STE WILLIAMS

Master NSA-Grade Security Tools at New Black Hat Trainings Virginia

Get ready, because this October Black Hat will bring its highly-regarded Trainings to Alexandria, Virginia for two days of intensive, practical cybersecurity education.

This October an all-new Black Hat Trainings event comes to Virginia, and it’s is a great opportunity to develop your skills in some of the most technical, hands-on security courses available anywhere.

At this special Trainings-only event there’s a great course on Reverse Engineering Firmware with Ghidra, for example, which promises to teach you the concepts, tools, and techniques required to reverse engineer firmware and assess embedded devices.

To ensure the tools taught are available to all in this two-day Training, you’ll be taught to use Ghidra, a powerful open-source reverse engineering tool developed by the National Security Agency. This free, capable tool eliminates the high cost of entry from expensive commercial tools currently used for these tasks, Plus you’ll practice using it against both an embedded Linux device and a bare-metal ARM device.

Information Operations – Influence, Exploit, and Counter is another valuable course designed to give you a practical primer on information operations: activities that involve the use of information to influence people, companies, and nations.

This course is developed and taught by career Army officers with a combined 50+ years of experience. While all material discussed will be unclassified, the Training is sure to teach you some novel approaches through  hands-on exercises that will apply and reinforce the skills learn. Not to be missed is a best IO campaign contest conducted live during the class.

In Dark Side Ops – Malware Dev you’ll spend two days diving deep into source code to gain a strong understanding of malware execution vectors, payload generation, automation, staging, command and control, and exfiltration. It’s  a great way to get lots of practical, hands-on experience with malware in a hurry along with the opportunity to observe black hat techniques currently used by hackers to bypass NIDS and HIPS systems, layer 7 Web proxies, “next-gen” antivirus, and DLP solutions.

These cutting-edge Black Hat Trainings and many more (listed below) will be taking place October 17th and 18th at the Hilton Alexandria Mark Center in Alexandria, Virginia.

●      Active Directory Attacks for Red and Blue Teams – Advanced Edition

●      Advanced Infrastructure Hacking – 2019 Edition

●      Astute Hunting in the Cloud – Bring the Thunder!

●      Data Breaches – Detection, Investigation, and Response

●      Military Strategy and Tactics for Cyber Security

●      Python Hacker Bootcamp – Zero to Hero

●      Web Hacking – Black Belt Edition 2019

From infrastructure hacking to incident response, there’s a course for hackers and security pros of all experience levels, so register today!

Article source: https://www.darkreading.com/black-hat/master-nsa-grade-security-tools-at-new-black-hat-trainings-virginia/d/d-id/1334799?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Why telcos ‘handed over’ people’s GPS coords to a bounty hunter: He just had to ask nicely

A bounty hunter was able to get the live location of a number of different individuals from American cellphone networks through a single phone call, it is claimed.

Matthew Marre was charged [PDF] last month with allegedly obtaining “confidential phone record information … by making false and fraudulent statements and representations.” It is claimed he called a hotline run by various mobile networks, and asked for the GPS location of specific cellphones – all of which belonged to people that were wanted for skipping bail.

The ruse was apparently extremely successful, according to Colorado federal court documents that have subsequently been restricted from public view. The paperwork, submitted by prosecutors, alleged that, last year, he successfully persuaded T-Mobile USA to hand over location data for six phone numbers, and as a result he collared three people who were using the numbers.

In one extraordinary tale, Marre allegedly contacted the police when he believed one person he was tracking was breaking into a house. The cops turned up but were unable to find the suspect, so Marre returned to his laptop, updated the GPS tracking on the suspect’s phone, and apparently found the person hiding in bushes at the back of the property.

The same ruse also seemingly worked with Verizon and Sprint, leaving only ATT as a company that did not hand over highly confidential information on the basis of a single phone call – and that may only be because none of the people Marre was tracking used ATT. The now-restricted court filing was noticed and discussed publicly earlier today by terrorism expert and PACER-whisperer Seamus Hughes.

But while the story is fascinating, Marre’s apparent ability to obtain the data has put a further spotlight on the sharing of location data by mobile operators: an issue that privacy groups and an FCC Commissioner are calling for a full investigation into.

What is remarkable is that Marre was seemingly able to get the information at all. As the prosecutors’ court doc notes, every mobile network operator has “24-hour law enforcement assistance operators that are available to assist in emergencies across the US to aid any law enforcement agency that is involved in an emergency that potentially involves death or serious bodily injury.”

The police are required to follow a “legal court process compelling the companies to assist law enforcement” i.e. get a warrant before mobile operators are supposed to hand over location data. But there is an exception for emergencies.

Implication

“In an emergency, without legal process if the situation potentially involves death or serious bodily injury that could occur without immediate action,” then operators are allowed to forego the normal legal process. This, in theory, is the bar that Marre should have jumped: an emergency that involved potential death. But it would appear that Marre didn’t even give a solid representation that he was a police officer, let alone one in the midst of a life-threatening situation.

The prosecution’s court doc indicates that one mobile operator, in explaining its decision to hand over location data, said that “a male who identified himself as a Matthew Marre, claiming to be an investigator for the ‘Colorado Department of Public Safety’ and the ‘Colorado Task Force’,” contacted them and asked for the information, which they then handed over.

Senator Wyden goes ballistic after US telcos caught selling people’s location data yet again

READ MORE

When Marre was interviewed following the bush-tracking incident, he told a police officer that he was the owner of “Colorado PSC LLC” and had been contracted by a bail bond company to track the man in question.

We haven’t been able to find a limited liability company called “Colorado PSC” but it is possible that Marre simply implied he was a police officer by saying he was from “Colorado PSC” and was given the information by the mobile operator. It is notable that he used his real name rather than a pseudonym.

The indictment against him also claims that he “provided a document… knowing such document was false and fraudulent.” It’s not clear what that is in reference to and it may be a further check run by mobile operators before approving location data, but it is not clear at this stage since neither law enforcement nor mobile operators want their verification processes to become public knowledge.

Either way, Marre was apparently able to get hold of information that should been restricted only to law enforcement officers in an emergency situation – and was able to do so repeatedly with three of the four mobile operators, suggesting at the very least that those companies have lax data protection systems in place.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/05/23/telco_location_data/

WikiLeaks boss Assange acted as a foreign spy, Uncle Sam exclaims in fresh rap sheet

Julian Assange has been formally accused by the US government of breaking the Espionage Act 18 times, expanding the legal case against him and raising significant free speech issues.

The Department of Justice announced on Thursday that it was effectively accusing the WikiLeaks founder of having acted as a foreign spy when he published hundreds of thousands of highly confidential US government reports, including war logs and diplomatic messages.

Assange spent years holed up in the Ecuadorian embassy in London, England, after avoiding a probe into sexual assault allegations against him in Sweden. Then last month, Assange was handed over to the UK authorities by Ecuadorian officials: he was subsequently jailed for 50 weeks for breaking his bail conditions in Britain by moving into the embassy and refusing to leave. Meanwhile, Uncle Sam has started extradition proceedings against him to haul the WikiLeaker into an American court.

The US government initially charged Assange with conspiracy to commit computer intrusion, which could lead to a five-year jail sentence if convicted. These latest charges [PDF] expand that case to the more serious issue of espionage, which would come with lengthier sentences, possibly even an effective life behind bars.

“If convicted, he faces a maximum penalty of 10 years in prison on each count except for conspiracy to commit computer intrusion, for which he faces a maximum penalty of five years in prison,” Justice Department officials said.

What is unsaid is that the US government is seeking to make an example of a man who has actively annoying the American authorities for over a decade.

Charging Assange under America’s Espionage Act does, however, raise significant free speech questions, especially since Assange is likely to argue that his actions were protected under the nation’s First Amendment.

The US government has never charged a journalist under the Espionage Act for publishing classified info, so there is no clear precedent over the extent to which a journalist’s work – including receiving and publishing confidential documents – is protected by the First Amendment.

Journalist or spy?

However, the US government is likely to argue that Assange is not in fact a journalist. Which on one level is perfectly true – he does not act as a conventional journalist in that he doesn’t produce or edit stories. But at the same time many of the methods he employs to get hold of information and made it publicly available are effectively the same, making it hard to draw a distinction.

The US government has had years to explore the issue and presumably feels it has a winnable case against the controversial figure. It is not clear where the Department of Justice will try to draw distinctions in the internet era between what the Fourth Estate does and what Assange and Wikileaks have done.

The DoJ points to Assange’s active assistance of former intelligence analyst Chelsea Manning in getting hold of the documents and what it claims was an active decision to “injure” the United States.

Assange

Julian Assange jailed for 50 weeks over Ecuador embassy bail-jumping

READ MORE

“Assange was complicit… in unlawfully obtaining and disclosing classified documents related to the national defense,” the announcement reads. “Assange conspired with Manning; obtained from Manning and aided and abetted her in obtaining classified information with reason to believe that the information was to be used to the injury of the United States or the advantage of a foreign nation.”

It also noted that WikiLeaks published “the unredacted names of human sources who provided information to United States forces in Iraq and Afghanistan, and to US State Department diplomats around the world.”

Again, this appears to be a distinction between WikiLeaks and the work of journalists, who went to some lengths to remove the names of individuals when they wrote about the same documents.

“Assange’s actions risked serious harm to United States national security to the benefit of our adversaries and put the unredacted named human sources at a grave and imminent risk of serious physical harm and/or arbitrary detention,” the prosecutors’ announcement states.

Whatever happens it is certain to be very carefully watched and will likely have very significant implications in future.

“The indictment of Julian Assange under the Espionage Act for publishing classified information is an attack on the First Amendment and a threat to all journalists everywhere who publish information that governments would like to keep secret,” thundered the Committee to Protect Journalist’s executive director Joel Simon.

“Press freedom in the United States and around the world is imperiled by this prosecution.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/05/23/assange_new_indictment/

Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online

Exclusive The maker of vehicle license plate readers used extensively by the US government and cities to identify and track citizens and immigrants has been hacked. Its internal files were pilfered, and are presently being offered for free on the dark web to download.

Tennessee-based Perceptics prides itself as “the sole provider of stationary LPRs [license plate readers] installed at all land border crossing lanes for POV [privately owned vehicle] traffic in the United States, Canada, and for the most critical lanes in Mexico.”

In fact, Perceptics recently announced, in a pact with Unisys Federal Systems, it had landed “a key contract by US Customs and Border Protection to replace existing LPR technology, and to install Perceptics next generation License Plate Readers (LPRs) at 43 US Border Patrol check point lanes in Texas, New Mexico, Arizona, and California.”

On Thursday this week, however, an individual using the pseudonym “Boris Bullet-Dodger” contacted The Register, alerting us to the hack, and provided a list of files exfiltrated from Perceptics’ corporate network as proof. We’re assuming this is the same “Boris” involved in the CityComp hack last month. Boris declined to answer our questions.

Screenshot of Perceptics files

Archives of files stolen from Perceptics touted on the dark web this week … Click to enlarge

The file names and accompanying directories – numbering almost 65,000 – fit with the focus of the surveillance technology biz. They include .xlsx files named for locations and zip codes, .jpg files with names that refer to “driver” and “scene,” .docx files associated with presumed government clients like ICE, and date-and-time stamped .jpgs and .mp4 files.

And there many other types of files: .htm, .html, .txt, .doc, .asp, .tdb, .mdb, .json, .rtf, .xls, and .tif among others. Many of the image files, we’re guessing, are license plate captures.

The files also include .mp3 files, presumably from someone’s desktop or laptop PC. Among the songs: Superstition, by Stevie Wonder, and Wannabe by Spice Girls, and a variety of AC/DC and Cat Stevens songs.

A Ransom Note

Extortionist hacks IT provider used by the stars of tech and big biz, leaks customer info after ransom goes unpaid

READ MORE

The stolen files amount to hundreds of gigabytes and include Microsoft Exchange and Access databases, ERP databases, HR records, Microsoft SQL Server data stores, and so on. This information, which includes business plans, financial figures, and personal information, is presently available in multiple .rar files on the dark web.

The nature of the company’s business – border security data acquisition, commercial vehicle inspection, electronic toll collection and roadway monitoring – means that it’s likely to have a significant amount of sensitive information.

A spokesperson for Perceptics, reached by phone, confirmed that the company was aware that its network had been compromised. She said the biz is working with authorities to investigate, but declined to go into further detail.

With the CityComp hack, stolen files were released because a ransom was not paid; we have yet to determine whether a ransom was sought for the Perceptics files.

At the time of writing, the company’s website redirected to Google.com. As we were about to publish this piece, however, we noticed the site was once again functioning properly. It’s likely to take longer still for the business to recover from this cyber-break-in. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/05/23/perceptics_hacked_license_plate_recognition/

FEC Gives Green Light for Free Cybersecurity Help in Federal Elections

Official opinion issued by the Federal Election Commission to nonprofit Defending Digital Campaigns is good news for free and reduced-cost security offerings to political candidates and committees.

The Federal Election Commission (FEC) has approved a request by nonprofit Defending Digital Campaigns (DDC) to offer federal candidates and national political party committees free and discounted cybersecurity services as a way to beef up US election security.

In an opinion letter issued on May 21 to DDC, the FEC said it reached its conclusion “under the unusual and exigent circumstances presented by your request and in light of the demonstrated, currently enhanced threat of foreign cyberattacks against party and candidate committees, the Commission approves DDC’s proposed activity.”

DDC — a nonpartisan nonprofit founded by Matt Rhoades, former campaign manager for Mitt Romney, and Robby Mook, former Hillary Clinton Campaign manager — last year published the free “Cybersecurity Campaign Playbook” for campaigns to better secure their data and online accounts. The organization had officially requested FEC approval last fall to ensure its plans to offer free and discounted services to political committees and campaigns complied with federal campaign finance rules.

Meanwhile, several major cybersecurity vendors and service providers, such as Google, Microsoft, CloudFlare, Akamai, and McAfee, began offering free website and user-account protection services, among others, to election municipalities and candidates since the runup to the 2018 elections, and in the wake of the Russian hacking of the Democratic National Committee, Democratic Congressional Campaign Committee, and former Hillary Clinton campaign manager John Podesta’s email account during the 2016 presidential election.

State and local election jurisdictions and campaigns are notoriously cash- and resource-strapped when it comes to technology, and especially security, so the freebie offerings were embraced by security experts as well as the election jurisdictions that opted for the services.

The FEC opinion issued this week specifically addresses the DDC’s request, but it should also provide guidance for existing cybersecurity offerings for the elections that fit the criteria specified by the agency. One stipulation, for example, is that the services cannot “defray expenses that committees would have incurred regardless of cybersecurity efforts, such as expenses for computers; only the securing of such computers against digital intrusion is within the scope of this opinion,” the FEC wrote in its opinion.

But if another vendor doesn’t follow the same criteria, its services may not be considered FEC-approved. “Therefore, if another person’s proposed activity were to differ in any materially distinguishable manner from the activity described in the opinion, they may wish to consider requesting their own advisory opinion from the Commission in order to receive formal legal guidance,” an FEC spokesman told Dark Reading.

DDC as an Intermediary
The DDC specifically plans to offer free or reduced-cost cybersecurity-related software and hardware and services, as well as information-sharing systems; a cybersecurity hotline; cybersecurity bootcamps, training, and certification courses; on-site training; and incident response and monitoring services via partnerships with suppliers. DDC will act as an intermediary to negotiate software licenses and service contracts from security vendors and providers, and to ensure proper installation and use of tools.

All registered national political party committees and federal candidate committees are eligible — including the DNC — for cybersecurity help via DDC, as is a House candidate committee with a minimum of $50,000 in receipts for the current election cycle; a Senate candidate committee with a minimum of  $100,000 in receipts for the current election cycle; and a presidential candidate’s committee if he or she is polling above 5% in national polls.

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/application-security/fec-gives-green-light-for-free-cybersecurity-help-in-federal-elections/d/d-id/1334797?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Moody’s Downgrade of Equifax: A Wake-up Call to Boards

The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.

Wall Street has been abuzz this week over drastic measures by credit ratings agency Moody’s to downgrade its rating of Equifax, with expensive data breach fallout named as a major factor for the poor marks. While the action was not unexpected, the landmark nature of the downgrade should provide some needed emphasis to both boards of directors and CISOs of the modern business imperative for cyber resilience, security and risk experts say.

“Today’s news puts a punctuation mark on the business reality of cybersecurity risks,” says Kevin Bocek, vice president of security strategy and threat intelligence at Venafi, who believes this is going to push more boards to take in increasingly active role in understanding and managing cybersecurity risks. “They definitely need to do more than ask the CISO some high-level questions. Equifax is in the hot seat now, but most of the Fortune 500 CEOs and CISOs would do no better in the same situation.”

CNBC broke the news last night of the note from Moody’s on the downgrade that cited the $690 million in breach expenses — including costs for settling mounting class action lawsuits — and increased need for infrastructure investments to be made by the company through 2020 to address systemic cybersecurity weaknesses found in post-breach scrutiny.

Joe Mielenhausen, a Moody’s spokesperson, told CNBC that “this is the first time the fallout from a breach has moved the needle enough to contribute to the change” in ratings outlook.

Equifax’s record-breaking data breach, first disclosed in September 2017, was eventually found to have exposed the information of 147.9 million people. Technically the exposure was triggered through the exploitation of an unpatched Apache Struts vulnerability, but security industry experts and government officials say that more serious organizational problems and lack of executive oversight were the true culprit of what Congress called an “entirely preventable” breach. 

The fallout from the breach included the ouster of Equifax’s CISO and eventually its CEO, and the company is still feeling the effects of class action suits from consumers and shareholder derivative lawsuits

“This is Moody’s delivering on their intent last November to take cyber risk into account when grading companies,” says Steve Durbin, managing director of the Information Security Forum. “This will certainly send a clear message to boards in a language that they understand that cyber risk is integral to business risk and that the implications of a breach or loss of data can have very real impact.” 

Durbin says he’s been advocating for some time to both the insurance industry and credit rating agencies to take cyber risk into account as they set policy pricing and assess company value. He believes this action by Moody’s will set the tone for assessment of business health in the future.

“Moving forward, this should become the norm since cyber risk is so integral to business risk that an assessment of business health without taking cyber risk and a company’s resilience into account will become meaningless,” he says.

Indeed, CNBC reported that Moody’s hinted as such in its Equifax note, stating that it will increasingly scrutinize cybersecurity “for all data oriented companies” in the future.

Security insiders say that this Moody’s action should not only be a wake-up call to CEOs and boards, but it’s also a crucial inflection point for CISOs.

According to Laurence Pitt, security strategy director at Juniper Networks, it’s another “chance in conversation” for security leaders — one that they shouldn’t blow by lacking the right data or insights about organization-wide cyberrisk. 

“This incident changes how business will look at cybersecurity, so cybersecurity needs to change how it talks to business,” he says.

Related Content: 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/moodys-downgrade-of-equifax-a-wake-up-call-to-boards/d/d-id/1334800?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

To Manage Security Risk, Manage Data First

At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.

INTEROP 2019 – LAS VEGAS–  At a time when organizations are launching digital transformation projects, bringing more devices onto their networks, and embracing cloud technology, it’s imperative leaders work together to create a plan for protecting vast stores of information.

It’s no secret that cybersecurity and business teams often have a rocky relationship. As Optiv practice director Mark Adams explained here at Interop, security is viewed as a drag on the business. “It doesn’t demonstrate a value proposition,” he said.

But business teams are not going to slow the pace of innovation, so security must help stay competitive by protecting the tech they want to use. “Unfortunately, there isn’t a real handbook around this,” Adams noted, but it’s important for security teams to understand what’s important for the business.

The problem is, most don’t. The majority of cybersecurity teams can list priorities for their agendas, but they can’t name even one of the top three business priorities. Responsibility for all this ultimately falls to the CISO, as board members expect the security lead to be “a very savvy business person,” he explained.

Digital transformation, however the business goes about it, carries tremendous implications for security staff. While great for the organization, these projects usually result in even more data being created, said Maxine Holt, research director for security at Ovum, in a discussion about digital transformation and privacy. Security functions must recognize and address the challenges.

Part of the problem in managing the influx of information is most companies either don’t know where their data resides, what they want to protect, where backups are located, or answers to many other questions related to the management of the data they store. Security teams can stem the flow of information in a data leak, but that won’t fix the core issue.

“The way companies need to think about data has to change tremendously,” noted Etan Lightstone, vice president of product design at ShiftLeft. Here are a roundup of the ideas, trends, and challenges around data management voiced by experts who spoke at Interop this week.

Know What Your Valuables Are
CISOs and security leads can’t put a program around data governance if they don’t know what to protect, Optiv’s Adams said. It’s the first part of a data management strategy: Identify the most precious information the business needs to operate, know where it is, and prioritize its security. Sensitive data should be kept to a minimum and be given the strongest protection.

This isn’t a one-time job, said Stacey Halota, vice president of information security and privacy at Graham Holdings Co., in a keynote. As a business changes, so, too, does its most valuable data. Her team conducts an inventory each year and requires each organization under Graham Holdings to report the data elements they have, where they go, where their backups are located, and other information so the full business knows what it’s collecting over time.

When data is no longer required to help a department or company operate, it should be deleted. The process for deciding what should stay and go is a complicated one, Halota explained. She said she has built relationships with division heads across the business so she can learn what they need and negotiate when it’s time to eliminate data that’s no longer of value.

Watch Data Wherever It Goes
Businesses need to worry about data wherever it resides, said Shawn Anderson, executive security adviser in Microsoft’s Cybersecurity Solutions Group. Many businesses focus on endpoint security but should be thinking more broadly about where data is located – not only on employee computers, but in the cloud, on mobile devices, and on a growing pool of IoT devices.

“You need to think differently about working in the cloud than you do on-prem,” said Anderson in a session focused on endpoint security. The cloud is rapidly driving the amount of data companies collect, process, store, and use. Security teams can better protect data by focusing on identity: enabling multifactor authentication, blocking legacy authentication, increasing visibility into why identities are blocked, and monitoring and acting on alerts.

Businesses should protect their applications and verify those that employees can access. “All of the different governance practices pretty much boil down to knowing who your users are and whether they have the appropriate access,” said Michael Melore, an IBM cybersecurity adviser. “People have privileges that they no longer require. That’s an unnecessary risk.” There should be processes in place to acknowledge whether privileges are no longer needed.

No matter how much software is on the endpoint, attackers will win if you lack a data protection strategy, Anderson said. Sensitive data should be secured from the time it enters the organization: It should be detected when it arrives, classified and labeled according to policy, and protected as it travels across the business before it’s eventually retired and deleted.

A Closer Eye on Compliance
Compliance is not strictly a security issue, Ovum’s Holt explained, but it is a lever on security and attracts board-level interest. She pointed to scenarios in which organizations were fined for noncompliant security and privacy practices. For example, one Portuguese healthcare provider was fined €400,000 (US$447,328) because staff illicitly accessed patient records. A German social media company was fined €20,000 (US$22,366) for storing passwords in plaintext. Google was fined €50 million (US$55,917,500) for failing to meet transparency and information requirements, and not obtaining a legal basis for processing.

Government regulations, industry standards, and compliance requirements such as GDPR and NIST can cause an organization’s information risk and security capabilities to change “often and quickly,” said John Pironti, president of IP Architects. He recommended companies document the types, amounts, and priority of information they find acceptable and unacceptable. This “information-risk appetite” should be developed alongside business leaders and stakeholders.

Still, different regulations have different definitions of what constitutes sensitive data. As Graham Holdings’ Halota pointed out in her talk, the California Consumer Protection Act (CCPA) puts a broader range of data under “personally identifiable information” than the GDPR. Graham Holdings had to repurpose its data governance solution to redefine risk assessment and expand its document repository so it was properly collecting and categorizing data.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/cloud/to-manage-security-risk-manage-data-first/d/d-id/1334802?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Researcher Publishes Four Zero-Day Exploits in Three Days

The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues.

A vulnerability researcher published four previously unreported flaws in Microsoft Windows over three days this week, flaws that could allow a local user to escalate their rights on a compromised system to that of an administrator.

Exploits for the four flaws — plus a fifth vulnerability that Microsoft fixed last week — were posted by the researcher to a GitHub repository using the name SandboxEscaper. The researcher, who has published working zero-day attacks for legitimate vulnerabilities in the past, posted the first exploit on Tuesday, May 21, with two more exploits published on each of the next two days.

The danger from the issues is likely to be low, but the code could be incorporated into popular malware frameworks, says Craig Young, a computer security researcher with Tripwire’s Vulnerability and Exposure Research Team (VERT).

“Overall, these vulnerabilities do not markedly change the typical security advice to use a layered approach to security, including endpoint monitoring,” he says. “Unlike the Task Scheduler exploit disclosed earlier in the week, these bugs do not require the attacker to know a username and password — meaning that some of them could more realistically be incorporated into malware.”

Publishing, or “dropping,” unknown vulnerabilities and exploit code used to be a popular way for vulnerability researchers to punish software vendors for a lack of focus on software security or for a lack of response to researchers’ vulnerability reports. However, as companies have increasingly taken security more seriously, and the impact of exploited vulnerabilities has grown more dire, researchers are far more likely to cooperate with software makers to fix issues, in a process known as coordinated disclosure.

Microsoft and the researcher may have collaborated on one of the issues, which resulted in the software giant fixing it earlier this month during its regular Patch Tuesday release. In a bulletin, Microsoft stated it had fixed the issue, identified as CVE-2019-0863, and credited both Palo Alto Networks and PolarBear, one name associated with SandboxEscaper. The GitHub repository that hosted the exploits published by the researcher was called PolarBearRepo.

Following the posting of the four other exploits, however, Microsoft was more circumspect.

“Microsoft has a customer commitment to investigate reported security issues and we will provide updates for impacted devices as soon as possible,” the company said in a statement. “We urge finders to practice coordinated vulnerability disclosure to reduce the potential risk to customers.”

SandboxEscaper published five exploits on GitHub. On Tuesday, the researcher published a code snippet called BearLPE, which exploits the Task Schedule to escalate local privileges. Local privilege escalations are techniques in which the attacker gains more capabilities on the targeted system by circumventing the operating system protections around user roles.

On Wednesday, the researcher published two more exploits, including one called AngryPolarBearBug2, which targeted the issue Microsoft patched the week before. The researchers followed on Thursday with another two exploits.

While the issues are mostly straightforward to exploit, two vulnerabilities are a type of vulnerability known as a race condition, and they require specific action to be conducted within a very tight time frame, making them more difficult to use successfully, says Satnam Narang, a senior research engineer at security firm Tenable.

“Some of these zero days are really hard to exploit, and some are a matter of having certain policies in place to address them, of having certain products and security tools,” he says.

Because the exploits cannot be used remotely, they are not as dangerous as some attacks, says Tripwire’s Young.

“Similar to past SandboxEscaper releases, these exploits are also local privilege escalations, meaning that attackers would use these only after gaining a foothold on a targeted system,” he says.

SandboxEscaper has gained a reputation for releasing LPE exploits with no warning. The researcher has posted repeatedly of her dislike for the software and security industries.

“F— this s—– industry. I don’t plan to make a career in it anyway,” she wrote in a post on Wednesday. “I hate all the people involved in this industry. Everyone just thinks they know better. Everyone just loves pointing fingers.”

Related Content:

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/researcher-publishes-four-zero-day-exploits-in-three-days/d/d-id/1334806?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Google stored some passwords in plaintext for 14 years

Oops, Google said on Tuesday: you know that domain administrator’s tool to reset passwords in the G Suite enterprise product? The one we implemented back in 2005, as in, 14 years ago?

We goofed, Google said. The company’s been storing copies of unhashed passwords – as in, plaintext, unencrypted passwords – all this time.

From a blog post written by Google vice president of engineering Suzanne Frey:

We made an error when implementing this functionality back in 2005: The admin console stored a copy of the unhashed password. This practice did not live up to our standards.

Only a small number of enterprise customers were affected, she said, though Google hasn’t put a number on it. People using the free, consumer version weren’t affected. Google’s notified a subset of its enterprise G Suite customers that some of their passwords were stored in plaintext in its encrypted internal systems.

Frey said that no harm came of it, as far as Google can ascertain, and it’s since been fixed:

To be clear, these passwords remained in our secure encrypted infrastructure. This issue has been fixed and we have seen no evidence of improper access to or misuse of the affected passwords.

How it’s supposed to work

The way Google typically handles passwords is by scrambling them with a hashing algorithm so humans can’t read them. It then stores hashed passwords along with their usernames. Then, both usernames and hashed passwords are encrypted before being saved to disk.

The next time a user tries to sign in, Google again scrambles their password with the same hashing algorithm. If the result matches the stored string, Google knows you must have typed the correct password, so your sign-in can proceed.

As Frey explained, the beauty of hashing is that it’s one-way: scrambling a password is easy, but it’s nearly impossible to unscramble it. So, if someone gets your scrambled password, they won’t be able to backtrack to your real password. Presuming, that is, that it’s also been salted. A salt is a random string added to a password before it’s cryptographically hashed.

The salt isn’t a secret. It’s just there to make sure that two people with the same password get different hashes. That stops hackers from using rainbow tables of pre-computed hashes to crack passwords, and from cross-checking hash frequency against password popularity. (In a database of unsalted hashes, the hash that occurs most frequently is likely to be the hashed version of the notoriously popular “123456”, for example.)

The downside of that one-way password hashing street is that you’re out of luck if you forget your password: Google can’t help you out by unscrambling your password for you. What it can do is to reset your password to a temporary password, make it valid only for one-time use, and then require you to pick a new one.

That’s the way it should work, anyway, though we’ve seen plenty of cases where forgetful users get emailed their plaintext password: an indication that their passwords are being stored, in plaintext, unsalted and unhashed.

Goodbye, handy dandy password recovery tool

To avoid storing passwords in plaintext, and to still be able to help out users who’ve forgotten their passwords, Google in 2005 introduced a tool for password setting and recovery to G Suite.

The tool, located in the admin console, enables admins to upload or manually set user passwords for their company’s users. Google’s intent behind introducing the tool was to help with onboarding of new users, such as when a new employee needs an account on the first day they start work, and also for account recovery.

That tool was apparently the component that stored plaintext passwords.

But wait, there’s more.

Google says that when it was troubleshooting its new G Suite customer sign-up flows, it discovered that starting in January 2019, it also inadvertently stored a subset of unhashed passwords inside its network.

This time, the passwords were supposedly there for at most 14 days.

That plaintext glitch has also been fixed. And like the other glitch, this second one apparently didn’t lead to anybody getting at the passwords, either.

Sorry, Google said: we’ll try to ensure this is an isolated incident. That presumably means “isolated” as in “it only happened twice.”

It’s not just Google

Unfortunately, Google isn’t the only technology company, large or small, that’s guilty of “isolated incidents” involving the storage of plaintext passwords.

Facebook, for example, admitted in April 2019 that it accidentally logged millions of Instagram passwords inside its network, in what feels like a similar sort of blunder to Google’s.

The moral of the story is that tech behemoths like Google and Facebook sometimes screw up and store passwords in plaintext, which makes it a pretty good bet that any other smaller online service that employs less slick technology and far fewer security engineers might very well slip up and do the same, be it by mistake or because they don’t know any better.

By the way, two-factor authentication (2FA) is a good way to save your bacon. Slather it on everywhere you can: 2FA, or U2F (Universal 2nd Factor) security keys, mean that a password alone isn’t enough for crooks to raid your account.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/FIQsF_1bVFw/

British Army cyber ‘n’ psyops unit 77 Brigade can’t even brainwash civvies into helping it meet recruitment targets

The British Army’s psyops unit 77 Brigade is still falling short of recruiting targets, despite cyber skills being bigged up repeatedly by the military and government.

The unit – whose remit covers information operations, psyops and similar shady things – has continued its struggle to attract part-time recruits, according to figures released under the Freedom of Information Act.

Despite its target headcount having been increased from 448 to 474 people between January 2017 and mid-2018, an increase of 5.8 per cent, in June 2018 the unit had 340 on strength – a shortfall of 29 per cent, or 134 personnel.

Another way of looking at the stats is that the crafty tricks brigade grew their headcount by 64 over 18 months for both full-time and part-time personnel, albeit more slowly than they should have done.

joker

Bored bloke takes control of British Army ‘psyops’ unit’s Twitter

READ MORE

Figures analysed by The Register show that the unit seems to have greater difficulty recruiting part-timers from the civilian world than it does in recruiting and keeping full-time soldiers.

While the numbers are an improvement over the 40 per cent shortfall that The Register reported in 2017, the continually missed targets reflect the British Army’s ongoing recruitment problems in general as well as the broader shortage of cyber security skills in the armed forces.

Breaking down the figures, 77 Brigade’s 2018 targets were to employ 203 full-timers and 271 part-timers to achieve its mission of being an “elite unit of hackers, propagandists and ne’er-do-wells who crawl social media to plant stories, influence opinion and generally manipulate things on behalf of government” as some crafty joker who hijacked their Twitter account summarised 77 Brigade’s purpose.

The unit was short of meeting both targets: it actually employed 190 full-timers and 150 reservist part-timers. We’ve put the relevant numbers into a table below.

The Ministry of Defence has been asked to comment.

77 Brigade forms one of the key parts of the armed forces that meets the government’s oft-trumpeted “offensive cyber” capability, as referenced over the past couple of days by both Defence Secretary Penny Mordaunt and Foreign Secretary Jeremy Hunt.

Part of the cause may be infamous outsourcing giant Capita, which handles all Army recruiting matters thanks to the disastrous outsourcing contract which continues to hobble the military. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/05/23/77_brigade_british_army_still_short_personnel/