thewayne: (Default)
Scammers have found an interesting trick via Google ads, and thus far it only seems to work with them, no other online ad company. They buy an ad, for example, for Microsoft.com, that says 'Call us toll free at 805-xxx-xxxx' and it pops up as a banner at the top of the page!

So you're browsing for whatever, and this page pops up and the URL looks completely legit, and there's a phone number just below the top of the page, do you trust it?

Well, looks like these days you shouldn't.

Might want to spread the word, and article, to your more gullible friends and older relations.

https://arstechnica.com/security/2025/06/tech-support-scammers-inject-malicious-phone-numbers-into-big-name-websites/
thewayne: (Default)
Ignoring the fiasco of Friday's Oval Office meeting between the weird old felon, Mascara Lad, and the Honorable President of Ukraine, the Secretary of Trying To Claim He's SoberDefense just gave Putin a lap dance and the cyber keys to the USA.

He ordered the U.S. military Cyber Command to ignore attacks and incursions from Russia. Allegedly the order states that they are to “stand down from all planning against Russia, including offensive digital actions.”

So that's it. With the exception of the NSA, the nation has no cyber defense against Russian attack.

If we ever needed any proof that there are traitors to the nation in the highest echelons of government, you don't have to look any further.

Benedict Arnold, we've got three new names to join you in infamy.

https://gizmodo.com/trumps-defense-secretary-hegseth-orders-cyber-command-to-stand-down-on-all-russia-operations-2000570343
thewayne: (Default)
This is a wild story, and it happened two years ago.

A security firm, Volexity, was investigating a network breach for an unnamed client in Washington, DC. By studying logs, they had evidence of anomalous and unauthorized traffic indicating a breach, but they couldn't figure out where it was coming from. The client's network was very well secured, and they went over it from top to bottom. Then another attack happened, and this time some critical information was captured: the name of a network domain belonging to a company across the street!

There was no reason to suspect that A was attacking B. They went over and did a network analysis, and what was eventually found was a compromised laptop. The Russians had got into it in such a way that they were able to activate the laptop's wireless card and attack Volexity's client with it!

But that wasn't all.

The Russians used a similar attack from yet another company to get into A!

Company A never detected the intrusion from the Russians, much less that the laptop had been compromised. Except Volexity locked down A and future attacks by the Russians were detected and blocked.

Definitely a clever approach to indirectly attacking someone. Traditionally when the Russians wanted access to a network, they sent an actual team to the business who would attempt wireless hacks. Except one such team was caught trying to get into The Hague and all their equipment was seized. Now they can do it all safely from Mother Russia with no risk of capture.

https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/

https://arstechnica.com/security/2024/11/spies-hack-wi-fi-networks-in-far-off-land-to-launch-attack-on-target-next-door/

https://mobile.slashdot.org/story/24/11/22/2331247/russian-spies-jumped-from-one-network-to-another-via-wi-fi
thewayne: (Default)
We first need to define what an air-gapped computer is. This is a computer with no external network connection: no ethernet cable (going to an outside connection, could have an internal network that has no outside connections), no modem, no WiFi, odds are that the mouse and keyboard are hard-wired rather than Bluetooth. And it's probably kept in a room that is hardened against radio signal penetration and with no windows.

Secure, right?

Ask the Iranians if their centrifuge facility was secure against IT intrusion.

A nation state actor, most likely Russia, figured out an attack against air-gapped PCs. The vector? USB drives. This is why if you want to really secure your network, you take a tube of epoxy to USB and other ports. The attack was first observed launched against a South Asian embassy in Belarus in 2019. It was since been used against an EU agency in 2022. The toolset is known as GoldenJackel.

The basics are quite simple. Infect a computer of someone whom you know works with the secure system that you want in to. Infect every USB device that they plug in, trusting that eventually said USB flash drive will be plugged into the secure system to transfer information to/from. The air-gapped system now gets infected. Information gets mapped out, written to a USB drive, exfiltrated via a non-secure computer, analyzed by the controllers, and they can plot what to exfiltrate next.

It's an interesting write-up, though it can get a little deep in the weeds. It once again proves that computer security is very hard, and trying to keep ultra-secure environments secure is probably even harder. I'm not sure how you'd improve the security in this scenario, you're going to have to move information in and out of the secure air-gapped system for it to be useful, it's a thorny issue.

There's a joke that the only secure computer has no network connection, no power, and is encased in a block of concrete. Very hard to hack that one!

https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/
thewayne: (Default)
Delta sued Crowdstrike in George court for $500mil in actual damages for having to cancel over 7,000 flights over the five day period that its IT systems were kaput, plus punitive reputational damages.

Crowdstrike says its terms of service limits recovery to 2x the fees you pay for the product. Which I suspect is a bit less than $500mil.

The problem is that pretty much every other IT org IN THE WORLD were able to recover their systems within a day, and both Microsoft and Crowdstrike offered to help Delta recover their systems at their own expense. The PRESIDENT of Microsoft couldn't get his calls returned from Delta for THREE DAYS, and the response was 'Nah, we're good'.

Those facts are going to weigh very heavily against Delta in court.

The basic problem is one that's not uncommon in IT: the corporation apparently has been cheap in keeping their IT infrastructure up to date. Old hardware, old versions of software, and likely IT staff who weren't as good at their jobs as they should have been for a company as big as Delta seems to have been the reason the recovery process dragged on for so long. And all of that is going to come out in court, and when it does, I expect the revelation of that soft white underbelly to really drive down their stock price. It doesn't matter how big an airline is, there's always room for the stock price to crash.

Yes, Crowdstrike made mistakes. And Delta probably has some valid claims to make. But to refuse free offers of assistance from both Microsoft and Crowdstrike? No one in their right mind would do that, and a jury is really going to question the rationality of the IT directors and C-Suite minds who said no.

It's possible that Delta may win the suite. But they might get a token amount, like $10. Or the TOS stipulation of twice the cost of the software. Regardless, all their bad practices will be revealed and that will be a topic of discussion at the next shareholder meeting.

https://arstechnica.com/tech-policy/2024/10/crowdstrike-accuses-delta-of-blaming-its-own-it-failures-on-global-outage/


The amusing bit is that Delta did not name Microsoft in the suit, nor sue Microsoft separately. It seems that MS told Delta that they would defend themselves vigorously, and told Delta to preserve all documentation regarding the state of their system, what software, operating systems and versions they use, all communications regarding this incident, etc. Microsoft has an extremely good legal team and would have no problem saying in court "Look, we offered to help. You said no. Why are you suing us?"
thewayne: (Default)
Because of the age of the vulnerability, there's a good chance that it /may/ have been used in the wild. However, it's not an easy attack to implement. It's more suited for non-home networks as it requires inserting a second DHCP server into the network and implementing a DHCP Option 121, which lets you divert non-encrypted VPN traffic onto the network of your choice. You receive the clear traffic, the person on the VPN sees their traffic as still being on the VPN.

Very interesting!

Even more interesting, Android is the only OS immune to it! Baked in to its DHCP system, it ignores changes to its option 121, so it cannot be spoofed in this manner. Linux, Windows, MacOS, iOS are all potentially vulnerable. Linux users/admins can avoid this apparently by using Network Namespaces, I know nothing about this as I'm pretty minimally fluent when it comes to *nix.

To install an additional DHCP server, you need a proverbial evil admin, and it's probably going to be tricky to hide a second DHCP server from network audits. For home users, unless your WiFi router has been compromised, I don't think there's anything to worry about.

https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/
thewayne: (Default)
And what's even harderer? Using an AI coding assistant to write secure programs.

Many, MANY times that I've written about computer insecurity issues I've said explicitly that computer security is HARD. And here we have a prime example.

It turns out that using an AI to help you write a program produces LESS secure programs! But that's not the worse part: the program is more likely to believe that they are writing MORE SECURE CODE!

This is very bad. I've used AI for hints in writing code, looking for little obscure code references that I'm not familiar with. Quite useful. I haven't used it to write entire programs for me, I'm not sure that I could. However, there are people out there paying for subscriptions to ChatGPT 4 and other engines using them heavily, and that is worrisome.

https://arxiv.org/html/2211.03622v3

https://www.schneier.com/blog/archives/2024/01/code-written-with-ai-assistants-is-less-secure.html
thewayne: (Default)
This is very bad.

SSH is one of the fundamental underpinnings that makes the internet and world wide web fundamentally secure. Well, we now know that it has some serious weaknesses.

What it boils down to is compatibility. There's lots of ways to implement SSH. Think of them as a whole bunch of switches, and each switch is a different implementation. Some are strong, some are not. They're all out there so that if I use Switch A and you use Switch B, we can still talk. Very convenient, but also a bit problematic. What happens if Switch C has some weaknesses to it?

The problem is that in lots of SSH implementations, Switch C is left turned on for ease of compatibility. And unless people know and specifically turn Switch C off, and all the other known weak switches off, then there are exploitable weaknesses.

The bad news? LOTS of systems are vulnerable. From the article: "A scan performed by the researchers found that 77 percent of SSH servers exposed to the Internet support at least one of the vulnerable encryption modes, while 57 percent of them list a vulnerable encryption mode as the preferred choice."

77% support the vulnerable mode and 57% PREFERRED IT? YIKES!

The good news is that it requires a Man In The Middle attack (MITMs), and those are not easy to carry out - but they can be done. The even better news is that the security researchers have released a scanner to let server administrators know if they are vulnerable. Some SSH packages have been patched to fix this issue, others I'm sure are in process. But there is also a likelihood that some implementations are not, or that some servers are not being updated for various reasons and will continue to be vulnerable.

I don't think this represents much of a problem for users, so much as for network administrators. Unless you're a very valuable person and likely to be targeted by hackers or world powers, you're not likely to have the resources to pull this off moved against you. As I said, MITMs are not easy to pull off, and if you're not Pentagon R&D level sort of stuff, you're probably safe. But I expect Apple and Microsoft and the various Linux distros will be patching their SSH bundles to make sure everything is good in the very near future, just to make sure.

Warning about the article: it gets REALLY deep into the SSH weeds, so don't bother with it if you're not already wise into the subject.

https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
thewayne: (Default)
So here's the thing. When you're dealing with a fingerprint reader, you've got multiple things interfacing. You've got the operating system, you've got the security library interfacing between the OS and fingerprint reader, and you've got the fingerprint reader.

Microsoft did a good job on the library. It's widely regarded as being secure and does a good job of authenticating fingerprints. And that's not where the problem is. The top three fingerprint scanner readers did a bad job of implementing their software that talks to Microsoft's library, and therein is the flaw.

At a Microsoft security conference, "A Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X all fell victim to fingerprint reader attacks, allowing the researchers to bypass the Windows Hello protection as long as someone was previously using fingerprint authentication on a device." Three very common machines, including one sold by Microsoft themselves - but containing parts made by other vendors.

This is where being hard-assed on your vendors to make sure they're correctly implementing important things - such as security protocols - is VERY important!

I bought a new MacBook Pro earlier this year, and if my Apple Watch is unlocked, when I open up my laptop, it unlocks automatically. The laptop also has a fingerprint reader, but I never use it. My 2015 iMac also unlocks to my Watch - most of the time. It's pretty cool stuff. But if my Watch is off my wrist charging or in the case of my iMac, it just is feeling like being a bit troublesome, I can always enter my password manually.

As I have said many times before, and am sure that I'll be saying many times again, computer security is hard! It only takes one vendor to screw up, and a whole platform line can be compromised.

https://www.theverge.com/2023/11/22/23972220/microsoft-windows-hello-fingerprint-authentication-bypass-security-vulnerability

https://tech.slashdot.org/story/23/11/22/144250/microsofts-windows-hello-fingerprint-authentication-has-been-bypassed
thewayne: (Default)
This is starting out with a warning: this article is really, REALLY deep computer security stuff, DO NOT dig into it if you don't have a minimal understanding of network encryption, SSH, RSA, etcetera! YOU WILL BE LOST!

RSA is a pretty much a deprecated encryption technique. While it was good in its day, it's somewhat broken and has been superseded by better methodologies, both because technology moves ever onward and because it's broken. Apparently it's mainly in use in old systems where companies haven't bothered to replace it: 'If it ain't broke, leave it alone', and just haven't budgeted the funds and time to get it done.

People who try to break computer security have found an interesting way to break RSA even worse. They monitor and sit and wait. The first thing that happens when establishing an SSH connection (and other secure types of connections) is a handshake - the computers send a few packets back and forth, exchange keys (encryption certificates), and get to know each other (proverbially). This handshake process is supposed to be encrypted and secured and not easily spied upon. Except sometimes it isn't.

Computers make mistakes. Sometimes the process that encrypts the handshake fails, it can be a memory bit failure, and this can reveal part of one of the private keys that provides the encryption to the handshake. These keys are generated by multiplying very large prime numbers. If you recover one of the keys, you can then recover the other key by dividing by great whomping big prime numbers. Once you break that, you have access to the certificates that created the secure connection and you can now sit in the middle and impersonate all traffic of either host.

This is what people in computer security call BAD.

OpenSSH applied fixes to try to prevent it, but some major vendors, including Cisco, roll their own code and had some pretty bad vulnerabilities to this problem. They might have fixed it, but when you're running closed-source software (where you've written your own code), rather than relying on an open software where there are tons of eyes looking for problems and testing, it's often weaker than the open source version such as OpenSSH.

Interesting times.

No real solid information as to whether or not this has been exploited in the wild as it's really hard to detect interception attacks like this.

https://arstechnica.com/security/2023/11/hackers-can-steal-ssh-cryptographic-keys-in-new-cutting-edge-attack/
thewayne: (Default)
It was a good week for cybersecurity people!

The first outfit was known as Trigona and was famous for ransom and reveal: pay up or your data is going to be published. They were infiltrated by a group that claims allegiance with Ukrainian. Over the course of several days, they copied all of the data from ten servers then trashed them and defaced their public web server. AND their infrastructure was hidden behind Onion networking! Some very good work done by the attackers. They say all the information is going to be handed over to the appropriate authorities.

The second outfit, Ragnar Locker, was taken down by Interpol and other authorities, raids were conducted in Spain, Czechia, and Latvia. Ragnar is a Ransomware As A Service operation, renting their software to other operations who attack companies then split proceeds with Ragnar. Arrests were made, servers were taken down.

https://arstechnica.com/security/2023/10/two-ransomware-gangs-knocked-out-of-commission-in-a-single-week/
thewayne: (Default)
This is excellent news. Most of Windows is written in C and C++. Those languages have memory problems. Let's use a simple example. There's a programming construct known as an array, it's sort of an indexed list. Let's say we have an array called MyList(10). It has ten elements to it, what's in them doesn't really matter. What happens when you try to reference element 11?

Usually in the C family of languages, you access the memory 'above' the tenth element and what is returned is undefined: we don't know what it will contain. Maybe it overlaps with the password cache, perhaps it has your banking account number in it.

Now, to be fair to C (personally I hate the C/C++ languages, but I firmly believe in 'to each their own'), later versions have better protection against accessing outside array boundaries and things like that which can cause information to leak.

A while back another programming language came to town, Rust. And it is designed, from the clear page, to have memory protection that will prevent access to element 11 and other buffer/memory issues. Which means that code, properly developed! (always a big problem), will theoretically be safer/more secure than C family languages.

Microsoft is now rewriting some subsystems in the Windows operating system into Rust!!!

This is excellent news. The ability to improve security is always a good thing, and this is the first step in doing it. You simply cannot rewrite the entirety of Windows in Rust in one swell foop, but you can rewrite portions of it - letting you see how it works - and progressively get the whole thing redone eventually!

This is now in an Insider edition of Windows 11, meaning it will eventually see the light of day to all users, and should be completely transparent.

In other Rust news, Linux has started rewriting SUDO into Rust. Sudo is a program that lets an account that does not have administrative permission run admin commands if they have the password for it. A fundamental rule of network security, and computer security in general, is to NEVER let your users run their local machines as administrator! Aside from the fact that it gives them far too much control to utterly screw their machine over - and I've seen it! - if your account with admin permissions gets taken over by malware, that's a leverage point to get into the entire network and subvert it!

Speaking as a system administrator, we see far too many programs that won't work if the user is not an administrator on the machine. The normal vendor solution? Make the user an admin. Usually this is caused by the bad coding practice of the developers having admin access on their computers, which really ticks me off. If a software package only runs as administrator, then it's badly written. We can usually develop some selective permissions to make such software work without giving the user admin, but it's always a PITB.

https://www.thurrott.com/windows/windows-11/282995/first-rust-code-shows-up-in-the-windows-11-kernel
thewayne: (Default)
I have/had a high-powered gaming laptop for running my band in Lord of the Rings Online. It was a high-end Asus ROG with a dedicated video card and 32 gig of ram. A friend of mine gave it to me, and though it was now a good four or five or more years old, it did really well - until a couple of months ago. The keyboard had previously begun to flake-out, easily remedied with an external keyboard. But the recent problem was spontaneous crashes - not of the computer, but it would kill my LOTRO sessions! Now, this is a bad thing when you've got 15 copies of LOTRO running and performing for the public.

I finally received my new PC three or four weeks ago. It's pretty awesome: 32 gig ram, SSD/spinning rust hard drives, and water-cooled! But it takes time to properly configure a new system. I think I mostly have LOTRO running the way that I want it, today I decided I needed to get my automatic backup system running.

I use a program called AShampoo, from the .com web site of the same name. I bought it originally from a Humble Bundle back in April '21 and it served me extremely well. I had three backups configured: one ran daily and backed up all my LOTRO music to my Microsoft OneNote cloud account, another weekly would backup the entire C: drive to D:, and another would back up everything to an external drive on command.

So now the software alleged protection silliness begins.

I didn't have access to my Humble Bundle account on the new tower when I wanted to reinstall AShampoo Backup this morning. I go to my Mac, find my key, download the installer, and try to mail it to myself to copy it between the machines.

Nuh-uh. Yahoo Mail is too clever! If you go mailing executable programs, that could cause an infection!

So I renamed the file, changing it from AShampoo.exe to AShampoo.exe.twits. And the email client happily uploaded and mailed it for me. I could have just as easily copied the file to myself via OneDrive, but it didn't occur to me at the moment.

I had the same problem mailing Microsoft Access databases, because they could theoretically contain malicious code embedded in Office VBA macros. Change the extension, smooth sailing.

Apple's MacOS takes a different approach. While they do use file extensions for associating, for example, a .DOC file with your preferred word processing program, when it comes to executable code, they have a much more clever approach. The program has what's known as a resource fork and a data fork. The resource fork identifies the file as a program and probably contains additional info like dates and version. The data fork is the actual program. So the file extension of a Mac program doesn't matter at all: the info is all read through the resource fork.

Windows seems to still be wedded to this file extension garbage, which as I showed above, is trivial to bypass. They would do well to let the program to internally self-identify what it is and how it should be run.
thewayne: (Default)
Did you know that the latest in cars have built-in computer networks? It's called a CAN, a Controller Area Network. And thieves have figured out how to exploit it to steal cars!

It's a lot like IOT, the Internet Of Things. Even the headlights in a car can be intelligent devices, I don't want to think about how much those cost to replace! Anyway, thieves have figured out that if they can get access to the CAN, they can tell it to unlock the car, disable the anti-theft interlocks like engine immobilizers, and they are away!

The basic problem is the exact same problem that the Internet has. When the Internet was being developed back in the early days, the engineers trusted in the better angels of humankind, and didn't accept the fact that the world has a ridiculously large number of people who are shitgibbons and enjoy destroying nice things that everyone could enjoy. This resulted in a huge number of exploitable weaknesses in the original internet as every device that connected to it was trusted to be well-behaved and no malice behind it. It didn't take long for that assumption to be disproven and the engineers have been forever trying to make the Internet more secure.

Same problem with CANs. Every device in the car that plugs into it is trusted. No code-signing, no security certificates, so anything that connects to it has full access to the control computer, which probably doesn't have much in the way of security precautions built-in. Override or trick the computer, and you're in.

https://www.theregister.com/2023/04/06/can_injection_attack_car_theft
thewayne: (Default)
Packt Publishing is running a sale - their ENTIRE inventory of ebooks and videos is $5 per item! Books ranging from $20 on up, only $5! I don't know how long the sale will be running, but it is one heck of a deal.

Packt also has a Book of the Day. Sign up for their mailing list, check the web site daily, and you can bind it to your library and read it anytime you like online. Good way to expand your library in subjects that may be on the periphery of your field but not really core to what you're doing that you might want to dig in to sometime.

https://subscription.packtpub.com/search?utm_source=all%20updates&utm_campaign=2a15eb6572-dollar_5_bestseller_programming_15_12_22


In other CS book news, Humble Bundle has several programming-related books up.

An O'Reilly bundle went up, launched a day or two ago, on "Gift for the technically inclined". 17 days remaining.
https://www.humblebundle.com/books/gifts-for-technically-inclined-oreilly-2022-books

A Wiley Cybersecurity bundle, lots of stuff on pen testing, crypto - both currencies and graphy, etc. 15 days left.
https://www.humblebundle.com/books/holiday-encore-become-cybersecurity-expert-wiley-books

Functional Programming by the Pragmatic Programmers: stuff for Scala, Kotlin, Elm, Elixer, etc. 10 days remaining.
https://www.humblebundle.com/books/functional-programming-pragmatic-programmers-books

And three days left on a No Starch Press bundle on Hacking. I do like No Starch, good people.
https://www.humblebundle.com/books/hacking-no-starch-press-books-2022
thewayne: (Default)
A group dummied up two simple computer breaks that would not require snooping into a laptop's contents and took it in for repairs after setting up hidden key and mouse loggers to see what the techs did, i.e. were they trustworthy custodians of your data. Half of the 'secret shoppers' were men, half women.

The results weren't terribly encouraging. Granted, the number of shops tested was a very small number.

https://arstechnica.com/information-technology/2022/11/half-of-computer-repairs-result-in-snooping-of-sensitive-data-study-finds/

The upshot is that if you must take your computer in for repairs, your best way to defend your data would be to encrypt your user data or documents directory. Many of these shops "required" or tried to brow beat you into giving them your account credentials - even on a battery replacement, which does not require log-on access to the computer!

If you're not comfortable with encryption, and I can't blame you, it's not risk-free, copy all your data to an external hard drive or two (or a cloud account), delete it, empty the recycle bin or trash can or equivalent, then run a disk compression or empty space wiper to make sure they can't get in and try to recover any photos from your system.

Of course, if your computer is completely borked and will not boot reliably enough for you to boot it to encrypt it or clean it, you're screwed and at the mercy of the shop.

Social media programs are tricky. Lots of people have their browsers remember their logins, so just logging out of the account and closing the browser isn't enough. You can export your bookmarks easily to an external device or even email them to yourself, I'm not sure if you can export remembered passwords and then purge them and later re-import them.

Me, I exclusively use web mail like Gmail or Outlook. Those are easy to sign out from, but you then need to delete cookies and have the browser delete the cookies, and that's mildly tricky for the uninitiated. If you're using an actual email client program, then you need to either encrypt your mail bag and close the program so that a password is required, or remove the data and program entirely.

There's two other ways to go. Create a dummy account with no data in it that has no admin capability. That doesn't do you any good if they need to do a malware cleanup or install system-level software for you - then they need an admin account. If you have to give them an admin-level password, then all your data is compromised regardless. You can simply say "I want to stand here and watch you work, I will enter the password as needed." Or you can say, "Screw you, I'm taking my business elsewhere" and leave.

Requiring a password to change a battery is massively beyond ridiculous.
thewayne: (Default)
There's something called 0Auth. It was designed to allow you to sign on to your Google/Apple/Microsoft account - which could be secured with 2FA - and that would pass a security token upstream to whatever account that you're on saying "Hey, this person is A-Okay!" and you'd be in. Or you create another set of web site credentials to maintain specific to that site.

A security researcher has figured out a very clever attack that negates 0Auth called BitB: Browser in the Browser. It uses a series of Cascading Styles Sheets (CSS) that presents a window that looks just like the 0Auth window that does a credential intercept, simulates a login fail, then produces a real login window. A lot of people will fall for that. And you can compromise your entire Google/whatever ecosystem.

The conventional protection methods of looking to see that you're on a HTTPS site and that the site is actually amazon.com instead of amazon.suspiciouswebsite.biz doesn't work. The thing that does is that the imposter 0Auth cannot be moved to on top of the address bar! A true 0Auth address display is an actual web page and can be moved on top of the page that you are logging on to, so if you have any questions or suspicions, move the form and drag it on top of the address bar to make sure: an imposter site won't pass that test.

I don't think this jeopardizes your computer's security, any more than any suspicious web site or download would, it's a way of stealing computer credentials, which is always a concern.

This isn't just a thought exercise, demonstration, or proof of concept: this has been found in the wild. It will be interesting to see how the 0Auth world responds to this. A friend and I wrote something like this to suck account credentials on a mini computer that students weren't logging out of back in the '80s. Simplicity itself. This is much more complicated to implement. There should be some way to trace where the stolen credentials go if an implementation is found.

https://arstechnica.com/information-technology/2022/03/behold-a-password-phishing-site-that-can-trick-even-savvy-users/
thewayne: (Default)
The first one was a doozie. A guy from Nigeria - actually from Nigeria, but he was no prince, created a ransomware scheme where he tried to recruit disgruntled employees to deploy ransomware from INSIDE corporate networks for a cut of the ransom! He was a student who wanted to create his own social media company but had no money and no job, thus no resources to start the operation.

So why not kickstart the money through a crime spree!

He's been arrested by Nigerian authorities. Another problem with having no money is the inability to pay off cops to avoid arrest.

Now, here's the really funny bit. Brian Krebs, former Washington Post reporter, who now solely writes about cybercrime and computer security, wrote about this guy when he launched his scheme. His identity wasn't known at that point. Krebs' web site is Krebsonsecurity.com. This scammer accused him of defaming his operation calling him Mister Krebson. :-) I thought that was hilarious! Guy clearly didn't do his homework on the people investigating him. He apparently wasn't difficult to take down.

https://krebsonsecurity.com/2021/11/arrest-in-ransom-your-employer-email-scheme/


The second story is quite good, but I just have to ask: WHY THE [BLEEP BLANKETY-BLANK] DIDN'T YOU IDIOTS DO THIS TWENTY YEARS AGO? I knew default passwords were a bad idea then, why are you just now coming around to this idea?!!!

The UK Parliament is passing an act that will require most, not all, devices that connect to the internet to not have weak/embedded passwords. Basically, when you get a device (WiFi router, web cam, thermostat, whatever) you MUST change the password on it and it cannot be reset to a factory default password.

Why?

Aside from the fact that it's a stupid and easily-prevented security hole, a British internet provider sent out thousands of WiFi routers with the same simple password, trusting that the users would change it when they set it up. Yeah, right. So rectal haberdashers went around, using these free WiFi hotspots (once you knew what the password was and how to find hotspots where the SSID is not broadcasted) to download childporn, leading to a lot of innocent people being raided by the police because their router was insecure.

From the article:
The Product Security and Telecommunications Infrastructure Bill lays out three new rules:

-easy-to-guess default passwords preloaded on devices are banned. All products now need unique passwords that cannot be reset to factory default
-customers must be told when they buy a device the minimum time it will receive vital security updates and patches. If a product doesn't get either, that must also be disclosed
-security researchers will be given a public point of contact to point out flaws and bugs


That last item will be a pain to implement, it's something that has been clamored for in the security community for ages. There's no standard for that so the implementation is going to be very uneven if it's not codified AND regularly updated! I've seen stories on Krebs and Schnier.com where security researchers have found proof, not just evidence, that a company's network has been compromised, but they haven't been able to reach anyone in the company's IT department to report it!

There are specific exceptions to the act of certain types of devices that are exempt. Still, progress!

https://www.bbc.com/news/technology-59400762


I do some computer installation work for a couple of very small companies in my area, people who are too intimidated to replace their own router. And that's fine, I'm happy to help them, and I make a few bucks on the side. I give them a strong password, it's written down for them, and I record the password in a protected file on my phone so when I'm working with them again later, I've got records in my pocket.

For the iPhone, I use a program called mSecure. I think it cost me $5-10 to buy, it has very strong encryption. If it's not available for the Android universe, I'm sure there's something similar.
thewayne: (Default)
The U.S. government are offering up to a $10,000,000 reward for info leading to the arrest of key members of the group! $5mil for affiliate members!

Recently a member was arrested in Poland and $6mil of cryptocurrency was recovered. He's in prison awaiting extradition to the USA!

The wheels of justice may grind slowly, but they grind exceedingly fine.

Krebs is learning that it seems any organization that is ten years old starts getting really lax about their internal cybersecurity. These guys were brought down because they didn't compartmentalize their hacker identities from their social media identities. People linked them, reported them to the authorities, and now they're behind bars!

https://krebsonsecurity.com/2021/11/revil-ransom-arrest-6m-seizure-and-10m-reward/
thewayne: (Default)
This is quite amusing and interesting.

Their bitcoin stash was seized and emptied. Their DDoS operation was seized: they used this to throw denial of service attacks at people whom they'd already hit with ransomware attacks who weren't paying up. Basically their infrastructure was taken from them and destroyed. No information who did this.

They closed up shop, and if I'm reading this article correctly, they released the decrpyt keys to everyone they'd encrypted but who hadn't paid yet.

Very strange things afoot.

One thing the article mentions is the "REvil Ransomware-as-a-service Platform." That's right, if you have the connections and the money, you can become a ransomware entrepreneur and go around perpetuating this shit and become rich and infamous. It is possible that the REvil people said 'No, you do not screw with major infrastructure, bad boys!' and had the means to tear them apart, or dropped a dime to law enforcement and turned them in. REvil is a pretty big org, and they certainly have the means to tear apart one of their franchise operators.

https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized/


Colonial paid a $5,000,000 ransom shortly after the incident happened to try and restore service as soon as they could. And they received a working de-crypt key promptly. The problem is, with the high levels of encryption that these ransomware packages apply, decryption of vast levels of data take a long time, so Colonial also started doing restores from backup while also decrypting, attacking the problem from two points at the same time.

There are multiple problems with ransomware, paying it or not. If you don't pay it, you have to rebuild your infrastructure from scratch and hope your backups are good. Smart people in IT have a saying that we're fond of that that if you don't test your backups by doing a restore, then you don't have a backup. And a lot of companies that get hit by ransomware all of a sudden find out that they don't have backups. I worked with one such company that got hit by ransomware: turns out they'd been having backup problems and just couldn't be bothered trying to resolve them, too busy.

Plus, the criminals have developed another layer to their model. They have to infiltrate your network to place the encryption software and launch it. So while they're there, they hit your email server and documents directories and exfiltrate that information, they also look for corporate secret stuff like blueprints and things. Lots of companies have secrets that they would rather were not exposed to the light of day, like that $1,000 gadget that everyone is buying that only costs $75 to make, or the CEO's perversity for 14 year olds? Things like that. So if the company doesn't pay the ransom and starts rebuilding, they then come back and double the ransom demand and threaten to dump this dirty laundry in the open press.

And then there's the problem with those that pay and become the victim of poor-quality criminals. They don't hear from the criminals and don't receive a decrypt key or program, or the key will not work, or they demand another ransom and it turns into escalating extortion.

The REvil people try to keep the criminals using their service operating professionally so that if you're hit by a REvil ransomware infection, you know that if you pay the ransom, you'll get your data back. I think it's a good chance that REvil took down DarkSide or dropped a dime and provided critical information for DarkSide's downfall.

We might know some day.


I'm not writing a lot about cybercrime because it's just too damn common. I could spend all my waking hours writing about it, just like I could spend all my time writing about politics. It's just not worth it. I quit working in IT, and I'm staying quit, though I'm still keeping abreast of some of the better blogs and web sites.

June 2025

S M T W T F S
123456 7
8910 11121314
15 1617 18 1920 21
22232425262728
2930     

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 25th, 2025 07:57 am
Powered by Dreamwidth Studios