Malware Devil

Tuesday, April 27, 2021

AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

The goal is greater visibility and effectiveness.

The post AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help. appeared first on AttackIQ.

The post AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help. appeared first on Security Boulevard.

Read More

The post AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help. appeared first on Malware Devil.



https://malwaredevil.com/2021/04/27/attackiq-and-mitre-engenuitys-center-for-threat-informed-defense-are-sighting-attck-techniques-in-the-wild-come-and-help/?utm_source=rss&utm_medium=rss&utm_campaign=attackiq-and-mitre-engenuitys-center-for-threat-informed-defense-are-sighting-attck-techniques-in-the-wild-come-and-help

Network Security News Summary for Tuesday April 27th, 2021

Microstation CAD and VBA; Apple Patches Everything (and 0-Day); Hashicorp code signing key exposed;

CAD: .DGN and .MVBA Files analyzed with oledump
https://isc.sans.edu/forums/diary/CAD+DGN+and+MVBA+Files/27354/

MacOS 0-Day Bug Patched
https://objective-see.com/blog/blog_0x64.html
https://support.apple.com/en-us/HT201222

Emotet Uninstaller Triggered
https://blog.malwarebytes.com/threat-analysis/2021/01/cleaning-up-after-emotet-the-law-enforcement-file/

HashiCorp Code Signing Key Exposed By Codecov Compromise
https://www.theregister.com/2021/04/26/hashicorp_reveals_exposure_of_private/

keywords: apple; code signing; gatekeeper; hashicorp; emotet; cad; microstation;

The post Network Security News Summary for Tuesday April 27th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/27/network-security-news-summary-for-tuesday-april-27th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-tuesday-april-27th-2021

Diving into a Singapore Post Phishing E-mail, (Tue, Apr 27th)

With the sustained persistence of COVID-19 globally, postal and e-commerce related phishing e-mails remain as one of the most widely favoured methods by adversaries and cybercrime groups. Although postal and shipping companies have often put-up warnings with respect to phishing sites and e-mails (for example Singapore Post [1] and DHL [2]), phishing sites and e-mails continue to be propagated. While organizations continue to deploy technologies and invest in security awareness training to allow better detection of phishing e-mails, individuals who are not particularly IT-savvy could fall prey to such phishing e-mails, especially with respect to their personal e-mail accounts who may not have enterprise phishing protection features. I was recently forwarded one phishing e-mail for a quick look. Unfortunately, by the time I got to it, the phishing page appeared to have been taken down. However, there were some salient points that struck me when I analyzed the contents of the e-mail, and wanted to talk a bit about it so as to increase awareness.

A check on the e-mail headers yielded the following information (with reference to Figure 1, and some details were omitted to preserve privacy):

Figure 1: E-Mail Headers

I did some research on the e-mail address in the “From” and “Sender” fields, and discovered that it originated from a legitimate company (hence the redaction). Of course, the name reflected in the “From” and “Sender” fields should have triggered some red flags since it stated “Singapore-post” but displayed another e-mail address.

Moving on to the contents of the e-mail. With reference to Figure 2 below, we can see the contents (some information have been removed to preserve privacy).

Figure 2: Contents of Phishing E-Mail

The first thing that drew my attention was the logo that was retrieved from a third-party site which felt particularly dodgy. After visiting the “phishing” site, a webpage related to the original site loaded with no signs of any content related to Singapore Post (thankfully!). While it appeared that the owner of the website removed phishing content and replaced with something of their own, the link was still kept.

Looking at all the factors, there were many opportunities to deny the adversaries from succeeding in sending out the phishing e-mail. The factors that could be addressed are as follows:

1. Image Hotlinking: This is a common issue faced by many individuals and organizations hosting their websites. If left unchecked, it could affect the uptime and bandwidth costs (this is especially so for small businesses that often cannot afford high-capacity web hosting plans). In this case, we can see that the third-party website inadvertently facilitated the adversaries’ attempts in providing the logo for their phishing e-mails. To mitigate this issue, one can consider using Content Delivery Networks (CDN) that have hotlink protection features, or tweak cPanel settings (if it is used to administer your website) as shown here [3]. There are also a few other methods, but configuration will vary due to the type of CMS that the website is running on. Nevertheless, there are some robust documentations available online with respect to image hotlinking, and owners should consider implementing them if possible.

2. Securing assets: A legitimate organization’s e-mail system was compromised to send out the phishing e-mail, and another legitimate organization’s website was used to host the phishing page. I did not probe into the affected organizations’ assets, but such compromises are usually due to unpatched systems, security misconfiguration or a successful phish of administrative credentials. Unfortunately, other than taking a proactive approach towards cybersecurity within limits of a given budget, there isn’t really much an organization can do (ignoring the issue can be one way, but that is bound to bring more disastrous and pressing issues to the organization/business in future). Building and maintaining security controls can be challenging, but there is useful documentation such as the CIS Controls (version 8 launching soon [4]) that organizations could refer to bolster their cybersecurity readiness.

As always, when in doubt, verify the authenticity of the e-mail received. In addition, why not consider checking in with your loved ones and friends to see if they received any phishing e-mails and let them know how they could spot potential ones? These are no doubt challenging times, and being able to maintain access to your digital accounts should be one of the top priorities.

References:
[1] https://www.singpost.com/online-security-you
[2] https://www.dhl.com/sg-en/home/footer/fraud-awareness.html
[3] https://documentation.cpanel.net/display/84Docs/Hotlink+Protection
[4] https://www.sans.org/blog/cis-controls-v8/

———–
Yee Ching Tok, ISC Handler
Personal Site
Twitter

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Diving into a Singapore Post Phishing E-mail, (Tue, Apr 27th) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/27/diving-into-a-singapore-post-phishing-e-mail-tue-apr-27th/?utm_source=rss&utm_medium=rss&utm_campaign=diving-into-a-singapore-post-phishing-e-mail-tue-apr-27th

Ameaças de segurança afetam a produtividade da sua força de trabalho? Veja como a Forrester diz que você pode lidar com eles

De acordo com a Forrester, o número de trabalhadores remotos permanentes em tempo integral deve aumentar em 300% ou mais em comparação com os números pré-pandemia. Em meio ao caos dos tempos atuais, levar toda a sua força de …

The post Ameaças de segurança afetam a produtividade da sua força de trabalho? Veja como a Forrester diz que você pode lidar com eles appeared first on ManageEngine Blog.

The post Ameaças de segurança afetam a produtividade da sua força de trabalho? Veja como a Forrester diz que você pode lidar com eles appeared first on Security Boulevard.

Read More

The post Ameaças de segurança afetam a produtividade da sua força de trabalho? Veja como a Forrester diz que você pode lidar com eles appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/ameacas-de-seguranca-afetam-a-produtividade-da-sua-forca-de-trabalho-veja-como-a-forrester-diz-que-voce-pode-lidar-com-eles/?utm_source=rss&utm_medium=rss&utm_campaign=ameacas-de-seguranca-afetam-a-produtividade-da-sua-forca-de-trabalho-veja-como-a-forrester-diz-que-voce-pode-lidar-com-eles

Monday, April 26, 2021

US Urges Organizations to Implement MFA, Other Controls to Defend Against Russian Attacks

Actors working for Moscow’s Foreign Intelligence Service are actively targeting organizations in government and other sectors, FBI and DHS say.

The FBI, the Department of Homeland Security (DHS), and the Cybersecurity & Infrastructure Security Agency (CISA) are urging US organizations to implement multifactor authentication and other defensive mechanisms to protect against threat activity by Russia’s Foreign Intelligence Service (SVR).

In a new joint advisory out today, the three entities warn government agencies, think tanks, information technology companies, and policy analysis organizations in particular to watch out for attacks from APT29, a threat group that they describe as working for the SVR.

The alert does not point to any specific new and recent threats or attacks from APT29 (aka Cozy Bear, Dukes, and Yttrium) targeting organizations in these sectors. But it does note the longstanding threat the group has posed to US organizations and the group’s use of customized tools to maximize stealth and to move laterally within victim networks. Since at least 2018, the group has shifted from predominantly targeting on-premises assets to targeting cloud-hosted email and other cloud resources, the three agencies say.

“[SVR] will continue to seek intelligence from US and foreign entities through cyber exploitation, using a range of initial exploitation techniques that vary in sophistication, coupled with stealthy intrusion tradecraft within compromised networks,” the alert notes.

This is the second time that US law enforcement has warned of SVR threat activity in the last two weeks. On April 15, shortly after the Biden administration formally attributed the SolarWinds attack to SVR, the FBI, DHS, and CISA released an advisory warning about the Russian intelligence service exploiting five known vulnerabilities in VPNs and other technologies to compromise US companies.

That advisory highlighted how, in addition to the SolarWinds supply chain attack, the SVR was responsible for several other recent campaigns, including several targeted attacks on COVID-19 research facilities.

Organizations should pay attention to advisories such as these that offer information on adversary tradecraft and recommendations for addressing threats that an adversary might present, says Sean Nikkei, senior cyber-threat intelligence analyst at Digital Shadows. “We have to assume that there are ongoing or will be new campaigns due to the nature of intelligence collection for strategic goal,” Nikkei says.

“The information can certainly help any organization because it gives them a chance to update and vet their signatures, talk to their vendors, and think about how they might be targeted,” he says.

The new advisory highlights three tactics that SVR and threat groups working for it have been observed using in recent attacks: password spraying, zero-day exploits, and the use of a malware tool set called WellMess for enabling encrypted command-and-control sessions on an infected system.

The advisory points to a 2018 compromise, where SVR agents used password spraying to find and exploit a weak password to an administrator account. The attack involved the adversary conducting the password spraying in a “low and slow” manner using a large number of local IP addresses associated with business, residential, and mobile accounts, in order to evade detection. The attackers used their access to the admin account to modify permissions and gain access to email accounts of specific interest to them, according to the joint advisory.

In another incident, actors working for SVR exploited a then zero-day vulnerability (CVE-2019-19781) in the Citrix Application Delivery Controller (ADC) to gain access to an enterprise network and harvest credentials, which they used to access other systems on the network. The actors acquired a foothold on several systems that were not configured for two-factor authentication. Though the breached organization eventually discovered the intrusion and evicted the attackers, they regained access via the same Citrix flaw. That initial access point was discovered as well, and closed down, according to the advisory.

The FBI, DHS, and CISA alert describes the WellMess malware family as being used in targeted attacks on COVID-19 research facilities. “These implants allow a remote operator to establish encrypted command and control (C2) sessions and to securely pass and execute scripts on an infected system,” the advisory notes.

Multiple Recommendations
The three entities urge organizations to consider mandating the use of multifactor authentication for all on-premises and remote users and administrators. They also recommend that organizations allow access to admin systems and functions only from known IP addresses, conduct regular audits of account permissions and mailbox settings, and implement strong passwords.

To defend against zero-day threats, the advisory recommends that security teams monitor for evidence of encoded PowerShell commands and use of NMAP and other network scanning tools, and to ensure endpoint security and monitoring systems are enabled.

Defending against supply chain attacks such as the one that affected SolarWinds’ customers can be tricky, the advisory concedes. But organizations can mitigate risk by implementing practices such as log file auditing to identify attempts to access privileged certificates; deploying controls for identifying suspicious behavior; implementing behavioral monitoring; and requiring authentication for certain user activities.

Dirk Schrader, global vice president of security research at New Net Technologies, says advisories such as the one released today help organizations get a better picture of the real-life operations of an advanced adversary. However, too many of them can end up being a distraction, he says. “Frequent advisories will lead to many questions from senior management and executive boards about the status of an organization in the light of those,” he says. “Cybersecurity teams will be — at least — required to balance these requests with their regular work.”

A lot of the recommendations included in these advisories — such as enabling multifactor authentication and not allowing from remote logins from unknown IP addresses — are also things that organizations should be doing already, says Joseph Neumann, cyber executive advisor at Coalfire.

These advisories also just speak to the tactics, techniques, and procedures, Neumann notes. “These are helpful to a degree that allows administrators and defenders to know where to start their initial looks,” he says. “But [they] fall short of giving [organizations] data that they can plug in to security tools to begin immediate automated remediations and mitigations.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post US Urges Organizations to Implement MFA, Other Controls to Defend Against Russian Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/us-urges-organizations-to-implement-mfa-other-controls-to-defend-against-russian-attacks-2/?utm_source=rss&utm_medium=rss&utm_campaign=us-urges-organizations-to-implement-mfa-other-controls-to-defend-against-russian-attacks-2

US Urges Organizations to Implement MFA, Other Controls to Defend Against Russian Attacks

Actors working for Moscow’s Foreign Intelligence Service are actively targeting organizations in government and other sectors, FBI and DHS say.

The post US Urges Organizations to Implement MFA, Other Controls to Defend Against Russian Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/us-urges-organizations-to-implement-mfa-other-controls-to-defend-against-russian-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=us-urges-organizations-to-implement-mfa-other-controls-to-defend-against-russian-attacks

Apple Patches Serious MacOS Security Flaw

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-29474
PUBLISHED: 2021-04-26

HedgeDoc (formerly known as CodiMD) is an open-source collaborative markdown editor. An attacker can read arbitrary `.md` files from the server’s filesystem due to an improper input validation, which results in the ability to perform a relative path traversal. To verify if you are affected, you can …

CVE-2021-22669
PUBLISHED: 2021-04-26

Incorrect permissions are set to default on the ‘Project Management’ page of WebAccess/SCADA portal of WebAccess/SCADA Versions 9.0.1 and prior, which may allow a low-privileged user to update an administrator’s password and login as an admini…

CVE-2021-29473
PUBLISHED: 2021-04-26

Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadat…

CVE-2021-29475
PUBLISHED: 2021-04-26

HedgeDoc (formerly known as CodiMD) is an open-source collaborative markdown editor. An attacker is able to receive arbitrary files from the file system when exporting a note to PDF. Since the code injection has to take place as note content, there fore this exploit requires the attackers ability to…

CVE-2021-31646
PUBLISHED: 2021-04-26

Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php – it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack.

The post Apple Patches Serious MacOS Security Flaw appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/apple-patches-serious-macos-security-flaw-2/?utm_source=rss&utm_medium=rss&utm_campaign=apple-patches-serious-macos-security-flaw-2

Apple Patches Serious MacOS Security Flaw

The bug can put Mac users at “grave risk” as it allows attackers to bypass Apple’s security mechanisms, a researcher reports.

The post Apple Patches Serious MacOS Security Flaw appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/apple-patches-serious-macos-security-flaw/?utm_source=rss&utm_medium=rss&utm_campaign=apple-patches-serious-macos-security-flaw

In Appreciation: Dan Kaminsky

Beloved security industry leader and researcher passes away unexpectedly at the age of 42.

“We’re hackers: we’re not afraid to get into how things work. Let’s use that knowledge and fearlessness and make things work better.” –Dan Kaminsky, 2015

The security industry is reeling over news of the death of an iconic industry leader and innovator who shaped a generation of ethical hacking and security technologies, Dan Kaminsky.

Kaminsky, 42, passed away suddenly on April 23 due to complications from diabetes, and word of his death spread online Saturday as friends, colleagues, and industry admirers shared tributes on Twitter about his groundbreaking and prolific security research, the personal touch he applied to all of the work he did and shared — and his signature generosity and enthusiastic passion for the work and industry he so loved.

His work spanned nearly every aspect of cybersecurity: network security, Web security, cryptography, clickjacking defense, online ad-fraud prevention with the co-founding of HUMAN (formerly White Ops), and more. He even wrote a mobile app called DanKam that uses a form of augmented reality for helping with color blindness. But his best-known research was the discovery of the massive DNS cache poisoning flaw in 2008 that could be exploited to redirect victims to a malicious website without their knowing. Kaminsky helped engineer a then-unprecedented emergency patching effort among vendors and service providers to protect domain servers worldwide, including internal email systems, from the attack.

Kaminsky stumbled onto the bug while working with his friend Artur Bergman — who later founded Fast.ly — on brainstorming ways to speed up content delivery networks by getting the Domain Name System to use faster servers. A neat trick he found to speed up the Internet led to his discovery of the dangerous design flaw in DNS.

Credit: Dan Kaminsky

For years, he hosted the famous “Black Ops” series of talks at Black Hat, where he shared his latest research and insights, including the impact of the DNS cache poisoning bug. His very first one in 2001, “The Black Ops of TCP/IP,” came together while he was studying for his business computing degree at Santa Clara University and was on “some random things I was working on instead of doing homework,” he once recalled. “My family was not happy with me.”

Family was always a part of Kaminsky’s professional life. His grandma famously attended his Black Hat talks, bringing along her homemade cookies in a Tupperware container to share with attendees after the presentations, and other family members also regularly attended his talks. He produced a DNS security “PSA” video for “non-geeks” in 2008 with his young niece, Sarah, on the importance of DNS security. “Kids, talk to your parents about DNS. They’ll be glad you did,” Kaminsky quipped at the end of the video.

Katie Moussouris, founder and CEO of Luta Security, says Kaminsky looked at security problems differently — and with optimism, often a rare sentiment in security. “He was not transactional in his approach of security. He was a long-game thinker,” she says. “We really don’t have too many folks in our industry who have a long track record as he had, and with as much impact — and [also] as much hope for the future” as Kaminsky had, she says. “That was something precious.”

Security researcher David Maynor says he was always inspired by Kaminsky’s enthusiastic embrace of security challenges and research, and to life: Kaminsky remained true to his excitement and love of his work throughout his accomplished career. He was eager to share his knowledge and excitement about his work. “He made it okay to be passionate about what you do every day,” Maynor says of his longtime friend. “I do a bunch of stuff, such as CTFs [capture the flag] that’s not work-related, that I don’t think I would be doing if not for Dan.”

Security expert Robert Graham described Kaminsky as “a nerd’s nerd.”

“Most conference talks have five minutes of content surrounded by 40 minutes of background material. So a couple times, Dan would rent a suite in a hotel and invite techies who already understood the background material to give the five-minute version of the talk. Everyone invited was expected to present,” Graham recalls. “This then included questions and answers from techies who thoroughly understood the material.”

Labor of Love
Kaminsky landed at his first Black Hat conference in 2000 at age 20 after winning a free ticket in a security treasure-hunt competition. He recalled that he had raised his hand to answer — correctly — a security question famed L0pht member Mudge (aka Pieter Zatko) posed to the audience during a panel presentation. Mudge gave him some advice that Kaminsky said he took to heart: “He said, ‘never tell anyone your age. That way you will always be old enough for them to believe what you are saying.'”

After working as an intern at Cisco and co-writing the book Hack Proofing Your Network, he decided to go back to school to finish his college degree.

“I took business classes, because you don’t naturally know how money works. I think finance should be a mandatory class for everyone,” he said. If you build an expensive but great security system that no one actually uses, he said, that’s worse than doing nothing at all.

He didn’t consider his security work as labor: It was fun for him and he embraced being a self-professed “nerd.” Kaminsky wrote his first code at the age of five, when he programmed the Tandy 80 computer he had back then. “I could tell the turtle to walk around, and make it do spirograph patterns,” he said.

Editor’s Note: Dan was always so very generous with his time for us, and we are the better for it. We will always remember his excitement and pure joy when he shared his groundbreaking work with us. We will miss him terribly.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post In Appreciation: Dan Kaminsky appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/in-appreciation-dan-kaminsky-2/?utm_source=rss&utm_medium=rss&utm_campaign=in-appreciation-dan-kaminsky-2

In Appreciation: Dan Kaminsky

Beloved security industry leader and researcher passes away unexpectedly at the age of 42.

The post In Appreciation: Dan Kaminsky appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/in-appreciation-dan-kaminsky/?utm_source=rss&utm_medium=rss&utm_campaign=in-appreciation-dan-kaminsky

Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks

Read More

The post Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/joint-detection-and-localization-of-stealth-false-data-injection-attacks-in-smart-grids-using-graph-neural-networks/?utm_source=rss&utm_medium=rss&utm_campaign=joint-detection-and-localization-of-stealth-false-data-injection-attacks-in-smart-grids-using-graph-neural-networks

Experian’s Credit Freeze Security is Still a Joke

In 2017, KrebsOnSecurity showed how easy it is for identity thieves to undo a consumer’s request to freeze their credit file at Experian, one of the big three consumer credit bureaus in the United States.  Last week, KrebsOnSecurity heard from a reader who had his freeze thawed without authorization through Experian’s website, and it reminded me of how truly broken authentication and security remains in the credit bureau space.

Experian’s page for retrieving someone’s credit freeze PIN requires little more information than has already been leaked by big-three bureau Equifax and a myriad other breaches.

Dune Thomas is a software engineer from Sacramento, Calif. who put a freeze on his credit files last year at Experian, Equifax and TransUnion after thieves tried to open multiple new payment accounts in his name using an address in Washington state that was tied to a vacant home for sale.

But the crooks were persistent: Earlier this month, someone unfroze Thomas’ account at Experian and promptly applied for new lines of credit in his name, again using the same Washington street address. Thomas said he only learned about the activity because he’d taken advantage of a free credit monitoring service offered by his credit card company.

Thomas said after several days on the phone with Experian, a company representative acknowledged that someone had used the “request your PIN” feature on Experian’s site to obtain his PIN and then unfreeze his file.

Thomas said he and a friend both walked through the process of recovering their freeze PIN at Experian, and were surprised to find that just one of the five multiple-guess questions they were asked after entering their address, Social Security Number and date of birth had anything to do with information only the credit bureau might know.

KrebsOnSecurity stepped through the same process and found similar results. The first question asked about a new mortgage I supposedly took out in 2019 (I didn’t), and the answer was none of the above. The answer to the second question also was none of the above.

The next two questions were useless for authentication purposes because they’d already been asked and answered; one was “which of the following is the last four digits of your SSN,” and the other was “I was born within a year or on the year of the date below.” Only one question mattered and was relevant to my credit history (it concerned the last four digits of a checking account number).

The best part about this lax authentication process is that one can enter any email address to retrieve the PIN — it doesn’t need to be tied to an existing account at Experian. Also, when the PIN is retrieved, Experian doesn’t bother notifying any other email addresses already on file for that consumer.

Finally, your basic consumer (read: free) account at Experian does not give users the option to enable any sort of multi-factor authentication that might help stymie some of these PIN retrieval attacks on credit freezes.

Unless, that is, you subscribe to Experian’s heavily-marketed and confusingly-worded “CreditLock” service, which charges between $14.99 and $24.99 a month for the ability to “lock and unlock your file easily and quickly, without delaying the application process.” CreditLock users can both enable multifactor authentication and get alerts when someone tries to access their account.

Thomas said he’s furious that Experian only provides added account security for consumers who pay for monthly plans.

“Experian had the ability to give people way better protection through added authentication of some kind, but instead they don’t because they can charge $25 a month for it,” Thomas said. “They’re allowing this huge security gap so they can make a profit. And this has been going on for at least four years.”

Experian has not yet responded to requests for comment.

When a consumer with a freeze logs in to Experian’s site, they are immediately directed to a message for one of Experian’s paid services, such as its CreditLock service. The message I saw upon logging in confirmed that while I had a freeze in place with Experian, my current “protection level” was “low” because my credit file was unlocked.

“When your file is unlocked, you’re more vulnerable to identity theft and fraud,” Experian warns, untruthfully. “You won’t see alerts if someone tries to access your file. Banks can check your file if you apply for credit or loans. Utility and service providers can see your credit file.”

Experian says my security is low because while I have a freeze in place, I haven’t bought into their questionable “lock service.”

Sounds scary, right? The thing is — except for the part about not seeing alerts — none of the above statement is true if you already have a freeze on your file. A security freeze essentially blocks any potential creditors from being able to view your credit file, unless you affirmatively unfreeze or thaw your file beforehand.

With a freeze in place on your credit file, ID thieves can apply for credit in your name all they want, but they will not succeed in getting new lines of credit in your name because few if any creditors will extend that credit without first being able to gauge how risky it is to loan to you (i.e., view your credit file). It is now free to freeze your credit in all U.S. states and territories.

Experian, like the other consumer credit bureaus, uses their intentionally confusing “lock” terminology to frighten consumers into paying for monthly subscription services. A key selling point for these lock services is they can be a faster way to let creditors peek at your file when you wish to apply for new credit. That may or may not be true in practice, but consider why it’s so important for Experian to get consumers to sign up for their lock programs.

The real reason is that Experian makes money every time someone makes a credit inquiry in your name, and it does not want to do anything to hinder those inquiries. Signing up for a lock service lets Experian continue selling credit report information to a variety of third parties. According to Experian’s FAQ, when locked your Experian credit file remains accessible to a host of companies, including:

-Potential employers or insurance companies

-Collection agencies acting on behalf of companies you may owe

-Companies providing pre-screened credit card offers

-Companies that have an existing credit relationship with you (this is true for frozen files also)

-Personalized offers from Experian, if you choose to receive them

It is annoying that Experian can get away with offering additional account security only to people who pay the company a hefty sum each month to sell their information. It’s also amazing that this sloppy security I wrote about back in 2017 is still just as prevalent in 2021.

But Experian is hardly alone. In 2019, I wrote about how Equifax’s new MyEquifax site made it simple for thieves to lift an existing credit freeze at Equifax and bypass the PIN if they were armed with just your name, Social Security number and birthday.

Also in 2019, identity thieves were able to get a copy of my credit report from TransUnion after successfully guessing the answers to multiple-guess questions like the ones Experian asks. I only found out after hearing from a detective in Washington state, who informed me that a copy of the report was found on a removable drive seized from a local man who was arrested on suspicion of being part of an ID theft gang.

TransUnion investigated and found it was indeed at fault for giving my credit report to ID thieves, but that on the bright side its systems blocked another fraudulent attempt at getting my report in 2020.

“In our investigation, we determined that a similar attempt to fraudulently obtain your report occurred in April 2020, and was successfully blocked by enhanced controls TransUnion has implemented since last year,” the company said. “TransUnion deploys a multi-layered security program to combat the ongoing and increasing threat of fraud, cyber-attacks and malicious activity.  In today’s dynamic threat environment, TransUnion is constantly enhancing and refining our controls to address the latest security threats, while still allowing consumers access to their information.”

For more information on credit freezes (also called a “security freezes”), how to request one, and other tips on preventing identity fraud, check out this story.

If you haven’t done so lately, it might be a good time to order a free copy of your credit report from annualcreditreport.com. This service entitles each consumer one free copy of their credit report annually from each of the three credit bureaus — either all at once or spread out over the year.

Read More

The post Experian’s Credit Freeze Security is Still a Joke appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/experians-credit-freeze-security-is-still-a-joke-2/?utm_source=rss&utm_medium=rss&utm_campaign=experians-credit-freeze-security-is-still-a-joke-2

Experian’s Credit Freeze Security is Still a Joke

In 2017, KrebsOnSecurity showed how easy it is for identity thieves to undo a consumer’s request to freeze their credit file at Experian, one of the big three consumer credit bureaus in the United States.  Last week, KrebsOnSecurity heard from a reader who had his freeze thawed without authorization through Experian’s website, and it reminded me of how truly broken authentication and security remains in the credit bureau space.

The post Experian’s Credit Freeze Security is Still a Joke appeared first on Security Boulevard.

Read More

The post Experian’s Credit Freeze Security is Still a Joke appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/experians-credit-freeze-security-is-still-a-joke/?utm_source=rss&utm_medium=rss&utm_campaign=experians-credit-freeze-security-is-still-a-joke

Signal Aesthetics, AirDrop Privacy, Safety vs. Security, & Data Ordering Attacks – ASW #148

This week in the AppSec News: Signal points out parsing problems, privacy preserving improvements to AirDrop, Homebrew disclosure, WhatsApp workflows, adversarial data ordering for ML, & more!

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw148

The post Signal Aesthetics, AirDrop Privacy, Safety vs. Security, & Data Ordering Attacks – ASW #148 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/signal-aesthetics-airdrop-privacy-safety-vs-security-data-ordering-attacks-asw-148/?utm_source=rss&utm_medium=rss&utm_campaign=signal-aesthetics-airdrop-privacy-safety-vs-security-data-ordering-attacks-asw-148

Flubot Spyware Spreading Through Android Devices

The malware is spreading rapidly through ‘missed package delivery’ SMS texts, prompting urgent scam warnings from mobile carriers.
Read More

The post Flubot Spyware Spreading Through Android Devices appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/flubot-spyware-spreading-through-android-devices/?utm_source=rss&utm_medium=rss&utm_campaign=flubot-spyware-spreading-through-android-devices

Proofpoint to Be Acquired by Thoma Bravo for $12.3B

The cybersecurity company will go private following the all-cash transaction.

Private equity firm Thoma Bravo has agreed to acquire cybersecurity company Proofpoint for $12.3 billion in an all-cash transaction, the two confirmed today.

Proofpoint was founded in 2002 by Eric Hahn, former CTO of Netscape, to help organizations defend against email-based security threats. Since then, its technology has expanded to address cloud security, archiving and compliance, security awareness training, and other security issues.

Proofpoint has expanded geographically as well: It’s headquartered in Sunnyvale, Calif., but its 3,600 employees are spread across Australia, Canada, France, Germany, Israel, Japan, the Netherlands, Singapore, the United Kingdom, and the United States. Proofpoint went public in 2012 and last year reported $1.05 billion in revenue.

This acquisition will see Proofpoint go private. Chairman and CEO Gary Steele anticipates this will allow the company to “be even more agile with greater flexibility to continue investing in innovation, building on our leadership position and saying ahead of threat actors,” he says in a statement.

Thoma Bravo has added several cybersecurity companies to its portfolio in recent years. Its notable acquisitions include Veracode for $950 million, Imperva for $2.1 billion, and Sophos for $3.9 billion, as well as Imperva, McAfee, LogRhythm, Venafi, Blue Coat, Barracuda, DigiCert, Imprivata, and Idaptiv.

Proofpoint has also completed several acquisitions, including those of InteliSecure, Wombat Security, ObserveIT, NetCitadel, Cloudmark, Meta Networks, and Weblife.

Its agreement with Thoma Bravo has been unanimously approved by Proofpoint’s board of directors, which has recommended company shareholders vote in favor of the acquisition at an upcoming shareholders’ meeting.

Read the full release for more details.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post Proofpoint to Be Acquired by Thoma Bravo for $12.3B appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/proofpoint-to-be-acquired-by-thoma-bravo-for-12-3b-2/?utm_source=rss&utm_medium=rss&utm_campaign=proofpoint-to-be-acquired-by-thoma-bravo-for-12-3b-2

Proofpoint to Be Acquired by Thoma Bravo for $12.3B

The cybersecurity company will go private following the all-cash transaction.

The post Proofpoint to Be Acquired by Thoma Bravo for $12.3B appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/proofpoint-to-be-acquired-by-thoma-bravo-for-12-3b/?utm_source=rss&utm_medium=rss&utm_campaign=proofpoint-to-be-acquired-by-thoma-bravo-for-12-3b

Deceptive Diffs From Subversive Submitters – ASW #148

We start with the article about “Researchers Secretly Tried To Add Vulnerabilities to Linux Kernel, Ended Up Getting Banned” and explore its range of issues from ethics to securing huge, distributed software projects.
It’s hardly novel to point out that bad actors can attempt to introduce subtle and exploitable bugs. More generally, we’ve also seen impacts from package owners who have revoked their code, like NPM leftpad, or who transfer ownership to actors who later on abuse the package’s reputation, as we’ve seen in Chrome Plugins.
So, what could have been a better research focus? In the era of more pervasive fuzzing, how much should we continue to rely on people for security code review?

Read the research paper at https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf

For additional resources please visit:
Deceptive Diffs From Subversive Submitters – ASW #148 Featuring: John Kinsella (https://www.linkedin.com/in/jlkinsel), Mike Shema (https://www.linkedin.com/in/zombie). We start with the article about “Researchers Secretly Tried To Add Vulnerabilities to Linux Kernel, Ended Up Getting Banned” and explore its range of issues from ethics to securing huge, distributed software projects.

Read the research paper at:

https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf

For further details please visit:

https://securityweekly.com/asw148

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw148

The post Deceptive Diffs From Subversive Submitters – ASW #148 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/deceptive-diffs-from-subversive-submitters-asw-148/?utm_source=rss&utm_medium=rss&utm_campaign=deceptive-diffs-from-subversive-submitters-asw-148

CAD: .DGN and .MVBA Files, (Mon, Apr 26th)

Regularly I receive questions about MicroStation files, since I wrote a diary entry about AutoCAD drawings containing VBA code.

MicroStation is CAD software, and it can run VBA code.

I’ve never been given malicious MicroStation files, but recently I’ve been given a normal drawing (.dgn) and a script file (.mvba).

To be clear: these are not malware samples, the files were given to me so that I could take a look at the internal file format and report it.

Turns out that both files are “OLE files”, and can thus be analyzed with my oledump.py tool.

Here is the .DGN file:

It’s an OLE file with storage (folder) Dgn-Md containing other storages and streams.

And the metadata identifies this as a MicroStation file (I’m using tail to filter out the thumbnail data):

It does not contain VBA code: AFAIK, .DGN files can not contain VBA code. Please post a comment if I’m wrong, or if you can share a sample .DGN file containing VBA code.

The VBA script file, with extension .MVBA, is also an OLE file with VBA code streams:

Here too, the M indicator alerts us to the presence of VBA code. It can be extracted with oledump:

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post CAD: .DGN and .MVBA Files, (Mon, Apr 26th) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/cad-dgn-and-mvba-files-mon-apr-26th/?utm_source=rss&utm_medium=rss&utm_campaign=cad-dgn-and-mvba-files-mon-apr-26th

Cyber Attacks On The Rise For Businesses

A new report, the Hiscox Cyber Readiness Report 2021, surveyed over 6,000 companies in the U.S. and Europe and found that the number of businesses targeted by cyber criminals in the past year increased from 38% to 43%, with over a quarter of those targeted (28%) experiencing five attacks or more, 

The post Cyber Attacks On The Rise For Businesses appeared first on K2io.

The post Cyber Attacks On The Rise For Businesses appeared first on Security Boulevard.

Read More

The post Cyber Attacks On The Rise For Businesses appeared first on Malware Devil.



https://malwaredevil.com/2021/04/26/cyber-attacks-on-the-rise-for-businesses/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-attacks-on-the-rise-for-businesses

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...