Malware Devil

Friday, February 26, 2021

Event ID 7039 – out…pid a pid

This event is not very well explained on the internet, so I took a liberty of describing it below:

The event message is as follows:

A service process other than the one launched by the Service Control Manager connected when starting the [SERVICE_NAME] service. The Service Control Manager launched process [PID1] and process [PID2] connected instead.

Note that if this service is configured to start under a debugger, this behavior is expected.

The message kinda tells us what happened – two different processes talk to SCM instead of one. It doesn’t really tell us WHY this happens.

Example from a case I looked at in response to a query on Twitter:

In this particular case the c:windowssysmon.exe was registered as a program that service process starts from. I believe this file was later manually replaced with a newer version of sysmon.exe. The little-known fact about distributable version of Sysmon (sysmon.exe from the sysinternals page) is that it is built as a 32-bit executable with an embedded 64-bit executable inside its resources. When launched on a 64-bit system the 32-bit version extracts and spawns that 64-bit version executable (note the PIDs and compare them against the Event Log):

Looking at it in general terms: when you register a service its configuration in Registry points to an executable file. This executable is then used to launch a service. Some services are not designed in a very good way. Once such programs are launched as a service, they spawn other processes, sometimes even batch files that may as well launch other programs. If one of these spawn programs talks to SCM the latter immediately recognizes that it’s not the same executable as the service process the service configuration points to. Such design is in general poor and could be a subject to possible privilege escalation (in a lolbinish way). And since this is a security concern the event 7039 is being logged.

And this leads me to the key reason I wanted to write an article. The Event 7309 tells you two things:

  • Whoever designed the service didn’t do the best job, OR, more importantly,
  • A bad guy may be using a badly designed service to escalate privileges.

Hence, you should be looking at these.

And last, but not least – does it mean Sysmon is designed badly? Nope. It’s designed in a clever way to use a single portable executable for 32-bit and 64-bit systems. The problem arises from a corner case in a way it was manually upgraded, instead of using the “-u” switch.

Read More

The post Event ID 7039 – out…pid a pid appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/event-id-7039-outpid-a-pid/?utm_source=rss&utm_medium=rss&utm_campaign=event-id-7039-outpid-a-pid

Infrastructure Hygiene: Fixing Vulnerabilities

Posted under: Research and Analysis

As discussed in the first post in the Infrastructure Hygiene series, the most basic advice we can give on security is to do the fundamentals well. That doesn’t insulate you from determined and well-funded adversaries or space alien cyber attacks, but it will eliminate the path of least resistance that most attackers take.

The blurring of infrastructure as more tech stack components become a mix of on-prem, cloud-based, and managed services further complicate matters. How do you block and tackle well when you have to worry about three different fields and multiple teams playing on each field? Maybe that’s enough of the football analogies.

As if that wasn’t enough, now you have no margin for error because attackers have automated the recon for many attacks. So if you leave something exposed, they will find it. They being the bots and scripts always searching the Intertubes for weak links.

Although you aren’t reading this to keep hearing about the challenges of doing security, are you? So let’s focus on how to fix these issues.

Fix It Fast and Completely

It may be surprising, but the infrastructure vendors typically issue updates when discovering vulnerabilities in their products. Customers of those products then patch the devices to keep them up to date. We’ve been patching as an industry for a long time. And we at Securosis have been researching patching for almost as long. Feel free to jump in the time machine and check out our seminal work on patching in the original Project Quant.

The picture above shows the detailed patching process we defined back in the day. You need to have a reliable, consistent process to patch the infrastructure effectively. We’ll point specifically to the importance of the test and approve step due to the severity of the downside of deploying a patch that takes down an infrastructure component.

Yet going through a robust patching process can take anywhere from a couple of days to a month. Many larger enterprises look to have their patches deployed within a month of release. But in reality, a few weeks may be far too long for a high-profile patch/issue. As such, you’ll need a high priority patching process, which applies to patches addressing very high-risk vulnerabilities. Part of this process is to establish criteria for triggering the high-priority patching process and which parts of the long process you won’t do.

Alternatively, you could look at a virtual patch=, which is an alternative approach to use (typically) a network security device to block traffic to the vulnerable component based on the attack’s signature. This requires that the attack has an identifiable pattern to build the signature. On the positive, a virtual patch is rapid to deploy and reasonably reliable for attacks with a definite traffic pattern.

One of the downsides of this approach is that all traffic destined for the vulnerable component would need to run through the inspection point. If traffic can get directly to the component, the virtual patch is useless. For instance, if a virtual patch was deployed on a perimeter security device to protect a database, an insider with direct access to the database could use the exploit successfully since the patch hasn’t been applied. In this context, insider could also mean an adversary with control of a device within the perimeter.

For high-priority vulnerabilities, where you cannot patch either because the patch isn’t available or due to downtime or other maintenance challenges, a virtual patch provides a good short-term alternative. But we’ll make the point again that you aren’t fixing the component, rather hiding it. And with 30 years of experience under our belts, we can definitively tell you that security by obscurity is not a path to success.

We don’t believe that these solutions are mutually exclusive. The most secure way to handle infrastructure hygiene is to use both techniques. Virtual patching can happen almost instantaneously, and when dealing with a new attack with a weaponized exploit already in circulation, time is critical.

But given the ease with which the adversary can change a network signature and the reality that it’s increasingly hard to ensure that all traffic goes through an inspection point, deploying a vendor patch is the preferred long-term solution—and speaking of long-term solutions.

Abuse the Shared Responsibilities Model

One of the things about the cloud revolution that is so compelling is the idea of replacing some infrastructure components with platform services (PaaS). We alluded to this in the first post, so let’s dig a bit deeper into how the shared responsibility model can favorably impact your infrastructure hygiene. Firstly, the shared responsibility model is a foundational part of cloud computing and defines that the cloud provider has specific responsibilities. The cloud consumer (you) would also have security responsibilities. Ergo, it’s a shared responsibility situation.

Divvying up the division of responsibilities depends on the service and the delivery model (SaaS or PaaS), but suffice it to say that embracing a PaaS service for an infrastructure component gets you out of the operations business. You don’t need to worry about scaling or maintenance, and that includes security patches. I’m sure you’ll miss the long nights and weekends away from your family running hotfixes on load balancers and databases.

Ultimately moving some of the responsibility to a service provider reduces both your attack and your operational surfaces, and that’s a good thing. Long term, strategically using PaaS services will be one of the better ways to reduce your technology stack risk. Though let’s be very clear using PaaS doesn’t shift accountability. Your PaaS provider may feel bad if they mess something up and will likely refund some of your fees if they violate their service level agreement. But they won’t be presenting to your board explaining how the situation got screwed up – that would be you.

The Supply Chain

If there is anything we’ve learned from the recent Solarwinds and the Target attack from years ago (both mentioned in the first post of the series), it’s that your hygiene responsibilities don’t end at the boundaries of your environment. Far from it. As mentioned above, you may not be responsible for maintaining the infrastructure components of your providers and partners, but you are accountable for how weaknesses there can potentially impact your environment.

Wait, what? Let’s clarify a bit. If an external business partner gets owned and the attacker moves into your environment and starts wreaking havoc, guess what? You are accountable for that, but you can make the case that the partner was responsible for protecting their environment and failed. That fact won’t help you when you are in front of your organization’s audit committee explaining why your third-party risk program wasn’t good enough.

Just as we want to abuse the shared responsibilities model to get some operational help and reduce the attack surface, you need to spend additional resources on risk management. On a positive note, you’ve very likely already been doing this, and it’s a minor extension of your program to scrutinize the infrastructure components underlying your tech stack.

Infrastructure hygiene is straightforward in concept, but it’s much harder to do consistently. At scale, so we’ll wrap up the blog series with a discussion of the processes required to do it well, which will include far more than just an admin running patches all day.

– Mike Rothman
(0) Comments
Subscribe to our daily email digest

The post Infrastructure Hygiene: Fixing Vulnerabilities appeared first on Security Boulevard.

Read More

The post Infrastructure Hygiene: Fixing Vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/infrastructure-hygiene-fixing-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=infrastructure-hygiene-fixing-vulnerabilities

BSides Calgary 2020 – Evil Mog’s ‘From Print Spooler To Kerberos Silver Tickets’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Evil Mog’s ‘From Print Spooler To Kerberos Silver Tickets’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Evil Mog’s ‘From Print Spooler To Kerberos Silver Tickets’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/bsides-calgary-2020-evil-mogs-from-print-spooler-to-kerberos-silver-tickets/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-evil-mogs-from-print-spooler-to-kerberos-silver-tickets

TikTok pays $92 million to end data theft lawsuit

TikTok, the now widely popular social media platform that allows users to create, share, and discover, short video clips has been enjoying explosive growth since it appeared in 2017. Since then, it hasn’t stopped growing—more so during the current pandemic

While we can no longer categorize TikTok as a kids’ app, most concerns about the app have been around the privacy of children. You can read more details about its track record in this field in our article Are TikTok’s new settings enough to keep kids safe?

Last year the app escaped a total ban in the US after rumors that it was sharing the data of US citizens with the Chinese government.

Now TikTok has agreed to pay $92 million to settle dozens of lawsuits alleging that it harvested personal data from users, including information using facial recognition technology, without consent, and shared the data with third parties.

What was TikTok accused of?

In fact, there were dozens of lawsuits alleging that the popular video-sharing app used personal data from users improperly. The suits were merged into one multi-district action in the Northern District of Illinois that cited violations of privacy laws in Illinois and California.

