STE WILLIAMS

2017 Data Breach Will Cost Equifax at Least $1.38 Billion

Company agrees to set aside a minimum of $380.5 million as breach compensation and spend another $1 billion on transforming its information security over the next five years. The 147 million US consumers affected by the breach have one week from today to file a claim.

The final minimum tab for Equifax’s failure to patch a known web application security flaw—that later proved to be the root cause of the company’s disastrous data breach in 2017—is over $1.38 billion.

The US District Court for the Northern District of Georgia Monday granted final approval of a settlement arrived at last July between the Federal Trade Commission and Equifax. Under the settlement, Equifax has agreed to set aside at least $380.5 million to settle claims related to its 2017 breach. The company has also agreed to spend at least $1 billion on information security and related technologies over a period of five years.

Personal data, including Social Security Numbers belonging to some 147 million US consumers was compromised in the breach. Equifax has blamed the incident on a buggy component in the open-source Apache Struts framework for which a patch was available at the time of the breach.

Money from the $380.5 million fund will be used to pay for credit monitoring services and compensation of up to $20,000 to individuals who can show documented out-of-pocket expenses directly related to the breach. The court-approved settlement allows individuals to claim up to 20 hours—at $25 per hour—for any time they might have had to spend taking preventative measures to protect their data against fraud and misuse following the breach. Up to 10 of those hours can be self-certified and requires no documentation.

Equifax will also provide up to four years of free three-bureau credit monitoring and identify protection services to victims of the data breach. In addition, the company will provide another six years of its own credit monitoring and identity protection service for free. Victims who were legal minors at the time of the breach are eligible for a total of 18 years of free credit monitoring.

Substantial as the costs are for Equifax, they could go even higher. The settlement for instance requires Equifax to set aside an additional $125 million in the event the $380.5 million fund proves insufficient to pay all claims. On top of that, the costs for the six years of additional credit monitoring that Equifax is required to provide under the settlement are not part of the $380.2 million fund. In approving the settlement, the court estimated that the market value of the free credit monitoring service—if all 147 million victims sign up for it—at an additional $2 billion for Equifax.

“This settlement is the largest and most comprehensive recovery in a data breach case in U.S. history by several orders of magnitude,” District Judge Thomas Thrash, Jr. wrote. “The minimum cost to Equifax of the settlement is $1.38 billion and could be more, depending on the cost of complying with the injunctive relief,” and other measures, he wrote.

Rui Lopes, sales engineering and technical support director at Panda Security says the security breach suffered by Equifax in 2017 was one of the biggest data in history. The big question is whether it could have been prevented. “And the answer is simply ‘yes,'” Lopes says. “Equifax left the door open to cybercriminals by not updating an open-source web application development framework.”

However, Jack Mannino, CEO at nVisium says what the incident really highlights, is the difficulty involved in running a security program at scale, especially for those under constant attack.

Though there were demonstrated gaps in security monitoring and secure development that contributed to the breach, the security issues at Equifax were not unique to them he says.  “Most organizations commonly struggle with keeping software libraries and dependencies up to date,” Mannino says. “However, given the value of the data they protect, it demonstrates that there are real consequences to these events.”  

Equifax’s Data Breach Settlement Website and settlement notice contains all details about the final settlement and the reliefs and benefits available under it. Consumers have until Jan. 22, 2020 to file a claim.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How to Keep Security on Life Support After Software End-of-Life.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/2017-data-breach-will-cost-equifax-at-least-$138-billion-/d/d-id/1336815?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Malicious npm package taken down after Microsoft warning

Criminals have been caught trying to sneak a malicious package on to the popular Node.js platform npm (Node Package Manager).

The problem package, 1337qq-js, was uploaded to npm on 31 December, after which it was downloaded at least 32 times according to figures from npm-stat.

According to a security advisory announcing its removal, the package’s suspicious behaviour was first noticed by Microsoft’s Vulnerability Research team, which reported it to npm on 13 January 2020:

The package exfiltrates sensitive information through install scripts. It targets UNIX systems.

The data it steals includes:

  • Environment variables
  • Running processes
  • /etc/hosts
  • uname -a
  • npmrc file

Any of these could lead to trouble, especially the theft of environment variables which can include API tokens and, in some cases, hardcoded passwords.

