Purple Team https://purpleteam.in Tue, 03 Mar 2020 07:45:32 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.5 https://purpleteam.in/wp-content/uploads/2019/09/cropped-150_PURPLE-32x32.png Purple Team https://purpleteam.in 32 32 10th February, 2020 – Purple Post https://purpleteam.in/campaigns/10-febpuplepost/ Mon, 10 Feb 2020 05:57:30 +0000 https://purpleteam.in/?post_type=campaigns&p=1575 10th February, 2020 – Purple Post Read More »

]]>

In how many ways do I fool thee!

I thought that it might be instructive to see how a poor man (poorer still now) got relieved of his cash. I have another story where I almost fell for a scam but woke up in the nick of time.

The story: the man complained about poor service from Fastag on an online forum. He received a response from ‘bank customer support’. They asked him to pay a small amount to activate his Fastag again. Very trustingly, he also gave them the OTP that was generated. And hey presto, he was ₹ 50k poorer and, hopefully, wiser.

In my case, it probably was not really an attack but could easily have been one. I purchased something from Ali Express and the item was overdue. I raised a dispute and the seller refunded the amount. Two days later, I received the item.  The seller promptly contacted me on Ali Express messaging and sent me a payment link asking me to return the money he paid to me as the item had now been delivered. I told him that yes indeed I had received the product and would be happy to return his money, if he made a claim via the Ali Express app or platform. He went quite after that.

What I want you to take away is not that the person in the first story “is so gullible” or I, in the second, am smart to have figured it out in time.  Quite the contrary. The attack in both cases presents a very convincing story. What can be more natural than an agile customer service team responding to a complaint on social media or a hard working merchant requesting a presumably honest customer to return his money?  In most cases it would be natural for fall for the scam and, indeed, it would be considered rude to be skeptical of the kind offer to help.

No con exists which is not plausible.  Earlier, there used to be a truism that said “You cannot con an honest man”, meaning that cons always had a shady or greedy angle to them. Typically the set-up is that you got something for very little or nothing. The venerable Nigerian Prince Scam is one such. (The fact that it is still being played out shows you how powerful greed is).  The other truism “If it sounds too good to be true, it probably is” was extremely helpful in preventing you falling for this kind of scams. 

However, the shift is that today’s cons play on helping you out. And it is extremely difficult to keep your guard up for that.  You are naturally frustrated and are looking for help.  And you are now so used to instant service that your resistance to validating the person offering to help is very low when that help is forthcoming. It is a fundamental human trait to be nice to someone who is nice to you.  And that is the play here.

Yes, I could repeat the platitudes about never sharing an OTP or clicking on links from unknown sources. But the problem is that the “rational man” of economics is not and common sense, is not.  One can only hope that one does not pay too high a price when one learns that lesson the hard way.
Eternal vigilance (and healthy scepticism) is not only the price of freedom but also of convenience!

– Sridhar Parthasarathy

Apologies

Purple Post has had a hiatus as it is undergoing some change in content, delivery and style. So you might receive a few versions of this week’s newsletter even though every effort is being made to reduce such irritants to zero. Please bear with us in case you are hit more than once with this week’s newsletter. And, apologies for the absence of the newsletter these past weeks – combination of medical emergencies & changes in newsletter back end are responsible.Now, on to the newsletter itself …


Last Week’s Breaches

120 Million Indian Medical Images leaked

Essentially due to poor understanding of good security practices, 1 Million users & 120 million medical images of Indians are exposed. These are even freely downloadable.

₹ 20 crores defrauded from Fastag bank

A well oiled gang siphoned off ₹ 20 crore ($ 3 Million) from Axis Bank by exploiting an undisclosed loophole in their Fastag operations. It appears to be a flaw in their refunds process.


Cyber Security News This Week

Update Azure now! Has serious flaws

A bad actor can take control of your Azure server thru the Azure App Service.

2019 – Top Ten Vulnerabilities!  Microsoft still the king!

More Microsoft vulnerabilities are targeted than, say, Adobe. This is perhaps a function of Microsoft’s popularity than any inherent strength of Adobe.

Why SCA is necessary – the risks of using open source

Open Source is being used everywhere knowingly or unknowingly. A good Software Composition Analysis tool is necessary to understand, and mitigate, risks.

Smart devices could be dumb

FBI has warned about “drive-by hacking”. Test case: Phillips Hue can be taken over by a malicious actor. And when you reconnect the ‘faulty’ bulb, malware is flooded to your network.

BitBucket used to deliver malware

Bad actors are using BitBucket to speedily disburse malware like Predator, Azorult, Evasive Monero Miner etc.

9 year old Sudo flaw. Update now!

Anyone can escalate privilege in  Linuxversions 1.7.1 through 1.8.25p1 as long as pwfeedback is enabled. If this is true, anyone can get sudo access. CVE-2019-18634 tracks the a stack-based buffer-overflow bug.  The flaw is more than 9 years old.

Malware steals your password by making you retype it!

It is quite smart, this malware. After a phishing attack that downloads the Trojan on your machine, this malware disables auto fill on all browsers.  This forces you to type the passwords which the Trojan then steals.  All the gory technical details in the link above.

WhatsApp is really convenient – even malware is 1 click!

iPhone users need to worry about this vulnerability. Bad actors can inject harmful code or links into “seemingly innocuous exchanges,” causing unsuspecting users to click on malicious links that appear to them like messages from a friend.

Do You Fly? Know that cyber security of 97% of Airports really sucks!

If you don’t use Schiphol,  Helsinki-Vantaa Airport or Dublin Airport  then your airport software is not secure.  ImmuniWeb has all the details above.

]]>
9th December, 2019 – Purple Post https://purpleteam.in/campaigns/purple-post-dec-9/ Mon, 09 Dec 2019 01:43:06 +0000 https://purpleteam.in/?post_type=campaigns&p=1546 9th December, 2019 – Purple Post Read More »

]]>

This week’s insight from Purple Team on

Why Aadhar is Flawed

Now that I have got your attention, I really want to talk about Bio-metric Authentication and its, often unconsidered, problems.  From Aadhar to airports, from bank accounts to office entrances, from phones to safes, bio-metric information like fingerprints and, more rarely, iris prints have become the authentication mechanism of choice.  And it is quite understandable why: It is very convenient. It is correct. It is fast. It is quite difficult to lose a finger or an eye. And, barring Mission Impossible like scenarios, it makes sure that it is indubitably you, the indented user.  


The Problems

There are two main problems with bio-metric authentication: legal & technical.
Consider: when an organization uses bio-metric information, it collects uniquely identifiable information about the person (that is, in fact, the point).  However, the privacy implications of this information are rarely considered.   Since this is not user information and it is authentication information, it is not accorded the ‘sanctity’ of a Personally Identifiable Information (PII) and therefore not safeguarded as well. A breach of this information would (and should) attract the same penalties as any privacy related data breach.
The technical consideration is more important: There is no way to change bio-metric information!  If the various organizations which store the information are not as careful as it should be with this information or if they get hacked, it would enable a bad actor to impersonate as the user or deny them access to services.  There are any number of other scenarios, all bad, that you can imagine as well I can, I am sure. When your password gets leaked, you can go in and change the password.   If you lose your multi-factor authentication device, you can buy another one.  What do you do when your fingerprints are leaked?!
(In case those issues do not bother you, consider the accuracy fingerprint data that Aadhar maintains – estimates on false positives vary between 3% to 5%.  While that might look accurate enough, consider the implication: India’s population today is 1,366,417,754; forget about 5%, an error rate of even of 0.5% means that 7 million people can be confused for each other!)


The Solutions

There are various solutions currently being attempted to solve the problem. However,  none afford the same comfort & speed as the current methods while adequately addressing the problem.  At least as yet.
Technically, the solutions tend to be in one of two categories: (a) a more fool proof authentication method like Behavioural Biometrics based authentication; or (b) substituting biometrics with mutable biometrics. Neither approach is complete and I am sorry to say, neither actually solves the problem.  We will perhaps have to wait for another Purple Post to understand the eventual solution when it materializes. 
The current state of art reminds me of Douglas Adam’s Ident-i-eeze in Mostly Harmless!  To refresh your memory, this is what he says “Hence the Ident-i-Eeze. This encoded every single piece of information about you, your body and your life into one all-purpose machine-readable card that you could then carry around in your wallet, and therefore represented technology’s greatest triumph to date over both itself and plain common sense.
What a prescient take!

– Sridhar Parthasarathy, CEO, Purple Team (www.purpleteam.in)


Learning News this Week

All The Breaches of 2019

ZDNet has, very conveniently,  collected the information and links on all the major hacks, cyber-attacks and breaches so far in 2019. It makes for very scary reading particularly when you realize that this is just a selection of the newsworthy incidents of the year.


Learning

Apart from the variety of in the incidents, the key learning from my perspective is that organizational cyber-security needs to be pro-active – be it patching your systems on schedule and as per your risk profile or ensuring that your IDS/IPS are up to scratch. From what I can see, there is no real pattern regarding the breaches. Perhaps there is a slight increase in ransomware attacks & insider threats. However, these are seasonal and I would not draw any lasting strategies based on it.

Learning

I am going to stay with the breaches of 2019 and see what lessons we can draw from that repot. 
The other learning is a bit inferential, in my opinion: get cyber insurance, without fail. It is a no brainer.
Consider: 

  • It is a certainty that you will be breached. It is better to be prepared.
  • 50% of organizations do not think they are ready to handle a breach.  Even if you are ready, your suppliers may not be. 
  • The average total cost of a breach, has risen 12% to $3.92 million when you take into account notification costs, expenses associated with investigation, damage control, and repairs, as well as regulatory fines and lawsuits. 
  • And your stock price drops by 7% if you notify a breach. 

At least cover the financial impact so that you can handle the reputational impact.


Interesting News

FBI: Echo/ Google Home Advisory

FBI has some very specific advise about using consumer IoT devices. Please read the article if you use any of these devices.  TL;DR: change the default passwords. Watch out what permissions that the attendant mobile app.

Android: Bouncer App

In the matter of application permissions on Android, I discovered this app: Bouncer. It revokes permissions from apps after you are done using them. That way you do not give up any functionality while ensuring that the apps do not snoop on you. Too much. 

CWE Top 25 Most Dangerous Software Bugs

Mitre has released the Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Errors (CWE Top 25).  The big news is that SQL Injection has slipped to #6. 

Disney+ & Nord VPN

Disney+ is available only in a few geographies and they have ensured that they block VPNs. However, Nord VPN users have been able to access Disney+ using something called “residential proxies”. The article provides a theory how. I personally think they just purchased a block of residential proxy addresses from a willing service provider.

Android Woes

Android had a fairly rotten week last week – 4 major vulnerabilities reported. Google themselves have categorized them “Critical”.  Ensure that you apply the Dec 1 security update, without fail.

]]>
25th November, 2019 – Purple Post https://purpleteam.in/campaigns/purple-post-nov-25/ Mon, 25 Nov 2019 11:17:20 +0000 https://purpleteam.in/?post_type=campaigns&p=1549 25th November, 2019 – Purple Post Read More »

]]>

This week’s insight from Purple Team

How Business Email Compromise works

Last week, we had talked at length about how to identify a phishing attempt.  This week, let us look at how a specific variety of phishing, Business Email Compromise (BEC) targets you.  This is also called Whaling, CEO Fraud or Wire-Transfer Fraud.
Lest you underestimate it, please understand that we are talking about an attack that caused $ 26 Billionin losses last year!  This type of attack is difficult to detect particularly because, like Jeeves, they work on ‘the psychology of the individual’.  This linked article gives a sample of such a scam.
Let us see how the scam works:


BEC Tactics

Barracuda has published a detailed reporton the various means perpetrators employ to get you to click that link. Key tactics:

  • Timing of the Attack
    91% of BEC attacks originate during a work day to convince you that the email is indeed from the presumptive originator. They are smart enough to avoid popular holidays; this trips them up sometimes in cultures with which they are not conversant. Conversely, they also increase the frequency during busy holidays like Thanksgiving or Deepavali betting that you would not pay as close attention.
  • Convincing Impersonation
    Most BEC attacks are very convincing. They target, on average, only 6 people in an organization. This also enables them to monitor the activities of the target better.  While the ‘from’ address looks convincing enough, the ‘reply to’ address is a giveaway. And the mail provider of choice is gmail.
  • Urgency
    The messages are imperative in tone & convey urgency very well. About half the BEC mails have “Request” or “Urgent”.  A significant portion have “Follow-up” to imply that it is an ongoing conversation.  Most first messages ask for help or check your availability. Once that is established, the rest follows. Again, remember, BEC mails do not have links typically; they get you to do the work for them!  For example, you could get a message from your CEO saying: 
    “Have you got a minute? I need you to complete a task for me discreetly.
    p.s. I am in a meeting now and can’t talk so just reply.”
    CEO, Acme Corp, <acme url> 
    Sent from wireless”

There are variations in the ultimate aim of the BEC – it could target HR to change payroll account or dues, or it could impersonate a vendor or supplier with an appropriate story. The thing to remember is that it is extremely believable.


What should you do?

At a transaction level, you need to validate the transaction off-band via , for example, a direct phone call.  As a process, you should essure that anyone who does validate is never penalized or chastised for it, ever. 
At a technical level, you can implement DMARC to authenticate your emails.
Whatever you choose, please be wary – ’tis the season for scams too!

– Sridhar Parthasarathy, CEO, Purple Team (www.purpleteam.in)


Learning News this Week

The Language of Cybercrime

Since phishing in general & BEC in particular so rooted in the psychology of the individual, it is very illuminating to look into how a scammer works.  The link above has some snippets  of an actual romance scam. Please read it; it is worth your time.

Learning

Two aspects stood out for me – (1) how easy it is to script an interaction to scam some one and, (2) the extent to which a scammer can push a victim. 
We each have this image of a scammer being computer nerd (disheveled may be; but a nerd!). Clearly that is not the case. Set scripts are available and all they need is a bit of seed capital. 
What we need to understand is that it is not about how smart we are; a successful scam depends  on how human you are. 

How the hell did that happen?

The article linked above explains how ransomware bypasses security checks, even in organizations that seem to have implemented good security practices.  We saw how psychology is at the core of BEC.  

Learning

The article talks about a few techniques like “Code Signing” or “Privilege Escalation”, etc.  These are but the methods how a ransomware hijacks your systems and data. The core problem in ransomware attacks is also rooted in psychology. 
The key  attack vectors  for ransomware are email links & malicious sites.  All the techniques listed in the article are useless if nobody clicks those links. And getting you to click on those links is an exercise in applied psychology.
In my opinion, investment in employee education pays extremely high dividends in the security arena.


Interesting News

1.2 Billion People Exposed

Data sleuth Bob Diachenko located an unsecured Elastisearch server with 1.2 Billion records leftover from two data aggregation companies – People Data Labs & OxyData.io.

Top 5 CyberSecurity Project that can save you

Small and medium enterprises can leverage these open-source projects and gain a head start to start their security initiatives for safeguarding their businesses. Another advantage of open-source projects is that companies can customise it based on their requirements and guard their information.

Are you 1-10-60 Compliant?

How long do you need to containg a breach in your organization. The recommendation is: 1 minute to detect, 10 minutes to triage, and 60 minutes to contain. The average company takes 162 hours to detect, triage, and contain a breach.
 

Ginp Android Banking Trojan

An Android malware, called Ginp, masquerades as other legitimate android apps like Adobe Flash Player. Once downloaded, it seeks  & gets permissions. That provides the springboard for further breaches. The current version targets your banking information.

How to avoid shopping scams this season

There’s nothing quite like a major online sale to have us reaching for the credit cards in the hopes of nabbing a bargain (or ten), but with Black Friday and Cyber Monday fast approaching, the need for increased diligence around our online safety is at an all-time high. 

Phoenix Key Logger Avoids detection

The Phoenix Key Logger (it has now morphed into an info-stealer) has gained anti-AV & Anti-VM capabilities. It now actively avoids 80 different security products.

]]>
18th November, 2019 – Purple Post https://purpleteam.in/campaigns/purple-post-nov-18/ Mon, 18 Nov 2019 11:41:30 +0000 https://purpleteam.in/?post_type=campaigns&p=1547 18th November, 2019 – Purple Post Read More »

]]>

This week’s insight from Purple Team

Let us talk about this week’s cybersecurity topic:

How to Detect a Phishing Attempt

We have talked at length about the dangers of phishing. 
Most mail service providers weed out the obvious ones. So what survives to your inbox are the plausible, and therefore pernicious, ones.   Let us learn this week how to identify a possible phishing attempt on you. 


The External Markers

  • The old bromide about about something being “too good to be true” is all too true  – if it looks too good, or too urgent, or too important, do not click it. Think about it. 
    And do not forget the emotional attacks  either – scammers can try to play to your political or religious sentiments to get you to click that link or attachment!  Postpone opening that link; most legitimate transactions will give you sufficient time to respond.  Please remember, the scammer can pretend to be your boss too!
  • No reputable company sends an email from a ‘free’ account. 
    So, if you get an official looking mail from say, a @gmail.com account, you should be suspicious of it. Please be aware – the mail may look very official and proper, with the correct logo, subject etc.  Looks do not matter. What you are looking for is if the portion after the ‘@’ looks like the company’s address.
  • And look very carefully at the domain’s spelling. Do a web search of the company and see how their domain is spelt. It is very easy to overlook a domain spelled ‘citi-bank.com’ or ‘citibank.io’  and assume it is from citibank. Or the legendary ethical hack that spelt the domain gimletrnedia (with a r-n-e-d-i-a instead of m-e-d-i-a) and fooled even the company’s CEO & President into clicking the phishing link.
  • Look very suspiciously at any attachment or link on emails.
    Never open an attachment that does not look like it is from a legitimate source. Or if it is too generically named. Or if you think it is odd to receive that attachment or link from that person in the current context. Check with the sender using another channel, like phone, and then open it  if you are fully satisfied about its legitimacy.
  • Links can easily be disguised as buttons.
    If you hover over the button or right click on it, it will display the address to which it is linked. Check if that address looks legitimate. (On a mobile, long press the link.) Only then click the link.

If you follow these guidelines, you would be able to filter out most phishing mails. We can can examine how to inspect the internals of an email that passes these tests in a subsequent newsletter.
It would pay you well to remember these tips when you,as an organization, send out emails as well.  Otherwise, you risk getting your mails classified as phishing mails, like this company’s email!  They could not have created a more suspicious looking email even if they deliberately tried to!

– Sridhar Parthasarathy, CEO, Purple Team (www.purpleteam.in)


Learning News this Week

Company finds it is hacked after server runs out of space

Back in 2016, an Utah based company figured out, 2 years too late, that it was hacked after one of its servers ran out of space. The hacker had stored the stolen data on the server’s disk. That archive finally grew too big, triggering the detection of the hack.


Learning

There were quite a few errors in how the company set up its systems – there were no means to detect unauthorized access or modification of its files. Nor did it track usage of resources. Nor were costs tracked closely enough to detect anomalies.
The hacker stole around 1 million user records  out of a total of around 12 Million user records.  To make it easier of the hacker, sensitive user information like, SSN, Payment card information, bank accounts, user names & passwords (GASP!!) were stored in clear text 
If you read the story, you will find that the intruder had earlier infected the company’s systems for remote access & control. So, the company’s IT sin is further compounded by the failure to clean out an infection completely – again an outcome of poor logging.
The company is a text book case study of how not to implement cybersecurity.  Learn from their travails!

The WORST way to check your password strength!

FinecoBank, a bank with more than 1.3 million customers in Italy and the UK, suggested an unusual password strategy to its customers: copy and paste the password into Google, and see if anyone else is using it.
This, obviously,  is a very bad idea!


Learning

While it is a good idea to encourage customers to choose unique, or rare, passwords, entering them in clear text in a search engine is wrong – too many actors know your customer’s password.  And after all that risk, the resulting password is likely not very strong as any human generated password is bound to follow some pattern.
A better solution is to use password generators, combined with a password manager.   It is suggested that random phrases with special character modifiers generate stronger passwords in real life.   
When this strategy is combined with multi factor authentication, you can balance security and ease of remembering the password adequately.


Interesting News

Mass Malware Attack

Bad actors are utilizing the interest generated by the US 2020 Elections & the impeachment proceedings to infect systems with malware.

Facebook  Plays Peek-a-Boo

The interwebs were ablaze last week with the news that Facebook switches on the phone camera when you use the app on iPhone. (Thankfully, this ‘feature’ is absent on Android)

$5M Ransom demand from Pemex

Attackers have demanded a $5 Million ransom from beleaguered Mexican State Oil firm Pemex, after making the point that they missed the ‘early bird discount’!

Cybersecurity – A Collective Responsibility

C-suite execs must set an example of good practices while also supporting the IT department with enough budget to protect the organization from next-generation cyberattacks.

AWS Suffers 8 Hour DDoS attack

AWS confirmed a sustained 8 hour DDoS attack on Route 53 & related services.  This news emphasizes the need for multi-cloud, multi-region architecture for your mission critical enterprise class applications, in my opinion.

Insider Attack Cheaper than  Malware?

A fascinating podcast on the economics of using Insider attack vectors over  the external. A discussion on what the top insider threats are, and why departing employees as a threat are pushing companies to update their exit policies.

GitHub Launches Security Lab

GitHub announced the launch of a new community program called Security Lab that brings together security researchers from different organizations to hunt and help fix bugs in popular open source projects.

]]>
11th November, 2019 – Purple Post https://purpleteam.in/campaigns/purple-post-nov-11/ Mon, 11 Nov 2019 08:49:14 +0000 https://purpleteam.in/?post_type=campaigns&p=1485 11th November, 2019 – Purple Post Read More »

]]>

This week’s insight from Purple Team

Let us discover what we can learn in cybersecurity this week

Insider Threats

Two news items this week highlight the tricky nature of insider threats.

The Incidents

Trend Micro has revealed a “security incident” leading to the theft of personal data from 120,000 customers caused by a former employee.  And, on the other hand,Saudi Arabia bribed two Twitter employeesto access confidential information of twitter users as a spying exercise.
The two cases demonstrate a key tenet of security: Any and all security measures that are implemented are only as good as the people using the systems.

The Threat

Consider it. It is far easier and more effective to bribe someone who already has privileged access to get you the information you want. (I daresay it would ultimately be cheaper too!).  In a similar vein, it is easier to hire away your employee to get your confidential information rather than go through the complex process of hacking your systems and accessing your information. And it has the added benefit of not having to take a legal risk as an organization!  The risk is entirely the employee’s as the Waymo-Uber case amply demonstrates.

The Learning

While a lot of security advisers will tell you how to set up processes, security policies and technical gates to ‘prevent’ insider threats, I think the answer lies in how well you understand your employees. At the end of the day, you have to trust them with the information in order for them to do their jobs.  It is also inevitable that a few of them go bad despite how well you treat them. After all, it is easy enough to build leverage on or play on a person’s greed. 
The problem is how do you to understand what their ‘normal’ behaviour is and catch any anomalous behaviour when it does happen.  It is not possible, ethical or even legal to know all the actions of your employees and catch it when they seem off. (It is called ‘stalking’ if you do it!).  
One necessary step is to ensure that you log all activities of everybody on your systems without fail, and immutably.  Once you have that, there are plenty of AI / ML tools that can highlight anomalies.  Without that, you have nothing.  Over time, you would be able get the tool to highlight only the salient anomalies.
Understanding what your employees are up to is one of the most important aspects of security. Do not ignore the first step in doing that.

– Sridhar Parthasarathy, CEO, Purple Team(Https://www.purpleteam.in)


Learning News this Week

The FBI as put out a public service announcement about a scam that has cost companies, by FBI’s estimates, $ 26 Billion!  The FBI calls it BEC (Business Email Compromise) and essentially it is a scam where the attacker tricks the organization into transferring money to a wrong account by sending instructions from what appears to be a legitimate email id of the person sending the instruction. For example it could look like a mail from the CEO asking for a sum to be transferred to close a deal; or a vendor changing payment instructions.

Learning

BEC is different from regular phishing mails in that it is targeted and requires a high level of understanding of your processes and the identity of the purported sender.  You need to ensure that the people processing payments are first aware of this scam. You then need train people on adequately validating  instructions for change of payment – these mails are crafted to look genuine for any but the most sceptical person. And finally, you need to ensure that no one ever suffers any blowback if they follow those instructions.  The full list of recommendations from FBI:

  • Use secondary channels or two-factor authentication to verify requests for changes in account information.
  • Ensure the URL in emails is associated with the business it claims to be from.
  • Be alert to hyperlinks that may contain misspellings of the actual domain name.
  • Don’t supply login credentials or PII in response to any emails.
  • Monitor financial accounts regularly
  • Keep all software patches on and all systems updated.
  • Verify the email address used 
  • Ensure that full email extensions are viewed.

So  you found out that you have been infected by ransomware, like seems to be the norm.  What do you do next?

Here’s what 1,180 adult individuals did:

Restarted Computer 30%Online Tool 18%Restored from backup 22%Removed 13%Reformatted Computer 5%Removed using AV 5%Paid Ransom 4%Other 3%
What should you do next?

Learning

First thing to remember – do notreboot off your computer!!   That sometimes enables a malware which is stuck to complete the job. Typically, if you have a ransomware attack, you have to do two things – The first is finding the ransomware’s artifacts — such as processes and boot persistence mechanisms — and removing them from an infected host.
The second is restoring the data if a backup mechanism is available.  If the first step is not completed, then it is possible that rebooting the computer often restarts the ransomware’s process and ends up encrypting the recently-restored files.
So, your best bet is to disconnect the computer from the network and then hibernate your computer because it saves a copy of the memory, where some shoddy ransomware strains may sometimes leave copies of their encryption keys.
Call for expert help immediately after that, instead of trying to restore your backup.
To learn more about dealing with ransomware attacks, you can check out the Emsisoft guide on how to remove ransomware and Coveware’s first response guide on dealing with a ransomware attack.


Interesting News

Cybersecurity for women

The Indian Police Service & a set of IT professionals have launched a site,   https://cybersafegirl.com/ that educates women on how to stay safe in the cyber world. And, if they do get into trouble, what to do about it. They have a free e-booklet that can be downloaded from the site.

What is a good password?

Is a password that even you cant remember good?  “Not really.” say experts.
Unreadable passwords lead you to repeat passwords, which means that a hacker cracking one account can crack multiple accounts. 
Shift to pass phrases.  Turn on two factor authentication. Install a good password manager.

IOT Security

IOT is setting the world ablaze with its myriad use cases. One forecast  predicts that there’ll be almost 41.6 billion connected things in 2025 that will generate 79.4 zettabytes of data.  However, the same use cases increase the attack surface and enable novel attacks to materialize. 
Technopedia has aggregated various expert’s views on how this threat can be handled and the risk limited

Cybersecurity Excuse Generator

As we have been saying, it is inevitable that you will get attacked. When that does happen, how to you tell the world that you got hacked?
The site linked above comes to your rescue and gives you plenty of tongue-in-the-cheek excuses you can use. 
Strictly for recreational use!

Amazon Echo, Google Home Laser Hackable

Researchers discovered that precisely modulated lasers could silently send “voice” commands to smart speakers from hundreds of feet away. The attack also worked on smartphones and on an iPad, but only at short distances.

How can you defend yourself if this starts happening in real life? The best bet is to make sure your Amazon Echo, Google Home, Facebook PortalAmazon Fire TV Cube and other smart speakers aren’t facing windows. 

Pwn2Own

Pwn2Own is a bi-annual hacking contest held at the CanSecWest security conference.  Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. This year’s Tokyo contest was won by Team Fluoroacetate (researchers Amat Cama and Richard Zhu) taking home the Master of Pwn title for the third year in a row.  Amazon, Sony, Xiaomi, Samsung Devices were successfully hacked this year.
The highlights of  Day 1 & Day 2 linked.

Advisory on Holidays, Phishing & Malware

As this holiday season approaches, the Cybersecurity and Infrastructure Security Agency (CISA) encourages users to be aware of potential holiday scams and malicious cyber campaigns, particularly when browsing or shopping online. A few dos & donts from CISA!


Threat Intelligence

]]>
1st November, 2019 – Purple Post https://purpleteam.in/campaigns/purple-post-nov-1/ Mon, 04 Nov 2019 00:25:09 +0000 https://purpleteam.in/?post_type=campaigns&p=1493 1st November, 2019 – Purple Post Read More »

]]>
This Week’s Insight from Purple Team

Let us talk about the raging news in cybersecurity this week:

Pegasus – The WhatsApp Spyware

Facebook is suing Israel’s NSO for breaching WhatsApp’s security to spy on users is the biggest news last week. So, of course we will talk about it!
The legal and ethical ramifications of how the exploit and the vulnerability are being used is beyond my capabilities to discuss. (Just know that there is no legal basis to hack a device in India, at least). However, we can look at what the breach means to you and your organization.


The Facts

First, it is important to understand that the basic vulnerability is in the WhatsApp code – Pegasus merely exploited it.   It is a fundamental flaw in the WhatsApp code, not restricted by the phone platform. So any device, whether it is Android or IOS, is vulnerable.

Also, please remember the vulnerability is not new.  While CVE-2019-3568 was entered into the NVD only this year, it has been exploited for over 3 years by bad actors. Again, Pegasus is not the only tool to exploit this vulnerability; it is merely the most visible as it calls itself an aid to law enforcement and hence, by definition, is on the side of the good guys. 

Most importantly, it is not a WhatsApp only problem – once installed, almost all the information on the device and the information that you access on the device are vulnerable. The figure alongside, sourced from Citizen Labs, shows what information can be compromised. 

What it Does


The flaw successfully allowed attackers to silently install the spyware app on targeted phones by merely placing a WhatsApp video call with specially crafted requests, even when the call was not answered.  Also, the victim would not be able to find out about the intrusion afterward as the spyware erases the incoming call information from the logs to operate stealthily.

Under hood, it is a buffer overflow flaw that allows the exploit to work by sending specially crafted SRTCP messages.  When a video call is made on WhatsApp, the call information as well as the metadata is sent to the recipient phone. When this comes, WhatsApp is “reading” this data in order to display it to you. Prior to its patch in May 2019, WhatsApp did not sanitise this package for the kind of code included in the metadata, because of which the contained Pegasus code would get executed on the recipient’s phone. This allowed remote installation of the spyware.  

It is not a virus in that it cannot be spread from an infected device to another; it requires a WhatsApp voice call to be made to a specific person.  And the call has to originate from Pegasus.  The earlier version required you to click a link but the current version evidently works by merely placing a call.


So what are the implications for you?

The good news is, it is extremely unlikely that you are a target of interest to users of Pegasus – they are looking at persons of interest politically. At current estimates, only 1500 people have been infected worldwide. (The numbers seem to be going up daily, though).

The bad news, however, is that those numbers only apply to Pegasus. There is nothing stopping other actors from using the exploit to their own ends.

So, update your WhatsApp NOW!

The other things you should do:

  • De-link cloud accounts from your device until you update WhatsApp
  • Change your passwords
  • Enhance your online safety
    Use this tool for your assessing what you need to do meet your digital security needs. 
  • Change your phone? There are reports that Pegasus can survive a factory reset.  So, if you are infected, you should replace your phone. Otherwise, no.

If you want more the details about Pegasus, Citizen Lab’s excellent article on their research is the place to start.

– Sridhar Parthasarathy, Purple Team


Learning News this Week

Kudankulam Power Plant Cyber Attack

The Kudankulam Nuclear Power Plant (KNPP) was infected by a North Korean Trojan called DTrack. The control systems of the reactor were not affected as they were air gapped. While it is known IT systems are compromised, it is not known which specific systems are compromised. KNPP was notified of the attack in September by CERT-In.

Learning

There are two learning points in this for you and your organization:

Air Gapping

The reason why we know the control systems are safe is because there is no connection between them and the internet.   They cannot be remotely controlled.  Most process industries are set up this way by default. 

However, this is a lesson that can be carried over to other industries as well, at least for mission critical systems. In this era of micro-services, it should be possible to isolate your mission critical systems. If not, at least tight access control that is periodically reviewed will help prevent most of such exploits.

Social Engineering

The DTrack remote access Trojan used in the KNPP attack has multiple variants and essentially uses process hollowing to work.  Once a system is infected, the malware has the ability to perform keylogging, copy browser history, gather all host IP addresses and retrieve information about all available networks and active connections within a device. 

If you think about it from an attacker’s perspective, it is precisely this kind of information that would enable them to mount other kind of attacks that would eventually compromise the control systems – for example, compromising an insider through other means or password reengineering or eavesdropping attack. At the very least, it allows them to build information about the IT landscape around the control systems and enables them to craft an attack with that information.

So, while it is good news that control systems are not compromised, it is bad enough that the IT systems have been breached.


News You ca7d287en Use

Top 10 Cybersecurity Terms

A basic knowledge of cybersecurity best practices goes a long way for people looking to protect their companies from cyberattacks. Although learning about cybersecurity can seem daunting, you don’t need to be an expert to help protect your business from security breaches. The page lists 10 cybersecurity terms you should be aware of, for starters.

$102 Billion Loss in one attack?

Since Ports are interconnected by definition, Lloyd’s of London warned that a single cyber attack on one of the 15 major ports across Singapore, China, Japan, South Korea, and Malaysia can result in $120 Billion loss.In a potential attack scenario targeting ship that the study posed, a software virus could scramble the cargo database logs at major ports and result in critical disruption. 

Unremovable’ XHelper 

A new Android malware strain has made a name for itself after popping up on the radar of several antivirus companies, and annoying users thanks to a self-reinstall mechanism that has made it near impossible to remove.  It known to have infected 45000 devices until now but it is seems to be spreading at the rate of 131 new victims a day. 
It is spread by web redirects.

Unlock any Fingerprint Locked Phone

Hackers working for Chinese security company Tencent claim that they have developed a method to photograph a fingerprint on any glass surface and use it to unlock any smartphone, no matter their fingerprint reader technology — in just 20 minutes

US investigates Tik-Tok

U.S. lawmakers have been calling in recent weeks for a national security probe into TikTok, concerned the Chinese company may be censoring politically sensitive content, and raising questions about how it stores personal data.


Threat Intelligence

]]>
Purple Post Welcome https://purpleteam.in/campaigns/purple-post-welcome/ Sat, 26 Oct 2019 06:44:04 +0000 https://purpleteam.in/?post_type=campaigns&p=1497 Purple Post Welcome Read More »

]]>
First, it is important to understand that the basic vulnerability is in the WhatsApp code – Pegasus merely exploited it.   It is a fundamental flaw in the WhatsApp code, not restricted by the phone platform. So any device, whether it is Android or IOS, is vulnerable. 

You are busy and the flood of cyber security warning just leaves you cold, as it is difficult to know what is important.
Do not worry. Purple Post is a weekly newsletter that curates the week’s cyber news highlighting the information that needs your attention while filtering out items that can be handled routinely. It also uses the news to educate its audience on how to react if the inevitable breach does occur.

Welcome on board to this wild & wonderful journey!

]]>
20th October, 2019 – Purple Post https://purpleteam.in/campaigns/purple-post-oct-20/ Sun, 20 Oct 2019 11:37:23 +0000 https://purpleteam.in/?post_type=campaigns&p=1551 20th October, 2019 – Purple Post Read More »

]]>
Protecting yourself

Author’s Note:In cyber security, ‘prevention’ is the first line of defence, followed closely by ‘detection’ when your defences are penetrated.  I propose to re-target this newsletter to explore how you can protect yourself, and your organization, when the inevitable breach does occur.  Using the cyber security news in the week, I will try to highlight where the vulnerability was & what was done in response to the incident.  And, if possible, how you can prevent it.
I think this would a more profitable use of your time, rather than just reading the week’s threat intelligence. Please do let me know your thoughts & if you would like to see some other kind of content here.


Multi-Factor Authentication

Multi-factor authentication is a basic hygiene practice that goes a long way in making you secure. (If you have not enabled it for your important accounts, please go and do it right now. I will wait!).

An SMS based 2FA is the most common MFA.  It is also the most easily broken authentication method.   It is prone to a SIM swap, or a SIM jacking attack which are quite easy to execute.  However it is quite sufficient for non-critical accounts and is definitely more secure than password based authentication.

If you are a good target for spear phishing, or if a compromise of your credentials has a very high impact, you are better off with an authenticator app  based MFA, like Google Authenticator, than an SMS based one.  Unless you lose your physical device or allow remote access, you would be secure.  

A dedicated hardware key offers still greater security, at the risk of a minor sacrifice in convenience.  In this method, you need the physical key to access your account and there is a tight binding between the device you use to access, your credentials & the key.  So, even if you lose the key, since nothing is stored on the key itself, it will be useless to access your account.  However, if you do lose the key, you would need to remove the key as a form of authentication from your accounts,  replace the key and re-establish the authentication again.  The peace of mind is worth the minor compromise in convenience, if the impact of wrongful access is great enough.

If you would like to explore a security key, Google has released a USB-C version of its popular Titan Security Key last week for $49. Do check it out.

And, if you need even more security (and if you are on the  Google eco-system), and if you do not want to even entertain the possibility of your account being compromised, you could also enroll into the Google Advanced Protection Program. It is basically impenetrable but not very broadly usable outside of Google; Apple users, for example, cannot use this.  You can learn about multi-factor authentication & their ins and outs in this excellent PC World article.

Read on for more information on learning from this week’s incidents and for the human interest cyber security news stories of the week. And,  if you need the threat intelligence on high priority vulnerabilities, they are there too!

– Sridhar Parthasarathy


Learning News this Week

Pitney Bowes Ransomware Attack

The latest ransomware attack victim turns out to be global mailing and shipping service, Pitney Bowes. As confirmed by the firm itself, their systems suffered a ransomware attack which caused disruption to their services.  

Learning

The average cost of a ransomware attack on a small company is pegged to be around $200,000 per incident. The irony is, even though ransomware attacks are common, they are not particularly sophisticated or insidious.  They are easily preventable even by a small , non-technical businesses. 
The best defence against this type of attack is having regular, well tested back-ups.  Both aspects of backups, regularity and testing, are important for this defence to be effective.  Additionally, your frequency of backup has to meet your organization’s standards for RPO (Recovery Point Objective).  
The other aspect to keep in mind is that since most ransomware are introduced via email to the organization,  either as an attachment or as a link, it might pay excellent dividends to invest in the security education of your employees.  Combined with a good back-up process, this will help you prevent or recover from 90% of ransomware attacks.

Going Dark on the Net

You are aware of all the epigrams:
– “If you’re not paying for the product, you are the product”,
– “Relying on the government to protect your privacy is like asking a peeping tom to install your window blinds.”
– “Privacy is not something that I’m merely entitled to, it’s an absolute prerequisite.”

What all these bon mots fail at is telling you how to erase your digital footprints on the broad internet.   It is not always possible to browse the net using the incognito mode – after all, it is convenient get recommendations for that playlist that is tuned just to your tastes!
You should be able to balance your need for convenience with how much of your information is collected and  how much of it is stored for how long.

Learning

 So, how do you ensure that your digital history is not stored on the internet? First, practice safe browsing practices:
– Examine a URL before clicking
– Do not install random software from unproven sources
– Install & use a good anti-virus
– Unfriend/ disassociate with anyone you do not actually know
– Look critically at the permissions you have given and fix them

Read the article from Gear Patrol to find out  more.


News You can Use

Are you over-working your executives?

For most organisations in India (92%), cybersecurity is an executive level priority. However, higher workloads and fatigue leave leaders little time to actually look into cyber security threats, according to Cisco’s 2019 Asia Pacific CISO Benchmark Study

You wont believe how he tracked her location!

Indie Japanese idol Ena Matsuoka ‘gave away’ her location to her obsessed fan Hibiki Sato! Apparently, he was able to stalk her from her photos on social media.  The 26-year-old fan used the angle of the light and shadows to approximate her GPS location!  He also zoomed in on the singer’s eyes and identified a train station from the reflection in her iris. He then used Google Maps to find the train station.

Hacked Data Recovered

In an ironic twist of fate, BriansClub, a black market site that contains stolen credit cards, was hacked to rescue the data of more than 26 million credit and debit cards.
KrebsOnSecurity reports that the data stolen in August from the site, which goes by the name BriansClub was shared with financial institutions who were able to identify, monitor, and reissue cards that were compromised. 

Change your Default Passwords!

Kaspersky has set up ‘honeypots’ in various geographies to find out the nature & pattern of threats on smart devices. These are small footprint devices which have some processing capabilities.
They setup around 50 honeypots around the world. They found that there were 20,000 infected sessions every 15 minutes. 
Their conclusion? Read the title of this snippet!

]]>
Purple Post https://purpleteam.in/campaigns/purple-post/ Mon, 14 Oct 2019 18:07:07 +0000 https://purpleteam.in/?post_type=campaigns&p=1498 Purple Post Read More »

]]>

Multi-Factor Authentication not very secure

If you thought you were safe because you use multi-factor authentication (MFA), there is bad news for you: MFA can be broken.
While MFA is still a recommended practice and is much safer than having just a password, it does not, however, guarantee your safety. You cannot afford to be complacent.

FBI: MFA Not So Secure!

Last month, the FBI issued a warning to private companies about MFA. The agency said that there is a rising threat of attacks against organizations and their employees that can bypass MFA solutions.

There are multiple ways to work around MFAs:

  • For example, like how the Twitter account of Jack Dorsey was hacked, your SIM too can be swapped.
  • Or if the site using MFA is not securely developed, an attacker can bypass MFA anyway and get at your private data. 
  • Finally, the ubiquitous ‘social engineering attacks’ can get you to divulge your information to an attacker voluntarily enabling them to inject themselves into the MFA cycle.

I do not want you to panic unnecessarily – after all, the FBI still says “Multifactor authentication continues to be a strong and effective security measure to protect online accounts, as long as users take precautions to ensure they do not fall victim to these attacks, …”.  I would only ask you to make note of the caveat.

– Sridhar Parthasarathy

JustDial Exposes 156 Million Users  

A massive security loophole at Just Dial has just been discovered. The flaw, discovered by an independent security researcher, has exposed almost 156 million unique users across the Just Dial ecosystem, that includes its web, mobile website, app and voice
JustDial claims to have addressed this issue.


Cyber Security News This Week

Vulnerabilities in Multiple VPNs

The NCSC is investigating the exploitation, by Advanced Persistent Threat (APT) actors, of known vulnerabilities affecting Virtual Private Network (VPN) products from vendors Pulse SecureFortinet and Palo Alto. The Cybersecurity and Infrastructure Security Agency (CISA) encourages administrators to review NSA’s Cybersecurity Advisory and CISA’s Current Activity on Vulnerabilities in Multiple VPN Applications for more information.

Microsoft – Cyberattacks on key emails

The Microsoft Threat Intelligence Center (MSTIC) has released a blog post describing an increase in malicious cyber activity from the Iranian group known as Phosphorus. These threat actors are exploiting password reset or account recovery features to take control of targeted email accounts.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users to review the Microsoft blog for additional information.

iTerm2 Vulnerability

Vulnerabilities have been discovered in MAC OS Terminal Emulator iTerm2, as per US-CERT information on vulnerability (CVE-2019-9535). Visit iTerm2’s downloads page for patch information and additional details for more information.

Windows Update Assistant Vulnerability

Microsoft has released a new version of the Windows 10 Update Assistant in order to fix a local privilege escalation vulnerability. The update is critical to cover the flaw.

Amazon CloudCam – People see you!

Dozens of Amazon workers based in India and Romania review select clips captured by Cloud Cam, according to five people who have worked on the program or have direct knowledge of it. Those video snippets are then used to train the AI algorithms to do a better job distinguishing between a real threat and a false alarm.

Twitter uses MFA data for ads

Twitter admitted to ‘inadvertently’ using data provided for multi-factor authentication for targeting ads.  The company did not divulge how long this has been going on or the extent of the misuse of data.

Vulnerabilities in Multiple VPNs

The NCSC is investigating the exploitation, by Advanced Persistent Threat (APT) actors, of known vulnerabilities affecting Virtual Private Network (VPN) products from vendors Pulse SecureFortinet and Palo Alto. The Cybersecurity and Infrastructure Security Agency (CISA) encourages administrators to review NSA’s Cybersecurity Advisory and CISA’s Current Activity on Vulnerabilities in Multiple VPN Applications for more information.


In Other News …

CISA Releases Article On Phishing Defense

NIST & FBI have released an article out lining defences that can be employed against phishing attacks. Comments & information are invited for the article.

FBI: Need for lawful access

FBI Director Christopher Wray shared cases where the support of technology companies helped law enforcement rapidly identify and save children being sexually abused. He followed by asking for the renewed and ongoing support of the industry in investigations into child pornography, terrorism, and other crimes.

How to payback in style!

A ransomware victim that paid Bitcoin to unlock his files has enacted sweet vengeance on his attackers, by hacking them right back.  As part of his retaliation, German programmer Tobias Frömel (aka “battleck”) released almost 3,000 decryption keys to assist others hit by the Muhstik ransomware, along with free decryption software.

New Initiatives – Participation Invited

Snippets

Updates on previous news

]]>