STE WILLIAMS

Incident Response: 3 Easy Traps & How to Avoid Them

Sage legal advice about navigating a data breach from a troubleshooting cybersecurity outside counsel.

While a serious security incident may be a rare occurrence inside an organization, as a troubleshooting outside counsel, I witness a range of incidents that run the gamut from serious to strange and are often riddled with common pitfalls. It never fails that the event seems to occur at the most inopportune times, such as Christmas Eve or when I’m standing in the middle of the frozen food section of the grocery store (both real-life examples) — the phone rings, and on the other line a client is experiencing their worst day ever. My job is to jump into the mix and begin troubleshooting the legal risks. Here are three traps I frequently see security teams fall into, and how best to navigate them.

Trap 1: Failure to Have a True Incident Response Plan (or to Follow It)
When was the last time you dusted off the ancient incident response plan and actually read it? No matter how sophisticated your organization may be, or how many times you’ve conducted a tabletop exercise in the last few years, it is important to review the plan and refresh it based on what incidents your organization may face today.

Do you know who is going to call outside counsel? Do you know who is alerting the insurance company? Or, better question, do you know what event triggers the alerting of both? These are often steps that need to happen either immediately or rapidly after first learning of an event.

Often, in the heat of a serious incident, the plan gets pushed to the wayside. Control of the incident response gets wrestled away from the CISO and may get placed in the hands of the CFO or the CEO. This is inevitable if the event is serious enough — not a single medical record compromised but the entire patient portal, for instance. You need to plan for those events that are catastrophic and work backward from there.

Is there a key member of the team that you know is going to be a part of the incident response, even if his or her job title doesn’t lend itself to being in the room? For example, is Alex a trusted member of the C-suite as chief strategy officer? If so, Alex may need to be considered as part of the team when the worst hits. What is Alex’s role? Practical planning in advance can save you a headache later.

Trap 2: Alerting the Wrong Law Enforcement Agency
This is another semiridiculous outcome. When the phone rings, a breathless client on the other end shares that law enforcement has already been alerted. Inevitably, it’s the wrong law enforcement agency for the event. While local police are great practical friends of many companies, they are rarely the group that should be called during a cybersecurity incident. Even state police in most states do not have the resources to adequately respond to a data breach.

In some cases, the question of whom to call will depend on the actual nature of the event and on the severity of the issue. In all cases, the decision about whether to call, when to call, and whom to call needs to be a conversation you first have with an attorney. While you may think that calling the FBI Cyber Crimes Division is the always the right move, there are exceptions, especially if you are dealing with an incident involving W2s or Employer Identification Numbers (EIN) theft, which may require a call to an IRS Special Agent. If there is physical mail involved, the U.S. Postal Service Fraud Division may be able to assign an agent to the investigation. There are strategic reasons for those calls and sometimes the reason can be simply finding an investigative authority who has the time to look into your particular issue.

Calling law enforcement before you have your attorney’s blessing can only make things more difficult. If you call the local police and they send over Deputy Andy with his cop car, employees will begin asking questions before the communications plan is ready to roll out.

Many if not most cybercrimes unfortunately do not result in handcuffs. And so some of you in the cybersecurity industry may ask whether it’s worth calling law enforcement at all. From the perspective of outside counsel, it is always better to be able to say we are “working with law enforcement” on a particular event, especially if it is catastrophic. But getting to the “working with law enforcement” part can be tricky. Sometimes, just because of the sheer number of incidents outside counsel have experienced, they may be able to get through to the right investigative authority quicker than you can alone. Trust that outside counsel will know who to call and let the call be placed.

Trap 3: Being Careless about Communications
Your cybersecurity event is never a “breach” until the thoughtful decision is made to categorize it as a “breach.” Until such time, it is an “incident” or an “event.”

Similarly, the way you characterize and describe the incident can have ramifications in potential lawsuits later on. When alerting employees, remember to use phrases like “our company has been the victim of a cybercrime.” Also, if Marla at the front desk clicked on a phishing email and exposed the crown jewels, now is not the time to say in group emails without counsel copied that you’ve been lobbying for her to be fired for failing to pass company phishing tests for years. As always, keep in mind that the highest cloak of confidentiality you can throw over communications is to loop in your attorney and use attorney-client privilege. Without that, every communication you send may be an exhibit in a later lawsuit.

Related Content:

Beth Burgin Waller is a lawyer who knows how to navigate between the server room and the board room. As chair of the cybersecurity data privacy practice at Woods Rogers, she advises clients on cybersecurity and on data privacy concerns. In this capacity, she … View Full Bio

Article source: https://www.darkreading.com/perimeter/incident-response-3-easy-traps-and-how-to-avoid-them/a/d-id/1334746?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Russian Nation-State Hacking Unit’s Tools Get More Fancy

APT28/Fancy Bear has expanded its repertoire to more than 30 commands for infecting systems, executing code, and reconnaissance, researchers have found.

Zebrocy malware – widely considered to be part of the the infamous APT28/Fancy Bear Russian cyber-espionage group’s toolset – now has more than 30 commands for reconnoitering compromised systems and spreading across networks.

Researchers from security firm ESET this week published new findings on the attack tool, which improves upon the older Sofacy backdoor, and combines downloaders and remote administration tools to allow attackers to control compromised systems. Both programs have been linked to the Russian cyber-espionage group that has been blamed for cyberattacks on the nation of Georgia prior to Russia’s 2008 invasion and for stealing e-mail and data from the US Democratic National Committee prior to the 2016 presidential election. 

ESET used telemetry generated by systems using its security agent to observe the initial Zebrocy infection via spearphishing attacks and subsequent commands, the company stated in an analysis

“We were able to monitor the way they use the Zebrocy malware after they infected their target, including all the interactions they had with the infected systems, and gain some intelligence,” says Alexis Dorais-Joncas, security intelligence team lead for ESET. “It is an updated modus operandi used by the group in the way … they perform their initial infection.”

The research sheds light on a tool that has become a major part of the operations of a long-running cyber espionage group. While ESET does not  explicitly attribute the attacks to Fancy Bear, analyses by other companies, such as the ATTCK entry from MITRE, have explicitly connected the use of the tool to the group.

Earlier this year, security firm Kaspersky Lab noted that Zebrocy, once a component of the Sofacy backdoor package in 2015, had rapidly become a popular tool, especially for use against government systems in Central Asia.

“Zebrocy continues to maintain a higher level of volume attacking local and remote ex-USSR republic Central Asian targets than other clusters of targeted Sofacy activity,” Kaspersky Lab concluded in its analysis. “Also interesting with this Sofacy sub-group is the innovation that we continue to see within their malware development.”

ESET’s research, meanwhile, highlights the rapidity with which the group behind Zebrocy has innovated with its tools and techniques. APT28/Fancy Bear is one of the original Russian cyber-operations groups tracked by security firms and government intelligence. Known also as Sofacy, STRONTIUM, and the Sednit group—ESET’s preferred name—the group has actively developed its toolbox of hacking programs.

In 2018, for example, ESET discovered that the Sednit group had successfully deployed a Unified Extensible Firmware Interface (UEFI) rootkit, dubbed LoJax, which infects the basic hardware operating system and can survive rebooting the system.

“Three years ago, the Sednit group unleashed new components targeting victims in various countries in the Middle East and Central Asia,” ESET wrote in its analysis. “Since then, the number and diversity of components has increased drastically.”

The group has mainly targeted embassies, ministries, and diplomats in Azerbaijan, Bosnia and Herzegovina, Egypt, Georgia, Iran, Kazakhstan, Korea, Kyrgyzstan, Russia, Saudi Arabia, Serbia, Switzerland, Tajikistan, Turkey, Turkmenistan, Ukraine, Uruguay and Zimbabwe, according to ESET.

How it Works

Zebrocy consists of two downloaders, one written in the Delphi scripting language and another in the AutoIt scripting language. Only one of the two downloaders need to run to install a backdoor—the third Zebrocy component—onto a targeted system.

Once installed, the operators would quickly perform reconnaissance on the system and gather operating system and file information, as well as other details about the system.

“The operators would quickly perform a reconnaissance phase to understand the kind of target that they just managed to infect,” says Dorais-Joncas. “They get information like the operating system, even some screenshots from the infected machines, get some networking information, IT configuration, and things like that.” 

In some cases, the first downloader installed another component whose purpose is currently being studied, according to ESET. “The very short timeframe where this backdoor is on the system and operating makes it harder to retrieve,” the company said. “Once its operators complete their evil deeds, they quickly remove it.”

Finally, because the commands issued after the initial installation are the same and executed very quickly, ESET suggested that they might be automated, rather than waiting for a member of the Sednit group to manually attack the system.

“They are gathering a considerable amount of information on the compromised target and they are not worried about duplicated data,” the report stated. “It shows a large gap between the development strategy and what operators do in practice. Backdoors with custom configuration and modules are deployed very carefully, which indicates some precautions to avoid ending up in the hands of researchers.”

Related Content:

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/application-security/russian-nation-state-hacking-units-tools-get-more-fancy/d/d-id/1334792?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft Opens Defender ATP for Mac to Public Preview

Users of the security platform who have preview features enabled can access Defender ATP for Mac via the Security Center onboarding section.

Microsoft is opening Microsoft Defender Advanced Threat Protection (ATP) for Mac devices to public preview following a two-month limited preview period, the company said this week.

The Mac version of Microsoft’s endpoint security platform, along with its new Threat Vulnerability Management tool for Mac, was announced in March. There were two parts to Defender ATP on Mac: a new user interface on Mac clients called Defender ATP, built to resemble the Windows 10 interface, and reporting for Mac devices on the Defender ATP portal.

Microsoft Defender ATP for Mac can be installed on devices running macOS Mojave, High Sierra, or Sierra that admins want to protect. In its limited preview, it provided anti-malware protection and let users configure their defense by running scans (full, quick, custom path); reviewing detected threats; and quarantine, remove, or allow threats on the machine.

Users could also configure advanced settings: disable or enable real-time and cloud protection; add exclusions for files and paths; manage threat notifications; and manually check for updates. Microsoft also included its AutoUpdate service so Defender ATP for Mac was kept current. Admins can review alerts as they do on Windows machines, but Mac detections are included.

During the limited preview period, Microsoft worked with early users to collect feedback and make changes. Now, Defender ATP users who have enabled preview features can access Defender ATP for Mac via the onboarding section in the Microsoft Defender Security Center.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/microsoft-opens-defender-atp-for-mac-to-public-preview/d/d-id/1334793?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Google’s Origin & the Danger of Link Sharing

How the act of sharing links to files stored in a public cloud puts organizations at risk, and what security teams can do to safeguard data and PII.

Some of us as “seasoned” computer science professionals recall the early days of computing pre-Web and pre-PageRank, the key algorithmic innovation that enabled Google to grow to its current mammoth scale. Much has been written about Google’s history and the spawning of effective web search engines that ranked web pages so users could easily find the most relevant information they were interested in.

At the time, some in the computer science community concerned with security and privacy issues expressed fears that Google’s web crawling and indexing might be illegal. Certainly, copyright issues would be in play if wholesale copying of web content wasn’t permissible. Many of these issues were resolved over the years by employing agreed-upon rules of the road, permitting crawling, page analysis, and indexing, but under the control of announced policies and terms of service by webmasters. In a perfect Internet, all would be good.

Today, web crawling is continuous and ubiquitous, and it has broadened in scope from web pages to general Internet searches and file shares. The downside to this is that Google searches can also capture and index files and data exposed in cloud shares. Along with the very many legitimate web crawlers that adhere to the rules in robot.txt, there are also malicious crawlers that ignore these warnings and scan and probe, sometimes successfully, to capture cloud shared documents. It may not be immediately apparent when a cloud share has been visited by a spider. After all, it isn’t immediately obvious when your website has been crawled unless you explicitly look for it.

This is why it pays to be proactive. We experienced a related incident firsthand at Columbia University, where I work as a computer science professor. Long ago, before there were so many regulations around protecting personal identifiable information, student Social Security numbers were used as the unique identifier when entering a housing lottery for securing a dorm room on campus. The files associated with this lottery were then stored in the cloud and forgotten. That is, until Google’s indexing made the Social Security numbers public and searchable, creating an incident years after the files were stored and students had moved on from the university. The university’s security team was able to remove the links and has since spent more time educating its faculty and students on data privacy best-practices. They’ve also set up a scanning system to help monitor for any instances of students’ social security numbers being shared.

It is these types of incidents that drove the university to take precautions, update security policies, and anticipate risks related to Google indexing and link sharing. Just recently, data from more than 90 companies, including Box, was exposed through Box accounts because employees shared web links.

How can security teams understand just how pervasive link-sharing risks are in their organizations? First, administrators should make sure the default access settings for shared links are configured to “people in your company” to reduce accidental exposure of data to the public. Secondly, security policies for cloud-resident data should mirror any policies that apply to data stored on the premises. That includes policies about downloading or sharing certain kinds of sensitive data, as well as encryption of sensitive data.

Defenders typically resort to cloud log analysis to determine the extent of the problem. Such log analytics can alert personnel to possibly misconfigured cloud share access controls, or user security violations, where a shared link gives access to a broad collection of documents to an interested spider.

The log analytics aren’t easy to do, but generally, capturing all events including time stamps, source IPs, agent strings, and URLs requested is the basic starting point. There are numerous products available to assist in the process — for example, to uncover the source IPs from tracert, and that analyze timing of requests. Being alert to spiders is important, but once a spider has done its job, and the shared documents have been exposed, what’s next?

At that point, once a spider has scanned and indexed the files in the cloud share, the data owner has lost the ability to control access to it; in essence, all bets are off. So, the immediate questions security teams need to know are: What was lost? Who is affected? Who is responsible? How did it get lost? Can it be prevented from happening again?

Cloud log analysis can help answer some of these questions. Appropriate mitigation actions in a case like this also include shutting down credentials for the person who shared the link, revoking user access to cloud-resident files, folders, or cloud shares, and, in some cases, decommissioning a public cloud folder and reconfiguring security settings for future files. That is how some of the organizations involved in the Box data leak responded.

At some point in the near to distant future, the information in cloud activity logs could be automatically analyzed using artificial intelligence, machine learning, or other technologies to lessen the workload of security professionals. Rather than spending resources digging through cloud logs, it may be possible to send teams real-time notifications when cloud security policies are violated, or when unsanctioned users open or download cloud-resident files that weren’t meant for them.

Related Content:

Dr. Salvatore Stolfo is the founder and CTO of Allure Security. As a professor of artificial intelligence at Columbia University since 1979, Dr. Stolfo has spent a career figuring out how people think and how to make computers and systems think like people. Dr. Stolfo has … View Full Bio

Article source: https://www.darkreading.com/cloud/googles-origin-and-the-danger-of-link-sharing/a/d-id/1334750?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Mobile Exploit Fingerprints Devices with Sensor Calibration Data

Data from routines intended to calibrate motion sensors can identify individual iOS and Android devices in a newly released exploit.

Attackers can use some of the mechanisms around sensors in smartphones to track devices around the Internet with no special permissions or escalations required, according to researchers.

SensorID – the name researchers Jiexin Zhang, Alastair R. Beresford, and Ian Sheret have given the sensor calibration fingerprinting exploit (designated CVE-2019-8541) – was discovered in smartphones running iOS and Android. In essence, the exploit takes advantage of routines that calibrate gyroscope and magnetometer sensors on iOS, and accelerometer, gyroscope, and magnetometer sensors on Android, to infer and access information that can identify the individual device and couple that “fingerprint” with tracking cookies and other software to accurately track the device through its online travels.

Because of the way devices are calibrated at the factory, iOS systems are considered somewhat more vulnerable to the exploit than Android devices. Apple patched the vulnerability in iOS 12.2, released in March, while Google has yet to patch the issue in Android.

Read more here and here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/mobile-exploit-fingerprints-devices-with-sensor-calibration-data/d/d-id/1334795?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Hackers for hire – the good, the bad and the just-plain-scammers

Hackers for hire are a bunch of swindlers, according to research published last week by Google and academics from the University of California, San Diego.

The researchers were specifically interested in a segment of black-market services known as hackers for hire: the crooks you send in when you lack the hacking skills to do the job yourself and the morals that whisper in your ear that this is not a nice, or legal, thing to do.

Such services offer targeted attacks that remain a potent threat, the researchers said, due to the fact that they’re so tailored. Think of spearphishing or whaling attacks that are so convincing because they get all the details right, such as forging company invoices or setting up copycat log-in sites that steal account credentials.

That kind of thing takes effort. Fortunately, most hackers for hire aren’t up to the task, to say the least. Many were outright scams – not too surprising – and some wouldn’t even take on the job if it involved attacking Gmail. For those services that did agree to take on the challenge of hacking Gmail accounts, the cost ballooned over the course of two years, from $123 to $384 – with a peak of $461 in February 2018.

Yahoo hacking prices have tracked the same as Google, while Facebook and Instagram hacking prices have actually fallen to the current average of $307.

The researchers hypothesize that the price differences for hacking the various email providers and the change in pricing are likely driven by what they call both operational and economic factors: namely, Google and Yahoo have gotten better at protecting email accounts, while prices have increased as the market for a specific service shrinks:

Prices will naturally increase as the market for a specific service shrinks (reducing the ability to amortize sunk costs on back-end infrastructure for evading platform defenses) and also as specific services introduce more, or more effective, protection mechanisms that need to be bypassed (increasing the transactional cost for each hacking attempt).

Overall, hackers for hire are pleasingly incompetent… or frauds

What’s sure to keep people’s accounts secure is surely aggravating the weasels who want to pay somebody to take them over. Namely, the hijacking ecosystem is “far from mature,” the researchers concluded.

They tested it out by setting up bogus online buyer personas with which to approach 27 hacking-for-hire services. The researchers tasked those services with compromising particular victim accounts.

Those supposed “victims” were actually honeypot Gmail accounts operated in coordination with Google.

Only five of the services they contacted delivered on their promise to attack the supposed victims. The rest were scammers, demurred when it came to attacking Gmail accounts, or had lousy customer service, they said:

Just five of the services we contacted delivered on their promise to attack our victim personas. The others declined, saying they could not cover Gmail, or were outright scams. We frequently encountered poor customer service, slow responses, and inaccurate advertisements for pricing.

The other good news: U2F (Universal 2nd Factor) security keys are working, the researchers said:

Further, the current techniques for bypassing 2FA can be mitigated with the adoption of U2F security keys.

… we would be remiss were we not to mention that Google last week got U2F egg on its face when it had to recall its Titan Bluetooth U2F keys after finding a security flaw.

Google has argued that Titan keys are still more secure than relying on just a password for access, and true, an attacker has to to be within about 10 meters and has to launch their attack just as you press the button on your Titan key… and needs to know your username and password in advance.

So we’ll grant the researchers that point.

Sum it all up, and the researchers don’t think the hackers-for-hire market is a large-scale threat at this point:

We surmise from our findings, including evidence about the volume of real targets, that the commercial account hijacking market remains quite small and niche. With prices commonly in excess of $300, it does not yet threaten to make targeted attacks a mass market threat.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/njQb43tYQKM/

Instagram data from 49 million accounts found lying around online

A security researcher has discovered a massive cache of data for millions of Instagram accounts, publicly accessible for everyone to see. The account included sensitive information that would be useful to cyberstalkers, among others.

A security researcher calling themselves anurag sen on Twitter discovered the database hosted on Amazon Web Services. It had over 49 million records when discovered and was still growing before it was deleted.

The Instagram data included user bios, profile pictures, follower numbers and location. This information is viewable online. What’s more puzzling is that it also contained the email address and telephone number used to set up the accounts, according to Techcrunch, which broke the story.

Reporters identified the owner of the database as Mumbai-based social media company Chtrbox. It pays social media influencers to publish sponsored content through their accounts. The database has since disappeared from Amazon.

Response from Chatrbox

Chatrbox took issue with press coverage of the leaked records, sending Naked Security the following statement:

The reports on a leak of private data are inaccurate. A particular database for limited influencers was inadvertently exposed for approximately 72 hours. This database did not include any sensitive personal data and only contained information available from the public domain, or self reported by influencers.

We would also like to affirm that no personal data has been sourced through unethical means by Chtrbox. Our database is for internal research use only, we have never sold individual data or our database, and we have never purchased hacked-data resulting from social media platform breaches. Our use of our database is limited to help our team connect with the right influencers to support influencers to monetize their online presence, and help brands create great content.

How might someone compile a massive database of Instagram information?

The company wouldn’t answer any more questions, so it’s difficult to know for sure. User names, profile shots, and follower numbers are publicly available and could be gathered by screen scraping. Screen scrapers use automated scripts to visit websites and copy the information they find there.

Companies use scraped data for all kinds of purposes, such as price comparisons and sentiment analysis. It’s considered malicious and many publishers try to block it because the scrapers are using their proprietary data and also draining their server resources.

We’ve seen people scraping Instagram before. Redditors attempted to archive every image from the site that they could, for kicks.

But it can get you into trouble. Authorities in Nova Scotia, Canada arrested a 19-year-old for scraping around 7,000 freedom-of-information releases from a public web site there, calling him a hacker. They subsequently dropped the charges.

What isn’t typically public is the phone number and email address used to create the account, and which TechCrunch says was included with some records. Facebook used to make this available via the Instagram API, even for accounts that didn’t publicly list that information. It had to turn off that feature in September 2017 after it found people downloading celebrity contact details.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/MpQmM_HnwlM/

The city of Baltimore is being held hostage by ransomware

The US city of Baltimore has been partially paralyzed since 7 May, when a ransomware attack seized parts of the government’s computer systems.

As soon as the city discovered that it had been attacked, it informed the FBI and took its systems offline in an effort to keep the infection from spreading.

But not before the attack took down voicemail, email, a parking fines database, and a system used to pay water bills, property taxes and vehicle citations. Real estate transactions were also shut down.

It was lousy timing, given that this is one of the real estate industry’s busiest times of the year. The Baltimore Sun reported that hundreds of property sales could have been affected: A real estate agent with access to industry data told the newspaper that at least 1,500 sales were pending in Baltimore.

But a sliver of good news came on Monday, when Mayor Bernard Young’s office announced that the city had developed a manual workaround that would allow real estate transactions to resume during the outage.

On Friday, the mayor’s office had said that the city is “well into the restorative process.” The work includes rebuilding some systems in a way that will ensure that when business functions are restored, they’ll be functioning securely.

According to Fox News, a recent analysis of the city’s cybersecurity defenses found that the network was “out of date in terms of security, staffing, and infrastructure to prevent attacks.”

Unlike both Greenville and Atlanta – which was hit by a SamSam attack last year – Baltimore doesn’t have an insurance policy to cover cybersecurity incidents. Baltimore’s head of computer security reportedly told City Council members last year at a budget hearing that the city needed one, but it didn’t happen.

Expect that to change: a spokesman for Young told the Baltimore Sun that the mayor has now directed the city’s finance and law departments to get coverage.

A long mop-up

In Friday’s update, Mayor Young’s office said that it could take months to restore all services. From the media release:

I am not able to provide you with an exact timeline on when all systems will be restored. Like any large enterprise, we have thousands of systems and applications.

The city has established a web-based incident command, shifted operations into manual mode and established other workarounds to keep delivering services.

The ransom: 13 Bitcoins for all you can eat

Baltimore has a choice: it can spend months getting its technology back online, or it can give in to the attackers’ demands. 13 Bitcoins – worth about US $100,000 – is now standing between Baltimore and what would purportedly be a full restore of its systems. Mayor Young told local reporters on Monday that the city might pay up at some point, but at this point, that’s a negative:

Right now, I say no.

But in order to move the city forward, I might think about it.

Ransomware galore

In recent months, we’ve covered several severe attacks, including one in which the malware author behind a new type of ransomware called MegaCortex geeked out and distracted victims with Matrix film references.

We saw another attack at the beginning of the year, against a slew of US newspapers, that delayed their publication. And then in February, a targeted attack against a hospital involved two GandCrab ransomware attacks.

What to do?

Defending against a determined, targeted attack demands defense in depth, and, as in many things, prevention is better than cure. That starts with ensuring that access to RDP (Remote Desktop Protocol) is secure and finishes with regular, comprehensive, off-site backups, with much else in between.

To read more about those things and the preventive steps you can take to protect yourself against targeted ransomware of all stripes, read our article on how to defend against SamSam ransomware.

Fortunately, the same advice that we gave to help to protect from SamSam will also help against ransomware – and cybercrime – in general, so please revisit it now.

We also urge you to read the SophosLabs 2019 Threat Report, in which Sophos researchers analyze the state of play in cybercrime today, including a section on ransomware.

Finally, visit sophos.com to read more about anti-ransomware technologies, including Sophos Intercept X.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/NyJ26Ix7QCs/

Mozilla fixes bugs, improves privacy in latest Firefox release

Mozilla rolled out version 67 of its Firefox browser this week, fixing some security bugs and introducing a host of privacy features.

The latest release fixes two critical security flaws, both affecting memory safety.

Mozilla also fixed 11 high-impact flaws, six moderate ones, and two low-impact ones in the release.

High-impact bugs include CVE 2019-9815 which enables a side channel attack in which one program can steal information from another on a Mac. To fix this, Mozilla uses an Apple option to switch off hyperthreading.

Mozilla also fixed several high-impact bugs that could cause the browser to crash, potentially enabling an attacker to exploit system instability. These included a flaw in the program’s image processor that could allow a malformed PNG image to destabilize it, and other bugs in the browsers event listener manager, and its implementation of XMLHttpRequest (a commonly used feature on Ajax web sites that constantly send data between the server and the browser).

There were also a couple of bugs specific to different operating systems. A bug in WebGL could cause buffer overflows in some Linux graphics drivers. Another bug in the Windows version allows attackers to exploit the browser’s built-in crash reporter and escape the sandbox that it uses to protect the host computer from browser processes.

The latest release also features the fingerprint blocking technology that Naked Security covered in March. This technique, borrowed from the Tor implementation of the Firefox browser, prevents trackers from using information such as your browser’s resolution and colour depth to uniquely identify you across different websites.

You can now also make Firefox check for cryptominers on the websites that it visits. These are pieces of JavaScript embedded in a website’s code that force your computer to mine for cryptocurrency, often without your knowledge. Attackers who compromise a web site with this code can tie up your computing resources in their pursuit of digital currency, normally opting for the anonymity-focused Monero.

In the latest edition of Firefox, you can reach these options by clicking the small ‘i’ icon in the address bar, and then under Content Blocking, clicking on the gear symbol on the right. This will let you select these options individually.

Firefox also added other privacy features including the ability to disable individual browser extensions and save passwords in private browsing mode.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/QQ4uAb-QUVM/

Tor Browser for Android 8.5 offers mobile users privacy boost

After nine months of alpha testing, a stable release of the Tor browser for Android can now be downloaded from Google’s Play store or direct from the Project’s website.

Tor’s been available in Windows, Mac and Linux versions for years, but the appearance of Tor Browser for Android 8.5 is still an important jump towards the mainstream for a browser whose user base is still dominated by in-the-know privacy enthusiasts.

As the Tor Project release notes remind us:

Mobile browsing is increasing around the world, and in some parts, it is commonly the only way people access the internet. In these same areas, there is often heavy surveillance and censorship online, so we made it a priority to reach these users.

The point of Tor Android is that users should get exactly the same level of privacy and anonymisation they would when using the desktop versions.

Apart from a few gaps that need to be ironed out, the list of protections in 8.5 includes:

  • Site isolation which stops third-party trackers from ‘following’ users from site to site.
  • Anti-surveillance – anyone monitoring the connection (an ISP, say) can see the user is connecting to Tor but not which websites they end up viewing.
  • Anti-fingerprinting – unlike most mainstream browsers, Tor for Android should make it a lot harder for websites to track users by noticing unique characteristics of their browser and device.
  • Tor encrypts all traffic, routing it through at least three dedicated relays before it reaches its destination.
  • The ability to visit sites an ISP might be blocking (a feature useful to countries where official censorship is an issue) and Tor sites with special Onion addresses.
  • Tor also bundles extensions such as HTTPS Everywhere and NoScript.

Limitations

As with desktop versions, Tor for Android is based on Firefox version 60.7, which does have some implications – as Tor users found out a few weeks back when a glitch at the Mozilla end temporarily disabled NoScript.

Using Tor for Android is also going to be slower than other mobile browsers both in terms of session set up, during which it establishes a connection, as well as browsing. While browsing websites, some page elements might not work, most obviously when the browser is configured via Security Settings to the ‘safest’ security level that blocks media, images and video.

Orfox and Orbot

Until now the only way to use the Tor network on Android was by using Orfox or Orbot.

Orfox will now be superseded by Tor for Android while Orbot, which offers slightly different features, will continue is separate development.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/qEDoK3PxBEk/