Anyone unlucky enough to have downloaded this will need to rotate those as a matter of urgency in addition to de-installing 1337qq-js itself.

What to do

The offending versions of the package are versions 1.0.11 to 1.0.9 inclusive.

The advice is to check for dependencies by generating a report using the npm audit command from the command line. This alerts admins to packages known to be malevolent as well as any other security issues that need addressing. In a perfect world, an audit will return this:

No known vulnerabilities found (x packages audited].

Malicious npm packages, particularly ones installing backdoors, have become a recurring theme in the last year or two.

A good example was last June’s targeting of the Agama cryptocurrency wallet. The thinking behind this attack was simple – upload what appears to be a useful package, wait until the specific target starts using it in their ‘build chain’, and then update the package with a malicious payload.

This kind of ruse puts a lot of pressure on npm’s security testers to spot malevolence before any damage is done. In this case, the attack was foiled.

There have been at least four other incidents with malicious packages trying to sneak backdoor attacks on npm users since 2017.

Instances of attackers targeting libraries and packages to target cryptocurrency apps by the backdoor are also on the increase.

Today’s applications are assembled from different pieces of software in a format that resembles a supply chain. Clearly, as with physical supply chains, this brings with it new risks.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/X4lFsmpAVr8/

Microsoft fixes critical bugs in CryptoAPI, RD Gateway and .NET

The CryptoAPI cryptographic bug that Microsoft reported in its Patch Tuesday release yesterday was so big that it warranted its own story. Here, we look at some of the other nasties that Microsoft fixed.

Among the most serious bugs were remote code execution (RCE) flaws affecting the Windows Remote Desktop Gateway, which is a Microsoft service that lets authorised remote users connect to resources on a network via the Remote Desktop Connection (RDP) client.

These pre-authentication bugs don’t require any user interaction to exploit, and involve an attacker sending a specially crafted request via RDP. Labelled CVE-2020-0609 through 11, the bugs affect Windows Server 2012 and 2012 R2, along with Windows Server 2016 and 2019. Rated 9.8 in CVSS, these are red hot bugs that companies should fix immediately.

In an analysis of the Microsoft patches, Johannes Ullrich at SANS explained:

Remember BlueKeep? The RD Gateway is used to authenticate users and allow access to internal RDP services. As a result, RD Gateway is often exposed and used to protect the actual RDP servers from exploitation.

There were several other critical bugs in Microsoft’s patch this month, all overshadowed by the cryptographic whopper that we cover elsewhere but still important to everyday users and admins.

CVE-2020-0603 is a critical RCE bug in ASP.NET Core stemming from improper object handling in memory. A user would have to open a specially crafted file to be hit, which an attacker could send via email.

The .NET framework had its fair share of critical bugs this month. One is triggered by specially crafted markup in a file that the system fails to check. Labelled CVE-2020-0605, this bug is critical and affects versions of Windows Server going back to 2008, and Windows ranging from 10 back to Windows 7 service packs. CVE-2020-0646, another .NET Framework flaw, can lay the system low with poor input validation. An attacker could pass malicious input to an application using susceptible .NET methods.

Also notable but not critical was a bug in the Windows Subsystem for Linux (WSL), which is the part of Windows that allows people to run Linux services and applications. Labeled CVE-2020-0636, it enables an attacker to run code with elevated privileges by running applications that manipulate a weakness in the way WSL handles files.

Adobe

Adobe also patched nine bugs in its products on Tuesday, including five critical flaws in its graphics editing software Adobe Illustrator CC. These are memory corruption flaws that could enable an attacker to run arbitrary code on the system. If they can’t execute code, the attempt will probably cause a denial of service. The bugs, CVE-2020-3710 through CVE-2020-3714, affect versions of Illustrator prior to version 24. Installing the latest version, Illustrator CC 2019 24.2, fixes them.

The company also patched another four bugs in its Adobe Experience Manager product, rated either Moderate or Important, which could lead to the disclosure of sensitive information. It patched these bugs, labelled CVE-2019-16466 through CVE-2019-16469, with new versions of the software.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/_JcrLmlUQmc/

How SD-WAN Helps Achieve Data Security and Threat Protection

Enterprises currently consider the technology a best practice because of its flexibility, scalability, performance, and agility.

