More stories

  • in

    Siloscape: this new malware targets Windows containers to access Kubernetes clusters

    A new brand of malware designed to compromise Windows containers to reach Kubernetes clusters has been revealed by researchers. 

    The malware, dubbed Siloscape, is considered unusual as malware generally designed to target containers focuses on Linux as a popular operating system for managing cloud applications and environments.  According to Palo Alto Networks’ Unit 42, Siloscape, first discovered in March this year, has been named as such because its overall aim is to escape Windows containers via a server silo. In a blog post on Monday, the cybersecurity researchers said Siloscape uses the Tor proxy and an .onion domain to connect to its command-and-control (C2) server, used by threat actors to manage their malware, data exfiltration, and to send commands.  The malware, labeled as CloudMalware.exe, targets Windows containers — using Server rather than Hyper-V isolation —  and will launch attacks utilizing known vulnerabilities that have not been patched for initial access against servers, web pages, or databases.  Siloscape will then attempt to achieve remote code execution (RCE) on the underlying node of a container by using various Windows container escape techniques, such as the impersonation of the CExecSvc.exe, a container image service, to obtain SeTcbPrivilege privileges. “Siloscape mimics CExecSvc.exe privileges by impersonating its main thread and then calls NtSetInformationSymbolicLink on a newly created symbolic link to break out of the container,” Unit 42 says. “More specifically, it links its local containerized X drive to the host’s C drive.”

    If the malware is able to escape, it will then try to create malicious containers, steal data from applications running in compromised clusters, or will load up cryptocurrency miners to leverage the system’s resources to covertly mine for cryptocurrency and earn its operators profit for as long as the activities go undetected.  The malware’s developers have ensured that heavy obfuscation is in place — to the point where functions and module names are only deobfuscated at runtime — in order to conceal itself and make reverse-engineering more difficult. In addition, the malware uses a pair of keys to decrypt the C2 server’s password — keys that are suspected to be generated for each unique attack.  “The hardcoded key makes each binary a little bit different than the rest, which is why I couldn’t find its hash anywhere,” the research states. “It also makes it impossible to detect Siloscape by hash alone.” Unit 42 managed to obtain access to the C2 and identified a total of 23 active victims, as well as 313 victims in total, likely secured in campaigns over the past year. However, it was mere minutes before the researchers’ presence was noted and they were kicked out of the server and the service was rendered inactive — at least, at that .onion address.  Microsoft recommends that Hyper-V containers are deployed if containerization is utilized as a form of security boundary rather than relying on standard Windows containers. Unit 42 added that Kubernetes clusters should be configured properly and should not allow node privileges alone to be enough to create new deployments. 

    Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Tiny particles power chemical reactions

    MIT engineers have discovered a new way of generating electricity using tiny carbon particles that can create a current simply by interacting with liquid surrounding them.

    The liquid, an organic solvent, draws electrons out of the particles, generating a current that could be used to drive chemical reactions or to power micro- or nanoscale robots, the researchers say.

    “This mechanism is new, and this way of generating energy is completely new,” says Michael Strano, the Carbon P. Dubbs Professor of Chemical Engineering at MIT. “This technology is intriguing because all you have to do is flow a solvent through a bed of these particles. This allows you to do electrochemistry, but with no wires.”

    In a new study describing this phenomenon, the researchers showed that they could use this electric current to drive a reaction known as alcohol oxidation — an organic chemical reaction that is important in the chemical industry.

    Strano is the senior author of the paper, which appears today in Nature Communications. The lead authors of the study are MIT graduate student Albert Tianxiang Liu and former MIT researcher Yuichiro Kunai. Other authors include former graduate student Anton Cottrill, postdocs Amir Kaplan and Hyunah Kim, graduate student Ge Zhang, and recent MIT graduates Rafid Mollah and Yannick Eatmon.

    Unique properties

    The new discovery grew out of Strano’s research on carbon nanotubes — hollow tubes made of a lattice of carbon atoms, which have unique electrical properties. In 2010, Strano demonstrated, for the first time, that carbon nanotubes can generate “thermopower waves.” When a carbon nanotube is coated with layer of fuel, moving pulses of heat, or thermopower waves, travel along the tube, creating an electrical current.

    That work led Strano and his students to uncover a related feature of carbon nanotubes. They found that when part of a nanotube is coated with a Teflon-like polymer, it creates an asymmetry that makes it possible for electrons to flow from the coated to the uncoated part of the tube, generating an electrical current. Those electrons can be drawn out by submerging the particles in a solvent that is hungry for electrons.

    To harness this special capability, the researchers created electricity-generating particles by grinding up carbon nanotubes and forming them into a sheet of paper-like material. One side of each sheet was coated with a Teflon-like polymer, and the researchers then cut out small particles, which can be any shape or size. For this study, they made particles that were 250 microns by 250 microns.

    When these particles are submerged in an organic solvent such as acetonitrile, the solvent adheres to the uncoated surface of the particles and begins pulling electrons out of them.

    “The solvent takes electrons away, and the system tries to equilibrate by moving electrons,” Strano says. “There’s no sophisticated battery chemistry inside. It’s just a particle and you put it into solvent and it starts generating an electric field.”

    “This research cleverly shows how to extract the ubiquitous (and often unnoticed) electric energy stored in an electronic material for on-site electrochemical synthesis,” says Jun Yao, an assistant professor of electrical and computer engineering at the University of Massachusetts at Amherst, who was not involved in the study. “The beauty is that it points to a generic methodology that can be readily expanded to the use of different materials and applications in different synthetic systems.”

    Particle power

    The current version of the particles can generate about 0.7 volts of electricity per particle. In this study, the researchers also showed that they can form arrays of hundreds of particles in a small test tube. This “packed bed” reactor generates enough energy to power a chemical reaction called an alcohol oxidation, in which an alcohol is converted to an aldehyde or a ketone. Usually, this reaction is not performed using electrochemistry because it would require too much external current.

    “Because the packed bed reactor is compact, it has more flexibility in terms of applications than a large electrochemical reactor,” Zhang says. “The particles can be made very small, and they don’t require any external wires in order to drive the electrochemical reaction.”

    In future work, Strano hopes to use this kind of energy generation to build polymers using only carbon dioxide as a starting material. In a related project, he has already created polymers that can regenerate themselves using carbon dioxide as a building material, in a process powered by solar energy. This work is inspired by carbon fixation, the set of chemical reactions that plants use to build sugars from carbon dioxide, using energy from the sun.

    In the longer term, this approach could also be used to power micro- or nanoscale robots. Strano’s lab has already begun building robots at that scale, which could one day be used as diagnostic or environmental sensors. The idea of being able to scavenge energy from the environment to power these kinds of robots is appealing, he says.

    “It means you don’t have to put the energy storage on board,” he says. “What we like about this mechanism is that you can take the energy, at least in part, from the environment.”

    The research was funded by the U.S. Department of Energy and a seed grant from the MIT Energy Initiative. More

  • in

    Patch now: Attackers are hunting for this critical VMware vCentre flaw

    The US Cybersecurity and Infrastructure Security Agency has warned companies running VMware vCenter Server and VMware Cloud Foundation software to update as soon as possible because attackers are scanning the internet for vulnerable servers. VMware released a patch for two critical remote code execution flaws on May 25. The two bugs, tracked as CVE-2021-21985 and CVE-2021-21986, have a severity rating of 9.8 out of 10. The bugs affect VMware vCenter Server (vCenter Server) and VMware Cloud Foundation (Cloud Foundation).  CISA  has now warned that it is “aware of the likelihood that cyber threat actors are attempting to exploit CVE-2021-21985”. It said organisations should apply the necessary updates as soon as possible, even if out-of-cycle work is required.As ZDNet reported last month, CVE-2021-21985 affects the vSphere HTML5 client and allows an attacker with network access to port 443 to exploit it to execute commands freely on the underlying operating system that hosts vCenter Server and take control of it.   “Although patches were made on May 25, 2021, unpatched systems remain an attractive target and attackers can exploit this vulnerability to take control of an unpatched system,” CISA warned. Via Ars Technica, Troy Mursch, a security researcher for Bad Packets, has been tracking mass scanning for the bugs on internet-exposed VMware vCenter servers. On Saturday, Mursch reported he had seen exploit activity using a proof of concept exploit targeting VMware vCenter servers harboring CVE-2021-21985. Bad Packets runs a honeypot that contains servers with the bug. 

    CVE-2021-21985 exploit activity detected from 119.28.15.199 (🇭🇰) based on this PoC (https://t.co/qhBbHdOaK4) targeting our VMware vCenter honeypot.Query our API for “source_ip_address=119.28.15.199″ for full payload and other relevant indicators. #threatintel— Bad Packets (@bad_packets) June 5, 2021

    VMware urged customers to patch affected servers immediately. The virtualization software firm warned organisations that have placed their vCenter Servers on networks that are exposed to the internet and thus may not have firewall protection — often the last line of defence — that they should therefore audit these systems for compromise.”In this era of ransomware it is safest to assume that an attacker is already inside the network somewhere, on a desktop and perhaps even in control of a user account, which is why we strongly recommend declaring an emergency change and patching as soon as possible,” it previously said.CISA recommended administrators review VMware’s VMSA-2021-010 advisory, its blogpost, and its FAQ about the issue.  More

  • in

    The cost of ransomware attacks worldwide will go beyond $265 billion in the next decade

    The cost of ransomware incidents worldwide is expected to spiral out of control, exceeding $265 billion by 2031. 

    Ransomware is now one of the most potentially damaging — and a very popular — types of malware. If ransomware lands on a vulnerable system, files are usually encrypted, users are locked out, and payment is demanded, usually in cryptocurrency, in return for a decryption key. In a more recent evolution of the applications of ransomware, operators will also steal information during an attack and will threaten to publish this information on leak sites on the dark web or sell it on, doubling the pressure for victims to pay up.  At present, some of the most well-known groups that have turned ransomware into a lucrative ‘business’ opportunity are Maze, Nefilim, Clop, and DarkSide, the latter of which left the scene — at least, under that name — after extorting Colonial Pipeline out of $4.4 million following a devastating attack that disrupted fuel supplies across the United States.  Cybersecurity Ventures predicts that the damage caused by ransomware could cost the worldwide stage $265 billion by 2031, based on this type of cybercrime attacking both enterprises and consumers at a rate of one attack every few seconds.  Currently, the cybersecurity agency estimates that ransomware will cost us approximately $20 billion this year, a 57x jump from 2015.  The latest estimates released by the company have been generated based on a 30% growth in incidents year-over-year.

    Ransomware infections can result in costly insurance premiums and payouts, the need to hire cyberforensics firms to investigate incidents, damage limitation or system repair, data loss, and potentially payments made to attackers to retrieve critical systems or prevent data from being leaked.  The latest estimate also includes during and post-attack business disruption, reputational harm, and the expense of employee training following a ransomware incident.  Palo Alto Networks suggests that ransomware payouts alone have surged from $115,123 in 2019 to $312,493 in 2020, a 171% year-over-year increase. The largest demand recorded in recent years is $30 million. Despite government officials across the globe becoming involved, including figures such as US President Biden who recently signed an executive order demanding that federal agencies work toward improving the country’s cybersecurity posture, ransomware incidents are only becoming worse.  “Despite authorities’ recent success in busting several ransomware gangs, this particular breed of malware has proven to be a hydra — cut off one head and several appear in its place — and all signs are that the coming decade will be no less problematic,” Cybersecurity Ventures noted.  Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    NBN floats options for killing off CVC charges

    NBN’s pricing options: a reworking of the current model; its melded halfway house model; and its flat price model.
    Image: NBN
    The company responsible for the National Broadband Network has revealed the flat-price modelling it has been working on as part of a trio of pricing options to retailers. The flat-price option would see the loathed connectivity virtual circuit (CVC) capacity charge removed from all plans, with access pricing increasing as a result. NBN is also putting forward a reworked option of its current pricing structure, with the CVC charge dropping by AU$2 to AU$6, and a melded option that removes the CVC on plans of 100Mbps down and quicker, while keeping the current AU$8 CVC charge on lower speeds. Satellite connections have not been considered as part of the discussion paper to modify NBN’s Special Access Undertaking released on Monday. “All three options substantially address many of the concerns that have been expressed by retailers and provide a pathway forward to delivering a sustainable long-term pricing framework that supports the industry and meets the future digital needs of Australians,” NBN said. “While we are aware of some retailers’ preference for a flat AVC-only construct, NBN Co believes careful consideration needs to be given to the potential impact on affordability of the broadband network for low usage customers, equitable cost recovery between consumer segments, take up of NBN services, retail competition, and consumer choice.” Citing a report written for it by Accenture, NBN said the flat-pricing option would see price hikes of AU$120 a year for the 1.4 million customers on low data plans.

    “NBN is concerned that [flat-pricing] would not deliver a number of outcomes that usage-based charges were designed to achieve, and would impact not just the affordability of the NBN broadband network for low usage customers, but also the take up of NBN services,” it said. “NBN estimates that between 69,000 to 170,000 end-users would no longer be able to afford or be willing to take-up NBN broadband under [flat-pricing], primarily as a result of the removal of data-capped plans in market and retail price increases. The initial pricing proposal … has been adjusted to account for potential losses in NBN take-up.” The company added that in exchange for losing revenue from CVC, it would turn to indexation to recoup its investment. “In general, NBN proposes that where the pricing proposals outlined in this paper restrict or entirely remove NBN’s ability to recover its costs through usage-based charges in the form of CVC as applied to increasing bandwidth usage, NBN should have the opportunity to recover those costs by increasing fixed charge pricing components in real terms (i.e. an increase above the rate of inflation, reflecting the rapid growth in usage and hence capacity),” it argued. “This is critical to allowing NBN the opportunity to generate additional revenue to recover efficient existing and future investments needed to sustain growing bandwidth requirements as well as network upgrade programs to uplift the capability of the network. This approach also reflects that the increased utility derived by end-users of the service as their usage of the network increases should be appropriately reflected in the revenues that NBN is able to earn.” It added that removing CVC would result in traffic surges, such as when popular games are updated, and said it would need extra safeguards to manage capacity NBN said for its melded option, due to telcos having data caps and entry level pricing plans sitting below the 100Mbps mark, it would expect retailers to have “little to no overage exposure”. See also: Best internet provider in Australia 2021: Top ISP picksOn entry level pricing, NBN said there was not strong evidence for 20% annual increases on data inclusion on 12/1Mbps plans. It said it has noticed CVC utilisation on such plans was shifting downwards as some customers moved to higher speeds and was well below the 1.7Mbps deemed suitable for a AU$35 bundle. “NBN understands that providing pricing certainty on entry-level services is important, and that price controls on these services can provide a meaningful anchor on prices of higher value services,” it said. “Accordingly, we are proposing a price control of CPI for entry-level services, to enable the price to remain constant in real terms over time. In addition, we are proposing to commit to increase CVC inclusions on the [entry-level bundle] based on the actual usage growth of end-users on that service.” For some time the Australian Competition and Consumer Commission (ACCC), which oversees the undertaking, has expressed concern at NBN’s use of discounts. NBN said in its paper that discounts allow it to trial pricing changes before offering them. Written submissions to NBN from those that make up its product development forum are due by July 16. NBN said it is looking to lodge the variation with the ACCC in the final quarter of 2021. “We believe the pricing options presented for discussion represent a balanced approach to meeting the objectives set out in this paper. The various pricing options include ones designed to reduce retailers’ commercial risk of exposure to higher than expected usage growth; support the continuation of cheaper data capped retail plans and promote a competitive environment that enables retailers to differentiate their respective offerings from their peers,” NBN executive general manager of commercial Ken Walliss said. “In evaluating a final pricing option, key considerations for NBN Co will be promoting strong outcomes for customers throughout Australia, creating the environment for robust retail competition and opportunities to support all customer groups as much as possible, and maintaining the company’s ability to earn a reasonable return on its investment to enable continued efficient investment in the network.” Related Coverage More

  • in

    Australians spent AU$26.5m in cryptocurrency to pay scammers in 2020

    Australians in 2020 reported losses to scams totalled AU$851 million, with AU$128 million lost to business email compromise (BEC), AU$8.4 million classed as remote access scams, and AU$3.1 million a result of identity theft.Topping the list of scams was investment scams, ripping people off to the tune of AU$328 million. The total number of scam incidents was 444,164.The information was revealed in a report [PDF] from the Australian Competition and Consumer Commission’s (ACCC) Scamwatch. The AU$851 million loss figure is reduced to AU$156 million, however, when information from Australia’s top financial institutions is removed. This is still an increase of around 23% compared to the AU$143 million in losses reported in 2019.The total number of scams received by Scamwatch during the 2020 calendar year was 216,087.Bank transfer remained the most common payment method used in scams, with just over AU$97 million lost, but bitcoin and other cryptocurrency was the second highest payment method, with AU$26.5 million lost.Those aged over 65 were the ones reporting the most loss, comprising AU$37.7 million of the total, but those in the 25 to 34-year old bracket made the most reports to Scamwatch, with 33,000 reports. The scam victims were almost split exactly 50-50 among those that identified as men and those that identified as women.It was shown phone calls were still the number one method for scammers to use, at 47.7%, or 103,153 scams, with email accounting for 22%, text message for 15%, “internet” for 6.3%, and 4.5% of victims were spoofed via social media.

    Unsurprisingly, COVID-19 led to an increase in losses and reports for several categories. Victoria, which was the hardest hit with lockdowns, was the origin of AU$49 million of the total losses for 2020.
    Image: Scamwatch/ACCC
    Compared with 2019, remote access scam reported losses increased more than 74% to AU$8.4 million and threat-based scam reported losses increased more than 178% to AU$11.8 million. 8,691 scams were attributed to “hacking”, 3,885 to ransomware and malware, and phishing accounted for 44,079 reports.The most commonly impersonated entities for phishing scams in 2020 were the same as those in 2019: Telstra, NBN Co, government organisations, the big four banks, and package delivery companies, with a large increase in the number of phishing scams involving impersonations of Amazon.Email phishing in 2020 most commonly impersonated PayPal, followed by Netflix.Health and medical scam reported losses increased more than 2,000% compared with 2019 as a result of the pandemic, reaching over AU$3.9 million.In 2020, there were over 24,000 reports about government impersonation scams made to the ACCC, with losses of AU$1.9 million.There was also a 220% increase in reports and a 322% increase in reported losses to scams related to buying vehicles including cars, caravans, and campervans, with reported losses of just over AU$1 million. The ACCC said scammers targeted both people buying and selling vehicles and used Facebook Marketplace, Gumtree, Car Sales, and Autotrader, mostly, to make contact with potential victims.Scamwatch also received over 330 bushfire-related Scamwatch reports through its website.Celebrity endorsement scams caused reported losses of over AU$1.8 million in 2020. Some of these, the ACCC said, included encouraging people to invest in cryptocurrencies.Scamwatch received 2,082 reports with reported losses of over AU$7 million to Chinese authority scams in 2020. This was a 77% increase in the number of reports and a 250% increase in the amount reported lost compared with 2019.Scam losses reported by businesses increased by 260% in 2020, to AU$18 million. Businesses made the most reports about false billing and phishing scams, with the scams typically involving a request for payment for a service or item that wasn’t ordered or a scammer diverting money by impersonating the intended recipient of a payment.In 2020, WhatsApp was added as an option in the reporting form. The ACCC received 347 reports selecting WhatsApp from the drop down menu. Scam reports listing the contact mode as social networking/online forum and identifying the platform as dating app Tinder increased from 73 in 2019 to 174 in 2020. “This 138% increase in reporting was primarily in relation to romance scams, but also included investment scams where scammers encouraged victims to invest in cryptocurrencies,” the reported added.SEE ALSO More

  • in

    US Justice Department accuses Latvian national of deploying Trickbot malware

    The US Department of Justice (DoJ) has charged a Latvian woman for her alleged role in creating and deploying Trickbot, the computer banking trojan that has evolved to become a highly popular form of malware among cyber criminals.The accused individual, Alla Witte, was arrested in Miami four months ago.According to the charges, Witte worked in the criminal organisation, called Trickbot Group, which deployed the Trickbot malware. In this role, she allegedly wrote code related to the control, deployment, and payments of ransomware for the organisation. Trickbot malware provides cyber criminals with a means of delivering malware onto compromised machines to steal personal and financial information, including login credentials, credit card numbers, emails, passwords, dates of birth, social security numbers, and addresses. Once the information is obtained, the attackers use that information to gain access to online bank accounts, execute unauthorised electronic funds transfers, and launder the money through US and foreign beneficiary accounts, the DoJ alleges. According to the indictment, Witte and others have stolen money and confidential information from unsuspecting victims, including businesses and their financial institutions, across Australia, Belgium, Canada, Germany, India, Italy, Mexico, Spain, Russia, the United States, and the United Kingdom, through the use of the Trickbot malware. Initially emerging as a banking trojan in 2014, Trickbot malware has increasingly been used by cyber criminals to distribute malware attacks, particularly in the wake of the takedown of the Emotet botnet.

    Emotet was the world’s most prolific and dangerous malware botnet before it was disrupted by an international law enforcement operation in January. In addition to the accusation that Witte helped write code for the Trickbot malware, the department also issued an indictment against Witte for her role in allegedly ransoming victims. Witte and her co-conspirators allegedly coerced victims into purchasing special software through a bitcoin address controlled by the Trickbot Group in order to decrypt compromised files. Witte also allegedly provided code to the Trickbot Group that monitored and tracked authorised users of the malware and developed tools and protocols to store stolen login credentials. In total, Witte has been charged in 19 counts of a 47-count indictment. If convicted, she could face up to 87 years in prison. Information about the other individuals charged in the indictment is currently confidential. “These charges serve as a warning to would-be cybercriminals that the Department of Justice, through the Ransomware and Digital Extortion Task Force and alongside our partners, will use all the tools at our disposal to disrupt the cybercriminal ecosystem,” Deputy Attorney-General Lisa Monaco said. Related Coverage More

  • in

    NSW Health confirms data breached due to Accellion vulnerability

    New South Wales Health has confirmed being impacted by a cyber attack involving the file transfer system owned by Accellion.  The system was widely used to share and store files by organisations around the world, including NSW Health, the government entity said on Friday afternoon.”Following the NSW government’s advice earlier this year around a world-wide cyber attack that included NSW government agencies, NSW Health is notifying people whose data may have been accessed in the global Accellion cyber attack,” it said in a statement.The state entity said medical records in public hospitals were not affected and the software involved is no longer in use by NSW Health.”Different types of information, including identity information and in some cases, health-related personal information, were included in the attack,” it added.NSW Health said it has been working with NSW Police and Cyber Security NSW and that to date, there is no evidence any of the information has been misused.See also: How NSW Health used tech to respond to COVID-19

    “A cyber incident help line has been set up to provide further information and support to those people NSW Health is contacting,” it said. “If you are contacted by NSW Health, you will be given the cyber incident help line details; if you are not contacted by NSW Health, no action is required.”The NSW Police Force and Cyber Security NSW have set up Strike Force Martine to determine the impact on NSW government agencies that were caught up in the attack on Accellion.Accellion’s file-sharing program, File Transfer Appliance, is an enterprise product used to transfer large files. While now discontinued and supplanted by other software such as Kiteworks, a zero-day vulnerability in the legacy software was found in December and has since been exploited by attackers in the wild. It is estimated that some 100 organisations around the world were among those affected by the breach.Transport for NSW in February confirmed being caught up in the breach.The Australian Securities and Investments Commission (ASIC) in January said one of its servers was breached earlier in the month in relation to Accellion software used by the agency to transfer files and attachments.Accellion was also used as the vector to breach the Reserve Bank of New Zealand (RBNZ) in January.HERE’S MORE More