Ive been saying it often – for years: antivirus is dead. Such a statement might at first seem strange – especially from someone whos been a mover and shaker since the very earliest days of all things viruses and anti-virus in the late eighties and early nineties. However, if you dig a little deeper into the AV show more ...
(RIP) topic and consult some authoritative sources in the (former) field, then the statement quickly becomes quite logical: first, antivirus has turned into protective solutions against everything; second, viruses – as a particular species of malicious program – have died out. Almost. And its that seemingly harmless, negligible almost I just wrote there that causes problems for cybersecurity still to this day – at the back end of the year 2022! And that almost is the basis of this here blogpost today… So. Viruses. Those Red-Listed last remaining few – where are they these days, and what are they up to? It turns out they tend to reside in… one of the most conservative sub-fields of industrial automation: that of operational technology (thats OT – not to be confused with IT). OT is hardware and software that detects or causes a change through the direct monitoring and/or control of industrial equipment, assets, processes and events (– Wikipedia). Basically, OT relates to an industrial control systems (ICS) environment – sometimes referred to as IT in the non-carpeted areas. OT = specialized control systems in factories, power plants, transportation systems, the utilities sector, and the extraction, processing and other heavy industries. Yes – infrastructure; yes – often critical infrastructure. And yes again – its in this industrial/critical infrastructure where dead computer viruses are found today alive and kicking: around 3% of cyber incidents involving OT-computers these days are caused by this type of malware. How so? Actually, the answer was given above: OT – rather, its application in industry – is very conservative. If there were ever a field that firmly believes in the old axiom if it aint broke, dont fix it!, its the field of OT. The main thing in OT is stability, not the latest bells and whistles. New versions, upgrades… even just updates (e.g., to software) are all looked upon with skepticism, if not scorn – if not fear! Indeed, operational technology in industrial control systems commonly features creaking old computers running… Windows 2000 (!) plus assorted other antique software full of vulnerabilities (there are also gigantic holes in security policies, and a whole load of other terrible nightmares for the IT security guy). But back to the non-carpeted areas imagery real quick: the IT kit in the carpeted areas (say, in the office – not the manufacturing shop floor or auxiliary/technical facilities) – this has long been inoculated against all viruses since its timely updated, upgraded and overhauled, while being fully protected by modern cybersecurity solutions. Meanwhile, in the non-carpeted areas (OT), everythings the exact opposite; hence, viruses survive – and prosper. Take a look at the Top-10 most widespread old-school malicious programs to be found in ICS computers in 2022: Sality! Virut! Nimnul! So what does that graph tell us? Actually, first, let me tell you that the percentages shown above relate to a sleeping phase for these old-school viruses. But from time to time such viruses might escape the bounds of a single infected system and spread across the whole network – leading to a serious local epidemic. And instead of full-fledged treatment, good old backups are usually resorted to – and they might not always be clean. Moreover, the infection can affect not only ICS computers, but also programmable logic controllers (PLCs). For example, long before the appearance of Blaster (a proof-of-concept worm able to infect PLCs firmware) the Sality loader was already present; well, almost: not in the firmware, but in the form of a script in HTML files of the web interface. So yes, Sality can make a real mess of automated production processes – but thats not all. It can mess up memory through a malicious driver, and also infect applications files and memory – potentially leading to complete failure of an industrial control system within days. And in case of an active infection, the whole network can be brought down – as Sality has been using peer-to-peer communication for updating the list of active control centers since 2008. The manufacturers of ICS would hardly have written its code with such an aggressive intended working environment in mind. Second, 0.14% in a month – doesnt sound like much, but… it represents thousands of instances of critical infrastructure around the world. Such a shame when you think how such risk could be excluded fully, simply, and with the most fundamental of methods. And third, given that factories cybersecurity is so sieve-like, its no wonder we often hear news about successful attacks on those factories by other types of malware – in particular ransomware (example: Snake vs Honda). Its clear why OT folks are conservative: the main thing for them is that the industrial processes they oversee stay uninterrupted, and bringing in new tech/updating/upgrading can bring interruptions. But what about the interruptions caused by old-school virus attacks permitted by staying behind the times? Indeed, and thats the dilemma OT folks face – and usually they settle for staying behind the times, and thus we get the figures shown in the graph. But guess what? That dilemma can be a thing of the past with our pill… Ideally, there needs to be an ability to innovate, update, upgrade OT kit with no risk to the continuity of industrial processes. And last year we patented a system that ensures just that Briefly, it goes like this: before introducing something new into the processes that MUST keep running, you test them out on a mock-up of the real thing – a special stand that emulates the critical industrial functions. The stand is made up of a configuration of the given OT-network, which turns on the same types of devices used in the industrial process (computers, PLCs, sensors, coms equipment, assorted IoT kit) and has them interact with one-another to replicate the manufacturing or other industrial process. In the input terminal of the stand theres a sample of the tested software, which starts to be observed by a sandbox, which records all its actions, observes network nodes responses, changes in their performance, accessibility of connections and many other atomic characteristics. The data gleaned like this permits building a model that describes the risks of new software, in turn permitting informed decisions to be made as to whether or not to introduce this new software and also what needs to be done to the OT to close the uncovered vulnerabilities. But wait – it gets more interesting… You can test literally anything in the input terminal – not just new software and updates to be deployed. For example, you can test for resilience against malicious programs that get around external means of protection and penetrate a protected industrial network. Such technology has plenty of potential in the field of insurance. Insurance companies will be able to judge cyber-risks better for more accurate calculations of insurance premiums, while the insured wont be overpaying for no good reason. Also, manufacturers of industrial equipment will be able to use stand-testing for certification of software and hardware of third-party developers. Developing this concept further, such a scheme would also suit industry-specific accreditation centers. Then theres the research potential in educational institutions! But for now, lets return to our factory stand… It should go without saying that no emulation can reproduce with 100% accuracy the full variety of processes in OT networks. However, based on the model weve built up based on our vast experience, we kinda already know where the surprises can be expected after introducing new software. Moreover, we can reliably control the situation with other methods – for example with our anomaly early-warning system, MLAD (about which I wrote in detail here), which can pinpoint issues in particular sections of an industrial operation based on direct or even indirect correlations. Thus, millions, if not billions of dollars in losses from incidents can be avoided. So whats stopping OT folks racing to adopt this stand-model of ours? Well, perhaps, so far – since theyre so conservative – theyre not actively looking for a solution like ours as they might not consider one necessary (!). Well do our best to promote our tech to save the industry millions, of course, but in the meantime Ill add this: our stand-model, though complex, will pay for itself very quickly if adopted by a large industrial/infrastructural organization. And its not a subscription model or anything: its bought once, then keeps saving the day (minimizing regulatory, reputational and operational risks) for years without extra investment. Oh, and theres one other thing itll keep saving: OT folks nerves… or sanity.
ConnectWise, a self-hosted, remote desktop software application that is widely used by Managed Service Providers (MSPs), is warning about an unusually sophisticated phishing attack that can let attackers take remote control over user systems when recipients click the included link. The warning comes just weeks after show more ...
