STE WILLIAMS

You can’t ignore Spectre. Look, it’s pressing its nose against your screen

The Spectre vulnerability is here to stay. Even if you choose to ignore it, the problem still exists. This is potentially a very bad thing for public cloud vendors. It may end up being great for chip manufacturers. It’s fantastic for VMware.

Existing patches can fix Meltdown, but only seem to be able to mitigate Spectre, not fix it. By many accounts, we’ll be playing whack-the-vulnerability with Spectre until at least the next generation of silicon.

The definitive paper on Spectre says: “While makeshift processor-specific countermeasures are possible in some cases, sound solutions will require fixes to processor designs as well as updates to instruction set architectures (ISAs) to give hardware architects and software developers a common understanding as to what computation state CPU implementations are (and are not) permitted to leak.”

A number of security experts I have spoken to confirm that the Spectre problem has not gone away, nor is it going to any time soon. There is some concern, however, about the messaging that is emerging around this vulnerability.

A great many individuals – not only those who work for Intel – have been putting a lot of time recently into telling everyone that we should calm down, not worry about Spectre, and simply continue with business as usual. There are patches, they say, and even if those patches cause problems now, that will be addressed soon.

It’s not quite that simple, and Spectre may ultimately change computing forever. In the short term, it means a lot of pain for some pretty big companies.

Cloud replacement

One can apply a patch for Meltdown, take the performance hit (which can be 30 per cent or more for some workloads), and then never think about Meltdown again. This isn’t ideal, but from a risk management standpoint it’s fire and forget.

Spectre is a different story. Even with microcode updates, Spectre can’t be completely fixed without significant changes to the architecture of modern CPUs, and that means hardware replacement. Unfortunately, the CPUs we all need to buy in order to guarantee that we’re not affected by Spectre don’t actually exist yet.

This isn’t exactly good news if you’re a public cloud provider that is trying to build enough trust to absorb a significant percentage of the world’s regulated workloads. It’s one thing for software vulnerabilities to exist, it’s another to have known hardware vulnerabilities. That’s not good when you’re selling the concept of shared infrastructure.

Even if public cloud providers wanted to replace some or all of their systems with CPUs that don’t have the Spectre hardware bug, they can’t. Yes, older Atom processors and other in-order CPUs aren’t affected by Spectre.

Unfortunately, none exist which are as fast as the out-of-order Xeons that power our servers. In fact, there probably aren’t enough in-order x86 CPUs on the planet to replace the requirements of even a tier-two public cloud provider. As soon as realistic replacement chips are produced, complete replacement cycles will most likely occur. The legal uncertainty places pressure on public cloud providers to get this Spectre issue put to bed once and for all, if for no other reason than risk management.

That’s great news for Intel – after all who else are you going to buy from – but it’s non-optimal for the public cloud providers. Unexpected hardware refresh cycles take time, money, and affect margins. Wall Street doesn’t like things that affect margins.

Forget what they taught you in kindergarten; sharing is bad

Spectre can theoretically allow code operating in a VM to read code in the cache of the physical CPU. If anyone figures out how to exploit it then it can allow someone executing code in one VM to peek into what’s running in memory of another VM.

Because cloud providers are designed to offer shared resources, nothing stops a malicious actor from executing code on VMs they hire from the cloud provider. This could let them get access to data being crunched by other VMs which the malicious actor didn’t hire. This means that – hypothetically, at least – every workload running in the public cloud that isn’t on a dedicated host is vulnerable to random malicious actors.

State-sponsored actors absolutely have the resources to produce malware to exploit Spectre. Let none of us pretend that they don’t. From a legal standpoint, this may not be a huge problem. It’s unlikely any judge will expect the average company to defend themselves against nation states.

Unfortunately, nation states likely aren’t the only ones with the resources to exploit Spectre. Consider the theft of cryptocurrency over the years. At today’s prices, since 2010, multiple billions of dollars worth has been stolen. In 2017 alone, $225m worth of the Ethereum coin was stolen. That’s not counting all the various Bitcoin thefts, or of other minor cryptocoins. A quick Google for Bitcoin thefts in 2017 shows that we could easily be looking at hundreds of millions of dollars there as well.

Add in the steady payday of ransomware over the past few years and the net result is malicious actors with significant digital crime experience and potentially a lot of money. Enough money to make very serious plays for Spectre zero days.

Yes, Spectre patches exist that mitigate the problem. And as soon as a new attack is discovered, patches will emerge to mitigate those attacks too. The problem is that everyone now knows where to look for guaranteed exploits, and there are likely to be more people trying to come up with new attacks than there are people trying to create new mitigation patches.

Your responsibilities

The above needs to be considered in the context of increasing regulatory pressure. The GPDR looms large. Canada is moving towards mandatory breach notification. Australia is already there, with some US states joining in as well.

Some of the newer regulatory regimes aren’t satisfied with just patching and pretending everything is OK. They basically say that organisations have to do everything within their power to protect against any flaws that they reasonably should have known existed. The more we collectively talk about Spectre – and the tech press isn’t giving up on this any time soon – the harder it becomes to stand up in front of a judge and say: “Your honour, burying our heads and engaging in business as usual was the best practice at the time.”

It is here that the real dichotomy emerges in discussions about Spectre.

Political realities

Public cloud providers, Intel, and software vendors that exist primarily in the cloud ecosystem are largely hoping nobody pulls a Max Schrems and challenges this in court until they can replace CPUs. They want to promote calm in order to ensure that the adoption of public cloud services continues uninterrupted.

And the public clouds matter. Shared infrastructure is increasingly dominant, and projected by many of the top analyst houses to host the lion’s share of enterprise IT by 2020.

Note that this doesn’t mean the majority of workloads. What it means is that enterprises are relying on the public cloud to handle the really large workloads. Big Data analytics, machine learning, artificial intelligence: the sort of workloads that I lump together under the term Bulk Data Computational Analysis (BDCA).

The key there is “computational”: these are CPU and GPU-heavy workloads. And they often operate on highly sensitive datasets, such as medical data. Public cloud companies don’t want to lose this work, and if we’re being perfectly honest about it, there aren’t enough trained BDCA IT operations people to allow enterprises to bring these workloads in-house anyways.

As a result of the above, frank discussions about Spectre are politically fraught territory. This was made clear early on when CERT deleted their note for one of the two Spectre CVEs that said the solution is to replace CPU hardware. The original wording was: “Underlying vulnerability is caused by CPU architecture design choices. Fully removing the vulnerability requires replacing vulnerable CPU hardware.”

Reality didn’t change between the initial posting of that recommendation and its retraction. Fully fixing Spectre still requires replacing the CPUs. The thing is, there’s nothing any of us can do about that right now, and CERT’s original recommendation could lead to anxiety.

Anxiety about Spectre is considered by many to be a very bad thing. There is an argument to be made that anybody rocking the boat with anything other than “remain calm” messaging is a threat to US national security. The public clouds are not only a major economic consideration for them, but they are increasingly a strategic asset.

Having companies and governments around the world suddenly decide that they are going to pull their data off of US servers run by US companies that must obey US subpoenas is not something the US encourages.

Your own toys

There is no reason for doom and gloom, however, as public cloud providers already have the solution to this problem to hand. The rental of bare-metal systems under the control of a single organisation is the ultimate mitigation against Spectre.

Yes, the Spectre vulnerability is still there, buried underneath it all. But malicious actors can no longer simply rent time on the same physical box that your workload is executing on, and try to get at your encryption keys, passwords, and other goodies. The bad guys would have to break in the old-fashioned way: through your layers of firewalls, application security and other defence-in-depth measures.

In many ways, VMware on AWS may be just be the ultimate solution here. After all, it is dedicated hardware to just you. VMware on AWS isn’t alone – Microsoft, for example, rolled their own version – and renting dedicated servers from service providers has been a thing for some time.

