STE WILLIAMS

Fearing NSA Surveillance, 25 Percent Of Firms Plan To Move Data Offshore

One-quarter of businesses are planning to move their data outside of the United States as a result of recent scandals over surveillance by the National Security Agency, according to a study published Wednesday.

The study, commissioned by PEER 1 Hosting, reports that about a third of Canadian companies are planning to move away from U.S. data centers.

Despite the emerging trend, the U.S. remains the most popular place for U.K. and Canadian companies to host data outside of their home countries, with 51 percent planning to keep data in the U.S, the study says.

The survey revealed that the top three concerns for U.K. and Canadian businesses when choosing a hosting provider are now security (96 percent), performance (94 percent), and reputation (87 percent). Nearly 70 percent of respondents agree they would sacrifice performance to ensure data sovereignty.

Yet organizations admit they are struggling to fully understand current data laws. Sixty percent agree they don’t know as much as they should about data security laws, and 44 percent feel that privacy and security laws confuse them, the study says.

Have a comment on this story? Please click “Add a Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/monitoring/fearing-nsa-surveillance-25-percent-of-f/240165251

Zero-Day Flaws Found, Patched In Siemens Switches

A security researcher has discovered a pair of zero-day vulnerabilities in a popular family of Siemens industrial control system switches that could allow an attacker to take over the network devices without a password.

Eireann Leverett, senior security consultant for IOActive, next week at the S4 ICS/SCADA conference in Miami will release his proof-of-concept code for users of the SCALANCE X-200 Switch family to test the flaws in their industrial control systems (ICS) environments. The researcher found the bugs a few months ago and reported them to Siemens, which last fall issued patches for the flaws, within three months of being notified.

Whether ICS/SCADA customers will actually apply the patches or just how quickly they will do so is the big question. The aftermath of Stuxnet has pressured some major ICS vendors like Siemens to regularly respond to vulnerability discoveries in their products with patches and updates to their software. But their customers, utilities and other process control operators, don’t routinely apply those patches: overall, only 10- to 20 percent of organizations do so, mainly because they face the risk of a power or plant operation disruption caused by a newly patched system.

Leverett says releasing his PoC code is all about giving Siemens customers a chance to test just what the newly discovered vulnerabilities could do. Many vulnerability and patch reports don’t include enough specifics on the potential implications of the flaws, he says. “My personal goal is to make sure asset owners have a chance to say, ‘how bad is it? What can I do with it?”

“If I give them the code … then their Python guy can run it” and see first-hand that you don’t need a password to update the firmware, for example.

The Siemens switch zero-day vulnerabilities are in the Web server interface to the devices. The researcher says the first of the two zero-day flaws he found in the Siemens SCALANCE X-200 switch was a basic one: a poorly constructed session ID setup, which would allow an attacker to hijack an administrative session on the switch without credentials. The session ID basically exposes the client’s IP address so an attacker could then hijack the admin’s Web-based session while managing the switch. “But you don’t log onto these switches very often – maybe once a year – so in that sense, it’s a weak vulnerability,” he says.

The more critical zero-day Leverett found in the switch was the second one, which would let an attacker take over the admin operations of the switch – no authentication required. The attacker could then download any network configuration information, or upload a malware-ridden firmware update, for example, Leverett says. “The device assumes if you know the URL, you must have authentication. But it never asks you to authenticate” for it, he says.

“Once I realized that you can change the firmware on the device, it was game over,” he says. “You could have access to all traffic to the switch and exfiltrate data, figure out” other features of the network and “sniff” other credentials and upload malware-laden firmware, he says.

The SCALANCE switches are small, with eight Ethernet ports, and most likely run in small process control environments or in hardened outdoor networks, he says. “I don’t have a good sense in how often they are used in critical infrastructure” environments, he says. Even so, both flaws are simple to exploit, he says.

Siemens issued updates to the SCALANCE X-200 switch firmware, to V5.0.1 and V5.1.2, which fixes the Web session hijacking bug and the Web server authentication flaw.

The vendor provided the security advisories it had issued for its customers in October when asked for an interview for this article.

“Siemens has been very helpful and produced the patches in a timeline that a couple of years ago would have felt impossible,” Leverett says. “I’m going to use that to challenge the rest of the industry” to quickly respond and fix bugs, he says.

[ICS/SCADA expert Ralph Langner published a report looking at how Stuxnet shifted from super-stealthy to simpler, and dispels common misconceptions about the infamous Stuxnet attack on Iran’s nuclear facility — including the belief that only a nation-state could pull off a similar attack in the future. See Stuxnet’s Earlier Version Much More Powerful And Dangerous, New Analysis Finds.]

Leverett says one purpose of his presentation at S4 next week is to urge ICS vendors to come clean with more specifics on flaws so their customers can better understand the risks, and thus be more compelled to apply the patches.

“You find these vulnerabilities in ICS equipment all the time,” Leverett says. “My talk [at S4] will be about how well vendors are informing end users about the security of their products, and how could we do that better … We should be able to give them a more clear, unified response from all of us.”

Siemens’ advisory says this about the critical flaw: “An issue in the web server’s authentication of the affected products might allow attackers to perform administrative operations over the network without authentication.”

Leverett says he understands that Siemens doesn’t want to reveal too much in the advisory to prevent the flaw from being exploited, but more detail in the advisory would be helpful. “Siemens did a really good job,” he says. “But it would be better if Siemens … [said] you can be unauthenticated and post to this device and upload new firmware, so you’ve got to patch,” he says.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/vulnerability/zero-day-flaws-found-patched-in-siemens/240165252

82% of enterprise Mac users not getting security updates

Apple109-250Last week I saw a post by Computerworld journalist Gregg Keizer about the fragmentation of OS X versions and how it flew in the face of Apple’s plans to unite users onto OS X Mavericks.

I have worked with Gregg for years and immediately began to think of the security implications.

Paul Ducklin wrote of the security fixes included in Mavericks, but strangely it appeared that Apple had not released similar fixes for OS X 10.6, 10.7 and 10.8.

The Net Applications data Gregg quoted was interesting, but I thought I would look into how Sophos customers have approached Mavericks.

Enterprise IT departments are often far more hesitant to deploy new operating system versions quickly and this time it might come along with some rather risky security consequences.

SAVMacOSVersions500

As you can see in the charts, 55% of Sophos Anti-Virus for Mac Home Edition (Free!) users have upgraded to OS X Mavericks, whereas only 18% of enterprise users have jumped on board.

After only 77 days these numbers reflect one of the highest adoption rates of a new OS I have seen. Unfortunately, that may not be good enough.

Without saying it in so many words, or any words for that matter, Apple appears to have stopped releasing security updates for OS X 10.6.8, 10.7.5 and 10.8.5.

It is a nice gesture that OS X 10.9 Mavericks is a free upgrade, but not everyone can upgrade. OS X 10.8 Mountain Lion has only been available for 15 months and is apparently already orphaned.

Microsoft has been taking heat for discontinuing Windows XP after supporting it for more than 12 years. I think Apple might be able to do a little better than 15 months.

If you are an Apple user, please update to OS X Mavericks or if you can’t, perhaps install Windows 7 or Linux.

If you must run an older version of OS X, you may want to follow the advice Duck and I had in a recent Techknow for Windows XP users to minimize the risk of compromise.

(Audio player above not working for you? Download to listen offline, or listen on Soundcloud.)

Apple is famous for the secrecy around its product and service launches. It’s unfortunate it has decided that the safety of Mac users should also require reading tea leaves.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/y_Qy9O0aNyg/

82% of enterprise Mac users not getting security updates

Apple109-250Last week I saw a post by Computerworld journalist Gregg Keizer about the fragmentation of OS X versions and how it flew in the face of Apple’s plans to unite users onto OS X Mavericks.

I have worked with Gregg for years and immediately began to think of the security implications.

Paul Ducklin wrote of the security fixes included in Mavericks, but strangely it appeared that Apple had not released similar fixes for OS X 10.6, 10.7 and 10.8.

The Net Applications data Gregg quoted was interesting, but I thought I would look into how Sophos customers have approached Mavericks.

Enterprise IT departments are often far more hesitant to deploy new operating system versions quickly and this time it might come along with some rather risky security consequences.

SAVMacOSVersions500

As you can see in the charts, 55% of Sophos Anti-Virus for Mac Home Edition (Free!) users have upgraded to OS X Mavericks, whereas only 18% of enterprise users have jumped on board.

After only 77 days these numbers reflect one of the highest adoption rates of a new OS I have seen. Unfortunately, that may not be good enough.

Without saying it in so many words, or any words for that matter, Apple appears to have stopped releasing security updates for OS X 10.6.8, 10.7.5 and 10.8.5.

It is a nice gesture that OS X 10.9 Mavericks is a free upgrade, but not everyone can upgrade. OS X 10.8 Mountain Lion has only been available for 15 months and is apparently already orphaned.

Microsoft has been taking heat for discontinuing Windows XP after supporting it for more than 12 years. I think Apple might be able to do a little better than 15 months.

If you are an Apple user, please update to OS X Mavericks or if you can’t, perhaps install Windows 7 or Linux.

If you must run an older version of OS X, you may want to follow the advice Duck and I had in a recent Techknow for Windows XP users to minimize the risk of compromise.

(Audio player above not working for you? Download to listen offline, or listen on Soundcloud.)

Apple is famous for the secrecy around its product and service launches. It’s unfortunate it has decided that the safety of Mac users should also require reading tea leaves.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/y_Qy9O0aNyg/

Data scrapers used Amazon cloud to reap biz bods’ CVs, wails LinkedIn

A guide to transactional email

LinkedIn is still waging its battle against “scrapers”, who use software to automatically harvest publicly available personal information from the social network.

And that fight has today wound up in a California court where the website’s bosses are trying to unmask the miscreants who have reaped the site for users’ employment histories and other data.


According to the filing against 10 “John Does” in the US District Court, Northern District of California, the attackers circumvented anti-abuse technologies in LinkedIn’s setup – in particular, the technology known as FUSE, which limits the amount of activity on the network a single account can carry out before being blocked.

LinkedIn alleged the scrapers did this by using Amazon’s EC2 cloud “to rent virtual computers on which to run their own computer programs and applications”.

“Amazon EC2 provides resizable computing capacity … The Doe defendants used Amazon EC2 to create virtual machines to run automated bots to scrape data from LinkedIn’s website”, the complaint alleges.

The scraping took place in May and June, we’re told, and LinkedIn says the miscreants used their AWS accounts to create “thousands” of fake profiles (along the way, managing to defeat its CAPTCHAs) to conduct the scraping.

Other security measures the attackers circumvented included “Sentinel”, which limits the number of requests permitted from a single IP address, and the restrictions on crawling that are implemented in its robots.txt file.

LinkedIn hopes that, by bringing the matter to court and triggering a discovery phase, it will be able to force Amazon to hand over identifying information on who created the AWS EC2 accounts.

The full complaint – which alleges counts of computer fraud and abuse; violation of the Digital Millennium Copyright Act; breach of contract; and trespass – is here to read [PDF]. ®

Quick guide to disaster recovery in the cloud

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/09/data_scrapers_used_amazon_cloud_linkedin/

Data scrapers used Amazon cloud to reap biz bods’ CVs, wails LinkedIn

A guide to transactional email

LinkedIn is still waging its battle against “scrapers”, who use software to automatically harvest publicly available personal information from the social network.

And that fight has today wound up in a California court where the website’s bosses are trying to unmask the miscreants who have reaped the site for users’ employment histories and other data.


According to the filing against 10 “John Does” in the US District Court, Northern District of California, the attackers circumvented anti-abuse technologies in LinkedIn’s setup – in particular, the technology known as FUSE, which limits the amount of activity on the network a single account can carry out before being blocked.

LinkedIn alleged the scrapers did this by using Amazon’s EC2 cloud “to rent virtual computers on which to run their own computer programs and applications”.

“Amazon EC2 provides resizable computing capacity … The Doe defendants used Amazon EC2 to create virtual machines to run automated bots to scrape data from LinkedIn’s website”, the complaint alleges.

The scraping took place in May and June, we’re told, and LinkedIn says the miscreants used their AWS accounts to create “thousands” of fake profiles (along the way, managing to defeat its CAPTCHAs) to conduct the scraping.

Other security measures the attackers circumvented included “Sentinel”, which limits the number of requests permitted from a single IP address, and the restrictions on crawling that are implemented in its robots.txt file.

LinkedIn hopes that, by bringing the matter to court and triggering a discovery phase, it will be able to force Amazon to hand over identifying information on who created the AWS EC2 accounts.

The full complaint – which alleges counts of computer fraud and abuse; violation of the Digital Millennium Copyright Act; breach of contract; and trespass – is here to read [PDF]. ®

Quick guide to disaster recovery in the cloud

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/09/data_scrapers_used_amazon_cloud_linkedin/

Undeterred by Snapchat’s snafus, upstart Confide punts self-destruct selfies

The master list of email delivery terminology

While the world wonders whether Snapchat is a three-billion-dollar disaster because of its recent hack, an AOL alumnus has launched a disappearing message app designed for corporate audiences.

Confide, which hit the app store on January 8 US time, pitches itself as an app that “lets you say what you want … messages disappear after they’re read, ensuring all your communication remains private, confidential and always off the record”.


Co-founder Jon Brod, formerly of AOL, tells Bloomberg the app’s users will have to “exercise proper caution and judgement” in using the app – sensible advice, but probably fruitless given that it seems tailor-made for insider traders.

“Words spoken during in-person chats over coffee or informal meetings disappear after they are heard. But emails or texts people send are permanent,” Brod writes in this blog post. “We set out to build a professional off-the-record messaging service we’d actually use ourselves.”

The app demands that users swipe words in messages to reveal them, and says it will notify the originator of a message if the recipient attempts a screenshot (the determined recipient could, of course, just use a separate video camera to capture messages permanently).

The app is currently only available for iOS, with Android on the drawing board. ®

Disaster recovery protection level self-assessment

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/09/disappearing_messages_get_another_run_with_confide/

Undeterred by Snapchat’s snafus, upstart Confide punts self-destruct selfies

The master list of email delivery terminology

While the world wonders whether Snapchat is a three-billion-dollar disaster because of its recent hack, an AOL alumnus has launched a disappearing message app designed for corporate audiences.

Confide, which hit the app store on January 8 US time, pitches itself as an app that “lets you say what you want … messages disappear after they’re read, ensuring all your communication remains private, confidential and always off the record”.


Co-founder Jon Brod, formerly of AOL, tells Bloomberg the app’s users will have to “exercise proper caution and judgement” in using the app – sensible advice, but probably fruitless given that it seems tailor-made for insider traders.

“Words spoken during in-person chats over coffee or informal meetings disappear after they are heard. But emails or texts people send are permanent,” Brod writes in this blog post. “We set out to build a professional off-the-record messaging service we’d actually use ourselves.”

The app demands that users swipe words in messages to reveal them, and says it will notify the originator of a message if the recipient attempts a screenshot (the determined recipient could, of course, just use a separate video camera to capture messages permanently).

The app is currently only available for iOS, with Android on the drawing board. ®

Disaster recovery protection level self-assessment

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/09/disappearing_messages_get_another_run_with_confide/

Anatomy of a 22-year-old X Windows bug: Get root with newly uncovered flaw

A guide to transactional email

The X Windows System, which today underpins Linux desktops the world over, has been around for more than two decades – and so have its bugs.

Sysadmins have a few days to patch libXfont to remove a newly discovered, 22-year-old privilege-escalation bug in the code before any tiresome users whip out an exploit. The flaw allows someone logged into a vulnerable machine to crash the X server, or possibly execute injected code as a superuser.


Hard on the heels of a Chaos Communication Congress presentation that found “hundreds” of bugs (discussed at the X.org mailing list here), the newly found bug is a textbook stack buffer overflow that dates back to 1991 – and is present in all versions of X11.

The bug is very straightforward. As the X.org advisory states: “A BDF font file containing a longer than expected string could overflow the buffer on the stack. Testing in X servers built with Stack Protector resulted in an immediate crash when reading a user-provided specially crafted font.”

The guilty party is this block of code in bdfReadCharacters() in libXfont/tree/src/bitmap/bdfread.c:

char charName[100];

if (sscanf((char *) line, "STARTCHAR %s", charName) != 1) {
   bdfError("bad character name in BDF filen");
   goto BAILOUT; /* bottom of function, free and return error */
}

If you can’t already see the bug then we’ll explain. On-screen fonts can be stored in Glyph Bitmap Distribution Format (BDF) [PDF] files, which start with the following line to declare the format version the font is adhering to:

STARTCHAR 2.1

That’s all well and good if the loaded font has a short version number, expressed as a string, which in this case is “2.1”. That information is copied into the string variable charName by the sscanf() call in bdfread.c. The problem is, sscanf() is not told to limit the number of bytes read for the version number and will keep copying data from the file until it hits a white-space character.

The charName variable is declared as having a length of 100 bytes, so feeding it a crafted BDF font with a “STARTCHAR” version number longer than that will punch through the boundary of the variable’s allotted space in memory and into other data on the stack. This means an attacker could overwrite the memory that controls the processor’s instruction pointer on leaving the bdfReadCharacters() function, effectively hijacking the program.

And since the X server is usually run with superuser privileges, the normal user can start running code to take control of the machine if the attack is successful. Much more in-depth explanations on how stack buffer overflows can be exploited, despite some of the protections in place on modern systems, can be found here and here.

The fix for the bug is simple; you simply tell sscanf() to read at most 99 bytes, leaving one for the terminating NULL:

if (sscanf((char *) line, "STARTCHAR %99s", charName) != 1) {

As the X.org announcement states:

As libXfont is used to read user-specified font files in all X servers distributed by X.Org, including the Xorg server which is often run with root privileges or as setuid-root in order to access hardware, this bug may lead to an unprivileged user acquiring root privileges in some systems.

In the December Chaos Communication Congress presentation, Ilja van Sprundel said he’d able to find 120 bugs in a couple of months, “and I’m not close to done”. Van Sprundel had already triggered a major X.org security update in May 2013, with tens of fixes needed because client libraries trusted servers to send valid data, and not sanity-tested what was sent.

The latest bug, discovered using the cppcheck static analyzer, is designated CVE-2013-6462; security updates should be available from all good package managers and repositories. ®

Quick guide to disaster recovery in the cloud

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/09/x11_has_privilege_escalation_bug/

Prez Bush email hacker Guccifer is BACK: A-list celebs’ inboxes ‘raided’

A guide to transactional email

A webmail hacker called Guccifer – most famous for raiding the email inboxes of former US president George H W Bush’s family – has been exceptional busy of late.

Crime news website The Smoking Gun reports that Guccifer has handed over a cache of documents – which, we’re told, reveal that he broke into the private email accounts of scores of new victims in the last year, lifting private personal photographs, financial documents, and phone records in the process.


Victims, it is alleged, include comedian Steve Martin; actress Mariel Hemingway; Kitty Kelley, the writer of unauthorised biographies; and magazine editor Tina Brown. Politicians and public figures including three members of the UK’s House of Lords, former President Nixon aide John Dean, and the director of Romania’s intelligence service are also on the seemingly random hit list, we’re told.

Guccifer’s swag bag included the phone numbers of actors Robert Redford and Warren Beatty as well as the private email addresses of other A-list Hollywood stars including Leonardo DiCaprio and Nicole Kidman, TSG reports. The miscreant’s haul also apparently included the script for the fourth season finale of Downton Abbey, six months before the episode of the British TV period drama aired.

The hacker passed his huge dossier to The Smoking Gun “in case I disappear”.

The motive for the attacks much less how they were carried out remain unclear. However, veteran security world watcher Graham Cluley reckoned that “Guccifer managed to gain access to some of the accounts he hacked by correctly guessing the secret answers to security questions”.

Guccifer previously claimed that “the Feds” began investigating him a “long time ago” and that he had hacked into “hundreds of accounts” over an extended period. Romania’s spies are confident that Guccifer will eventually be caught, Softpedia reports. It’s understood the hacked Yahoo! account of George Maior, the head of the Romanian Intelligence Service (SRI), was an older webmail account that he only used in his former career as an academic.

Guccifer uses various proxy services to disguise his location and has so far managed to stay at least one step ahead of the authorities on his tail. ®

Quick guide to disaster recovery in the cloud

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2014/01/08/guccifer_webmail_hacker/