STE WILLIAMS

Backpacker claims to find a network of hidden webcams in farm stay

You have to hand it to makers of disguised webcams: they sure are creative!

…and, of course, open to profiting off of whatever lascivious (or vigilant? or surveillance-happy? or all of the above?) purposes motivated customers to buy their cameras-disguised-as-fill-in-the-blank, be it smoke alarms, water bottles, USB power plugs, lightbulbs, alarm clocks, wall clocks, clothes hooks, Teddy bears, air fresheners, picture frames, wall outlets, smiley buttons, and ..

…this just in: decorative bird statues glued to the bed’s footboard.

Those birds were just part of an extensive menagerie of gadgets (connected to USB cables for apparently no good reason) that a Dutch backpacker claims to have discovered in his bedroom when he checked in to a farm job in a remote Queensland spot in the scenic Glasshouse Mountains.

As NT News tells it, Maron de Rooij, 26, had signed up for a dreamy job that he saw posted on Facebook. It was with a company called Animal Ark Transport, which transports small animals, such as sheep, chickens, guinea pigs or similar.

The job promised free accommodations, a weekly paycheck, free meals, travel across four states and “a lot of fun” for a “male backpacker.” All this, driving in a climate-controlled vehicle that’s comfortable for both driver and pets/livestock.

According to NT News, de Rooij said the job looked “really promising” and almost “too good to be true”.

He claims that company manager Conrad Cosgrove showed him into his room – a “cozy” room with a queen-sized bed and en suite bathroom. The first thing Cosgrove pointed out was an infrared light in the ceiling that he said was a bug repellent. de Rooij alleges that it was actually a hidden camera.

He also alleges that there were cameras hidden in walls, behind corrugated metal shelves, and in the shower, along with one microphone.

As depicted in a walk-through de Rooij videotaped, there were USB cords all over the place.

Where are you going to go?

We typically tell people who find hidden webcams in Airbnbs or hotel/motel rooms or anywhere else to get dressed, capture images (as de Rooij did), to call the police (which says he lacked the connectivity to do), and then to hightail it… which he couldn’t do, since he was in the middle of nowhere.

I couldn’t do anything. I was in a remote area and there was no reception.

So instead, he hid under the covers, managed to call his cousin in Australia, and waited until morning. That’s when the police, alerted by his cousin, arrived.

I didn’t know if there was a microphone and if he would be able to hear me talking.

After police searched the property and a computer, Cosgrove was charged with recordings in breach of privacy and possession of tainted property. He’s due to appear before Maroochydore Magistrates Court on 20 June.

Animal Ark Transport has vehemently denied wrongdoing, saying the charges are slanderous. On Tuesday, the business announced on Facebook that it was changing hands, with Cosgrove suggesting that it’s the best way to protect it:

I … trust that by disassociating myself from with the Business that it will be free of Harrasment and Slander.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/3-DcX28N1X4/

Facebook keeps deepfake of Mark Zuckerberg

After a fake video of House Speaker Nancy Pelosi depicting her drunkenly slurring her words went viral last month, Facebook said nope, we’re not taking it down.

We’ve flagged it as fake, Facebook said, we’ve de-prioritized it so doesn’t show up (all that much) in users’ feeds, and we slapped third-party fact-checker information next to it.

Facebook VP for Product Policy and Counterterrorism Monika Bickert, from a grilling by CNN’s Anderson Cooper:

We think it’s important for people to make their own, informed choice about what to believe. Our job is to make sure we are getting them accurate information. And that’s why we work with more than 50 fact-checking organizations around the world.

Oh, reeeeeally?

Well, Facebook’s bluff has been called. Facebook, meet your CEO’s evil deepfake twin, the Zucker-borg who implies that he’s in total control of billions of people’s stolen data and ready to control the future. To rub a bit of salt into the wound, it was distributed on Facebook’s own Instagram platform, and it was gussied up with official CBS trademarking so it looked like a bona fide interview.

‘Imagine this…’ (2019) Mark Zuckerberg reveals the truth about Facebook and who really owns the future… see more @sheffdocfest VDR technology by @cannyai #spectreknows #privacy #democracy #surveillancecapitalism #dataism #deepfake #deepfakes

A post shared by Bill Posters (@bill_posters_uk) on Jun 7, 2019 at 7:15am PDT

Some of the things that the fake Zuck appears to say that the real Zuck has never said, at least not in a publicly broadcast news story that we’ve ever seen:

Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures. I owe it all to Spectre. Spectre showed me that whoever controls the data, controls the future.

Another nod to authenticity was that the Instagram video was rigged with broadcast chyrons that made it seem like standard Facebook messaging handed out in a news segment: “We’re increasing transparency on ads,” it reads, and “announces new measures to ‘protect elections.’”

Facebook vs. fakery recap

Here’s a bit of history of how Facebook has approached fake news since it got into trouble over being used as a fakery cannon in the 2016 US presidential campaign:

In March 2017, Facebook started slapping “disputed” flags on what its panel of fact-checkers deemed fishy news.

The flags just made things worse. The flags did nothing to stop the spread of fake news, instead only causing traffic to some disputed stories to skyrocket as a backlash to what some groups saw as an attempt to bury “the truth”.

Then, in April 2018, Facebook threw in the towel on all that and decided on a new strategy, which is the one that Bickert explained to Cooper with regards to that Pelosi DeepFake (a video in which Pelosi’s voice was slowed down to 75% and its pitch tweaked to mask the slow-down). The new strategy: Decide for yourself.

Who is this ominous-sounding Spectre who’s controlling the Zucker-borg?

You might think that the “Spectre” the DeepFake Zuck is referring to is the global criminal organization that’s stuck sticks into James Bonds’ spokes, but it is not. As Motherboard’s Vice explains, the Instagram DeepFake was created by two artists – Bill Posters and Daniel Howe – and the advertising company Canny.

Spectre is an art installation the two artists premiered last month, as part of the Sheffield Doc Fest in the UK, that promises to…

…reveal the secrets of the Digital Influence Industry, but only if you are willing, as the artists say, to ‘pray at the altar of Dataism with the Gods of Silicon Valley’.

CBS: Please stop

An Instagram spokesperson told Motherboard that the Zuck DeepFake will be handled like any other fakery: if it gets reported as false, and if third-party fact-checkers agree that it’s false, it will get filtered from what Instagram calls its recommendation surfaces: its Explore and hashtag pages.

Vice reports that on Tuesday evening, CBS asked Facebook to take down the video, as it displays “an unauthorized use of the CBSN trademark.”

Reactions to the deepfake have been mixed, with some saying it’s easy to spot as a fake. According to the Onion, others say that the video just isn’t quite good enough to give them the glee that they’ve come to expect from deepfake porn.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/MgY4lezZeoU/

UK Home Sec kick-starts US request to extradite ex-WikiLeaker Assange

UK Home Secretary Sajid Javid revealed this morning that he has signed papers to have Julian Assange extradited to the US.

Speaking on BBC radio earlier today, Javid said: “There’s an extradition request from the US that is before the courts tomorrow but yesterday I signed the extradition order and certified it and that will be going in front of the courts tomorrow.”

Javid’s certifying of the US extradition request lodged this week is the first formal step in having Assange sent across the pond. The next phase is tomorrow, when Belmarsh Magistrates’ Court will set a date for a full extradition hearing.

After that, assuming a district judge (full-time professional magistrate) OKs the extradition, Javid himself will make the final decision on whether or not to send the one-time chief WikiLeaker to America, as UK.gov’s website explains. It is almost certain Assange will file an appeal to the High Court after the district judge’s ruling, and again (as the law allows) after the Home Secretary’s final decision.

Avenging US government agents have long wanted Assange in their clutches because of his website WikiLeaks. As world+dog knows, WikiLeaks published classified material that mostly came from the US government, including the infamous “Collateral Murder” footage from gun cameras aboard American attack helicopters in the Middle East, depicting US pilots killing unarmed civilians.

It also published thousands of entirely unredacted US diplomatic cables, exposing the nation’s foreign policy workings and causing it severe embarrassment in the process.

Sweden, which previously wanted Assange over allegations of sexual assault, abandoned its attempt to get its hands on the Australian national a week ago after a local court decided not to grant prosecutors an EU Arrest Warrant. That would have bypassed normal extradition protections in UK law. Assange’s fans have always maintained that the Swedish proceedings were a front to have him extradited on to America.

Assange is charged in the US with 18 counts including publishing classified material, collaborating with ex-US Army leaker Chelsea Manning, and various other crimes. In UK law, the Americans must promise only to try Assange on the charges they have published so far before he can be handed over – and the possibility of the death sentence would automatically bar his extradition. So far the WikiLeaker has not been charged with capital crimes.

In his defence, Assange is understood to be claiming that he is a journalist and that the activities of WikiLeaks were journalism, rather than espionage as American prosecutors claim.

In May, Assange was sentenced for jumping bail in the UK when he fled to London’s Ecuadorian embassy, back in June 2012. He is currently serving 22 weeks in HM Prison Belmarsh in Woolwich, southeast London, with a theoretical release date of 2 October, well after the normal legal timescales for extradition hearings would be over. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/13/assange_extradition_us_sajid_javid_certified/

Train to be a top-notch cybercrime detective at SANS DFIR Europe Summit in Prague

Promo If you work in digital forensics or incident response and would like to advance to a higher level, the annual Digital Forensics and Incident Response (DFIR) event staged by security training company SANS is a must.

This year’s SANS DFIR Europe Summit and Training 2019 event takes place in Prague from 30 September to 6 October. The one-day summit on 30 September brings together leading DFIR experts to share their experiences, case studies, and stories from the field. Summit attendees will explore real-world applications of innovative solutions, new tools, techniques, and artifacts from all aspects of the fields of digital forensics and incident response.

What past attendees are saying…

“This continues to be my favourite conference to attend. It’s my chance to refresh, renew, and rebuild my DFIR spirit – all with awesome talks, people, and networking” – Summit attendee, 2018.

“The speakers and content at DFIR Summit are great. The experience drives me to explore tools and techniques I would possibly be unaware of were it not for this SANS event” – Summit attendee, 2018.

Complement your summit attendance and elevate your skills to the next level with the following training courses from 1-6 October. SANS are hosting a range of eight DFIR-focused courses, six of which offer the chance to gain a valuable GIAC certification:

Advanced incident response, threat hunting, and digital forensics

Chances are your systems are already under threat. The key is to be on constant alert for attacks that have found their way past security systems and to catch intrusions in progress, before the hackers have done their worst. Threat-hunting examines the network to spot and stop security breaches, noting malware patterns and behaviours to generate useful threat intelligence.

Advanced network forensics: threat hunting, analysis, and incident response

Whether you’re handling a case of intrusion, data theft, or employee misuse, the network often provides the best evidence. Examine various use cases to learn the skills needed for today’s growing focus on network communications in investigations.

Security essentials bootcamp style

Do you know why some organisations get compromised? Could you find threatened systems on your network? Are you sure all your security devices are effective? Are proper security metrics set up and communicated to your executives? Expert hints-and-tips will help you fight off the cybercriminals.

Windows forensic analysis

The mountains of data commonly held on Windows systems contain evidence of fraud, threats, industrial espionage, employee misuse, and intrusions. Learn how to recover data, track user activity, and organise findings for investigations and litigation. Hands-on lab exercises focus on Windows 7, Windows 8/8.1, Windows 10, Office and Office 365, cloud storage, SharePoint, Exchange, and Outlook.

Mac and iOS forensic analysis and incident response

Apple devices are everywhere, from coffee shops to corporate boardrooms. Acquire the forensic analysis and response skills you need to investigate any Mac or iOS device.

Advanced memory forensics and threat detection

Examine RAM to discover what happened on a Windows system. The course involves freeware and open-source tools, and shows how they work. An introduction to macOS and Linux memory forensics is also included.

Smartphone forensic analysis in-depth

Learn the ins and outs of mobile devices: where to find evidence, how the data got there, how to recover deleted data, how to decode evidence, and how to handle applications that use encryption.

Reverse-engineering malware: malware analysis tools and techniques

A popular course using monitoring utilities, a disassembler, a debugger, and other free tools to examine malicious programs that target Windows systems. End the course with a series of Capture-the-Flag challenges.

Plus: Level Up

Data security breaches and intrusions are growing more complex. Adversaries are no longer compromising one or two systems in your enterprise; they are compromising hundreds. Are your forensic skills up to scratch? SANS Institute has launched a new campaign in EMEA called Level Up to encourage people to test their cyber security knowledge and to help highlight the cyber security skills gap.

Take this short test and check out their Digital Forensics page, which has a tonne of great information and resources.

Full information and registration details are available right here.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/13/sans_dfir_europe_summit_prague/

SQL Injection Attacks Represent Two-Third of All Web App Attacks

When Local File Inclusion attacks are counted, nearly nine in 10 attacks are related to input validation failures, Akamai report shows.

Cyberattackers have several vectors for breaking into Web applications, but SQL injection continues to be by far their most popular choice, a new analysis of attack data shows.

For its “State of the Internet” report, Akamai analyzed data gathered from users of its Web application firewall technology between November 2017 and March 2019. The exercise shows that SQL injection (SQLi) now represents nearly two-thirds (65.1%) of all Web application attacks. That’s up sharply from the 44% of Web application layer attacks that SQLi represented just two years ago.

Local File Inclusion (LFI) attacks, which, like SQLi, are also enabled by a Web application’s failure to properly validate user input, accounted for another 24.7% of attacks. Together, SQLi and LFI attacks represented 89.8% of all attacks at the Web application layer over the 17-month period of Akamai’s study.

“The growth of SQLi as an attack vector over the last two years should concern website owners,” Akamai noted. “While every application attack vector is stable or growing, none are growing as quickly as SQLi.”

SQL injection errors and cross-site scripting (XSS) errors have topped, or nearly topped, the Open Web Application Security Project’s (OWASP) list of top 10 Web vulnerabilities for more than a decade. Just this week, in fact, HackerOne published a report showing XSS errors to be by far the most common security vulnerability in Web apps across organizations. Both XSS and SQLi are well understood, and many researchers have catalogued the dangers associated with them for years.

The fact that so many Web apps still have them reflects the relatively scant attention paid to security in the application development stage, says Andy Ellis, chief security officer at Akamai. “It is not that the developers are making errors,” he says. “It is system that we put them into that is dangerous.”

Developers are under pressure to deliver code and are not given clear security guidelines and libraries to work with. “How many people really understand how to write an application that can talk securely with the database in the backend?” he notes. Few developers can understand security so deeply that a security flaw would actually represent a mistake for them, Ellis says.

Akamai’s data shows most Web application attacks originate from inside the US and most targets are US-based as well. Of the nearly 4 billion application-layer attacks that Akamai counted over the 17-month period, some 2.7 billion targeted US organizations. Companies in the UK, Germany, Brazil, and India were also relatively heavily targeted. though nowhere nearly as much as US companies.

Another major takeaway from Akamai’s “State of the Internet” report is the sharp uptick in credential-stuffing attacks, where attackers use large datasets of stolen credentials to try and break into corporate accounts. During its analysis, Akamai counted a staggering 55 billion credential-stuffing attacks targeted at organizations in various verticals. In many cases, Akamai found attackers were launching credential-stuffing attacks using credentials that were stolen from websites via SQL injection attacks.

By far, companies in the gaming industry were the most targeted entities in credential stuffing attacks. Some 12 billion of the attacks that Akamai detected were, in fact, directed against organizations in the gaming sector. Each attack that Akamai counted represented an attempt to access an account to which the threat actor did not have legitimate access.

A lot of the interest in gaming companies appears to be the result of attackers viewing gamers as financially viable targets known for spending money on game-related items, including skins, game currency, and updates. Steve Ragan, a threat researcher from Akamai, says one of the more gratifying takeaways from the report is the fact that many gaming companies have taken measures to address the threats by educating users on issues like phishing and two-factor authentication.

“The takeaway is that credential stuffing is not going away,” Ragan says. But implementing multifactor authentication can slow it down. “If you do just token multifactor authentication or SMS authentication, it is better than having nothing at all,” he says. “Just user names and passwords are not really going to protect you anymore.”

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/sql-injection-attacks-represent-two-third-of-all-web-app-attacks/d/d-id/1334960?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Black Hat Q&A: Defending Against Cheaper, Accessible ‘Deepfake’ Tech

ZeroFox’s Matt Price and Mike Price discuss their work researching cybersecurity responses to the rising tide of ‘deepfake’ videos.

The tools and techniques to create false videos via AI-driven image synthesis are getting easier to access every year, and few people know that better than ZeroFox’s Matt Price and Mike Price (not related). In an email interview with Black Hat’s Alex Wawro, the pair of security experts shared their latest research, which will be presented at Black Hat USA in Las Vegas this summer.

Alex: Why are ‘deepfakes’ important?

Matt: For me personally, I think deepfakes are important because of their potential to change political discourse, and just public discourse in general. We’ve already seen evidence of this, not even with deepfakes, but with people splicing videos and slowing them down. I think deepfakes have a lot of potential to do some good, especially when you think about movies and special effects, but they also have a lot of potential to cause problems.

Mike: Long story short, here at ZeroFox we do a lot of work in terms of analyzing content for security-related issues. We started off as a social media security company, and when I arrived here four or five years ago, most of what we were doing was ‘Hey, is there something bad in this tech? Or, is there something bad in this image.’ So that brought us to the question — what about video?

A couple years ago, when deepfakes appeared on the scene, our research team organically took interest in the topic and we started looking into how they’re created, and how we can develop protections against them. I’ve been working with Matt to really round out not just the offensive parts but also the defensive part: how do you detect these things, and do something against them?

Alex: How good is deepfake tech right now, and how quickly do you think it will pose a significant threat to security systems?

Mike: The research that’s been done by other folks, and the work that we’ve done in understanding what’s going on out there suggests that the tools and the resources required to produce deepfakes are much lower-cost now. Previously, stuff like this didn’t really exist outside of Hollywood studios where they needed to synthesize a person’s image. But now you have these tools where, anybody can download an open-source package and produce a fake video clip pretty quickly. So the cost has been brought down a ton, the complexity has been brought down a ton, so that’s really the main risk factors.

As far as quality goes, from what we’ve seen there’s still a lot of work going on to really perfect this stuff; you have a lot of little hiccups with regards to, for example, getting a variety of different videos, jumping through all kinds of hoops to get the right kinds of source images, and so on. So there are still a lot of hurdles to producing deepfakes that are really dynamic, with many people in the video moving around and changing positions. You see mostly short clips of a single person looking forward; there are still some limitations to what’s easily accomplished with this tech.

But there’s a lot of work going on. The tooling seems to be getting better and better, and people are doing a lot of exploration of different algorithms that may be able to produce better results with less input. So that’s where things stand today. And as far as people using it for nefarious purposes, mostly we’re seeing lots of proof-of-concept videos out there. Nicolas Cage is the guinea pig for a lot of the work being done, and then you see some political examples — like the Obama video.

Alex: Why did you feel it was important to give this talk at Black Hat, and what do you hope attendees will get out of it?

Mike: A lot of people have asked about this subject; I know that in the federal space there are a lot of people thinking about whether this will be an issue in the future. So there’s lots of questions in the air about what deepfake technology is, how it works, how real it can be, that sort of thing. We want to explain all that, and then walk you through what your options are for detecting deepfakes and doing something about it.

Matt: To piggyback off that, I’m mainly interested in the detection side, and I think this talk is important because I’ve seen some quite sensationalist headlines saying there is no solution to deepfakes, which isn’t true. There are detection methods out there right now to detect deepfakes; DARPA’s actually heavily investing in this area as well. So that’s kind of the point, for me. We can detect deepfakes. There are tools to do it; this is just a security problem like any other.

Alex: What are you hoping to get out of Black Hat this year?

Matt: I’m really interested in some of the developments in neural networks and their applications to cybersecurity problems. My role at ZeroFox is mainly to run our data science program, so I’m always interested in the newest and latest tech on that front, and neural networks seems to be one of the hot topics for solving problems that traditionally we’ve had issues solving.

For more information about the ZeroFox Deepfake Briefing and many more check out the Black Hat USA Briefings page, which is regularly updated with new content as we get closer to the event. Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Article source: https://www.darkreading.com/vulnerabilities---threats/black-hat-qanda-defending-against-cheaper-accessible-deepfake-tech/d/d-id/1334949?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

The Rise of "Purple Teaming"

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

In 1992, the film Sneakers introduced the term “Red Team” into popular culture as actors Robert Redford, Sydney Poitier, Dan Aykroyd, David Strathairn, and River Phoenix portrayed a team of security experts who hire themselves out to organizations to test their security systems by attempting to hack them.

This was a revolutionary concept at the time — the term “penetration test” didn’t even exist yet, and the idea of a friendly security team trying to break through a company’s defenses wasn’t exactly commonplace. Today, penetration testing is an important part of any cybersecurity system, and both internal and external Red Teams play a critical role in that process.

But they don’t do it alone. Organizations often employ “Blue Teams,” referring to the internal security team tasked with defending against both real and simulated attacks. If this raises your curiosity about whether and how closely Red Teams and Blue Teams collaborate in security testing, then you’ve pinpointed the fast-rising cybersecurity trend of “Purple Teaming.”

What Makes Purple Teaming Different?
For years, organizations have run penetration tests similarly: The Red Team launches an attack in isolation to exploit the network and provide feedback. The Blue Team typically knows only that an evaluation is in progress and is tasked to defend the network as if an actual attack were underway. 

The most important distinction between Purple Teaming and standard Red Teaming is that the methods of attack and defense are all predetermined. Instead of attacking the network and delivering a post-evaluation summary of finding, the Red Team identifies a control, tests ways to attack or bypass it, and coordinates with the Blue Team in ways that either serve to improve the control or defeat the bypass. Often the teams will sit side by side to collaborate and truly understand outcomes.

The result is that teams are no longer limited to identifying vulnerabilities and working based on their initial assumptions. Instead, they are testing controls in real time and simulating the type of approach that intruders are likely to utilize in an actual attack. This shifts the testing from passive to active. Instead of working to outwit each other the teams can apply the most aggressive attack environments and conduct more complex “what-if” scenarios through which security controls and processes can be understood more comprehensively and fixed before a compromise.

How Deception Technology Adds Value to Penetration Testing
Part of what makes Red Teaming and Purple Teaming so valuable is they provide insight into the specific tactics and approaches that attackers might use. Deception technology can enhance this visibility by incorporating deception technology into the testing program. The first benefit comes from detecting attackers early by enticing them to engage with decoys or deception lures. The second comes from gathering full indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) into lateral movement activity. This significantly enhances visibility into how and when attackers circumvent security controls, enriching the information that typically results from these exercises.

Cyber deceptions deploy traps and lures on the network without interfering with daily operations. A basic deployment can easily be completed in under a day, providing the Blue Team an additional detection mechanism that blends in with the operational environment. This creates more opportunities to detect when the Red Team bypasses a defensive control, forcing team members to be more deliberate with their actions and making simulated attack scenarios more realistic. It also offers a truer test of the resiliency of the organization’s security stack and the processes it has in place to respond to an incident.

The rise of Purple Teaming has changed the way many organizations conduct their penetration tests by providing a more collaborative approach to old-fashioned Red Team vs. Blue Team methodology. The increased deployment of deception technology in cybersecurity stacks has further augmented the capabilities of both the Red and Blue teams by allowing them to adopt a more authentic approach to the exercises.

Related Content:

Joseph Salazar is a veteran information security professional, with both military and civilian experience.  He began his career in information technology in 1995 and transitioned into information security in 1997.  He is a retired Major from the US Army … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/the-rise-of--purple-teaming-/a/d-id/1334909?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

DNS Observatory Offers Researchers New Insight into Global DNS Activity

Among its early findings, 60% of the DNS transactions captured were handled by just 1,000 name servers.

The Domain Name System (DNS), which is part of essentially every transaction on the Internet, has also become a critical part of many online attacks. Now, a monitoring framework presented at IETF 104 in March is providing new insight into the way DNS queries are received and answered across the Internet, as well as how that process might have an impact on security.

The DNS Observatory is a research project backed by Farsight Security. It allows researchers to see details of the queries and traffic flowing between recursive DNS resolvers (the kind most users query when they type in a website name) and authoritative name servers (the DNS servers that keep the canonical list of Web names and addresses). 

According to Farsight, the DNS Observatory looked at streams of passive observations between recursive DNS resolvers and authoritative name servers. The Observatory processed over 1 trillion DNS transactions from January to March and saw over 2.5 million unique Fully Qualified Domain Names (FQDNs) per minute, on average.

One of the primary findings from that is that the vast majority of DNS resolution requests are made through a relative handful of servers. “Approximately 60% of the DNS transactions captured in our list were handled by just 1,000 name servers; the majority of queries flowed into ASes [authoritative servers] operated by less than 10 organizations,” according to Pawel Foremski, scientist/senior distributed systems engineer at Farsight.

Paul Vixie, founder of Farsight Security, points out that this concentration of requests can represent a significant security risk for the global Internet. “I’d say it seems to be a lot of eggs in a small number of baskets,” he says. “We’re not seeing the kind of organizational diversity that characterized the earlier internet.”

Vixie explains that the limited number of authoritative name servers, coupled with subtle server behaviors regarding how long servers will try to respond to queries for a nonexistent domain or those involving both IPv4 and IPv6 addresses, means the time for resolving names has crept up over time. “Some of the transaction times here are almost a tenth of a second to reach some pretty popular domains,” Vixie says.

While that’s not a time likely to be perceived by a human user, it is enough time to create opportunities for attacks involving DNS. “When Dan Kaminsky came up with his novel attack on DNS transactions in 2008, it turned out that the time taken for a content server to answer a question from one of these recursive servers controlled the number of opportunities that the attacker would have to try to guess the various combinations of numbers that were in the transaction,” Vixie says.

While increasing the number of authoritative servers could speed the transaction time for DNS resolution and minimize one set of risks, the possibility exists that the same action would increase other risks, Vixie says. “There is no way to separate the benefits and the costs of scale,” he says. “If we add a lot more name servers, then we will be adding more computers that have to be audited, upgraded, and fixed when they break.”

Vixie points out that these additional servers will need additional trained staff. The complexity will increase the attack surface for malicious actors to work on, and that attack surface will demand additional monitoring and protection. “There’s no way to avoid that,” Vixie says.

Farsight Security says it will make DNS Observatory data available to other researchers and invites ideas for its use.

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/dns-observatory-offers-researchers-new-insight-into-global-dns-activity/d/d-id/1334953?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Apple Pledges Privacy, Beefs Up Security

The company hits back at the data economy – and fellow tech giants Facebook and Google – by announcing its own single sign-on service. A host of other iterative security improvements are on their way as well.

Whether it’s from Apple fans, embedded marketing people, or actual developers, applause is an oft-heard feature of any keynote at Apple’s Worldwide Developers conference. 

Yet the loudest applause at this year’s conference came not for some shiny feature, but for a seemingly insignificant, geeky detail: providing users with randomized e-mail addresses. As part of its coming “Sign in with Apple” feature, the company said it will provide users with the ability to use a random e-mail address for each app, holding out the possibility that consumers could, once again, have some small control over the informational transactions with application makers.

The applause for that small detail was both raucous and sustained

“A lot of love for random addresses here,” said Craig Federighi, senior vice president of software engineering at Apple, before the WWDC 2019 crowd last week. “And that’s good news because we give each app a unique random address. This means that you can disable any one of them at anytime when you are tired of hearing from that app.”

Among a host of announcements, the “Sign in with Apple” offering stood out. It promised to treat people as valued customers rather than digital horseflesh to trade on the open market, taking aim squarely at two technology giants of whom consumers — and governments — have increasingly become wary: Google and Facebook. And it gave Apple some measure of cover in the US government’s investigation of whether its own business should be considered a monopoly that needs to be broken up. A bifurcated Apple, after all, may not be able to offer privacy as a selling point.

“This gives them a chance to improve the privacy of, at least, Apple users,”  says Jacob Hoffman-Andrews, senior staff technologist at the Electronic Frontier Foundation. “They also show a world is possible where companies are not snarfing up all your data to make money.”

The announcement placed the focus at the WWDC 2019 on privacy, but in smaller venues speaking to a more technical crowd, Apple focused on security as well.

The company announced it had made app notarization — a process that runs automated security checks against developers’ release candidates — mandatory as of June 1, 2019. Not to be confused with the App Review process, notarization involves sending a release candidate to Apple, which scans the code and checks it for common errors and security problems, as well as creates a certificate that validates the software. In return, developers are prevented from inadvertently shipping malicious code, gain the benefits of Apple’s hardened runtimes, and are provided an audit trail of their developer account’s activity, Garret Jacobsson, CoreOS security engineer at Apple, told developers at the conference.

“Users are more likely to download and try new software knowing that Apple has scanned it for known security issues,” he said.

The next version of the Mac OS, dubbed Catalina, will also have more extensive security checks. Apple has applied defense-in-depth principles to a greater extent in the coming version of the Mac OS. Gatekeeper, a program that originally blocked specific malicious software programs from running on Macs, has evolved into a much more comprehensive tool that scans for malicious content but also validates the signature provided by as part of the notarization process. 

While the current version of the Mac OS, Mojave, blocks apps from accessing certain types of data without explicit user permission — including contacts, calendar appointments, reminders, and photos — almost all user data will be included in the permission-based model in the coming version. Applications that try to access files on the desktop, in the user’s Documents folder, or in any type of storage will require either explicit or inferred permission. 

Unsurprisingly, considering its recent privacy-focused advertisements, Apple spent a great deal of time on showcasing its pro-privacy technologies. Any app that offers the capability of single sign-in with Facebook or Google will have to offer the user the “Sign-in with Apple” capability, Federighi said. In addition, the company will give users the ability to share location only a single time, requiring applications to request permission for each new time they want to use location data. 

“At Apple, we believe that privacy is a fundamental human right, and we engineer it into everything we do,” he said.

Apple moves, along with the regulatory pressure from the European Union’s General Data Protection Regulation (GDPR) and antitrust investigations, will likely put pressure on Google and Facebook to change how much control they give users.

“I think there is a lot of pressure on the data companies from a lot of different directions,” says Omer Tene, vice president and chief knowledge officer at the International Association of Privacy Professionals. “Apple will continue to be the most aggressive proponent of privacy as it provides them a competitive advantage.”

Yet, whether technology companies that provide services for free can wean themselves off of data remains to be seen, the EFF’s Hoffman-Andrews says.

“Apple’s particular corner of the market is sustainable because they are one of the richest companies on the planets,” he says. “But can others follow in their footsteps? Probably not.”

Related Content

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/apple-pledges-privacy-beefs-up-security-/d/d-id/1334955?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

This is grim, Vim and Neovim: Opening this crafty file in your editor may pwn your box. Patch now if not already

Proof-of-concept text files are now available that, when opened in a vulnerable installation of the Vim and Neovim, will execute commands on the underlying machine, or even open a backdoor.

Bug-hunter Armin Razmjou this week documented a security hole, designated CVE-2019-12735, in the popular text and source code editors that can be potentially exploited by malicious documents to commandeer victims’ computers when opened. The vulnerability is present in Vim versions prior to 8.1.1365, and Neovim builds before 0.3.6.

Razmjou reported the issue to the maintainers of both applications on May 22. Vim had a patch out by May 23, and Neovim released its fix on May 29. Now that Razmjou’s exploit code is available, you should ensure you’re patched: updating either application to the most recent build will address the flaw. Razmjou also noted that some Linux distributions, such as Debian, ship with Vim configuration files that block the hole by default – more on that below.

Invader Vim

The infosec bod said the vulnerability lies in code that handles modeline instructions that Vim uses to set things like the text width or spacing in a file. These settings are usually specified within a given text file to format it as needed, however, it turns out these modelines can be abused to execute system commands on the underlying host as the user.

“The modeline feature allows to specify custom editor options near the start or end of a file,” Razmjou explained. “This feature is enabled by default and applies to all file types, including plain .txt.”

Normally, the modeline settings are limited to a small group of functions, and any system command to be executed is isolated in a sandbox to keep it from harming or accessing the rest of the computer.

That sandbox, however, can be turned off by putting a modifier (in this case !) at the end of a source instruction. This instruction reads in a specific file from the file system, or the file being edited if % is used. Combining ! and % makes Vim execute commands within the edited text file outside the sandbox.

Ramzjou’s proof-of-concept text file demonstrates how this can be exploited to open a backdoor, known as a reverse shell, allowing miscreants to inject system commands over the network or internet, and cover its tracks after.

In another example, see below, the text runs the command uname -a on the underlying box to get details of the operating system kernel.

:!uname -a||" vi:fen:fdm=expr:fde=assert_fails("source! %"):fdl=0:fdt="

Save that as poc.txt and then run vim poc.txt as normal to trigger the flaw.

In addition to updating Vim and Neovim to the latest versions, there are other protections you can put in place to avoid attack. Your .vimrc configuration file in your home directory can be modified to disable modelines (include set nomodeline), or you can disable expressions in modelines (modelineexpr) completely.

With Debian and some other Linux distros, the .vimrc ships with modelines already disabled by default, hence those versions are not vulnerable out of the box, though it is still a good idea to update your copy of Vim or Neovim to the latest version. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/12/vim_remote_command_execution_flaw/