STE WILLIAMS

Mozilla’s bizarre robo-surfer project demonstrates ad snooping

Well, this is one of the more bizarre internet stunts we’ve seen. In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that you’re someone else.

The company has introduced an online project called Track THIS (although we don’t recommend you go explore that link until you’ve read the rest of this article).

It’s a website that lets you choose from four different personality profiles, and then automatically surfs for the kinds of websites that person might visit. The idea is to let these sites fill your browser with cookies, and watch as advertisers start showing you commercials for things you have no interest in buying.

Why? According to Mozilla, it’s to “bring that out-of-sight tracking front and center” and highlight to users of the internet why they might want to block third-party tracking cookies. In other words, it’s using it as a conversation-sparker to get people interested in the Enhanced Tracking Protection that it introduced in version 67.0.1 of its Quantum browser earlier this month.

Mozilla told us:

We wanted to illustrate how widespread tracking is and let people step into another character’s advertising profile for a while to see how quickly shifts in their online behaviour are being recorded and acted upon by marketers and companies on the web.

Those who want to test out the service can choose from the following four personality types:

Hypebeast: a user obsessed with streetwear, sneakers, and the latest music.

Filthy Rich: a monied-up surfer looking for luxury brands, fancy cars, and exclusive clubs.

Doomsday prepper: a paranoid conspiracy theorist looking for supplies, evaluating bunkers, and accessing the latest crackpot stories.

Influencer: A vapid online approval minder, searching for skincare routines, holistic remedies, astrology and meditation apps (wait – don’t this lot already make entire careers out of pretending to be someone they’re not?)

If you select one of the profiles and press ‘Track THIS’, it opens 100 tabs in your browser, inviting a torrent of cookies that persuade advertisers you fit one of these profiles. They’ll then start showing you ads for mylar blanks and flashlights, or selfie sticks and cherry lipgloss, or whatever.

Mozilla does a lot of useful privacy-focused stuff online, but this seems like a poorly considered publicity stunt. For one thing, opening up 100 tabs in your browser will rapidly chew through your CPU power and memory, and possibly make lesser-powered machines throw a wobbly. The company even admits this:

Before you try Track THIS, get your tabs in order and save your work. Maybe even open up a new window or browser. Track THIS will open A LOT of tabs. 100 tabs is a lot.

Isn’t borking a surveillance victim’s machine in the interests of demonstrating privacy issues a little counter-productive?

The other worry is that Track THIS might open a website that has been attacked by hackers or malvertisers, thus infecting your machine. Even if Mozilla vets the URLs at the outset, isn’t there a danger that they might be compromised later?

Mozilla responded:

In terms of selecting the URLs, we chose reputable websites with a large audience. The possible security risks associated with this activation are no greater than any typical encounter a user would have with the sites that are associated with each of the four profiles.

We tried Track THIS out in a virtual machine with two cores and 8Gb of memory allocated. We pretended to be a doomsday prepper. Firefox’s own browser refuses to open 100 tabs (its security features allow only 20 tabs at a time), but after opening Track THIS in a new installation of Opera and allowing pop-ups, it did indeed open 100 sites.

Sites opened included various Amazon searches for prepper gear, and articles on everything from wildfires through to how doomsday preppers are represented in the movies. It sourced content from a range of sites including the New York Intelligencer, the History channel, and apartmentprepper.com.

We had no ad blocking or anti-tracking settings turned on in Opera, and we can’t say that the ads reflected our chosen personality much. Rolling Stone showed us ads for Quickbooks. Another site showed us ads for ATV tyres and wellness coaching. Your mileage may vary.

This is an interesting publicity stunt, but we can’t help feeling that the sorts of people this is going to attract are those who already understand the implications of online tracking.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/D0lFpfyNfxY/

Cryptocurrency phish dials back the fear, cranks up the politeness

Have you heard of a cryptocurrency outfit called Luno?

We hadn’t heard of it until today – there are lots of cryptocoin companies out there, after all – but cybercrooks certainly had.

According to its own website, Luno (it’s the word for moon in the constructed global language Esperanto, in case you’re wondering) has processed cryptocurrency transactions for more than 2,000,000 people in 40 countries since 2013.

And that’s more than enough potential phishing victims to make it worthwhile for crooks to pump out a spama kampanjo (that’s Esperanto for spam campaign, as you probably guessed) to try to trick Luno users into handing over personal data, including their Luno password.

So, rather sadly for Luno, quite a few people are going to be hearing the company name for the first time in the context of an attempted fraud against them.

Like this:

Now, here’s the thing.

A great many spammers are sloppy, and make lots of mistakes in grammar and spelling – with the result that many of us have fallen into the trap of relying on typos and language blunders as the primary “tells” that we’re talking to a crook.

So if you’ve drifted into the habit of watching out for roten speling and gramattic mistakens in order to detect bogus messages, you could easily fall for this one.

It’s not written in quite the sort of English that a fluent, native speaker of the language would use – there’s a certain linguistic clumsiness throughout – but it’s as well-written as many official and supposedly professional documents that we’ve received in recent years, from both the public and private sector.

This email also avoids the overly dramatic style that characterises many phishing campaigns, where the crooks rely heavily on a combination of fear and pressure to URGE YOU TO ACT and, indeed, to ACT RIGHT NOW.

As phishes go, we have to admit, very grudgingly, that this one is better than most.

Obvious anyway

Fortunately there are other obvious signs that this is a phish, notably that reputable companies try to avoid putting links in their emails that lead directly to authentication pages, and even if they do, you shouldn’t click them anyway.

Also, the link in this phish doesn’t point to the sort of URL you’d probably expect – it leads off to a weirdly named and unencrypted (non-HTTPS) server in the .CO.KR (South Korea) domain.

Of course, in the same way that crooks are learning to spell and punctuate correctly, they’re also learning to use HTTPS websites for their scams, so you see a padlock when you click their links…

…but in this case, they haven’t bothered, so you can instantly use that fact as an unassailable reason, all on its own, to delete the email.

The .CO.KR server used by these crooks is in fact hosted in the US, using a domain that was set up just this week, presumably for short-term use in this and other similar scams.

This US-based server is used only to redirect you to a .COM web address, this time hosted in Serbia, where you are presented with a fake “account unlock” page:

The domain name used for the second step of the scam – the address you end up seeing in your address bar, albeit without a padlock – was registered several years ago, and was presumably bought up or hacked by the crooks to give their scam some apparent legitimacy to reputation-based cybersecurity scanners.

For all we know, the owner of this domain bought it on a whim back in 2011, set up a default web server with all the best intentions…

…and then left it lying around, assuming that a server that’s not doing anything can’t cause any harm.

Until it gets “borrowed” as a sort of accomodation address for malicious web pages and scripts during a scam campaign or a malware attack.

What to do?

  • If an email looks like a phish because it’s badly written, spelled and punctuated, it IS a phish. If the warning signs are obvious, don’t ignore them!
  • But if an email has correct grammar and spelling, that doesn’t make it legitimate. Crooks know how to copy-and-paste, so it’s easy for them to concoct decent-looking emails even in languages they don’t understand.
  • If an email looks like a phish because it insists that you login using a link in the email itself, it IS a phish. Don’t follow links that could have been sent by anyone, and probably were.
  • If a website isn’t using HTTPS, don’t visit it. Some legitimate sites still haven’t bothered to add encryption to their servers – if we all stop visiting them, they’ll soon get the message to adopt HTTPS.
  • But if a webserver does use HTTPS and shows a padlock, that doesn’t ensure it’s legitimate. Crooks can hack existing servers that are already encrypted, or simply get their own web certificates. The HTTPS padlock is important because it stops other people snooping or changing web pages on their way back to you, but it doesn’t vouch for the truth or accuracy of the web content itself.
  • Don’t leave old domains, accounts and web servers lying around unpatched and unloved. You may end up inadvertently giving free cloud services to a crook – and if you do, the finger of blame will end up pointing at you.

If in doubt, leave it out.

If you really are a Luno customer, and you’ve received a message like this, why would trust anything in the email?

That would be like asking the defendant in a criminal trial to serve on their own jury.

Never take any cybersecurity action based on the say-so of a message that “just showed up”.

After all, if you phone the “emergency number” given in a scam email, the crook who answers will tell you what you want to hear; if you try to verify “facts” by visiting a website someone else told you to use, you’ll see what the inventor of the “facts” wants you to see.

Simply put – it’s better to follow your own nose to validate facts than blindly to follow someone else’s!

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/42oofly2AD4/

New Exploit for Microsoft Excel Power Query

Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.

Organizations now have one more reason to pay attention to the security settings of their Microsoft Office applications.

Researchers at Mimecast have developed a working proof of concept that shows how attackers can use a legitimate function in Microsoft Excel called Power Query to remotely drop and run malware on a user’s system to escalate privileges and other malicious activity.

Such attacks can be hard to detect and could allow attackers to load payloads into Excel spreadsheets directly from the Web or other external source when the document is opened, Mimecast said. Because Power Query is a very powerful feature, the potential for the issue to be abused is great, according to the security vendor.

Mimecast’s exploit is the latest involving Dynamic Data Exchange (DDE), a protocol that allows Microsoft applications that use shared memory to exchange data and messages with each other. In the past, researchers and advanced threat groups have demonstrated how DDE can be exploited within Word and other Microsoft Office apps to distribute malware, escalate local privileges, and enable other malicious activity.

In response, Microsoft issued guidance in January 2018 recommending that organizations disable the DDE feature where it is not needed to block external data connections. The company has also noted that for DDE exploits to work, a user would need to click through multiple security prompts. Warnings are displayed on all currently supported Excel versions before loading external data and before executing a command from a DDE formula.

But Meni Farjon, chief scientist of advanced threat detection at Mimecast, says it’s unclear how many organizations are following the advice. “It is unlikely that many organizations have disabled it,” he says.

The default setting is for DDE to be enabled, which means an organization is vulnerable to exploits targeting the protocol, he says. “It is hard to say that organizations have disabled this feature because some of them rely on these Excel features.”

DDE and Social Engineering
Mimecast’s new exploit shows how attackers can use Power Query to launch a remote DDE attack in an Excel spreadsheet.

Power Query is a feature in Excel that lets users to connect their spreadsheets with other structured and unstructured data sources, including web pages, text files, databases, Active Directory, Exchange, Hadoop, and even Facebook. It’s one of three data analysis tools available with Excel and allows users to discover, combine, and refine their data in various ways.

Mimecast researchers discovered that Power Query’s ability to link spreadsheets to other sources and load data from them into an Excel spreadsheet could be abused relatively easily to launch sophisticated and hard-to-detect attacks. “Using Power Query, attackers could embed malicious content in a separate data source, and then load the content into the spreadsheet when it is opened,” the company said in an advisory Thursday.

Mimecast’s proof of concept shows how an external web page hosting a malicious payload can be loaded into an Excel spreadsheet. “An attacker just needs to open up an Excel document and follow a few clicks to create the issue — no reverse engineering, no hex editing, no memory abuse,” Farjon says.

For an attack to work, a threat actor would need to send a crafted Excel file to the victim via a phishing email or use some other social engineering tactic to get that person to open the document. At that point, the document would make a query or request for the malicious payload hosted on the web page. 

Antivirus tools wouldn’t spot the crafted file as being malicious because the payload would not be embedded in it. And attackers could ensure the payload bypasses antivirus and sandboxing controls when being loaded from the external web page by adding a specific HTTP header in the request, Mimecast said.

“It is very easy and fast to craft, so it makes it viable for both opportunistic and high-scale attacks,” Farjon says. A user, however, would need to click on a warning box in order to enable the remote content, he adds. “This isn’t a configuration issue since it is enabled by default. It’s a security issue rather than a security vulnerability, as per Microsoft,” he says.

Microsoft itself pointed to its previous guidance around DDE in response to Mimecast’s new exploit. “For this technique to work, a victim would need to be socially engineered to bypass multiple security prompts prior to loading external data or executing a command from a DDE formula,” a spokeswoman said in an emailed statement.

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/new-exploit-for-microsoft-excel-power-query-/d/d-id/1335083?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

2001: Linux is cancer, says Microsoft. 2019: Hey friends, ah, can we join the official linux-distros mailing list, plz?

Microsoft’s transformation into a fully paid-up member of the Linux love-train continued this week as the Windows giant sought to join the exclusive club that is the official linux-distros mailing list.

The purpose of the linux-distros list is used by Linux distributions to privately report, coordinate, and discuss security issues yet to reach the general public; oss-security is there for stuff that is already out in the open or cannot wait for things to bounce around for a few days first.

Sasha Levin, who describes himself as a “Linux kernel hacker” at the beast of Redmond, made the application for his employer to join the list, which if approved would allow Microsoft to tap into private behind-the-scenes chatter about vulnerabilities, patches, and ongoing security issues with the open-source kernel and related code. These discussions are crucial for getting an early heads up, and coordinating the handling and deployment of fixes before they are made public.

To demonstrate that Microsoft qualifies for membership alongside the likes of Ubuntu, Debian, and SUSE, he cited Microsoft’s Azure Sphere and the Windows Subsystem For Linux (WSL) 2 as examples of distro-like builds.

Azure Sphere is Microsoft’s take on edge computing, with its own flavor of Linux running on Arm-based hardware. It has, however, resolutely remained in preview. WSL 2, also in preview, is based on a tweaked version of the Linux 4.19 kernel and took a bow for Windows Insiders earlier in June. Levin reckons it will be generally available in 2020 (so its official release won’t coincide with the increasingly mythical 19H2 build of Windows 10.)

Levin went on to highlight that Microsoft has plenty of users not employed by the Windows giant, its Linux builds aren’t based on someone else’s distribution and, of course, it contributes to the community.

Satya Nadella speaking at a Microsoft cloud event

Redmond top man Satya Nadella: ‘Microsoft LOVES Linux’

READ MORE

Levin has indeed been an active member of the community. A glance at the changelog for the 5.0.15 Linux kernel is peppered with his sign-offs, often along with Greg Kroah-Hartman, a fellow at the Linux Foundation. It was therefore not surprising to see Kroah-Hartman vouch for Levin. Kroah-Hartman pointed out that Levin has full write permissions to the stable kernel trees, and applauded Microsoft’s application to sign up.

Microsoft would join such Linux luminaries as Google’s Chrome OS team and Red Hat on the list. Penguinistas concerned that the number-two cloud flinger’s appearance is a sign of the creeping corporatisation of the Linux world’s once carefree free-for-all would be well advised to note that another kindly, caring software giant, Oracle, also has representatives on the list. And don’t forget: most Linux kernel development is done by engineers working at organizations like IBM-gobbled Red Hat, Intel, and the Linux Foundation these days, anyway.

It is indeed a measure of how far Microsoft, famed for jealously guarding its software secrets and once describing Linux as a cancer, has come that it has the distro chops to qualify for lists dedicated to dealing with security issues affecting open source software.

“What were seeing here is that Microsoft wants access to early security alerts on Linux,” said open-source pioneer Bruce Perens, in a phone call with The Register on Thursday. “That’s why specifically they’re asking to be on this list. They’re joining it as a Linux distributor because that’s how it’s structured. Microsoft obviously has a lot of Linux plays, and it’s their responsibility to fix known security bugs as quickly as other Linux distributors.”

Perens said he would expect large cloud providers to do the same if they haven’t already. “I would expect Chrome OS has the same kinds of problems,” he said.

Thanks to Register reader Alan J. Wylie, who forwarded us the thread. ®

Additional reporting by Thomas Claburn in San Francisco.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/27/microsoft_linux_distro_list/

While we were raging about Putin’s meddling and Kremlin hackers, Five Eyes were pwning Yandex, Russia’s Google

Hackers from the Five Eyes intelligence agencies have been accused of breaking into systems at Yandex, dubbed Russia’s Google.

A report by Reuters today cites four sources claiming Western spies are believed to be behind a malware infection spotted spreading among developer machines at the Russian search, webmail, and ecommerce giant Yandex over several weeks in October and November last year.

The Windows malware, dubbed Regin, was developed and wielded by Britain’s GCHQ and America’s NSA to spy on VIPs around the planet, according to top-secret files leaked by Edward Snowden. The modular and adaptable software nasty is primarily designed to be used for extended surveillance operations.

In the case of Moscow-based Yandex, the malware was apparently used to follow a specific group of programmers within the organization’s research and development division. It is thought the West’s hackers wanted to figure out a way to covertly break into specific user accounts and harvest private messages and other sensitive data.

“Cyber attacks are a common occurrence throughout the world. This particular attack was detected at an early stage by the Yandex security team,” a Yandex spokesperson told The Register in the past hour.

Regin super-malware has Five Eyes fingerprints all over it says Kaspersky

READ MORE

“It was fully neutralized before any damage to Yandex customers’ data was done. At this point in time we are not disclosing any further details about the attack. The Yandex security team’s response ensured that no user data was compromised by the attack.

“Ensuring the security of user data is of critical importance to us. Following the attempted attack, we took the necessary measures to ensure that we would not be susceptible to such an attack in the future. We continue to employ all relevant cyber defense tools and also cooperate with leading third-party experts and providers to protect our users’ privacy.”

Russian infosec giant Kaspersky, which published an investigation into Regin back in 2014, was called in by Yandex to help clean up the infection and help attribute the attack to Five Eyes intel agencies. When contacted by The Register, Kaspersky declined to comment.

It’s tempting to chalk this up to “spies do spying.” It is no secret that the NSA and other Five Eyes member agencies have sought to infiltrate critical government and private sector organizations in Russia and other nations to extract intelligence.

However, at a time when the US government has been publicly criticizing other countries for hacking American public and private sector networks as part of their own spycraft, it comes off as more than a little hypocritical that Uncle Sam’s own white/grey/black hats were hard at work infiltrating one of Russia’s largest online businesses. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/27/nsa_yandex_hack/

Understanding & Defending Against Polymorphic Attacks

Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here’s why.

I first wrote about polymorphic malware four years ago. I recall having a hard time getting an editor to approve publication of my piece because he claimed none of his readers would be interested in the concept. Yet in the time since then, polymorphism has gone from virtually unknown to standard practice by malware writers. Indeed, it has become so common that most descriptions of attacks don’t even call it out specifically. Webroot in its annual threat assessment from earlier this year reported that almost all malware it has seen had demonstrated polymorphic properties.

The term refers to malware that can adapt to conditions and change its behavior to try to avoid detection. A recent example is the After-Shock-3PC malware which targeted a number of media websites. It frequently switched its active code to spoof online payment systems, in the process trying to appear as if it belonged on the computers that it infected. It was even partially successful.

Polymorphic malware has become popular because criminals can purchase malware construction kits that include this feature, such as the kits that have produced the Cobalt Strike, Fallout, and Orcus malware families. Another reason for the attraction is that polymorphic code is harder for researchers to pick apart and track down its shifting series of operations.

Actually, polymorphic malware is far from a New Thing. The first piece of such malware could be traced to 1990 with Ralf Burger’s Chameleon. But what is good for attackers is also good for defenders. Using polymorphic principles to confuse an attacker has become a rich research area, especially for academics. They also call the concept a “moving target defense,” and there have been two major two Association of Computing Machinery conferences devoted to the subject: the first one in November 2014 in Arizona and a second one in November 2015 in Denver.

That research has spawned a number of vendors that incorporate polymorphic methods using one (or more) of three major protective tactics to defend your resources:

  • Using network-based actions such as changing IP addresses,
  • Using host-based actions such as changing host names and other identifying characteristics, and
  • Using application-based actions such as recompiling code or changing memory locations of executables.

This last tactic is used by several vendors, including Polyverse and Morphisec. The latter has been a leader in this area and earlier this year closed a $12 million series B funding round. Its software is now installed on 2 million endpoints. Other startup vendors, such as CyActive, have been absorbed by PayPal, indicating how important this technology is for online-centric businesses that want to shore up their defenses.

Shape Security has a network-based product that is used to block distributed denial-of-service and man-in-the-browser attacks, working with an ordinary network firewall to redirect traffic to critical web resources. There are also numerous other security vendors that claim to block some kinds of polymorphic malware vectors as part of their overall firewall, web app/email security gateways, or intrusion-detection products.

Clearly, its time has come, on both offensive and defensive sides.

What are the main takeaways for security staffs? First, study the concepts behind the moving target defense to see if this can benefit your own operations. Next, consider using one of the defensive vendors mentioned above to protect your most critical online assets. Look at recompiling your custom apps to include polymorphic methods to help stay ahead of attackers. Finally, examine your existing threat detection portfolio and check to see if anything can recognize polymorphic attack scenarios properly. Certainly, the attackers will continue to use these methods to evade detection, so we have to get better at ferreting them out and stopping them.

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

David Strom is one of the leading experts on network and Internet technologies and has written and spoken extensively on topics such as cybersecurity, VOIP, convergence, email, cloud computing, network management, Internet applications, wireless and Web services … View Full Bio

Article source: https://www.darkreading.com/perimeter/understanding-and-defending-against-polymorphic-attacks/a/d-id/1335006?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

How Hackers Infiltrate Open Source Projects

The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.

The open source software that the vast majority of organizations include in their critical applications is vulnerable to exploitation from threat actors taking part in its creation. That’s the message from security professionals who point to the nature of open source projects and the ubiquity of the code as a real threat to enterprises.

Once insinuated into an open source project, criminals have a wide range of options, but within a narrow window: “Whether it’s a backdoor keylogger, or Trojan of some sort, it needs to net them something valuable quickly, or they need to do it in a really slick way so they don’t get found out for a while,” says Brad Causey, owner of Zero Day Consulting.

The combination of flexibility and availability makes open source project hacking an opportunity that criminals are willing to sieze. “It’s a pretty well-known attack vector. And I would I would expect that it’s probably happening more than we’re aware of,” says Chris Eng, chief research officer at Veracode.

Other experts agree. “It’s not only heard of, it’s happening all the time around us. We know of such actions from history and there’s no reason to believe that it’s not still going on,” says Eran Yalon, head of security research for Checkmarx. 

In almost all open source projects, contributors must have their work vetted by other members before the code is accepted as part of the project. The level of review varies with the individual’s reputation — as they become more trusted, fewer layers of review may be required. Especially in the larger, more well-known open source projects such as major Linux distributions, the procedures are well-defined and the labor pool large enough to enforce those procedures on a consistent basis.

“The smaller projects don’t have those resources to provide the level of security that the larger project have,” says Causey. “So you see those projects getting compromised more often.”

Small Project, Big Impact

Experts point to very small open-source projects as the primary target for malicious actors looking to insert malicious code.

“A very small package can be a dependency of larger packages, and there’s no limit on how many layers deep the dependencies can go,” says Yalon. “When you think you’re building a project with one or two dependences, you could actually be using hundreds, and there’s no way of really checking all of them.”

An open source project published and maintained by a single individual, Event-stream, was taken over by a malicious actor who managed to insert attack code into the code library distributed through NPM, a popular package manager for Javascript developers.

“Event-stream was a project run by a developer who didn’t have enough time to maintain it,” explains Yalon. “A malicious user convinced him that he could take over the project.”

After taking over the project, the code was maintained as usual — for a time. Then, the malicious owner changed a package that event-stream itself depended on, inserting code that was able to hijack certain Bitcoin wallets.

How big was the reach of this attack? The project code is downloaded almost 1.5 million times each week, and it used in more than 1,600 other packages that are, themselves, downloaded millions of times.

Another non-malicious incident exemplifies how profound the impact of a small package can be: On March 23, 2016, a developer named Azer Koçulu removed 250 modules he had written and distributed through NPM. One of those modules was a very small piece of code (11 lines) that added spaces to the left side of a string of text to make it fit into a variable definition. “left-pad” was, as it turns out, part of the code collection (known as dependencies in development-speak) used in thousands upon thousands of enterprise and commercial programs around the world, including those built with Javascript development mainstays Babel and Node.

And upon left-pad’s un-publishing, those thousands upon thousands of applications stopped working. While it was easy for developers to re-create the functionality, the short-term impact of this simple act was huge.

(Nearly) Universal Threat

“I do think [that it’s] important to just underscore how prevalent open source is,” notes Engz. Gartner data shows that 95% of enterprises use open source code in their internal projects, he says.

Given the time pressures inherent in agile and devops methodologies, the one certain defense — the internal development team writing its own functions and libraries — is not likely to be adopted, Eng says.

So what is a dev group to do to increase code security?

“Step number one is to be selective about what libraries and what open source projects you choose to roll into your technology stack,” says Causey, adding that some projects have much better track records than others.

Next, he says, be sure that the project for the code used is an active project, with regular updates. “Look into the history of the activity of the project to make sure it’s a good project, meaning that there’s a lot of active folks out there,” he explains. This makes it far more likely that any vulnerabilities will be quickly patched.

And once the patches are written, they have to be applied, says Eng. He says that he’s seen too many organizations that get excited about zero-day vulnerabilities and nation-state actors fail to keep up with “basic code hygiene.” That’s “the basic blocking and tackling like simply keeping your open source code up-to-date, and doing basic code scanning,” he says.

It’s all about trust: trust in the open source project and in the internal developer using the code, Yalon says. “A malicious open source packages isn’t a problem if no one uses it,” he says. “There should be rules inside every it organization for who can upgrade or change software packages. Someone should take a look to see what’s going on.”

Related Content:

 

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/application-security/how-hackers-infiltrate-open-source-projects-/d/d-id/1335072?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Inside MLS, the New Protocol for Secure Enterprise Messaging

As personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security.

As the world moves toward end-to-end encryption for personal messaging platforms, businesses are challenged to integrate the same level of security in corporate messaging apps.

Even encryption protocols for person-to-person messaging are still undergoing development. Services want to reduce the amount of sensitive data they store; however, only a few encryption protocols – Signal, for one – have been scrutinized for security.

The Signal protocol, which rolled out to WhatsApp’s base of one billion users in 2016, is the first end-to-end encryption protocol to be globally deployed. Security guarantees of the open-source protocol include forward-secrecy and recovery from key compromise. And while a few personal messaging systems have adopted Signal, corporate messaging has failed to follow.

“In the consumer space there are a few services with end-to-end encryption but in the business space it’s very rare,” says Raphael Robert, head of security at Wire, which launched in 2014 as a secure messenger primarily built for consumers. Since then, it has repositioned itself to build a secure business collaboration system. Wire is currently in the midst of working to develop Messaging Layer Security (MLS), a new protocol designed to facilitate more secure enterprise messaging platforms.

Technical challenges often hold companies back from adopting end-to-end encryption. “The bigger the organization, the harder it is to make a change in general,” says Robert. Scalability is a key problem: WhatsApp, for example, uses a protocol dubbed Sender-Keys to support group chats. The problem is, the protocol doesn’t support post-compromise-security, meaning in a simple deployment an employee who left the company may still read messages.

In many modern enterprise environments, products use transport encryption between client and server but messages and content being shared aren’t encrypted on the server. This information usually ends up in a large database, he continues, where it’s vulnerable to third-party access. A cybercriminal needs only an employee’s credentials to break in and get it.

“This is a huge risk, which doesn’t really meet the requirements of businesses in general,” he adds. “There is typically very sensitive information.”

Messaging Layer Security (MLS): A New Protective Protocol

To address the many issues in enterprise messaging security, the Internet Engineering Task Force (IETF) is building the MLS group messaging protocol. Its goals for MLS differ from those of pairwise protocols: it aims to allow practical groups up to 50,000 clients, cover multiple industry use cases including federation and Web browser support, and offer formal security guarantees.

When Wire introduced end-to-end encryption to its system in 2016 and open-sourced its code base, secure messaging protocols were “always a big issue,” says Robert. There was no open standard they could adopt. That summer, during the IETF meeting in Berlin, Wire proposed a standard that was protected by modern security properties and could be used by companies large and small.

MLS has since been undergoing development. While initiatied by Wire, along with Mozilla and Cisco, in 2016, it has received support from major tech companies along the way: Facebook, Google, INRIA, and Twitter have all contributed to the effort. “In the past 18 months we’ve worked a lot on the core protocol to make sure of what kind of security guarantees we want to achieve and how we can achieve them,” says Robert. Now, they’re finalizing it for the academic community to review.

How will it be different? Researchers proposed it should be possible to use MLS in a federated environment, meaning you don’t need a central server or central cloud to implement it. Employees should be able to communicate across clouds and devices, Robert explains.

Many businesses also struggle with the risk of shadow IT, he continues. People rely on their mobile apps to communicate internally and externally, and it’s difficult to regulate. Most employees use multiple devices, which most existing protocols “never really took into account,” he adds. Since its inception, the people behind MLS wanted to address security across devices.

“One of the core goals of MLS was to support multi-device scenarios and support groups, particularly large groups, particularly large groups, and to make encryption as efficient as possible,” he adds. With many protocols, encryption for groups can get expensive.

By next year, he hopes, MLS will be ready to integrate into messaging platforms. Robert, along with INRIA’s Benjamin Beurdouche and independent researcher Katriel Cohn Gordon, will discuss the research behind, and details of, MLS this summer at Black Hat USA in a briefing entitled “Messaging Layer Security: Towards a New Layer of Secure Group Messaging.”

Related Content:

 

 Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/perimeter/inside-mls-the-new-protocol-for-secure-enterprise-messaging/d/d-id/1335075?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

7 Ways to Mitigate Supply Chain Attacks

Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.PreviousNext

Image Source: Shutterstock

Image Source: Shutterstock

Breaches resulting from third-party security lapses are on the rise. Last year, 61% of surveyed US organizations said they had experienced a breach caused by one of their vendors or another third party. Some 75% said they believed such incidents were only going to increase.

The growing complexity of the third-party landscape bears much of that blame, according to the Opus/Ponemon Institute survey. While companies in the survey, on average, said they shared confidential and sensitive information with as many as 583 third parties, barely one-third had as much as an inventory of these entities. Some 69% said they did not have centralized control over third parties, and more than 60% did not have adequate resources for managing third-party risk.

In a separate survey conducted this year by BitSight and the Center for Financial Professionals, 97% of financial services companies said third-party risk were becoming a major concern. Nearly eight in 10 companies said they had already terminated a business relationship, or had ratcheted it down, over cybersecurity issues. Barely 22% said they were continuously monitoring third-party cyber-risk.

“Supply chains are difficult to secure. They create risk that is hard to identify, complicated to quantify, and costly to address,” says Steve Durbin, managing director of the Information Security Forum. 

Here, according to Durbin and several other security experts, are tips for managing third-party risks.

 

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full BioPreviousNext

Article source: https://www.darkreading.com/analytics/7-ways-to-mitigate-supply-chain-attacks/d/d-id/1335068?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Former Equifax CIO Sentenced to Prison for Insider Trading

Jun Ying is the second Equifax employee found guilty of insider trading related to the massive 2017 data breach.

Jun Ying, former chief information officer of Equifax US Information Solutions, has been sentenced to four months in federal prison and a year of supervised release for insider trading.

In March 2018, the Securities and Exchange Commission (SEC) charged Ying with insider trading ahead of Equifax’s disclosure of a massive data breach in September 2017. As an executive within a US business unit of Equifax, Ying was privy to sensitive information that led him to conclude the company had been breached in August 2017, weeks before the incident was made public.

On Aug. 25, 2017, Ying messaged a colleague to warn Equifax may have been breached. A few days later he exercised all of his stock options and received 6,815 shares of Equifax stock, which he sold to receive proceeds of $950,000. He realized a gain of more than $480,000 – avoiding a loss of over $117,000. Equifax announced the breach on Sept. 7; its stock price fell.

Ying, who was next in line to be Equifax’s global CIO, has also been ordered to pay restitution of $117,117.61 as well as a $55,000 fine. He was convicted of these charges on March 7, 2019.

This is the second Equifax employee to be found guilty of insider trading related to the 2017 data breach. Sudhakar Reddy Bonthu, former Equifax manager, pleaded guilty in July 2018.

“If company insiders don’t follow the rules that govern all investors, they will face the consequences for their actions,” said Chris Hacker, special agent in charge of FBI Atlanta, in a statement. “Otherwise the public’s trust in the stock market will erode.”

Read more details here.

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/former-equifax-cio-sentenced-to-prison-for-insider-trading/d/d-id/1335078?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple