STE WILLIAMS

Marketers, IT contractor arrested in theft of 20 million South Korean credit cards

South Korea credit card image courtesy of Shutterstock, 116809015At least 40% of South Korea’s entire population – some 20 million people – have had their names, social security numbers and credit card details ripped off and sold to marketing firms in the nation’s biggest-ever theft of personal information.

It’s looking like an inside job.

The theft has been traced back to an IT contractor working for a company called the Korea Credit Bureau, which produces credit scores, the BBC reports.

The worker purportedly copied the massive trove of data onto a USB stick.

He’s been arrested, along with two managers at the marketing firms who were allegedly willing buyers of the data.

According to the BBC, early reports point to the contractor, an engineer, being able to get his hands on the data courtesy of Korea Credit Bureau’s access to databases run by three big South Korean credit card firms.

The Wall Street Journal reports that the chiefs of those credit card firms – KB Kookmin Card, Lotte Card, and NH Nonghyup Card – have publicly apologised for the leaks.

Prosecutors earlier this month alleged that the engineer stole the data between May 2012 and December, according to the WSJ.

Executives at the credit card companies have offered to resign.

One of those resignations – that of the head of NongHyup’s card business, Sohn Kyoung-ik – was immediately accepted, while resignations at the other companies are pending decisions from a company board or chairman.

Although the personal information was leaked, it hasn’t yet been distributed, Financial Services Commission Chairman Shin Je-yoon told reporters on Monday.

The card issuers said that customers wouldn’t be responsible for any future fraudulent charges.

An official at Korea’s national financial regulator, the Financial Services Commission, said that the data was easy to steal, given that it was unencrypted and that the credit card issuers didn’t know it had been copied until investigators told them about the theft, the BBC reports.

No encryption? Yikes!

As far as insider jobs go, this one’s pretty bad if the engineer turns out to be guilty of the crimes with which he’s charged.

The data should have been encrypted, and those trusted with handling it should have been a lot more deserving of that trust.

Deep sympathy to the 20 million Koreans targeted because of the security lapses involved in this debacle.

You’d think we’d have learned by now, in the wake of the Bradley/Chelsea Manning “Wikileaks” saga of 2010, in which decades of confidential US State Department cables were siphoned off…

…without anyone noticing that one person had been drawing down unfeasibly large tranches of data onto removable media.

(If you haven’t thought about a Data Loss Prevention Strategy yet, now might be an excellent time to do so!)

Here’s a sadly-still-relevant podcast from the Wikileaks incident, looking at the question, “How could this have happened?”

(Audio player not working? Listen on Soundcloud.)


Image of South Korea credit card courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/jQcGnMTYAHA/

Don’t be a DDoS dummy: Patch your NTP servers, plead infosec bods

The Road to Enterprise PaaS

Security researchers have responded to recent denial of service attacks against gaming websites and service providers that rely on insecure Network Time Protocol servers by drawing up a list of vulnerable systems.

Network Time Protocol (NTP) offers a means of synchronising clocks over a computer network. Features of the simple UDP-based protocol mean it is possible to abuse it to return a large reply to a small request.


The technique was used to take down Battle.net, League of Legends, Steam and other gaming sites in late December for reasons that still remain unclear, weeks later.

Symantec recorded a “significant spike in NTP reflection attacks” in general over the Christmas season.

DNS-based reflection and amplification attacks were used in high volume attacks against Spamhaus and others in 2013. “NTP-based attacks use similar techniques, just a different protocol,” CloudFlare, the web security firm that helped Spamhaus mitigate last year’s packet flood, explains.

Open NTP servers are the new open DNS resolvers. In just the same way that the ‪openresolverproject.org aimed to list open DNS resolvers a new service called openntpproject.org.

The message to web admins and ISPs in both cases is clear: fix your servers and prevent them from participating in amplification attacks. Resolving misconfiguration problems in either case is straightforward and shouldn’t take more than a few minutes. In the case of open DNS resolvers the fix involves configuration changes, while open NTP servers can be taken out of the pool of systems open to abuse by cybercrooks through either patching or disabling an abusable service.

Publicly accessible NTP servers can be abused to swamp a target system with UDP traffic. An attacker would send a series of “get monlist” requests to a vulnerable NTP server, with the source address spoofed to be the victim’s.

US-CERT advises sys admins to either disable the monlist functionality within the NTP server or to upgrade to the latest version of the technology (NTP 4.2.7), which doesn’t automatically enable the problematic monlist service. A small query can redirect megabytes of traffic, security experts at the SANS Institute’s Internet Storm Centre warn.

The Open NTP Project is a useful resource in helping to identify vulnerable systems because it allows sysadmins to use external IP addresses to search through a ready-compiled database of affected machines, as explained in a blog post by cloud security firm Qualys here. ®

The Benefits and Significance of Private Platform as a Service

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/21/open_ntp_patching_project/

Ex-Google, Mozilla bods to outwit EVIL BOTS with ‘polymorphic’ defence

The Road to Enterprise PaaS

Startup Shape Security is re-appropriating a favourite tactic of malware writers in developing a technology to protect websites against automated hacking attacks.

Trojan authors commonly obfuscate their code to frustrate reverse engineers at security firms. The former staffers from Google, VMWare and Mozilla (among others) have created a network security appliance which takes a similar approach (dubbed real-time polymorphism) towards defending websites against breaches – by hobbling the capability of malware, bots, and other scripted attacks to interact with web applications.


Polymorphic code was originally used by malicious software to rewrite its own code every time a new machine was infected. Shape has invented patent-pending technology that is able to implement “real-time polymorphism” – or dynamically changing code – on any website. By doing this, it removes the static elements which botnets and malware depend on for their attacks.

How it works

When a ShapeShifter appliance protects a website, instead of encountering an application with fixed elements that are trivial to program an attack against, cybercriminals now face the difficult task of getting their malware to interact with a web app that is a moving target, constantly rewriting itself. This is done while keeping all of the user interaction functionality intact for legitimate users. And it works better than earlier approaches such as IP reputation or throttling, the pitch goes.

Shape Security said its technology is able to defend against common hacking attacks such as SQL injection attacks as well as attempts by hackers to brute force logins to websites and application layer DDoS attacks.

The technology, in development over the past two years, also defends against so-called man-in-the-browser attacks, which are commonly used in combination with Trojans on a victim’s PC to defeat the additional layer of protection offered by two-factor authentication technology.

Shuman Ghosemajumder, Shape Security VP of strategy, told El Reg that its technology relies on deflecting automated attacks rather than detection. Detection of attacks based on signatures or heuristics, is an approach taken by established technologies such as Web Application Firewalls. Ghosemajumder explained how ShapeShifter is designed to screw up automated attack code without messing things up for regular users.

“ShapeShifter institutes the same new policy for every website visitor, regardless of whether it is a legitimate user or an attacker: real-time polymorphism,” he told El Reg. By constantly rewriting the code of the website’s user interface, malware, bots, and scripts simply have their capability to attack the website disabled, since their own attack instructions, as coded by their authors, are rendered immediately out-of-date and invalid. Meanwhile, real users, who do not interact directly with the website’s underlying user interface code, are unaffected.”

No change to a customer web applications is needed in order to deploy the technology, Ghosemajumder adds.

Shape Security raised $26m in funding from investors including Google Ventures, Kleiner Perkins Caufield Byers, Google chairman Eric Schmidt’s TomorrowVentures, and former Symantec chief exec Enrique Salem. Its business model is still being refined.

“The pricing model is still being finalised, but we are considering a subscription model as well as an appliance sales model,” Ghosemajumder explained. “For early adopters we have focused on an unlimited use model and seven-figure enterprise-wide deals. We have achieved bookings in the low seven figures already and are estimating bookings of low eight figures in 2014.” ®

The Benefits and Significance of Private Platform as a Service

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/21/shapeshifter/

KCOM-owned Eclipse FAILS to cover up the password ‘password’

The Road to Enterprise PaaS

Exclusive A Register reader has exposed another privacy howler at KCOM – this time involving its Exeter-based ISP Eclipse Internet, which displays passwords in plain text to users via a webpage.

Customers who log in to their personal Eclipse user site are somewhat surprisingly shown the password for their account.


Today’s tip of the hat from Vulture Central goes to Steve Foster, who got in touch following our story last week about a KC engineer allegedly revealing a spreadsheet containing unencrypted user IDs and passwords. He told El Reg:

I doubt that you’ll be surprised that the utter incompetence within Kingston Communications goes further than Hull. At least as far as Exeter, in fact.

I attach a (redacted) screen grab from Eclipse Internet’s management tool.

You’ll see that they not only keep their passwords in plain text, they obligingly display them to you in full when you log into their website.

And yes, it does allow ‘password’.

Anyone else feeling a tad bit insecure?

We asked KCOM to explain the lax security on display over at Eclipse Internet.

A spokeswoman at the company told The Reg:

Customers can view their password within our secure Eclipse customer portal only after they have logged in using their user name and password to authenticate their details. During the login process the password is not visible in plain text.

Which left your baffled correspondent wondering why the password would need to be displayed, if the same password was used to access the site.

We were also curious to know if there was any progress with the apparent KC spreadsheet blunder that El Reg recently uncovered.

But KCOM’s spokeswoman told us there was “no update” on that particular story. ®

5 DNS security risks that keep you up at night

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/21/kcom_eclipse_internet_password_in_plain_sight/

Obama Outlines 5 Surveillance Reforms

President Obama on Friday announced five changes in US surveillance policy, a move he attributed in part to the revelations about the scope of US intelligence gathering made possible by documents leaked by ex-NSA contractor Edward Snowden.

The most significant change is an end to the bulk collection of telephone records — phonecall meta-data — under Section 215. The President said he is ordering the gradual discontinuation of this program and the establishment of “a mechanism that preserves the capabilities we need without the government holding this bulk meta-data.”

But the President conceded that alternatives, such as having a third-party or individual businesses retain data until the government comes calling, pose problems. It remains to be seen exactly what form such data collection will take.

Read the full article here.

Have a comment on this story? Please click “Discuss” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/government-vertical/obama-outlines-5-surveillance-reforms/240165517

What Would Judge Leon Say About The ‘Big 8’?

Special to Dark Reading

Mark Weinstein is a privacy advocate and author of the Habitually Great book series, and founder and CEO of Sgrouples.com, a new type of social network built upon a Privacy Bill of Rights for its members.

U.S. District Court Judge Richard Leon stated in his December 16 ruling against the National Security Agency (NSA) that Founding Father James Madison “would be aghast” at how our government encroaches on our personal liberties. While undoubtedly true, the reality is that Madison’s shock and disappointment would extend far beyond our government.

Case and point, just a week later the “Big 8” major technology companies, including Apple, Facebook, Google, Microsoft and Twitter, joined forces in an open letter asking the U.S. government to enforce tighter controls on government surveillance. First off, I commend them for their efforts. Our power to achieve becomes unlimited when we unite in one voice against what we perceive as inequities or injustices.

But let’s get to the heart of the matter here. The statement set forth by these companies, individually or together, represents the penultimate in hypocrisy. The very words they use against our government and in support of protection of our individual rights are the very practices they put into place within their own corporations.

Let’s look at their statement:

“The balance in many countries has tipped too far in favor of the state and away from the rights of the individual — rights that are enshrined in our Constitution. This undermines the freedoms we all cherish. It’s time for a change.”

That statement is absolutely true. At the same time, if you replace the word “state” with Facebook, Google, or the names of any of the Big 8, that statement is also true. You see those companies all collect information about what you do on the Internet. They store your email messages. They track your search queries. They follow your payments and plenty more personal information. This is not conjecture, mind you, but fact.

In a July 31, 2013 article for The Wall Street Journal, Amir Efrati pointed out in detailed diagram form how Google compiles a portfolio of you based on where you go and what you do online. Facebook similarly gathers information on you through activity on its site and any activity on a website that has a Facebook “Like” box tagged onto it. In terms of the latter, in case you didn’t know, that includes compiling a portfolio of non-Facebook users interacting with those partnered sites.

Make no mistake here. These companies are not the white hat or the prince in shining armor here. They are the wolf in sheep’s clothing. What they are doing is damage control, which under the circumstances makes total sense. Brad Smith, Microsoft’s general counsel, let the cat out of the bag when he he said,”People won’t use technology they don’t trust.” I agree wholeheartedly. The problem is these companies want to give the impression they are trustworthy through their press releases and public relations, which counter their data spying practices and privacy infringements.

They say they want to limit the government’s authority to collect user information. Amen to that. What they don’t say anything about is limiting their own authority. It’s the classic “Do as I say, not as I do” defense, because when it comes down to it, everything they want the government to do should be practiced by all Internet companies.

Chris Soghoian, a senior analyst with the American Civil Liberties Union, correctly calls out how these companies should have been crying for reform before Ed Snowden’s disclosures and the whole NSA mess. But they didn’t, and that’s indicative of where they stand on the issue. They will take a stand when the public cries for one, not because of any sense of moral justice or protection of inalienable rights.

Balancing individual rights with public safety is an important debate and one worth creating legislation for that protects individual rights. At the same time, those same laws should apply to Internet companies to protect our privacy and outlaw data scraping.

James Madison may have died close to 200 years ago, but the truths he set forth in the United States Constitution still stand as the laws of our land for citizens and companies alike. While the technology behemoths act as if they are on your side, they are truly acting on their own behalf. They don’t want to change their egregious methods of operation, yet they don’t want to appear greedy or untrustworthy towards the public. But change they must to dispel the unsavory practices they support, and attacking the US government for their own faults merely ignores the real problem. Next time, they should direct the letter towards the government, and CC themselves.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/privacy/what-would-judge-leon-say-about-the-big/240165508

Target Malware Origin Details Emerge

Digital forensic investigators and information security researchers have positively identified the malware used in the recent attack against Target. The malicious code infected point-of-sale (POS) terminals at the retailer and then helped transfer the stolen data to an FTP server in Russia.

The attack against Target, which began in late November and continued until mid-December, resulted in the theft of 40 million credit and debit cards as well as personal information for as many as 70 million customers.

A joint federal-private report providing more details about the apparent hacking and malware campaign against Target has been distributed to firms in the retail and financial-services sectors. The report was jointly issued by the Department of Homeland Security (DHS), the Secret Service, the Financial Services Information Sharing and Analysis Center (FS-ISAC), and Dallas-based private cybersecurity firm iSight Partners.

Read the full article here.

Have a comment on this story? Please click “Discuss” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/attacks-breaches/target-malware-origin-details-emerge/240165491

Feds seize Silk Road’s $28 million Bitcoin wallet

Image of Bitcoin sack from Shutterstock, 165294086In a press release on Thursday, the US Attorney’s office for Manhattan announced the forfeiture of 29,655 Bitcoins seized from Silk Road, a dark web marketplace that facilitated the trade of drugs and other illegal activity.

Prosecutors seized the virtual currency that allows buyers to remain anonymous, worth around $28 million (£17 million) at current prices, during a raid on a Silk Road server in October last year. Preet Bharara, the United States Attorney for the Southern District of New York, also confirmed that the Silk Road website itself will be forfeited along with the Bitcoins.

Bharara highlighted the fact that the Bitcoins were not seized simply because they were Bitcoins but because of their status as an asset in a criminal case, saying that:

With today’s forfeiture of $28 million worth of Bitcoins from the Silk Road website, a global cyber business designed to broker criminal transactions, we continue our efforts to take the profit out of crime and signal to those who would turn to the dark web for illicit activity that they have chosen the wrong path. These Bitcoins were forfeited not because they are Bitcoins, but because they were, as the court found, the proceeds of crimes.

The largest ever seizure of the virtual currency also saw authorities grab 144,336 Bitcoins from the personal computer of Ross Ulbricht, the alleged mastermind of Silk Road. Ulbricht, who it is claimed also went by the name of Dread Pirate Roberts, was arrested at the San Francisco Public Library in October following a federal investigation that began in 2011.

He has been charged with computer hacking conspiracy, narcotics trafficking conspiracy, and money laundering.

The future of Ulbricht’s stash, currently valued at around $130 million and in the hands of the FBI, is being contested:

Ulbricht has filed a claim in the civil forfeiture action, asserting that he is the owner of the Bitcoins found on his computer hardware, and contesting the forfeiture of those Bitcoins.

The government can only auction off Silk Road’s assets because they were “being used to facilitate money laundering”, so Ulbricht may be able to keep his Bitcoins if his civil case is successful in proving that those on his personal computer were not associated with the website.

Other individuals who may have had Bitcoins in the Silk Road wallet, for whatever reason, will have lost their virtual funds though. This includes Bitcoin fans who, according to Ars Technica, sent micro-payments to the wallet now held by the federal government in order to allow them to add publicly-viewable messages such as these gems:

Public Note: I THOUGHT OF SNIFFING FARTS WHILST SENDING THESE BITCOINS TO YOU

and

Public Note: hey computer geek, who control this address. ‘Ross Ulbricht’ is not the bad guy, you are a bad guy. Please open your eyes, dont be brainwashed, and think your self!!!

Just how the federal government will dispose of the Bitcoins currently in its possession is not known at this time, with Manhattan US Attorney Office spokesperson Jim Margolin telling Forbes that, “We have not yet determined exactly how the Bitcoins will be converted and liquidated,” before later suggesting that an auction will be held.

With Bitcoins currently valued at around $900 each, investors and other holders of the virtual currency may want to consider their positions, as it’s possible that any large-scale sale by the US authorities may push down prices for some time to come.

Image of sack of Bitcoins courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Za0lBkSq_nw/

Digitally signed data-stealing malware targets Mac users in "undelivered courier item" attack

Our colleagues at SophosLabs pointed us at a interesting item of malware the other day, namely a data-stealing Trojan aimed at Mac users.

In fact, it was somewhat more than that: it was one of those “undelivered courier item” emails linking to a dodgy web server that guessed whether you were running Windows or OS X, and targeted you accordingly.

You’re probably familiar with “undelivered item” scams.

The idea is surprisingly simple: you receive an email that claims to be a courier company that is having trouble delivering your article.

In the email is a link to, or an attachment containing, what purports to be a tracking note for the item.

You are invited to review the relevant document and respond so that delivery can be completed.

We’ve seen a wide variety of courier brands “borrowed” for this purpose, including DHL, the UK’s Royal Mail and even, in one bewildering case, a made-up courier company called TNS24, with its very own website, featuring its very own amusingly ill-Photoshopped planes, ships and automobiles.

But a competently-executed courier scam can be fairly convincing, especially if the criminals behind it know enough about you to create what becomes a targeted attack.

Even a modest amount of detail (if that is not an oxymoron) can do the trick.

For example, the crooks will sound a lot more believable if they know your address and phone number; are aware of what you do in your job; and have a general idea about some of the projects you are working on right now.

Of course, if you open the attachment or click on the link in one of these scams, you are immediately put into harm’s way: the attachment might try to trigger an exploit in your unpatched copy of Word, for instance, or the link might attack an unpatched Java plugin in your browser.

Here’s what the emails looked like in this attack, with some details changed or redacted for safety:

We wish to inform you that we have a pending parcel for the past 10 days bearing your name Mr. Jonathan Sidebottom,with parcel number (MV-45-QA566). The parcel was sent for delivery on the below mentioned address but nobody was there to receive it. Your parcel content has a set of engineering documents, which was discovered during our security checks of parcels brought into our head office. So, we are sending you a scanned copy of that parcel. Give your positive response, if it belongs to you.

If you are a native speaker of English, you will notice that the wording of the email is clumsy and unidiomatic, and if you were to receive a message like this you might well be suspicious on those grounds alone.

But if Mr Sidebottom really is in the engineering business, and regularly deals with inbound documents from courier companies around the world, an email of this sort could easily pass muster.

The link, of course, doesn’t really lead to fedex.com.ch, but instead takes you to a domain name that is controlled by the attackers.

If you are on a mobile device, the server delivers an error message.

If you are using a desktop browser that isn’t Safari, you receive a ZIP file containing a Windows program detected by Sophos Anti-Virus as Mal/VBCheMan-C, a vague relative of the Zbot or Zeus malware.

But if you are using Safari, you receive Mac malware, delivered as an Application bundle packaged inside a ZIP file.

By default, on OS X 10.9.1 (the latest update to Mavericks, Apple’s most recent operating system version), Safari directly downloads the file, showing you an empty Safari window with the icon of the downloaded file in the Dock at the bottom of the screen:

Clicking on the download button shows you what looks like a PDF file:

There is no PDF file, as a visit to the Terminal windows quickly reveals.

Safari has automatically unzipped the download, producing an Application bundle (actually just a subdirectory tree with a special structure) that has deliberately been given a PDF icon:

As you can imagine, the temptation is to click on what looks like a PDF file to see what it contains.

OS X does try to advise you that you aren’t opening a document, although you can argue that the warning would be more compelling if it explicitly said that you were about to “run a software program”, rather than merely to “open” the file:

Note that you don’t get a warning about the App being from an “unknown developer” because it is digitally signed, something that happens surprisingly often with modern malware.

→ The quantity of digitally-signed malware in circulation prompted Microsoft, which sees a lot more malware than Apple, to publish a recent blog post with the uncompromising title “Be a real security pro – Keep your private keys private.” In that article, Microsoft documents a malware family it calls “Winwebsec” of which it has more than 15,000 digitally-signed samples, signed with 12 different stolen keys.

If you do click the [Open] button, nothing seems to happen: you end up back at the desktop with your email software open and an empty Safari window in front of it.

But a trip back to the Terminal shows that what looked like a PDF file is now running in the background as a process named foung:

As it happens, foung, like its counterpart delivered to Windows computers, is a bot, short for “robot malware”, detected by Sophos Anti-Virus as OSX/LaoShu-A.

LaoShu-A as good as hands control of your Mac over to the attackers, but its primary functions appear to be more closely associated with data stealing than with co-opting you into a traditional money-making botnet.

(You will often hear the term RAT, or Remote Access Trojan, rather than the more common term bot, used to describe this sort of malware.)

In other words, the attackers seem more concerned with digging around on your computer for what they can steal than with abusing your computer and your internet connection to aid and abet other cybercriminal activities.

Amongst other things, LaoShu-A contains code to:

  • Search for files with extensions such as DOC, DOCX, XLS, XLSX, PPT and PPTX.
  • ZIP those files.
  • Upload (exfiltrate) them to a server operated by the attackers.

However, this RAT also knows how to:

  • Download new files.
  • Run arbitrary shell commands.

For example, during our tests, LaoShu-A downloaded a second application that took a screenshot with OS X’s built-in screencapture command, and tried to exfiltrate the image it had just grabbed.

But the behaviour of that second application can be varied by the attackers at any time, which is why, in our recent podcast, Understanding botnets, SophosLabs expert James Wyke warned as follows:

Without analysing the full network capture of the entire interchange between a bot and the person controlling it, you can’t say for sure exactly what that bot might have done… [it] might go and download some completely different piece of malware which carries out a completely different set of functionality.

James went on to recommend:

Be more suspicious of things you get in e-mail. E-mail is still one of the most common ways people get infected, and it is predominantly through social engineering attacks… So when you receive an e-mail from someone you’ve never heard of before, or you’ve never communicated with before, and there’s some interesting attachment to the e-mail or [a link to click], …don’t do that! That’s one of the that most common ways people get infected.

(Audio player not working? Download to listen offline, or listen on Soundcloud.)

Let’s hope this malware reminds OS X users of a few simple truths that some Mac fans still seem willing to ignore:

  • Mac malware is unusual, but not impossible.
  • Data thieves are interested in what Mac users have on their computers.
  • Malware writers can often get their hands on digital certificates to give software to give it a veneer of respectability and to bypass operating system warnings.
  • Mac malware doesn’t have to ask for a password before running.
  • Mac malware can run directly from a download without an installation step.
  • Bots and RATs are particularly pernicious because they can update and adapt their behaviour after you are infected.

As always, prevention is better than cure.

And that “undelivered courier item” almost certainly doesn’t exist.

Free: Sophos Anti-Virus for Mac Home Edition

Sophos for Mac stops threats for Windows and Mac alike, protecting you and those you share files with.

Choose from blocking viruses in real time (on-access protection), scanning at scheduled times, or running a check whenever you want.

Free download, no registration required, no expiry date.

Click to go to download page...

Image of forklift courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/DEnNT-vX63o/

EFF claims Vietnam targeted its staff with spear phishing attack

The Road to Enterprise PaaS

Advocacy group the Electronic Frontier Foundation (EFF) has warned of an uptick in targeted malware attacks by “state-aligned actors” in Vietnam against foreign activists and journalists.

In a blog post this week the group complained of a new campaign targeting its own staff – the first of its kind.


A suspicious looking email inviting EFF activists to an Oxfam conference in Asia was found to contain malicious links and attachments, with the malware in question detected by just one AV vendor in 47, according to VirusTotal.

The same malware was apparently sent to a Vietnam-based AP reporter, this time in an email purporting to come from Human Rights Watch and containing a link to a white paper.

Although the emails contain dodgy grammar and are fairly easy to spot as fake, they have clearly been crafted to appeal to their specific targets.

EFF didn’t elaborate on the end goal for these specific attacks although it said that the related malware and CC server “reveals a relationship to earlier campaigns targeting Vietnamese activists”.

Such previous campaigns have involved malware and RATs designed to spy on their targets.

Vietnamese “state-aligned” actors aren’t just targeting foreign hacks and activists now but also homegrown dissidents who’ve since moved abroad.

EFF attributed the attacks to a group known as “Sinh Tử Lệnh”, which has been active since 2009, but which has hitherto mainly focused on homegrown targets.

The group is sometimes claimed to be comprised of Chinese attackers but is “more likely the work of Vietnamese targeting Vietnamese”, EFF added.

The rights group continued:

EFF is greatly disturbed to see targeted malware campaigns hitting so close to home. While it is clear that this group has been targeted members of the Vietnamese diaspora for some time, these campaigns indicate that journalists and US activists are also under attack. And while longtime activists and journalists might expect to be targeted by a state they regularly criticise, it appears that a single blog post is enough to make you a target for Vietnamese spying.

Like China, Vietnam is keen to reap the economic rewards that come from embracing e-commerce, software development and ambitious ICT projects, but the one-party state is also prepared to censor, spy on and imprison anyone using the internet in a way which could challenge its rule.

So far the cyber attacks observed by EFF have been nothing like the same scale or sophistication as those seen in China, but the group is right to be concerned of what it may foreshadow.

Last year the government passed Decree 72 and Decree 174, for example, which introduce strict penalties on the use of social media “against the state”. ®

The Benefits and Significance of Private Platform as a Service

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/21/vietnam_cyber_attack_activist_journo_foreign/