STE WILLIAMS

Microsoft’s memory randomization security defense is a little busted in Windows 8, 10

A Carnegie-Mellon CERT researcher has discovered that Microsoft broke some use-cases for its Address Space Layout Randomisation (ASLR) mechanism, designed to severely hamper hackers’ attempts to exploit security bugs.

The programming blunder is simple: as of Windows 8, a flaw in Microsoft’s system-wide mandatory ASLR implementation meant applications were allocated addresses with zero entropy – in other words, where they were placed in memory was supposed to be randomized, but wasn’t. Windows 10 suffers from the same problem, too.

It means return-oriented programming (ROP) attack code written to exploit vulnerabilities have a much, much higher chance of working and successfully infecting a system than previously expected.

The bug was found by CERT/CC analyst Will Dormann, and was published late last week, here.

Dormann was researching why Microsoft’s equation editor opened Excel to remote code execution (fixed in last week’s patch Tuesday list) when he discovered the ASLR slip-up.

Here’s the summary of the bug:

Microsoft Windows 8 introduced a change in how system-wide mandatory ASLR is implemented. This change requires system-wide bottom-up ASLR to be enabled for mandatory ASLR to receive entropy. Tools that enable system-wide ASLR without also setting bottom-up ASLR will fail to properly randomise executables that do not opt in to ASLR.

It’s important to note that while bad, the bug only affects a subset of applications:

  • Applications forced to used ASLR, via a mandatory system-wide policy, are affected;
  • Applications that opt into ASLR aren’t affected;
  • Applications that never used ASLR aren’t affected either way, of course.

Essentially, system-wide mandatory ASLR requires a feature called system-wide bottom-up ASLR to be enabled. Unfortunately, Windows Defender Exploit Guard nor the deprecated Enhanced Mitigation Experience Toolkit (EMET) don’t switch on that latter part, thus derailing the forced ASLR. Exploit Guard can enable bottom-up ASLR, but doesn’t from the user interface – you have to have to prod around in the registry to flip the switch:

Both EMET and Windows Defender Exploit Guard enable system-wide ASLR without also enabling system-wide bottom-up ASLR. Although Windows Defender Exploit guard does have a system-wide option for system-wide bottom-up-ASLR, the default GUI value of “On by default” does not reflect the underlying registry value (unset). This causes programs without /DYNAMICBASE to get relocated, but without any entropy. The result of this is that such programs will be relocated, but to the same address every time across reboots and even across different systems.

As Dormann tweeted:

As Dormann’s tweet – and his Gist post – describe, sysadmins can set a registry value to force bottom-up ASLR, a wonderful task if you’re in charge of a fleet of machines. So far, Microsoft hasn’t published any fix. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/11/21/microsoft_windows_8_address_space_layout_randomisation_weakness/

Half of Americans Unsure of Online Shopping Safety

Consumers struggle to determine the safety of online shopping websites, putting them at risk for holiday hacking.

Only half of American consumers claim they can determine the safety and legitimacy of online shopping sites, discovered a new survey conducted by the Global Cyber Alliance (GCA) ahead of Cyber Monday.

More than one-third (35%) of the 1,019 respondents say they have stopped online purchases due to security concerns. Fear of being scammed causes 27% of consumers to excessively worry and 12% to lose sleep. Sixty percent have had their machine infected with malware.

The season of giving is also a season of scamming for cybercriminals, who launch more fake websites during the holiday shopping period than any other time of year. Nearly 119,000 unique phishing sites were detected in November 2016, targeting more than 300 brands. The most “spoof-able” sites are Amazon (82%), Walmart (36%), and Target (20%).

Scammers commonly trick victims by designing websites that look like legitimate brand sites but have a different IP address. GCA found nearly 77% of consumers have mistyped a Web address into their browser or clicked a suspicious link, both of which could lead to fake sites.

Read more details here.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/half-of-americans-unsure-of-online-shopping-safety/d/d-id/1330471?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Iranian Nation-State Hacker Indicted for HBO Hack, Extortion

‘Winter is coming,’ DoJ official says of overseas hackers such as the alleged HBO hacker who steal intellectual property from the US.

The US Department of Justice today unsealed an indictment charging an Iranian national with a cyberattack earlier this year against HBO and using the stolen content for $6 million worth of Bitcoin in an extortion scheme.

Iranian resident Behzad Mesri, 29, aka “Skote Vahshat,” has not been arrested by US authorities. According to the indictment says Mesri – who had previously performed hacking for the Iranian military – stole scripts, plot summaries, and other proprietary program information from HBO and leaked some of stolen HBO content online, including information on upcoming episodes of “Game of Thrones” and other programs. He also stole emails from at least one HBO employee, financial files, and online credentials for HBO social media accounts.

“Mesri now stands charged with federal crimes, and although not arrested today, he will forever have to look over his shoulder until he is made to face justice.  American ingenuity and creativity is to be cultivated and celebrated — not hacked, stolen, and held for ransom.  For hackers who test our resolve in protecting our intellectual property — even those hiding behind keyboards in countries far away — eventually, winter will come,” said Acting Manhatten US Attorney Joon H. Kim.

Among the charges Mesri faces are wire fraud, hacking, aggravated identity theft, and extortion-related activity. Read more on the indictment here.

 

 

 

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/iranian-nation-state-hacker-indicted-for-hbo-hack-extortion/d/d-id/1330474?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

A Call for Greater Regulation of Digital Currencies

A new report calls for international collaboration to create more transparency with virtual currencies and track money used for cybercrime.

Alternative payment systems, or “virtual currencies” as the Financial Action Task Force (FATF) has dubbed them, have fueled the exchange of illegal goods and services on the Dark Web. Under the shield of anonymity these currencies have let criminals engage in a growing breadth of illicit activities.

The use of cyberspace for financial activity has expanded opportunities for attackers, writes Tom Kellerman in a new report, “Follow the Money: Civilizing the Darkweb Economy,” an initiative for The Wilson Center’s Digital Futures Project, where he is a global fellow.

The World Economic Forum estimates cybercrime costs the global economy about $445 billion per year, the report states, citing a stat from the McKinsey Global Institute. It’s time for payment systems to be held accountable, according to the report. Many implement Anti-Money Laundering (AML) and Know Your Customer (KYC) protocols, but criminals continue to find workarounds.

“We, as an industry, continue to talk about the symptoms of cybercrime without appreciating the fact that hacking tools and services are all commodities that are facilitated by an economy of scale,” Kellerman explains. “The Dark Web has become a full economy of scale by definition.”

Indeed, the Dark Web has enabled the sale not only of hacking tools, but all types of personally identifiable information and content promotion services to spread disinformation online. While hacking tools can be expensive, data is not: Identity “packages” can cost as little as 25 cents. Criminal markets include weapon and drug sales, child pornography, and hackers for hire.

Bitcoin is among the most well-known virtual currencies but far from the only one; in fact, most cybercrime proceeds are not laundered through Bitcoin, says Kellerman. Internet-based virtual currencies also include the more anonymous Monero, Dash, and Zcash, as well as China’s AliPay, Russia’s WebMoney, and Kenya’s M-Pesa. While these are commonly used for legitimate purposes, they are also “ripe for abuse,” the report says.

“The more anonymous they are, the more likely they are to be used on the Dark Web,” says Scott Dueweke, president at the Identity and Payments Association, who provided insight for the report. Anonymity fuels cybercrime and the movement of currencies across systems.

Kellerman says financial institutions, including alternate payment providers, should be able to prove who their customers are and freeze funds used for crime and conspiracies if needed by law enforcement. “The best way to destabilize the capability of cybercriminals to flourish is to put pressure on their capacity to deliver goods and services,” he explains.

Since 50% of all crimes now have a cyber component, the report states, it’s time to “follow the money” and create an e-forfeiture fund to benefit public and private organizations around the world. The idea is financial institutions can track funds used for illegal purposes, seize it, and reinvest the money in protecting the infrastructure of the global financial system.

As cybercrime is a global problem, it demands an international solution among public and private organizations, says Dueweke. A public-private partnership could build a de facto or industry-led standard for converting money into alternate payment systems.

“This could create a baseline of respectability and standard of trust that doesn’t exist now,” Dueweke explains. There is no standard for companies to prove which customers are using virtual currencies for legitimate purposes, and which are using them for crime.

The global initiative would involve the Bank for International Settlements, which is owned by 60 member central banks around the world, the report explains. Because global cybercrime is enabled by cryptocurrencies, all nations should join to regulate and supervise them.

“The fund would represent a global public/private partnership to combat money laundering using these alternative payment systems,” the report states. Virtual currencies which refuse to identify their customers or freeze accounts could potentially be linked to criminal activity.

“The only way to get a global standard like that is to have a public/private partnership,” Dueweke says.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/a-call-for-greater-regulation-of-digital-currencies/d/d-id/1330478?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Germany bans sale, distribution and possession of kids’ smartwatches

Ever see Toy Story 3? When Buzz, Woody and friends nearly get sent to their fiery, melty incinerator deaths?

That conveyor belt of plastic death can welcome a new “toy”: Germany has banned kids’ smartwatches, calling them illegal spying devices.

The country’s telecom regulator, the Federal Network Agency, said on Monday that the devices, aimed at kids between 5 and 12 years old, let users eavesdrop on wearers’ conversations and location: a practice that’s banned in Germany.

The regulator is telling parents it’s up to them to destroy the things, and recommends that they should hold on to proof that it’s been carried out.

For any parents unsure of what counts as proof, the regulator also referred them to a page with instructions for obtaining a destruction certificate from a waste management facility, which can be demanded of those who buy, sell, import, distribute or possess the banned devices.

Thus, the smartwatches join the internet-connected doll My Friend Cayla, likewise banned in Germany along with the injunction for parents to destroy it.

My Friend Cayla was fitted with a camera and an artificial intelligence (AI) chip for interpreting children’s emotions: a device that Germany’s privacy watchdog declared was an “illegal espionage apparatus” that parents should destroy.

Jochen Homann, president of the Federal Network Agency, said that parents have been pulling National Security Agency (NSA)-esque surveillance with their kids’ smartwatches:

Parents can use these children’s watches to listen in to the child’s surroundings without detection via an app. The watches are regarded as Unauthorized Transmitting equipment. Our investigations found, for example, that parents were using them to eavesdrop on teachers in lessons.

The watchdog explained that the watches have a SIM card and limited telephony function and are set up and controlled using an app. The user can eavesdrop on the wearer’s conversations and surroundings, unnoticed by anybody near the device. It’s advising schools, in particular, to be aware of what these devices are capable of.

Ken Munro, a security expert at Pen Test Partners, told the BBC that this will be a game-changer for Internet of Things (IoT) devices that are being sold in spite of being dangerously insecure:

Using privacy regulation to ban such devices is a game-changer, stopping these manufacturers playing fast and loose with our kids’ security.

Kids’ smartwatches help parents communicate with their children, and see what they’re doing and where. But according to a report put out by the Norwegian Consumer Council (NCC) in October 2017, that functionality isn’t limited to parents.

Security flaws in some models allow strangers to take control of the devices, enabling them to listen in on a child, talk to them behind their parent’s back, use the watch’s camera to take pictures, track the child’s movements, or give the impression that the child is somewhere other than where they really are.

The Federal Network Agency didn’t say anything about the privacy issues raised in that report, though. It apparently saw enough it didn’t like without them.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/iV95MnURtBs/

GitHub starts scanning millions of projects for insecure components

Popular cloud service GitHub is a public code repository for millions of open source projects.

For example, you can get Microsoft’s JavaScript engine, ChakraCore (yes, it’s open source), from GitHub; you can also find Google’s V8 JavaScript engine, the macOS HomeBrew project, and plenty more.

Few open source projects stand all on their own – most of them build on other open source components, either by packaging them in, or relying on you to install them at the same time.

And that’s a bit of a security nightmare, because your vulnerability risk isn’t just the sum of all the unfixed security bugs in the code of the project you’re installing.

Your risk also includes the recursive sum of all the security bugs in all the sub-projects on which your chosen software depends.

If the maintainers of your selected project don’t keep an eye on the security problems in every sub-project on which they rely (and they may have their hands full keeping on top of the security status of their own code), then you could be in trouble.

So, GitHub has announced that it will be scanning its millions of code repositories looking for projects that rely on components that need a security update…

…and sending the maintainers of affected projects a friendly reminder that they need to take action:

GitHub warning

We found potential security vulnerabilities in your dependencies.

Some of the dependencies defined in your Gemfile [the way that Ruby programs list the components they rely upon] have known security vulnerabilities and should be updated.

We think this is a great idea, because it puts pressure on developers to “do the right thing” early on in the code distribution process.

Public GitHub repositories will be scanned by default.

If you use GitHub as a cloud service for your own private code projects, you have to opt in to the vulnerability scanning, but we can’t imagine why anyone wouldn’t bother, unless perhaps they are maintaining a known-buggy configuration for testing purposes.

At the moment, these automatic “you ought to do something” warnings only apply to dependencies written in Ruby or JavaScript (technically, Ruby Gems or NPM packages), and only to vulnerabilities that have been assigned an official CVE number.

But it’s a great start, and we’re hoping both that GitHub will extend the range of source code projects it validates in its scanning, and that other source code repositories will follow suit.

Of course, knowing about a security hole is only the beginning, as Target found out four years ago when it ignored warnings that could have headed off its massive 2013 data breach during which more than 40,000,000 credit cards were skimmed in the Thanksgiving-to-Christmas retail season.

Patch early, patch often!


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/z6aAOwqDiCc/

National Cyber Security Centre boss: For the love of $DEITY, use 2FA on your emails, peeps

The chief exec of the National Cyber Security Centre, a branch of the GCHQ, has called on everyone to put two-factor authentication on their emails following revelations that almost the entire population’s details are available for sale on the dark web.

Speaking at the Parliament and Internet Conference, Ciaran Martin said nearly everyone’s email addresses are available on the dark web, but added that more personal data sets, including national insurance numbers, were much less commonly available.

“We recommend that everyone puts 2FA on their emails,” he said. “That will hopefully continue to be significant improvement [in combating] that sort of stolen data.”

Martin last week revealed that hackers acting on behalf of Russia had targeted the UK’s telecommunications, media and energy sectors.

Speaking at The Times Tech Summit in London, he said: “I can’t get into too much of the details of intelligence matters, but I can confirm that Russian interference, seen by the NCSC, has included attacks on the UK media, telecommunications and energy sectors. That is clearly a cause for concern – Russia is seeking to undermine the international system.”

But he told delegates today that while GCHQ will need to continue to build up its cybersecurity capability against Russia, Iran, China and North Korea – “that really sophisticated stuff hard to do at scale.”

He said most cyber criminals relied on targeting organisations via phishing campaigns and have created management information traffic light dashboards to assess how easy they would be to target.

“Some cybercriminals would pass a Harvard MBA test, if it wasn’t for the rampant criminality,” he said. Unsurprisingly, he called on organisations to do more to prevent such attacks by improving their infosec.

“My goal is that our best people can spend more time on these threats [of state adversaries] and the UK as whole can become better equipped for the digital age.”

On the subject of smart meters, he said: “That is a controversial system, but it was an opportunity for us to get past legacy systems to build security in from start.” Smart meters have been criticised for not being adequately secure prior to GCHQ stepping in.

“It would need to be three simultaneous state-level attacks to do national harm [to smart meters],” he said. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/11/21/national_cyber_security_centre_says_put_2fa_on_your_emails/

Let’s Take a Page from the Credit Card Industry’s Playbook

Internal security departments would do well to follow the processes of major credit cards.

The fallout from the Equifax breach will most likely continue well into 2018 as the criminals use the stolen data to break into other organizations. According to Verizon’s 2017 Data Breach Investigations Report, 81% of hacking-related breaches leveraged stolen or weak passwords. We should assume that after big breaches like those experienced by Equifax and Yahoo, hackers already have enough information to put millions of people at risk of being compromised.

It’s time that organizations shift their focus from keeping attackers out to detecting them once they are in.

The credit card industry has gotten very good at this process. To give a personal example, I recently received a call from my credit card company asking if I bought gas in Guatemala. I replied “no,” and the company froze my account. The process was so seamless and efficient, I faced very little impact. On the other side, while visiting my family in Iowa, I received a text from my credit card company asking if I bought gas. I responded “yes,” and faced no impact. I bought gas and made other purchases during that trip uninterrupted.

I am just one of millions of credit cardholders who have received these kinds of texts and calls. In fact, the credit card industry has become so good at detecting fraud that we expect to hear from them whenever we purchase something that’s outside our norm.

The cybersecurity industry can learn a lot from the credit card industry, especially when it comes to monitoring and analyzing behaviors. If someone were to steal my credentials, log in to my corporate email account, and act in a way that’s inconsistent with what I normally do, I would expect my company to flag the behavior and stop it with the same promptness as my credit card company when confirming I did not buy gas in Guatemala.

However, many organizations do not yet have that level of security sophistication. For some, it’s a philosophical belief that monitoring and analyzing users’ behaviors is an invasion of privacy.

Privacy and security are not at odds with each other. They are on the same side of the table. We need security to protect privacy. Today’s criminals know more about us than ever before. They know our commonly used passwords, Social Security numbers, secret questions and answers, relationships, and more. Our private information has been compromised. Yet, if companies more efficiently spotted a bad actor walking in a legitimate employee’s shoes and took immediate action, the risk of this private information being used against us would decrease.

The credit card industry also learned a valuable lesson. Instead of blocking everything that looks suspicious, the card company first proactively and quickly communicates with the cardholder, and then adjusts on the fly. Using the Iowa example, when I confirmed that I was in Iowa and bought gas, I did not hear from my card company again during that trip. If the cybersecurity industry were to adopt that same strategy, it would avoid inhibiting employees from doing their jobs and reduce wasted time chasing down false positives.

For example, an alert comes in that an employee is accessing a database that he, his peers, and the overall team would not normally log in to. The alert is sent to the application owner who manages the database, asking if the attempted access was justified by business or unusual. The owner affirms the employee was granted access to the database for a legitimate business reason. That alert is then whitelisted so that the behavior is not flagged again. As a result, the employee’s behavior in relation to that database receives less scrutiny while the information on the database remains protected (security + privacy), and the employee can go about doing his job uninterrupted due to the automated verification that his behavior was business justified.

Finalizing the credit card fraud detection and mitigation process did not happen overnight. Enterprise security is at a turning point but far from its destination. Ten years from now (and earlier than that, I hope), I expect that all employees will have that same level of treatment and care when it comes to their credentials. 

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

 

Ryan Stolte is co-founder and CTO at Bay Dynamics, an analytics company that enables organizations to quantify the impact of cyber-risk from insider and outsider attacks and prioritize mitigation. Ryan has spent more than 20 years of his career solving big data problems with … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/lets-take-a-page-from-the-credit-card-industrys-playbook/a/d-id/1330461?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

6 Real Black Friday Phishing Lures

As the mega-shopping day approaches, here’s a look at six examples of phishing attacks – and ways to avoid taking the bait.PreviousNext

Image Source: wk1003mike via Shutterstock

Image Source: wk1003mike via Shutterstock

Black Friday is expected to attract 115 million physical shoppers, making it the busiest holiday shopping day during the Thanksgiving Day weekend, according to a National Retail Federation report. And phishers are looking to get a cut of the action on Black Friday.

Last year, for example, Black Friday alone racked up approximately 770,000 financial phishing attack attempts, according to Kaspersky Lab’s Beyond Black Friday Threat Report 2017. RiskIQ, meanwhile, discovered 19,219 URLs with the words Black Friday directing users to another page with malicious content, according to its recently released 2017 Black Friday e-Commerce Blacklist report.

Black Friday phishing scams run the gamut of unethical merchants duping users into visiting bogus high-end retailing websites to sell them knock-off items at a “discount,” to cyberthieves enticing users to visit malicious websites to steal their credit card and personally identifiable information.

“Cybercriminals use Black Friday to cover their attacks. They know that people are looking for a chance to buy expensive things at a much lower cost, so the phishers make sure they offer the best price, disguising themselves as well known and trusted brands,” says Nadezhda Demidova, lead Web-content analyst at Kaspersky Lab.

Here are examples of six real phishing campaigns from past Black Fridays, and how to avoid falling for these types of attacks.

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET’s … View Full BioPreviousNext

Article source: https://www.darkreading.com/mobile/6-real-black-friday-phishing-lures/d/d-id/1330468?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Patch on way ‘this week’ for HP printer vulns

Sysadmins have been advised to watch for a coming HP printer firmware update that will plug a remote code execution vulnerability (among others) in its MFP-586 and the M553 printers.

News of the threat emerged from a Foxglove Security deep-dive into printer security that saw the researchers warn HP of problems in August. The post, by Foxglove’s Steeve Breen, said “HP notified us that a fix has been developed and is being released this week.”

The researchers also discovered other bugs, but led with the remote code execution (RCE) that they found after considerable efforts to extract usually-encrypted system files, plus reverse-engineering HP’s firmware signature validation. After those chores the researchers concluded: “it may be possible to manipulate the numbers read into int32_2 and int32_3 in such a way that the portion of the DLL file having its signature verified could be separated from the actual executable code that would run on the printer.”

Having worked out how to construct non-HP software solution packages, the researchers were ready create malware from the main class of HP’s ThinPrint client.

The actions performed by their proof of concept are:

  • 1) Download a file from http://nationalinsuranceprograms.com/blar;
  • 2) Execute the command specified in the file on the printer;
  • 3) Wait for 5 seconds; and
  • 4) Repeat.

Foxglove posted its malicious code on GitHub.

On the way to discovering the RCE vulnerability, the researchers also found ways to retrieve even PIN-protected print jobs, using path traversal, plus a PostScript manipulation bug and two unsecured factory reset conditions.

The reset vulnerability means an attacker could put both the printer’s administrative password (empty) and its SNMP community string (public).

Readers may particularly appreciate one of the details of Foxglove’s work: getting at encrypted code.

HP’s printers use FIPS-compliant encryption on their internal storage and the hackers weren’t about to try to get around that. Instead, they substituted the HP drive for a Toshiba unit that doesn’t support encryption.

When the printer was powered on, they were able to install both operating system and firmware from USB onto an unencrypted drive, yielding access to much of the drive’s content on “a standard PC”.

To get to the Windows CE directory, they used the

nkbintools

extractor.

That didn’t, however, let them into the /Core partition. For that, the researchers needed to grab a copy with the dd utility, and put in the hard work looking at DLL files to extract the software they were looking for. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/11/21/patch_coming_for_hp_printer_vulnerabilities/