One lawsuit accused the social media platform of deploying a complex artificial intelligence (AI) system to scan for facial features in users’ videos, combined with algorithms to identify a user’s age, gender and ethnicity.

Another point brought forward, claims that TikTok doesn’t adequately disclose how user data is shared with entities outside the US. Since the owner of the app is the Chinese company ByteDance this behavior has already prompted some organizations—including Wells Fargo and some branches of the US military—to ask their employees to not use the app on devices that also contain data about them.

According to lawyers representing TikTok users, the app “clandestinely vacuumed up” vast quantities of private and personally identifiable data that could be used to identify and surveil users without permission. Even information from draft videos that were never shared publicly were mined by TikTok for data, the lawyers for the users alleged. Tiktok also shared information about users, without their consent, with Facebook, Google and other companies, the suit claims.

Code obfuscation

One of the arguments brought forward to prove their case was that investigators hired by the plaintiffs’ lawyers found that TikTok went to great lengths to obfuscate its data collection and sharing practices. It is worth noting here that obfuscation is not only done to hide illegal practices. Sometimes obfuscation is simply done to keep out the competition.

Did TikTok admit anything?

No. A spokesperson said:

Rather than go through lengthy litigation, we’d like to focus our efforts on building a safe and joyful experience for the TikTok community.

So, they would rather spend their time elsewhere, rather than in court. Understandable, but $92 million is a hefty sum. And maybe, just maybe, they would like to keep their lawyers available for possible future actions against the company. Former President Donald Trump threatened to ban TikTok unless ByteDance sold the app to a US-based owner. The Biden administration has pulled back from that take on TikTok, instead launching a broader review of Americans’ use of Chinese technology.

TikTok has always denied the allegations of sharing data, arguing other competing social networks have similar data collection practices, and insisting the company does not ship American user data to foreign servers.

So, this is settled now?

Well, not completely. This part of the battle has taken the best part of a year. And a federal judge still needs to sign off on the $92 million agreement. If it is approved, the settlement money will be divided up among US-based TikTok users (it’s roughly one dollar per American TikTok user).

The proposed TikTok settlement follows a similar deal struck last year in which Facebook paid $650 million to resolve legal claims over collecting and storing the biometric data of millions of users.

Besides the monetary settlement, TikTok will no longer record users’ biometric information, including facial characteristics, nor track their locations using GPS data. TikTok also committed to stop sending US users’ data overseas, and the app said it would no longer collect data on draft videos before the content is published.

Biometric data

TikTok’s use of facial biometric data is interesting, but unexceptional. All across the world, governments and corporations are developing facial recognition technology. Facebook uses it, Apple Photos uses it, police forces all over the world use it.

There are many concerns, however. Lack of oversight, ethics, failures and false positives, and bias against marginalized groups are all pressing concerns. As a result, a backlash has started and bans or moratoriums on facial recognition are now being implemented or considered in many jurisdictions.

With increased scrutiny on the use of facial recognition, and on the use of Chinese technology, the use of biometrics and other personal data by social media with ties to foreign entities, especially China, is likely to attract a lot of attention from now on. Just ask Clubhouse.

The post TikTok pays $92 million to end data theft lawsuit appeared first on Malwarebytes Labs.

The post TikTok pays $92 million to end data theft lawsuit appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/tiktok-pays-92-million-to-end-data-theft-lawsuit-2/?utm_source=rss&utm_medium=rss&utm_campaign=tiktok-pays-92-million-to-end-data-theft-lawsuit-2

TikTok pays $92 million to end data theft lawsuit

TikTok, the now widely popular social media platform that allows users to create, share, and discover, short video clips has been enjoying explosive growth since it appeared in 2017. Since then, it hasn’t stopped growing–more so during the current pandemic.

While we can no longer categorize TikTok as a kids’ app, most concerns about the app have been around the privacy of children. You can read more details about its track record in this field in our article Are TikTok’s new settings enough to keep kids safe?

Last year the app escaped a total ban in the US after rumors that it was sharing the data of US citizens with the Chinese government.

Now TikTok has agreed to pay $92 million to settle dozens of lawsuits alleging that it harvested personal data from users, including information using facial recognition technology, without consent, and shared the data with third parties.

What was TikTok accused of?

In fact, there were dozens of lawsuits alleging that the popular video-sharing app used personal data from users improperly. The suits were merged into one multi-district action in the Northern District of Illinois that cited violations of privacy laws in Illinois and California.

One lawsuit accused the social media platform of deploying a complex artificial intelligence (AI) system to scan for facial features in users’ videos, combined with algorithms to identify a user’s age, gender and ethnicity.

Another point brought forward, claims that TikTok doesn’t adequately disclose how user data is shared with entities outside the US. Since the owner of the app is the Chinese company ByteDance this behavior has already prompted some organizations–including Wells Fargo and some branches of the US military–to ask their employees to not use the app on devices that also contain data about them.

According to lawyers representing TikTok users, the app “clandestinely vacuumed up” vast quantities of private and personally identifiable data that could be used to identify and surveil users without permission. Even information from draft videos that were never shared publicly were mined by TikTok for data, the lawyers for the users alleged. Tiktok also shared information about users, without their consent, with Facebook, Google and other companies, the suit claims.

Code obfuscation

One of the arguments brought forward to prove their case was that investigators hired by the plaintiffs’ lawyers found that TikTok went to great lengths to obfuscate its data collection and sharing practices. It is worth noting here that obfuscation is not only done to hide illegal practices. Sometimes obfuscation is simply done to keep out the competition.

Did TikTok admit anything?

No. A spokesperson said:

Rather than go through lengthy litigation, we’d like to focus our efforts on building a safe and joyful experience for the TikTok community.

So, they would rather spend their time elsewhere, rather than in court. Understandable, but $92 million is a hefty sum. And maybe, just maybe, they would like to keep their lawyers available for possible future actions against the company. Former President Donald Trump threatened to ban TikTok unless ByteDance sold the app to a US-based owner. The Biden administration has pulled back from that take on TikTok, instead launching a broader review of Americans’ use of Chinese technology.

TikTok has always denied the allegations of sharing data, arguing other competing social networks have similar data collection practices, and insisting the company does not ship American user data to foreign servers.

So, this is settled now?

Well, not completely. This part of the battle has taken the best part of a year. And a federal judge still needs to sign off on the $92 million agreement. If it is approved, the settlement money will be divided up among US-based TikTok users (it’s roughly one dollar per American TikTok user).

The proposed TikTok settlement follows a similar deal struck last year in which Facebook paid $650 million to resolve legal claims over collecting and storing the biometric data of millions of users.

Besides the monetary settlement, TikTok will no longer record users’ biometric information, including facial characteristics, nor track their locations using GPS data. TikTok also committed to stop sending US users’ data overseas, and the app said it would no longer collect data on draft videos before the content is published.

Biometric data

TikTok’s use of facial biometric data is interesting, but unexceptional. All across the world, governments and corporations are developing facial recognition technology. Facebook uses it, Apple Photos uses it, police forces all over the world use it.

There are many concerns, however. Lack of oversight, ethics, failures and false positives, and bias against marginalized groups are all pressing concerns. As a result, a backlash has started and bans or moratoriums on facial recognition are now being implemented or considered in many jurisdictions.

With increased scrutiny on the use of facial recognition, and on the use of Chinese technology, the use of biometrics and other personal data by social media with ties to foreign entities, especially China, is likely to attract a lot of attention from now on. Just ask Clubhouse.

The post TikTok pays $92 million to end data theft lawsuit appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/tiktok-pays-92-million-to-end-data-theft-lawsuit/?utm_source=rss&utm_medium=rss&utm_campaign=tiktok-pays-92-million-to-end-data-theft-lawsuit

Securing Super Bowl LV

A peek at open XDR technology, and defense that held up better than the Kansas City Chiefs.
(image by detakstudio, via Adobe Stock)

(image by detakstudio, via Adobe Stock)

Protecting the Super Bowl from cyberattackers is no small task. In fact, it’s a sprawling, messy mass of challenges converging on a day when (almost) 100 million people are watching.

This year, much of the job fell to ReliaQuest, the official cybersecurity partner for both the Tampa Bay Buccaneers and the NFL Super Bowl LV Host Committee. ReliaQuest CEO Brian Murphy and CTO Joe Partlow lay out the tasks:

Protecting the stadium’s wireless access points and payment systems. Defending the scoreboard from vandalism and sad fans hoping to change the score. Locking down the volunteer staff’s background checks and COVID screening info. Securing coaches’ tablets and comms so their playbooks and play-calling are kept confidential. Making sure injury reports, starting lineups, and other valuable data aren’t leaked to the competition and the gambling public early. The list goes on. It means monitoring threat intelligence reports, scraping social media, shifting defense to respond to shifting threats.

(And, hopefully, doing so as effectively as the Buccaneers’ defense was against the Kansas City Chiefs’ attacks in the Bucs’ 31-9 victory that night.)

It would be a big undertaking in any year, for sure, but in 2021 the pandemic created new challenges, Murphy and Partlow explain.

Attendance in the stadium at Super Bowl LX was slashed from 62,000 to 22,000, but the bigger change affecting infosec was in the viewership outside of the stadium.

“‘Watch parties weren’t happening,” Murphy explains.

Usually, he says, people gather to watch the game, at restaurants, bars, and friends’ houses with big-screen TVs. This year, instead, people were watching alone, at home, on a variety of devices.

The result: Although the overall viewership ratings were the lowest for a Super Bowl since 2006, live-streaming viewership rocketed up by 65%, according to CBS.

Expecting the bump in online viewers, ReliaQuest also expected an accompanying bump in overall security events leading up to and during the game. The company hypothesized that its overall customer base might experience more attacks during the 2021 Super Bowl than in 2020.

They were right: In fact, ReliaQuest detected a 20.2% increase in total security events, year over year. There were upticks in phishing and ransomware attacks. The most noteworthy change was the increase in malicious streaming services, luring victims with promises like, “Watch the Super Bowl for free! Just download here.”

Defending against the wide variety of threats related to the event requires an array of intelligence, detection, and response tools – security information and event management (SIEM), endpoint detection and response (EDR), and threat intelligence, for starters, and in in this case, pulled together by an extended detection and response product (XDR). Partlow and Murphy explain that their company’s XDR offering is an “open XDR” technology. By “open,” they mean the XDR is vendor-agnostic. It integrates security tools from a variety of security companies – some Carbon Black here, some Tenable there, etc.

This approach can also, for example, simplify a merger or acquisition, Partlow explains.

“Each company probably chose their security tools for a good reason,” he says, “As that [merged] enterprise, I don’t have to rip-and-replace and make it all one logo.”

Although bruised-up Chiefs quarterback Patrick Mahomes might disagree, attacks on Super Bowl Sunday were handled without major incident – “aside from the streaker,” says Partlow. But that, he notes,”was a physical security breakdown.”

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Securing Super Bowl LV appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/securing-super-bowl-lv/?utm_source=rss&utm_medium=rss&utm_campaign=securing-super-bowl-lv

Supply Chain, Sandstorm Returns, Flying Cars, & Net Neutrality – Wrap Up – SWN #102

This week, Dr. Doug talks Flying cars, Net Neutrality, LOTS of supply chain stories, and all this weeks’ shows, on the Security Weekly News Wrap Up!

Visit https://www.securityweekly.com/swn for all the latest episodes!

Show Notes: https://securityweekly.com/swn102

The post Supply Chain, Sandstorm Returns, Flying Cars, & Net Neutrality – Wrap Up – SWN #102 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/supply-chain-sandstorm-returns-flying-cars-net-neutrality-wrap-up-swn-102/?utm_source=rss&utm_medium=rss&utm_campaign=supply-chain-sandstorm-returns-flying-cars-net-neutrality-wrap-up-swn-102

Black History Month Spotlight: Jane-Glenna Anthony

Black History Month Spotlight: Jane-Glenna Anthony
michelle
Fri, 02/26/2021 – 10:26

We’re celebrating Black History Month by spotlighting our outstanding team members whose exemplary work furthers the mission of our company every day. Meet Jane-Glenna Anthony on our Technical Services team.
Feb 26, 2021

What inspired you to join Delphix?

First, Delphix has a great culture. The company is led by a diverse leadership team, which is a rare occurrence in Silicon Valley. Women and people of color hold key executive positions. I see this as a critical aspect of building a diverse and inclusive workforce and organization that reflects a variety of backgrounds and experiences. 

Delphix’s products are also at the cutting edge of enterprise tech, allowing customers around the world to eliminate their data challenges and drive responsible innovation. 

What does Black History Month mean to you?

I dedicate every Black History Month to learn more about the Black history heroes who have not been in the spotlight but deserve to be celebrated for their contributions to civil rights, the arts, science, sports, and beyond. 

Who inspires you?

I’m inspired by many people, as each person has a different perspective to offer through their experience and background. Some are family members, in particular, my mother and grandmothers. Others are my friends as well as the men and women of the Haitian Revolution, American Civil Rights movement, and more. 

One person I’d like to highlight this year is Stacey Abrams. Her intellect, determination, and grace to create a world where all people can thrive and where every voter can have their voices heard is incredibly inspiring. 

How does being black impact the way you approach diversity & inclusion?

As a black woman, I can feel the subtle, even tacit prejudice caused by the lack of empathy and sensitivity. Diversity and inclusion for me means accepting people as they are, without prejudice, racism, bias, colorism (a huge sequel of colonization among people of color), sexism, and other negative tendencies. 

What’s your favorite mantra or quote?

I have a notebook full of quotes that I use and pull out during different life situations that I’m facing in particular moments. The one that comes to mind often these days is: “Nil Sine Magno Labore.” It means nothing without big effort. This also happens to be the motto of my alma mater, CUNY—Brooklyn College. To achieve any significant milestone in life, one must strive and stay disciplined and focused. This mantra gives me perseverance and tenacity and helps me stay focused and disciplined to achieve my goals in my professional and personal life. 

The post Black History Month Spotlight: Jane-Glenna Anthony appeared first on Security Boulevard.

Read More

The post Black History Month Spotlight: Jane-Glenna Anthony appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/black-history-month-spotlight-jane-glenna-anthony/?utm_source=rss&utm_medium=rss&utm_campaign=black-history-month-spotlight-jane-glenna-anthony

How application protection helps HIPAA compliance

Creating HIPAA compliant apps requires robust application protection measures. Here’s what you need to know.

The post How application protection helps HIPAA compliance appeared first on Intertrust Technologies.

The post How application protection helps HIPAA compliance appeared first on Security Boulevard.

Read More

The post How application protection helps HIPAA compliance appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/how-application-protection-helps-hipaa-compliance/?utm_source=rss&utm_medium=rss&utm_campaign=how-application-protection-helps-hipaa-compliance

Yeezy Fans Face Sneaker-Bot Armies for Boost ‘Sun’ Release  

Sneaker bots ready to scoop up the new Yeezy Boost 700 “Sun” shoes to resell at a huge markup.  
Read More

The post Yeezy Fans Face Sneaker-Bot Armies for Boost ‘Sun’ Release   appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/yeezy-fans-face-sneaker-bot-armies-for-boost-sun-release/?utm_source=rss&utm_medium=rss&utm_campaign=yeezy-fans-face-sneaker-bot-armies-for-boost-sun-release

XKCD ‘Exposure Models’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Exposure Models’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Exposure Models’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/xkcd-exposure-models/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-exposure-models

Attackers Turn Struggling Software Projects Into Trojan Horses

While access to compromised systems has become an increasingly common service, some cybercriminals are going straight to the source: buying code bases and then updating the application with malicious code.

On Dec. 4, users of a simple Android program — a barcode scanner — started witnessing odd behavior when their smartphones suddenly began opening up their browser to display unwanted advertisements.

While the devices exhibited the hallmarks of a malware or adware infection, the compromises puzzled most users since they had not recently downloaded new software, according to an analysis by endpoint security firm Malwarebytes. Instead, the malicious behaviors came from a software update to a popular application — the generically named “Barcode Scanner,” with millions of downloads. An enterprising group bought the code and then pushed a malicious update to every user of the application.

The supply chain attack is a new technique — buying applications, along with their software base, and then pushing out updates with malicious code — that will likely grow in popularity among cybercriminals, says Nathan Collier, senior malware intelligence analyst at Malwarebytes.

“Now that this has been done, I can definitely see it happening more in the future,” he says. “Honestly, for malware developers it’s kind of genius that they can just do this — let someone else build something, have it on Google Play for years. You are buying the ability to update all of the users to a new version of the app.”

Already, a second group used a similar tactic to infect millions of users with malicious code through a popular Google Chrome extension. In early February, Google removed the Great Suspender utility for Chrome, which reduces the memory consumed by the browser through shutting down old tab processes, after the original maintainer of the open source project sold the code to an unknown group. Users of the extension noticed in October 2020 that new owners had installed updated code on users’ systems without notification — code that appeared to behave similar to adware.

The technique for distributing malicious code comes as developers and security firms are trying to detect attackers who compromise code bases and insert malicious modifications. Skipping the initial requirements of compromising the code base makes the attack simpler, Bishop Fox CEO Vinnie Liu told Dark Reading earlier this month.

“The secure development life cycle has for 15 years been focused on preventing the inadvertent introduction of vulnerabilities by developers, and not against identifying and preventing the purposeful insertion of malicious code or behavior into an existing application,” he said. “Developers are unprepared for this. Most enterprise security programs are unprepared for this.”

Paying for access to a vulnerable system is not necessarily new, however. Cybercriminals services that sell access to already compromised systems have evolved over the past decade; such services now account for a large number of ransomware infections. In 2016, cybersecurity experts were already warning of the emergence of access-as-a-service sites used by cybercriminals.

Other gray-market groups use a more subtle approach, creating advertising software development kits (SDKs) used by developers to monetize their applications, but then adding aggressive advertising or even malicious code to the third-party component. In August, for example, researchers at security firm Snyk revealed that an SDK used by more than 1,200 iOS applications had adopted code to spy on millions of users.

Compromising the supply chain directly is also becoming more common. Many cybercriminals and nation-state operators have targeted popular software and vendors — such as the software compromise that allowed NotPetya to spread and the attack on SolarWinds — as a way to eventually infect companies using the software.

By targeting struggling but popular software projects, however, cybercriminals have added another door into the supply chain for their code.

The Barcode Scanner app behind the latest case appeared on the Google Play store in 2017 as a legitimate, ad-driven application with tens of thousands of users, according to Malwarebytes. At the time of its sale to an organization named LavaBird LLC, the application had about 10 million downloads and an extensive user base, according to Malwarebytes. LavaBird says the company then sold it to another third party, who made the malicious modifications, Collier says.

“The clean version was on there for a long, long time … so it was growing and growing and growing before it got taken up by LavaBird,” he says. “They bought it with the intention of selling it as quickly as they can, but the problem is they did zero verification on who they were selling it to.”

Should developers be required to do due diligence on buyers? Collier says he is not so sure. Instead, the company behind the ecosystem — whether Apple, Google, Microsoft, or another — should ensure that security checks on updates are as rigorous as on the original application, especially if the maintainer has changed.

“Google really only looks in depth when the code is first uploaded,” he says. “Looking at the code, this would have been an easy one to detect. I downloaded the app, and within five minutes it was opening up Google Chrome and doing redirects.”

Yet he acknowledged the security firms have to adapt to the new strategy as well.

“To be fair, in Google’s defense, the [mobile security] vendors were not even detecting it right off the bat either,” Collier says. “It was sly, slipped in, and it worked.”

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Attackers Turn Struggling Software Projects Into Trojan Horses appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/attackers-turn-struggling-software-projects-into-trojan-horses-2/?utm_source=rss&utm_medium=rss&utm_campaign=attackers-turn-struggling-software-projects-into-trojan-horses-2

Attackers Turn Struggling Software Projects Into Trojan Horses

While access to compromised systems has become an increasingly common service, some cybercriminals are going straight to the source: buying code bases and then updating the application with malicious code.

The post Attackers Turn Struggling Software Projects Into Trojan Horses appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/attackers-turn-struggling-software-projects-into-trojan-horses/?utm_source=rss&utm_medium=rss&utm_campaign=attackers-turn-struggling-software-projects-into-trojan-horses

Thursday, February 25, 2021

The case for Collective Defense in the U.S. energy sector

America’s energy sector—including the oil and gas and electric power generation and transmission industries—has long faced significant threats in the cyber arena.  Four years ago,  the Idaho National Lab for the U.S. Department of Energy reported that “threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication.”  In 2018, for example, the U.S. publicly accused Russia of conducting a two-year long coordinated campaign of cyber intrusions into the U.S. grid.

The post The case for Collective Defense in the U.S. energy sector appeared first on Security Boulevard.

Read More

The post The case for Collective Defense in the U.S. energy sector appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/the-case-for-collective-defense-in-the-u-s-energy-sector/?utm_source=rss&utm_medium=rss&utm_campaign=the-case-for-collective-defense-in-the-u-s-energy-sector

Cyber in the US financial sector: A critical need for collaboration

It almost goes without saying that America’s financial services sector—at the heart of our economy and success as a nation—regularly faces significant cyber attacks from a wide range of threat actors.  And while the idea that these bad actors are heavily focused on the financial sector is completely unsurprising—after all, the old saying about why people rob banks (“that’s where the money is”) applies with equal force in the cyber realm—the scale and scope of attacks may make defending the financial services sector a uniquely difficult challenge.

The post Cyber in the US financial sector: A critical need for collaboration appeared first on Security Boulevard.

Read More

The post Cyber in the US financial sector: A critical need for collaboration appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/cyber-in-the-us-financial-sector-a-critical-need-for-collaboration/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-in-the-us-financial-sector-a-critical-need-for-collaboration

Ransomware, Phishing Will Remain Primary Risks in 2021

Attackers have doubled down on ransomware and phishing — with some tweaks — while deepfakes and disinformation will become more major threats in the future, according to a trio of threat reports.

The post Ransomware, Phishing Will Remain Primary Risks in 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/ransomware-phishing-will-remain-primary-risks-in-2021-2/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-phishing-will-remain-primary-risks-in-2021-2

Ransomware, Phishing Will Remain Primary Risks in 2021

Attackers have doubled down on ransomware and phishing — with some tweaks — while deepfakes and disinformation will become more major threats in the future, according to a trio of threat reports.

Cybercriminals and nation-states have doubled down and improved on popular attacks, targeting companies with double-extortion ransomware attacks, adopting various COVID-19-themed lures for phishing, and taking advantage of cybersecurity chaos following the move to remote work, according to three threat reports published this week.

Ransomware made up nearly a quarter of the incident-response engagements for IBM Security’s X-Force threat intelligence group. Fifty-nine percent of the ransomware incidents involved cybercriminals exfiltrating, before encrypting, the data — so-called “double-extortion” attacks, according to the “X-Force Threat Intelligence Index 2021” report. The most common ransomware group, dubbed Sodinokibi, raked in more than $123 million in profits during 2020, according to the company’s calculations.

The use of double-extortion ransomware attacks and the focus on large companies and big scores will continue in 2021, says Nick Rossmann, global threat intelligence lead for IBM Security X-Force.

“Double extortion is the trend that attackers have gone to in 2020 because the attack circumvents the defenses, like backups and a good incident response strategy, that companies have put into place,” he says. “This shift is a natural evolution of where attackers are going to go in response to companies’ defenses.”

In separate threat reports published by IBM, anti-malware firm Trend Micro, and endpoint security firm BlackBerry, many of the same themes emerge. Ransomware dominated all, with Sodinokibi and Ryuk headlining lists of top ransomware campaigns, but relative newcomers Egregor and DoppelPaymer were also on the list.

Attackers’ focus on stealing and encrypting data at larger enterprises has led to an increase in ransoms, with one insurance company noting the average ransom doubled from 2019 to the first quarter of 2020, according to Trend Micro’s “2020 Annual Cybersecurity Report.” The top ransomware family, however, was not a new threat: The WannaCry crypto-ransomware worm, which automatically infected systems in May 2017, continues to scan for unpatched computers.

“WannaCry, aside from being the top malware family, is the only ransomware in the list [of top malware],” Trend Micro states in its report. “Cryptocurrency miners as a whole are in second place, showing how prevalent they had become.”

While many companies have seen ransomware on the rise, the number of attempted ransomware attacks — as measured by the number of e-mail messages with malicious links or malware connected to ransomware — has dropped. The decline is not because the threats have decreased, says Jon Clay, director of global threat communications at Trend Micro.

“If you look at the ransomware numbers, that number is actually down year-over-year because the tactics have shifted,” he says. “We have moved from the spray-and-pray ransomware attacks to the much more targeted approach by the ransomware actors.”

The notable exception is the 4-year-old WannaCry ransomware worm, which still creates the most malicious traffic, according to Trend Micro, which sees such encounters because its data is collected from endpoints.

Phishing attacks aimed at either stealing credentials or as part of a business e-mail compromise (BEC) scheme continue to be popular. With many employees working from home, they presented more of an opportunity for attackers, BlackBerry states in its “2020 Threat Report.”

“Software-as-a-service (SaaS) applications and Webmail remained the most targeted services for phishing attacks, dominating others throughout the year,” according to the report. “Financial and payment sectors ranked in the second and third positions.”

Traditional exploits continued to be a common attack vector, claiming the top slot in the IBM report. While ransomware and phishing both climbed, IBM Security’s X-Force found 35% of investigated incidents leverage vulnerabilities in the attack. The company also found attacks on Linux vulnerabilities had increased.

“A lot of companies are moving to the cloud, so there is a lot of data there,” says IBM Security X-Force’s Rossmann. “In addition, the majority of Linux-based malware is cryptocurrency miners. So the Bitcoin market is driving attackers to move into Linux and try to exploit cloud services.”

Looking to the future, disinformation and the threat of deepfakes are perhaps the most significant threats. Already, deepfakes are being used to enhance business scams, allowing cybercriminals to produce the voice of CEOs requesting a payment made to an attacker’s account.

Put together, deepfakes and disinformation will hobble national efforts to prepare for a variety of threats, from future pandemics to cybersecurity and national security issues, says Eric Milam, a threat researcher with BlackBerry.

“What do we do when what you see is a complete misinformation campaign, but it is so well done that you don’t know it is a misinformation campaign, and those people who want to believe it now have a level of confidence that they would not have had in the past?” he says. “That is a threat to us as human beings, and we have no way to deal with that right now.”

Milam predicts that machine-learning models will be the only way to defend against such threats in the future.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post Ransomware, Phishing Will Remain Primary Risks in 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/ransomware-phishing-will-remain-primary-risks-in-2021/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-phishing-will-remain-primary-risks-in-2021

Cyberattacks Launch Against Vietnamese Human-Rights Activists

Vietnam joins the ranks of governments using spyware to crack down on human-rights defenders.
Read More

The post Cyberattacks Launch Against Vietnamese Human-Rights Activists appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/cyberattacks-launch-against-vietnamese-human-rights-activists/?utm_source=rss&utm_medium=rss&utm_campaign=cyberattacks-launch-against-vietnamese-human-rights-activists

2021-02-25 – TA551 (Shathak) back to pushing IcedID (Bokbot)

Read More

The post 2021-02-25 – TA551 (Shathak) back to pushing IcedID (Bokbot) appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/2021-02-25-ta551-shathak-back-to-pushing-icedid-bokbot/?utm_source=rss&utm_medium=rss&utm_campaign=2021-02-25-ta551-shathak-back-to-pushing-icedid-bokbot

Thousands of VMware Servers Exposed to Critical RCE Bug

Security experts report scanning activity targeting vulnerable vCenter servers after a researcher published proof-of-concept code.

The post Thousands of VMware Servers Exposed to Critical RCE Bug appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/thousands-of-vmware-servers-exposed-to-critical-rce-bug-2/?utm_source=rss&utm_medium=rss&utm_campaign=thousands-of-vmware-servers-exposed-to-critical-rce-bug-2

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...