STE WILLIAMS

Russian National Arrested for Kelihos Botnet Sent to US

Peter Levashov, among the world’s most notorious email spammers, has been extradited to the US.

Peter Levashov, one of the world’s most well-known email spammers and operator of the Kelihos botnet, has been extradited to the US from Spain. He awaits federal charges in Connecticut, where prosecutors say he used the botnet to harvest personal data.

Levashov, a Russian citizen, is accused of identity theft, wire fraud, and conspiracy. He was arrested in April 2017 while on holiday in Barcelona as part of a US Department of Justice effort to take down Kelihos. Officials said the operation was distributing hundreds of millions of fraudulent emails per year, intercepting credentials for online accounts belonging to thousands of Americans, and spreading ransomware. Indictment details were released later the same month.

The spammer initially claimed he was collecting data on opposition parties for the United Russia party, which later said he was unknown to them. Russia filed a competing extradition request; the Spanish National Court approved Levashov’s extradition to the US in October.

In addition to driving spam and malware-rigged email campaigns, Levashov has been associated with click-fraud and DDoS operations. Many cyberattackers thought of him as a spam service provider. He was indicted, but not extradited, in 2009 for operating the Storm botnet.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/russian-national-arrested-for-kelihos-botnet-sent-to-us/d/d-id/1330974?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Adobe warns of Flash zero-day, patch to come next week

It’s like 1998 all over again!

OK, perhaps it would be fairer to say that it’s like 2008 all over again…

…there’s a zero-day security hole in Adobe Flash.

In APSA18-01, Adobe’s first Flash Security Advisory of the year, the company warns:

Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild, and is being used in limited, targeted attacks against Windows users. These attacks leverage Office documents with embedded malicious Flash content distributed via email.

To revisit the terminology here:

  • CVE-2018-4878 is a placeholder identifier for a security bug, or vulnerability, in Flash.
  • The word exploit means there exists a working, booby-trapped file that triggers the vulnerability.
  • The use of Office documents as a carrier for the malicious Flash exploit file, plus the use of email to push the malware at your users from outside, means it’s a remote attack.
  • An exploit that can trick your computer into running program code sent in from outside without a warning is called an RCE, short for Remote Code Execution, the most dangerous sort of exploit.
  • The RCE is dubbed a zero-day because the crooks found and used it first, before a patch was ready, so there were zero days during which you could have been patched proactively.

The good news is that Adobe intends to release a patch next week (the week starting 2018-02-05), rather than waiting until the week after next, when its usual Patch Tuesday (2018-02-13) falls.

The bad news, of course, is that the patch won’t be available until next week, so the vulnerability will remain a zero-day until then.

What to do?

  • Uninstall Flash if you don’t need it. The most common “need” we hear for Flash is to watch web videos, but almost all websites will use HTML5 for videos if you don’t have Flash. If you uninstall it, your browser will use its built-in video player instead – so you probably don’t need Flash after all.
  • Try uninstalling Flash anyway unless you are certain you need it. If anything critical stops working, you can always put it back.
  • Grab and install Adobe’s update as soon as you can. If you uninstalled Flash as a precaution, don’t reinstall it until the new version is out.

Note that just turning off Flash in your browser isn’t enough – that prevents Flash files embedded in web pages from rendering inside your browser, but doesn’t remove the Flash playing software from your computer as a whole.

We’re assuming that the crooks chose to embed their booby-trapped Flash file inside an Office document to bypass your browser, where many users have already blocked Flash from playing, or only activate it for specific websites.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/8YZcwUs0Kp4/

Bluetooth ‘Panty Buster’ sex toy fails penetration test

Security researchers have found multiple vulnerabilities in smart sex toys that open up the potential for all sorts of mischief by hackers.

The Bluetooth and internet-connected Vibratissimo Panty Buster, and its associated online services, made by German gizmo biz Amor Gummiwaren, are riddled with exploitable privacy flaws, researchers at SEC Consult said on Thursday.

