Malware Devil

Wednesday, March 17, 2021

Fallas en ciberseguridad, uno de los grandes riesgos de 2021

Banner blog riesgos en ciberseguridad

Desde el 2020, con las personas trabajando desde casa y las aplicaciones de productividad y trabajo a tope, las ciberamenazas tomaron un rol protagónico. Fueron muchos los ataques de ransomware, phishing y otras modalidades que afectaron a millones de …

The post Fallas en ciberseguridad, uno de los grandes riesgos de 2021 appeared first on ManageEngine Blog.

The post Fallas en ciberseguridad, uno de los grandes riesgos de 2021 appeared first on Security Boulevard.

Read More

The post Fallas en ciberseguridad, uno de los grandes riesgos de 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/fallas-en-ciberseguridad-uno-de-los-grandes-riesgos-de-2021/?utm_source=rss&utm_medium=rss&utm_campaign=fallas-en-ciberseguridad-uno-de-los-grandes-riesgos-de-2021

Behind the Scenes: The Journey to Defensive Security & Kasada v2

We’ve been on a journey to rebuild a defensive security solution against highly skilled, motivated, and persistent adversaries. Our new v2 platform development has been years in the making. Over this time, we’ve focused on adversarial thinking in all phases of the v2 design by understanding tactics, identifying common pitfalls, and analyzing every bot we’ve […]

The post Behind the Scenes: The Journey to Defensive Security & Kasada v2 appeared first on Security Boulevard.

Read More

The post Behind the Scenes: The Journey to Defensive Security & Kasada v2 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/behind-the-scenes-the-journey-to-defensive-security-kasada-v2/?utm_source=rss&utm_medium=rss&utm_campaign=behind-the-scenes-the-journey-to-defensive-security-kasada-v2

Mimecast Says SolarWinds Attackers Accessed its Source Code Repositories

But the amount of code downloaded is too little to be of any use, the email security vendor says in its latest update.

Hackers who gained access to Mimecast’s systems via a poisoned SolarWind’s software update late last year appear to have caused more damage than originally thought.

The email security vendor’s continuing investigation of the breach has revealed that the attackers accessed and downloaded at least some of its source code repositories and also email addresses, contact information and hashed, salted credentials belonging to some customers.

In an update this week — at least the third since news of the breach first broke — Mimecast described the source code theft as limited in scope and unlikely to have any negative consequences for customers.

“We believe that the source code downloaded by the threat actor was incomplete and would be insufficient to build and run any aspect of the Mimecast service,” the company said.

There is also no evidence that the threat actor used their access to modify Mimecast source code or impact products in any way, the security vendor noted.

Mimecast is one of many organizations around the world that was impacted when a believed nation-state backed threat actor installed malware called SUNBURST on their networks by quietly hiding the malicious code in legitimate software updates from SolarWinds. Some 18,000 SolarWinds customers — such as Mimecast — received and downloaded the poisoned updates. But relatively few of them were subsequently targeted for further exploits.

Mimecast discovered the attack in January when Microsoft notified the company about a compromise involving certificates used to authenticate Mimecast security products to Microsoft 365 Exchange Web Services environments. Along with the certificates, the attackers also accessed related customer server connection information.

Mimecast said Microsoft had discovered the threat actor using the compromised certificates to illegally access networks that belonged to a handful of their mutual customers. In its initial advisory, Mimecast said about 10% of its customers used the compromised certificates. But it said less than 10 of those customers had their Microsoft 365 environments illegally accessed via the compromised certificate-based connection. Mimecast asked all customers to delete their existing connection to their M365 tenant and re-establish a fresh one with the company’s newly issued keys.

Mimecast’s subsequent investigation — with FireEye Mandiant’s help — showed the attackers had used their initial foothold to move laterally to the company’s production environment, which contained “a small number” of Windows servers. The attackers then queried and likely extracted encrypted service account credentials from the servers that potentially gave them access to on-premises and cloud-hosted systems belonging to mutual customers of Microsoft and Mimecast in the US and UK.

According to Mimecast, it did not find any evidence to suggest that the encrypted credentials were later decrypted and misused in any way.

“The update from Mimecast reiterates the fact that the recent attack did not stop with the initial target,” says John Morgan, CEO of Confluera.The threat actors used their access on Mimecast’s network to steal certificates and keys that allowed them to further expand attacks beyond Mimecast’s own environment and affiliated systems, he says. This was a scenario that played out at many of the organizations that were impacted in the SolarWinds supply chain attack.

“Another takeaway from the Mimecast report is how critical lateral movement was to the overall attack,” Morgan notes. “As with many modern attacks, after gaining initial access, the attacker moved from the point of access to the targeted servers via lateral movement.”

One of the reasons why many modern attacks are so effective is because organizations often cannot detect such lateral movement, he says.

Mimecast Reiterates Earlier Recommendation
In its advisory this week, Mimecast reiterated its recommendation that all of its customers reset server connection credentials being used on the Mimecast platform. The company said it had reset the hashed and salted credentials that were accessed, changed all impacted certificates and encryption keys, and implemented closer monitoring of all its certificates and encryption keys.

In addition, the company has decommissioned the SolarWinds Orion platform, changed credentials for all employees, and implemented two-factor authentication for employees requiring access to production systems. It has also implemented measures to ensure its source code is secure and cannot be tampered with and is currently working on developing a new OAuth-based authentication and connection mechanism between Microsoft and Mimecast environments.

A Mimecast spokesman declined to say when the new mechanism would become available.

Dirk Schrader, global vice president of security research at New Net Technologies, says Mimecast’s response and remediation measures have been laudable, but its failure to detect the breach in the first place is concerning. Measures such as host monitoring, system and file integrity checks, and change control are essential and should have been implemented, he says. They would have helped Mimecast detect the intrusion, instead of having to be alerted by Microsoft days later, he adds.

The fact that the credentials stolen from Mimecast’s environment gave threat actors a way to potentially attack both cloud and on-premises systems is troubling as well, Confluera’s Morgan says.

“This should be a wake-up call for any organizations who have preconceived notions about the security of the servers based on its deployment models,” he says. “It reiterates the need for organizations to adopt a security model that can detect and respond to threats in real-time across their entire environment.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post Mimecast Says SolarWinds Attackers Accessed its Source Code Repositories appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/mimecast-says-solarwinds-attackers-accessed-its-source-code-repositories/?utm_source=rss&utm_medium=rss&utm_campaign=mimecast-says-solarwinds-attackers-accessed-its-source-code-repositories

A Guide to Detecting Microsoft Exchange Zero-Day Exploits

TL;DR First and foremost, apply patches to the Exchange infrastructure. Assume compromise. It’s been reported that the attackers launched a massive compromise attack against 60,000+ Exchange Servers before patches became available, and many other attackers are actively looking for exploited…

The post A Guide to Detecting Microsoft Exchange Zero-Day Exploits appeared first on LogRhythm.

The post A Guide to Detecting Microsoft Exchange Zero-Day Exploits appeared first on Security Boulevard.

Read More

The post A Guide to Detecting Microsoft Exchange Zero-Day Exploits appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/a-guide-to-detecting-microsoft-exchange-zero-day-exploits/?utm_source=rss&utm_medium=rss&utm_campaign=a-guide-to-detecting-microsoft-exchange-zero-day-exploits

XKCD ‘Siri’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Siri’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Siri’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/xkcd-siri/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-siri

Attack Surface – What are we Missing? – Ilia Kolochenko – ESW #220

Ilia Kolochenko, founder of ImmuniWeb, joins Paul and Adrian to discuss the challenge of discovering and handling exposed data and vulnerabilities before the bad guys do.

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw220

The post Attack Surface – What are we Missing? – Ilia Kolochenko – ESW #220 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/attack-surface-what-are-we-missing-ilia-kolochenko-esw-220/?utm_source=rss&utm_medium=rss&utm_campaign=attack-surface-what-are-we-missing-ilia-kolochenko-esw-220

Cisco Plugs Security Hole in Small Business Routers

The Cisco security vulnerability exists in the RV132W ADSL2+ Wireless-N VPN Routers and RV134W VDSL2 Wireless-AC VPN Routers.
Read More

The post Cisco Plugs Security Hole in Small Business Routers appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/cisco-plugs-security-hole-in-small-business-routers/?utm_source=rss&utm_medium=rss&utm_campaign=cisco-plugs-security-hole-in-small-business-routers

Teen Behind Twitter Bit-Con Breach Cuts Plea Deal

The ‘young mastermind’ of the Twitter hack will serve three years in juvenile detention. 
Read More

The post Teen Behind Twitter Bit-Con Breach Cuts Plea Deal appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/teen-behind-twitter-bit-con-breach-cuts-plea-deal/?utm_source=rss&utm_medium=rss&utm_campaign=teen-behind-twitter-bit-con-breach-cuts-plea-deal

RDP Attacks Persist Near Record Levels in 2021

A wave of attacks targeting Remote Desktop Protocol has continued throughout the pandemic as more employees continue to work from home.

Remote Desktop Protocol (RDP) became a hot target for cybercrime as businesses shifted to remote work due to the COVID-19 pandemic. A year later, the trend shows no sign of slowing.

RDP, Microsoft’s proprietary protocol for enabling people to remotely access Windows servers or workstations, is among the most popular remote access protocols used by organizations today. As such, when businesses shifted to remote work last March, cybercriminals swiftly took notice.

In the spring of 2020, when many organizations shut their office doors, attacks targeting RDP began to skyrocket: Kaspersky reported a spike from 93.1 million global RDP attacks in February to 277.4 million in March – a 197% increase, researchers note. The trend went up and down throughout the year but saw another significant jump as winter lockdowns were announced.

ESET telemetry reflects a similar pattern. The research team reported “quite stable growth” in RDP attacks throughout 2020, with the fastest changes in February and March as the US and Western Europe went into lockdown. While there was some variation in the number of attack attempts toward the end of the year, the number of companies reporting RDP attacks per day remained steady. Between the first and fourth quarters of 2020, RDP attacks grew 768%.

By February 2021, Kaspersky reported 377.5 million brute-force attacks targeting RDP, underscoring a massive spike from the 91.3 million observed at the start of 2020. In some countries these attacks tripled, while in others they grew as much as 10 times, says Kaspersky researcher Maria Namestnikova. RDP has long interested attackers because it allows them to easily gain complete control over a machine, but their attacks have ramped up in the past year.

“With the widespread popularity of this technology, the efforts of cybercriminals in this area have multiplied as they look to take advantage of the fact that RDP is being used en masse by people and entire companies,” Namestnikova explains, noting they are “often very poorly aware of the risks of using applications for remote access and don’t know ways to make such access more secure.”

Much of the attacks researchers are seeing against RDP are brute-force attacks. These require minimal effort from attackers, Namestnikova says, but remain effective because people continue to use simple passwords that can be brute-forced with several attempts. It’s worth noting that attackers may exploit vulnerabilities to target RDP, and Microsoft patched a number of remote desktop flaws in 2020. And RDP isn’t the only protocol in use; if a company uses other means of remote access, such as the VNC protocol, it will still be at risk.

While RDP attacks certainly weren’t the only threat to watch in 2020, they saw a larger spike than most, ESET researchers say. Cryptominers went up for the first time since 2018, a trend they attribute to growing Bitcoin prices, and downloaders saw an increase for most of the past year. Ransomware, of course, saw changes as operators shifted strategies to breach via remote access or exploited vulnerabilities to then steal data and engage in double-extortion attacks.

“RDP was surely the most prominent,” according to the ESET Malware Research Labs, noting “there were other malware categories that saw an upward trend, although not in such large numbers.”

Security Gaps Enable RDP Attacks
Hastily implemented and configured RDPs in many organizations have played a role in driving this type of attack, says Namestnikova. The attack vector, already popular, has become even more accessible in terms of the number of users and level of security.

“The primary measure that you should take in your company if you use RDP is, firstly, to educate employees on how complex passwords should be,” she says. (The answer is very, and it is better to store them using password managers.) Namestnikova also advises using a corporate VPN for RDP access. Further, RDP allows additional authentication before establishing a server connection, which organizations should be using. If they don’t use RDP, the protocol should be turned off.

Now that criminals have identified RDP as an effective attack vector, it’s unlikely we’ll see these attacks ease up – especially as businesses decide to allow for remote work more often or full time. Both employers and employees are growing accustomed to this way of working, she adds.

“That means it’s likely RDP will remain more popular than it was before the pandemic, even when the disease recedes and all companies that want to return their employees to the office do so,” Namestnikova continues. That said, she notes Kaspersky expects to see a decrease from current levels as those using RDP remember to turn it off.

The ESET team also anticipates more organizations will devote more effort into securing and hardening their systems, bringing a stabilization and perhaps a gradual drop in the number of successful RDP attacks in coming months.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post RDP Attacks Persist Near Record Levels in 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/rdp-attacks-persist-near-record-levels-in-2021/?utm_source=rss&utm_medium=rss&utm_campaign=rdp-attacks-persist-near-record-levels-in-2021

ARM Support, Cyber “SPAC”, Cyber Fusion, Docker, & Beer Outage – ESW #220

This week in the Enterprise Security News: funding announcements from Coalition, HeraSoft, Cowbell Cyber, Argon, Cynet, Docker, and Cyware. Sonatype Acquires MuseDev, Sumologic Acquires DF Labs, Acronis acquires Synapsys, Lookout grabs CipherCloud and a cybersecurity SPAC. Kasada announces some new features to its bot detection offering, Rapid7 introduces an agent for CloudFront, Aqua supports ARM, and Chris Roberts joins Cynet, & more!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw220

The post ARM Support, Cyber “SPAC”, Cyber Fusion, Docker, & Beer Outage – ESW #220 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/arm-support-cyber-spac-cyber-fusion-docker-beer-outage-esw-220/?utm_source=rss&utm_medium=rss&utm_campaign=arm-support-cyber-spac-cyber-fusion-docker-beer-outage-esw-220

Investing In Cybersecurity – Ron Gula – ESW #220

Ron joins us to cover various aspects of investing, including how to give the right pitch, what enterprises should be looking for in new technologies, are you 5% or amazing tech? Ron is also championing a new concept called data care and has launched his own podcast, Gula Tech Cyberfiction, in addition to some outstanding cybersecurity grants.

Gula Tech Foundation Grant Program – Data Care: https://www.gula.tech/foundation/

Gula Tech Non-Profits: https://www.gula.tech/projects/

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw220

The post Investing In Cybersecurity – Ron Gula – ESW #220 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/17/investing-in-cybersecurity-ron-gula-esw-220/?utm_source=rss&utm_medium=rss&utm_campaign=investing-in-cybersecurity-ron-gula-esw-220

It’s official… SMS is not a security tool

Using SMS as a second factor for authentication has always been a bit iffy, due to the risk of “SIM swapping” attacks. However, many people…

The post It’s official… SMS is not a security tool appeared first on Security Boulevard.

Read More

The post It’s official… SMS is not a security tool appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/its-official-sms-is-not-a-security-tool-2/?utm_source=rss&utm_medium=rss&utm_campaign=its-official-sms-is-not-a-security-tool-2

It’s official… SMS is not a security tool

Using SMS as a second factor for authentication has always been a bit iffy, due to the risk of “SIM swapping” attacks. However, many people…

The post It’s official… SMS is not a security tool appeared first on Security Boulevard.

Read More

The post It’s official… SMS is not a security tool appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/its-official-sms-is-not-a-security-tool/?utm_source=rss&utm_medium=rss&utm_campaign=its-official-sms-is-not-a-security-tool

Tuesday, March 16, 2021

Stop Identity Misconfigurations in Your Cloud

After an unprecedented year when enterprises were forced to take a quantum leap on cloud computing and remote work exploded, […]

The post Stop Identity Misconfigurations in Your Cloud appeared first on Sonrai Security.

The post Stop Identity Misconfigurations in Your Cloud appeared first on Security Boulevard.

Read More

The post Stop Identity Misconfigurations in Your Cloud appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/stop-identity-misconfigurations-in-your-cloud/?utm_source=rss&utm_medium=rss&utm_campaign=stop-identity-misconfigurations-in-your-cloud

Can We Stop Pretending SMS Is Secure Now?

SMS text messages were already the weakest link securing just about anything online, mainly because there are tens of thousands of people (many of them low-paid mobile store employees) who can be tricked or bribed into swapping control over a mobile phone number to someone else. Now we’re learning about an entire ecosystem of companies that anyone could use to silently intercept text messages intended for other mobile users.

The post Can We Stop Pretending SMS Is Secure Now? appeared first on Security Boulevard.

Read More

The post Can We Stop Pretending SMS Is Secure Now? appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/can-we-stop-pretending-sms-is-secure-now-3/?utm_source=rss&utm_medium=rss&utm_campaign=can-we-stop-pretending-sms-is-secure-now-3

Can We Stop Pretending SMS Is Secure Now?

SMS text messages were already the weakest link securing just about anything online, mainly because there are tens of thousands of people (many of them low-paid mobile store employees) who can be tricked or bribed into swapping control over a mobile phone number to someone else. Now we’re learning about an entire ecosystem of companies that anyone could use to silently intercept text messages intended for other mobile users.

The post Can We Stop Pretending SMS Is Secure Now? appeared first on Security Boulevard.

Read More

The post Can We Stop Pretending SMS Is Secure Now? appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/can-we-stop-pretending-sms-is-secure-now-2/?utm_source=rss&utm_medium=rss&utm_campaign=can-we-stop-pretending-sms-is-secure-now-2

Can We Stop Pretending SMS Is Secure Now?

SMS text messages were already the weakest link securing just about anything online, mainly because there are tens of thousands of people (many of them low-paid mobile store employees) who can be tricked or bribed into swapping control over a mobile phone number to someone else. Now we’re learning about an entire ecosystem of companies that anyone could use to silently intercept text messages intended for other mobile users.

Security researcher “Lucky225” worked with Vice.com’s Joseph Cox to intercept Cox’s incoming text messages with his permission. Lucky225 showed how anyone could do the same after creating an account at a service called Sakari, a company that helps celebrities and businesses do SMS marketing and mass messaging.

The “how they did it” was sickeningly simple. It cost just $16, and there was precious little to prevent someone from stealing your text messages without your knowledge. Cox writes:

Sakari offers a free trial to anyone wishing to see what the company’s dashboard looks like. The cheapest plan, which allows customers to add a phone number they want to send and receive texts as, is where the $16 goes. Lucky225 provided Motherboard with screenshots of Sakari’s interface, which show a red “+” symbol where users can add a number.

While adding a number, Sakari provides the Letter of Authorization for the user to sign. Sakari’s LOA says that the user should not conduct any unlawful, harassing, or inappropriate behavior with the text messaging service and phone number.

But as Lucky225 showed, a user can just sign up with someone else’s number and receive their text messages instead.

Lucky told KrebsOnSecurity that Sakari has since taken steps to block its service for being used with mobile telephone numbers. But he said Sakari is just one part of a much larger, unregulated industry that can be used to hijack SMS messages for many phone numbers.

“It’s not a Sakari thing,” Lucky225 replied when first approached for more details. “It’s an industry-wide thing. There are many of these ‘SMS enablement’ providers.”

The most common way thieves hijack SMS messages these days involves “sim swapping,” a crime that involves bribing or tricking employees at wireless phone companies into modifying customer account information.

In a SIM swap, the attackers redirect the target’s phone number to a device they control, and then can intercept the target’s incoming SMS messages and phone calls. From there, the attacker can reset the password of any account which uses that phone number for password reset links.

But the attacks Lucky225 has been demonstrating merely require customers of any number of firms to sign a sworn “letter of authorization” or LOA stating that they indeed do have the authority to act on behalf of the owner of the targeted number.

Allison Nixon is chief research officer at Unit221B, a New York City-based cyber investigations firm. An expert on SIM-swapping attacks who’s been quoted quite a bit on this blog, Nixon said she also had Lucky225 test his interception tricks on her mobile phone, only to watch her incoming SMS messages show up on his burner phone.

“This basically means the only thing standing between anyone and the equivalent of a SIM swap is a forged LOA,” Nixon said. “And the ‘fix’ put in seems to be temporary in nature.”

The interception method that Lucky225 described is still dangerously exposed by a number of systemic weaknesses in the global SMS network, he said.

Most large and legacy telecommunications providers validate transfer requests related to their customers by consulting NPAC, or the Number Portability Administration Center. When customers want to move their phone numbers — mobile or otherwise — that request is routed through NPAC to the customer’s carrier.

That change request carries what’s known as an ALT-SPID, which is a four-digit number that enables NPAC to identify the telecommunications company currently providing service to the customer. More importantly, as part of this process no changes can happen unless the customer’s carrier has verified the changes with the existing customer.

But Lucky225 said the class of SMS interception he’s been testing targets a series of authentication weaknesses tied to a system developed by NetNumber, a private company in Lowell, Mass. NetNumber developed its own proprietary system for mapping telecommunications providers that is used by Sakari and an entire industry of similar firms.

NetNumber developed its six-digit ALT SPIDs (NetNumber IDs) to better organize and track communications service providers that were all using other numbering systems (and differing numbers of digits). But NetNumber also works directly with dozens of voice-over-IP or Internet-based phone companies which do not play by the same regulatory rules that apply to legacy telecommunications providers.

“There are many VoIP providers that offer ‘off net’ ‘text enablement’,” Lucky225 explained. “Companies such as ZipWhip that promise to let you ‘Text enable your existing business phone number’ so that customers can text your main business line whether it be VoIP, toll-free or a landline number.”

As Lucky225 wrote in his comprehensive Medium article, there are a plethora of wholesale VoIP providers that let you become a reseller with little to no verification, many of them allow blanket Letters of Authorization (LOAs), where you as the reseller promise that you have an LOA on file for any number you want to text enable for your resellers or end-users.

“In essence, once you have a reseller account with these VoIP wholesalers you can change the Net Number ID of any phone number to your wholesale provider’s NNID and begin receiving SMS text messages with virtually no authentication whatsoever. No SIM Swap, SS7 attacks, or port outs needed — just type the target’s phone number in a text box and hit submit and within minutes you can start receiving SMS text messages for them. They won’t even be alerted that anything has happened as their voice & data services will continue to work as usual. Surprisingly, despite the fact that I publicly disclosed this in 2018, nothing has been done to stop this relatively unsophisticated attack.”

NetNumber declined to comment on the record, but instead referred to a statement from the CTIA, a trade association representing the wireless industry, which reads:

“After being made aware of this potential threat, we worked immediately to investigate it, and took precautionary measures. Since that time, no carrier has been able to replicate it. We have no indication of any malicious activity involving the potential threat or that any customers were impacted. Consumer privacy and safety is our top priority, and we will continue to investigate this matter.”

Lucky225 told KrebsOnSecurity many of the major mobile companies have moved to ensure none of their customers can be affected by changes requested through NetNumber or its partners. But he suspects some of the smaller wired and wireless telecommunications firms may still be vulnerable.

“I’m pretty sure it’s only the big carriers that they’re protecting now,” he said. “But there’s just so much we don’t know about what they patched because everyone is being so tight lipped about this right now.”

Nixon said it’s time for federal regulators to step up and protect consumers.

“Its clear this is a lot of foundational infrastructure mucky muck and some fundamental changes are going to need to happen here,” she said. “Regulators really need to get involved.”

WHAT CAN YOU DO?

Given the potentially broad impact of fraudsters abusing this and other weaknesses in the vast mobile ecosystem to completely subvert the security of SMS based communications and multi-factor authentication, it’s probably a good idea to rethink your relationship to your phone number. It’s now plainer than ever how foolish it is to trust SMS for anything.

My advice has long been to remove phone numbers from your online accounts wherever you can, and avoid selecting SMS or phone calls for second factor or one-time codes. Phone numbers were never designed to be identity documents, but that’s effectively what they’ve become. It’s time we stopped letting everyone treat them that way.

Any online accounts that you value should be secured with a unique and strong password, as well the most robust form of multi-factor authentication available. Usually, this is a mobile app like Authy or Google Authenticator that generates a one-time code. Some sites like Twitter and Facebook now support even more robust options — such as physical security keys.

Removing your phone number may be even more important for any email accounts you may have. Sign up with any service online, and it will almost certainly require you to supply an email address. In nearly all cases, the person who is in control of that address can reset the password of any associated services or accounts– merely by requesting a password reset email.

Unfortunately, many email providers still let users reset their account passwords by having a link sent via text to the phone number on file for the account. So remove the phone number as a backup for your email account, and ensure a more robust second factor is selected for all available account recovery options.

Here’s the thing: Most online services require users to supply a mobile phone number when setting up the account, but do not require the number to remain associated with the account after it is established. I advise readers to remove their phone numbers from accounts wherever possible, and to take advantage of a mobile app to generate any one-time codes for multifactor authentication.

Read More

The post Can We Stop Pretending SMS Is Secure Now? appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/can-we-stop-pretending-sms-is-secure-now/?utm_source=rss&utm_medium=rss&utm_campaign=can-we-stop-pretending-sms-is-secure-now

Chinese APT Targets Telcos in 5G-Related Cyber-Espionage Campaign

Telemetry suggests that threat actor behind Operation Dianxun is Mustang Panda, McAfee says.

A Chinese advanced persistent threat (APT) actor is targeting major telecommunications companies in the US, Europe, and Southeast Asia in a cyber-espionage campaign that appears designed to steal data pertaining to 5G technology.

The campaign — dubbed Operation Dianxun — is likely motivated by the ban on the use of Chinese technology in 5G rollouts in several countries, McAfee says in a new report. According to the security vendor, the threat actor behind the campaign is using methods associated with Mustang Panda, a group that several security vendors previously have identified as working for the Chinese government.

Data related to Operation Dianxun shows that victims were lured to a website purporting to be a career page for Huawei — widely regarded as the leader in the 5G space. Several governments, including the US, have barred the use of Huawei’s 5G technology out of fears that it might contain backdoors that enable widespread spying. There’s nothing to indicate that Huawei is in any way connected to the current threat campaign, however, McAfee says.

According to the security vendor, it’s unclear how the attackers initially lured victims to the phishing site. But once victims got there, they were greeted with a webpage that looked very similar to Huawei’s career site. The attackers used the fake website to download malware that masqueraded as a Flash application. The site from which the Flash application was downloaded also was carefully designed to appear like the official webpage in China for the Flash download site. The malware, among other things, downloaded the Cobalt Strike attack kit on compromised systems.

Thomas Roccia, senior security researcher with McAfee’s Advanced Threat Research group, says that available telemetry suggests that Mustang Panda is the group behind the ongoing Operation Dianxun threat campaign. “The targets are mainly in the telecommunications sector,” he says. “Most of the organizations where we have observed telemetry hits, were expressing concerns regarding the rollout of 5G technology from China,” suggesting the campaign is tied to the global race to deploy next-gen communications technology, he says.

Mustang Panda first surfaced back in 2014 and has been associated with attacks on organizations perceived as being of interest to the Chinese government. In 2017, CrowdStrike reported observing Mustang Panda members targeting a US-based think tank and several nongovernmental organizations with a nexus to Mongolia and the Mongolian government.

More recently, between May and September 2020, several security vendors (including McAfee and Recorded Future) observed a group using methods similar to Mustang Panda targeting the Vatican and other Catholic organizations in Hong Kong and Italy. The intrusions occurred ahead of a planned renewal of a 2018 agreement between China and the Vatican involving the Catholic community in China and appeared designed to give Beijing advance intelligence on the Holy See’s negotiating position, Recorded Future said. McAfee says it also observed Mustang Panda threat activity in September 2020 involving decoy documents related to Catholicism, Tibet-Ladakh relations, and the United Nations General Assembly Security Council.

Single Threat Actor
Other security vendors, such as Recorded Future have attributed last year’s attacks on the Vatican and other religious entities to a group called RedDelta. But Roccia says McAfee’s analysis shows there’s just one actor behind the ongoing Operation Dianxun campaign and the ones against the religious institutions last year. “McAfee believes with a high level of confidence that the campaign can be attributed to Mustang Panda,” Roccia says. “While previous research mentioned RedDelta and Mustang Panda as two separate groups, we believe, based on our research, that Mustang Panda and RedDelta are in fact the same threat group.”

Most of the previous attacks that Mustang Panda has carried out have involved the use of PlugX, a remote access Trojan that various attack groups have used since at least 2008 to steal files and modify files, download malware, log keystrokes, and control a computer’s webcam. However, with Operation Dianxun, the threat group has eschewed the use of that particular method, though it is continuing to use Cobalt Strike as it has in previous campaigns, according to McAfee.

McAfee advocates that organizations implement a multilayer security approach to address threats such as those presented by Mustang Panda and other APT groups. Capabilities such as URL reputation checks, SSL decryption, and malware emulation are critical for analyzing Flash, .Net, and other active Web content that can be easily weaponized. Organizations also need to have both signature and behavioral analysis capabilities to detect threats directed at the enterprise endpoint environment. Also critical are controls for detecting and blocking communications between compromised host systems and external command-and-control servers and for proactively identifying defense evasion and persistence mechanisms, according to McAfee.

The security vendor’s blog has listed the indicators of compromise and operating methods associated with Operation Dianxun along with advice on how to protect against the threat.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Chinese APT Targets Telcos in 5G-Related Cyber-Espionage Campaign appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/chinese-apt-targets-telcos-in-5g-related-cyber-espionage-campaign/?utm_source=rss&utm_medium=rss&utm_campaign=chinese-apt-targets-telcos-in-5g-related-cyber-espionage-campaign

The Robots Are Coming!

 The debate around SOC automation has been a fun one to follow. Allie Mellen wrote a short but on the spot piece about it, reaffirming what seems to be the commonsense opinion on this topic today: Automation is good, but to augment human capacity, not replace it.

 

After that Anton brought up a very interesting follow up, confirming that view but also pointing to a scary future scenario, where automation would be adopted so extensively by the attackers that it would force defense to do the same. Does this scenario make sense? 

 

I believe it does, and indeed it forces defense to adopt more automation. But even if Anton says the middle ground position is “cheating”, I still think it is the most reasonable one. There will never be (until we reach the Singularity) a fully automated SOC, just as there will never be a fully automated attacker (until…you know). Why? Let’s look at the scenario Anton painted for this evolved attacker:

 

 

• You face the attacker in possession of a machine that can auto-generate reliable zero day exploits and then use them (an upgraded version of what was the subject of 2016 DARPA Grand Challenge)
• You face the attackers who use worms for everything, and these are not the dumb 2003 worms, but these are coded by the best of the best of the offensive “community”
• Your threat assessment indicates that “your” attackers are adopting automation faster than you are and the delta is increasing (and the speed of increase is growing).

 

 

Even if it looks scary, this scenario is still limited in certain points. You may have malware capable of creating exploits by itself, but what will they exploit? What is this exploitation trying to accomplishThere is an abstract level of actions that is defined by the creator of the malware. Using MITRE ATT&CK language, the malware is capable of generating multiple instances of a selection of techniques, but a human must define the tactics and select the techniques to be used. Quoting Rumsfeld, there will be more known unknowns, but the unknown unknown is still the realm of humans.

 

A few years ago, I had a similar discussion with a vendor claiming that their deep learningbased technology would be able to detect“any malware”. This is nonsense. Even the most advanced ML still needs to be pointed to some data to look at. If the signal required to detect something is not in that data, there’s no miracle. Let’s look at a simple example:

 

• A super network-based detection technology inspects ALL network traffic and can miraculously identify any attack.
• The attacker is on host A in this network, planning to attack host B, connected to the same network
• The attacker scans for Bluetooth devices from host A, finds host B, exploits host B via a Bluetooth exploit
• The super NDR/NIDS tool sits there patiently waiting to see an attack that never traverses the monitored network!

 

You may claim this is an edge scenario, but I’m using anexaggerated situation on purposeThere’s still many cases that we can relate to, such as breaches due to the use of shadow IT, cloud resources, etc. What I want to highlight is the type of lateral thinking very often employed by attackers in cybersecurity. And the lateral thinking is still exclusive of humans.

 

What I’m trying to say is that fully automated threats are scary, buy they lack the main force that makes detecting threats challenging. Defense automation can evolve to match the same level, but both sides will still rely on humans to tip the scale when those machines reach a balance point in capabilities.

 

What we have today is similar to those battling robots TV shows. Machines operated by humans. If things evolve as Anton suggests we will move to what happens in “robot soccer”: human created machines operating autonomously, but within a finite framework of capabilities.






Robot wars vs Robot Soccer

 

 

Threats and SOCs will become more automated for sure. As they automate, they become faster, so each side has to increase its own level of automation to keep up. But when automation limits are reached, the humans on the threat side must apply that lateral thinking to find other avenues to exploit. They need to take the Kirk approach to Kobayashi Maru. When this happens, the humans on the defense side become critical. They need to figure out what is happening and create new ways to fight against the new methods.

 

 

 

So, humans will still be necessary on both sides. Of course, the operational involvement will be greatly reduced, again, on both sides. But they will be there, waiting to react against the innovation introduced by their counterparts on the other side.

 

This may be an anticlimactic conclusion, and it is. But there are some interesting follow up conversations to have. The number of humans required, their skills and how they are engaged will be different. What does it mean for outsourcing? Do end users still need people on their side? If solution providers engage this problem in a smart way, we may be able to remove, or greatly reduce, the need for humans on the end user organization side, for example. The remaining humans would be on the vendor side, adapting the tools to react against the latest attacks. For the end user organization, the result may look very similar to full automation, as they would not need to add their humans to the mix. Will we end up with the mythical “SOC in a box”? Future will tell.

 

The post The Robots Are Coming! appeared first on Security Boulevard.

Read More

The post The Robots Are Coming! appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/the-robots-are-coming-3/?utm_source=rss&utm_medium=rss&utm_campaign=the-robots-are-coming-3

The Security Digest: #52

Hello and welcome to the 52nd TSD, your weekly blog post with top of mind security issues. TSD began as an internal newsletter 1 year …

The post The Security Digest: #52 appeared first on Cyral.

The post The Security Digest: #52 appeared first on Security Boulevard.

Read More

The post The Security Digest: #52 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/16/the-security-digest-52-4/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-digest-52-4

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...