the company quietly patched a vulnerability that makes it easier for phishers to launch these attacks. A phishing attack targeting MSP customers using ConnectWise. ConnectWise’s service is extremely popular among MSPs that manage, protect and service large numbers of computers remotely for client organizations. Their product provides a dynamic software client and hosted server that connects two or more computers together, and provides temporary or persistent remote access to those client systems. When a support technician wants to use ConnectWise to remotely administer a computer, the ConnectWise website generates an executable file that is digitally signed by ConnectWise and downloadable by the client via a hyperlink. When the remote user in need of assistance clicks the link, their computer is then directly connected to the computer of the remote administrator, who can then control the client’s computer as if they were seated in front of it. While modern Microsoft Windows operating systems by default will ask users whether they want to run a downloaded executable file, many systems set up for remote administration by MSPs disable that user account control feature for this particular application. In October, security researcher Ken Pyle alerted ConnectWise that their client executable file gets generated based on client-controlled parameters. Meaning, an attacker could craft a ConnectWise client download link that would bounce or proxy the remote connection from the MSP’s servers to a server that the attacker controls. This is dangerous because many organizations that rely on MSPs to manage their computers often set up their networks so that only remote assistance connections coming from their MSP’s networks are allowed. Using a free ConnectWise trial account, Pyle showed the company how easy it was to create a client executable that is cryptographically signed by ConnectWise and can bypass those network restrictions by bouncing the connection through an attacker’s ConnectWise control server. “You as the attacker have full control over the link’s parameters, and that link gets injected into an executable file that is downloaded by the client through an unauthenticated Web interface,” said Pyle, a partner and exploit developer at the security firm Cybir. “I can send this link to a victim, they will click this link, and their workstation will connect back to my instance via a link on your site.” A composite of screenshots researcher Ken Pyle put together to illustrate the ScreenConnect vulnerability. On Nov. 29, roughly the same time Pyle published a blog post about his findings, ConnectWise issued an advisory warning users to be on guard against a new round email phishing attempts that mimic legitimate email alerts the company sends when it detects unusual activity on a customer account. “We are aware of a phishing campaign that mimics ConnectWise Control New Login Alert emails and has the potential to lead to unauthorized access to legitimate Control instances,” the company said. ConnectWise said it released software updates last month that included new protections against the misdirection vulnerability that Pyle reported. But the company said there is no reason to believe the phishers they warned about are exploiting any of the issues reported by Pyle. “Our team quickly triaged the report and determined the risk to partners to be minimal,” ConnectWise spokesperson Tarran Street said. “Nevertheless, the mitigation was simple and presented no risk to partner experience, so we put it into the then-stable 22.8 build and the then-canary 22.9 build, which were released as part of our normal release processes. Due to the low severity of the issue, we didn’t (and don’t plan to) issue a security advisory or alert, since we reserve those notifications for serious security issues.” Pyle said he doubts the issue he reported is unrelated to the phishing attacks ConnectWise is warning about. “They don’t want to talk about my work (no advisory), and they recommend applying the patch they issued in response to my work,” Pyle wrote when asked to comment on ConnectWise’s response. The ConnectWise advisory warned users that before clicking any link that appears to come from their service, users should validate the content includes “domains owned by trusted sources,” and “links to go to places you recognize.” But Pyle said this advice is not terribly useful for customers, because in his attack scenario the phishers can send emails directly from ConnectWise, and the short link that gets presented to the user is a wildcard domain that ends in ConnectWise’s own domain name — screenconnect.com. What’s more, examining the exceedingly long link generated by ConnectWise’s systems offers few insights to the average user. “It’s signed by ConnectWise and comes from them, and if you sign up for a free trial instance, you can email people invites directly from them,” Pyle said. ConnectWise’s warnings come amid breach reports from another major provider of remote support technologies: GoTo disclosed on Nov. 30 that it is investigating a security incident involving “unusual activity within our development environment and third-party cloud storage services. The third-party cloud storage service is currently shared by both GoTo and its affiliate, the password manager service LastPass. In its own advisory on the incident, LastPass said they believe the intruders leveraged information stolen during a previous intrusion in August 2022 to gain access to “certain elements of our customers’ information.” However, LastPass maintains that its “customer passwords remain safely encrypted due to LastPass’s Zero Knowledge architecture.” In short, that architecture means if you lose or forget your all-important master LastPass password — the one needed to unlock access to all of your other passwords stored with them — LastPass can’t help you with that, because they don’t store it. But that same architecture theoretically means that hackers who might break into LastPass’s networks can’t access that information either.
Though there have been fewer than expected publicly reported attacks involving the vulnerability, nearly three-quarters of organizations remain exposed to it.
The threat actor behind an August intrusion used data from that incident to access customer data stored with a third-party cloud service provider, and affiliate GoTo reports breach of development environment.
A vulnerability discovered in GitHub Actions could allow an attacker to poison a developer's pipeline, highlighting the risk that insecure software pipelines pose.
Jefferson Wells, the tax professional services arm of ManpowerGroup, reported on Tuesday that while cybersecurity continues as the No. 1 risk among audit professionals, ESG jumped up to No. 2 on the list of emerging risks.
According to the information posted on Twitter by Yusuke Osumi, a security researcher at Yahoo! Japan, the attacker sends SMS messages from overseas with a Google Play link to lure users to install the malware.
China-linked cyberespionage group UNC4191 has been observed targeting public and private entities in Southeast Asia, Asia-Pacific, the U.S., and Europe, with increased attention on the Philippines. Hackers attempt to steal data from air-gapped systems through self-replicating malware on USB drives. The three malware show more ...
families, dubbed MISTCLOAK, DARKDEW, and BLUEHAZE, can help achieve backdoor access to compromised devices.
A shocking 87% of contractors have a sub-70 Supplier Performance Risk System (SPRS) score, the metric that shows how well a contractor meets Defense Federal Acquisition Regulation Supplement (DFARS) requirements.
CloudSEK released a new advisory about a previously disclosed phishing campaign against the UAE government. The team suggested that the campaign appears to be more substantive than believed earlier. Security experts have noted an additional cluster of phishing domains—camouflaged as the Ministry of Human Resources show more ...
of the UAE government—targeting contractors with lures, such as vendor registration and contract bidding.
Google identified three different exploitation frameworks, namely Heliconia Noise, Heliconia Soft, and Heliconia Files. These frameworks exploit Google Chrome, Windows Defender, and Mozilla Firefox, respectively.
About 72% of organizations remain vulnerable to the Log4Shell vulnerability as of October 1, 2022, Tenable‘s latest telemetry study has revealed, based on data collected from over 500 million tests.
Synopsys researchers found vulnerabilities that enable authentication bypasses and remote code execution in the three apps, namely Lazy Mouse, Telepad, and PC Keyboard, but did not find a single method of exploitation that applies to all three.
In total, Lookout researchers uncovered 251 Android apps on the Google Play store with over 15 million collective downloads. They also identified 35 apps on the Apple App Store that were in the top 100 finance apps in their regional stores.
LockBit 3.0 or 'LockBit Black' includes anti-debugging capabilities, the ability to delete Volume Shadow Copy files and the potential ability to self-spread via legitimate tools.
Analysts at Confiant have been tracking 'CashRewindo' since 2018 and report the threat actor stands out for an unusually crafty approach in setting up malicious advertising operations with great attention to detail.
New findings from cybersecurity firm JFrog show that malware targeting the npm ecosystem can evade security checks by taking advantage of an "unexpected behavior" in the npm command line interface (CLI) tool.
What helped take down KmsdBot was its lack of error-checking and "the coding equivalent of a typo," which led to the malware crashing and stopping to send attack commands due to the wrong number of arguments to the C2 server.
Sirius XM's Connected Vehicle Services has fixed an authorization flaw that would have allowed an attacker to remotely unlock doors and start engines on connected cars knowing only the vehicle identification number (VIN).
The Australian parliament has approved a bill to amend the country's privacy legislation, significantly increasing the maximum penalties to AU$50 million ($33.44 million) for companies and data controllers who suffered large-scale data breaches.
Google this week announced the release of Chrome 108 in the stable channel with patches for 28 vulnerabilities, including 22 reported by external researchers. Of those 22, eight are high-severity issues and 14 are medium-severity flaws.
Russia-based OpZero went on the record recently with a $1.5 million offer for Signal remote code execution (RCE) exploits, more than tripling the relatively stable high-water mark for that app offered by American firm Zerodium.
The backdoor has a wide range of spying capabilities, including monitoring drives and portable devices and exfiltrating files of interest, keylogging and taking screenshots, and stealing credentials from browsers.
A new report conducted by Enterprise Strategy Group (ESG) highlights why today’s security teams find it increasingly difficult to detect and stop cyber threats targeting their organizations.
LastPass chief executive Karim Toubba said in a blog post that an “unauthorized party” recently gained access to some customers’ information stored in a third-party cloud service shared by LastPass and its parent company, GoTo.
The cybercriminals behind the Medibank cyber-attack have posted on the dark web what appears to be the remainder of the customer data they took from the health insurer, stating it is “case closed” for the hack.
The financial services sector has been hit by cybercriminals again and again - ranging from ransomware attacks to DDoS attacks to phishing. There is a 3.5 times increase (257%) in web app and API attacks, year-over-year. 32% of organizations in the financial services sector observed accidental data leakage compared to an average of 25% in other industry verticals.
Disguised as the good guy, these malicious apps known as the “Schoolyard Bully Trojan” are camouflaged as legitimate, educational applications with a wide range of books and topics for their victims to read.
While the threat has evolved, threat actors continue to use phishing attacks to steal credentials and then send fraudulent invoices soliciting payment. Thousands of organizations have lost billions of dollars.
Over the past few days, Keralty and its subsidiaries, EPS Sanitas and Colsanitas, have suffered disruption to their IT operations, the scheduling of medical appointments, and its websites.
Nearly two years after the first series of Microsoft Exchange Server vulnerabilities became known, four collections of high-profile bugs are likely to remain a headache for enterprises for the foreseeable future.
Ubuntu Security Notice 5753-1 - The Qualys Research Team discovered that a race condition existed in the snapd snap-confine binary when preparing the private /tmp mount for a snap. A local attacker could possibly use this issue to escalate privileges and execute arbitrary code.
Ubuntu Security Notice 5752-1 - David Bouman and Billy Jheng Bing Jhong discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Soenke Huster show more ...
discovered that an integer overflow vulnerability existed in the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
More than 300,000 users across 71 countries have been victimized by a new Android threat campaign called the Schoolyard Bully Trojan. Mainly designed to steal Facebook credentials, the malware is camouflaged as legitimate education-themed applications to lure unsuspecting users into downloading them. The apps, which were available for download from the official Google Play Store, have now been
An ongoing analysis into an up-and-coming cryptocurrency mining botnet known as KmsdBot has led to it being accidentally taken down. KmsdBot, as christened by the Akamai Security Intelligence Response Team (SIRT), came to light mid-November 2022 for its ability to brute-force systems with weak SSH credentials. The botnet strikes both Windows and Linux devices spanning a wide range of
Popular password management service LastPass said it's investigating a second security incident that involved attackers accessing some of its customer information. "We recently detected unusual activity within a third-party cloud storage service, which is currently shared by both LastPass and its affiliate, GoTo," LastPass CEO Karim Toubba said. GoTo, formerly called LogMeIn, acquired LastPass
Medibank on Thursday confirmed that the threat actors behind the devastating cyber attack have posted another dump of data stolen from its systems on the dark web after its refusal to pay a ransom. "We are in the process of analyzing the data, but the data released appears to be the data we believed the criminal stole," the Australian health insurer said. "While our investigation continues there
A critical security vulnerability has been disclosed in the Quarkus Java framework that could be potentially exploited to achieve remote code execution on affected systems. Tracked as CVE-2022-4116 (CVSS score: 9.8), the shortcoming could be trivially abused by a malicious actor without any privileges. "The vulnerability is found in the Dev UI Config Editor, which is vulnerable to drive-by
Today's threat landscape is constantly evolving, and now more than ever, organizations and businesses in every sector have a critical need to consistently produce and maintain secure software. While some verticals - like the finance industry, for example - have been subject to regulatory and compliance requirements for some time, we are seeing a steady increase in attention on cybersecurity best
A Barcelona-based surveillanceware vendor named Variston IT is said to have surreptitiously planted spyware on targeted devices by exploiting several zero-day flaws in Google Chrome, Mozilla Firefox, and Windows, some of which date back to December 2018. "Their Heliconia framework exploits n-day vulnerabilities in Chrome, Firefox, and Microsoft Defender, and provides all the tools necessary to
Why deleting your Twitter account may be a very bad idea, how the police unravelled the iSpoof fraud gang, and a trip into outer space (or at least interplanetary file systems). All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by original show co-host Vanja Švajcer.