STE WILLIAMS

More and more websites are mining crypto-coins in your browser to pay their bills, line pockets

Sketchy websites are increasingly using cryptocurrency mining as a source of income.

CoinHive – the most prevalent cryptocurrency mining code provider – and its clones are becoming an alternative to dodgy advertising affiliate programs and survey scams in many cases.

More than 220 websites – mostly porn sites and torrent trackers – silently launch mining threads when surfers visit their sites, according to a new study by Adguard. The consumer-focused security firm reckons at least $43K was mined in Monero, as of October 10, based on the average time spent on website. Cryptocurrency mining code contaminated websites with an aggregated audience of 500 million people.

MANCHESTER, UK - Cristiano Ronaldo reacts prior to the UEFA Champions League semi-final game between Manchester City and Real Madrid

Real Mad-quid: Murky cryptojacking menace that smacked Ronaldo site grows

READ MORE

Cryptojacking scripts sometimes turn up on mainstream websites. For example, TV channel Showtime and the official website of Real Madrid star Cristiano Ronaldo were both caught harbouring CoinHive code recently. Pirate Bay admitted that it had experimented with the technology, something that happened without telling users beforehand.

Security researchers such as Troy Mursch (aka Bad Packets) have found it difficult to get sites to act on reports of infection. This means it can be difficult to determine whether third party hackers have planted the code on insecure sites or whether it’s there as a sanctioned money making move. The anonymity offered by digital currencies adds to the confusion.

The largest website sporting mining code is the Dropbox clone uptobox.com, which is a top-1000 websites according to Alexa’s worldwide rankings of sites by traffic, with 60 million-plus monthly visitors, Adguard reports.

The CoinHive team has called on website operators to inform their users about mining operations but there’s no facility to block misuse of the technology by the unscrupulous, according to Adguard, which adds that three more clones of CoinHive appeared over the three week period of its recent study.

Ad blockers and antivirus programs have added features that block browser mining. AdGuard has updated its apps to give users the choice to let a site mine, or to forbid it to launch mining in their browsers. Informed consent lies at the root of objections to cryptocurrency mining practices. Done with permission the technology offers an alternative revenue stream to publishers outside of online ads, which many find either intrusive or annoying.

An earlier study on how cryptocurrency mining is being abused can be found in a blog post by Malwarebytes here. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/10/13/cryypto_mining/

Malware again checks into Hyatt’s hotels, again checks out months later with victims’ credit cards

Hyatt has provided the perfect excuse for folks trying to explain to bosses or spouses why a film they watched in their hotel room for just seven minutes appeared on their company or personal credit card.

Its computer systems were earlier this year hacked by miscreants, who infected payment terminals with malware that siphoned off people’s credit card numbers to the scumbags. These details could be used to clone cards and go on spending sprees online, and basically rack up bills on someone else’s dime.

In a statement today, the chain admitted that between March 18 and July 2, 41 of its hotels in about a dozen countries were infiltrated by the software nasty. There’s a list here. The majority of the infected locations are in China and elsewhere in Asia, although three Hyatt hotels in Hawaii were also hit.

The chain said it can’t tell exactly whose card data was slurped. Hyatt staff have advised those who have stayed in the affected hotels to check their credit card statements carefully.

“We understand that such unauthorized access to card data was caused by an insertion of malicious software code from a third party onto certain hotel IT systems,” Chuck Floyd, global president of operations, said in a statement.

Hotel scene - suitcase propped up against freshly made bed. Image by Shutterstock

Secret shaggers, rejoice! Now you can blame that Hyatt credit card bill on hackers

READ MORE

“I want to assure you that there is no indication that information beyond that gained from payment cards – cardholder name, card number, expiration date and internal verification code – was involved, and as a result of implemented measures designed to prevent this from happening in the future, guests can feel confident using payment cards at Hyatt hotels worldwide.”

So that’s it, nothing to worry about. The hackers only got just enough information to copy your credit cards, with verification numbers, and go wild online to potentially knacker your credit ratings. And Hyatt has implemented measures to stop it happening again.

Which is odd, because that’s pretty much what it said in December 2015 when the same thing happened – even reusing the website hyatt.com/notice/protectingourcustomers from that security breach for this latest cockup. Back then, Chuck offered similar platitudes to affected customers.

“Protecting customer information is critically important to Hyatt, and we take the security of customer data very seriously,” he said. Based on today’s news it’s back to the drawing board. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/10/12/hyatt_falls_to_credit_card_skimmers_for_second_time_in_two_years/

Kaspersky Lab and the AV Security Hole

It’s unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor’s network, security experts say.

With Moscow-based Kaspersky Lab under the gun for its software reportedly helping Russian cyberspies steal classified US data, some security experts say the same sort of theft the company is alleged to have enabled could have been pulled off using any other antivirus software, and without any vendor participation.

The Wall Street Journal on Wednesday cited knowledgeable sources as saying that Kaspersky Lab actively modified its anti-virus system so Russian agents could use it as a tool to search through and steal from computers running the vendor’s software.

The WSJ report was the latest twist to a rapidly evolving and sometimes, bizarre, story involving Kaspersky Lab, Israeli intelligence agents, Russian cyber spooks, and the US government. The WSJ was the first to break the story when it reported last week that in 2015 Russian agents had used Kaspersky Lab systems’ and network to steal highly classified material from the computer of a contractor who worked for the US National Security Agency (NSA)

In separate subsequent reports, the WSJ, New York Times, and Washington Post said the Russian hackers had used Kaspersky Lab’s systems and network to search through computers worldwide that had the AV vendor’s software installed on them. The Russian cyberspies were apparently looking to see if they could find and pilfer from systems containing data on classified US government programs.

Those searches, which involved the use of specific keywords such as “Top Secret” and “Classified,” eventually led them to an Internet-connected home computer of an NSA contractor that happened to be running Kaspersky’s antivirus software. The home computer contained highly sensitive data on NSA penetration testing and cyber offense tools stored in complete violation of the agency’s rules. It remains unclear at this point if the Russian spies succeeded in finding and stealing additional classified US government information from any other computers running Kaspersky’s AV software.

None of the stories make it explicitly clear if the Russians cyberspies gained access to Kaspersky’s network by breaking into it, or if the Russian government coerced the vendor into granting them access, or if the vendor helped voluntarily.

Many believe it is easily possible the Russian government forced Kaspersky Lab to provide access to its platform. It wouldn’t be the first time that a government has done something like this: Most famously, the NSA itself is alleged to have paid $10 million to RSA so it could install backdoors in the vendor’s encryption technology.

Interestingly, the NSA data theft and the Russian hacker activity on Kaspersky’s network was first spotted by a team of Israeli intelligence agents who had also managed to silently infiltrate the security vendor’s network sometime in 2014. When the Israeli agents observed what was going on with Kaspersky’s network, they tipped off US officials about it sometime in 2015 and warned about classified NSA data ending up in the hands of Russian intelligence.

That tip-off is believed to have eventually led to the US government’s decision earlier this year to remove Kaspersky Lab from its approved list of IT vendors and to ban government agencies from using the company’s software altogether. It is unclear if the mushrooming scandal around the company’s technologies could now prompt US businesses and even consumers to start ditching the company’s software, which has consistently ranked among the top AV products for several years.

Kaspersky Lab itself discovered the Israeli intrusion in mid-2015. In a June 2015 report, the company said it was the victim of a highly sophisticated attack by a threat actor very similar to the one that had carried out the Stuxnet campaign on Iran’s uranium processing facility in Natanz. Kaspersky Lab did not specifically identify Israeli agents as being behind the attack, but said it appeared designed to steal data about the company’s technologies and ongoing research.

The security company has emphatically denied it has anything to do with the Russian hacking activity on its networks and has suggested the company is the victim of a hyper-charged geo-political environment.

“Kaspersky Lab was not involved in and does not possess any knowledge of the situation in question,” the vendor said in a statement responding to Wednesday’s WSJ story about its alleged complicity in the data theft. “The company reiterates its willingness to work alongside U.S. authorities to address any concerns they may have about its products as well as its systems.”

Meanwhile, Kaspersky Lab on Thursday announced an extension to its work with Interpol, with the signing of a threat-sharing agreement with the global law enforcement agency. The agreement strengthens an existing relationship between the two organizations and will result in Kaspersky sharing even more threat intelligence with law enforcement authorities worldwide in their fight against cybercrime, the company said.

The company’s previous engagements with Interpol included participation in an operation that led to the takedown of nearly 9,000 botnet command and control servers and hundreds of compromised websites.

AV Software Has ‘Carte Blanche’

The reality is the sort of data theft in the Kaspersky Lab case would have been possible with any AV vendor if an attacker had managed to surreptitiously gain privileged access to the AV vendor’s network.

Antivirus tools and their vendors pretty much have carte blanche access to files and data on any computer on which the software is installed, says Srinivas Mukkamala, CEO of RiskSense. “It is checking all your binaries, your files, your memory. It is looking at your registry and diagnosing everything on your system in a privileged mode.”

Systems running AV software routinely get updates from update servers and push files out to the AV vendor’s cloud for inspection, without any checks or inspection at all, he says. Technically at least, someone that wanted to abuse the tool could do anything including search for and exfiltrate data from systems with little risk of being caught, Mukkamala says.

In Kaspersky Lab’s case, for instance, if someone had managed to gain privileged access to the company’s update server farm they would have been able to do the sort of searching, querying, and stealing that the company is suspected of enabling. Given enough time, the intruders would have been able to scan end user systems running Kaspersky’s software and pilfer data from them without needing any help from the vendor, he says.

The same thing would be true in any situation where attackers can get privileged and persistent access to an antivirus software vendors network, he says. Of course, a vendor like Kaspersky Lab can either by choice or through coercion make such data theft easier, Mukkmala says.  

With time and the necessary skills, an adversary would have been able to exploit any AV vendor’s network in the same way without necessarily being detected by the vendor.

“If Kaspersky was compromised by the Russian government, then it might be possible, technically, for Russian collection from Kaspersky to go undetected,” says Malcolm Harkins, chief security and trust officer at Cylance. “We don’t know if that is what happened.” 

Harkins notes the speculation in media reports about Kaspersky Lab allegedly modifying its software in order to make things easier for the Russian agents on its network. “Again, we don’t know if this is accurate,” he notes.

“In general, AV companies are attractive targets for compromise by foreign intelligence services partly because, in theory at least, modifications aren’t really necessary,” Harkins said. “AV companies are often already looking for exactly the kind of data that would be attractive to intelligence services.”

Scott Petry, CEO of and founder of Authentic8, says the whole incident has exposed a fundamental weakness in current approaches to cybersecurity. When someone signs up with an AV vendor, they are essentially agreeing to have that vendor scan all files on their network and send information back to the vendor.

“A security vendor is inventorying all the data on a user’s system,” he says. Sharing all that sensitive information with the vendor is dangerous, he says. “Scanning files is required. Sharing a manifest of scanned files with the vendor for better security is asinine,” Petry says.

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/kaspersky-lab-and-the-av-security-hole/d/d-id/1330116?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Report from the Virus Bulletin 2017 Conference [Chet Chat Podcast 263]

After a break of a few months, our popular Chet Chat Podcast returns.

Sophos experts Chester Wisniewski (he’s the Chet in the Chat) and John Shier recently attended the International Virus Bulletin 2017 Conference in Madrid.

(As an aside that we can’t stop ourselves mentioning here, our own Gabor Szapannos, better known to Naked Security readers as Szapi, won Virus Bulletin’s annual award for the best technical security research of the year.)

Here’s their inside look at what went on:


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/RlWYKFSC5jI/

Report from the Virus Bulletin 2017 Conference [Chet Chat Podcast 263]

After a break of a few months, our popular Chet Chat Podcast returns.

Sophos experts Chester Wisniewski (he’s the Chet in the Chat) and John Shier recently attended the International Virus Bulletin 2017 Conference in Madrid.

(As an aside that we can’t stop ourselves mentioning here, our own Gabor Szapannos, better known to Naked Security readers as Szapi, won Virus Bulletin’s annual award for the best technical security research of the year.)

Here’s their inside look at what went on:


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/RlWYKFSC5jI/

Mr Robot season 3 episode Eps3.0_Power-Saver-Mode.H – the security review

For those of you who have been reading Naked Security for at least a year, you may remember that last year I wrote security-centric posts on Mr. Robot season 2 episodes, as they aired.

The show has earned a lot of accolades from the infosec community for its commitment to accurately portraying key security and hacking concepts, tools and cultural notes. To its credit, Mr. Robot has key staff with real information-security experience and hasn’t been shy in tapping security professionals for guidance and even a few cameos. So even if the show isn’t of interest to you plot-wise, and though it’s not always 100% on the mark, Mr. Robot easily wins the prize for most realistic portrayals of hacking on a TV show. (Granted, that’s not necessarily a high mark to clear.)

Since season 3 started airing on 11 October 2017, we thought it’d be worth following along this season as well to see what security tools and concepts pop up as well. (These aren’t plot reviews — there are plenty of blogs that already do those a lot better than I would.) The security recaps were fun to do last year, so why not again?

Inevitably I may have missed something or misinterpreted something I thought I saw—we tend to have great, edifying discussions in the comments of these posts, so let us know if there’s something else in each episode you thought was worth a call-out.

Here we go for round three of Mr. Robot.

WARNING:SPOILERS AHEAD – SCROLL DOWN TO READ ON

Before we dive in too deep, it’s worth revisiting the season 2 eps2.3logic-b0mb.hc and eps2.4m4ster-s1ave.aes posts that look at the Femtocell hack, as it came up again in this episode briefly.

We saw the new season open with a new character trying to get a … milkshake? When we first meet him, we don’t know who this guy is, but we see him actively trying to work his way around the rules, find the flaws, figure out a way to get what he wants. Let’s hold that thought and come back to it in a few moments.

“When we lose our principles, we invite chaos.”

We touched on this a little bit towards the end of season two, but this episode drives it home: The electrical grid is a high-profile target for attack and, if vulnerabilities are discovered and exploited, the public (or at least the Mr. Robot public) could get a tough lesson on how fragile key infrastructure really can be. We see that power has been out for nearly a week and it’s taking a toll on people in the streets, while ECorp higher-ups chuckle that they’re so very grateful for backup generators.

Having key infrastructure fail due to adverse weather (like a massive hurricane) is extremely dangerous and dire, of course. Having that infrastructure fail due to poor security would likely have a similar effect, except unlike disastrous weather, that kind of failure could and should theoretically have been completely preventable. Anger and chaos that we see on the streets in Mr. Robot almost seem like a given. It’s no real wonder that governments are catching up to the criticality of this issue — just this year, a U.S. executive order required critical infrastructure systems to become compliant with major cybersecurity regulations (from NIST) for the first time.

Did someone say “Hack the planet”?

When we see Elliot and Darlene putting on their hoodies, we know it’s time for some Serious Hacker Business. (I can just imagine all the eyes rolling right now…)

And when they find them walking the streets to some clandestine location, only to discover them coming across a hackerspace that not only has power but extremely fast internet, I really thought it was only a matter of time until we saw someone introducing themselves as Zero Cool.

But no, this hackerspace—complete with DEF CON logo flag hanging in the background—is throwing a raucous party, with lots of screaming and partying, loud EDM music and jostling crowds. And then someone mentions they’re having a CTF tournament, which is “like the Hacker Olympics,” hence the extremely high energy.

Capture the Flag tournaments are a staple of many security classes, gatherings and conferences, as they’re valuable teaching experiences and challenging competitions for proving your security mettle, regardless of your professional experience. The formats can vary depending on how the CTF tournament is run, but for the most ‘traditional’ style CTF, there’s a flag (e.g. a file or a string of text) to be captured on each team’s network, and the other teams work to defend their own flags as well as capture other team flags. While sometimes CTF competitors work individually, most tend to be team-based efforts. The hackers in the Mr. Robot space mention that if they don’t make it in the top three they’re not “going to Vegas,” a sure reference to the famous CTF that happens at DEF CON every year.

As for the party environment at the CTF on the show, well, the ones I’ve been to certainly had their share of EDM blasting, and the DEF CON CTF does have a lot of interesting lighting to add to the ambience, but for the most part people are heads-down, not talking (or talking very little) and intently concentrating. They’re not nearly as energetic as what Mr. Robot portrayed, but I imagine showing a lot of people sitting silently around a table in a hotel conference room doesn’t make for interesting television!

That’s not what we mean by hacking a car

So the milkshake guy we met at the opening of this episode is Irving, or as we hear during one scene, “Detective Abernathy.” We hear Irving use some of his own car expertise mixed in with some good old-fashioned social engineering to call OnStar (a paid service that allows remote access and control of a car). With just a bit of basic information about the car that’s tailing him, and a little bit of hustle, he convinces OnStar to disable the vehicle that’s following right behind him.

OnStar is often marketed in the States as a service to help people with emergencies in their car, but it has also proven popular with foiling car thieves, as it has been used by police to disable cars in the vein shown on the show. There were indeed fears of this capability being misused when OnStar announced it, so sure, with a bit of car knowledge and some social engineering, this plot beat seems plausible enough.

Other notes:

  • It was nigh-impossible to hear what Elliot was trying to do in disabling the Stage 2 backdoor over the din at the hackerspace, I caught something about changing the name server configs and that was about it. On screen, I saw shred, lots and lots of shred, the command to securely delete files in Linux. I’m not sure what happened there — commenters, fill me in! — but I’m starting to suspect Mr. Robot isn’t really a TV show, but is instead a covert plan to teach the world bits and bobs of Linux.
  • Though it was for just a split second, we do see Tyrell and Mr. Robot himself using Shodan, a favorite tool of many hackers and security pros, basically like a Google for the Internet of Things, revealing a whole lot of nifty data, including where that device is located geographically and what kind of system it’s running (and if that system is potentially out of date and vulnerable). Could prove interesting.

Did everyone see that E-coin commercial? Did anyone sign up for the service? In any case, we’re off to an interesting start in season 3. Let’s see where Mr. Robot takes us.


[twitter-follow screen_name=’NakedSecurity’ show_count=’yes’

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/x4DlqflHZvk/

Mr Robot season 3 episode Eps3.0_Power-Saver-Mode.H – the security review

For those of you who have been reading Naked Security for at least a year, you may remember that last year I wrote security-centric posts on Mr. Robot season 2 episodes, as they aired.

The show has earned a lot of accolades from the infosec community for its commitment to accurately portraying key security and hacking concepts, tools and cultural notes. To its credit, Mr. Robot has key staff with real information-security experience and hasn’t been shy in tapping security professionals for guidance and even a few cameos. So even if the show isn’t of interest to you plot-wise, and though it’s not always 100% on the mark, Mr. Robot easily wins the prize for most realistic portrayals of hacking on a TV show. (Granted, that’s not necessarily a high mark to clear.)

Since season 3 started airing on 11 October 2017, we thought it’d be worth following along this season as well to see what security tools and concepts pop up as well. (These aren’t plot reviews — there are plenty of blogs that already do those a lot better than I would.) The security recaps were fun to do last year, so why not again?

Inevitably I may have missed something or misinterpreted something I thought I saw—we tend to have great, edifying discussions in the comments of these posts, so let us know if there’s something else in each episode you thought was worth a call-out.

Here we go for round three of Mr. Robot.

WARNING:SPOILERS AHEAD – SCROLL DOWN TO READ ON

Before we dive in too deep, it’s worth revisiting the season 2 eps2.3logic-b0mb.hc and eps2.4m4ster-s1ave.aes posts that look at the Femtocell hack, as it came up again in this episode briefly.

We saw the new season open with a new character trying to get a … milkshake? When we first meet him, we don’t know who this guy is, but we see him actively trying to work his way around the rules, find the flaws, figure out a way to get what he wants. Let’s hold that thought and come back to it in a few moments.

“When we lose our principles, we invite chaos.”

We touched on this a little bit towards the end of season two, but this episode drives it home: The electrical grid is a high-profile target for attack and, if vulnerabilities are discovered and exploited, the public (or at least the Mr. Robot public) could get a tough lesson on how fragile key infrastructure really can be. We see that power has been out for nearly a week and it’s taking a toll on people in the streets, while ECorp higher-ups chuckle that they’re so very grateful for backup generators.

Having key infrastructure fail due to adverse weather (like a massive hurricane) is extremely dangerous and dire, of course. Having that infrastructure fail due to poor security would likely have a similar effect, except unlike disastrous weather, that kind of failure could and should theoretically have been completely preventable. Anger and chaos that we see on the streets in Mr. Robot almost seem like a given. It’s no real wonder that governments are catching up to the criticality of this issue — just this year, a U.S. executive order required critical infrastructure systems to become compliant with major cybersecurity regulations (from NIST) for the first time.

Did someone say “Hack the planet”?

When we see Elliot and Darlene putting on their hoodies, we know it’s time for some Serious Hacker Business. (I can just imagine all the eyes rolling right now…)

And when they find them walking the streets to some clandestine location, only to discover them coming across a hackerspace that not only has power but extremely fast internet, I really thought it was only a matter of time until we saw someone introducing themselves as Zero Cool.

But no, this hackerspace—complete with DEF CON logo flag hanging in the background—is throwing a raucous party, with lots of screaming and partying, loud EDM music and jostling crowds. And then someone mentions they’re having a CTF tournament, which is “like the Hacker Olympics,” hence the extremely high energy.

Capture the Flag tournaments are a staple of many security classes, gatherings and conferences, as they’re valuable teaching experiences and challenging competitions for proving your security mettle, regardless of your professional experience. The formats can vary depending on how the CTF tournament is run, but for the most ‘traditional’ style CTF, there’s a flag (e.g. a file or a string of text) to be captured on each team’s network, and the other teams work to defend their own flags as well as capture other team flags. While sometimes CTF competitors work individually, most tend to be team-based efforts. The hackers in the Mr. Robot space mention that if they don’t make it in the top three they’re not “going to Vegas,” a sure reference to the famous CTF that happens at DEF CON every year.

As for the party environment at the CTF on the show, well, the ones I’ve been to certainly had their share of EDM blasting, and the DEF CON CTF does have a lot of interesting lighting to add to the ambience, but for the most part people are heads-down, not talking (or talking very little) and intently concentrating. They’re not nearly as energetic as what Mr. Robot portrayed, but I imagine showing a lot of people sitting silently around a table in a hotel conference room doesn’t make for interesting television!

That’s not what we mean by hacking a car

So the milkshake guy we met at the opening of this episode is Irving, or as we hear during one scene, “Detective Abernathy.” We hear Irving use some of his own car expertise mixed in with some good old-fashioned social engineering to call OnStar (a paid service that allows remote access and control of a car). With just a bit of basic information about the car that’s tailing him, and a little bit of hustle, he convinces OnStar to disable the vehicle that’s following right behind him.

OnStar is often marketed in the States as a service to help people with emergencies in their car, but it has also proven popular with foiling car thieves, as it has been used by police to disable cars in the vein shown on the show. There were indeed fears of this capability being misused when OnStar announced it, so sure, with a bit of car knowledge and some social engineering, this plot beat seems plausible enough.

Other notes:

  • It was nigh-impossible to hear what Elliot was trying to do in disabling the Stage 2 backdoor over the din at the hackerspace, I caught something about changing the name server configs and that was about it. On screen, I saw shred, lots and lots of shred, the command to securely delete files in Linux. I’m not sure what happened there — commenters, fill me in! — but I’m starting to suspect Mr. Robot isn’t really a TV show, but is instead a covert plan to teach the world bits and bobs of Linux.
  • Though it was for just a split second, we do see Tyrell and Mr. Robot himself using Shodan, a favorite tool of many hackers and security pros, basically like a Google for the Internet of Things, revealing a whole lot of nifty data, including where that device is located geographically and what kind of system it’s running (and if that system is potentially out of date and vulnerable). Could prove interesting.

Did everyone see that E-coin commercial? Did anyone sign up for the service? In any case, we’re off to an interesting start in season 3. Let’s see where Mr. Robot takes us.


[twitter-follow screen_name=’NakedSecurity’ show_count=’yes’

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/x4DlqflHZvk/

Ransomware Grabs Headlines but BEC May Be a Bigger Threat

With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.

Recently, ransomware like WannaCry or Petya has generated dramatic headlines around the globe. The pernicious online threats have become a shooting star among malware vectors, gaining notoriety and troubling millions of businesses and individuals alike. However, another cyberthreat lurking beneath the surface and causing even greater damage is business email compromise (BEC).

Unlike most other cybercrime activity, BEC entirely depends upon social engineering. It involves a faked email from a co-worker or corporate executive that short-cuts internal processes and asks the finance department to make a payment. A ploy that appears to be fairly simple-minded turns out to be both surprisingly effective and lucrative.

Perpetrators typically begin their campaign with reconnaissance. This includes scouting the company’s hierarchy, corporate executives, and employees. While life for the bad guys was much more difficult — perhaps next to impossible — in the good old days, the advent of social media has turned things upside down. With introductions to the leadership team on the target’s website, along with their profiles published on Facebook, Google+, LinkedIn, and so on, perpetrators can hardly believe their luck. Gathering information has never been easier. BEC has literally become the land of milk and honey for cybercriminals.

Emails Bypass Most Security Tools
What then usually follows is a faked email, supposedly sent from the CEO or another corporate official, urgently requesting that the recipient pay a business partner or supplier. The beneficiary’s back account is often abroad and held by cybercriminals or their intermediaries. Laundering techniques and “money mules” worldwide drain the funds into other accounts that are difficult to trace.

These BEC campaigns primarily target large organizations, and many of them have fallen victim including Facebook and Google, as reported by Fortune Magazine. Despite all the corporate policies and safeguarding the firms have put in place, the success rate of the fake messages is astonishing — a 1,300% increase since Jan 2015, representing damages surpassing those of ransomware, according to the FBI in a press release. Since these emails don’t contain malware or suspicious links, they can often bypass security tools and permeate an organization.

Damages on the Rise
The Internet Crime Complaint Center (IC3) — an alliance between the FBI, the U.S. Department of Justice, and the National White Collar Crime Center — reports that $5.3 billion was stolen due to BEC-related fraud between October 2013 and December 2016, as highlighted in Cisco’s 2017 Midyear Cybersecurity Report (registration required). This corresponds to an average of $1.7 billion per year, the report notes. By way of comparison, ransomware exploits pocketed about $1 billion in 2016, according to the report.

“The ability of these criminal groups to compromise legitimate business email accounts is staggering — they are experts at deception,” Special Agent Martin Licciardo, a veteran organized-crime investigator at the FBI’s Washington field office, noted in the press release. “The FBI takes the BEC threat very seriously, and we are working with our international partners to identify these perpetrators and dismantle their organizations.”

Combating BEC fraud has little to do with technology. It all boils down to process improvements and policy enforcement, awareness, and education. For example, payments shouldn’t be made outside the official approval process and without applying the “four-eye principle,” a requirement that two individuals approve some action before it can be taken. Never rely on e-mail alone. An out-of-the-ordinary request for an out-of-country transfer should immediately sound alarm bells.

To effectively combat BEC, the FBI issued a one-pager that recommends organizations use  corporate email accounts only, and avoid free web-based accounts; that companies carefully consider what’s posted to their social media and corporate websites; that employees be suspicious of requests for secrecy or pressure to take action quickly; the separation of computer devices from Internet of Things (IoT) devices; and disabling of the Universal Plug and Play protocol (UPnP) on corporate routers.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Marc Wilczek is an entrepreneur and senior executive with more than 20 years of leadership experience within the ICT space. He’s passionate about all things #digital with emphasis on cloud, big data and IoT services. Before serving as VP portfolio, innovation … View Full Bio

Article source: https://www.darkreading.com/perimeter/ransomware-grabs-headlines-but-bec-may-be-a-bigger-threat-/a/d-id/1330088?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Ransomware Grabs Headlines but BEC May Be a Bigger Threat

With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.

Recently, ransomware like WannaCry or Petya has generated dramatic headlines around the globe. The pernicious online threats have become a shooting star among malware vectors, gaining notoriety and troubling millions of businesses and individuals alike. However, another cyberthreat lurking beneath the surface and causing even greater damage is business email compromise (BEC).

Unlike most other cybercrime activity, BEC entirely depends upon social engineering. It involves a faked email from a co-worker or corporate executive that short-cuts internal processes and asks the finance department to make a payment. A ploy that appears to be fairly simple-minded turns out to be both surprisingly effective and lucrative.

Perpetrators typically begin their campaign with reconnaissance. This includes scouting the company’s hierarchy, corporate executives, and employees. While life for the bad guys was much more difficult — perhaps next to impossible — in the good old days, the advent of social media has turned things upside down. With introductions to the leadership team on the target’s website, along with their profiles published on Facebook, Google+, LinkedIn, and so on, perpetrators can hardly believe their luck. Gathering information has never been easier. BEC has literally become the land of milk and honey for cybercriminals.

Emails Bypass Most Security Tools
What then usually follows is a faked email, supposedly sent from the CEO or another corporate official, urgently requesting that the recipient pay a business partner or supplier. The beneficiary’s back account is often abroad and held by cybercriminals or their intermediaries. Laundering techniques and “money mules” worldwide drain the funds into other accounts that are difficult to trace.

These BEC campaigns primarily target large organizations, and many of them have fallen victim including Facebook and Google, as reported by Fortune Magazine. Despite all the corporate policies and safeguarding the firms have put in place, the success rate of the fake messages is astonishing — a 1,300% increase since Jan 2015, representing damages surpassing those of ransomware, according to the FBI in a press release. Since these emails don’t contain malware or suspicious links, they can often bypass security tools and permeate an organization.

Damages on the Rise
The Internet Crime Complaint Center (IC3) — an alliance between the FBI, the U.S. Department of Justice, and the National White Collar Crime Center — reports that $5.3 billion was stolen due to BEC-related fraud between October 2013 and December 2016, as highlighted in Cisco’s 2017 Midyear Cybersecurity Report (registration required). This corresponds to an average of $1.7 billion per year, the report notes. By way of comparison, ransomware exploits pocketed about $1 billion in 2016, according to the report.

“The ability of these criminal groups to compromise legitimate business email accounts is staggering — they are experts at deception,” Special Agent Martin Licciardo, a veteran organized-crime investigator at the FBI’s Washington field office, noted in the press release. “The FBI takes the BEC threat very seriously, and we are working with our international partners to identify these perpetrators and dismantle their organizations.”

Combating BEC fraud has little to do with technology. It all boils down to process improvements and policy enforcement, awareness, and education. For example, payments shouldn’t be made outside the official approval process and without applying the “four-eye principle,” a requirement that two individuals approve some action before it can be taken. Never rely on e-mail alone. An out-of-the-ordinary request for an out-of-country transfer should immediately sound alarm bells.

To effectively combat BEC, the FBI issued a one-pager that recommends organizations use  corporate email accounts only, and avoid free web-based accounts; that companies carefully consider what’s posted to their social media and corporate websites; that employees be suspicious of requests for secrecy or pressure to take action quickly; the separation of computer devices from Internet of Things (IoT) devices; and disabling of the Universal Plug and Play protocol (UPnP) on corporate routers.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Marc Wilczek is an entrepreneur and senior executive with more than 20 years of leadership experience within the ICT space. He’s passionate about all things #digital with emphasis on cloud, big data and IoT services. Before serving as VP portfolio, innovation … View Full Bio

Article source: https://www.darkreading.com/perimeter/ransomware-grabs-headlines-but-bec-may-be-a-bigger-threat-/a/d-id/1330088?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Olympic Games Face Greater Cybersecurity Risks

Cybercriminals may alter score results and engage in launching physical attacks at future Olympic Games, a recently released report warns.

Berkelely, Calif. – The Olympic Games in the coming years are likely to face far more serious cyberattacks and ones that will be more difficult to detect, according to a report released this week by the UC Berkeley Center for Long-Term Cybersecurity (CLTC).

And although the Summer Olympics don’t roll into Los Angeles until 2028, US officials are already considering the cybersecurity threats for the high-profile event. The Los Angeles Organizing Committee for the 2028 Olympic Games provided support for the CLTC report.

The concern is understandable. During the 2008 Beijing Olympics, security officials fielded 11 million to 12 million daily alerts, with roughly a half dozen falling into the imminent threat category, according to the report. And in the 2012 Summer Olympics in London, six major security incidents – five of which involved DDoS-related attacks – were brought to the attention of the event’s CIO. Last year, at the conclusion of the Rio Olympic Games, Russian hackers pilfered medical records of athletes from the World Anti-Doping Agency.

While most of the threats that have emerged at the Olympics have largely fallen into the categories of reputational harm and financial harm. Cybercriminals ran ticket scams, manipulated websites, pilfered payment information, and attacked maintenance systems, but even more serious attacks are likely in the future, said Betsy Cooper, CLTC executive director, who presented the findings during a panel session here at the University of California at Berkeley this week.

Threats to Grow Darker

While most of the past attacks on sporting events center on IT systems at stadiums and ticket sales and operations, future cyberattacks at the Olympics may occur in eight key areas, says Cooper.

The areas include cyberattacks to facilitate terrorism and kidnappings and panic-induced stampedes; altering scoring systems; changing photo and video replay equipment; tampering with athlete care food dispensing systems; infiltrating monitoring equipment; tampering with entry systems; and interfering with transportation systems.

“I was surprised to learn there are instances where human decisions are overridden by technology,” Cooper said, in reference to a growing reliance on using technology to make the first call in a sporting event, rather than a human referee.

She pointed to the reliance of electronic line-calling technology Hawk-Eye that is used in such sports as tennis. The Association of Tennis Professionals (ATP) plans to fully use electronic line-calling technology at its Next Gen Finals match, reports Tennis.com.

“Increasingly technology is being used to assist with referee calls,” Cooper said, noting the potential of hackers breaking into such systems and altering the outcome of the scoring systems. “With more automation, there are more potential vectors of attack.”

Betsy Cooper, CLTC executive director; Doug Arnot, Broadstone Group Chairman; Brian Nelson, LA 2028 General Counsel; Missy Franklin, five-time Olympic Medalist; and Steve Weber, panel moderator and CLTC faculty director

These type of attacks not only have the potential to alter the outcome of which athletes become gold-medal winners at the Olympics, but also detection of this type of hacking may be more difficult to detect, she added.

If an electronic referee is called into action multiple times over the course of an athlete’s performance, a hacker could occasionally slip in to alter the results just enough to tip the win in the target’s favor.

Athletes could also face physical harm if cybercriminals were to tamper with automated food systems that dispense such items as protein drinks that have specific nutrients doled out for each athlete. An Olympic swimmer who is allergic to gluten, for example, could get a protein drink laced with gluten after a cybercriminal, or nation-state, seeks to take that athlete out of the games, according to Cooper.

Such attackers are likely to be cybercriminals looking to make money by betting on certain teams or players and altering the results to win, or a nation-state or patriotic national wanting to rig the game so their home team wins, said Doug Arnot, chairman of the Broadstone Group and a panelist at the Olympics cybersecurity panel.

Missy Franklin, a five-time Olympic medalist swimmer and panel member, said as an athlete she is first and foremost worried about physical security, and then secondly, cybersecurity threats that can alter the outcome of a game.

“It’s intimidating and threatening,” Franklin said, noting technology is used to determine the swimmer who touches the wall first when deciding the outcome of a game.

That said, however, Franklin noted that human referees are also used to make calls on the way a swimmer makes a lap turn or whether they start the race prematurely.

Keeping a Level Playing Field

CLTC made several recommendations to minimize the attack surface at the Olympic Games. One is to balance opportunity and risk by questioning the need to add new technology at the risk of enlarging the attack surface.

Another suggestion is to have a human as a backup to any technology, and to give human referees the ability to verify that the technology used in the games is producing the correct results.

Cybersecurity training on such issues as phishing to social engineering should be provided to all Olympic staff members and officials, according to the report.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Related Content:

 

 

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET’s … View Full Bio

Article source: https://www.darkreading.com/informationweek-home/olympic-games-face-greater-cybersecurity-risks-/d/d-id/1330107?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple