Quantcast
Channel: security news – Cyber Parse – Cyber Security and Information Security
Viewing all 4495 articles
Browse latest View live

So, you want to be a security pro? Read this first

$
0
0
Of all the high-demand areas in IT, security stands out at the top.

According to DICE, the number of security jobs skyrocketed by more than 40 percent from 2014 to 2015, to 50,000 openings, compared with 16.8 percent growth the year before. "Security j...

Device Management presents barrier to IoT at scale

$
0
0
Industry survey highlights key to delivering ambitious growth expectations for connected devices4 April 2016: Management of thousands or millions of internet connected devices is posing a major obstacle to the success of the Internet of Things, claims IoT pioneer DevicePilot (previously 1248).

These concerns are reflected in a survey of 50 companies planning to deploy IoT applications at scale across different industry sectors including environmental and industrial monitoring, elderly care/wellness, smart homes and cities, energy management, refrigeration, retail and public services.

The survey ranked ‘risk to growth’ as the most worrying consequence of failing to manage devices, followed by ‘risk to revenue’ and ‘risk to brand’. This may be one of the reasons why some of the ambitious predictions for IoT devices have not yet been borne out. While 12% of respondents had deployed a million or more devices in the field, 82% had deployed only 1,000 devices or less. However, respondents to the Device Management Survey expect these numbers to grow, with 70% of companies predicting an eventual market size of at least millions of devices and 20% predicting that they will reach the billions level. “It is clear that most IoT companies are currently managing their connected products manually or by a mixture of manual and automatic processes,” said Pilgrim Beart, CEO at DevicePilot. “But as projects move from pilot to deployment at scale, the time and operational cost of manually logging-in to each device to perform an upgrade or check if it is working becomes a major barrier.

Automatic asset management, monitoring and lifetime support are essential for the long term success of the IoT.” Colin Chapman, CTO of smart commercial refrigeration specialists Elstat says, "It's important to maintain our leadership in the smart refrigeration market – simply put this means connectivity which gives us the opportunity to collect sales data and insights remotely.

At scale, the management of those connected devices has to be automatic, in order to be cost effective.” DevicePilot, an ARM mbed™ Partner, unveiled its new as-a-Service solution for managing the growing IoT ecosystem at the end of last year at ARM TechCon.

DevicePilot™ continuously monitors and manages connected devices and presents a simple dashboard showing how many have been deployed, where and by whom, how many are not working and why. “Managing IoT devices is a complex hurdle within the IoT value chain,” said Zach Shelby, vice president of marketing, IoT business, ARM. “The ARM mbed IoT Device Platform makes it easier for developers to build and deploy IoT devices at scale and coupling this with DevicePilot will help to alleviate this problem in IoT deployments.” “Connected devices are deployed into the physical world where lots of things can go wrong.

For the IoT to work like the Web, it needs an open ecosystem of interoperating, off-the-shelf products and services,” said Beart. “DevicePilot fills a major gap in the set of services required for successful IoT deployment.” Summary of key survey findings: 61% of companies anticipate 10x growth over the coming year 70% estimate their addressable market to be in the millions of devices - and 9% in the billons The most common business model is a combination of up-front fee plus ongoing service fee Only 18% of companies describe their device management as “highly automated and slick” The biggest perceived risk of not managing devices well is risk to the growth of the company 86% of companies say that as far as managing devices is concerned, they’re either already in trouble, or expect to be within 12 months For the full survey report, please visit: www.devicepilot.com Quotes from some participants in the DevicePilot survey:Cees Links, veteran of the world of connected devices and currently CEO of GreenPeak Technologies commented, "It sometimes surprises me how many device companies don't even know how many of their devices have been deployed, let alone how many are working.

As the IoT matures, users' expectations of service quality are rapidly increasing, and you really have to keep on top of this stuff. When it comes to the smart home we expect all devices to be connected and providing useful information for owners and manufacturers on usage, diagnostics, need for refurbishment and replacement." Toby Coleman of demand response aggregator Open Energi said, "It's interesting that most survey respondents agreed with us that the biggest risk of not getting device management right is the risk to growth. Our business model is based on aggregating flexible energy demand from very large numbers of connected devices; having an accurate picture of how those devices are performing and simplifying how we connect and exchange information between multiple control systems and processes is a vital part of scaling our business and maximizing the value of the flexible energy demand we’re tapping into.” “It's remarkable how many of the companies surveyed are still trying to manage their device estate manually - and how many believe that they might be in trouble in the next 12 months as a result. Having managed large estates of remote devices automated device management is essential in reducing operational costs," said Pete Easey, Founder and CTO of Crowdlytics, providers of the next dimension of water management. "The answer to device management is automation,” said Chris Wright, CTO of Moixa, a business deploying a solar energy storage product. “We need to be connected for multiple reasons including remote management, demand response and performance reporting; and if the product isn’t working or has lost connection, then we can’t bill.” About DevicePilotDevicePilot (formerly 1248 Ltd) has designed and developed DevicePilot™, the software of choice for locating, monitoring and managing connected devices at scale.

DevicePilot is completely agnostic, allowing the user to connect any device across any platform, with simple and easy integration.

The company draws on the significant experience of its founders who successfully scaled their previous connected-device businesses to 1 million+ end-customers in areas as diverse as mobile phones, IPTV set-top-boxes and the connected home.

For further information and white papers, please visit http://devicepilot.com For more details on DevicePilot, images or interviews, please contact Peter Rennison or Sam Morgan at PRPR: pr@prpr.co.uk / sam@prpr.co.uk, Tel +44 (0)1442 245030

To dodge crypto, undercover UK cops simply asked to see terror convict’s iPhone

$
0
0
CNNKey evidence that helped convict two British men last week for terrorist offences was reportedly obtained from a locked phone using a simple but highly effective ruse. According to CNN, which cited a source close to the investigation, undercover police officers visited Junead Khan, 25, of Luton posing as company managers and asked to check his driver and work records. "When they disputed where he was on a particular day, he got out his iPhone and showed them the record of his work.

The undercover officers asked to see his iPhone and Khan handed it over," CNN reported.

At that point they apparently arrested Khan and changed the password settings on the iPhone to prevent it from becoming locked. Dean Haydon, head of the Metropolitan Police's counter terrorism command, told CNN: "Via that phone we knew that they'd been in contact with Daesh fighters in Syria via text message, via e-mails but also using social media applications but also there was a vast amount of extremist and terrorist material on there in relation to how to make a bomb, for instance, but also material that related to atrocities overseas." The Met indicated that encryption was not a problem when obtaining further valuable digital evidence in the successful conviction of Khan and his uncle for "engaging in conduct in preparation of terrorist acts." Scotland Yard said: "Digital forensic analysts sifted through around 64,000 files from Junead Khan's three computers, recovering deleted documents.

