In the olden days, people were not exactly au fait with technologies that wouldn’t appear for centuries or even millennia, which is why the cybersecurity lessons we find in fairy tales tend to need some excavation. Encrusted in metaphor, conjecture, and literary tinsel, the original meanings of familiar fairy show more ...
tales can be distorted or lost entirely. Fortunately, Cinderella managed to escape that fate. The earliest version of the tale was recorded on Egyptian papyrus; Cinderella isn’t just another European folk story. In short, it is about a young woman in distress who finds traditional happiness with the aid of a supernatural entity. (In the version by Charles Perrault, that entity is the fairy godmother; for the Brothers Grimm, it’s a tree growing on Cinderella’s mother’s grave. In the ancient Egyptian rendering, the god Horus assumes the role. Such minor discrepancies need not distract from the core message.) The common element — and the most important aspect from a cybersecurity perspective — is the pivotal shoe/glass slipper incident. Despite the exotic spice of the Egyptian original, we will rely on the European versions as the most familiar to the reader. Fake identity Let’s begin. Our heroine lives in a house with her father, stepmother, and stepsisters. Tasked with menial jobs such as sorting grain, Cinderella tries to automate the drudgery by engaging the help of pigeons and doves. Even in the earliest version of the tale, this is possibly a reference to sorting not physical objects but rather huge amounts of data. At the same time, Cinderella dreams of going to a ball at the king’s palace, but she cannot — not because of work but because she won’t be allowed in. She would need a beautiful dress and a carriage, and her family refuses to help. The fairy godmother comes to her rescue, turning a pumpkin into a carriage, mice into horses, and rags into a gown. In essence, the fairy godmother creates a fake identity for Cinderella so she can attend the ball incognito. Remember that in days of yore the word hacker did not exist as such, and people attributed such wizardry to sorcerers and enchantresses. But never mind the days of yore — even now, hackers are portrayed in popular culture as omnipotent technoshamans! Access to the ball clearly doesn’t require an invitation (that is, initial authentication), so all Cinderella has to do is register at the entrance. Trouble is, her original identity does not fit the selection criteria, whereas the fairy godmother’s fake obviously takes them into account. Digital certificate The details of Cinderella’s identity alteration soon become clear, when the fairy godmother warns her that her new image will disappear at midnight. When that happens, everyone will see rags, not a gown, vermin in place of horses and servants, and so on. What could form the basis of this plot device? Judging by the realities of medieval Europe, absolutely nothing. It seems instead to be some kind of artificial limitation. But let’s recall what exactly happens at midnight: The date changes. Anyone who’s ever forgotten to renew a website’s SSL certificate understands this scenario very well. Literally one second ago, the certificate was valid and users were calmly browsing your site. Then the certificate expired, and browsers started displaying warnings and stubs instead of your content. The website turned into a pumpkin at the stroke of midnight. Certificates work roughly the same way in digital tokens — that is, access keys. They are valid for a limited time, which means that at some point they too stop working, whereupon the system instantly ends the connection (assuming everything is set up properly). All of a sudden, poor Cinderella becomes an imposter at the ball. Why the fairy godmother is unable to make a more reliable certificate is not clear, but most likely she lacks direct access to a certificate authority. Signature-based detection Realizing that her time is running out, Cinderella runs from the palace, losing a shoe or glass slipper, the only part of her new identity that is real, in the process. The Brothers Grimm version is especially interesting here. In their interpretation, the shoe is not lost by chance, but rather because the prince smeared the stairs with pitch to obtain a fragment of the mystery girl and use it to trace her. In other words, he deployed some kind of cyberthreat-detection system. The prince then uses the shoe as a basis for a tool for detecting objects of the “Cinderella” type and launches a global search, checking the feet of all young maidens in the land. That is basically how many antivirus engines work. Antivirus experts take a section of malware code, create a “shoe” from it (called a hash), and then match it against incoming data. We use this technology, called signature-based detection, in our solutions, although it hasn’t been our main method of detection in quite some time. Hash spoofing attempt In any event, the Brothers Grimm — who, for some reason, creepily focused on blood in their early fairy tales — take this lesson one (shoeless) step further. In their version of the tale, Cinderella’s stepsisters try to spoof the hash by literally cutting their feet to fit the shoe. But hash spoofing is not easy. Unsurprisingly, the sisters’ hash is off the mark, and the prince’s signature-analysis engine rejects it. Thus, using this tale and our post, you can explain to your kids such basic concepts as identity forgery, digital certificates, and signature analysis. We recommend availing yourself of this opportunity — if only to keep the efforts of such eminent cybersecurity experts as Charles Perrault and Jacob and Wilhelm Grimm alive.
The survey carried out by Brazilian credit intelligence company Boa Vista with over 500 consumers between August and September 2020 suggests that over 70% of those polled do not know what the GDPR is.
21 WeLeakInfo customers have been arrested across the UK for using stolen credentials downloaded from WeLeakInfo following an operation coordinated by the UK National Crime Agency (NCA).
The Cybersecurity and Infrastructure Security Agency (CISA) released a PowerShell-based tool that helps detect potentially compromised applications and accounts in Azure/Microsoft 365 environments.
While usually designed to target a single type of e-commerce platform, this new type of web skimming malware can take over the checkout process on shops using multiple online store management systems.
President-elect Joe Biden stressed the need to modernize U.S. military forces to account for attacks in cyberspace following a massive hack of multiple government agencies that came to light recently.
Kawasaki Heavy said it found fraudulent server access via a company base in Thailand during a system audit on June 11 this year, and confirmed the possibility of a data breach.
Over the weekend, the ransomware gang published files stolen from Whirlpool, including employee benefits documents, accommodation requests, medical information requests, background checks, and more.
When Zix acquired cloud backup and recovery provider CloudAlly for $30 million, it picked up backup for such popular SaaS apps as Microsoft 365, Google Workspace, Salesforce, Box, and Dropbox.
In an official statement, KRP Commissioner Tero Muurman said the attack did not cause any damage to the Parliament's internal IT system but was not an accidental intrusion either.
Zero trust architecture is the opposite of the old “trust, but verify” methodology—instead, it’s a risk management approach that translates to: “trust nothing and record everything.”
The Facebook users targeted span from a number of countries including Egypt, the Philippines, Pakistan, and Nepal with more than 615,000 of them being affected in totality.
Last week’s Brexit deal solidifies the terms under which the United Kingdom will leave the EU. But the issue of data transfers remains open, with great potential for confusion among privacy officers.
In February 2020, Malwarebytes reported that its Mac users encountered about twice as many "threats" as Windows users. However, it mainly included potentially unwanted programs (PUPs) and adware.
The scam is designed to make e-commerce users believe that Flipkart is offering a year-end carnival, although there is no such information this year on the e-commerce player's official website.
Google has patched a bug in its feedback tool incorporated across its services that could be exploited by an attacker to potentially steal screenshots of sensitive Google Docs documents.
Attackers are targeting the healthcare sector for its intellectual property (IP), as critical research of COVID-19 therapeutics are developed and biotech firms begin to mass-produce vaccines.
Threat actors have been discovered distributing a new credential stealer written in AutoHotkey (AHK) scripting language as part of an ongoing campaign that started early 2020.
An employee of Freedom Finance fell victim to a phishing email, resulting in the loss of data of 16,000 clients from 2018. The attack also disrupted the internal network of the company.
With a large user base, it makes it quite easy for cybercriminals to publish malicious browser extensions that perform illicit activities, including spying and data theft, among others.
Four nation-state-backed APTs abused Pegasus phone-surveillance solution to target 36 Al Jazeera members by exploiting a zero-day in iPhones, in an espionage attack.
A threat intelligence analyst first spotted on a popular hacking forum a threat actor that is selling a database allegedly containing the database of the Italian mobile service provider Ho mobile.
OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.
HPE Edgeline Infrastructure Manager suffers from multiple broken authorization flows that allow for administrative function access without authenticating and can allow for arbitrary password changes.
Cassandra Web is vulnerable to directory traversal due to the disabled Rack::Protection module. Apache Cassandra credentials are passed via the CLI in order for the server to auth to it and provide the web access, so they are also one thing that can be captured via the arbitrary file read. Version 0.5.0 is affected.
Threat actors have been discovered distributing a new credential stealer written in AutoHotkey (AHK) scripting language as part of an ongoing campaign that started early 2020. Customers of financial institutions in the US and Canada are among the primary targets for credential exfiltration, with a specific focus on banks such as Scotiabank, Royal Bank of Canada, HSBC, Alterna Bank, Capital One,
Google has patched a bug in its feedback tool incorporated across its services that could be exploited by an attacker to potentially steal screenshots of sensitive Google Docs documents simply by embedding them in a malicious website. The flaw was discovered on July 9 by security researcher Sreeram KL, for which he was awarded $3133.70 as part of Google's Vulnerability Reward Program. <!-
The news is flooded with updates regarding the COVID-19 vaccine. Cyberattacks are targeting the vaccine supply chain. Phishing attacks are exploiting sign-ups for the vaccine. There are even attacks to get access to vaccine data. Sounds a lot like our enterprises every day! We’re all learning about human show more ...
immunology from the headlines, but what are […] The post How Can We Vaccinate Our Networks? appeared first on Security Weekly.