More stories

  • in

    Average time to fix high severity vulnerabilities grows from 197 days to 246 days in 6 months: report

    The latest AppSec Stats Flash report from NTT Application Security has found that the remediation rate for severe vulnerabilities is on the decline, while the average time to fix is on the rise.The report, which is compiled monthly, covers window of exposure, vulnerability by class and time to fix.The latest report found that the window of exposure for applications has increased over the last six months while the top-5 vulnerability classes by prevalence remain constant, which the researchers behind the report said was a “systematic failure to address these well-known vulnerabilities.”According to NTT Application Security researchers, the time to fix vulnerabilities has dropped 3 days, from 205 days to 202 days. The average time to fix is 202 days, the report found, representing an increase from 197 days at the beginning of the year. The average time to fix for high vulnerabilities grew from 194 days at the beginning of the year to 246 days at the end of June.Remediation rates have also decreased across all vulnerability severities, with rates for critical vulnerabilities falling from 54% at the beginning of the year to 48% at the end of June. Rates for high vulnerabilities decreased from 50% at the beginning of the year to 38% at the end of June.The report notes that many of these vulnerabilities are “pedestrian” and require a low level of effort and skill to exploit. HTTP Response Splitting is one issue that is on the rise, according to the report, and the authors suggest organizations pay closer attention to upgrading underlying open-source components. The vulnerability allows attackers “to modify the user-facing content of a website by tricking the target user into clicking a malicious link or visiting a malicious website.”

    More than 65% of applications in the utilities sector have at least one serious exploitable vulnerability throughout the year, leading all other industries. Education, manufacturing, and retail and wholesale trade applications each saw an increase in their windows of exposure this month. The window of exposure for the education, retail trade and manufacturing industries saw increases of 4% and healthcare rose by 2%.”The Wholesale Trade sector has seen a 15% increase in Window of Exposure, while Utilities has experienced an 11% increase since the beginning of the year,” the researchers wrote. “Manufacturing, Public Administration and Healthcare are large sectors that have each seen a decline in their respective window of exposures, likely due to an increased focus on security following targeted breach activity and/or new regulations.”Two other sectors saw improvements in their window of exposure. The finance and insurance sectors reported a 2% drop in their window of exposure. “This data indicates that industries like Education, Retail, Manufacturing, Healthcare, Utilities and Public Administration continue to suffer more than other industries, including Finance and Insurance,” the report said. “The top-5 vulnerability classes identified in the last three month rolling window remain constant: Information Leakage, Insufficient Session Expiration, Cross Site Scripting, Insufficient Transport Layer Protection & Content Spoofing.”  More

  • in

    Box unveils unlimited e-signature capabilities

    Cloud content management provider Box has released its native e-signature feature, Box Sign, to business and enterprise customers. The company has included this as part of its overall lifecycle of managing content versus selling it as a standalone product. 

    ZDNet Recommends

    The best cloud storage services

    Free and cheap personal and small business cloud storage services are everywhere. But, which one is best for you? Let’s look at the top cloud storage options.

    Read More

    The technology that enables this came to Box through the February acquisition of SignRequest. The release on July 26 gives customers unlimited signatures plus access to a set of application programming interfaces (APIs) to modernize and digitize the process of managing signed documents. The service is available to a subset of customers now but will be rolled out to all users in the next few months. Box Sign includes the following features: documents now can be sent for signature from within the Box web application; ability to sign and request signatures with four standard fields: signature, date, checkbox, and text; templates for common and repeatable processes, such as NDAs;email reminders and deadline notifications to keep projects on track; serial and parallel document processing, so users can sign documents at the same time or sequentially; real-time tracking; and security controls, such as signer authentication via email, tamper seal indicators, and the inclusion of electronic record and signature disclosures if required. Pandemic hastened use of e-signaturesThe use of e-signatures saw a sharp rise during the stay-at-home period of the COVID-19 pandemic. There are many processes that pre-pandemic required an actual wet signature that shifted to e-signatures due to the need for physical distancing. This includes real estate transactions, sales contracts, and even some legal documents, such as employee onboarding. Now that people have grown accustomed to the ease of e-signatures as businesses trust the process, the increased use of them is likely to stay and even grow.While there are many standalone signature services, the use of them can cause some business challenges, particularly in large volumes. The first one is simply the additional cost of paying for a service. Some charge by the document, others by the user, some have capacity limits, etc. Also, there can be issues with version control when creating the document. For example, a salesperson may create a document in Word and then upload it into a standalone service to send to the customer. If the customer then asks for a change, the Word file is updated and re-uploaded, creating another copy–if the original isn’t deleted. Then there is the process of protecting, archiving, and storing executed agreements. Typically, each e-signature service has its own file storage, and the user would need to remember to download the document from that service and then upload it into the corporate content management system.This is where Box’s approach is different, because it thinks about the lifecycle of the e-signature, which includes the actual signature but also the upstream and downstream processes. For example, consider a contract being created where the sales team and legal team would need to collaborate and send versions back and forth, make comments, assign tasks, and so on. This is made easy with the core Box platform when compared with something like email, because everyone is working with the same document. Instead of having to log into a separate tool, the e-signature process is done in Box natively, which means there’s nothing to upload. Once the contract is signed, it stays in Box, and any kind of governance policies can be applied to it. This might include something such as ensuring only certain key people can access the document once it is signed. Difference between e-signatures and digital signatures

    Those new to this area should understand there is a difference between e-signatures and digital signatures. A digital signature is an e-signature with enhanced security. When a document goes through the signing process, the signature is authenticated to validate the person’s identity. That information is stored in the document and will show if anyone tampers with the document after it has been signed. I asked Box about the service, and a spokesman explained that the company is starting with e-signatures but working on digital-signature verification capabilities for release later this year. This includes the ability to use SMS and/or passwords. In parallel, Box is working to integrate with a third-party trust provider to bring full digital-signature capabilities. Customers who require this today can work with a number of partners, such as DocuSign. Box also launches Enterprise Plus suite of toolsBox also introduced its Enterprise Plus suite. This is a new plan that includes the following add-ons: Box Shield, Box Governance, Box Relay, Box Platform, and Box Sign. The suite also includes the ability to send documents for signature directly from Salesforce. Enterprise Plus is available now to Box customers. Businesses currently using Box Digital Suites can keep their current plan or upgrade to Enterprise Plus at no additional cost. Box has done a nice job with the evolution of its product to meet the constantly changing demands of an increasingly digitized world. When the term “collaboration” is used, many people think of products such as Webex and Zoom. While those are certainly important, workers collaborate by sharing, editing, securing, and now signing content; no one does that better than Box, and I look at this company as one of the vendors enabling businesses to shift to composable organizations. The pandemic had an interesting impact on society, because it forced us to try many things with which we may not have been comfortable previously, such as signing documents electronically. Now that people have been exposed to this and have experienced the benefits, the demand is likely to stay high. As businesses adopt e-signatures, it’s important to think of this as part of the overall document management process, versus something done in isolation. More

  • in

    'Praying Mantis' threat actor targeting Windows internet-facing servers with malware

    Windows internet-facing servers are being targeted by a new threat actor operating “almost completely in-memory,” according to a new report from the Sygnia Incident Response team. The report said that the advanced and persistent threat actor — which they have named “Praying Mantis” or “TG1021″ — mostly used deserialization attacks to load a completely volatile, custom malware platform tailored for the Windows IIS environment.”TG1021 uses a custom-made malware framework, built around a common core, tailor-made for IIS servers. The toolset is completely volatile, reflectively loaded into an affected machine’s memory and leaves little-to-no trace on infected targets,” the researchers wrote.”The threat actor utilized the access provided using the IIS to conduct the additional activity, including credential harvesting, reconnaissance, and lateral movement.”Over the last year, the company’s incident response team has been forced to respond to a number of targeted cyber intrusion attacks aimed at several prominent organizations that Sygnia did not name.”Praying Mantis” managed to compromise their networks by exploiting internet-facing servers, and the report notes that the activity observed suggests that the threat actor is highly familiar with the Windows IIS platform and is equipped with 0-day exploits.”The core component, loaded onto internet-facing IIS servers, intercepts and handles any HTTP request received by the server. TG1021 also use an additional stealthy backdoor and several post-exploitation modules to perform network reconnaissance, elevate privileges, and move laterally within networks,” the report explained. 

    “The nature of the activity and general modus-operandi suggest TG1021 to be an experienced stealthy actor, highly aware of operations security. The malware used by TG1021 shows a significant effort to avoid detection, both by actively interfering with logging mechanisms, successfully evading commercial EDRs and by silently awaiting incoming connections, rather than connecting back to a C2 channel and continuously generating traffic.” The actors behind “Praying Mantis” were able to remove all disk-resident tools after using them, effectively giving up on persistency in exchange for stealth. The researchers noted that the actors’ techniques resemble those mentioned in a June 2020 advisory from the Australian Cyber Security Centre, which warned of “Copy-paste compromises.”The Australian notice said the attacks were being launched by “sophisticated state-sponsored actor” that represented “the most significant, coordinated cyber-targeting against Australian institutions the Australian Government has ever observed.”Another notice said the attacks were specifically targeting Australian government institutions and companies. “The actor leveraged a variety of exploits targeting internet -acing servers to gain initial access to target networks. These exploits abuse deserialization mechanisms and known vulnerabilities in web applications and are used to execute a sophisticated memory-resident malware that acts as a backdoor,” the Sygnia report said. “The threat actor uses an arsenal of web application exploits and is an expert in their execution. The swiftness and versatility of operation combined with the sophistication of post-exploitation activities suggest an advanced and highly skilful actor conducted the operations.”The threat actors exploit multiple vulnerabilities to leverage attacks, including a 0-day vulnerability associated with an insecure implementation of the deserialization mechanism within the “Checkbox Survey” web application.They also exploited IIS servers and the standard VIEWSTATE deserialization process to regain access to compromised machines as well as “This technique was used by TG1021 in order to move laterally between IIS servers within an environment. An initial IIS server was compromised using one of the deserialization vulnerabilities listed above. From there, the threat actor was able to conduct reconnaissance activities on a targeted ASP.NET session state MSSQL server and execute the exploit,” the report noted.It added that the threat actors have also taken advantage of vulnerabilities with Telerik products, some of which have weak encryption. Sygnia researchers suggested patching all .NET deserialization vulnerabilities, searching for known indicators of compromise, scanning internet-facing IIS servers with a set of Yara rules and hunting for suspicious activity on internet-facing IIS environments.  More

  • in

    InMotion Hosting review: Well-equipped web hosting

    If you’re looking for a web hosting provider, you have a tremendous number of choices. In my The best web hosting providers article, I looked at 15 providers who offer a wide range of plans.To get a better feel for each individual provider, I set up the most basic account possible and performed a series of tests. In this article, we’re going to dive into InMotion Hosting’s offerings. Stay tuned for in-depth looks at other providers in future articles. Because there’s such variability among plans and offerings among hosting providers, it’s hard to get a good comparison. I’ve found that one of the best ways to see how a provider performs is to look at the least expensive plan they offer. You can expect the least quality, the least attention to detail, and the least performance from such a plan.If the vendor provides good service for the bottom-shelf plans, you can generally assume the better plans will also benefit from similar quality. In the case of InMotion Hosting, the quality was quite reasonable. How pricing really works For the series of hosting reviews I’m doing now, I’m testing basic entry-level plans. In the case of InMotion Hosting, that’s what they call their Launch Plan. To get pricing, I simply went to the company’s main site at InMotionHosting.com. If you want to save some money, though, read to the end of this section.
    InMotion
    Like nearly every hosting provider in the business, their offering is somewhat misleading. There is no option to just get billed $4.99 per month.

    While it looks like you can get the Launch plan for $4.99 per month, that’s only if you prepay for three full years, which means you’re actually paying $179.64. If you want only one year, you’re charging $83.88 to your card (which is $6.99 per month). There’s a gotcha, though: When you renew, you’re going to pay more. This is not uncommon for hosting plans and is a practice I strongly wish the hosting industry would stop. Instead of paying $179.64 for three years, you’re paying $359.64, which is more than double the price — a 100% increase.By the way, if you want to save some money, use the ‘Sales Chat’ button at the top of the InMotion site before you place an order. Just as soon as I asked for clarification, the agent offered me a few bucks off the posted price. It wasn’t much, but it was worth the five minutes it took.I harp on high renewal fees in my coverage of hosting vendors for two key reasons. First, it’s a really nasty feeling suddenly getting a bill that’s hundreds or even thousands of dollars (depending on the plan) more than you expect. Second, switching from one hosting provider to another hosting provider can be a very time-consuming and possibly expensive job, fraught with hassles and potential points of failure. Unfortunately, while not a universal practice, at least half of the hosting vendors I’ve looked at over the years do these promo deals, with big jumps in renewal fees.

    ZDNet Recommends

    What the base Launch plan includes Most bottom-end plans are for one website and one site only. I was pleasantly surprised to find that InMotion’s Launch plan allows for two sites. While most folks starting out with their first website will only need one site, having a second site allows for both growth and experimentation. You can use the second site as a staging site or use it to try out new ideas without risking the performance and functionality of your main site. As with most hosting vendors these days, InMotion claims unlimited disk space, unlimited bandwidth, and unlimited email. In practice, these unlimited values are limited in terms of service. You can’t use your unlimited storage as a giant backup tank where you dump gigabits of video, for example. They also state, “accounts that adversely affect server or network performance must correct these issues or will be asked to upgrade to a virtual or dedicated server.” In other words, if your site suddenly becomes some sort of viral hit (you lucky thing!), you’re probably going to have to pay more to keep your site running. There are a few other wins in InMotion’s most basic plan. First, they host all their plans on SSDs. Even if a site is using caching (which reduces the load on a server), having fast drives is always a plus. Second, the company offers SSH access for even the basic plan. SSH is command-line shell access to a site. Most entry-level website operators don’t need SSH. Trust me; there are times that command-line access is the only thing that will fix a problem. Having SSH is something I consider necessary table stakes if you’re running a site you care about, but not all hosting providers offer it. Third, the company offers a free SSL encryption certificate for all accounts. While the certificate offered isn’t as complete as a fully professional certificate, it will do for most browsers accessing your site, and you won’t have to worry about Chrome flagging your site as “non-secure”. Fourth, and this is big: The company offers a 90-day money-back guarantee. This is great. This not only gives you enough time to learn their service and set up a site but run it for a while and make sure it works well for you. This level of guarantee is something I’d like all hosting providers to offer. Finally, the Launch program offers free email, a website builder, and some free ad and marketing credits. Dashboard access The first thing I like to do when looking at a new hosting provider is exploring their dashboard. Is it an old friend, like cPanel? Is it some sort of janky, barely configured open source or homegrown mess? Or is it a carefully crafted custom dashboard? These are often the ones that worry me the most because they almost always hide restrictions that I’m going to have to work around somehow. When you first log into InMotion’s dashboard, you’re greeted with their account management panel. Here, you can manage your credit card information, get support, and so on. Each account is also presented as a section in the panel.
    InMotion
    This is not the only dashboard you’ll be using. The main dashboard is cPanel, which is common to many, many sites across the web. Some management features are available in the main panel and in cPanel. On the one hand, that elevates some of the more major tasks (like installing apps) to the account panel. On the other hand, that can get confusing. That said, there’s cPanel. While cPanel can be frustrating at times, it’s a very capable interface that lets you manage all aspects of your site. InMotion seems to have enabled all of cPanel’s main capabilities, so even with a basic account, I didn’t find myself restricted in any way, and that’s a nice feeling on an entry-level account.

    Installing WordPress There are certainly other content management and blogging applications you can use besides WordPress. That said, since 32% of the entire web uses WordPress, it’s a good place to start. WordPress sites can be moved from hosting provider to hosting provider, so there’s no lock-in. And by testing a site built with WordPress, we can get some consistency in our testing between hosting providers. I was a little surprised to see that a WordPress site had already been built for me by InMotion. So the very first thing I did was delete it. Softaculous is a standard app installer that makes it about as easy to install a web application as it is to install an app on your phone. Once I was sure that the previous WordPress files were gone and the database was eliminated, I clicked the Softaculous icon. Installation was quick and painless, and in about five minutes, I had a WordPress site up and running. I prefer using Softaculous when it’s available because, although installing WordPress is generally easy even by hand, there are text files that need to be edited, permissions that have to be gotten right, and some general fiddling. Softaculous does that all for you. Then, in cPanel, I dropped into the MySQL panel, created my database, created a database user, and assigned the user to the database. The only gotcha I found was connecting to the database. Rather than specifying localhost, I had to specify localhost:3306, which is the port used to access the database. Overall, adding an app using InMotion’s cPanel went very smoothly. Quick security checks Security is one of the biggest issues when it comes to operating a website. You want to make sure your site is safe from hackers, doesn’t flag Google, and can connect securely to payment engines if you’re running an e-commerce site of any kind. While the scope of this article doesn’t allow for exhaustive security testing, there are a few quick checks that can help indicate whether InMotion’s most inexpensive platform is starting with a secure foundation. The first of these is multi-factor authentication. It’s way too easy for hackers to just bang away at a website’s login screen and brute-force a password. One of my sites has been pounded on by weeks from some hacker or another, but because I have some relatively strong protections in place, the bad actor hasn’t been able to get in. Unfortunately, I have to ding InMotion for what I consider a pretty serious security flaw. When you log into their AMP (Account Management Panel), all you need to provide is a username and password. There is no option to set up any form of multi-factor authentication (MFA). Weirdly enough, if you log directly into your cPanel, you can set up MFA there. That’s most likely because cPanel has authentication built into it. But the cPanel MFA is essentially worthless because you can get into cPanel from your main AMP login. Ouch. I mentioned earlier that InMotion does provide a free SSL certificate, which is definitely a point in the provider’s favor. Even so, SSL is somewhat difficult to set up. The thing is, you’re going to want SSL because Google is starting to flag sites that don’t have secure HTTP connections (i.e., https://), whether or not they’re going to be used for anything that accepts payments. One quick trick on that front, if you use WordPress, is to install the Really Simple SSL plugin. This plugin makes it nearly effortless to add SSL to your WordPress site. As my last quick security check, I like to look at the versions of some of the main system components that run web applications. To make things easy, I chose four components necessary to safe WordPress operation. While other apps may use other components, I’ve found that they’re usually up to date across the board if components are up-to-date for one set of needs. Here are my findings (using the WordPress Health Check plugin), as of the day I tested, for InMotion’s Launch plan: Component Version Provided Current Version How Old PHP 7.032 7.2.11 One month MySQL MariaDB 10.2.17 MariaDB 10.3.10 One month cURL 7.45.0 7.61.1 3 years OpenSSL 1.0.2k-fips 1.0.2p (and 1.1.1) 18 months Note that versions are updated constantly, and so what I found on the day of testing could be different for you. Use the Health Check plugin during your money-back period to check versions and then compare to the official repositories to see if what InMotion is offering is sufficiently up to date. My testing, though, should at least give us an idea of how up-to-date they keep their servers.In general, these results aren’t bad. You kind of need to know the component to know how to read these results. For example, WordPress prefers PHP 7.2, so even though PHP is only one month old, it’s due for an upgrade. On the other hand, even though the cURL library is three years old, it’s up-to-date enough to support TLS 1.2 transactions (used in e-commerce) safely. Also, the company supports OpenSSL 1.0.2k, where the absolutely most current version is 1.1.1. The gotcha is that when OpenSSL went to 1.1, it broke a lot of code. As a result, the OpenSSL project is updating both the 1.0.2 branch and the 1.1 branch. I know, it’s enough to give you a headache. The bottom line is that InMotion is pretty much where it should be in terms of the system components they’re offering on their platform. Performance testing Next, I wanted to see how the site performed using some online performance testing tools. It’s important not to take these tests too seriously. We’re purposely looking at the most low-end offerings of hosting vendors, so the sites they produce are expected to be relatively slow. That said, it’s nice to have an idea of what to expect, and that’s what we’re doing here. The way I test is to use the fresh install of WordPress and then test the “Hello, world” page, which is mostly text, with just an image header. That way, we’re able to focus on the responsiveness of a basic page without being too concerned about media overhead. First, I ran two Pingdom Tools tests, one hitting the site from San Francisco and the second from Germany. Here’s the San Francisco test rating:
    InMotion
    And here’s the same site from Germany: Next, I ran a similar test using the Bitchatcha service: Finally, I hit the site with Load Impact, which sends 25 virtual users over the course of three minutes to the site and then measures the responsiveness. The Load Impact test shows pretty much what you’d expect. As more users are concurrently hitting the site, the responsiveness becomes more irregular. At the beginning of the test, the response time was about 33ms. By the end of the test, response time got as bad as 228ms. This is definitely a characteristic of a lower-cost hosting plan. One of the reasons you pay more for a hosting plan is if your business model can’t sustain a reduction of responsiveness. None of the tests showed spectacular performance, but I wouldn’t expect that for a low-end plan. None of them was terrible, despite the C grades shown in the first set of tests.

    Support responsiveness In a word (well, five words): Way better than I expected. During testing, I had two reasons to reach out in just getting information for this article. Then one standardized test I use across hosting providers to both gauge support and learn about their backup offerings. The first contact was via chat. I suddenly couldn’t log into the AMP and kept getting error messages. I reached out through Sales Chat and was transferred to a tech support chat operator, who asked me to try a different browser. It turned out to be a Chrome issue. Clearing cookies solved the problem. That chat took less than a minute to connect. My second attempt was trying to find out if there was a multi-factor authentication option for the main dashboard, and I just couldn’t find it. That one took 10 minutes to connect. Sadly, that one also told me there was no MFA. The third attempt was via voice. I was initially concerned that there wasn’t any phone support because sometimes chatting and ticket systems can take forever. As it turns out, while there isn’t a phone number to call, there are Skype accounts to connect to. I reached out to inMotion-support, and much to my surprise, I was connected in less than two minutes. The agent I spoke to had some reasonable answers. My first question was, “How often do you backup my account?” His answer: Daily, but each new day overwrites the previous day’s backup. My second question was, “Do you backup my databases? How do I set up daily backups for both files and databases?” For this, he sent me to the cPanel backup option and offered to send me a description of how to set it up. Unfortunately, cPanel doesn’t offer an automatic, daily, incremental backup (so you can restore from last Tuesday, for example). He was unable to tell me how to do that or even refer me to some scripts to do so. There are actually a ton of options. I use the ManageWP.com service from GoDaddy to backup my WordPress sites, but WordPress plugins do the same thing. The agent mentioned it might be possible to set up a cron job to do such an automatic backup but didn’t share any resources for getting the job done. Here’s one way to do it, just for the record.Overall, especially for the cheap seats plan offered by InMotion, I thought support was just fine. Overall conclusion You never want to get your expectations too high for a bottom-end plan. The economics of running such a super-cheap offering is that the provider has to make it up on volume. Professional and enterprise hosting plans with lots of traffic and performance must, out of necessity, cost more. The only way to truly know what it’s like to use a service is to run a live website on it for a few years. That said, I was quite pleased with InMotion’s offering. The basic tests I performed indicated a well-equipped service with attention to upgrades and support. Combine that with a 90-day guarantee, and I can’t think of a reason not to recommend you try it out. You can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, and on YouTube at YouTube.com/DavidGewirtzTV.

    ZDNet Recommends More

  • in

    HP finds 75% of threats were delivered by email in first six months of 2021

    According to the latest HP Wolf Security Threat Insights Report, email is still the most popular way for malware and other threats to be delivered, with more than 75% of threats being sent through email messages. The report — covering the first half of 2021 — is compiled by HP security analysts based on customers who opt to share their threat alerts with the company. HP’s researchers found that there has been a 65% rise in the use of hacking tools downloaded from underground forums and filesharing websites from H2 2020 to H1 2021. Some of the tools are able to solve CAPTCHA challenges using computer vision techniques. Some of the most targeted sectors include manufacturing, shipping, commodity trading, maritime, property and industrial supplies. Ian Pratt, global head of security at HP, said the proliferation of pirated hacking tools and underground forums are allowing previously low-level actors to pose serious risks to enterprise security.””Simultaneously, users continue to fall prey to simple phishing attacks time and time again. Security solutions that arm IT departments to stay ahead of future threats are key to maximizing business protection and resilience,” Pratt said. The report notes that affiliates of Dridex — which is now the top malware family isolated by HP Wolf Security — have been selling access to breached organizations to other threat actors, including ransomware groups. 

    Some criminal groups are now also using CryptBot malware to deliver banking trojan DanaBot, and cyberattackers are increasingly targeting business executives. “In March 2021, HP Wolf Security isolated a multi-stage Visual Basic Script malware campaign targeting senior executives. The targets received a malicious ZIP attachment by email, named using their first and last names,” the report said. “It is likely the threat actor obtained employee names and email addresses from publicly available information online. The archives contained an obfuscated VBS downloader that downloads a second VBS script from a remote server to the user’s %TEMP% folder. The first stage script was heavily obfuscated and had a low detection rate — only 21% of anti-virus scanners on VirusTotal detected it as malicious.”  The company also found a résumé-themed malicious spam campaign that targeted shipping, maritime, logistics and related companies in Italy, Japan, Chile, UK, Pakistan, the US, and the Philippines. According to HP, these attacks exploit a Microsoft Office vulnerability to deploy the commercially available Remcos RAT and gain backdoor access to infected computers.”Threat actors are continuing to exploit old vulnerabilities in Microsoft Office, underlining the need for enterprises to patch out-of-date Office versions in their environments,” HP’s researchers wrote. “We saw a 24% increase in CVE-2017-11882 exploits in H1 2021 compared to H2 2020. Otherwise, there was no significant change in the vulnerabilities exploited by attackers over the reporting period compared to H2 2020.”Alex Holland, the senior malware analyst at HP, said the cybercrime ecosystem continues to develop and transform, with more opportunities for petty cybercriminals to “connect with bigger players within organized crime, and download advanced tools that can bypass defenses and breach systems.” “We’re seeing hackers adapt their techniques to drive greater monetization, selling access on to organized criminal groups so they can launch more sophisticated attacks against organizations,” Holland said. “Malware strains like CryptBot previously would have been a danger to users who use their PCs to store cryptocurrency wallets, but now they also pose a threat to businesses. We see infostealers distributing malware operated by organized criminal groups — who tend to favor ransomware to monetize their access.”The report adds that threats downloaded using web browsers rose by 24%, driven mostly by cryptocurrency mining software.Nearly half of all email phishing lures used invoices and business transactions, while another 15% were replies to intercepted email threads. The days of cybercriminals using the COVID-19 pandemic as a lure seems to have ended, considering less than 1% of emails used the pandemic, and there was a 77% drop from H2 2020 to H1 2021 in its usage. 
    HP
    The report attributes the stolen email thread technique to Emotet, which law enforcement agencies took down in January. “We saw large Emotet campaigns targeting Japanese organizations using lures created from stolen email threads — a technique called email thread hijacking. Following the takedown, the proportion of malware being distributed via Word documents fell significantly because Emotet’s operators preferred to use a Wordbased downloader,” the report said. Archive files, spreadsheets, documents and executable files were the most common types of malicious attachments. According to HP’s team, almost 35% of malware captured had not been previously known. “Cybercriminals are bypassing detection tools with ease by simply tweaking their techniques. We saw a surge in malware distributed via uncommon file types like JAR files — likely used to reduce the chances of being detected by anti-malware scanners,” Holland added. “The same old phishing tricks are reeling in victims, with transaction-themed lures convincing users to click on malicious attachments, links and web pages.”Pratt explained that as cybercrime becomes more organized and smaller players can easily obtain effective tools and monetize attacks by selling on access, there’s no such thing as a minor breach. He noted that the endpoint continues to be a huge focus for cybercriminals. “Their techniques are getting more sophisticated, so it’s more important than ever to have comprehensive and resilient endpoint infrastructure and cyber defense,” Pratt said. “This means utilizing features like threat containment to defend against modern attackers, minimizing the attack surface by eliminating threats from the most common attack vectors — email, browsers, and downloads.” More

  • in

    Verizon and Samsung complete virtualised 5G trial on C-band spectrum

    Verizon and Samsung said on Tuesday they have completed a fully virtualised 5G data session over C-band spectrum — from 4GHz to 8GHz — in a live network environment. The session was done in preparation for the US telco’s expansion of its 5G Ultra Wideband serivce, its mmWave service, which will use its newly acquired C-band spectrum. The pair’s trials were conducted over Verizon’s network in Texas, Connecticut, and Massachusetts. They used Samsung’s virtualised RAN (vRAN) solution, which is built on its own software stack, and C-band 64T64R Massive MIMO radio in coordination with Verizon’s virtualised core. The trials achieved speeds level with that of traditional hardware equipment, the pair claimed. “We have been driving the industry to large scale virtualisation using the advanced architecture we have built into our network from the core to the far edge. This recent accomplishment paves the way for a more programmable, efficient, and scalable 5G network,” Verizon senior vice president of technology planning Adam Koeppe said. See also: The winner in the war on Huawei is SamsungAccording to Verizon and Samsung, virtualisation is “critical” for delivering services promised by advanced 5G networks, such as massive scale IoT solutions, autonomous robotics in manufacturing, and smart city solutions.

    Cloud-native virtualised architecture will offer greater flexibility, faster delivery of services, greater scalability, and improved cost efficiency in networks, paving the way for wider scale mobile edge computing and network slicing, they said. The technology will also allow Verizon to rapidly respond to customers’ varied latency and computing needs, they added. By the first quarter of next year, the US telco said it expects to put its new 5G C-band spectrum into service in 46 markets, with its 5G Ultra Wideband service to be made available to 100 million people. Coverage will expand to 175 million people over 2022 and 2023, the company said.  When the remaining C-band spectrum is cleared for use, Verizon will offer its 5G Ultra Wideband service on C-band to 250 million people in 2024, it added. Last year, Samsung signed a deal worth $6.6 billion to supply Verizon with network equipment. RELATED COVERAGE More

  • in

    Best Mac VPN 2021: VPN services for Apple devices

    Because I write so often about VPNs, I tend to get a lot of reader questions. In this article, I’m going to do my best to answer questions from readers about using a VPN on a Mac. I’m also going to recommend VPNs that all must have a certain set of specs: Kill switch, no leaking, and fast. These are our table stakes for recommendations.  The VPNs below allow five or more simultaneous connections, as well, so if you have an iPhone and an iPad as well as a Mac, you can protect all three with one license. With that, let’s dive in.

    Heavy hitter in the VPN market

    Mac, iPad, iPhone: Yes, yes, and yesSimultaneous connections: 6Kill switch: YesLogging: Email address and billing information onlyTrial: 30-day refund guaranteeCountries: 60Best price: $89 for two years ($3.30 per month)NordVPN is one of the heavy hitters in the VPN market. In our aggregate speed test ranking, it came in first overall. We found that Nord’s user interface was crisp and clean, and the product was quick and easy to install. It also doesn’t get in the way. It runs when you want it to, but you can quickly shut it off when you’re back at home or in the office.Full review: NordVPN review: A market leader with consistent speed and performanceWe were quite intrigued by the five communications services offered: P2P, Double VPN, Dedicated IP, Onion Over VPN, and Obfuscated (which means “to render obscure, unclear, or unintelligible). The Double VPN feature is designed to run your data through a second VPN server, and while that’s a great idea, I found it was unreliable in real-world usage.Also: Meet NordSec: The company behind NordVPN wants to be your one-stop privacy suiteBeyond the Apple platforms, NordVPN supports Windows and Android. And beyond that, NordVPN has clients a huge number of platforms ranging from all the way back to Windows XP, forward to Raspberry Pi, Synology, and Western Digital, along with QNAP NAS boxes, Chromebook, a whole bunch of routers, and more.

    View Now at NordSec

    Among the fastest VPNs tested

    Mac, iPad, iPhone: Yes, yes, and yesSimultaneous connections: 5Kill switch: YesLogging: NoTrial: 45-day refund guaranteeCountries: 80Best price: $95.88 for one year ($7.99 per month)Hotspot Shield came in second in our aggregate performance ranking, but that was because the performance was somewhat inconsistent. For some testers (myself included), Hotspot Shield was among the fastest VPNs tested. I actually found that some connections increased in speed when using Hotspot Shield, which feels almost like a violation of the laws of physics. But for other testers, performance was lower.Full review: Hotspot Shield review: Here’s a VPN that actually lives up to its hypeThat’s why we always recommend you take advantage of return policies and test actively before your money-back time is up.Hotspot Shield achieves its rather unexpected performance gains because it uses its own proprietary network and protocol. Those who love debating VPN protocols might be disappointed because “Catapult Hydra” is your only choice. But don’t let it keep you away, because — at least from America to other countries, which is how I tested — it works.Client installs were straightforward. You can’t modify some options until after you connect, which is vaguely annoying. But it gets the job done, and its speed, if it works for you, is something to behold.

    View Now at Hotspot Shield

    Payment via Bitcoin available for utmost anonymity

    Mac, iPad, iPhone: Yes, yes, and yesSimultaneous connections: 5Kill switch: YesLogging: NoTrial: 30-day refund guaranteeCountries: 94Best price: $99.95 for one year ($8.32 per month-ish)ExpressVPN came in third in our aggregated performance testing. In one way, it was more like NordVPN than Hotspot shield, in that the standard deviation was low. What this means is that the performance numbers were generally consistent across all testers. Hotspot’s numbers varied considerably across testers.Full review: ExpressVPN review: A fine VPN service, but is it worth the price?Unlike Nord and Hotspot, ExpressVPN offers a 30-day money-back guarantee, not a 45-day. That’s not too much of a loss because if you make testing a priority, you can certainly determine if ExpressVPN works for you within a month. One standout benefit ExpressVPN offers that the others don’t is payment via Bitcoin. If you want to remain as anonymous as possible, Bitcoin payment makes sense.Oddly enough, the company advertises that its one year plan bills at $99.95, but they then list that a per-month fee of $8.32. 8.32 times 12 is 99.84, not 99.95. Eleven cents doesn’t really matter, but math clearly isn’t someone’s strong suit.One feature I really liked was the network-wide speed test. Once in the client, you can tell ExpressVPN to scan its entire network and tell you server speeds for each server. It takes a few minutes, but it’s great for not only picking the fastest server but for getting a feel for network performance overall.On the downside, we run into a weird security issue with something called Security Firewall Ltd. I recommend you read the review, as well as ExpressVPN’s response, to decide if this is of concern to you.I liked ExpressVPN. It was a breeze to set up and configure. I like how you can determine server speed across the entire network. And searching, saving, and configuring locations is dead simple. If you’re using a VPN to protect your coffee shop surfing, it’s fine. But if you’re using a VPN to protect your location to protect your life, I’d think twice.

    View Now at ExpressVPN

    So there you go. Three VPNs with well-considered configurations for Macs, iPhones, and iPads.

    Do I even need a VPN on a Mac?

    This comes because the Mac is often considered more secure than Windows. By virtue of both the smaller number of units sold (making it a less juicy target for hackers) and Apple’s tight lock on hardware/software integration, the Mac is somewhat more secure than Windows. That means less malware runs on the Mac platform.But you don’t use a VPN primarily to protect against malware. You use a VPN to protect the data you transmit and receive and prevent your location from being determined by your visit sites. Apple will be offering iCloud+ Private Relay when MacOS Monterey comes out in the fall, and while that does offer some protection, it’s not a full VPN.So, yes, you need a VPN on the Mac because you want to protect your communications when you’re out and about and your location any time you don’t want anyone to know where you’re located.

    How should I choose a VPN for my Mac?

    This comes from the question some readers ask about whether they should limit their VPN choices to products sold on the Mac App Store and because Mac programs that are built expressly for the Mac tend to integrate better.You definitely want a well-integrated VPN client into the Mac, but the Mac App Store puts some limitations on how a VPN can function. While I wouldn’t necessarily shy away from Mac App Store VPNs, it’s not necessarily a plus either.When you choose a VPN, the most important factor is going to be the security infrastructure of the VPN provider because you’re not just installing an app; you’re adopting a network.Look for VPNs with clean, responsive clients that have kill switches in case the connection drops, that are fast to start and stop that hides your location and traffic that doesn’t log your surfing behavior, and move data quickly.

    You can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, and on YouTube at YouTube.com/DavidGewirtzTV.

    ZDNet Recommends More

  • in

    GE made an earthworm robot

    Robots that dig underground are getting lots of development attention thanks to DARPA, the Pentagon’s research funding arm. The latest example? An earthworm from GE.The GE robot is part of DARPA’s Underminer program. According to the agency:DARPA has selected three performers to develop technologies and solutions for the Underminer program that would surpass current commercial drilling capabilities. Underminer aims to demonstrate the feasibility of rapidly constructing tactical tunnel networks to provide secure logistics infrastructure to pre-position supplies or resupply troops as they move through an area.DARPA is also rounding third base on its SubT (Subterranean) Challenge, which “seeks novel approaches to rapidly map, navigate, and search underground environments during time-sensitive combat operations or disaster response scenarios.” The final events for the virtual and systems challenges will take place in late September of this year.

    [embedded content]

    GE’s earthworm robot is bio-inspired, drawing inspiration from the wriggly worm, and like its prototype its soft, putting it in a class of robots that don’t have hard exterior bodies. The earthworm robot is powered by fluidic muscles and has undergone successful trials through a year-and-a-half long demonstration period.”Through this project, we have truly broken new ground in advancing autonomous and soft robotic designs,” Deepak Trivedi, a GE researcher leading the project, said. “By creating a smaller footprint that can navigate extreme turning radiuses, function autonomously, and reliably operate through rugged, extreme environments, we’re opening up a whole new world of potential applications that go well beyond commercially available technologies.” The prototype earthworm, which made a 10 cm diameter tunnel, autonomously dug underground at GE’s Niskayuna, NY, research campus, achieving a distance comparable to available trenchless digging machines.”The ability of GE’s robot to operate reliably in rugged, extreme environments is, to our knowledge, a first in soft robotic design,” said Trivedi.

    If a military-funded earthworm sounds terrifying, DARPA outlined the need for digging technologies in the run up to the SubT.As underground settings become increasingly relevant to global security and safety, innovative and enhanced technologies have the potential to disruptively and positively impact subterranean military and civilian operations. To explore these possibilities, DARPA has issued a Request for Information (RFI) to augment its understanding of state-of-the-art technologies that could enable future systems to rapidly map and navigate unknown complex subterranean environments to locate objects of interest, e.g., trapped survivors, without putting humans in harm’s way.The earthworm, for its part, has potential broad utility, including in inspection and repair tasks.”In the future, we want to enable deeper, in-situ inspection and repair capabilities that would enable more on-wing inspection and repairs or enable major power generation equipment like gas and steam turbines to be inspected and repaired without removing them from service for lengthy periods of time,” Trivedi said. “The advancements we have made on this project support key developments needed to make that possible.” More