Thursday, July 23, 2020

If Vendor insecurity seems to be the new norm then God help all of us

Attackers compromise Twilio's SDK due to misconfigured  AWS S3 buckets left the SDK's path publicly readable and writable for roughly five years. Twilio powers communications for over 40,000 businesses and helps developers add voice, video, messaging, and authentication capabilities. 

The company's customer list includes Twitter, Netflix, Uber, Shopify, Morgan Stanley, Airbnb, Wix, Spotify, Yelp, Hulu, Intuit, ING, eBay, and countless others.



Interesting Observations on Hate groups:

 1 - Education plays a MINOR role in determining who does or does not join a hate group. 
2 - The more religious groups on the East Coast, the more hate groups. 
3 - Poverty is a crucial driver. 



Tuesday, June 2, 2020

Ransom-warez - No hacking skills needed , just visit auction site and bid for (interesting) stolen data.

With many companies losing our personal information , the only solution for us is to be vigilant and follow simple policies like "Think before you Click/Pick (phone)" and keep an eye on credit/bank reports.

https://www.bleepingcomputer.com/news/security/revil-ransomware-creates-ebay-like-auction-site-for-stolen-data/

Friday, May 29, 2020

Important Ransomware Lessons:

1 - "Prevention is better than cure"
2 - Backups help with recovery but, won't prevent a data breach. 

We now have NetWalker - “ransomware-as-a-service” (RaaS) - Threatens to publish victims’ data on the internet if ransoms are not paid.  Attackers send poisoned emails are sent that appear related to the Coronavirus crisis. It  can also masqueraded as the legitimate password management app Sticky Password.

https://www.tripwire.com/state-of-security/featured/netwalker-ransomware-what-need-know/

Wednesday, May 27, 2020

ATM Skimmers - This one has three bad news

1 - ATM Skimmers (nothing new)
2 - ATM vendor wanted to install it
3 - The vendor enjoyed legal protection from a top anti-corruption official in the Mexican attorney general’s office.

https://krebsonsecurity.com/2020/05/report-atm-skimmer-gang-had-protection-from-mexican-attorney-generals-office/

Tuesday, May 26, 2020

Few ransomware stats to help manage your business risk

: 1 - Criminals succeeded in encrypting the data in 73% of these attacks.
2 - 59% of attacks involved data in the public cloud.
3- One in five organizations has a major hole in their cyber security insurance.
4 - The average cost to rectify the impacts is US$732,520 for those who do not pay the ransom, rising to US$1,448,458 for those who pay.

Good news - 56% got data back via backups than by paying the ransom .


https://news.sophos.com/en-us/2020/05/12/the-state-of-ransomware-2020/?cmp=26105

Tuesday, April 21, 2020

Starbleed Vulnerability - A new security bug that impacts Xilinx FPGA chipsets.- Why is it important? - These chips are in many safety-critical applications today, from cloud data centers and mobile phone base stations to encrypted USB-sticks and industrial control systems

. This vulnerability allows an attacker to crack the bitstream encryption and tamper with the operations stored inside the bitstream, allowing the attacker to load their own malicious code on vulnerable devices. Intellectual properties included in the bitstream can be stolen. It is also possible to insert hardware Trojans into the FPGA by manipulating the bitstream.


https://www.zdnet.com/article/starbleed-bug-impacts-fpga-chips-used-in-data-centers-iot-devices-industrial-equipment/

Wednesday, April 15, 2020

Manufacturer of AirSense 10, the world’s most widely used CPAP says the AirSense 10 would require “significant rework to function as a ventilator,” while (surprise!) many ventilator functions were already built into the device firmware.

 Security researcher Trammel Hudson has released a patch (dubbed Airbreak) that he says unlocks the hidden capabilities buried deep inside the AirSense 10.


https://arstechnica.com/information-technology/2020/04/firmware-jailbreak-lets-low-cost-medical-devices-act-like-ventilators/

Wednesday, March 25, 2020

FREE COVID-19 Threatlist from DOMAINTOOLS

- We know bad guys are creating fake COVID-19 related domains to lure us. To battle this , DomainTools is providing a free, curated list (updated everyday) of high-risk COVID-19-related domains to support the community during the Coronavirus crisis.

https://www.domaintools.com/resources/blog/free-covid-19-threat-list-domain-risk-assessments-for-coronavirus-threats

Tuesday, March 24, 2020

Zero Trust Security Model is the new rage - How much do we know about it. Here is a timely doc from Microsoft that can help

(US Residents) Beware of these COVID-19 relates emails:


1. Emails purporting to contain helpful information from the Centers for Disease Control and Prevention (CDC)
2. Medical sources, and phishing emails that ask to provide their personal information in order to receive an economic stimulus check.
(3. Free pass to entertainment services like Netflix)

https://www.scmagazine.com/home/security-news/cybercrime/fbi-warns-of-covid-19-phishing-scams-promising-stimulus-checks-vaccines/

Security vendors are in the business of selling security they don't have to care about securing their own environment (Remember RSA, Symantec)

- British security outfit Keepnet Labs exposed a massive database (without any password protection) on the internet, containing more than five billion records.

https://www.grahamcluley.com/security-firm-five-billion-records-exposed-unsecured-database/

In case you missed it due to everything happening around COVID-19 - Microsoft has issued a new security advisory warning billions of Windows users of two new critical, unpatched zero-day vulnerabilities

This could let hackers remotely take complete control over targeted computers.  No Patch Yet Available; Apply Workaround ( Disable the Preview Pane and Details Pane in Windows Explorer)

https://thehackernews.com/2020/03/windows-adobe-font-vulnerability.html

Monday, March 9, 2020

FREE Cybersecurity Law Casebook.

Thanks to Bobby Chesney,Professor at University of Texas at Austin for publishing this FREE Cybersecurity Law Casebook.
Who should use it: The book is designed to be valuable not just to beginners but also those who may have experience in one area but would like to see how their corner of the puzzle relates to the larger whole.
About this book: This is an interdisciplinary “eCasebook,” designed from the ground up to reflect the intertwined nature of the legal and policy questions associated with cybersecurity.

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3547103

Thursday, February 20, 2020

What happens when a (dumb) vendor cannot separate test and production environment - Nothing much , just a bunch of freaked-out customers

Many owners of Samsung smartphones have received an odd notification but the message  simply disappeared when they clicked on it. Samsung explains "This notification was confirmed as a message sent unintentionally during internal testing and there is no effect on your device"

https://www.grahamcluley.com/samsung-find-my-mobile-notification/

Friday, February 7, 2020

Free guide for SYSMON ,an excellent security tool from Microsoft

Remember "Prevention is Ideal but Detection is a MUST."

Sysmon is designed to extend the current logging capabilities in Windows to aid in understanding and detecting attackers by behavior.

Download Link:
https://lnkd.in/gupkbqK

hxxps://github.com/trustedsec/SysmonCommunityGuide/releases

Wednesday, February 5, 2020

WhatsApp users, here's something to remember - A vulnerability (in desktop app) could allow the spread of malware

. It could also  impact WhatsApp for iPhone, if we don’t update our desktop and mobile apps, and if we don’t use newer versions of the Chrome browser.

https://threatpost.com/whatsapp-bug-malicious-code-injection-rce/152578/

This could happen to any organization - Ransomware => Blackmail => Data Breach

 The gang places the company name on a website. If a payment is not forthcoming immediately it then places a small amount of the stolen data on the site as proof. If payment is received the name is removed. The important question is "how can we be sure?" after all what's stopping them from blackmailing again.

https://www.scmagazine.com/home/security-news/ransomware/maze-ransomware-publicly-shaming-victims-into-paying/

Monday, February 3, 2020

How to drive cars with autopilot crazy? - Project fake images from drones on the road or on surrounding billboards, as rea

l.  Researchers  were able to create “phantom” images; use a projector to transmit them within the autopilots’ range of detection; and trick systems into believing that they are legitimate.

https://threatpost.com/tesla-autopilot-duped-by-phantom-images/152491/

Thursday, January 30, 2020

We might not be up-to-date on current events but, cybercriminals are and they are quick to capitalize on them. The latest being "CoronaVirus"



One important behaviour pattern cybercriminals depend on is that if, an email sounds scary / urgent then we might click on the link or attachment. The new botnet campaign targets geographic regions that may be more impacted by the outbreak given their locations in Asia to spread Emotet trojan.IBM X-Force warned that Emotet operators will probably expand their targeting beyond Japan soon.

https://threatpost.com/coronavirus-propagate-emotet/152404/

Trickbot trojan gets dangerous as it can now run in stealth mode

. It uses Wsreset.exe , which when executing a command it will not display a UAC prompt and users will have no idea that a program has been executed.


https://www.bleepingcomputer.com/news/security/trickbot-uses-a-new-windows-10-uac-bypass-to-launch-quietly/

Monday, January 27, 2020

Finally, UK has an IoT Law



The Law Mandates:
  1. IoT device passwords must be unique. 
  2. Manufacturers must also provide a public point of contact so that anyone can report a flaw. 
  3. Manufacturers must also explicitly state the minimum length of time for which devices will receive security updates.


https://threatpost.com/mandatory-iot-security-uk-proposal/152217/

Friday, January 24, 2020

Interesting Attack Technique - Ransomware can now infect any Active directory connected windows system if the user profile is setup to execute a login script when a user logs in.

The attacker weaponized AD by putting not Trickbot, but Ryuk, into the AD [roaming] login script. So anybody who logged into that AD server was immediately infected.
So as soon as an engineer, for example, logged in from his or her workstation, the payload would drop, execute, and lock the user out of the machine.

https://www.darkreading.com/threat-intelligence/ryuk-ransomware-hit-multiple-oil-and-gas-facilities-ics-security-expert-says-/d/d-id/1336865

Thursday, January 23, 2020

I am dumbstruck - Microsoft exposed (in clear-text) 14 years worth of data with 250 million CSS records

. This means records from 2005 to December 2019 were leaked online and left without any security authentication allowing the public to access it with just a web browser.


https://www.hackread.com/250-million-microsoft-customer-support-records-leaked-plain-text/

Extortionists find new victims - "Plastic surgery patients"

Hackers not only know their personal information, but also might have photographs of their “before” and “after”. One can easily imagine that things become even more uncomfortable if it’s other parts of your body that you’ve had “tweaked”.

The Center for Facial Recognition says that within three weeks of being threatened by the extortionists, up to 20 patients have been contacted by the criminals with individual demands for payment.

https://www.grahamcluley.com/plastic-surgery-patients-ransomware/

Wednesday, January 15, 2020

Tuesday, January 14, 2020

Microsoft starts 2020 patch Tuesday with a BANG - Brian Krebs calls one of the vulnerability (fixed) as "extraordinarily serious security vulnerability". So, if we don't patch then, "Shame on Us".



It could have wide-ranging security implications for a number of important Windows
functions, including authentication on Windows desktops and servers, the protection of sensitive data handled by Microsoft’s Internet Explorer/Edge browsers, as well as a number of third-party applications and tools


Those sources say Microsoft has quietly shipped a patch for the bug to branches of the U.S. military and to other high-value customers/targets that manage key Internet infrastructure, and that those organizations have been asked to sign agreements preventing them from disclosing details of the flaw prior to Jan. 14, the first Patch Tuesday of 2020.


https://krebsonsecurity.com/2020/01/cryptic-rumblings-ahead-of-first-2020-patch-tuesday/

Hidden Camera Risk (Airbnb or anywhere other than home), What can we do aboutit ?. This article has some recommendation (Tools like Angry IP Scanner, Nmap, and Network Scanner)