STE WILLIAMS

Cryptocurrencies now being pooped out by cartoon cat

The Benefits and Significance of Private Platform as a Service

Nyan Cat, the most annoying internet meme since the Hampster Dance , has spawned its very own Bitcoin clone.

Nyan Cat appeared in 2011 in this video depicting a cat shaped like a pop tart streaming an endless rainbow from its rear parts as it flies through space.


The background music is a Japanese pop song, which may explain its popularity: 100 million YouTube views and counting.

The Nyan Cat brand is potent enough that it’s now been adopted to add credence to a new crypto-currency, namely Nyancoin.

A site, nyanco.in, registered by one Charles Feng of Stanford, California, proclaims “Nyancoin is a fun peer-to-peer Internet currency that enables instant payments to anyone in the world. We have partnered with PRguitarman (Nyancat creator) to create the very first cryptocurrency to be officially licenced in history!”

The rest of the site will look familiar to Bitcoin miners and others familiar with crypto-currency, as it outlines mining tools, wallets, details the algorithm used to mine and offers other crytpocurrency accoutrements.

On the Nyancoin forums there’s even a “Nyancoin accepted here” logo, but no indication just how the currency’s backers plan to get it taken seriously.

Nyancoin accepted here

Crytpocurrencies are proliferating at present, probably thanks to BitCoin’s burgeoning value and the possibilities presented by an anonymous fungibility. If Nyancoin helps one such effort to succeed, those who feel a currency based on a cat video could yet end up with rainbow-coloured poop on their faces. ®

5 DNS security risks that keep you up at night

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/23/nyancoin_crytpocurrency/

Chrome lets websites secretly record you?! Google says no, but…

The Benefits and Significance of Private Platform as a Service

A design flaw in the Chrome browser can allow malicious websites to use your computer’s microphone to eavesdrop on you, one developer has claimed, although Google denies that this is the case.

“Even while not using your computer – conversations, meetings and phone calls next to your computer may be recorded and compromised,” Israeli developer Tal Ater wrote in a blog post on Wednesday.


According to Ater, the vulnerability arises when sites aren’t completely forthright about when they are using the microphone.

Ordinarily, users must explicitly give permission to each site that requests to use the mic, and Chrome displays a blinking red dot in the page’s tab as long as the site is recording. But Ater says that’s not enough to prevent malicious sites from hiding what they’re doing.

“When you click the button to start or stop the speech recognition on the site, what you won’t notice is that the site may have also opened another hidden pop-under window,” Ater wrote. “This window can wait until the main site is closed, and then start listening in without asking for permission. This can be done in a window that you never saw, never interacted with, and probably didn’t even know was there.”

For secure HTTPS sites, Chrome will even remember that you gave a site permission to use the microphone and will maintain that permission between browser sessions without asking you again.

Ater says he alerted Google to the dangers of this behavior last September. But although the web kingpin’s engineers acted immediately, a patch was created to address Ater’s concerns, and Ater’s bug disclosure was even nominated for a bug bounty, the patch has yet to be merged into the mainstream Chrome code base.

According to Ater, the Chocolate Factory’s engineers are still in discussions with its internal web standards group to determine the best course of action – which is why he ultimately chose to publish exploit code on Github.

No bug here, says Google

But when El Reg asked Google to comment on Ater’s claims, we heard a different side of the story. “The security of our users is a top priority, and this feature was designed with security and privacy in mind,” a spokesperson told us.

For one thing, per Google’s documentation, the blinking red light in the browser tab isn’t the only way Chrome lets you know when it’s using cameras or microphones. You can also check which browser window or tab is recording by clicking a persistent icon in the Windows system tray or the OS X status menu – an icon you can actually see in action in this video demo of Ater’s exploit (look for the camera icon in the upper left):

Chrome Bug Lets Sites Listen to Your Conversations

For another, Google argues that the recording feature works how it was meant to work. Chrome first gained voice input support with the release of Chrome 25 last February. But what made it possible is the Web Speech API, a recent spec from the W3C, the web’s primary standards body.

“The feature is in compliance with the current W3C specification, and we continue to work on improvements,” a Google spokesperson told The Reg.

Ater, on the other hand, maintains that the Web Speech API requires browsers to abort speech input sessions whenever the user changes windows or tabs, to prevent the kind of abuse he describes. But the language that mandates that behavior was removed from the spec in a later errata, so that no longer appears to be the case.

