Home Tags Countermeasure

Tag: countermeasure

Version 2: Sinister malware just got sinistererer Security researchers have identified a second wave of Shamoon 2 PC-wiping attacks against a further target in Saudi Arabia last November.

The new research shows hackers upping the ante and developing more sophisticated, multi-stage attacks. The original Shamoon attack hobbled the network of Saudi Aramco in 2012. Similar destructive attacks against a civil aviation agency and other Gulf state organisations in Saudi Arabia re-emerged in November 2016. United States intel officials blame Iran for the Shamoon attacks, partly on the basis of geopolitical motives as well as the nature of the attack.

The technical evidence isn't conclusive either way but certainly doesn't rule out Iran as a strong suspect. Phase one of the latest assaults were designed to wipe systems at one particular target on November 17, researchers at Pal Alto Networks previously reported.

They have since discovered another, similar payload targeted against a second unnamed organisation in Saudi Arabia. This malware variant was configured to wipe systems on November 29, eight days after the previous attacks.

This second-wave attack was designed to take out one of the primary countermeasures employed against wiper attacks, Virtual Desktop Interface (VDI) snapshots. The second malware payload contained hardcoded account credentials specific to the newly targeted organisation.

These met Windows password complexity requirements, which suggests that hackers obtained the credentials through a previous, separate attack, similar to the November 17 attack.

That's where the similarities stop. "The most notable thing about this latest sample is that it contains several usernames and passwords from official Huawei documentation related to their VDI solutions, such as FusionCloud," Palo Alto researchers explained. VDI solutions can provide some protection against destructive malware – such as the Disttrack wiper dropped on systems infected by Shamoon – through the ability to load snapshots of wiped systems.

The hacking crew behind the Shamoon attacks obtained usernames and passwords for VDI systems prior to launching their malware-based attack in an apparent attempt to thwart a important line of defence. Organisations should consider adding additional safeguards in protecting credentials related to their VDI deployment as a potential countermeasure against the new tactic, Palo Alto advises. Details of the login-snatching attack ahead of the Shamoon 2 assault remain unclear. "At this time, we have no details of the attack we believe preceded this Shamoon attack to obtain credentials," according to Palo Alto. "We also have no details on the delivery method used to deliver the new, similar, but different Disttrack payload in this attack." More details on what's known so far about the Shamoon 2 attacks can be found in a detailed blog post by Palo Alto researcher Robert Falcone here. ® Sponsored: Customer Identity and Access Management
A barely passing grade from a former special agent in charge of the NYC FBI cybercrimes division for failing to create deterrents and policies that encourage self defense. As the Obama era comes to a close, Dark Reading asks industry leaders to weigh in on the best and worst of the administration’s cybersecurity policies. In countering the cyber threat, or any national security challenge, the President’s powers can be divided into two buckets.

The first contains actions and policies intended to change the behavior of our adversaries.

The second contains actions and policies intended to change the behavior of those we seek to protect.
In other words, the President can try to stop the bad guys from attacking us or encourage good guys to take steps to reduce their exposure. Unfortunately for cybersecurity professionals tasked with defending sensitive data and systems, the Obama administration has come up short in both areas.  Ineffective Use of US Power to Create a DeterrentIn the first category, the Obama administration has been too cautious in taking steps to create a real deterrent to nation states who use cyber tools and weapons against us.

Take China, for example.

The US intelligence community has been warning the President for years that China had embarked on a strategic cyber espionage campaign targeting US companies.

Despite these warnings, the administration did little or nothing to dissuade the Chinese from deploying large numbers of hackers to steal intellectual property and business information.
In the eyes of many experts, this effort cost US companies’ contracts, and - ultimately - jobs to Chinese state-owned competitors. The administration appeared to take a bold step in May 2014 by green-lighting the Department of Justice’s indictment of five officers of the Chinese People’s Liberation Army on cyber espionage charges.

But this was after many years of sitting on the evidence, hoping softer measures would convince China to change its ways. While the indictments got China's attention, it wasn't until President Obama called out China's President Xi Jinping in September 2015 that we saw any real response from the Chinese. President Xi's pledge not to conduct cyber espionage for commercial gain seemed to signal progress, but the damage had already been done.

After years of successfully stealing US intellectual property and business information, China had what it needed to elbow US competitors out of major markets.   A similar stance was taken with the Iranians.

Despite Iran’s aggressive use of distributed denial of service (DDoS) attacks against the US financial sector in 2012 and 2013, the administration did little or nothing to make Iran pay a real price for its aggression.
It was not until after the nuclear framework with Iran was concluded in July 2015 that the administration finally called them out on their cyberattacks.

This came in the form of an indictment of seven Iranian hackers for the attacks on US banks’ websites and a dam in New York.

The timing of the indictment again diluted its deterrent effect.  The list of missed opportunities to create a deterrent doesn’t end there. While there may be much going on behind the scenes, it seems the administration has let a number of significant cyberattacks go unanswered.

For example, other than weak and ineffective trade sanctions, North Korea appears to have paid no price for the devastating attack on Sony in 2014.
Similarly, the more recent attacks against the DNC and other networks related to the presidential campaign, purportedly by the Russians, have been absorbed without a significant response.    Nation-state actors are (mostly) rational.

They conduct a risk-reward analysis before taking on the US with cyberattacks or any other aggressive behavior.

The administration has not made our cyber adversaries pay a price, so cyberattacks are little risk and great reward. We have to change the inputs on the risk side to change their behavior. Ineffective Policies to Encourage Self-DefenseCompounding the administration’s hesitant use of US power to create a deterrent is its myopic focus on “information sharing” as the bedrock of cyber protective strategies. While important, the strict focus on information sharing as a countermeasure is misplaced for two reasons.

First, a lack of information sharing doesn’t seem to be the problem. We see from studies like the Verizon Data Breach Investigations Report (2015) that 99.9% of the vulnerabilities exploited by hackers were known for more than a year.

This is a staggering statistic.
It shows the problem for enterprises is not sharing information, it’s effectively using the information (e.g. patching the vulnerabilities) that we already have. The value of “information sharing” as the foundation of a cyber defense strategy depends almost entirely on the type of information shared.
If the information takes the form of a “signature” of “Indicator of Compromise,” (IOC), a defender may be able to configure defenses to detect such activity.

But this approach has been demonstrated to have limited value, especially against sophisticated adversaries.  The administration is well aware of the limitations of signature-based systems because it owns and operates one.
Specifically, the National Cybersecurity Protection System, operationally known as “Einstein,” is an integrated system-of-systems that is intended to deliver a range of capabilities, including intrusion detection, intrusion prevention, analytics, and information sharing.
In January of 2016, the US Government Accountability Office (GAO) issued a report that criticized Einstein with facts that cybersecurity professionals know all too well.  According to the GAO report, Einstein “provides DHS with a limited ability to detect potentially malicious activity entering and exiting computer networks at federal agencies.
Specifically, [Einstein] compares network traffic to known patterns of malicious data, or “signatures,” but does not detect deviations from predefined baselines of normal network behavior.
In addition, [Einstein] does not monitor several types of network traffic and its “signatures” do not address threats that exploit many common security vulnerabilities and thus may be less effective…” Disincentives for Sharing: What Went WrongInformation sharing as a basis for national strategy falls short for a second reason – we are not sharing all of the information available.

This is because there are significant disincentives for organizations to open up about what they did wrong or how they let a breach happen.

This type of information is potentially far more useful for network defenders.  For example, it would help to know what Target actually did or failed to do in the days leading up to their now famous breach in November 2013.

But we may never know the facts - even though they could help others to avoid repeating the same mistakes - because sharing such information is an invitation to litigation.

The Target breach does not stand alone in this regard.
In the current legal framework, some of the most valuable information for cyber defense never sees the light of day because there are real disincentives for sharing. Despite the limited value of sharing signatures and IOCs, the administration has not been successful in creating incentives and removing penalties to expand the types of information being shared.

This is arguably the result of resistance from the private sector and Congress.

The net effect, however, is a continued focus on technical indicators that make signature-based systems, like Einstein, less effective.   I believe the administration tried hard, and would have changed the rules to encourage more effective sharing if they could, but they just couldn’t get it done.
I also believe that nation states don’t care how hard we try.

Their only concern is whether they can achieve their goals with within their cost and risk tolerance parameters.

After seven years of the administration’s best efforts, the fact remains that nation state actors are seeing more upside than ever. Related Content: Leo Taddeo is the chief security officer for Cryptzone, a provider of dynamic, context-aware security solutions.

Taddeo was previously the special agent in charge of the special operations/cyber division of the FBI's New York office, where he led more than 400 agents and ...
View Full Bio More Insights
All those unchangeable PINs, up for easy swiping Cybercriminals are hawking their claimed ability to exploit newly introduced biometric-based ATM authentication technologies. Many banks view biometric-based technologies such as fingerprint recognition to be one of the most promising additions to current authentication methods, if not a complete replacement to chip and PIN. Crooks, however, regard biometrics as a new opportunity to steal sensitive information, research by Kaspersky Lab shows. Credit card-related financial fraud against ATMs started many years ago with primitive skimmers – homemade devices attached to an ATM and capable of stealing information from the card’s magnetic strip and PIN with help of a fake ATM pin pad or a web camera.

This information was subsequently used to make counterfeit cards. Over many years, the design of such skimmers has been improved to make them less visible.

Following the introduction of much harder (but not impossible) to clone chip-and-pin payment cards, the devices evolved into so-called “shimmers”.

These shimmers added the ability to gather information from the card’s chip, giving sufficient information to conduct an online relay attack.

The banking industry is responding with new authentication solutions, some of which are based on biometrics. Crooks have recently begun boasting about the ability to offer next generation ATM skimmers that circumvent these additional biometric-based authentication controls. According to a Kaspersky Lab investigation into underground cybercrime, there are already at least twelve sellers offering skimmers capable of stealing victims’ fingerprints. Moreover, at least three underground sellers are already researching devices that could illegally obtain data from palm vein and iris recognition systems. Researchers at the Russian security software firm spotted the first wave of biometric skimmers in “presale testing” last September.

Evidence collected by Kaspersky Lab researchers since suggests that during this prototype development process, developers discovered several bugs.

The main problem was the use of GSM modules for biometric data transfer – they were too slow to transfer the large volume of data obtained.

As a result, new versions of skimmers will use other, faster data transfer technologies. Ongoing discussions in underground communities cover the development of mobile applications based on placing masks over a human face. With such an app, attackers might be able to take a person’s photo posted on social media and use it to fool a facial recognition system. “The problem with biometrics is that, unlike passwords or pin codes which can be easily modified in the event of compromise, it is impossible to change your fingerprint or iris image,” said Olga Kochetova, a security expert at Kaspersky. “Thus, if your data is compromised once, it won’t be safe to use that authentication method again.

That is why it is extremely important to keep such data secure and transmit it in a secure way.” “Biometric data is also recorded in modern passports – called e-passports -- and visas.
So, if an attacker steals an e-passport, they don’t just possess the document, but also that person’s biometric data,” she added. The use of tools capable of compromising biometric data is not the only potential cyber-threat facing ATMs, according to the Kaspersky Lab researchers. Hackers will continue to conduct malware-based attacks, blackbox attacks and network attacks to seize data that can later be used to steal money from banks and their customers. More on Kaspersky’s research into the latest generation of threats against cash machines in general, together with possible countermeasure, can be found in a blog post on Kaspersky Lab’s Securelist.com blog here. ®
Cyber Security Labs @ Ben Gurion Universityreader comments 18 Share this story Researchers have devised a new way to siphon data out of an infected computer even when it has been physically disconnected from the Internet to prevent the leakage of s...