STE WILLIAMS

Barrister fined after idiot husband uploads unencrypted client data to internet

A barrister has been fined by the Information Commissioner’s Office after they accidentally uploaded client information to the internet.

According to the monetary penalty notice [PDF] issued against the senior barrister, who is unnamed, she has only been fined £1,000 by the ICO after information belonging to up to 250 people, including vulnerable adults and children, was uploaded to the internet. The incident occurred when her husband backed them up using an online file directory service while he was updating software on the couple’s home computer.

Andy Lee, a senior associate at Brandsmiths, informed The Register that according to the Bar Standards Board Code of Conduct [PDF] a barrister’s sixth core duty is to “keep the affairs of each client confidential” while the tenth core duty is to “take reasonable steps to manage your practice, or carry out your role within your practice, competently and in such a way as to achieve compliance with your legal and regulatory obligations.”

According to the ICO, some 725 unencrypted documents — which were created and stored on the computer — were temporarily uploaded to an internet directory as a back-up during the software upgrade.

They were apparently “visible to an internet search engine and some of the documents could be easily accessed through a simple search”, despite six of the files containing confidential and highly sensitive information relating to people who were involved in proceedings in the Court of Protection and the Family Court.

Steve Eckersley, head of enforcement at the ICO said: “People put their trust in lawyers to look after their data – that trust is hard won and easily lost. This barrister, for no good reason, overlooked her responsibility to protect her clients’ confidential and highly sensitive information.”

“It is hard to imagine the distress this could have caused to the people involved – even if the worst never happened, this barrister exposed her clients to unnecessary worry and upset,” Eckersley concluded.

Lee told The Register that considering the legal responsibilities of barristers, in addition to the data protection issues which the ICO handled, it was fair to say that “by reason of logic security measures must be taken and must be reasonable.”

As to what is appropriate security measures, there is no real hard and fast guidance but one can answer the question by seeing how the breach occurred and whether that was as a result of there being no security measures in place (in which case the answer is relatively clear) or for example inadequate measures which may be a little more difficult to answer but for example if client information is stored in the cloud the very least one would expect is that access to that cloud server is secure and password protected and/or the documents are encrypted/password protected.

The Bar Council’s advice on information security stresses that the onus is on barristers to “protect the confidentiality of each client’s affairs, except for such disclosures as are required or permitted by law or to which your client gives informed consent” and encourages them to encrypt everything.

Further advice regarding the reporting of security breaches in such incidents is available to barristers too, although neither advisories are “guidance” in the official sense.

The Bar Standards Board, which regulates barristers in England and Wales, told The Register that it does not comment as to whether or not individual barristers are the subject of a complaint or a disciplinary investigation.

If complaints are received they are usually treated confidentially unless they result in a listing for a Disciplinary Tribunal hearing. Such listings are published on the Bar Tribunals Adjudication Service website and hearings are held in public. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/16/barrister_fined_over_data_breach/

Google Removes Chamois Apps Botnet from Play Store

Google has eliminated Chamois apps, which installed invisible apps and downloaded unwanted plugins without victims’ knowledge.

Google has removed malicious apps from the Google Play Store after discovering they were tricking users into downloading unwanted apps and plugins. These apps, which sent premium text messages and installed invisible apps in the background without users’ consent, were identified as part of the Chamois family.

Bernhard Grill, Megan Ruthven, and Xin Zhao, all Google security software engineers, found and removed the apps — which they described as one of the largest they have seen — using malware scanner Verify Apps. Researchers say Chamois apps can evade detection because they keep changing file formats – from .APK file to .JAR file and then to .ELF file.

“This multi-stage process makes it more complicated to immediately identify apps in this family as a PHA because the layers have to be peeled first to reach the malicious part,” they explain.

Though there is no official figure from Google about how many were victimized by Chamois botnet, an earlier study found that malware HummingBad made $300,000 per month through ad fraud.

Read more here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/mobile/google-removes-chamois-apps-botnet-from-play-store/d/d-id/1328414?_mc=RSS_DR_EDT

Personal Data Leak Affects 33 Million US Employees

Information exposed in the leak includes personal details of employees from the Department of Defense and US Postal Service.

The personal data of more than 33 million employees from US-based organizations was found lying unprotected on the web, reports Help Net Security. The leaked information, available on Troy Hunt’s Have I Been Pwned service, had been compiled by US business service firm Dun Bradstreet (DB), which sells commercial data to businesses.

Security researcher Hunt got the data from a reportedly reliable source, and it is believed that it may have been stolen from the unprotected database of a DB customer. The information includes personal details such as email addresses and company information. Affected employees include those of the Department of Defense, US Postal Service, ATT, FedEx, Citigroup and others.

“In terms of where this data specifically came from, DB don’t believe it was directly from one of their systems and with thousands of customers purchasing this information, we may well never know who lost it,” says Hunt.

Although the leaked data was not classified, it carries the risk of misuse by cybercriminals who aim to impersonate employees and get their hands on more sensitive information.

Read more on Help Net Security.  

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/personal-data-leak-affects-33-million-us-employees/d/d-id/1328415?_mc=RSS_DR_EDT

What Businesses Can Learn From the CIA Data Breach

Just because threats like malicious insiders, zero-days, and IoT vulnerabilities are well-understood doesn’t mean organizations have a handle on them.

Like other major data breaches, the one that allegedly exposed the CIA’s entire arsenal of malware tools has raised familiar concerns about vulnerability stockpiling, insider threats, and the importance of a robust breach detection and response capability.

The fact that many of these concerns are familiar and well-understood has only served to highlight the continuing challenges that organizations across the board still face.

Here are the four most important takeaways from the CIA leaks:

Insiders Are Hard to Catch

The sheer scope of the data theft from a supposedly super-secure network deep inside the CIA’s Center for Cyber Intelligence facility has prompted speculation that the heist was pulled off by a Snowden-like insider, or at least abetted by one.  

It hammered home once again how difficult it is, even for a technologically sophisticated organization like the CIA, to police the actions of insiders with privileged and legitimate access to enterprise systems and data.

The primary issue for organizations is that the insider threat represents a multi-competency problem, says Jeff Pollard, an analyst with Forrester Research. It is a multi-stakeholder issue that affects everyone from IT, security teams and app developers to business unit leaders, human resources and general counsel, he says.

“An [organization] has to know what their sensitive data is, who has access, how data is used and stored and how data flows through their own environment and partner environments,” Pollard says. In addition, there also must understand how data is used normally, so that they can begin to identify anomalies. “It’s a tremendously complicated endeavor to pull data from all those systems together, define a baseline, and then begin policing usage,” he says.

Insider breaches highlight the constant struggle within enterprises to choose between what is most secure and what is most productive, adds Tim Condello, technical account manager for Red Owl, a vendor of an insider threat platform.

Based on the fact that most of the leaked information involved mobile and hardware exploits, chances are that whoever stole the data worked for the group that collaboratively supported this effort or had access to systems used by the group, Condello says.

“Looking at the information available on the CIA data leak, it is apparent that either there were no proactive measures in place or the ones that existed could be circumvented,” he says. “The lessons that can be learned from this are to have a layered approach to controlling access and movement of data in their environment while also monitoring employee behavior.”

Don’t Get Too Fixated on the Zero-Days

As with the Shadow Brokers leak of NSA data last year, many of the CIA exploits that were leaked on WikiLeaks this month involved previously unknown zero-day flaws in technology products from major IT companies.

Zero-day flaws have the potential to cause big problems if attackers find a way to exploit them before a patch becomes available. Security researchers often urge organizations to prioritize patching of such vulnerabilities.

But instead of getting fixated on them, focus on the ones you do know about, says Ilia Kolochenko, CEO of Web security firm High-Tech Bridge.

Gartner predicts that 99% of all vulnerabilities exploited through 2020 will continue to be known security vulnerabilities for which patches are already available, for at least a year, Kolochenko points out.

“A 0-day is a sort of cherry on the cake, for very important targets that cannot be hacked by other means,” he says. “Otherwise, why spend on it, if a public exploit can bring the same results?”

What breaches such the CIA’s really highlight is the need for organizations to do a comprehensive and continuous inventory of all digital assets. Rather than worry about the potential for a zero-day exploit to be used against them, organizations are better off ensuring their assets are protected against the known ones. “By keeping all our devices and software up to date, we can avoid 99% of problems,” Kolochenko says.

Pay Attention to Those IoT Devices

Among the many CIA exploits that were leaked was one named Weeping Angel, which essentially turns a Samsung smart TV into a silent audio-recording device capable of listening in to conversations even after the device had supposedly been switched off. The exploit garnered attention not because it was particularly sophisticated, but because it demonstrated how trivially easy it is to hack many of the so-called smart “things” that are being connected to the Internet these days.

For enterprises, the exploit should serve as a warning of the potential for attackers to increasingly target vulnerabilities in industrial and commercial IoT products in order to then gain entry into the enterprise. Many IoT vulnerabilities stem from Web and Web-based interfaces that are riddled with issues like remote code execution bugs and hardcoded passwords, Kolochenko says.

 More on Security Live at Interop ITX

The goal should be to try and secure the IoT environment as much as possible to prevent it from being a launching pad into the enterprise – or the source of data leaks and disruptions.

“Because an attacker has to get inside the network to accomplish any other goal including surveillance, IoT as an entry point is the place to start,” Pollard says. Obviously, not every firm has to worry about being snooped on via a rogue TV, he says, but some do.

“That’s why having a risk assessment that incorporates geopolitical threats or concerns is important,” Pollard says. Also important are practices like threat modeling: based on how the organization makes money, geographies in which it operates, sensitive intellectual property, and even potential clients that may make the organization a target.

Vulnerability Stockpiles Merit Another Look

The CIA’s stockpile of malware tools including several that take advantage of undisclosed flaws in widely used technology products once again stirred debate over responsible vulnerability disclosure by US intelligence agencies.

Some have argued that agencies like the CIA and NSA whose mission it is to develop offensive cyber-capabilities have a responsibility to disclose 0-day flaws to vendors so that the vulnerabilities get patched before adversaries use it against them.

In a report released after the CIA leaks, the RAND Corporation provided some perspective on this hot topic. RAND’s study of more than 200 zero-day flaws showed that the benefits of disclosing such flaws were not always as great as assumed. The report argues that most zero-days tend to remain hidden for years and the chances of two people finding same flaw are remote. So, sometimes it actually makes sense for agencies like the CIA to stockpile vulnerabilities.

But Daniel Castro, vice president at the Information Technology and Innovation Foundation, argues that such reasoning is dangerous. “Without comparing the actual stockpiled zero-day exploits of countries like China and Russia we do not know how much overlap exists here,” he says.

So the best approach is to disclose and patch zero-days as they are found. “Practically speaking, responsible disclosure is the only way to keep Americans secure,” he says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/what-businesses-can-learn-from-the-cia-data-breach/d/d-id/1328413?_mc=RSS_DR_EDT

Ethical Hacking: The Most Important Job No One Talks About

If your company doesn’t have an ethical hacker on the security team, it’s playing a one-sided game of defense against attackers.

Great power comes with great responsibility, and all heroes face the decision of using their powers for good or evil. These heroes I speak of are called white hat hackers, legal hackers, or, most commonly, ethical hackers. All these labels mean the same thing: A hacker who helps organizations uncover security issues with the goal of preventing those security flaws from being exploited. If companies don’t have an ethical hacker working for them, they’re in a one-sided game, only playing defense against attackers.

Meet the Hackers
Companies house both developer and security teams to build out codes, but unfortunately, there often is little communication between the two teams until code is in its final stages. DevSecOps — developer and security teams — incorporates both sides throughout all of the coding process to catch vulnerabilities early on, as opposed to at the end, when making updates becomes harder for developers.

 More on Security Live at Interop ITX

Although secure coding practices and code analysis should be automated-  and a standard step in the development process – hackers will always try to leverage other techniques if they can’t find code vulnerabilities. Ethical hackers, as part of the DevSecOps team, enhance the secure coding practices of the developers because of the knowledge sharing and testing for vulnerabilities that can be easily taken advantage of by someone outside the company.

Take, for example, Jared Demott. Microsoft hosts the BlueHat competition for ethical hackers to find bugs in its coding, and Demott found a way to bypass all of the company’s security measures. Let that sink in for a moment — he found a way to bypass all of Microsoft’s security measures. Can you imagine the repercussions if that flaw had been discovered by a malicious hacker?

Let the Hackers Hack
Security solutions (such as application security testing and intrusion detection and prevention systems) are a company’s first line of defense because they’re important for automatically cleaning out most risks, leaving the more unique attack techniques for the ethical hackers to expose. These could include things such as social engineering or logical flaws that expose a risk. Mature application security programs will use ethical hackers to ensure continuous security throughout the organization and its applications. Many organizations also use them to ensure compliance with regulatory standards such as PCI-DSS and HIPAA, alongside defensive techniques, including static application security testing.

You may be thinking, “What about security audits? Wouldn’t they do the trick?” No, not fully. Ethical hacking is used to build real-world potential attacks on an application or the organization as a whole, as opposed to the more analytical and risk-based analysis achieved through security audits. As an ethical hacker, the goal is to find as many vulnerabilities as possible, no matter the risk level, and report them back to the organization.

Another advantage is that once hackers detect a risk, vendors can add the detection capability to their products, thus enhancing detection quality in the long run. For example, David Sopas, security research team leader for Checkmarx, discovered a potentially malicious hack within a LinkedIn reflected filename download. This hack could have had a number of potential outcomes, including a full-blown hijacking of a victims’ computers if they had run the file. It’s probably safe to say that just the audit wouldn’t have identified this hidden flaw.

How to Hack
The good news for companies searching for someone to fill this role is that there are several resources for their own employees to learn more about ethical hacking and become a more-valuable asset.

The first step is to get certified. EC-Council has resources and certifications available, and if you want to continue brushing up on your ethical hacking skills, OWASP has you covered. While getting certified isn’t a requirement, I highly recommend this, because getting the basics down will help to provide a foundation on which to build. After you have the basics down, there are many tools and automated processes that can be utilized, but ethical hackers usually use penetration testing and other, mostly offensive, techniques to probe an organization’s networks, systems, and applications. In essence, ethical hackers use the same techniques, tools, and methods that malicious hackers use to find real vulnerabilities.

One Small Step for Companies, One Giant Leap for Hackers
What does this all mean for companies? Well, companies must first acknowledge how ethical hackers can help them. Strong application security programs need to focus both on the code security as it’s being developed, as well as in its running state — and that’s where ethical hacking comes into play. Nothing beats secure coding from the get-go, but mistakes do happen along the way, and that’s where ethical hacking experts can make a difference in an organization.

At the next meeting on staffing, ethical hackers should be right at the top of the list of priorities to keep your company, and its data, safe. 

Related Content:

Amit Ashbel has been with the security community for over a decade and has taken on multiple tasks and responsibilities, including technical positions and senior product lead positions. Amit has experience with a wide range of security solutions, including network, endpoint, … View Full Bio

Article source: http://www.darkreading.com/perimeter/ethical-hacking-the-most-important-job-no-one-talks-about/a/d-id/1328400?_mc=RSS_DR_EDT

Xen bends own embargo rules to unbork risky Cirrus video emulation

The Xen Project has bent its own rules of vulnerability disclosure for a buggy and possibly exploitable video component that needs urgent attention.

It’s not a hypervisor escape yet, but as the Xen advisory notes, it could be a pathway to one.

The crashable component is a VGA driver, of all things – the default Cirrus video emulator, which can be crashed by fiddling with display settings.

The bug is triggered by changing the display geometry, while simultaneously selecting a blank screen mode. The resize doesn’t happen, but “will be properly handled during the next time a non-blank mode is selected during an update.”

So far so good. The problem is that other console components (the advisory picks out VNC emulation) see the resize and try to apply it. “When the display is resized to be larger than before, this can result in a heap overflow as console components will expect the display buffer to be larger than it is currently allocated.”

For Hardware Virtual Machine (HVM) guests, the process will crash through, but should only get the privileges of their guest kernel.

The Xen Project usually slaps a two-week embargo on bugs, so that clouds that use the hypervisor can sort things out before every hacker capable of spelling “HTML” descends on the millions of VMs they run.

However, what led to this one being shipped ahead of the normal embargo cycle is that the developers couldn’t rule out a more serious exploit emerging.

“But the ability of a userspace process to trigger this vulnerability via legitimate commands to the kernel driver (thus elevating its privileges to that of the guest kernel) cannot be ruled out,” the advisory says. It also offers another reason for the early public disclosure, namely “to enable the community to have oversight of the Xen Project Security Team’s decision-making.”

The advisory includes patches. Users can also mitigate by running HVM with a stub domain; the advisory says it can also be mitigated by using the stgvga, but warns against this until the embargo period ends:

“It is NOT permitted during the embargo to switch from Cirrus VGA to Stdvga on public-facing systems with untrusted guest users or administrators. This is because it may give a clue where the issue lies. This mitigation is only permitted AFTER the embargo ends.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/16/xen_flaw/

DoJ Indicts Russian FSB Officers and Cybercriminals in Yahoo Breach

Russian intelligence officials hired renowned cybercriminals to do their bidding in massive hacks that compromised Yahoo, Gmail, and other email accounts of millions of people in the US, Russia, elsewhere.

The increasingly blurred line between the Russian government and that nation’s notorious cybercrime underground was exposed in a very public way today as the US Department of Justice announced indictments of two FSB officers as well as two infamous Russian cybercriminals for their roles in the massive breach of Yahoo as well as other related hacks.

DoJ’s indictments charge that Russian nationals and agents of Russian intelligence agency FSB Dmitry Aleksandrovich Dokuchaev, 33, and Igor Anatolyevich Sushchin, 43, allegedly hired one of the FBI’s Most Wanted cybercriminals, Alexsey Alexseyevich Belan, aka “Magg,” 29, a Russian national and resident, as well as with Canadian and Kazakh national Karim Baratov, aka “Kay,” “Karim Taloverov” and “Karim Akehmet Tokbergenov,” 22 , to hack Yahoo systems and steal information from some 500 million Yahoo accounts.

They then used some of that stolen information to access accounts from Yahoo, Google, and other webmail services, as well as emails of Russian journalists, US and Russian government officials, and employees at a Russian investment banking firm, US financial services and private equity firms, a US airline, a Swiss bitcoin wallet firm, a US cloud storage company, the International Monetary Fund, and “employees of a prominent Russian cybersecurity company,” as well as other victims, the DoJ said. Many of the victims were high-level executives and officials.

The FSB agents worked for Russia’s Center for Information Security, aka Center 18, which is the FBI’s direct point of contact for cybercrime investigations and cases, which makes the indictments even more extraordinary than they already are. “The involvement and direction of FSB officers with law enforcement responsibilities makes this conduct that much more egregious. There are no free passes for foreign state-sponsored criminal behavior,” Acting Assistant Attorney General Mary McCord said in a press briefing today announcing the indictments.

While DoJ’s McCord said the indictments do not allege any connection to US investigations into Russia’s hacking and tampering in the US presidential election, the case ultimately could have wider tentacles than it appears on the surface. APT29 aka Cozy Bear is the cyber espionage arm of the FSB, and was named by the US intel community as a perpetrator – along with the Russian military (coined APT28/Fancy Bear) – in hacks and data dumps related to the 2016 US presidential election. APT28/Fancy Bear was behind the hack and ultimate dumping of Gmail messages of Clinton campaign manager John Podesta, for example.

“I don’t know if the Yahoo hack was a springboard per se” to the DNC and other election-related hacks, says John Bambenek, threat systems manager of Fidelis Cybersecurity, which assisted in the DNC breach investigation. “If the FSB has people hacking Yahoo, the same kind of people [with the same skillsets] are hacking other people’s emails. If it’s not the same guys, it’s people who work in the same office or next door,” he says. “At the end of the day, if these two FSB officials indicted weren’t involved in the DNC operation, they [likely] know who was.”

Then there’s the indictment of Dokuchaev, who was recently charged by Russian officials with cyber-treason, as was his supervisor, Sergei Mikhailov, for allegedly working with the CIA –  charges by Russian officials that came in the wake of the Obama administration and intelligence community going public with its findings that Russia had interfered with the 2016 presidential election with hacking, online leaks of stolen information, and fake news articles.

Security experts who investigate breaches and study cyber espionage and cybercrime gangs long have warned of a growing connection between nation-states and cybercriminals in their respective nations, especially in Russia, where the cyber underground can be a lucrative gig for a talented hacker.

Former US Attorney Ed McAndrew, who served for 10 years as a cybercrime prosecutor and National Security Cyber Specialist for the DoJ, says it’s the first publicly available indictment that confirms the Russian FSB’s collusion with Russian cybercriminals.

“They [the FSB] do it for plausible deniability and obfuscation, primarily,” says McAndrew, who is co-chair of law firm Ballard Spahr’s Privacy and Data Security Group. The intel agencies basically offer cover and protection to the cybercriminals and often allow them to make a little extra income on the side via the work, he says.

“They get a commission on behalf of FSB, but the FSB is also quite aware that these guys [cybercriminals] have multiple objectives,” he says. “They may do intel-gathering work of the FSB, but at the same time they will engage in their own financial gain, like spam campaigns or redirecting traffic to collect commissions, and theft of credit cards,” as in this case, he says.

Acting Assistant Attorney General McCord said federal investigators are seeing more nation-states working with cybercriminals, and not just with Russia. “We are certainly seeing more and more use by nation-states of criminal hackers to carry out some of their intentions.”

Former President Barack Obama in late December issued wide-ranging sanctions including some against the GRU and FSB, as well as against four GRU officers and three companies that allegedly supported the operations, in response to the Russian hacking and disinformation campaign during the US presidential election. The sanctions included Belan, who was already on the FBI’s Cyber Most Wanted list at the time, and the US formally ejected 35 Russian intelligence operatives from the United States and imposed sanctions on nine entities and individuals: Russia’s two leading intelligence services (the GRU and the FSB), four individual GRU officers, and three other organizations.

Today’s indictments aren’t the first by the US Department of Justice: the department in 2014 indicted five members of the Chinese military for allegedly hacking and stealing trade secrets of major American steel, solar energy, and other manufacturing companies, including Alcoa, Westinghouse Electric, and US Steel.

Spies Crooks

FSB officers Dokuchaev and Sushchin allegedly instructed and paid cybercriminals including Belan and Baratov to hack into systems and steal information from US and other targets. Belan and Baratov specifically were commissioned to steal email account access of thousands of people. Belan, who was indicted by the US in September of 2012 and again in June 2014 for various hacking crimes, was arrested in June 2013 but managed to escape to Russia before being extradited to the US. He was then harbored by the FSB officers to avoid detection by the US and other law enforcement entities.

Starting around November and December 2014, Belan, under the direction of the indicted FSB officials, pilfered a backup copy of some of Yahoo’s user database full of usernames, recovery email accounts, phone numbers, and other sensitive information needed to create account authentication Web browser cookies for some 500 million Yahoo user accounts. Belan also hacked into Yahoo’s Account Management Tool for the FSB: that’s Yahoo’s internal tool for updating and logging changes to user accounts. With the Yahoo database and account management tools at their disposal, Belan, Dokuchaev and Sushchin looked for Yahoo email “accounts of interest” and created cookies for them so they could access some 6,500 targeted email accounts.

Belan double-dipped as well, stealing credit card numbers and gift cards from Webmail accounts, and pilfered contacts from some 30 million exposed accounts in order to wage spam campaigns. He also engaged in search engine fraud via Yahoo to make money.

The FSB officers later hired Baratov to steal more than 80 email accounts they needed that were not Yahoo accounts. He was arrested in Canada on March 14 by local authorities.

 More on Security Live at Interop ITX

Vitali Kremez, a senior intelligence analyst at Flashpoint, says another intriguing aspect to this case is how indicted FSB officer Dokuchaev had such close ties to the cyber underground in Russia.

“Dokuchaev was an active member in the underground, even after joining the FSB,” he notes, shining a light further on how Russian nation-states work closely with the cybercrime world. He even had a hacker nickname, “forb,” and had been arrested in 2012 in Greece for hacking an ecommerce site with health insurance information. He returned to Russia thereafter, according to Kremez.

Belan has a reputation for his Web hacking skills, while Karem is known for his email penetration hacking services, notes Kremez.

Like in the US, government jobs in Russia don’t pay as well as the private sector, and Russia’s well-established and entrenched cybercrime realm is especially lucrative. “They live a very lavish lifestyle,” so many are attracted to cybercrime rather than cyber espionage, he notes. “The lines are very blurry a this point” between state actors and cybercriminal activity, he says.

They also employ many of the same hacking tools, and access them from the same places, according to one source with knowledge of the attack groups. “There’s always been a lot of evidence that these FSB actors are working with criminal elements” and this case demonstrates that, according to the source, who requested anonymity.

This case likely is the tip of the iceberg in the Russian hacking machine’s activities against US interests. “This is the beginning of a true avalanche of information on PawnStorm/Fancy Bear that will be [revealed] in hearings soon,” says Tom Kellermann, CEO of Strategic Cyber Ventures.

But like the 2014 indictments by the DoJ of the Chinese military officers for cyber espionage activity – which were the first-ever such indictments of nation-state actors by the US – the Russian indictments aren’t likely to do much more than send a political message. Experts certainly don’t expect Russia to extradite any of the suspects.

“The whole indictment looks like a deterrent” or a warning, notes Flashpoint’s Kremez.

Even so, it’s a different approach by US officials. “It’s very unprecedented. We’ve never seen a Russian agent so publicly outed by the US government.”

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: http://www.darkreading.com/endpoint/doj-indicts-russian-fsb-officers-and-cybercriminals-in-yahoo-breach/d/d-id/1328412?_mc=RSS_DR_EDT

Security chiefs join the chorus of concern about shoddy IoT devices

Britain’s new National Cyber Security Centre (NCSC, opened last month) has joined with the National Crime Agency in the UK to warn people about connected Internet of Things devices.

The risks may already be apparent to readers of Naked Security, with articles on safety equipment, dolls in our news in brief section and a great deal else.

However, if it’s drawing the issue to wider national and indeed international audiences then it’s no bad thing. The specific warning this time is about ransomware on watches, TVs and indeed anything users might pay to “liberate” once criminals have shut it down.

The report, available on this page, highlights a number of stark facts. The NCSC has been running for only three months, and during that time the UK has been hit by 188 high-level attacks in which the organisation had to become involved. It’s well known that the cyber-threat is increasing but the report draws attention to the British government’s commitment to forming an alliance between government, industry and law enforcement.

It takes readers back to basics and notes that there is no longer any need for technical expertise when someone is creating a threat, also to increasing collaboration from cybercriminals who are learning from each other more than ever before.

Specifically in terms of ransomware and IoT, it points to new developments such as malware that downloads and encrypts files and then deletes the originals. “The threat of ransomware attack means that business should consider further mitigation and preventative solutions to combat it,” the report says. “These include maintaining appropriate backups and defensive systems that automatically sandbox email attachments.”

Chet Wisniewski, principal research scientist at the office of the CTO for Sophos (and  of course a key Naked Security contributor), says ransomware was common in 2016 and will only increase in 2017. He notes the increasing sophistication of the attacks:

Due to the profitable nature of ransomware, cyber-criminals are likely to look at evolving into any internet-connected devices which hold data of value to their victims. Over the past couple of years Sophos has examined a large number of IoT devices including CCTV cameras, baby monitors, kettles, wireless routers and printers.

The way to avoid a problem is first to look at the basics. So many people still leave their devices’ passwords on the default setting, which isn’t going to protect anything for long. Old versions of software are intrinsically more vulnerable than unpatched newer ones, but people don’t always update.

Says Wisniewski:

At present your chances of finding a poorly secured IoT device are higher than finding one with a reasonable level of protection. That doesn’t mean they are all bad and some vendors are working hard to improve their security and work with researchers, but many of these products are still in the stage of focusing on fast features over any concern for resilience.

He and Sophos offer the following checklist if you’re concerned about an IoT gadget:

  1. Many smart things support Wi-Fi so that you don’t have to plug them into your smartphone or computer every time you want to use them. If your home Wi-Fi router allows you to create separate guest networks to keep untrusted visitors off your regular network, make a special guest network for your “things” and connect them there.
  2. Many devices, such as video cameras, try to talk to your router to open up inbound holes so they can accept connections from outside. This makes it easier to access them from the internet, but it also exposes your devices to the rest of the world. Turn off Universal Plug and Play (UPnP) on your router, and on your IoT devices if possible, to reduce exposure. Don’t assume that “no one will notice” when you hook up your device for the first time. There are specialized search engines that go out of their way to find online devices, whether you wanted them to be found or not.
  3. Keep the firmware up to date on all of your IoT devices – patching is just as important as it is on your PC. It can be time consuming to figure out whether updates are available, but why not make a habit of checking the manufacturer’s website twice a year? Treat it like changing your smoke detector batteries: a small price to pay for safety and security.
  4. Choose passwords carefully and write them down if needed. Complexity is important, but so is uniqueness. Many IoT devices have been found to have bugs that let attackers trick them into leaking security information, such as giving away your Wi-Fi password. Remember: one device, one password.
  5. Favour devices that can work without the cloud. IoT “things” that rely on a cloud service are often less secure than those you can control entirely from within your home. Read the packaging carefully to determine whether internet access is needed to make the device work.
  6. Don’t connect devices to the network if you don’t have to. If all you want from your TV is to watch broadcast television, you don’t need to connect it to the network. Eliminate unnecessary internet connections when possible.
  7. Don’t take your IoT devices to work or connect them to your employer’s network without permission from IT. Insecure devices could be used by attackers as a foothold into the organisation, and used to assist with data stealing and illicit surveillance. You could put your company and your job at risk
  8. It is a good idea to do a quick Google search to see if the “thing” has been attacked already. Often it is good to choose a brand you think will be around for a year or more so you have someone to ask for updates if something bad occurs.

Nobody designs a device deliberately to be insecure, so don’t leave it that way if you can possibly avoid it.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/eDlzT9rKgys/

Swastikas all over Twitter – what you need to do

Today’s huge security SNAFU was the widepsread appareance of swastikas and Nazi taunts all across the Twittersphere.

What made this eruption of online hatred particularly unusual was the nature of some of the accounts that had apparently waded in, openly hashtagging both the Germans and the Dutch with the epithet “Nazi”, and referring to an upcoming constitutional referendum in Turkey.

Amnesty International was one organisation that hit the headlines, as this screenshot from Twitter (now removed as a tweet) shows:

The unauthorised tweets not only included offending icons and hashtags in their body text, but also linked to a YouTube video talking up Recep Erdoğan, the current President of Turkey.

As well as tweeting from affected accounts, the cybercrooks behind this attack also changed the profile pictures on many accounts to an image of the Turkish flag.

Starbucks Argentina is probably the most widely reported of those accounts because it continued to display the Turkish flag long after many other companies had repaired the damage, perhaps because of the timezone difference.

We’re happy to report that @StarbucksAr is back to normal now:

What happened?

As far as we know so far, this wasn’t a breach at Twitter itself.

It seems to have been an as-yet-undisclosed security blunder at a third-party company called Twitter Counter, which offers Twitter services that help you collect analytical statistics, deliver adverts, and more.

Legitimate third-party Twitter apps don’t actually store, or even know, your password, so they can’t take over your account entirely (and dodgy ones can’t try out your password on other sites, either).

But when you activate Twitter services such as Hootsuite, Twitpic, Twitter Counter and many others, you nevertheless authorise them, via a security token issued by Twitter, to perform certain actions on your account.

(Note that when we say “apps” in this context, we aren’t referring only to mobile software packages like Twitter’s own apps for Android, Windows Phone and iOS, but also to online services that you can configure to run your account semi-automatically in your absence.)

If any of those third-party services get hacked, or turn out to have an exploitable vulnerability that lets crooks issue commands to other people’s accounts remotely, then the sanity and sanctity of your own Twitter feed is at risk.

And that’s part of the problem here.

Services that you have authorised to access your account at any time in the past can continue to do so, even after you log off from Twitter in your own browser, or after you logout via the Twitter software on your mobile phone.

What to do right now?

According to reports from Twitter and Twitter Counter, Twitter Counter’s access to existing customer accounts was revoked, thus automatically preventing any further abuse .

At the time of writing [2017-03-15T15:15Z], Twitter Counter’s service appears to be “temporarily down for maintenance”:

The company rather sweetly says that it will be back online shortly, and is “just fine tuning the experience”.

You’ll have to decide for yourelf whether that makes you feel better or worse about its attitude to security.

Twitter has reportedly deleted all the illegally-sent “swastika” tweets, too, but if you are a Twitter Counter user we recommend you review the appearance of your account anyway if you haven’t already.

Look out for tweets that shouldn’t be there, and make sure your profile wasn’t fiddled with along the way, as happened to Starbucks Argentina.

What to do next?

It’s vital to learn how to review the Twitter apps that have access to your account.

Admittedly, if you were an active Twitter Counter customer when this “swastika outbreak” happened, you would have been at risk anyway, because you would have expected the company to have access to your account.

But we’re prepared to wager that many Twitter users have more apps on their access list than they realise, including apps that they don’t even remember, and the purpose of which they have now forgotten.

In other words, we suspect that at least some of the victims in this “swastika” case were surprised to find that the Twitter Counter service still had access to their account, because as far as they were concerned, they were no longer using it.

Here’s how to check which third parties can get at your Twitter:

1. Login to Twitter from your browser. (As far as we can tell, the feature you need isn’t available from Twitter mobile applications, though it is available, if a little fiddly, via your mobile phone’s browser.)

2. Go to Profile and Settings. You can use the link https://twitter.com/settings/account, or click on your avatar at the top right and choose Settings and privacy from the pulldown menu.

3. Click on Apps in the menu at the left hand side.

You will see a list entitled “These are the apps that can access your Twitter account”.

For any apps and services you no longer use, no longer trust, or simply can’t remember, use [Revoke access] to do just that. (You can always restore their access later if necessary.)

When it comes to handing over acccount access to other people, follow our adage: “If in doubt, don;t give it out.”

Note that even Twitter’s own mobile apps can have their access revoked from this page.

This is very handy if you are in the habit of leaving your mobile phone logged into Twitter via the app, and then you lose your phone.

Even if the app is currently running on your phone, and someone else is using it, revoking the app’s access stops the person who has your phone from doing anything new to your account – it essentially causes a forced logout.

Try for yourself! Open up your mobile Twitter app, login if you haven’t already, and find a tweet you are happy to retweet. Now revoke access to your mobile phone via Twitter’s website, and hit the Retweet icon on your mobile. The app will figure out it’s no longer allowed to do that, and will immediately prompt for your password. When you have logged back in via the mobile app, it will reappear as authorised on the Settings | Applications page.


Featured image: AlesiaKan / Shutterstock.com

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/lYzRPgq4Hz0/

News in brief: France drops e-voting; alleged Yahoo hackers indicted; Google tool for parents

Your daily round-up of some of the other stories in the news

France drops e-voting amid attack fears

As several European countries gear up for general elections, France has dropped plans to allow its 1.3m citizens abroad vote electronically in its presidential election amid concerns about the risk of cyber-attack, said the French foreign ministry on Monday.

There has been a rising tide of concern about the impact of Russian meddling in elections – which Moscow has denied – which led to France’s National Cybersecurity Agency deciding to drop the facility for French citizens overseas, to vote electronically.

The ministry said there was an “extremely high risk” of cyber-attacks, adding: “It was decided it would be better to take no risk that might jeopardise the legislative vote for French citizens residing abroad.”

Russian intelligence agency officers indicted for Yahoo breach

Four people, including two officers of the FSB, Russia’s intelligence agency, have been indicted by a grand jury in California in connection with the hack on Yahoo that led to the the breach of 500m users’ details in 2014.

The four men – Dmitry Alexandrovich Dokuchaev and Igor Anatolyevich Sushchin from the FSB and two alleged hackers, Latvian national Alexsey Alexseyevich Belan and Karim Baratov, who holds Canadian and Kazakh nationality – have been charged with hacking, wire fraud, trade secret theft, economic espionage and other offences.

Jeff Sessions, US attorney-general, said: “This is one of the largest data breaches in history … today we have identified four individuals responsible for unauthorised access to millions of users’ accounts. The United States will vigorously investigate and prosecute the people behind such attacks.”

Google launches tool for parents

In a move that can either be seen as a smart way to protect kids online, or perhaps to get the younger generation on board as customers, Google has launched a tool called Family Link for phones.

The tool lets parents oversee what apps their kids install on Android devices, as well as keeping an eye on how long they spend using their devices and remotely lock kids’ devices at bedtime or homework time.

Mashable’s review of the tool found much to praise, although reviewer Pete Pachal thought the controls weren’t as granular as he’d like them to be. However, it seems like a useful tool for parents who want to give their kids devices but at the same time keep an eye on what they do with those devices.

If you’re an Android family, you can request an invitation here.

Catch up with all of today’s stories on Naked Security


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Ywgu7YCZFj8/