Monday, November 9, 2009

…iPhone. iPhone Gets First Worm

If you’re an Australian and you’ve gone against Apple and jailbroken your iPhone, well, karma is coming to get you. There is a worm on the loose that at this point is only affecting Australian iPhone users. This one replaces the phone’s wallpaper with a picture of Rick Astley.

The vector of attack is via the SSH application where the user has not changed the default password (more karma).

Experts say this likely is the first of many.

CIO Zone
Sophos

Friday, October 16, 2009

Monday, October 5, 2009

National Cyber Security Awareness Month

“National Cyber Security Awareness Month (NCSAM), conducted every October since 2001, is a national public awareness campaign to encourage everyone to protect their computers and our nation’s critical cyber infrastructure.

The success of National Cyber Security Awareness Month rests on all of us doing what we can to engage in awareness activities. There are opportunities for everyone from home users to major corporations and government entities to get involved.”

How To Get Involved

…PII. U.S. Government Suffers 'Largest Release Of Personally Identifiable Information Ever'

While this likely isn’t as bad as it sounds, it is still unbelievable to me that this is still happening. It very clearly shows that there is a lack of interest in keeping this information secure. American voters should be making this a priority for any new elections because eventually no one is going to have any personally identifiable information. The government is going to have carelessly let it all out into the public.

Dark Reading

Tuesday, September 15, 2009

…Infrastrucutre. SANS Top Threats Revealed

SANS has released their Top Cyber Security Risks report. Top two priorities: Unpatched internal systems and vulnerable websites.

“Featuring attack data from TippingPoint intrusion prevention systems protecting 6,000 organizations, vulnerability data from 9,000,000 systems compiled by Qualys, and additional analysis and tutorial by the Internet Storm Center and key SANS faculty members.”

SANS: The Top Cyber Security Risks

Tuesday, September 8, 2009

…Windows O/S. 0-Day BSOD Vulnerability

Word today that there is a 0-Day exploit targeting a flaw in SMB2 that can allow a single packet to crash a Windows Vista/7/2008 machine. Not too many details yet but the code is out and there is a Metasploit module available.

SANS ISC
Metasploit

Thursday, September 3, 2009

…OS X. Snow Leopard; vulnerabilities pre-installed.

image

So it seems OS X 10.6 has an old version of Flash bundled with it and it won’t keep your updated version if you’re upgrading. Somehow in the rush to get 10.6 out the door, Apple didn’t update to the newest version and doesn’t during the install.

We all know that Flash is a significant vector for attack so you need to make sure you update it as soon as you have installed your new breed of Leopard.

Engadget
Daily Tech

Monday, August 31, 2009

…Conversation – Skype Trojan in the Wild

There is evidence that there is a Skype trojan in the wild:

“Symantec describes how the Trojan intercepts API calls to Skype, capturing and storing audio conversations as MP3 files with caller, date, day and time stamps to identify them, and SkypeOut and SkypeIn call designations. The Trojans then attempts to upload the recordings to pre-defined locations after detecting and attempting to bypass named firewall filters.”

This could be extremely dangerous for companies using Skype for cheap international calls. It should be noted, however, that it isn’t clear whether the trojan actually does all of the things it is designed to do.

Risk is listed as low, but it is interesting to see that someone has done this. There is also talk that it is code that was originally written for commercial purposes that has now found its way to the open source market.

Computer World
Symantec

Wednesday, August 26, 2009

…Web Site – 130,000+ Pages Infected

A SQL injection attack discovered last week has now infected more than 130,000 web pages. The sites download a mix of trojans, keystroke loggers and other malware to unsuspecting users from legitimate websites.

Security Focus

The New Threat to Oil Supplies: Hackers

(FILES) This file photo taken in 1977 shows oil platform Statfjord A in the Norwegian sector of the North Sea. A serious oil leak from the platform was reported on May 24, 2008 as a result of which more than 150 workers were evacuated, the rig's operators said.  Two helicopters had been used to evacuate 156 of the 217 people working on the Statfjord A platform, located some 200 kilometres (125 miles) from the Norwegian coast, to nearby oil rigs, another company spokesman said. AFP PHOTO / SCANPIX / Oddvar Walle Jensen ---NORWAY OUT---- (Photo credit should read Oddvar Walle Jensen/AFP/Getty Images)

I had never heard of fully remote off-shore drilling rigs. However they’re a target as they have wireless communication from the rig back to on-shore facilities for all manner of controls.

Read the article here.

Tuesday, August 25, 2009

Health Care Breach Notification Mandated

Catching up on a few things from last week.

“Two new rules were created this week requiring health care organizations, and other entities that interact with personal health records (PHRs), to issue notifications in the event of a data breach.
Both rules were created as part of the American Recovery and Reinvestment Act of 2009 (ARRA), signed into law by President Obama in February.”

One rule requires organizations subject to HIPAA regulations to individuals when breaches of information for 500 people or more occur.

The other rule covers web-based business that collect health information from consumers. They must also issue notifications if a breach occurs.

SC Magazine
FTC - 16 CFR Part 318

Wednesday, August 12, 2009

20 Critical Security Controls V2.0

I was away when this was released but it is a very valuable read. From the introduction:

“This consensus document of 20 crucial controls is designed to begin the process of establishing that prioritized baseline of information security measures and controls. The consensus effort that has produced this document has identified 20 specific technical security controls that are viewed as effective in blocking currently known high-priority attacks, as well as those attack types expected in the near future. Fifteen of these controls can be monitored, at least in part, automatically and continuously. The consensus effort has also identified a second set of five controls that are essential but that do not appear to be able to be monitored continuously or automatically with current technology and practices. Each of the 20 control areas includes multiple individual subcontrols, each specifying actions an organization can take to help improve its defenses.”

20 things that will go a long way to helping ensure that your organizations critical information stays secure.

http://www.sans.org/cag/

Tuesday, August 11, 2009

Patch Tuesday Has Arrived

Lots of patches again today affecting most versions of Windows and Windows Server as well as Office.

You can read all the details here - http://www.microsoft.com/technet/security/bulletin/ms09-aug.mspx

Tuesday, July 7, 2009

Microsoft Warns of Active-X 0-Day

A vulnerability is currently being exploited in Windows 2003 Server and Windows XP via a Video Active-X control. The vulnerability can be exploited by duping a user into downloading the control via a malicious web site using Internet Explorer.

Microsoft has released a web-based script that will turn off the affected control and also allow you to turn it on again when needed – click here. Also, for more technical information, click here.

Monday, June 22, 2009

Could Opera 10 Be Banned in Corporations?

The new version of Opera, version 10, will include a web server as part of a platform called Unite. Opera is touting it for home users who want to be able to publish content but don’t know how to configure their firewalls or are getting blocked by ISP’s. This also means that anyone on your corporate network could setup a web server to serve up files from your network (sound scary? It should.)

Security researchers say this could be a perfect opportunity for botmasters to use the browser as a command and control channel. Not only that but Opera users could unknowingly give access to critical system files as well. The platform uses a group of extensions to the widget system Opera uses to provide enhanced functionality to the browser. While Opera warns developers of the risks, it is up to the developer in the end to decide how careful they are going to be. It also places a significant responsibility on the end user to determine what parts of Unite and the other Opera widgets could give up control to the less honest people on the web.

Other researchers are also warning that it could spur malware authors to write specifically for the Opera browser. As it passes through the Beta phase I’m sure we’ll see more about this and likely some POC code.

Sunbelt Software
Network World – “Could Opera be a Botmaster’s Best Friend
Geeks are Sexy - “Opera Unite – should be “Untie”?”
Opera Software – Opera Unite

Wednesday, June 10, 2009

Accidental Google Hack

Google is a great source of information both good and not so good. Be careful what you post on forums, discussion groups, etc. This is a very interesting blog post:

http://synjunkie.blogspot.com/2009/06/accidental-google-hack.html

“Oh dear...within seconds Bob found a password. Surely it was old and probably not active anymore?”

Friday, June 5, 2009

Checklist a Day: Residential Wireless Audit

If you aren’t sure if your home wireless network is secure (or you don’t think it should be) you should read this document. It takes very little time and will make sure your personal information is secure.

Home Network Audit

Microsoft and Adobe to Issue Patches Tuesday June 9

Adobe is releasing a round of patches Tuesday June 9 that will cover Acrobat 7.x – 9.x for Windows and OS X.

Also on Tuesday Microsoft is releasing 10 patches to cover vulnerabilities in Windows, Excel, and IE.

Get ready to do some heavy testing on Tuesday.

Friday, May 29, 2009

Much Anticipated Cyber Policy Review Out Today

I haven’t had a chance to read it but here is the Cyber Policy Review doc released today by the White House.

http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf

Near Term Action Plan
1.
Appoint a cybersecurity policy official responsible for coordinating the Nation’s cybersecurity policies and activities; establish a strong NSC directorate, under the direction of the cybersecurity policy official dual-hatted to the NSC and the NEC, to coordinate interagency development of cybersecurity-related strategy and policy.
2.
Prepare for the President’s approval an updated national strategy to secure the information and communications infrastructure. This strategy should include continued evaluation of CNCI activities and, where appropriate, build on its successes.
3.
Designate cybersecurity as one of the President’s key management priorities and establish performance metrics.
4.
Designate a privacy and civil liberties official to the NSC cybersecurity directorate.
5.
Convene appropriate interagency mechanisms to conduct interagency-cleared legal analyses of priority cybersecurity-related issues identified during the policy-development process and formulate coherent unified policy guidance that clarifies roles, responsibilities, and the application of agency authorities for cybersecurity-related activities across the Federal government.
6.
Initiate a national public awareness and education campaign to promote cybersecurity.
7.
Develop U.S. Government positions for an international cybersecurity policy framework and strengthen our international partnerships to create initiatives that address the full range of activities, policies, and opportunities associated with cybersecurity.
8.
Prepare a cybersecurity incident response plan; initiate a dialog to enhance public-private partnerships with an eye toward streamlining, aligning, and providing resources to optimize their contribution and engagement
9.
In collaboration with other EOP entities, develop a framework for research and development strategies that focus on game-changing technologies that have the potential to enhance the security, reliability, resilience, and trustworthiness of digital infrastructure; provide the research community access to event data to facilitate developing tools, testing theories, and identifying workable solutions.
10.
Build a cybersecurity-based identity management vision and strategy that addresses privacy and civil liberties interests, leveraging privacy-enhancing technologies for the Nation.

Thursday, May 21, 2009

cyberDefense Competition Preps Students

This looks like a great competition and it's nice to see kids getting this kind of education.

http://current.com/items/90072618_cyberdefense-competition-preps-students-for-real-world-information-assurance.htm

Wednesday, May 13, 2009

Will Windows 7 Overcome Anti-Virus Fear and Loathing?

Will Windows 7 Overcome Anti-Virus Fear and Loathing?:
"But beyond that obvious complaint, over and over, I find that security suites are the buggiest, most troublesome applications on my systems. I’ve spent innumerable hours nursing these “solutions” along, working around them, fixing them, reinstalling them."

I have had very similar feelings to the author with regard to anti-virus software. I haven't yet had a chance to install the Windows 7 RC, however I've been impressed with Microsoft's effort on securing Vista and Windows 7. Unfortunately, as with UAC, you can't always do everything you want. However I think one of the biggest leaps in security with these versions of Windows has been the unprivileged user.

I would never advocate running without anti-virus software, though as it is a necessary part of a defense-in-depth strategy for either home or business use. Maybe someday anti-virus vendors will put as much effort into streamlining and cleaning up their applications as Microsoft has to making their OS more secure out of the box. Maybe...

Security Updates available for Adobe Reader and Acrobat

Time to get patching...

Adobe - Security Bulletins: APSB09-06 Security Updates available for Adobe Reader and Acrobat

Monday, May 11, 2009

Freedom to surf: workers more productive if allowed to use the internet for leisure

Those of you tasked with filter internet usage in your company may want to forward this to the decision makers. It is by no means definitive, but it is an interesting take on internet usage at work.

Freedom to surf: workers more productive if allowed to use the internet for leisure : News : The University of Melbourne: "“People who do surf the Internet for fun at work - within a reasonable limit of less than 20% of their total time in the office - are more productive by about 9% than those who don’t,” he says."

Friday, May 8, 2009

How a man off the street infiltrated a FTSE finance firm | 8 May 2009 | ComputerWeekly.com

This is a truly amazing social engineering story.

How a man off the street infiltrated a FTSE finance firm | 8 May 2009 | ComputerWeekly.com:
"He spent a week in the building undetected, during which the following took place:
  • Greenlees spent the first morning watching people entering and leaving the premisesto get an idea of security in reception.
  • After lunch on that first day he decided to gain access by tailgating people as they swiped their access cards. He pretended to be on the phone and signalled to people that he wanted the third floor.
  • He entered a glass meeting room, calmly hung up his jacket and started to work on his laptop.
  • Within 20 minutes he had seen a confidential document, which had been left on a desk. It concerned the merger of two household names worth £434m.
  • He accessed different floors, rooms, store rooms andfiling cabinets, and found information on desks. He used tricks such as holding two cups of coffee so people would open normally secure doors for him.
  • He gained access to the data room by pretending to carryout a security audit. He was given information about the company's network and was able to plug his laptop in as a result. This gave him access to confidential customer, employee and company data.
  • Greenlees got hold of an internal phone directory and, using an internal phone, he pretended to be an IT support worker. Hemanaged to get usernames and passwords from 17 of the 20 people he asked.
  • He even smuggled another, more technical, consultant in to help him analyse IT systems.
  • Greenlees was soon on first name terms with security staff.
  • "

    Wednesday, May 6, 2009

    Steve Riley on Security : Good bye, and good luck

    Steve Riley on Security : Good bye, and good luck

    Wow! While I know that Steve will go on to help many, many organizations, this is a huge loss to Microsoft. Hopefully this will not set back the Trustworthy Computing initiative, but I'm skeptical.

    Data Ransom Scheme a Surprising Play for Hackers

    "But at a time when botnets are quietly stealing mountains of financial and corporate data and slinking off into the cyber-crime underworld, data being kidnapped and held for ransom is not among the top threats enterprises should be worried about, security pros say. Truth be told, the biggest threats are the ones that attempt to leave no trace for victims to pick up on."

    Data Ransom Scheme a Surprising Play for Hackers

    Tuesday, May 5, 2009

    Virginia Health Data Potentially Held Hostage -- Data Breaches -- InformationWeek

    "It's not immediately clear whether this note is genuine. The Virginia DHP hasn't responded to repeated calls and e-mail messages seeking comment."

    Virginia Health Data Potentially Held Hostage -- Data Breaches -- InformationWeek:

    The only thing scarier than having your data stolen, is to not know whether the data has in fact been stolen. Hopefully the lack of response from the DHP is because they're too busy tring to figure out what to do, not because they're trying to figure out if the data-napper is telling the truth or not.

    Adobe Fixes Announced

    Adobe has announced the release of a Flash Media Server vulnerability fix as well as the expected date of the fix for the Reader zero-day.

    The Reader fix is expected on May 12. Details below:
    Adobe Product Security Incident Response Team (PSIRT): Adobe Reader Issue Update

    Here is the Flash Media Server information:
    Security advisory APSB09-05

    Thursday, April 30, 2009

    Adobe confirms new flaw, recommends turning off JavaScript

    Adobe confirms new flaw, recommends turning off JavaScript - SC Magazine US

    Note that this is only the Acrobat Javascript functionality, you don't need to do it system wide. However, this also makes it pretty tough in a large (i.e. more than 20 workstations) environment unless you're going to roll out a cusomized version of Acrobat. I'd suggest telling your user base not to open any PDF's from the web until this is fixed.

    I found this an interesting quote:
    "This is not the first time that critical vulnerabilities have been found in Adobe's software," Sophos' Graham Cluley said on Wednesday his blog. "And there is growing concern tha the vendor's dominant market share of the PDF reader market is proving extremely attractive for hackers hellbent on infecting as many PCs as possible."

    It is very true, could Adobe be the next big target? The advantage to hackers is that most Adobe products are cross-platform and therefore have the potential to create a lot more havoc. If nothing else however, it will hopefully get Adobe to shape up and be a little better at dealing with this kind of thing. For all their flaws, Microsoft's reporting of vulnerabilities and patching timelines only improved as their products became significant targets.

    Here is Adobe's official response:
    Adobe PSIRT

    Monday, April 27, 2009

    Swine Flu/Pandemic Planning - Updated

    Update #4 – Not a lot new that isn’t already widely public. However the CDC has launched a new site focusing on social media tools for health emergencies in general. It’s at the bottom of this post

    Update #4 – WHO raises alert level to 5, didn’t take long for the spammers to arrive, list of “spamvertised” domains

    Update #3 – Canadian airlines stop flights to Mexico, First Death Reported in US

    Update #2 - Follow the CDC on twitter - @CDCemergency

    Update #1 – The WHO has raised their alert level to 4, additional links at the bottom of the post.

    __________________________________________________________

    While it is still too early to tell if the Swine Flu outbreak will turn into a pandemic, it is never too early to start your planning. There are a number of sites available with some preliminary information as well as ways to track the outbreak and suggestions for planning. I'll continue to update this page as I get more information.

    From the CDC:

    The CDC currently recommends that you cover your nose and mouth with a tissue when you cough or sneeze, wash your hands often with soap and water, avoid touching your eyes, nose or mouth, and try to avoid close contact with sick people.

    The CDC also suggests that if one does contract an illness, they should stay home from work or school and limit contact with others to avoid spreading the infection.

    If you develop an illness with fever and respiratory symptoms and you live in or near a region in which the virus has been identified, the CDC recommends that you immediately seek attention from your health care provider to determine whether further influenza testing is needed.

    Skeleton plan from the SANS Institute:

    Don’t Panic!

    Initial monitoring stage (where we are right now)

    • If you’re sick, stay home
    • Family is sick, stay home
    • Close contact with someone showing symptoms, stay home
    • Wash your hands, cover your cough

    Then, if multiple cases in your area,
    • Think about telling non-essential workers to stay home
    • Recommend workers take kids out of daycare

    Pandemic stage
    • Everyone will be staying home, how will you handle it?
    • Do you have enough laptops?
    • Can your VPN concentrators handle the load

    Some links with valuable and/or interesting information:

    2009 Swine Flu Outbreak Map - Google Maps
    SANS Institute: Pandemic Watch 2009
    Mashable: How to Track Swine Flu Online
    TED Interview with “Virus Hunter” Nathan Wolfe
    Canada Foreign Affairs Department Travel Warnings
    List of domains being used by spammers
    CDC Social Media Tools for Partners and Consumers

    Friday, April 24, 2009

    Bruce Perens - A Cyber-Attack on an American City

    I have been surprised at how little this event has been reported as well. One would think that the press would run with this based on the terrorism theme. Good read, as usual.

    Bruce Perens - A Cyber-Attack on an American City

    Wednesday, April 15, 2009

    The Human Factor in Laptop Encryption

    The link below goes to the sign-up page for a white paper. However, the statistics on the landing page are scary enough -

    "56% of business managers have disengaged their laptop’s encryption "
    "61% of business managers share their passwords, compared to only 4% of IT managers."

    The Human Factor in Laptop Encryption

    Tuesday, April 14, 2009

    Microsoft Security Bulletin Summary for April 2009

    A pile of vulnerability fixes this month from Microsoft including a number with a very high potential for attack.

    TechNet Summary
    Microsoft Security Bulletin Summary for April 2009

    Consumer Friendly Summary
    http://www.microsoft.com/protect/computer/updates/bulletins/200904.mspx

    Monday, April 13, 2009

    I’ll Be Speaking at the WCIS Conference this week.

    This Thursday April 16 I’ll be speaking at the ISACA - Western Canada Information Security Conference in Winnipeg - http://www.wcisc.ca/program2009.htm

    I’ll be doing the end-of-day keynote and will be teaching an excerpt from the SANS SEC401 Security Essentials course. If you’re going to the conference and are curious about SANS courses this is a perfect opportunity to evaluate one for free (well aside from the conference fees…).

    Aside from SANS you can also hear talks from Microsoft, Compugen, RSA, Checkpoint, and many others.

    NERC Advises Industry on Cyber Assets

    So, the North American Electric Reliability Corporation took the bold step of recommending that energy companies take a comprehensive look at how they identify critical cyber assets -Before Grid Hack Reports, NERC Advises Industry on Cyber Assets

    It seems to me that if they haven't even identified these assets then they have a long way to go before they can actually defend them. Let's hope the government gets involved and really forces the operators to start working on security.

    Here is a list of articles relating to the infiltration of the power grid:
    http://online.wsj.com/article/SB123914805204099085.html
    http://fcw.com/Articles/2009/04/08/FERC-needs-to-step-up-oversight-to-safeguard-grid.aspx
    http://www.nextgov.com/nextgov/ng_20090408_1423.php
    http://www.washingtonpost.com/wp-dyn/content/article/2009/04/08/AR2009040803904_pf.html
    http://www.cnn.com/2009/TECH/04/08/grid.threat/index.html
    http://www.eweek.com/c/a/Security/Before-Grid-Hack-Reports-NERC-Advises-Industry-on-Cyber-Assets-479748/

    And the letter from NERC - http://online.wsj.com/public/resources/documents/CIP-002-Identification-Letter-040609.pdf

    Wednesday, April 1, 2009

    Welcome!

    I'm an IT Manager with a specialty in security and a security educator on the side. I strongly believe that education is the key to making our computers and networks secure. this blog is my place to provide information, tips, and explanations for home users as well as systems admins in small companies.

    There is no silver bullet in security, but if you take the time to implement basic security and educate yourself about the threats, as well as the tools available to combat them, you and your information will be much more secure.

    Stay tuned...