STE WILLIAMS

Symantec Acquires Luminate to Build on Cloud Security

Luminate Security, which specializes in software-defined perimeter technology, will extend Symantec’s integrated defense platform.

Symantec has confirmed its acquisition of Luminate Security, a startup specializing in software-defined perimeter technology and zero-trust access between users and cloud applications.

As more companies adopt infrastructure, they must still be responsible for their data and users. Luminate’s Secure Access Cloud is built to handle access to corporate resources and applications both on-prem and in the cloud. IT and security managers can scale private access control so employees only have access to data and applications they are authorized to use.

Symantec plans to leverage Luminate’s technology in its Integrated Cyber Defense platform. Its goal, it seems, is to strike the delicate balance between cloud security and user experience.

Terms of the acquisition were not disclosed. Luminate has raised a total of $14 million in funding over two rounds; most recently, it announced $11 million in Series A in March 2018. Prior to this deal, Symantec purchased mobile security vendor Skycure and browser isolation firm Fireglass, both within a two-week window in July 2017.

Read more details here.

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/symantec-acquires-luminate-to-build-on-cloud-security/d/d-id/1333854?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts

Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale from today on the dark web, according to the data trove’s seller.

For less than $20,000 in Bitcoin, it is claimed, the following pilfered account databases can be purchased from the Dream Market cyber-souk, located in the Tor network:

Dubsmash (162 million), MyFitnessPal (151 million), MyHeritage (92 million), ShareThis (41 million), HauteLook (28 million), Animoto (25 million), EyeEm (22 million), 8fit (20 million), Whitepages (18 million), Fotolog (16 million), 500px (15 million), Armor Games (11 million), BookMate (8 million), CoffeeMeetsBagel (6 million), Artsy (1 million), and DataCamp (700,000).

Sample account records from the multi-gigabyte databases seen by The Register appear to be legit: they consist mainly of account holder names, email addresses, and passwords. These passwords are hashed, or one-way encrypted, and must therefore be cracked before they can be used.

There are a few other bits of information, depending on the site, such as location, personal details, and social media authentication tokens. There appears to be no payment or bank card details in the sales listings.

Who are the buyers?

These silos of purportedly purloined information are aimed at spammers and credential stuffers, which is why copies are relatively cheap to buy. The stuffers will take usernames and passwords leaked from one site to log into accounts on other websites where the users have used the same credentials.

So, for example, someone buying the purported 500px database could decode the weaker passwords in the list, because some were hashed using the obsolete MD5 algorithm, and then try to use the email address and cracked password combinations to log into, say, strangers’ Gmail or Facebook accounts, where the email address and passwords have been reused.

All of the databases are right now being touted separately by one hacker, who says he or she typically exploited security vulnerabilities within web apps to gain remote-code execution and then extract user account data. The records were swiped mostly during 2018, we’re told, and went on sale this week.

The seller, who is believed to be located outside of the US, told us the Dubsmash data has been purchased by at least one person.

Some of the websites – particularly MyHeritage, MyFitnessPal, and Animoto – were known to have been hacked as they warned their customers last year that they had been compromised, whereas the others are seemingly newly disclosed security breaches. In other words, this is the first time we’ve heard these other sites have been allegedly hacked. This also marks the first time this data, for all of the listed sites, has been peddled publicly, again if all the sellers’ claims are true.

Is this legit?

A spokesperson for MyHeritage confirmed samples from its now-for-sale database are real, and were taken from its servers in October 2017, a cyber-break-in it told the world about in 2018. 500px also confirmed today its account data was stolen from its servers and put up for sale this week in the seller’s collection. This lends further credibility to the data trove.

Last week, half a dozen of the aforementioned sites were listed on Dream Market by the seller: when we spotted them, we alerted Dubsmash, Animoto, EyeEm, 8fit, Fotolog, and 500px that their account data was potentially being touted on the dark web.

Over the weekend, the underground bazaar was mostly knocked offline, apparently by a distributed denial-of-service attack. On Monday this week, the underworld marketplace returned to full strength, and the seller added the rest of the sites. We contacted all of them to alert them, and ask for a response. Meanwhile, Dream Market has been smashed offline again.

Here’s a summary of what is, or briefly was, purported to be on sale:

  • Dubsmash: 161,549,210 accounts for 0.549 BTC ($1,976) total

    11GB of data taken in December 2018. Each account record contains the user ID, SHA256-hashed password, username, email address, language, country, plus for some, but not all the users, the first and the last name. This alleged security breach has not been previously publicly disclosed. Dubsmash is a video-messaging application popular with millennials and younger folk.

    New York City-based Dubsmash has hired law firm Lewis Brisbois to probe the online sale. Partner Simone McCormick told us:

    Our office has been retained to assist Dubsmash in this matter. Thank you for your alert. We immediately launched an investigation. We plan to notify any and all individuals as appropriate. Again, thank you for bringing this to our attention.

  • 500px: 14,870,304 accounts for 0.217 BTC ($780) total

    1.5GB of data taken July 2018. Each account record contains the username, email address, MD5-, SHA512- or bcrypt-hashed password, hash salt, first and last name, and if provided, birthday, gender, and city and country. 500px is a social-networking site for photographers and folks interested in photography.

    “Our engineering team is currently investigating and if we can confirm there was a breach we will take the necessary steps to inform our users as per GDPR standards,” 500px spokesperson Stephanie Newell told us.

    Update: 500px staff are now notifying their users that the site was indeed hacked, and will reset everyone’s passwords, starting with the ones weakly hashed using MD5.

    “We are able to confirm a breach occurred,” Newell told us. “Our engineers immediately launched a comprehensive review of our systems and have since taken every precaution to secure them. All areas of vulnerability have been identified and fixed during our internal investigation, and we’ve found no evidence to date of any recurrence of the issue.

    “We are currently working on notifying our entire user base, however, given the amount of users affected, this task will span one day at minimum. We’ve taken every precaution to ensure our users’ data is safe. A system-wide password reset is currently underway for all users, prioritized in order of accounts with the highest potential risk, and we have already forced a reset of all MD5-encrypted passwords.”

    In addition, 500px, which is based in Canada, said it has taken the following steps to shore up its security:

    – Vetted access to our servers, databases, and other sensitive data-storage services.

    – Analyzed and are continuing to monitor our source code, both public-facing and internal, to improve our security protocols and protect against security issues.

    – We have partnered with leading experts in cyber security to further secure our website, mobile apps, internal systems, and security processes.

    – Modifications to our our internal software development process.

    – Reviewing the PII [personally identifying information] data we collect from users and how it is used on our platform.

    – We are continuing to upgrade our network infrastructure. Over the last 12 months, we have undertaken a major upgrade to our network infrastructure—this project is nearing completion, and will also offer a significant increase in security.

  • EyeEm: 22,360,765 accounts for 0.289 BTC ($1,040) total

    1.7GB of data taken February 2018. Each account record contains an email address and SHA1-hashed password, although about three million are missing an email address. This alleged security breach has not been previously publicly disclosed. Germany-based EyeEm is an online hangout for photographers. A spokesperson did not respond to a request for comment.

  • 8fit: 20,180,667 accounts for 0.2025 BTC ($728) total

    1.9GB of data taken July 2018. Each account record contains an email address, bcrypted-hashed password, country, country code, Facebook authentication token, Facebook profile picture, name, gender, and IP address. This alleged security breach has not been previously publicly disclosed. Germany-headquartered 8fit offers customized workout and diet plans for healthy fitness types.

    8fit CEO Aina Abiodun told us her team is investigating, adding: “I need to get back to you on this and can’t comment immediately.”

  • Fotolog: 16 million accounts for 0.52 BTC ($1,872) total

    5.9GB of data taken in December 2018. There are five SQL databases containing information including email addresses, SHA256-hashed passwords, security questions and answers, full names, locations, interests, and other profile information. This alleged security breach has not been previously publicly disclosed. Fotolog, based in Spain, is another social network for photography types. A spokesperson did not respond to a request for comment.

  • Animoto 25,402,283 accounts for 0.318 BTC ($1,144) total

    2.1GB of data taken in 2018. Each account record contains a user ID, SHA256-hashed password, password salt, email address, country, first and last name, and date of birth. This security breach was publicly disclosed by the NYC-headquartered business in 2018, though this is the first time the data has gone on sale, we understand.

    “We provided notification about an incident potentially affecting customers back in August 2018 after we identified unusual activity on our system,” spokesperson Rebecca Brooks told us. “After identifying the suspicious activity, we immediately took the systems offline and implemented numerous security controls to help prevent an incident like this from happening again.”

  • MyHeritage 92,284,478 accounts for 0.549 BTC ($1,976) total

    3.6GB of data taken October 2017. Each account record contains an email address, SHA1-hashed password and salt, plus the date of account creation. This security breach was publicly disclosed by the business last year, though this is the first time the data has gone on sale, we’re told. No DNA or similar sensitive information was taken. MyHeritage, based in Israel, is a family-tree-tracing service that studies customers’ genetic profiles.

    A spokesperson told us:

    The date, the number of users affected, and the type of information [in the 2018 disclosure] correspond almost exactly to [the for-sale database], so this does not look like a new breach. It seems likely that the perpetrator(s) of the October 2017 breach or someone who obtained the data from them is now trying to sell it. We will investigate this immediately and report the attempted sale to the authorities so they can try to trace the perpetrators. Until this moment, we have not seen any evidence of circulation or usage or abuse of the breached email addresses and hashed passwords, and this is the first time a mention of them has surfaced since June 4 2018.

  • MyFitnessPal 150,633,038 accounts for 0.289 BTC ($1,040) total

    3.5GB of data taken February 2018. Each account record contains a user ID, username, email address, SHA1-hashed password with a fixed salt for the whole table, and IP address. This security breach was publicly disclosed by the business last year. This may be the first time it has gone on public sale. Under-Armor-owned MyFitnessPal does what it says on the tin: it’s an app that tracks diet and exercise. A spokesperson did not respond to a request for comment.

  • Artsy 1,070,000 accounts for 0.0289 BTC ($104) total

    184MB of data taken April 2018. Each account record contains an email address, name, IP addresses, location, and SHA512-hashed password with salt. This alleged security breach has not been previously publicly disclosed. Artsy, located in NYC, is an online home for collecting and organizing art. A spokesperson did not respond to a request for comment.

  • Armor Games 11,013,617 accounts for 0.2749 BTC ($988) total

    1.8GB of data taken late December 2018. Each account record contains a username, email address, SHA1-hashed password and salt, date of birth, gender, location, and other profile details. This alleged security breach has not been previously publicly disclosed. California-based Armor Games is a portal for a ton of browser-based games. A spokesperson did not respond to requests for comment.

  • Bookmate 8,026,992 accounts for 0.159 BTC ($572) total

    1.7GB of data taken July 2018. Each account record typically contains a username, an email address, SHA512 or bcrypt-hashed password with salt, gender, date of birth, and other profile details. This alleged security breach has not been previously publicly disclosed. British Bookmate makes book-reading apps. A spokesperson did not respond to a request for comment.

  • CoffeeMeetsBagel 6,174,513 accounts for 0.13 BTC ($468) total

    673MB of data taken December 2017. Each account record contains typically a full name, email address, age, registration date, gender, and what is claimed to be a SHA256-hashed password. This alleged security breach has not been previously publicly disclosed. CoffeeMeetsBagel is a dating website.

    Jenn Takahashi, spokesperson for the CoffeeMeetsBagel, told us: “We are not aware of a breach at this time, but our security team is looking into this now.” She also said the San-Francisco-based biz does not store passwords, and uses third-party sites for authentication.

    “We have engaged with our legal team and forensic security experts to identify any issues and ensure we have the best security stance moving forward,” Takahashi added.

  • DataCamp 700,000 accounts for 0.013 BTC ($46.8) total

    82MB of data taken December 2018. Each account record contains an email address, bcrypt-hashed password, location, and other profile details. This alleged security breach has not been previously publicly disclosed. US-based DataCamp teaches people data science and programming. A spokesperson told us they are “looking into” the online sale.

    “We take this matter seriously and want to further verify if this is indeed the case,” said the biz’s Lode Vanacken. “We will also investigate access and audit logs to see if we can trace back any potential unauthorised access. If indeed further investigation shows this data to be valid we will communicate with you and with the affected end-users.”

  • HauteLook 28 million accounts for 0.217 BTC ($780) total

    1.5GB of data taken during 2018. Each account record contains an email address, bcrypt-hashed password, and name. This alleged security breach has not been previously publicly disclosed. HauteLook is an online store for fashion, accessories, and so on. A spokesperson for the Los Angeles-based biz did not respond to a request for comment.

  • ShareThis 41,028,098 accounts for 0.217 BTC ($780) total

    2.7GB of data taken early July 2018. Each account record contains a name, username, email address, DES-hashed password, gender, date of birth, and other profile info. This alleged security breach has not been previously publicly disclosed. Palo Alto-based ShareThis makes a widget for sharing links to stuff with friends. A spokesperson did not respond to a request for comment.

  • Whitepages 17,775,679 accounts for 0.434 BTC ($1560) total

    2.9GB of data taken 2016. Each account record contains an email address, SHA1- or bcrypt-hashed password, and first and last name. This alleged security breach has not been previously publicly disclosed. Whitepages is a Seattle-based online telephone and address directory. A spokesperson did not respond to a request for comment.

The seller told The Register they have as many as 20 databases to dump online, while keeping some others back for private use, and that they have swiped roughly a billion accounts from servers to date since they started hacking in 2012.

Their aim is to make “life easier” for hackers, by selling fellow miscreants usernames and password hashes to break into other accounts, as well as make some money on the side, and highlight to netizens that they need to take security seriously – such as using two-factor authentication to protect against password theft. The thief also wanted to settle a score with a co-conspirator, by selling a large amount of private data online.

The hacker previously kept stolen databases private, giving them only to those who would swear to keep the data secret.

“I don’t think I am deeply evil,” the miscreant told us. “I need the money. I need the leaks to be disclosed.

“Security is just an illusion. I started hacking a long time ago. I’m just a tool used by the system. We all know measures are taken to prevent cyber attacks, but with these upcoming dumps, I’ll make hacking easier than ever.” ®

Updates below

This article was revised at 0430 UTC to include confirmation from 500px that it was hacked, with its user account data appearing in a database touted for sale this week on Dream Market, as we reported.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/

‘Now is the winter of our disk contents’… Decision on Lauri Love’s seized gear due next week

Lauri Love will find out whether he is getting his computers back from the National Crime Agency on 19 February, a judge ruled today.

As reported earlier, Love wants the return of two laptops, two desktop tower PCs, an SD card, an external hard drive and one of the laptops’ hard drives, which were seized from his family home in Stradishall, Suffolk, when he was arrested in October 2013. Some of the computers were encrypted.

Lauri Love. Pic: Courage Foundation

Accused hacker Lauri Love tries to retrieve Fujitsu lappie and other gear from Britain’s FBI in court

READ MORE

Today’s hearing continued Love’s earlier attempts to get the computers and accessories returned. The NCA previously tried to force him to decrypt the machines as the price for getting them back; in 2016 District Judge Nina Tempia, sitting in Westminster Magistrates’ Court, refused permission for the NCA to do this. Since that hearing, no progress was made until today – the 19th time this application has come in front of the magistrates’ court.

After Love successfully fought off a 2018 US extradition attempt – which alleged that he hacked a number of government agencies including the FBI, NASA and the Department of Energy – he had another go at getting his computers back, which was heard today. The NCA confirmed that Love is still under criminal investigation.

In his written skeleton argument submitted to the court, Love opened with: “Now is the winter of our disk contents made glorious by the summer sun of law…”

He continued: “The NCA was under the strict obligation, not only to not initially remove any articles of property from the premises where a photograph or copy would suffice for the purposes of an investigation, but after removal of property to return originals as soon as practicable to the persons from whom they were seized… these obligations were and remain unfulfilled.”

Love also argued that the court had no power to “order any acts of destruction, modification or tampering with property removed by executive agents, which would constitute vandalism”.

Exhorting District Judge Margot Coleman to ignore the NCA’s arguments, Love said in his written legal arguments that he has “no relevant criminal record, nor history of offending, [and] has undertaken no actions during the course of the NCA investigation or since its effective closure in July 2014 to suggest that he will commit criminal offences”.

Reserving her judgment, District Judge Coleman said: “I am not going to give a decision today. I will reflect on this and take time to prepare a written decision [to be handed down] on 19th February” at Westminster Magistrates’ Court.

The judge also clarified an earlier reporting restriction order she made, allowing reporters at the hearing to quote from parts of Love’s skeleton argument.

The National Crime Agency was represented by barrister Andrew Bird. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/02/11/lauri_love_laptop_decision_reserved/

Network kit biz Phoenix takes heat as flaws may leave industrial control system security in ashes

Companies running a popular brand of industrial Ethernet switch are being advised to update their firmware ASAP following a series of bug disclosures.

Security house Positive Technologies took credit today for the discovery of six CVE-listed security vulnerabilities in the Phoenix Contact FL Switch 3xxx, 4xxx, and 48xx industrial control switches. The flaws are addressed in firmware versions 1.35 or newer.

Among the now-patched flaws were several Positive described as “critical” security risks that could be exploited to knock vulnerable devices offline or pull off man-in-the-middle attacks.

“Successful exploitation of these weaknesses has the potential to cause disruption, or even total interruption, of ICS operations,” Positive Technologies SCADA research analyst Paolo Emiliani said in the company’s write-up of the issue.

“An attacker can intercept user credentials and then re-configure a switch to disable its ports, resulting in failure of network communication between ICS components.”

These are particularly serious bugs given where many of the vulnerable network switches are used. Positive says the Contact FL line is particularly popular for oil and energy facilities, as well as maritime systems, where a controller breakdown would be a major headache.

All of the vulnerabilities were discovered and privately reported by researchers Evgeny Druzhinin, Ilya Karpov, and Georgy Zaytsev.

Two of the more series flaws were CVE-2018-13993, a cross-site request forgery that would let an attacker use the web interface to control a vulnerable switch and send arbitrary commands, and CVE-2018-13990, a brute force vulnerability caused by the switch not having a timeout period between login attempts.

Factory crane

Yes, you can remotely hack factory, building site cranes. Wait, what?

READ MORE

CVE-2018-13992 is a possible password theft vulnerability caused by the switch transmitting login information over its web interface as plain text, while CVE-2018-13991 is a man-in-the-middle flaw that could allow an attacker to harvest encryption keys.

Two other bugs, CVE-2018-13994 and CVE-2017-3735 are denial of service vulnerabilities caused by a buffer error and the web interface not properly limiting the number of possible connections.

All of the bugs can be patched by updating the switch’s firmware to the latest build (in this case 1.35 or later). Those downloads can be found on the managed switch products page on Phoenix’s website. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/02/11/phoenix_switch_flaws/

Blue Monday in infosec: 620 million accounts across 16 ‘hacked’ websites now for sale on dark web, seller claims

Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale from today in bulk on the dark web, according the data trove’s seller.

For less than $20,000 in Bitcoin, the following purportedly pilfered account databases can be purchased from the Dream Market cyber-souk, located in the Tor network:

Dubsmash (162 million), MyFitnessPal (151 million), MyHeritage (92 million), ShareThis (41 million), HauteLook (28 million), Animoto (25 million), EyeEm (22 million), 8fit (20 million), Whitepages (18 million), Fotolog (16 million), 500px (15 million), Armor Games (11 million), BookMate (8 million), CoffeeMeetsBagel (6 million), Artsy (1 million), and DataCamp (700,000).

Sample account records from the multi-gigabyte databases seen by The Register at least appear to be legit: they consist mainly of account holder names, email addresses, and passwords. These passwords are hashed, or one-way encrypted, and must therefore be cracked before they can be used.

There are a few other bits of information, depending on the site, such as location, personal details, and social media authentication tokens. There appears to be no payment or bank card details in the sales listings.

Who are the buyers?

These silos of seemingly purloined information are aimed at spammers and credential stuffers, which is why they are relatively cheap to buy. The stuffers will take usernames and passwords leaked from one site to log into accounts on other websites where the users have used the same credentials.

So, for example, someone buying the purported 500px database could decode the weaker passwords in the list because some were allegedly hashed using the obsolete MD5 algorithm, and then try to use the email address and cracked password combinations to log into, say, strangers’ Gmail or Facebook accounts, where the email address and passwords have been reused.

All of the databases are right now being sold separately by one hacker, who says he or she typically exploited vulnerabilities within web apps to gain remote-code execution and then extract user account data. The records were swiped mostly in 2018, and went on sale this week.

The seller, who is believed to be located outside of the US, claims the affected sites should be aware of the data thefts one way or another and patched their systems. For one thing, the seller apparently tried to extort one of the websites, telling its staff and founders to pay up or the information would go on sale.

We’re also told the Dubsmash data has been purchased by at least one person.

Some of the websites – particularly MyHeritage, MyFitnessPal, and Animoto – were known to have been hacked as they warned their customers last year that they had been compromised, whereas the others are seemingly newly disclosed security breaches.

In other words, if the databases are legit, then this is the first time we’ve heard these other sites have been hacked. This also marks the first time this data, for all of the listed sites, has been sold publicly, again if the sellers’ claims are true.

Is this legit?

A spokesperson for MyHeritage confirmed samples from its now-for-sale database are real, and were taken from its servers in October 2017, a cyber-break-in it told the world in 2018. This lends further credibility to the data trove.

Last week, half a dozen of the aforementioned sites were listed on Dream Market by the seller: when we spotted them, we alerted Dubsmash, Animoto, EyeEm, 8fit, Fotolog, and 500px that their allegedly stolen account data was being touted on the dark web.

Over the weekend, the underground bazaar was mostly knocked offline apparently by a distributed denial-of-service attack. On Monday this week, the underground marketplace returned to full strength, and the seller added the rest of the sites. We contacted all of them for a response. Meanwhile, Dream Market has been smashed offline again.

Here’s a summary of what is, or briefly was, purported to be on sale:

  • Dubsmash: 161,549,210 accounts for 0.549 BTC ($1,976) total

    11GB of data taken in December 2018. Each account record contains the user ID, SHA256-hashed password, username, email address, language, country, plus for some, but not all the users, the first and the last name. This alleged security breach has not been publicly disclosed by the business. Dubsmash is a video-messaging application popular with millennials and younger folk.

    Dubsmash has hired law firm Lewis Brisbois to probe the online sale. Partner Simone McCormick told us:

    Our office has been retained to assist Dubsmash in this matter. Thank you for your alert. We immediately launched an investigation. We plan to notify any and all individuals as appropriate. Again, thank you for bringing this to our attention.

  • 500px: 14,870,304 accounts for 0.217 BTC ($780) total

    1.5GB of data taken July 2018. Each account record potentially contains the username, email address, MD5-, SHA512- or bcrypt-hashed password, hash salt, first name, last name, birthday, gender, country, city, and Facebook ID. This alleged security breach has not been publicly disclosed by the business. 500px is a social-networking site for photographers and folks interested in photography.

    “Our engineering team is currently investigating and if we can confirm there was a breach we will take the necessary steps to inform our users as per GDPR standards,” 500px spokesperson Stephanie Newell told us.

  • EyeEm: 22,360,765 accounts for 0.289 BTC ($1,040) total

    1.7GB of data taken February 2018. Each account record contains an email address and SHA1-hashed password, although about three million are missing an email address. This alleged security breach has not been publicly disclosed by the business. EyeEm is an online hangout for photographers. A spokesperson did not respond to a request for comment.

  • 8fit: 20,180,667 accounts for 0.2025 BTC ($728) total

    1.9GB of data taken July 2018. Each account record contains an email address, bcrypted-hashed password, country, country code, Facebook authentication token, Facebook profile picture, name, gender, and IP address. This alleged security breach has not been publicly disclosed by the business. 8fit offers customized workout and diet plans for healthy fitness types.

    8fit CEO Aina Abiodun told us her team is investigating, adding: “I need to get back to you on this and can’t comment immediately.”

  • Fotolog: 16 million accounts for 0.52 BTC ($1,872) total

    5.9GB of data taken in December 2018. There are five SQL databases containing information including email addresses, SHA256-hashed passwords, security questions and answers, full names, locations, interests, and other profile information. This alleged security breach has not been publicly disclosed by the business. Fotolog is another social network for photography types. A spokesperson did not respond to a request for comment.

  • Animoto 25,402,283 accounts for 0.318 BTC ($1,144) total

    2.1GB of data taken in 2018. Each account record contains a user ID, SHA256-hashed password, password salt, email address, country, first and last name, and date of birth. This security breach was publicly disclosed by the business in 2018, though this is the first time the data has gone on sale, we understand.

    “We provided notification about an incident potentially affecting customers back in August 2018 after we identified unusual activity on our system,” spokesperson Rebecca Brooks told us. “After identifying the suspicious activity, we immediately took the systems offline and implemented numerous security controls to help prevent an incident like this from happening again.”

  • MyHeritage 92,284,478 accounts for 0.549 BTC ($1,976) total

    3.6GB of data taken October 2017. Each account record contains an email address, SHA1-hashed password and salt, plus the date of account creation. This security breach was publicly disclosed by the business last year, though this is the first time the data has gone on sale, we’re told. No DNA or similar sensitive information was taken. MyHeritage is a family-tree-tracing service that studies customers’ genetic profiles.

    A spokesperson told us:

    The date, the number of users affected, and the type of information [in the 2018 disclosure] correspond almost exactly to [the for-sale database], so this does not look like a new breach. It seems likely that the perpetrator(s) of the October 2017 breach or someone who obtained the data from them is now trying to sell it. We will investigate this immediately and report the attempted sale to the authorities so they can try to trace the perpetrators. Until this moment, we have not seen any evidence of circulation or usage or abuse of the breached email addresses and hashed passwords, and this is the first time a mention of them has surfaced since June 4 2018.

  • MyFitnessPal 150,633,038 accounts for 0.289 BTC ($1,040) total

    3.5GB of data taken February 2018. Each account record contains a user ID, username, email address, SHA1-hashed password with a fixed salt for the whole table, and IP address. This security breach was publicly disclosed by the business last year. This may be the first time it has gone on public sale. Under-Armor-owned MyFitnessPal does what it says on the tin: it’s an app that tracks diet and exercise. A spokesperson did not respond to a request for comment.

  • Artsy 1,070,000 accounts for 0.0289 BTC ($104) total

    184MB of data taken April 2018. Each account record contains an email address, name, IP addresses, location, and SHA512-hashed password with salt. This alleged security breach has not been publicly disclosed by the business. Artsy is an online home for collecting and organizing art. A spokesperson did not respond to a request for comment.

  • Armor Games 11,013,617 accounts for 0.2749 BTC ($988) total

    1.8GB of data taken late December 2018. Each account record contains a username, email address, SHA1-hashed password and salt, date of birth, gender, location, and other profile details. This alleged security breach has not been publicly disclosed by the business. Armor Games is a portal for a ton of browser-based games. A spokesperson did not respond to requests for comment.

  • Bookmate 8,026,992 accounts for 0.159 BTC ($572) total

    1.7GB of data taken July 2018. Each account record contains a username, potentially an email address, SHA512 or bcrypt-hashed password with salt, gender, date of birth, and other profile details. This alleged security breach has not been publicly disclosed by the business. Bookmate makes book-reading apps. A spokesperson did not respond to a request for comment.

  • CoffeeMeetsBagel 6,174,513 accounts for 0.13 BTC ($468) total

    673MB of data taken December 2017. Each account record contains typically a full name, email address, age, registration date, gender, and what is claimed to be a SHA256-hashed password. This alleged security breach has not been publicly disclosed by the business. CoffeeMeetsBagel is a dating website.

    A spokesperson for the CoffeeMeetsBagel told us: “We are not aware of a breach at this time, but our security team is looking into this now.” They also said they do not store passwords, and use third-party sites – cough, Facebook – for authentication. It may well be that these hashes date back to before the site started using Facebook for logging in.

  • DataCamp 700,000 accounts for 0.013 BTC ($46.8) total

    82MB of data taken December 2018. Each account record contains an email address, bcrypt-hashed password, location, and other profile details. This alleged security breach has not been publicly disclosed by the business. DataCamp teaches people data science and programming. A spokesperson told us they are “looking into” the online sale.

    “We take this matter seriously and want to further verify if this is indeed the case,” said the biz’s Lode Vanacken. “We will also investigate access and audit logs to see if we can trace back any potential unauthorised access. If indeed further investigation shows this data to be valid we will communicate with you and with the affected end-users.”

  • Hautelook 28 million accounts for 0.217 BTC ($780) total

    1.5GB of data taken during 2018. Each account record contains an email address, bcrypt-hashed password, and name. This alleged security breach has not been publicly disclosed by the business. Hautelook is an online store for fashion, accessories, and so on. A spokesperson did not respond to a request for comment.

  • ShareThis 41,028,098 accounts for 0.217 BTC ($780) total

    2.7GB of data taken early July 2018. Each account record contains a name, username, email address, DES-hashed password, gender, date of birth, and other profile info. This alleged security breach has not been publicly disclosed by the business. ShareThis makes a widget for sharing links to stuff with friends. A spokesperson did not respond to a request for comment.

  • Whitepages 17,775,679 accounts for 0.434 BTC ($1560) total

    2.9GB of data taken 2016. Each account record contains an email address, SHA1- or bcrypt-hashed password, and first and last name. This alleged security breach has not been publicly disclosed by the business. Whitepages is an online telephone and address directory. A spokesperson did not respond to a request for comment.

The seller told The Register they have as many as 20 databases to dump online, while keeping some other ones back for private use, and that they have swiped roughly a billion accounts from servers to date since they started hacking in 2012.

Their aim is to make “life easier” for hackers, by selling fellow miscreants usernames and password hashes to break into other accounts, as well as make some money on the side, and highlight to netizens that they need to take security seriously – such as using two-factor authentication to protect against password theft. The thief also wanted to settle a score with a co-conspirator, by selling a large amount of private data online.

The hacker previously kept stolen databases private, giving them only to those who would swear to keep the data secret.

“I don’t think I am deeply evil,” the miscreant told us. “I need the money. I need the leaks to be disclosed.

“Security is just an illusion. I started hacking a long time ago. I’m just a tool used by the system. We all know measures are taken to prevent cyber attacks, but with these upcoming dumps, I’ll make hacking easier than ever.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/02/11/dark_web_hacked_accounts_for_sale/

Intel SGX ‘safe’ room easily trashed by white-hat hacking marauders: Enclave malware demo’d

Updated Security researchers have found that Intel’s Software Guard Extensions (SGX) don’t live up to their name. In fact, we’re told, they can be used to hide pieces of nasty malware that can silently masquerade as normal applications.

SGX is a set of processor instructions and features for creating a secure enclave in which code can be executed without scrutiny or interference from any other software – not even the operating system or hypervisor can look in. It’s aimed at processing financial transactions, performing anti-piracy decryption of protected Hollywood movies, and similar cryptography in private away from prying eyes.

That’s the theory. However, boffins – some of whom helped expose the Spectre-Meltdown processor flaws last year – think they have cracked it, by leveraging the age-old technique of return-oriented programming.

Return-oriented programming (ROP) involves overwriting a thread’s stack to, rather than have the application work as normal, instead it carries out malicious operations. This is done by stringing together clumps of unrelated memory-resident instructions, called gadgets, to manipulate the operation of the software. It’s a bit like carjacking someone using the tire iron in the vehicle’s trunk (or boot for our UK readers).

You change the return addresses in the stack so that the code jumps not back to where it should be after a routine, but to small sections of other code, followed by another section, then another, building up a patchwork of instructions that tell the program to do something else than it should, like leak or change data.

Homer Simpson

Spectre haunts Intel’s SGX defense: CPU flaws can be exploited to snoop on enclaves

READ MORE

In a paper scheduled for publication on Tuesday, “Practical Enclave Malware with Intel SGX,” brainiacs at the Graz University of Technology in Austria describe a technique for bypassing various security technologies like ASLR, and executing arbitrary code that can steal information or conduct denial-of-service attacks, via SGX and ROP.

Enclaves have to talk to the outside world via their assigned host application, yet the team’s SGX-ROP approach allows the enclave to meddle with the underlying system as a normal process. In effect, malware in the enclave is hidden from view, but it can potentially do what it likes to the environment around it. This also means the enclave can keep its vulnerability exploits and parts of its malicious behavior out of view and secret.

“We demonstrate that instead of protecting users from harm, SGX currently poses a security threat, facilitating so-called super-malware with ready-to-hit exploits,” explain co-authors Michael Schwarz, Samuel Weiser, and Daniel Gruss in their paper.

The trio say that security experts tend to discount attacks involving enclaves because these locked-down code spaces are more constrained than normal system processes – enclaves can only issue system calls, to interact with the operating system, through their host application, and they can’t handle I/O operations directly. That should stop bad code within an enclave from reaching the outside world.

Nonetheless, the Graz group has found a viable way to bypass Intel’s enclave launch process and obtain signing keys, particularly now that SGXv2 provides a way to remove Intel as an intermediary for enclave signing. This means a malicious enclave can work around its restrictions – no syscalls nor knowledge of host application memory – to run arbitrary code under the disguise of a host process, and parade around the computer rather than staying confined to its shoebox.

It is, admittedly, a convoluted technique – compared to classic Windows escalation-of-privilege attacks – yet it’s a fascinating one.

“The enclave has to run locally, but the trigger signal to run the exploit comes from a remote adversary in the scenarios we describe,” said Gruss in an email to The Register.

“So you can deploy your exploit (maybe a super expensive zero-day exploit) on all devices via an enclave and no one could tell. Then send the trigger signal when you like and to whom you like and run the exploit.”

“However, it could also be an enclave with a bug which can be exploited remotely,” Gruss added. “That would have the same result. Arbitrary code execution in an enclave means untraceable arbitrary code execution on the device. An attacker can do anything then.”

Attackers TAP resources

The attack relies on the Transactional Synchronization eXtensions (TSX) in modern Intel processors, in conjunction with a novel technique called TSX-based Address Probing (TAP). TAP involves using TSX to determine if a virtual address is accessible by the current process, the researchers explain. And this exploration of memory is invisible to the operating system because that’s how secure enclaves are designed.

“We have been working with TSX since quite a while,” said Gruss. “It has several interesting properties that we’ve exploited in the past years. If the processor has TSX support (many don’t have TSX support) then the attack can be run just like that, no special preparations required.”

He added that the TSX primitive is also interesting in contexts unrelated to SGX because it can be used an an “egg hunter” for scanning the address space for injected shell code (in a system supporting TSX).

TAP’s goal is to find code that resides in memory – code gadgets – so they can be chained together for an ROP-style code-reuse attack. But to conduct an SGX-ROP attack, the attacker has to have access to writeable host memory, to store the fake stack frame and attack payload. Since the secure enclave can’t allocate host application memory, TAP is used to spot accessible memory.

Woman telling you to be quiet

Boffin suggests Trappist monk approach for Spectre-Meltdown-grade processor flaws, other security holes: Don’t say anything public – zip it

READ MORE

To pull that off, the researchers developed a fault-resistant write primitive, Checking Located Addresses for Writability (CLAW). To determine whether a memory page is writable, CLAW wraps the write instruction for the target page in a TSX transaction and aborts it after the write. The writability of the page can then be deduced by the return value of the transaction.

“With SGX-ROP, we bypassed ASLR, stack canaries, and address sanitizer, to run ROP gadgets in the host context enabling practical enclave malware,” the researchers claim, noting that the entire exploit process can be accomplished in about 20 seconds.

Gruss said he and his colleagues are looking into techniques like sandboxing to make SGX better. But as with the Spectre and Meltdown fixes, the cost could be paid in processor speed.

“We are working on mitigations, some of which trade performance for security on commodity systems, others require hardware changes but do not cost any performance,” he said.

The Register asked Intel if it was aware of the researchers’ work prior to publication. An Intel spokesperson didn’t have an immediate response, but we’ll let you know if the company has something to add. ®

Updated to add

In a statement emailed to The Register, an Intel spokesperson said:

Intel is aware of this research which is based upon assumptions that are outside the threat model for Intel SGX. The value of Intel SGX is to execute code in a protected enclave; however, Intel SGX does not guarantee that the code executed in the enclave is from a trusted source. In all cases, we recommend utilizing programs, files, apps, and plugins from trusted sources. Protecting customers continues to be a critical priority for us and we would like to thank Michael Schwarz, Samuel Weiser, and Daniel Grus for their ongoing research and for working with Intel on coordinated vulnerability disclosure.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/02/12/intel_sgx_hacked/

Experian: US Suffers the Most Online Fraud

New data from the credit reporting firm shows the sheer scale of online activity in the US also has made businesses and consumers there prime targets.

Consumers and businesses in the United States appear to be experiencing substantially more online fraud than their counterparts in other regions of the world.

The situation is driving an increased focus on technologies for detecting and preventing online fraud, a new survey by Experian shows.

The credit-monitoring firm recently polled 1,000 large companies and some 10,000 consumers across 21 countries on their experience with online fraud. The results showed eight-in-10 US businesses reporting an increase in fraud losses over the past 12 months, compared to 55% in Europe, the Middle East, and the rest of Asia. Much of the losses were tied to fraud resulting from account takeovers and the use of fake and stolen identities.

Experian’s survey shows that some 40% of consumers worldwide have experienced at least one fraudulent incident online. Here again, the incidence of fraud was much higher among US consumers than individuals elsewhere.

The data is the latest to highlight surging losses to US businesses from account takeover attacks; from the use of stolen identity credentials to create fraudulent credit card accounts; and other types of fraud.

Seventy-four percent of US financial institutions recently surveyed by the Aite Group, for instance, reported an increase in losses via the digital channel over the past two years; 60% reported a 10% increase or higher. As with the Experian survey, the respondents in Aite’s study also pointed to account takeovers as one of the primary causes for increased fraud losses.

Kathleen Peters, Experian’s senior vice president and head of fraud and identity, says a big reason for the higher prevalence of online fraud in the US is sheer scale. “The US continues to be a target-rich environment, with all types of online transactions increasing,” Peters says.

The massive volume of compromised identity records as well as the bustling Dark Web, have made it easier for criminals to conduct a wide range of fraudulent activity, she says.

The relatively recent adoption in the US of credit and debit cards based on the Europay MasterVard Visa (EMV) smartcard standard is another factor. The new payment cards have made it much harder for criminals to carry out fraud using counterfeit cards. As a result, a lot of the criminal activity that used to take place offline has migrated online in recent years, she says.

Synthetic ID Fraud

In addition, “one of the more significant trends we’ve seen over the past year has been the move to synthetic identity fraud – which is growing 35% year-over-year,” Peters says. This is a type of fraud where criminals cobble together real and fake information — such as a false name and a real but stolen Social Security Number — to create a brand-new identity.

The increasing fraud trend is driving a greater interest in detection and mitigation technologies. Three quarters of the companies in Experian’s survey said they had increased their online fraud management budgets last year, and they expect it will increase this year as well.

“Organizations need to move beyond basic demographic information and passwords to authenticate individuals,” Peters says. “A multi-layered approach that leverages advanced data and technology, such as device intelligence, biometrics, and document verification,” is critical to secure authentication while helping maintain a positive customer experience she says.

Such measures can help not just reduce fraud but boost consumer confidence as well, the Experian survey found. Nine in ten consumers surveyed are aware that businesses are collecting and using their personal information in different ways and 60% are aware of the risks of providing their personal information online. Still, 70% of consumers say they would be willing to share more personal information online if they were better assured of its security.

“Transaction security should no longer be viewed as binary, but on a scale,” says David Vergara, director of security product marketing at OneSpan. Online fraud has increased in volume, velocity, and sophistication making it hard for businesses and consumers to distinguish legitimate from illegitimate activity. “Organizations need to implement more intelligent and layered security measures to more accurately detect fraud,” Vergara says.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/endpoint/experian-us-suffers-the-most-online-fraud/d/d-id/1333846?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Client-Side DNS Attack Emerges From Academic Research

A new DNS cache poisoning attack is developed as part of the research toward a dissertation.

The rise of speculative execution side-channel vulnerabilities is having an interesting side effect: More researchers from academia are finding their names in CVEs and bounty notices, and, in turn, those from the security business side are finding themselves collaborating more with those academics. 

A recent DNS cache-poisoning attack that exploits a vulnerability found in mDNSResponder, a component used in name resolution in a variety of operating systems, illustrates one of the ways in which academic research is having an impact on commercial computing on a far faster cycle than the years typically associated with research and publication at universities.

A team of researchers, led by Ph.D. candidate Fatemah Alharbi, at the University of California, Riverside, discovered the attack as part of Alharbi’s doctoral research. “We found that the client-side DNS cache poisoning attack has never been technically and practically studied before; thus, I decided to choose this project as my first project in my PhD study,” Alharbi told Dark Reading in an email interview.

Alharbi’s group began to research the possible attack on Android and Ubuntu Linux. Once they demonstrated a successful attack, they moved on to see whether the same vulnerability existed for MacOS and Windows.

“As expected, we found the needed vulnerability to launch the attack and succeeded in poisoning the DNS cache of these two operating systems as well,” she said. “[As a result], one of the machine users can launch the attack and poisons the DNS cache (without any root or admin privileges) with a malicious DNS mapping. Since there is no complete isolation between users, another user (even the admin) visiting the same domain will end up visiting the webserver that is controlled by the attacker instead of the legitimate webserver.”

The attack itself takes advantage of the fact that the OS DNS cache used by mDNSResponder is shared among all the users of a given machine — and that cache is generally without explicit protection. “Client devices are typically not considered to be part of the DNS hierarchy and therefore have not been considered by defenses against DNS cache poisoning,” Alharbi said.

The research team disclosed the attack to the vendors and was recognized by Apple in the security notes for macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, and Security Update 2019-001 Sierra. Aside from the mitigation that may come through operating system updates, there are few good options available on the client system.

“One easy and fast solution is to disable the DNS cache,” Alharbi said. “The downside about this is that the client has to wait for the DNS response after the DNS resolution process is complete for each DNS query she sends.”

Another downside, she noted, is that the dependence entirely on the DNS server (and the additional traffic that represents) could make the DNS resolver more vulnerable to DDoS attacks.

The paper describing the attack and potential remediation will be published in the proceedings of IEEE International Conference on Computer Communications (INFOCOM) 2019, in Paris this May.

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/client-side-dns-attack-emerges-from-academic-research/d/d-id/1333848?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

‘Now is the winter of our disk contents’: Decision on Lauri Love’s seized gear due next week

Lauri Love will find out whether he is getting his computers back from the National Crime Agency on 19 February, a judge ruled today.

As reported earlier, Love wants the return of two laptops, two desktop tower PCs, an SD card, an external hard drive and one of the laptops’ hard drives, which were seized from his family home in Stradishall, Suffolk, when he was arrested in October 2013. Some of the computers were encrypted.

Lauri Love. Pic: Courage Foundation

Accused hacker Lauri Love tries to retrieve Fujitsu lappie and other gear from Britain’s FBI in court

READ MORE

Today’s hearing continued Love’s earlier attempts to get the computers and accessories returned. The NCA previously tried to force him to decrypt the machines as the price for getting them back; in 2016 District Judge Nina Tempia, sitting in Westminster Magistrates’ Court, refused permission for the NCA to do this. Since that hearing, no progress was made until today – the 19th time this application has come in front of the magistrates’ court.

After Love successfully fought off a 2018 US extradition attempt – which alleged that he hacked a number of government agencies including the FBI, NASA and the Department of Energy – he had another go at getting his computers back, which was heard today. The NCA confirmed that Love is still under criminal investigation.

In his written skeleton argument submitted to the court, Love opened with: “Now is the winter of our disk contents made glorious by the summer sun of law…”

He continued: “The NCA was under the strict obligation, not only to not initially remove any articles of property from the premises where a photograph or copy would suffice for the purposes of an investigation, but after removal of property to return originals as soon as practicable to the persons from whom they were seized… these obligations were and remain unfulfilled.”

Love also argued that the court had no power to “order any acts of destruction, modification or tampering with property removed by executive agents, which would constitute vandalism”.

Exhorting District Judge Margot Coleman to ignore the NCA’s arguments, Love said in his written legal arguments that he has “no relevant criminal record, nor history of offending, [and] has undertaken no actions during the course of the NCA investigation or since its effective closure in July 2014 to suggest that he will commit criminal offences”.

Reserving her judgment, District Judge Coleman said: “I am not going to give a decision today. I will reflect on this and take time to prepare a written decision [to be handed down] on 19th February” at Westminster Magistrates’ Court.

The judge also clarified an earlier reporting restriction order she made, allowing reporters at the hearing to quote from parts of Love’s skeleton argument.

The National Crime Agency was represented by barrister Andrew Bird. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/02/11/lauri_love_laptop_decision_reserved/

Patch this run(DM)c Docker flaw or you be illin’… Tricky containers can root host boxes. It’s like that – and that’s the way it is

Aleksa Sarai, a senior software engineer at SUSE Linux GmbH, has disclosed a serious vulnerability affecting runc, the default container runtime for Docker, containerd, Podman, and CRI-O.

“While there are very few incidents that could qualify as a doomsday scenario for enterprise IT, a cascading set of exploits affecting a wide range of interconnected production systems qualifies…and that’s exactly what this vulnerability represents,” said Scott McCarty, principal product manager for containers at Red Hat, in a blog post.

The flaw, designated CVE-2019-5736, was found by open source security researchers Adam Iwaniuk and Borys Popławski.

“The vulnerability allows a malicious container to (with minimal user interaction) overwrite the host runc binary and thus gain root-level code execution on the host,” said Sarai in a post to the OpenWall mailing list.

The attack involves replacing the target binary in the container with one that refers back to the runc binary. This can be done by attaching a privileged container (connecting it to the terminal) or starting it with a malicious image and making it execute itself.

But the Linux kernel normally would not allow the runc binary on the host to be overwritten while runc is executing.

“To overcome this, the attacker can instead open a file descriptor to /proc/self/exe using the O_PATH flag and then proceed to reopen the binary as O_WRONLY through /proc/self/fd/nr and try to write to it in a busy loop from a separate process,” Sarai explains. “Ultimately it will succeed when the runc binary exits.”

The attacker can then run any command as root within a container and can take over the container host.

Sarai, one of the maintainers of runc, has pushed a git commit to fix the flaw, but all the projects built atop runc need to incorporate the changes. He also found that a variation of the flaw affects LXC, a Linux containerization tool that predates Docker, and that too has been patched.

Elderly woman and man holding a cardboard container

Docker invites elderly Windows Server apps to spend remaining days in supervised care

READ MORE

Docker has just released v18.09.2 which fixes the flaw. Red Hat says default configurations of Red Hat Enterprise Linux as well as Red Hat OpenShift are protected but has mitigation advice for those who need to update. Rancher, maker of open source Kubernetes management software, has published a patching script for legacy versions of Docker.

Linux distributions Debian and Ubuntu are working on fixes. AWS and Google Cloud have posted security notices advising customers to update containers on a variety of affected services.

McCarty says this isn’t the first major container runtime flaw and it won’t be the last. “Just as Spectre/Meltdown last year represented a shift in security research to processor architectures from software architectures, we should expect that low-level container runtimes like runc and container engines like docker will now experience additional scrutiny from researchers and potentially malicious actors as well,” he said. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/02/11/docker_container_flaw/