Malware Devil

Friday, March 5, 2021

Massive Supply-Chain Cyberattack Breaches Several Airlines

The cyberattack on SITA, a nearly ubiquitous airline service provider, has compromised frequent-flyer data across many carriers.
Read More

The post Massive Supply-Chain Cyberattack Breaches Several Airlines appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/massive-supply-chain-cyberattack-breaches-several-airlines/?utm_source=rss&utm_medium=rss&utm_campaign=massive-supply-chain-cyberattack-breaches-several-airlines

HAFNIUM Exchange Zero-Day Scanning

The Microsoft Exchange Zero-day exploit drop this week is a big one for 2021. The actions everyone needs to take when these exploits are being used in the wild is: 1. Take inventory Do you host an on-prem exchange server? Is the exchange server vulnerable? Most likely unless you applied the latest out-of-band patches released…

The post HAFNIUM Exchange Zero-Day Scanning appeared first on Infocyte.

The post HAFNIUM Exchange Zero-Day Scanning appeared first on Security Boulevard.

Read More

The post HAFNIUM Exchange Zero-Day Scanning appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/hafnium-exchange-zero-day-scanning/?utm_source=rss&utm_medium=rss&utm_campaign=hafnium-exchange-zero-day-scanning

John McAfee Indicted for ICO Manipulation, Securities Fraud

McAfee Breach Stormy Daniels Lawsuit Contracts

Today, the United States Attorney for the Southern District of New York, William F. Sweeney, announced the unsealing of a seven count indictment charging John David McAfee, founder of McAfee, and Jimmy Gale Watson, an executive advisor to McAfee, with pump-and-dump schemes, as well as initial coin offering (ICO) touting schemes. Watson was arrested on..

The post John McAfee Indicted for ICO Manipulation, Securities Fraud appeared first on Security Boulevard.

Read More

The post John McAfee Indicted for ICO Manipulation, Securities Fraud appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/john-mcafee-indicted-for-ico-manipulation-securities-fraud/?utm_source=rss&utm_medium=rss&utm_campaign=john-mcafee-indicted-for-ico-manipulation-securities-fraud

Realistic Patch Management Tips, Post-SolarWinds

Patch management and testing are different, exactly the same, and completely out of hand. Here are tips from the experts on how to wrangle patches in a time of malicious software updates.

The post Realistic Patch Management Tips, Post-SolarWinds appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/realistic-patch-management-tips-post-solarwinds-2/?utm_source=rss&utm_medium=rss&utm_campaign=realistic-patch-management-tips-post-solarwinds-2

Realistic Patch Management Tips, Post-SolarWinds

Patch management and testing are different, exactly the same, and completely out of hand. Here are tips from the experts on how to wrangle patches in a time of malicious software updates.
(image by Barbara Helgason, via Adobe Stock)

(image by Barbara Helgason, via Adobe Stock)

“If you didn’t already know that patching introduces risk, well…now you know,” says Brad Causey, CEO of security consulting and penetration testing firm Zero Day Consulting.

Causey is referring of course to the recent attack on SolarWinds that shook the industry. Software updates for SolarWinds’ Orion network management software were used to distribute the Sunburst/Solarigate backdoor Trojan to some 18,000 organizations worldwide. (Note: SolarWinds is, itself, also a provider of third-party patch management services. However, those services do not appear to have been affected by the recent attacks.)

“We’re introducing risk by trying to reduce risk,” Causey says.

This isn’t a new thing though, he says, and testing patches before deployment is standard best practice. Yet, patch testing is generally done to avoid operational snafus, not security threats. It’s meant to spot a code library change that prevents three other applications from running; not to spot a backdoor Trojan.

With the Sunburst/Solarigate attacks fresh in mind, though, is it time to revamp patch testing procedures? How can enterprise infosec teams tackle patch management securely? Here’s advice from security experts on what to do now.

Be Realistic.

Causey and others say that a supply chain attack on the scale and sophistication of SolarWinds is harrowing, but it doesn’t mean that enterprises need to completely reinvent patch management. Rather, IT teams just need to do some of the best practices they should have been doing all along. After all, the National Institution of Standards and Technology (NIST) lays out highly detailed guidelines on patch management in SP 800-40.

The trouble is, SP 800-40 was last updated eight years ago, and by NIST’s own reckoning, the number of vulnerabilities per year has tripled since then.

“We patch all the time. We’re always patching,” says John Pironti, president of cybersecurity and risk consultancy IP Architects LLC.

Security hygiene, including patching, is an essential part of defense, says Pironti. Nevertheless, he says, “We’re fooling ourselves if we think we can defend ourselves against a nation-state attack [like the SolarWinds incident] while continuing to release code at the speed we do.”

Curtis Franklin, senior analyst of enterprise security management at Omdia, says companies must have patch management technology to help automate the process now, “because it’s gotten really beyond human-scale at this point.”

Keep Trusting Patches. But…

Despite the recent high-profile example of a malicious software update, Pironti says companies should not shy away from deploying updates.

“I think we would be doing ourselves a disservice if we started distrusting patches,” he says. “I’d rather trust my vendors than question them when there’s an exploit in the wild.”

He does, however, say it’s fair to ask for better security hygiene in the software development lifecycle.

…Ask Software to Be More Trustworthy

“We’ve been trained as a society to accept flawed code,” says Pironti. While regulations mandate that some industries’ products meet certain safety and quality standards, enterprise software is largely unregulated. Pironti thinks that at some point this may change. “You can’t let [software companies] be the barometers of what’s acceptable and unacceptable risk,” he says.

In the meantime, he suggests companies ask software vendors and service providers one question before any purchase: What are you doing to ensure the integrity of your third-party code?

Create a Testing Environment That’s a Reasonable Representation of Reality.

In an ideal world, your testing environment would be a perfect mirror image of your production environment. It would represent every device, running every version of every operating system version, and every application, in every complex configuration that might be running in your environment at the time.

“And you’d have to invest in all that equipment nobody’s using, and pay someone to maintain it, right?” points out Causey.

More realistic and affordable, though, he says, is to create a testing environment that accurately represents the systems that are the most critical — those that are used by the widest number of users, or most critical to daily operations, or that touch the most sensitive data.

Omdia’s Franklin says that many companies succeed in creating a test environment that represents the lion’s share of their endpoints. “The trouble is with their edge cases,” he says.

Those edge cases might not be a problem. Until they are.

Franklin lays out an example:

It might be the system that prints out the bills of lading for the trucks leaving your manufacturing facility. And it runs a dot-matrix printer that has been cranking along since 1997. And Charlie at the freight yard knows how to hit the buttons on his Windows 98 computer to make it print all these bills of lading to keep things flowing out. And you’ve decided that it’s simply impossible to retrain Charlie down in shipping. So you’re not going to.

And it was fine when Charlie was getting hand-written notes and typing them in. But sometime a few years ago your SAP rep said ‘ya know we can put a connector that goes from SAP to Charlie’s desktop.’ So now Charlie’s Windows 98 desktop has a link back — probably through the Internet — to your SAP instance.

Now, all of a sudden, Charlie’s Windows 98 machine is a vulnerability. … My guess is you don’t have a Windows 98 machine in your [testing] lab. So even if [Microsoft] released an out-of-band patch for Windows 98, you couldn’t test it.

You’re going to have some cases like that. And they get far more numerous and bizarre in healthcare.

Franklin says most companies widely use sandboxing. “But if they’re honest with themselves, they know that they can’t sandbox everything. If they’re doing it right, though they know what they can’t sandbox.”

Use the Right Tool for the Job.

Identifying those fringe cases requires help. There are many types of technologies that will allow enterprises to locate and organize those IT assets and a wide variety of tools that help make patch management smoother. For example:

{Continued on Next Page}

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Previous

1 of 2

Next

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post Realistic Patch Management Tips, Post-SolarWinds appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/realistic-patch-management-tips-post-solarwinds/?utm_source=rss&utm_medium=rss&utm_campaign=realistic-patch-management-tips-post-solarwinds

Upcoming Webinar: The Future of Cyber: Maturing your Cyber Program over the Life of your Business

Wednesday March 31, 2021 at 11am PST / 2pm EST The global pandemic has shed a light on the challenges that remote working has placed on organizations of all sizes globally. While the threats tied to remote work are not new, the challenge has been scaled greatly as organizations have sent the majority of their[…]

The post Upcoming Webinar: The Future of Cyber: Maturing your Cyber Program over the Life of your Business appeared first on Iceberg Networks.

The post Upcoming Webinar: The Future of Cyber: Maturing your Cyber Program over the Life of your Business appeared first on Security Boulevard.

Read More

The post Upcoming Webinar: The Future of Cyber: Maturing your Cyber Program over the Life of your Business appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/upcoming-webinar-the-future-of-cyber-maturing-your-cyber-program-over-the-life-of-your-business/?utm_source=rss&utm_medium=rss&utm_campaign=upcoming-webinar-the-future-of-cyber-maturing-your-cyber-program-over-the-life-of-your-business

On International Women’s Day 2021, Does the ‘Rule of Steve’ Still Apply? Yes.

On International Women’s Day 2021, gender diversity has improved in cybersecurity, but there is still a long way to go.

The post On International Women’s Day 2021, Does the ‘Rule of Steve’ Still Apply? Yes. appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/on-international-womens-day-2021-does-the-rule-of-steve-still-apply-yes-2/?utm_source=rss&utm_medium=rss&utm_campaign=on-international-womens-day-2021-does-the-rule-of-steve-still-apply-yes-2

On International Women’s Day 2021, Does the ‘Rule of Steve’ Still Apply? Yes.

On International Women’s Day 2021, gender diversity has improved in cybersecurity, but there is still a long way to go.

Some time ago, Dawn-Marie Hutchinson introduced the “Rule of Steve” to draw attention to the lack of diversity in cybersecurity. It goes like this: In a room (virtual or physical) full of cybersecurity professionals, there are usually more people named Steve than there are women.

Albeit tongue-in-cheek, it is a good indicator of how far the cybersecurity industry still has to go in terms of gender diversity. The situation has improved over recent years, but as we get to International Women’s Day 2021, it is nowhere near parity. Everyone has a role to play in striving for parity this decade.

2020 Provided Opportunity to Change, but There Is Still a Long Way to Go
The (ISC)2 Cybersecurity Workforce Study 2020 noted that the security workforce gap closed last year, and by a considerable margin: down from 4 million people to 3.1 million. This is little surprise in a global environment suffering from uncertainty and cost pressures. However, there is still a significant shortfall, and to build the cybersecurity workforce we need to encourage diversity.

To put it bluntly, we need more women, more ethnic diversity, and more neurodiversity. We need more men. We need more people from a whole range of “groups” who have the right aptitude and attitude to work in information and cybersecurity, regardless of location.

Does everyone who works in the industry need to be in an office? Most definitely, “no.” The business challenges of COVID-19 brought about an opportunity for change and to encourage diversity by recruiting individuals away from traditional urban hubs. Remote working significantly expands the pool of candidates, which in turn brings access to a better and more diverse range of individuals.

A disparate and global workforce thinks more broadly, has different ideas, and can drive faster business outcomes than centrally located groups. For those naysayers who didn’t believe it was possible to work remotely in cybersecurity, the COVID-19 crisis proved otherwise and has given organizations a new opportunity to break the Rule of Steve.

There are a range of statistics available for the number of women working in cybersecurity roles. The same (ISC)2 study suggests around 28% of workers are female, but this is everyone with 25% or more of their role in cybersecurity. Other studies report percentages of females in the cybersecurity workforce at 21%, 20%, 14%, 11%. Omdia estimates the percentage to be around one-fifth, or 20%. Study after study shows that diverse teams — board level and others — deliver better results, but the Rule of Steve persists.

International Women’s Day Is Not the Only Time We Should Focus on Improving Diversity in the Cybersecurity Workforce
As the mother of two daughters, I see every day as an opportunity to further the cause of women in the workforce. My children are not yet fully in the workforce, but when they do join, irrespective of their choice of profession, they will not regard their gender as any kind of impediment to what they want to achieve.

Everyone working in the cybersecurity industry today has a role to play. Many organizations recognize the lack of diversity in their workforce and have programs in place to improve the situation, but these programs take time to manifest. Every individual’s day-to-day attitude is an important component. We must challenge casual sexism in the workplace: letting it go unchallenged means it is acceptable. We must encourage diversity in job applications: gender language de-coders for job advertisements are free and can significantly improve diversity in applications. We must highlight diverse role models for others to aspire to — not only leaders but also experts in their field. We must constantly challenge ourselves with our own subconscious biases: Have we really addressed our own preconceptions?

There is much to do to break the “Rule of Steve” in cybersecurity, and if everyone plays their part, then we have a chance of achieving parity this decade. International Women’s Day presents an opportunity for headlining the discussion, but the actions should take place 365 days a year.

Maxine leads Omdia’s cybersecurity research, developing a comprehensive research program to support vendor, service provider, and enterprise clients. Having worked with enterprises across multiple industries in the world of information security, Maxine has a strong … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post On International Women’s Day 2021, Does the ‘Rule of Steve’ Still Apply? Yes. appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/on-international-womens-day-2021-does-the-rule-of-steve-still-apply-yes/?utm_source=rss&utm_medium=rss&utm_campaign=on-international-womens-day-2021-does-the-rule-of-steve-still-apply-yes

BSides Calgary 2020 – Noor Abid’s ‘Using Biometrics (Gait) For Security Applications’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Noor Abid’s ‘Using Biometrics (Gait) For Security Applications’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Noor Abid’s ‘Using Biometrics (Gait) For Security Applications’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/bsides-calgary-2020-noor-abids-using-biometrics-gait-for-security-applications/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-noor-abids-using-biometrics-gait-for-security-applications

Non-Fungible Tokens, Talon Cameras, OSINT, & Rockwell – Wrap Up – SWN #104

This week Dr. Doug talks Non-fungible tokens, Exchange, Talon cameras, OSINT, Rockwell, & show wrap ups on the Security Weekly Wrap Up Show!

