STE WILLIAMS

WikiLeaks exposes CIA anti-forensics tool that makes Uncle Sam seem fluent in enemy tongues

WikiLeaks released the third tranche of its leaked CIA documents trove on Friday, which in this episode focuses on anti-forensics tools.

The previous two releases from Vault7 have focused on manuals and supporting documents for the spy agency’s hacking tools. The first set of leaked files, released on 7 March, described security exploits used to compromise vulnerable Android handhelds, Apple iPhones, Samsung TVs, Windows PCs, Macs, and other devices.

Two weeks later, in episode two, we learned how the CIA could purchase Apple Macs and iPhones, install spyware on them, and give them to targets. WikiLeaks spun this to suggest this might be happening in the factory, a suggestion unsupported by the leaked documents themselves, as previously reported.

Episode three brings the release of source-code files for the CIA’s secret anti-forensic Marble Framework. The technology is designed to make the CIA’s malware harder for security researchers at antivirus firms to analyse, thus hampering attribution. It does this by hiding (“obfuscating”) text fragments.

Obfuscating code and designing it so that it detects and doesn’t run in virtual machine sandbox has not been an uncommon tool among mainstream cybercrooks for some years.

One feature in Marble stands out. It creates a means for virus writers to pretend that the malware was created by a speaker of a range of foreign languages (Chinese, Russian, Korean, Arabic and Farsi). These are, of course, the languages of the US’s main cyber-adversaries – China, Russia, North Korea and (historically, at least) Iran.

WikiLeaks suggests that this tech would allow the real-life equivalent of American Dad‘s Stan Smith to trick security researchers into thinking they were, for example, Chinese PLA.1

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, but there are other possibilities, such as hiding fake error messages.

There might be something in this but robust attribution is based on multiple factors, so using Marble alone wouldn’t be enough to throw a normally competent cyber-sleuth off the trail.

Marble Framework is used for obfuscation only and does not contain any vulnerabilities or exploits by itself, something that has allowed WikiLeaks to release its source code. Exploits and hacker tools from earlier releases have been held back and only manuals and supporting documents have been pushed out. WikiLeaks has promised to supply CIA’s hacking tool code to vendors. El Reg has independently confirmed that Assange and co have entered talks on this point with Microsoft, at least.

Bootnote

1Marble also includes a deobfuscator to reverse CIA text obfuscation (i.e. translate text strings back to English).

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/31/wikileaks_cia/

WikiLeaks exposes CIA anti-forensics tool that makes Uncle Sam seem fluent in enemy tongues

WikiLeaks released the third tranche of its leaked CIA documents trove on Friday, which in this episode focuses on anti-forensics tools.

The previous two releases from Vault7 have focused on manuals and supporting documents for the spy agency’s hacking tools. The first set of leaked files, released on 7 March, described security exploits used to compromise vulnerable Android handhelds, Apple iPhones, Samsung TVs, Windows PCs, Macs, and other devices.

Two weeks later, in episode two, we learned how the CIA could purchase Apple Macs and iPhones, install spyware on them, and give them to targets. WikiLeaks spun this to suggest this might be happening in the factory, a suggestion unsupported by the leaked documents themselves, as previously reported.

Episode three brings the release of source-code files for the CIA’s secret anti-forensic Marble Framework. The technology is designed to make the CIA’s malware harder for security researchers at antivirus firms to analyse, thus hampering attribution. It does this by hiding (“obfuscating”) text fragments.

Obfuscating code and designing it so that it detects and doesn’t run in virtual machine sandbox has not been an uncommon tool among mainstream cybercrooks for some years.

One feature in Marble stands out. It creates a means for virus writers to pretend that the malware was created by a speaker of a range of foreign languages (Chinese, Russian, Korean, Arabic and Farsi). These are, of course, the languages of the US’s main cyber-adversaries – China, Russia, North Korea and (historically, at least) Iran.

WikiLeaks suggests that this tech would allow the real-life equivalent of American Dad‘s Stan Smith to trick security researchers into thinking they were, for example, Chinese PLA.1

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, but there are other possibilities, such as hiding fake error messages.

There might be something in this but robust attribution is based on multiple factors, so using Marble alone wouldn’t be enough to throw a normally competent cyber-sleuth off the trail.

Marble Framework is used for obfuscation only and does not contain any vulnerabilities or exploits by itself, something that has allowed WikiLeaks to release its source code. Exploits and hacker tools from earlier releases have been held back and only manuals and supporting documents have been pushed out. WikiLeaks has promised to supply CIA’s hacking tool code to vendors. El Reg has independently confirmed that Assange and co have entered talks on this point with Microsoft, at least.

Bootnote

1Marble also includes a deobfuscator to reverse CIA text obfuscation (i.e. translate text strings back to English).

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/31/wikileaks_cia/

30% of Q4 Malware was New or Zero-Day

WatchGuard quarterly report, based on Firebox Feed data, lists five key findings on Internet security threats.

New data from network security firm WatchGuard Technologies shows that nearly one third of all malware samples in the fourth quarter of 2016 were new or zero-day.

WatchGuard’s quarterly report on Internet security covers related threat issues and their effect on businesses. The data comes via Firebox Feed, anonymized data from over 24,000 WatchGuard unified threat management (UTM) appliances worldwide.

The report points to five crucial findings. First, hackers are using old attack methods in new packaging and second, 30% of malware is still new or zero-day because it manages to avoid discovery due to lack of advanced detection techniques. WatchGuard’s data also showed that JavaScript is used extensively in malware delivery while Web browsers and services are targeted the most. And the top network attack is Wscript.shell Remote Code Execution, targeting Germany 99% of the time.

“Each quarter, our report will marry new Firebox Feed data with original research and analysis of major information security events to reveal key threat trends and provide defense best practices,” says Corey Nachreiner, CTO of WatchGuard Technologies.

Read full report here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/vulnerabilities---threats/30--of-q4-malware-was-new-or-zero-day-/d/d-id/1328521?_mc=RSS_DR_EDT

30% of Q4 Malware was New or Zero-Day

WatchGuard quarterly report, based on Firebox Feed data, lists five key findings on Internet security threats.

New data from network security firm WatchGuard Technologies shows that nearly one third of all malware samples in the fourth quarter of 2016 were new or zero-day.

WatchGuard’s quarterly report on Internet security covers related threat issues and their effect on businesses. The data comes via Firebox Feed, anonymized data from over 24,000 WatchGuard unified threat management (UTM) appliances worldwide.

The report points to five crucial findings. First, hackers are using old attack methods in new packaging and second, 30% of malware is still new or zero-day because it manages to avoid discovery due to lack of advanced detection techniques. WatchGuard’s data also showed that JavaScript is used extensively in malware delivery while Web browsers and services are targeted the most. And the top network attack is Wscript.shell Remote Code Execution, targeting Germany 99% of the time.

“Each quarter, our report will marry new Firebox Feed data with original research and analysis of major information security events to reveal key threat trends and provide defense best practices,” says Corey Nachreiner, CTO of WatchGuard Technologies.

Read full report here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/vulnerabilities---threats/30--of-q4-malware-was-new-or-zero-day-/d/d-id/1328521?_mc=RSS_DR_EDT

US Border Policy Shifts May Drive Changes in Laptop Security

In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.

The new travel ban enacted by the U.S. Department of Homeland Security for laptops in the cabin of flights from certain countries may have corporate risk managers revisiting policies about how road warriors handle data on laptops and mobile devices.

Enterprise employees may find that government actions won’t just put a crimp on convenience but could also have heavy implications – from a regulatory and intellectual property protection perspective – when combined with growing powers of US Border Control to demand travelers unlock their devices for inspection. As things develop, large organizations doing international business may be facing a new minefield when it comes to device-based data portability in and out of U.S. soil.

At the bare minimum, experts believe this latest decree by the feds will bolster resolve for existing policies on endpoint security as worries about devices disappearing from checked luggage grows.

“It’s going to force people to actually implement and enforce the policies they have on paper,” says George Wrenn, CEO and founder of CyberSaint Security, and a research affiliate MIT’s (IC3) Critical Infrastructure Protection Program. He explains that most large organizations already have policies on device encryption, authentication and data storage to plan for loss or theft. “They’re just not enforced,” he says, “because people will carry their laptops and they’re considered to be using other compensatory strategies to prevent the loss of intellectual property and data.”

The question now becomes how to effectively enforce policies that have long been ignored, says Jonathan Gossels, president and CEO of SystemExperts.

“This is not rocket science.  We are talking whole disk encryption, good quality passwords or two factor authentication, and key management,” he says.  “Blocking and tackling, but it has to be enforced by each company to be effective.”

Nevertheless, even with the basic blocking and tackling in place, many organizations may still be squirrely about laptops with corporate secrets or customer data sets being parted from their caretakers into aircraft holds.

“Most organizations won’t feel comfortable with employees packing away their company-owned laptops and other IT equipment into their luggage, even if they are properly secured with encryption and passwords,” says Richard Steinnon, Chief Strategy Officer of Blancco Technology Group. “So, I imagine that employees traveling to the countries included in this ban will likely be asked by their employers to not carry these devices with them. If they have to, they will likely be told to remove all non-essential data before they check in their IT assets in their baggage.”

In some instances, simply leaving a corporate laptop unattended may already be against company policy. For example, warns Eric O’Neill, military contractors likely wouldn’t be able to bring their laptops on affected legs.

“When traveling internationally, the rule of thumb is to keep all critical devices on your person – especially phones, laptops and tablets that have important information on them, or access to important or sensitive information,” he says.

The travel ban is just one part of the equation. Even more troubling are the inspection rights that border patrol have increasingly been asserting with regard to devices, even those locked by their possessors.

“The long-term substantial impact is that key information may be exposed, unpredictably, and for no substantive reason, to inspectors who have no right to that access,” says Mark Graff, CEO of Tellagraff and former CISO for Nasdaq. “This development may well open these companies to litigation exposure any inadvertent violation of data security regulations. It is only a matter of time before companies fined for violating federal standards take the federal government to court for forcing that violation with the new order inspection practices.”

Both the laptop ban and the requirement of unlocking devices for inspectors throw up data confidentiality and integrity issues, explains Phillip Hallam-Baker, vice president and principal scientist at Comodo. However, the latter is a lot more difficult because there are few compensating controls.

“The laptop ban only affects a small number at present. Laptop searches by border protection is a much broader concern,” Hallam-Baker says. “Currently, the main confidentiality control available is full disk encryption, though this does not help if a user can be ordered to unlock the device. And there is a real possibility other governments will follow suit. Whether the U.S. government could be trusted not to abuse data obtained in this manner is irrelevant if your laptop is being searched in Russia.”

Many experts believe that this confluence of issues should be enough to convince organizations to update policies and address frequently traveling employees of the risks. Christopher Ensey, COO of Dunbar Security Solutions, urges extreme caution transporting any data at all on laptops, mobile phones or portable media over any border these days.

“The restrictions on what is allowed for inspection and seizure have become nearly impossible to track. The best practice is to take a vanilla device with you that can only connect to sensitive information via secure tunnels and strong authentication,” he says. “Latency in faraway lands can be an issue, and frankly the experience isn’t all it’s cracked up to be for the end user. This is, however, the best way to ensure that data isn’t going to be leaked all over the place when crossing a border.” 

Employees will lose the ability to access and work on information without internet access, but Morey Haber, vice president of technology for BeyondTrust, believes that this is the best policy for all organizations to adopt. He says that users and admins need to be mindful of managing connection configurations and security after an interaction at the border to be sure to keep the set-up fully secure.

“Whether the mobile device uses VPN or accesses the cloud to retrieve the data, being online to retrieve it and not store it locally, is critical to mitigating these risks introduced by the US government,” he says. “In addition, if the device is accessed or copied, organizations need a prompt method to change VPN keys and passwords on those devices to mitigate the image compromised being leveraged against them as well.”

Experts say that many organizations may already have derivations of this for travel to certain parts of the world. Wrenn explains that the practice of ‘shaking’ devices by shady authorities is a well-known practice.

“Companies should already be anticipating these scenarios,” he says. “So I think there just may be a need to edit policies to make sure this new use case (at the U.S. border) is factored in.”

Steinnon agrees.

“It has long been a best practice when heading to hostile environments to issue clean devices to traveling employees,” explaining that organizations typically overwrite memory and load machines with fresh images both before and after travel to certain parts of the world. “Look for this practice to become more common and even for special device services to be built around this new need.”

Related Content:

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Article source: http://www.darkreading.com/endpoint/us-border-policy-shifts-may-drive-changes-in-laptop-security/d/d-id/1328530?_mc=RSS_DR_EDT

US Border Policy Shifts May Drive Changes in Laptop Security

In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.

The new travel ban enacted by the U.S. Department of Homeland Security for laptops in the cabin of flights from certain countries may have corporate risk managers revisiting policies about how road warriors handle data on laptops and mobile devices.

Enterprise employees may find that government actions won’t just put a crimp on convenience but could also have heavy implications – from a regulatory and intellectual property protection perspective – when combined with growing powers of US Border Control to demand travelers unlock their devices for inspection. As things develop, large organizations doing international business may be facing a new minefield when it comes to device-based data portability in and out of U.S. soil.

At the bare minimum, experts believe this latest decree by the feds will bolster resolve for existing policies on endpoint security as worries about devices disappearing from checked luggage grows.

“It’s going to force people to actually implement and enforce the policies they have on paper,” says George Wrenn, CEO and founder of CyberSaint Security, and a research affiliate MIT’s (IC3) Critical Infrastructure Protection Program. He explains that most large organizations already have policies on device encryption, authentication and data storage to plan for loss or theft. “They’re just not enforced,” he says, “because people will carry their laptops and they’re considered to be using other compensatory strategies to prevent the loss of intellectual property and data.”

The question now becomes how to effectively enforce policies that have long been ignored, says Jonathan Gossels, president and CEO of SystemExperts.

“This is not rocket science.  We are talking whole disk encryption, good quality passwords or two factor authentication, and key management,” he says.  “Blocking and tackling, but it has to be enforced by each company to be effective.”

Nevertheless, even with the basic blocking and tackling in place, many organizations may still be squirrely about laptops with corporate secrets or customer data sets being parted from their caretakers into aircraft holds.

“Most organizations won’t feel comfortable with employees packing away their company-owned laptops and other IT equipment into their luggage, even if they are properly secured with encryption and passwords,” says Richard Steinnon, Chief Strategy Officer of Blancco Technology Group. “So, I imagine that employees traveling to the countries included in this ban will likely be asked by their employers to not carry these devices with them. If they have to, they will likely be told to remove all non-essential data before they check in their IT assets in their baggage.”

In some instances, simply leaving a corporate laptop unattended may already be against company policy. For example, warns Eric O’Neill, military contractors likely wouldn’t be able to bring their laptops on affected legs.

“When traveling internationally, the rule of thumb is to keep all critical devices on your person – especially phones, laptops and tablets that have important information on them, or access to important or sensitive information,” he says.

The travel ban is just one part of the equation. Even more troubling are the inspection rights that border patrol have increasingly been asserting with regard to devices, even those locked by their possessors.

“The long-term substantial impact is that key information may be exposed, unpredictably, and for no substantive reason, to inspectors who have no right to that access,” says Mark Graff, CEO of Tellagraff and former CISO for Nasdaq. “This development may well open these companies to litigation exposure any inadvertent violation of data security regulations. It is only a matter of time before companies fined for violating federal standards take the federal government to court for forcing that violation with the new order inspection practices.”

Both the laptop ban and the requirement of unlocking devices for inspectors throw up data confidentiality and integrity issues, explains Phillip Hallam-Baker, vice president and principal scientist at Comodo. However, the latter is a lot more difficult because there are few compensating controls.

“The laptop ban only affects a small number at present. Laptop searches by border protection is a much broader concern,” Hallam-Baker says. “Currently, the main confidentiality control available is full disk encryption, though this does not help if a user can be ordered to unlock the device. And there is a real possibility other governments will follow suit. Whether the U.S. government could be trusted not to abuse data obtained in this manner is irrelevant if your laptop is being searched in Russia.”

Many experts believe that this confluence of issues should be enough to convince organizations to update policies and address frequently traveling employees of the risks. Christopher Ensey, COO of Dunbar Security Solutions, urges extreme caution transporting any data at all on laptops, mobile phones or portable media over any border these days.

“The restrictions on what is allowed for inspection and seizure have become nearly impossible to track. The best practice is to take a vanilla device with you that can only connect to sensitive information via secure tunnels and strong authentication,” he says. “Latency in faraway lands can be an issue, and frankly the experience isn’t all it’s cracked up to be for the end user. This is, however, the best way to ensure that data isn’t going to be leaked all over the place when crossing a border.” 

Employees will lose the ability to access and work on information without internet access, but Morey Haber, vice president of technology for BeyondTrust, believes that this is the best policy for all organizations to adopt. He says that users and admins need to be mindful of managing connection configurations and security after an interaction at the border to be sure to keep the set-up fully secure.

“Whether the mobile device uses VPN or accesses the cloud to retrieve the data, being online to retrieve it and not store it locally, is critical to mitigating these risks introduced by the US government,” he says. “In addition, if the device is accessed or copied, organizations need a prompt method to change VPN keys and passwords on those devices to mitigate the image compromised being leveraged against them as well.”

Experts say that many organizations may already have derivations of this for travel to certain parts of the world. Wrenn explains that the practice of ‘shaking’ devices by shady authorities is a well-known practice.

“Companies should already be anticipating these scenarios,” he says. “So I think there just may be a need to edit policies to make sure this new use case (at the U.S. border) is factored in.”

Steinnon agrees.

“It has long been a best practice when heading to hostile environments to issue clean devices to traveling employees,” explaining that organizations typically overwrite memory and load machines with fresh images both before and after travel to certain parts of the world. “Look for this practice to become more common and even for special device services to be built around this new need.”

Related Content:

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Article source: http://www.darkreading.com/endpoint/us-border-policy-shifts-may-drive-changes-in-laptop-security/d/d-id/1328530?_mc=RSS_DR_EDT

Romanian Man Pleads Guilty to ATM Skimming Scheme

Radu Bogdan Marin allegedly used stolen account details and fake ATM cards to withdraw tens of thousands of dollars.

Romanian citizen and resident of New York, Radu Bogdan Marin, has pleaded guilty to his involvement in bank fraud through “ATM skimming” and stealing tens of thousands of dollars. A US Department of Justice (DoJ) release says Marin and his co-conspirators defrauded customers of Bank of America and PNC Bank.

According to the DoJ, the defendant used illegal means to steal his victims’ bank details, including personal identification numbers. And between March 2015 and July 2016, he and his accomplices deployed the stolen account details and over 10 fake ATM cards to allegedly withdraw money from ATMs in New Jersey. Marin was personally responsible for stealing $39,140, says DoJ.

Click here for details.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/romanian-man-pleads-guilty-to-atm-skimming-scheme/d/d-id/1328531?_mc=RSS_DR_EDT

Romanian Man Pleads Guilty to ATM Skimming Scheme

Radu Bogdan Marin allegedly used stolen account details and fake ATM cards to withdraw tens of thousands of dollars.

Romanian citizen and resident of New York, Radu Bogdan Marin, has pleaded guilty to his involvement in bank fraud through “ATM skimming” and stealing tens of thousands of dollars. A US Department of Justice (DoJ) release says Marin and his co-conspirators defrauded customers of Bank of America and PNC Bank.

According to the DoJ, the defendant used illegal means to steal his victims’ bank details, including personal identification numbers. And between March 2015 and July 2016, he and his accomplices deployed the stolen account details and over 10 fake ATM cards to allegedly withdraw money from ATMs in New Jersey. Marin was personally responsible for stealing $39,140, says DoJ.

Click here for details.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/romanian-man-pleads-guilty-to-atm-skimming-scheme/d/d-id/1328531?_mc=RSS_DR_EDT

Germany Creates Separate Military Wing for Cyber Command

The new unit to tackle cyberattacks will be launched next week and be located in Bonn with staff of 260.

Increasing incidents of cyberattacks on its military has prompted the German government to launch Cyber and Information Space Command which will be a separate cyber unit and the sixth major wing of the military, reports Reuters. This unit will be based in Bonn and headed by Lieutenant General Ludwig Leinhos.

The country’s military has been a prime target of allegedly Russian hackers with a reported 284,000 would-be attacks registered in the initial nine weeks this year. December 2016 saw an increase in malicious cyber activities on German political parties.

According to a ministry spokesperson, “The expansion of cyber capabilities is an essential contribution to the government’s overall security posture, and offers additional opportunities for preventing conflicts and dealing with crises to include hybrid threats.”

The cyber command will be launched next week with an initial staff of 260 which is expected to grow to 14,500 by 2021.

Read full story here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/operations/germany-creates-separate-military-wing-for-cyber-command/d/d-id/1328532?_mc=RSS_DR_EDT

Germany Creates Separate Military Wing for Cyber Command

The new unit to tackle cyberattacks will be launched next week and be located in Bonn with staff of 260.

Increasing incidents of cyberattacks on its military has prompted the German government to launch Cyber and Information Space Command which will be a separate cyber unit and the sixth major wing of the military, reports Reuters. This unit will be based in Bonn and headed by Lieutenant General Ludwig Leinhos.

The country’s military has been a prime target of allegedly Russian hackers with a reported 284,000 would-be attacks registered in the initial nine weeks this year. December 2016 saw an increase in malicious cyber activities on German political parties.

According to a ministry spokesperson, “The expansion of cyber capabilities is an essential contribution to the government’s overall security posture, and offers additional opportunities for preventing conflicts and dealing with crises to include hybrid threats.”

The cyber command will be launched next week with an initial staff of 260 which is expected to grow to 14,500 by 2021.

Read full story here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/operations/germany-creates-separate-military-wing-for-cyber-command/d/d-id/1328532?_mc=RSS_DR_EDT