STE WILLIAMS

Severe Vulnerabilities Discovered in GE Medical Devices

CISA has released an advisory for six high-severity CVEs for GE Carescape patient monitors, Apex Pro, and Clinical Information Center systems.

The US Cybersecurity and Infrastructure Agency (CISA) today issued an advisory for six high-severity security vulnerabilities in patient monitoring devices manufactured by GE Healthcare.

These flaws, collectively dubbed “MDhex,” could allow an attacker to make changes at the software level of a device and in doing so interfere with its functionality, render it unusable, change alarm settings, or expose personal health information (PHI). Their discovery began with CyberMDX security researchers investigating the CIC Pro, a common product among customers.

The CIC Pro is a workstation that hospital staff use to view their patients’ physiological data, waveforms, and demographics. Data is transmitted from multiple patient-side monitors and collected through a shared network. CIC Pro may be used to centrally manage patient monitors for things such as admission, date and time synchronization, and setting alarm limits.

Researchers started the investigation when they noticed CIC Pro devices in the field had open ports running an outdated and potentially problematic version of Webmin. “It was allowing incoming traffic on a range of management ports,” says head of research Elad Luz. “With that [discovery], we thought we’d do an in-depth examination of that product ourselves.”

Their analysis led to a total of six severe vulnerabilities, as listed in CISA’s advisory. Five were assigned a CVSS maximum severity score of 10: CVE-2020-6961, CVE-2020-6963, CVE-2020-6964, CVE-2020-6966, and CVE-2020-6962. The sixth, CVE-2020-6965, was given a high-severity score of 8.5. MDhex was reported to GE on September 18, 2019, and is being formally disclosed today after a period of collaboration among GE, CISA, and CyberMDX to confirm and evaluate the vulnerabilities.

The popular Carescape product line, launched in 2007, has been adopted by hospitals around the world. Products affected by these vulnerabilities include certain versions of the Carescape CIC, Apex Telemetry Server/Tower, Central Station (CSCS) Telemetry Server, B450 patient monitor, B650 patient monitor, and B850 patient monitor. GE did not disclose the number of affected devices; however, CyberMDX believes the installed base is in the hundreds of thousands.

Inside a hospital, these devices are deployed on a network they share with other monitoring equipment, which also consists of vulnerable devices. If a hospital has one of these affected products, they likely have the others, Luz points out.

Each flaw exists in a different aspect of device design and configuration. CVE-2020-6961 is an SSH vulnerability. An SSH server configuration typically holds a file holding public keys of entities authorized to connect. In vulnerable devices, the configuration also has a private key — which is the same across the entire medical product line.

“The same private key is universally shared across an entire line of devices in the CARESCAPE and GE Healthcare family of products,” researchers write in a blog post. “Using the private key, an attacker could remotely access and execute code on these devices — potentially comprising the device’s very availability as well as the confidentiality and integrity of any data it holds.”

The issue of hard-coded credentials also exists in Microsoft Server Message Block vulnerability CVE-2020-6963. Credentials underlying this flaw can be accessed by doing password recovery on the Window XP operating system of affected devices. With these credentials, an attacker could break into other devices. CVE-2020-6964 exists in MultiMouse/Kavoon KM software, which enables remote keyboard, mouse, and clipboard control of a device. The bug could let an attacker abuse this functionality and take over devices without any credential controls to alter device settings and change data.

VNC vulnerability CVE-2020-6966 enables remote control in VNC, a software used for remote desktop access. Credentials for this are insecurely stored and can be found in publicly available and easily searchable product documentation. CVE-2020-6962 pertains to the deprecated version of Webmin (1.2.5) in affected devices, which are exposed to known exploits in the wild.

These vulnerabilities generated the highest scores because they easily allow hackers to do remote code execution, which Luz considers “the endgame” for the majority of cyberattacks.

“Once you gain that remote code execution, you can [alter] the device functionality, perhaps make it unusable, perhaps make it display false data, things like that,” he explains. While it’s not clear why an attacker might target a specific medical device, the level of access granted by these vulnerabilities could enable a large-scale ransomware attack on a healthcare target.

GE plans to provide patches and additional security information for affected users over the coming months. Users can check its website for more updates or contact the company directly. In the meantime, mitigations are offered in the CyberMDX blog post.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem.”

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/severe-vulnerabilities-discovered-in-ge-medical-devices/d/d-id/1336867?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Deconstructing Web Cache Deception Attacks: They’re Bad; Now What?

Expect cache attacks to get worse before they get better. The problem is that we don’t yet have a good solution.

“Web cache” refers to any technology that fronts an origin web server and temporarily stores frequently accessed content so that subsequent requests for the same content can be served efficiently. Be they centralized caching proxies deployed on-premises at an enterprise or content delivery networks (CDNs) with massively distributed caching edge servers, caches have become critical Internet infrastructure that enable scalable traffic delivery.

Attacks targeting caches are nothing new. However, it wasn’t until 2017 that web cache attacks saw a significant surge in popularity, with novel exploits regularly making the headlines. Works such as “Web Cache Deception Attack,” “Practical Cache Poisoning,” and “CPDoS: Cache Poisoned Denial of Service” demonstrate disastrous vulnerabilities that are easy for miscreants to exploit.

In our own research with academics from the University of Trento and Northeastern University, we homed in on the aforementioned web cache deception attack, or WCD for short. WCD is a particularly damaging threat, where the adversary tricks a cache into storing the victim’s sensitive data, therefore leaking it on the Internet. We analyzed 340 popular websites and found that 37 were affected by WCD, also finding that simple tweaks to existing attack techniques are sufficient to discover new exploitable targets. (We will present this work, titled “Cached and Confused: Web Cache Deception in the Wild,” at Usenix Security Symposium in August 2020.)

Is WCD a genuine security concern? Absolutely. That point was already made repeatedly over the past years. In this column, I will focus on a largely overlooked question: Given the severity of the issue, why aren’t we seeing researchers scrambling to propose defenses? Why aren’t security vendors flooding the market with solutions?

Unfortunately, this is a direct consequence of the fact that web caches are easy to exploit but disproportionately difficult to secure. Let’s dig deeper into how the attack works to understand why.

WCD stems from a discrepancy between how a cache and an origin server interpret a given HTTP request. For instance, an attacker can craft a URL that points to the account information on a banking website but append to it a nonexistent path component disguised as a static image, such as “/account.php/nonexistent.jpg.” Many origin servers will simply ignore the invalid suffix and respond with account details. However, a web cache proxying the content will be oblivious to the processing that happens on the origin server, and it will store the response as if it were an image. If the attacker can trick a user into clicking on this link, the victim’s account information will be cached, giving the attacker an opportunity to steal it.

The key observation here is that neither the origin server nor the web cache is individually at fault. In fact, when we examine them in isolation, they are both perfectly secure, performing their intended functions. Instead, the vulnerability results from different interpretations of the same request by two technologies that process the traffic, leading to a disagreement on the “cacheability” of the response. Perhaps a safety model — as opposed to a more traditional security model — is more appropriate when analyzing WCD: Faulty components don’t lead to a vulnerability; instead, hazardous interactions between components lead to an accident.

Dire Implications
This has dire implications for security professionals. Fixing a WCD vulnerability is very different from applying a patch to a broken software; it requires site operators to adopt a holistic view of their web infrastructure. Operators need to identify all technologies that may influence the Internet traffic traversing their environment, understand how they individually work, and how they influence each other, just to pinpoint a vulnerability. The fix may then require intrusive architectural changes.

This is already nontrivial for a small web deployment but large enterprises often span global infrastructures, utilize a patchwork of centralized caches, and chain together multiple CDN providers. The task quickly becomes intractable.

Attackers, on the other hand, do not need to concern themselves with this complexity. They do not need to understand why a vulnerability exists but merely test their exploits treating their target as a black box. Sweeping through a large array of sites looking for vulnerabilities is straightforward, whereas fixing a single vulnerability requires considerable effort.

Fundamental Challenges
With the flood of new attack variants, exciting offensive research opportunities, and the media’s focus on exploited sites, it’s easy to overlook the fundamental challenges for an effective WCD defense. Cache attacks will likely get worse before they get better, and we don’t yet have a good solution. Automatic discovery of hazardous interactions in a web architecture is an open research problem.

In the meantime, falling back on asset management best practices is a good bet. A well-maintained system register that describes entities and the relationships between them goes a long way in helping site operators track down potential WCD vulnerabilities. Perhaps most important, though, is realizing that a systems safety problem like WCD can’t possibly be addressed by system owners, cache vendors, or CDN providers on their own. Systems-centric security and safety analyses of Internet-wide infrastructures require the collaboration of all parties involved.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem.”

Kaan Onarlioglu is a researcher and engineer at Akamai who is interested in a wide array of systems security problems, with an emphasis on designing practical technologies with real-life impact. He works to make computers and the Internet secure — but occasionally … View Full Bio

Article source: https://www.darkreading.com/deconstructing-web-cache-deception-attacks-theyre-bad-now-what/a/d-id/1336845?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

NSA Offers Guidance on Mitigating Cloud Flaws

A new document separates cloud vulnerabilities into four classes and offers mitigations to help businesses protect cloud resources.

The National Security Agency (NSA) today published a new document outlining common types of cloud vulnerabilities and offering different ways for companies to protect cloud environments.

“Mitigating Cloud Vulnerabilities” addresses how cloud adoption can improve security posture but introduce risks that organizations should understand. It addresses four types of cloud architectural services – identity and access management, compute, networking, and storage – and explains the importance of shared responsibility with cloud service providers. For example, this model affects tasks like patching but varies by CSP, cloud service, and product offering.

It also digs into different types of cloud threat actors, which may include malicious admins who use their privileged credentials to access sensitive data. These may come from the CSP or the customer, NSA notes. Other cloud-focused attacks may come from cybercriminals, nation-state attackers, or untrained or neglectful customer cloud administrators, officials state.

The document breaks cloud vulnerabilities into four classes. Misconfigurations, considered to be the lowest in sophistication, often arise from CSP policy mistakes or misunderstanding the shared responsibility model. It’s the most widespread of the four and could expose an organization to a range of threats including denial of service and account compromise.

Poor access control is another widespread threat of moderate sophistication. This occurs when cloud resources use weak authorization methods or have vulnerabilities that would let an attacker bypass authentication. An attacker could elevate privileges and compromise resources.

Shared tenancy vulnerabilities are considered rare and of high sophistication. Hypervisor flaws are difficult and expensive to find and exploit; CSPs continuously scan hypervisor code for bugs. Containers run on a shared kernel, and a vulnerability in the container platform could let an attacker target containers run by other tenants on the same host.

Supply chain flaws, the fourth type of cloud vulnerability, are also considered to be rare and advanced. These vulnerabilities include the presence of inside attackers, as well as intentional backdoors built into hardware and software. Bringing someone into the supply chain could give attackers an easy route into a target organization.

Read more details and mitigations in the full document here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/nsa-offers-guidance-on-mitigating-cloud-flaws/d/d-id/1336871?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

DHS Warns of Increasing Emotet Risk

Emotet is considered one of the most damaging banking Trojans, primarily through its ability to carry other malware into an organization.

The Department of Homeland Security’s CISA (Cybersecurity and Infrastructure Security Agency) has issued a warning of increased activity around highly targeted Emotet attacks. Emotet’s main threat is that it can act as a carrier (or “dropper”) for a wide variety of different malware payloads.

Emotet is classified as a banking Trojan that spreads primarily through email attachments. It is known for its ability to quickly and widely spread through an organization once an initial infection occurs. According to the DHS, Emotet is “…among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT) governments, and the private and public sectors.”

For more, read here and here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/dhs-warns-of-increasing-emotet-risk/d/d-id/1336873?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

The Annoying MacOS Threat That Won’t Go Away

In two years, the adware-dropping Shlayer Trojan has spread to infect one in 10 MacOS systems, Kaspersky says.

Mac users generally tend to be better protected against malware and other online threats than Windows users. That doesn’t mean they are immune, however.

Shlayer, a malware tool for distributing unwanted advertisements on MacOS systems, is a case in point. Since first surfacing in February 2018, the malware has emerged as the most widely distributed threat on the MacOS platform. Among those most impacted by the malware are MacOS users in the US, Germany, France, and the UK.

Kaspersky, which has been tracking Shlayer for some time, this week described it as currently infecting at least one in 10 Mac users. Though the malware has little to separate it from other malicious software from a purely technical standpoint, it continues to remain as active as when it first surfaced.

According to Kaspersky, in 2019 Shlayer-related attacks accounted for nearly 30% of all attacks on MacOS devices protected by the company’s products. Worse, almost all of the other remaining top 10 MacOS threats were adware products distributed by Shlayer. Among them were AdWare.OSX.Bnodlero, AdWare.OSX.Geonei, AdWare.OSX.Pirrit, and AdWare.OSX.Cimpli, the security vendor noted.

One reason for Shlayer’s continuing prevalence is the manner in which it is being distributed. Currently, over 1,000 “partner” websites distribute Shlayer on behalf of the malware’s authors. Unsuspecting users who arrive on these sites — many of which hawk pirated content — are typically redirected to fake Flash Player update pages from where the malware gets downloaded on MacOS systems. The partner sites get paid for each download.

“The affiliate network is an intermediate link between the creators of the Trojan and those who are willing to distribute it for a fee,” says Vladimir Kuskov, head of advanced threat research and software classification at Kaspersky. “The role of partner sites is to attract users to their resource and instill the need to download and run a malicious file.” 

Shlayer is being distributed in a variety of other ways, including malicious links to fake Adobe Flash update sites embedded in article references on Wikipedia and video descriptions on YouTube. Kasperksy researchers have so far found links to at least 700 malicious domains for downloading Shlayer hidden in a variety of legitimate sites.

Users looking for pirated content are more likely to get infected, Kuskov says. At the same time, even those clicking on links below a YouTube video or while searching for something on Wikipedia are at risk, he notes.

Annoying but Less Harmful
Shlayer is distributed under the guise of a Flash Player installer and, at first sight, looks pretty legitimate. Like other installers, the malware installs software, except that in this case it installs adware instead of legitimate software.

One alleviating fact is that Shlayer does not load on its own. Users have to actively click and download the installer for it to load on a system. But those distributing the malware have employed a variety of social engineering tricks to redirect users to fake Flash Player update sites to get users to download the malware, Kuskov notes.

Shlayer itself is also not persistent on an infected system. A user who discovers the malware can simply delete the installation file to get rid of it, he says.

The real problem is the adware it installs. “It’s important to understand that Shlayer itself performs only the initial stage of the attack — it penetrates the system, loads the main payload, and runs it,” Kuskov says. The installed adware is not easy for the average user to remove. It can be especially challenging because of the multiple adware family Shlayer can install on a single system.

Also, some adware like AdWare.OSX.Cimpli can intercept a user’s HTTP and HTTPS traffic and inject code into the Web pages requested by the user. “In theory, that means that Cimpli can steal any data entered by the user on the Web page,” Koskov said.

Even so, Shlayer is relatively innocuous compared to other more destructive malware. It is also an example of how attackers are constantly looking for ways to earn money by attacking MacOS systems.

The threat landscape for Apple devices is changing, and the amount of malicious and unwanted software is growing, Kaspersky said. Since at least 2012, the volume of malicious and potentially unwanted files targeted at MacOS has been doubling each year. 

“But instead of full-fledged malware, MacOS users increasingly receive annoying, but less harmful, adware,” Kuskov says. “It seems that this way of monetizing an infection allows attackers to make more profit and save on expenses.”

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem.”

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/the-annoying-macos-threat-that-wont-go-away/d/d-id/1336875?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Looking for silver linings in the CVE-2020-0601 crypto vulnerability

The scene stealer in January’s Patch Tuesday updates from Microsoft was CVE-2020-0601, a very serious vulnerability in the crypt32.dll library used by more recent versions of Windows.

The flaw, which also goes by the names Chain of Fools and Curveball, allows an attacker to fool Windows into believing that malicious software and websites have been digitally vouched for by one of the root certificate authorities that Windows trusts (including Microsoft itself).

An attacker could exploit the flaw to disguise malware as legitimate – Microsoft-approved – software, to conduct silent Man-in-the-Middle attacks or to create more realistic phishing websites.

The vulnerability is undoubtedly very serious, but in the days since its disclosure I have started to wonder if there is a silver lining to this cloud.

Fortunately, there may be a few.

First, it appears this vulnerability only affects the latest editions of Windows, including Windows 10, Windows Server 2016, Windows Server 2019 and their derivatives. It doesn’t affect older versions of Windows, nor does it impact users of MacOS, Linux or Unix variants.

Second, the vulnerability can be detected both in the network and at the endpoint. This means you may have a heads-up from patched machines or network security devices, even if some of your endpoints may not yet have the January 2020 updates.

It would also seem that the most important thing, Windows updates themselves, are unaffected by the vulnerability. Windows Update uses a pinned certificate chain with RSA certificates, which are not affected by CVE 2020-0601. This means you can safely update systems without fear of someone booby-trapping your updates.

Perhaps most importantly though, CVE 2020-0601 is the first Microsoft Windows vulnerability disclosure credited to the NSA (National Security Agency). That isn’t to say the agency hasn’t assisted in previous vulnerability disclosures, but it’s the first time it’s been made public. This is a new precedent and a new look for the agency. This may be a result of the Vulnerabilities Equities Process, which is used to determine the relative risk/benefit ratio of a zero-day vulnerability with regard to its use as a weapon.

This may signify an evolution in the position of the United States’ role in disclosure.

A similar form of attack, attributed to the NSA, was used by Flame malware almost eight years ago. The malware surreptitiously infected Windows machines by bypassing the cryptographic validation of software signatures.

After infecting a host, Flame would abuse the WPAD auto-proxy configuration “feature” in Windows to direct Windows Updates to the infected computer as a proxy. The attackers knew that Windows Update still trusted a couple of certificates that used the MD5 algorithm, long known to suffer from calculated collision weaknesses. This allowed them to supply fake updates to their proxy implant and make them appear to be signed by Microsoft’s MD5 certificate authorities.

This attack was first discovered by Iran in 2012 and forced Microsoft to reconsider and modernize how it secures Windows Updates. While it might have been slightly embarrassing for both the NSA and Microsoft, it demonstrated that they were more than happy to keep dangerous vulnerabilities to themselves.

Four years later, just before Christmas in 2016, the Shadow Brokers resurfaced, claiming to have stolen NSA cyberweapons available for auction. The veracity of the claim was unclear at the time, but it appears the group did have stolen NSA exploits, which may have put pressure on the NSA to do something to head off the threat at the pass.

With the cat out of the bag, the NSA contacted Microsoft and shared details of the exploit before the Shadow Brokers were able to make a public disclosure or sale. Microsoft released MS17-010 (patching CVE 2017-144) in March 2017, to patch the vulnerability, known as EternalBlue.

At the time the patch didn’t get much attention and, unfortunately, many organisations didn’t apply it quickly enough. The result was the headline-making Wannacry outbreak in May of 2017.

While disclosing details of EternalBlue to Microsoft (albeit grudgingly) was an improvement over what the NSA had done with Flame, it wasn’t done early enough to prevent adversaries from abusing one of the US government’s own fully armed exploits.

Which brings us to CVE 2020-0601, a proactively disclosed, dangerous zero-day vulnerability that could have been a sibling to Flame and EternalBlue.

It is unclear why the NSA chose to disclose this vulnerability to Microsoft. Discovery of US enemies using it against American targets perhaps? Or maybe the NSA had already made use of the vulnerability and was concerned that others may have discovered it. Or perhaps the agency has learned from its previous instances of playing with fire.

The answer is probably classified and we will likely never know with certainty, but there is one thing we can say for sure: we are all safer for it.


Latest Naked Security podcast

LISTEN NOW

Click-and-drag on the soundwaves below to skip to any point in the podcast.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/uLFrNZCgCNo/

Ooh, watch out Google. You’ve got competition. Verizon has a new ‘privacy-focused’ search engine

Verizon has slung out a new, privacy-focused search engine in an effort to win over customers who prefer not to have their browsing habits tracked by ad-slingers and the like.

For years, the company has been trying to diversify its market from selling hundreds of billions of dollars’ worth of wireless and wired comms, towards other growing sectors – flinging cash at new tech firms, IT services and media outlets.

It has also been trying to shift its image from a stodgy, boring broadband provider to a hip, kombucha-drinking, new media giant. Three years ago, it bought Yahoo! and two years before that, AOL, in a ham-fisted effort to woo millennials away from Facebook and Google – which it later rebranded as Oath and then the Verizon Media Group.

The parent firm itself was given a bash with the rebranding stick in 2015.

So far the makeover has not gone well. One effort, a tech news site called Sugarstring, imploded after one of its writers revealed that he’d been banned from reporting on two subjects close to Verizon’s heart: net neutrality and surveillance. The company denied this.

The firm’s latest new media mishap, go90, touted as a video-streaming service for millennials to rival YouTube, was also dead on arrival. And let’s not get started on Verizon’s’s mobile wallet app, which just so happened to share its name with a violent Islamist militant group.

digital dollars

Verizon promises to stop selling its subscribers’ location data… for now

READ MORE

Verizon said the new search engine, named One Search, won’t share user’s personal information with advertisers, or store their search history. A new “Advanced Privacy Mode” will encrypt search terms and URLs against third-party tracking.

The decision to make a privacy-focused search engine is apparently in line with Verizon’s “commitment to trust and transparency” and the way the company has led the industry “over the last couple decades.”

The move might strike some readers as rich coming from a business that has a long history of consumer surveillance. In 2016, Verizon was fined $1.4m by the FCC for using stalker supercookies to clandestinely track its users across the internet. Two years earlier, it settled for $7.4m for failing to tell customers that it was using their personal information for marketing purposes.

Verizon was also called out for harvesting users’ location data and selling it on to pretty much anyone who would pay for it, including other actors who then sold it to the police. Verizon later promised to end the programme, but not immediately, arguing that doing so would “disrupt beneficial services being provided using customer location data, such as the fraud prevention and call routing services”.

That’s not to mention Verizon’s cozy relationship with the NSA. The company didn’t make a peep when the government agency began indiscriminately collecting the data of millions of customers, regardless of whether they were suspected of any wrongdoing, albeit in compliance of a top secret court order. To be fair, it would not have been alone among tech firms as a recipient of such an order.

Verizon has also lobbied Congress to quash privacy rules at the FCC that would have prevented ISPs from selling users’ browser history. It also joined forces with ATT to lobby against a net neutrality bill, and threatened to sue states and cities that tried to enforce it independently.

It’s no surprise, then, that many analysts are skeptical. Brian Honan, a special advisor on internet security to Europol, told The Reg: “Given their history, Verizon have an uphill battle in gaining the trust of customers around privacy. In particular for non-US-based customers who worry companies like Verizon will prioritise US government requests over their individual rights.”

The move highlights that companies are beginning to take privacy seriously. Several tech firms – such as Mozilla, Microsoft and Apple – have shifted towards selling privacy as a service in recent years.

Honan added: “The introduction of GDPR and the California Consumer Privacy Act have made consumers more aware of their privacy rights and they are looking to deal with companies who respect those rights.” ®

Sponsored:
Detecting cyber attacks as a small to medium business

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/01/23/verizon_search_engine/

We need to make it even easier for UK terror cops to rummage about in folks’ phones, says govt lawyer

The Government Reviewer of Terrorism Laws has declared that safeguards protecting Britons from police workers demanding passwords for their devices must be watered down.

In a speech delivered to conservative think tank the Henry Jackson Society yesterday, Jonathan Hall QC, the “Independent Reviewer of Terrorism Legislation”* said section 49 of the Regulation of Investigatory Powers Act (RIPA) 2000 is too “difficult” for police and others to work with.

Section 49 of RIPA is the part of UK law that lets police and others legally order suspects to hand over passwords for encrypted information.

There are two safeguards: one is subsection (3), which says the state can only demand your password if it is “in the interests of national security”, for “preventing or detecting crime” or for the “economic well-being of the United Kingdom”.

The other safeguard, identified by Hall, is subsection (2)(d), which says password demands can only be made by the state if it is “not reasonably practicable” to get at the encrypted information without demanding the password. Failure to obey is a crime punishable with up to five years in prison.

Even these sweeping permissions and slim safeguards are too narrow, in Hall’s view. In his speech he said:

The truth is that these preconditions may be difficult to establish, especially when counter-terrorism police are working against the clock in relation to multiple individuals and multiple devices, where those individuals are in precharge detention and must be either charged or released unconditionally…

Pre-charge detention – arrest and incarceration without being charged – for people apprehended under terrorism powers lasts for up to a fortnight. After 14 days police must ask a judge’s permission to carry on jailing a suspect without setting out a case against them.

Hall went on to call for the creation of a new offence of failing to hand over a password during a terrorism investigation. It was unclear whether the barrister was calling for the word “terrorism” to be inserted alongside “child indecency” and “national security” in RIPA section 53(5A)(a), which sets longer sentences for refusals to decrypt in certain types of case.

In a coded warning, Hall appeared to suggest that opposing an expansion of forced-decryption powers could lead to “longer and longer periods of pre-trial detention being sought” by police, spies and the like.

Lest all this is thought to be an edge case that only applies to nasty people who had it coming to them anyway, British police abused their Terrorism Act powers to target a journalist’s courier who was changing flights at Heathrow while carrying encrypted material from Edward Snowden. In an act of great national shame, a senior judge decided this was perfectly legal.

Hall’s proposal would see people in similar circumstances – journalists, your lawyer, your family members – facing a potential five-year prison term for quite reasonably refusing to incriminate themselves or others. Such abuses, and potential abuses, must be confronted and taken outside the range of lawful options open to police and others.

Hall’s full speech is available as a PDF on the government website, gov.uk. ®

Bootnote

* The Independent Reviewer of Terrorism Legislation’s official name is deliberately misleading: the post is now used by the government of the day for prominent barristers to prove their political loyalty before promotion into senior politico-legal posts.

Hall’s immediate predecessor, Max Hill QC, echoed then-Home Secretary Amber Rudd’s demands for encryption and online anonymity to be outlawed, something that did not in any way slow down his promotion to Director of Public Prosecutions – top job in the criminal legal world – 10 months later.

Before Hill came David Anderson QC, who was widely accepted to have been as neutral as is possible in the post; nonetheless, this didn’t stop his elevation to the House of Lords as a crossbench peer after he stepped down in 2017.

The first permanent reviewer and Anderson’s predecessor was Lord (Alex) Carlile QC, who, though nominally a Lib Dem, took a post in 2001 in Tony Blair’s Labour government. He spent the next nine years overseeing the introduction of intrusive legal powers for police, spies, local councils and anyone else in the public sector who fancied themselves as James Bond.

Sponsored:
Detecting cyber attacks as a small to medium business

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/01/23/weaken_forced_decryption_safeguards_govt_lawyer_says/

Weathering the Privacy Storm from GDPR to CCPA & PDPA

A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.

A stat caught my eye while sifting through my news feed recently, and I’ve been noodling on it ever since. Only 28% of firms that must comply with the General Data Protection Regulation (GDPR) are actually in compliance, according to Capgemini research published last fall. Yet, when GDPR went into effect in May 2018, there was an overall sense of confidence that most companies felt ready to comply at the time — 78% of companies, according to the same survey.

This data point showcases a pretty sizable disconnect between perception and reality.

Think about it: We’re already more than 18 months into the regulation coming into full force, and so few companies are actually in compliance. And the regulatory landscape is only getting more complicated as similar regulations go in effect, such as the California Consumer Privacy Act (CCPA) and the lesser-known Personal Data Protection Act (PDPA) in Singapore.

The Evolving Regulatory Landscape
Facing this growing set of regulations, while crucial, is a massive undertaking and it’s certainly not cheap.

For example, if companies are found out of compliance with GDPR, they are looking at penalties upward of 4% of annual global revenue. To put that percentage in perspective, of the 12 major fines handed down since the GDPR took effect in May 2018, that equates to $359 million spent on fines. That is not a small number.

There is also the cost to comply — something virtually all companies face today in some shape or form if they do business on a global basis. For CCPA alone, the initial estimates for getting California businesses into compliance is estimated at around $55 billion, according to the California Department of Justice. And that’s just to comply with one regulation.

The reality is that compliance is expensive but not as expensive as being caught out of compliance. This double-edged sword is unfortunate but it is the world we live in today. So, how should companies navigate in today’s business world to ensure the privacy rights of their customers (and employees) are protected without missing the mark on any one of these regulatory requirements?

“General” Data Protection
A lot of companies are approaching the notion of data privacy in a one-off fashion, addressing various privacy regulations separately from each other. But today, taking that one-by-one approach is not only extremely laborious and taxing on every aspect of the business, it is needless. If we take a step back and ask “What is the lowest common denominator across all these?” the answer is really about knowing what data you actually have and putting the right controls in place to ensure you can properly safeguard it.

Taking this “common denominator” approach can free up a lot of time, energy, and resources dedicated to data privacy efforts across the board.

Consider these fundamental practices:

1. Identify your sensitive data. This information is often stored across systems, databases, and file stores (think Box, SharePoint, etc.). Knowing what sensitive data you have and where it’s stored is a key first step.

2. Know who has access. Getting a clear picture of who has access and ensuring that only the right people who “should” have access actually do is your next key step to protecting your customer’s information.

3. Implement controls and keep them updated. Using policies to keep access consistent is important, but ensuring they are updated and stay current with organizational changes is paramount.

Weathering the Privacy Storm
Taking a general approach to privacy, no matter the regulation is the only way to stay ahead of the privacy storm we’re collectively facing today. We’re already seeing extensions on existing regulations — the California Privacy Rights and Enforcement Act of 2020 is an example of this. CCPA 2.0 as it’s been dubbed, would become an amendment to the CCPA. If this one takes effect, it would create a whole new set of privacy rights that — surprise, surprise — align well with GDPR, putting greater safeguards around protecting sensitive personal information. I fully believe amendments piggybacking on existing regulations is not an isolated, US-centric move, but something we’ll see continue around the world as enforcement becomes stricter with privacy rights more invaluable than ever.

The truth is privacy is (almost) dead. So many of us essentially have thrown our hands up, knowing our own personal data is already out there on the Dark Web. But that doesn’t mean that we can all sit back and let the storm continue to brew, chasing our way around each of these privacy regulations to the detriment of our customers’ privacy. It’s cost-prohibitive and ineffective, lacking a cohesive strategy.

The bigger picture is this: Make data privacy just as central to the rest of your security strategy. Make sure it is holistic and takes into account all facets (and overlaps in) the slew of regulations you face as a business leader. Only then do you stand a fighting chance of weathering the privacy storm and averting a data privacy disaster in the future.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff.

In his role as CEO, Mark brings to bear over 20 years of experience developing and leading innovative technology companies. Under Mark’s direction, SailPoint has grown from a collection of fresh ideas into a publicly recognized leader in the identity management software … View Full Bio

Article source: https://www.darkreading.com/risk/weathering-the-privacy-storm-from-gdpr-to-ccpa-and-pdpa-/a/d-id/1336819?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says

Attackers ‘weaponized’ Active Directory to spread the ransomware.

S4x20 CONFERECE – Miami – More signs that the industrial control system (ICS) sector has become one of the latest favorite targets of ransomware attacks: The head of an operational technology (OT) cybersecurity services firm says at least five organizations in the oil and gas industry were recently hit by Ryuk.

Clint Bodungen, founder and CEO of ThreatGen, which conducts incident response and other security services, says he believes the ransomware attack revealed late last month by the US Coast Guard in a Marine Safety Information Bulletin may have been part of a more widespread Ryuk ransomware attack campaign that included two of his firm’s oil and gas organization clients as victims.

The Coast Guard in its Dec. 16, 2019, alert warned of a Ryuk ransomware attack at a Maritime Transportation Security Act (MTSA)-regulated facility that began with a user opening a malicious link in a phishing email, leading to Ryuk locking the victim out of “critical” files in the IT network. Ryuk also spread to systems that monitor and control the transfer of cargo, ultimately knocking the facility’s “primary operations” for 30 hours during the incident response.

“The impacts to the facility included a disruption of the entire corporate IT network (beyond the footprint of the facility), disruption of camera and physical access control systems, and loss of critical process control monitoring systems,” the Coast Guard said in the alert

The Coast Guard alert caught Bodungen’s attention. “I don’t know if the … Coast Guard is talking directly about one of my customers, but the data was relative enough and close enough that even one of my customers thought, ‘Are they talking about us?'” says Bodungen, who is scheduled to give a presentation here today about the ransomware incidents.

Either way, he says, the tactics, techniques, and procedures (TTPs) used against all five oil and gas victims were similar, indicating that the Ryuk attackers were specifically targeting the sector – possibly in a coordinated campaign. In addition to his two oil and gas customers, he points to the attack on Mexico’s Pemex in November as well two additional oil and gas firms he is aware of.

“This feels like one campaign because the TTPs are that similar,” he says. The Coast Guard and ICS-CERT were contacted by at least one of his customers in the wake of their ransomware attack.

Ryuk, a ransomware variant created by a Russian cybercrime group known as Wizard Spider, is well-known for targeting large companies and organizations with the aim of scoring more lucrative ransom payments. As of the third quarter of 2019, the average initial ransom demand from Ryuk attacks was $377,000, according to data from Coveware

The malware was behind several local government attacks, including one against Riviera Beach, Fla., in which the city paid out $600,000 in ransom, and another against Lake City, Fla., which coughed up $460,000 in ransom. New Orleans reportedly also was hit with Ryuk in its recent ransomware attack.

Bodungen says neither of his firm’s oil and gas sector clients paid the ransom demands. He would not disclose the actual ransom amount out of concern that it could be used to identify those customers, who he had promised not to name publicly. He plans to share here today the TTPs gathered from the IR engagements with his clients.

Efforts to reach the US Coast Guard were unsuccessful as of this posting.

The Attacks
The attackers apparently had sat dormant in both of ThreatGen’s oil and gas customer networks for several months before launching the ransomware attack itself. The initial infiltration began with a spear-phishing email in one case and a water-holing attack in another, which planted the infamous Trickbot backdoor, Bodungen says. Trickbot is typically used by attackers to move quietly through the victim network to identify the location of potentially sensitive data they can lock down in the ransomware stage of the attack.

The attackers hacked into the victims’ Active Directory servers via the Remote Desktop Protocol (RDP). “They actually weaponized AD by putting not Trickbot, but Ryuk, into the AD [roaming] login script. So anybody who logged into that AD server was immediately infected,” namely Windows-based servers and endpoints, Bodungen says.  

So as soon as an engineer, for example, logged in from his or her workstation, the payload would drop, execute, and lock the user out of the machine.

While the Coast Guard alert said industrial systems were hit by Ryuk in the victim’s network, Bodungen says, that was not the case with the oil and gas firms his company investigated.

“Some engineering workstations and [HMI and other] terminals got infected, so as soon as that started to happen, they did a manual switchover [with the industrial systems],” he says. “The industrial processes were not shut down by Ryuk … it disables your ability to monitor, view, and control,” so the plants went into manual mode.

Ryuk did not directly infect his oil and gas client’s physical security cameras or physical access control as the Coast Guard alert appears to indicate, he says. Instead, the network links to those systems were temporarily disrupted during ThreatGen’s IR investigation, when the plant was “isolated” to thwart further spread of the attack, according to Bodungen. In all, the two oil and gas organizations were down anywhere from 24 to 72 hours during the IR engagements.

Meanwhile, Trend Micro late last month warned that the oil and gas industry was increasingly at risk of ransomware attacks. The security firm referenced the case of a US oil and natural gas firm that was hit with a very targeted ransomware attack in which just three computers were affected, as well as its cloud backups. The infected machines hosted “essential” company data and cost the company some $30 million in losses.

“While we do not have additional details on this case, we believe the attackers did plan this attack carefully and were able to target a few strategic computers rather than hitting the company with a massive infection,” the company said in an oil and gas threat report it issued.

Bad News Backups
For one of ThreatGen’s Ryuk victim clients, restoring from its backup systems backfired. “When they restored from backup, they restored to a compromised state” because the attackers had been in the network for months, Bodungen explains.

It’s unclear just what the motivation was for the quiet phase of the infection by the attackers. Sometimes this approach is about reconnaissance and timing for triggering the ransomware payload. There’s another possible angle, too: A nation-state, for example, could employ this strategy for cover if they were to get discovered in the network.

“If I just have a foothold for future use and I get caught, I could immediately deploy ransomware like Ryuk as a diversionary [tactic],” he says. “So hopefully they then restore back to the compromised state and [the attacker] lays low for a while.”

The bottom line is you can’t trust your backups if they’re conducted while you’re infected, so in those cases the next step is to replace the hard drives, Bodungen says.

Eddie Habibi, founder and CEO of ICS security firm PAS Global, recommends that OT and other organizations maintain “clean” copies of their systems. “Make sure you have the ability to tell the ransomware guys to knock it off,” he says. “Be prepared to shut down systems and start over from scratch.”  

Habibi expects ransomware attacks to increase against industrial firms, with potentially dangerous consequences. Holding a chemical plant’s systems for ransom could be more lucrative for attackers because that would be “more severe than shutting down a business [network],” he notes.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem.”

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/ryuk-ransomware-hit-multiple-oil-and-gas-facilities-ics-security-expert-says-/d/d-id/1336865?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple