STE WILLIAMS

Browser data leakage bug – Mozilla to delete info just in case

Mozilla published an unexpected security patch this week, bumping Firefox up to version 57.0.3.

(You probably weren’t expecting a browser update between Christmas and New Year, but it’s good to know that security fixes don’t take second place in holiday season.)

Officially numbered Bug 1427111, the good news is that this wasn’t a vulnerability that gave crooks the ability to launch an attack, implant malware, or rootle around for personal data on your hard disk.

It was, however, an ironic bug: if Firefox hit a bug and crashed, it could then hit another bug and upload crash report data even if you’d told it not to.

Technically, this counts as data leakage, but because the data was sent directly from your browser to Mozilla’s servers, rather than to somewhere unknown or unpredicatable, we’ll accept that the risk was modest:

Fix a crash reporting issue that inadvertently sends background tab crash reports to Mozilla without user opt-in

As bugs go, this one doesn’t sound terribly serious – not least because many users have Mozilla’s crash reporting turned on anyway, as a way of helping the development team.

You can check your own settings on the about:preferences#privacy page, in the section about data collection:

However, as Mozilla notes, there is a small risk of personal data escaping in a crash report, not least because the information uploaded comes from the memory space of a program that has already misbehaved by crashing in the first place:

[W]e need to be mindful that crash dumps contain the contents of the crashing tab. With low frequency they may contain private or identifying information.

That’s why some users (we’re amongst that number) err on the side of caution and deliberately turn off crash reporting, for all that it might benefit the community to have it enabled.

And therein lies a dilemma for Mozilla: the organisation may already have collected data that wasn’t supposed to be uploaded, something that this update can’t reach back in time and fix.

Worse still for Mozilla, it can’t now tell which crash dump data was collected on account of the bug, and which of it was collected with consent.

Mozilla has therefore said it aims to get rid of information it’s not sure it ought to have collected, writing that “[o]ur goal is to have this data deleted in the next ten days”.

We think that’s a silver lining to this bug.

After all, we’ve seen mailing lists ask for ten days to remove us from their address database when we’ve unsubscribed – and that includes mailing lists that didn’t ask for permission to add us in the first place – without even offering to remove any else they might know about us at the same time.

What to do?

  • To check that Firefox is up to date, and to trigger an update if it isn’t, just go to the About Firefox menu option.
  • To revisit your chosen settings for crash reports, put the special URL about:preferences#privacy into the address bar.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/4u_TucIPF8I/

Holiday Fun #3: It’s (never) too late to learn long multiplication!

So far this week we’ve looked at Question 1 and Question 2 in our holiday-fun suggestions for technodiversions you might like:

  1. Install a non-mainstream operating system. Because you can.
  2. Fool around with software you used to love. No one will know.
  3. Rewrite a well-known algorithm from scratch. Prove you can still code.

Today, it’s time to consider Question 3:

You settle down to rewrite a well-known algorithm from scratch, to prove you can still code. Which do you choose?

Modular exponentiation
Quicksort
Conway’s Game of Life

Let’s start at the beginning…

Modular exponentiation

One good reason to learn about modular exponentiation is that it’s a very handy algorithm in cryptography.

Indeed, modular exponentiation can be used to agree on a secure, secret encryption key with someone else, even if you have to use a public, insecure network for your communication. (Look for Diffie-Hellman-Merkle, also abbreviated to Diffie-Hellman or just DH.)

The trick is that modular exponents are easy – or, at least, fairly easy – to calculate, but as good as impossible to reverse.

If you remember your school mathematics, exponentiation is repeated multiplication; the inverse (the operation that gets you back where you started) is a logarithm, or log for short.

For example, 2 to the power 3 is 2×2×2, and works out to be 8 (23 = 8, for short); going backwards, we say that the logarithm to the base 2 of 8 is 3 (log28 = 3).

In general, if bE = Y, then logbY = E.

(The base is the number at the bottom – the value than gets multiplied by itself over and over – and the exponent it’s raised to is the elevated number above the base – the number of repeated multiplications you need to do.)

Calculating 23 in your head is easy, but working out log28 is much trickier.

In fact, it’s easiest to start the other way around and use approximation: keep on multiplying 2 by itself until you hit, or get close to, the answer you’re looking for.

In cryptography, modular exponentiation complicates things still further by dividing the result after each repeated multiplication by a specially-chosen prime number, and taking the remainder, known as the modulus, like this:

Once you add the “take the remainder” step into the exponentiation process, it becomes as good as impossible to reverse the process algebraically: there’s no formula to compute a modular logarithm, so you pretty much have to try every possible input until you hit upon the solution by chance.

In general, if bX mod P = Y, then you can quickly calculate Y given X, but there is no shortcut by which you can solve the equation backwards for X if you are given Y.

How quick is “quick”?

We glibly said above that “you can quickly calculate Y given X“, but just how quick is “quick”?

Let’s ignore the modulus part for now, and just consider the repeated multiplications, given that in cryptographic calculations we aren’t usually multiplying single-digit numbers like 2×2, but dealing with numbers that have hundreds or even thousands of digits.

Most modern computers can only multiply 64-bit values in one go, and typical IoT computers or smartcards may only be able to do calculations 32 bits or 16 bits at a time.

We need to break the multiplication down into chunks we can compute, just as you do in the old-school process of long multiplication.

Long multiplication lets you multiply big numbers such as 745×368 one digit at a time, because:

745 x 368 = 745 x (3x100 + 6x10 + 8x1)
          = 745x3x100 + 745x6x10 + 745x8x1
          = (7x100 + 4x10 + 5x1) x (3x100) + (7x100 + 4x10 + 5x1) x (6x10) + . . .
          = (7x3 x100x100 + 4x3 x10x100 + 5x3 x1x100) + . . . etc.

Multiplying by 10, 100, 1000 and so on is easy (just add the correct number of zeros onto the end), so long multiplication means you replace a single 3-digit by 3-digit multiply with nine 1-digit by 1-digit multiplies.

Here’s how to do long multiplication with pen and paper, if you’ve never seen it before:

That’s approach quick enough for numbers that you might call “biggish”, but you get bogged down fast when the numbers become huge.

For example, using this algorithm to multiply together two 2048-bit prime numbers so you only work on 64 bits at a time means splitting each number into 32 chunks of 64 bits each, and therefore needs 32×32 = 1024 multiplies.

If you have a 32-bit CPU, you’ll need to do 64×64 = 4096 multiplies to produce all the intermediate results, and then do all the necessary addition operations to combine them into a multi-precision result.

In general, the complexity goes up as a the square of the number of digits, which is OK for small numbers but gets sluggish quickly.

Cutting down the work

Multiplication quickly becomes computationally expensive, given that doubling the lengths of the numbers involved (for example, going from 1024-bit cryptographic keys to 2048-bit keys to stay ahead of crackers) will typically quadruple the workload.

Of course, exponentiation with huge powers means lots of multiplying, so anything we can do to reduce the number of individual multiplies will help enormously.

Handily, when it comes to exponentiation, there’s a shortcut based on the fact that we aren’t multiplying together two arbitrary numbers each time – we’re multiplying by the same number (the base) over and over again.

So, we can repeatedly multiply the result of each previous multiplication with itself, instead of multiplying by the base each time:

And that’s the trick known as exponentiation-by-squaring: after N-1 loops, you reach your base to the power of 2N-1, rather than just to the power of N. (Above, after 4 loops we get to 516 on the right but only to 55 on the left.)

And with all the powers of 2 up to 2N-1, you can represent any number up to 20 + 21 + … 2N-1, which just happens to be 2N−1, so you can represent any exponent up to 2N−1, and therefore you can compute your base raised the power 2N−1 with at most N multiplies.

Actually, you need at most 2N multiplies, because you need N multiplies to do all the squaring, plus up to another N multiplies more to combine the various powers to get the result.

But if your exponent has 2048 bits, that means you’ll need at most 2 x log22048 multiplies to get the job done, instead of naively looping round naively 2047 times – that’s a workload of 12/2047, or well under 1% of the effort.

What next?

Unfortunately, there just wasn’t time in this article to deal with the other two algorithms in today’s quiz question, so we’ll have to ask you to wait for us to cover them some time in the New Year.

In the meantime, why not take our Holiday Fun quiz (and watch out for our New Year’s #sophospuzzle crossword, coming soon to Naked Security)?


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/eaCxGKKnyLw/

Fancy a T-shirt? Try our New Year’s #sophospuzzle crossword…

Are you working over the New Year?

Well, whatever you’re up to – but especially if you’re on sysadmin or tech support duty while the rest of us are partying – here’s a bit of fun that looks just like real work but isn’t. (Don’t let on that we said so.)

Presenting the NYE 2017 #sophospuzzle crossword:

“);
else
document.write(“”);
}
document.writeln(“”);
}
document.writeln(“”);

// Finally, show the crossword and hide the wait message.
Initialized = true;
document.getElementById(“waitmessage”).style.display = “none”;
document.getElementById(“crossword”).style.display = “block”;
}

// * * * * * * * * * *
// Event handlers

// Raised when a key is pressed in the word entry box.
function WordEntryKeyPress(event)
{
if (CrosswordFinished) return;
// Treat an Enter keypress as an OK click.
if (CurrentWord = 0 event.keyCode == 13) OKClick();
}

// * * * * * * * * * *
// Helper functions

// Called when we’re ready to start the crossword.
function BeginCrossword()
{
if (Initialized)
{
document.getElementById(“welcomemessage”).style.display = “”;
document.getElementById(“checkbutton”).style.display = “”;
}
}

// Returns true if the string passed in contains any characters prone to evil.
function ContainsBadChars(theirWord)
{
return !/^[a-z-]+$/i.test(theirWord);
}

// Pads a number out to three characters.
function PadNumber(number)
{
if (number = 0) OKClick();
DeselectCurrentWord();

// Determine the coordinates of the cell they clicked, and then the word that
// they clicked.
var target = (event.srcElement ? event.srcElement: event.target);
x = parseInt(target.id.substring(1, 4), 10);
y = parseInt(target.id.substring(4, 7), 10);

// If they clicked an intersection, choose the type of word that was NOT selected last time.
if (TableAcrossWord[x][y] = 0 TableDownWord[x][y] = 0)
CurrentWord = PrevWordHorizontal ? TableDownWord[x][y] : TableAcrossWord[x][y];
else if (TableAcrossWord[x][y] = 0)
CurrentWord = TableAcrossWord[x][y];
else if (TableDownWord[x][y] = 0)
CurrentWord = TableDownWord[x][y];

PrevWordHorizontal = (CurrentWord 0 TableCell.innerHTML != ” ” TableCell.innerHTML.toLowerCase() != ” “)
{
TheirWord += TableCell.innerHTML.toUpperCase();
TheirWordLength++;
}
else
{
TheirWord += “•”;
}
}

document.getElementById(“wordlabel”).innerHTML = TheirWord;
document.getElementById(“wordinfo”).innerHTML = ((CurrentWord WordLength[CurrentWord])
{
document.getElementById(“worderror”).innerHTML = “You typed too many letters. This word has ” + WordLength[CurrentWord] + ” letters.”;
document.getElementById(“worderror”).style.display = “block”;
return;
}

// If we made it this far, they typed an acceptable word, so add these letters to the puzzle and hide the entry box.
x = WordX[CurrentWord];
y = WordY[CurrentWord];
for (i = 0; i LastHorizontalWord ? i : 0));
TableCell.innerHTML = TheirWord.substring(i, i + 1);
}
DeselectCurrentWord();
}

// Called when the “check puzzle” link is clicked.
function CheckClick()
{
var i, j, x, y, UserEntry, ErrorsFound = 0, EmptyFound = 0, TableCell;
if (CrosswordFinished) return;
DeselectCurrentWord();

for (y = 0; y = 0 || TableDownWord[x][y] = 0)
{
TableCell = CellAt(x, y);
if (TableCell.className == “ecw-box ecw-boxerror_unsel”) TableCell.className = “ecw-box ecw-boxnormal_unsel”;
}

for (i = 0; i 0 TableCell.innerHTML.toLowerCase() != ” “)
{
UserEntry += TableCell.innerHTML.toUpperCase();
}
else
{
UserEntry = “”;
EmptyFound++;
break;
}
}
UserEntry = UserEntry.replace(/AMP;/g, ”);
// If this word doesn’t match, it’s an error.
if (HashWord(UserEntry) != AnswerHash[i] UserEntry.length 0)
{
ErrorsFound++;
ChangeWordStyle(i, “ecw-box ecw-boxerror_unsel”);
}
}

// If they can only check once, disable things prematurely.
if ( OnlyCheckOnce )
{
CrosswordFinished = true;
document.getElementById(“checkbutton”).style.display = “none”;
}

// If errors were found, just exit now.
if (ErrorsFound 0 EmptyFound 0)
document.getElementById(“welcomemessage”).innerHTML = ErrorsFound + (ErrorsFound 1 ? ” errors” : ” error”) + ” and ” + EmptyFound + (EmptyFound 1 ? ” incomplete words were” : ” incomplete word was”) + ” found.”;
else if (ErrorsFound 0)
document.getElementById(“welcomemessage”).innerHTML = ErrorsFound + (ErrorsFound 1 ? ” errors were” : ” error was”) + ” found.”;
else if (EmptyFound 0)
document.getElementById(“welcomemessage”).innerHTML = “No errors were found, but ” + EmptyFound + (EmptyFound 1 ? ” incomplete words were” : ” incomplete word was”) + ” found.”;

if (ErrorsFound + EmptyFound 0)
{
document.getElementById(“welcomemessage”).style.display = “”;
return;
}

// They finished the puzzle!
CrosswordFinished = true;
document.getElementById(“checkbutton”).style.display = “none”;
document.getElementById(“congratulations”).style.display = “block”;
document.getElementById(“welcomemessage”).style.display = “none”;
}

// Called when the “cheat” link is clicked.
function CheatClick()
{
if (CrosswordFinished) return;
var OldWord = CurrentWord;
document.getElementById(“wordentry”).value = Word[CurrentWord];
OKClick();
ChangeWordStyle(OldWord, “ecw-box ecw-boxcheated_unsel”);
}

// Returns a one-way hash for a word.
function HashWord(Word)
{
var x = (Word.charCodeAt(0) * 719) % 1138;
var Hash = 837;
var i;
for (i = 1; i

Welcome!

Click a word in the puzzle to get started.

Congratulations!

You have completed this crossword puzzle. Don’t forget to take a screenshot and send it to [email protected] if you want to try to win a T-shirt!

There’s a Sophos T-shirt for the for the first correct solution received, and a T-shirt for a one other successful solver chosen from the rest of the correct answers received in time.

The cutoff for entries to be eligible for a T-shirt is 2018-01-02T12:00T-10 (that’s noon in Hawaii on the day after New Year’s Day).

If you get stuck, try a search engine; if you’re still stuck after that, try following @NakedSecurity on Twitter, and keep your eye on the hashtag #sophospuzzle.

(All we ask is that you don’t spoil it for other people – public hints and teasers are fine, but please don’t blurt out complete answers.)

You are also welcome to email us for hints on [email protected] if you don’t use Twitter, or if you want to keep your hints to yourself.

To try for a T-shirt, take a screenshot when you have finished the puzzle, and email it to us.

Please put the text SOLUTION at the start of the subject line, and let us know in the email if you’re OK with being named amongst the solvers.

You can tell us some or all of: your name, nickname, city, country and Twitter handle – or choose to stay anonymous. (We’ll only use your email address to contact you if you win a shirt – we won’t add you to any mailing lists, honest)

Good luck with your puzzling, and, from the Naked Security team, Happy New Year!

LEADERBOARD


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/HnQrAyIqqCo/

21st Century Oncology Faces $2.3M HIPAA Settlement Cost after Breach

Company to pay US Department of Health and Human Services over potential HIPAA violations after patient medical data was stolen by cyberthieves.

21st Century Oncology and the US Department of Health and Human Services Office for Civil Rights reached a $2.3 million settlement agreement, following a breach of the company’s network SQL database and theft of the medical data and Social Security numbers of millions of patients.

The breach at the company, which provides cancer care and radiation oncology services, is believed to have occurred as early as October 3, 2015, when attackers gained access to a remote desktop protocol from an exchange server within the company’s network. The attackers were then able to access 2.2 million patient medical records and Social Security numbers, according to the Health and Human Services (HHS) department.

The Federal Bureau of Investigation (FBI) notified 21st Century Oncology of the breach in 2015, after an FBI informant had illegally obtained the patient data from an unauthorized third party.

An investigation by the HHS Office of Civil Rights (OCR) determined that 21st Century Oncology did the following:

  • Failed to conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of the electronic protected health information.
  • Failed to implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.
  • Failed to implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
  • Failed to have a written business associate agreement before disclosing protected health information to third-party vendors.

As part of the company’s settlement agreement, which is designed to address potential violations of the Health Insurance Portability and Accountability Act Privacy and Security Rules, 21st Century Oncology will develop a comprehensive correction action plan that will include risk analysis and risk management, workforce education on policies and procedures, and an internal monitoring plan, HHS announced. The company, which filed for Chapter 11 bankruptcy protection in May, received approval of the HHS OCR settlement from the bankruptcy court on December 11.

Read more about the settlement here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/perimeter/21st-century-oncology-faces-$23m-hipaa-settlement-cost-after-breach/d/d-id/1330724?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

17 Things We Should Have Learned in 2017, but Probably Didn’t

The worm has returned and the Yahoos have all been exposed, but did 2017 teach us any genuinely new lessons we shouldn’t already have known?

(Image: studiostoks, via Shutterstock)

Before you make your cybersecurity resolutions for 2018, curl up with some egg nog, sit by a fire, nestle yourself in the comforting sounds of loved ones’ voices in the next room, and spend some time reflecting on all the cybersecurity resolutions you failed to fulfill in 2017, 2016, and 2015. 

Chances are, you make similar resolutions every January 1st. Each year the infosec headlines flood us with new cautionary tales, some trying to teach us the same old lessons. Here are 17 things we should have learned from the horrors of 2017…but probably didn’t: 

1. You need to know what data you have, and where it is.
It seems like a reasonable request. Keep track of the valuable assets people give you, whether that be cash, a lawnmower, or personally identifiable information. Nevertheless, it took Yahoo three years to discover that they’d experienced a data breach of 1 billion accounts in August 2013, and another 10 months to realize that (slight miscalculation) three times as many accounts, in fact every single Yahoo user, were exposed in that incident.  

Credit bureau Equifax also had some trouble discerning the scope of its breach – an incident that not only exposed nearly every American adult to the threat of identity theft, but inspired new calls for stricter regulations on data aggregators. Bolstering that argument: marketing firm Alteryx’s subsequent leak of extremely rich data on 123 million American households, including 248 data fields covering everything from how much they refinanced their home for to whether they prefer dogs or cats.

Breaches like this are what the EU’s General Data Protection Regulation was created for, and with GDPR enforcement actions due to arrive in May 2018, lesson number 1 is something you ought to get hip to right quick. (Bonus tip: don’t set your AWS cloud storage bucket access permissions to “let any AWS user download my database” like Alteryx did.)  

2. How we respond to incidents is just as important as how we prevent them.
Equifax was going to lose some friends when they exposed names, Social Security Numbers, birth dates, and addresses on 145.5 million Americans and 12.5 million Brits. They exacerbated the problem by waiting 40 days to report the incident after discovering it. They made it worse by having a website with poor functionality and conflicting information. Then, Equifax offered victims complimentary credit monitoring – provided, ironically, by Equifax – but only if the victim first provided their credit card number and waived any rights to take legal action against the company. (They later removed this clause, after public pressure.) It was hard to imagine how they could have bungled it worse. 

Until Uber’s news broke. Not only did the company choose to keep their data breach (of 57 million drivers’ and passengers’ data) to themselves for a full year, they paid attackers $100,000 to keep the secret to themselves too (and delete the data, which reportedly appeared on the black market anyway). The behavior was ethically questionable, and the lawsuits quickly started to pile up on Uber; the city of Chicago and Cook County asked for $10,000 per day for every violation of a user’s privacy. 

3. Social Security Numbers should not be used for anything but Social Security.
Apparently this is something that still needs to be said. One of the greatest concerns of the Equifax breach was the release of so many Social Security numbers, which would not be a concern if SSNs weren’t trusted so implicitly so widely, and if they could be reset, reissued, or verified by the Social Security Administration. For some reason, we continue to treat an unchangeable, easily guessable, unverifiable set of nine numerals with the same reverence we treat fingerprints.

4. Radio frequency communications need to be secured.
Interception of radio communications only became an issue about, oh, 100 years ago or so. Maybe we just need to give the manufacturers of radiation monitoring systemspacemakers, and other IoT devices another 100 years to start using encryption (and strong encryption) on their RF protocols. Non-WiFi communications in general need more security love in the IoT world, as the Blueborne vulnerabilities in Bluetooth also attest. On the plus side, security companies are beginning to address these issues, with tools like Rapid7’s RFTransceiver extension for scanning wireless devices outside of 802.11. 

5. ICS/SCADA needs special security treatment
The year began with the discovery that the 2016 electric grid outage in Ukraine was caused by the first malware designed solely for electric grids (called CrashOverride by some, Industroyer by others). By the end of the year, the TRITON malware was disrupting ICS operations even while failing to achieve its true aims. In between, the DragonFly (aka Energetic Bear) APT group was looming over the US power grid, a PLC hack jumped the air gap, and more.

Honeywell survey found that about two-thirds of companies in the industrial sector don’t monitor for suspicious traffic and nearly half don’t have a cybersecurity leader. But don’t sneer at them. Most of the cybersecurity tools currently available are too invasive to be borne in highly heterogenous ICS environments that have little to no tolerance for downtime. 

6. You need to deploy patches faster…no, really.
Equifax was compromised first in May, via the critical Apache Struts vulnerability disclosed in March. When news broke, attackers were already attempting to exploit the vuln and researchers urged anyone using Struts2 to upgrade their web apps to a secure version. Clearly Equifax did not move fast enough.

In fairness, patching is hard, and March to May isn’t that much time for an enterprise Equifax’s size to complete the process. Organizations nevertheless must inject some jet fuel into their patch management processes because the vendors sometimes take their sweet time issuing fixes. Microsoft, for example, didn’t patch a Windows SMB bug until a month after an exploit for it, EternalBlue, was publicly disclosed. The EternalBlue exploit, which enables malware to quickly spread through a network from just one infected host, was soon used in both the WannaCry attacks in May and the NotPetya attacks in June. Despite the terrifying (and highly publicized) nature of WannaCry and NotPetya, a scanner created by Imperva researchers found in July that one of every nine hosts (amounting to about 50,000 computers from what they’d scanned) was still vulnerable to this exploit.

7. The NSA might not be the best place to put your secret stuff.
That EternalBlue exploit used in NotPetya and WannaCry was first stolen from the National Security Agency and publicly leaked by the Shadow Brokers gang last year. Attackers used it, as well as other NSA creations like Adylkuzz, in a variety of campaigns in 2017. Plus, NSA software developer Nghia Hoang Pho pleaded guilty to illegally retaining national defense secrets and bringing them home, where they were subsequently stolen by Russian state-sponsored actors. Although there was no indication that Pho had malicious intentions, he is the third NSA insider in recent years to be responsible for the misappropriation of highly classified information. 

8. Cybersecurity failures are beginning to have significant market impacts … sort of.
The incident at Yahoo – even before the full scope of it was discovered – led the company to shave $350 million off the price when they sold the company to Verizon for a paltry $4.48 billion (about a 7 percent discount). Equifax’s stock price dropped massively in the immediate wake of its devastating and horribly mismanaged breach. By early October, though, it had secured a new deal doing identity verification for the IRS and the stock had nearly recovered. Three months later, the stock is even higher than it was in September.

Security researchers are investigating other ways to use market pressures to improve cybersecurity themselves. Meanwhile, organizations are getting smacked by regulatory fines and legal settlements, like Anthem Healthcare’s record-setting $115 million to settle its 2015 data breach. 

9. Integrity of data (and the democratic process) can be disrupted by more than “hacking.”
Depending upon your definitions of “cybersecurity” and “information security,” you may or may not feel that fighting disinformation is part of your job description, unless there is some kind of hacking or malware involved. Remember, though, that “integrity” is the “I” in the sacred security C-I-A triad, even if confidentiality and availability get most of the attention. So it is worth studying how attackers spread disinformation campaigns, how disinformation have been used to disrupt elections in Ukraine and the US, how attackers use fake social media profiles for malicious purposes, how the FCC’s Net Neutrality public comment process was marred by the influx of millions of comments made with stolen identities, and how social engineering in all its forms succeeds daily. 

10. You really should refresh your DDoS defense and preparation plan.
If you didn’t immediately start reviewing your DDoS defense and response plans after Mirai hit last year, then perhaps news that DDoS attacks doubled this year, averaging eight attack attempts per day, will get you moving. Or attackers’ renewed interest in DNS, like, when they seized control of a Brazilian bank’s DNS infrastructure? Or the fact that WannaCry and NotPetya caused major disruptions to production and operations at companies like Honda and Merck? If not, it’s time to start planning. And don’t forget to take a look at your DNS, and figure out how to protect your cloud resources from ransomware.

11. You can’t escape the effects of political and civil unrest.
Attackers have always capitalized on current events when writing phishing messages, but unrest can also impact disaster recovery plans, security software purchasing decisions, and the culture of the security team. One-third of the over 250 respondents to an informal Dark Reading survey say that the US political climate has already caused them to make infosec-related changes to their business continuity and disaster recovery plan; another 12 percent say they’re considering making such changes. Federal government agencies are removing Kaspersky Lab security software for fear that the security company was influenced by the Russian government, (shortly after President Trump tweeted that he and Russian president Vladimir Putin had “discussed forming an impenetrable Cyber Security unit”). 

12. Infosec workforce diversity is something you should actually care about.
The most mercenary reason cited for increasing the diversity of the cybersecurity workforce is that there are many thousands of unfilled security jobs that need filling, and we’re missing out by not appealing to more women and people of color. There are other, better reasons as well, like treating people with respect, getting the best out of your staff, and, maybe even better understanding an increasingly diverse group of threat actors. Infosec leaders need to take steps to build a path to greater diversity by revisiting hiring practices, making meetings more inclusive and being willing to “have the uncomfortable conversations” that lead to greater understanding and better teamwork. 

13. Bitcoin is awesome, once you take away the part about currency. 
Gee, Bitcoin sure is great for paying ransomare operators and for debating just how much volatility a financial system can bear. But the best thing about it is the platform upon which it’s built: Blockchain. The distributed ledger technology essentially allows for the creation of a list of records, each record cryptographically linked and secured, thereby enabling greater data integrity for all manner of applications. JP Morgan’s CEO Jamie Dimon called Bitcoin “stupid,” but his company got behind Blockchain in a big way this year, announcing Blockchain-based cross-border payment network; IBM released a similar offering. And while you’re doing that, mind your Bitcoin, because cryptocurrencies are already being targeted by DDoSesand mined by botnets, and now the Lazarus Group is in on the act. (You may remember Lazarus Group from its performances in Sony Breach and SWIFT Network Attacks.) 

14. Encryption is great … except when it isn’t.
People love Blockchain partly because of all the crypto packed inside like chocolate chips in a cookie. Our trust in crypto can sometimes be shaken, however, like during one very bad week in October, when it was discovered that secure WiFi sessions could be hijacked by the KRACK vulnerabilities in WPA2 when a factorization bug in Infineon’s TPM chipset had exposed millions of crypto keys to an exploit that would allow attackers to generate a private key from a public key,  and some suspicious individual was scanning up to 25,000 systems a day looking specifically for vulnerable private SSH keys. That made Cloudflare’s little ol’ months-long leak of encryption keys, cookies, passwords, and HTTPS from Cloudflare-hosted sites like Uber and OKCupid seem almost quaint. 

15. Firmware is your problem too.
Itty-bitty concerns like factorization bugs that could render your encryption entirely useless start in the chipset. There were plenty of other hardware and firmware hacks unleashed this year that should also get the infosec pro’s attention, even if they’re more comfortable with software. Like for example the Intel AMT flaw, or the Intel ME vulnerabilities that would give attackers “God mode” even when it’s turned off (US-CERT sent an advisory about that one), or any of the hardware/firmware hacks revealed at Black Hat conferences.

16. No malware does not mean no problem.
Malware is nice, but it’s more easily detectable than some other kinds of attacks. The good old-fashioned con never goes out of style, because social engineering works. Business email and account compromise attacks (BEC attacks) are a good example – total losses to BECs have surged past the $5 billion mark, according to the FBI, and are five times more profitable than ransomware, according to Cisco. And then there are “fileless” attacks. By using malicious macros, manipulating legitimate Windows services for nefarious activity, executing code in memory, using stolen credentials or PowerShell or a variety of other sneaky methods, attackers are evading anti-malware systems by simply not using malware at all.

17. Getting stabbed in the side is a bigger problem than getting stabbed in the back. 
We’ve known for years that attackers can break in through one poorly secured endpoint and laterally move through your network until they access the crown jewels from the inside. While attackers continue to get better at lateral movement, most organizations haven’t done anything to get better at preventing it. With better-managed access controls and microsegmentation, and the use of an automated lateral movement tool to help good guys (and others) quickly find the most vulnerable pathways, organizations might begin to help defend themselves against a variety of attacks, including nightmares like an Active Directory botnet

It isn’t all bad
In summary: there’s no substitute for good hygiene. True, 2017 wasn’t without it’s horrors, but there were a few victories too. The WireX Android botnet was taken down, the Andromeda network of botnets (that helped spread Petya, Cerber and Neutrino) was finally taken down, and although 2018 might be worse, the good news is that CISOs’ salaries are expected to go up again, to over $240,000. Raise your champagne glass to that.

Related Content:

 

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/17-things-we-should-have-learned-in-2017-but-probably-didnt/a/d-id/1330541?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Avoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation

Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks.

It’s official: micro-segmentation has become “a thing.” Enterprise security experts are declaring that 2018 is the year they are going to do it, and do it right. The irreversible movement of critical workloads into virtualized, hybrid cloud environments demands it. Audits and industry compliance requirements make it imperative. News stories of continued data center breaches, in which attackers have caused severe brand and monetary damage, validate it.

Customers tell us (and independent studies confirm) that east-west data center traffic now accounts for most enterprise traffic — as much as 77% by some estimates. As a result, traditional network and host-based security, even when virtualized, doesn’t provide the visibility, security controls, or protection capabilities to secure what has become the largest attack surface of today’s enterprise computing environments. Furthermore, point solutions offered by cloud and premises vendors come up short and add layers of complexity most enterprises can’t afford.

Attackers know this and are exploiting it. (The recent Equifax breach is a prime example.) Today’s attacks are not only for direct gain, but are often launched to covertly harness portions of an enterprise’s compute power to commit other crimes. We’ve seen a shift from “bot-herding” tens of thousands of individual end user computing resources to targeted direct attacks on hybrid cloud data centers, whose compute power far exceeds that acquired by traditional means. Not only is it easier, but hijackers can accomplish their ends more quickly and efficiently in a hybrid environment, given the dearth of native security controls and the average length of dwell time before detection.

Security is ultimately — and contractually — a shared responsibility between the provider and the user. Enterprises must shift their attention from intrusion prevention to securing the workloads and applications themselves.

The Micro-Segmentation Dilemma
In view of this sense of urgency, and agreement that micro-segmentation solves this problem, why is it such a daunting challenge? In conversations with people at dozens of organizations that have tried to implement micro-segmentation, we’ve uncovered some of the more common pitfalls.

Lack of visibility: Without deep visibility into east-west data center traffic, any effort to implement micro-segmentation is thwarted. Security professionals dealing with this blind spot must rely on long analysis meetings, traffic collection, and manual mapping processes. Too many efforts lack process-level visibility and critical contextual orchestration data. The ability to map out application workflows at a very granular level is necessary to identify logical groupings of applications for segmentation purposes.

All-or-nothing segmentation paralysis: Too often, executives think they need to micro-segment everything decisively, which leads to fears of disruption. The project looks too intimidating, so they never begin. They fail to understand that micro-segmentation must be done gradually, in phases.

Layer 4 complacency: Some organizations believe that traditional network segmentation is sufficient. But ask them, “When was the last time your perimeter firewalls were strictly Layer 4 port forwarding devices?” Attacks over the last 15 years often include port hijacking – taking over an allowed port with a new process for obfuscation and data exfiltration. Layer 4 approaches, typical of most point solutions, amount to under-segmentation. They do not adequately limit attack surfaces in dynamic infrastructures where workloads are communicating and often migrating across segments. Attackers exploit open ports and protocols for lateral movement. Effective micro-segmentation must strike a balance between application protection and business agility, delivering strong security without disrupting business-critical applications.

Lack of multi-cloud convergence: The hybrid cloud data center adds agility through autoscaling and mobility of workloads. However, it is built on a heterogeneous architectural base. Each cloud vendor may offer point solutions and security group methodologies that focus on its own architecture, which can result in unnecessary complexity. Successful micro-segmentation requires a solution that works in a converged fashion across the architecture. A converged approach can be implemented more quickly and easily than one that must account for different cloud providers’ security technologies.

Inflexible policy engines: Point solutions often have poorly thought-out policy engines. Most include “allow-only” rule sets. Most security professionals would prefer to start with a “global-deny” list, which establishes a base policy against unauthorized actions across the entire environment. This lets enterprises demonstrate a security posture directly correlated with compliance standards they must adhere to, such as HIPAA. 

Moreover, point solutions usually don’t allow policies to be dynamically provisioned or updated when workflows are autoscaled, services expand or contract, or processes spin up or down — a key reason enterprises are moving to hybrid cloud data centers. Without this capability, micro-segmentation is virtually impossible. 

Given these obstacles, it’s understandable why most micro-segmentation projects suffer from lengthy implementation cycles, cost overruns, and excessive demands on scarce security resources, and fail to achieve their goals. So, how can you increase your chances of success?

Winning Strategies for Successful Micro-Segmentation
Done right, micro-segmentation is very achievable. It starts with discovery of your applications and visually mapping their relationships. With proper visibility into your entire environment, including network flows, assets, and orchestration details from the various platforms and workloads, you can more easily identify critical assets that can logically be grouped via labels to use in policy creation. Process-level (Layer 7) visibility accelerates your ability to identify and label workflows, and to implement micro-segmentation successfully at a deeper, more effective level of protection.

Converged micro-segmentation strategies that work seamlessly across your entire heterogeneous environment, from on premises to the cloud, will simplify and accelerate the rollout. When a policy can truly follow the workload, regardless of the underlying platform, it becomes easier to implement and manage, and delivers more effective protection. 

Autoscaling is one of the major features of the new hybrid cloud terrain. The inherent intelligence to understand and apply policies to workloads as they dynamically appear and disappear is key. 

Finally, take a gradual, phased approach. Start with applications that need to be secured for compliance. Which assets are most likely to be targets of attackers? Which are most vulnerable to compute hijacking? Create policies around those groups first. Over time, you can gradually build out increasingly refined policies down to the micro-service, process-to-process level. 

Related Content:

Dave Klein is Regional Director of Sales Engineering Architecture at GuardiCore. He has over 20 years of experience working with large organizations in the design and implementation of security solutions across very large scale data center and cloud environments. At … View Full Bio

Article source: https://www.darkreading.com/perimeter/avoiding-micro-segmentation-pitfalls-a-phased-approach-to-implementation/a/d-id/1330646?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

China Shuts Down 13,000 Websites for Breaking Internet Laws

The government says its rules are to protect security and stability, but some say they are repressive.

The Chinese government has shut down more than 13,000 websites for breaking Internet laws, reports Xinhua, China’s state-run news agency. These rules and regulations have governed the country’s networks since 2015.

On top of this, 2,200 sites have been called into talks with the Cyberspace Administration of China. Such actions “have a powerful deterrent effect,” says Wang Shengjun, deputy chairman of the Standing Committee of the National People’s Congress, in Xinhua’s report.

China claims its regulations protect national security and stability. Human rights groups feel its harsh Internet laws are repressive, created to block dissent. In its “Freedom on the Net 2017” report, Freedom House called China “the world’s worst abuser of Internet freedom.”

The country, which has more than 731 million people online, has banned thousands of websites, including popular foreign sites Facebook, Google, Twitter, Instagram, and Pinterest. Social media is highly regulated. China limits its citizens to local social platforms Weibo and WeChat.

Despite its restrictive Internet laws, China’s government says it wants to collaborate with other nations as global Internet access continues to grow. Earlier this month, President Xi Jinping told tech industry leaders to “respect cyberspace sovereignty” and said the country will become a partner in establishing a “common future” online as the world becomes increasingly connected.

While China is an extreme example, it’s not the only country ramping up efforts to limit illicit content and propaganda online. A new law in Germany, for example, imposes fines on social media companies for neglecting to remove posts with hate speech. Social firms have pushed back, saying rules could cause unnecessary censorship.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/china-shuts-down-13000-websites-for-breaking-internet-laws/d/d-id/1330723?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Mozilla Issues Critical Security Patch for Thunderbird Flaw

Mozilla released five patches for Thunderbird security vulnerabilities, including one critical buffer overflow bug affecting Windows machines.

Mozilla this week fixed a severe security problem in its open-source Thunderbird email client, which also serves as a client for news, RSS, and chat. The most critical flaw (CVE-2017-7845) is a buffer overflow bug affecting Thunderbird running on the Windows OS.

“A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content,” Mozilla wrote. “This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash.” The same bug was fixed in the Firefox browser earlier in December.

The critical patch was one of five security bugs Mozilla fixed this month. Others include two vulnerabilities rated high, one moderate, and one low. Both of the highly rated security flaws affected the RSS feed. The moderate and low bugs affected RSS and email, respectively.

The latest version of Thunderbird, 52.5.2, fixes all of the flaws. Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/mozilla-issues-critical-security-patch-for-thunderbird-flaw/d/d-id/1330721?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Jailed Hacker Claims Proof He Breached DNC on Russia’s Orders

A Russian national in jail for hacking the Democratic National Committee says a data signature proves he acted on the Kremlin’s orders.

Konstantin Kozlovsky, a jailed Russian who claims he hacked the Democratic National Committee, now says he can prove Russian intelligence ordered him to steal emails released during the 2016 US presidential election.

Earlier this year, Kozlovsky made headlines when his confession to hacking the DNC on Russia’s orders was made public. He was arrested on a separate charge this year, as an alleged member of a hacking group that stole more than $50 million from Russian bank accounts.

In an interview with a Russian television station made public Dec. 27, Kozlovsky reported more details on what he said was an operation led by the Russian intelligence agency FSB to hack the DNC. He claims he planted a string of numbers — his Russian passport and visa number to visit the island of St. Martin — in a generic .dat file. The idea was to give himself a safety net in case those who directed the attack turned on him, he claims.

In other details released this week, Kozlovsky said he collaborated with the FSB to create computer viruses. These were first tested on large Russian corporations and later used on multinational businesses, according to a published McClatchy report.

The report also notes Kozlovsky’s statements are tough to prove because few people know the details of the hack. DNC hired CrowdStrike to investigate the breach; the tech firm had “no immediate comment” on Kozlovsky’s claims about an implanted file, the report states. Further, it continues, the hacker claims he mostly worked from home and the DNC attack was one of many on other nations and the private sector.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/jailed-hacker-claims-proof-he-breached-dnc-on-russias-orders/d/d-id/1330720?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Holiday Fun #2: Relove some old software…

In our holiday quiz, we made three suggestions for techno-geeky diversions you might like to try:

  1. Install a non-mainstream operating system. Because you can.
  2. Fool around with software you used to love. No one will know.
  3. Rewrite a well-known algorithm from scratch. Prove you can still code.

Yesterday, we took at a look at Q1, and the three answers we presented for you to choose from.

Today, it’s time for Q2:

You’re on your own, so you can fool around with software you used to love and no one will know. Which do you choose?

Emacs
TeX (keep it real – no LaTeX allowed)
Leisure Suit Larry in the Land of the Lounge Lizards

To be honest, today’s question is more humorous than serious – not least because two of the software packages listed above are still in widespread use, while the third isn’t, at least not at work.

But here goes, anyway.

Emacs

In simple words, Emacs is a text editor – but don’t call it that, whatever you do, because the name itself is short for Editing MACroS, an extensible environment for building a flexible text editor, among many other things.

Indeed, Emacs does a lot more that just letting you work on files – the GNU Emacs flavour of the app that ships with Apple’s macOS even includes a manifesto about “free” software, accessible by pressing Ctrl-H Ctrl-P. (We used to think that was shorthand for Help/Propaganda, but it seems that it might just be Help/Project.)

Most Emacs implementations are written predominantly in the Lisp programming language, with a small Lisp interpreter at the heart of the software to make it all work.

The Lisp engine inside Emacs makes it extremely extensible, with add-on packages available so you can do everything from reading your email to browsing the internet without leaving the editor at all – indeed, without so much starting up a second program that communicates with Emacs.

If you’re familiar with Microsoft’s DDE (dynamic data exchange), for example, you’ll know that Word and Excel can be loaded load side-by-side and exchange data in real time – but that sort of software integration isn’t the Emacs way.

If Office were like Emacs, you’d have Excel implemented as a set of macros inside Word, or Word written as macros inside Excel – or, better yet, you’d have Word and Excel programmed as macros inside Powerpoint.

As you can imagine, that means a running Emacs instance often isn’t small.

Indeed, you’ll sometimes hear Emacs antagonists telling you that it’s short for Eighty thousand Megabytes And Continuously Swapping. (Actually, the disparaging name started off as “eight megabytes”, back when a megabyte of physical memory would draw breaths of amazement, but we’ve corrected for the current era.)

In the Unix and Linux worlds, the two best-known editors are Vi (short for VIsual editor) and Emacs, and once you’ve settled into one camp or the other, it’s rare to switch sides.

When we polled Naked Security readers on Twitter, this is what we got:

If you’re one of the 15% who use Emacs to this day, please accept our apologies for implying that Emacs is a pile of “old software” that you used to adore but fell out of love with.

And if you’re a Vi user, why not show some holiday goodwill and give Emacs another try? (Only kidding!)

TeX

TeX, which is properly written (and pronounced) as if it were in Ancient Greek, has the middle letter set below the others, just to show what it’s capable of.

The name looks a little bit – but not actually – like this: TEX.

You can tell that a document was typeset using TeX at a glance, because it will look fiercely and proudly scientific, in the fashion of this paper published in the Annals of Improbable Research:

TeX is still enormously popular amongst academics, notably with mathematicians, physicists and computer scientists, not least because of the ease with which it can typeset mathematical formulas and proofs.

Those three disciplines have by far the best parties – especially low-temperature physicists, because someone is bound to show up with a bucket of liquid nitrogen, with two fantastic outcomes: a bubble monster, and on-demand ice cream.

So if you can get yourself invited, be sure to take advantage, but make sure you don’t commit either of these social blunders:

  1. Don’t pronounce TeX as though you were talking about Texas, or even as though you were saying the start of the word technology. Pretend you are talking about a Scottish loch, and add a gentle guttural roll to it, och aye. In the jargon, say it as a voiceless velar fricative.
  2. Don’t refer to TeX as a word processor, or even as a document formatter. It’s a typesetting system. In fact, play ignorant and don’t mention TeX at all. Say, “I love your paper – I see you had it typeset professionally.”

(If you do make either of these mistakes, don’t panic: bring along a bottle of chocolate milk as a backup. A few seconds in the LN2 and they’ll be eating out of your hand. Literally.)

Leisure Suit Larry

We’re not sure quite how to explain this one, so we’ll just show you what the packaging looked like back in 1987, when it came out:

A picture is worth 1000 words, even if they were only 16-bit words back then – that’s all we’re saying.

What next?

Why not take our quiz now – it’s anonymous, and we think it’s fun:


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/VLEWPvxR_xM/