STE WILLIAMS

I’m the queen of Gibraltar and will never get a traffic ticket… just two of the things anyone could have written into country’s laws thanks to unsanitised SQL input vuln

Exclusive A SQL injection vulnerability on the Government of Gibraltar’s website paved the way for any old Joe to rewrite official web versions of the British Overseas Territory’s laws.

Security researcher Ax Sharma spotted the vuln while poring over the Gibraltar government’s visa rules, which he accessed from the Gibraltar Borders and Coastguard Agency website.

A malicious person using the information exposed by the government website could have deleted and uploaded PDF files to the official online repository of Gibraltar’s laws.

Gibraltar gov editable laws

See the “modify” and “delete” links at the bottom of the page? All you needed to make those work were the site login details – and protections around those were trivial to bypass

Such people, using a freely downloadable software suite, could have abused the vulnerability to alter online versions of laws. In the digital era, laws published on government websites are treated by the wider world as official and binding even though their master versions tend to be hard copies stored in parliaments.

Although the Gibraltar Government has pulled the affected webpages offline, the incident will be a timely reminder to sysadmins that basic SQL hygiene and security practices remains as important as ever.

Gibraltar's border agency website

Gibraltar’s border agency website

Until last Friday, the link on the left (in the above picture) to the Immigration Act led to another page with a search form. That form did not sanitise user inputs to prevent the execution of code – and a single ' character input as a search term (an error-based injection) returned an error page confirming that fact, as well as links titled “modify/delete” presented on public-facing webpages for each individual law.

Using open-source penetrating testing tool sqlmap, Sharma was able to view all the tables and database information powering the law-hosting site. One such table, named giblaws_giblaws.user immediately caught his eye.

He told El Reg: “The table contained names of staff members, usernames and password digests, etc,” adding: “sqlmap’s in-built digest-cracking tool easily cracked one of the passwords in 1 second!”

A screenshot of the Gibraltar Government's laws website user database, captured by Ax Sharma

A screenshot of the Gibraltar Government’s laws website user database, captured by Ax Sharma

That password, said the security researcher, was six numeric digits: “perhaps a date of birth”. Using those details, it would have been a trivial exercise to log in and use the account’s privileges to edit the website’s contents.

Although one would hope the Gibraltar Government maintains access and change controls as well as site content monitoring that would have allowed it to instantly spot such tomfoolery, El Reg can only speculate.

A Gibraltar government spokesman thanked Sharma for “pointing out the vulnerabilities” and said: “This matter has now been dealt with and the major vulnerabilities have been mitigated. However, within the next couple of days, this section of the website will, in any event, be relocated to an entirely new website.”

Old URLs previously leading to pages of laws currently go to 404 “not found” pages. The spokesman continued: “It should also be noted that the Government of Gibraltar website is hosted outside our corporate network and therefore the earlier vulnerabilities posed no risk to the security of the government’s communication systems.”

It is worth noting that running sqlmap on someone else’s machine without their permission could constitute an offence under the UK’s Computer Misuse Act 1990.

Strangely, the spokesman did not comment on the possibility of anyone being able to edit laws at their leisure. Political custom is that such things normally involve politicians, brown envelopes and considerable amounts of time and effort.

Sharma’s detailed findings are set out on his Medium blog. ®

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/01/07/gibraltar_sql_vuln_allowed_law_editing/

Wheelie bad end to 2019 for Canyon Bicycles as hackers puncture IT systems

German cycle-maker Canyon Bicycles GmbG has confirmed it was the victim of a security break-in over the holiday period that has all the hallmarks of a ransomware attack with parts of the infrastructure padlocked by the perpetrators.

The digital burglars gained access to IT systems “shortly before the turn of the year”, the bike maker said in a statement (PDF): “Software and servers were encrypted and thus locked in places.”

The website remained unaffected, meaning that online orders were placed as normal, it added, and that attack had been “identified and stopped” to the best of its “current state of knowledge.”

“The attack shows massive criminal intent,” said Canyon founder and CEO Roman Arnold. “Due to the encryption of our IT infrastructure, work and business processes were temporarily massively affected.”

The Koblenz HQ in west Germany and nearly all of the international operations were directly impacted, with the exception of the US subsidiary because it runs a separate IT system.