These included bomb making guides and terrorist propaganda." According to the CNN report, Khan was planning to stage a car crash near a US or RAF military base and then attack a US airman with a knife. "He'd also researched and planned on how to make a pressure cooker bomb," Haydon told CNN. "We think that that bomb was going to be detonated if he was compromised by police either before or during the actual attack." UK police were not only aware of Kahn's activities, but they actively tried four times to dissuade him from engaging with other known terrorists, the Met said. This latest terrorism case appears to provide a good demonstration of how encryption can be circumvented using old-fashioned but highly-effective policing techniques.

Arguably, the easiest way to deal with a secure system is often to concentrate efforts on what is generally the weakest link—the human element. Kahn and his uncle, Shazib Khan, 23, also of Luton, were found guilty of engaging in conduct in preparation of terrorist acts following a six-week long trial at Kingston Crown Court.

The two men have been remanded in custody until they are sentenced on May 13. This post originated on Ars Technica UK

Top Silk Road 2.0 admin “DoctorClu” pleads guilty, could face 8 years in prison

$
0
0
Judit Klein Last week, a federal judge in Washington formally accepted the guilty plea of Brian Farrell, the 28-year-old who had been accused in 2015 of being the right-hand man to the head of Silk Road 2.0, the copycat website inspired by the infamous Tor-enabled drug website. In a 2015 press release, the Department of Justice said that SR2 had generated approximately $8 million per month since it began in November 2013.Farrell pleaded guilty in March 2016 to one count of distribution of heroin, cocaine, and methamphetamine last month, which carries a minimum sentence of five years in prison. He will also be required to forfeit items that were seized at his arrest in Bellevue, Washington, which included $3,900 in silver bullion bars, $35,000 in cash, and "various computer media." Both Farrell’s lawyers and prosecutors have agreed to a sentence of eight years, but the judge is allowed to impose a harsher sentence if he chooses. (By comparison, Ross Ulbricht, who was convicted of running the original Silk Road, was sentenced in 2015 to a dual life sentence.) In the 10-page court filing, Farrell admitted that not only was he "DoctorClu," a site administrator, but that he also served as "informal spokesman" for "Defcon," the site’s founder.

Farrell also said that he led a denial-of-service attack on Tor Market, a competitor. Federal prosecutors believe that Defcon is a man named Blake Benthall, whose own criminal case remains pending in federal court in New York. Nothing has been filed in that case in over a year, suggesting that Benthall’s attorneys and prosecutors may also be working on a similar plea agreement. According to the original January 2015 criminal complaint against Farrell, when federal agents asked if Farrell could help them identify other top people who had been involved with Silk Road 2.0, Farrell told them, "You're not going to find much of a bigger fish than me." In February 2016, US District Judge Richard Jones denied Farrell’s motion to compel disclosure of exactly how federal investigators found him out.
In the order, the judge seemed to suggest that even though Farrell took measures to protect his privacy via Tor, his actual IP address—which was what betrayed him and made it trivial for law enforcement to find him—was not in and of itself private. That same month, Judge Jones confirmed what has been strongly suspected—Carnegie Mellon University researchers from its Software Engineering Institute were hired by the federal government to research breaking into Tor back in 2014. Farrell is scheduled for sentencing in federal court in Seattle on June 3, 2016.

EA trumps Trump ad, takes down supporter’s retweeted Mass Effect video

$
0
0
I probably could have made this up if I tried, but you wouldn't believe it if I did.Trump Effect In a US presidential campaign season full of unexpected moments and petty squabbles between candidates and public figures of all stripes, today's interaction between Donald Trump and Electronic Arts still ranks as one of the oddest.

This afternoon, the publisher issued a YouTube takedown notice for a video supporting Donald Trump that uses voices and music from 2010's Mass Effect 2, after the candidate himself tweeted the video approvingly to nearly 7.5 million followers earlier in the morning. The ad, which appears to have been created by an individual fan with no official connection to the Trump campaign, draws directly from Mass Effect 2's launch trailer, overlaying a speech from Martin Sheen's Illusive Man character with videos and photos from modern America. "We're at war," Sheen intones over scenes of generalized and specifically Trump-related chaos. "No one wants to admit it, but humanity is under attack. One very specific man might be the only thing that stands between humanity and the greatest threat of our brief existence." The Mass Effect content is roughly intercut with images and messages from Trump supporters, as well as lines from Trump's stump speech about making America great again.
It ends with the message that "the American people are DONE with career politicians" and an entreaty to "GO OUT & Vote for Trump." Yet there are some signs the video could be an elaborate, trollish joke against Trump, including an image with the non sequitur purported Trump quote, "No more oreos!" While the YouTube version of the video "is no longer available due to a copyright claim by EA," the video is still currently up at its original location on vid.me, where it was posted a week ago as "a Mass Effect 2 launch trailer parody video covered under Fair Use," according to its description.

The video is also still available directly through Trump's tweet itself, as well as through the original March 31 'Immigrants 4 Trump' tweet that seems to be the source for Trump's reposting [Update: Trump's tweet has now "been withheld in response to a report from the copyright holder," but previous tweets with the same video seem unaffected so far]. "The video was an unauthorized use of our IP," an EA spokesperson told Game Informer. "We do not support our assets being used in political campaigns." Veteran Mass Effect developer Manveer Heir offered his own two cents about the video on Twitter, saying that seeing his game's assets used in "campaign propaganda" was "#gross." "I love the idea that Trump may think he's the Illusive Man, who is verifiably the bad guy in the game," Heir tweeted. "Trump is indoctrinated, that makes so much damn sense.

THE REAPERS ARE REAL." Trump's major competition for the GOP nomination, Texas senator Ted Cruz, has reportedly been a serious video game fan since childhood, though his current tastes apparently run more toward Plants vs. Zombies than Mass Effect. Trump himself isn't the first GOP candidate to subtly integrate game-related content into his campaign (intentionally or not).

Back in 2011, pizza chain magnate Herman Cain movingly quoted a line from Pokemon: The Movie 2000 multiple times before suspending his failed bid for the presidency.

BBM App Security Features Now Free

$
0
0
A new update gives Android, iOS, and BlackBerry device owners unlimited access to Retract and Timer. BlackBerry has dropped its $1-per-month subscription plans for some key BBM privacy features. A new update gives Android, iOS, and BlackBerry device owners unlimited access to Retract and Timer. As its name suggests, Retract lets users rescind messages and photos they accidentally sent to the wrong person, or that they no longer want to be accessible to certain recipients.

Timer, meanwhile, takes a page from Snapchat's book, and gives folks control over how long contacts can view shared messages, pictures, and location information (up to 15 seconds).
"Building on the renowned immediacy, reliability, and security inherent to BBM, the new release provides unmatched level of privacy and control to BBM users without any subscription fees," Matthew Talbot, senior vice president of BBM at BlackBerry, said in a statement. "Keeping control over the messages and content that they share, BBM users can be ensured that what they share is always theirs to control," he added. Additional cross-platform features in the latest update include access to features like Private Chat (remove names and avatars) and Edit (rewrite messages you've sent to a contact), as well as the ability to forward messages from one chat to another. Individually, Android, iOS, and BlackBerry 10 users will notice a handful of changes.

Aside from support for Marshmallow, the Android BBM app is getting the ability to mute notifications for multi-person chats and scroll through shared photos.

Apple owners, meanwhile, get an enhanced chat screen aesthetic, enhanced video sharing, and multi-select mode (delete, retract, or forward multiple messages at once). Both mobile operating systems also comes with improved BBM Voice call quality and the option to save to the device pictures taken during BBM chat. For its own BlackBerry 10 platform, the company made it easier to delete messages from just your chat view and retract and edit messages in group chats, as well as the added option to retract all messages in a chat when it ends. But can attempts like these—and the November launch of the Android-powered Priv—save the Canadian phone maker? According to CNET, the outlook is not so good: BlackBerry last week said it sold 600,000 phones in its fiscal fourth quarter, below Wall Street's expectations of 850,000, and less than the 700,000 units sold in the previous quarter. The announcement came shortly after Verizon started selling the Priv.

The handset is also available via AT&T and T-Mobile.

Open Network Insight Project Builds on Big Data to Improve Security

$
0
0
The open-source effort, which is backed by Cloudera, Intel, eBay and others, is seeing early adoption, as organizations aim to gain the upper hand on attackers. Using big data to collect network events in an effort to help improve security is not a new concept, but it is evolving. Part of the evolution is coming by way of the open-source Open Network Insight (ONI) project, which has been generally available for just over a month and is already being used by Intel.Helping to lead the ONI effort is Cloudera, one of the leading vendors and participants in the development of the Hadoop big data platform. ONI isn't just Hadoop though, as simply having big data is not the same as understanding the data and making sense of it to improve security outcomes.
In addition to Hadoop, ONI includes the open-source Wireshark project, which is a widely used packet sniffing and analysis technology; nfdump, which is a netflow network packet capture tool; and the D3 JavaScript visualization library and the Jupyter project for reporting."Hadoop is a really great platform for storing cyber-security information, and this is a use case that we see across industries," Eddie Garcia, chief security architect at Cloudera, told eWEEK.By making use of Hadoop as the back end for storing data, Garcia noted that that an organization can look at and analyze more data than by using a non-big data approach.

From a community perspective over the last month, ONI has seen adoption and contributions by eBay and Accenture, among other organizations.

Garcia noted that eBay is using ONI for its own security needs, while Accenture is now running ONI as a managed service for clients. One of the challenges of using Hadoop as the basis of a security platform is that many organizations have built their own approaches and there hasn't been a standard model, but that's something ONI is aiming to address, according to Garcia. When dealing with network security, among the challenges that ONI helps to solve is how to represent network data in Hadoop in a common model and format, regardless of the network device or vendor that the data comes from. "What we're enabling is a platform to store network data and do analytics on top," he said. "In the future, what we see is an open model to enable other threat and security analysis, including users and servers."While the current iteration of ONI has a focus on network events, the platform is also useful for performing User Behavior Analytics (UBA), which is an increasingly common security activity for detecting anomalous user activity."A user is going to have an IP address," Garcia said. "From that perspective, you can already do some user analytics with ONI today."What ONI is missing, he noted, is the direct correlation to the user and all the different devices that a particular user might be using to access a network. Work to enable more robust UBA is ongoing in ONI.From a reporting perspective, Garcia explained that the Jupyter component helps to power the ONI dashboard.

Currently in the ONI dashboard, it's possible for an administrator to drill down into specific events and IP addresses, as well as filter by date and packet header information.

As ONI community partners and users continue to embrace the platform, Garcia expects that vendors will build their own tools on top of ONI for even more functionality.Despite only having been publicly available for a month, Garcia said the ONI project is already in production at Intel, which is also one of the core contributors and founders of the project."This technology grew out of a necessity that the number of events Intel was receiving outpaced the technology that they had," he said. "Now with Hadoop behind it, Intel is able to capture and analyze data across 20 billion events they receive daily."Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com.

Follow him on Twitter @TechJournalist.

TSA spent $47,000 on an app that just randomly picks lanes for passengers

$
0
0

According to Mashable, the Transportation Security Administration apparently spent $47,000 on an app that is essentially a random number generator—it was briefly used to assign travelers to left or right lanes at airports. As the website reported: “The app was used by TSA agents to randomly assign passengers to different pre-check lines as part of a now-discontinued program called ‘managed inclusion.’” Such an app is widely viewed to be an extremely simple program to write. Many are questioning why a government agency overpaid for the app. The revelation was published Sunday evening by Kevin Burke, a San Francisco-based developer, who received TSA documents in response to a Freedom of Information Act Request.

The documents showed a $1.4 million price tag. However, the TSA has clarified that figure, stating that the app actually cost $47,000. The TSA did not immediately respond to Ars’ request for comment.

George Bush naked selfie hacker Guccifer gets his day in US court

$
0
0
Romanian taxi driver embarrasses the rich and famous Marcel Lehel Lazăr, 44, who as the hacker Guccifer published the email account contents of senior US political figures, has appeared for the first time in a US court. The indictment claims that between December 2012 and January 2014, Lazăr used publicly available information and guesswork to get into email accounts via password reset questions. His targets were an unnamed US presidential family member, a former member of the joint chiefs, and a cabinet member, amongst others. He faces three counts of wire fraud, three counts of gaining unauthorized access to protected computers, and one count each of aggravated identity theft, cyberstalking and obstruction of justice. "Mr. Lazăr violated the privacy of his victims and thought he could hide behind the anonymity of the Internet," said US Attorney Dana Boente of the Eastern District of Virginia. "No matter where they are in the world, those who commit crimes against U.S. citizens will be held accountable for their actions, pursued by our investigators and prosecutors and brought to justice." The victims are unnamed, but the most infamous incident Guccifer is accused of is broadcasting a painted self-portrait by former President George W Bush while naked in a shower and bath. Guccifer also claimed responsibility for the hacking of an AOL account run by former Secretary of State and presidential hopeful Hillary Clinton, and documents that were published from that hack kicked off the current investigation into her use of a private email server for state documents. Former head of the US Joint Chiefs of Staff Colin Powell also had his emails put online by Guccifer, as did Christopher Kojm, former Chairman of the US National Intelligence Council (NIC).

Comedian Steve Martin; actress Mariel Hemingway; Kitty Kelley, the writer of unauthorized biographies; and magazine editor Tina Brown also had personal data published. Lazăr was arrested by Romanian police in January 2014 after a joint operation between US and Romanian authorities, and was jailed for four years in June of that year.
In March he was extradited to the US and now faces doing hard time in the US. "Marcel Lazăr is the latest of a dozen high-level cybercriminals who have recently been extradited to face justice in the United States," said Assistant Attorney General Leslie Caldwell. "Old-fashioned investigative work, enhanced international law enforcement relationships, and a long memory can ensure that foreign-based hackers have no safe haven, even in remote corners of the globe.

As the saying goes, 'they can run, but they can't hide'." Lazăr will be tried in the United States District Court for the Eastern District of Virginia – also known as the "Rocket Docket," as it is the fastest district in the US when it comes to obtaining a decision. He won't have long to wait before finding out whether offending the wrong people has consequences. ® Sponsored: DevOps: hidden risks and how to achieve results

Massive Law Firm Hack Reveals Rich Hiding Money

$
0
0
Hackers allegedly stole more than 11.5 million documents from the Panamanian law firm of Mossack Fonseca, detailing the workings of offshore accounts for many politicians and the rich, and delivered the information to journalists. The alleged hack of Mossack Fonseca, a Panamanian law firm, has resulted in the leak of more than 11.5 million documents that detail the workings of offshore accounts held by many politicians and wealthy citizens.The leak happened a year ago, when an unknown source contacted the Süddeutsche Zeitung (SZ), a German newspaper.

The newspaper collaborated with about 400 other journalists from other publications to sift through the 2.6 terabytes of material and verify the information.

The media outlets released the information—dubbed the "Panama Papers"—on April 3, shedding light on the companies set up by hundreds of "important politicians, international criminals, and well-known professional athletes" to hide money."[T]he new Panama Papers trove shows the role of often-overlooked lawyers and incorporation agents in the process [of] moving, hiding and laundering money for the wealthy," wrote journalists from Fusion.net—one of the many media outlets that partnered with SZ on the project. "The results of the yearlong investigation encompass 214,488 corporate entities—among them companies, trusts, and foundations—controlled by everyone from heads of state, politicians, Forbes-listed billionaires, to drug lords, businesses blacklisted by the US government, scammers, and FIFA officials."The massive leak underscores the lucrative nature of offshore companies that are incorporated in jurisdictions that allow extensive secrecy.

The Tax Justice Network estimated that, as of 2010, some $21 trillion to $32 trillion have been sequestered in tax havens. "We believe this range to be conservative," the group said in 2012, pointing to the variety of yachts, land and other assets owned by such companies. "Remember: this is just financial wealth." The leak also underscores that law firms' lack of focus on cyber-security has put them in legal jeopardy and exposed their clients to business loss and risk.

For more than half a decade, security experts have been warning law firms that they are a logical target of hackers and nation-state adversaries.
In 2009, the FBI warned law firms of a notable increase in efforts to break into their systems, according to the Associated Press. Last year, a Citigroup report took law firms to task for their lack of openness regarding successful attacks on their systems. Law firms typically only have basic security, such as spam filters, firewalls and anti-spyware, according to the American Bar Association's Legal Technology Survey Report for 2015. Only 41 percent of law firms use encryption or file-access restrictions.

Fifteen percent of law firms included in the study had experienced a breach."Outside the USA there has been little interest by foreign law firms in investing in cyber security and for mounting competent cyber defense capabilities," Philip Lieberman, president and CEO of Lieberman Software, said in a statement sent to eWEEK. "The fact is of great value to many criminal and nation state activities in the exploitation of weak security within law firms."So far, there is little evidence as to whether the Mossack Fonseca leak resulted from a hack or insider theft.

The law firm, in a statement to Reuters, blamed a "limited hack," but other reports have indicated that the breach may have been caused by a disgruntled employee.Law firms hold their clients' most sensitive secrets and typically have a poor understanding of cyber-security, making them ideal targets for attackers."The implications of law firm breaches are mind boggling," Lieberman said. "It is a simple step for a criminal to move on to attacking an appropriate law firm to harvest their files.

For a criminal this could mean the ability to manipulate stocks, access the personal records of principals within the companies, and provide a way to blackmail a person based on information not publicly known."Mossack Fonseca did not reply to emailed requests for comment.

Hackers demo persistent, quiet attacks through Windows DSC

$
0
0
Desired State Configuration tool can create state of chaos AUDIO from Black Hat Asia Forensics men Matt Hastings and Ryan Kazanciyan have flipped the Windows Desired State Configuration (DSC) into a covert persistence mechanism and weapon in a new attack vector to own Windows boxes. The Tanium security duo released the DSCompromised framework of Powershell scripts and modules that help attackers use DSC, while smoothing over otherwise confusing and undocumented bugs. They told Black Hat Asia in Singapore last week that attackers abusing DSC can continually and covertly re-infect Windows systems. The pair say they were keen to showcase the new attack and suggested defences to the security community before criminals find the vector on their own. "If not properly remediated, DSC will automatically re-infect the victim by re-dropping the file and re-executing the malware without notifying the user," Kazanciyan says. "We have yet to see an example of this attack happening in the wild - that doesn't mean it isn't happening - but it does give us hope that we can get this out there so that red and blue teams are aware." Their attack works in DSC pull mode where compromised clients issue requests over HTTPS to servers either located on the internet or within the victim's network. Listen: | Download | Slides (start from page 11) DSCompromised: A Windows DSC Attack Framework. Powershell 3 and later sport script and module logging features that warn admins of running scripts, and would also log Hastings' and Kazanciyan's attack. Moreover script heuristics in Powershell 5 may also trigger some flags when the attack is run, but the duo haven't tested its efficacy. Matt Hastings (Ryan Kazanciyan is off camera). The two have urged interested hackers to contribute to the DSCompromised framework hosted on GitHub. ® Sponsored: Why every enterprise needs an Internet Performance Management (IPM) Strategy

Ultracomms Achieves Payment Card Industry Data Security Standard (PCI DSS) Level 1 Certification for its Cloud Platform

$
0
0
Fareham, Hants, UK – 5 April, 2016 – Ultracomms, Europe’s first cloud contact centre services provider, today announced that it has been certified as compliant with the Payment Card Industry Data Security Standard (PCI DSS) v3.1, achieving PCI DSS Level 1 accredited service provider status for its entire platform.

This certification means that all calls made over the Ultracomms cloud platform are secure, and underlines Ultracomms’ commitment to maintaining the highest standards of data integrity and providing completely secure payment card transaction processes for customers.Ultracomms uses DTMF (dual-tone multi-frequency) clamping technology to completely mask payment card data from entering the contact centre, so the person handling the call is unable to see or hear the sensitive card details, making screen and continuous call recording safe for organisations and customers. As one of very few cloud contact centre service providers to achieve this level of certification, attaining PCI DSS Level 1 enables Ultracomms’ clients achieve PCI DSS compliance using the Self-Assessment Questionnaire (SAQ) process, without having to invest heavily in their own infrastructure. Using a Level 1 certified platform also significantly reduces the risk of a data breach occurring and shifts the liability for investigating any suspected breaches from the contact centre organisation, removing the risk of financial and reputational damage for clients. For technology vendors, achieving PCI DSS Level 1 certification involves a detailed audit to ensure the company’s technology, network and internal processes are documented and up to the stringent PCI standards. Ultracomms completed its certification following an audit by independent QSA Coalfire, confirming its solutions are compliant with the Payment Card Industry Data Security Standards (PCI DSS) for Level 1 merchants who handle over 6 million card transactions a year.

As a result, Ultracomms will shortly be included in the MasterCard and Visa Europe lists of approved service providers. Robert Bates, Chairman of Ultracomms said, “As an enterprise-level provider of cloud and on-site PCI solutions for contact centres, our clients rely on us to be able to provide a secure environment for handling sensitive payment transaction information for their own customers.

Clients are more sensitive than ever to the potential for financial and reputational damage caused by security breaches and fraud involving payment card information.

Achieving PCI DSS Level 1 certification is a significant milestone for Ultracomms, providing a foundation for our growth and reflecting our commitment to maintaining the highest standards of service and security for our clients”. Ultracomms’ PCI DSS Attestation of Compliance can be found here www.ultracomms.com/products/pci-solutions Notes to EditorsThe PCI DSS is a comprehensive security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures.
It applies to all organisations that store, process or transmit cardholder information from any of its members’ cards and was developed by the founding payment brands of the PCI Security Standards Council, including American Express, MasterCard Worldwide, JCB International and Visa. More information on the PCI Security Standards Council can be found at http://www.pcisecuritystandards.org/ ENDS About UltracommsUltracomms was founded over a decade ago as Europe’s first cloud-based contact centre solution provider.

Today, the company is positioned as one of the UK’s most innovative contact centre solution providers, with both PCI DSS level 1 certified on premise and cloud options.
Its’ services help clients to achieve: better customer engagement and real-time responsiveness; reduced contact centre cost of ownership; simplified infrastructure; staff optimisation; compliance; and visibility of contact centre performance. PR and AR contacts:Maxine AmbroseAmbrose Communicationsmaxineambrose@ambrosecomms.co.uk+ 44 (0) 1491 412944 Liz RawlinsHead of Marketing, UltracommsLiz.rawlins@ultracomms.com+ 44 (0)7919 275070

Digital certificates are helping deliver malware

$
0
0
Digital certificates and malware go together like peanut butter and petroleum jelly -- they can be sandwiched together easily, but the result is not exactly tasty or good for you. As you may know, digital certificates are used to cryptographically sign executable code and documents.
If the digital certificate used for signing the content was issued from a certificate authority you or your computer trusts, then the content will more likely be accepted for execution or opening, without warning messages. The general process of code signing goes something like this: 1.

The developer receives a code-signing digital certificate from a trust certification authority (CA). a.

The CA is supposed to identify the developer’s identity before issuing the digital certificate, thereby tying the digital certificate to the verified developer. b.

The code-signing certificate contains the public key of the developer signed by the CA’s private key. 2.

The developer creates content. 3.

The developer signs content. a. When signed, the content is run against a cryptographic hash algorithm (such as SHA-1 or SHA-2) to create a unique hash output, which uniquely identifies the content. b.

The hash is then signed by the developer’s private key (related to the public key included in the developer’s code-signing certificate) to create a digital signature. c.

The digital signature is cryptographic proof of the content’s integrity when signed. 4. The developer distributes signed content along with the code-signing digital certificate. 5. When a user or computer downloads the content, a program or a device checks the integrity of the content. a.

The content is rehashed using the hash signature algorithm stated in the digital certificate to get a newly obtained hash result. b.

The original signed content hash is unlocked with the developer’s public key included in the digital certificate. c.

The digital certificate is unlocked by using the public key of the trusted CA (which may already be installed on the device or the downloading program). d.

The original, newly obtained hash results are compared. e.
If the two hashes are identical, it means there is a high likelihood that the content has not been modified since the original signing. That’s the way it’s supposed to work.

The idea is if you come across signed code, particularly if it was signed by a digital certificate from a legitimate CA, you should be able to trust it. Unfortunately, that fragile and often mysterious trust is often broken, so much so that some people wonder if code signing has any value. Why malware uses digital certificates This is a no-brainer: Malware is often signed by trusted code-signing certificates to make you or your computing device accept malicious Trojan code as legitimate. Sometimes the malware writers use their own, nontrusted code-signing certificates, but more often they use code-signing certificates from other legitimate vendors.

The number of legitimate vendors who have had their code-signing certificates stolen reads like a who’s who of the computer world.
It includes big names who make the world’s most popular software. Once a legitimate code-signing certificate is stolen, even after the theft has been discovered, it can be difficult to revoke that certificate.

That’s because revoking the compromised certificate means all the legitimate software signed by the certificate will no longer be accepted as legitimate, either. One malware program signed by one stolen digital certificate may end up invalidating dozens to hundreds of pieces of legitimate code. Of course, that’s only when revocation works -- often, it doesn’t.  How malware creators snag trusted digital certificates Malware creators break into software companies wielding the same techniques they use against any company: social engineering, Trojans, unpatched software, and so on.
Sometimes hackers break in with the intent to steal the victim’s code-signing certificates; other times they stumble across them and recognize their value. Malware developers pay handsomely for popular vendors’ code-signing certificates. For example, the world’s most sophisticated malware program, Stuxnet, was signed by digital certificates stolen from two popular Taiwanese companies. Over the last decade, several cyber gangs dedicated to stealing trusted signing keys have emerged.

They are prolific and successful at what they do. Dozens of malware programs include digital certificate stealing routines in their bag of tricks.

A 2013 Symantec report did a great job detailing a number of these tools. In a few cases, flaws in the digital certificate allowed a determined human adversary to compromise the private key of the code-signing certificate simply because the attacker had the public key (often readily available to any downloader).

For example, in 2012, the sophisticated Flame malware program was able to “steal” a Microsoft digital certificate’s private key because it was hashed using the vulnerable MD-5 hash algorithm.  How many malware programs have digital certificates? I don’t have the latest statistics, but it might not be a stretch to say there are more malware programs with trusted digital signatures than not. McAfee warned that more than 1.5 billion new malicious binaries were signed by malware in one quarter alone -- in 2013.
It’s much worse now. Kaspersky has said that digitally signed malware has risen steadily since 2008. An article by Lucian Constantine of IDG News Service tells the story of multiple digital certificates stolen in 2015. Plus, check out this website dedicated to listing all digital certificates used by malware programs. How to protect your code-signing certificates For three decades, whenever I installed a company's new Public Key Infrastructure (PKI), I warned them to protect their PKI servers as if they were the most valuable assets in the firm.

For the first two decades I said this because of the theoretical threat, though I knew hackers were not really targeting PKIs or digital certificates -- yet.  Now they are. Over the last decade, hackers and malware have been in hot pursuit of your PKIs and digital certificates, especially your code-signing certificates. Here’s what you can do to protect yourself: Be sure to use a hardware storage module for all your PKI CAs and for code signing.

To date, no private key has ever been stolen in an unencrypted state from an HSM -- at least no one has publicly acknowledged it. All PKI and code-signing servers and computers should have the strongest security settings and configurations available. All code signing should be done from dedicated computers not connected to any network. Make sure all users understand that a valid, trusted digital certificate doesn’t mean the program they might be tempted to install, execute, or open is harmless.
Share this article and educate them. Malware has so successfully abused the trusted digital signature paradigm that it makes you question the value of the digital signature process in general. Yes, there’s still value, along with issues and cracks.

They could be fixed if more code signers used the protections outlined here.

Surprise! Magic Kinder app could let hackers send vids to your kids

$
0
0
Infosec bods look at app, discover huge vulnerabilities Security watchers have warned of massive privacy problems with the Magic Kinder App for children. A lack of encryption within the Magic Kinder smartphone app and other security shortcomings open the doors for all sorts of exploits, they claim. Hacktive Security alleges that a malicious user could "read the chat of the children, send them messages, photographs and videos or change user profile info such as date of birth and gender," as explained in detail in a blog post here. The Android app – which has clocked in at more than 500,000 downloads – was developed by a subsidiary of Ferrero International, the firm behind Nutella, Kinder and Ferrero Rocher. The mobile software aims to offer “strategic, educational games and quizzes to improve children's skills and development”. Ferrero has yet to respond to a request for comment. Joe Bursell, marketing manager at independent security consultancy Pen Test Partners, said that the app Magic Kinder App is riddled with basic security problems. “These are not subtle, hard-to-find issues,” Bursell told El Reg. “You'd see those IDs in the proxy within minutes of testing and the first thing you would do is manually increment/decrement them.” “There are no authorisation checks on any of the requests.

This means that anyone can: send a message to your kids, read your family diary, and change other data about people, e.g. gender.” “Also, it doesn't use encryption,” Bursell added. Reg tipster Clive, who brought the issue to our attention, commented: “The app seems to only be available to users in Europe – certainly a violation of several EU directives.” There’s been heightened concern over the security of technology provided to children over recent months following the high profile VTech hack last November.
VTech servers holding customer information were breached.
In a statement, VTech admitted that it had failed to secure personal information on 4.8 million parents and 6.37 million children – including 1.2 million users of its KidConnect messaging service. ® Sponsored: Network monitoring and troubleshooting for Dummies

Preservica joins the Information Governance Initiative to support preservation of long-term digital records

$
0
0
Digital Preservation specialist partners with industry-leading think tank to conduct new research on the protection of digital informationPreservica, the digital preservation specialist, has become a ‘Supporter’ of the Information Governance Initiative (IGI), and will join forces with the think tank for a quantitative research project to benchmark the unique challenge of protecting long-term digital records. The IGI is supported by a number of leading information governance providers, and aims to promote the adoption of information governance strategies in the protection of corporate data. Preservica’s partnership with the IGI demonstrates the growing importance of digital preservation in the overall information governance lifecycle, ensuring that data is findable, useable and trustworthy long into the future. With technology refresh occurring at an ever increasing rate, digital content and records are at serious risk of being lost forever as the hardware and software within which they are stored becomes obsolete.

Digital preservation technology is fundamental to protecting and future-proofing the vulnerable and vital information that many businesses require to be retained as a matter of law. As part of the collaboration, Preservica and the IGI have launched a Research Initiative on the Preservation of Long-Term Digital Records and Information.

The survey aims to discern how organizations are currently handling their records and information management, and gauge industry awareness of the risks surrounding current practices. Some forward-thinking organizations are already leading the way in adopting digital preservation as a core facet of their information governance strategies.
In the last twelve months, Preservica has partnered with world-leading global organizations across a variety of sectors, including HSBC, Transport for London (TfL) and the Associated Press, in order to safeguard their digital assets. Jason R.

Baron, Co-Chair at the Information Governance Initiative, said of the collaboration: “I am delighted that Preservica has joined as a supporter of the IGI.

An increasingly important facet of information governance is the ability of institutions to provide long-term preservation of records and information of all kinds, in trustworthy formats.

This is true both in the public and private sectors where soon there will be millions of records in electronic form, appraised as long-term and permanent under existing records schedules, all of which must be preserved and made accessible.
I look forward to Preservica’s important contributions to the IGI.” "The importance of digital preservation is rapidly rising up the information governance agenda" says Jon Tilbury, CEO Preservica. "We look forward to working with the IGI community to share and discuss the challenges of ensuring long-term and permanent digital records remain usable and accessible into the future." Information Governance and Records Management professionals are invited to participate in the Research Initiative, which is now live. About IGIThe Information Governance Initiative (IGI) is a think tank and community dedicated to advancing the adoption of Information Governance (IG) practices and technologies through research, events, advocacy and peer-to-peer networking. We are dedicated to the professionalization of IG and have called for the creation of a new kind of information leader called the Chief Information Governance Officer. Our Annual Report has become an industry standard reference guide for organizations benchmarking and building their IG programs. The IGI Community is where thousands of practitioners from cybersecurity, IT, analytics, privacy, legal, records management and the other facets of IG come together and learn from each other. We produce hands-on educational workshops and executive roundtables each year.

The IGI was founded by recognized leaders in the field of IG, and is supported by leading providers of IG products and services. About PreservicaPreservica is a world leader in digital preservation technology, consulting and research. Our active preservation solutions are used by leading businesses, archives, libraries, museums and government organizations globally, to safeguard and share valuable digital content, collections and electronic records, for decades to come.

These include the European Commission, the Met Office, Texas State Archives, Wellcome Library and HSBC, to name a few. Preservica’s award-winning digital preservation and access software is a complete, standards-based (OAIS ISO 14721) trusted repository that includes connectors to leading Enterprise Content and Records Management systems to ensure long-term usability, trustworthiness and preservation of vital digital records, emails and content. Visit: www.preservica.com In the US: For further information, please contact: Maria Doyle, maria@doylestratcomm.com, +1-781-964-3536 In the UK: For further information, please contact: Ilona Hitel, ihitel@thecommsco.com, or mobile: 07734 355205.

How to Spot and Avoid Credit Card Skimmers

$
0
0
The moment I started seriously worrying about credit card and debit card skimmers wasn't when my entire bank account was transferred to Turkey, or when I had to get three credit cards in two months because of fraudulent charges.
It was when I learned that stealing a credit card number is as easy as plugging in a magnetic strip reader into a computer and opening a word processor.

Every swipe is read as a keyboard entry, with no extra setup required. More advanced devices to steal your information are installed by criminals directly on to ATMs and credit card readers.

These are called skimmers, and if you're careful you can keep from being victimized by these insidious devices. What Are Skimmers?Skimmers are are essentially malicious card readers that grab the data off the card's magnetic stripe attached to the real payment terminals so that they can harvest data from every person that swipes their cards.

The thief has to come back to the compromised machine to pick up the file containing all the stolen data, but with that information in hand he can create cloned cards or just break into bank accounts to steal money. Perhaps the scariest part is that some skimmers don't prevent the ATM or credit card reader from functioning properly. Classic skimming attacks are here to stay, and will likely continue to be a problem even after banks make the shift to EMV chip cards, according to Stefan Tanase, a security researcher at Kaspersky Lab.

Even if the cards have a chip, the data will still be on the card's magnetic strip in order to be backwards compatible with systems that won't be able to handle the chip, he told us. Now, months after the U.S. rollout of EMV cards, some merchants still require customers to use the magstripe. The typical ATM skimmer is a device smaller than a deck of cards that fits over the existing card reader. Most of the time, the attackers will also place a hidden camera somewhere in the vicinity with a view of the number pad in order to record personal-identification-numbers, or PINs.

The camera may be in the card reader, mounted at the top of the ATM, or even just to the side inside a plastic case holding brochures.
Some criminals may install a fake PIN pad over the actual keyboard to capture the PIN directly, bypassing the need for a camera. The above picture is a real-life skimmer in use on an ATM. You can see how the arrows are very close to the reader.

That is a sign a skimmer was installed over the existing one, since the real card reader would have some space before the arrows. When you are pumping gas or grabbing some money for lunch out of the ATM, the last thing you want to worry about is your card information getting stolen. Here are some tips, straight from the experts. Check for TamperingWhen you approach an ATM, check for some obvious signs of tampering at the top of the ATM, near the speakers, the side of the screen, the card reader itself, and the keyboard.
If something looks different, such as a different color or material, graphics that aren't aligned correctly, or anything else that doesn't look right, don't use that ATM.

The same is true for credit card readers. If you're at the bank, it's a good idea to quickly take a look at the ATM next to yours and compare them both.
If there are any obvious differences, don't use either one, and report the suspicious tampering to your bank.

For example, if one ATM has a flashing card entry to show where you should insert the ATM card and the other ATM has a plain reader slot, you know something is wrong.
Since most skimmers are glued on top of the existing reader, they will obscure the flashing indicator. If the keyboard doesn't feel right—too thick, perhaps—then there may be a PIN-snatching overlay, so don't use it. Wiggle EverythingEven if you can't see any visual differences, push at everything, Tanase said.

ATMs are solidly constructed and generally don't have any jiggling or loose parts.

Credit card readers have more variation, but still: Pull at protruding parts like the card reader.
See if the keyboard is securely attached and just one piece.

Does anything move when you push at it? Skimmers read the magnetic stripe as the card is inserted, so give the card a bit of a wiggle as you put it in, Tanase advised.

The reader needs the stripe to go in a single motion, because if it isn't straight in, it can't read the data correctly.
If the ATM is the kind where it takes the card and returns it at the end of the transaction, then the reader is on the inside. Wiggling the card as you enter it in the slot won't interfere with your transaction, but will foil the skimmer. Think Through Your StepsWhenever you enter your debit card's PIN, Just assume there is someone looking. Maybe it's over your shoulder or through a hidden camera.

Cover the keypad with your hand when you enter your PIN, Tanase said. Even if you don't notice the skimmer and swipe your card, covering your hand when you enter your PIN can keep you safe. Obtaining the PIN is essential, since the criminals can't use the stolen magnetic stripe data without it, Tanase said. Of course, that assumes the attacker is using a camera and not an overlay to obtain your PIN. Criminals frequently install skimmers on ATMs that aren't located in overly busy locations since they don't want to be observed installing malicious hardware or collecting the harvested data.

The ATMs inside banks are generally safer because of all the cameras, although some daring criminals do still succeed at installing them there.

The ATM inside a grocery store or restaurant is generally safer than the one that is outside on the sidewalk.
Stop and consider the safety of the ATM before you use it. The chances of getting hit by a skimmer are higher on the weekend than during the week, since it's harder for customers to report the suspicious ATMs to the bank.

Criminals typically install skimmers on Saturdays or Sundays, and then remove them before the banks reopen on Monday. Whenever possible, don't use your card's magstripe to perform the transaction.

For credit card readers, feel underneath the PIN pad for a slot to insert your card and its EMV chip to be read. When you use your EMV chip, the card is authorized on the device and your personal information is never transmitted.

This forces criminals to attack the inner workings of EMV-enabled readers. While cracking EMV readers is possible, it's much harder than magstripe skimming. If the credit card terminal accepts NFC transactions, consider using Apple Pay, Samsung Pay, or Android Pay.

These services tokenize your credit card information, so your personal information is never exposed.
If a criminal somehow intercepts the information, he'll only get a useless virtual credit card number. Stay AwareIf you don't notice a card skimmer and your card data does get stolen, take heart.

As long as you report the theft to your card issuer (for credit cards) or bank (where you have your account) as soon as possible, you will not be held liable for the lost amount and your money will be returned.

Business customers, on the other hand, don't have the same legal protection and may have a harder time getting their money back. Timely reporting is very important in cases of fraud, so be sure to keep an eye on your debit and credit card transactions. Personal finance apps like Mint.com can help ease the task of sorting through all your transactions.

Also, try to use a credit card whenever possible.

A debit transaction is an immediate cash transfer and requires making an FDIC claim whcih can take weeks to be processed.

Credit card transactions can be halted and reversed at any time, and doing so puts pressure on merchants to better secure their ATMs and point-of-sale terminals. Lastly, pay attention to your phone.

Banks and credit card companies generally have very active fraud detection policies and will immediately reach out to you, usually over phone or SMS, if they notice something suspicious. Responding quickly can mean stopping attacks before they can affect you, so keep your phone handy. Just remember: If something doesn't feel right about an ATM or a credit card reader, just don't use it.

And whenever you can, use the chip instead of the strip on your card. Your bank account will thank you. Fahmida Y. Rashid contributed to this story

WhatsApp is now most widely used end-to-end crypto tool on the planet

$
0
0
samazgor WhatsApp has enabled end-to-end encryption across all versions of its messaging and voice calling software, according to a Tuesday announcement on the company's website. Given that WhatsApp is already in use by over 1 billion people worldwide, as users upgrade to the latest version, it will become the most widely used end-to-end crypto tool."We live in a world where more of our data is digitized than ever before," Jan Koum, a WhatsApp co-founder, wrote in a company blog post on Tuesday. "Every day we see stories about sensitive records being improperly accessed or stolen.

And if nothing is done, more of people's digital information and communication will be vulnerable to attack in the years to come.

Fortunately, end-to-end encryption protects us from these vulnerabilities." As the company explained in a white paper that was released on Monday night, WhatsApp uses the Signal protocol (formerly known as Axolotl), which was created by Moxie Marlinspike’s Open Whisper Systems. (That protocol is also used by Marlinspike’s Signal encrypted messaging and voice app.) In November 2014, WhatsApp announced that it was using the same encryption as Signal in the Android version of the chat app. Over the next two years, the company worked to roll out strong encryption to iOS and other mobile platforms and to expand the data protected to group chats, voice calls, and media attachments. The implementation of this crypto protocol is largely thanks to American tax dollars: since 2013, Open Whisper Systems has received a total of $2.25 million from the Open Technology Fund, an umbrella group whose primary funder is the United States government, through agencies such as the Broadcasting Board of Governors and the Department of State. The move received praise from many privacy advocates and civil libertarians, including Christopher Soghoian of the American Civil Liberties Union. Our elected officials in Congress who authorized the millions in funding that paid for WhatsApp's crypto did us all a favor.

Thank you. — Christopher Soghoian (@csoghoian) April 5, 2016 The WhatsApp paper also points out that the encryption protocol uses perfect forward secrecy, so that "even if encryption keys from a user’s device are ever physically compromised, they cannot be used to go back in time to decrypt previously transmitted messages." Specifically, WhatsApp uses Curve25519, and the app now allows users to verify fingerprints for a given chat session, presumably over a secondary communications channel.

Veriflow Brings 'Formal Verification' to Network Security

$
0
0
Startup Veriflow, newly emerged from stealth mode, aims to help limit security risks by mathematically verifying the integrity of networks. Before NASA launches a spacecraft or Intel puts a new chip into fabrication, an industrial process known as "for...

Android Bug Fixes Roll Out to Nexus Devices

$
0
0
The fix fixes a slew of bugs, including one related to a media framework that caused Stagefright issues to return. Google's monthly Android patch is one you might want to keep an eye on. The fix takes aim at a slew of critical vulnerabilities, including one related to a media framework that caused Stagefright issues to return.

The fix also includes security updates on Bluetooth and Download Manager features, among others. "The most severe of these issues is a Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files," Google says. Google releases monthly security updates for Nexus devices, which get the over-the-air updates immediately.

But the company also posts the patches to its developer site, so partner vendors can patch their own devices.

That process, however, can sometimes be slow to get to devices, if at all. Still, this one is particularly notable. Last month, security firm NorthBit uncovered the Metaphor exploit, which attacked devices running Android and caused the reemergence of the nasty Stagefright flaw. To its credit, Google was quick to respond to the vulnerability and patched the issue.
In addition, it talked of some other issues it discovered, including a particularly nasty flaw that would have given a hacker kernel access to a device and allow the person to do whatever he or she wants.

NoScript and other popular Firefox add-ons open millions to new attack

$
0
0
EnlargeNoScript, Firebug, and other popular Firefox add-on extensions are opening millions of end users to a new type of attack that can surreptitiously execute malicious code and steal sensitive data, a team of researchers reported. The attack is made possible by a lack of isolation in Firefox among various add-ons installed by an end user.

The underlying weakness has been described as an extension reuse vulnerability because it allows an attacker-developed add-on to conceal its malicious behavior by invoking the capabilities of other add-ons.
Instead of directly causing a computer to visit a booby-trapped website or download malicious files, the add-on exploits vulnerabilities in popular third-party add-ons that allow the same nefarious actions to be carried out. Nine of the top 10 most popular Firefox add-ons contain exploitable vulnerabilities.

By piggybacking off the capabilities of trusted third-party add-ons, the malicious add-on faces much better odds of not being detected. "These vulnerabilities allow a seemingly innocuous extension to reuse security-critical functionality provided by other legitimate, benign extensions to stealthily launch confused deputy-style attacks," the researchers wrote in a paper that was presented last week at the Black Hat security conference in Singapore. "Malicious extensions that utilize this technique would be significantly more difficult to detect by current static or dynamic analysis techniques, or extension vetting procedures." Of the top 10 most popular add-ons vetted by Mozilla officials and made available on the Mozilla website, only Adblock Plus was found to contain no flaws that could be exploited by a malicious add-on that relied on reuse vulnerabilities.

Besides NoScript, Video DownloadHelper, Firebug, Greasemonkey, and FlashGot Mass Down all contained bugs that made it possible for the malicious add-on to execute malicious code. Many of those apps, and many others analyzed in the study, also made it possible to steal browser cookies, control or access a computer's file system, or to open webpages to sites of an attacker's choosing. Enlarge Buyukkayhan et al. The researchers noted that attackers must clear several hurdles for their malicious add-on to succeed.

First, someone must go through the trouble of installing the trojanized extension.
Second, the computer that downloads it must have enough vulnerable third-party add-ons installed to achieve the attackers' objective.
Still, the abundance of vulnerable add-ons makes the odds favor attackers, at least in many scenarios. In many cases, a single add-on contains all the functionality an attacker add-on needs to cause a computer to open a malicious website.
In other cases, the attacker add-on could exploit one third-party add-on to download a malicious file and exploit a second third-party add-on to execute it.
In the event that a targeted computer isn't running any third-party add-ons that can be exploited, the attacker-developed add-on can be programmed to provide what's known as a "soft fail" so that the end user has no way of detected an attempted exploit. Here's a diagram showing how the new class of attack works. Enlarge / An extension-reuse attack showing a malicious extension M reusing functionality from two legitimate extensions X and Y to indirectly access the network and filesystem of a targeted computer.

The technique allows the malicious extension to discreetly download a malicious file and execute it. Buyukkayhan et al. "We note that while it is possible to combine multiple extension-reuse vulnerabilities in this way to craft complex attacks, it is often sufficient to use a single vulnerability to successfully launch damaging attacks, making this attack practical even when a very small number of extensions are installed on a system," the researchers wrote. "For example, an attacker can simply redirect a user that visits a certain URL to a phishing website or automatically load a web page containing a drive-by-download exploit." Proof of concept The researchers said they developed an add-on containing about 50 lines of code that passed both Mozilla's automated analysis and its full review process. Ostensibly, ValidateThisWebsite—as the add-on was called—analyzed the HTML code of a given website to determine if it was compliant with current standards.

Behind the scenes, the add-on made a cross-extension call to NoScript that caused Firefox to open a Web address of the researchers' choosing. The vulnerability is the result of a lack of add-on isolation in the Firefox extension architecture.

By design, Firefox allows all JavaScript extensions installed on a system to share the same JavaScript namespace, which is a digital container of specific identifiers, functions, methods, and other programming features used in a particular set of code.

The shared namespace makes it possible for extensions to read from and write to global variables defined by other add-ons, to call or override other global functions, and to modify instantiated objects.

The researchers said that a newer form of Firefox extension built on the alternative JetPack foundation theoretically provides the isolation needed to prevent cross-extension calls.
In practice, however, JetPack extensions often contain enough non-isolated legacy code to make them vulnerable. In an e-mail, Firefox's vice president of product issued the following statement: The way add-ons are implemented in Firefox today allows for the scenario hypothesized and presented at Black Hat Asia.

The method described relies on a popular add-on that is vulnerable to be installed, and then for the add-on that takes advantage of that vulnerability to also be installed. Because risks such as this one exist, we are evolving both our core product and our extensions platform to build in greater security.

The new set of browser extension APIs that make up WebExtensions, which are available in Firefox today, are inherently more secure than traditional add-ons, and are not vulnerable to the particular attack outlined in the presentation at Black Hat Asia.

As part of our electrolysis initiative—our project to introduce multi-process architecture to Firefox later this year—we will start to sandbox Firefox extensions so that they cannot share code. In the meantime, the researchers said Firefox users would benefit from improvements made to the screening process designed to detect malicious add-ons when they're submitted.

To that end, they have developed an application they called CrossFire that automates the process of finding cross-extension vulnerabilities.
In their paper, they proposed that it or a similar app be incorporated into the screening process. "Naturally, we do not intend our work to be interpreted as an attack on the efforts of Firefox's cadre of extension vetters, who have an important and difficult job," the researchers wrote. "However, since the vetting process is the fundamental defense against malicious extensions in the Firefox ecosystem, we believe it is imperative that (i) extension vetters be made aware of the dangers posed by extension-reuse vulnerabilities, and that (ii) tool support be made available to vetters to supplement the manual analyses and testing they perform."
Viewing all 4495 articles
Browse latest View live




Latest Images