almost 650% from the first quarter of 2018, researchers found in the Malwarebytes Q1 Cybercrime Tactics and Techniques report. The Emotet Trojan has made a “total shift” away from consumers as operators focus on business targets, researchers say, with the exception of a few outlier spikes.

“The biggest takeaway from this report is the continued increase in business detections we see and business-focused attacks we see,” says Adam Kujawa, director of Malwarebytes Labs. Emotet isn’t the only Trojan targeting organizations, researchers found. The spike in Trojan malware can also be attributed to families like TrickBot and other info-stealing malware.

Emotet, first detected in 2014, has proven to be a widespread and pricey global threat. Malwarebytes calls it the most common malware, as well as the most invasive and expensive to remove. And it’s growing: The number of Emotet detections spiked from 800,000 to 4 million year-over-year.

Trend Micro researchers have found Emotet is evolving with new capabilities. Recent samples use a different post-infection traffic compared with earlier versions, and the Trojan is now attempting to use infected connected devices as proxy command-and-control servers to redirect back to the real Emotet command-and-control (C2) servers. While the changes may seem small, experts warn these complexities in C2 traffic indicate Emotet’s authors are working harder to evade detection.

Business threat detections have been increasing overall. While there was only a 7% increase between the fourth quarter of 2018 and the first quarter of 2019, Malwarebytes found detections overall were up 235% year-over-year. The spike is likely because persistent families like Emotet are focusing on businesses.

Ransomware is also back to business, with a 195% increase in enterprise detections between the fourth quarter of 2018 and the first quarter of 2019 and a 500% increase from the first quarter of 2018. Malwarebytes primarily attributes the increase to the Troldesh ransomware attack against US organizations early in the first quarter.

“At the end of the day, it’s all about money,” says Kujawa of the enterprise focus. “It’s always going to be about money.” Cybercriminals are capturing data they can sell for money, and info stealing is predicted to increase as data regulation policies such as GDPR are put into place.

Consumers Have Different Concerns
“[There’s] a decline in efforts on the consumer side, which coincide with the increase in efforts on the business side,” Kujawa explains. But cybercriminals aren’t ignoring consumers entirely — they’re just using different techniques.

For example, consumer detections of ransomware have continued to fall by 10% quarter-over-quarter and by 33% year-over-year. Researchers did detect activity by families like GandCrab, which mostly hit consumers last quarter as it switched to ransomware-as-a-service. Cryptomining against consumers “is essentially extinct” as CoinHive halted operations in March.

Consumers should be more worried about the security of their Macs and mobile devices. Across the board, Mac malware was up 60% between the fourth quarter of 2018 and quarter of 2019; adware was especially pervasive, with an increase of more than 200% from the last quarter. Mobile adware was also up, particularly in the form of malware preinstalled on devices. That said, researchers found, adware detections were down overall in the first quarter compared with the same quarter last year.

The increase in business-focused cyberattacks is making consumers wary. In a 4,000-person study conducted in the first quarter, Malwarebytes found users have deep concerns about the abuse, misuse, and theft of personally identifiable information (PII) — especially from social media companies, which are distrusted among 95% of respondents. Nearly 60% of people avoid sharing contact information, credit card numbers, banking details, and health data.

What’s Coming Next
Kujawa anticipates the rest of 2019 will bring more innovation in the ransomware space as cybercriminals find new ways to target organizations. He’s also concerned about the potential for Trojans to increase, with attackers inspired by the success of Emotet and Trickbot.

“I’m terrified that Emotet and TrickBot are going to inspire copycats — that we’re going to get a lot more malware that does a lot of the same things,” he says. There’s the possibility future forms of malware will adopt Emotet’s techniques for spreading and reaching out to other systems. “It’s a very dangerous, very sophisticated piece of malware,” he says of Emotet.

Researchers anticipate ransomware development and resurgence against businesses will continue, and by the end of this year we may see “an intense campaign” targeting organizations with the goal to generate as much money as possible. They predict consumer ransomware will continue to decline as cybercriminals save their weapons for more valuable targets.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/endpoint/enterprise-trojan-detections-spike-200--in-q1-2019/d/d-id/1334535?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

How a Nigerian ISP Accidentally Hijacked the Internet

For 74 minutes, traffic destined for Google and Cloudflare services was routed through Russia and into the largest system of censorship in the world, China’s Great Firewall.

On November 12, 2018, a small ISP in Nigeria made a mistake while updating its network infrastructure that highlights a critical flaw in the fabric of the Internet. The mistake effectively brought down Google — one of the largest tech companies in the world — for 74 minutes.

To understand what happened, we need to cover the basics of how Internet routing works. When I type, for example, HypotheticalDomain.com into my browser and hit enter, my computer creates a web request and sends it to Hypothtetical.Domain.com servers. These servers likely reside in a different state or country than I do. Therefore, my Internet service provider (ISP) must determine how to route my web browser’s request to the server across the Internet. To maintain their routing tables, ISPs and Internet backbone companies use a protocol called Border Gateway Protocol (BGP).

BGP is a dynamic routing protocol, meaning it automatically updates routing tables as changes occur. The Internet isn’t a single straight line from one point to another. There are generally a few different paths a connection can take from point A to point B. BGP’s job is to decide which path is the “best” path (shortest) to reach any given destination network, and update routers accordingly. This path can change as routers are taken down and brought back up online. BGP handles all of these route changes automatically.

The Internet is broken up into a number of autonomous systems (ASs), exactly 6,3954 at this time of writing. Each AS is assigned an autonomous system number (ASN) by the Internet Assigned Numbers Authority (IANA). Your ISP has at least one ASN, likely even more. Big companies like Google also maintain their own border routing infrastructure and have their own ASN.

Autonomous systems form connections with their neighbors, called peers. Through these peer connections, ASs advertise the routes — or “network prefixes,” as they are called — that they know how to reach. Neighbors forward on these advertisements to their other neighbors to propagate them across the Internet backbone. Eventually, because of these route advertisements, an ISP in Seattle can learn a route all the way to a web server hosted in Sydney.

Ground Zero: Internet Exchange Point, Nigeria
So, what exactly happened on November 12? It all starts with an organization called the Internet Exchange Point of Nigeria (IXPN). Internet exchange points (IXPs) are common, especially in developing countries. They provide a central location for regional ISPs to peer with each other and share data at reduced bandwidth costs. Without IXPs, regional ISPs might not have a direct connection with each other. This means traffic between them may travel an overly long distance, possibly even leaving the country before coming back in.

IXPs also act as a single point of connection for larger remote companies and services. In the case of IXPN, Google maintains a peering connection with participating Nigerian ISPs, allowing direct connections from their networks to Google’s services. To facilitate this, Google announces its network prefixes (routes) to its ISP peers in Nigeria. Think of it like building a highway straight to Google instead of having to take a winding country road up through Europe.

These peering agreements and route advertisements are generally for the benefit of the ISPs and their customers alone, so they use route filters to prevent accidently advertising the prefixes beyond their own networks. Without these route filters, the ISP routers, using BGP, would continue to propagate the routes to their other neighbors across the Internet and risk changing how global Internet traffic routes to Google.

Next Stop China
On November 12, 2018, at around 21:13 UTC, MainOne Cable Company in Nigeria was performing routine maintenance on its routing infrastructure. During this maintenance, it accidently misconfigured its route filters, causing it to announce 212 Google prefixes (and several Cloudflare prefixes) to its other BGP neighbors.

China Telecom, one of MainOne’s BGP peers, accepted the route advertisement and relayed it to its neighbors. Transtelecom, based in Russia, accepted this advertisement and relayed it to its peers. At this point, the advertisement had made it far enough into the Internet that many ASs began accepting it.

For around 74 minutes, most traffic destined for Google and Cloudflare services from around the world was routed through Russia, into China, and on to MainOne in Nigeria. Cloudflare was quick to spot the issue and update its routing topography to mitigate the problem. Many users attempting to access Google services, however, had their connections crash right into the largest system of censorship in the world, China’s Great Firewall. Everyone else suffered extreme latency as their connections were routed across the world to Nigeria before reaching Google.

Why is this a big deal? This accident highlights a critical vulnerability in the fabric of the Internet. BGP relies on the trust system. Peers trust that their neighbors are advertising accurate routes. If a neighbor starts advertising routes to prefixes it doesn’t own, it could start intercepting and man-in-the-middling connections to any connection it wants. A single small ISP from Nigeria managed to disrupt traffic to the largest company on the Internet because of a simple mistake. Now imagine what a malicious, coordinated BGP hijack could accomplish.

The good news is that there is a fix out there. Resource Public Key Infrastructure (RPKI) uses cryptographic signatures to authenticate BGP route advertisements, similar to how websites use certificates. Route origin validation (ROV) confirms that prefix advertisements come from the actual owner. Unfortunately, only 13% of advertised prefixes use RPKI, and less than 1% of ASs validate route advertisements. If our Internet service providers and other participants on the Internet backbone don’t start adopting these standards soon, the next BGP hijack might not be an accident — and will likely be much worse.

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.

Marc Laliberte is a senior security analyst at WatchGuard Technologies. Specializing in networking security protocols and Internet of Things technologies, Marc’s day-to-day responsibilities include researching and reporting on the latest information security threats and … View Full Bio

Article source: https://www.darkreading.com/cloud/how-a-nigerian-isp-accidentally-hijacked-the-internet/a/d-id/1334482?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

55% of SMBs Would Pay Up Post-Ransomware Attack

The number gets even higher among larger SMBs.

Security experts typically advise against paying for stolen data after ransomware attacks, but 55% of executives at small to midsize businesses say they would do exactly that.

The number jumps to 74% among larger SMBs with 150 to 250 employees, as stated in the AppRiver Cyberthreat Index for Business Survey. Nearly 40% went so far as to say they “definitely” would pay the ransom, at almost any price, to prevent leakage or loss of data.

Some respondents said the opposite. Forty-five percent of SMB leaders polled said they would not give in to attackers regardless of the ransom. Some SMBs in the legal services and nonprofit sector seem willing to pay ransom in exchange for stolen data, with 67% and 60%, respectively, saying they wouldn’t work with cybercriminals regardless of the ransom amount or data value.

Separate research shows attackers are getting greedier with ransom demands: The average ransom amount paid by victims in cases handled by Coverware jumped 89%, from $6,733 in the fourth quarter of 2018 to $12,762 in the first quarter of 2019. Still, companies willing to pay generally get their data back: In 96% of cases, paying victims received a decryption key.

Security pros advise businesses to implement stronger data protection practices, update their systems, conduct regular backups, and educate their users on ransomware tactics instead of putting funds aside to prepare for a ransomware attack.

Read more details here.

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/55--of-smbs-would-pay-up-post-ransomware-attack/d/d-id/1334539?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

UVA Wins Second Consecutive National Collegiate Cyber Defense Championship

The Wahoos came out on top among 235 colleges and universities that took part in the 15-year-old competition.

The National Collegiate Cyber Defense Competition wrapped up this week with defending champion University of Virginia again winning the title of national champion. UVA was one of ten university teams that gathered at the Rosen Center in Orlando, Fla., for the finals of the competition.

The CCDC features student teams that “protect” a simulated commercial network including users, web servers, email servers, and e-commerce sites. Teams must detect and respond to external threats, keep critical services available to users, and respond to typical business requests for additional or changed services.

A volunteer Red Team member provides automated attacks and challenges, and an automated scoring engine verifies the functionality and availability of each service.

University of Virginia team captain Mariah Kenny (left) works with team member Calvin Krist (right) at the National Collegiate Cyber Competition.

The 15th annual competition began with more than 235 colleges and universities taking part. Regional competitions took the field down to the 10 competitors that met in Orlando, where the University of Central Florida took second place and Rochester Institute of Technology captured third.

For more, read here.

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/operations/uva-wins-second-consecutive-national-collegiate-cyber-defense-championship/d/d-id/1334541?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

New EternalBlue Family Member Takes Aim at Asian Web Servers

Beapy is a new malware variant that’s storming across China, leaving cryptominers in its wake.

A new variant of the EternalBlue exploit is hitting hundreds of businesses in China. The cyptojacking campaign, dubbed “Beapy” for one of the principal files used in the attack, uses email for its initial infection vector and then spreads laterally through a network, leaving a cryptominer wherever it goes.

In a blog post by the Security Response Attack Investigation Team at Symantec, researchers note that Beapy is continuing a tactic previously seen in the Bluwimps worm: focusing cyptominer activity at enterprise networks.

The infection chain begins with a weaponized Excel file attached to a phishing email. Once opened by the recipient, the file downloads a DoublePulsar backdoor to the computer. DoublePulsar was one of the exploits leaked in the Shadow Brokers file dump, just like EternalBlue. And this isn’t the first time criminals have turned to this state-developed exploit: It was also used in 2017’s WannaCry ransomware campaign.

Alan Neville, threat intelligence analyst at Symantec, says that once the bogus spreadsheet is launched, “it would then download Beapy onto their machines, and then it would try to spread across the networks, either using EternalBlue or dumping network credentials.” The credential dump is especially dangerous because “… essentially, once you have network credentials, you become a legitimate user,” he says. “That makes it very easy for the likes of Beapy to spread across networks very, very quickly, then download and install this coin-mining software.”

While the Beapy campaign is not currently focused on data exfiltration, Jonathan Bensen, CISO and senior director of product management at Balbix, says it’s still a serious problem. “Cryptojacking should not be viewed as a victimless crime,” he says. “Besides drastically slowing down computers and causing device degradation, Beapy, in particular, leverages open source credential stealing capabilities to aid in its spread throughout an enterprise’s network.”

And even though Beapy isn’t currently exfiltrating data, once the data is captured there’s nothing to prevent the current Beapy controllers from eventually adding stolen credentials to the cryptocurrency they’re taking from the victim’s network.

And there is evidence that Beapy will not be limited to cryptocurrency mining. According to the Symantec report, Beapy has targeted Web servers as one of its hosts, and early versions of the software contained Mimikatz modules for credential theft. These versions targeted Apache Tomcat and Oracle WebLogic servers beginning in early February, with activity continuing to the present time.

Neville says the Beapy attack is very profitable because “the file basically allows cybercriminals to be able to mine cryptocurrencies a lot faster than some of the traditional methods that we’ve seen in the past. It’s just a coin hive, where it was embedded within browsers to be able to generate some revenue by mining cryptocurrencies within a browser just by visiting websites.”

This, Neville says, lets the malware leverage the CPU itself and allows cybercriminals to mine coins much faster. The fast mining is aided by the lack of any “throttle” that the team has seen — Beapy and its miner will take every CPU cycle the system can make available, bringing legitimate enterprise software to a halt.

Protection from Beapy begins behind the keyboard, says Stuart Reed, vice president at Nominet. “The best defense against these attacks combines education — empowering and even rewarding employees for spotting problem emails, then alerting others — with technologies to monitor the network and identify malicious activity before the damage can be done.”

In addition to training, there’s another critical step that organizations should take, Neville says. “It’s very important to have your systems patched. Any systems that aren’t patched against EternalBlue are vulnerable to this attack,” he says.

Organizations beyond China should keep this in mind, as well. “There’s nothing specific that we came across as part of our analysis that would suggest that [Beapy is] targeting specific software or systems within China, and it could definitely be utilized to spread farther,” Neville says.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/new-eternalblue-family-member-takes-aim-at-asian-web-servers/d/d-id/1334544?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cyberattackers Focus on More Subtle Techniques

Spam has given way to spear phishing, cryptojacking remains popular, and credential spraying is on the rise.

The time it takes to detect the average cyberattack has shortened, but  cyberattackers are now using more subtle techniques to avoid better defenses, a new study of real incident response engagements shows.

Victim organizations detected attacks in 14 days on average last year, down from 26 days in 2017. Yet, attackers seem to be adapting to evade the greater vigilance: Spam, while up slightly in 2018, continues to account for far less of e-mail volume than during every other year in the past decade, and techniques such as hard-to-detect cryptojacking and low-volume credential spraying are becoming more popular, according to Trustwave’s newly published Global Security Report

Other stealth tactics—such as code obfuscation and “living off the land,” where attackers use system tools for their malicious aims—are also coming into greater use, showing that attackers are changing their strategies to avoid detection, says Karl Sigler, threat intelligence manager at Trustwave’s SpiderLabs. 

“Companies’ basic best practices are stopping the previous strategies, where attackers cast a wide-spread net, so (attackers) are becoming more targeted in their methods,” he says. 

The report, based on data from Trustwave engagements that had been anonymized and analyzed, covers a wide swath of threats and security issues. Social engineering continued to be the most popular way to compromised companies, with 60% the cases resulting from a successul social engineering attack.

“If an attacker induced a user to give away their credentials, then any attacker actions likely will look similar to legitimate actions,” the report says.

Brute-force password attacks, self-propagating malware, and other obvious attacks declined in 2018, in favor of more subtle approaches.

Attacks that use e-mail demonstrate the trend. Back in 2008, 87% of all e-mail consisted of spam messages, a brute-force approach to deliver attacks. That generation of spam dropped to 36% and 45% in 2017 and 2018, respectively, as e-mail fraud became more targeted. 

In addition, fewer malicious e-mails contained actual malware, with only 6% of spam messages carrying malware in 2018, down from 26% in 2017, according to the report. 

Perhaps the most brutish e-mail attack involved attempts to turn credential information into money by extorting users with claims that their sexual activity would be exposed—so-called sextortion. While nonexistent at the beginning of 2018, by end of the year, sextortion made up 10% of all spam messages.

“It hit really hard in December of last year,” Sigler says. “It almost totally relies on leaked credentials. It just shows that passwords are always valuable—if you can’t immediately monetize compromised credentials, you can use them in some other way.”

Cryptojacking

While the decline in the value of cryptocurrency has caused a decline in cryptomining in general, attackers continued to use the computationally heavy approach as a quick way to turn a compromise into cash. Cryptojacking, which uses JavaScript to run cryptomining software on a person’s computer through their browser, allows attackers to eke out small profits after compromising websites.

Eighty-four percent of coin-miner installations had signs that they incorporated cryptojacked browsers as part of their infrastructure, Trustwave found.

“It’s easy to see what makes cryptojacking attractive to the same cybercriminals who once relied heavily on exploit kits,” the company stated in the report. “Whereas exploits are platform-specific and require the presence of an unpatched vulnerability to work, web miners can run in any browser – on PCs, Macs even mobile devices – that has JavaScript enabled.”

While firms more quickly detected intrusions in 2018 compared to the previous year, it mattered significantly whether an intrusion was detected internally or by a third party. In 2018, the average attack was detected by a company within a single day, a significant drop from the nearly two weeks it took in 2017.

For more subtle attacks that the victim failed to catch, however, it took a third party more than a month and a half—47 days—to notify the company.

Trustwave still found cases where attackers had access to compromised environments for long periods of times, sometimes more than a year, so security professionals still need to seek out signs of attacks, says Sigler. 

“The longer that an attacker is on your network and has access to your data, the more widespread the intrusion tends to be, and the more they get their tentacles into other systems and other servers using their initial breach as a foothold,” he says. “So it takes a lot longer to address the compromise, the longer it goes on before detection.”

AppSec Problems

Companies also have numerous other issues. For the past two years, every application tested by Trustwave had vulnerabilities. In addition, the median number of vulnerabilities per application increased in 2018 to 15 – up from a low of 11 in 2016 and 2017.

“Not all vulnerable applications are likely to be attacked, of course, but understanding what an application’s vulnerabilities are is vital to assessing its security state and determining which areas to address first,” the report states.

Related Content

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/cyberattackers-focus-on-more-subtle-techniques/d/d-id/1334545?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple