STE WILLIAMS

‘Goldilocks’ Legislation Aims to Clean up IoT Security

What’s This?

The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

David Holmes contributed to this article.

Cybercrime in general — and most recently, crime perpetrated using IoT devices — has become a serious problem. Legislatures around the world have struggled to write laws to rein things in. The problem has been that governments have issued cybersecurity laws that are either too burdensome or ineffective.

We’ve seen various breach disclosure acts designed to “name and shame” organizations for their security failures in hopes that exposure will lead to better security. There have been presidential directives that seem to only reiterate the importance of security, suggest more study and cooperation, or rearrange government agencies. At the other end of the spectrum, we’ve seen very prescriptive, resource-intensive laws like GDPR and HIPAA mandating large infrastructures of security controls, policies, and reporting.

Now in the US we’re seeing “Goldilocks” proposed IoT legislation that’s not too hard, not too soft, and might be just right. It’s called the Internet of Things (IoT) Cybersecurity Improvement Act of 2017, proposed by Mark Warner (D-VA), Cory Gardner (R-CO), Ron Wyden (D-OR) and Steve Daines (R-MT).

Let’s take a closer look at its pros and cons.

The Power of the Government Purchase Order
For years, cybersecurity experts have been imploring the US government to clean up its own cybersecurity and use its mammoth buying power to push through new standards in security. A major component of the new proposed legislation does this. Not only would this be a powerful way to raise the bar across the industry, it would also be easier to pull off than larger, more direct legal measures.

The bill would require the Office of Management and Budget (OMB) to develop standards for all agencies in its purview to develop specific contractual standards for IoT security.

Government-purchased IoT devices would need to:

  • Be free of known security vulnerabilities, as defined in the NIST National Vulnerability Database
  • Have software or firmware components that accept “properly authenticated and trusted” patches from the vendor
  • Use acceptable standards for communication, encryption, and interconnection with other devices or peripherals. This means that feeble old Telnet would not be acceptable as an administrative mechanism.
  • Not include any “fixed or hard-coded” credentials (that is, passwords) for remote administration, delivery of updates, or communications
  • Have notification and disclosure methods in place for discovered security vulnerabilities
  • Be patched or have security vulnerabilities removed in a timely manner

The legislation would also require government agencies to set inventories of IoT devices and update them every 30 days. Agencies would also be required to publicly disclose which IoT devices have gone out of support, and which have liability protections.

Considering that the US government is budgeted to spend nearly $85 billion (yes, that’s billion) in 2017 on IT, this proposed legislation casts a huge shadow across the industry.

Liberty to Do Research on Security Flaws
Another positive of this bill is that it would provide safe harbor for security researchers who have been under the chilling effects of the Computer Fraud and Abuse Act (CFAA). To recap, CFAA states a person is committing a crime if he or she accesses a computer without authority and causes harm. Unfortunately, this act, which began with good intentions to ensure that computer crimes not go unpunished, has been used against security researchers who often uncover serious weaknesses in software, systems, and devices. As a result, CFAA has dampened efforts by researchers to find new security vulnerabilities before the bad guys do (and the bad guys just ignore this law, anyway).

Specifically, the bill would set up an exemption both in the CFAA and the Digital Millennium Copyright Act (DMCA) (which prohibits tampering with copyright restrictive mechanisms) for security researchers who test “in good faith” the security of any IoT device being used by a federal agency.

Note that the law doesn’t protect security researchers from being sued for libel if they publish false results. There’s already been at least one big dust-up regarding security vulnerability disclosure and libel around medical devices.

What’s Not So Great
One hard nut to crack is defining exactly what an IoT device is. This bill goes a little too gray in that area and scopes in all “Internet-connected devices” which are defined as “a physical object that…”

  • is capable of connecting to and is in regular connection with the Internet, and
  • has computer processing capabilities that can collect, send, or receive data.

This basically includes any computing device, far beyond IoT. It also calls into question any virtual or cloud-computing system. But do they really qualify?

A law wouldn’t be a law if it didn’t have exceptions, and this proposed law has several. For one, manufacturers can be waived from the requirements if they disclose known vulnerabilities, possible mitigations, and provide “a justification for secure use of the device notwithstanding the persisting vulnerability.”

There are also exceptions for devices of “severely limited functionality” that would be “unfeasible” or “impractical” to secure to the requirements. Of course, any Internet-connected IoT device could still be subverted into a thingbot for DDoS attacks and other mayhem, regardless of its “limited functionality.”

All in all, the proposed legislation is not bad. Let’s hope it passes. If not, manufacturers, without any accountability whatsoever, will continue to build vulnerable IoT devices. And government agencies and consumers will continue to purchase these vulnerable devices, many of which will inevitably become part of worldwide thingbots (like Mirai), used to pull off massive attacks like those seen in late 2016.

Get the latest application threat intelligence from F5 Labs.

 

Raymond Pompon is a Principal Threat Researcher Evangelist with F5 labs. With over 20 years of experience in Internet security, he has worked closely with Federal law enforcement in cyber-crime investigations. He has recently written IT Security Risk Control Management: An … View Full Bio

Article source: https://www.darkreading.com/partner-perspectives/f5/goldilocks-legislation-aims-to-clean-up-iot-security-/a/d-id/1330361?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

‘Goldilocks’ Legislation Aims to Clean up IoT Security

What’s This?

The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

David Holmes contributed to this article.

Cybercrime in general — and most recently, crime perpetrated using IoT devices — has become a serious problem. Legislatures around the world have struggled to write laws to rein things in. The problem has been that governments have issued cybersecurity laws that are either too burdensome or ineffective.

We’ve seen various breach disclosure acts designed to “name and shame” organizations for their security failures in hopes that exposure will lead to better security. There have been presidential directives that seem to only reiterate the importance of security, suggest more study and cooperation, or rearrange government agencies. At the other end of the spectrum, we’ve seen very prescriptive, resource-intensive laws like GDPR and HIPAA mandating large infrastructures of security controls, policies, and reporting.

Now in the US we’re seeing “Goldilocks” proposed IoT legislation that’s not too hard, not too soft, and might be just right. It’s called the Internet of Things (IoT) Cybersecurity Improvement Act of 2017, proposed by Mark Warner (D-VA), Cory Gardner (R-CO), Ron Wyden (D-OR) and Steve Daines (R-MT).

Let’s take a closer look at its pros and cons.

The Power of the Government Purchase Order
For years, cybersecurity experts have been imploring the US government to clean up its own cybersecurity and use its mammoth buying power to push through new standards in security. A major component of the new proposed legislation does this. Not only would this be a powerful way to raise the bar across the industry, it would also be easier to pull off than larger, more direct legal measures.

The bill would require the Office of Management and Budget (OMB) to develop standards for all agencies in its purview to develop specific contractual standards for IoT security.

Government-purchased IoT devices would need to:

  • Be free of known security vulnerabilities, as defined in the NIST National Vulnerability Database
  • Have software or firmware components that accept “properly authenticated and trusted” patches from the vendor
  • Use acceptable standards for communication, encryption, and interconnection with other devices or peripherals. This means that feeble old Telnet would not be acceptable as an administrative mechanism.
  • Not include any “fixed or hard-coded” credentials (that is, passwords) for remote administration, delivery of updates, or communications
  • Have notification and disclosure methods in place for discovered security vulnerabilities
  • Be patched or have security vulnerabilities removed in a timely manner

The legislation would also require government agencies to set inventories of IoT devices and update them every 30 days. Agencies would also be required to publicly disclose which IoT devices have gone out of support, and which have liability protections.

Considering that the US government is budgeted to spend nearly $85 billion (yes, that’s billion) in 2017 on IT, this proposed legislation casts a huge shadow across the industry.

Liberty to Do Research on Security Flaws
Another positive of this bill is that it would provide safe harbor for security researchers who have been under the chilling effects of the Computer Fraud and Abuse Act (CFAA). To recap, CFAA states a person is committing a crime if he or she accesses a computer without authority and causes harm. Unfortunately, this act, which began with good intentions to ensure that computer crimes not go unpunished, has been used against security researchers who often uncover serious weaknesses in software, systems, and devices. As a result, CFAA has dampened efforts by researchers to find new security vulnerabilities before the bad guys do (and the bad guys just ignore this law, anyway).

Specifically, the bill would set up an exemption both in the CFAA and the Digital Millennium Copyright Act (DMCA) (which prohibits tampering with copyright restrictive mechanisms) for security researchers who test “in good faith” the security of any IoT device being used by a federal agency.

Note that the law doesn’t protect security researchers from being sued for libel if they publish false results. There’s already been at least one big dust-up regarding security vulnerability disclosure and libel around medical devices.

What’s Not So Great
One hard nut to crack is defining exactly what an IoT device is. This bill goes a little too gray in that area and scopes in all “Internet-connected devices” which are defined as “a physical object that…”

  • is capable of connecting to and is in regular connection with the Internet, and
  • has computer processing capabilities that can collect, send, or receive data.

This basically includes any computing device, far beyond IoT. It also calls into question any virtual or cloud-computing system. But do they really qualify?

A law wouldn’t be a law if it didn’t have exceptions, and this proposed law has several. For one, manufacturers can be waived from the requirements if they disclose known vulnerabilities, possible mitigations, and provide “a justification for secure use of the device notwithstanding the persisting vulnerability.”

There are also exceptions for devices of “severely limited functionality” that would be “unfeasible” or “impractical” to secure to the requirements. Of course, any Internet-connected IoT device could still be subverted into a thingbot for DDoS attacks and other mayhem, regardless of its “limited functionality.”

All in all, the proposed legislation is not bad. Let’s hope it passes. If not, manufacturers, without any accountability whatsoever, will continue to build vulnerable IoT devices. And government agencies and consumers will continue to purchase these vulnerable devices, many of which will inevitably become part of worldwide thingbots (like Mirai), used to pull off massive attacks like those seen in late 2016.

Get the latest application threat intelligence from F5 Labs.

 

Raymond Pompon is a Principal Threat Researcher Evangelist with F5 labs. With over 20 years of experience in Internet security, he has worked closely with Federal law enforcement in cyber-crime investigations. He has recently written IT Security Risk Control Management: An … View Full Bio

Article source: https://www.darkreading.com/partner-perspectives/f5/goldilocks-legislation-aims-to-clean-up-iot-security-/a/d-id/1330361?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

OceanLotus APT Group Unfolds New Tactic in Cyber Espionage Campaign

The group has begun using compromised websites to profile and target entities of interest to the Vietnamese government, Volexity says.

OceanLotus, an APT actor that over the past few years has been conducting a sophisticated digital surveillance campaign aligned with Vietnamese state interests, has built out a massive attack infrastructure of compromised websites.

Security vendor Volexity, which has been tracking OceanLotus for sometime, says it has recently observed the group using a network of compromised websites in the region to profile victims and gather intelligence from them. The compromised websites appear to have been chosen specifically because their visitors have a higher likelihood of being people of interest to the Vietnamese government, the company said in an advisory this week.

OceanLotus, aka APT32, has compromised over 100 websites, the vast majority of which belong to organizations and individuals critical of the government in Vietnam. The remaining websites belong to entities in countries that share a land border with Vietnam, Volexity said. Among the list of compromised websites are those that belong to entities with links to government, military, civil society, human rights, and the media.

“This is the first time they have been noted leveraging strategic Web compromises to profile and target website visitors,” says Steven Adair, president of Volexity and one of the authors of the report. “OceanLotus attackers [have] compromised a fairly significant number of websites to pull off a widespread profiling and tracking campaign.” 

The use of compromised websites to lure victims is a new development for OceanLotus and shows how sophisticated threat actors manage to stay a step ahead of defenders by constantly switching tactics.

The group has been operational since at least 2014 and has been associated with a string of attacks on entities of interest to Vietnam including the media, civil and, social rights groups as well as members of the Association of Southeast Nations (ASEAN).

In a report this May, FireEye described the APT32 group’s activities as targeting foreign companies with interests in Vietnam’s consumer goods, manufacturing, and hospital sectors. Also in the group’s crosshairs are organizations in the technology infrastructure and network security segments.  According to FireEye, known victims of the APT32 group include a European company constructing a manufacturing facility in Vietnam, a global hospitality industry developer with plans to develop in Vietnam, and several organizations in the banking and media industries.

In these previous attacks, OceanLotus used spear phishing and other social engineering methods to lure victims into downloading and enabling sophisticated data-stealing malware on their systems. The lures were often multilingual, and tailored to specific victims.

It is only in recent months that OceanLotus has begun using compromised websites as lures to identify potential victims and to plant malware for stealing data on their systems. In most cases, the group has been compromising websites by either gaining direct access to the site’s content management systems (CMS) using legitimate user credentials, or by exploiting outdated plugins on these sites. Volexity said it has not, however, been able to identify how OceanLotus actors are obtaining the credentials for the CMS systems in the first place.

Once a website has been compromised, OceanLotus has used different methods to identify site visitors and drop different payloads on their systems. The attackers have been delivering payloads for snooping and data-stealing only to those they identify as potential targets, not every website visitor. The payloads included custom Google apps designed to gain access to the victim’s Gmail account and steal their contact list. The attackers have also created numerous websites disguised as sites belonging to Facebook Google, Cloudflare, and others for serving malware.

“In the case of targeting specific organizations, we believe they examined the IP address WHOIS information to identify the organization,” Adair says.  “Once they know their IP address space, they place it on a whitelist for targeting.” 

In addition to building out a big network of compromised websites to stage and deliver malware to selected victims, OceanLotus has also managed to build a massive backend infrastructure to facilitate its core data collection activities. Interestingly, a substantial portion of the attack infrastructure that OceanLotus has been using is located in the United States. “A successful large-scale attack of this magnitude takes quite a bit of effort and is nearly unparalleled,” Adair says.

Steve Ginty, senior product manager at threat management firm RiskIQ says his company’s analysis of data associated with OceanLotus’ activities shows that the group has been compromising regional Web pages since at least Feb. 2016. “The group did a good job of mimicking legitimate infrastructure, registering typo-squatting domains of legitimate services and cookies,” he says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/oceanlotus-apt-group-unfolds-new-tactic-in-cyber-espionage-campaign/d/d-id/1330371?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

OceanLotus APT Group Unfolds New Tactic in Cyber Espionage Campaign

The group has begun using compromised websites to profile and target entities of interest to the Vietnamese government, Volexity says.

OceanLotus, an APT actor that over the past few years has been conducting a sophisticated digital surveillance campaign aligned with Vietnamese state interests, has built out a massive attack infrastructure of compromised websites.

Security vendor Volexity, which has been tracking OceanLotus for sometime, says it has recently observed the group using a network of compromised websites in the region to profile victims and gather intelligence from them. The compromised websites appear to have been chosen specifically because their visitors have a higher likelihood of being people of interest to the Vietnamese government, the company said in an advisory this week.

OceanLotus, aka APT32, has compromised over 100 websites, the vast majority of which belong to organizations and individuals critical of the government in Vietnam. The remaining websites belong to entities in countries that share a land border with Vietnam, Volexity said. Among the list of compromised websites are those that belong to entities with links to government, military, civil society, human rights, and the media.

“This is the first time they have been noted leveraging strategic Web compromises to profile and target website visitors,” says Steven Adair, president of Volexity and one of the authors of the report. “OceanLotus attackers [have] compromised a fairly significant number of websites to pull off a widespread profiling and tracking campaign.” 

The use of compromised websites to lure victims is a new development for OceanLotus and shows how sophisticated threat actors manage to stay a step ahead of defenders by constantly switching tactics.

The group has been operational since at least 2014 and has been associated with a string of attacks on entities of interest to Vietnam including the media, civil and, social rights groups as well as members of the Association of Southeast Nations (ASEAN).

In a report this May, FireEye described the APT32 group’s activities as targeting foreign companies with interests in Vietnam’s consumer goods, manufacturing, and hospital sectors. Also in the group’s crosshairs are organizations in the technology infrastructure and network security segments.  According to FireEye, known victims of the APT32 group include a European company constructing a manufacturing facility in Vietnam, a global hospitality industry developer with plans to develop in Vietnam, and several organizations in the banking and media industries.

In these previous attacks, OceanLotus used spear phishing and other social engineering methods to lure victims into downloading and enabling sophisticated data-stealing malware on their systems. The lures were often multilingual, and tailored to specific victims.

It is only in recent months that OceanLotus has begun using compromised websites as lures to identify potential victims and to plant malware for stealing data on their systems. In most cases, the group has been compromising websites by either gaining direct access to the site’s content management systems (CMS) using legitimate user credentials, or by exploiting outdated plugins on these sites. Volexity said it has not, however, been able to identify how OceanLotus actors are obtaining the credentials for the CMS systems in the first place.

Once a website has been compromised, OceanLotus has used different methods to identify site visitors and drop different payloads on their systems. The attackers have been delivering payloads for snooping and data-stealing only to those they identify as potential targets, not every website visitor. The payloads included custom Google apps designed to gain access to the victim’s Gmail account and steal their contact list. The attackers have also created numerous websites disguised as sites belonging to Facebook Google, Cloudflare, and others for serving malware.

“In the case of targeting specific organizations, we believe they examined the IP address WHOIS information to identify the organization,” Adair says.  “Once they know their IP address space, they place it on a whitelist for targeting.” 

In addition to building out a big network of compromised websites to stage and deliver malware to selected victims, OceanLotus has also managed to build a massive backend infrastructure to facilitate its core data collection activities. Interestingly, a substantial portion of the attack infrastructure that OceanLotus has been using is located in the United States. “A successful large-scale attack of this magnitude takes quite a bit of effort and is nearly unparalleled,” Adair says.

Steve Ginty, senior product manager at threat management firm RiskIQ says his company’s analysis of data associated with OceanLotus’ activities shows that the group has been compromising regional Web pages since at least Feb. 2016. “The group did a good job of mimicking legitimate infrastructure, registering typo-squatting domains of legitimate services and cookies,” he says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/oceanlotus-apt-group-unfolds-new-tactic-in-cyber-espionage-campaign/d/d-id/1330371?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Barracuda Buys Sonian for Cloud Analytics

Barracuda snaps up Sonian to improve on cloud archiving and email security and management.

Cloud security and data protection firm Barracuda Networks is aiming to improve its cloud archiving, analytics, and management capabilities with the acquisition of Sonian, the company announced today.

Sonian is a provider of cloud archiving and business insights, and its technology aims to help customers store, access, and leverage data in email messages and attachments. Once they have insight into their data, users can apply it to their business and pinpoint potential threats before they turn into bigger problems.

Barracuda intends to add Sonian’s analytics and AI to its security platform. In doing so, it plans to improve on the security and data protection it currently offers customers in Office 365 and cloud environments. Sonian will also bring its customer base of 32,000 users, as well as partnerships with large managed service providers and software companies.

Read more details here.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/barracuda-buys-sonian-for-cloud-analytics/d/d-id/1330376?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Barracuda Buys Sonian for Cloud Analytics

Barracuda snaps up Sonian to improve on cloud archiving and email security and management.

Cloud security and data protection firm Barracuda Networks is aiming to improve its cloud archiving, analytics, and management capabilities with the acquisition of Sonian, the company announced today.

Sonian is a provider of cloud archiving and business insights, and its technology aims to help customers store, access, and leverage data in email messages and attachments. Once they have insight into their data, users can apply it to their business and pinpoint potential threats before they turn into bigger problems.

Barracuda intends to add Sonian’s analytics and AI to its security platform. In doing so, it plans to improve on the security and data protection it currently offers customers in Office 365 and cloud environments. Sonian will also bring its customer base of 32,000 users, as well as partnerships with large managed service providers and software companies.

Read more details here.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/barracuda-buys-sonian-for-cloud-analytics/d/d-id/1330376?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Quantum computers could crack Bitcoin, but fixes are available now

An international group of quantum boffins reckons Bitcoin could be broken by the year 2027.

The researchers from Singapore, Australia and France say that scenario represents the worst case, and would see a quantum computer able to run Shor’s algorithm against the cryptocurrency’s protective elliptic curve signature quicker than the 10 minutes Bitcoin needs to record a transaction in the blockchain.

There are two items of good news in the paper for Bitcoin: its proof-of-work isn’t as vulnerable to “quantum speedup” as people think, and the signature can be replaced with something more quantum-resistant before the day of reckoning.

In their paper, which landed at arXiv in late October, Divesh Aggarwal and his collaborators say ASIC-based mining rigs are fast compared to even optimistic theoretical quantum computer clock speeds.

A Grover search could work against Bitcoin’s “hashcash” proof-of-work, they write, but it would be slow:

The extreme speed of current specialized ASIC hardware for performing the hashcash PoW, coupled with much slower projected gate speeds for current quantum architectures, essentially negates this quadratic speedup, at the current difficulty level, giving quantum computers no advantage. Future improvements to quantum technology allowing gate speeds up to 100GHz could allow quantum computers to solve the PoW about 100 times faster than current technology.

As far as defeating hashcash goes, the numbers are daunting for quantum computer designers: by 2028, the researchers reckon, you’d need a 4.4 million qubit machine to achieve 13.8 gigahashes per second: “This is more than one thousand times slower than off the shelf ASIC devices which achieve hash rates of 14TH/s”.

Shor’s algorithm, a quantum algorithm for factoring integers (that’s how it would attack cryptography), is a better path, they write.

Deploying a quantum computer against the secp256k1 elliptic curve Bitcoin uses is much more dangerous: if the signature is cracked, the scheme is completely insecure, and attackers can plant fake transactions and steal Bitcoin.

As with cracking the proof-of-work, the researchers assume quantum computers get big and fast relatively quickly, and even so, they fall slightly short: with a 10 GHz clock rate, around half a million qubits, and a low enough error rate of 10-1 could crack the signature in 30 minutes.

That’s close enough to make Bitcoin’s critical 10-minute rate “highly insecure”, so the authors recommend the Bitcoin protocol be migrated to a post-quantum signature scheme. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/11/09/quantum_computers_could_crack_bitcoin/

Intel’s management engine – in most CPUs since 2008

Positive Technologies, which in September said it has a way to attack the Intel Management Engine, has dropped more details on how its exploit works.

The firm has already promised to demonstrate God-mode hack in December 2017, saying the bug “allows an attacker of the machine to run unsigned code in the Platform Controller Hub on any motherboard”.

For some details, we’ll have to wait, but what’s known is bad enough: Intel Management Engine (IME) talks to standard Joint Test Action Group (JTAG) debugging ports. As does does USB, so Positive Technologies researchers put the two together and crafted a way to access IME from the USB port.

IME’s problems first emerged in May, when researchers noticed you could access the Active Management Technology running on the microcontroller with an empty login string.

That was patchable, but the IME – a microcontroller that’s got full control over hardware and networking, independently of the operating system – remained in place.

The latest attack came to Vulture South’s attention via a couple of Tweets:

The linked blog post [in Russian] explains that since Skylake, the PCH – Intel’s Platform Controller Hub, which manages chip-level communications – has offered USB access to JTAG interfaces that used to need specialised equipment. The new capability is DCI, Direct Connect Interface.

Any attack needs access to USB which as we know is really difficult.

We still don’t know all the details Positive Technologies will show off at Black Hat, but their trailers are sure fun to watch. ®

Bootnote: The IME is able to control a computer because it runs an OS of its own, namely MINIX. And it turns out that while Intel talked to MINIX’s creator about using it, the company never got around to saying it had put it into every CPU it makes.

Which has MINIX’s creator, Andrew S. Tanenbaum, just a bit miffed. As Tanenbaum wrote this week in an open letter to Intel CEO Brian Krzanich:

The only thing that would have been nice is that after the project had been finished and the chip deployed, that someone from Intel would have told me, just as a courtesy, that MINIX was now probably the most widely used operating system in the world on x86 computers. That certainly wasn’t required in any way, but I think it would have been polite to give me a heads up, that’s all.

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/11/09/chipzilla_come_closer_closer_listen_dump_ime/

Brit moron tried buying a car bomb on dark web, posted it to his address. Now he’s screwed

A British teenager who tried to order a car bomb on the dark web and get it delivered to his address has been found guilty this week.

Gurtej Randhawa, 19, of Wightwick, in the West Midlands of England, was cuffed by cops in May after purchasing what he thought was what’s legally known as a vehicle borne improvised explosive device from an online souk. Police say they were tipped off that he was trying to get his hands on a bomb, and took action.

Officers at the UK National Crime Agency said they switched the package with a dud device, and delivered it to the address specified by Randhawa. The plod waited until he tried to test the device and arrested him and two women, aged 18 and 45, who were later released without charge.

Randhawa pleaded guilty to charges of attempting to import explosives but denied maliciously possessing an explosive substance with intent to endanger life or cause serious injury. He was found guilty of the latter charge by Birmingham Crown Court on Tuesday.

“The explosive device Randhawa sought to purchase online had the potential to cause serious damage and kill many people if he had been successful in using it,” said Tim Gregory from the crime agency’s armed operations unit.

“He was not involved in an organised crime group or linked to terrorism, but is clearly an individual who poses a significant risk to the community. Identifying people like Randhawa – who seek to access illegal firearms and weapons – is a priority for the NCA and we will not stop in our efforts to make sure they are arrested and held accountable for their actions.”

Randhawa was refused bail, will face sentencing on January 12, and can expect a serious prison sentence.

As for how exactly he was detected trying to get hold of explosives on the dark web, there are a number of possibilities. The most likely explanation is that the underworld store selling the car bomb was run by or infiltrated by the police as a sting operation. This is something some police make a habit of in the past against those looking to hire hitmen.

Alternatively, it may be that Randhawa was already under surveillance and his terror shopping was picked up by those monitoring him. It’s also possible that the bomb was real but was detected in the postal system and exchanged for a phony device.

However, no doubt there will be those who take this as evidence that the police have found a way to break cryptographic anonymizing networks, such as Tor, that are a bedrock of the dark web. As ever, Occam’s razor applies. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/11/09/british_teenager_car_bomb_dark_web/

Redmond pals up with partners for threat-hunting

Windows Defender Advanced Threat Protection first landed as a public preview in September, and now it’s general availability, Redmond has announced a bunch of partners to give it cross-platform support: Bitdefender for Linux and macOS, Lookout for iOS and Android, and Ziften for macOS and Linux).

With Bitdefender’s Gravityzone Cloud integration arriving in public preview today, El Reg spoke to the company’s group product manager Deepakeswaran Kolingivadi – DK – to find out what Redmond wanted.

DK told us the demand came from Microsoft’s enterprise customers, who having seen Microsoft’s code wanted the system to cover non-Windows devices.

“When MS pitched their Windows Defender Advanced Threat Protection (ATP) solution to their customers, they liked seeing Windows-based malware detection … they expressed the need to see that information in the same console from Mac/Linux,” DK told The Register.

In particular, he said, macOS machines were nominated as popular in the executive suites, and Microsoft didn’t have coverage of them. That’s made them an attractive target, and “in the last couple of years we’ve seen a spike in attacks”.

That contact, “around four or five months ago”, set off the integration effort, and DK said the two companies’ engineers got the work completed within a quarter.

Bitdefender in Windows Defender ATP

Bitdefender info through Windows Defender ATP. Click to embiggen

He said the current capabilities will be expanded, with Bitdefender increasingly seeing “platform-agnostic script-based attacks” that can affect Windows and macOS alike, and defences against those threats are part of the company’s plans.

Announcing the partners, Microsoft said Lookout and Ziften products for Windows Defender ATP will land soon. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/11/09/windows_defender_atp_partners/