STE WILLIAMS

TrickBot Rapidly Expands its Targets in August

What’s This?

TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Doron Voolf and Jesse Smith also contributed to this article.

Compared to the most recent version we examined in July (v24), TrickBot’s target URL list has grown significantly, surpassing the 1,000 mark for the first time with notable increases in US targets.

TrickBot authors also introduced a worm module in v29 that spreads locally through SMB, a port usage we questioned when it turned up on the command and control (CC) list in v24. Starting with v29, we began analyzing the infection targets separately by static injection (sinj) targets, which are redirection attacks, and dynamic injection (dinj) targets, which are webinjects. Whereas there are more dinj targets in total, there has been a sharp rise in sinj targets in the latest analyzed configurations.

URL Target Analysis
US financial institutions were the most targeted starting in v28 (185 URLs), followed by Australia, Spain, and Canada, which stayed consistent through v29 and v30. Rounding out the top 5 country targets was the “unknown” group. The top five company targets are led by “unknown” with 46 URLs, and followed by Chase, PayPal, American Express, and Bank of America. Little change in the URL targets occurred in v29 with the introduction of the worm module, but v30 saw the addition of 40+ US targets and a handful of new Canadian targets, moving Citibank into the third most targeted position. We also saw Amazon begin to be targeted for the first time, with 10 URLs present in the dinj target list.

Version 31 featured more Australian, New Zealand, Singapore, UK, and “unknown” targets. No URLs at all were dropped from v30, and we saw 159 added, while the company target list remained the same from v30. Version 32 saw almost twice as many URL targets as v31, even though 119 targets from v31 were dropped. There is a large focus on the US and UK, and the Nordic banks (previously observed in v24) are back.

In many instances, it appears that the targets for v32 were simply a combination of targets from previous versions. Almost all of the countries with eight or less targets appearing in v32 did not appear in v31, but did appear in v24. The Nordic countries behaved similarly: they did not appear in v31, but 78% of their URLs did appear in v24. Most of the increase in targets in this version are attributable to recycling older targets from previous versions that had been discarded over time. Notably, Amazon was discarded as a target in v32.

“Unknown” URL Target Analysis
URLs in this group often resemble “*/business/login/Login.jsp*”, about which it is impossible to make a target determination. Every “unknown” URL target is a dinj (webinject) target, which makes sense; static inject targets need to be sure of what page the user is attempting to access in order to serve up a convincing redirect, while webinject targets merely need to insert malicious code into legitimate pages.

These “unknown” URLs could be used to target groups of banks all relying on a single online platform with an identical subdomain architecture. For instance, Bank XQW could use “www.bankxqw.com/business/login/Login.jsp”, while Bank QRS could use “www.bankqrs.co.uk/business/login/Login.jsp”. Both banks would be affected by the example “unknown” dinj target URL, allowing TrickBot to target multiple banks with a single URL. Certain URLs within the TrickBot target list strongly suggest this intent.

There was also a large number of URLs in the form of “*/snapshoot/#”, “*/rcrd/#”, and */getq/#” targets; a few were wildcarded versions of URLs from Dyre, but most differed in the specific number used at the end of the URL from those seen in Dyre target lists. In the original Dyre configuration, these URLs took the form of “bankqrs.com/snapshoot/###”, with a different 1, 2 or 3-digit number assigned to different companies. When they appeared on both the TrickBot and Dyre target lists, comparing these numerical identifiers allowed us to determine which company was being targeted. It is also possible that these URLs were not targeting a specific firm at all, and so we hesitate to offer definitive analysis on these URLs at this time, other than to note that they are unusual and worth our further attention.

CC Locations and Owners
It’s well known that TrickBot hosts its CC servers on compromised wireless routers. Prior to IoT devices being used as attacker infrastructure (hosting malware and growing thingbots), it was unusual to see the US have such a large portion of the pie because it’s typically not hard to get nefarious activity hosted in the US shut down quickly. JSC Mediasoft had the most used networks for hosting TrickBot CC servers (10 of Russia’s 15), followed by OVH; the 9 US CC servers are spread out among 8 separate networks.

Figure 2: TrickBot v24 through v32 CC servers by country

The unusual targets that stood out in our analysis were the rise in US-based firms—especially credit card companies. In addition to credit card companies, we have seen some development of net new URLs. This indicates some level of effort being placed on refining the target set, but there is still an overwhelming reliance on the target set found in the Dyre malware, circa late 2015.

This partly explains how TrickBot is able to go through so many iterations so quickly. It’s time-consuming to research all the appropriate URLs for all the financial services providers in a specific country, but almost all of that work has been done before. TrickBot’s authors can simply swap in the set of URLs they want from Dyre, make some tweaks based on updates to banks’ login sequences, and spend the rest of their time focusing on making the code itself more effective. We anticipate that TrickBot will continue to focus on the same firms targeted by Dyre through 2015, and will continue to make small modifications to the URLs to improve the effectiveness of their targeting.

Get the latest application threat intelligence from F5 Labs.

Sara Boddy currently leads F5 Labs, F5 Networks’ threat intelligence reporting division. She came to F5 from Demand Media where she was the Vice President of Information Security and Business Intelligence. Sara ran the security team at Demand Media for 6 years, covering all … View Full Bio

Article source: https://www.darkreading.com/partner-perspectives/f5/trickbot-rapidly-expands-its-targets-in-august/a/d-id/1329810?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Equihax: Identifying & Wrangling Vulnerabilities

Now that we know what was taken from Equifax, how it was taken, and what is being sold, what more do we need to learn before the next time?

Equifax recently confirmed that the vulnerability responsible for the massive breach of 143 million records was indeed for the ApacheStruts 2 Web framework, but not CVE-2017-9805 as was initially circulated. Rather, CVE-2017-5638, which could enable an attacker to perform a remote code execution using malicious content in the absence of suitable security measures, has been pinpointed as the flaw that permitted access to the yet-to-be identified actors. CVE-2017-9805 is certainly worthy of our attention: until last week, it was essentially a zero day with exploits available in the wild.

The bug was first found in March, and a patch has been available since its discovery. In essence, Equifax could have been working to address the shortcomings and protect the personal information of millions using publicly available information approximately two months before the breach occurred. For reasons yet unknown, it did not. As a result, millions of Americans are scrambling to find out if they have been breached and to protect their information from being used for identity theft.

On the other hand, Equifax is facing federal scrutiny and a massive hit to its reputation and consumer trust. The firm’s top information security executives — its CIO and chief security officer — have departed the company following what’s being called one of the worst breaches in US history.

What happened at Equifax, and how can organizations patch their systems and improve their security posture to prevent breaches of this magnitude in the future?

Let’s start with what happened: The data exfiltrated between May to July 2017 included names, Social Security numbers (SSNs), dates of birth, and “other information,” according to Equifax. That data may now be for sale. Security blogger Krypt3ia found a listing on the Dark Web (shown in the image below) ostensibly placed by the Equifax hackers offering records for sale in return for digital currency. The listing includes some samples of the data in the form of screenshots. How much are the records worth? Four Bitcoins would net you 1 million entries; at today’s rate, that’s approximately $13,840. It’s unclear if the purchaser could specify what type of entries they could acquire, as an SSN would certainly command more money than dates of birth on secondary markets.

Source: https://krypt3ia.wordpress.com/2017/09/14/equihax/

The listing is very disconcerting. Until recently, we were aware of the breach’s grand scale and some rough order of magnitude in terms of the number of records: 143 million in comparison to the Yahoo hack, which included more, but arguably less-sensitive, records. Seeing records — and the personal identifiable information of individuals — is sobering. For those engaged in threat modeling, the price points provide a marker by which to assess the value of such records in underground markets, although both wallets appeared to be empty at the time of writing.

Vulnerabilities Matter but Do Not Stop Business
We can elicit a number of lessons from this event. In response to Equifax’s disclosure of the Struts2 bug, the Apache Software Foundation released some cogent guidance to those using any Web framework. As always, Brian Krebs has provided practical advice to those who may have been affected by the breach. Gartner’s Strategic Planning Assumptions are also worth repeating here:

  • Through 2021, the single most impactful enterprise activity to improve security will be patching.
  • Through 2021, the second most impactful enterprise activity to improve security will be removing Web server vulnerabilities.

This incident highlights the importance of a multilayer application security strategy. Firstly, it is absolutely critical to patch systems in a timely fashion. Had Equifax had an effective, multilayered application security strategy that includes the underlying infrastructure, middleware, application, and edge, the company likely would have prevented the intrusion or caught it much sooner. Appropriate data governance also could have diminished the scale of exposure of sensitive data: an understanding of what kind of records are in their possession, their classification, how long they can be kept for, and the security that must be applied to safeguard them accordingly appears to have been elusive.

A mature security regime requires organizations to implement a combination of technical vulnerability management processes and the ability to deploy effective security controls — including compensating controls when patches cannot be deployed in a timely manner.

Web applications and services (like APIs) represent critical business drivers as well as an exposed attack surface for a growing number of organizations. That attack surface can be reduced by properly hardening infrastructure and middleware, using up-to-date frameworks, and defeating attacks at the edge of the network: a Web application firewall, a security control that proxies all Internet traffic while applying a security posture to block traffic deemed malicious or unauthorized, is a highly effective control when properly configured. This year’s Verizon Data Breach Investigations Report confirms that Web application attacks lead the pack with respect to breaches, with botnet activity bolstering that number considerably.

Hackers tend to view the human user as a path of least resistance, but that calculus changes considerably when vulnerabilities are discovered in technologies. Today’s time-to-exploit has become relatively shorter as security expertise proliferates, even if the number of publicly available exploits is dropping.

Don’t give attackers a window of opportunity! Vulnerabilities don’t need to slow down or stop business operations. Deploying patches is absolutely imperative to maintain a strong security posture, but the process can be disruptive or complex, especially for legacy systems, making additional security measures — acting as compensating controls — necessary to provide suitable defenses to maintain exploitable systems while patches are deployed.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Nick Deshpande, CISSP, is the vice president of product development at Zenedge, where he combines his passions for user experience and security. He’s a graduate of the Royal Military College of Canada and American Military University. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/equihax-identifying-and-wrangling-vulnerabilities/a/d-id/1329966?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Ransomware Numbers Continue to Look Abysmal

Ransomware is one of the fastest-growing concerns among IT pros, according to several studies out this week.

Even after several years of escalation, ransomware continues its hockey-stick growth by just about every metric. This week, three new studies show how ransomware continues to escalate around the globe, proving to be one of the fastest-growing problems that cybersecurity practitioners face today.

“Ransomware attacks have eclipsed most other global cybercrime threats, with the first half of 2017 witnessing ransomware attacks on a scale previously unseen following the emergence of self-propagating ‘ransomworms,’ as observed in the WannaCry and Petya/NotPetya cases,” write Europol experts in the agency’s Internet Organized Crime Threat Assessment (IOCTA) 2017 report published this week. “Moreover, while information-stealing malware such as banking Trojans remain a key threat, they often have a limited target profile.”

Interestingly, many experts proclaimed the highly proliferated worms to be failures because WannaCry and Petya/NotPetya didn’t reap financial benefits as effectively as other attacks. According to Europol, less than 1% of victims paid a ransom for WannaCry. But the ill effects remain disruptive and costly no matter which way these attacks are analyzed. For example, though most industry estimates peg total ransoms paid to attackers in the past two years to be only about $25 million, the FBI believes the total cost of ransomware broke the $1 billion mark in 2016.

According to a report out today by McAfee, this year the WannaCry attacks infected more than 300,000 systems worldwide in less than 24 hours. The total costs of the attacks are still being compiled, but given the disruption of major infrastructure such as hospitals and factory floors, the bill will be high.

“It has been claimed that these ransomware campaigns were unsuccessful due to the amount of money made,” said Raj Samani, chief scientist for McAfee.”However, it is just as likely that the motivation of WannaCry and NotPetya was not to make money but something else. If the motive was disruption, then both campaigns were incredibly effective. We now live in a world in which the motive behind ransomware includes more than simply making money. Welcome to the world of pseudo-ransomware.”

Whatever the motivation, new ransomware increased by 54% in the second quarter of this year, according to McAfee. The number of total new ransomware samples has increased by 47% in the past four quarters.

Tellingly, 80% of security pros view ransomware to be a moderate or extreme threat today. This is from a study of nearly 500 practitioners among the Information Security Community on LinkedIn, conducted by Cybersecurity Insiders and Crowd Research Partners. That survey showed that 75% of organizations affected by ransomware have experienced up to five attacks in the last year, and 25% have been hit by six or more attacks.

Disconcertingly, the study showed that 39% of organizations say it takes them anywhere between several days to a few weeks to recover from a ransomware attack. This lack of resiliency and the fallout from attacks this year highlight the lack of accountability for instituting the basics of IT security within organizations, says James Carder, CISO of LogRhythm.

“Core IT operational competencies, such as patch management, backups, disaster recovery, and incident response, are not well implemented or maintained,” he says. “These are absolutely essential in protecting your company from damaging cyberthreats, and without them, you are left in a perpetually vulnerable state, a sitting duck for these types of attacks, merely hoping that you aren’t compromised.”

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/ransomware-numbers-continue-to-look-abysmal/d/d-id/1330005?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Central Banks Propose Better Inter-Bank Security

Institutions from the world’s largest economies want to improve security following abuse of inter-bank messaging and payment systems.

Central banks from major economies have suggested steps to advance security of inter-bank messaging and payment systems, Reuters reports. The Committee on Payments and Market Infrastructures (CPMI) has called for banks to improve security to protect the financial system.

Last year, attackers tried to steal almost $1 billion from the Bangladesh central bank’s account at the Federal Reserve Bank of New York. About $80 million was taken before the hackers were detected. Bangladesh blamed the incident on poor security around the Bangladesh Bank’s SWIFT terminal. SWIFT is used among banks to send payment instructions and until last year, was used to transfer trillions of dollars every day.

CPMI made suggestions to secure messaging services like SWIFT and Britain’s CHAPS system. These include ensuring quick reporting of fraud and attempted fraud, risk audits, user education, and monitoring system access points, where hackers often enter the system.

The security proposals will be published in early 2018.

Read more details here.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/risk/central-banks-propose-better-inter-bank-security/d/d-id/1330006?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Report: Bank Email Fraud Increases since Equifax Breach

Cyberthieves are impersonating banks to send bogus “secure” bank email messages.

A spate of bogus “secure message” emails from financial institutions are making the rounds, following the high-profile Equifax breach, according to a report released today by Barracuda.

Over the past month, variants of the “secure message” email attacks have included malicious Word document attachments that rewrite directory files in users’ computers once opened, according to Barracuda’s Threat Spotlight report.

In some of these cases, depending on the script, the malware will remain dormant to avoid anti-virus detection when downloaded or opened but will spring into action later – potentially as ransomware.

Techniques used in these fraudulent “secure message” emails include impersonation of financial institutions, spoofed email domains and phishing attacks to get users to open the attachments or click on the links, the report notes.

Read more about the bogus “secure messages” here.

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/report-bank-email-fraud-increases-since-equifax-breach/d/d-id/1330007?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

The sorry state of stock trading mobile app security revealed

Remember how mobile banking apps got raked over the coals for, among other security lapses, not checking security certificates?

Raked over the coals, as in, repeatedly, in 2013 and again in 2015.

Well, the bad money-handling apple hasn’t fallen very far from the we-don’t-need-no-certificate-validation tree. The only difference is that this time around, it’s stock-checking apps that are asleep at the wheel, using HTTPS without bothering to validate security certificates, or even using HTTP and sending your passwords and other data around in plain text.

A recap of what’s led up to the still-sorry state of mobile financial apps:

Back in the Dark Ages – that would be 2013 – we were pretty appalled when IOActive reported that 40% of iOS banking apps blindly accepted any old TLS certificate for secure HTTP (HTTPS) traffic, with no validation whatsoever.

When you engage in a secure connection using HTTPS you’re given a public key by the system you’re connecting to and that key is signed by a digital certificate that identifies them. Anyone can create a certificate but unless the details in it have been vouched for by a CA (Certificate Authority) it’s deemed untrustworthy.

If apps don’t bother to check if a CA has vouched for a certificate then all bets are off. Any certificate could be presented, by anybody, without setting off any alarms.

A banking app could be misdirected to a phishing site, perhaps by a bogus Wi-Fi hotspot, and you’d be none the wiser. Your mobile browser wouldn’t tell you to back out of the untrusted site and you’d be left high and dry, handing over your banking details to a crook.

Ah, those kooky 2014 banking apps! Those were the days. The painful days.

It had to get better, right? And it did, at least a little.

By December 2015, when IOActive redid the study, it found that the initial 40% of iOS banking apps that weren’t validating certificates had shrunk to “only” 12.5%.

So yes, it got better, but it still wasn’t great: those iOS banking apps were still committing a laundry list of security sins that left many of them vulnerable to things like JavaScript injections, as well as leaking user activity and the back and forth interactions between client and server – all of which should be kept locked away from prying eyes.

It’s not just financial apps that get HTTPS wrong though.

Other apps that fumble HTTPS have included Pinterest’s iOS app and Microsoft’s iOS Yammer client, both of which failed to give warnings about fake certificates when Dutch security company Securify checked them out in April 2015.

Anyway, fast forward to the current time, and IOActive has taken yet another look at mobile apps that handle our money. This time, it looked at stock-checking apps that use HTTPS but that, deja vu, don’t check the SSL certificate.

…and/or that send passwords in clear text… and/or that expose trading and account information… and/or send sensitive data to log files… and/or fail to encrypt data.

In fact, IOActive’s Alejandro Hernández says that the security of mobile trading apps – he looked at 21 of the most popular Android and iOS apps – is far worse than the banking apps the company’s looked at in the past:

The results proved to be much worse than those for personal banking apps in 2013 and 2015. Cybersecurity has not been on the radar of the [financial technology] space in charge of developing trading apps. Security researchers have disregarded these apps as well, probably because of a lack of understanding of money markets.

The new flavors of appalling that arose from testing 14 security controls in the trading apps included these findings:

  • 68% of Android and iOS apps failed to validate SSL certificates.
  • 62% of Android and iOS apps left sensitive data in the logging console.
  • 67% of Android and iOS apps failed to securely store data.*
  • 62% of Android apps contained hardcoded secrets.
  • 95% of Android apps didn’t detect if they were running on a rooted device.
  • 95% of iOS apps didn’t support privacy mode.

There’s another blast from the past in this recent research too. Most of the trading apps don’t have two-factor authentication (2FA), just like the banking apps in the 2013 and 2015 analyses.

When we reported on the banking apps in 2013, Naked Security’s Paul Ducklin pointed out that all the cool kids offer 2FA: Facebook, Twitter, Google et al.

The extra security provided by 2FA is obvious: crooks who steal or guess your password are out of luck unless they also steal your mobile phone, without which they won’t receive the additional codes they need to log in each time.

Hernández has disclosed his findings responsibly, he says, reporting them to 13 of the brokerage firms whose trading apps harboured the higher risks vulnerabilities. Only two responded.

So how can we get mobile apps to improve without people like Hernández having to pop them open, gasp in horror and write lengthy reports first? He has a suggestion:

…there are rating organizations that score online brokers on a scale of 1 to 5 stars. I glimpsed at two recent reports and didn’t find anything related to security or privacy in their reviews. Nowadays, with the frequent cyberattacks in the financial industry, I think these organizations should give accolades or at least mention the security mechanisms the evaluated trading platforms implement in their reviews.

For now, improvement rests in the hands of the brokerage firms and app developers who need to up their games.

You can mitigate some of the problems IOActive uncovered by using a VPN if you’re trading from coffee shops, airports or anywhere else with public Wi-Fi. Most of the security issues mentioned here are invisible though, with the exception of 2FA. If it isn’t a feature of a trading app you want to use you can send a message by walking away.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/D8Tpu7RM9pw/

NBD: Adobe just dumped its private PGP key on the internet

Updated An absent-minded security staffer just accidentally leaked Adobe’s private PGP key onto the internet.

The disclosure was spotted by security researcher Juho Nurminen – who found the key on the Photoshop giant’s Product Security Incident Response Team blog, ironically. That contact page should have only included the public PGP key.

Adobe has not returned a request for comment on the matter, possibly because it has slightly more pressing concerns at the moment. Namely, key rotation and internal public-private key education. It has also torn down its private key from the security blog.

It goes without saying that the disclosure of a private security key would, to put it mildly, ruin a few employees’ Friday. Armed with the private key, an attacker could spoof PGP-signed messages as coming from Adobe. Additionally, someone (cough, cough the NSA) with the ability to intercept emails – such as those detailing exploitable Flash security vulnerability reports intended for Adobe’s eyes only – could use the exposed key to decrypt messages that could contain things like, say, zero-day vulnerability disclosures.

Armed with that info, miscreants could exploit that information to infect victims with malware before Adobe had even considered deploying a patch.

On the other hand, PGP isn’t exactly known for being a user-friendly system, and the process of intercepting and decrypting messages would be difficult to do before the keys are changed.

While very embarrassing for Adobe, the likelihood this will lead to any sort of catastrophic incident is fairly low, especially if the key is only being used for email. Still, it’s rather clumsy. We’re all only human after all. ®

Updated to add on September 25

A apokesperson for the Photoshop giant has been in touch to say:

Adobe is aware of the issue and has revoked the PGP key in question and published a new public and private key. The PGP key in question was used exclusively for email correspondence between external security researchers and the Adobe security team, and there is no impact to Adobe customers.

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/09/22/oh_dear_adobe_security_blog_leaks_private_key_info/

Mac High Sierra hijinks continue: Nasty apps can pull your passwords

A security shortcoming in earlier versions of OS X has made its way into macOS High Sierra despite an expert’s best efforts to highlight the flaw.

Patrick Wardle, of infosec biz Synack, found that unsigned, and therefore untrustworthy, applications running on High Sierra, aka macOS 10.13, were able to quietly access sensitive information – including stored passwords and keys – without any notification to the user. Normally, apps, even signed trusted ones, trigger a prompt to appear on screen when touching the operating system’s Keychain database of saved passphrases and other secrets.

In a short video, Wardle showed how his proof-of-concept unsigned app was able to lift the highly personal information on an updated High Sierra Mac. Wardle said he provided Apple the software and details of the flaw earlier this month, but a fix could not be deployed in time for this week’s official High Sierra release. Wardle said a patch is likely in the works.

Still, the researcher reckoned the app should serve as a note of caution to anyone who regularly installs and runs applications downloaded from the internet on their Mac. Even legitimate apps, he noted, could possibly be compromised to exploit the vulnerability.

“Obviously, random apps should not be able to access the entire keychain and dump things like plaintext passwords,” Wardle explained this week. “In fact, even signed Apple utilities (ie, /usr/bin/security) that are designed to legitimately access the keychain explicitly require user approval; or most authenticate (with the user’s password) before they are allowed to retrieve sensitive keychain data.”

This is not the first time the Synack researcher has poked holes in Apple’s handling of software permissions. In 2015, Wardle was credited with discovering weaknesses that would let an attacker circumvent the security protections in Apple’s app checker, the OS X Gatekeeper.

This is also not the first major security hole to be uncovered in the day-old High Sierra macOS.

Last week, as the OS was nearing its formal release, Wardle revealed that a flaw in the Security Kernel Extension Loading (SKEL) security tool allowed its protections to be easily bypassed, potentially leaving users vulnerable to low-level infections such as rootkits.

It goes without saying that macOS users should avoid running unsigned applications, and disable their execution from the system control panel. Essentially, the take-home here is: don’t run unsigned apps. And if you or your friends or family really must do so, be mindful that even untrusted software can exfiltrate sensitive information that applications typically shouldn’t have access to without your permission. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/09/28/high_sierra_hijinks_continue_nasty_apps_can_pull_your_passwords/

Ransomware keeping cops, NHS and local UK gov bods awake at night

Cybersecurity bods at the Met Police, NHS and the Local Government Association in the UK believe ransomware will be one of the biggest threats facing the British public sector next year.

Speaking at the Cyber Security in Healthcare event in London, the public sector heads discussed the predicted cybersecurity threats to health and care services in 2018 and how are they evolving.

DCI Gary Miles, from the SC07 Organised Crime Command at the Metropolitan Police, who is responsible for complex fraud and cybercrime, said: “Three years ago [the main threat] was the inception of DDoS attacks or the criminal damage of computers; two years ago it was data breaches like TalkTalk, this year its been the use of ransomware attacks on individuals and corporate systems. Next year it will be more of the same.”

The Met has 300 officers looking at this specific issue, said Miles. Just under 50 per cent of all crime committed has an online element, according to the Office for National Statistics.

Dan Taylor, head of security for NHS Digital, said he “totally agreed”. However, he added that healthcare has not been specifically targeted, although it has “often fallen victim” as it was with WannaCrypt. “We need to make sure [good security practice] is everyone’s responsibility,” he said.

Earlier this year it emerged that NHS Digital stopped short of advising health organisations in England not to cough up for the WannaCrypt ransomware attack because it couldn’t be certain that all hospitals had backed up patient records.

However, Taylor said paying the ransom generally “exacerbates the issue”, which is why NHS Digital now advises against it.

More than $140,000 (£105,000) in Bitcoin has been paid out by victims of the global WannaCrypt ransomware outbreak from May.

Sarah Pickup, deputy chief executive of the Local Government Association, outlined the Internet of Things as one potential area of future threats.

But when asked about what keeps her up at night, she said she was more concerned that being too risk averse about data protection would stop organisations doing what they needed.

Miles said: “What worries me is we don’t know what the next thing will be. We are playing catch-up as the digital [world] has gone at a steep curve.”

Ransomware attacks are becoming increasingly prevalent, with security consultant Trend Micro naming it as the biggest threat to companies this year.

Joseph Bonavolonta, an assistant special agent with the FBI, has previously said firms that fall victim to infection from file-encrypting ransomware should simply pay the ransom. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/09/28/ransomware_biggest_threat_to_uk_public_sector_2018/

NatWest customer services: We’re aware of security glitch

Retail bank NatWest is backtracking on previous claims that it was aware of a security glitch at the log-in stage that requested customers to enter more digits of their password than existed.

A little over a week ago, a potential security issue emerged when this writer was asked to enter the 11th digit of a password to an online account that only contained nine characters.

Worried I’d been hacked, I rang the NatWest Customer Care Centre and a supervisor took on the case, which was then “escalated”.

A letter was subsequently sent by NatWest apologising for the incident, assuring your correspondent: “in order to more thoroughly investigate this matter for you, I have contacted our Online Banking technicians directly and discussed the issue in detail with them.”

The supervisor continued: “I was informed that we are currently aware of an error in which the online banking service is requesting customers to enter a digit of their password which they do not hold.”

The techies at NatWest could not ascertain where the error stemmed from, “as our systems do not record which characters of a pin or password in entered into the system for security reasons,” the letter continued.

Work on a solution was under way but “no time scale can yet be provided,” the NatWest customer services rep said.

So El Reg contacted the PR wizards at the bank to ask them what was happening, only for them to deny any such problem existed.

The supervisor’s letter had been sent with “with incorrect information”. The PR handlers further assured us, “there is no technical glitch with our online banking facilities”.

We did attempt to clarify why the info was sent out, but got no further beyond the suggestion that some member of their customer services team had exceeded their authority.

Has anything similar happened to any of you? We’d love to know. Send us an email here. ®

Sponsored:
The Joy and Pain of Buying IT – Have Your Say

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/09/28/natwest_customer_services_were_aware_of_a_security_glitch/