Malware Devil

Sunday, November 15, 2020

ENISA: Top 15 Threats: Spam, Phishing, and Malware!

ENISA’s Top 15 Threats report starts with this summary document: 

The list of the Top 15 Threats is an annual list from ENISA, with only slight changes in positions for the various threats since last year. Malware remains in the Number 1 spot, and Web-based attacks remains Number 2. Phishing actually increased from 4th to 3rd position. Spam also rose this year, from 6th to 5th position. The threat making the greatest movement was Identity Theft, jumping from 13th to 7th position!

    
  A full report from ENISA is available for each of the topics below. Click to access each one. I’ll only comment on a few in this blog post!
    1. Malware
    2. Web-based Attacks
    3. Phishing
    4. Web Application Attacks
    5. Spam 
    6. DDOS 
    7. Identify Theft
    8. Data Breach 
    9. Insider Threat
    10. Botnets
    11. Physical manipulation, damage, theft and loss
    12. Information Leakage 
    13. Ransomware
    14. Cyber espionage
    15. Cryptojacking 

#1 Cyber Threat – Malware

ENISA ranks Malware as the #1 threat again, pointing out several troubling trends.  Detection of malware on Business-owned Windows computers went up 13% from the previous year, and 71% of malware infections had spread from one infected user to another.  46.5% of malware delivered by email used a “.docx” file extension, indicating that our continued unsafe business practice of sharing Word documents by email continues to put our organizations and our employees at risk!  Another change was that 67% of malware was delivered via an encrypted HTTPS connection — the “increased safety” of having encrypted web pages has also greatly increased our difficulty in understanding when an employee is receiving malware by visiting a webpage.
The number one malware family in this reporting period was Emotet, which targeted US-based businesses 71% of the time and UK targets 24% of the time.  
An increasing number of banking trojans were also seen that targeted the Android operating system.  Top families included Asacub, SVPeng, Agent, Faketoken, and HQWar.
 The so-called File-less Malware was also a significant attack method, often using Windows Management Instrumentation or PowerShell scripts to perform complex attacks more or less “at the command line” rather than by downloading a Windows PE Executable.

For C2-based malware, a growing trend in having Russian-based Command & Control servers was observed, with the likelihood of a Russian-host going up 143% from the previous reporting period.  these malware families included Emotet, JSECoin, XMRig, CryptoLoot, Coinhive, Trickbot, Lokibot, and AgentTesla (according to MalwareBytes, quoted in the report.)

ENISA says that 94% of all malware deliveries were via email during 2019, quoting from the EC3 Internet Organised Crime Threat Assessment.   Many such attacks were enabled by employee behavior and gained extended reach due to vulnerabilities in Windows, several of which allowed Remote Code Execution, making malware attacks “wormable” and able to spread throughout the enterprise, often due to poor patch management.
Proposed actions in this report include the need for better in-bound screening, including the ability to decrypt and inspect SSL/TLS traffic as it comes into the network, including web, email, and mobile applications.  Security policies must also be updated to include what processes and escalations must occur “post-detection” in the case of an infection.  Log monitoring must be improved.  
One suggestion that I strongly agree with — “Organizations need to disable or reduce access to PowerShell functions” — so much malware this year, especially ransomware, would be stopped cold in its tracks if PowerShell were not so prevalently deployed and enabled in our organizations!  
Although it is not mentioned by ENISA, my favorite document for understanding PowerShell threats is “The art and science of detecting Cobalt Strike” from our friends at Talos Intelligence!  More than any other attack platform, Cobalt Strike is being abused by malicious actors in order to fully compromise domains, often for the purpose of exfiltrating and encrypting for ransomware.
Please refer to the full report for additional recommendations.

#2 Cyber Threat – Web-Based Attacks

Web-Based Attacks are broken into four main vectors by ENISA.  Drive-by downloads, Watering hole attacks, Form-jacking, and Malicious URLs. 
As noted in part one, due to the age of the reporting window (January 2019 to April 2020) some of the particular attacks noted are more historical and of less keen interest by this time, however a couple trends are worth calling attention to.
“MageCart” attacks continue to be a prominent method for acquiring financial credentials.  Because of the vast popularity of a small handful of online “checkout” systems, many organized crime groups are investing heavily in hackers who have “nation-state” level capabilities in order to create new zero day attacks into these systems.  Shoppers are basically defenseless as their order information is transparently transmitted to criminals while they shop at even the largest and most prominent “trust-worthy” online vendors. 
In addition to browser vulnerabilities that can make watering hole attacks quite successful, attackers are also attacking popular web browser extensions, which often have less rigorous security updates than the base browser products themselves.
Content Management Systems also present an enormous footprint of vulnerability as platforms such as WordPress provide millions of vulnerable websites that can be used at will by hackers to host both phishing sites and malware payload files.

#3 Cyber Threat – Phishing

Phishing has historically been email-based crime that lures a target to an illicit website via a social engineering email.  It is the key to $26 Billion in losses due to Business Email Compromise, as well as to a growing number of scams linked to the COVID-19 Pandemic.  In the FIRST MONTH of the COVID-19 Pandemic, ENISA reports that phishing attacks increased 667%!  As previously mentioned, these dangerous emails are now very likely to contain a trojaned Microsoft Office family document.  
ENISA warns that phishing URLs are now being seen more frequently delivered via SMS, WhatsApp, and Social Media platforms, expanding beyond the original email platform.
While phishing historically targeted financial institutions, ENISA says that webmail became the leading target of phishing in Q1 of 2019, with Microsoft 365 services being particularly targeted.
User education and user reporting remains a critical strategy, especially as ENISA says that 99% of phishing emails require human interaction in order to be effective.
The most effective means to combat phishing continues to be the implementation of 2FA. If a phisher cannot gain access to an account with simple userid and password, many schemes would be immediately blocked.
From a financial perspective, wiring money should ALWAYS require out of band confirmation.  The cost of not getting the confirmation is simply too high, with some Business Email Compromise attacks costing tens of millions of dollars!

#5 Cyber Threat – Spam 

As the ENISA report on Spam menions, after 41 years of dealing with spam, “nothing compared with the spam activity seen this year with the COVID-19 pandemic!”
During the reporting period, Emotet, Necurs, and Gamut were some of the top spamming families.
Some other findings: 
85% of all emails exchanged in April of 2019 were spam, a 15-month high.
13% of data breaches could be traced back to malicious spam.
83% of companies were unprotected against email-based brand impersonation (DMARC)
42% of CISOs reported dealing with at least one spam-based security incident.
To bring this category up to date, we noticed that ENISA was fond of the Quarterly Spam & Phishing reports from Kaspersky.  Please find below links to the 2020 Q1, Q2, and Q3 reports from Kasperky, which will technically be part of NEXT year’s ENISA reporting:
Kaspersky found that throughout the third quarter, spam was at least 48.9% of all email sent, a slight decline from Q2, however the portion of spam containing malicious emails was up significantly.  Kaspersky identified 51 Million malicious attachments in that quarter, with 8.4% of them being the keylogger commonly known as Agent Tesla (Kaspersky uses the name “Trojan-PSW.MSIL.Agensla.gen”). Microsoft Office documents exploiting CVE-2017-11882 were the second most common.
They also noted 103 million phishing attacks, with the top targeted sectors being Online Stores (19.2%) and Global Web Portals (14.48%) which would include Office365.  Only 10.8% of the phishing attacks observed by Kaspersky targeted banks!
My favorite spam campaign here was the “FTC Official Personal Data Protection Fund” which claimed that the Federal Trade Commission had found that the recipient was a victim of “personal data leakage” and they were eligible to be compensated for that loss, if they just filled out a simple form on their website (which harvested personal data, including credit card and social security number.) 

The post ENISA: Top 15 Threats: Spam, Phishing, and Malware! appeared first on Security Boulevard.

Read More

The post ENISA: Top 15 Threats: Spam, Phishing, and Malware! appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/enisa-top-15-threats-spam-phishing-and-malware/?utm_source=rss&utm_medium=rss&utm_campaign=enisa-top-15-threats-spam-phishing-and-malware

The ENISA Cybersecurity Threat Landscape

 ENISA, the European Union Agency for CyberSecurity, met on October 6, 2020 to review their current recommendations and get any last minute changes.  On October 20, 2020, they released a huge batch of reports that many folks seem to have not seen.  We wanted to take a moment to give you the guided tour and strongly recommend the consumption of these report.  Each publication is available “flip book” style on the ENISA website, and also as a downloadable PDF.

Let’s get started!

https://www.enisa.europa.eu/publications/year-in-review 

This is the 8th Year In Review for ENISA and their reporting just keeps getting better!  This year the main components of the report break down into topics like this: 

  • The Year In Review
  • Cyber Threat Intelligence Overview 
  • Sectoral and Thematic Threat Analysis 
  • Main Incidents in the EU and WorldWide
  • Research Topics
  • Emerging Trends
  • List of Top 15 Threats 

The Year In Review 

This report has a few key sections.  The first that we’ll cover is the “Ten Main Trends” that were observed during the reporting period: 

  1. Attack surface in cybersecurity continues to expand as we are entering a new phase of the digital transformation 
  2. There will be a new social and economic norm after the COVID-19 pandemic even more dependent on a secure and reliable cyberspace.
  3. The use of social media platforms in targeted attacks is a serious trend and reaches different domains and types of threats.
  4. Finely targeted and persistent attacks on high-value data (e.g. intellectual property and state secrets) are being meticulously planned and executed by state-sponsored actors
  5. Massively distributed attacks with a short duration and wide impact are used with multiple objectives such as credential theft
  6. The motivation behind the majority of cyberattacks is still financial 
  7. Ransomware remains widespread with costly consequences to many organisations
  8. Still many cybersecurity incidents go unnoticed or take a long time to be detected
  9. With more security automation, organizations will invest more in preparedness using Cyber Threat Intelligence as its main capability
  10. The number of phishing victims continues to grow since it exploits the human dimension being the weakest link.
Another key section in this area was the “What To Expect” which broke the topic into three areas — Nation States, Cyber Offenders, and Cyber Criminals.  The reader is invited to view the full report, but I did want to mention that with regards to Nation States, ENISA describes the coming year as an “Uncontrolled cyber-arms race” with a free-for-all of nation states trying to buy up and acquire the best attack tools for the “cyberspace warfare domain” possibly through sponsored agents who may not present as the purchasing nation.
In the area of What to Expect From Cyber Criminals … BEC – Business Email Compromise, and BPC – Business PROCESS Compromise are expected to continue, along with malware targeting Managed Service Providers.  They predict that “Deep Fakes Used for Fraud” may be a rising trend.  I’m not sold on this concept as being a 2021 reality, but it is certainly something to watch for.
I also wanted to call attention to the prediction that Cyberbullying is likely to greatly increase as a growing number of adolescents are spending a much greater time online, possibly with limited parental oversight of their activities, as Mom and Dad are busy working from home as well!

Cyber Threat Intelligence Overview 

In this area, training resource links are offered, however the report begins by calling attention to the great gap between higher performing CTI practices and the training and tools available to the average user.  While praising existing frameworks, such as MITRE: ATT&CK, they also point out the short-comings in addressing specialized sector-specific systems, emerging systems, and cloud-computing and managed service threats.
The call is made to spend more emphasis on PREVENTION, DETECTION, and MITIGATION rather than the current near-total obsession with IOCs and APT-naming. Some sectors are especially trailing in the CTI area due to the specialty nature of their equipment and practices.  ALL SECTORS need to be greatly improving their capabilities in PDR (to use the more common Prevent, Detect, Respond term that I still prefer.)  The report calls attention to the fact that trailing sectors are often dealing with limited trust between organizations.  The more isolated your organization is from its peers, the more likely that your sector is struggling in this way.  Improved information sharing is a key.  To quote the report: “one should note that the deficiencies described are not due to a lack of CTI knowledge per se but rather to the lengthy cross- and intra-sector communication and coordination cycles for exchanging CTI knowledge.”  A related quote => “Existing offerings concentrate on operational and tactical CTI, while strategic CTI is mostly offered independently.”
Results are shared of a “Comprehensive CTI Survey” conducted by ENISA.  Some key findings include: 
  • CTI is still primarily a MANUAL PROCESS in most organizations.
  • Much CTI data is still primarily being passed through spreadsheets and email.
  • CTI Requirements are becoming more defined and beginning to take significant guidance from business needs and executive input.
  • CTI from Public Sources combined with observations from internal network and system monitoring is a popular model
  • Open-source information, enriched by threat feeds from CTI vendors is a “clear upwards trend” indicating more focus on internal CTI production.
  • Threat Detection is described as the main use for CTI, with IOCs being a base, but more interest in TTPs in the area of threat behavior and adversary tactics.
  • Only 4% of respondents felt they could measure the effectiveness of their CTI programs!  OUCH!  Machine learning was ranked especially low, with most saying the skill of the analysts was the best predictor of success!
Several areas of interest in the “Next Steps” section to me included:
–  an emphasis on coordinating CTI requirements.  While the report called for this at the EU-member state level, I would say that SECTORS should be working together to determine appropriate CTI requirements and encouraging a sector-wide improvement through collaboration.  
– development of a CTI Maturity model and Threat Hierarchies model.
– ensuring that CTI is taking into account the geopolitical world state and not just the state of bits and bytes.
Please refer to the full report for more details!  

Sectoral and Thematic Threat Analysis 

This report begins by describing the difficulty of measuring and categorizing differences by sector. I must confess to being disappointed by the lack of insights in this particular report.  As sectors shifted to the cloud during the COVID-19 Pandemic, much of the “targeting” became less sector-targeting and more “target of opportunity” focused. 
While most attack trends were “stable” there were some “cross-sector” attack types described as “Increasing” … specifically Web Application Attacks, Phishing, and Malware.
The only sector actually that was called out as being at significantly greater risk than others based on incident trends was “Health/Medical” where increases in Malware, Insider Threat, and Web Application Attacks were all marked as Increasing.
After a lack-luster “trends” report, all of two pages long, the remainder of the report focuses on Threats to Emerging Technologies, where there are some interesting observations regarding 5G Mobile communications, Internet-of-Things (IoT), and Smart Cars.
The reader is invited to visit the report for more details.

Main Incidents in the EU and WorldWide

Unfortunately, with the official timeline of this report being January 2019 through April 2020, many of the “main incidents” here are quite dated.  Good to cover them for historical documentation, but not really worth re-hashing them at this time. Significant data breaches included the 770 million email addresses stolen from MEGA (the cloud data storage service in New Zealand run by “Kim Dot Com”.) They also mention breaches such as ElasticSearch, Canva, Dream Market, Verifications.io, and a couple big MongoDB breaches.
The most targeted services, according to this report, are Digital Services, Government Administration, Tech Industry, Financial Institutions, and Healthcare entitites.  In the area of Digital Services, we know that the primary use is to take the email address/password pairs and use them to attempt password replay attacks attempting to use the same pair against many additional online properties.  ENISA refers to those as “credential stuffing” attacks and indicates that “companies experience an average of 12 credential-stuffing attacks each month!” 
The report indicates that 84% of cyber attacks “rely on social engineering” and that 71% of the organizations with malware activity have seen the malware spread from one employee to another. 
Groups that are depicted in the report as “Most active actors” don’t really align with what we’ve seen from other sources, but are listed as: 
  • TURLA – attacking Microsoft Exchange serveres
  • APT27 – mentions attacks against government SharePoint servers in the Middle East 
  • Vicious Panda – targeting Mongolian government entities
  • Gamaredon – spear-phished the Ministry of Defence in Ukraine in December 2019

The report indicates that ENISA believes most cyber attacks originate from Organized Crime groups.

The Top Five motivations for attackers are: Financial, Espionage, Disruption, Political, and Retaliation.
The Top Five “Most Desired Assets” by Cyber Criminals are listed as: 
  1. Industrial property and Trade secrets
  2. State/Military classified information
  3. Server infrastructure
  4. Authentication Data
  5. Financial Data 
I won’t detail is here, but the report also has advice on “What changed in the landscape with the COVID-19 Pandemic?” and refers to several previous publications from ENISA for that topic.

Research Topics

ENISA says that “apart from basic cybersecurity hygiene and training, investing in research and innovation is the most viable option for defenders.” Some of the key areas that they are encouraging research to be performed are: 
  • Better understanding of the human dimension of security – (I know so many great researchers in this space, from UAB’s own Nitesh Saxena, to UAB’s Ragib Hasan and his current survey on “User Preferences in Authentication” to Carnegie Mellon’s Lorrie Cranor and the IIIT Delhi PreCog lab run by Ponnurangam “PK” Kumaraguru.) 
  • Cybersecurity research and innovation – with a special focus on building “test labs and cyber ranges” that better reflect real world deployments. 
  • 5G Security 
  • EU Research and Innovation Projects on Cybersecurity 
  • Rapid dissemination of CTI methods and content 

Emerging Trends

This report begins by pointing out that COVID-19 has initiated “new and profound changes in the physical world and in cyberspace” and pointing out that “cybersecurity risks will become harder to assess and interpret due to the growing complexity of the threat landscape, adversarial ecosystem and expansion of the attack surface.”
The Emerging Trends are given as three trend lists — Ten Cybersecurity Challenges; Five Trends with cyber threats; and Ten emerging trends in attack vectors.  As I’ve said a few times, go check out the report for the full details, but a few really caught my eye, which I’ll comment on below:
Cybersecurity Challenge 1 – Dealing with systemic and complex risks.  The interconnectedness of our systems and networks means that a risk introduced in one part of the environment can quickly spread throughout our organizations.  The demands of reducing complexity and increasing ease of management has unfortunately caused many organizations to create flat network structures where a single Active Directory domain may touch every resource in the environment and where network segmentation has become almost non-existent.
Unfortunately many of the other “emerging trends” in the cybersecurity challenges are seem more like wishful thinking than an emerging trend.  Reducing unintentional errors, automation of CTI ingestion, Reducing alarm fatigue and false positives, and cloud migration protections are all things we would love to see, but calling them an “emerging trend” strikes me as premature.  A few that I definitely agree with however include the role of CTI and the lack of a skilled workforce.
Cyber Threat Intelligence (CTI) is needed to help with the WHY, the HOW, and the WHAT questions.  The report points out “the value proposition of any CTI capability or program is to improve the preparedness of the organization to protect its critical assets from unknown threats.” Anticipating the unknown requires a deeper understanding of both threat and adversary – not just in the form of specific Indicators of Compromise (IOCs) but in the form of TTPs – based on the Tactics, Techniques and Procedures – as evidenced by observations made both from open source intelligence (OSINT) but also through same sector and cross-sector intelligence sharing is going to be a key to hardening and preparing the organization to address forth-coming attacks instead of constantly reacting to known attacks.
Just as we see in the US, a shortage in cybersecurity skills is hitting the EU hard. 70% of firms say that lack of skills is hampering investment in new technologies, and 46% of firms report difficulty filling vacancies in cybersecurity due to a lack of skilled applicants.  In the US, I constantly refer students to the Cybersecurity Supply/Demand Heatmap maintained by Cyberseek.org.  Currently they are showing 521,617 cybersecurity vacancies just in the United States!
The final “Emerging Trends” area – Ten Emerging Trends in Attack Vectors –  has a few that I wanted to call attention to as well.  I’ll share the list and comment on a few:
  1. Attacks will be massively distributed with a short duration and a wider impact
  2. Finely targeted and persistent attacks will be meticulously planned with well-defined and long-term objectives
  3. Malicious actors will use digital platforms in targeted attacks
  4. The exploitation of business processes will increase
  5. The attack surface will continue expanding 
  6. Teleworking will be exploited through home devices
  7. Attackers will come better prepared 
  8. Obfuscation techniques will sophisticate 
  9. The automated exploitation of unpatched systems and discontinued applications will increase
  10. Cyber threats are moving to the edge 
A key thread that flows through many of these trends is that attacks will move to new less defended “soft spots.”   The report mentions banking trojans being downloaded from the Google Play store, attacks against routers, switches and firewalls rather than servers, and attacks being presented through apps that are skating on the edge between personal and business apps, such as SMS, WhatsApp, SnapChat and various messaging platforms, as well as gaming and streaming apps that may be present on devices being used to “work from home.”

List of Top 15 Threats 

The next post will address the ENISA “Top 15 Threats” 

The post The ENISA Cybersecurity Threat Landscape appeared first on Security Boulevard.

Read More

The post The ENISA Cybersecurity Threat Landscape appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/the-enisa-cybersecurity-threat-landscape/?utm_source=rss&utm_medium=rss&utm_campaign=the-enisa-cybersecurity-threat-landscape

When good URLs are bad for business

Analyzing memory dumps comes with a price – ‘good’ information overload. One that annoys me a lot is running URl/domain extraction tools over the memdump and finding tones of legitimate […]
Read More

The post When good URLs are bad for business appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/when-good-urls-are-bad-for-business-2/?utm_source=rss&utm_medium=rss&utm_campaign=when-good-urls-are-bad-for-business-2

DEF CON 28 Safe Mode Voting Village Village – Ben Dubow’s ‘How Influence Warfare Subverts Democracy’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel. Enjoy!

Permalink

The post DEF CON 28 Safe Mode Voting Village Village – Ben Dubow’s ‘How Influence Warfare Subverts Democracy’ appeared first on Security Boulevard.

Read More

The post DEF CON 28 Safe Mode Voting Village Village – Ben Dubow’s ‘How Influence Warfare Subverts Democracy’ appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/def-con-28-safe-mode-voting-village-village-ben-dubows-how-influence-warfare-subverts-democracy/?utm_source=rss&utm_medium=rss&utm_campaign=def-con-28-safe-mode-voting-village-village-ben-dubows-how-influence-warfare-subverts-democracy

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 303’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics .

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics.

Permalink

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 303’ appeared first on Security Boulevard.

Read More

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 303’ appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/robert-m-lees-jeff-haas-little-bobby-comics-week-303/?utm_source=rss&utm_medium=rss&utm_campaign=robert-m-lees-jeff-haas-little-bobby-comics-week-303

When good URLs are bad for business

Analyzing memory dumps comes with a price – ‘good’ information overload. One that annoys me a lot is running URl/domain extraction tools over the memdump and finding tones of legitimate URLs that make it harder to find the juicy stuff I am after. I mean, things like:

  • http://www.w3.org/2001/XMLSchema-instance
  • http://www.w3.org/2000/svg
  • http://www.w3.org/1999/xlink
  • http://www.w3.org/XML/1998/namespace
  • http://www.w3.org/1999/xhtml
  • http://www.w3.org/2000/xmlns/
  • http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd
  • http://update.microsoft.com
  • http://schemas.microsoft.com/rtc/2009/05/simplejoinconfdoc

There is a lot of ‘good’ URLs embedded in manifests, various resources (e.g. HTML/XML/Json/CSS files), certificates, and many are introduced as a side-effect of linking with static libraries that often include copyright information and URL to author’s page. And of course, there is vendor information either directly in the resources or in binary or its config files.

Not only memory dump analysis suffer from it. The same goes for network log analysis – lots of requests that ‘hide’ the juicy stuff are related to authentication checks, downloads from certificate stores, etc..

In an effort to help with analysis I started building a small repository of these ‘good’ URL (at the moment primarily related to certificates). I extracted these from my ‘good’ sample repository so I believe all of them are legitimate. If you find any error, please let me know.

You can download the repo here.

Read More

The post When good URLs are bad for business appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/when-good-urls-are-bad-for-business/?utm_source=rss&utm_medium=rss&utm_campaign=when-good-urls-are-bad-for-business

DEF CON 28 Safe Mode Voting Village Village – Martin Mickos’ ‘See Something, Say Something’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel. Enjoy!

Permalink

The post DEF CON 28 Safe Mode Voting Village Village – Martin Mickos’ ‘See Something, Say Something’ appeared first on Security Boulevard.

Read More

The post DEF CON 28 Safe Mode Voting Village Village – Martin Mickos’ ‘See Something, Say Something’ appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/def-con-28-safe-mode-voting-village-village-martin-mickos-see-something-say-something/?utm_source=rss&utm_medium=rss&utm_campaign=def-con-28-safe-mode-voting-village-village-martin-mickos-see-something-say-something

oledump’s ! Indicator, (Sun, Nov 15th)

In diary entry “AV Cleaned Maldoc” I analyze a malicious document with VBA code that has been removed by anti-virus.

As the VBA code has been wiped, no M or m indicators are present:

I’ve updated my oledump.py to add a ! indicator for such streams:

I also compiled an overview of oledump’s indicators.

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post oledump’s ! Indicator, (Sun, Nov 15th) appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/oledumps-indicator-sun-nov-15th/?utm_source=rss&utm_medium=rss&utm_campaign=oledumps-indicator-sun-nov-15th

Montana CISO Shares State Security Actions and Priorities

Back in 2014, I first interviewed the technology and security leaders in “Big Sky Country” for this blog. A lot has changed in the past six years, including the state’s government technology and security leadership. But what hasn’t changed is a focus on excellence and professionalism in public service that continues to surprise observers around..

The post Montana CISO Shares State Security Actions and Priorities appeared first on Security Boulevard.

Read More

The post Montana CISO Shares State Security Actions and Priorities appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/montana-ciso-shares-state-security-actions-and-priorities/?utm_source=rss&utm_medium=rss&utm_campaign=montana-ciso-shares-state-security-actions-and-priorities

Who Caused 2018 Power Outages in Russia?

It was 1984 when Severomorsk, Russia hit the news for a horrible tragedy. A navy weapons depot caught fire and exploded, killing hundreds. …the Central Intelligence Agency learned of the accident from travelers, then positioned satellites and electronic devices to assess the damage. Those sources said the death toll was estimated at between 200 and … Continue reading Who Caused 2018 Power Outages in Russia?

The post Who Caused 2018 Power Outages in Russia? appeared first on Security Boulevard.

Read More

The post Who Caused 2018 Power Outages in Russia? appeared first on Malware Devil.



https://malwaredevil.com/2020/11/15/who-caused-2018-power-outages-in-russia/?utm_source=rss&utm_medium=rss&utm_campaign=who-caused-2018-power-outages-in-russia

Saturday, November 14, 2020

DEF CON 28 Safe Mode Voting Village Village – Amélie Koran’s ‘Hacking Democracy II: On Securing An Election’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel. Enjoy!

Permalink

The post DEF CON 28 Safe Mode Voting Village Village – Amélie Koran’s ‘Hacking Democracy II: On Securing An Election’ appeared first on Security Boulevard.

Read More

The post DEF CON 28 Safe Mode Voting Village Village – Amélie Koran’s ‘Hacking Democracy II: On Securing An Election’ appeared first on Malware Devil.



https://malwaredevil.com/2020/11/14/def-con-28-safe-mode-voting-village-village-amelie-korans-hacking-democracy-ii-on-securing-an-election/?utm_source=rss&utm_medium=rss&utm_campaign=def-con-28-safe-mode-voting-village-village-amelie-korans-hacking-democracy-ii-on-securing-an-election

Weekly News Roundup — November 8 to November 14

Hello and welcome to Sec Soup, where the weekly newsletter has a collection of infosec links to Tools & Tips, Threat Research, and more! The focus trends toward DFIR and threat intelligence, but general information security and hacking-related topics are included as well. This list is not vetted nor intended to be an exhaustive source. Keeping up with the enormous volume of security-related information is a daunting task, but this is my way of filtering the most useful items and improving the signal to noise ratio. Happy Reading!

Industry Reports, News, and Miscellany

Threat Research 

Tools and Tips

Breaches, Government, and Law Enforcement 

Vulnerabilities and Exploits

Read More

The post Weekly News Roundup — November 8 to November 14 appeared first on Malware Devil.



https://malwaredevil.com/2020/11/14/weekly-news-roundup-november-8-to-november-14/?utm_source=rss&utm_medium=rss&utm_campaign=weekly-news-roundup-november-8-to-november-14

XKCD ‘Set In The Present’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Set In The Present’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Set In The Present’ appeared first on Malware Devil.



https://malwaredevil.com/2020/11/14/xkcd-set-in-the-present/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-set-in-the-present

Memory buffers for… initiated, part 3 – Frida(y) edition

Okay, we can dump heap buffers. What’s next? What about a sandbox-like, IOC generator & payload dumper? In its most basic version we will run a sample and our handlers […]
Read More

The post Memory buffers for… initiated, part 3 – Frida(y) edition appeared first on Malware Devil.



https://malwaredevil.com/2020/11/14/memory-buffers-for-initiated-part-3-friday-edition-3/?utm_source=rss&utm_medium=rss&utm_campaign=memory-buffers-for-initiated-part-3-friday-edition-3

Where all the Cyber Tooth Fairies go?

One of my favorite TV Series is Dexter. Early seasons were so-so, focused on a cheap thrill, lame TV that you can see all over the place. As the series […]
Read More

The post Where all the Cyber Tooth Fairies go? appeared first on Malware Devil.



https://malwaredevil.com/2020/11/13/where-all-the-cyber-tooth-fairies-go-3/?utm_source=rss&utm_medium=rss&utm_campaign=where-all-the-cyber-tooth-fairies-go-3

2020-11-13 – Traffic Analysis Exercise – Quiethub.net

Read More

The post 2020-11-13 – Traffic Analysis Exercise – Quiethub.net appeared first on Malware Devil.



https://malwaredevil.com/2020/11/14/2020-11-13-traffic-analysis-exercise-quiethub-net/?utm_source=rss&utm_medium=rss&utm_campaign=2020-11-13-traffic-analysis-exercise-quiethub-net

Memory buffers for… initiated, part 3 – Frida(y) edition

Okay, we can dump heap buffers. What’s next? What about a sandbox-like, IOC generator & payload dumper? In its most basic version we will run a sample and our handlers […]
Read More

The post Memory buffers for… initiated, part 3 – Frida(y) edition appeared first on Malware Devil.



https://malwaredevil.com/2020/11/14/memory-buffers-for-initiated-part-3-friday-edition-2/?utm_source=rss&utm_medium=rss&utm_campaign=memory-buffers-for-initiated-part-3-friday-edition-2

Memory buffers for… initiated, part 3 – Frida(y) edition

Okay, we can dump heap buffers. What’s next?

What about a sandbox-like, IOC generator & payload dumper? In its most basic version we will run a sample and our handlers will spit out all the file names of files being opened by the analyzed program. They will also dump file buffers read to and written from. And for a good measure, we will try to convert some of the file creation flags/arguments passed to the APIs so we can get a more readable log.

To dump a list of files being opened by APIs I will focus on handling CreateFileA, and CreateFileW APIs. I chose these APIs for a couple of reasons:

  • They are very commonly used and are easy to test
  • CreateFileA & CreateFileW exist inside kernel32.dll
  • CreateFileA & CreateFileW exist inside kernelbase.dll
  • you may hook them all, and you may also want to choose either of them; of course, too many hooks is not good, hence there are challenges introduced by this duplication

Same as with buffers, we will store file handles in a table at the time file is created / opened. We will then lookup these handles at the time of file reading and writing so we can log actual file names in our logs, as opposed to just file handles. In my old sandbox I used a code inject that was relying on NtQueryObject executed in a context of a target process, but then again – I had to inject my code into that process, hook APIs before the malicious implant took over. Pretty complicated.

Anyway… since we can map file handles to file names we can now output the content of buffers/arguments to appropriate files (one file will store list of files/objects and the other one – actual file buffers). And for the fun of it, we will file buffers in hex + will include PID and TID, and of course a file name in our log:

The list of objects (and file handle to file name mapping) created using CreateFile APIs will be stored inside objects_list.txt file:

You may notice that some of them are 0xFFFFFFFF — these failed to open. It’s an interesting result – you will not only see existing files being accessed, but also these that don’t. Let me reiterate — these are calls to CreateFile API to access _some_ files or directories that may not be present on the system. Pretty much like Procmon, but a bit easier to read and far easier to mod the output to our needs. Such log’s value in security research cannot be overstated — it can help finding references to non-existing files, phantom libraries, anti-debugging strings e.g. device names, etc..

Finally, our attribute/flags resolution code works as well:

The screenshot below shows how this works in practice – the dwDesiredAccess’s value of 0x80000000 is translated to ‘GENERIC_READ’:

Now, before we get too excited about our ‘building our own sandbox experience’… let me mention that there are caveats. One of them is that Frida doesn’t work all the time. For the benefit of this article, I tried to run my handlers over pafish.exe executable and… it just got stuck:

I wanted to test pafish, because it refers to a number of devices associated with guest OS devices that help to detect a virtualization:

and

– so I thought I can output all these referenced device names and show how cool the handlers can be. Then the main pafish.exe process got stuck and that’s about it. So, you have been warned.

Still, I have never worked with such rapid prototyping & hooking engine in one. It’s amazing what you can do with a few lines of JavaScript.

You can download my testhandlers from here.

Read More

The post Memory buffers for… initiated, part 3 – Frida(y) edition appeared first on Malware Devil.



https://malwaredevil.com/2020/11/14/memory-buffers-for-initiated-part-3-friday-edition/?utm_source=rss&utm_medium=rss&utm_campaign=memory-buffers-for-initiated-part-3-friday-edition

Friday, November 13, 2020

Where all the Cyber Tooth Fairies go?

One of my favorite TV Series is Dexter. Early seasons were so-so, focused on a cheap thrill, lame TV that you can see all over the place. As the series […]
Read More

The post Where all the Cyber Tooth Fairies go? appeared first on Malware Devil.



https://malwaredevil.com/2020/11/13/where-all-the-cyber-tooth-fairies-go-2/?utm_source=rss&utm_medium=rss&utm_campaign=where-all-the-cyber-tooth-fairies-go-2

Where all the Cyber Tooth Fairies go?

One of my favorite TV Series is Dexter. Early seasons were so-so, focused on a cheap thrill, lame TV that you can see all over the place. As the series progress though we observe a shift in the narrative and we witness a true character of the main protagonist developing in front of our eyes. Dexter’s inner thoughts are full of curiosity, inquisitive reflections on life and it’s hard not to relate. We all try to fit in and be a part of it, whatever that ‘IT’ is.

So far I watched the series twice and I know I will come back to it.

One of my fav parts of the series is the history of the Tooth Fairy Killer. Walter Kenny is in his 70s when he is introduced to the audience, and due to his serial killing activities he becomes one of Dexter’s targets. Tooth Fairy Killer’s character is very interesting, because… he is way past his prime, he never got caught and … he is a somehow lonely, yet still arrogant individual.

When we swap ‘killer’ with ‘cyber’ we bring this post back to our infosec world.

What happens or will happen to us, aging ‘serial cybers’?

I don’t know. We don’t hear much from people who already retired and are either enjoying their Autumn years, or became wealthy quickly enough that working is no longer necessary. Then there are these not so happily-ever after retired – these who we end up hearing about on the news or through a grapevine. And it is not surprising to find out that many of these we hear of commit suicide, end up imprisoned, or live bigger life than themselves.

How many of us will end up there?

Putting difficult, and somehow inevitable mental health and medical issues associated with aging aside, what is that we want to do at the age of 70? Will we still work thinking we are saving the world from the cyber crime? What if futuristic laws and protocols make the cybercrime almost obsolete? And if not, will we still care? Will we still hold true and honest the ideals from our 20s? Or, worse, will we become victims of some sophisticated future social engineering tricks that will target us – the elderly? Again, I don’t know the answer. I am not that old yet, yet the questions like this start popping up in my head as I am getting older.

Our industry expanded so quickly that it’s impossible to keep up. It’s now mandatory to specialize. The good ol’ corporate entered the game and we are being institutionalized like any other company department. Is the anniversary watch we get as we retire the only prize for all these efforts, all-nighters and opinions we so eagerly shared with others over these early cyber years?

Maybe it is a price of being in the industry that very quickly goes through stages of maturity. From random, opportunistic to systematic, managed. Very rapidly. There is a final stage of cyber process already emerging today. I expect that in the next few years most of the ‘really’ technical jobs will move and gravitate around specialized vendors – these providing classification, automation, orchestration or whatever you call it, and… working frameworks.

Forget manually crafted super-timelines, inspections of systems, bit to bit imaging, and file format analysis. Forget manual malware analysis. Not only OS/Cloud telemetry and forensic/sandboxing capabilities will be provided out of the box, but they will be easy to use, already built-in and the DFIR/RCE hacking as we know will be over.

So, where do we land? Working for vendors is an easy answer. Client-side IT Security efforts coordinators aka security vendor managers is another. Security advisors? Security consultants? Table Top exercise coordinators? Teachers at uni?

Or.. perhaps cyber is here to stay for another 100 years ? And maybe, hopefully… Cyber Tooth Fairies is only the problem of the bad guys? Because… there is always something ‘for the benefit of good’ to do?

Read More

The post Where all the Cyber Tooth Fairies go? appeared first on Malware Devil.



https://malwaredevil.com/2020/11/13/where-all-the-cyber-tooth-fairies-go/?utm_source=rss&utm_medium=rss&utm_campaign=where-all-the-cyber-tooth-fairies-go

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...