I find it deeply ironic that perhaps the greatest reason for organisations to seriously consider VMware on AWS isn’t exactly something VMware can get out there and start loudly advertising. Don’t expect to see any “use VMware on AWS because Spectre means that shared infrastructure is a bad plan for sensitive workloads and Intel is going to take a couple of years to get the world replacement chips” whitepapers. VMware can’t really afford to pee in either Amazon’s or Intel’s Cheerios.

Other than Google, there may not be anyone who can.

Defence in depth

For most, the above is an abstract discussion. None of us can really do anything about Spectre other than patch. Public cloud adoption programs are large undertakings that move slowly, and they aren’t easily slowed or halted. In the time it would take most organisations to bring their workloads back in-house, the hardware replacement will have taken place.

But Spectre may cause security-conscious organisations to delay implementation of new public cloud migrations. It may also cause discussions to move away from shared infrastructure and towards dedicated servers. If done on a large enough scale that changes cloud economics, and could even have a noticeable impact on global electricity consumption.

Defence in depth is ultimately the only real choice any of us have. Some vendors may do well here. HyTrust (formerly DataGravity) is one vendor I expect is going to get a second look from a lot of organisations. Their elevator pitch has always been about enforcing security-based policies across private and public clouds, and automating security just got a whole lot more important for everyone.

But all the firewalls, network microsegmentation, policy automation, Role Based Access Controls (RBAC), and so forth that we layer on top of our networks guarantees nothing. Our best bet is proper holistic IT, and some serious investment in automated incident response.

Part of defence in depth now requires that we pay careful attention to which workloads we place on shared infrastructure and which workloads we insist must operate on nodes only our organisation uses. We must now assume that everything is compromised. Even the CPUs upon which our workloads run. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/29/you_cant_ignore_the_spectre_pressing_its_nose_against_your_glass/

Thar she blows: Strava heat map shows folk on shipwreck packed with 1,500 tonnes of bombs

People wearing Strava-enabled fitness trackers appear to have been poking around a Thames shipwreck containing nearly 1,500 tonnes of explosives from the Second World War.

In addition, other fitness fanatics appear to have been wandering around military training sites – including danger areas used for live-fire tank and artillery training.

The information came to light after social media users realised that the latest version of Strava’s heat map, which shows the aggregated routes of all of its users, could be used to figure out where Western military bases in the Middle East are. Fitness-conscious soldiers, running around the bases’ perimeters, built up visible traces on the heat map over time.

However, of much more concern is the revelation that people have been poking around the wreck of the SS Richard Montgomery, a Second World War cargo ship that was carrying thousands of tonnes of explosive munitions from America to the UK. The ship grounded in the Thames Estuary in August 1944, barely two miles north of Sheerness.

Extract from Admiralty chart of Sheerness. Crown copyright

Extract from Admiralty chart of Sheerness (Crown copyright): The multicoloured box is the location of the SS Richard Montgomery wreck

Extract from the Strava heat map for Sheerness

Extract from the Strava heat map for Sheerness. The arrow indicates the location of the wreck

Although wartime salvage parties managed to scavenge a large amount of ordnance from the grounded Liberty ship, her hull split in two and sank, taking around 1,400 tonnes of explosives down with her, before the job could be completed. Officials decided to leave the wreck in place.

According to a 1995 survey report on the wreck: “The bombs thought to be on board are of two types. The bulk are standard, un-fused TNT bombs. In addition, some 800 fused cluster bombs are believed to remain. These bombs were loaded with TNT. They could be transported fused because the design included a propeller mechanism at the front which only screwed the fuse into position as the bombs fell from an aircraft. All the bombs could therefore be handled – with care – when the accident occurred.”

Man ties laces on running shoe pre-jog. Photo by Shutterstock

All your base are belong to us: Exercise app maps military sites, reveals where spies jog

READ MORE

Although the New Scientist bellowed in 2004 that an explosion would “bring death and devastation to a wide area”, the truth is (shocker!) more nuanced than that.

The 1995 report noted that TNT “does not react with water and will not explode if it is damp”, before adding that the brass-cased cluster bombs’ lead-based fuses “will combine with brass to produce a highly unstable copper compound which could explode with the slightest disturbance”. Although the compound “if formed, will wash away in a few weeks”, it was not made clear in the report how often the compound forms and creates the dangerous hair-trigger condition. Experts believe that the best way of keeping the wreck safe is not to disturb it, which led to a 500-metre exclusion zone being imposed around it.

The Maritime and Coastguard Agency, which has overall responsibility for the wreck, has not yet responded to The Register‘s questions, though we understand that the Strava data may include crew of MCA survey ships which occasionally inspect the wreck and the buoys surrounding it.

Danger areas

El Reg had a quick squint on the Strava heat map at Castlemartin Ranges, which is a military training area in southwest Wales, immediately south of Milford Haven, used for tank and artillery live firing. The place where the shells land and explode is called the impact area.

Castlemartin Ranges, seen on the Strava heatmap

Castlemartin Ranges, seen on the Strava heatmap – complete with fitness tracker trails criss-crossing the artillery ranges

As you can see, there are a surprising number of tracks across the range.

It may be the case that Royal Armoured Corps or Royal Artillery personnel are wearing Fitbits or other fitness trackers while bouncing around the ranges in their armoured vehicles. Perhaps even explosive ordnance disposal personnel who enter the impact areas to safely destroy “blinds” (fired shells that failed to explode) were wearing them too.

But it would be an incredibly idiotic jogger or cyclist who ventured into a live range or an impact area. You’d either be shelled or machine-gunned to bits or step on a blind, which would make you, as Captain Blackadder said, “leap 200 feet into the air and scatter yourself over a large area”. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/29/strava_heat_map_explosive_ww2_shipwreck_thames/

All your base are belong to us: Exercise app maps military sites, reveals where spies jog

In November, exercise-tracking app Strava published a “Heatmap” of user activity which it cheerily boasted comprised a billion activities, three trillion lat-long points, 13 trillion rasterized pixels and 10 TB of input data.

It took a while, but late last week someone wondered “how many Strava users are members of the military or national security groups, and are uploaded their activity?” The answer is “plenty – and they’ve revealed where they work, where they live, when they were sent to a new outpost and where to ambush them when they least expect it.”

Ever since Nathan Ruser, an international security student at the Australian National University, observed that Strava’s data included the exercise routes of military and natsec personnel, locating military installations in Strava’s has become a social media sensation.

For example, in Australia, it’s now possible to see where people exercise at the secretive deep desert Pine Gap sigint station:

Observers have also noted that Strava hasn’t revealed much more than was already already visible on Google Earth. For example, here’s Pine Gap again, this time from Google:

Pine Gap on Google Maps

Google’s got a much clearer image of Pine Gap

Strava’s explanation of how it made the Heatmap says it excluded data that users asked to be kept private. The service allows users to create multiple “privacy zones” with a radius of up to 1km. When users enter such the zones, their digital tracks disappear in order to make it harder to figure out where they live or work.

Data revealing the location of sensitive facilities, or the habits of military personnel, would therefore have been excluded if users had employed Strava’s privacy setttings.

However, as Ruser later Tweeted, the location of bases isn’t the only concern: the ability to establish “pattern of life” information also makes the Heatmap a serious source of risk.

The Daily Beast’s Adam Rawnsley noticed the app can even reveal troop movements, if new Strava users pop up in an area around a military base:

Beyond the military frenzy, however, El Reg agrees with observations that the heat map is sufficiently detailed to pose a risk to individuals. Brian Haugli noticed that it reaches all the way to your door:

Even if the individual hasn’t set up their home as a privacy zone (which Haugli noted is not the default), this is a level of personally identifying information that shouldn’t have been published, according to European privacy researcher Lukasz Olejnik.

Olejnik said at the least, someone should have conducted a privacy impact statement before pressing “publish” on the dataset.

He told The Register in an e-mail: “This highlights the challenges of location data anonymisation, and how mass datasets reveal unexpected patterns. Organisations should carefully consider consequences on multiple levels prior to publishing private data.

“That said, making a privacy impact assessment of this kind of a project would be quite an adventure.”

Olejnik also Tweeted that Europe’s General Data Protection Regulation (GDPR) considers location to be sensitive information, meaning publication should be handled with care. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/29/strava_military_base_locations/

Microsoft works weekends to kill Intel’s shoddy Spectre patch

Microsoft has implemented Intel’s advice to reverse the Spectre variant 2 microcode patches.

Redmond issued a rare weekend out-of-cycle advisory on Saturday here, to make the unwind possible.

Intel’s first patch was so bad, it made many computers less stable, sending Linus Torvalds into a justifiable meltdown last week.

Chipzilla later withdrew the patch, but it had made its way into a Microsoft fix, which the company pulled on Saturday.

“Our own experience is that system instability can in some circumstances cause data loss or corruption,” Microsoft wrote, adding “We understand that Intel is continuing to investigate the potential impact of the current microcode version and encourage customers to review their guidance on an ongoing basis to inform their decisions.”

This applies only to the Spectre patch, Microsoft emphasised: “Application of this payload specifically disables only the mitigation against CVE-2017-5715 – ‘Branch target injection vulnerability.’”

It noted that as far as anyone knows, nobody’s yet weaponised Spectre variant 2.

LinuxConf panel: embargo a “sh!t-show”

The handling of Spectre and Meltdown received sharp criticism at last week’s LinuxConfAU in Sydney, with Linux Foundation technical advisory board member Jonathan Corbet complaining of the ongoing secrecy about events between the first private reports of the bugs and their eventual disclosure (which The Register broke on January 2).

Instead of the disclosure processes used for most vulnerabilities, Corbet said, “This disclosure process was handled very differently,” and nobody’s explained why.

Corbet later added “I’d like the industry to end at least that piece of it, so that we can get the whole story out there, and figure out how to do better the next time around”.

Developer Jess Frazelle said disclosure could be improved by “not having an absolute shit-show of an embargo”, while Katie McLaughlin added that only big cloud providers were in the know: “It seems to be like an exclusive club as to whether you know or don’t know, and it’s not really clear the lines of who should be informed.”

A video of the conference panel is below, for your viewing pleasure. ®

Youtube Video

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/29/microsoft_out_of_band_patch_to_remove_spectre_patches/

You publish 20,000 clean patches, but one goes wrong and you’re a PC-crippler forever

Security software vendor Malwarebytes has overwritten two updates to its products and apologised to users who found their machines turned into near-bricks.

The problem started with a production update the company pushed out last Friday, which sent users to their keyboards complaining of excessive RAM and CPU consumption.

Affected products included Malwarebytes for Windows Premium, Malwarebytes for Windows Premium Trial, Malwarebytes Endpoint Security (MBES) and Malwarebytes Endpoint Protection (Cloud Console).

Irritated users lit up the company’s forums with hundreds of messages about the issue.

The company moved to resolve the issue, but its first fix failed and users kept venting. That led to this Sunday apology, as the company pushed out a second fix.

“The root cause of the issue was a malformed protection update that the client couldn’t process correctly,” the apology post said, something Malwarebytes says is rare since “we have pushed upwards of 20,000 of these protection updates routinely”.

The company also published the timeline below, in its analysis [PDF] of the issue.

Malwarebytes timeline

The company explained that the snafu arose because of work to try and improve its Web protection detection syntax controls.

“Recently we have been improving our products so that we can show the reason for a block, i.e. the detection ‘category’ for the web protection blocks. In order to support this new feature, we added enhanced detection syntaxes to include the block category in the definitions. The unfortunate oversight was that one of the syntax controls was not implemented in the new detection syntax, which cause the malformed detection to be pushed into production.” ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/29/malwarebytes_patches_patchy_patch/

Exercise-tracking app mapped military bases, revealed where spooks go jogging

Last November, exercise-tracking app Strava published a “Heatmap” of user activity which it cheerily boasted comprised a billion activities, three trillion lat-long points, 13 trillion rasterized pixels and 10 TB of input data.

It took a while, but late last week someone wondered “how many Strava users are members of the military or national security groups, and are uploaded their activity?” The answer is “plenty – and they’ve revealed where they work, where they live, when they were sent to a new outpost and where to ambush them when they least expect it.”

Ever since military analyst Nathan Ruser observed that Strava’s data included the exercise routes of military and natsec personnel, locating military installations in Strava’s has become a social media sensation.

For example, in Australia, it’s now possible to see where people exercise at the secretive deep desert Pine Gap sigint station:

Observers have also noted that Strava hasn’t revealed much more than was already already visible on Google Earth. For example, here’s Pine Gap again, this time from Google:

Pine Gap on Google Maps

Google’s got a much clearer image of Pine Gap

Strava’s explanation of how it made the Heatmap says it excluded data that users asked to be kept private. The service allows users to create multiple “privacy zones” with a radius of up to 1km. When users enter such the zones, their digital tracks disappear in order to make it harder to figure out where they live or work.

Data revealing the location of sensitive facilities, or the habits of military personnel, would therefore have been excluded if users had employed Strava’s privacy setttings.

However, as Ruser later Tweeted, the location of bases isn’t the only concern: the ability to establish “pattern of life” information also makes the Heatmap a serious source of risk.

The Daily Beast’s Adam Rawnsley noticed the app can even reveal troop movements, if new Strava users pop up in an area around a military base:

Beyond the military frenzy, however, El Reg agrees with observations that the heat map is sufficiently detailed to pose a risk to individuals. Brian Haugli noticed that it reaches all the way to your door:

Even if the individual hasn’t set up their home as a privacy zone (which Haugli noted is not the default), this is a level of personally identifying information that shouldn’t have been published, according to European privacy researcher Lukasz Olejnik.

Olejnik said at the least, someone should have conducted a privacy impact statement before pressing “publish” on the dataset.

He told The Register in an e-mail: “This highlights the challenges of location data anonymisation, and how mass datasets reveal unexpected patterns. Organisations should carefully consider consequences on multiple levels prior to publishing private data.

“That said, making a privacy impact assessment of this kind of a project would be quite an adventure.”

Olejnik also Tweeted that Europe’s General Data Protection Regulation (GDPR) considers location to be sensitive information, meaning publication should be handled with care. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/29/strava_military_base_locations/

Microsoft works weekends to kill Intel’s shoddy Spectre patche

Microsoft has implemented Intel’s advice to reverse the Spectre variant 2 microcode patches.

Redmond issued a rare weekend out-of-cycle advisory on Saturday here, to make the unwind possible.

Intel’s first patch was so bad, it made many computers less stable, sending Linus Torvalds into a justifiable meltdown last week.

Chipzilla later withdrew the patch, but it had made its way into a Microsoft fix, which the company pulled on Saturday.

“Our own experience is that system instability can in some circumstances cause data loss or corruption,” Microsoft wrote, adding “We understand that Intel is continuing to investigate the potential impact of the current microcode version and encourage customers to review their guidance on an ongoing basis to inform their decisions.”

This applies only to the Spectre patch, Microsoft emphasised: “Application of this payload specifically disables only the mitigation against CVE-2017-5715 – ‘Branch target injection vulnerability.’”

It noted that as far as anyone knows, nobody’s yet weaponised Spectre variant 2.

LinuxConf panel: embargo a “sh!t-show”

The handling of Spectre and Meltdown received sharp criticism at last week’s LinuxConfAU in Sydney, with Linux Foundation technical advisory board member Jonathan Corbet complaining of the ongoing secrecy about events between the first private reports of the bugs and their eventual disclosure (which The Register broke on January 2).

Instead of the disclosure processes used for most vulnerabilities, Corbet said, “This disclosure process was handled very differently,” and nobody’s explained why.

Corbet later added “I’d like the industry to end at least that piece of it, so that we can get the whole story out there, and figure out how to do better the next time around”.

Developer Jess Frazelle said disclosure could be improved by “not having an absolute shit-show of an embargo”, while Katie McLaughlin added that only big cloud providers were in the know: “It seems to be like an exclusive club as to whether you know or don’t know, and it’s not really clear the lines of who should be informed.”

A video of the conference panel is below, for your viewing pleasure. ®

Youtube Video

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/29/microsoft_out_of_band_patch_to_remove_spectre_patches/

Lenovo’s craptastic fingerprint scanner has a hardcoded password

Lenovo wants ThinkPad owners to update their machines after its Fingerprint Manager Pro software was found to contain serious security vulnerabilities.

Among the glaring flaws cited: a hardcoded password. In the fingerprint scanner. To log into the computer.

“Sensitive data stored by Lenovo Fingerprint Manager Pro, including users’ Windows logon credentials and fingerprint data, is encrypted using a weak algorithm, contains a hard-coded password, and is accessible to all users with local non-administrative access to the system it is installed in,” Lenovo said in fessing up on Thursday.

Discovery of the flaws was credited to Jackson Thuraisamy at Security Compass.

In total, Lenovo says that more than two dozen ThinkPad models are vulnerable, along with five ThinkStation Models and eight ThinkCentre models.

Lenovo says Fingerprint Manager Pro was used with the Thinkpad, ThinkCentre, and ThinkStation machines running Windows 7, Windows 8, and Windows 8.1. The tool could be configured to store and authenticate website credentials via fingerprint.

Unfortunately, Lenovo says, it was also improperly protecting those stored credentials, leaving the readers far less secure than they should be. Now, the PC slinger is advising users still running the Fingerprint Manager Pro software to install the latest update (version 8.01.87) to address the issue.

Because the Fingerprint Manager Pro software does not need to run on Windows 10 (Microsoft added native fingerprint reader support with that build), newer and updated machines are not considered vulnerable.

Earlier this month, Lenovo moved to put to bed another headache from its past when it agreed to a settlement deal with the FTC that will end the case over its use of intrusive adware in its pre-bundled software on PCs back in 2014.®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/26/lenovo_thinkpad_fingerprint_manager_vulnerability/

Crypto-jackers slip Coinhive mining code into YouTube site ads

The hijacking of CPU cycles through crypto-mining JavaScript code has surged over the past few days, according to security biz Trend Micro.

The reason appears to be a distribution campaign that piggybacks on Google’s DoubleClick ads that appear on YouTube among other sites.

“We detected an almost 285 per cent increase in the number of Coinhive miners on January 24,” said Trend Micro researchers Chaoying Liu and Joseph C. Chen on Friday in a blog post, noting that traffic to five malicious domains picked up on January 18. “After closely examining the network traffic, we discovered that the traffic came from DoubleClick advertisements.”

Coinhive is JavaScript code designed to mine Monero, a cryptocurrency favored by online criminals and others because of its privacy features. Its creators position the code as a way for websites to make money without relying on ads.

Stealth web crypto-cash miner Coinhive back to the drawing board as blockers move in

READ MORE

It’s when the code gets used without consent that there’s a problem. And that’s been happening more frequently because it’s almost a victimless crime. People may complain when their data gets stolen, but few even notice when their computer is asked to do covert calculations.

Liu and Chen say that the scheme relies on two separate web mining scripts, hosted on AWS, called from a web page that presents the DoubleClick ad. When the web page is loaded, a legitimate ad gets presented while a randomly generated number decides which of the two mining scripts gets called.

Ninety per cent of the time, coinhive.min.js runs; the other 10 per cent of the time, it’s a script named mqoj_1.js – configured to contribute to a separate mining pool as a means of avoiding the 30 per cent CoinHive commission.

At least that’s the breakdown seen by Trend Micro. Variant code posted to Pastebin shows the mqoj_1.js file being run only 3 per cent of the time.

Either way, the scripts are set to consume 80 per cent of the CPU resources on the computer in question.

Google says it took action against the ads once it became aware of them.

“Mining cryptocurrency through ads is a relatively new form of abuse that violates our policies and one that we’ve been monitoring actively,” a spokesperson told The Register in an email. “We enforce our policies through a multi-layered detection system across our platforms which we update as new threats emerge. In this case, the ads were blocked in less than two hours and the malicious actors were quickly removed from our platforms.”

The problem Google faces is that those abusing its systems rely on cloaking techniques to conceal the nature of the code and fake accounts that can be abandoned without consequence. As with email spammers, it’s a game of Whac-A-Mole.

Google confronted a similar issue in November when it emerged that miscreants were misusing Google Tag Manager to distribute coin crunching code. The Chrome extension SafeBrowse was also spotted quietly taxing processors to collect Monero. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/27/cryptojackers_slip_coinhive_mining_code_into_doubleclick_ads/

Dutch Intel Agency Reportedly Helped US Attribute DNC Hack to Russia

The General Intelligence and Security Service of the Netherlands broke into Cozy Bear’s network in 2014 and spotted the group launching attacks, de Volkskrant says.

Information provided by the General Intelligence and Security Service of the Netherlands (AIVD) helped US intelligence officials attribute to the Russians the controversial 2016 hacking attack on the Democratic National Committee (DNC), Dutch newspaper de Volkskrant reported this week.

According to the paper, agents from AIVD managed to infiltrate the network of a university building in Moscow’s Red Square in summer 2014 that Russian threat group APT29, aka Cozy Bear, was using. The intrusion provided Dutch intelligence agents with unprecedented visibility into the activities of the group, which since 2010 has been linked to numerous attacks on government organizations, and energy and telecommunication companies.

AIVD’s access to the network was so complete that Dutch agents were able to use a CCTV in the building to watch every move of the 10 or so Cozy Bear actors who used the network. By comparing photos gathered from the snooping with photos of known Russian agents, AIVD was able to determine with a high level of confidence Cozy Bear was led by Russia’s Foreign Intelligence Service, the Dutch newspaper said.

It was that access that allowed Dutch agents to spot Cozy Bear launching an attack on the DNC network in summer 2015 and transferring emails and documents from the breached networks to its own servers. AIVD’s information on the attack ultimately helped US intelligence agencies state with a high level of confidence that Moscow was involved in the attacks, de Volkskrant quoting several unnamed sources. The NSA and other intelligence agencies have publicly acknowledged receiving the help of a “western ally” in identifying the actor behind the DNC attack.

The DNC attack, and the subsequent leak of thousands of emails from Democratic candidate Hillary Clinton’s campaign, later prompted accusations of Russian meddling in the 2016 Presidential election and the Trump campaign’s alleged involvement in it.

The 2015 attack on the DNC network is not the only tip that Dutch have given US intelligence agencies in the two years or so while they had access to Cozy Bear’s network.

AIVD’s access to Cozy Bear’s network also allowed the agency to warn US officials of an attack on the US State Department network in late 2014. The APT group had managed to obtain email addresses and login credentials belonging to several State Department employees and had used that to access a non-classified portion of the State Department network.

Teams from the NSA and FBI used information provided by the Dutch to eventually prevent Cozy Bear from expanding its access to more critical areas of the State Department network. The attack, which one official later described as the “worst ever,” forced the State Department to shut down access to its email systems for a weekend in order to restore security.

During the attack, Cozy Bear managed to send an email purportedly from the State Department to an individual in the White House. The email essentially tricked the employee into sharing his email credentials with a Cozy Bear threat actor who then used it to access a server containing emails sent and received by then President Obama, the Dutch newspaper said. Cozy Bear, however, did not manage gain access to any classified system in the White House breach.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/dutch-intel-agency-reportedly-helped-us-attribute-dnc-hack-to-russia/d/d-id/1330921?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple