More stories

  • in

    Enterprise data breach cost reached record high during COVID-19 pandemic

    The average cost of a data breach has now reached over $4 million, hitting a record high during the COVID-19 pandemic. On Wednesday, IBM Security released its annual “Cost of a Data Breach” report, which estimates that in 2021, a typical data breach experienced by companies now costs $4.24 million per incident, with expenses incurred now 10% higher than in 2020 when 1,000 — 100,000 records are involved. 
    IBM
    So-called “mega” breaches impacting top enterprise firms responsible for the exposure of between 50 million and 65 million records now also come with a higher price tag — reaching an average of $401 million to resolve. After analyzing data breaches reported by over 500 organizations, together with a survey conducted by Ponemon Institute, IBM says that the “drastic operational shifts” experienced by the enterprise due to the pandemic, stay-at-home orders, and the need to quickly turn processes remote prompted higher costs and increased difficulty in containing a security incident once it had taken place. IBM estimates that roughly 60% of organizations moved to the cloud to keep their businesses running — but ramping up security controls did not necessarily follow. When work from home was reported, so was an increase of up to $1 million more when a data breach occurred — with the highest rates of $4.96 million in comparison to $3.89 million. The most common attack vector for enterprises experiencing a data breach was compromised credentials, either taken from data dumps posted online, sold on, or obtained through brute-force attacks. Once a network was infiltrated, customer Personally identifiable information (PII) including names and email addresses was stolen in close to half of cases. 

    Over 2021, it has taken an average of 287 days to detect and contain a data breach, 7 days longer than in the previous year. In total, on average, an organization will not detect intrusion for up to 212 days, and then they will not be able to fully resolve the issue until a further 75 days has passed. 

    Data breaches in the healthcare industry were the most expensive, at an average of $9.23 million, followed by financial services — $5.72 million — and pharmaceuticals, at $5.04 million. However, according to IBM, companies that employ security solutions based on artificial intelligence (AI) algorithms, machine learning, analytics, and encryption all mitigated the potential cost of a breach, saving firms, on average, between $.1 25 million and $1.49 million. “Higher data breach costs are yet another added expense for businesses in the wake of rapid technology shifts during the pandemic,” said Chris McCurdy, VP of IBM Security. “While data breach costs reached a record high over the past year, the report also showed positive signs about the impact of modern security tactics, such as AI, automation, and the adoption of a zero-trust approach — which may pay off in reducing the cost of these incidents further down the line.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    New AI tools aim to improve live-stream content moderation

    While Facebook, Twitter, Google and other popular web-service providers are busy deploying legions of people to mitigate online toxicity in the forms of hate speech, bullying, and sexual/racial abuse, two lesser-known companies have come together in a new research and development project to try and resolve these problems in the live-streaming video industry.The Meet Group, which develops software for interactive dating websites, and Spectrum Labs, which makes an AI-based audio-content moderation platform, on July 27 announced an expansion of their partnership to include a significant R&D commitment into voice moderation aimed at protecting users from online toxicity in TMG’s live-streaming applications.The Meet Group owns several mobile social networking services including MeetMe, hi5, LOVOO, Growlr, Skout, and Tagged. The company has registered millions of mobile daily active users and facilitates tens of millions of conversations daily. Its mobile apps are available on iOS and Android in multiple languages.Hate and personally abusive speech are increasing in many channels, as social-networking companies have reported. Voice moderation is currently a major challenge because recording all content is not possible nor privacy-friendly in an ephemeral live-streaming video context, TMG said. Existing methods of AI voice moderation are slow, tedious, and cost-prohibitive, because they require voice content to be transcribed before the text AI can be applied. Recording, analyzing content at the right timeThe Meet Group and Spectrum Labs are partnering to record content at the right time and proactively and cost-effectively detect toxicity, improve accuracy for moderators, and expand safety measures for users, TMG said.”The method of monitoring live streaming video today is twofold,” TMG CEO Geoff Cook told ZDNet. “One is algorithmic sampling of the stream every five to seven seconds, analyzing it, and taking actions accordingly. The other is the report side; we have 500-plus moderators who are staffing this and putting eyes on the stream in less than a minute after that report button is tapped. We want to record and transcribe that content, analyze it based on what’s going on, index it potentially in some kind of category, take action on it, then make that transcription or recording available to the moderator.”This R&D project is concerned with being more thoughtful about filling in the gaps in the existing moderation.”

    Voice tracking will begin recording from two different triggers: The first happens when a report button is tapped; the tool will begin recording the voice track and automatically send it for analysis. The second trigger will begin voice recording automatically based on comments in the video. If an issue is believed to exist in the video based on the comments in the chat, the live stream proactively will be reported. If a content violation is believed to exist, the recording, along with the behavior flag and transcription, in addition to the live stream itself, if still in progress, will be sent to one of The Meet Group’s 500+ human moderators, who will review the content under the company’s Content and Conduct policy to see if a policy was violated. Live-streaming usage increasing on social networksSocial, dating, and gaming companies are increasingly moving into live streaming video to improve community engagement, Spectrum Labs CEO Justin Davis told ZDNet. “With that shift comes a growing demand for effective moderation for voice,” Davis said. “With a billion minutes spent in its live-streaming platform per month and nearly 200,000 hours of content broadcast per day, The Meet Group is a fantastic partner with whom to work in deploying Spectrum’s toxic-voice detection and moderation platform to deliver best-in-class user safety controls for their moderation team and consumers alike.””User safety is fundamental to what we do, and effective moderation of live-streaming video requires effective moderation of all aspects of the stream, including voice, text chat, and video,” Cook said. “The combination of Spectrum’s technology and moderation solutions with our safety standards and processes create what we believe is a model that others in the live-streaming video industry may look to follow.”The expanded partnership announced July 27 also includes algorithmic moderation of all chats sent within The Meet Group’s live-streaming solution and AI private-chat moderation.The algorithmic chat moderation which will be available to The Meet Group apps as well as the company’s expanding list of vPaaS partners will be screening the nearly 15 million daily chats within the live-streaming feature for hate speech, sexual harassment, and other code-of-conduct violations, TMG said. More

  • in

    Google announces new bug bounty platform

    Google announced a new bug bounty platform as it celebrated the 10-year anniversary of its Vulnerability Rewards Program (VRP). The program led to a total of 11,055 bugs found, 2,022 rewarded researchers and nearly $30 million in total rewards. Jan Keller, technical program manager for Google’s VRP, said that in honor of the program, they are unveiling a new platform:  bughunters.google.com.”This new site brings all of our VRPs (Google, Android, Abuse, Chrome and Play) closer together and provides a single intake form that makes it easier for bug hunters to submit issues,” Keller said. Keller added that the platform will have gamification features and offer more chances for interaction or competition. There will be per-country leaderboards and chances to acquire awards or badges for specific bugs. The company is also creating a more “aesthetically pleasing leaderboard” as a way to help those using their achievements in the VRP to find jobs. There will even be more chances for bug hunters to learn through the new Bug Hunter University.”We know the value that knowledge sharing brings to our community. That’s why we want to make it easier for you to publish your bug reports. Swag will now be supported for special occasions (we heard you loud and clear!),” Keller wrote. The blog post notes that more people should take advantage of other VRP features like the ability to submit patches to open-source software for rewards and potential rewards for research papers on the security of open source. 

    Some open-source software may even be eligible for subsidy, Keller explained. “When we launched our very first VRP, we had no idea how many valid vulnerabilities — if any — would be submitted on the first day. Everyone on the team put in their estimate, with predictions ranging from zero to 20,” Keller said. “In the end, we actually received more than 25 reports, taking all of us by surprise. Since its inception, the VRP program has not only grown significantly in terms of report volume, but the team of security engineers behind it has also expanded – including almost 20 bug hunters who reported vulnerabilities to us and ended up joining the Google VRP team.”Keller went on to thank the Google bug hunter community for their work and urged them to give feedback about the new platform. Hank Schless, senior manager at Lookout, said his company has reported nearly 600 malicious apps found in the Play Store and commended Google for “essentially crowdsourcing their bug and vulnerability reporting.””Google has always taken a more open approach to its software than comparable companies. Android, for example, is built on open-source technology that enables more customization of the OS,” Schless said. “Relying on others to help report on issues is a key part of creating a secure customer experience that can continue to improve. This type of community-based knowledge only serves to make the world a more secure place.” More

  • in

    Average time to fix high severity vulnerabilities grows from 197 days to 246 days in 6 months: report

    The latest AppSec Stats Flash report from NTT Application Security has found that the remediation rate for severe vulnerabilities is on the decline, while the average time to fix is on the rise.The report, which is compiled monthly, covers window of exposure, vulnerability by class and time to fix.The latest report found that the window of exposure for applications has increased over the last six months while the top-5 vulnerability classes by prevalence remain constant, which the researchers behind the report said was a “systematic failure to address these well-known vulnerabilities.”According to NTT Application Security researchers, the time to fix vulnerabilities has dropped 3 days, from 205 days to 202 days. The average time to fix is 202 days, the report found, representing an increase from 197 days at the beginning of the year. The average time to fix for high vulnerabilities grew from 194 days at the beginning of the year to 246 days at the end of June.Remediation rates have also decreased across all vulnerability severities, with rates for critical vulnerabilities falling from 54% at the beginning of the year to 48% at the end of June. Rates for high vulnerabilities decreased from 50% at the beginning of the year to 38% at the end of June.The report notes that many of these vulnerabilities are “pedestrian” and require a low level of effort and skill to exploit. HTTP Response Splitting is one issue that is on the rise, according to the report, and the authors suggest organizations pay closer attention to upgrading underlying open-source components. The vulnerability allows attackers “to modify the user-facing content of a website by tricking the target user into clicking a malicious link or visiting a malicious website.”

    More than 65% of applications in the utilities sector have at least one serious exploitable vulnerability throughout the year, leading all other industries. Education, manufacturing, and retail and wholesale trade applications each saw an increase in their windows of exposure this month. The window of exposure for the education, retail trade and manufacturing industries saw increases of 4% and healthcare rose by 2%.”The Wholesale Trade sector has seen a 15% increase in Window of Exposure, while Utilities has experienced an 11% increase since the beginning of the year,” the researchers wrote. “Manufacturing, Public Administration and Healthcare are large sectors that have each seen a decline in their respective window of exposures, likely due to an increased focus on security following targeted breach activity and/or new regulations.”Two other sectors saw improvements in their window of exposure. The finance and insurance sectors reported a 2% drop in their window of exposure. “This data indicates that industries like Education, Retail, Manufacturing, Healthcare, Utilities and Public Administration continue to suffer more than other industries, including Finance and Insurance,” the report said. “The top-5 vulnerability classes identified in the last three month rolling window remain constant: Information Leakage, Insufficient Session Expiration, Cross Site Scripting, Insufficient Transport Layer Protection & Content Spoofing.”  More

  • in

    Box unveils unlimited e-signature capabilities

    Cloud content management provider Box has released its native e-signature feature, Box Sign, to business and enterprise customers. The company has included this as part of its overall lifecycle of managing content versus selling it as a standalone product. 

    ZDNet Recommends

    The best cloud storage services

    Free and cheap personal and small business cloud storage services are everywhere. But, which one is best for you? Let’s look at the top cloud storage options.

    Read More

    The technology that enables this came to Box through the February acquisition of SignRequest. The release on July 26 gives customers unlimited signatures plus access to a set of application programming interfaces (APIs) to modernize and digitize the process of managing signed documents. The service is available to a subset of customers now but will be rolled out to all users in the next few months. Box Sign includes the following features: documents now can be sent for signature from within the Box web application; ability to sign and request signatures with four standard fields: signature, date, checkbox, and text; templates for common and repeatable processes, such as NDAs;email reminders and deadline notifications to keep projects on track; serial and parallel document processing, so users can sign documents at the same time or sequentially; real-time tracking; and security controls, such as signer authentication via email, tamper seal indicators, and the inclusion of electronic record and signature disclosures if required. Pandemic hastened use of e-signaturesThe use of e-signatures saw a sharp rise during the stay-at-home period of the COVID-19 pandemic. There are many processes that pre-pandemic required an actual wet signature that shifted to e-signatures due to the need for physical distancing. This includes real estate transactions, sales contracts, and even some legal documents, such as employee onboarding. Now that people have grown accustomed to the ease of e-signatures as businesses trust the process, the increased use of them is likely to stay and even grow.While there are many standalone signature services, the use of them can cause some business challenges, particularly in large volumes. The first one is simply the additional cost of paying for a service. Some charge by the document, others by the user, some have capacity limits, etc. Also, there can be issues with version control when creating the document. For example, a salesperson may create a document in Word and then upload it into a standalone service to send to the customer. If the customer then asks for a change, the Word file is updated and re-uploaded, creating another copy–if the original isn’t deleted. Then there is the process of protecting, archiving, and storing executed agreements. Typically, each e-signature service has its own file storage, and the user would need to remember to download the document from that service and then upload it into the corporate content management system.This is where Box’s approach is different, because it thinks about the lifecycle of the e-signature, which includes the actual signature but also the upstream and downstream processes. For example, consider a contract being created where the sales team and legal team would need to collaborate and send versions back and forth, make comments, assign tasks, and so on. This is made easy with the core Box platform when compared with something like email, because everyone is working with the same document. Instead of having to log into a separate tool, the e-signature process is done in Box natively, which means there’s nothing to upload. Once the contract is signed, it stays in Box, and any kind of governance policies can be applied to it. This might include something such as ensuring only certain key people can access the document once it is signed. Difference between e-signatures and digital signatures

    Those new to this area should understand there is a difference between e-signatures and digital signatures. A digital signature is an e-signature with enhanced security. When a document goes through the signing process, the signature is authenticated to validate the person’s identity. That information is stored in the document and will show if anyone tampers with the document after it has been signed. I asked Box about the service, and a spokesman explained that the company is starting with e-signatures but working on digital-signature verification capabilities for release later this year. This includes the ability to use SMS and/or passwords. In parallel, Box is working to integrate with a third-party trust provider to bring full digital-signature capabilities. Customers who require this today can work with a number of partners, such as DocuSign. Box also launches Enterprise Plus suite of toolsBox also introduced its Enterprise Plus suite. This is a new plan that includes the following add-ons: Box Shield, Box Governance, Box Relay, Box Platform, and Box Sign. The suite also includes the ability to send documents for signature directly from Salesforce. Enterprise Plus is available now to Box customers. Businesses currently using Box Digital Suites can keep their current plan or upgrade to Enterprise Plus at no additional cost. Box has done a nice job with the evolution of its product to meet the constantly changing demands of an increasingly digitized world. When the term “collaboration” is used, many people think of products such as Webex and Zoom. While those are certainly important, workers collaborate by sharing, editing, securing, and now signing content; no one does that better than Box, and I look at this company as one of the vendors enabling businesses to shift to composable organizations. The pandemic had an interesting impact on society, because it forced us to try many things with which we may not have been comfortable previously, such as signing documents electronically. Now that people have been exposed to this and have experienced the benefits, the demand is likely to stay high. As businesses adopt e-signatures, it’s important to think of this as part of the overall document management process, versus something done in isolation. More

  • in

    'Praying Mantis' threat actor targeting Windows internet-facing servers with malware

    Windows internet-facing servers are being targeted by a new threat actor operating “almost completely in-memory,” according to a new report from the Sygnia Incident Response team. The report said that the advanced and persistent threat actor — which they have named “Praying Mantis” or “TG1021″ — mostly used deserialization attacks to load a completely volatile, custom malware platform tailored for the Windows IIS environment.”TG1021 uses a custom-made malware framework, built around a common core, tailor-made for IIS servers. The toolset is completely volatile, reflectively loaded into an affected machine’s memory and leaves little-to-no trace on infected targets,” the researchers wrote.”The threat actor utilized the access provided using the IIS to conduct the additional activity, including credential harvesting, reconnaissance, and lateral movement.”Over the last year, the company’s incident response team has been forced to respond to a number of targeted cyber intrusion attacks aimed at several prominent organizations that Sygnia did not name.”Praying Mantis” managed to compromise their networks by exploiting internet-facing servers, and the report notes that the activity observed suggests that the threat actor is highly familiar with the Windows IIS platform and is equipped with 0-day exploits.”The core component, loaded onto internet-facing IIS servers, intercepts and handles any HTTP request received by the server. TG1021 also use an additional stealthy backdoor and several post-exploitation modules to perform network reconnaissance, elevate privileges, and move laterally within networks,” the report explained. 

    “The nature of the activity and general modus-operandi suggest TG1021 to be an experienced stealthy actor, highly aware of operations security. The malware used by TG1021 shows a significant effort to avoid detection, both by actively interfering with logging mechanisms, successfully evading commercial EDRs and by silently awaiting incoming connections, rather than connecting back to a C2 channel and continuously generating traffic.” The actors behind “Praying Mantis” were able to remove all disk-resident tools after using them, effectively giving up on persistency in exchange for stealth. The researchers noted that the actors’ techniques resemble those mentioned in a June 2020 advisory from the Australian Cyber Security Centre, which warned of “Copy-paste compromises.”The Australian notice said the attacks were being launched by “sophisticated state-sponsored actor” that represented “the most significant, coordinated cyber-targeting against Australian institutions the Australian Government has ever observed.”Another notice said the attacks were specifically targeting Australian government institutions and companies. “The actor leveraged a variety of exploits targeting internet -acing servers to gain initial access to target networks. These exploits abuse deserialization mechanisms and known vulnerabilities in web applications and are used to execute a sophisticated memory-resident malware that acts as a backdoor,” the Sygnia report said. “The threat actor uses an arsenal of web application exploits and is an expert in their execution. The swiftness and versatility of operation combined with the sophistication of post-exploitation activities suggest an advanced and highly skilful actor conducted the operations.”The threat actors exploit multiple vulnerabilities to leverage attacks, including a 0-day vulnerability associated with an insecure implementation of the deserialization mechanism within the “Checkbox Survey” web application.They also exploited IIS servers and the standard VIEWSTATE deserialization process to regain access to compromised machines as well as “This technique was used by TG1021 in order to move laterally between IIS servers within an environment. An initial IIS server was compromised using one of the deserialization vulnerabilities listed above. From there, the threat actor was able to conduct reconnaissance activities on a targeted ASP.NET session state MSSQL server and execute the exploit,” the report noted.It added that the threat actors have also taken advantage of vulnerabilities with Telerik products, some of which have weak encryption. Sygnia researchers suggested patching all .NET deserialization vulnerabilities, searching for known indicators of compromise, scanning internet-facing IIS servers with a set of Yara rules and hunting for suspicious activity on internet-facing IIS environments.  More

  • in

    InMotion Hosting review: Well-equipped web hosting

    If you’re looking for a web hosting provider, you have a tremendous number of choices. In my The best web hosting providers article, I looked at 15 providers who offer a wide range of plans.To get a better feel for each individual provider, I set up the most basic account possible and performed a series of tests. In this article, we’re going to dive into InMotion Hosting’s offerings. Stay tuned for in-depth looks at other providers in future articles. Because there’s such variability among plans and offerings among hosting providers, it’s hard to get a good comparison. I’ve found that one of the best ways to see how a provider performs is to look at the least expensive plan they offer. You can expect the least quality, the least attention to detail, and the least performance from such a plan.If the vendor provides good service for the bottom-shelf plans, you can generally assume the better plans will also benefit from similar quality. In the case of InMotion Hosting, the quality was quite reasonable. How pricing really works For the series of hosting reviews I’m doing now, I’m testing basic entry-level plans. In the case of InMotion Hosting, that’s what they call their Launch Plan. To get pricing, I simply went to the company’s main site at InMotionHosting.com. If you want to save some money, though, read to the end of this section.
    InMotion
    Like nearly every hosting provider in the business, their offering is somewhat misleading. There is no option to just get billed $4.99 per month.

    While it looks like you can get the Launch plan for $4.99 per month, that’s only if you prepay for three full years, which means you’re actually paying $179.64. If you want only one year, you’re charging $83.88 to your card (which is $6.99 per month). There’s a gotcha, though: When you renew, you’re going to pay more. This is not uncommon for hosting plans and is a practice I strongly wish the hosting industry would stop. Instead of paying $179.64 for three years, you’re paying $359.64, which is more than double the price — a 100% increase.By the way, if you want to save some money, use the ‘Sales Chat’ button at the top of the InMotion site before you place an order. Just as soon as I asked for clarification, the agent offered me a few bucks off the posted price. It wasn’t much, but it was worth the five minutes it took.I harp on high renewal fees in my coverage of hosting vendors for two key reasons. First, it’s a really nasty feeling suddenly getting a bill that’s hundreds or even thousands of dollars (depending on the plan) more than you expect. Second, switching from one hosting provider to another hosting provider can be a very time-consuming and possibly expensive job, fraught with hassles and potential points of failure. Unfortunately, while not a universal practice, at least half of the hosting vendors I’ve looked at over the years do these promo deals, with big jumps in renewal fees.

    ZDNet Recommends

    What the base Launch plan includes Most bottom-end plans are for one website and one site only. I was pleasantly surprised to find that InMotion’s Launch plan allows for two sites. While most folks starting out with their first website will only need one site, having a second site allows for both growth and experimentation. You can use the second site as a staging site or use it to try out new ideas without risking the performance and functionality of your main site. As with most hosting vendors these days, InMotion claims unlimited disk space, unlimited bandwidth, and unlimited email. In practice, these unlimited values are limited in terms of service. You can’t use your unlimited storage as a giant backup tank where you dump gigabits of video, for example. They also state, “accounts that adversely affect server or network performance must correct these issues or will be asked to upgrade to a virtual or dedicated server.” In other words, if your site suddenly becomes some sort of viral hit (you lucky thing!), you’re probably going to have to pay more to keep your site running. There are a few other wins in InMotion’s most basic plan. First, they host all their plans on SSDs. Even if a site is using caching (which reduces the load on a server), having fast drives is always a plus. Second, the company offers SSH access for even the basic plan. SSH is command-line shell access to a site. Most entry-level website operators don’t need SSH. Trust me; there are times that command-line access is the only thing that will fix a problem. Having SSH is something I consider necessary table stakes if you’re running a site you care about, but not all hosting providers offer it. Third, the company offers a free SSL encryption certificate for all accounts. While the certificate offered isn’t as complete as a fully professional certificate, it will do for most browsers accessing your site, and you won’t have to worry about Chrome flagging your site as “non-secure”. Fourth, and this is big: The company offers a 90-day money-back guarantee. This is great. This not only gives you enough time to learn their service and set up a site but run it for a while and make sure it works well for you. This level of guarantee is something I’d like all hosting providers to offer. Finally, the Launch program offers free email, a website builder, and some free ad and marketing credits. Dashboard access The first thing I like to do when looking at a new hosting provider is exploring their dashboard. Is it an old friend, like cPanel? Is it some sort of janky, barely configured open source or homegrown mess? Or is it a carefully crafted custom dashboard? These are often the ones that worry me the most because they almost always hide restrictions that I’m going to have to work around somehow. When you first log into InMotion’s dashboard, you’re greeted with their account management panel. Here, you can manage your credit card information, get support, and so on. Each account is also presented as a section in the panel.
    InMotion
    This is not the only dashboard you’ll be using. The main dashboard is cPanel, which is common to many, many sites across the web. Some management features are available in the main panel and in cPanel. On the one hand, that elevates some of the more major tasks (like installing apps) to the account panel. On the other hand, that can get confusing. That said, there’s cPanel. While cPanel can be frustrating at times, it’s a very capable interface that lets you manage all aspects of your site. InMotion seems to have enabled all of cPanel’s main capabilities, so even with a basic account, I didn’t find myself restricted in any way, and that’s a nice feeling on an entry-level account.

    Installing WordPress There are certainly other content management and blogging applications you can use besides WordPress. That said, since 32% of the entire web uses WordPress, it’s a good place to start. WordPress sites can be moved from hosting provider to hosting provider, so there’s no lock-in. And by testing a site built with WordPress, we can get some consistency in our testing between hosting providers. I was a little surprised to see that a WordPress site had already been built for me by InMotion. So the very first thing I did was delete it. Softaculous is a standard app installer that makes it about as easy to install a web application as it is to install an app on your phone. Once I was sure that the previous WordPress files were gone and the database was eliminated, I clicked the Softaculous icon. Installation was quick and painless, and in about five minutes, I had a WordPress site up and running. I prefer using Softaculous when it’s available because, although installing WordPress is generally easy even by hand, there are text files that need to be edited, permissions that have to be gotten right, and some general fiddling. Softaculous does that all for you. Then, in cPanel, I dropped into the MySQL panel, created my database, created a database user, and assigned the user to the database. The only gotcha I found was connecting to the database. Rather than specifying localhost, I had to specify localhost:3306, which is the port used to access the database. Overall, adding an app using InMotion’s cPanel went very smoothly. Quick security checks Security is one of the biggest issues when it comes to operating a website. You want to make sure your site is safe from hackers, doesn’t flag Google, and can connect securely to payment engines if you’re running an e-commerce site of any kind. While the scope of this article doesn’t allow for exhaustive security testing, there are a few quick checks that can help indicate whether InMotion’s most inexpensive platform is starting with a secure foundation. The first of these is multi-factor authentication. It’s way too easy for hackers to just bang away at a website’s login screen and brute-force a password. One of my sites has been pounded on by weeks from some hacker or another, but because I have some relatively strong protections in place, the bad actor hasn’t been able to get in. Unfortunately, I have to ding InMotion for what I consider a pretty serious security flaw. When you log into their AMP (Account Management Panel), all you need to provide is a username and password. There is no option to set up any form of multi-factor authentication (MFA). Weirdly enough, if you log directly into your cPanel, you can set up MFA there. That’s most likely because cPanel has authentication built into it. But the cPanel MFA is essentially worthless because you can get into cPanel from your main AMP login. Ouch. I mentioned earlier that InMotion does provide a free SSL certificate, which is definitely a point in the provider’s favor. Even so, SSL is somewhat difficult to set up. The thing is, you’re going to want SSL because Google is starting to flag sites that don’t have secure HTTP connections (i.e., https://), whether or not they’re going to be used for anything that accepts payments. One quick trick on that front, if you use WordPress, is to install the Really Simple SSL plugin. This plugin makes it nearly effortless to add SSL to your WordPress site. As my last quick security check, I like to look at the versions of some of the main system components that run web applications. To make things easy, I chose four components necessary to safe WordPress operation. While other apps may use other components, I’ve found that they’re usually up to date across the board if components are up-to-date for one set of needs. Here are my findings (using the WordPress Health Check plugin), as of the day I tested, for InMotion’s Launch plan: Component Version Provided Current Version How Old PHP 7.032 7.2.11 One month MySQL MariaDB 10.2.17 MariaDB 10.3.10 One month cURL 7.45.0 7.61.1 3 years OpenSSL 1.0.2k-fips 1.0.2p (and 1.1.1) 18 months Note that versions are updated constantly, and so what I found on the day of testing could be different for you. Use the Health Check plugin during your money-back period to check versions and then compare to the official repositories to see if what InMotion is offering is sufficiently up to date. My testing, though, should at least give us an idea of how up-to-date they keep their servers.In general, these results aren’t bad. You kind of need to know the component to know how to read these results. For example, WordPress prefers PHP 7.2, so even though PHP is only one month old, it’s due for an upgrade. On the other hand, even though the cURL library is three years old, it’s up-to-date enough to support TLS 1.2 transactions (used in e-commerce) safely. Also, the company supports OpenSSL 1.0.2k, where the absolutely most current version is 1.1.1. The gotcha is that when OpenSSL went to 1.1, it broke a lot of code. As a result, the OpenSSL project is updating both the 1.0.2 branch and the 1.1 branch. I know, it’s enough to give you a headache. The bottom line is that InMotion is pretty much where it should be in terms of the system components they’re offering on their platform. Performance testing Next, I wanted to see how the site performed using some online performance testing tools. It’s important not to take these tests too seriously. We’re purposely looking at the most low-end offerings of hosting vendors, so the sites they produce are expected to be relatively slow. That said, it’s nice to have an idea of what to expect, and that’s what we’re doing here. The way I test is to use the fresh install of WordPress and then test the “Hello, world” page, which is mostly text, with just an image header. That way, we’re able to focus on the responsiveness of a basic page without being too concerned about media overhead. First, I ran two Pingdom Tools tests, one hitting the site from San Francisco and the second from Germany. Here’s the San Francisco test rating:
    InMotion
    And here’s the same site from Germany: Next, I ran a similar test using the Bitchatcha service: Finally, I hit the site with Load Impact, which sends 25 virtual users over the course of three minutes to the site and then measures the responsiveness. The Load Impact test shows pretty much what you’d expect. As more users are concurrently hitting the site, the responsiveness becomes more irregular. At the beginning of the test, the response time was about 33ms. By the end of the test, response time got as bad as 228ms. This is definitely a characteristic of a lower-cost hosting plan. One of the reasons you pay more for a hosting plan is if your business model can’t sustain a reduction of responsiveness. None of the tests showed spectacular performance, but I wouldn’t expect that for a low-end plan. None of them was terrible, despite the C grades shown in the first set of tests.

    Support responsiveness In a word (well, five words): Way better than I expected. During testing, I had two reasons to reach out in just getting information for this article. Then one standardized test I use across hosting providers to both gauge support and learn about their backup offerings. The first contact was via chat. I suddenly couldn’t log into the AMP and kept getting error messages. I reached out through Sales Chat and was transferred to a tech support chat operator, who asked me to try a different browser. It turned out to be a Chrome issue. Clearing cookies solved the problem. That chat took less than a minute to connect. My second attempt was trying to find out if there was a multi-factor authentication option for the main dashboard, and I just couldn’t find it. That one took 10 minutes to connect. Sadly, that one also told me there was no MFA. The third attempt was via voice. I was initially concerned that there wasn’t any phone support because sometimes chatting and ticket systems can take forever. As it turns out, while there isn’t a phone number to call, there are Skype accounts to connect to. I reached out to inMotion-support, and much to my surprise, I was connected in less than two minutes. The agent I spoke to had some reasonable answers. My first question was, “How often do you backup my account?” His answer: Daily, but each new day overwrites the previous day’s backup. My second question was, “Do you backup my databases? How do I set up daily backups for both files and databases?” For this, he sent me to the cPanel backup option and offered to send me a description of how to set it up. Unfortunately, cPanel doesn’t offer an automatic, daily, incremental backup (so you can restore from last Tuesday, for example). He was unable to tell me how to do that or even refer me to some scripts to do so. There are actually a ton of options. I use the ManageWP.com service from GoDaddy to backup my WordPress sites, but WordPress plugins do the same thing. The agent mentioned it might be possible to set up a cron job to do such an automatic backup but didn’t share any resources for getting the job done. Here’s one way to do it, just for the record.Overall, especially for the cheap seats plan offered by InMotion, I thought support was just fine. Overall conclusion You never want to get your expectations too high for a bottom-end plan. The economics of running such a super-cheap offering is that the provider has to make it up on volume. Professional and enterprise hosting plans with lots of traffic and performance must, out of necessity, cost more. The only way to truly know what it’s like to use a service is to run a live website on it for a few years. That said, I was quite pleased with InMotion’s offering. The basic tests I performed indicated a well-equipped service with attention to upgrades and support. Combine that with a 90-day guarantee, and I can’t think of a reason not to recommend you try it out. You can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, and on YouTube at YouTube.com/DavidGewirtzTV.

    ZDNet Recommends More

  • in

    HP finds 75% of threats were delivered by email in first six months of 2021

    According to the latest HP Wolf Security Threat Insights Report, email is still the most popular way for malware and other threats to be delivered, with more than 75% of threats being sent through email messages. The report — covering the first half of 2021 — is compiled by HP security analysts based on customers who opt to share their threat alerts with the company. HP’s researchers found that there has been a 65% rise in the use of hacking tools downloaded from underground forums and filesharing websites from H2 2020 to H1 2021. Some of the tools are able to solve CAPTCHA challenges using computer vision techniques. Some of the most targeted sectors include manufacturing, shipping, commodity trading, maritime, property and industrial supplies. Ian Pratt, global head of security at HP, said the proliferation of pirated hacking tools and underground forums are allowing previously low-level actors to pose serious risks to enterprise security.””Simultaneously, users continue to fall prey to simple phishing attacks time and time again. Security solutions that arm IT departments to stay ahead of future threats are key to maximizing business protection and resilience,” Pratt said. The report notes that affiliates of Dridex — which is now the top malware family isolated by HP Wolf Security — have been selling access to breached organizations to other threat actors, including ransomware groups. 

    Some criminal groups are now also using CryptBot malware to deliver banking trojan DanaBot, and cyberattackers are increasingly targeting business executives. “In March 2021, HP Wolf Security isolated a multi-stage Visual Basic Script malware campaign targeting senior executives. The targets received a malicious ZIP attachment by email, named using their first and last names,” the report said. “It is likely the threat actor obtained employee names and email addresses from publicly available information online. The archives contained an obfuscated VBS downloader that downloads a second VBS script from a remote server to the user’s %TEMP% folder. The first stage script was heavily obfuscated and had a low detection rate — only 21% of anti-virus scanners on VirusTotal detected it as malicious.”  The company also found a résumé-themed malicious spam campaign that targeted shipping, maritime, logistics and related companies in Italy, Japan, Chile, UK, Pakistan, the US, and the Philippines. According to HP, these attacks exploit a Microsoft Office vulnerability to deploy the commercially available Remcos RAT and gain backdoor access to infected computers.”Threat actors are continuing to exploit old vulnerabilities in Microsoft Office, underlining the need for enterprises to patch out-of-date Office versions in their environments,” HP’s researchers wrote. “We saw a 24% increase in CVE-2017-11882 exploits in H1 2021 compared to H2 2020. Otherwise, there was no significant change in the vulnerabilities exploited by attackers over the reporting period compared to H2 2020.”Alex Holland, the senior malware analyst at HP, said the cybercrime ecosystem continues to develop and transform, with more opportunities for petty cybercriminals to “connect with bigger players within organized crime, and download advanced tools that can bypass defenses and breach systems.” “We’re seeing hackers adapt their techniques to drive greater monetization, selling access on to organized criminal groups so they can launch more sophisticated attacks against organizations,” Holland said. “Malware strains like CryptBot previously would have been a danger to users who use their PCs to store cryptocurrency wallets, but now they also pose a threat to businesses. We see infostealers distributing malware operated by organized criminal groups — who tend to favor ransomware to monetize their access.”The report adds that threats downloaded using web browsers rose by 24%, driven mostly by cryptocurrency mining software.Nearly half of all email phishing lures used invoices and business transactions, while another 15% were replies to intercepted email threads. The days of cybercriminals using the COVID-19 pandemic as a lure seems to have ended, considering less than 1% of emails used the pandemic, and there was a 77% drop from H2 2020 to H1 2021 in its usage. 
    HP
    The report attributes the stolen email thread technique to Emotet, which law enforcement agencies took down in January. “We saw large Emotet campaigns targeting Japanese organizations using lures created from stolen email threads — a technique called email thread hijacking. Following the takedown, the proportion of malware being distributed via Word documents fell significantly because Emotet’s operators preferred to use a Wordbased downloader,” the report said. Archive files, spreadsheets, documents and executable files were the most common types of malicious attachments. According to HP’s team, almost 35% of malware captured had not been previously known. “Cybercriminals are bypassing detection tools with ease by simply tweaking their techniques. We saw a surge in malware distributed via uncommon file types like JAR files — likely used to reduce the chances of being detected by anti-malware scanners,” Holland added. “The same old phishing tricks are reeling in victims, with transaction-themed lures convincing users to click on malicious attachments, links and web pages.”Pratt explained that as cybercrime becomes more organized and smaller players can easily obtain effective tools and monetize attacks by selling on access, there’s no such thing as a minor breach. He noted that the endpoint continues to be a huge focus for cybercriminals. “Their techniques are getting more sophisticated, so it’s more important than ever to have comprehensive and resilient endpoint infrastructure and cyber defense,” Pratt said. “This means utilizing features like threat containment to defend against modern attackers, minimizing the attack surface by eliminating threats from the most common attack vectors — email, browsers, and downloads.” More