STE WILLIAMS

VLC media player gets biggest security update ever

Earlier this month, VideoLAN – the maintainers of the world’s most popular open source media player, VLC – issued the biggest single set of security fixes in the program’s history.

Numbering 33 in all, this included two marked critical, 21 mediums and 10 rated low, bringing VLC to 3.0.7.

But perhaps the most interesting part of the story is less the flaws themselves but the process through which they were found.

The most serious flaws

The first of the criticals, CVE-2019-12874, discovered and documented in detail by Symeon Paraschoudis of Pen Test Partners, is an out-of-bounds write flaw in the FAAD2 MPEG-4 and MPEG-2 AAC decoder library used by VLC 3.0.6 and earlier.

The second is CVE-2019-5439, a stack buffer overflow in version 4.0.0 beta’s Reliable Internet Stream Transport (RIST), potentially allowing remote code execution (RCE) at the user’s privilege level, if a the user can be persuaded to run a malicious AVI or MKV video file.

The mediums, meanwhile, are described by VideoLAN’s Jean-Baptiste Kempf as “mostly out-of-band reads, heap overflows, NULL-dereference and use-after-free security issues,” which could crash VLC.

Bug bounties

The number of vulnerabilities serves to remind of the complexity of media players, which must support numerous file formats, Codecs, and text renderers, any one of which can open security holes. However, according to Kempf, the number of fixes this time was directly connected to the bug bounty sponsorship offered under the EU-FOSSA 2 program, which rewards hackers for finding critical flaws in open source software used by EU institutions.

By the standards of proprietary programs, this is pretty modest – only $220,000 had been scheduled for payment via the Intigrity/Deloitte and HackerOne platforms as of April 2019 – but this is still a step up for open source reporting, which normally relies on researchers looking for kudos alone.

But providing fixes for open source flaws doesn’t solve the question of who will create the fix, which is why EU-FOSSA 2 offers a 20% bonus to researchers who take the time to do that.

Interestingly, Kempf admits he’s not a fan of bug bounties on the basis that they incentivise researchers to find flaws but not the fixes for the flaws. As he writes:

What about you give money to VLC instead of random hackers?

Not all of the “hackers” who send VideoLAN news of security weaknesses are helpful either:

Some reporters were more than distasteful, insulting, impatient, trying to get 2 times the bounty for the same bug, or even reporting the issues to other programs (Android one) to get more money.

As explained by VideoLAN’s alert, anyone running 3.0.6 and earlier should update to 3.0.7 as soon as possible, refraining from opening files from untrusted third parties until they do. VLC doesn’t update automatically but does have notification (Tools Preferences Privacy Network Interaction Activate Update Notifier) that is enabled to check for new versions every three days by default.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/sAL4j4fpxRI/

Social engineering forum hacked, user data dumped on rival site

Social Engineered, a forum that bills itself as dedicated to the “Art of Human Hacking,” may have been given a dose of its own medicine: in mid-June, its user data was leaked and dumped on a rival forum.

On Thursday, the founder of Social Engineered, who goes by the username Snow101, confirmed the breach, blaming a MyBB vulnerability:

Mybb had a vulnerability yet again and the site got breached along other websites using Mybb. We moved over to xenforo i suggest changing your passwords immideately [sic].

MyBB is open-source, free software used to create and run online forums.

Snow101 said that Social Engineered has now moved over to the XenForo platform to try to avoid a repeat of the data breach. The forum owner is also looking for contributions: Snow101 asked members to voluntarily chip in to help in the shift from a free, open-source project to a commercial forum.

According to Bleeping Computer, whoever’s behind the leak posted that they had “uploaded the full database and root directory of this website.”

MyBB’s MyBad month

MyBB has had a shaky month. It was one of the many CMSs (content management systems) that researchers recently found weren’t storing passwords securely. They found that MyBB, along with a dozen others, was using the now obsolete MD5 hashing function.

Weak password hashing couldn’t have caused the breach at Social Engineered, but it might make the consequences of the breach much worse as hackers make light work of cracking the site’s exposed password database.

However, a bug that could lead to a catastrophic site breach was discovered earlier this month. MyBB released updates that fixed vulnerabilities in version 1.8.20 and older that could have allowed a remote attacker to get complete control over a site and, potentially, the server.

RIPS Technology researchers had discovered two security vulnerabilities in the code – a stored XSS vulnerability caused by a parsing error in posts and private messages and an authenticated Remote Code Execution (RCE) vulnerability that can be exploited by administrators of a forum. Chain them together, and taking over a user account is a snap, they said:

An attacker merely needs a user account on a target forum to send an admin a private message containing malicious JavaScript code, which exploits the RCE vulnerability. This leads to a full remote take over of a target board by an attacker, as soon as as an administrator who is at the same time authenticated in the backend context opens the malicious PM. No further user interaction is required.