Retail and banking technology professionals are keenly aware of the large number of devices that connect to their enterprise’s network via Ethernet and Wi-Fi. IT sprawl at each branch adds complexity to network visibility and security, and that complexity means increased risk of a breach. Endpoint security alone, without proper edge security, won’t be enough to reduce these risks — and even a next-generation firewall service isn’t always enough to secure the perimeter.

As a result, organizations are breached because they fail to detect the threat early enough to respond rapidly and effectively. Traditional security solutions are simply not adequate for the level of visibility and control that are required to mitigate today’s threats.

The typical bank IT system, for example, uses multiple financial applications as well as video and voice to enable services such as kiosks for consumers to conference with financial experts miles away.

These branches also need to access financial applications that are hosted in the cloud. Connecting all the bank branches or branch offices of a retail company at a reduced bandwidth cost is the crux of the answer. However, the near-real-time nature of the application puts enormous demands on the network to deliver guaranteed performance without risking the data’s security or integrity.

Because of this, enterprises such as finance and retail have begun examining the role of software-defined networking as a best practice for their future IT needs, particularly as it relates to security.

Software-defined wide area networking (SD-WAN) addresses flexibility with transport independence and enables connections over direct Internet broadband as well as multiprotocol label switching (MPLS) circuits and LTE/5G. SD-WAN with multicloud connectivity in particular has allowed enterprises to seamlessly move data and workloads from data centers to the branches to the public cloud. [Editor’s note: The author’s company is one of many that offer services in this area. See Gartner’s Magic Quadrant report for more information.]

The flexibility of the application access that SD-WAN provides from end to end, however, comes with a price if not properly secured: That is, security breaches can occur from anywhere, especially from the branches. The “local Internet breakout” feature — the ability for a branch to work over the Internet without needing to backhaul to the data center — creates a specific need to secure the Internet breakout link. This means enterprises, such as retailers or banks, need to evolve their branch security, in particular, with the overall threat landscape in mind.

Luckily, SD-WAN puts a premium on security, due to the regulatory environment and the need to keep customer data safe and secure. For example, every link is encrypted via IPSec in order to secure the content. This ability to segment traffic is essential for ensuring that credit card transactions are protected from untrusted traffic. Going beyond the Payment Card Industry Data Security Standard compliance is the best possibility to close those unused links and prevent rogue devices from connecting to the network via Ethernet.

Ideally, SD-WAN can use policies to automate security assurance and can take automatic remedial security actions based on suspicious network behavior that is detected in real time and without user action.

Consider a scenario where a customer needs to have guest access at a bank branch or at a retail shop. Once this access is provided, that user’s file downloads need to be quarantined for viruses and other threats. Embedded intrusion prevention and detection systems (IPS/IDS) and antivirus functionality are needed at the branch network where this Wi-Fi connection is going to be established. URL/web filtering is also necessary to prevent this guest user from accessing unwanted and potentially virus-laden websites.

The prevention of this unwanted access is also not just limited to the guest users. It can be applied to the bank or retail shop employees as well in restricting access to specific websites and unauthorized access to things such as corporate data centers, for example. With security policies defined per user group or retail location, such access can be controlled.

A truly flexible SD-WAN security implementation should not just mandate embedded security; it should also provide the flexibility to supplement any onboard security from the SD-WAN vendor with additional features from the cloud security vendor. When a traffic flow needs to be further scrubbed, this approach then allows it to be redirected to the security measures deployed in the cloud. As part of the automatic response to a threat, it is important to dynamically insert a security service for suspected traffic. This dynamic insertion may involve instantiation of a security virtual network function within the customer premises equipment at the branch.

To prevent further security attacks, one needs visibility into what is happening on the network today. The visibility and analytics should provide reports and alerts based on security policy violations, byte/packet count of the volumetric distributed denial-of-service attack, number of accesses to malicious sites, user/location-based activity, etc. These reports help in-network forensics and troubleshooting as well.

Enterprises currently consider SD-WAN to be a best practice because of its flexibility, scalability, performance, and agility to deploy and manage a larger number of branches; there also is embedded security in SD-WAN branches and the controller.

Because of its security functions (such as a stateful firewall, URL/web filtering, IPS/IDS, visibility and analytics at the link level as well as the application level), SD-WAN provides security for today’s vast landscape of IT connections from the data center to the branch to the cloud, aiding an enterprise’s journey toward digital transformation.

Charuhas Ghatge is a Senior Product and Solutions Marketing Manager at Nuage Networks and is responsible for promoting SDN and SD-WAN products and solutions for service providers and enterprises. Charuhas has held a number of engineering, product management, and marketing … View Full Bio

Article source: https://www.darkreading.com/cloud/how-sd-wan-helps-achieve-data-security-and-threat-protection-/a/d-id/1336724?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Apple says no to unlocking shooter’s phone; AG and Trump lash back

No surprise here: Apple has yet again said no to the FBI’s request to break iOS encryption – this time, as it investigates the 6 December mass shooting at a naval base in Pensacola, Florida.

No surprise redux: Attorney General William Barr is using Apple’s “No” as a “perfect” illustration of why “the public needs to be able to get access to digital evidence”. In other words, this is why we need a backdoor, the FBI says.

We have asked Apple for its help in unlocking the shooter’s phones. So far, Apple has not given any substantive assistance. This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence once it’s received a court order based on probable cause.

In a press conference on Monday, Barr confirmed that the FBI’s investigation has uncovered multiple anti-American screeds posted by the killer, Mohammed Saeed Alshamrani, a member of the Saudi Royal Air Force who was taking flight classes in Florida. He murdered three young US Navy students and wounded eight others before being shot to death by authorities.

Barr said that the evidence points to the shooter being motivated by Jihadist ideology, as can be seen in messages Alshamrani posted to social media. One message stated that “the countdown has begun.” He posted messages up to two hours before the attack, and the FBI is keen to know who else he might have been communicating with.

During the shootings, Alshamrani took time out to shoot one of the phones. His second iPhone was also damaged. Barr said that it’s “virtually impossible” to get into the killer’s iPhones, but that it’s important to do so:

It is very important to know with whom and about what the shooter was communicating before he died.

The AG called on Apple and other technology companies to “help us find a solution so we can better protect the lives of the American people and prevent future attacks.”

In response, Apple said in a statement that it’s offered investigators a variety of information since the attack, including iCloud backups, account information and transactional data for multiple accounts in response to six legal requests.

Apple will keep working with the FBI, a spokesperson told The Hill, but it won’t put in a backdoor that would let law enforcement slip past encryption to read messages. Weakening encryption wouldn’t just get the FBI into a given iPhone, it said – it would cripple everybody’s security.

We have always maintained there is no such thing as a backdoor just for the good guys. Backdoors can also be exploited by those who threaten our national security and the data security of our customers.

Today, law enforcement has access to more data than ever before in history, so Americans do not have to choose between weakening encryption and solving investigations. We feel strongly encryption is vital to protecting our country and our users’ data.

This is the same rationale that Apple’s been using since its legal battle with the FBI over its demands that the company help it to unlock the iPhone of San Bernardino terrorist Syed Farook.

In 2016, the FBI versus Apple court case was withdrawn after the FBI said that it had succeeded in breaking into Farook’s encrypted phone with the use of an unspecified, third-party tool.

Just because the government withdrew its court case didn’t mean that it had abandoned the battle over end-to-end encryption, however, as Barr’s public call for a backdoor clearly shows.

What’s not clear is what the government plans to do next. Sue Apple? Introduce legislation outlawing end-to-end encryption?

Even if Apple were to agree to put in a backdoor, that wouldn’t mean that the FBI could then crack encryption on Alshamrani’s iPhones. But the question of whether it will press charges against Apple may be simply a question of strategy. As Barr said, this case “perfectly illustrates” why the government needs a backdoor.

Last night President Trump also weighed in to demand that Apple unlock the phones of criminals – the least they can do, given the support the tech company receives from the government:

What remains to be seen: Whether the FBI’s failure to unlock Alshamrani’s iPhones gets used to make the government’s case against unweakened encryption within a courtroom or on Capitol Hill.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/ZRh0_aJQATA/

Peekaboo Moments baby-recording app has a bad database booboo

No need to wait until you’ve gurgled out of your mother’s womb to experience the joys of having your privacy breached, thanks to a mobile app called Peekaboo Moments.

Bithouse Inc. – the developer of the mobile app, which is designed to capture photos, audio, weight, length, video and diaries of tots starting as early as their zygote days – has left an Elasticsearch database flapping wide open, leaving thousands of infants’ videos and images exposed, unsecured and up for babbling its contents to any internet busybody who knows where to look.

The database was discovered by Dan Ehrlich, who runs the Texas-based cybersec startup Twelve Security. Ehrlich told Information Security Media Group (ISMG) that the 100GB database contains more than 70 million log files, with data going back as far as March 2019. The logs record when someone uses the Peekaboo app, what actions they took and when.

And my oh my, what actions you can take! As the Peekaboo Moment developer croons on the app’s Google Play listing, users can…

Take photos, videos for your little ones! Starting from pregnancy, newborn to every first ‘papa’ ‘mama’, these memories will be auto-organized by age of child.

Users can also record the weight, length and birth dates of their babies, as well as their location data, in latitude and longitude, down to four decimal points: an accuracy that translates to within about 30 feet. In other words, this could be Baby’s First PII Breach.

The open database has exposed at least 800,000 email addresses, detailed device data, and links to photos and videos. The frosting on the cupcake: Ehrlich found that the Peekaboo Moments’ API keys for Facebook – which enable users to take content they’ve uploaded to Facebook and post it in the Peekaboo app – have also been exposed, potentially enabling an attacker to get access to content on users’ Facebook pages.

One more thing: Ehrlich says that Peekaboo Moments exposed its own API endpoint, which could allow an attacker to upload their own code or exfiltrate all of the data that the API can get at: a “pretty standard ‘hacking’ thing to do,” he said.

Ehrlich told Facebook about the API on Wednesday, but as of Tuesday, it hadn’t responded to questions about whether it would revoke the developer’s API keys.

Ehrlich’s response to the gruesomely botched setup: My eyes!!!!

I’ve never seen a server so blatantly open. Everything about the server, the company’s website and the iOS/Android app was both bizarrely done and grossly insecure.

Ehrlich says the data is stored on servers hosted by Singapore-based Alibaba Cloud.

As ISMG points out, the 👶SECURED SPACE, SHARING FRIENDLY category of the app’s listing makes promises it hasn’t kept, such as that it will safeguard the data and information it stores.

“We completely understand how these moments [are] important to you,” croons the Peekaboo Moments app.

Data privacy and security come as our priority. Every Baby’s photos, audios videos or diaries will be stored in secured space. Only families friends can have access to baby’s moments at your control.

It’s not clear how long Bithouse has been flubbing that promise or who’s gotten into its open Elasticsearch database, if anybody. The company, apparently based in China, hasn’t responded to ISMG’s queries.

ISMG’s Jeremy Kirk did, however, manage to get in touch with a Peekaboo user who said that the idea of strangers being able to access her children’s personal pictures is creepy. The user, Michelle Smith, told ISMB that this is the first she’s heard of the breach, and that she’s been using the app for seven years for three of her children.

This is very concerning as I believed it to be a secure app and don’t feel comfortable at the thought of strangers being able to access personal pictures.

Another misconfigured Elasticsearch instance?

As we’ve noted a whole lot more than once, improperly configured Elasticsearch databases are a common cause of inappropriate data disclosures. Like, say, the millions of SMS messages leaked by enterprise texting services provider TrueDialog last month, the Elasticsearch database with customer data for 7.5 million Creative Cloud accounts found gaping wide open in October, or the leaky database full of Groupon emails (which, for what it’s worth, turned out to belong to crooks!).

These databases sometimes get manually set up for remote access, even though the database isn’t designed to be accessible via a URL: that was the glitch that caused the TrueDialog spill last month.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/s_aas9nhhmI/

Today’s webcast: Hackers don’t care if you’re big or small. Tune in to find out how to protect your mid-sized biz

Webcast We don’t want to spook anyone, but… cyber-criminals have been busy.

Hackers and online crooks may already be reaching inside your perimeter to gain access to servers and other machines. From this vantage point, they can siphon off your data – they are, frankly, pretty good at it.

To miscreants, the size of a target is irrelevant. While larger businesses may have whole teams of experts dealing with barrages of cyber-security alerts, small and medium-sized organisations lack the skills and resources to put a comprehensive response together. Let’s put it this way: simply just keeping your antivirus up to date is not enough when facing today’s sophisticated and determined threat actors.

Tune into today’s webcast, brought to you by F-Secure, at 3pm GMT to find out what smaller enterprises can do to protect themselves.

Endpoint Detection and Response (EDR) solutions can go a long way towards minimizing the level of threat, though they need to be chosen and used in the right way. In this webinar, aimed at those responsible for IT security, we talk to an expert at F-Secure to determine:

  • The cybercriminal’s mindset when it comes to smaller businesses
  • How EDR enables a comprehensive response to current threats
  • Choosing EDR that delivers against smaller business needs

So, if you are looking to augment your arsenal with a game-changing security control, register right here and join us this afternoon.

Sponsored:
Detecting cyber attacks as a small to medium business

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/01/15/detecting_cyber_attacks_webinar/

Updated your WordPress plugins lately? Here are 320,000 auth-bypassing reasons why you should

A pair of widely used WordPress plugins need to be patched on more than 320,000 websites to close down vulnerabilities that can be exploited to gain admin control of the web publishing software.

The team at WebArx, a security firm specializing in WordPress and other CRM and publishing platforms, took credit for discovering and reporting the flaws in WP Time Capsule and InfiniteWP. Both plugins were patched earlier this month by the developer, and updates should be applied.

In each case, WebArx says, the authentication bypass flaws were down to “logical issues” that, when targeted, gave an attacker admin access over the site without the need for a password.

In the case of InfiniteWP, a management tool with an estimated 300,000 users, the attacker would make a POST request with the payload written first in JSON and then encoded in Base64. If properly encoded, the request will be able to bypass the password requirement and log in the user with only the username.

For WP Time Capsule, a backup tool running on around 20,000 sites, the bypass would also be run as a POST function, but without the need for the payload to be encoded. Again, if a specific string is included in the request the code won’t ask for authentication and allow admin access to the site.

In this case, patching the plug-ins is particularly important as attacks on the vulnerabilities would likely slip past firewalls.

default WordPress background image

Top websites screwed over in WordPress.com super-outage: VIP Go? More like VIP No Go

READ MORE

“Because authentication bypass vulnerabilities are often logical mistakes in the code and don’t actually involve a suspicious-looking payload, it can be hard to find and determine where these issues come from,” WebArx explained.

“In this case, it’s hard to block this vulnerability with general firewall rules because the payload is encoded and a malicious payload would not look much different compared to a legitimate looking payload of both plugins.”

WebArx noted that, to their credit, Revmakx, the developer of both plugins, was quick to respond and each was updated within a day of being reported.

Let this serve as a reminder to admins that WordPress and all of its plugins should be included in your regular update cycles. While patches for Windows, Acrobat, and other software get much of the press, WordPress is an extremely popular target for attackers looking to hijack sites and install things like cryptocoin miners or MageCart. ®

Sponsored:
Detecting cyber attacks as a small to medium business

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/01/15/update_wordpress_plugins/

Cloud Adoption & Technology Change Create Gaps in Enterprise Security

Many companies are struggling to get a handle on risk exposure because of visibility issues, Radware survey shows.

Many businesses that are transitioning to public cloud environments, microservices architectures, and 5G networks are creating new blind spots in the attack surface for criminals to leverage, according to a new report from Radware.

The security vendor recently surveyed more than 560 security professionals from small and large companies around the world on how they are preparing for and dealing with cyberattacks. Their responses showed that a substantial percentage of organizations are struggling to get a handle on cyber-risk because they lack visibility across their network environment.

Twenty-two percent of the respondents didn’t know if their organizations had been attacked recently, 27% of organizations that were attacked had no idea what their attackers might have been after, and nearly half (46%) were unable to tell if they had experienced an SSL-based distributed denial-of-service attack. Thirty percent did not monitor so-called east-west traffic, meaning they would be unable to detect lateral movement.

Unsurprisingly, many organizations are experiencing a very high volume of cyberattacks. Nearly one-third of those surveyed said their organizations experience attacks on either a daily or a weekly basis. “The main takeaway is that as organizations make strategic transformations — in technology, environments, and processes — they inevitably create a lot of cracks and blind spots,” says Ben Zilberman, head of product marketing for application security at Radware.

Until even relatively recently, the adoption of microservices architectures, the public cloud, and technologies such as 5G was somewhat limited across enterprises. But with more organizations adopting these technologies, new cracks have begun to emerge in their defenses. “While businesses are better prepared to cope with threats they know and understand, the dynamics of change [is creating] more ways for hackers to get in,” Zilberman says.

Radware’s survey showed that financial services companies are no longer the favorite targets of cyberattackers. A higher percentage of organizations in the education and retail sectors reported daily attacks — 45% and 39%, respectively — than financial services organizations (37%). Other heavily targeted sectors included government and healthcare, with 36% of organizations reporting daily attacks, followed by service providers (35%), professional services (34%), and manufacturing (32%).

Nation-State Attacks
Significantly, the percentage of cyberattacks that were attributed to nation-state-backed threat actors jumped 42% compared with 2018. Zilberman says that rather than an increase in nation-state attacks, the new data suggests that enterprise organizations are getting better at identifying and attributing attacks to state-backed groups. “It may have to do with the establishment of national agencies, like CERTs, that help organizations, particularly critical ones within critical infrastructures,” he says.

For organizations targeted by nation-state actors, the danger is not just data theft and espionage. In many cases, government-backed threat groups are also infiltrating and injecting dormant tools into targeted networks to be activated if war or other hostilities break out between rival nations. The tools can be remotely controlled and used to trigger large-scale disruptions and shutdowns of critical government, military, and civil systems.

For the most part, though, a majority of cyberattacks in the US and elsewhere continue to be financially motivated. Seven in 10 of US organizations that reported being attacked in the survey said their attackers were looking for a ransom or some other form of financial gain. More than three in 10 organizations also described attacks against them as being motivated by political or “hacktivist” reasons or as being cyberwar or geopolitically related. Radware said it expects to see massive Internet of Things botnets being used to thwart election-related activity in 2020.

Organizational response to the changing threat landscape continues to be decidedly mixed. “Some neglect and deny and believe stacking up solutions will deliver on the promise,” Zilberman notes. Others are simply keeping on doing what they have always done. “They continue to design and manage their information security using old methods that don’t match the current requirements.”

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “6 Unique InfoSec Metrics CISOs Should Track in 2020.” 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/cloud-adoption-and-technology-change-create-gaps-in-enterprise-security/d/d-id/1336808?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft Patches Windows Vuln Discovered by the NSA

The National Security Agency is publicly acknowledged for its finding and reporting of CVE-2020-0601, marking the start of what it says is a new approach to security.

The first Patch Tuesday of 2020 has the industry buzzing about 49 CVEs, in particular a Windows CryptoAPI spoofing vulnerability disclosed to Microsoft by the US National Security Agency (NSA).

CVE-2020-0601, which affects Windows’ cryptographic functionality, exists in Windows 10, Windows Server 2016, and Windows Server 2019. It’s categorized by Microsoft as Important and rated as level one, or “exploitation more likely,” in its advisory released today. Neither Microsoft nor the NSA has seen this vulnerability used in the wild, and the agency said it has not seen it in a tool.

The certificate-validation flaw exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the bug by using a spoofed code-signing certificate to sign a malicious executable so the file appears to be from a known and trusted source. The move could trick both users and anti-virus software, the DHS explains in an emergency directive on today’s patches. Neither a user nor the AV program would know a file was malicious.

With this vulnerability, an attacker could issue a maliciously crafted certificate for a hostname that didn’t authorize it. As a result, a browser that relies on CryptoAPI would not issue a warning to the user, giving the intruder access to modify or inject data on user connections. Successful exploitation could also allow an attacker to launch man-in-the-middle attacks and decrypt confidential data on users’ connections to the affected software.

Some places where trust may be breached include HTTPS connections, signed files and emails, and signed executable code launched as user-mode processes, the NSA says in an advisory. An attacker could compromise Web certificates and spy on traffic as part of a man-in-the-middle attack, or compromise digitally signed emails. For apps using signatures for verification, an attacker could manipulate a user into deploying a malicious app that is signed and seems real.

If exploited, CVE-2020-0601 could render affected platforms “fundamentally vulnerable,” officials say, and the consequences of not patching this flaw are “severe and widespread.” The agency anticipates remote exploitation tools will be made quickly and widely available.

“The blast radius is pretty close to as bad as you can get,” says Will Ackerly, CTO and cofounder of Virtu, who spent eight years with the NSA, where he was a technology architect and created the Trusted Data Format (TDF). If the operating system believes software is trusted, users won’t see certain dialogues and certain blocks will be bypassed.

“It attacks trust,” says Dr. Richard Gold, director of security engineering at Digital Shadows, of the vulnerability. “It is no longer possible to rely on the cryptographic guarantees provided by an unpatched system.” In this sense, he continues, this is a “very serious” bug as it attacks the trust businesses have in a system to verify updates, check signatures, and other measures.

New NSA-Vendor Cooperation

Microsoft has publicly credited the NSA with reporting CVE-2020-0601, a shift away from the agency’s practice of keeping vulnerabilities under wraps. It marks the start of a new approach by the NSA, said NSA director of cybersecurity Anne Neuberger on a call with reporters today.

“We thought hard about that,” said Neuberger with respect to the decision to allow attribution. While the NSA has been discovering vulnerabilities for a long time, it has never permitted public attribution to reporting a vulnerability. 

NSA experts look very carefully at software, especially software the US government plans to use including Windows and commercial products. They did an evaluation and turned it over to Microsoft. It’s unclear how much time passed between the NSA’s discovery of the bug and Microsoft’s patch.

Neuberger says the agency routinely finds vulnerabilities but with respect to the reporting process, “we’re working to do several things differently along the way.” The NSA follows the vulnerabilities equities process (VEP), which is used by the federal government to determine how to treat vulnerabilities on a case-by-case basis: should they be disclosed to the public to improve computer security, or should they be kept secret for offensive government use? VEP was created between 2008-2009; the government publicly disclosed the process in Nov. 2017.

Virtu’s Ackerly says this shift is the next step of a gradual change he noticed during his time with the NSA. Neuberger has coordinated with other agencies and counties, where her counterparts spoke to the value of public engagement. Now we’re seeing the NSA move forward on this.

Will see more vulnerability reports from the NSA? “We’ll approach each situation on its own merits,” Neuberger said in response.

But Don’t Stop Patching There

Microsoft today also disclosed multiple Windows RDP bugs. CVE-2020-0609 and CVE-2020-0610 are critical Windows RDP Gateway Server remote code execution vulnerabilities that exist when an unauthenticated attacker connects to a target system using RDP and sends specially crafted requests. Both are pre-authentication and require no user interaction; to exploit them an attacker would need to send a specially crafted request to a target system’s RD Gateway via RDP. The two vulnerabilities affect Windows Server 2012 and newer.

There is also CVE-2020-0611, a Remote Desktop Client RCE vulnerability that exists when a user connects to a malicious server. An attacker would first need to have control of the server and then convince a user to connect via social engineering, DNS poisoning, or a man-in-the-middle attack. If successful, they could execute arbitrary code on the connecting machine and install programs; view, change, or delete data; or create new accounts with full user rights. This bug affects Windows Server 2012 and newer, as well as Windows 7 and newer.

The Cybersecurity and Infrastructure Security Agency (CISA) is unaware of active exploitation of these vulnerabilities, officials wrote in advisory AA20-014A. Organizations are advised to prioritize patching for mission-critical systems, internet-facing systems, and networked servers.

Related Content

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “6 Unique InfoSec Metrics CISOs Should Track in 2020.”

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/microsoft-patches-windows-vuln-discovered-by-the-nsa-/d/d-id/1336807?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple