The Gonatus squid eats its own kind.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
from Friday Squid Blogging: Cannibal Squid
The Gonatus squid eats its own kind.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
A private company that sells exploits has just announced a huge reward for exploiting Apple’s new iOS platform. For anyone who is able to find an exploit in the new OS, the company will pay $1.5 million in prize money.
Zerodium is behind this challenge. It is a company that purchases zero day vulnerabilities and exploits and then pays heavy rewards to anyone who is able to discover any known flaws or security loopholes within popular system software.
Zerodium is going to only pay for finding exploits in fully patched iPhones and iPads. They are encouraging researchers to find these exploits by putting large prizes on the board.
Read more details http://www.zdnet.com/article/you-can-now-earn-1-5-million-for-hacking-the-iphone/
The post Hack An iPhone And Earn $1.5 Million Instantly appeared first on Cyber Security Portal.
Today, one of our researchers noticed a fake version of uBlock Origin, uploaded on the 29th of September, on the Chrome Web Store. If ever you find yourself searching for the said app within the store, you'll want to avoid imitations...
Categories: Tags: fake ad blockerfake chrome extensionfake ublock origin app |
Microsoft President Brad Smith isn't one to shy away from a fight when he thinks his company is in the right — see his fight with the U.S. government over secret access to customer information.
Microsoft President Brad Smith isn't one to shy away from a fight when he thinks his company is in the right — see his fight with the U.S. government over secret access to customer information.
Picking up from yesterday’s post:
Imagine a time when carburetors ruled the earth (or at least car’s fuel systems), and a time before emissions controls extended to evaporating fuel vapor, say perhaps in the 70s when I began my career as a mechanic, working on cars of that era and older. Back then, in ye olden days, fuel systems were open to the environment, both in cars and in the tanks at gas stations. That meant that water vapor could condense in the fuel tanks and drip or run down the sides and pool at the bottom of the tanks. This is why the fuel pickups in gas stations’ underground tanks were a few inches above the bottom, and why we always used water-detecting paste on the giant tank sticks used to measure the amount of fuel in the ground. An inch or two of water at the bottom of the tank and no one cared as long as the amount didn’t increase rapidly- it would stay down there harmlessly. Unless, of course, you got a fuel delivery which churned up everything on the bottom of the tanks, water, sediment, whatever. Still, it would eventually settle back down- but if you happened fill up your car while the much was stirred up you could get the nasties, including water, into your car’s tank. And no, most stations didn’t have great fuel filtration between the tank and the pumps. To this day I avoid filling up my vehicles if I see a fuel truck in the gas station lot- I had to deal with too many dirty fuel systems to take the chance. And even if you didn’t get water from a bad gas station fill up you could build up water from condensation on the roof of your fuel tank settling to the bottom.
Now we have a couple of paths to getting water into your car’s gas tank, where does that take the sugar myth? It doesn’t take a lot of water to dissolve sugar that finds its way into the tank, especially given the constant vibration and sloshing that happens in a moving vehicle, so now we can move the sugar solution along with the gasoline towards the engine. We still have a fuel filter to deal with, but they were generally simple paper filters designed to stop solids, not liquids, so our mix of gasoline and sugar water wouldn’t get stopped there. This assumes that the vehicle has a fuel filter at all- which is not a safe assumption if you go far enough back in time, or if you happen to be dealing with someone who bypassed their fuel filter “because it kept clogging up”. (If you think no one would ever do something that dumb, you have probably never worked a helpdesk).
And now the fuel hits the carburetor, where a little bowl acts as a reservoir for fuel before it finds its way into the intake system. Carburetors are full of tiny orifices, the kind that don’t like dirt, or much of anything other than clean gasoline and clean air. Sugar water can gum things up, block holes, or settle out into the bottom of the fuel bowl- and that’s where things are no longer theoretical. I had to clean out a few carburetors with sticky goo in them in my “gas station mechanic” days, and I recall one where we dropped the gas tank and found an ugly mess in the tank. Sugar in the tank could, under some circumstances, be annoying. Not catastrophic but mildly disruptive, and a genuinely unpleasant thing to do to someone.
What’s the moral of the story? I don’t think there is one, other than exaggeration and hyperbole feed urban legends whether they’re based on complete nonsense or a tiny grain of truth.
Bottom line, don’t put sugar in gas tanks. Not just because it won’t work, but because it’s a rotten thing to do.
Jack
Interesting research from Sasha Romanosky at RAND:
Abstract: In 2013, the US President signed an executive order designed to help secure the nation's critical infrastructure from cyberattacks. As part of that order, he directed the National Institute for Standards and Technology (NIST) to develop a framework that would become an authoritative source for information security best practices. Because adoption of the framework is voluntary, it faces the challenge of incentivizing firms to follow along. Will frameworks such as that proposed by NIST really induce firms to adopt better security controls? And if not, why? This research seeks to examine the composition and costs of cyber events, and attempts to address whether or not there exist incentives for firms to improve their security practices and reduce the risk of attack. Specifically, we examine a sample of over 12 000 cyber events that include data breaches, security incidents, privacy violations, and phishing crimes. First, we analyze the characteristics of these breaches (such as causes and types of information compromised). We then examine the breach and litigation rate, by industry, and identify the industries that incur the greatest costs from cyber events. We then compare these costs to bad debts and fraud within other industries. The findings suggest that public concerns regarding the increasing rates of breaches and legal actions may be excessive compared to the relatively modest financial impact to firms that suffer these events. Public concerns regarding the increasing rates of breaches and legal actions, conflict, however, with our findings that show a much smaller financial impact to firms that suffer these events. Specifically, we find that the cost of a typical cyber incident in our sample is less than $200 000 (about the same as the firm's annual IT security budget), and that this represents only 0.4% of their estimated annual revenues.
The result is that it often makes business sense to underspend on cybersecurity and just pay the costs of breaches:
Romanosky analyzed 12,000 incident reports and found that typically they only account for 0.4 per cent of a company's annual revenues. That compares to billing fraud, which averages at 5 per cent, or retail shrinkage (ie, shoplifting and insider theft), which accounts for 1.3 per cent of revenues.
As for reputational damage, Romanosky found that it was almost impossible to quantify. He spoke to many executives and none of them could give a reliable metric for how to measure the PR cost of a public failure of IT security systems.
He also noted that the effects of a data incident typically don't have many ramifications on the stock price of a company in the long term. Under the circumstances, it doesn't make a lot of sense to invest too much in cyber security.
What's being left out of these costs are the externalities. Yes, the costs to a company of a cyberattack are low to them, but there are often substantial additional costs borne by other people. The way to look at this is not to conclude that cybersecurity isn't really a problem, but instead that there is a significant market failure that governments need to address.
I published the following diary on isc.sans.org: “SNMP Pwn3ge“. Sometimes getting access to company assets is very complicated. Sometimes it is much easier (read: too easy) than expected. If one of the goals of a pentester is to get juicy information about the target, preventing the IT infrastructure to run
[The post [SANS ISC Diary] SNMP Pwn3ge has been first published on /dev/random]
Lester Holt led with topic of cybersecurity as the first question on national security in Monday's Presidential debate. [...]
The post Clinton, Trump Debate ‘Twenty-First Century War’ Of Cyberattacks appeared first on SecurityOrb.com.
Federal government agencies face sophisticated, persistent cyber attacks that present a major strategic and economic threat to the nation. Meeting this challenge takes a combination of technology and human ingenuity. But it is skilled human capital that is in short supply, says the Office of Management and Budget.
As we get back to our Endpoint Advanced Protection series, let’s dig into the lifecycle we alluded to at the end of the intro post. We laid out a pretty straightforward set of activities required to protect endpoint devices. Though to be clear, just because it’s straightforward, doesn’t mean it’s easy to do.
The reality is that at some point you have deice where endpoint protection starts and where it ends. Additionally, figuring out how it integrates with the other defenses you use in your environment is critical because we know that today’s attacks require more than just a single control, rather an integrated system to protect the devices. The other caveat we’ll add before we jump into the lifecycle is that we are actually trying to address the security problem here, not a compliance problem. We aim to actually protect the devices from advanced attacks. Yes, that is a very aggressive objective, and some would say probably crazy given the rate of change on the part of adversary sophistication. But all the same, we wouldn’t be able to sleep at night accepting mediocrity of our defenses, and we figure you are similar – so we’ll aspire to this lofty goal.
You need to know what you have, how vulnerable it is, and how exposed it is. With this information you can prioritize your exposure and design a set of security controls to protect it. You start by understanding what an adversary would be interested in within your environment. To be clear, there is something of interest in every organization. It could be as simple as compromising devices to launch attacks on other sites, or as focused as gaining access to your environment to steal your crown jewels. When trying to understand what an advanced attacker will probably come looking for, there is a fairly short list, including intellectual property, protected customer data, and business operational data (proposals, logistics, etc.)
Once you understand the potential targets you can begin to profile adversaries likely to be interested in them. The universe of likely attacker types hasn’t changed much over the past few years. You’re facing attacks from a number of groups across the sophistication continuum. These start with unsophisticated attackers (which may include a 400 pound hacker in a basement), organized crime, competitors, and/or state-sponsored adversaries. Understanding likely attackers provides insight into their tactics, which enables you to design and implement security controls to address the risks. But before you can design a security control set, you need to understand where the devices are, as well as their vulnerabilities.
This process finds the devices accessing critical data and makes sure everything is accounted for. This simple function helps avoid “oh crap” moments, as it’s no good to stumble over a bunch of unknown devices with no idea what they are, what they have access to, or whether they are cesspools of malware.
A number of discovery techniques are available, including actively scanning your entire address space for devices and profiling what you find. This works well enough and is traditionally the main method of initial discovery. You can supplement active discovery with a passive discovery capability, which monitors network traffic and identifies new devices based on network communications. Depending on the sophistication of the passive analysis, devices can be profiled and vulnerabilities can be identified, but the primary goal of passive monitoring is to find new unmanaged devices faster. Passive discovery is also helpful for identifying devices hidden behind firewalls and on protected segments which active discovery cannot reach.
As if you needed complications, this cloud and mobility thing that everyone keeps talking about does make discovery a bit more challenging. Embracing software as a service (SaaS), as pretty much everyone has, means that you may never get a chance to figure out exactly which devices are accessing critical resources. For these devices that don’t need to to through the corporate networks, you’ll need to use other means to ensure they are properly protected. That may involve a trigger upon authentication to a SaaS service or possibly having the endpoint protection capability leverage the cloud and phone home to relay telemetry about the device to a central management function. We’ll dig into these new (and emerging) use cases when we discuss detection and forensics.
Once you know what’s out there you need to figure out how vulnerable it is. That typically requires some kind of vulnerability scan on the devices you discovered. Key features to expect from your assessment function include:
The assessment provides perspective on how the specific device is vulnerable, but that doesn’t necessarily equate to risk. You presumably have a bunch of defenses in place on the network in front of your endpoints, so attackers may not be able to reach a vulnerable device. So you’ll need to factor that probability into the prioritization of the vulnerable devices.
It may not be as sexy as advanced detection or cool forensics technology, but these assessment tasks are necessary before you can even start thinking about building a set of controls to prevent advanced attacks. In the next post, we’ll dig into reducing attack surface and new and updated technologies that can help prevent the endpoint attacks in the first place.
- Mike Rothman (0) Comments Subscribe to our daily email digestA new malware tries to detect if it's running in a virtual machine or sandboxed test environment by looking for signs of normal use and not executing if they're not there.
From a news article:
A typical test environment consists of a fresh Windows computer image loaded into a VM environment. The OS image usually lacks documents and other telltale signs of real world use, Fenton said. The malware sample that Fenton found...looks for existing documents on targeted PCs.
If no Microsoft Word documents are found, the VBA macro code execution terminates, shielding the malware from automated analysis and detection. Alternately, if more than two Word documents are found on the targeted system, the macro will download and install the malware payload.
Neural networks are good at identifying faces, even if they're blurry:
In a paper released earlier this month, researchers at UT Austin and Cornell University demonstrate that faces and objects obscured by blurring, pixelation, and a recently-proposed privacy system called P3 can be successfully identified by a neural network trained on image datasets -- in some cases at a more consistent rate than humans.
"We argue that humans may no longer be the 'gold standard' for extracting information from visual data," the researchers write. "Recent advances in machine learning based on artificial neural networks have led to dramatic improvements in the state of the art for automated image recognition. Trained machine learning models now outperform humans on tasks such as object recognition and determining the geographic location of an image."
Research paper
So we’ve been working on our deception technologies research (have we mentioned we want to hear YOUR story about how YOU are using those?) and one of the things we are trying to understand is how organizations are building business cases for deceptions tools. As Anton said, most of the times deception will be seen as a “nice to have”, not a “must have”. With so many organizations struggling to get money for the musts, how would they get money for a should?
Anton mentioned two main lines to justify the investment:
In general, most arguments will support one of the two points above. However, I think we can add some more:
– More “business aligned” detection: with all these vendors doing things such as SCADA and SWIFT decoys, it looks like one of the key ideas to justify deception tools is the ability to make them very aligned to the attacker motivations. However, in the end, isn’t that just one way of supporting #1 above?
– Cheap (ok, “less expensive”) detection: most of the products out there are not as expensive as other detection technologies, and certainly are cheaper when you consider the TCO – Total Cost of Ownership. They usually cost less from a pure product price point of view and also require less gear/staff to operate. This is, IMO, the #3 on the list above, but could also be seen as an expansion of #2 (high quality alerts -> less resources used for response -> less expensive).
– Less friction or reduced risk of issues: Some security technologies can be problematic to implement, but it’s hard to break anything with deception tools; organizations that are too sensitive about messing with production environments might see deception as a good way to avoid unnecessary risks of disruption. I can see this as an interesting argument for IoT/OT (sensitive healthcare systems, for example). Do we have a #4?
– Acting as an alternative control: This is very similar to the point above. Some organizations will have issues where detection tools relying on sniffing networks, receiving logs or installing agents just cannot be implemented. Think situations like no SPAN ports or taps available/desirable, legacy systems that don’t generate events, performance bottlenecks preventing the generation of log events or installation of agents, etc. When you have all those challenges and still want to improve detection, what do you do? Deception can be the alternative to not doing anything. This looks like a strong #5 to me.
– Diversity of approaches: This is a bit weak, but it makes some sense. You might have many detection systems at network and endpoint level, but you’re still looking for malicious activity among all the noise of normal operations. Doesn’t it just make sense to have something that approaches the problem differently? I know it’s a quite weak argument, but surprisingly I believe many attempts to deploy deception tools start based on this idea. At least for me it is worth a place on the list.
With all these we have a total of 6 points that could be used to justify an investment in deception technologies. What else do you see as a compelling argument for that? Also, how would you compare these tools to other security technologies if you only have resources or budget to deploy one of them? When does deception win?
Again, let us hear your stories!
The post Building a Business Case for Deception appeared first on Augusto Barros.
A new piece of Mac malware, dubbed Komplex, has been discovered by Palo Alto Networks. This malware provides a backdoor into the system, like most other recent Mac malware. Where it gets most interesting, though, isn't in its capabilities, but in the connections it allows us to make.
Categories: Tags: KomplexmacMacKeepermalwarePalo Alto NetworksSofacy |
Brian Krebs writes about the massive DDoS attack against his site. In fact, the site is down as I post this.
According to the FBI the incursion of ransomware has just gone from bad to worse. In a recent alert, the U.S. Federal Bureau of Investigation (FBI) warned that recent ransomware variants have targeted and compromised vulnerable business servers to identify and target hosts, thereby multiplying the number of potential infected servers and devices on a network. More…
The post The Era of Proportional Ransomware Has Arrived appeared first on Speaking of Security - The RSA Blog.
One of the things that struck me watching today's Ignite keynote announcement was what wasn't said, at least not immediately: That Microsoft is a mobile-first, cloud-first company.
The company still definitely is: They boasted that they're one of the biggest app publishers on Android and iOS and showcased endless datapoints showing Azure's successes, including noting that it now has 34 regions, twice the number of AWS.
Conference goers busy hacking APT! |
This week a security issue was found with the way iTunes secures iOS 10 device backups. Described as a “major security flaw” by Elcomsoft this issue allows an attacker to attempt and break the passcode on the backup 2500 times faster than before. For some reason Apple uses an alternative password verification method for iOS ...
The post Your iOS 10 device iTunes backup is still perfectly safe appeared first on SecuritySpread.
Vulnerable Software Packages on Arch Linux Vulnerabilities happen and are usually fairly quickly fixed. This is also true for Arch Linux. This rolling distribution can be considered to be always up-to-date, as it uses the latest versions of software packages from the upstream. When there is an update, it doesn’t take long that is becomes available in the package manager pacman. One problem that remained was the inability to quickly test if you have any vulnerable packages. After all running pacman -Suy daily [...]
The post Show vulnerable packages on Arch Linux with arch-audit appeared first on Linux Audit.
Today we bring back a blog of the past. With the Yahoo Breach still a hot topic of cyber news we here at AsTech cannot stress enough the importance of password security whether it’s using salted hashes or as in … Continue reading →
The post A Blog of the Past – Using Secure Managers for Passwords appeared first on AsTech Consulting.
The recent news of the Yahoo breach and leak of hundreds of millions of passwords, names, dates of birth, and other
personal information has led to headlines across the country. Understandably, given Yahoo’s popularity, people are worried. Especially as a summer dominated by news of leaks, hacks, and foreign intelligence agencies with nefarious agendas comes to an end.
Given that reports suggest that the initial breach of this data occurred in 2014, one of the primary concerns about this type of data dump are password reuse attacks, where cybercriminals take previously compromised credentials and use them to break into accounts on other platforms where the victim used the same username/password combination. It’s only a matter of time before criminals use the credentials leaked in the Yahoo breach to attempt to compromise other accounts, such as financial accounts or social media profiles.
In July we learned that 10% of the UK population have been the victims of e-Crime – albeit nearly always reimbursed, having “only” suffered the hassle of a refused card and a couple of days struggle to get the cash to survive until they received a new card. Earlier this week we learned that on-line...
The post The 50% e-Crime rise and Yahoo revelations show how right the CMS Select Committee was appeared first on When IT Meets Politics.
It’s that time of week again. Our Threat Recap is bringing you the top news in cybersecurity from new OS releases to remote access of popular cars. Here are five of the...read more
The post Threat Recap: Week of September 19th appeared first on Webroot Threat Blog.
A Lego model of a giant space kraken destroying a Destroyer from Star Wars.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
I like this Amtrak security awareness campaign. Especially the use of my term "security theater."
Organizations are learning (don’t worry, most have done the learning) that if they don’t do encryption right – people will have access to sensitive data. With encryption and other cryptographic technologies acting as building blocks within a larger, layered IT security strategy, it’s clear that there are multiple needs for these technologies across enterprises, as more information is collected, stored and used throughout organizations. But these basic security needs don’t just stop at the enterprise level. Cloud service providers need […]
The post What Can Automation and Innovation do for your Organization? appeared first on Data Security Blog | Vormetric.
Strata + Hadoop World in NYC, set for the end of September, is quickly coming up. The Strata + Hadoop World Conference is a unique experience that helps attendees tap into the opportunity that big data presents. Hadoop, an open-source software framework for storing and processing big data, has become so popular because its unique […]
The post September Starts Strata + Hadoop World NYC appeared first on HPE Security - Data Security.
If your company doesn’t have a crisis communication function, and doesn’t have a breach readiness plan, in the event of a public security incident it’s highly likely you will be the one everyone looks at when the CEO says ‘now what do we do?’ How do we manage the media? What do we tell customers, analysts, investors?…
The post Planning for a Breach Crisis appeared first on Speaking of Security - The RSA Blog and Podcast.
Impressive remote hack of the Tesla Model S.
The vulnerability has been fixed.
Remember, a modern car isn't an automobile with a computer in it. It's a computer with four wheels and an engine. Actually, it's a distributed 20-400-computer system with four wheels and an engine.
Today we’re releasing our quarterly Hacked Website Report for 2016/Q2. The data in this report is based on compromised websites we worked on, with insights and analysis performed by our Incident Response Team (IRT) and Malware Research Team (MRT). CMS Analysis Our analysis consisted of over 9,000 infected websites. The graphs below show a side-by-side...
The post Hacked Website Report – 2016/Q2 appeared first on Sucuri Blog.
To get a leg up against a rising tide of mobile malware activity, don't just phone it in—secure your mobile phone with these tried and true methods.
Categories: Tags: mobile phone securitymobile security |
This is an interesting back-and-forth: initial post by Dave Aitel and Matt Tait, a reply by Mailyn Filder, a short reply by Aitel, and a reply to the reply by Filder.
Like the Internet, the Internet of Things (IoT) is going to be a part of our everyday life, with an increasing number of devices establishing connections – from smart light bulbs to connected cars and everything in between. However, as businesses and individuals alike begin to enjoy the conveniences associated with increased connectivity, these clear benefits lead to clear vulnerabilities. Increased Connectivity = Increased Risks As we’ve seen many times, attackers can often hack into connected products with shocking ease. […]
The post Driving Connected Car Security Forward appeared first on Data Security Blog | Vormetric.
When it comes to security, it pays to be completely honest with yourself. After all, you may be able to hide weaknesses in your network from yourself, but that won’t stop threat actors from finding them.
If you are totally honest with yourself, you’ll realize there’s no way to completely shield your users from attacks.
You can tighten your spam filter, keep a watchful eye on user permissions, and buy in the best endpoint security package you can afford… but still, some attacks will make it through. And if your users are like most people, right now they aren’t even close to being ready to cope with that. We explored this previously in Why Some Phishing Emails Will Always Get Through Your Spam Filter.
We believe people can be the last line of your network defense – and do a damn good job of it – but first they have to be trained.
Here are a few ideas to get you started.
Digitization - the use of social, mobile, analytics, and cloud technologies to generate, process, store and communicate data - is transforming everything, with profound implications on how we learn, work and play.
“Digital transformation is not just a technology trend, it is at the center of business strategies across all industry segments and markets,” stated IDC.
The website for Just For Men, a company that sells various products for men, had their website breached and was serving a password stealing Trojan. The malicious code embedded in the WordPress site was part of the EITest campaign and pushed the RIG exploit kit.
Categories: Tags: anti exploitCombeeitestexploit kitJust For MenjustformenmalwareRIG EKtrojanwordpress |
"Periscope skimmers" are the most sophisticated kind of ATM skimmers. They are entirely inside the ATM, meaning they're impossible to notice.
They've been found in the US.
Jacob Ajit, a 17 year old teen from Alexandria, Virginia has just hacked his way into getting free data for his phone.
When asked how he figured it all out, he casually said that he was just investigating how networks are configured until he found a little loophole. He discovered the loophole inside the T-Mobile network.
He knows that T-Mobile will quickly fill in the loophole, but in the meantime, he just wanted to share his findings with the community.
He figured out how to get free data while playing with a prepaid T-mobile service on his phone.
The post A 17 Year Old Kid Discovers A Way To Get Free Data On Phone appeared first on Cyber Security Portal.