And yet something seems to be fishy, because when we tried out some Web Speech API demos here at Vulture Annex in San Francisco – including Ater’s exploit code and even Google’s own demo – no persistent icon appeared in the system trays of our Windows machines or the status menu of our OS X computers while Chrome was listening, contrary to Google’s online documentation.

It’s possible that this feature was removed from recent builds of Chrome in the four months since Ater first demonstrated his exploit. If so, that would seem to make Ater’s claims all the more valid, since it makes it even harder to spot when the microphone is active. Google so far has only offered a canned statement, and has yet to respond to our request for clarification on this apparent change.

Still, while it’s debatable whether Chrome does enough to alert users when it’s accessing their cameras or microphones, El Reg knows of at least one surefire way for Chrome users to be sure they’re not being listened in on. From the main menu, choose Settings, click “Show advanced settings…”, click Content Settings, then scroll down and select “Do not allow sites to access my camera and microphone.” Problem solved. ®

5 DNS security risks that keep you up at night

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/23/chrome_speech_spying_vulnerability/

When ZOMBIES go shopping: 40m Target customer breach? That’s NOTHING!

The Benefits and Significance of Private Platform as a Service

Malware linked to fraud in the retail sector may be a bigger problem than even the recent revelation about the compromise of systems US retailer Target suggests.

Shopping giant Target and luxury retailer Neiman Marcus both announced significant data breaches during the 2013 holiday shopping season.


The Target breach at least has been narrowed down to a specific malware tool (a modified version of BlackPOS) that affected its point-of-sale systems and, according to some security experts, enterprise payment processing servers.

Target has admitted 40 million credit and debit card accounts may have been compromised over a two-week period, beginning 27 November, as a result of the breach. The numbers of cards exposed by the Neiman Marcus breach is, as yet, unconfirmed but is thought to involve a lower number of higher value cards.

Security firm Seculert reckons attackers were able to extract over 11GB of data out of the Target network through an FTP server, before using a virtual private server (VPS) located in Russia to download this stolen data.

Reuters reports that at least three other unnamed retailers may have been hit using similar techniques to those used in the Target attack.

Chip and PIN wouldn’t have been enough to stop fraud in the Target case, according to a blog post by security vendor Easy Solutions.

All this is bad enough by itself, but the picture looks even worse once you consider research that suggests botnet and malware activity is endemic in the retail sector.

Analysis of 139 US retailers from November 2013 until 12 January 2014 by net security firm BitSight found 1,035 instances of unique malware infections actively communicating with attackers from inside corporate networks: 7.5 on average per company.

The Trojan Neurevt was by far the most prevalent attack observed in the retail sector during this time period. Neurevt, which exploits Windows systems, steals sensitive data (such as login details) from a compromised machine by modifying the device’s settings and preventing security processes from running. Infection with Neurevt grants hackers unfettered access to compromised machines.

Kaptoxa, which is a modified version of a known hacking tool called BlackPOS, has been linked to the fraud at Target. It is but one example of malicious code coming from an expanding production line. Other hacker tools and Trojans suited to attacks involving the compromise of point-of-sale and back-office systems at retailers include Dexter and Alina. Further examples include Dacebal, a new kind of point-of-sale malware that originates from Romania, which is unusual – not least because it is written in VBScript.

Security intelligence firm interCrawler said that Dacebal brings previously unseen features to the retail attack-orientated malware, including compact command-and-control programming routines. ®

5 DNS security risks that keep you up at night

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/23/retail_malware_epidemic/

SSCC 131 – Mac malware, Starbucks security, Apple versus FTC and giant Korean breach [PODCAST]

DNS poisoning slams web traffic from millions in China into the wrong hole

The Benefits and Significance of Private Platform as a Service

A widespread DNS outage hit China on Tuesday‪, leaving millions of surfers adrift.‬

DNS issues in China between 7am and 9am GMT left millions of domains inaccessible. Two-thirds of China’s DNS (Domain Name System) infrastructure was blighted by the incident, which stemmed from a cache poisoning attack.


Chinese netizens were left unable to visit websites or use social media and instant messaging services as a result of the screw-up, the Hong Kong-based South China Morning Post reports.

The snafu, which affected China’s root servers, meant all queries resolve to the IP address 65.49.2.178. A fix was implemented around two hours after the snag first surfaced.

All China’s generic top-level domain names were affected. Services provided by local internet giants such as search engine Baidu and social-media portal Sina.com were rendered unavailable to locals unless they accessed them through virtual private network (VPN) technology.

DNS servers provide a lookup function that converts domain names, such “www.baidu.com,” into a numerical IP address understood by routers and servers.

The cause of the problem, which might take up to 12 hours to be fully resolved, was not immediately clear, with an attack by hackers being at least one of the possible reasons.

DNSPod, a DNS provider that describes itself as the largest in the country, handling three million domains, put out an update on Twitter blaming an attack without going into details.

More coverage of the incident can be found in a story by the Wall Street Journal here. ®

5 DNS security risks that keep you up at night

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/21/china_dns_poisoning_attack/

Anonymous: Sign this petition or we’ll … get mad about the media?

The Benefits and Significance of Private Platform as a Service

Entities using the name and iconography often associated with hacktivist collective Anonymous and declaring themselves the Brisbane outpost of the non-organisation have taken a step in a new direction: winning support for convicted drug trafficker Schapelle Corby.

Corby was convicted of importing marijuana to Indonesia, but her case has long been contentious as she denies the charge and insists she did not place four kilograms of the drug in the pocket of a surfboard bag wherein it was found. While concerns have been raised about the conduct of Corby’s trial, evidence offering an explanation for the presence of the drug in Corby’s luggage has never emerged.


The case has since become something of a soap opera: Corby is never far from the pages of Australia’s gossip mags, which have delighted in probing her life and that of her family.

That Corby was arrested and currently resides in Bali, a tourism destination favoured by young Australians who often feel altered states are as much a part of a visit to the island as sun and surf, has fuelled interest in the case.

Just why entities using Anonymous’ name and iconography have an interest in Corby’s case is anyone’s guess.

In this typically pompous video and transcript, Anons allege a conspiracy to prevent the release of evidence that would prove Corby’s innocence and challenge the mainstream media to debate the topic.

There’s also a call to sign a petition, but no threat of Anonymous’ regular disruptive tactics.

Anonymous Australia’s Twitter account is silent on the matter. Vulture South is therefore happy to suggest that Anonymous Brisbane is fine example of the terminology we use to describe Anonymous: an entity using the name and iconography often associated with the hacktivist collective, rather than a group concerned with Anonymous’ core aims. ®

5 DNS security risks that keep you up at night

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/22/anonymous_brisbane_schapelle_corby_campaign/

Celebrity email cracker ‘Guccifer’ cuffed in Romania: reports

The Benefits and Significance of Private Platform as a Service

“Guccifer”, the hacker who made celebrity e-mail account hijacks his specialty and first gained notoriety for raiding the inboxes of George H W Bush’s family, has reportedly been arrested in Romania.

Named as Marcel Lazăr Lehel, Romania Insider reports that he was arrested in Arad after a raid on his home by officers of the Directorate for Investigating Organized Crime and Terrorism (DIOCT).


The DIOCT media release refers to the arrested man only as “LML”, and says he is a 42-year-old man with prior convictions for hacking offences under the pseudonyms Guccifer and Little Smoke in 2011 and 2012. He received a three-year suspended sentence in 2012 for hacking the e-mail accounts of Romanian public figures.

Smoking Gun notes that in 2013, he also obtained and released correspondence between Romanian diplomat Corina Cretu and former US Secretary of State Colin Powell suggesting a romantic involvement between them (which they denied).

The Romanian authorities say they worked with American services to track down Lazăr Lehel. This is hardly surprising, since as well as the former president and secretary of state, his US victims included Steve Martin, John Dean (former Nixon adviser), Mariel Hemingway, an ex-CIA analyst, other A-listers, while over in the UK, he accessed the mailboxes of various members of the House of Lords. ®

5 DNS security risks that keep you up at night

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/22/guccifer_arrested_in_romania_reports/

DHS Warns Contractors About Breach Of Its Web Portal

The U.S. Department of Homeland Security has sent warning letters to roughly 114 organizations whose data was exposed when hundreds of documents were accessed without authorization.

The move came after the department’s Science and Technology Directorate was notified of the breach by a company that manages its external Small Business Innovation Research (SBIR)/Long Range Broad Agency (LRBAA) Web portal. Some 520 documents – including whitepapers, decision notification letters and documents regarding contract awards – were accessed in the incident.

Sixteen of the organizations had bank information in the documents. All of the affected organizations were notified by the Science and Technology Directorate (ST). According to a copy of the letter posted by security blogger Brian Krebs, the breach is believed to have occurred in the past four months.

“Notably, the letter does not assert that any security protocols, such as password protection or encryption, were circumvented to access the information,” says Aaron Titus, chief privacy officer and general counsel at Identity Finder. “It’s not even clear that the access was malicious.”

“In my experience, breaches like this are often the result of a failure of basic sensitive data management practices,” he says. “It’s entirely possible that this information was accidentally left on a public server for four months without password or encryption protection.”

None of the documents were classified, according to DHS. The agency did not offer any information about how exactly the data was accessed, stating only that the documents were downloaded from the portal by people outside of DHS. The incident remains under investigation.

“Since discovery of this incident, Science and Technology Directorate (ST) has worked with the operator of this external web portal to identify and resolve the security vulnerability, and all appropriate measures have been taken,” a DHS ST spokesperson tells Dark Reading. “All of the affected documents have been thoroughly reviewed to determine if there was a loss of sensitive personally identifiable information, proprietary or business-sensitive information, security information, export control sensitive information, and all potentially affected parties were notified before any nefarious activity could take place.”

“ST takes its responsibility to safeguard personal information seriously and is working with appropriate law enforcement partners on the ongoing investigation to determine the cause of the incident and the identities of the perpetrators,” the spokesperson adds. “It is important to note that none of ST’s internal systems were accessed or compromised.”

Last year, DHS warned employees and former employees that their data may have been compromised after a vulnerability was discovered in software used by a DHS vendor to process personnel security investigations. The software was used to gather and store sensitive personally identifiable information (PII) for background organizations.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/attacks-breaches/dhs-warns-contractors-about-breach-of-it/240165533

Microsoft Maps Out Malware Haves And Have-Nots

Malware infections declined an average of 23.3 percent overall in 2011-2012 among more than 100 countries, but the story was very different for developing nations with fast-growing Internet connectivity.

A new study by Microsoft shows how some nations suffer more malware infections at the time when they begin building out their Internet and technology infrastructure. The newly published “Cybersecurity Risk Paradox” report draws from malware infection rates gathered from Microsoft’s Malicious Software Removal Tool (MSRT) and findings in its semi-annual Security Intelligence Report to analyze how developing nations new to the Net are faring security-wise.

“What was interesting to me is that we found this risk paradox: something we thought was there, and then to come back and show that mathematically,” says Paul Nicholas, senior director of Microsoft’s Global Security Strategy Diplomacy group, and a co-author of the report. “The period of time when countries come online, their cybersecurity risk or exposure to malware actually goes up. We wanted to see what causes this paradox and how to get out of it.”

Nations with the worst conditions politically and socioeconomically suffer five times more malware infections than other nations. But the good news is that nations can experience less cybercrime and malware with improved political and social stability, according to the Microsoft report. Take Brazil, which saw a 42 percent drop in malware in one year during 2011-2012, after PC ownership and broadband had exploded in that nation. “They are also continuing to grow in institutional stability,” Nicholas says.

Trend Micro also has studied Brazil and its malware and cybercrime problems. “Brazil is the fastest-growing country in people connecting to the Internet, and it also has the biggest malware problem as a country” in the Latin American region, says Christopher Budd, global threat communications manager at Trend Micro. Conficker is rampant there on computers, says Budd, formerly with Microsoft’s security response team.

Other factors making Brazil a target, says Budd, are a lack of user education as new users unfamiliar with the Internet have rapidly come online there.

Latin America is quietly becoming a new hotbed for cybercrime, and the cybercriminals there are learning their craft from their counterparts in other regions. Cyberattack incidents increased anywhere from 8 to 40 percent last year in Latin America and the Caribbean, depending on the country — and that’s only among nations that reported or knew about the threats hitting them, according to a report published last year by Trend Micro in collaboration with the Organization of American States (OAS).

A lack of cybercrime laws, economic challenges, and unpatched and unprotected citizen machines make the region ripe for cybercrime — and the data only represents a fraction of the cybercrime incidents there since few incidents are even reported or detected, Trend’s report found.

[Cybercriminals in the region have built their own tools and learned from their predecessors in other regions, says Trend Micro report in cooperation with Organization of American States (OAS). See Threat Nuevo: Latin America, Caribbean Cybercrime On The Rise.]

If those factors weren’t enough to make developing nations major targets for malware and cybercrime, add to the mix the end of Microsoft’s support for Windows XP in April of this year. “Developing countries tend to be much slower to upgrade,” says Christopher Budd, global threat communications manager at Trend Micro, who was formerly with Microsoft’s security response team. “Microsoft has said no more security updates for XP after April, and I can guarantee they are going to stick by that. For the developing world, that means where there’s a likely a disproportionately large XP base, the first day after support ends, those regions will be at incredible risk.”

Budd expects attackers to re-engineer Windows updates, some of which will be exploitable on XP. “I’m really worried” about this, he says. “We’re facing an unprecedented threat environment late spring/early summer. And in the developing world, some people don’t have the money to buy a new PC running Windows 8.”

Another big factor hurting developing nations coming online to the Net is a lack of law enforcement addressing cybercrime. “Let alone cybersecurity as a regulation [protecting] critical infrastructure,” says Tom Kellermann, managing director for cyber protection at Alvarez Marshal Global Forensic and Dispute Services. “And ISPs are popping up left and right” as the demand for Internet connectivity explodes in these nations, he says.

Kellermann says higher rates of Internet connectivity can result in more colonized infrastructure without a national cybersecurity strategy wrapped around it. “Internet penetration rates have always been viewed as a positive economic metric, however, the Internet is not pacific and hacking has become an epidemic,” he says.

The big question, of course, is how to help developing nations avoid the malware and cybercrime proliferation as the grow their online presence. “We can begin to work with policymakers worldwide on how to build a business plan that’s right for this country, and this set of circumstances. The social and economic factors need to be aligned and the technology and skills developed,” says Microsoft’s Nicholas.

Microsoft didn’t name names in its report, but 52% of the struggling nations were located in the Middle East and Africa; 21% in Asia/Pacific; 17% were in Latin America and the Caribbean; and 10% in Central and Eastern Europe.

They typically had low broadband speed services as well as low literacy rates and high crime per-capita. They had an average technology piracy rate of 68%, another big risk factor for malware, and less than 10% of the nations had signed international treaties or codes of conduct on cybercrime.

Microsoft plans to share its findings so that Internet build out efforts can include cybersecurity measures and training, for example. A copy of the full report is available for download here (PDF).

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/vulnerability/microsoft-maps-out-malware-haves-and-hav/240165549

EU commissioner calls for larger data breach fines

Euros. Image courtesy of Shutterstock.The European Union commissioner for justice, Viviane Reding, has called for bigger fines for companies who breach data privacy laws within the union.

Her comment came after data protection authorities in Spain and France ruled that Google’s new consolidated privacy policy violated the existing data protection rules yet yielded small fines for the company.

In December, the Richmond company was fined 900,000 euros by the Spanish privacy watchdog who said that its consolidation of over seventy privacy policies into one broke the nation’s laws.

Then, this month, the Commission Nationale de l’informatique et des Libertes (CNIL) fined Google after claiming that its new all-encompassing privacy policy does not inform users just how their personal data is used or collected, does not obtain user consent prior to storing cookies, fails to define data retention periods, and combines data across its services without any legal basis.

The fine levied by CNIL was much smaller at just 150,000 euros, the largest penalty that the independent commission is allowed to apply. Reding commented:

In Spain, Google was fined the maximum amount of EUR 900,000, while in France – whose data protection authority is one of the most respected and feared in Europe – the fine levied was EUR 150,000, also the highest possible sum. Taking Google’s 2012 performance figures, the fine in France represents 0.0003% of its global turnover. Pocket money.

Reding questioned whether such a small fine actually served as a deterrent:

Is it surprising to anyone that two whole years after the case emerged, it is still unclear whether Google will amend its privacy policy or not?

Two years ago Reding put forward new data protection plans that have yet to be adopted by the Commission.

In the original draft of the legislation an offender could have been hit with a fine equal to two percent of its annual turnover a proposal that would, in the Google case, have led to a financial penalty of around 731 million euros ($1 billion).

More recently, the European Parliament considered going even further after voting in favour of fines of up to 5% of a company’s global revenue.

On Monday, Reding stated that “Europeans need to get serious”, adding that larger fines for data protection breaches would act as a more significant deterrent, being a “sum much harder to brush off.”

But the proposals are unlikely to be realised any time soon. Reding’s own reforms have been amended over 4,000 times so far and Germany has raised concerns that a single European data protection authority may compromise its own existing data protection legislation. Reding commented:

Member States, however, have been stalling. Even after the shocking revelations of mass spying and surveillance which continue to dominate the headlines, they have so far mainly reacted with words. EU Heads of State and Government have committed to a “timely” adoption of the new framework. But in real terms there has been little action.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/b36aQudiNy0/