A lot of worried hackers

According to a post on Have I Been Pwned, the breach happened on 13 June 2019. The data, lifted from 89,392 compromised accounts covering a total of 55,121 users, included usernames, private messages, IP addresses and passwords, which were stored as salted MD5 hashes.

Poetic justice?

If all an attacker had to do was to get an account on the forum and to then send a malicious link in an email to an admin, who then – delicious irony alert – opens it and triggers a takeover, does that mean that Social Engineered got socially engineered by an attacker using the RIPS Technologies’ chain of flaws?

We can’t say for sure what happened, unless the social engineers engineer their mouths open and spill the beans.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/vhHhn9fwQQY/

Hacker threw Molotov cocktail, dropped USB drive of his DDoS deeds

If you’re going to go around DDoSing businesses, it’s probably not the slickest idea to carry a thumb drive full of evidence in your pocket while you’re hurling a Molotov cocktail at one of their brick-and-mortars.

A now-35-year-old Belgian man who was already sentenced to prison for hurling that bomb has had his sentence extended by 18 months because of what investigators found on a USB drive that the man dropped during or after his 2014 attack on a Crelan Bank in the town of Rumbeke, Belgium, according to Belgian news site Het Laatste Nieuws (HLN).

HLN reported last week that the USB held evidence showing that the man, identified in court documents only as Brecht S., was a member of the hacker groups that brand themselves as Anonymous Belgium and Cyber Crew.

It also implicated the man in launching a distributed denial of service attack (DDoS) against Crelan Bank that took it offline for hours, and that he extorted a pizza shop, DDoS-ing it several times until the pizzeria paid him to call off the attacks.

Investigators who searched Brecht’s devices and history reportedly found evidence that Brecht had participated in large-scale international cyber attacks, including attacks launched against the Fédération Internationale de Football Association (FIFA): the world soccer’s governing body.

FIFA has been hacked multiple times: The first time, in 2017, led to the publishing of footballers’ failed drug tests. At the time, the attack was attributed to the Russian hacking group Fancy Bear, also known as APT28.

The second intrusion was dubbed the largest ever leak in journalism: it involved more than 70 million documents, totaling 3.4 terabytes of data that covered events leading up to last year.

As HLN reports, Brecht told the court that he unleashed the DDoS against Crelan Bank in retaliation after €300,000 ($342,000) disappeared from his mother’s account. The money was looted after a divorce with his father, he said. Brecht also said that he couldn’t get a hearing from the bank on the matter.

Crelan’s servers were swamped, unable to conduct transfers for hours.

As far as the multiple extortionist DDoS attacks against the pizzeria go, Brecht said that he was having problems with drugs at the time.

According to his defense lawyer, Brecht had noble intent, as do many who’ve taken part in collective hacks over the years, be it DDoS attacks against hospitals in the #opJustina crusade or fighting the Islamic State by defacing loyalists’ profiles with porn.

HLN reports that the case law isn’t clear about whether hacking with ethical purposes is prohibited or not. That’s surprising to hear, particularly if you’re in the US, where prosecutors come down like a ton of bricks on hackers, noble intent or no.

HLN reports that a second, unidentified hacker from Bruges – an accomplice of Brecht’s – was also arrested. He was fined 1,200 euros (US $1,365).

Brecht had already been sentenced to a three-year jail term for arson related to the Molotov cocktail attack. The 18-month extension will be added to that term. According to ZDNet, Brecht hadn’t yet begun serving the jail time for arson: the prison time had been delayed so that he could receive psychological counseling.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Vrm1oHt7kU0/

Wipro wasn’t a one-off: Same hacking crew targeted scores of firms, big and small – researchers

The criminals behind the Wipro phishing attack from earlier this year also targeted Western Union, Expedia, Rackspace and a whole host of other big companies, according to threat intel outfit RiskIQ.

In a report published this morning the firm said the Wipro attackers were running a much larger series of phishing campaigns, aimed at extracting cash from hapless businesses whose files had been forcibly encrypted.

Indian outsourcing behemoth Wipro discovered earlier this year that its email systems had been compromised, seemingly for some time, by black hats using it as a jumping-off point to target Wipro customers.

Fish hook in a clear light blue tropical ocean. Photo by Shutterstock

Indian outsourcing giant Wipro confirms flushing phishers from systems

READ MORE

RiskIQ said it had “identified at least five distinct attack campaigns based off analysis of the actor-owned infrastructure,” having analysed “both Passive DNS and SSL certificate data”.

Targeted companies included Western Union, Moneygram, Rackspace, Capgemini, Wipro, Staples, Costco, Expedia, Virgin Pulse, Messagelab and Sendgrid.

A reasonably sophisticated group* with some knowledge of how to cover their traces were behind the attacks – and were said to have used off-the-shelf phishing templates to compromise the Indian outsourcer, as well as hitting a number of other companies.

Those templates appeared to have been drawn from a counter-phishing training product marketed by Swiss pentesting firm Lucy Security – though Lucy has strenuously denied to The Register that one of its software products was used in the Wipro compromise.

Templates from a Lucy counter-phishing training product were identical to those used by the Wipro attackers, according to RiskIQ, which said in its report: “Lucy comes with a variety of default phishing templates, and one of these templates was used during most of the phishing campaigns – including the now notorious Wipro case.”

“There is no evidence that [the hackers] used Lucy software, other than using the template design, and our analysis demonstrates significant evidence to the contrary,” said Colin Bastable, chief exec of Lucy Security. FireEye, which also investigated the group behind the Wipro hack following infosec journalist Brian Krebs’ work to reveal it in the first place, concurred with Bastable in that Lucy’s software itself did not appear to have been used by the crims.

FireEye’s CTO of strategic services, Charles Carmakal, told The Register: “The actor commonly uses public or commercially available tools that may already exist in victim environments, such as ScreenConnect, EMCO Remote Installer, CleverControl, Teramind, and Kaseya, to maintain persistence and move laterally.”

Powershell and Mimikatz

The Wipro attackers first appeared in May 2016, according to RiskIQ, and went in four distinct waves, mainly targeting services-based businesses such as digital marketing agencies, IT firms, point-of-sale and payment transfer companies and gift card providers. Later waves of attacks retargeted some of the same companies, though each wave saw around 20 to 25 separate businesses being phished.

Those phishing pages were online for just a couple of days – long enough for targeted victims to see the pages but short enough, so the attackers hoped, to evade detection and takedown.

Having phished their way into the target company, the attackers would then deploy and use the Screenconnect remote control tool, as well as the EMCO Remote Installer. Once Screenconnect was in place on a machine inside the target, the hackers then ran “small PowerShell scripts to rename the ScreenConnect product name on compromised machines.”

That Powershell script, named Babysharkpro by the criminals, would also execute a custom Mimikatz build in memory, which would dump the credentials of recently logged-in users on that particular device. Mimikatz is rather popular at the moment among black hats, as a number of telcos around the world recently found out the hard way.

“The fact that it was custom-compiled makes it an interesting sample – it does not ever hit the filesystem, as it is executed in memory only,” commented RiskIQ.

RiskIQ’s previous research includes a plausible explanation for the British Airways hack (compromised JS on the airline’s credit card payment page) as well as detailed tracking of miscreants using the Magecart malware. ®

Bootnote

* Although RiskIQ named what appeared to be two individuals it had identified from Whois records linked to domains used to host early iterations of their ransomware’s command-and-control infrastructure, El Reg has decided not to reproduce those names or details. There is, after all, little to suggest that those identities themselves hadn’t been stolen by the criminals.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/26/wipro_hack_crew_much_bigger_operation_riskiq/

It could be Rotterdam or anywhere, Wiltshire or in Bath: Euro cops cuff 6 for cybersquatting, allegedly nicking €24m in Bitcoin

European cops have cuffed six people for typosquatting – in this case spoofing a well known cryptocurrency exchange – and allegedly making off with €24m worth of Bitcoin tokens.

The arrest is the culmination of a 14-month joint investigation between Britain’s South West Regional Cyber Crime Unit and the National Crime Agency, Dutch fuzz and Europol.

The suspects, five men and one woman, were collared at their homes in Charlcombe, Lower Weston and Staverton in the UK and Amsterdam and Rotterdam in the Netherlands.

The €24m that the group are believed to have amassed is understood to have been defrauded from roughly 4,000 unsuspecting individuals in 12 countries, though Europol said the numbers are continuing to grow.

British police began the initial probe but referred the case to the European Cyber Crime Centre and the Joint Action Taskforce, hosted at Europol, after several of the crims were confirmed as living in the Netherlands, and action was co-ordinated.

The typosquatting fraudsters produced a site that imitated a genuine site to gain entry to their crypto-casualties’ Bitcoin wallets to free them of those lovely funds and their login details.

Bitcoin is now valued at more than £9,000 per unit, making it an attractive target for crims. Not a month goes by without some allegations of crypto-related scams appearing in the hallowed pages of The Reg.

In May, OneCoin, set up and run by self-appointed “CryptoQueen” Ruja Ignatova, was slapped with a fraud lawsuit and this week, Gerald Cotten, the late CEO of a Canadian crypto exchange, was found by Ernst Young auditors to have set up fake accounts containing bogus funds on his site and was alleged to have used them buy his customers’ currencies. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/26/euro_cops_slaps_cuffs_on_six_bods_for_cryptofraud/

Could Foster Kids Help Solve the Security Skills Shortage?

Foster Warriors is a new nonprofit initiative focused on helping foster kids find a place in the world, and especially in the world of security. Join us!

They are rare moments, moments when the security industry can do something that’s not only in its own best interest but could also forge enormous social change. Change lives, even save lives. This may be one of those moments. 

As the industry desperately searches for more bodies to send to the barricades, necessity has forced it to be much more creative in where it looks. Veterans, retired law enforcement, gamers, high schoolers, the neurodiverse — they’re all getting a close look to see if any among them would be interested in and suited for a career in cybersecurity.

But perhaps the biggest and most potent army-in-waiting is still getting little more than the stink eye. They’re foster kids and there are lots of them — an estimated 435,000 just in the US. They’re desperate for any opportunity to prove themselves worthy and are far more likely to go that extra mile for any employer willing to show such faith in them.

And if we’re serious about encouraging more young women to consider careers in cybersecurity, foster care to the rescue. There are an estimated 50,000 young women, aged 12–18, in foster care at any given time. So let’s give them an opportunity.

Helping foster kids find a place in the world, and especially in the world of security, could be life-changing. Even life-saving. According to the National Foster Youth Initiative:

  • Nearly 2,000 children age out of the US foster care system every 30 days, and one in every five will become instantly homeless.
  • 50% of foster kids who age out of the system still won’t have any form of gainful employment by the age of 24.
  • There is less than a 3% chance for children who have aged out of foster care to earn a college degree at any point in their life.
  • Seven out of 10 girls who age out of the foster care system will become pregnant before the age of 21.

If the security industry is worried that foster kids are too broken to be trusted, they might be right. But just not right enough to completely ignore the thousands of foster youth who might be absolutely perfect for a career in cybersecurity and a place on your team, if only given the chance. Someone like Joyous “Joy” Huggins, whose LinkedIn profile suggests she’s just about the perfect candidate for all kinds of security roles. After a stint in the Navy, Joy earned an undergraduate degree in cybersecurity followed by a Master’s in cybersecurity and now works as a threat analyst.

In her spare time, she runs an academy to help underprivileged boys and girls learn the basics of security and privacy. She’s the product of one of the toughest foster upbringings imaginable. She was dumped into foster care at just three months old, a product of a family broken by alcoholism, drug addiction, and neglect. Nine homes later, at the age of 21, Joy was dumped back out of the foster system and left to fend for herself.

“People tend to prejudge foster kids because they simply misunderstand them,” according to Huggins. “Sure, many have issues that need to be fixed. That doesn’t mean they can’t be fixed. And many have issues that are no different to any other young adult trying take those first steps on their own and in a new career.”

Joy Huggins is the face of Foster Warriors, a new nonprofit initiative focused on engaging, recruiting, training, and supporting foster youth in preparation for entry-level careers in security. For high schoolers, it means not only teaching students the basics of cyber hygiene, but also teaching them how to be security evangelists and leaders in their own schools.

For older youth, the program includes local peer support and mentoring, extensive online security training (including cyber range training), preparation for entry-level certifications like CompTIA Security+, and hopefully that key first internship. Plus, all the time working with foster care experts to make sure participating students are not just ready emotionally but practically — with access to reliable transportation, personal support networks, a safe and stable home, even guidance on personal financial management.

The biggest hope is that if enough foster kids can be transformed into cyber warriors, we can help to permanently remove the stigma from the word foster, help kids wear foster as a badge of honor instead of shame, and give a new generation some real role models with whom they can truly relate.

The pilot program is being developed in Cincinnati, Ohio, with a team of local partners and supporters before it’s introduced nationally. But Foster Warriors won’t succeed unless the security community stands up and lets these kids know they’ll be wanted and welcomed. You can help — with donations, sponsorships, or simply volunteering some of your time or skills. You can learn more at www.schooledinsecurity.org/foster-warriors. Or contact me directly via email by clicking the envelope icon under my photo. Join Foster Warriors and make a difference.

Related Content:

Neal O’Farrell has spent nearly four decades in global security and privacy. In the 1980s he led pioneering work in the field of advanced speech and data encryption, and while still in his twenties won the first contract to encrypt Ireland’s entire national ATM network.
His … View Full Bio

Article source: https://www.darkreading.com/careers-and-people/could-foster-kids-help-solve-the-security-skills-shortage/a/d-id/1335027?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

FIDO Alliance to Tackle Identity Verification and IoT Authentication

Standards group forms two new working groups to develop new open specifications.

The FIDO Alliance this week launched new initiatives to advance identity verification and the automated authentication of IoT devices on a network.

The group, which has created standards for passwordless authentication, has formed two new working groups – the Identity Verification and Binding Working Group (IDWG) and the IoT Technical Working Group (IoTTWG) – both of which it kicked off today at the Identiverse conference in Washington, DC.

Andrew Shikiar, executive director and chief marketing officer of the FIDO Alliance, says the IDW will define criteria for remote identity verification and develop a certification program and educational materials to support adoption of those specifications.

The IDWG will be led by co-chairs Rob Carter of Mastercard and Parker Crockford of Onfido. Other participating companies include Aetna, Idemia, Microsoft, Nok Nok Labs, OneSpan, Phoenix Technologies, and Visa.

Crockford, director of policy and strategic accounts at Onfido, notes that there’s no standard way today for a user to validate their government ID or driver’s license. The working group aims to develop a standard process using selfie photos as an additional authentication factor for applications that require validation, such a government agency or financial institution site.

“We’re looking at doing three things: Create technical specifications for those two processes, run certification programs, and develop a testing process for the industry,” he says.

Rolf Lindemann, vice president of products of Nok Nok Labs, says the FIDO Alliance’s new initiative seeks to standardize how a user both sets up a new account online and recovers their online account from a lost or stolen device.

“Think about what it was like 20 years ago when you wanted to set up a new account at a bank,” Lindemann says. “You had to physically go to the bank, fill out paperwork, and show your government ID: it could take up to two hours. With FIDO, we can reduce account setup and recovery to seconds.” 

The FIDO Alliance’s new IoT TWG will create IoT device authentication profiles to enable interoperability between service providers and IoT devices, automated onboarding, and IoT device authentication and provisioning via smart routers and IoT hubs.

Lorie Wigel, vice president of platform security at Intel, says the working group will look to solve the poor security of most IoT devices, including consumer and industrial products. Consumer IoT products usually come with little or no security, she notes, with weak passwords such as 0000 or 12345678, for example. 

Giridhar Mandyam, senior director for technology at Qualcomm, points out that onboarding IoT devices requires chip manufacturers to play a more prominent role in consumer devices because IoT security has traditionally been very weak. 

Today, many IoT devices don’t come with an integrated user interface to guide users through initial set-up, which is why a critical goal of manufacturers is to enable a device to work when it’s first powered up. It typically takes multiple steps to associate an IoT device to an online service, such as pairing the device with a smartphone or tablet to configure it. This can require discovering and downloading a manufacturer-provided app to a smartphone, pairing the phone with the IoT device, and entering configuration information on the application. 

The IoT working group plans to develop a comprehensive authentication framework for IoT devices in keeping with FIDO’s basic mission of passwordless authentication. Toward that goal, the working group hopes to develop a standard way to automate the onboarding of IoT devices on to a local network or public cloud, says Intel’s Wigel.

“We’re very excited that this work will be part of an industry-wide standards effort,” Wigel says. “We think the fact that it will be based on open standards will reduce a lot of barriers to adoption.”

The IoTTWG will be led by co-chairs Marc Canel of Arm Holdings and Giridhar Mandyam of Qualcomm. Along with Intel, other members of the group include Idemia, Lenovo, Nok Nok Labs, OneSpan, and Phoenix Technologies.

Michael Barrett, former CISO at PayPal who also worked closely with Nok Nok Labs and the FIDO Alliance to create the FIDO standard, says it makes sense that FIDO is expanding its scope. 

“It’s a generic enough standard that can be applied as an added layer to many areas, including identity proofing, IoT and eventually authentication for blockchain,” Barrett says. FIDO was designed as an open standard, much like TCIP/IP. 

Related Content:

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Article source: https://www.darkreading.com/endpoint/fido-alliance-to-tackle-identity-verification-and-iot-authentication/d/d-id/1335044?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Stop us if you’ve heard this one: US government staff wildly oblivious to basic computer, info security safeguards

A US Senate probe has once again outlined the woeful state of computer and information security within Uncle Sam’s civil service.

A committee report (PDF) examining a decade of internal audits this week concluded that outdated systems, unpatched software, and weak data protection are so widespread that it’s clear American bureaucrats fail to meet even basic security requirements.

To produce this damning dossiers, the Senate’s Permanent Subcommittee on Investigations pored over a decade of findings from inspector-general-led probes into information security practices within the Department of Homeland Security, State Department, Department of Transportation, Department of Housing and Urban Development, Department of Agriculture, Department of Health and Human Services, Department of Education, and the Social Security Administration.

Of those eight organizations, seven were found to be unable to adequately protect personally identifiable information stored on their systems, six were unable to properly patch their systems against security threats, five were in violation of IT asset inventory-keeping requirements, and all eight were using either hardware or software that had been retired by the vendor and was no longer supported.

Department of Homeland Security

Audit finds Department of Homeland Security’s security is insecure

READ MORE

“Despite major data breaches like OPM, the federal government remains unprepared to confront the dynamic cyber threats of today,” the report noted.

“The longstanding cyber vulnerabilities consistently highlighted by Inspectors General illustrate the federal government’s failure to meet basic cybersecurity standards to protect sensitive data.”

In delivering the report, the Senate panel pointed out some of the previously reported security findings, such as a 2017 Homeland Security audit that found a malware scanning tool first introduced in 2013 was at the time only successfully running at 65 per cent of agencies. Or the 2018 inspector general finding that the department wasn’t even able to comply with its own standards for an effective security program.

The findings were equally grim for other major federal departments. At Health and Human Services, for example, IT staff were unable to account for how much of its $10.2bn operations and maintenance budget was being spent on outdated, legacy systems that had in some cases been in use for as long as 14 years.

Meanwhile, the Department of Education Inspector General said that every year since 2011 the agency failed annual tests of its ability to keep unauthorized users from accessing its private network and stealing highly personal information.

Such failures, the committee noted, were depressingly common among all eight of the organizations studied, and were indications of a much more widespread lack of urgency to secure sensitive data.

US government’s $6bn super firewall doesn’t even monitor web traffic

READ MORE

“The failures cited above are not new,” the committee noted. “Inspectors General have cited many of these same vulnerabilities for the past decade.”

Despite issuing the scathing review, don’t expect the Senate to actually hold anyone accountable for the lapse. Beltway news site The Hill cited an unnamed Congressional source in reporting that there are no hearings scheduled nor legislation in the works to address the findings of the report.

In other words, government agencies have been found unable to properly manage their own security, but they will be allowed to continue to do so anyway.

Apropos of nothing, Americans can register to vote in state and federal elections here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/26/government_security_failures_report/

Email Threats Continue to Grow as Attackers Evolve, Innovate

Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.

Email continues to be an extremely effective vector for delivering malicious content because of how adept attackers have become at tricking users over the years.

The latest examples include the increasing use of malicious URLs in emails rather than attachments, a trend toward use of HTTPS domains for hosting malicious sites, and new variants of impersonation fraud.

FireEye recently analyzed a sample set of 1.3 billion emails for the first three months of 2019 and counted more URL-based email attacks than attachment-based ones in the first quarter.

URL attacks involve emails with embedded links pointing to a malware download site or a phishing site designed to steal a user’s account credentials or credit card data. Emails containing such links are often harder to detect and block than ones with malicious attachments, according to FireEye.

In many cases, attackers have been embedding such links in emails with very little or no content in them in an attempt to bypass email filters and to try and get the recipient curious enough to click on the link. According to FireEye, there was a spike in the number of content-less emails in January. Sometimes the emails have contained nonclickable URLs that are activated when a user copies and pastes it into a browser, the vendor noted.

FireEye observed a troubling 26% quarter-over-quarter increase in malicious URLs pointing to phishing sites hosted on HTTPS domains. The sites, and the phishing lures to get users there, often spoofed major brands. In fact, in Q1 2019, FireEye observed a 17% quarter-over-quarter increase in phishing attacks involving the misuse of a well-known brand name.

Microsoft was by far the most spoofed brand, accounting for 30% of all detections in the first quarter. Other frequently spoofed brands included Apple, Amazon, PayPal, and OneDrive.

“The increase in phishing sites using HTTPS was a very interesting shift,” says Ken Bagnall, vice president of email security at FireEye. Also significant was the number of phishing sites spoofed to appear like different Microsoft login pages that FireEye observed in the first quarter. “This really highlights how useful attackers see getting access to a victim’s Office 365 credentials,” Bagnall says.

Exploiting Trust in File-Sharing Sites
Also increasing significantly in the first quarter was the number of URL links pointing to malicious files hosted on widely trusted cloud-hosted file sharing sites, such as Dropbox, OneDrive, Google Drive, and WeTransfer. Threat actors are increasingly using such file-sharing services to host malicious content because the sites pass the domain reputation checks that many security tools use for vetting links, FireEye said.

Some of these file-sharing sites even let users preview the hosted content and offer a link that can be clicked without having to download the file, the vendor said. “Attackers are simulating user behavior here,” Bagnall notes. File-sharing sites have become very common, so users are likely to be less suspicious of interacting with content on these services. “There was a very significant increase in OneDrive this quarter, and we will see more targeting based on customers usage of cloud services in their workflow,” he says.

Impersonation email attacks, where an attacker might pretend to be a CEO or a CFO to trick employees into initiating a fraudulent wire transfer or some other action, continued to grow and evolve in the first quarter. In the past, such attacks targeted employees in the accounts payable department. In this year’s first quarter, FireEye observed an increase in attacks targeting the payroll and supply chain departments.

For organizations, such developments highlight the need for multilayered defenses. On the technology front, they need a tool stack that innovates in line with attacker behavior, Bagnall says. Security awareness training and education are important as well. So are controls that protect payments processes and prevent individuals in an organization to change bank details or initiate similar actions based on an email communication alone, he says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/email-threats-continue-to-grow-as-attackers-evolve-innovate/d/d-id/1335054?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Serious Security: Rambleed attacks blunted – the OpenSSH way

We all know that you’re not supposed to save raw passwords to disk these days.

The reason is obvious: disk storage is generally supposed to be both permanent and shared.

Once you’ve written something to disk unencrypted, there’s always a chance that someone else might be able to get it back later, especially if they know it’s there and it’s worth looking for.

At worst, they could shut down the computer your program is running on, remove the disk (or desolder the chips that make up a solid-state storage device) and try to extract the data elsewhere at their leisure.

As we like to say at Naked Security, Dance like no one’s watching. Encrypt like everyone is.

Of course, blunders happen – even companies that pride themselves on being leaders in secure coding practices have recently admitted to saving plaintext passwords by mistake.

Facebook let plaintext passwords escape into logfiles for about seven years before noticing the error; rivals Google made a similar mistake in a sysadmin toolkit for an astonishing 14 years, admitting in May 2019 that “we made an error when implementing this functionality back in 2005.”

But there are well-known ways of storing passwords and cryptographic keys securely, including:

  • Salting-hashing-and-stretching passwords if all you need to do verify later that someone typed in the right password.
  • Keeping passwords and cryptographic keys in an encrypted file that is only ever decrypted temporarily into memory when a password is needed.
  • Generating keys in a tamperproof hardware device where they can be used to perform encryption and decryption but not extracted.

What about RAM?

So far, so good.

But what to do about data that’s sitting around in memory?

How do you stop someone snooping on your software while it’s running, during the temporary period that you need access to a password or an encryption key?

For example, if you want to verify a password against your salted-and-stretched database of password hashes, you need the actual password in memory briefly while you calculate its hash.

You can wipe the password from memory as soon as the calculation is finished, leaving you with a one-way hash in memory to compare against the list of hashes on disk.

The hashes can’t be reversed, so anyone who can figure out which database entry you matched against still doesn’t know anthing about the original password that was supplied.

But there’s still what automative safety gurus call TE2D, or time exposed to danger, while the password itself is being hashed.

And what if you need to keep the password or the encryption key around for some time, such as when you need to access a private key repeatedly for calculating digital signatures on a whole sequence of network requests?

Obviously, the operating system and your computer hardware can help here, by enforcing what’s called privilege separation between your application and all the other programs running at the same time.

In theory, a sysadmin with root powers might be able to snoop on what you’re doing, but your process space should be opaque to other users and processes at the same privilege level as you.

But there’s a more general concern about memory snooping these days, thanks to a series of bugs and weaknesses in most modern multi-core, multi-threaded CPUs.

Modern processors aim to boost performance by carrying out lots of different machine instructions at the same time – sometimes deferring their formal security checks until after they’ve done the work, and then relying on cancelling internally any memory accesses that weren’t supposed to happen.

Sometimes, however, even internal memory accesses that end up rejected may leave behind tell-tale signs in the chip that can be detected externally later.

And modern memory chips have such high capacities that the silicon components making up each storage location are packed together tightly enough that they may interefere with each other in ways that let you guess at better-than-even odds what data they contain.

Flaws with dramatic names such as F**CKWIT, Spectre, Meltdown and Rambleed [PDF] are programming tricks that could allow a determined adversary to use unprivileged code – software that can’t directly access data in your memory space – to make inferences about the secrets you’re keeping in RAM.

Fortunately, attacks like Rambleed aren’t perfect or definitive: they typically require lots of repetitive memory accesses, and only allow attackers to make informed guesses about what bits are stored where.

Nevertheless, the authors of the Rambleed paper were able to extract OpenSSH private keys from memory, without root privileges, provided that the keys were around in RAM for long enough.

As the researchers somewhat mysteriously summarised their results:

[We] successfully read the bits of an RSA-2048 key at a rate of 0.3 bits per second, with 82% accuracy.

While this is a worrying result, in practice they needed to recover 4200 bits of private key data (an RSA-2048 key isn’t simply 2048 bits of random data) correctly.

This took more than 30 hours of continuous probing by a program running under carefully controlled circumstances on the same computer as the OpenSSH software.

Rambleed blunted

The OpenSSH team has now added code to make RAM-sniffing attacks against private keys very much harder, with a pair of aptly named functions:

sshkey_shield_private()
sshkey_unshield_private()

If you’re interested in learning more about storing your long-term secrets in memory more safely, the OpenSSH code is pretty easy to follow, assuming you’re famililiar with C (check the file sshkeys.c), and well worth a look.

Simply put, the new key-shielding code in OpenSSH aims to keep the actual data of your private keys out of memory except during the brief moments it’s actually needed.

What to do?

Imagine you have a 256-bit Elliptic Curve keypair, which takes about 1000 bits of RAM (128 bytes), that you want to cache in memory for repeated use.

But you also want to keep it scrambled so it isn’t directly accessible, even if some other process manages to peek through your security curtains.

A good start would be to store the private key encrypted using AES-256 with a randomly generated symmetric key, and then save the symmetric key somewhere else in memory.

An AES-256 key typically needs another 384 bits of RAM (32 bytes of key and 16 bytes of initialisation vector).

A Rambleeding cybercrook’s job would therefore become much harder – they’d need to squeeze out the contents of two different memory locations, and they wouldn’t be able to use any statistical techniques to correct for bit errors in the extracted data, as the Rambleed researchers did in their attacks against unencrypted RSA keys.

A single-bit error in the random AES key would turn the “decrypted” EC keypair into useless garbage, and a single-bit error in the encrypted EC keypair data would make it similarly undecryptable, and thus similarly useless for key recovery.

But the OpenSSH authors made things exponentially more difficult for an attacker by adding an extra step to the scrambling process, like this:

  1. Generate a random data string of 131,072 bits (16Kbytes). This is called the prekey.
  2. Calculate the 64-byte SHA512 hash of the prekey.
  3. Use the first 32 bytes of the hash as a key, and the next 16 bytes as an initialisation vector.
  4. Shield the private key by encrypting it with AES-256 in Counter Mode.

In pseudocode:

shield:
  const  BLOBSIZE = 16*1024;
  string prekey   = random.bytes(BLOBSIZE);
  string hash     = digest.sha512(prekey);
  string key      = string.cut(hash, 1,32);
  string ivec     = string.cut(hash,33,48);
  wipemem(hash);
  string shield   = encrypt.aes_ctr(private,key,ivec);
  wipemem(key,ivec,private);

Instead of keeping the raw value of private in memory, you store the pair {prekey,shield}, from which you can temporarily extract private when needed:

unshield:
  string hash     = digest.sha512(prekey);
  string key      = string.cut(hash, 1,32);
  string ivec     = string.cut(hash,33,48);
  wipemem(hash);
  string private  = decrypt.aes_ctr(shield,key,ivec);  
  wipemem(key,ivec);
  -- use private briefly, e.g. for signing 
  -- or encrypting a transient crypto key 
  wipemem(private);

With this approach, you greatly reduce the time that private is exposed to danger; you use the values hash, key and ivec only very briefly; and you force an attacker to bleed out not only the encrypted shield data representing the private key, but also the entire BLOBSIZE×8 bits’ worth of prekey.

As the maintainters of OpenSSH put it:

Attackers must recover the entire prekey with high accuracy before they can attempt to decrypt the shielded private key, but the current generation of attacks have bit error rates that, when applied cumulatively to the entire prekey, make this unlikely.

In the meantime, if attacks improve – perhaps as memory density increases and thus Rambleed attacks that rely on nearby memory cells interfering with each other become more common – you can easily adapt your defensive code.

For example, you could:

  • Increase the value of BLOBSIZE above.
  • Regularly re-shield keys by decrypting and re-encrypting them using a brand new prekey.

Increasing the size of the prekey means the crooks have to attack for longer; re-shielding keys regularly means the crooks have less time to finish each attempted attack.

In the longer term, the OpenSSH team are being upbeat:

Hopefully we can remove this in a few years time when computer architecture has become less unsafe.

That’s not quite as good as “more safe”, but being “less unsafe” would be better than we are now.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/db9__FziV34/