STE WILLIAMS

Clogged Cache? The Edge Cartoon Contest Winners

Creativity flowed, but two captions rose to the top.

We’re flushed with excitement to announce the winner of The Edge’s very first cartoon caption contest!  

Credit — and a $25 Amazon gift card — goes to Flavius Hobbs, aka “FMHobbs,” a cybersecurity engineer at Bowie, Maryland-based MilCorp. His caption appears above.

And congrats to runner-up “Hyznbrg,” an HP Certified security professional at Southwest Copy Systems, in Albuquerque, New Mexico, for the caption, “Should we tell them the caps lock is on?” A $10 Amazon gift card is on the way.  

If you haven’t had a chance to read all the entries, be sure to check them out today.

Our next cartoon publishes on Sept. 3. We hope you’ll join in the fun. 

 

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Article source: https://www.darkreading.com/edge/theedge/clogged-cache-the-edge-cartoon-contest-winners/b/d-id/1335556?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

80 Charged in Massive BEC Operation Bust

A group of mostly Nigerian nationals attempted to steal $46 million through business email compromise and romance scams, the FBI reports.

Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of Justice in a 252-count federal grand jury indictment unsealed on August 22.

The October 18 indictment alleges 80 defendants, mostly Nigerian nationals, used BEC fraud, romance scams, and schemes targeting the elderly to defraud victims out of millions in a scheme that ran from 2014 through 2018. At least $6 million was taken in that time; the conspiracy targeted another $40 million. Some defendants, including 14 arrested Thursday and others in custody, are based in the US. Officials believe most are abroad, primarily in Nigeria.

Lead defendants in the case are Valentine Iro and Chukwudi Igbokwe, both Nigerian citizens living in California. A criminal complaint unsealed August 22 alleges co-conspirators based in the US, Nigeria, and other countries would contact Iro and Igbokwe when they needed bank and money-service accounts to store ill-gotten funds. The duo collected bank accounts, accepted requests for bank account information, gave that information to co-conspirators, and laundered victims’ stolen money in exchange for a percentage, according to the 145-page indictment.

The indictment includes descriptions of more than 440 “overt acts” conducted in the operation, including details of fraudulent wire transfers and cash withdrawals affecting different victims.

Co-conspirators regularly filed fake business name statements with the Los Angeles County Registrar/Recorder’s Office that were presented to banks to open fraudulent accounts. If a bank account with a specific business name was needed to trick an organization into making a payment, Iro and Igbokwe coordinated with money mules to open accounts to receive the funds. Once a victim deposited cash, they’d work with others to launder it by wiring money to other accounts they owned or withdrawing it as cash or cashier’s checks, the indictment states.

When stolen money was withdrawn as cash, defendants would use illegal money exchangers to move it overseas while bypassing legitimate banks. The money exchangers used a Nigerian banking app to transfer other funds in naira, the Nigerian currency, from Nigerian bank accounts they controlled to other Nigerian bank accounts owned by the lead defendants.

Each of the 80 defendants is charged with conspiracy to commit fraud, conspiracy to launder money, and aggravated identity theft. Some also face substantive fraud and money-laundering charges, and seven are charged with operating illegal money transmitting businesses.

On top of those, Iro, Igbokwe, and defendant Chuks Eroha face charges for trying to destroy their phones when the FBI arrived with a search warrant in July 2017. Upon agents’ arrival at Iro’s apartment, he broke his phone in half while the other two defendants threw theirs out a bedroom window. Iro is charged with lying to the FBI in an interview done during the search.

“Today’s announcement highlights the extensive efforts that organized criminal groups will engage in to perpetrate BEC schemes that target American citizens and their hard-earned assets,” said Paul Delacourt, assistant director in charge of the FBI’s Los Angeles Field Office, in a statement. “Billions of dollars are lost annually, and we urge citizens to be aware of these sophisticated financial schemes to protect themselves or their businesses from becoming unsuspecting victims.”

BEC is a growing problem for businesses and consumers: Last summer the FBI reported BEC fraud had cost $12 billion in losses to organizations around the world since 2013. These attacks, in which fraudsters attempt to con victims out of money by posing as someone they know, are growing in frequency and complexity as criminals find new, more creative ways to do them.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/risk/80-charged-in-massive-bec-operation-bust/d/d-id/1335631?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

IBM Announces Quantum Safe Encryption

Techniques too tough for quantum computing solutions will be part of public cloud and tape storage encryption.

IBM researchers have announced development of new “quantum safe” encryption techniques that they plan to deploy to the IBM Public Cloud in 2020. The techniques have also been prototyped as part of a quantum safe enterprise class tape system.

According to the announcement, the new encryption algorithms are based on algebraic lattices, a class of mathematical problems that have not yet been shown to be susceptible to quantum computing solutions. The algorithms are implemented in “Cryptographic Suite for Algebraic Lattices” (CRYSTALS), a collection based on two primitives: Kyber, a secure key encapsulation mechanism, and Dilithium, a secure digital signature algorithm.

IBM has donated the quantum safe algorithms to OpenQuantumSafe.org for developing additional open standards and has submitted them to NIST for standardization.

Read more here and here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/application-security/ibm-announces-quantum-safe-encryption/d/d-id/1335632?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Qualys Launches Free App for IT Asset Discovery and Inventory

Qualys’s Chairman and CEO, Philippe Courtot talks about changes in the security landscape he’s witnessed during the company’s 20-year lifespan, as well as what motivated the vendor to give away its Global IT Asset Discovery and Inventory app for free.

Article source: https://www.darkreading.com/qualys-launches-free-app-for-it-asset-discovery-and-inventory/v/d-id/1335625?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Bumper Cisco patches fix four new ‘critical’ vulnerabilities

If you’re a Cisco customer, the company just issued some urgent patching homework in the form of 31 security fixes, including four addressing new flaws rated ‘critical’.

Three of the criticals (CVE-2019-1937, CVE-2019-1938, CVE-2019-1974) relate to authentication bypass vulnerabilities affecting the following products:

  • UCS Director and Cisco UCS Director Express for Big Data.
  • IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data.
  • Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data.

All are remotely exploitable, resulting in the CVSS score of 9.8, which could allow “an attacker to gain full administrative access to the affected device.”

The fourth (CVE-2019-1935, also a 9.8) affects the Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data.

This is described as a default credentials flaw which could allow an attacker to log into the command line interface using the SCP user account giving them “full read and write access to the system’s database.”

Reheats

In addition, the advisory mentions two other critical vulnerabilities (in addition to the 31), CVE-2019-1913 and CVE-2019-1912, but these are just updates to advisories from early August affecting the company’s 220 Series Smart Switches.

What appears to have changed since then is that Cisco has received word that public exploits are now available, although in both cases:

Cisco PSIRT is not aware of malicious use of the vulnerability that is described in this advisory.

That sounds comforting, but the fact that proof-of-concept code is out there raises the urgency of patching these flaws as soon as possible.

Insecure boot

Cisco also finds itself patching a high priority flaw (CVE-2019-1649) in the proprietary secure boot routine used by what appears to be a big chunk of the company’s well-known enterprise router and switching hardware.

This could allow an attacker to tamper with a device’s firmware, although admin access to the system would also be necessary for this.

In total, eight of the flaws classified as high priority relate to the possibility of command injection.

A final interesting flaw is CVE-2019-9506,  Cisco’s fix for the industry-wide Bluetooth ‘KNOB’ key negotiation vulnerability made public at the recent USENIX symposium.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Eij0RYVwTSA/

‘Privacy policy change’ hoax infects Instagram; it confirms it’s crud

Who are you going to believe: screen sweetheart Julia Roberts or Instagram chief Adam Mosseri himself?

Roberts and a host of other celebrities have unfortunately fallen for an Instagram version of the Facebook chain letter hoax. After making the rounds on Facebook, it spread to Instagram, bleating all the way with its legalistic, poorly written and puzzlyingly punctuated load of horsefeathers about a purported privacy policy change taking place “tomorrow!”

The hoax would have us all believe that Instagram is planning to tweak its privacy policy to let old messages and private photos be used in court cases against its users.

It’s not. Mosseri took to his verified Instagram Story feed to confirm that it’s a load of bunk:

Heads up!

If you’re seeing a meme claiming that Instagram is changing its rules tomorrow, it’s not true.

The meme reportedly jumped from Facebook to Instagram, appearing as a text blob that went viral on Tuesday.

This hoax is as old as Rip Van Winkle but lacks the graciousness to shut up and take a 20-year nap.

Snopes debunked the original Facebook version in 2012.

We’ve written about variations on that Facebook version multiple times – back when it breathed its first spammy breath in 2012, again in 2015, yet again in 2016, and—encore!—a few days ago.

The Instagram version is the same as the Facebook one in that it makes up a new privacy rule to fret about. In this case, Instagram is purportedly changing its rules so that it can do a photo-grab on your content.

Everything you’ve ever posted becomes public from today

… says some spam writer who’s allergic to periods. It goes on to mention the same cockeyed laws that the Facebook version cites, including the Uniform Commercial Code (UCC)—a “legal talisman” which, Snopes has pointed out, is a darling among conspiracy buffs who “incorrectly maintain that citing it above your signature on an instrument will confer upon you the ability to invoke extraordinary legal rights.”

The Instagram meme, like its Facebook daddy meme, also cites the Rome Statute. As far as I can tell, that’s a statute out of the International Criminal Court that has to do with genocide, crimes against humanity, war crimes, and the crime of aggression.

Pretty sober stuff to apply to a copyright issue, wouldn’t you say?

Facebook has been debunking this chain letter for years: At least two of the many times this chain letter has come around, Facebook has reassured users that they …

… own the intellectual property (IP) that is uploaded to the social network, but depending on their privacy and applications settings, users grant the social network ‘a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook (IP License).’

Facebook owns Instagram. Facebook spokesperson Stephanie Otway told Gizmodo that there’s …

… no truth to this post.

None? At all?

Let’s take a look at Instagram’s terms of use.

In order to use the wildly popular service, you grant Instagram a license to use your content. That doesn’t mean that Instagram claims ownership of the content that you post. But when you share, post or upload content that’s covered by intellectual property rights, such as photos or videos, you do grant Instagram a …

… non-exclusive, royalty-free, transferable, sub-licensable, worldwide license to host, use, distribute, modify, run, copy, publicly perform or display, translate, and create derivative works of your content (consistent with your privacy and application settings).

Don’t like it? Unfortunately, the chain letter is lying to you when it says that you can block use of your content by copying and pasting a statement giving notice to Instagram that it’s forbidden from disclosing, copying, distributing, or taking “any other action against me based on this profile and/or its contents.”

No, you cannot Copy-C, Copy-V your way into revoking the permission you’ve already granted Instagram to “use my pictures, information, messages or posts, both past and future.”

There is, of course, another way to do that: as the use of services policy states, you can end the content use license anytime. Just delete your content or your account. That won’t delete content you’ve shared with others, though; unless others delete your content, it’s still going to be out there.

What to do?

We don’t want to shame the many celebs and non-celebs who shared this meme. We know you think you’re being helpful – but you’re not, because forwarding nonsense like this just gives it credibility it doesnt deserve.

Please, if you see this meme, or if you yourself have shared it, do everybody a favor and report it as spam. Don’t post it, and delete it if you already posted it. You’ll get extra bonus points from the internet at large if, the next time you see something like this, you first do a quick search to see if it’s already been debunked before you share it.

Thanks in advance!

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/fqYSQUlREk0/

Instagram phishing uses 2FA as a lure

When cybercrooks first got into phishing in a big way, they went straight to where they figured the money was: your bank account.

A few years ago, we used to see a daily slew of bogus emails warning us of banking problems at financial institutions we’d never even heard of, let alone done business with, so the bulk of phishing attacks stood out from a mile away.

Back then, phishing was a real nuisance, but even a little bit of caution went an enormously long way.

That’s the era that gave rise to the advice to look for bad spelling, poor grammar, incorrect wording and weird-looking web sites.

Make no mistake, that advice is still valid. The crooks still frequently make mistakes that give them away, so make sure you take advantage of their blunders to catch them out. It’s bad enough to get phished at all, but to realise afterwards that you failed to notice that you’d “logged into” into the Firrst Bank of Texass or the Royall Candanian Biulding Sociteye by mistake – well, that would just add insult to injury.

These days, you’re almost certainly still seeing phishing attacks that are after your banking passwords, but we’re ready to wager that you get just as many, and probably more, phoney emails that are after passwords for other types of account.

Email accounts are super-useful to crooks these days, for the rather obvious reason that your email address is the place that many of your other online services use for their “account recovery” functions.

A crook who can get at your emails before you do can use the [Reset password] button on your online accounts and click on the “choose new password” links that come back via email…

…without you ever noticing that a password reset was requested.

Social media passwords are also valuable to crooks, because the innards of your social media accounts typically give away much more about you than the crooks could find out with regular searches.

Worse still, a crook who’s inside your social media account can use it to trick your friends and family, too, so you’re not just putting yourelf at risk by losing control of the account.

Indeed, we now see more phishing attacks that are going after email and social media passwords than we do attacks against online banking accounts.

Here’s a not-so-good one from this week that was after webmail passwords:

This message did indeed mention an account that’s not used much any more, so the crooks got lucky with the timing of the message.

But the ripped-off Microsoft logo is messed up and the text “we are closing all old verions” doesn’t really make sense, so your bogosity detectors should be going off by now.

The [Confirm] button is a bit sneaky – the crooks obviously wanted to avoid saying anything about “logging on” in their email, because many recipients these days know that’s a red flag.

Emails with login links are almost always bogus, especially for mainstream webmail accounts, and years of publicity about the risks of clicking through when emails demand you to “login now” have made us nervous of the L-word.

(It’s easy enough to memorise your webmail site name – for Microsoft mail, outlook.com will do the trick; for Google you just put in gmail.com; and so on.)

Of course, the [Confirm] button doesn’t do quite what it says, because you do end up at a login page anyway, and that’s where this phish shows its carelessness:

There’s no HTTPS (note the missing padlock); the domain name looks (and is) bogus; the login page doesn’t look like any webmail service I’ve ever used; and the whole thing is clearly fake.

But here’s another attack we received this week that was much more believable, this time going for Instagram accounts:

We dont like to admit it, but the crooks thought this one through.

Apart from a few punctuation errors and the missing space before the word ‘Please’, this message is clean, clear and low-key enough not to raise instant alarm bells.

The use of what looks like a 2FA code is a neat touch: the implication is that you aren’t going to need to use a password, but instead simply to confirm that the email reached you.

And two-factor authentication codes kind of ooze cybersecurity – because, well, because 2FA.

If you click through, you ought to spot the phishiness from the domain name alone – we’ve redacted the exact text here, but it’s a .CF (Centrafrique) domain that nearly spells “login”, but doesn’t quite:

If we had to guess, we’d suggest that the crooks did’t get quite as believable a name as they wanted because they went for a free domain name. (CF is one of many developing economies that gives away some domains for nothing in the hope of attracting users and selling well-known words and what it thinks are cool-sounding domain names for $500 or more.)

Nevertheless, the phishing page itself is a perfectly believable facsimile of the real thing, and comes complete with a valid HTTPS certificate.

Remember that web certificates keep your connection to the site secure and stop the replies being snooped on or tampered with, and they vouch for the fact that the person who acquired the certificate really was able to login to the website and modify it.

But they don’t vouch for the actual content of the web pages, or for the files that are stored on the site and served up by it.

In other words, a site without a padlock definitely isn’t to be trusted, in the same way that typos and grammatical errors should turn you away; but a site can’t automatically be trusted just because it has a padlock and was advertised with emails that were spelled correctly.

The real Instagram login page is pretty close, so you can’t rely on visual mistakes in the password screen itself:

What to do?

The phishing page looks OK, and it has an HTTPS padlock just as you’d expect, so how are you supposed to spot phishes of this sort?

The good news is that, despite our grudging admission above that the crooks had come up with a phish that’s well above average in believablility, there are nevertheless some telltale signs that give it away.

Watch out for any and all of these tricks whenever you receive an email that claims to be a security warning.

  • Sign-in link in email. Easy solution: never use them! If you need to sign in to Instagram, you don’t need a link to find it. Use the app on your phone or a bookmark you set up yourself from your browser. Yes, it’s slightly more work. No, it’s not difficult.
  • Unexpected domain name. Make sure you know where your browser has taken you. If the address bar is too short to see the full URL, copy and paste the text out of it to make sure. If it looks wrong, assume it is wrong and ignore it, or take a second opinion from someone you trust. Yes, it’s slightly more work. No, it’s not difficult.
  • Unreasonable request. If you are worried that someone else has been logging into your account, use that account’s official way of checking your login activity. Don’t rely on web links that could have come from anywhere. Annoyingly, each social media app does this a bit differently, but once you know where to look you’ll never be tricked by an email like this again. Yes, it’s slightly more work. No, it’s not difficult.

To view your login activity on Instagram. Go to your Profile page, tap the hamburger menu (three-line icon) in the top right, then the Settings option at the bottom of the screen. From there, go to Security and then Login activity

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/JksWcX1iM6g/

Cybercrook hands cops £923k in Bitcoin made from selling phished deets on the dark web

A hacker from Kent has handed over almost a million quid in Bitcoin following a lengthy police investigation.

Grant West, 27, of Ashcroft Caravan Park, Sheerness, made most of the money through phishing scams targeting companies and individuals around the world since 2015. He sold financial details on and stashed the resulting Bitcoin in a variety of accounts and wallets.

West used the pseudonym Courvoisier and scammed more than 100 companies. The Bitcoin will be sold and the proceeds returned to victims, the Metropolitan Police Service (MPS) said in a statement.

West was jailed on 25 May for 10 years and eight months, having been arrested and charged in September 2017. The confiscation order for £922,978.14 was granted today and was not contested by West.

The lengthy investigation by the Met’s Cyber Crime Unit, dubbed Operation Draba, found he was running an organised crime gang mainly targeting London firms.

Between July and December 2015, West ran a phishing scam masquerading as the takeaway ordering service Just Eat. He failed to collect any financial details but cost the company £200,000.

Detectives also found evidence that West had attempted cyber attacks against the websites of 17 organisations including Sainsbury’s, Nectar, Groupon, AO.com, Ladbrokes, Coral Betting, Uber, Vitality, RS Feva Class Association 2017, Asda, the British Cardiovascular Society, Mighty Deals Limited, Truly Experiences Ltd, T Mobile, M R Porter, the Finnish Bitcoin exchange and Argos.

Officers found an SD card containing 78 million individual usernames and passwords along with 63,000 credit and debit card details. The laptop he used, actually his girlfriend’s, had details for 100,000 people stored in a file called “fulz”.

Raids on storage units rented by West uncovered £25,000 in cash and half a kilo of cannabis – selling the drug is how West started his dark web career. He also made money by selling “how-to” guides to other online fraudsters.

He pleaded guilty to two counts of conspiracy to defraud, two counts of possession of criminal property, unauthorised modification of computer material, possession of a Class-B drug with intent to supply, possession of a Class-B drug, attempting to supply a controlled drug, offering to supply a Class-B drug, and concealing/removing criminal property.

Detective Chief Inspector Kirsty Goldsmith, head of the Metropolitan Police Service’s (MPS) Cyber Crime Unit, said: “The MPS is committed to ensuring that individuals who are committing criminality on the Dark Web are identified, prosecuted and their criminal assets are seized.

“I wish to thank our partners within the MPS and in both public and private industry who have all assisted with this investigation which was incredibly complex and lengthy. I am very proud of my team for bringing this offender to justice and ensuring we have secured this order.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/08/23/cyber_crim_hands_police_1m_in_pilfered_bitcoins/

App Security Still Dogs Developers, End-User Organizations








This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



To InformationWeek
Network Computing
Dark Reading





Dark Reading | Security | Protect The Business - Enable Access

Search

Lots of re-used code, cost pressures and long lead times for application software all lead to porous security where application software is concerned, says Chris Eng, Chief Research Officer for Veracode. But an emerging role he calls a “security champion” can help circumvent those problems and make apps safer for everyone.



‘);
}



‘);
}

Comments

News

News

News

Register for Dark Reading Newsletters

Live Events

Webinars

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments


Cartoon

Latest Comment: What do you mean – I have a good system – I don’t need a password manager!

7 Threats Disruptive Forces Changing the Face of CybersecurityThis Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.

Reports

The State of IT Operations and Cybersecurity Operations

The State of IT Operations and Cybersecurity Operations

Your enterprise’s cyber risk may depend upon the relationship between the IT team and the security team. Here’s some insight on what’s working – and what isn’t – in the data center.

Dark Reading - Bug Report
Bug Report

googletag.cmd.push(function() {
googletag.display(‘div-gpt-ad-961777897907396673-15’);
});

Information Week
<!–
UBM DeusM
–>

UBM Tech



10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills

The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security – without busting any budgets.PreviousNext

From IT to marketing to HR, artificial intelligence (AI) is making its way throughout the enterprise. For security professionals, learning about the technology and how to apply it can be critical for keeping up with malicious actors and turning security into an asset. The question is how to do so without creating a new section on the “expense” side of the ledger.

The good news: Tools are available that allow virtually anyone with basic software development skills to begin honing their AI chops for a price that ranges from free to a few hundred dollars.

AI security involves many areas of research, says Jason Mancuso, a research scientist at Dropout Labs who spoke at the AI Village at DEF CON. “There is applying AI to security problems,” he explains. “There’s using AI to enhance red teaming or blue teaming in traditional cybersecurity. Then there’s the security of AI itself, which is a totally separate field, and it’s concerned with different problems.”

While AI research can be conducted on a standard laptop computer, AI research can benefit from a bit of a hardware boost. For this list, we’ve assembled both hardware aimed at an AI mission as well as software that will help those who are first getting started.

Bear in mind: Just because these options are inexpensive doesn’t mean AI is easy to master. That’s where online communities, education resources, and local Meetups dedicated to AI can help.  

Have you begun the process of adding AI to your security repertoire? Which tools are you using? Let us know in the Comments.

(Image Source: Worawut via Adobe Stock)

 

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full BioPreviousNext

Article source: https://www.darkreading.com/analytics/10-low-cost-(or-free!)-ways-to-boost-your-security-ai-skills/d/d-id/1335582?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple