5 Top Cybersecurity Attacks Revealed at RSAC2018

YouTube Video of the discussions of the following people:

Alan Paller, Moderator, Research Director and Founder, SANS Institute Ed Skoudis, Faculty Fellow, Penetration Testing

The following image shows the most interesting points brought forward in the video, as this is a presentation at RSAC every year now with SANS’ top instructors or employees that work throughout their company. Dr. Johannes Ulrich is at Internet Storm Center many days(although others keep it going when he is not available).

Top Cyber attacks to look for this year:

  1. Cloud Storage leakage
  2. Big Data Analaytics
  3. Crypto Currency mining on your infrastructure
  4. ICS/SCADA  will get some attention from hackers
  5. IoS will continue to be attacked and used for hacker purposes

These possible attack vectors are not surprises really, but it is good to reinforce where we need to focus.

Cloud storage can be a problem when not configured with security in mind. Have you done an audit with  your data?  Considered if private repositories were marked public? Public repositories with sensitive data? Github, Amazon, Google cloud, Microsoft Azure, Docker Hub and more each have their own pitfalls.

When you collaborate within the cloud is the software written within the cloud written with security in mind?  We know that some chips cannot keep all data within the bounds as we expect without a patch.  This information was found after the software was out in the world for years. New cloud security problems are being investigated now.

Big Data Analytics

Now the criminals are using the data that they have already stolen in new ways…  Maybe they fill out your new credit card with all info about you(as if it was you).  Also could fill out a completed tax form with 90% accuracy.    So it is possible that new methods are being devised where data is being found on you to help create better scams or general criminal enterprises.

Data is not important, criminal hackers want your computer resources to run crypto currencies.

Finally, the ICS/SCADA cyber problem is going to just get going. The problem in SCADA is that people will likely get hurt.  The problem in this space is that the ICS (Industrial Control Systems) space is not as secure as other systems have been due to a lack of focus on security.

Of course the IoT(Internet of Things item is also an important attack area. If you think about it the criminals will come up with new ways of attacking our infrastructure and will try and find any method that is possible. So if you are not focusing on an area, or it has not had a Cyber focus in the past… then it will be found sooner than later.

 

It is true, the hackers are trying to get the low hanging fruit, but we need to circle the wagons, and review everything again and again.

The simple thing to do is to audit your systems with a framework of audit work such as in CISA (Certified Information Systems Auditor).

Lucky we have this CISA certification –

Contact Us

In a Russian Conflict: Cybersecurity another Dimension of Attack

(((4/19 update below)))

In that cybersecurity is another Dimension of attack  (versus Dimensions: Land, Air, Sea, and Space) how would we be affected by this dimension?

In Land one sees their foe most of the time, and if the enemy wants to take your stuff they have to physically take it.  (Or they try and send munitions instead via Artillery with limited range).

In Air one can take troops up and over your land and enemy land forces to drop them and take stuff. Munitions are able to  drop from remote areas, but one has to send missiles and airplanes where radar can see them.

In Sea one can move around with ships or submarines to drop people to take stuff. The munitions are sent via devices as well which are physical.

Space is also a dimension which although in a unique area, is also a physical dimension with physical munitions.

In Cyber how do you know if the enemy is not already in your  systems.  There is no need for enemy soldiers to leave their homes or their barracks, they can attack your infrastructure without moving. Control of your computers can be done automatically and it can look like a third party attacked.  Cyber has an electronic dimension so the fact that it is not as physical “or real” has made understanding this dimension more difficult for some.

So what does this mean? It means if you understand how to navigate a command line or can read custom code you can understand this phenomenon (Cyberwar) in ways a non speaker is not capable:

Maybe this analogy will help:

You know in Physics there is Height, width, and length?

What about the fourth dimension(and not time) :

It is hard for us 3D people to think 4D.  So that seems to be the same for people who do not live in Cyber, they just DO NOT get the details!!!   It does not matter how much I try to explain the details, 4D is too much of a leap for some.

 

So I think Cyber is just too difficult or maybe a better word is ‘strange‘ of a concept for many people.

 

****UPDATED 4/19 12pm Central******

An interesting story about Russia attacking US and UK routers…

https://mashable.com/2018/04/17/russian-router-warning-us-uk/#slGg.DbuWsqF

Remember my post on 3/13/18?  http://oversitesentry.com/replace-your-wi-fi-router-if-2yr-old/

some good quotes from the mashable article:

‘These “cyber actors” are identifying vulnerable devices to break into, where they can extract device configurations, harvest login details, and control the traffic that goes through the router.’

 

A quick review from my post  — you can’t patch older than 2 years routers, as they are not being patched by manufacturers.

********************************

The compliance departments are reverse engineering the effects of a breach and Cyber understanding.   It is too difficult to decipher code, so we say don’t perform CC processing without encryption.  We don’t say what the encryption is and how it should be sent. There are many more pitfalls for a manager without technical knowledge.

If Hackers can steal data of your prized customers with a thermometer, then what else can they do?

So what to do? Create Cyber audits to review the IT world in your entity. Otherwise you will see headlines that you will not like.

Contact Us to discuss

 

 

The Real Problem With Facebook Privacy Issues

We can easily read the latest news on Facebook’s transgression of not protecting privacy of 50 million users on the CNN website ,  on 2015 this ‘hack’ supposedly happened and Facebook ‘let’ it happen.

I guess the media and the rest of the world was not paying attention, as in 2009 Dark Reading story: “Private Facebook Info exposed By Simple Hack”

Apparently a blog called FBHive was able to view supposedly private information .

How about this:

In 2008 a Sophos video about how to view everyone’s birthdate on Facebook, even if it claims to be “secure”.

So all one needs to do is hack Facebook. So what do I mean by that? Well, all one has to do is to play around with the URL settings of Facebook.

I.e. https://www.facebook.com/<FirstInitialLastname> for  main account lookup, but then you need security username and password.

If you use https://www.facebook.com/photo.php?fbid=

Then use a set of numbers, which you can modify to look at other people’s  information. What all these hackers found out is that Facebook has some settings that are public no matter what Facebook Privacy settings are. (we are not going to ‘hack’ Facebook on this post) .

So, what to do? The only thing one can do is to have a sufficient red team and make many tests from outside Facebook. It is obvious that Facebook does not have the capability to review its own security flaws.

So if one is a programmer then one can create quick programs to cycle through all numbers and place them in your own database, thus creating your own database of all the Facebook userbase.

There are more problems, one programmer was able to delete other user’s photo albums. The specific details are at zerohacks.com  “Deleting any photo albums – How I hacked Your Facebook Photos”

Needless to say the enterprising programmer was able to delete another photo album and received $12.5k from Facebook’s bug bounty program. (He released to Facebook first not to the criminal hackers).

 

 

A serious Cybersecurity Audit must be performed by known attackers, call the ethical hackers or certified Information Systems Auditors (CISA).  The price for this audit is cheap compared to the damage being done to Facebook today (many billion$ in stock price and reputation). The estimates are that Facebook has over 2 Billion monthly active users (Zephoria Digital marketing).

Even as some younger users disconnect due to shifting moods, there are still quite a few users on Facebook. I suspect this is only a beginning of the blowback to the Facebook reputation. As this latest election related snafu has created quite a big spotlight.

The point of this post is to be careful what you post, as if you post, it is public no matter the safeguards. Hackers are always out there probing for weaknesses, and it is better to find them yourself rather than have the criminals tell you after a defining Cybersecurity event for your company.  TonyZ says: “Do not post anything that you are embarrassed for the world to know!”

Contact Us to discuss your Cybersecurity audit program.

 

Replace your Wi-Fi Router if 2yr+ old

Insignary had some research and created a report that looked into the binary code of most of the routers on the market. Technewsworld has  a story…

And Business Insider has a story

The short story is that many router companies do not update their devices which would mean customers would have to upgrade firmware, which is also doubtful, but at least it is possible to update and secure your router.  Many people do not update because it is difficult or time consuming, and the router upgrades require a technical skill missing in most home users anyway. It seems that all of the vulnerabilities of the routers:

WPA2(KRACK) – Key reinstallation attack

ffmpeg – DoS attack

openssl – DoS attack, and remote code exec

Samba – remote code exec

OSS components have weaknesses which are also open source.

New components that are secure have been created but have not been created to coexist with the Wi-Fi devices (within their firmware). If they would have been created you would have to download the firmware and then you would have to update this firmware. So the process of updating firmware in Wi-Fi routers differs with each manufacturer, I would go to your manufacturer website and try to find out if a new firmware has been released.

But as a safety precaution (with security in mind) it is probably best just to buy a new Wi-Fi  router (which has  software that does not have these old vulnerabilities.

So it depends on your level of risk and what you are protecting. Myself I always like to update my computers and wifi devices every year or every two years anyway.  If you are in the habit of doing this as a standard way of doing business you will not be affected by these vulnerabilities.

 

Contact Us to discuss your risk exposure and decide what upgrade standards you might need.

Attack Life Cycle Changed By Cloud

Great video from BSides Columbus Ohio 2018 :

“Zero to Owned in 1 Hour”

That is an interesting review of how the new potential weaknesses are in the Cloud itself.

Human Access to the cloud can be a weak point.

AWS (Amazon Web Services)

Does Multi-factor Authentication work with multiple people running things?

Service Provider (cloud company) – has a main login, here is where the hacker can get the keys to the kingdom.  what if the hacker can figure out to get the main account login somehow? we are so busy locking down all the desktops and more, it is the easy items that we seem to fall down on.

The comparison with the old life cycle is interesting, as we were so focused on denying system access last year (or pre-cloud).

Today  if the main account somehow is taken over the hacker does not need to escalate privileges or keep access in the network since the main control account can do all of that and more.

So due to the big beacon of if you capture this item then you have keys to kingdom, what can we do to prevent this?

You have to review how the system administration and ownership of the cloud account is handled.

  1. How many people are managing the main account
  2. How is the password/authentication performed?
  3. Who is reviewing the security of this important account?

I.e. who should be at fault if there is a security problem? The Cloud company (or service provider)  or our own IT people? At first blush, you would think it depends on the problem, but the interesting thing about this is that some cloud companies want to push that responsibility to the client.   Check this post by CSOonline.com :

12 top cloud Security threats  “Treacherous 12”

  1. Data Breaches
  2. Insufficient Identity, credential and access management
  3. Insecure interfaces and application programming interfaces (APIs)
  4. System vulnerabilities
  5. Account hijacking
  6. Malicious Insiders
  7. Advanced Persistent Threats (APTs)
  8. Data loss
  9. Insufficient Due Diligence
  10. Abuse and nefarious use of cloud services
  11. Denial of Service (DoS)
  12. Shared Technology vulnerabilities

 

This is a nice list, so which threats could be classified “service provider”, and which would be more the client fault?

All of them could be both or either , except for System vulnerabilities which  is just Service provider. Denial of Service ought to be service provider as well.

The problem is that the client can affect almost all of them as the client drives the applications and thus the technological trail. Or the client really controls most of the issue like account hijacking (main account)

As usual someone has to review and check (technical Audit) to make sure that the technology is doing what it is supposed to be doing “securely”.

Contact to discuss