STE WILLIAMS

Series of Zero-Day Vulnerabilities Could Endanger 200 Million Devices

Vulnerabilities in VxWorks’ TCP stack could allow an attacker to execute random code, launch a DoS attack, or use the vulnerable system to attack other devices.

A series of vulnerabilities in a real-time operating system (RTOS) could leave up to 200 million devices open to exploit. And those devices include everything from network firewalls to medical devices. The vulnerabilities aren’t theoretical — the exploits have been demonstrated — and many of the affected devices haven’t been touched or actively managed in years.

A team of researchers from Armis found 11 critical zero-day vulnerabilities in VxWorks, a popular RTOS that has been in use since the late 1980s. The vulnerabilities, which include 6 remote code execution (RCE) vulnerabilities, and 5 that are denial of service, information leak, or logical flaw vulnerabilities, are present in versions of the operating system that span more than 13 years.

The RCE vulnerabilities, which would allow an attacker to execute any code they choose on a vulnerable system, have an additional quality that makes them critical. “Normally, when a network vulnerability is exploited, the attack comes from inside the network,” says Ben Seri, vice president of research at Armis. He points out that firewalls and other network edge devices are programmed to recognize and stop network vulnerability exploits that come from outside the network.

“In this case, an attacker can leverage a vulnerability to attack a device that’s behind network address translation (NAT) and behind a firewall,” Seri explains, because, “The vulnerability is in the TCP header itself. It traverses these devices without being stopped by the firewall.”

The issue, he says, is that the contents of a packet can be encrypted to be protected from theft or corruption, but headers travel in clear-text. If an attacker knows network communication is taking place, they can intercept the traffic and make their changes to the header without needing to know the packet’s contents.

As has been the case with a number of other vulnerabilities, the problems are made worse by mis-configuration. “These are pretty basic memory exploit bugs, but users have to enable existing security features,” says Craig Young, computer security researcher for Tripwire’s vulnerability and exposure research team (VERT). “The devices [Armis] were testing weren’t making use of the secure configuration. From my experience, this isn’t rare.”

One of the factors complicating the way companies will address the vulnerabilities is that it can be very difficult to know whether a particular IoT device is running VxWorks. “A very big concern, when I start thinking about this, is how do we identify who’s impacted? How does a business or organization identify, hey, do I have these things in my environment or not have these things in my environment?” asks Deral Heiland, research lead for IoT technology at Rapid 7. Most organizations, he says, don’t know which operating systems are running under the covers of the firewalls, routers, printers, or process controllers in their organization.

“It’s often like a ‘plug and ignore’ thing, Heiland explains. “If it happens to be on a printer or cable modem or some kind of communication device, it’s not core to the business, but a side function of the business operation.” And since they’re not core functionality, many organizations won’t know whether they’re vulnerable or not.

Seri is quick to point out that there is some good news with the bad. While the vulnerabilities exist in every version of VxWorks from v6.5 forward, they are not present either in VxWorks 653 or VxWorks Certified — the versions most often used in the most sensitive and critical devices.

In addition, Young says the the sky is not falling due to these vulnerabilities in VxWorks’ TCP stack routines. “This can’t be trivially exploited by anyone without skill,” he says. “When it’s exploited, it will be on a per-device basis and the attacks will take time.”

Even with the difficulty, though, the pool of potential victims is very large. Dave Weinstein, CSO of Clarity, says, “The potential for scale is pretty high. And while there has been no evidence of infections in the wild, there’s a good chance that hackers have exploited this vulnerability given how long it goes back.” 

Weinstein says that he’s cautious about pronouncements of doom, and general prefers that difficult to patch vulnerabilities be communicated in private, rather than through public disclosure. But, he admits, “Then again, that won’t land you on a big stage at BlackHat.”

Seri and fellow researcher For Zusman will present their findings in Critical Zero Days Remotely Compromise the Most Popular Real-Time OS, on Thursday, August 8, at Black Hat USA.

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/endpoint/series-of-zero-day-vulnerabilities-could-endanger-200-million-devices/d/d-id/1335379?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

NAS targeted by brute force ransomware attacks

Network Attached Storage (NAS) company Synology has issued an urgent warning for owners to check their box’s security settings after it emerged cybercriminals are targeting numerous NAS vendors with a new wave of ransomware.

At first it was thought that recent attacks could be exploiting an unknown software vulnerability in Synology’s products, but according to the company it has since been established that the attackers’ method is a much simpler but still effective brute-forcing of admin credentials.

Synology’s Manager of Security Incident Response Team, Ken Lee, wrote:

We believe this is an organised attack. After an intensive investigation into this matter, we found that the attacker used botnet addresses to hide the real source IP.

Spotted on 19 July 2019, the campaign involves trying lots of commonly used passwords on internet-connected NAS boxes. The attackers hope that eventually they’ll hit on a password that allows them the access necessary to encrypt the data on it.

The first symptom of this will be a ransom note in a readme file – typically asking for thousands of dollars-worth of bitcoins – to decrypt the data.

When you strip away the techniques used to hide the source IP, this isn’t a complex attack. That’s good news because it means that it’s also not difficult to defend against as long as owners check and enable specific security settings (see below).

Unfortunately, that means it’s also not hard to compromise a weakly defended NAS, which has led to a number of users being locked out of large volumes of data.

Warning: this campaign doesn’t only target Synology NAS boxes – the same techniques are being used to target other vendors’ products too.

In other recent incidents affecting another NAS vendor, QNAP, earlier in July, the ransomware involved was eCh0raix (probably the culprit in the latest Synology campaign) which you can read more about on the site of the security company that first noticed it.

What to do

Synology lists a number of basic defences, starting with the need to set a long and complex admin password (brute-force attacks succeed against shorter, simpler ones) before doing the same for everyone else who accesses data on the device.

The simplest way to make sure this has been done on a Synology NAS is to enable the ‘force users to change passwords after the administrator resets the password’ setting in the management console.

A second setting is the ‘apply password strength rules’ after deciding what this should mean (for example, forcing users to include mixed cases, special characters, numerals while excluding names and user descriptions).

Synology also recommends:

  • Creating a new account in the administrator group and disabling the “admin” account.
  • Enabling Auto Block in Control Panel to block IP addresses with too many failed login attempts.
  • Running Security Advisor to make sure there are no weak passwords in the system.
  • Enabling the Firewall in Control Panel while allowing publicly facing ports only when necessary.
  • Finally, enable two-step verification (2SV).
  • Based on Synology’s general advice, cloud multi-versioning should allow defenders to roll back to the same or previous versions of the same files. Or, better still, make regular offline backups.

Critically, on the topic of remote access, ensure it isn’t enabled via RDP when it shouldn’t be – or at all.

Naked Security has documented numerous attacks targeting RDP in recent times and provided advice on securing this protocol across a range of services, including NASs.

Remember, the NAS ransomware attacks discussed here depend on weakly secured remote access to succeed. Close that door and you’ve blocked their way in.

We urge you to read the SophosLabs 2019 Threat Report, in which Sophos researchers analyze the state of play in cybercrime today, including a section on ransomware.

Finally, visit sophos.com to read more about anti-ransomware technologies, including Sophos Intercept X.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/65WSz3fpK98/

Android exploit code emerges, ransomware goes south, Citrix calls off hack probe, and more

Roundup Here’s a quick summary of what’s been happening in the infosec world lately, beyond what we’ve already reported.

Louisiana declares state of emergency over ransomware

A massive ransomware infection spreading among Louisiana school districts has caused the governor to declare a state of emergency – a designation usually reserved for natural disasters or widespread civil unrest.

The declaration was made by Louisiana governor John Bel Edwards after three different districts reported having their data encrypted by ransomware infections.

In addition to declaring the emergency, the governor has called in the state’s Cyber Security Commission to address the problem.

“The state was made aware of a malware attack on a few north Louisiana school systems and we have been coordinating a response ever since,” Edwards said.

“This is exactly why we established the Cyber Security Commission, focused on preparing for, responding to and preventing cybersecurity attacks, and we are well-positioned to assist local governments as they battle this current threat.”

PoC shows how Android gear gets pwned by a video

One of the Android remote code execution flaws patched by Google earlier this month now has a partial proof-of-concept to go with it.

Researcher Marcin Kozlowski says that his PoC shows how a video file can be embedded with code that causes Android to crash.

But it’s only a partial attack; Kozlowski purposely only sets up the crash so that script-kiddies couldn’t just drag and drop the attack and start spreading it.

“You can own the mobile by viewing a video with payload,” he explains, “in my example I didn’t include real payload.”

Rather, anyone who wants to actually weaponize the bug will have to go the extra mile and add their own RCE instructions.

Citrix wraps up hack probe

Enterprise software giant Citrix is putting an end to its investigation of the 2019 network breach that saw hackers steal 6TB worth of corporate data.

The report doesn’t have much in the way of new information. Rather, Citrix confirms the earlier reports that the attackers were on Citrix’s network for five months and were able to collect massive amounts of data as well as access some employee email accounts.

“Importantly, we found no compromise or exfiltration beyond what has been previously disclosed. The cyber criminals have been expelled from our systems. There is no indication that the security of any Citrix product or customer cloud service was impacted,” Citrix said.

“Finally, we determined that the cyber criminals did not discover or exploit any vulnerabilities in our products or services to gain entry.”

iSynq still trying to clean up attack

Last week we mentioned the ransomware attack that caused accounting software cloud company iSynq to temporarily shut down service. In the days since the outbreak, the provider is working to get everything back online, but many customers are still unable to log in.

As of Wednesday, iSynq estimated that 1,000 customers were back online, but the rest might have to wait until the weekend.

“Our work isn’t done, and we’ll work over the coming days until we get ALL of our customers online safely and securely,” iSynq said.

Apple devices invaded by Bluetooth BLE attack

A set of PoC scripts emerged on Thursday showing how Apple devices can be tricked into handing over personal information via Bluetooth Low Energy (BLE) connections.

The scripts show how, among other things, the devices can be prompted to turn over the device’s phone number, ask for Wi-Fi network passwords, or even send a message to the targeted phone.

RobinHood cops to plaintext password buffoonery

Financial services site RobinHood has admitted to a serious lapse in security.

The online investment site told some customers that some of their their passwords had been erroneously stored in plain text, rather than hashed. This meant that employees, and in theory hackers, would have been able to see credentials that should never have been exposed.

While no unauthorized people were able to get to the passwords, RobinHood said it was going to reset all of the exposed credentials out of an abundance of caution. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/29/security_roundup_250719/

4 Network Security Mistakes Bound to Bite You

It’s Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help.

Just like sharks off the Florida coast, encrypted threats are lurking in network traffic. And as the volume of transport layer security (TLS) encrypted traffic rises exponentially, organizations become even more vulnerable to attacks. Ouch!

We all cringe at the reports of shark sightings each summer. If you’re one of the 35 million viewers planning to partake in the cultural feeding frenzy that is Shark Week, I offer you a primer. Here we marry our shark appreciation with some serious discussion around the following four network security mistakes bound to bite you:

1. Letting familiarity fool you into complacency
Most shark attacks occur less than 100 feet from the shore, says National Geographic. But even when sharks are in close proximity to you — for example, just a few feet away from these swimmers at Daytona Beach — they’re really hard to see. The same can be said for the network. It’s a familiar environment, yet more than half of malware is now hiding right beneath your nose in encrypted traffic.

Pro tip: Treat encrypted traffic as an attack vector. Make sure you can quickly expose encrypted attacks, hidden command and control channels, malware, and unauthorized data exfiltration exploits. 

2. Misjudging the effectiveness of your gear
It’s important to wear a hat and lather on sunscreen at the beach, but while you’re focused on blocking the sun, let’s not forget you could still be acting as a shark magnet, according to one researcher, depending on your tattoos, nail polish, and jewelry. Allowing for pockets of risk is much like the way operations teams want visibility into encrypted traffic, but encryption also blinds security and application monitoring tools. In order to gain visibility, decryption via Secure Sockets Layer (SSL) is needed, but it is extremely computationally intensive and can introduce network latency.

Pro tip: Before deploying any SSL decryption solution, be aware of the total volume of network traffic and how much of it is encrypted with SSL/TLS. Know how and where traffic is traversing the network. For an SSL/TLS solution to work effectively, it needs to see both directions of traffic. Asymmetric traffic can cause incomplete decryption if all traffic is not combined and fed to the solution.

3. Ignoring cloud considerations
From dusk until dawn and when dipping into murky waters, cloudy conditions carry an increased risk of shark encounters. Security leaders are navigating similar visibility challenges that come as a result of enterprises deploying more and more software to private and public clouds and making wider use of software-as-a-service applications.

Pro tip: Remember to establish a clear line of sight and to secure all data in motion, not just across the enterprise, but also cloud environments. Don’t get caught like a shark out of water, which can happen when you can’t see where and how network data is increasing and you end up caught in a period of catch-up that can hurt business transformation projects such as cloud adoption. Effective network visibility helps scale the network — and the business.

4. Not knowing the response plan if there’s an attack
Shark Week programming will likely strike fear, but will you walk away knowing what to do if faced with an attack? (See here for advice.) When it comes to cyber sharks, only 58% of organizations feel highly confident that they could detect an important security issue before it has a significant impact.

Pro tip: Honestly appraise your threat detection and incident response tools and processes, and evaluate any architectural improvements you might need to make to stay a step ahead. Intentionally engineer your security strategy to overcome data and tool-set silos to get information to the right place at the right time, and base your architecture on a deliberate attempt to identify, respond to, and counter threats.

No security posture — or open-water swim — is absolutely safe. But taking appropriate safety measures like the ones outlined above can go a long way toward a reliable and maintainable security infrastructure. Bottom line: When it comes to swimming with sharks, visibility matters.

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Shane Buckley is President and Chief Operating Officer of Gigamon with responsibility for expanding the company’s business and markets worldwide. He brings more than 20 years of executive management experience to the team and joins Gigamon from Xirrus where he was CEO prior … View Full Bio

Article source: https://www.darkreading.com/cloud/4-network-security-mistakes-bound-to-bite-you/a/d-id/1335357?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Russia targeted all 50 states in 2016 election, Senate report says

Russians targeted election systems in all 50 states during the 2016 US presidential election, and it’s unclear what their purpose was, according to a report released by the US Senate Select Committee on Intelligence (SSCI) on Thursday.

What were the Russians intending? Your guess is as good as the SSCI’s. From the 67-page, highly redacted report:

Russian intentions regarding U.S. election infrastructure remain unclear. Russia might have intended to exploit vulnerabilities in election infrastructure during the 2016 elections and, for unknown reasons, decided not to execute those options. Alternatively, Russia might have sought to gather information in the conduct of traditional espionage activities. Lastly, Russia might have used its activity in 2016 to catalog options or clandestine actions, holding them for use at a later date.

From what’s known about Russia’s operating procedures and intentions more broadly, the country’s cyber activity is intended, overall, to undermine election integrity and American confidence in democracy, the SSCI said.

This report, entitled Volume 1: Russian Efforts Against Election Infrastructure, is the first installment in a series of reports expected to come out of the SSCI’s two-year, ongoing investigation into Russia’s 2016 tampering. There are four more installments due, coming from other areas on which its probe focused.

According to the report, the SSCI found that from at least as early as 2014 and continuing until at least 2017, Moscow directed “extensive” activity at US election infrastructure at the state and local level.

In October 2018, the Department of Homeland Security (DHS) reported that “numerous actors” were targeting election systems, “likely for different purposes,” such as to disrupt elections, steal sensitive data, and undermine confidence in the election. The DHS said it saw an upswing in the malicious activity in 2018, though it can’t really compare the activity with previous years, since it doesn’t have a complete comparative baseline. It gets its intelligence from state and local election officials, who proactively share it, as well as from intelligence and information sharing within the election community.

A tool kit of tactics

Russia’s tactics have included both the analog – the State Department was aware of agents being sent to polling sites to observe elections in 2016 – and the digital. According to the SSCI’s report, Moscow tried common cyber assaults: since at least April 2018 up until at least early October 2018, unidentified actors have tried spear-phishing, exploiting databases, and denial of service (DoS) attacks against election systems.

They’ve also successfully phished at least one state employee’s login credentials after installing keystroke-logging malware, according to a private-sector DHS partner claiming secondhand access. Fortunately, the actor was stopped by a lack of more credentials needed to get at the voter registration database.

That sounds a lot like what happened to the Democratic National Committee (DNC), where phishers managed to get credentials; break into the email account of John Podesta, chairman of Hillary Clinton’s presidential campaign; steal a bevvy of emails; and post them on WikiLeaks.

Another of many attacks described in the SSCI report came on 24 August 2018, when cybersecurity officials detected multiple attempts to get at Vermont’s Online Voter Registration Application (OLVR) registration database. The attackers tried one Cross Site Scripting (XSS) attack, seven Structured Query Language (SQL) injection attempts, and one attempted Denial of Service (DoS) attack. None of the attacks worked.

The attackers had more luck getting, and maintaining, access to some elements of multiple state or local electoral boards, though. They got access to two states’ election systems, managing to steal voter data. In Illinois, that meant the theft of up to 200,000 voters’ registrations. The records they exfiltrated included voters’ names, addresses, partial social security numbers, dates of birth, and either a driver’s license number or state identification number.

The attack was carried out via SQL injection on Illinois’s online voter registration website. The silver lining: “None of these systems were involved in vote tallying.” The tarnished lining: all that data can be used for identity theft.

The report redacts the second state’s identity, referring to it in non-redacted sections only as “State 2.” Whoever State 2 is, it staunchly believes that there was “never an attack on our systems.” In December 2018, the state’s secretary of state and election director told the SSCI, “we did not see any unusual activities. I would have known about it personally.”

An earlier SSCI assessment from January 2017 highlighted Russia’s gearing up to have people contest the election results if Secretary Hillary Clinton managed to pull off a win in the presidential election. According to that declassified report, Russian diplomats were prepared to throw voter fraud allegations into the ring, to “publicly call into question the validity of the results”. The SSCI also found that pro-Kremlin bloggers had prepared a Twitter campaign, dubbed it #DemocracyRIP, and geared up to unleash it on election night if Clinton won.

Besides Twitter activity, the SSCI says that during a 2017 election, one unidentified state saw “hot activity” on social media – particularly on Reddit – including allegations of voter fraud. That state had to try to prove later that there was no fraud.

While the DHS and FBI warned states about these cyberattacks in the summer and fall of 2016, the report said that the warnings “did not provide enough information or go to the right people.” It sounds like alarm fatigue also came into play. From the report:

Alerts were actionable, in that they provided malicious Internet Protocol (IP) addresses to information technology (IT) professionals, but they provided no clear reason for states to take this threat more seriously than any other alert received.

The SSCI says that the feds don’t want to step on any toes. States should be “firmly in the lead” when it comes to running elections. The fact that the country has a decentralized election system “can be a strength from a cybersecurity perspective,” the report says, but each operator should be “keenly aware of the limitations of their cybersecurity capabilities and know how to quickly and properly obtain assistance.”

Senator Ron Wyden, always quick to weigh in on technology issues, begged to differ. In dissenting minority views that accompany the committee’s report, he said, “I cannot support a report whose top recommendation is to ‘reinforce state’s primacy in running elections.’”

From Wyden’s comments:

We would not ask a local sheriff to go to war against the missiles, planes and tanks of the Russian Army. We shouldn’t ask a county election IT employee to fight a war against the full capabilities and vast resources of Russia’s cyber army. That approach failed in 2016 and it will fail again.

The SSCI also recommended evaluating the grant money – $380 million – that Congress gave to states in 2018 to bolster security. Senate Majority Leader Mitch McConnell has repeatedly blocked additional election security bills, including two measures he shot down on Thursday, dismissing them as “partisan legislation.”

While politicians waste time on partisan squabbling, Russia’s still at it, according to former special counsel Robert Mueller. On Wednesday, in testimony about his own report to the House Judiciary Committee, he called the Russian government’s effort to interfere in our elections among the “most serious” challenges to the country’s democracy he’s seen. From his testimony:

It wasn’t a single attempt. They’re doing it as we sit here.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/UJz1p2vRAoU/

Three quarters of gamers suffer hate and harassment online

Almost three in four online gamers find themselves feeling less social thanks to high levels of harassment in online games, according to a survey out from the Anti-Defamation League (ADL). Trolling, stalking, sexual harassment and humiliation have become so bad that one in ten respondents had depressive or suicidal thoughts. The biggest target? Female gamers.

The survey of 1,045 American adults, conducted for the ADL by games and esports analyst Newzoo, included responses from 751 people who play multiplayer online games. It found that 74% of gamers had experienced harassment while playing games online. Almost two thirds (65%) had experienced severe forms of harassment, including physical threats, stalking, and sustained harassment, and 29% of people had been doxed, having their personal information exposed online.

The harassment has direct physical consequences. Of the respondents, 8% said that they had taken steps to protect their physical safety, while 7% had their school or college performance negatively affected. 5% – that’s one in 20 people – had contacted the police because harassment had become so bad.

What are all these online trolls and stalkers getting so upset about? Gender and sexual orientation, mostly. These factors featured in 38% and 35% of cases respectively, while race and religion were also popular topics for online bigots.

The most common form of harassment that people reported was offensive name calling, followed by trolling. Discriminating against people and humiliating them were close in joint third place. Physical threats and sexual harassment were less common while stalking was the least prevalent, but even that was worryingly high; more than one in three respondents claimed to have been stalked online.

People who get harassed in games react in various ways. Most of them simply manage who they play with, but some change how they play by doing things like not using their game mics. Nearly one in five (19%) reported leaving games to escape harassment.

It’s worth pointing out that there were also positive experiences in gaming. Of the survey base, 88% said that they had experienced positive social interactions, including making friends (51%). Almost one in three (30%) felt like they belonged to a community in online games, which is encouraging, and 32% discovered new interests. Another positive: 13% found a partner through an online game.

Unfortunately, positive and negative experiences aren’t mutually exclusive. A significant number of people (43%) who had a positive experience quit or started avoiding at least one game because of harassment.

ADL recommended that games developers and publishers introduce more tools to moderate content across different channels, including voice chat. Companies could also introduce ratings that account for the level of harassment in specific games, it said.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/0Qk2-9zWF-E/

NAS vendors hit by brute force ransomware attacks

Network Attached Storage (NAS) company Synology has issued an urgent warning for owners to check their box’s security settings after it emerged cybercriminals are targeting numerous NAS vendors with a new wave of ransomware.

At first it was thought that recent attacks could be exploiting an unknown software vulnerability in Synology’s products, but according to the company it has since been established that the attackers’ method is a much simpler but still effective brute-forcing of admin credentials.

Synology’s Manager of Security Incident Response Team, Ken Lee, wrote:

We believe this is an organised attack. After an intensive investigation into this matter, we found that the attacker used botnet addresses to hide the real source IP.

Spotted on 19 July 2019, the campaign involves trying lots of commonly used passwords on internet-connected NAS boxes. The attackers hope that eventually they’ll hit on a password that allows them the access necessary to encrypt the data on it.

The first symptom of this will be a ransom note in a readme file – typically asking for thousands of dollars-worth of bitcoins – to decrypt the data.

When you strip away the techniques used to hide the source IP, this isn’t a complex attack. That’s good news because it means that it’s also not difficult to defend against as long as owners check and enable specific security settings (see below).

Unfortunately, that means it’s also not hard to compromise a weakly defended NAS, which has led to a number of users being locked out of large volumes of data.

Warning: this campaign doesn’t only target Synology NAS boxes – the same techniques are being used to target other vendors’ products too.

In other recent incidents affecting another NAS vendor, QNAP, earlier in July, the ransomware involved was eCh0raix (probably the culprit in the latest Synology campaign) which you can read more about on the site of the security company that first noticed it.

What to do

Synology lists a number of basic defences, starting with the need to set a long and complex admin password (brute-force attacks succeed against shorter, simpler ones) before doing the same for everyone else who accesses data on the device.

The simplest way to make sure this has been done on a Synology NAS is to enable the ‘force users to change passwords after the administrator resets the password’ setting in the management console.

A second setting is the ‘apply password strength rules’ after deciding what this should mean (for example, forcing users to include mixed cases, special characters, numerals while excluding names and user descriptions).

Synology also recommends:

  • Creating a new account in the administrator group and disabling the “admin” account.
  • Enabling Auto Block in Control Panel to block IP addresses with too many failed login attempts.
  • Running Security Advisor to make sure there are no weak passwords in the system.
  • Enabling the Firewall in Control Panel while allowing publicly facing ports only when necessary.
  • Finally, enable two-step verification (2SV).
  • Based on Synology’s general advice, cloud multi-versioning should allow defenders to roll back to the same or previous versions of the same files. Or, better still, make regular offline backups.

Critically, on the topic of remote access, ensure it isn’t enabled via RDP when it shouldn’t be – or at all.

Naked Security has documented numerous attacks targeting RDP in recent times and provided advice on securing this protocol across a range of services, including NASs.

Remember, the NAS ransomware attacks discussed here depend on weakly secured remote access to succeed. Close that door and you’ve blocked their way in.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/65WSz3fpK98/

He’s coming home, he’s coming… Hutchins’ coming home: British Wannacry killer held in US on malware dev rap set free by judge

Marcus Hutchins is on his way home to England after a judge spared him a stretch behind bars in America for developing the Kronos banking trojan.

Hutchins, the British malware reverse-engineer who shot to fame in May 2017 for thwarting a global Wannacry epidemic by discovering and activating its kill switch, was facing up to 10 years in the clink – after admitting he crafted the online-bank-account-raiding software nasty Kronos years ago as a teenager.

Today, however, Judge Joseph Stadtmueller, in a Wisconsin federal district court, sentenced Hutchins, 25, to one year of supervised release, and time served, plus ordered him to cough up $100 for each count as restitution to victims of his code. This effectively spared the Brit prison in the US, a country he has been forced to live in while awaiting trial since his dramatic arrest by the FBI in Las Vegas in August 2017.

“We see all sides of the human existence, both young, old, career criminals, those who strayed,” Judge Stadtmueller said, investigative journalist Marcy Wheeler reported from the courtroom. “I appreciate the fact that one might view ignoble conduct against backdrop as work a hero, a true hero. That is, at the end of the day, what gives this case its uniqueness.”

Wheeler noted separately that, according to Uncle Sam’s prosecutors, virtually all the victims of Hutchins’ malware were outside America, making this whole US trial thing pretty odd.

Turned a corner

The judge acknowledged that Hutchins had already turned from the dark side of malware development during his teenage years to become a respected professional white-hat infosec researcher, well before the Feds collared him. Hutchins, the judge said, was now using his intimate knowledge of malware and related skills to study and kill off software nasties, rather than creating more of them. Such skills are sorely needed, the judge noted, to help society tackle its woeful state cyber-security, before passing sentence.

“It’s certainly to your credit that without any encouragement … you stepped up to plate without expectation of notoriety,” Judge Stadtmueller added. “It is important to keep in mind the relative age of a young person who may not have matured to the point of being able, at end of day, to exercise good judgment.”

It is understood Hutchins is keen to return to the UK as soon as possible after spending the past two years in the US without his passport awaiting his fate. Judge Stadtmueller said nothing in today’s judgment forces him to remain in the States, and he is thus free to leave and carry out his year of probation abroad. The judge warned Hutchins that his criminal conviction may well preclude the Brit from ever visiting the US again once he leaves. Stadtmueller even suggested Hutchins consider seeking a pardon or some kind of waiver in order to return – a comment Hutchins’ legal team called “unprecedented.”

arrest

WannaCry kill-switch hero Marcus Hutchins collared by FBI on way home from DEF CON

READ MORE

Hutchins became a computer security celebrity when he discovered Wannacry was checking for the existence of a particular domain name, and by registering it, he activated a kill switch in the ransomware worm that stopped it from spreading further. The malicious code had trashed computers in more than 70 countries, and had crippled large chunks of the UK’s National Health Service. By triggering the kill switch, he halted what could have been a terrible global epidemic.

Later that year, he was invited to the DEF CON conference in Las Vegas, USA, and spent the week hobnobbing with fellow hackers and doing the usual tourist stuff. When he was about to board a flight home, the FBI swooped and arrested him.

Unbeknownst to Hutchins, the g-men had been investigating him, and suspected he had played a role in the creation of two pieces of malware: the Kronos bank-account-draining trojan, and the UPAS Kit malware. The agents had obtained chat logs showing Hutchins had developed part of the code as a teenager, and had sold copies of it to crooks for a few thousand quid.

While Hutchins initially denied the accusations, he later pleaded guilty. That admission, the fact he built the code when he was teenager, and his subsequent work fighting malware and educating others on how to thwart software nasties, before he was even aware the Feds had him in their sights, counted heavily toward today’s verdict.

“Incredibly thankful for the understanding and leniency of the judge, the wonderful character letter you all sent, and everyone who helped me through the past two years, both financially and emotionally,” Hutchins, aka MalwareTechBlog, tweeted after the verdict.

“Hopefully I can work on finding some way to come back to the US. But until then, back to work!”

Meanwhile, his lawyers tweeted:

Hutchins’ tearful mother was in court to see her son freed. He will now return to Los Angeles, where he has been staying, to pick up his stuff, before heading back to Blighty. Right now, though, he’s, very understandably, celebrating with pals…

Today’s verdict is a rare sign of sense from an American legal system that all too often seems more focused on hard punishment rather than perspicacity. There is little sense in locking away a talented researcher, who has much to offer the world, over youthful indiscretions. ®

PS: The judge was keen to allow Hutchins to smoothly return to the UK, via LA to pick up his belongings, without him being intercepted by America’s feisty border cops, ICE, who have no tolerance for criminal immigrants. “Nothing in the judgment requires he stay in US. I’m seeking to avoid him being taken into custody by ICE. We don’t need any more publicity or another statistic,” he said.

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/26/hutchins_sentencing/

Brit infosec firms urge PM Boris to reform the Computer Misuse Act

A group of British infosec companies has written to UK prime minister Boris Johnson asking him to reform the Computer Misuse Act 1990, saying the act “has failed to keep pace with technological and market developments, inadvertently prohibiting a large component of contemporary threat intelligence research.”

The companies, comprising NCC Group, Orpheus Cyber, Context Information Security and Nettitude, urged the winner of the Conservative Party’s recent internal leadership contest to bring about “legislative reform to bring cyber crime legislation in step with other regimes”.

Key among the companies’ demands for reform is the introduction of “statutory defences that apply to accredited professionals who act ethically, in the public interest, to detect and prevent criminal activity.”

The letter came after The Register revealed in May this year that while 90 per cent of hacking prosecutions last year were successful, the odds of a prison sentence were very low.

The letter said, in part:

Legislation currently forces cyber security specialists to act with one hand tied behind their backs. Reforming the Computer Misuse Act would enable us to learn more about an attacker’s tactics and identify additional victims, addressing current barriers that often halt our defence investigations so as not to break the law. More modern legislation exists in other jurisdictions – countries which we actively compete with in the global cyber security market. Failure to modernise our laws risks the increasing demand for cyber security services being met outside the UK.

Its signatories, all C-suite execs from the named firms, added: “We believe removing current legislative restraints, and offering certainty to the industry, would significantly unlock the growth of the UK cyber threat intelligence sector, while allowing industry to better support law enforcement and intelligence agencies.”

queen and phil

How a hack on Prince Philip’s Prestel account led to UK computer law

READ MORE

Researchers have long complained that the Computer Misuse Act (CMA) inhibits research because of broad wording that does not make it completely clear what is and what is not illegal in the fast-moving world of infosec. While no statute could be exhaustively prescriptive about what can and cannot be done, the companies say that the time is ripe to give protection to bona fide researchers.

Ollie Whitehouse, global chief technical officer at NCC Group, said in a statement to The Register: “We’re proud to be the driving force behind the necessary reform to the Computer Misuse Act (CMA) – an essential but outdated legislation, which currently restricts many industry specialists like ourselves from carrying out crucial threat intelligence work. Cyber security is a global issue, so it’s vital that the UK is able to compete on a level playing field with our international colleagues.”

The act was last amended five years ago, causing some severe worries among human rights-watchers about harsher sentences being passed.

In its original form, the CMA was passed into law following the escapades of a couple of journalists in the late 1980s who managed to severely embarrass BT and access Prince Phillip’s Prestel email account. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/29/computer_misuse_act_1990_reform_letter/

Dear hackers: If you try to pwn a website for phishing, make sure it’s not the personal domain of a senior Akamai security researcher

Think you have bad luck? Imagine being the script kiddie who inadvertently tried and failed to pwn an Akamai security pro.

Larry Cashdollar, a senior security response engineer at the US-based global web giant, told us late last week he just recently noticed something peculiar in the logs on his personal website. Further investigation turned up signs of someone scanning for remote file inclusion (RFI) vulnerabilities.

Anyone in charge of public-facing servers will know these boxes come under continuous scanning and probing by miscreants, bots, and security researchers all the time. However, in this particular case, Cashdollar has today helpfully documented his findings as a heads up, or warning, to website admins and webapp developers. If anything, you should ensure your software is not vulnerable to RFI, otherwise you may well fall to the same fools who tried to pwn the infosec engineer’s website.

He told The Register his site’s logs showed the would-be attacker probing for RFI holes that would allow them to trick web applications into fetching and running a remote malicious script. In this case, the scumbag was trying, unsuccessfully, to load a file via a custom tool Cashdollar had created for his site.

“Based on my log entries they appear to be parsing web sites looking for form variables and automatically testing if those variables allow remote file inclusion,” Cashdollar told El Reg.

“It’s a generic test against any website where they can parse out the form input variable and then supply a URL to that variable to see if the content is included and executed.”

Unfortunately for the attacker, Cashdollar also used the logs to follow the GET requests to the payload the attacker was trying to load: a script that attempted to harvest information about his server. By dissecting that and other files the hacker had ready to execute commands and take over vulnerable websites, Cashdollar was also able to extract the criminal’s email address and their preferred language – Portuguese.

While RFI exploits are usually performed to hijack a web server, in this case Cashdollar believes the attackers were trying something different: using file-injecting holes as a way to transform the site into a base for phishing. The miscreant’s arsenal of scripts included commands that would create HTML files on the victim’s server that mimicked the site of a popular European bank.

In other words, the attacker was probing for an RFI vulnerability that would allow them to quietly install phishing pages on the host server that masqueraded as a legit bank’s login webpage, and then direct victims to those pages to harvest their bank account credentials as they tried to log into the fake.

iran_flags_648

Your server remote login isn’t root:password, right? Cool. You can keep your data. Oh sh… your IoT gear, though?

READ MORE

“It’s interesting to consider that of all the things the attacker could do with a system after discovering an RFI vulnerability, they chose to upload phishing landing pages rather than install a crypto currency miner or other means to monetize their access to the system,” Cashdollar explained.

“This is further proof that phishing is a profitable and highly-successful method of compromising credentials and victim information.”

The Akamai security engineer told El Reg that, for admins, the big takeaway from his experience is the importance of watching logs, patching site management tools, and writing web code that cannot be exploited for RFI.

“Make sure their application patches are up to date,” Cashdollar advised. “Keep track of any new vulnerabilities discovered in software they’re using for content management and site delivery and patch when new vulnerabilities are disclosed by the vendor.” ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/29/hackers_akamai_researcher/