STE WILLIAMS

Monday review

Catch up with everything we’ve written in the last seven days with our handy roundup.

General interest

Lady Gaga rallies Little Monsters against Applause ‘hackers’

Apple apps turned upside down writing right to left – you’re only 6 characters from a crash!

Anatomy of a dropped call – how to jam a city with 11 customised mobile phones

Whistleblower-friendly site Cryptome booted briefly offline for hosting “malicious content”

SSCC 115 – XP “as a giant 0-day”, choosing and remembering passwords, and next-gen HTTP [PODCAST]

Facebook transparency, Apple bugs, SEA DDoSes itself – 60 Sec Security [VIDEO]

Hacking and scams

Secure Google Docs email results in mailbox compromise

Google Palestine hijacked: hackers say rename Israel to Palestine, listen to RiRi

Syrian Electronic Army brings down Twitter and The New York Times through domain name provider hack

Law and order

Leak of kids’ social services info earns Aberdeen City Council £100k fine

Internet dating scam – mother and daughter crime duo jailed

Reality TV mother-of-eight Kate Gosselin sues husband for “hacking” email, phone, revealing private info

Facebook pays out $20 million in personal ads settlement; each user gets $15

Social networks

Facebook to include profile photos in its facial recognition database?

Schools hire snoopers to monitor kids on social networks. Is it OK? [POLL]

Surprise! First ever Facebook “Government Requests” report reveals the most inquisitive authorities

Pinterest And StumbleUpon patch critical flaws that could have exposed over 100 million users’ email addresses

OS and software

Apple neglects OS X privilege escalation bug for six months, gets Metasploit on its case…

Privacy and online safety

Tor usage doubles in August. New privacy-seeking users or botnet?

Would you like to keep up with all the stories we write? Why not sign up for our daily newsletter to make sure you don’t miss anything. You can easily unsubscribe if you decide you no longer want it.

Days of the week image from Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/NaCLBEYz-GA/

‘Anonymous’ to Reg hack: We know SEA leaders’ names

Win a Samsung 40-inch LED HDTV with The Reg and HP!

Following the Syrian Electronic Army’s (SEA’s) attack on a Melbourne IT reseller which resulted in the temporary compromise of domain name records for targets as diverse as The New York Times and Twitter, a group claiming association with Anonymous now says it has compromised SEA databases and servers.

As first reported here (in French with NSFW images) and here by Brian Krebs, the attackers say they have compromised SEA servers, obtained members’ names along with user IDs and passwords, and have copied gigabytes of SEA data.


The Twitter stream operated under the handle @blackplans includes screenshots which the operator of that account describes as showing the SEA’s Parallels server, blog logins, and user credentials.

In an online chat with The Register, an “entity or person associated with Anonymous” confirmed the accuracy of the Krebs article, as well as the scale of the compromised data.

The @blackplans associate told El Reg Anonymous had already d0xed – that is, de-anoymised – “five core members” of the SEA.

While the SEA’s Twitter account – @Official_SEA16 – has denied that it’s been compromised and calls the screenshots fakes, the same signature is also used on a complaint posted at Pastebin, asserting that his story and others put individuals at risk of being “tracked and killed by the FSA” (Free Syrian Army).

The @blackplans associate said a group of individuals determined to attempt a breach on the SEA on the basis that the SEA works on behalf of the Syrian government. Performing the attack turned out to be relatively easy, he or she claimed. While unwilling to divulge specifics of techniques, “they left trails, nicknames, email addresses, modus operandi” and were therefore “easy to trace”.

Moreover, “they reuse passwords as well” – something that would considerably simplify breaching systems. Active members of the SEA are not restricted to Syria, @blackplans claimed, but also in Kuwait, Saudi Arabia and Indonesia. The breach also gave access to an account called @eagles_syrian which @blackplans described as associated with the SEA.

@Blackplans said it was decided not to leak all of the data obtained, to avoid the risk that some individuals in the databases would be killed.

Since Brian Krebs’ article was published, leaks against the SEA include copies of banking scam phishing e-mails allegedly held in its systems. ®

Win a top of the range HP Spectre laptop

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/09/02/anon_slurps_sea_data_launches_leaks/

Boffins follow TOR breadcrumbs to identify users

Win a Samsung 40-inch LED HDTV with The Reg and HP!

It’s easier to identify TOR users than they believe, according to research published by a group of researchers from Georgetown University and the US Naval Research Laboratory (USNRL).

Their paper, Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries, is to be presented in November at November’s Conference on Computer and Communications Security (CCS) in Berlin. While it’s been published at the personal page of lead author Aaron Johnson of the NRL, it remained under the radar until someone posted a copy to Cryptome.


The paper states simply that “Tor users are far more susceptible to compromise than indicated by prior work”. That prior work provided the framework for what Johnson’s group has accomplished: using traffic correlation in the live TOR network to compromise users’ anonymity.

“To quantify the anonymity offered by Tor, we examine path compromise rates and how quickly extended use of the anonymity network results in compromised paths”, they write. In some cases, they found that for the patient attacker, some users can be identified with 95 percent certainty.

The compromise isn’t something available to the trivial attacker. The models that Johnson developed assume that an adversary has access either to Internet exchange ports, or controls a number of Autonomous Systems (for example an ISP). However, it’s probably reasonable to assume that the instruments of the state could deploy sufficient resources to replicate Johnson’s work.

At the core of Johnson’s work is a Tor path simulator that he’s published at github. The TorPS simulator helps provide accurate AS path inference from TOR traffic.

“An adversary that provides no more bandwidth than some volunteers do today can deanonymize any given user within three months of regular Tor use with over 50 percent probability and within six months with over 80 percent probability. We observe that use of BitTorrent is particularly unsafe, and we show that long-lived ports bear a large security cost for their performance needs. We also observe that the Congestion-Aware Tor proposal exacerbates these vulnerabilities,” the paper states.

If the adversary controls an AS or has access to Internet exchange point (IXP) traffic, things are even worse. While the results of their tests depended on factors such as AS or IXP location, “some users experience over 95 percent chance of compromise within three months against a single AS or IXP.”

The researchers also note that different user behaviours change the risk of compromise. Sorry, BitTorrent fans, your traffic is extremely vulnerable over time. ®

Win a top of the range HP Spectre laptop

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/09/01/tor_correlation_follows_the_breadcrumbs_back_to_the_users/

Taiwan bids to bolster security with free malware database

Win a Samsung 40-inch LED HDTV with The Reg and HP!

Taiwan’s National Centre for High-Performance Computing (NCHC) has launched what it claims to be the world’s first free malware database designed to help businesses, academics and researchers better identify and defend against criminally-coded attacks.

The centre, one of the 11 which comprise Taiwan’s National Applied Research Laboratories, teamed up with the Ministry of Education and 20 universities back in 2010 to kick off the ambitious project, according to the country’s Central News Agency (CNA).


Some 200,000 malware samples have apparently been added to the database so far, with over 1,000 added every month. The Malware Knowledge Base, features 6,000 IP addresses to monitor and identify new malware strains, the agency said.

Malware sources and global attack patterns can also be traced and predicted with a handy Google Earth-based UI, an NCHC official told Taiwan Today.

Considering its relatively diminutive size, Taiwan remains one of the top sources of attack traffic in the world, so the database project should be welcomed within the republic as an attempt to shore up its IP address space.

Akamai’s State of the Internet report for Q1 2013 placed Taiwan seventh in terms of sources of global attack traffic, with a 2.5 per cent share, immediately beneath India but above Brazil.

NCHC research associated Tsai Yi-lang told the Central News Agency that the country is hit by 3.4 million attacks daily.

Many of these attacks are likely to come from near neighbour China.

Despite a recent calming of hostilities, the Communist Party still regards Taiwan as a part of Greater China and territory that one day should be subsumed back into the fold.

As a result, reports of state-sponsored online espionage attacks launched from across the Straits are fairly common in local Taiwanese media.

A year ago, Taiwan Times said that the country’s defence ministry was creating a new “electronic and internet warfare” group to cope with the rising number of attacks, after a government report accused China of “using internet viruses to attack Taiwan’s government, economic and military websites”.

Those interested in using the Malware Knowledge Base need to apply online through the site. ®

Win a top of the range HP Spectre laptop

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/09/02/taiwan_malware_knowledge_database_free/

Leak of kids’ social services info earns Aberdeen City Council £100k fine

Aberdeen City Council has been hit with a £100,000 fine (about $150k) by the Information Commissioner’s Office (ICO), after an employee took sensitive files home and accidentally uploaded them to a public website.

The data, which included information on vulnerable children and details of alleged crimes, was on display for three months before it was spotted and taken down.

The incident started in November 2011, when an unnamed female council worker worked on council files on her own second-hand computer at home. These files apparently included minutes of meetings and detailed reports relating to the care of children.

The investigation into the incident failed to pin down whether the documents were accessed using remote access to council email or carried home on a USB stick, but at some point after being copied to the My Documents folder on her laptop the files were posted online by some unspecified software, thought to have been installed on the system by a previous owner and either started automatically or accidentally activated by the hapless employee.

Once online they were not noticed until February 2012 when another council employee stumbled across them when doing a search for their own name, and they were promptly removed from the website. The exact location the four files were posted to is also unspecified in the ICO report.

The ICO found huge gaps in the council’s policies regarding home working, which seem to have focused entirely on health and safety with no regard for the security of sensitive data, and even those policies which had been drafted were not being enforced:

In this case Aberdeen City Council failed to monitor how personal information was being used and had no guidance to help home workers look after the information. On a wider level, the council also had no checks in place to see whether the council’s existing data protection guidance was being followed.

The Data Protection Act, found to have been breached in this case, allows for fines of up to £500,000 for the most serious data breaches.

This case highlights a wealth of common problems with working from home and BYOD (Bring Your Own Device) practices. Any business or institution dealing with sensitive data – which is just about anyone really – needs to think carefully about how that data is secured when it’s being accessed remotely by staff, just as much as when handing it over to third parties.

Strict and comprehensive policies need to be put in place, clearly demonstrated to staff and strongly enforced with both technical and regulatory controls.

The rules need to cover what data can be accessed, from where and by whom, how data is accessed, transferred and handled, and what systems can be used to work on data.

The BYOD issue usually focuses on smartphones and tablets being brought in to work, but personal laptops remain the default tool to enable home working. Imposing the same level of application control, anti-malware and other security features is far more difficult than in systems built and monitored by dedicated IT staff.

So staff training is also vital – from the sound of this case, where the employee in question appears to have been unaware of what was running on her pre-owned laptop, it seems that IT skills were not considered an important part of her job, but people need to take more care to know what the tools they are using are capable of before they blindly trust them with information which could be incredibly sensitive to leakage.

Since the Aberdeen incident, auditing and assessment by the ICO earlier this year has noted some improvements, although there is still some way to go to achieve a satisfactory level of security.

Hopefully this good-sized fine will be an eye-opener to anyone dealing with personal information, particularly local government where data sensitivity is high but IT infrastructure tends to be disparate and creaky and skills are often minimal.

They need to wake up to the dangers of home-working and BYOD, and make sure they do all they can to minimise the risk.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/rf1Z3vHS4yU/

Facebook transparency, Apple bugs, SEA DDoSes itself – 60 Sec Security [VIDEO]

Facebook transparency, Apple bugs, SEA DDoSes itself

Mother/daughter team jailed for million-dollar internet dating scam

Win a top of the range HP Spectre laptop

A mother and daughter have been jailed for over a decade apiece after pleading guilty to money laundering for an internet dating scam that persuaded the gullible that they were helping US troops in search of love.

Vasseurs

The mother and daughter team muled over a million to Nigerian scammers


Karen Vasseur, 63, and daughter Tracy, 42, were part of a gang that spent three years searching dating sites and social networks for likely targets. Other collaborators posed as members of the US military overseas and persuaded dupes to send them money, supposedly for satellite phone calls, customs fees, and for travel so they could meet their imagined paramours.

For smaller amounts of cash, the scammers persuaded their victims to use Western Union or MoneyGram, but larger transfers would have attracted attention from the companies’ anti-fraud systems, so the Vasseurs were recruited to set up bank accounts to receive funds.

Posing as military agents, the two accepted over a million dollars (one British victim sent in $59,000) before funneling it to the scam’s organizers for around 10 per cent of the take.

The two set up 68 accounts in 19 different cities using 24 aliases to handle the transfer of funds and sent the bulk of the money to individuals in Nigeria, who set up the operation. Money was also wired to addresses in the UK, Ecuador, India, the United Arab Emirates, and the US, none of which has been recovered.

All the victims mentioned in the court papers were women, usually married, who had been conducting online dalliances with what they thought were male soldiers, usually claiming to be stationed in Afghanistan and with fake Army records to bolster their claims. Many of the women sent tens of thousands of dollars at a time to help these imaginary soldiers.

“Not only did this mother-daughter duo break the law, they broke hearts worldwide,” said Colorado attorney general John Suthers in a statement. “It is fitting that they received stiff sentences for their unconscionable crimes committed in the name of love and the United States military.”

Tracy Vasseur was sentenced to 15 years in prison for her part in the scheme. The authorities added an additional four years to her time in the Big House because she carried on transferring money even after being indicted, and also tried to influence a public official and take control of her children’s inheritance.

Her mother Karen was sent down for 12 years plus five years of parole. She will also serve a 10 years sentence for a separate fraud in which she convinced at-risk adults to pay fees to free up a bogus Nigerian inheritance, but that sentence will be served concurrently.

The case shows that one of the oldest internet scams in the book is still going strong, and that the ringleaders are getting away with it. The Vasseurs weren’t actually involved in duping the victims but were simply money mules, and the masterminds behind this operation are no doubt already finding new victims to fleece. ®

Win a top of the range HP Spectre laptop

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/30/motherdaughter_team_jailed_for_milliondollar_internet_dating_scam/

New Study Reveals Only 11% of Information Security Managers Trust Security Level Of Their Applications

LONDON, Aug. 30, 2013 /PRNewswire/ — Application vulnerabilities are a major factor in the cyber-crime game. The objectives of Quotium’s research published today was to better understand the solutions used to secure applications in leading corporates in Europe and in the United States. More than 500 CISOs and Security managers have been interviewed about the security state of their applications, the frequency of attacks in their organizations and the solutions in place to mitigate these security threats.

(Photo: http://photos.prnewswire.com/prnh/20130830/PH71785-INFO-a )

(Logo: http://photos.prnewswire.com/prnh/20130830/PH71785LOGO-b )

The first fact that arises from the study is that most of the big organizations interviewed currently have processes in place to test their web applications vulnerabilities. Most of them use penetration testing services, automated testing tools – mostly applications scanners or static code analyzers – or web application firewalls to secure their assets.

However, a majority of security managers are unsure of the current level of their application security state and do believe that a hacker could manage to exploit their applications. Also almost half do not have a clear view on the attacks currently performed against their organization.

One of the most interesting findings of this study is the gap between the efforts put into protecting applications and the actual state of the applications. While almost all organizations invest time, money and energy into protecting their infrastructure, using one or more types of service or technology, most applications remain vulnerable and are still being attacked.

The research and linked Infographic can be found at this address:

http://www.quotium.com/research/State_of_application_security_Infographic.php

About Quotium Technologies

Quotium Technologies is a specialist in the development of innovative software solutions to guarantee the security and performance of business critical applications throughout their lifecycle. Quotium is an Interactive Application Security Testing (IAST) pioneer with the release of its application security testing software Seeker. Seeker’s technology increases the accuracy of application testing by combining the detection of a potential vulnerability with verification through a real-time exploit attempt. With accuracy, clarity and simplicity, Seeker solution maximizes the return on investment applications.

Article source: http://www.darkreading.com/vulnerability/new-study-reveals-only-11-of-information/240160683

The Easiest Way To Deface A Website Is To Target The Domain Registrar

Earlier this week there was yet another attack attributed to the Syrian Electronic Army (SEA). For a period of around six hours some visitors to The New York Times, two Twitter services, and The Huffington Post’s U.K. sites were redirected to pro-Assad political Web content. Many people naturally assumed that these high profile websites had been hacked and then defaced, but in reality the attack was much simpler — and the SEA attackers had no need to even touch a single server belonging to these organizations.

Despite being arguably the most critical component of the modern Internet, very few people really understand how DNS and, more specifically, domain maintenance works. In recent years, I think businesses with a significant Internet presence have grown to appreciate some of the threats that can affect their DNS infrastructure, but are yet to invest in suitable systems and response plans that’ll help keep their sites and content accessible under anything more than the lightest touch of a competent hacker.

Unlike much of the infrastructure used by online businesses to serve content on the Internet or process transactions, DNS and domain registration is almost exclusively managed by third-parties. In the majority of cases, these DNS and domain registration providers know their business pretty well, but there’s often a big disconnect between the security of their operations and that of their largest clients.

For example, for websites that receive 50,000+ unique visitors per day or process more than 1,000 financial transactions per hour, you can be pretty sure that they’re running current generation perimeter defense systems (NGFW, IPS, DLP, etc.), undergo regular and extensive security reviews and penetration testing, and are generally monitored in real-time by a back-office contingent of seasoned system administrators and product managers — by the business themselves.

Meanwhile, DNS is hosted by one third-party, domain registration is likely managed by another one, and none of the security defenses or alerting systems feed back to the client. Oh, and the domain registration provider may be the same folks that the company originally purchased the domain name 15 years ago.

From a hacker’s perspective, going after the target’s DNS infrastructure or domain management portal represents a soft target.

Hacking a modern Web server cluster, subverting it to your political cause, and having that message presented to thousands of site visitors for more than five minutes is a difficult task. Hacking the hosting infrastructure of a major Internet business or service provider is often considerably harder. Meanwhile, targeting and subverting a small DNS hosting provider or obtaining the administration credentials for the domain registration portal is a much easier proposition — the attacker probably doesn’t even need to touch any systems owned and operated by their ultimate target. Once key DNS entries have been altered, the attackers can appear to have compromised the target’s Web services for hours (if not days), as the updated entries propagate around the Internet.

While the end effect is the same, the hacks against the DNS server or the domain registration process are technically quite different. Hacking a DNS server on one hand is much like hacking any other infrastructure device, but there are also a lot of additional attack vectors that specifically target weaknesses in the way the DNS application and database operates — looking to affect caching glitches, exploit DNS service vulnerabilities, usurp administrative access controls, or by simply guessing a management account.

Hacking the domain registration system tends to be a different beast. In most cases, hacks against the system focus upon obtaining the access credentials of the domain owner or administrator. For example, in the SEA attack earlier this week, the attackers are said to have employed a spear-phishing attack against staff at a Melbourne IT reseller to capture administrator-level account details, and used them to edit the name server fields. By changing the name server fields for the targeted domains, the SEA were able to redirect all Internet lookups for those particular top-level domains (TLDs) to DNS servers they controlled, and those DNS servers in turn answered inbound lookup queries for hosts (and services) associated with those TLDs with the IP addresses of servers they controlled… serving up pro-Assad political content.

I’ve constantly found the domain registration and administrative process to be weak and haphazard. In the first phases of a penetration test, during the passive information gathering phase, it’s easy to identify administrative weaknesses in the domain registration details from even a quick WHOIS lookup. When you start to enumerate which accounts can maintain a domain entry (i.e. via the “mnt-by:” tag), and those that still rely upon an authentication password protected by a lowly MD5 hash (i.e. “auth: MD5-PW”), you’re bound to shake your head in disbelief.

My advice to organizations looking to protect themselves from similar DNS and Domain registry level attacks is, in the first order, choose a DNS provider and Domain Registrar that can prove they’ve invested in the appropriate level of perimeter defense systems and response strategies — ideally at a level comparable (or better) than your own. In this particular service tree of the Internet, you really do get what you pay for.

Secondly, when you’re assessing the security of your key websites and Internet accessible infrastructure, make sure that your DNS and Domain Registrars are not only included in the passive information gathering stages, but are also within the scope of a penetration test or red-team exercise.

Finally, you should “harden” your domain administration processes – ensuring that you’re using strong authentication and change control procedures and, where possible, you’ve locked the domain via the “registry-lock” and “registrar-lock” options.

A warning though: Even after performing these actions, DNS and domain maintenance processes will remain one of the weaker points of your Internet security stature. Vigilance is advised. Recognize that this is a continued weak spot, ensure that you monitor for changes continuously, and vet incident response plans appropriately.

Gunter Ollmann, CTO, IOActive Inc.

Article source: http://www.darkreading.com/attacks-breaches/the-easiest-way-to-deface-a-website-is-t/240160677