The adult toy is controlled by a wirelessly connected smartphone app. You’re supposed to slip this self-love gadget into your underwear, and set it off wherever you are – at home, work, etc – or have special friends control it from over the internet. It also does stuff to music. Use your imagination.

A database containing highly sensitive Vibratissimo customer data – such as explicit images, chat logs, sexual orientation, email addresses, passwords in clear text, etc – was openly accessible on the internet. Enumeration of users’ explicit images was possible due to predictable ID numbers, and missing authorisation checks.

Yes, explicit images. From a cyber-dildo. How? Social network stuff. SEC Consult explained:

The mobile apps used to control those devices are not just an ordinary remote. The apps offer multiple features for communication and socializing like search for other users, maintaining a friends list, a video chat, a message board and also a feature to create and share image galleries, where images can be stored and shared with friends in the Vibratissimo social network.

SEC Consult confirmed to The Reg that this leaky database is not accessible by the public.

Worse yet, a creepy miscreant may be able to remotely turn on the device without the consent of its owner, the infosec bods discovered. Non-consensual “tickling” could be carried out either against a nearby toy via Bluetooth, or over the internet.

Here’s a video thrusting the flaws into the public eye:

Youtube Video

Based on app download figures, tens of thousands of users are potentially affected. The research was carried out by Werner Schober in cooperation with security consultancy SEC Consult and the University of Applied Sciences St. Pölten in Austria.

The Vibratissimo Panty Buster, its associated iOS and Android applications, and the server backend, had multiple vulnerabilities, including:

  • Customer database credential disclosure
  • Exposed administrative interfaces on the internet
  • Cleartext storage of passwords
  • Unauthenticated Bluetooth LE connections
  • Insufficient authentication mechanism
  • Insecure direct object reference
  • Missing authentication in remote control
  • Reflected cross-site scripting

SEC Consult contacted CERT-Bund – part of German Federal Office for Information Security – to help coordinate the disclosure process for the German vendor. Most of the most severe vulnerabilities have been addressed.

Privacy

Wi-Fi sex toy with built-in camera fails penetration test

READ MORE

We’re told the hardware manufacturer has implemented a more secure pairing method that will is included in a new version of the pleasure-gizmo’s firmware.

According to the researchers, however, the adult toy slinger disputed whether remote manipulation of other people’s devices by miscreants was a problem, before emitting the fix. SEC Consult alleged the manufacturer had said it was even a “desired property of the sex toy.”

We’ve asked Amor Gummiwaren for comment.

This research was done as a part of a master’s thesis with the goal of reviewing multiple smart sex toys including several teledildonics devices. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/02/02/adult_fun_toy_security_fail/

3 Ways Hackers Steal Your Company’s Mobile Data

The most effective data exfiltration prevention strategies are those that are as rigorous in vetting traffic entering the network as they are traffic leaving it.

It’s the unfortunate reality of the cybersecurity threat landscape today that malicious actors are advancing their tactics at a breakneck pace, finding new vulnerabilities in network defenses to execute attacks faster than IT teams can keep up.

This is especially true in the context of the modern distributed organization, where employees leverage an array of mobile devices — and access private networks from almost any location outside of headquarters — to conduct their work. This is a boon for business in that workers can enjoy flexible hours and not be tied to their desks to complete tasks, which can boost employee satisfaction and performance. But it also puts an increased burden on IT teams and network administrators, as they now are tasked with managing a practically borderless network with higher traffic volumes than ever before.

In fact, according to a recent survey of IT teams at major US organizations conducted by Researchscape for iboss, 80% of IT executives weren’t confident in their ability to secure mobile traffic in the future, while only 56% of their superiors in the C-suite accepted the same reality.

This is compounded by the increased adoption of cloud services such as Office 365, Dropbox, and other off-premises storage providers, making it harder than ever for corporations to monitor the data leaving their network. Criminals are increasingly able to hide within encrypted traffic, exit the network, and slowly siphon out sensitive data without IT administrators immediately noticing.

While understanding the flaws in network defenses is valuable in planning for the future, it’s also critical to know when and how sensitive data leaves the network, especially in expanding, high-stakes mobile breach scenarios. Here are three ways that cybercriminals can gain access to corporate systems through mobile devices and exfiltrate data.

Tor: Free Data Encryption
First developed in 2002 as “The Onion Router,” the Tor project directs traffic through a free volunteer overlay network that employs more than 7,000 relays to conceal information about users from network monitoring teams. Tor can be implemented in the application layer of a communication protocol stack that’s nested like an onion — hence the original name — encrypting data, including the next destination IP address, repeatedly, before it goes through a virtual circuit comprising successive, randomly selected Tor relays.

Because the routing of communication is partially hidden at every port in the Tor circuit, traffic source and destination are hidden from the view of network administrators at every stop. This makes it increasingly difficult for IT and security professionals to determine whether traffic is legitimately exiting the network or if the activity indicates data exfiltration.

Hiding Within Legitimate Traffic
Sensitive data may also be hidden within files or documents that wouldn’t normally be tagged as malicious content by traditional network security monitors. A hacker who may already have crossed the perimeter might hide sensitive data within Word documents or .zip files, for instance, that feature familiar naming protocols and size characteristics.

If security protocols at the gateway aren’t taking a detailed approach to vetting content as it exits the network — that is, taking a layered approach to evaluating entire files that goes beyond adhering to proxy settings or standard decryption — hackers can funnel data out of the network for weeks, months, or years before administrators even notice.

Leveraging Cloud Storage Applications
The problem with many cloud applications is that they usually require users to send content into a data center shared by multiple customers, where many users and corporations leverage the same storage capacity and bandwidth. Cloud providers are also a third-party service, which means that data is potentially at risk of being mishandled by the provider if they aren’t a proven, trusted partner, or if their security protocols aren’t up to snuff.

File encryption and strong passwords can go a long way toward protecting corporate data housed in the cloud. But the most effective way to prevent data exfiltration is a defense-in-depth strategy that is as vigorous in vetting traffic entering the network as it does leaving it, by looking at data packets individually to determine the true intent of the content. For example, this could include sandboxing features that allow documents to play out in a simulated network environment that tests for malicious inclinations once the document crosses the network perimeter. Putting data about to leave the network through the same proxies and firewalls as incoming traffic is another possible solution.

This approach is especially critical for mobile devices accessing network data via remote channels and public Wi-Fi. With the increasing mobility of employees who frequently and easily access cloud services from coffee shops and airports, companies need to make sure that all their active user and device directories remain up-to-date, and that the network is constantly monitored to ensure all users are following best practices. This requires taking regular inventory of the devices and users accessing the network — quarterly, monthly, or even weekly — to ensure that unverified traffic is easy to spot on a rolling basis. The more rigorous that security teams are in making sure their reference points are up-to-date, the more effective their use of leading cybersecurity tools will be in preventing data exfiltration.

Related Content:

Paul Martini is the CEO, co-founder and chief architect of iboss, where he pioneered the award-winning iboss Distributed Gateway Platform, a web gateway as a service. Paul has been recognized for his leadership and innovation, receiving the Ernst Young Entrepreneur of The … View Full Bio

Article source: https://www.darkreading.com/cloud/3-ways-hackers-steal-your-companys-mobile-data-/a/d-id/1330955?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

APIs Pose ‘Mushrooming’ Security Risk

As APIs grow in prominence, top security concerns include bots and authentication.

The application economy has now become the API economy. And as the importance of application programming interfaces (APIs) grows within the enterprise, organizations must keep their security top-of-mind, lest they put the entire software stack at risk.

Software is powering digital disruption today and the secret sauce to this success is not just the features of the software itself, but how well it integrates with other software. Integrations between internal applications across business groups, with external platforms and applications held by partners, and with other consumer-based applications on customer devices is what fuels business success today. APIs are the glue that holds all these integrations together.

But APIs deployed without security measures expose organizations to yet another class of attack vectors.

“APIs represent a mushrooming security risk because they expose multiple avenues for hackers to try to access a company’s data,” explains Terry Ray, CTO of Imperva. “To close the door on security risks and protect their customers, companies need to treat APIs with the same level of protection that they provide for their business-critical web applications.”

Nevertheless, APIs remain greatly important for business and IT strategy.

“The greatest revenue potential (APIs) provide is removing barriers to growing revenue by integrating platforms and apps so organizations can quickly launch new business models and scale fast,” explains Louis Columbus, an enterprise software strategist and principal at IQMS, a manufacturing ERP vendor, in a Forbes piece last year.

What’s more, APIs are also fueling new methods of developing and deploying software. As organizations seek means to deliver and tweak software faster, they’re increasingly breaking up large monolithic code bases into smaller chunks of independent code called microservices. Advanced organizations develop applications using segmented microservices that fit together like bricks into a larger software structure, making it easier to execute quick changes to parts of the software without accidentally breaking something else in the code base. But these microservices must interface with one another, and it takes APIs to accomplish that.

According to a study out this week from Imperva, these trends in software strategy have translated to the kind of proliferation where the typical organization is managing an average of 363 APIs within their application ecosystem. So, the obvious question for cybersecurity is where do the risks lie? 

According to the survey, more than two-thirds of organizations expose APIs to the public in order to enable partners and external developers to hook into the power of their software. This kind of exposure may open up a world of business opportunity, but it also brings risk to the table. Among the 250 IT and security practitioners questioned, the biggest proportion – 39% – were most concerned about the risks that bots and DDoS attacks posed to APIs.

Nearly a quarter of respondents also expressed concerns about authentication enforcement, a tricky topic when it comes to allowing access to only some data within an application without exposing other sensitive data. A bank, for example, might want its application to easily interface with other consumer applications, but wouldn’t want its credentials shared with those applications on sign-on. And that’s just the start of the threat exposure.

Some 76% of organizations report that they currently treat API security differently than Web security. Only about 63% of organizations use a Web application firewall to secure their APIs. Approximately 63% also report using an API gateway, though that number does bump up to 80% for public-facing APIs. Meanwhile, fewer than half of organizations use runtime application self-protection (RASP) to prevent attackers from tampering with or reversing API code for future attacks.

“In their approach to API security, organizations exposing Web APIs must balance ease of access – to ensure adoption of APIs – with control – to prevent abuse or attacks,” Gartner analysts Mark O’Neill, Dionisio Zumerle, and Jeremy D’Hoinne said in a recent report on API security strategy. “Like the bank robber attacking banks because ‘that’s where the money is,’ the use of APIs to provide access to applications and to business-critical data has naturally led to API security incidents.”

Related Content:

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Article source: https://www.darkreading.com/application-security/apis-pose-mushrooming-security-risk/d/d-id/1330966?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cyberattack Impersonates FBI Internet Crime Complaint Center

Threat actors trick victims into sharing personal information with fake IC3 messages laced with malware.

A new cyberattack scams people into providing personal data and downloading malicious files by impersonating the Internet Crime Complaint Center, a division of the FBI intended to give the public a reliable means of reporting suspected illegal activity online.

The unknown threat actors emailed targets requesting information so they could be paid restitution. To make their messages seem legitimate, they added hyperlinks of news articles reporting on the arrest of Internet fraudsters. Targets received text documents, which contained malware, to download, fill out, and return to the attackers.

Experts have identified three other versions of the IC3 scam. One involves a fake IC3 social media page requesting personal data to report Internet crime. Another arrives as an email stating that the recipient’s name was found in a corporate database and they can be compensated for unfair treatment. The third, an email from the Internet Crime Investigation Center/Cyber Division, claims the recipient’s IP address is a possible victim of cybercrime.

The IC3 reports anyone who thinks they’ve been the victim of Internet crime should file a complaint on its official website.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/cyberattack-impersonates-fbi-internet-crime-complaint-center/d/d-id/1330969?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Deepfakes AI porn GIFs purged from Gfycat platform

Redditors who are in on the creation of videos with celebrities’ faces stitched in via artificial intelligence (AI) are not pleased.

Their favorite service to post what are called deepfakes – Gfycat – has begun to purge their creations.

On Friday, it was the chat service Discord that shut down a channel that was spreading deepfake videos, citing its policy against non-consensual porn.

It was Motherboard that first discovered the r/deepfakes subreddit in December, and it was Motherboard again that picked up on it when r/deepfakes users on Tuesday started to comment about their gifs being taken down from the image hosting platform Gfycat.

Motherboard says a Gfycat spokesperson confirmed that it finds deepfakes “objectionable” and is deleting them from the site. Speaking to The Verge, a spokesperson said that its terms of service give it the right to remove such content:

Our terms of service allow us to remove content that we find objectionable. We are actively removing this content.

For its part, Discord cited its policy against revenge porn, which is another term for nonconsensual/involuntary porn.

There are many alternative sites to upload content, r/deepfakes users noted. But given the glare of the public eye that’s been turned onto the deepfakes phenomenon in the past week, which of those sites won’t melt?

That’s why one of the Redditors suggested to the group that they should construct their own distributed system to upload the deepfakes content – one where their “hard work won’t go unrecognized” – and stop relying on others. So far, he said, they have a team of specialists that includes a “crypto specialist” to ensure that deepfakes continues to get coding support for “this incredible contribution to global [masturbation].”

From his post:

Bottom line: this community is in its infancy. Replacing faces is just the beginning. We all know that the future of fantasy is in this tech, and the more we build it the more fun we’ll have.

Lets give women a place to express their sexuality with varying levels of anonymity.

He didn’t explain what “varying levels of anonymity” means, but the comment was note-worthy in that it actually mentions anything whatsoever relating to the concept of privacy for the women (it’s mostly women) who are cast in these videos.

Meanwhile, there must be a cone of silence that’s been lowered over Reddit, which hasn’t responded to multiple requests for comment. As it is, its content policy prohibits involuntary porn.

But it’s not clear whether it would recognize deepfakes as involuntary porn. Given its silence, it well could be weighing its commitment to avoid censorship against its own involuntary porn policy, though its history does include removing violent content and the stolen images of celebrities.

At any rate, Reddit’s policy stipulates that the subjects portrayed in involuntary porn need to make a complaint.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/_Bc0gZSXyl8/

California says no, you can’t cover your license plate

Under pressure from police lobbyists, California state senators have killed a bill that would have made it harder for data-aggregators-on-wheels to automatically snap photos of parked cars’ license plates.

Senate bill SB-712, which had bipartisan support, would have tweaked a law that says you can’t cover your car’s license plate.

In California, it’s currently legal to cover your entire vehicle when it’s parked, including the license plate, to protect the car from the weather, as long as the cover is easy enough to pull up to get a look at the license plate.

However, it’s illegal to cover just the license plate when it’s parked, which you may very well want to do to protect your privacy from automated license plate readers (ALPRs). As of Tuesday, the bill is dead, and it’s still illegal to cover just your license plate.

The bill, which was endorsed by the Electronic Frontier Foundation (EFF), was meant to protect location data privacy from the spying electronic eyes of ALPRs. As the EFF notes, ALPR data can reveal where you live, where you work, where you worship and where you drop your kids at school. From the EFF:

This measure was a simple way to empower people to protect information about where they park their cars, be it an immigration resource center, a reproductive health center, a marijuana dispensary, a place of worship, or a gun show.

Without the ability to legally cover your license plates, businesses can continue to send ALPRs, mounted on vehicles, driving up and down streets to document the travel patterns of drivers, to take photos of every license plate they see, to time-stamp and location-stamp those photos, to upload them to a central database, and to sell the data to lenders, insurance companies and debt collectors.

The ALPR companies also sell information to law enforcement, including to the US Department of Homeland Security (DHS). The DHS, in fact, last month released its updated policy for using this commercial ALPR data for immigration enforcement.

Last week, DHS’s Immigration and Customs Enforcement (ICE) arm officially gained agency-wide access to a nationwide license plate recognition database. That will enable ICE to track license plates across the country, giving it access to billions of license plate records and new powers of real-time location tracking: a profound source of concern to civil libertarians.

Although a vendor wasn’t named in the contract, an ICE representative told The Verge that the license plate records will be supplied by Vigilant Solutions.

Vigilant is the leading vendor of license plate recognition data. As of two years ago, the Atlantic reported that Vigilant had amassed roughly 2.2 billion license-plate photos and was capturing and permanently storing about 80 million additional geotagged images per month.

Two years on, Vigilant’s data set has continued to burgeon. It’s currently absorbing up to 100 million license plate readings per month, each tagged with a date, time and GPS coordinates. The company doesn’t necessarily collect all the data itself. Rather, it acquires data from partners such as car repo agencies and other private groups. Vigilant also partners with police departments, picking up yet more data from camera-equipped police cars.

Jay Stanley, a senior policy analyst who studies license plate readers with the American Civil Liberties Union (ACLU), told The Verge that the biggest concern for civil libertarians is the scale of Vigilant’s network, which it’s put together almost completely outside of public accountability.

If ICE were to propose a system that would do what Vigilant does, there would be a huge privacy uproar, and I don’t think Congress would approve it. But because it’s a private contract, they can sidestep that process.

According to the EFF, police lobbyists misrepresented California’s SB-712, claiming that Amber alerts – alerts sent out about abducted children – don’t work if kidnappers can hide their license plates. Contrary to what the lobbyists claimed, vehicles in motion would have still been required to keep their plates uncovered under the bill, and good Samaritans wouldn’t have been prevented from identifying missing children.

The lobbyists also claimed that the bill would enable criminals to hide their parked cars: “to park in plain sight, undetected by law enforcement.” Well, that doesn’t make sense, the EFF argued: it’s legal now to cover the entire car. If crooks instead only covered their plates, police could more easily see the make, model and color of their cars. Besides, the bill would have legalized plate covers that could simply be raised by police who found a car that matched the description of a wanted vehicle.

The vote in California’s senate, which took place on Tuesday, rejected SB-712 18 to 12.

The EFF said fine, senators, you don’t like this bill, which would have protected driver privacy? Then you better spend the year coming up with a new solution.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/HKFD7-9lb1A/

Venture into the security thickets at CyberThreat18

Promo Sometimes it can seem like the IT security landscape is shifting so fast that you have to keep running on the spot just to stay upright. A new event coming to London this month aims to help exhausted security professionals breathe easy, confident they have the information they need to meet the risks ahead.

Hosted by the UK’s National Cyber Security Centre, a part of GCHQ, and the SANS Institute, CyberThreat18 runs on 27 and 28 February at the QEII Conference Centre in Westminster.

The event brings together a packed schedule of talks on a broad range of familiar and less familar topics by security experts and prominent industry figures, interspersed with team-building events and hands-on challenges designed to put both your defensive and offensive skills to the test.

Keynotes come from Stephen Sims, Faculty Fellow of the SANS institute and author of some of their most advanced PenTesting courses, and renowned bug hunter David Litchfield who promises: “A surprise with something very cool and technically brilliant”. They are followed by speakers including:

  • Alex Davies, senior threat hunter at Countercept, on the nefarious use of memory injection techniques and how to detect them.
  • Aatif Khan, cyber security researcher, outlining the hacking threat to civil drones.
  • Ryan Nolette, security technologist at SQRRL, on how to spot attackers moving sideways into the network.
  • Bogdan Necula, operational analyst at European anti-fraud organisation Olaf, on Analysing the Bad for a Greater Good, a case study illustrating the workings of the DDoS market.
  • Kevin Breen, head of Content at Immersive Labs, on Hunting Pastebin for Fun and for Profit, showing how Pastebin can be a treasure trove of information for hackers
  • Rachelle Saunders of Helical Levity standing up for programmers in a talk entitled Secure Code: Not Actually That Easy Smarty Pants

There’s a chance to take part in a capture-the-flag event and a hackathon on both afternoons.

Registration details are here.

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/02/02/cyberthreat18/

On the NHS tech team? Weep at ugly WannaCry post-mortem, smile as Health dept outlines plan

The WannaCry outbreak has forced the NHS to overhaul its crisis planning to put new measures in place to avoid further crippling cyber attacks.

A Department of Health and Social Care post-mortem on the May 2017 WannaCry outbreak, published on Thursday, repeats the findings of previous UK government studies that the attack was preventable in retrospect and caused all sorts of problems for NHS England, including delaying the first appointments of suspected cancer patients.

The study, Lessons learned review of the WannaCry Ransomware Cyber Attack, concluded the failure to apply available patches on Windows systems combined with poor isolation of vulnerable services from the open internet was to blame for a malware outbreak that affected one in three English NHS Trusts to a lesser or greater extent.

Health service staff were praised for the response to the outbreak, which has prompted the development of a comprehensive incident response plan, designed to better protect hospitals against future cyber-attacks.

The 42-page report makes 22 recommendations for NHS England, some of which have already been put in place. A “Cyber Handbook” has been produced to describe the approach and actions to be taken by NHS England, NHS Digital and NHS Improvement in the event of a cyber attack affecting the public health service.

The reports has made it clear a one-size-fits-all approach will not work across health and social care, so big hospitals need to take a different approach to security than smaller care facilities or GP surgeries, for example.

The “Cyber Handbook” does not detail local cyber response activities in any depth and should be tested alongside local and scaled approaches to cyber response including testing the mechanisms for communication between the wider system and local CIOs.

To date, 190 independent on-site cyber assessments of NHS Trusts have been undertaken. Whilst the wider cyber security programme is looking at addressing some of the shortfalls, these assessments have identified that most NHS trusts also need capital investment in areas such as addressing weaknesses in their infrastructure to secure networks by upgrading firewalls, improving network resilience and segmentation to minimise the risk to medical, improving device security through device replacement and automation of patch management, and improving anti-virus protection.

Chucking cash at CareCERT non-compliants…

Part of the response includes increased spending on information security. For example, a further £25m of capital funding has been identified in 2017/18 to support organisations that have self-assessed as being non-compliant against high severity CareCert alerts, strengthening hardware and software across the system. The Digital Delivery Board (the governing board for the Personalised Health and Care 2020 programme) reprioritised £21m capital to address key vulnerabilities in Major Trauma Centres and Ambulance Trusts, with 32 organisations receiving funding to improve cyber-preparedness.

Meanwhile a reprioritisation exercise is underway across the NHS IT portfolio to identify additional cyber investment between 2018/19 and 2020/21. “As part of this, an initial £150m has been identified focused on continuing investment in local infrastructure as well as national systems and services to improve monitoring, resilience and response,” the report stated.

The study underlines the new reality: that it’s a question of when and not if a new cyber-attack will hit.

“Our challenge is to ensure that the health and care system nationally, regionally and locally is equipped to withstand and respond to cyber attacks in an effective manner which minimises disruption to services and, most importantly, impact on our patients.”

A change in culture is also required.

But new procedures might not cure tech’s headaches

The report concluded future cyber incidents have the potential to be both intense and difficult to resolve, a combination of factors that will stretch staff resources.

“The traditional nature of major incidents has been that they are either very intense, but are over with in a number of hours (such as a major traffic incident or physical terror attack) or they are long lasting but slow moving (such as strike action),” the report said. “Cyber attacks create the potential for a long running, highly intense incident. NHS England needs to ensure that it has the capacity to rotate its incident coordination centre and senior leadership to effectively manage the response.”

The study provides a detailed look to date of the effects of the ransomware worm on the health service in England, one of the organisations worst hit by the worldwide attack.

The NHS responded well to what was an unprecedented incident, with no reports of harm to patients or of patient data being compromised or stolen. In total, one per cent of NHS activity was directly affected by the WannaCry attack.

The attack led to disruption in one-third of hospital trusts in England. NHS England data shows that at least 80 out of 236 trusts were affected – with 34 infected and locked out of devices (of which 27 were acute trusts), and 46 not infected but reporting disruption. A further 603 primary care and other NHS organisations were infected by WannaCry, including 8 per cent of GP practices (595 out of 7,454).

The review – put together by William Smart, chief information officer for the health and social care system at the Department of Health and Social Care – draws together the main conclusions from the NHS’s internal assessments with two national reviews (a National Audit Office investigation and a study by National Cyber Security Centre) and the conclusions taken from reports by local organisations.

The disruption to patient care has “made it even clearer how dependent the NHS is on information technology and, as a result, the need for security improvements to be made across the service.”

Senior NHS Trust managers and board members will be held accountable for cyber security in future, the report said.

“Local organisations must ensure effective management of their technology infrastructure, systems and services, including the adequate patching of devices and systems, ensure sufficient network security and replace unsupported software,” the report stated.

Microsoft… Sigh.

And inevitably, “Nationally, a new agreement with Microsoft has been signed [in August], which includes patches for all its current Windows devices operating XP.”

As previously reported by El Reg and noted in previous national reports, unpatched Windows 7 systems, in particular, rather than residual reliance on long obsolete Windows XP boxes (which crashed rather than further spreading the worm) laid the groundwork for the WannaCry outbreak. Reliance on Win XP is nonetheless problematic and has been reduced.

The majority of NHS devices infected were running the supported, but unpatched, Microsoft Windows 7 operating system. Unsupported devices (those on XP) were in the minority of infected devices and the number of these devices has decreased in the last 18 months from 18 per cent to 1.8 per cent in January 2018.

None of the 80 NHS organisations affected by WannaCry had applied the Microsoft update patch advised by NHS Digital’s CareCERT bulletin on 25 April 2017 following the receipt of intelligence of a specific threat from BT on 24 April 2017.

Whether organisations had patched their systems or not, taking action to increase the security of their network firewalls facing the N3 network would have guarded organisations against infection.

How the sickness spread

The initial infection was likely through an exposed vulnerable internet-facing Server Message Block (SMB) port 30, rather than email phishing as initially assumed. Many organisation worldwide (including Chinese universities, Telefonica in Spain, Russia’s Interior Ministry and global firms like FedEx, Nissan and Renault) were also affected by WannaCry but the NHS in England was particularly hard hit.

As part of its incident response the NHS enacted its “mutual aid” processes in some parts of the country. This meant that where one AE could no longer take patients, nearby AEs stepped up to take their demand. During the incident, some patients from five hospitals travelled further for emergency treatment than normal. A minority 1.2 per cent or 6,912 of first appointments were cancelled and re-arranged between 12 and 18 May, the period when NHS England was dealing with WannaCry and its aftermath.

NHS England’s EPRR review identified at least 139 patients who had an urgent appointment for potential cancer cancelled between 12 and 18 May, representing approximately 0.4 per cent of urgent cancer referrals. “The disruption to secondary care had a knock on effect for primary care, for example on access to test results,” the report added. “Third party systems were also impacted, for example DocMan, impacting the electronic flow of clinical information from secondary care to primary care services.”

A total of 1,220 (1 per cent) pieces of diagnostic equipment across the NHS were affected by WannaCry. “This figure does not include diagnostic devices which were disconnected to prevent further infection,” the report added. “As a result, there were, for example, delays in test processing and communication of diagnostic results.”

Bootnote

Although not named in the report, cybersecurity researcher Marcus Hutchins, currently awaiting US trial on unrelated allegations of having a past as a criminal hacker, is credited with finding the “kill switch” that limited the spread of WannaCry.

“The work of a cybersecurity researcher, who activated a ‘kill-switch’ on the evening of Friday 12 May, had the effect of stopping WannaCry infecting further devices. Without this intervention, it is likely that the impact that WannaCry had on services would have been even greater,” the report stated. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/02/02/nhs_wannacry_post_mortem/