STE WILLIAMS

It’s baaack – WannaCry nasty soars through Boeing’s computers

WannaCry, the Windows ransomware that took off last May around the world, has landed on some computers belonging to US aircraft and weaponry manufacturer Boeing.

“All hands on deck,” said Mike VanderWel, chief engineer at Boeing Commercial Airplane production engineering, in a memo seen earlier today by the Seattle Times. “It is metastasizing rapidly out of North Charleston and I just heard 777 (automated spar assembly tools) may have gone down. We are on a call with just about every VP in Boeing.”

VanderWel said he was concerned that equipment used to test airframes after they roll off the production line was hit by the file-scrambling nasty. He feared the malicious code, which demands a ransom to restore encrypted documents, could “spread to airplane software.”

wannacry

WannaCry: Everything you still need to know because there were so many unanswered Qs

READ MORE

That’s unlikely to be the case, unless he meant possibly the in-flight entertainment systems, given the propagation methods used by the attack code. WannaCry exploits a Microsoft Windows SMB vulnerability using a cyber-weapon stolen from the NSA. Aircraft do not use Windows for critical systems.

The outbreak suggests that someone at Boeing was asleep at the switch when it comes to patching. WannaCry exploits software holes that were patched over a year ago and, after the first outbreak took down large chunks of Britain’s National Health Service, people got busy installing and updating their networks.

Not so at Boeing, it seems. VanderWel referred to the reaction needed to counter the outbreak as “a battery-like response,” a reference to Boeing’s problems with batteries overheating in the first models of its 787 Dreamliner.

“Our cybersecurity operations center detected a limited intrusion of malware that affected a small number of systems,” a spokesperson for Boeing told the Times. “Remediations were applied and this is not a production and delivery issue.” ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/03/28/wannacry_boeing/

Facebook to extend bug bounty to cover data leakage, sever ties to data brokers

Facebook has outlined a set of changes to its platform that impact developers and data brokers.

The changes appear to be reactions to the company’s recent and well-publicised troubles stemming from unauthorised use of some data for contentious political purposes.

Data brokers will suffer for Facebook’s sins by being excluded from the platform.

Facebook has a program called “Partner Categories” that it tells advertisers will let them “further refine your targeting based on information compiled by … partners, such as offline demographic and behavioural information like homeownership or purchase history.”

The partners Facebook uses are Acxiom, CCC Marketing, Epsilon, Experian, Oracle Data Cloud and Quantium.

Graham Mudd, a Facebook product marketing director, said that using such providers to refine ad targeting “is common industry practice” but that Facebook feels “this step, winding down over the next six months, will help improve people’s privacy on Facebook.”

On its own platform, Facebook has promised new fine print for business-to-business applications, complete with “rigorous policies and terms”. Which kind of admits some of Facebook’s past fine print was floppy. Perhaps floppy enough to let data flow to Cambridge Analytica and beyond?

Also notable is a change that means apps that provides access to lists of a user’s friends will now be reviewed by Facebook.

Facebook Wow Sad Angry

Facebook’s inflection point: Now everyone knows this greedy mass surveillance operation for what it is

READ MORE

Another change will mean that “If we find developers that misused personally identifiable information, we will ban them from our platform.” Once that’s done, Facebook “will notify everyone who used it.”

The company’s also promised to make app management features “more prominent and easier to manage” so that punters can see what they’ve connected to, how it uses their data, and sever links if they want to.

Facebook’s also eating its own dogfood by tapping communities to help out, in this case by expanding its bug bounty program “so that people can also report to us if they find misuses of data by app developers.” The details of the expanded program are, like most of the above, coming real soon now.

“We know these changes are not easy,” wrote Facebook’s director of product partnerships Ime Archibong, “but we believe these updates will help mitigate any breach of trust with the broader developer ecosystem.”

The Social Network™ has paused review of new apps while it makes these changes.

Facebook’s often promised to make its permissions more usable and to ensure data only flows in directions its users understand, but its Settings menus remain confusingly extensive and use opaque language. Perhaps this new round of changes will address that problem. Convincing developers to play nice is another matter entirely. Facebook is a honeypot of data and the unscrupulous will always try to bend its rules. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/03/29/facebook_to_extend_bug_bounty_to_cover_data_leakage_from_apps/

Egg on Cisco’s face: Three critical software bugs to fix over Easter

Cisco’s ruined Easter for netadmins by revealing three critical-rated flaws, with fixes landing today.

The company’s IOS and IOS XE software need patching against two bugs, CVE-2018-0151 and CVE-2018-171.

CVE-2018-151 is a bounds-checking error in IOS/IOS XE’s quality-of-service subsystem, and can be attacked using malicious packets to UDP port 18999. A successful attack triggers a buffer overrun, either causing a denial-of-service (DoS) or remote code execution (RCE).

If you can’t patch immediately, block traffic to UDP 18999.

CVE-2018-171 is a bug in IOS/IOS XE’s smart install feature: a malicious message to TCP port 4786 on a client device can trigger DoS or RCE conditions.

Smart install is designed to simplify configuration of devices destined for the branch office: the sysadmin can ship a new device to a site, and it fetches configuration data when it’s first powered up.

Critical bug number three, CVE-2018-0150, affects only IOS XE: it’s a static credential that’s left over from installation.

As well as the three critical bugs, Cisco’s March 2018 IOS/IOS XE bundled security publication has another 19 bugs rated as high impact. Happy Easter! ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/03/29/cisco_critical_ios_bugs/

Running Drupal? You need to patch, patch, patch right now!

Anyone running a website built with Drupal should stop whatever they are doing right now and install critical security patches.

The company has put out an urgent security patch and warned Wednesday that it has discovered a remote code execution vulnerability in “multiple subsystems” of its content management system software.

The holes could allow hackers to attack a Drupal website in a number of different ways and that “could result in the site being completely compromised.” In other words, it’s really bad.

A hacker will be able to hack your site from any webpage, the company warned, and it doesn’t require them to login or have any privileges, meaning that a completely anonymous user can take over your site as well as access, delete and change non-public data.

There is currently no attack code but Drupal has warned it could be a mere matter of hours before some is developed. Which means one thing: patch. And do it now.

So what’s the problem?

The flaws – compiled in CVE-2018-7600 – are in the software’s core and affect versions 6, 7 and 8 of its content management software.

The company is so concerned that malicious actors will be able to develop attack code fast that it took the rare step of informing website administrators last week so they could schedule downtime.

drupal

BDSM sex rocks Drupal world: Top dev banished for sci-fi hanky-panky

READ MORE

Drupal has also produced patches for older versions of its latest software – 8.3 and 8.4 as well as the most current 8.5 version – to ensure that websites can be updated as soon as possible, rather than require an overall update.

A 7.x patch is also available, but if you are still running version 6.x, you may have a big headache on your hands – Drupal has not put out a patch.

“The Drupal Security Team urges you to reserve time for core updates because exploits might be developed within hours or days,” it warned last week.

While the approach of giving website administrators a heads-up – including a window of 18:00 – 19:30 UTC – was good in theory, it backfired somewhat on Wednesday when the huge focus on attention ended up overwhelming the company’s servers, making it harder for it to publish the actual patches.

drupal

Warning people in advance: a good idea in theory

As administrators waited patiently – and impatiently – for the patches to drop, an impromptu series of conversations started up on mailing lists and on social media. A game of internet hangman popped up. Memes erupted.

It may be worth noting that while a critical vulnerability in one of the world’s most popular content management system is not a good thing, it can have interesting side-effects: such as when the website of law firm Mossack Fonseca was hacked and ransacked, providing the extraordinary information that led to the so-called Panama Papers – all because it failed to update Drupal and so patch a critical vulnerability.

The Panama Papers revealed a vast global conspiracy to hide money in overseas bank accounts and resulted in unprecedented promises to cut down on tax evasion.

We’ll have to wait and see if anything similar emerges from this security scramble. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/03/28/running_drupal_you_need_to_patch_patch_patch_right_now/

How Measuring Security for Risk & ROI Can Empower CISOs

For the vast majority of business decisions, organizations seek metrics-driven proof. Why is cybersecurity the exception?

Whoever coined the phrase “what you don’t know can’t hurt you” obviously never held a cybersecurity job. Lack of awareness has resulted in significant compromises of networks, systems, applications, devices, and data. And yet, even after all of those losses, it’s still surprising to me that so many organizations remain in the dark about the effectiveness of the products that protect them. According to recent research from NSS Labs only:

  • 43% of enterprises validate the effectiveness of their security products through internal testing (NSS Labs 2017 Security Architecture Study, May 2017);
  • 38% of enterprises always perform a proof of concept prior to selecting a security control (NSS Labs 2017 Security Architecture Study, May 2017);
  • 47% of executives believe that all security products they currently deploy add value (NSS Labs 2016 Advanced Endpoint Protection Study, December 2016).

In 2018, according to Gartner, companies will spend a projected $96 billion on security products and services. But will they have the hard data to know if those investments actually reduce their exposure to threats? In my regular discussions with chief information security officers (CISOs), this lack of information is a recurring topic of concern.

To understand their anxiety, think about your car: All cars are equipped with gauges and warning lights that provide real-time feedback about the health of the vehicle. These gauges include everything from how fast you’re going to whether your tires are low or how much further you can drive before you need to fill your tank with gas. Now imagine that these gauges and warning lights were all broken. What if you didn’t know how long it was since you’d last filled up your tank or how far had you driven since refueling? How much gas do you have left before you run out? Do you have enough gas to make it to the next gas station? And now imagine your teenage kid borrows the car now and again without warning. As unbelievable as this sounds, CISOs are dealing with the equivalent of this every day.

For the vast majority of business decisions, we seek metrics-driven proof. Why, then, is cybersecurity the exception? Isn’t it obvious that continuous measurement and validation of the effectiveness of security controls is critical? Who wouldn’t want the visibility to know how effectively their defenses are securing their network, systems, applications, devices, and data?

The CEO Question: “Should I Be Worried?”
Too often, the answer is “I don’t know” or even “yes.” Although CISOs have a number of key performance indicators to track and measure security activities such as patching, they lack a process or approach that measures the effectiveness of their security solutions. What they need is a continuous measurement approach, with which they can assess their security postures, pinpoint the threats that pose the greatest risk to enterprise operations, and then determine whether existing solutions are delivering sufficient protection.

Supporting this need for ongoing measurement, governments and regulators have produced a number of frameworks — from the National Institute of Standards and Technology (NIST), Federal Financial Institutions Examination Council (FFIEC), and the EU’s General Data Protection Regulation (GDPR) — all with mandates for measuring and monitoring security controls. If you have not yet done so, now is the time to think about the resources you will need to implement a successful continuous monitoring program. It’s also incumbent upon security professionals to articulate priorities and justification in terms that business leaders can understand.

Let’s Talk about ROI
In looking at cybersecurity from a business perspective, a metrics-supported approach goes a long way in justifying investments. Yet few organizations — only 17%, according to NSS Labs research (NSS Labs 2017 Security Architecture Study, May 2017) — perform ROI calculations of their security controls. Moving forward, calculating ROI and providing relevant metrics will be a must-have in the CISO’s toolbox. Without them, security executives may find themselves in the difficult position of explaining that the cause of a data breach was a result of “having had a technology solution for the problem in the budget, but it got cut.”

As we move to the future, CISOs and their teams will be asked to incorporate more data science, empirical evidence, and metrics to demonstrate the effectiveness of their security programs. CISOs must refocus on the right types of insights and data to drive effective decisions and actions. But perhaps just as important, they must have the ability to measure the effectiveness of cybersecurity in language the business can appreciate and understand.  Introducing metrics that account for risk and ROI will empower security leaders to partner effectively with their business counterparts and pave the way for CISOs to have a stronger voice in their organization.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.

Vikram Phatak is Chief Executive Officer of NSS Labs, Inc. Vik is one of the information security industry’s foremost thought leaders on vulnerability management and threat protection. With over 20 years of experience, he brings unique insight to the cybersecurity problems … View Full Bio

Article source: https://www.darkreading.com/risk/how-measuring-security-for-risk-and-roi-can-empower-cisos-/a/d-id/1331357?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Baltimore Hit with Hack on 911 System

An attack took down part of Baltimore’s 911 system for 17 hours over the weekend, and details are still in short supply.

Baltimore has been hacked, but you couldn’t call 911 — it was the target. Systems were attacked over the weekend, leading to a disruption in the automated dispatch system in the city. The police department was quick to say that no calls went unanswered as staff switched over to manual dispatching, but the hack did show that critical systems continue to be vulnerable to criminal hacking.

The system attacked is the one that automatically places caller information into forms and on a mapping system, allowing for faster response time, especially for callers who are confused, injured, or unsure of their location. The Baltimore police reported that the system was back online around 2:00 a.m. on March 26.

Details about the attacker are still unknown, with police officials citing the ongoing investigation as a reason to keep details away from the public.

Baltimore’s attack is the latest in a series of hacks on municipal systems. In Atlanta, residents are unable to pay water bills, and officials are still filling out paper forms after a ransomware attack hit government offices late last week.

For more, read here and here

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/baltimore-hit-with-hack-on-911-system/d/d-id/1331389?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Destructive and False Flag Cyberattacks to Escalate

Rising geopolitical tensions between the US and Russia, Iran, and others are the perfect recipe for nastier nation-state cyberattacks.

Olympic Destroyer. NotPetya. Bad Rabbit. OilRig. These disruptive and in most cases destructive cyberattacks were just the beginning.

Geopolitical tensions typically map with an uptick in nation-state cyberattacks, and security experts are gearing up for more aggressive and damaging attacks to ensue against the US and its allies in the near-term, including crafted false flag operations that follow the strategy of the recent Olympic Destroyer attack on the 2018 Winter Olympics network.

As US political discord escalates with Russia, Iran, North Korea, and even China, there will be expected cyberattack responses, but those attacks may not all entail the traditional, stealthy cyber espionage. Experts say the Trump administration’s recent sanctions and deportation of Russian diplomats residing in the US will likely precipitate more aggressive responses in the form of Russian hacking operations. And some of those could be crafted to appear as the handiwork of other nation-state actors.

A shift in Russia’s M.O. against the US infamously began in 2016 with the hacks of the Democratic National Committee (DNC), Democratic Congressional Campaign Committee (DCCC), and Hillary Clinton campaign manager John Podesta’s email account, all of which were punctuated with data dumps via WikiLeaks, DC Leaks, and Guccifer 2.0.

US companies Merck and Federal Express were believed to be collateral damage from the NotPetya attack Russia forged last year against Ukrainian targets, posing as a ransomware attack but instead wiping data from hard drives at infected sites. But such attacks may well become more direct in the near future, experts believe.

Security experts worry that Russia will continue to ratchet up more aggressive cyberattacks against the US – likely posing as other nations and attack groups for plausible deniability – especially given the success of recent destructive attack campaigns like NotPetya. Not to mention the successful chaos caused by Russia’s election-meddling operation during the 2016 US presidential election.

That doesn’t mean Russia or any other nation-state could or would cause a massive power grid outage in the US, however. Instead, US financial services and transportation networks could be next in line for disruption via nation-state actors, experts say.

Vikram Thakur, senior manager on Symantec’s security response team, says Olympic Destroyer scratched the surface for cloak-and-dagger attacks. “We think the future is going to get even more complicated with actors relying more and more on false flags, in some cases, throwing another group [under] the bus from an attribution standpoint.”

“To say the waters are muddied would be such an understatement,” he says. Not only are some nations teaming up outside of cyber, but others are happy to pilfer from one another’s cyber domains as well: “We’re aware of groups happy to steal others’ information and sit on their command and control server. We’re aware of false flag operations.”

But Tom Kellermann, chief cybersecurity officer at Carbon Black, expects more nefarious activity out of Russia, and possibly from Iran and North Korea, against the US. He expects some regimes to team up in the long term to target the US and other Western allies/NATO in cyberspace. For example, the nomination of CIA director Mike Pompeo – who has criticized the Iran nuclear deal – as the new US Secretary of State to replace Rex Tillerson, could spark online retaliation from Iran, he says.

“You’re going to see a dramatic escalation of Iranian cyberattacks against US infrastructure” that follow White House and State Department rhetoric, he says. Iran already has dramatically improved its cyberattack capabilities, he says, and he believes it’s learning from Russia’s tactics. “They’re all using the same playbook” now, he says, with similar “kill chain” methods in their attacks and payloads.

Kellermann says he believes Russia is providing North Korea and Iran with the technologies and tactics to advance their attacks. It may not be direct coordination, but there’s some element of technology transfer from Russia to those nations, he maintains.

The Iranian OilRig attackers, for instance, have advanced in their ability to mask lateral movement within a targeted organization, he notes, and they have adopted methods similar to Russia’s Fancy Bear group, including an AppLocker bypass exploit, indirect code execution, and the increasingly popular file-less malware method where legitimate system tools are used against victims rather than custom malware.

This move away from custom malware to so-called file-less malware also complicates attribution and helps embolden false-flag operations. “[Custom malware] was one of the primary methods for identifying certain groups in the past. Without that, it becomes difficult to determine who the perpetrator might be,” Symantec’s Thakur says.

That doesn’t mean attribution is dead. “It’s becoming a lot more challenging. But in the end they are still humans and even if they write scripts in PowerShell or JavaScript or PHP, at the end of the day they will reuse code and are lazy. That helps us” identify them, he says.

North Korea’s Hidden Cobra, believed to be behind the sophisticated attacks bank members of the SWIFT network, also is maturing fast. “The M.O. they use against the financial sector reminds me of the M.O. of Russian cybercriminals,” says Kellermann. Their custom Trojan development aside, they employed similar communications methods, including a custom binary protocol to beacon back to the C2 servers over TCP port 8080, 8088, and their use of SSL, he says, as well as when they overwrote the ServiceDLL in the Windows registry.

Thakur says his team at Symantec hasn’t seen much cooperation among different nations to date. Multiple hacking teams from a particular nation, such as Iran, will work in tandem in an attack campaign, splitting up different stages of the attack. “I don’t think different countries are going to collaborate on malware or on different active campaigns. Most are very nationalistic, or have ambitions for intellectual property” theft, he says.

One high-profile exception, of course, was Stuxnet. Although neither the US nor Israeli governments ever took credit for the hack that sabotaged uranium centrifuges in Iran, experts who studied the attacks pointed to fingerprints from both nations’ intelligence agencies.

CrowdStrike vice president of intelligence Adam Meyers says he hasn’t seen much overlap of nation-state groups working together, but points to nations such as Iran modeling some of their techniques after Russian ones. Take Iran’s initial dabbling with destructive attacks via the Shamoon campaign, which hit a couple of targets.

“It was a shot across the bow,” Meyers says. But starting in 2016, Iran waged a series of destructive cyberattacks targeting the Saudi government and infrastructure and business, he notes. “That was for maximum impact and psychological impact on the people of Saudi Arabia,” he says. “It’s what Russia has been doing against Ukraine for seven years.”

Meyers believes the issue is more about Iran’s cyberweapon capability improving and maturing – likely inspired by Russia’s.

Symantec’s Thakur says the likelihood of the number of destructive cyberattacks against the US and others increasing in the coming months is “more realistic” now than ever. “It’s more about the motivation by threat actors working on behalf of certain countries that will reach the threshold where they would more often cause destruction to someone’s network,” he says. “There are a lot of factions. It’s fair to assume some might get more reckless.”

But that doesn’t mean widespread critical infrastructure damage. “That doomsday scenario isn’t fair. It’s extremely unlikely we would face a situation of a widescale blackout across the country,” Thakur says. “If anything, there are small pockets of the country that don’t have the redundancy or rollover, who might be at elevated risk of cyberattacks and some kinetic” threat, he says.

Even with the recent confirmation by the federal government that Russia’s DragonFly  hacking team is well embedded in US power companies and other industrial networks, there’s a silver lining, he says. “Today our infrastructure in the US is in a much better place than a year ago” security-wise, he says.

In the runup to a possible meeting between Kim Jong-Un and Donald Trump, meantime, North Korean hacking teams will likely escalate their attacks. “They want to get intel around the US strategy,” notes CrowdStrike’s Meyers. “And leading up to those meetings, there is increasing pressure on the US government and POTUS to maintain a hard line on sanctions against North Korea … So [North Korea] may step up their criminal operations,” especially on the lucrative cryptocurrency mining attacks, he says.

Related Content: 

Interop ITX 2018

Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/destructive-and-false-flag-cyberattacks-to-escalate/d/d-id/1331390?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

New Android Cryptojacker Can Brick Phones

Mobile cryptojacking malware mines Monero.

A little CPU power can go a long way in a criminal application. That was the lesson of the Mirai botnet and now also a lesson being applied by a new cryptojacker mining Monero user the power of the Android phone.

Researchers at Trend Micro recently discovered ANDROIDOS_HIDDENMINER, a piece of malware that embeds itself in an Android device, obfuscates its presence, and proceeds to use the device CPU to mine Monero, a cryptocurrency that has gained favor with criminals because of its anonymous, untraceable nature.

Researchers have seen an increase in cryptojacking in 2018 as cybercriminals turn to malware that seems more reliable than ransomware and less likely to draw the immediate attention of law enforcement. Cryptojackers have begun using delivery mechanisms like EternalBlue to plant themselves on systems, indicating that the same sort of criminal organizations that were banking on ransomware have now turned to the less aggressive cryptojackers for revenue.

Like other cryptojackers, ANDROIDOS_HIDDENMINER is far from benign. The demands that cryptocurrency mining places on a CPU are so great that the CPU can overheat causing the device to lock, fail, and be permanently damaged. Similar malware such as Laopi has been known to cause heat-related battery swelling to the point that the phone case actually bubbled and buckled, according to one report.

ANDROIDOS_HIDDENMINER is currently being delivered through a fake Google Play update app. So far, it has been available to users in China and India, though the Trend Micro researchers note  that there’s no technical reason that the malware couldn’t enter other markets, and that they fully expect to see spread to other geographies in the future.

As for protection from the malware, in addition to anti-malware software on the device the researchers have recommendations that are basic, good, mobile device hygiene, including download “only from official app marketplaces, regularly update the device’s OS (or ask the original equipment manufacturer for their availability), and be more prudent with the permissions you grant to applications.”

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/mobile/new-android-cryptojacker-can-brick-phones/d/d-id/1331398?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cambridge Analytica’s secret coding sauce allegedly leaked

Not only did Cambridge Analytica (CA) scrape Facebook user data without permission, all while Facebook turned a blind eye; the company has also been tied to another analytics firm that allegedly left its code flapping on the laundry line.

That includes exposed political data and microtargeting tools that Republican campaigns used to target ads designed to sway the 2016 US presidential election. CA’s clients included not only campaigns for the victorious Donald Trump; also-rans Ted Cruz and Ben Carson also forked over big bucks to CA for microtargeting, as did Arkansas Senator Tom Cotton and former US Ambassador to the United Nations John Bolton (now being considered to replace H.R. McMaster as White House national security adviser), among others.

Security firm UpGuard claims that it found a large code repository from AggregateIQ (AIQ), a Canadian political data firm also active in the 2016 US presidential race, left publicly downloadable online.

You might remember that data analytics firm’s name for its part in Brexit: the official Vote Leave campaign gave £3.5m to AIQ, which, like CA, specializes in highly targeted Facebook advertising.

Over the weekend, The Guardian reported that CA has undisclosed links to AIQ. The Guardian reports that former CA employee/founder turned whistleblower Christopher Wylie has revealed that besides setting up CA, he was also a central figure in setting up AIQ.

AIQ and CA’s parent company, SCL Group, are tied by an intellectual property license, but the threads that bind go way beyond that: Wylie says that some CA staff referred to AIQ as a “department” within the company and that the two businesses shared the same underlying technology.

According to UpGuard, it found that technology within an open repository that holds a smorgasbord of tools used to influence individuals, including…

…a set of sophisticated applications, data management programs, advertising trackers, and information databases that collectively could be used to target and influence individuals through a variety of methods, including automated phone calls, emails, political websites, volunteer canvassing, and Facebook ads.

It also allegedly found what it says is a possible misconfiguration at AIQ’s customized Gitlab code repository. Last Tuesday, UpGuard Director of Cyber Risk Research Chris Vickery – if you know breaches, you’ll surely recognize that name – discovered what UpGuard says is a large data warehouse hosted on a subdomain of AIQ.

Getting into it was no problem: after entering the URL, the warehouse prompts the visitor to register to see the contents, for free. All you have to do is enter an email address. After that, dozens of code repositories are downloadable, handing you the keys to the psychographic kingdom:

Within these repositories appear to be nothing less than mechanisms capable of organizing vast quantities of data about individuals, measuring how they are being influenced or reached by advertising, and even tracking their internet browsing behavior.

Vickery found that the “simple matter” of neglecting to fix a permission setting to exclude public registrants from waltzing into the development repository rendered the code exposed.

UpGuard says beyond the voter targeting tools, it found data that could have been used by “any malicious actors encountering the exposure,” including…

…numerous credentials, keys, hashes, usernames, and passwords to access other AIQ assets, including databases, social media accounts, and Amazon Web Services repositories…

… As it was left publicly downloadable, many sets of internal credentials that could have been used to launch damaging attacks were left out in the open.

The files confirm that CA didn’t come up with its own software platform; rather, it was AIQ’s technology behind campaign apps created for Ted Cruz and Texas Governor Greg Abbott, as well as a Ukrainian steel magnate named Serhiy Taruta, head of the country’s newly formed Osnova party. The software was called Ripon (named for the town of Ripon, Wisconsin, where the Republican Party was founded).

The files were quickly taken offline Sunday night after Gizmodo reached out to AIQ co-founder Jeff Silvester.

Gizmodo says AIQ was solely responsible for the platform, but that the company was bound by a non-disclosure agreement from discussing its contract with CA.

The US Federal Trade Commission (FTC) is now investigating Facebook, looking for answers as to how it lost control of more than 50 million users’ personal data to CA.

British authorities are also investigating whether the Brexit campaign violated election finance rules by illegally funneling money to AIQ through other Brexit groups. That includes a donation of £625,000 pounds ($888,000) allegedly sent to the pro-Brexit student group BeLeave but which wound up going directly to AIQ.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/op8lCsE76Mk/

Push for legal mandate to unlock phones revived by DOJ

Officials from the FBI and the Department of Justice (DOJ) have been meeting with security researchers, working out how to get around encryption during criminal investigations, according to the New York Times.

Based on those meetings, DOJ officials are convinced they can get at encrypted data “without intolerably weakening the devices’ security against hacking,” the NYT reports, and thus are renewing their push for a legal mandate that would force tech companies to build encryption backdoors.

Sources familiar with the matter say that there have been workshops held on the subject by Daniel Weitzner, a computer science professor at the Massachusetts Institute of Technology (MIT).

The meetings have been attended by technologists that have included Ray Ozzie, a former chief software architect at Microsoft; Stefan Savage, a computer science professor at the University of California, San Diego; and Ernie Brickell, a former chief security officer at Intel, all three of whom are working on techniques to help police get around encryption during investigations.

Savage said the meetings have focused on finding what the NYT called “a safe enough way” to unlock data on encrypted devices, as opposed to the separate matter of decoding intercepted messages sent via encrypted communications services, like Signal and WhatsApp. The newspaper quoted him:

The stuff I’ve been thinking about is entirely the device problem. I think that is where the action is. Data in motion and the cloud are much harder to deal with.

Presentations from Ozzie, Savage and Brickell were included in a report released last month by a National Academy of Sciences committee following an 18-month study of the encryption debate.

According to the NYT, Ozzie said that the researchers recognize that “this issue is not going away” and hence are trying to foster “constructive dialogue” rather than declaring that there’s no possible solution.

Ozzie’s spot-on when it comes to this issue not going away: law enforcement for years have been lobbying for a way to overcome what they call the “going dark” problem. The phrase refers to the “enormous and increasing number of cases that rely on electronic evidence” that law enforcement can’t get at in spite of having the legal authority to do so, as FBI Director Christopher Wray described it during a speech in Boston earlier this month.

From his prepared remarks:

I recognize this entails varying degrees of innovation by the industry to ensure lawful access is available. But I just don’t buy the claim that it’s impossible.

In that speech, Wray picked up from where he left off in January, when he called unbreakable encryption a “public safety issue,” citing 7,775 devices that the FBI couldn’t crack in 2017 – more than half of those that the agency sought to lawfully access…

…which in turn picked up from where his predecessor, James Comey, left off… which also followed Assistant Attorney General Rod Rosenstein having made the same arguments multiple times last year.

During both his speeches, Wray has referenced a chat and messaging platform called Symphony used by a group of major banks and marketed as offering something called “guaranteed data deletion.”

Pushed by a state regulator, four banks agreed to keep a copy of all communications sent to or from them through Symphony for seven years, Wray said. They also agreed to give copies of their encryption keys to independent law firms.

Wray:

So at the end, the data in Symphony was still secure, still encrypted, but also accessible to the regulators so they could do their jobs. I’m confident that by working together and finding similar areas to agree and compromise, we can come up with solutions to the Going Dark problem.

Maybe it worked for four banks, but according to the NYT, Symphony wouldn’t work for millions of ordinary smartphone users. Another approach that’s particularly caught the government’s eye is a system that would…

…generate a special access key that could unlock… data without the owner’s passcode. This electronic key would be stored on the device itself, inside part of its hard drive that would be separately encrypted – so that only the manufacturer, in response to a court order, could open it.

Nope, that wouldn’t work, according to Susan Landau, a Tufts University computer security professor. In a post she wrote on Lawfare, Landau said that the government is ignoring the “technical realities of what is possible to build securely – and what is not” when it argues that Silicon Valley can securely provide updates that undo security protections.

The updating process, modified to be used multiple times a day rather than a few times a year, is susceptible to subversion. The process could be automated, but that presents a security risk. It’s prudent to have eyes on the process of undoing the protections of someone’s phone.

A more likely model is that multiple people – a lawyer (to examine the court order requiring the phone unlock) and an engineer – would work together to approve a “security-undo” update. Letting so many people access the server that authorizes updates introduces human risks to the system. Risks may arise from malfeasance or from sloppiness – or, most likely, a combination of both.

Pfft! Details. The government’s attitude: perfection is the enemy of progress.

The NYT quoted Brickell, the former Intel official, who said that forcing tech companies to equip devices with powerful new keys to function “is a difficult problem.” But it’s not insurmountable, he said:

Let’s keep working on it. But let’s not let the desire for a perfect solution get in the way of one that would help.

At any rate, the National Academy of Sciences’ report concluded that the proposed encryption-workaround schemes aren’t ready for prime time:

[The] proposed encryption schemes are not considered ready for deployment until they have undergone careful scrutiny by experts regarding their effectiveness, scalability, and security risks and been subject to real-world testing at realistic scale in the relevant contexts.

In a statement sent to the NYT and Ars Technica, Apple Senior Vice President for Software Engineering Craig Federighi said that proposals to weaken security “make no sense.”

We’re continuously strengthening the security protections in our products because the threats to data security intensify every day.

Proposals that involve giving the keys to customers’ device data to anyone but the customer inject new and dangerous weaknesses into product security. Weakening security makes no sense when you consider that customers rely on our products to keep their personal information safe, run their businesses, or even manage vital infrastructure like power grids and transportation systems. Ultimately protecting someone else’s data protects all of us so we need to move away from the false premise that privacy comes at the cost of security when in truth, it’s a question of security versus security.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/sMP6fRgOltQ/