Arnold made no reference to ransomware, if a ransom has been demanded, the size of the ransom or if it had been paid. The Register called the UK operations to pose these questions but was told by the head of customer services that no further comment will be made.

“It is a very sensitive business-related matter,” the rep said.

We have also emailed a bunch of questions to the HQ in Germany as no telephone number is available.

The CEO did say that Canyon expects delays to customer orders and delivery in the next few weeks but it making “every effort” to lessen the impact on punters “get back to normal operations as quickly as possible.”

“We regret this incident very much and apologise that Canyon us currently not able to offer its usual standard of service,” Arnold added.

Since the incident occurred, Canyon said it has worked closely with local and state criminal investigators, and has informed the commissioner for the state of Rhineland-Palatinate. The company said: “Criminal charges will be filed against the perpetrators.”

“Experts from the fields of IT, forensics and cyber security were able to quickly analyse and control the attack and have already initiated solutions and countermeasures,” Canyon added.

Arnold and his brother Franc, who is no longer involved with the business, set up Radsport Arnold GmbH in 1985 as a supplier of bike components, and in 2001 it changed its moniker and became a finished cycle maker.

In 2016, the firm had to apologise for delayed orders and “missing information” for customers after it implemented a new ERP system and opened a new production site in late 2015. ®

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/01/07/hackers_canyon_bicycles/

Accenture pays for CSS injection from Symantec parent Broadcom: Yep, it bought its cybersecurity arm

Symantec’s parent Broadcom has offloaded its Cyber Security Services (CSS) operation to Accenture for an undisclosed sum.

The unit flogs and provides global threat monitoring and analysis – among other things – via six security operation centres based in the US, UK, India, Australia, Singapore and Japan.

The services, which also include real-time adversary and threat intelligence and incident response, are delivered by Accenture’s proprietary cloud platform.

Some 300 staff are employed by the security services division, and presumably most, if not all, will shuffle off to their new employer in March, when the buy clears. It is currently subject to closing conditions.

Cue the canned statement from Accenture Security’s senior MD, Kelly Bissell, who talked about organisations facing an “unprecedented volume of cyber threats that are highly sophisticated and targeted to their businesses, and they can no longer rely solely on generic solutions.”

Symantec’s CSS reckons it has services for sectors including utilities, financial, media, health, comms, media, technology and retail.

For its part, Accenture has snaffled a bunch of security outfits already that comprise the terribly named Deja vu Security, iDefense, Maglan, Redcore, Arismore and FusionX. The new entrant will join the fold if all goes according to plan.

Symantec was itself consumed by Broadcom last August for $10.7bn (£8.82bn) in cash, joining the same stables as CA and Brocade.

Sources in Symantec’s channel have told The Reg that business via resellers has shrunk in recent months and that many of the faces they knew have left the sales, marketing, and channel account management areas. ®

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/01/07/symantec_parent_broadcom_flogs_cyber_security_services_division_to_accenture/

New Standards Set to Reshape Future of Email Security

Emerging specs and protocols expected to make the simple act of opening an email a less risky proposition

Email is one of the most successful communications media ever invented, and its reach continues to grow. Almost 300 billion emails are sent worldwide every day, and the number of worldwide users continues to grow at a rate of 3% per year. By 2020 there will be 4 billion active users of email — more than half the planet’s population — according to the Radicati Group, which tracks email usage worldwide. 

Unfortunately, email is unprepared for today’s threats, because it was designed nearly 40 years ago when its eventual global reach and security challenges were unimaginable. Decades of work by the email industry has largely contained spam, but phishing and email-based malware remain enormous threats, with email involved in over 90% of all cyberattacks, according to various estimates. Email vulnerabilities have even played a disruptive role in elections, such as in the 2016 hack of the Democratic National Committee’s email (done via spear phishing email) and in 2018 attacks on Florida election officials. 

That’s why email insiders are busy developing standards aimed at addressing email’s most glaring weakness: that anyone can send email as anyone else. This lack of a strong sender identity model has created an epidemic of spoofing that doesn’t exist through other messaging applications that have strong sender identity controls. In other words, when you get a Facebook message, a WhatsApp message, or a Twitter DM, you can be fairly sure of who the sender actually is. But there are no such assurances in email, and that’s why there are 6.4 billion spoofed emails sent every day, according to a research report from Valimail.

With stronger sender identity protections in place, we can eliminate these fakes. Email will be more trustworthy and better able to support advanced capabilities. And that’s exactly what a variety of standards groups are focusing on. The gold standard for strong sender identity in email is DMARC, and the standards shaping the future of email are increasingly requiring it. Here are some of the new email standards improving sender identity and security for the entire ecosystem.

DMARC 2.0
Domain-based Message Authentication, Reporting Conformance has been an unofficial but widely accepted standard since 2015. It provides a way for domain owners to control which senders are allowed to send email using their domain. DMARC is accepted and enforced by about 80% of the world’s email inboxes, has been growing exponentially among domain owners, and the Internet Engineering Task Force (IETF) is working to make it an official standard. It’s too soon to know exactly what the next version of DMARC will include but it’s safe to say that it is fast becoming part of basic security best practices, along with firewalls and SSL/TLS encryption on websites.

BIMI
Brand Indicators for Message Identification is a way for brands to specify images that appear alongside the authenticated email messages they send. Once their domains are authenticated with DMARC (with an enforcement policy), they gain the ability to display logos with their messages in place of the default avatars most inboxes show. Verizon Media is already running a pilot of BIMI in Yahoo Mail, and Google plans to run its own pilot in 2020. BIMI’s offer of brand impressions is a big incentive for marketers, which will drive many organizations to deploy DMARC in order to reap that benefit — and wider usage of DMARC will mean more trustworthy email overall for everyone. 

AMP for Email
AMP is a framework for accelerating web page load times. AMP for Email creates the possibility of building interactive applications in AMP that live right inside the inbox — no need for users to click out to a separate web page. It includes provisions for authenticating senders and encrypting data in transit, which should alleviate security concerns, while opening up a wide range of possibilities for email-based application design. 

Schema.org for Email
Schema.org is a collaborative, decentralized project creating data ‘”schemas” for different types of structured data, such as informational listings for people, places, and businesses; calendar events; audio and video objects; books; and even recipes. These lightweight metadata frameworks create a common baseline for applications to ingest and use this data. In email, Schema.org-encoded data can simplify integrations: For instance, if you get an order confirmation from a retailer, a Schema.org-formatted email could contain dynamically updated information on its shipping progress. 

STARTTLS and MTA-STS
STARTTLS is an email security protocol that enables email clients and servers to exchange data in encrypted form, using TLS (Transport Layer Security) or SSL (Secure Sockets Layer) if they are available. This is akin to HTTPS for web pages: It ensures that messages are encrypted in transit. MTA Strict Transport Security (MTA-STS) is a related standard that takes this a step further, and can require authentication checks and encryption for connections between mail servers, which helps prevent any unencrypted data from being transmitted and thwarts man-in-the-middle attacks. In combination with DMARC, which assures the sender’s identity is legitimate, these two protocols further improve security for the “hidden plumbing” that makes email work.

As these standards gain acceptance, with strong and widely deployed sender identity, email will become more interactive and more secure for all users. Already a vital communications channel for more than half the planet, it will evolve into an even more engaging, ubiquitous platform for B2B and B2C communications, and many of the problems we currently face with phishing and BEC will fade away. 

That won’t be easy. It will take a lot of effort by many different organizations and individuals. But the groundwork has been laid, and the benefits will be immense, so there is every reason to think that email is going to continue improving – and growing. Email isn’t going away. It’s only going to empower richer experiences and get bigger and better through the process.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff.”

Seth Blank is the chair of the working group developing BIMI, the secretary of the IETF working group developing DMARC, and an active contributor to many email industry groups. He is the director of industry initiatives at Valimail. View Full Bio

Article source: https://www.darkreading.com/application-security/new-standards-set-to-reshape-future-of-email-security/a/d-id/1336683?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Insight Partners Acquires Armis at $1.1B Valuation

This deal marks the largest-ever acquisition of a private Israeli cybersecurity company, Armis’ co-founders report.

Enterprise Internet of Things security company Armis has agreed to be acquired by US private equity firm Insight Partners for a valuation of $1.1 billion. CapitalG, the investment division of Google parent company Alphabet, also join for $100 million. The deal is expected to close in February.

Armis was co-founded in 2015 by CEO Yevgeny Dibrov and CTO Nadir Izrael. Since then, the company has raised $112 million over four funding rounds and grown to include more than 250 employees. Its agentless platform aims to discover all the devices on a corporate network and identify their type, manufacturer, model, operating system, reputation, username, software, and risk factors, among other data. By tracking behavior and connections, it aims to determine whether a device is acting maliciously.

Gartner anticipates the number of connected devices will reach 25 billion by 2021, creating a challenge for organizations that need to handle them. Unmanaged devices with poor security represent a rapidly growing attack landscape. Armis’ customer base includes organizations across vertical industries, including healthcare, high tech, industrial, retail, and transportation.

Following the deal, Armis will continue to operate independently and be fully management by Dibrov and Izrael, along with its executive team. Under Insight, Armis will work to continue along its growth with the support of Insight’s business strategy and ScaleUp division, Onsite.

Read Armis’ blog post here and the full release here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/insight-partners-acquires-armis-at-$11b-valuation/d/d-id/1336732?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Accenture to Buy Symantec’s Cyber Security Services

The purchase, for an undisclosed amount, is scheduled to close in March.

Accenture has announced that it will purchase Symantec’s Cyber Security Services business from Broadcom. The acquisition will add Symantec Cyber Security Services’ portfolio of services, including global threat monitoring and analysis, real-time adversary, and industry-specific threat intelligence and incident response services to that of Accenture Security.

The acquisition is the latest in a series of purchases Accenture has made, including those of Deja vu Security, iDefense, Maglan, Redcore, Arismore, and FusionX. In its fiscal year 2019, Accenture spent approximately $1.2 billion globally on 33 acquisitions.

Financial terms of the deal to acquire Symantec Cyber Security Services were not disclosed. The purchase, subject to customary closing conditions, is expected to close in March 2020.

For more, read here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/application-security/accenture-to-buy-symantecs-cyber-security-services-/d/d-id/1336733?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Car Hacking Hits the Streets

The top-three carmakers sell only connected vehicles in the United States – and other manufacturers are catching up – creating a massive opportunity for attacks, which black-hat hackers are not overlooking.

(image by Tomasz Zajda, via Adobe Stock)

In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks, according to a report released by cybersecurity firm Upstream Security. 

The company documented 176 digital, electronic, and cyberattacks aimed at vehicles in 2019, more than double the 78 attacks from the previous year. The incidents ranged from stealing cars by hacking keyless entry fobs to tracking trucks by compromising online fleet services. For the second year in a row, malicious actors conducted more attacks against vehicle systems than security researchers and white-hat hackers, a trend that is unlikely to reverse, says Dan Sahar, vice president of products for Upstream Security.

“The ‘Charlie Miller days,’ where it is only researcher activity — that’s behind us,” he says. “We are seeing hackers with criminal intent now the most significant actor going after vehicles.”

Since 2010, Upstream has compiled data on 388 digital, electronic, and cyberattacks, more than 45% of which occurred in the last year. In April, for example, a hacker found that two GPS services, ProTrack and iTrack, configured accounts with a default password, which many users had not changed, allowing him to access 27,000 accounts between the two services. Access to the accounts reportedly could have been used to remotely turn off an engine, if the car was moving at 12 mph or slower.

The weak passwords were found by a white-hat hacker, but, increasingly, breaches and attacks are fueled by criminals — 57% of attacks are malicious, Upstream found. In one criminal attack, a video shows car thieves stealing a Tesla in less than 30 seconds using a keyless-entry bypass. In another, nation-state attackers linked to Vietnam stole information on 3.1 million Toyota customers.

While attacks that take down entire fleets of cars are theoretically possible, most attacks have focused on crimes that have a payoff in the end: either the theft of the vehicle, as in the Tesla case, or the accessing of consumer information, as happened to Toyota, says Sahar.

“What will likely continue to happen are attacks more in the lines of service disruption,” he says. “Less about threatening human safety but still cause them to feel the impact. Companies that can no longer turn on the engines across their fleet of trucks, for example. Or consumers not being able to unlock their cars in the morning.”

The surge in incidents, which more than doubled in 2019 from the previous year, is due to the proliferation of connected and embedded systems in vehicles as well as the research that has laid the ground for many of the attacks. 

When two researchers — Charlie Miller and Chris Valasek — demonstrated in 2015 that a Jeep could be hacked while it was going 70 mph on the highway, connected cars were still relatively rare. That’s set to change.

Already, the top-three carmakers in the US — GM, Toyota, and Ford — plan to sell only connected cars this year, according to a report by the nonprofit Consumer Watchdog. Those three companies make up more than half of cars sold in the United States. Others car manufacturers are on track move to 100% of their vehicles connected to the Internet in the next five years.

Most attacks focus on the keyless entry system (30%), the application servers for the service (27%), the mobile application for the service (13%), or the onboard diagnostic port used by mechanics to service the vehicle, according to Upstream’s report. While keyless attacks, which allow thieves to steal a car, are an easy way to monetize a vulnerable system, because the technique requires proximity, it can only affect a single car at a time. Server attacks, however, could affect millions of cars, Upstream stresses.

“When someone gains access to a telematics server, they then have access to everything connected to it, including apps, data, and all the connected vehicles,” the company stated in its report. “This can lead to multi-vehicle or fleet-wide attacks, which are extremely risky to all parties involved, from OEMs to telematics service providers, and companies who manage fleets to the drives themselves.”

Because there is little that consumers can do to secure their cars, the manufacturers have to step up. They have done so somewhat slowly. The industry created its own information sharing and analysis center in 2016, and many companies have started paying for vulnerability information. Tesla kicked off a bug bounty program in 2014. General Motors followed suit in 2016, Toyota in 2018, and Ford just last year.

“Security is something that car companies are investing more budget in,” Sahar says. “Because consumers do not have the capabilities to protect themselves, it is a big responsibility of the OEMs, the carmakers, and the fleet providers to also focus on security.”

Related Content

 

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?”

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/edge/theedge/car-hacking-hits-the-streets/b/d-id/1336730?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

US military branches ban TikTok following Pentagon’s warning

Last month, the Pentagon told US military to steer clear of what it sees as a national-security landmine: the singing/dancing/jokey TikTok platform.

Tell your Department of Defense employees not to download it, and wipe it if it’s already on their devices, the Defense Information Systems Agency recommended.

Some military outfits have snapped to attention and heeded the call. A number of military branches in the US have now banned the popular Chinese-owned social media app on government-issued smartphones, and some have even discouraged members of the armed forces from using it on their personal devices.

From an email sent on Friday by Marine Corps spokesman Capt. Christopher Harrison to the New York Times:

Marine Corps Forces Cyberspace Command has blocked TikTok from government-issued mobile devices. This decision is consistent with our efforts to proactively address existing and emerging threats as we secure and defend our network. This block only applies to government-issued mobile devices.

In December 2019, the Air Force amn/nco/snco Facebook page posted an email from Naval Network Warfare Command that called TikTok a “cybersecurity threat” and told users to uninstall it from their iPhones and iPads:

TikTok is a cybersecurity threat. Users are instructed NOT to install the application on their mobile device. DO NOT install Tiktok on your Government furnished mobile device. If you have this application on your device, remove it immediately.

The response of one Facebook user: “It’s amazing they actually have to be told not to do this.”

An Air Force spokeswoman noted that it’s not just TikTok that has the military worried:

The threats posed by social media are not unique to TikTok (though they may certainly be greater on that platform), and DoD personnel must be cautious when making any public or social media post.

All DoD personnel take annual cyber-awareness training that covers the threats that social media can pose, as well as annual operations security training that covers the broader issue of safeguarding information.

Removing TikTok won’t keep information out of China’s hands, the Pentagon said in its 16 December message, but at least it will plug whatever leaks to Beijing are now happening:

Doing so will not prevent already potentially compromised information from propagating, but it could keep additional information from being collected.

TikTok’s many attempts to smooth it all over

TikTok has tried to soothe US fears about censorship and national security risks, including a reported plan to spin TikTok off from its parent company.

In November, Vanessa Pappas, the general manager of TikTok US, wrote that data security was a priority, reiterating what TikTok has repeatedly claimed: that all US user data is stored in the US and that TikTok’s data centers are located “entirely outside of China.”

That and other attempts to allay concerns came after the US opened a national security review of TikTok owner Beijing ByteDance Technology Co’s $1 billion acquisition of the US social media app Musical.ly in 2017. ByteDance combined Musical.ly with a Chinese app called Douyin and put it under a new brand: TikTok. The Committee on Foreign Investment in the United States (CFIUS) is currently probing the app for possible national security risks.

In October, Senators Tom Cotton and Chuck Schumer had written to Acting Director of National Intelligence Joseph Maguire, asking that the intelligence community please look into what national security risks TikTok and other China-owned apps may pose.

The senators pointed out that TikTok has been downloaded in the US more than 110 million times.

But we’re all about fun-fun-fun

Look, guys, we’re not about kowtowing to the Chinese government. We’re dedicated to entertainment and creativity, Pappas said in her post. The company denied ever having been asked by the Chinese government to remove content and said it “would not do so if asked. Period.”

But how, the senators asked, would we even know if that were true? As it is, there’s no legal means to appeal a content removal request in China, they pointed out. Instead, we’re dealing with China’s “vague patchwork of intelligence, national security, and cybersecurity laws [that] compel Chinese companies to support and cooperate with intelligence work controlled by the Chinese Communist Party.”

In October, facing the hostility on Capitol Hill, TikTok said that it was pulling together a bunch of lawyers to review its content moderation policies on a range of topics, including child safety, hate speech, misinformation, and bullying – just like American companies such as Facebook and YouTube have done.

The latest: the transparency report dance

The announcement about a panel of experts coming on board was seen as yet another attempt to placate the US government. Last week, it tried once more to soothe US fear and loathing: on 30 December, TikTok released its first-ever transparency report.

The report reveals the number of requests TikTok received from local regulators during the first half of 2019, including government requests to access user information (including emergency requests) and requests for content removal. India topped the list, with 107 demands for user information, followed by the US with 79 requests and Japan at 35.

Besides the big askers, more notable still is the country that the report lacks: China.

That’s not surprising. TikTok doesn’t actually exist in China, where its Chinese equivalent, Douyin, holds sway. As of July, Douyin claimed to have 320 million daily active users.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/-aP1_y68iB8/

Here we go again: Software nasties slip into Google Play, exploit make-me-root Android flaw for maximum pwnage

At least three malicious apps with device-hijacking exploits have made it onto the Google Play Store in recent weeks.

This is according to eggheads at Trend Micro, who found that the since-removed applications were all abusing a use-after-free() flaw in the operating system to elevate their privileges, and pull down and run further malware from a command-and-control server. The malicious apps were Camero, FileCrypt, and callCam, so check if you still have them installed.

“The three malicious apps were disguised as photography and file manager tools,” said Trend researchers Ecular Xu and Joseph Chen on Monday.

“We speculate that these apps have been active since March 2019 based on the certificate information on one of the apps.”

The exploited programming blunder was CVE-2019-2215, a use-after-free() vulnerability present in the inter-process messaging system of the Android kernel, specifically in binder.c. Successful exploitation of the flaw allows a local app to execute arbitrary code on the infected gizmo with kernel-level privileges, aka God mode.

It is not clear how many times the apps had been installed, though the reach may have been minimal as a screencap for Camero lists its installs at “5+”.

Interestingly, while the apps themselves have been available since March 2019, the fix for CVE-2019-2215 was only posted in the October 2019 Android security update. However, the exploit for that vulnerability may have been added after March, such as when the hole was first disclosed.

Android logo

Google: We caught a Russian state hacker crew uploading badness to the Play Store

READ MORE

According to the researchers, exploitation occurred when a victim downloaded either Camero or FileCrypt Manager. The supposedly legitimate apps contacted a command and control server from which they download a pair of files that, in tandem, exploited CVE-2019-2215 to gain kernel-level privileges and installed the final piece of the scheme, the callCam app.

The callCam tool is able to collect device hardware information as well as location, installed apps, and data from specific applications like WeChat, Outlook, Twitter, Yahoo Mail, Gmail, and the Chrome browser. The pilfered data is then stored as an encrypted file for upload at a later time.

It is believed that, based on the command and control servers, the group behind the infections is the SideWinder crew, a hacking operation active since 2012.

The team is believed to have largely targeted government and military systems in Pakistan and has until now relied mostly on exploits and malware for Windows PCs. ®

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/01/07/nasty_google_play_apps/

Widely Known Flaw in Pulse Secure VPN Being Used in Ransomware Attacks

New Year’s Eve attack on currency exchange service Travelex may have involved use of the flaw.

VPN provider Pulse Secure on Monday urged customers to immediately apply a security patch if they have not yet done so. The company issued the patch last April to address a critical, remotely executable flaw in some versions of its products.

The advice stemmed from reports over the last few days of attackers exploiting the flaw — tracked as CVE-2019-1150 — to deliver ransomware on enterprise systems and to delete data backups and disable endpoint security tools.

Among those believed affected in the ongoing campaign is travel insurance and currency exchange provider Travelex, which experienced a massive service disruption this week following a reported ransomware attack on its systems on New Year’s Eve. The attack, involving the use of ransomware known as REvil (Sodinokibi), forced the company to take all of its systems offline and to resort to manual operations at branches worldwide.

Travelex did not respond immediately to a Dark Reading request seeking an update on the incident.

UK security researcher Kevin Beaumont, who first reported the attacks on Saturday, described at least two organizations as having been compromised so far by recent attacks targeting the Pulse Secure VPN flaw.

“Pulse Secure publicly provided a patch fix on April 24, 2019 that should be immediately applied to the Pulse Connect Secure [VPN],” says Scott Gordon, chief marketing officer at Pulse Secure. “Do not delay as the CVE-2019-1150 vulnerability is highly critical,” he warns.

The flaw in multiple versions of Pulse Connect Secure and Pulse Policy Secure gives remote attackers a way to connect via HTTPS to an enterprise network without needing any valid username or password. Attackers can use the flaw to view logs and files, turn-off multifactor authentication, download arbitrary files, and execute malicious code on enterprise networks,

The security vulnerability is one of several that were discovered last year in VPN products from Pulse Secure, Palo Alto Networks, and Fortinet. Flaws like these are considered especially dangerous because they exist in the products that enterprises rely on for protection against cyber threats. Pulse Secure and numerous others have repeatedly urged organizations with vulnerable systems to apply the patch as soon as possible.

Exploits for the vulnerability have been freely available since at least last August. Both the NSA and the US Department of Homeland Security have issued separate advisories on the VPN flaws and warned about nation-state-backed advanced persistent threat groups exploiting them to take control of vulnerable systems.

Despite the warnings, a substantially large number of Pulse Secure’s affected products remain unpatched and vulnerable to attacks. According to threat intelligence firm Bad Packets, at least 3,825 Pulse Secure VPN servers remain unpatched and vulnerable to attack as of January 3, 2020. More than 1,300 of the vulnerable systems are located in the United States. According to Beaumont, Travelex had seven unpatched Pulse Secure servers when it was attacked on New Year’s Eve.

“We estimate that nearly 90% of Pulse Secure VPN systems have been patched, and some of those systems are not in active production,” Gordon says. Back in August, when Bad Packets conducted an Internet scan, it identified 15,000 servers at risk to the vulnerability, he notes.

Gordon says that Pulse Secure has made its support engineers available on a 24/7 basis, including weekends and holidays, to help customers who need assistance to apply the patch fix. Patch assistance is available even to customers that are not currently under an active maintenance contract, he says.

“Any vulnerability in the remote access of a network is a big deal,” says Chris Morales, head of security analytics at Vectra. Any remotely executable VPN vulnerability — especially one that gives an attacker the same level of access as an approved remote user, should have been addressed immediately, he says. “I don’t know all the variables at play specific to Travelex. However, it is a shame that vulnerability management and patching are still difficult to do.”

Colin Bastable, CEO of Lucy Security, says attacks like the one on Travelex highlight the enormous challenges organizations face in addressing threats to the network. “There are too many moving parts in modern IT infrastructure for the IT Team to manage, especially with global businesses,” he says. “Playing defense is always harder than playing offense, because someone, somewhere, or some server, will fail to get the memo and miss or misapply the patch.”

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple