STE WILLIAMS

2.3B Files Currently Exposed via Online Storage

Digital Shadows researchers scanned various online file-sharing services and concluded the number of exposed files is up 50% from March of 2018.

More than 2.3 billion files are exposed across misconfigured online file storage technologies, marking an increase of 750 million files – or a 50% jump – from 1.5 billion in March 2018.

Researchers with the Digital Shadows’ Photon Research Team thought last year’s 1.5B figure alone was “incredible,” they say in the aptly named “Too Much Information: The Sequel” report. Files with sensitive and insensitive data were found via SMB file shares, misconfigured network-attached storage (NAS) devices, FTP and rsync servers, and Amazon S3 buckets.

The United States exposed the most data (over 326 million files), though France (151 million) and Japan (77 million) each had the highest in their geographies. The United Kingdom exposed 98 million, and countries throughout Europe collectively exposed more than one billion files.

There’s “a lot of really good work” being done to try and contain this wealth of compromised information, says Harrison Van Riper, strategy and research analyst at Digital Shadows. “However, the fact is that businesses are continuing to expand their footprint online, beyond their own networks and, more importantly, their own storage devices,” Van Riper explains.

“The same kinds of access controls and safeguards that businesses put on their own data within their networks should be implemented on those systems existing outside as well,” he adds.

“The same kinds of access controls and safeguards that businesses put on their own data within their networks should be implemented on those systems existing outside as well,” he adds.

Server Message Block (SMB) protocol exposed the most data (46%) of all technologies analyzed. That’s more than one billion files exposed via SMB file shares, a 547.6 million jump from March 2018. FTP was next-highest at 457.4 million (20%), followed by rsync at 386.7 million (16%), Amazon S3 at 182.1 million (8%), webindex at 163.5 million (7%), and NAS at 65.4 million (3%). FTP-hosted files increased by over 54 million, cancelling out rsync’s decline of 53.7 million files.

The researchers aren’t entirely sure why SMB-enabled file shares nearly doubled in the past year, though they call the statistic troubling. One potential reason is in June 2018, Amazon AWS Storage Gateway added SMB support, giving file-based applications built for Microsoft Windows a means to store and access objects in Amazon S3. Another is in November 2018, Akamai discovered attackers were opening SMB ports 139 and 445 for malicious reasons.

SMB is one of the main ways Windows users can facilitate file shares, Van Riper notes, and Microsoft adoption of the protocol surely drove its popularity. It’s not a bad thing, he points out; technology is supposed to simplify the ways we live our lives and conduct business. However, he adds, the Internet has changed what we thought we knew about these systems and how they interact. It’s time to rethink new ways to implement old protocols, he says.

“As businesses continue to digitize older systems and [processes], and more and more Windows systems that have SMB installed get spun up, the more chances there are for these exposures to occur knowingly,” he explains.

In the report, researchers point out that in early 2018, Microsoft stopped preinstalling SMBv1 in Windows 10 and Windows Server. However, it’s hard to confirm the full impact of this as researchers included SMB v1, v2, and v3 in the study.

Amazon S3 bucket misconfigurations, which have inadvertently exposed data for years, may also slow thanks to “Amazon S3 Block Public Access,” introduced in Nov. 2018. The move locked down default security controls for S3 buckets so users can set global block rule for private data.

Ransomware Targets Exposed SMB

The standard advice for companies preparing for ransomware attacks is to back up their files. If they’re hit and their files are encrypted, they can use saved data to get back up and running.

But what happens if the same ransomware variant also encrypts backup files? The researchers at Digital Shadows notice this is a growing trend, with more than 17 million ransomware-encrypted files across file stores used for backups. They specifically note NamPoHyu ransomware, an update to the MegaLocker variant that targets Samba servers. Samba is the open-source implementation of the SMB protocol; it runs on Unix systems and allows for file communication to Windows. Since April 2019, more than two million files have been encrypted with the .NamPoHyu extension.

“Obviously, WannaCry is the other big ransomware variant that comes to mind when we think about SMB and we are still seeing new files be encrypted by it,” Van Riper says. “The trend has definitely picked up steam with the addition of a new variant in NamPoHyu.”

These days, data is not only kept internally and businesses should protect their information wherever it resides. Oftentimes that means working with third parties to ensure they have a security strategy in place: for example, researchers point to a small IT consulting company in the UK that exposed more than 212,000 files containing company and client information.

When it comes to third parties, Van Riper says businesses should be asking the same questions they ask of their own security teams. Where is data stored? How are we storing it? Is it encrypted? Who has access to it? “These questions shouldn’t only be asked internally, as these days data is not only kept internally,” he explains.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/23b-files-currently-exposed-via-online-storage/d/d-id/1334843?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Vulnerability Leaves Container Images Without Passwords

A old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store.

Nearly one in five of the most popular containers available on the Docker store have no password for root access. That’s the finding of researcher Jerry Gamblin, building on work by researchers at Cisco Talos. The result could easily be hundreds of thousands of containers deployed with no functional password at all.

The finding is important because containers, most frequently with Docker as the container manager, are becoming popular for deploying virtualized applications (as opposed to completed virtualized servers deployed with products like VMware or Microsoft Hyper-V). As Docker puts it, “A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries, and settings.” 

In order to save time, developers will often put a container image into a repository for reuse, or they’ll look at a public repository, like GitHub or the Docker Store, to find containers built by others that they can download and use. If those publicly available containers have vulnerabilities, they can quickly spread across the Internet.

According to the original Cisco Talos report, the vulnerability began with “null” passwords for the root user in Docker images for Alpine Linux, a lightweight, container-specific Linux distribution very popular in container development.

The vulnerability, now designated CVE-2019-5021, was first discovered in 2015 and patched — but then eight days later someone replaced a patched file with another file that enabled the vulnerability. A series of testing errors allowed the vulnerable files to be retained and distributed until May of this year. The original Alpine Linux images have been repatched, but Gamblin found that many containers remain with the vulnerability intact.

Gamblin, who is principal security engineer at Kenna Security, says the need for development speed — a need that has made containers a more popular deployment option — also means best practices aren’t always followed.

“I think we’re at the point in containers where they’re becoming more useful locally and in small company situations, and you’re seeing fewer best practices used,” he says. “It’s developers, it’s system admins, and just people testing software and running it on their local machines that blow by best practices in the name of speed.”

The good news for developers and security professionals is that the technology issue around this vulnerability has been solved. It’s now up to processes and practices to ensure secure containers are pulled from repositories and deployed.

Gamblin says he sees this as an issue security teams should be aware of but not lose sleep over. “It’s a weakness, but it’s not a structural weakness,” he says.

As he pointed out in a blog post he wrote about the vulnerability: “Deploying containers that allow users to authenticate as root should be avoided at all costs, because authenticating as root is already outside the scope of ‘best practices’ for secure containers or generally in system.”

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/application-security/vulnerability-leaves-container-images-without-passwords/d/d-id/1334844?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Senator: US govt staff may be sending their smartphone web traffic ‘wrapped in a bow’ to Russia, China via VPNs

US government workers may be placing America’s national security at risk as there is no official policy banning them from running their smartphones’ personal and official internet traffic through untrustworthy foreign-hosted VPN services.

A letter [PDF] from Homeland Security’s Cybersecurity and Infrastructure Security Agency director Chris Krebs to Senator Ron Wyden (D-OR) concedes that Uncle Sam does not have rules in place to prevent federal employees from routing their work-issued cellphones’ data through VPNs in Russia, China, and so on.

As a result, Krebs says, there is a “low to moderate” risk that some US government communications could be intercepted by an overseas VPN service and handed over to a hostile government in, oh, say, Russia or China.

“The vulnerabilities are the ability of users to download untrusted VPN services and the lack of policy across organizations restricting their download,” Krebs told Wyden. “No overarching US government policy or whitelist restricts users from downloading a foreign VPN application on government-operated mobile devices. Policy restrictions vary across departments and agencies.”

Woman pulls face while tasting dubious cocktail.

There’s NordVPN odd about this, right? Infosec types concerned over strange app traffic

READ MORE

The letter was a response from Krebs to an earlier inquiry from Wyden about VPN use in government agencies, and the risks associated with workers opting to link up their office-issued devices with unvetted VPN providers for any use.

In a statement to The Register, the senator said the Dept of Homeland Security’s response justified his suspicions. “DHS has confirmed my fears: that using Chinese or Russian VPN services is essentially just taking your private data, wrapping it in a bow and then sending it directly to foreign spies in Beijing or Moscow,” Wyden said of the letter. “US government employees should not be using these apps, and I hope that DHS will take steps to prohibit their use on government-issued smartphones.”

This has long been the knock on VPN services, which simply reroute your traffic through someone else’s box. Should a VPN operator be less than trustworthy, users’ unencrypted traffic may be snooped on. Generally speaking, we advise readers to avoid free VPN services, and if at all possible, set up your own using OpenVPN, Algo, or Outline. Bear in mind, you are trusting whoever is hosting your personal VPN server that they will not spy on your unencrypted internet traffic, too.

That US government employees are still able to use foreign VPNs is also something of a glaring blind spot in the White House’s crusade against eavesdropping from foreign IT vendors. That campaign has included outright bans on products from Huawei and Kaspersky, citing the exact risks Krebs and Wyden outline. Don’t be surprised to see bills drafted soon calling for restrictions on VPN use. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/05/30/dhs_alarm_vpn/

The Ransomware Dilemma: What if Your Local Government Is Next?

Baltimore has so far refused to comply with a ransom demand. It’s being forced to make a decision all such victims face: to act morally or practically.

Although ransomware took a backseat to other attack vectors in 2018, the threat has regained momentum this year. The most recent high-profile ransomware attack occurred 20 miles from my home, on the city government of Baltimore, on May 7. Baltimore was attacked by a ransomware strain known as RobinHood, and attackers demanded approximately $100,000 in exchange for the digital keys that would restore the city’s systems and access to data. To date, Baltimore has refused to pay the ransom. We are now three weeks into the attack; significant disruptions continue to occur and are costing the city dearly in financial and reputational damages.

Ransomware sets the stage for a great debate on moral versus practical dilemmas. This recent surge of ransomware attacks raises the question: Is your local government next? And if you are in a position of power, will you pay the ransom?

To Pay or Not to Pay — That Is the Question!
Whether a city pays ransomware demands depends on many factors. It’s not an easy question to answer, and whatever side you are on will have a sharp opposing view. Before making a decision, however, it’s vital to examine your response through both a moral and a practical lens.

Morally, the most common, quick, and easy answer is “no.” Don’t pay the ransom because it only serves to reinforce attacker behavior. I appreciate this angle. It generally has been the US view on ransom demands involving hostage captivity, though the government has paid a ransom to free hostages in some situations. OK, I know here we’re talking humans and not computers, but there must be some parallels — and in today’s world, computers affect humans on an extraordinary level. 

Practically, you’ll find that many people believe that paying a ransom is the right move. This is because the costs of paying the ransom ultimately dwarf the costs associated with not paying it. It’s hard to put an exact quantification on this, but the logic is clear.

For example, the government of Atlanta refused to pay $50,000 and ended up paying an estimated $17 million to recover from the attack. It’s not easy to determine what costs would have been avoided if the city had paid the ransom, but a quicker recovery time would have resulted in less business disruption and reduced spending on third-party consultants. This alone would have indicated a positive return on investment for paying the ransom.

Unfortunately, Baltimore is three weeks into the attack, and it’s still experiencing disruption. Email remains down. Real estate transactions have been disrupted. Online bill payment systems have not recovered, significantly affecting city revenue collection. These negative effects also result in the unavailability of services or the degradation of service delivery quality. For example, critical services such as emergency medical services, police, fire, and 311 have remained operational in the city. However, the quality of service and operations is being intensely affected — 911 alerts are now occurring via pagers rather than the normal manner of a computer-generated, automated alert.  

Of course, there is always risk of paying a ransom and the attackers don’t restore the system. A Trend Micro report from a three years ago indicated one in five companies never got their data back. However, this data is dated and it would be interesting to see a current look at where this issue stands. But decision-makers must ask themselves: What is the cost of disruption? How much has been paid to third-party consultants to restore systems? And how do these costs compare with the costs had the city paid the ransom initially?

Conclusion
The moral reaction to ransomware says to not pay the ransom because it reinforces bad behavior. However, I think the practical aspect of ransomware is that the cost of not paying the ransom is materially greater than the cost of paying it. I had a conversation recently with a savvy CISO that led me to believe that it’s more standard than not for organizations to pay the ransom. I suspect this is happening more frequently than we realize and that there are likely many ransomware attacks we don’t hear about because significant disruption was mitigated by paying the ransom.

And while there may be honor among thieves, the value of holding an entire city government under ransom is a tempting and interesting dilemma given the amount adversaries will pay for information on the Dark Web. All in all, where do you stand on the spectrum of practicality versus morality when it comes to ransomware? Let us know by commenting below.

Related Content:

Todd Weller, Chief Strategy Officer at Bandura, works with large organizations in acting on their threat intelligence to prevent future attacks. He brings over 20 years of cybersecurity industry experience with a unique blend of operational and hands-on proficiency. He … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/the-ransomware-dilemma-what-if-your-local-government-is-next-/a/d-id/1334827?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Palo Alto Networks Confirms PureSec Acquisition

The company also agreed to buy container security company Twistlock as it develops its cloud security suite.

Palo Alto Networks is on a cloud security shopping spree as it builds out its new Prisma cloud security strategy. This week the company confirmed acquisitions of PureSec and Twistlock.

PureSec, an Israeli startup founded in 2016, was created under the premise that serverless architecture demands a new approach to application security. Its serverless security tool aims to help its customers build, maintain, and secure serverless applications. PureSec co-founders Shaked Zin, Ory Segal, and Avi Shulman will join Palo Alto Networks as part of the acquisition.

The transaction value for the acquisition was not officially disclosed; however, Israeli business publication Globes reports the price tag is $60 million to $70 million. Meantime, Palo Alto Networks confirmed it will pay $410 million for container security firm Twistlock in an all-cash transaction.

Portland, Ore.-based Twistlock was founded in 2015 and most recently completed its Series C, bringing it to a total of $63 million in funding. It offers a container security platform and has 290 customers, 25% of which are in the Fortune 100. Palo Alto Networks reports Twistlock’s co-founders, Ben Bernstein and Dima Stopel, will also be joining the company following the close of the deal.

Technologies from PureSec and Twistlock are intended to bolster Palo Alto Networks’ cloud security suite, Prisma, also announced this week. The platform is designed to help businesses connect offices and employees to the cloud, and develop and deploy SaaS applications, with a combination of newly acquired tools and rebranded products from Palo Alto Networks.

Both transactions are expected to close during Palo Alto Networks’ fiscal fourth quarter.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/palo-alto-networks-confirms-puresec-acquisition/d/d-id/1334839?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Caveat Emptor: Calculating the Impact of Global Attacks on Cyber Insurance

The reality for business owners and CISOs looking to protect their business from a cyberattack is that cyber insurance is not a catchall for protecting against risk and loss.

The cyber insurance investigation into the loss potential of the recent ransomware attack on one of the world’s largest aluminum producers, Norsk Hydro, has begun. It is likely to generate increased interest in obtaining cyber insurance by manufacturers and other organizations driven by the attention raised by 2017’s NotPetya worm. While the cost for the Norsk Hydro “LockerGoga” attack is yet to be calculated in full, we have already seen, as with NotPetya, a dramatic loss of income and intense business disruption.

But can cyber insurance do enough to limit the fallout for the victims of ransomware attacks? If not, how can proactive businesses ensure they are financially protected after a breach?

Calculating the Costs
The effect on the IT and insurance industries from the most recent wave of cybercrime continues to grow as businesses disclose silent cyber impacts, as well as affirmative losses from WannaCry/NotPetya. The latest reports from Property Claim Services (PCS) put the loss from NotPetya at over $3.3 billion, and it’s still growing. The Norsk Hydro event is currently being evaluated by PCS to ascertain whether it meets the global cyber event designation, which would require the attack to generate a re/insured loss of at least $20 million. Recent estimates from the company suggest $40 million in losses.

Despite the payouts, for some businesses, reliance on insurance has proven inadequate. Consider US pharmaceutical company Merck. The company disclosed that the NotPetya cyberattacks have cost it as much as $580 million since June 2017, and predicted an additional $200 million in costs by the end of 2018. In contrast, experts estimated their insurance payout would be around $275 million, a huge number but under half of the amount it has incurred so far, let alone any silent costs that may continue to rise.

Other companies have been left even worse off, such as snack food company Mondelez International Inc., which is in a continuing battle with its property insurer, Zurich American Insurance Company. Mondelez filed a claim for the NotPetya attacks under a policy that included “all risks of physical loss or damage,” specifying “physical loss or damage to electronic data, programs, or software, including loss or damage caused by the malicious introduction of a machine code or instruction.”

Zurich disputed the claim, based on a clause that excludes insurance coverage for any “hostile or war-like act by any governmental or sovereign power” after US intelligence officials determined that the NotPetya malware originated as an attack by the Russian military against Ukraine. Zurich is fighting the claim by Mondelez that it is wrongfully denying coverage.

What an Act of War Might Mean for Coverage
As cybercrime continues to rise, cyber insurance has businesses reconsidering their coverage. Organizations faced with a decision to take out coverage need to find space in the budget for monthly costs and potentially large premiums. For this investment to be worthwhile, businesses want to be confident that they will recover their costs if a breach happens. Therefore, selecting the “right” form of coverage becomes critical.

The insurance payouts around the NotPetya cyberattacks, and in particular the Mondelez case, throw this into question. This is especially true considering the rise in cyberattacks that are nation-backed or could plausibly be claimed to be nation-backed by insurance companies in order to dispute a claim. As regulations change and the US military is given more freedom to launch preventative cyberattacks against foreign government hackers, any evidence that suggests governmental or military attribution could be confirmation of an act of cyberwar and be legitimately used against claimants looking to settle their losses.

Will the Fine Print Affect Public Research?
The ripple effect of this could go beyond the claims sector, and, in the long run, have a connected impact on security research, and potentially free press and journalism. Traditionally, researchers have had the freedom to comment and even speculate on the attribution of cyberattacks through information on the attackers’ behavior and the attack signatures they use. If insurance companies and claims handlers begin using public research as a reason to deny coverage to victims, research teams could be put in an ethical bind when faced with the realization that the results of their investigative work could exacerbate victims’ woes. They may be reluctant to share their findings, due to fear of being pulled into legal proceedings by giving insurers a possible reason to withhold coverage. The net effect might end up reducing the amount of public research and the transparency of the industry overall.

Can Cybersecurity Vendors “Guarantee” Safety?
The issue of what claims to honor extends to financial guarantees from cybersecurity vendors too, not only to insurance handlers. It is becoming increasingly popular for vendors to offer warranties to customers that purchase cybersecurity products, giving real substance to their claims. However, many experts believe that cyber insurance policies have so many loopholes that they negate the benefit of any warranty. We’ve already addressed exclusion of coverage for the often cited “nation-state or act of God” exception. Other examples include portable devices, insider threats, or intentional acts. Even if you are widely covered for an event, does that extend to all employees? According to the latest Cyber Insurance Buying Guide, “most policies do not adequately provide for both first-party and third-party loss.”

Caveat Emptor
The reality for business owners and CISOs looking to protect their business is that cyber insurance is not a catchall for protecting against risk and loss, especially as cybercrime indiscriminately crosses new lines for inflicting damage. As we’ve seen, the cyber insurance industry is faced with unresolved challenges to ensure protection for victims. And cybersecurity companies making big promises that are ultimately undermined by the small print are neither a guarantee of safety or recourse. Until the industry resolves out some of these issues, it’s caveat emptor for businesses purchasing policies and cybersecurity solutions.

Related Content:

Sharon is vice president of products at Guardicore, responsible for driving product strategy for the company. He is an accomplished data and network security expert with a successful track record combining deep technical hands-on excellence with market vision to incubate new … View Full Bio

Article source: https://www.darkreading.com/caveat-emptor-calculating-the-impact-of-global-attacks-on-cyber-insurance/a/d-id/1334794?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

What a teen grade hacker’s confession can teach us

It’s hard to know whether to laugh or cry at a new column that Motherboard’s Vice started earlier this month.

It’s called Scam Academy. Pull up a chair, students: Scam Academy is where you come to read about “schemes and cheats from within the high schools and colleges of America.” The authors are not Vice journalists. No, the authors are the ones who’ve cheated and accepted Vice’s invitation to share how they did it and why.

Presuming that these stories are true confessionals and not just made up for the lulz, the most recent column could have been titled “I made money hacking my teacher’s computer to change grades. It wasn’t particularly legal, but it was fun.”

Actually, forget about laughing or crying. Instead, if you’re anybody who works in education, be it teaching or in school IT administration, you need to grab a notepad and jot down what this anonymous kid had to say, because he or she described security holes big enough to drive a school bus through.

Can’t log in? No problemo!

It all started in freshman year of high school, the grade-hacker reminisced, when they got handed an administrator’s credentials to log in.

When I couldn’t log on to my computer during class my freshman year of high school, my teacher came over and gave me the administrator login and password. I thought, Maybe we could use that somewhere else. I started looking and found out that it worked across every computer on the network.

Lesson learned: don’t share your password. Everyone should have their own account and set their own password.

Smile, you’re on school security cam

Next year, the hacker-in-training met a new friend who knew a good amount of coding. The two found the IP addresses of the school security cameras and figured out how to move them around by using a program called NetVu Observer.

It wasn’t necessarily the most legal thing, but something to do that was sort of fun.

Fun, and an excellent way for hackers to spy on a teacher’s movements.

We were still trying to figure out how to get a username and password for the network. So my friend and I positioned the cameras toward one classroom where the teacher was known to walk in and out of the room constantly. We used the cameras to see when she left before the end of school, and we caught the door before she left. She hadn’t logged off, and we got access.

Lesson learned: Always log out when you leave your computer! Failing to log off at the end of the day is the digital equivalent of leaving the door wide open for intruders, as is leaving your webcam unsecured (or behind a default password). We’ve written up numerous stories about about hackers who use the Shodan search engine to find unsecured webcams, and about the dangers of shoulder surfing.

And, while we’re on the subject of doors, leaving the door wide open for intruders is, literally, leaving your door wide open for intruders. An unlocked door can give bad actors free access to what should be physically secured areas.

Access gained, keylogger installed

Once the hackers had access to the teacher’s computer, they plugged in a keylogger that would email them a copy of whatever she typed every half hour. That’s how they got her username and password. After that, getting access to grades was a done deal:

Since we had access to her credentials, we had access to the grade book. Now we could change the grades.

Lesson learned: keyloggers suck – use antivirus.

Keyloggers, which come in either hardware or software form, are notoriously hard to detect unless the (innocent-looking, if visible at all) hardware versions are spotted. That makes them a common tool for everything from snooping on spouses to bank heists to multiple instances of kids doing exactly what this kid said they did: hacking their grades and/or getting their hands on exams and test questions in advance.

In April, we heard about a US senator’s fired sysadmin who snuck back in to his workplace and installed keyloggers so he could rip off his former colleagues’ logins. Then, he used the ripped-off employee credentials to get into senators’ Wikipedia entries so as to dox their contact information … and to steal the employees’ credit card information and taxpayer IDs; the personally identifying information (PII) of hundreds of other people; and tens of thousands of emails and internal documents belonging to the senator’s office.

These keyloggers are literally child’s play to plug in. They’re cheap, they’re easy, and they’re often undetected at the typical targets – schools, universities, libraries – that all too often have paltry budgets for equipment, software and skilled administrators.

How do you protect against keyloggers? As far as the software versions are concerned, use reputable antivirus software to keep them out. But as far as the hardware versions go, there’s no way for an operating system to detect such devices, which are plugged inline between a computer and a keyboard. Some of them are visible if you look at your USB or PS/2 port, though…

…Ever worked somewhere where the policy is to regularly check for keyloggers? Not me!

Anyway, back to the hacker cadet.

Subtle tweaks

S/he goes on to outline the logic behind how much to increase their friends’ (and what would become their clients’) grades.

We would just boost each grade by five points at the most because we didn’t want the teacher to know. If someone gets a zero and we change it to a 100, that’s pretty obvious.

The hackers were generally subtle in their grade boosts, and they were likewise modest in the cost they charged their fellow students, as in, $20. They made between $500 and $600 the first year. The columnist said the hackers “didn’t want to rip people off.”

In a less honor-amongst-thieves vein, a swelling bank account would draw attention, the hacker said:

Both of my parents could see my bank account at the time, so I didn’t want them to question where a ton of money was coming from.

Kids these days

Perhaps the biggest takeaway from this hackers training manual is that people are generally oblivious to what some kids can do, the hacker said:

IT administrators really underestimate what students can actually do.

In fact, the hacker’s coding-adept buddy found, through scanning the network’s computers, that all the schools in the district were on the same network, and that an IT admin from a different school was using a default admin account “to do all his work.” That admin was also running a program that pushed updates “to every single computer across the entire network,” which granted the marauding students access to “everything.”

That admin even had a program running the HVAC system.

Yes, poor security hygiene meant that hacking students could have controlled the temperatures in all the schools.

We were pretty happy with what we found, I’m not gonna lie.

And rest assured the kids at the school aren’t the only ones looking to profit from the alleged security holes. If they could find their way in and around the school network, what chance somebody from outside the school could too?

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/AKz4ugCTsHU/

A million devices still vulnerable to ‘wormable’ RDP hole

An internet-wide scan has revealed almost one million devices vulnerable to BlueKeep, the Windows vulnerability that has the security community on high alert this month.

BlueKeep is better known as CVE-2019-0708, a vulnerability that Microsoft announced in its May Patch Tuesday release that affects Windows Remote Desktop Services, accessible via the RDP protocol. It allows for remote code execution and is wormable, meaning that a compromised Windows machine could seek out and infect other vulnerable devices with no human interaction. Worms can spread quickly online, as we saw with the WannaCry ransomware exploit in 2017.

BlueKeep affects Windows XP, Vista, and 7 machines, but not Windows 8 or 10 boxes. The older versions make up around 35% of Windows installations, according to Statcounter. The flaw also affects Windows Server 2003 and 2008.

Security researcher Rob Graham ran a two-part scanning project to find out how many machines were vulnerable to this worrying flaw. He began by scanning the entire internet using the mass-scanning tool to find all devices responding on port 3389, the port most commonly used with RDP.

Then, he honed the results by forking a BlueKeep scanner project that ended up in the Metasploit pen testing tool last week. His fork created rdpscan, a tool designed to quickly iterate over a large set of addresses looking for Windows boxes vulnerable to BlueKeep exploits.

He did this over Tor, but says he probably wasn’t the person who caused a spike in RDP scans via the anonymous onion routing service last week:

That’s far more systems vulnerable to BlueKeep than there vulnerable to the flaw that enabled WannaCry to spread around the globe in a day.

Kevin Beaumont, the security researcher who gave BlueKeep its nickname, pointed out that the number of machines exposed to the internet via RDP is just be the tip of the iceberg:

Microsoft has released patches for this flaw (here and here). The problem, as with the CVE-2017-0144 vulnerability that prompted WannaCry, is getting people to apply them. There was a patch available for CVE-2017-0144 two months before WannaCry appeared, but it still wreaked havoc.

So if you haven’t patched already, you’d better get on with it advises Paul Ducklin, Senior Technologist at Sophos:

The word ‘zero-day’ understandably fills us with dread, because it refers to an exploitable hole that is already being attacked but for which no patch yet exists. So don’t turn already-patched holes back into your own personal zero-day situation by not applying patches that do exist! The crooks will not only go looking and find you, but also have the keys to the castle in advance.

Some tardy patching is down to a lack of awareness, but complexity is also an issue. If you have Windows XP Embedded running on an arcane piece of equipment that’s supporting a critical process, patching it is a scary prospect.

If you’re unable to patch immediately, there are other things you can do in the meantime. The clearest is turning off Remote Desktop Services if not needed, or at least turning on Network Level Authentication for it, if you do need it. You could also block port 3389 at the external firewall level.

Experts concur that a real-world exploit is likely a matter of time and several security vendors have now demonstrated working code that they are not releasing.

The race to patch is on.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/tgjwybamyFY/

New Zealand’s “hacked” budget was found on a website

New Zealand’s Treasury office said it had been “deliberately and systematically hacked,” with evidence showing more than 2,000 hacking attempts recorded over a 48-hour period from Sunday through Tuesday.

On Tuesday, the National Party – a center-right political party in New Zealand that’s also known as the Nats or National – published what it said were secret budget details. They were the same parts of the budget that were affected by the hacking attempts.

National leader Simon Bridges refused to say how National got its hands on the budget details two days before they were due to be published, though he said it was legitimate and rejected any implications that National got at the leaked documents via hacking.

The BBC quoted Bridges:

There has been no hacking under any definition of that word. There has been entirely appropriate behavior from the National Party the whole way through. There has been nothing illegal or even approaching that.

[The government is] not in control of what they are doing, so they are lashing out and they are having a witch-hunt.

According to the Guardian, Finance minister Grant Robertson said he had contacted National to ask that it stop releasing any more budget documents, given that they could have been sourced from the hack.

Bridges called for Robertson to resign.

Treasury Secretary Gabriel Makhlouf said that the attacks have been referred to the police. The Treasury doesn’t know, at this point, whether the attacks came from inside or outside of the country, he said.

One heck of a hot-potato budget

This is no normal budget. It’s the nation’s, and what its proponent say is the world’s first so-called “wellbeing” budget. The controversial budget prioritizes mental health, domestic violence and child poverty in its spending decisions, being guided not only by traditional cost-benefit fiscal and economic analysis but also by a range of indicators measuring everything from loneliness to water quality.

Critics contend that the government might not have enough spending power to fund this approach, with debt currently forecast at 21% of gross domestic product, as Reuters reports.

In short, there’s been a lot of buzz about this particular budget, and it’s not entirely surprising that hackers want to get at it.

Why didn’t anybody notice?

A reporter at RNZ asked Makhlouf how it came to be that over 2,000 attacks, coming one after another in sub-second intervals, could go undetected for 48 hours?

You don’t have anybody who was monitoring the website? There was no way of it essentially flagging that this specific area was under attack?

You had no safeguards in place? …specifically around the budget to be released tomorrow?

He replied that the Treasury does penetration testing that works quite well, but he didn’t address what appears to be a lack of ongoing monitoring. Makhlouf said that the 2,000 hacks had eventually succeeded in exploiting a weakness in the system, though he didn’t give details.

When asked how the Treasury was going to bolster the security on its systems, Makhlouf said that some people who previously had access to the data no longer do – a situation that’s causing some inconvenience for those responsible for publishing the budget, he said.

He said there’s no evidence that the leak might have come from a rogue employee or other type of internal actor, as opposed to a remote attack, and declined to speculate on how National could have gotten the budget details if not by hacking. Makhlouf also said that the breach was definitely not caused by incompetence – as in, nobody accidentally posted the budget details online.

…perhaps because it wasn’t a hack

On Thursday 30 May, the Treasury released a statement saying that the police had already closed the investigation because it wasn’t a hack at all:

Following Tuesday’s referral, the Police have advised the Treasury that, on the available information, an unknown person or persons appear to have exploited a feature in the website search tool but that this does not appear to be unlawful. They are therefore not planning further action.

The statement goes on to explain that the government had prepared a “clone” of the live website that wasn’t public (a staging website in the vernacular) that contained budget data. The clone would have replaced the live site on the day the budget was released.

The treasury maintains that even if no law was broken, something fishy was going on:

The evidence shows deliberate, systematic and persistent searching of a website that was clearly not intended to be public. Evidence was found of searches that were clearly intended to produce results that would disclose embargoed Budget information.

It remains to be seen if this was an “inside job” – the Treasury statement says it has identified three IP addresses involved in the incident and that one of them belongs to the Parliamentary Service.

Whether it was or not, it’s a useful reminder that development and staging versions of websites, and other websites that aren’t supposed to be public, are a favourite target for hackers because their security is so often overlooked.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/XsD3I6mWsQ8/

The cryptominer that kept coming back

One of computer security’s special frustrations is the phenomenon of malware that keeps re-infecting a system no matter how many times defenders think they’ve cleaned it.

This was the puzzle that recently confronted Sophos Support when it was called in to investigate the mystery of an internet-facing Apache Tomcat web server that couldn’t seem to shake a Monero cryptominer called XMrig.

Thanks to its open-source status, XMrig has recently become more popular – and, fortunately, it’s not that hard to spot, in this case by way of intrusion detection and command and control detection alerts.

Nevertheless, while the automated reinstatement of this kind of malware had turned up in SophosLabs honeypots before, it had never been detected in the wild.

The server’s OS and applications were fully up to date which means that the attackers were either exploiting an unknown software flaw or had found another, more parochial weakness.

Analysis of the network packets allowed Support to peel back the layers of the attack, and identify the root cause as a successful brute-force attack on the Tomcat’s internet-facing admin panel.

Armed with admin-level access, the attacker was aided by the fact that the server was configured to allow the upload of executables using the Web Application Resource (.war) format, which was used to transfer a malicious admin.jsp file.

This enabled the execution of three commands using HTTP POST requests: SI (which returns system information), UF (file creation on the server) and SH (command execution).

The SH command was used to execute code that contacted a remote server, which responded by offering up the XMrig cryptominer as well as some PowerShell that attempted to kill three server processes that weren’t in fact running.

Sitting duck

Ostensibly, the glaring vulnerability was that the compromised server’s admin panel used a weak, easily guessed or default password, the foothold the attackers needed for the compromise. Specifically:

The initial phase of the attack was marked with a brute-force credential stuffing attempt at the Tomcat admin panel, and once the attackers successfully logged in as an admin, all bets were off.

Certainly, where an attack is reinstating quickly, the security of the server’s credentials should come under immediate suspicion. Changing these as a precaution costs nothing.

But there was a second big problem, namely that the admin panel was reachable from the internet at all. This gives criminal hackers all the time in the world to conduct a brute force attack against its passwords, and an opportunity to shrug off those passwords completely if a vulnerability is discovered in Tomcat’s admin code.

The combination of these two issues on a server where admins can upload executables and files offered the sort of target that invites trouble. This attack could have been so much worse than a bout of nuisance cryptomining.

Simple risk assessment tells us this. If the front door is visible enough to be a target, what sort of power lies beyond? In the case of this server, too much.

Ideally, admin access should be restricted to internal IP addresses. Where that’s not possible, the use of multi-factor authentication – such as client digital certificates – should be a minimum rather than a luxury.

You can read more about this attack and delve into the technical details in the SophosLabs Uncut article Worms deliver cryptomining malware to web servers.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/9UwbgHXkegA/