Visit https://www.securityweekly.com/swn for all the latest episodes!

Show Notes: https://securityweekly.com/swn104

The post Non-Fungible Tokens, Talon Cameras, OSINT, & Rockwell – Wrap Up – SWN #104 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/non-fungible-tokens-talon-cameras-osint-rockwell-wrap-up-swn-104/?utm_source=rss&utm_medium=rss&utm_campaign=non-fungible-tokens-talon-cameras-osint-rockwell-wrap-up-swn-104

Employee Appreciation Day: A Big Thank You to Our Amazing Employees

Our people are our greatest asset and on the occasion of Employee Appreciation Day, we express our gratitude to them. We also want our people to know that we value their individual efforts that add up to make us a successful company Recognition lifts the morale of the employees, as it makes them feel appreciated […]

The post Employee Appreciation Day: A Big Thank You to Our Amazing Employees appeared first on Security Boulevard.

Read More

The post Employee Appreciation Day: A Big Thank You to Our Amazing Employees appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/employee-appreciation-day-a-big-thank-you-to-our-amazing-employees/?utm_source=rss&utm_medium=rss&utm_campaign=employee-appreciation-day-a-big-thank-you-to-our-amazing-employees

China’s RedEcho accused of targeting India’s power grids

RedEcho, an advanced persistent threat (APT) group from China, has attempted to infiltrate the systems behind India’s power grids, according to a threat analysis report from Recorded Future [PDF].

It appears that what triggered this attempt to gain a foothold in India’s critical power generation and transmission infrastructure, was a tense standoff at Pangong Tso lake in May 2020. However, the report by Recorded Future, a cybersecurity company specializing in threat intelligence, claims that RedEcho were on the prowl way before this time.

Incidents at the border

China and India have been locked in a territorial dispute for decades, over an ill-defined, disputed border between Ladakh and Aksai Chin. This de-facto boundary called the Line of Actual Control (LAC) sits in the Himalayan region. Because of snowcaps, rivers, and lakes along the frontier, the LAC can shift, and soldiers from both sides often find themselves face to face with each other, increasing the risk of a confrontation.

The most recent conflict at the border transpired in June 2020, barely a full month after the May skirmish. This time, Chinese and Indian soldiers clashed in Galwan, with China accusing India of crossing onto the Chinese side. A total of 63 casualties—20 troops from India and 43 from China—were reported. Both countries insisted that no bullets were exchanged. Instead, they engaged using, literally, sticks and stones (“rocks and clubs”, according to the BBC).

Incidents in cyberspace

Although Recorded Future had observed a lot of intrusion activity towards Indian organizations in the digital space before the clash, it gained momentum after the Indian and Chinese troops faced off in May.

“In the lead-up to the May 2020 skirmishes, we observed a noticeable increase in the provisioning of PlugX malware C2 infrastructure, much of which was subsequently used in intrusion activity targeting Indian organizations,” the report said. “The PlugX activity included the targeting of multiple Indian government, public sector, and defense organizations from at least May 2020.”

RedEcho is the latest APT group to target India via its energy sector using ShadowPad, a modular backdoor that has been in use since 2017. The company also noted in its report that ShadowPad is shared among other state-backed threat actor groups who are affiliated with both the Chinese Ministry of State Security (MSS) and the People’s Liberation Army (PLA). Some of these groups include APT41 (aka Barium, among others), Icefog, KeyBoy (aka Pirate Panda), Tick, and Tonto Team.

RedEcho allegedly penetrated a total of 12 organizations, including four of India’s five Regional Load Despatch Centres (RLDCs) and two State Load Despatch Centres (SLDCs). These organizations are responsible for ensuring the optimum scheduling and dispatching of electricity based on supply and demand across regions in India. According to Recorded Future, “The targeting of Indian critical infrastructure offers limited economic espionage opportunities; however, we assess they pose significant concerns over potential pre-positioning of network access to support Chinese strategic objectives.”

This isn’t the first time India’s critical infrastructure has been in the crosshairs. In November 2020, APT41 had set their sights on India’s oil and gas sectors. Media reports suggested that the October 2020 power outage in Mumbai and neighboring areas, which crippled train transportation, closed the stock exchange, and hampered those working from home amidst the pandemic, was sabotage. Some called the outage a “warning shot” from China.

“Profoundly disturbed”

Subrahmanyam Jaishankar, India’s foreign minister, described the relationship between India and China as “profoundly disturbed”. RedEcho is just one threat actor group that has entered the scene, but we can expect that they won’t be the last. And things might only get worse because of rising geopolitical tensions, not just between China and India but also between other countries that are currently in dispute.

Remember the December 2016 power grid attack against Ukraine by Russian hackers?

And to accentuate the likely reality that more attacks against critical infrastructures will happen in the future, Dragos Inc, a cybersecurity firm specializing in industrial cybersecurity, released its “2020 Year in Review” report in late February 2021 determining that threats against industrial control systems (ICSs) and operational technology (OT) have increased threefold.

It’s worth mentioning that not all attacks on critical infrastructure are backed by nation states though. And while this is true, the outcome is still the endangerment of lives. Take, for example, the attempted poisoning of a Florida city’s drinking water last month, which was likely an act of vandalism, but could have had the impact of a terrorist attack.

The post China’s RedEcho accused of targeting India’s power grids appeared first on Malwarebytes Labs.

The post China’s RedEcho accused of targeting India’s power grids appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/chinas-redecho-accused-of-targeting-indias-power-grids-2/?utm_source=rss&utm_medium=rss&utm_campaign=chinas-redecho-accused-of-targeting-indias-power-grids-2

China’s RedEcho accused of targeting India’s power grids

RedEcho, an advanced persistent threat (APT) group from China, has attempted to infiltrate the systems behind India’s power grids, according to a threat analysis report from Recorded Future [PDF].

It appears that what triggered this attempt to gain a foothold in India’s critical power generation and transmission infrastructure, was a tense standoff at Pangong Tso lake in May 2020. However, the report by Recorded Future, a cybersecurity company specializing in threat intelligence, claims that RedEcho were on the prowl way before this time.

Incidents at the border

China and India have been locked in a territorial dispute for decades, over an ill-defined, disputed border between Ladakh and Aksai Chin. This de-facto boundary called the Line of Actual Control (LAC) sits in the Himalayan region. Because of snowcaps, rivers, and lakes along the frontier, the LAC can shift, and soldiers from both sides often find themselves face to face with each other, increasing the risk of a confrontation.

The most recent conflict at the border transpired in June 2020, barely a full month after the May skirmish. This time, Chinese and Indian soldiers clashed in Galwan, with China accusing India of crossing onto the Chinese side. A total of 63 casualties–20 troops from India and 43 from China–were reported. Both countries insisted that no bullets were exchanged. Instead, they engaged using, literally, sticks and stones (“rocks and clubs”, according to the BBC).

Incidents in cyberspace

Although Recorded Future had observed a lot of intrusion activity towards Indian organizations in the digital space before the clash, it gained momentum after the Indian and Chinese troops faced off in May.

“In the lead-up to the May 2020 skirmishes, we observed a noticeable increase in the provisioning of PlugX malware C2 infrastructure, much of which was subsequently used in intrusion activity targeting Indian organizations,” the report said. “The PlugX activity included the targeting of multiple Indian government, public sector, and defense organizations from at least May 2020.”

RedEcho is the latest APT group to target India via its energy sector using ShadowPad, a modular backdoor that has been in use since 2017. The company also noted in its report that ShadowPad is shared among other state-backed threat actor groups who are affiliated with both the Chinese Ministry of State Security (MSS) and the People’s Liberation Army (PLA). Some of these groups include APT41 (aka Barium, among others), Icefog, KeyBoy (aka Pirate Panda), Tick, and Tonto Team.

RedEcho allegedly penetrated a total of 12 organizations, including four of India’s five Regional Load Despatch Centres (RLDCs) and two State Load Despatch Centres (SLDCs). These organizations are responsible for ensuring the optimum scheduling and dispatching of electricity based on supply and demand across regions in India. According to Recorded Future, “The targeting of Indian critical infrastructure offers limited economic espionage opportunities; however, we assess they pose significant concerns over potential pre-positioning of network access to support Chinese strategic objectives.”

This isn’t the first time India’s critical infrastructure has been in the crosshairs. In November 2020, APT41 had set their sights on India’s oil and gas sectors. Media reports suggested that the October 2020 power outage in Mumbai and neighboring areas, which crippled train transportation, closed the stock exchange, and hampered those working from home amidst the pandemic, was sabotage. Some called the outage a “warning shot” from China.

“Profoundly disturbed”

Subrahmanyam Jaishankar, India’s foreign minister, described the relationship between India and China as “profoundly disturbed”. RedEcho is just one threat actor group that has entered the scene, but we can expect that they won’t be the last. And things might only get worse because of rising geopolitical tensions, not just between China and India but also between other countries that are currently in dispute.

Remember the December 2016 power grid attack against Ukraine by Russian hackers?

And to accentuate the likely reality that more attacks against critical infrastructures will happen in the future, Dragos Inc, a cybersecurity firm specializing in industrial cybersecurity, released its “2020 Year in Review” report in late February 2021 determining that threats against industrial control systems (ICSs) and operational technology (OT) have increased threefold.

It’s worth mentioning that not all attacks on critical infrastructure are backed by nation states though. And while this is true, the outcome is still the endangerment of lives. Take, for example, the attempted poisoning of a Florida city’s drinking water last month, which was likely an act of vandalism, but could have had the impact of a terrorist attack.

The post China’s RedEcho accused of targeting India’s power grids appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/chinas-redecho-accused-of-targeting-indias-power-grids/?utm_source=rss&utm_medium=rss&utm_campaign=chinas-redecho-accused-of-targeting-indias-power-grids

Securing APIs: Application Architecture Disrupted

Posted under: Research and Analysis

When you think of disruption, the typical image is a tornado coming through and ripping things up, leaving towns leveled and nothing the same moving forward. But disruption can be slow and steady, incremental in the way everything you thought you knew has changed. Securing cloud environments was like that, initially trying to use existing security concepts and controls, which worked well enough. Until they didn’t and forced a re-evaluation of everything that we thought we knew about security. The changes were (and still are for many) challenging, but overall very positive.

We see the same type of disruption in how applications are built, deployed, and maintained within most organizations. Macro changes include the migration to cloud disrupting the tech stack, application design patterns bringing microservices to the forefront, and DevOps changing dev/release practices. As we’ve been slowly navigating this sea change, the common thread between these changes is an increasing reliance on application programming interfaces (APIs).

From a security standpoint, this new dependence on APIs changes the source of risk – it’s not just the front end under siege from traditional attacks and recon activities that map out backend processes. APIs have quickly emerged as the most attractive and least protected target within these new applications since they have access to critical data and services. Thus, we’ve decided to document this disruption and the impact on how you have to view application security moving forward.

We’re happy to introduce our latest blog series called Securing APIs: The New Application Attack Surface. In the series, we’ll go through how application architecture and the attack surface is changing, how application security needs to evolve to deal with these disruptions, and how to empower security in an environment where DevOps rules the roost. Because that is the way.

Let’s give thanks to Salt Security as the potential licensee of this blog series before we get started. As a refresher for those new around here, we don’t write sponsored papers. We publish research for practitioners that we may license to a vendor at the end of the process. That gives us the flexibility to go where our research takes us without undue influence. It’s a bit of a counter-intuitive model, but we’ve been doing it for 13 years at this point, and it works pretty well.

Application Architecture Today

As we get started, let’s go through how we see application architecture evolving. There isn’t one size fits all regarding architecture, and not all of these aspects may apply to your situation. But we’re pretty sure they will; it’s just a matter of time.

  • Smaller: First, let’s highlight microservices. This approach breaks down traditional monolithic applications into a set of services weaved together through defined APIs. This approach adds modularity (yes, we used to call this reusability of components), flexibility and consistency since your developers don’t need to reinvent the wheel. It’s also heavily dependent on open source components that provide the base for many services.
  • Faster: With the embrace of DevOps in many application teams, the objective is to eliminate the typical walls between Development and Ops (and security to a point), which creates shared accountability and focuses everyone on not just building but deploying and operating applications at higher velocity with better resilience. A key to making DevOps work is adding automation to manage the deployment process. The automation spans from code check-in, to testing (including security tests), and ultimately the deployment into production. How do you address the CI/CD (continuous integration/continuous deployment) pipeline and all the ancillary services orchestrated by the pipeline? Yup. Through APIs.
  • Cloud-Native: The computing platform where the applications run also has evolved significantly. Given the requirements (as described above) of modularity, flexibility, and velocity, applications need to run in a more agile infrastructure. It may be public cloud, containerized, serverless, or some combination therein. When we say cloud-native, it can encompass any of the three, not just containers. But regardless, you interact with the computing platform via (drum roll, please) APIs. And increasingly, your infrastructure is described as code, which increases the application surface for security testing.

Another hallmark of modern application architecture is assembling applications, as opposed to building them. Using pre-built microservices to get started and building the components you need allows you to weave the application together without developing everything. This democratizes technology and allows business professionals to play a more prominent role in building the applications they need, potentially without IT interference. That’s a bit harsh but not too far from the truth.

And to reiterate, what do microservices, DevOps, and the cloud have in common? A reliance on APIs to integrate the components of the application stack. And that makes APIs a pretty sweet target for attackers.

API Attack Surface

As with most things security, protection starts with visibility. You’ve got options to enumerate the API environment, leveraging an inventory (such as a Swagger file repository) or via the discovery of APIs via scanning and network monitoring.

But visibility isn’t only for you. The problem is attackers can also use the same techniques to enumerate your API surface. Especially given that API requests and responses may travel over accessible networks, and Swagger files are accessible, providing an opportunity for an attacker to discover API parameters and potentially gain access to application data. We’ll go into a more detailed discussion of API visibility/discovery in the next post.

API Attacks

OWASP has done an excellent job of documenting standard API attacks in their list of OWASP API Top 10. These range from the simple, like randomly changing resource IDs to access other customer’s data (insecure direct object reference) or brute force attacks to identify weak links in API authentication. There are input attacks meant to cause API failures or traditional flaws like buffer overflows.

More complicated attacks involve gaming the application’s permission structure by invoking admin-level APIs without proper authorization or authentication. You can also see application defects like excessive data exposure when the application unnecessarily returns full data objects. Finally, you can have availability attacks, such as a denial of service against the API to overwhelm the system.

API attacks look a lot like other application attacks that we’ve seen for years. Attackers can go after the logic, the input, the availability, or the permission structure – and they do.

Traditional Defenses (are) Traditional

Since we are drawing analogies to traditional application security, we’ll need to consider how the traditional defenses would work against these kinds of attacks. By traditional defenses, we mean WAFs, API Gateways, and managed application security services. Let’s highlight some of the challenges of using these defenses within the context of an API attack.

  • WAF: Within the context of new API attacks, think of a WAF as the equivalent of an email gateway trying to stop a web-based attack. It talks in a different language. The WAF can detect some API attacks (like an injection that look like application attacks), but its proxy architecture and limited rule sets present limitations in defending APIs.
  • API Gateway: API gateways emerged to centralize API traffic for performance and reliability purposes. Security was mostly an after-thought, and similar to the WAF, the API gateway is rather limited in the security protection it offers. Malformed requests, brute force, and injection attacks are simple to handle. Yet, anything aiming to enumerate the API surface or exploit logic or excessive data flaws will go undetected.
  • Managed Application Security Services: A new class of managed offerings has emerged that combines the WAF, DDoS, API gateway and adds some bot mitigation under one offering. They are typically offered by a CDN or cloud provider since they see the traffic anyway. Using a managed version of the previously mentioned solutions will address some operational issues but doesn’t address the underlying technologies’ limitations.

Additionally, tactics like application security testing also have a place in protecting APIs by scanning the Swagger files to find potential vulnerabilities and exposures. To be clear, we are not saying that these traditional protections are not relevant in this new API-centric world. They are necessary but not sufficient. It’s not a matter of either/or for these protections. The point we’ll make through the rest of the series is that you need to consider API security as an additional aspect of protecting your critical applications, and not just within existing application security tools and processes.

In the next post, we’ll dig into the approaches to protect the API layer and how those defenses complement the rest of your application security strategy.

– Mike Rothman
(0) Comments
Subscribe to our daily email digest

The post Securing APIs: Application Architecture Disrupted appeared first on Security Boulevard.

Read More

The post Securing APIs: Application Architecture Disrupted appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/securing-apis-application-architecture-disrupted/?utm_source=rss&utm_medium=rss&utm_campaign=securing-apis-application-architecture-disrupted

The value of PAM integrations with a credential vault

SecureLink’s mission is to make third-party remote access as comprehensive and powerful as possible. To achieve this, our product integrates with a number of other cybersecurity programs and applications to make our customer’s experience as secure and efficient as possible.  In this post, we’ll look at four Privileged Access Management (PAM) providers that securely integrate […]

The post The value of PAM integrations with a credential vault appeared first on SecureLink.

The post The value of PAM integrations with a credential vault appeared first on Security Boulevard.

Read More

The post The value of PAM integrations with a credential vault appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/the-value-of-pam-integrations-with-a-credential-vault/?utm_source=rss&utm_medium=rss&utm_campaign=the-value-of-pam-integrations-with-a-credential-vault

Encrypted Traffic Strategies

The post Encrypted Traffic Strategies appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/encrypted-traffic-strategies-2/?utm_source=rss&utm_medium=rss&utm_campaign=encrypted-traffic-strategies-2

Encrypted Traffic Strategies

The post Encrypted Traffic Strategies appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/encrypted-traffic-strategies/?utm_source=rss&utm_medium=rss&utm_campaign=encrypted-traffic-strategies

XKCD ‘Manage Your Preferences’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Manage Your Preferences’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Manage Your Preferences’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/xkcd-manage-your-preferences/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-manage-your-preferences

The Case for Collective Defense of the Public Sector

“The United States now operates in a cyber landscape that requires a level of data security, resilience, and trustworthiness that neither the U.S. government nor the private sector alone is currently equipped to provide. … If the U.S. government cannot find a way to seamlessly collaborate with the private sector to build a resilient cyber ecosystem, the nation will never be secure.”

The post The Case for Collective Defense of the Public Sector appeared first on Security Boulevard.

Read More

The post The Case for Collective Defense of the Public Sector appeared first on Malware Devil.



https://malwaredevil.com/2021/03/04/the-case-for-collective-defense-of-the-public-sector-12/?utm_source=rss&utm_medium=rss&utm_campaign=the-case-for-collective-defense-of-the-public-sector-12

It’s an Amazing Time to Be in Digital Identity

ForgeRock has a rich history of transforming the digital identity experiences for the most successful companies on the planet. The announcement of Okta’s intent to acquire Auth0 underscores the importance of this market. It’s more exciting than ever to be part of ForgeRock as we execute on our mission of helping organizations create digital identity experiences that are frictionless and intuitive while still protecting the security of the enterprise in a Zero Trust environment.

We’re in a Better Position than Ever Before to Lead the Way

In light of the news, I was reflecting on what we hear consistently from customers. Based on research and experience, some things have become crystal clear. To support the future of work and digital transformation, ForgeRock is uniquely poised and ready to help customers meet their requirements as they embark on their modernization journey.

User Experience and Security Without Compromise

Today’s end user won’t tolerate a poor experience, and businesses can’t risk security vulnerabilities. When you try to balance security and experience, you usually end up with an approach that’s mediocre at best. At ForgeRock, our purpose is to help users safely and simply access the connected world. We help organizations deepen their relationships with their customers and improve the productivity of their workforce all while growing revenues and saving costs; increasing security and compliance; and reducing fraud and risk. Using our unique Intelligent Access Trees, our customers can avoid compromise and deliver exceptional and secure experiences.

A Purpose-built, Enterprise-grade IAM Platform 

This means support for any kind of identity: consumers, workforce, services, or things. It means support for key functionality: identity management, access management, and identity governance. It means providing powerful extensibility, configurability, scalability, and performance. It means protecting applications and application programming interfaces (APIs). And it means integration support for any kind of app, whether modern microservices-based, mobile, web, or legacy. This is what you get with ForgeRock.

Cloud-based Solutions that Support Hybrid IT

According to a soon-to-be released survey of more than 300 IAM decision makers at large organizations, 98% of respondents who have adopted cloud-based IAM solutions have experienced challenges mapping and integrating them into their existing processes and legacy systems. Customers want a platform that they can integrate into their current reality while modernizing their infrastructure. With our simplified pricing model, ForgeRock enables customers to consume our technology as a cloud service, deploy into self-managed environments or both. Customers can deploy identity management where and how they need it to support their hybrid architectures. 

Control Over Data 

To meet global security and regulatory requirements, organizations require flexibility in how they consume identity services and where their data is stored. Customers want to be sure the performance of their environment is not affected by others. They need assurance that their data is not comingled, and they want to avoid nosy and noisy neighbor problems. ForgeRock’s unique cloud architecture does just that, while providing customers the time to value they have come to expect from a cloud-based service.

Acceleration of Digital Transformation by Putting an End to Identity Silos 

As customers push to modernize, they are struggling with how to manage the numerous identity silos that crop up across their organizations. We call this Shadow Identity, and it leads to poor customer experiences and increased security risks. Our industry has spent decades tearing down silos of identity in order to unify identity in customers’ environments in order to provide better experiences and reduce security risks. Understandably, these companies are moving fast, but it is imperative that they take a strategic view of identity that will support their goals today and in the future. ForgeRock enables organizations to harmonize their identity while enabling business agility to move fast.

No matter what the business driver is  Zero Trust, cloud adoption, digital transformation, or modernization ForgeRock is uniquely equipped to deliver world-class business outcomes on a global scale without compromise. We believe the news this week solidifies our position as the only identity solution provider that can set the identity standard for enterprises: One platform, Any identity.

The post It’s an Amazing Time to Be in Digital Identity appeared first on Security Boulevard.

Read More

The post It’s an Amazing Time to Be in Digital Identity appeared first on Malware Devil.



https://malwaredevil.com/2021/03/05/its-an-amazing-time-to-be-in-digital-identity-4/?utm_source=rss&utm_medium=rss&utm_campaign=its-an-amazing-time-to-be-in-digital-identity-4

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...