STE WILLIAMS

The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?

The old-school technology is experiencing new popularity, but too many people assume mainframes are inherently secure.

By all accounts, a mainframe renaissance is here. After years of negativity and predictions about the impending death of the mainframe, the technology is experiencing a resurgence and wide adoption this year, with even greater growth predicted beyond 2019.

Case in point: IBM’s Z series mainframe sales are up 70% year-over-year. And a recent Compuware survey showed that mainframe workloads are increasing. Currently, 57% of enterprises with a mainframe run more than half of their critical applications on the mainframe, but that number is expected to rise to 64% by next year, according to Compushare.

As the face of IT has changed, the mainframe has kept up with trends, with its ever-evolving ability to provide the performance and number-crunching required by technologies such as machine learning and artificial intelligence.

But while mainframe technology has evolved to meet the trends, the security processes and practices needed to keep the platform secure haven’t exactly kept up. It’s not for lack of technology and tools, however. The phenomenon is largely due to a series of misconceptions among IT professionals around mainframe security. Those misconceptions are placing countless businesses — and an enormous amount of sensitive customer data — at serious risk.

Debunking Misconceptions
I’ve spent the majority of my career in mainframe security, and the one mistaken belief I come across consistently is that the mainframe is inherently secure. What I hear is that mainframes have security built into them from the ground up — that through cryptographic hardware acceleration and a secure operating system, mainframes fulfill the critical requirement of keeping data protected. But that’s only part of the story.

If you’re thinking “But one of the main reasons I chose mainframe technology was its reputation for security!” you’re not mistaken. It’s true — the mainframe is arguably the most secure platform. But really, I prefer to think of the mainframe as the most securable platform. Any system comes with weaknesses, and the mainframe is no exception.

Like any other system, mainframes are subject to ransomware attacks, cybersecurity threats, and vulnerabilities that leave them open to serious exposures. Despite the reputation for security, reliability, and scalability, the mainframe requires the same level of attention as any other computing platform when it comes to security.

Widespread Complacency
Unfortunately, I see businesses overlooking mainframe security all too often. This advice isn’t only meant for businesses new to mainframes that might not know any better. It’s also an important reminder to businesses that have long been relying on mainframes to run mission-critical processes and safeguard sensitive customer information.

Overlooking mainframe security is an industrywide issue today. Recent research shows that even though 85% of companies say that mainframe security is a top priority, 67% admit that they only sometimes or rarely factor security into mainframe environment decisions.

In other words, companies aren’t practicing what they preach when it comes to mainframe security. And as we hear about a new data breach seemingly every day, business and consumers alike should be worried about the implications of security complacency.

There’s also a widespread lack of knowledge around how to best protect the mainframe. Executives around the world rank security as the second-biggest challenge today, but they’re not sure how to get started.

Creating a Mainframe Security Strategy
Companies can’t afford a breach: The cost of a data breach is high, averaging $3.86 million globally, not to mention the damage to your business in reputational harm and potential lost business. With that in mind, how can businesses build a successful mainframe security strategy?

Most organizations rely on third-party tools to establish permissions (authentication) and access control (authorization), but that alone isn’t a complete solution. Security exploits are also a major cause of breaches, and organizations need to make sure they’re taking steps to protect against them. A Forrester survey of companies that have experienced a data breach within the last year found that 35% were caused by an exploited vulnerability.

With the threat and vulnerability landscape constantly changing, organizations are under attack across their IT systems. As a result, compliance regulations increasingly require mainframe penetration testing, vulnerability scanning, and ongoing vulnerability management. Consistent testing and evaluation can help uncover known and zero-day vulnerabilities.

A comprehensive security strategy also includes things like automating compliance assessments, penetration testing, scanning mainframe applications and operating systems (OS) for vulnerabilities, and, of course, making sure they have the right resources (both in terms of tools and people) to secure the environment.

In other words, the best defense is a good offense. Organizations need to be proactive about protecting the mainframe not only against known threats but also seeking out the gaps in their systems that might allow unknown threats to creep into their mainframe and compromise customer data.

Ultimately, the mainframe renaissance will equip businesses with the processing power, reliability, and scalability they need to thrive. But for true peace of mind, especially where sensitive customer data is involved, businesses need to be aware of the importance of mainframe security and, just as importantly, prepared to execute on it.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: 5 Things to Know About Cyber Insurance.

Ray Overby is a Co-Founder and President of Key Resources, Inc., (KRI), a software and security services firm specializing in mainframe security. A recognized world authority in mainframe security, risk, and compliance for IBM Z System environments, Ray heads the KRI … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/the-mainframe-is-seeing-a-resurgence-is-security-keeping-pace/a/d-id/1335476?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

World recoils in horror as smartphone maker accused of helping government snoops read encrypted texts, track device whereabouts

Comment In a report that has left lawmakers across the globe reeling, the Wall Street Journal on Wednesday claimed a smartphone maker helped government officials in Uganda access encrypted texts on a handset used by one of its own citizens, and track the device’s whereabouts.

It is, we think you will agree, virtually unheard of that a manufacturer of telecommunications gear would respond to a request from a country’s intelligence services.

It strongly implies that there is some kind of law that gives Uganda’s snoops the power to demand and obtain a target’s personal communications. Worse, it would appear that this surveillance was not made public – making the WSJ’s efforts to bring the truth to the world that much more impressive.

What is remarkable is that the WSJ’s investigative team was able to glean this information in a country in which it has but a single reporter. Despite the nation’s small impact on the world, or on US interests, the WSJ has seemingly taken an intense interest in Ugandan affairs, covering events in the African nation no less than four times in the past year.

Compare that to, say Hong Kong, which the WSJ has written four stories about in the last four hours, or Mexico which has had three dedicated stories in the past week.

In this case, the WSJ was shown Ugandan police records that identified a member of opposition in Uganda’s parliament, Bobi Wine, as the target of a surveillance operation, and listed two engineers from the maker of the cellphone he uses who helped the government track his movements as well as access an encrypted WhatsApp group used to organize street rallies in support of the political opposition.

The WSJ doesn’t say how it obtained the documents, though it does reveal that Wine was recently in Washington DC where he had briefed the US government on events in Uganda and had received offers of assistance.

It is absolutely extraordinary that Uganda, a sovereign government, would seek to probe one of its own citizens. That a phone maker would assist in that effort is nothing sort of staggering.

Dogged reporting

The fact that the WSJ was aware of Wine’s Washington DC visit, and was able to track down internal police documents revealing Wine’s surveillance is testament to the extraordinary skills and resources that the newspaper possesses. It appears the WSJ’s single Uganda reporter took time out from writing regional reports about emerging and growth markets to track down highly confidential and politically sensitive documents that fingered state surveillance of a politician.

For reasons that are unclear, however, the WSJ story did not lead with the fact that Uganda has put a Washington-friendly politician under surveillance. Instead the main thrust of the piece was, for some reason, focused almost entirely on the smartphone maker whose engineers helped in the probe. In this case, it was, allegedly, the Chinese manufacturer Huawei.

It is also worth noting that the engineers were, the WSJ claims, brought in to assist members of Uganda’s cybersecurity team who were trying, and failing, to use Israeli-made spyware to extract WhatsApp group messages from Wine’s phone. The techies were apparently drafted in to get the surveillance tools to work.

The article didn’t spend much time digging into why an Israeli outfit had handed, directly or indirectly, snooping software to the Ugandan government. Nor was it very interested in the political repercussions within the African nation. But it was very interested in claiming that the mobile phone enterprise in this case was Huawei. That’s HUAWEI.

There is no evidence that the HUAWEI engineers provided any information on Wine to anyone other than the Ugandan authorities. But still, HUAWEI is based in China, even if its engineers in this case weren’t, and its phone wasn’t, and the person being tracked wasn’t either. Nonetheless, HUAWEI is a CHINESE company.

Huawei denies any of this took place.

The fact HUAWEI, allegedly, acceded to the demands of the Ugandan government to track a specific phone using someone else’s software is not in any way comparable to the long-standing and absolutely above board and entirely fair systems that exist in the US, UK, and Australia to do more or less the same thing.

It is also worth noting that it is horrifying that HUAWEI engineers helped locate a specific mobile phone for the Ugandan government whereas in the US, you just have to be a bounty hunter to access such information.

As it happens, the US intelligence services are currently engaged in a global information campaign about Huawei in which they have sought to exclude the company and its products from the US and other Western markets by claiming that it represents a security threat, without providing any public proof of that.

Most of those allies have rejected that claim following in-depth security reviews and many are suspicions that the Huawei clampdown is driven more by US business interests than any real threat to security, national or otherwise.

But that small side note is not thought to have had any impact on the Wall Street Journal’s extraordinary piece of investigative journalism published this week. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/08/15/huawei_uganda_report/

How dodgy browser plugins, web scripts can silently rewrite that URL you were about to hit – and throw you into an internet wormhole

Analysis Clickjacking, which came to the attention of security types more than a decade ago, continues to thrive, despite defenses deployed since then by browser makers.

Boffins from Microsoft and universities in China, South Korea and the US recently looked at the Alexa top 250K websites and identified three different clickjacking techniques currently being used to intercept clicks.

In summary, malicious browser extensions, and dodgy third-party scripts loaded by pages, can quietly alter URLs in links to redirect netizens elsewhere on the web, or trigger more code to run in the background. The goal by the makers of this stuff is to get victims to inadvertently click on adverts, set cookies, fool affiliate programs, download and run malware, and suchlike.

The researchers – Mingxue Zhang and Wei Meng from Chinese University of Hong Kong, Sangho Lee from Microsoft Research, Byoungyoung Lee from both Seoul National University and Purdue University, and Xinyu Xing from Pennsylvania State University – are scheduled to present their findings at the USENIX Security conference on Thursday.

In-depth

In a paper titled, “All Your Clicks Belong to Me: Investigating Click Interception on the Web,” the computer scientists describe how they developed their own browser-based analysis framework called Observer to monitor click interception. They did so because the dynamic, event-driven nature of web applications makes it difficult to assess the scripts responsible for interfering with click events simply by looking at application code.

They built Observer by customizing the open source Chromium browser so they could mediate all JavaScript-driven access to web links in the browser’s rendering engine, to identify the initiator of the URL in each link. Their framework, which they say they will release as open source code, also provides visibility into the creation and execution of JavaScript objects and allows the monitoring of all event handlers on every HTML element and of JavaScript navigation APIs. In short, it offers a window into where scripts go bad.

Among the top 250,000 Alexa websites, they found 437 third-party scripts intercepting user clicks on 613 websites that collectively receive 43 million daily visits.

The researchers reported that scripts tricking users to click on page elements disguised as first-party content or implemented as nearly invisible elements placed atop first-party content. They also said they found third-party scripts intercepting users clicks to monetize them, which they describe as a novel click fraud technique.

“We revealed that some websites collude with third-party scripts to hijack user clicks for monetization,” the paper says. “In particular, our analysis demonstrated that more than 36 per cent of the 3,251 unique click interception URLs were related to online advertising, which is the primary monetization approach on the Web.”

In addition to advertising, clickjacking may be used to drive malware installation. The researchers identified only two such campaigns, but suspect there are many fiddling with click events, noting that it was beyond the scope of their study to analyze the two million URLs in their data set for malware.

The clickjacking techniques discussed include: intercepting hyperlinks, either through third-party scripts that tamper with first-party URLs or huge hyperlinks that cover most of a page by enclosing much of the HTML or a large background image; adding a navigation-related event listener to a page element; and using visual deception (copying a first-party design element or a transparent overlay).

In a phone interview with The Register, Augustine Fou, a cybersecurity and ad fraud researcher who advises companies about online marketing, described how such click interception might be accomplished.

“If a user downloads a toolbar or extension, the extension sees everything in the browser so it can not only replace or inject ads, it can also inject clicks,” he said. “What those extensions might do is call a URL so a cookie gets planted, making an affiliate network believe an affiliate partner drove the sale so it pays a revenue share.”

As an example, he said, a webpage might include a hidden iframe that loads an Amazon.com page to place a cookie with an affiliate code, which gives the designated affiliate credit for purchases within the next 30 days.

Cookie stuffing

Fou pointed to the prosecution of an eBay affiliate for cookie stuffing back in 2013 and said he had recently heard from one of the largest affiliate networks in China that such fraud remains a major problem. “That kind of clickjacking is alive and well and as bad as ever,” he said.

Fou said the researchers have not only documented affiliate fraud through attribution URL flooding, they’ve also documenting other forms of display ad fraud that are not well known and also very well hidden. He pointed to JavaScript include directives that happen dynamically so code scanning won’t show malicious content and to clickjacking that leads to a roadblock/page-takeover ad that the user has to close before reaching their intended destination. These clicks, he said, can be made to look like ad clicks when the user is really just trying to navigate.

Google in 2017 announced changes to its Chrome designed to prevent two types of automatic redirection that were being abused. But as the research paper states:

“Chrome still cannot detect and prevent other possible ways to intercept user clicks, including but not limited to links modified by third-party scripts, third-party contents disguised as first-party contents, and transparent overlays.”

Fou said there’s a way to fight clickjacking-driven fraud but it isn’t technical. “Literally rip out all the third-party scripts from your website,” he said.

“Publishers were thinking that by adding more scripts, they could make more money. But they’re making less money and their audience is being stolen from them. It’s harming the user experience. Once you put someone else’s JavaScript on your page, they can then change its function at any time in the future and you’ll never know it. That’s how all this malvertising is happening.” ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/08/15/hijacked_clicks_research/

Intel: Listen up, you NUC-leheads! Mini PCs and compute sticks just got a major security fix

Hot on the heels of Patch Tuesday fixes from Microsoft, Apple, Adobe, and SAP, Intel has dropped its monthly security bundle to address a series of seven CVE-listed vulnerabilities in its firmware and software.

The most serious of the seven is the patch for CVE-2019-11162, a vulnerability in the Intel Compute Improvement Program software. This program is an opt-in diagnostic tool that collects detailed information about the hardware it’s running on and less-detailed information about activities like type of sites browsed, applications used and what region of the world the computer is being used in.

According to Intel, one of the drivers in the tool is actually the source of the vulnerability, which while serious is not exploitable over the network, at least. It can be exploited by a bad user or malware already on a system to take control of the box via privilege escalation, or crash it or make it leak information.

“Insufficient access control in hardware abstraction in SEMA driver for Intel Computing Improvement Program before version 2.4.0.04733 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access,” Chipzilla says in its summary of the flaw.

Users and admins are advised to update their software to version 2.4.0.04733 or later. Credit for the discovery was given to security researcher Jesse Michael.

Another diagnostic tool, the Intel Processor Identification Utility, was the host of CVE-2019-11163, a flaw that would allow a local attacker to leak information, crash the thing, or elevate their privileges.

The updated version is 6.1.0731. Jesse Michael gets credit for finding this bug as well.

Those using Intel’s mini-computers or compute stick hardware will want to install the update for CVE-2019-11140, a flaw in the Intel NUC firmware. That vulnerability was blamed on “insufficient session validation” and would allow for elevation of privilege and information disclosure, not the sort of things you want happening to your board’s firmware.

The fixed BIOS version is 0066 for NUC boards, 0060 for Compute Stick, and 0037 for Intel Compute Card. Credit goes to researcher Dmitry Frolov.

beach

This summer’s hottest sequels: BlueKeep II, III, IV and V – the latest wormable RDP holes in Microsoft Windows

READ MORE

Meanwhile, Intel has gone so far as to flat out cancel RAID Web Console 2, the source of CVE-2019-0173, an authentication bypass flaw accessible via a network connection. Admins will want to update to RAID Web Console 3 version 7.009.011.000 or later. Credit to trotmaster99.

The Intel Authenticate software has been patched for CVE-2019-11142, a local escalation of privilege vulnerability traced back to improper permissions in the software installer. Users and admins will want to update to version 3.8 or later. Credit for the discovery goes to Tunisian security researcher SaifAllah benMassaoud.

Driver and Support Assistant was updated to 19.7.30.2 to patch against CVE-2019-11146, an elevation of privilege bug discovered by Hacker One bug hunter Jakub Palaczynski and CyberArk’s researcher Eran Shimony.

The Intel Remote Displays SDK got a patch for CVE-2019-11148, an elevation of privilege bug discovered by flaw finder Marius Gabriel Mihai. Patched versions are 2.0.1 R2 and later. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/08/14/intel_security_fix/

Stronger Defenses Force Cybercriminals to Rethink Strategy

Researchers see the rise of new relationships and attack techniques as criminals put companies’ resilience to the test.

As businesses ramp up defenses, cybercriminals and advanced persistent threat groups are rethinking their attack strategies to be more collaborative and complex, researchers report.

The more organizations invest in securing their networks and training staff, the harder and more expensive it becomes for attackers to disrupt them, Accenture iDefense analysts say in the “2019 Cyber Threatscape Report.” Instead of backing down, adversaries are targeting victims with layered attacks, new techniques, and intricate relationships to disguise their identities.

“They’ve become more sophisticated; they’ve gone deeper underground,” says Howard Marshall, director of cyber intelligence services, in an interview with Dark Reading. Conventional cybercrime operations remain active: Emotet, Loki Bot, Pony, NanoCore, and Nocturnal were the most common types of malware seen in 2018 and 2019, researchers found. The most common spam attachments deliver malware via weaponized Microsoft Office files.

As traditional campaigns continue to spread, law enforcement takedowns of popular communities, such as Alphabay and Hansa, have motivated attackers to swap open partnerships on underground forums for smaller, close-knit syndicates in order to remain hidden. “There’s loss of visibility – the fact that it’s a lot harder to get into some of these closed-network environments,” adds Josh Ray, Accenture cyber defense lead, pointing to adversary cost.

That attack groups continue to remain operational despite crackdowns highlights a “significant increase” in the maturity and resilience of criminal networks, researchers say. As groups more closely work together, it disguises their identities and makes attribution harder.

Financially motivated campaigns aren’t going away. The report describes an uptick in “big game hunting,” in which cybercriminals launch targeted attacks for financial gain using a broad range of tailored malware or commodity crimeware that can be downloaded or purchased from underground forums. Criminals also conduct targeted attacks using legitimate pentesting tools, including Metasploit, Cobalt Strike, PowerShell Empire (PSE), Meterpreter, and Mimikatz.

Both Marshall and Ray point to the rise of disinformation as a threat to watch. In the report, analysts explain how new technologies can drive the spread of false information. Cybercriminals are likely to take advantage of high-profile global events to sway public opinion, and they have more tools to help, researchers say, citing 5G networks and artificial intelligence. New technologies will prove beneficial to businesses, but they may cause more damage when in the hands of an attacker.

Accenture predicts upcoming global events, including the 2020 Tokyo Summer Olympics, 2020 US presidential election, and events and activities related to NATO expansion, will become leverage for information operations, phishing campaigns, and other more destructive threats.

“Awareness around that activity has heightened,” Ray says. Disinformation tactics can range from outright lies to the selection and distortion of facts to tell a misleading story. Social media remains the battlefield: It’s free, and its presence in everyday life makes it an appealing tool.

“The near omnipresent role of social media in everyday life has positioned online communities as target-rich environments which exist beyond the conventional purview of corporations’ security controls,” researchers write in the report. “This has propelled social networks to the frontlines, as high-yield arenas for manipulation.”

Ransomware: Bypassing Spam Campaigns
Ransomware is by no means a new concern to organizations around the world, but researchers anticipate the threat will be exacerbated. In addition to delivering ransomware via spam campaigns, attackers are also installing ransomware onto business networks by purchasing Remote Desktop Protocol (RDP) access to compromised servers on underground forums. This level of access is typically obtained through vulnerability exploitation and brute forcing.

Analysts predict ransomware will continue to drive cash flow for attackers. The median ransom demand observed in 2018 was around $10,000 per incident, with the highest reaching $8.5 million. But even with profits rising, researchers see mixed motives driving ransomware. Some attackers seek to destroy network environments in addition to, or instead of, making money.

Ransomware’s ability to destroy information, slow performance, and disrupt services can help attackers hide evidence of crimes like espionage or fraud. Campaigns can also interfere with markets by using malware to lower a company’s share price and increase its product cost. A ransomware attack can also send financial and political messages. Analysts point to GandCrab as an example of a threat that avoids targeting victims in certain countries.

What can businesses take from this? With respect to ransomware, researchers recommend maintaining regular backups of storage devices, servers, and users’ information. If malware hits, they should “immediately disconnect” affected systems from the network, reimage infected systems whenever possible, and restore user data from backups. They should not pay ransom.

More broadly, Ray advises security admins to better understand their business’ value chain. “A lot of security professionals don’t understand how their companies make money,” he says. This awareness can help downgrade the effectiveness of a cyberattack or disinformation campaign.

Business-savvy security leaders can also learn why different adversaries would target the firm, he adds. Attackers may focus on crown jewels you don’t expect them to eye; marrying business acumen with threat data can provide a view of how a company appears to attackers.

Related Content:

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/endpoint/stronger-defenses-force-cybercriminals-to-rethink-strategy/d/d-id/1335527?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Trend Micro Patches Privilege Escalation Bug in its Password Manager

Organizations should update to latest build as soon as possible, security vendor says.

Trend Micro has patched a couple of security flaws in its Password Manager credential management product that gave attackers a way to escalate privileges and gain persistence on systems running the software.

In a security advisory Wednesday, the security vendor described the issue as involving two DLL hijacking vulnerabilities in the company’s stand-alone version of the product and the version that comes integrated with the latest version of its anti-malware suite.

One of the now-patched vulnerabilities (CVE-2019-14684) would have allowed an attacker to load an arbitrary file with malicious code into the password manager. The other separate but similar vulnerability (CVE-2019-14687), also allowed attackers to load malicious code but using a different DLL.

The flaws existed in Trend Micro’s 2019 versions of Password Manager, Maximum Security, and Premium Security products for Windows computers. The security vendor has issued a patch that is currently available to users who have signed up for automatic updates. Others can get the patch by manually updating their software to the latest build.

“Exploiting these types of vulnerabilities require that an attacker has access (physical or remote) to a vulnerable machine,” Trend Micro said. Even though an exploit would likely require several specific conditions to exist, organizations should still upgrade to the latest build as soon as possible, the company advised.

Attractive to Attackers

Peleg Hadar, security researcher at SafeBreach Labs, the security firm that originally discovered and reported the vulnerabilities, says certain features in Trend Micro’s Password Manager make it interesting for attackers.

For instance, the product runs as the most privileged user account (NT AuthoritySystem) on Windows systems, thereby making it attractive to attackers seeking to escalate privileges on an infected system.

The product also uses a Trend Micro-signed executable. Hackers that find a way to execute code within this signed process have a way to potentially bypass whitelisting controls. Trend Micro’s Password Manager service starts automatically at boot time – which benefits attackers looking for a way to maintain persistence on a system, he says.

The vulnerabilities that SafeBreach discovered would in certain situations have allowed an attacker to drop a malicious file with malicious code on a certain directory in the product, Hadar says. The code would be loaded and executed while signed as an executable under the scope of the Trend Micro password manager, he says. An attacker would have the ability to run under the highest privileges that the operating systems supports.

“This will provide the attacker the ability to do multiple malicious operations on the computer such as stealing sensitive data,” Hadar says. “The attacker will also be able to likely evade security products because it’s running under a process which is signed by Trend Micro.” In the right conditions, an attacker would only need the lowest privilege in order to write a malicious file to a directory, he adds.

Vulnerable Password Managers

Reports of vulnerabilities in security products—including password managers—are certainly not new.

Earlier this year Independent Security Evaluators (ISE), a consulting firm based in Baltimore released a report summarizing the findings from its analysis of popular password managers for Windows systems. The five products tested were Dashlane, KeePass, LastPass, 1Password 7, and 1Password 4.

The research turned up serious security issues in every single product including in some cases those that allowed credentials—even the master password—to be easily extracted from a locked password manager.

Even so, many security researchers advocate the use of password managers because it helps users secure credentials far more effectively than if they had not been using one. Even the researchers from ISE who uncovered the issue concluded that a password manager is generally a good thing.

“Aside from being an administrative tool to allow users to categorize and better manage their credentials, password managers guide users to avoid bad password practices such as using weak passwords, common passwords, generic passwords, and password reuse,” the researchers said.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/trend-micro-patches-privilege-escalation-bug-in-its-password-manager/d/d-id/1335525?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Financial Phishing Grows in Volume and Sophistication in First Half of 2019

Criminals are using the tools intended to protect consumers to attack them through techniques that are becoming more successful with each passing month.

Phishing — especially phishing involving websites claiming to be from financial institutions — is growing, and criminals are getting better at their craft. A new report shows how attackers are using messages that closely mimic legitimate bank promotions to entice users to open email messages and click on links, then using those clicks and opens as the first step in campaigns that steal credentials, embezzle funds, and plant ransomware or other malware across systems.

The report, “The State of Financial Phishing” for the first half of 2019, demonstrates that one of the principal tools in fighting online fraud — the green “lock” icon that shows the website is protected by encryption — has now been co-opted by criminals to create a false sense of security in their malicious Web traps.

Criminals have found that the same free certificate authorities (CAs) making it easy for legitimate small businesses to protect their websites enhance the look and feel of bogus, criminal sites. Bob Maley, chief security officer at report sponsor Normshield, says that free CAs like LetsEncrypt have helped small organizations but with significant unintended consequences: “The shift to using domains with certificates changes the game,” he says.

According to the report, the first six months of the year saw a 14% increase in domains potentially used in phishing campaigns and double the number of phishing domains that were certified by registrars. That works out to more than 1,900 potential phishing domains that were registered in the first half of 2019.

Maley says the rate of phishing domain registration is increasing, and he expects more than 3,500 new criminal domains will be registered by the end of the year. Many of those, he says, won’t be used quickly; attackers will let them “age” so that protection algorithms designed to protect users from “quick hit” campaigns won’t be triggered.

Those criminal domains are using techniques like TLS or SSL certificates to look more legitimate. The researchers say the 8.5% of phishing domains that used a valid encryption certificate in 2018 will increase to 15% of sites with a legitimate green lock icon in 2019.

“My take on this is that cybersecurity professionals really need to understand that there’s a strategic process being followed by both sides,” Maley says. “OODA — observe, orient, decide, and act — is a war-fighting concept that everyone uses. Some just do it quicker.”

The great danger is that criminals are going through the OODA loop faster than the defenders, Maley says. And he points out that security professionals could take concrete steps to get ahead of their adversaries.

He recommends searching for URLs likely to be used in legitimate business transactions and being vigilant about several critical points. First, avoid clicking on two- or three-letter domain names because they’re so easily spoofed. The same, he says, is true of highly generic site names. Block these in internal Web filter software and, Maley argues, make life a little easier for your peers.

“Identify phishing domains that are applied to your company and take those down” with DMCA and other legal takedown demands, he says.

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/financial-phishing-grows-in-volume-and-sophistication-in-first-half-of-2019/d/d-id/1335528?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Chin up, CapitalOne: You may not have been the suspected hacker’s only victim. Feds fear 30-plus organizations hit

The ex-Amazon software engineer accused of stealing the personal information of 106 million people from Capital One’s cloud-hosted databases may have hacked dozens of other organizations.

This is according to a filing [PDF] this week by prosecutors in a US federal district court in Seattle, where suspected cyber-thief Paige Thompson is facing trial.

While arguing their case to keep Thompson in jail before and during proceedings, Uncle Sam’s legal eagles noted that as many as 30 other companies and organizations may have been similarly ransacked and had their customer records and corporate secrets siphoned by the alleged hacker.

“Thompson’s crime in this case – major cyber intrusions that resulted in the theft of massive amounts of data from what now appears to be more than 30 victim companies – only exacerbates the harm that Thompson has done, and the threat she would pose if released,” the filing reads.

This is not a terribly surprising development, given that, according to documents previously submitted by the FBI in the Capital One case, Thompson bragged online about swiping data from dozens of other targets, from Ford to American universities. Capital One aside, none have, to the best of our knowledge, alleged in public any network intrusions at the hands of Thompson, a former AWS techie who may have used her intimate knowledge of the cloud giant to gain access to vulnerable S3 storage buckets.

Jeff Bezos feels a tap on the shoulder. Ahem, Mr Amazon, care to explain how Capital One’s AWS S3 buckets got hacked?

READ MORE

Thompson, who went by the online aliases “erratic” and “0xA3A97B6C”, was collared late last month in a dramatic armed raid in which police stormed the Seattle home she shared with several housemates, and seized 20 firearms and accessories along with Thompson’s computing gear.

It is not just the additional investigations that have prosecutors asking Judge Mary Theiler to keep Thompson in detention. The Feds’ paperwork also notes that the accused hacker has a history of threats to harm herself and others, potentially making her a danger for not only flight, but also a risk to the public.

“Thompson has a long history of threatening behavior that includes repeated threats to kill others, to kill herself, and to commit suicide by cop,” the filing notes. “Thompson’s threats have resulted in multiple calls to law enforcement, and the entry of protection orders against Thompson.”

One couple were granted five-year protection orders against Thompson after claiming she had subjected them to seven years of harassment. Her housemates also reported that she had threatened to commit “suicide by cop.”

The next hearing in the case, to discuss the detention request, is set for later this week. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/08/14/capitalone_hacker_court/

BioStar 2 Leak Exposes 23GB Data, 1M Fingerprints

Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users.

Researchers with VPNMentor have discovered a massive leak in biometric security platform BioStar 2, which uses facial recognition and fingerprint scanning as part of its means to identify users. Thousands of organizations use the tool to control access to buildings and secure areas.

Suprema, the security firm that built BioStar 2, recently partnered with Nedap to integrate the platform into its AEOS access control system. More than 5,700 institutions across 83 countries, including local businesses, governments, banks, and the UK’s Metropolitan Police, use AEOS.

Noam Rotem and Ran Locar, both Internet privacy researchers, first detected the leak on August 5 while scanning ports as part of a Web-mapping project. Their team hunts for familiar IP blocks and uses them to find holes in a company’s Web system. When these holes are found, the researchers then look for vulnerabilities that could lead to a data breach. During this process, the team found large chunks of BioStar 2’s database unsecured and unencrypted.

The database held “almost every kind of sensitive data available,” researchers wrote in a blog post. They could access more than 27.8 million records and a total of 23 GB of data, including more than 1 million fingerprints; facial recognition data and user images; access to client admin panels, dashboards, back-end controls, and permissions; unencrypted usernames and passwords, records of entry and exit to secure areas; and employee records.

“One of the more surprising aspects of this leak was how unsecured the account passwords we accessed were,” they point out. “Plenty of accounts had ridiculously simple passwords, like ‘Password’ and ‘abdc1234.'” While some users had more complex passwords, the researchers were able to view passwords across the database because they were stored as plaintext files.

Following a rocky disclosure process, BioStar 2 secured the database on August 13.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/biostar-2-leak-exposes-23gb-data-1m-fingerprints/d/d-id/1335521?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

GitHub Named in Capital One Breach Lawsuit

A new lawsuit says that GitHub bears responsibility for the Capital One breach because it actively encourages hacking and stored stolen data.

The fallout from the Capital One data breach continues, with a recent class-action lawsuit naming the financial giant — and GitHub, the online data repository that has become central to many companies’ agile and devops coding efforts.

The lawsuit, filed in US District Court for the Northern District of California, claims that GitHub (now owned by Microsoft) “actively encourages” hackers,  and that this active encouragement means that it has a higher responsibility than most repositories to scan uploaded files for dangerous or illicit data.

According to the lawsuit, files containing information on the methods used in the breach were uploaded to the site in April, but not removed until July, when GitHub was alerted by Capital One.

In a statement to Dark Reading, GitHub said, “GitHub promptly investigates content, once it’s reported to us, and removes anything that violates our Terms of Service. The file posted on GitHub in this incident did not contain any Social Security numbers, bank account information, or any other reportedly stolen personal information. We received a request from Capital One to remove content containing information about the methods used to steal the data, which we took down promptly after receiving their request.”

The suit is depending on a standard of “morally culpable,” as opposed to “legally culpable,” which is a commonly used legal standard. 

For more, read here and here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/github-named-in-capital-one-breach-lawsuit/d/d-id/1335523?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple