More stories

  • in

    This new ransomware group claims to have breached over 30 organisations so far

    An emerging ransomware operation appears to have links to a veteran cyber criminal group in the space – while also attempting to piggyback on the reputation of one of the most notorious forms ransomware.Prometheus ransomware first emerged in February this year and not only do the criminals behind it encrypt networks and demand a ransom for the decryption key, they also use double extortion tactics and will threaten to leak stolen data if their demands for cryptocurrency aren’t met.Analysis by cybersecurity researchers at Palo Alto Networks details how, like many ransomware operations in 2021, the group runs like a professional enterprise, even going so far as to refer to victims of cyber attacks as “customers” and communicating with them via a ticketing system.The cyber criminals behind Prometheus claim to have hit over 30 victims around the world so far, including organisations in North America, Europe and Asia. Sectors Prometheus claims to have hit include government, financial services, manufacturing, logistics, consulting, agriculture, healthcare services, insurance agencies, energy and law. However, only four victims have paid to date, according to the group’s leak site which claims that a Peruvian agricultural company, a Brazilian healthcare services provider and transportation and logistics organizations in Austria and Singapore paid ransoms, Palo Alto said.One notable trait of Prometheus is that it uses the branding of another ransomware group across its infrastructure, claiming to be ‘Group of REvil’ on the ransom note and across its communication platforms.SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)  

    REvil is one of the most infamous and most successful ransomware operations, claiming a string of high profile victims. The FBI recently attributed the ransomware attack against meat processor JBS to the group, which is believed to work out of Russia.However, despite the use of REvil’s name, there doesn’t appear to be any link between the two operations – and it’s likely that Prometheus is attempting to use the name of an established criminal operation in order to increase their chance of receiving a ransom payment.”Since there is no solid connection other than the reference of the name, our running theory is that they are leveraging the REvil name to increase their chances of securing payment. If you search for REvil, the headlines are going to speak for themselves versus searching Prometheus ransomware where probably nothing major would’ve come up,” Doel Santos, threat intelligence analyst at Unit 42, Palo Alto Networks told ZDNet. Researchers note the operation does have strong links to Thanos ransomware.Thanos ransomware first emerged for sale on underground forums in the first half of 2020 but the behaviour and infrastructure of it is almost identical to Prometheus, which could suggest that Thanos and Prometheus are run by the same group of criminals.See: This company was hit by ransomware. Here’s what they did next, and why they didn’t pay upWhile researchers haven’t been able to identify the exact method Prometheus is delivered to victims, Thanos is known to be distributed with the aid of buying access to networks which have previously been compromised with malware, brute-force attacks against commonly used passwords and phishing attacks.After compromising victims with ransomware, Prometheus tailors the ransom depending on the target, with demands ranging from $6,000 to $100,000 – a figure that’s doubled if the victim doesn’t pay within a week. The ransom is demanded in Monero, rather than Bitcoin, a decision likely made because Monero transactions are more difficult to track than Bitcoin – so there’s less chance of the group being detected or their assets seized by law enforcement operations. It’s believed that the group is still active and will continue as long as attacks remain profitable.”As long as Prometheus keeps targeting vulnerable organizations, it will keep running campaigns,” said Santos. “Going forward we would expect this group to keep adding victims to their leak site, and change their techniques as needed,” he added.Given how Prometheus and other ransomware groups often rely on breaching user accounts to embed themselves on networks, one thing which organisations can do to help protect against ransomware attacks is use multi-factor authentication.Deploying this to all users provides an additional barrier to attacks, making it harder for cyber criminals to exploit stolen credentials as a starting point for ransomware campaigns.MORE ON CYBERSECURITY More

  • in

    Zoom Phone Appliances launch with Poly, Yealink devices in latest hybrid work play

    Zoom Video Communications is launching Zoom Phone Appliances, a combination of hardware from Poly and Yealink with Zoom video meetings, phone and collaboration software. The all-in-one desk phone has an integrated touch display to start and schedule meetings, take phone calls and collaborate. Yealink’s VP59 Smart Video Phone. Credit: YealinkVideo collaboration players are launching new products and revamping platforms to prepare for hybrid work arrangements.With its video collaboration footprint, Zoom is aiming to blur lines between video and audio and make it easier for enterprises to procure and manage hardware with minimal integration. Zoom Phone Appliances include:Deskphones that are always on. Poly’s CCX 600 Desk Phone and CCX 700 Desk Phone with integrated video camera and Yealink VP59 Smart Video Phone are the two headliner Zoom Phone Appliances with more hardware partners to be added. Centralized management via Zoom Admin Portal with remote provisioning and updates. No additional licensing and available through Zoom’s hardware-as-a-service offering. Synched user calendar, status, meeting settings and phone. Zero touch provisioning. Touch display with interactive whiteboarding. Certification from Zoom. More

  • in

    DHL makes massive robot order to keep pace with e-commerce

    The robotics sector continues to see positive growth due to the rising demands of e-commerce during the pandemic. The latest anecdotal proof? DHL Supply Chain, a contract logistics provider, is planning to take on up to 2,000 new warehouse robots by 2022.The robots will be provided by Locus Robotics, with whom DHL Supply Chain has been piloting an ongoing collaboration. The autonomous picking robots rely on machine vision to strategically identify items to be picked and placed on a line. The robots calculate an optimal trajectory and grasping strategy and learn over time. These sorts of robots are becoming more and more common in hybrid human-robot logistics warehouses, which are the engine of e-commerce’s increasingly fast delivery promises.”It is particularly important for us to be able to consistently optimize our supply chains — assisted picking robots are very effective in this respect,” says Markus Voss, Global CIO & COO DHL Supply Chain. “So far, more than 500 assisted picking robots are already in industrial use in our warehouses in the USA, Europe, and the UK. By the end of 2021, another 500 robots are to be added in a total of more than 20 locations. The collaborative picking technology has clearly proven its effectiveness and reliability in modern warehousing. More locations have already been identified with concrete implementation roadmaps for the remaining robots, which we will deploy in 2022. However, the overall potential for assisted picking robots in our DHL warehouses is much bigger, so we are confident that we will meet the targets we have set ourselves together with Locus Robotics.”Earlier this year Locus announced $150 million in Series E funding, bringing its overall valuation to $1 billion. Locus is using the funding to accelerate product innovation and global expansion as warehouses continue to face ongoing labor shortages, exploding e-comm volumes, and ever-greater demand for speed and reliability in their technology deployments. A Locus spokesman told me the company expects that over a million warehouse robots will be installed over the next four years, while the number of warehouses using them will grow ten‐fold.The current generation of picking robots can be swiftly integrated into existing warehouses, drastically reducing the time it has traditionally taken to onboard industrial robots in arenas like manufacturing.”Our expanded partnership with DHL reflects the increasing demand for warehouse digitalization worldwide to meet today’s exploding fulfillment challenges,” said Rick Faulk, CEO, Locus Robotics. “Locus is proud to be a valued technology resource that is helping DHL realize their strategic vision of digital transformation.”For DHL’s part, the move is likely a matter of adaptation as a matter of survival. The pandemic has only accelerated e-commerce’s swift rise and growing customer demands. In addition to robots, DHL Supply Chain has incorporated software and cockpit solutions to give the company real-time information on the status of the global service logistics network of their customers. In a familiar cycle, demand is driving need for ever-greater efficiency, and we’re currently witnessing an arms race for who can adopt the correct technology cocktail fastest. More

  • in

    Fastly's global outage: Here's what went wrong

    Content delivery network (CDN) Fastly has explained its major outage yesterday, which knocked out many of the world’s top websites, from Amazon to ZDNet.  The breadth of the outage demonstrated once again how CDNs, which bring content to end users from globally distributed points of presence (POPs), can also be a single point of failure. 

    ZDNet Recommends

    Fastly has POPs across the globe running on solid state drives (SSDs) that make up its “edge cloud” for delivering web content from data centers that are closer to end users. Instead of accessing a website’s servers directly, users access a cache of the site from cache storage maintained by the CDN.  SEE: Network security policy (TechRepublic Premium) Its global outage yesterday briefly prevented web users from accessing The Guardian, the Financial Times, The New York Times, ZDNet, Reddit, Twitch, Amazon, PayPal, and the UK government website gov.uk.  Nick Rockwell, Fastly’s senior vice president of engineering, said the hour-long outage happened because a customer pushed a configuration change that triggered the undiscovered software bug.  Rockwell doesn’t explain what exactly happened, other than saying that on May 12, the company deployed a software update that “introduced a bug that could be triggered by a specific customer configuration under specific circumstances.”

    Then yesterday, June 8, a customer pushed a configuration change that met the conditions to trigger the bug, which caused 85% of its network to return errors. End users visiting affected sites saw the “Error 503 Service Unavailable” error message in browsers.  Fastly yesterday said that issue was causing customers to see an “increased origin load and lower Cache Hit Ratio (CHR)”. CHR is a measure of how many requests a cache can deliver compared to how many requests it receives. “Once the immediate effects were mitigated, we turned our attention to fixing the bug and communicating with our customers. We created a permanent fix for the bug and began deploying it at 17:25,” said Rockwell.  The disruption began at 9:47 UTC.  Fastly is the seventh largest CDN provider, following Google, Cloudflare, F5, Amazon CloudFront, and jsDelivr, according to Datanyze. SEE: GDPR: Fines increased by 40% last year, and they’re about to get a lot bigger The pitfall of CDNs is that when they go down, as Cloudflare did in 2019 – due to a buggy configuration change – users can’t access websites that rely on the CDN to deliver content.  Rockwell recognized that the company should have seen this bug before the customer accidentally triggered it. He also apologized to customers.  “Even though there were specific conditions that triggered this outage, we should have anticipated it. We provide mission-critical services, and we treat any action that can cause service issues with the utmost sensitivity and priority,” he wrote.   “We apologize to our customers and those who rely on them for the outage and sincerely thank the community for its support.” More

  • in

    Apple pays millions of dollars to student after repair staff leak her explicit photos online

    Apple has agreed to a multi-million dollar settlement to resolve a lawsuit with a woman whose explicit photos were leaked online by employees repairing her iPhone. 

    The woman, a past student at the University of Oregon, handed over the mobile device in 2016 for repair for an unspecified issue at a Pegatron facility in California, as reported by The Telegraph. Pegatron has acted as a long-term supplier and partner with the iPhone and iPad maker. At the time, two employees of the firm allegedly accessed explicit images and video stored on the device. This content was then posted on the woman’s Facebook account, to appear as if she shared it.  The explicit material has been described as “photos of her in various stages of undress and a sex video.” The woman was only made aware of the technicians’ activities when a contact alerted her to the leak, and she was able to take the images and video down.  However, the damage was done and the student then launched a claim against Apple for privacy violations and the emotional distress caused. 

    Apple reportedly settled for a multi-million dollar amount which was reimbursed by Pegatron. According to reports, the agreement includes a clause to prevent the woman from disclosing the value of the settlement.  The tech giant also apparently demanded confidentiality, but a legal battle between Pegatron and its insurer — which disputed the amount requested for reimbursement — resulted in Apple’s role being identified.  The technicians have been fired.  Apple said in a statement that upon learning of the incident and “egregious violation” of data privacy and security policies, “we took immediate action and have since continued to strengthen our vendor protocols.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    PuzzleMaker attacks exploit Windows zero-day, Chrome vulnerabilities

    Researchers say zero-day vulnerabilities fixed in Microsoft’s recent Patch Tuesday round have been used in targeted attacks against the enterprise. 

    According to Kaspersky, a wave of “highly targeted attacks” on several organizations was traced that utilized a chain of zero-day exploits in the Google Chrome browser and Microsoft Windows systems over April 14 and 15, 2021. The attackers have been named PuzzleMaker. The first exploit in the chain, while not confirmed, appears to be CVE-2021-21224, a V8 type confusion vulnerability in the Google Chrome browser prior to 90.0.4430.85.  Google issued a patch for the severe flaw on April 20, which if exploited, allowed remote attackers to execute arbitrary code inside a sandbox via a crafted HTML page. Sandboxes, by design, are intended for developer environments, tests, and protection, and so segregate activities away from a main system. For an exploit chain to work, a sandbox escape would then be a necessary next step.  According to the researchers, this escape was found in two Windows 10 vulnerabilities — both of which are zero-day bugs that were patched in Microsoft’s latest Patch Tuesday update.  The first, CVE-2021-31955, is a Windows Kernel information disclosure vulnerability in the file ntoskrnl.exe, used to expose the addresses of the Eprocess structure kernel for executed processes. The second, CVE-2021-31956, is a heap buffer overflow vulnerability in the Windows NTFS driver that can be exploited for privilege escalation.

    Kaspersky says that when chained together, the vulnerabilities allowed the attacker to escape the sandbox and execute malicious code on a target machine.  Malware is then deployed which includes stager, dropper, service, and remote shell modules. The first module will first check that exploitation was a success, and if so, will grab the dropper module from a command-and-control (C2) server for execution.  Two executables then land on the target machine which masquerades as legitimate Windows files. The first is registered as a service and is used to launch the second executable, which contains remote shell capabilities.  This payload is able to download and exfiltrate files, as well as create system processes. The malware is also capable of putting itself to ‘sleep’ for a time or self-destruct.  It is recommended that organizations maintain frequent patch schedules and apply relevant fixes — more so if bugs are being actively exploited. As we saw with the Microsoft Exchange Server incident in March, attackers will quickly jump on security issues as soon as they are publicly known. Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Huawei reveals 'cybersecurity framework' with launch of China transparency centre

    Huawei Technologies has kicked into PR overdrive, pledging its commitment to cybersecurity with the opening of its latest transparency centre in Dongguan, China. It also releases the “security baseline framework” that the Chinese tech vendor says is adopted for its products, outlining requirements for implementation and compliance of legal and regulatory requirements.The new Dongguang facility is amongst seven transparency centres Huawei operates worldwide, including in Belgium, Germany, Canada, and the UK, where its first was launched in 2010. These sites have hosted 700 customer exchange over the past decade. According to Huawei, the centres offer a platform on which its products and software can be tested and security verified by customers and governments. The facilities provide technical documents, testing tools and environments, as well as technical support. 

    When asked, Huawei told ZDNet that customers and governments also would be able to view the source codes of its security framework. The spokesperson said independent third-party testing organisations would be able to perform “fair, objective, and independent security tests and verifications” based on “industry-recognised” cybersecurity standards and best practices.”[The centre] allows outsiders to remotely access Huawei’s source code, our ‘crown jewels’,” he noted. Along with the launch, Huawei unveiled the security baseline framework that it said was integrated into its product development process and developed to address legal and regulatory requirements. The framework comprised 54 requirements spanning 15 categories for product implementation, such as backdoor prevention, access channel control, encryption, application security, and secure compilation. The vendor added that this was the first time its security baseline was made available to the industry. 

    Huawei also urged the need for a “unified approach” to cybersecurity, pointing to industry bodies such as GSMA and 3GPP that had pushed the adoption of standards such as NESAS (Network Equipment Security Assurance Scheme) and independent certifications. “At present, the industry still lacks a standards-based, coordinated approach, especially when it comes to governance, technical capabilities, certification, and collaboration,” the Chinese vendor said. NESAS is a voluntary initiative introduced to provide a security enhancement programme that focused on mobile network infrastructure equipment. It encompasses equipment designed to facilitate functions defined by 3GPP (3rd Generation Partnership Project), and deployed by mobile network operators on their networks. Specifically, it comprises security assessments of vendor development and product lifecycle processes as well as security evaluations of network products. The programme has been adopted by a handful of vendors, namely, Nokia, Ericsson, and ZTE.”These baselines have seen wide acceptance in the industry and will play an important role in the development and verification of secure networks,” Huawei said, adding that its 5G and LTE equipments had passed NESAS evaluation. Through its transparency centres, the vendor said it had conducted more than 200,000 training courses covering cybersecurity and privacy process development as well as verification and testing. Last year, it also carried out risk assessment and monitored more than 4,000 suppliers of various cybsersecurity services. It said the emergence of 5G networks and services also would increase security risks, further underscoring the need for collective efforts to combat such threats.Huawei said: “Industry digitalisation and new technologies like 5G and AI (artificial intelligence) have made cyberspace more complex, compounded by the fact that people have been spending a greater portion of their lives online throughout the COVID-19 pandemic. These trends have led to a rise in new cybersecurity risks.”It noted that digitalisation also blurred the physical boundaries of traditional networks, leading to more network threats as well as the consequences of vulnerabilities and attacks that were more serious. Huawei’s rotating chairman Ken Hu said: “Cybersecurity risk is a shared responsibility. Governments, standards organisations, and technology providers need to work closer together to develop a unified understanding of cybersecurity challenges. This must be an international effort.”The Chinese vendor said its research and development (R&D) spending on cybersecurity and privacy components accounted for 5% of its overall R&D budget, and its global headcount included more than 3,000 cybersecurity R&D professionals.Huawei last week launched HarmonyOS 2 across 100 of its devices in China, including smartphones, smart watches, and tablets, further driving its aim to have the mobile OS installed on more than 300 million devices.  It said in April that it would continue to diversify its product focus as it looked to buffer a decline in its smartphone sales, which were impacted by ongoing US export sanctions that blocked access to Google’s Android ecosystem. With HarmonyOS still unavailable outside of China, though, it remains to be seen if the mobile OS will be adopted as widely internationally as its distribution across multiple consumer device categories may further trigger security and privacy concerns.RELATED COVERAGE More

  • in

    Nokia, Qualcomm, and UScellular hit 750Mbps over 11kms with mmWave 5G

    Image: Qualcomm
    Nokia, Qualcomm, and UScellular announced on Tuesday a millimetre-wave (mmWave) test had successfully been conducted on UScellular’s live 5G network that hit 748Mbps down and 56.8Mbps up at a range of 11.14 kilometres. At a distance of around 10 kilometres, the trio said the test reached speeds around the 1Gbps mark. The equipment used consisted of Nokia’s mmWave range-extending system, and customer premises equipment using Qualcomm’s Snapdragon X55 5G modem and mmWave antenna. The test was conducted at Grand Island in Nebraska using 28GHz spectrum. The results were touted as showing mmWave could be used to provide rural fixed wireless connectivity. “These latest trial results reinforce the important role that fast, reliable wireless service plays in keeping people connected no matter where they live or work,” UScellular CTO Mike Irizarry said. At the start of the year in Australia, the company responsible for the National Broadband Network claimed it had hit close to 1Gbps over a distance of 7.3 kilometres. NBN had previously said it was looking at using mmWave over 10-kilometre distances.

    Elsewhere, Dell Technologies announced on Wednesday it was launching Project Metalweaver to allow carriers to deploy 5G edge, core, and Open RAN solutions, alongside a number of reference architectures.These architectures include core software from Nokia and Affirmed Networks, private networks from CommScope, multi-access edge computing thanks to Intel, and Mavenir and Dell teamed up for Open RAN on PowerEdge XR11 servers.  Related Coverage More