More stories

  • in

    ASD using classified capabilities to warn local entities of impending ransomware hit

    Image: APH
    While the Australian Cyber Security Centre (ACSC) is engaged in helping a local organisation remove and recover from a ransomware hit or cyber attack, its overseer, the Australian Signals Directorate (ASD) is able to use its more secretive powers to find out if any other organisations are on the attackers hit list. Speaking about the attack on Channel Nine in March, director-general of the Australian Signals Directorate Rachel Noble told Senate Estimates that pre-warning organsations about any precursor activity on their networks or systems is part of ASD’s “value add”. “We were very engaged with [Channel Nine] and the technical information that they were able to provide us about what happened on their network helped us, using our more classified capabilities, to warn two other entities that they were about to be victims as well, to prevent them from becoming victims,” Noble said. A particular focus in the past year for ACSC has been the health sector, which has seen its share of cyber incidents, and been the sector with the highest level of ransomware attacks. ACSC head Abigail Bradshaw said when an incident occurs, ACSC assists organisations with shutting down and confining the ransomware, before providing assurance that the malicious actor is out, and then helping to restore systems. “And lastly, as quickly as we can … to take whatever indicators of compromise we can for the purpose of pre-warning other entities before they become victims,” Bradshaw said. “We use the full range of ASD capabilities to determine whether or not there might be indicators of future victims. We have done that in a number of cases in the last 12 months … using the full range of ASD capabilities, we have been able to identify precursors going down on other people’s networks, and to pre-warn those entities before they become victims, which [as Noble says] is much more useful.”

    The ACSC has been publishing pre-emptive threat advisories for health care over the past 18 months “because they have been so vulnerable and also useful targets for criminals,” Bradshaw said. “We have direct links into, and in fact officers embedded in the Department of Health, because of the criticality of the health sector at the moment.” the ACSC chief said. “That means we alert the Department of Health whenever there is a impact to the healthcare sector, but also, in particular, any entity involved in the vaccine rollout, because that is of critical importance.” Noble confirmed the government has been engaging with global meat producer JBS after ransomware took down its systems earlier this week. “We have been engaging with the JBS subsidiary here in Australia to provide them with the best advice and assistance that that we can,” Noble said. “I think it’s fair to say that they have a private incident response provider, which is terrific, and they know that we’re here for them.” The director-general said ASD has not used its offensive cyber capabilities against the ransomware crew, at this time believed to be Russian-based. JBS said on Tuesday it has seen “significant progress” in resolving the attack that hit its North American and Australian operations while leaving its Mexico and UK without impact. “We have cybersecurity plans in place to address these types of issues and we are successfully executing those plans. Given the progress our IT professionals and plant teams have made in the last 24 hours, the vast majority of our beef, pork, poultry and prepared foods plants will be operational tomorrow,” JBS USA CEO Andre Nogueira said. The company said it has received strong support from governments in Washington, Canberra, and Ottawa, and was having daily calls with officials. In April last year, the government announced ASD used its offensive powers against COVID-19 scammers, and since then, ASD has made sure those crews have not got up off the mat. “We absolutely have continued quite a range of offensive cyber operations, including ensuring that this particular organised criminal syndicate — watching them and making sure that they are unable to rebuild their infrastructure — do not get back on their feet,” the director-general said. Bradshaw added that the National Cyber Security Committee has sometimes been meeting daily, in particular, when vulnerabilities in Microsoft Exchange and Accellion appear. Related CoverageAustralia’s answer to thwarting ransomware is good cyber hygieneBut Labor thinks the advice falls short of recognising the actual problem.Colonial Pipeline attack used to justify Australia’s Critical Infrastructure BillHome Affairs has touted the benefits of the pending Critical Infrastructure Bill while confirming the government has considered the merits of a mandatory reporting requirement for ransomware as an extension of the cybersecurity strategy.RBA to step up cyber resilience with new identity and access management systemThe Reserve Bank of Australia has gone to market for help to deliver more automated IDAM capabilities to reduce unauthorised data access.NSW cyber strategy demands government lead by exampleA new cyber strategy wants strong cybersecurity foundations to start with government agencies as NSW aims to be a leader in digital.The winged ninja cyber monkeys narrative is absolutely wrong: Former NCSC chief’Hype, fear, uncertainty, doubt, that is our enemy,’ says Ciaran Martin. ‘We need absolutely to demystify cybersecurity.’ More

  • in

    FireEye sells FireEye Products unit to STG for $1.2 billion

    FireEye said it is selling its FireEye Products business for $1.2 billion to a consortium led by Symphony Technology Group (STG).The all-cash deal is expected to close at the end of the fourth quarter. FireEye said that the transaction separates the company’s network, email, endpoint and cloud security products from Mandiant’s software and services. FireEye Products and Mandiant Solutions will continue to be one entity until the transaction closes. Symphony Technology Group and FireEye will maintain reselling and collaboration agreements. FireEye CEO Kevin Mandia said the deal will allow FireEye to scale its software platforms. FireEye projected that its products and related subscriptions and support revenue would fall 10% to 11% in 2021 compared to 2020. Here’s a look at how FireEye Products fit into the company’s first quarter billings mix. In addition, FireEye said it has authorized a stock repurchase program of $500 million. More

  • in

    Accelerating AI at the speed of light

    Improved computing power and an exponential increase in data have helped fuel the rapid rise of artificial intelligence. But as AI systems become more sophisticated, they’ll need even more computational power to address their needs, which traditional computing hardware most likely won’t be able to keep up with. To solve the problem, MIT spinout Lightelligence is developing the next generation of computing hardware.

    The Lightelligence solution makes use of the silicon fabrication platform used for traditional semiconductor chips, but in a novel way. Rather than building chips that use electricity to carry out computations, Lightelligence develops components powered by light that are low energy and fast, and they might just be the hardware we need to power the AI revolution. Compared to traditional architectures, the optical chips made by Lightelligence offer orders of magnitude improvement in terms of high speed, low latency, and low power consumption.

    In order to perform arithmetic operations, electronic chips need to combine tens, sometimes hundreds, of logic gates. To perform this process requires the electronic chip transistors to switch off and on for multiple clock periods. Every time a logic gate transistor switches, it generates heat and consumes power.

    Not so with the chips produced by Lightelligence. In the optical domain, arithmetic computations are done with physics instead of with logic gate transistors that require multiple clocks. More clocks means a slower time to get a result. “We precisely control how the photons interact with each other inside the chip,” says Yichen Shen PhD ’16, co-founder and CEO of Lightelligence. “It’s just light propagating through the chip, photons interfering with each other. The nature of the interference does the mathematics that we want it to do.”

    This process of interference generates very little heat, which means Shen’s optical computing chips enable much lower power consumption than their electron-powered counterparts. Shen points out that we’ve made use of fiber optics for long-distance communication for decades. “Think of the optical fibers spread across the bottom of the Pacific Ocean, and the light propagating through thousands of kilometers without losing much power. Lightelligence is bringing this concept for long-distance communication to on-chip compute.”

    With most forecasters projecting an end to Moore’s Law sometime in 2025, Shen believes his optic-driven solution is poised to address many of the computational challenges of the future. “We’re changing the fundamental way computing is done, and I think we’re doing it at the right time in history,” says Shen. “We believe optics is going to be the next computing platform, at least for linear operations like AI.”

    To be clear, Shen does not envision optics replacing the entire electronic computing industry. Rather, Lightelligence aims to accelerate certain linear algebra operations to perform quick, power-efficient tasks like those found in artificial neural networks.

    Much of AI compute happens in the cloud at data centers like the ones supporting Amazon or Microsoft. Because AI algorithms are computationally intensive, AI compute takes up a large percentage of data center capacity. Picture tens of thousands of servers, running continuously, burning millions of dollars worth of electricity. Now imagine replacing some of those conventional servers with Lightelligence servers that burn much less power at a fraction of the cost. “Our optical chips would greatly reduce the cost of data centers, or, put another way, greatly increase the computational capability of those data centers for AI applications,” says Shen.  

    And what about self-driving vehicles? They rely on cameras and AI computation to make quick decisions. But a conventional digital electronic chip doesn’t “think” quickly enough to make the decisions necessary at high speeds. Faster computational imaging leads to faster decision-making. “Our chip completes these decision-making tasks at a fraction of the time of regular chips, which would enable the AI system within the car to make much quicker decisions and more precise decisions, enabling safer driving,” says Shen.

    Lightelligence boasts an all-MIT founding team, supported by 40 technical experts, including machine learning pioneers, leading photonic researchers, and semiconductor industry veterans intent on revolutionizing computing technology. Shen did his PhD work in the Department of Physics with professors Marin Soljajic and John Joannoupolos, where he developed an interest in the intersection of photonics and AI. “I realized that computation is a key enabler of modern artificial intelligence, and faster computing hardware would be needed to complement the growth of faster, smarter AI algorithms,” he says.

    Lightelligence was founded in 2017 when Shen teamed up with Soljajic and two other MIT alumni. Fellow co-founder Huaiyu Meng SM ’14, PhD ’18 received his doctorate in electrical engineering and now serves as Lightelligence’s vice president of photonics. Rounding out the founding team is Spencer Powers MBA ’16. Powers, who received his MBA from MIT Sloan School of Management, is also a Lightelligence board member with extensive experience in the startup world.

    Shen and his team are not alone in this new field of optical computing, but they do have key advantages over their competitors. First off, they invented the technology at the Institute. Lightelligence is also the first company to have built a complete system of optical computing hardware, which it accomplished in April 2019. Shen is self-assured in the innovation potential of Lightelligence and what it could mean for the future, regardless of the competition. “There are new stories of teams working in this space, but we’re not only the first, we’re the fastest in terms of execution. I stand by that,” he says.

    But there’s another reason Shen’s not worried about the competition. He likens this stage in the evolution of the technology to the era when transistors were replacing vacuum tubes. Several transistor companies were making the leap, but they weren’t competing with each other so much as they were innovating to compete with the incumbent industry. “Having more competitors doing optical computing is good for us at this stage,” says Shen. “It makes for a louder voice, a bigger community to expand and enhance the whole ecosystem for optical computing.”

    By 2021, Shen anticipates that Lightelligence will have de-risked 80-90 percent of the technical challenges necessary for optical computing to be a viable commercial product. In the meantime, Lightelligence is making the most of its status as the newest member of the MIT Startup Exchange accelerator, STEX25, building deep relationships with tier-one customers on several niche applications where there is a pressing need for high-performance hardware, such as data centers and manufacturers. More

  • in

    Breached companies facing higher interest rates and steeper collateral requirements

    Companies are now being penalized financially by banks for data breaches, according to a new study from the American Accounting Association.

    ZDNet Recommends

    In a new report, titled “Do Banks Price Firms’ Data Breaches?” the organization found that banks are punishing companies that lose customer financial account information or social security numbers through data breaches with substantially higher interest rates and steeper requirements for collateral and covenants. The researcher behind the report analyzed data on 1,081 bank loans to publicly traded companies from 2003 to 2016. Of the 1,081 bank loans, 587 went to companies that had dealt with a data breach and 494 went to companies that had not. Henry Huang, co-author of the study and an associate professor of accounting at Yeshiva University, said he wanted to find a way of quantifying the financial consequences of breaches.The researchers matched companies in similar industries to see whether those that had been breached saw differences in how banks dealt with them. The report showed a clear link between higher interest rates and data breaches, with those that suffered more disastrous breaches faced even tougher treatment from banks. But banks did make a distinction between the companies that had been hacked by criminal groups and those that had lost control of customer data through accidents or mistakes. The financial penalties were harsher for certain industries, like healthcare, business services, computer, electronic equipment, and transportation. Surprisingly, companies that were known for having well-regarded IT departments faced even harsher treatment from banks after breaches because “banks had to make a bigger adjustment to their assessment of the company’s security.”

    “We also wanted to learn which variables come into play. For example, we learned there are things companies can do to mitigate damage after a data breach,” Huang said, mentioning actions like hiring security companies to address the attack and building out IT security systems.”There are also valuable lessons here for accountants and auditors. It highlights the consequence of different types of data breaches in different industries, the importance of safeguarding confidential information, and the value of remedial actions after a breach,” Huang added. Cybersecurity experts like Lamar Bailey, senior director of security research at Tripwire, explained that insurance rates and loan rates are all based on risk. 

    ZDNet Recommends

    The best cyber insurance

    The cyber insurance industry is likely to go mainstream and is a simple cost of doing business. Here are a few options to consider.

    Read More

    He compared it to the credit scores and driving records banks use for consumers, noting that the higher interest rates breached companies face is “totally valid.” “I would love to see a public security risk score so consumers can decide if they want to do business with this company or give them any personal data,” Bailey told ZDNet. Panorays founder Demi Ben-Ari explained that since companies are being held accountable for data breaches through data privacy regulations, it’s not surprising that banks are taking a similar approach by charging risky organizations higher interest rates. “The message is clear: organizations are responsible for protecting the data of their customers. To prevent cyber incidents, it’s essential for companies to thoroughly assess and continuously monitor their own cyber posture as well as that of the third parties with which they do business,” Ben-Ari said. “Clearly, investing in such processes pays in the long run.” More

  • in

    Brazil passes bill to fund connectivity for students and teachers

    A bill seeking extra funding to ensure Internet access in Brazil’s public school network was passed to benefit millions of students and teachers nationwide. Under the proposed measures, a budget of 3.5 billion reais ($690 million) will be provided by the central government via the Fund for Universal Access to Telecommunications Services (FUST). The funding will ensure the connectivity required for teachers and students to continue schooling activities during the Covid-19 pandemic.

    The proposals were vetoed by president Jair Bolsonaro, but the decision was overturned by the Brazilian Congress and was later confirmed by the Senate. According to the bill, the funding should go mainly towards mobile internet offerings, with fixed broadband provision possible if that option is cheaper or in cases where mobile services are not viable. Schools can also benefit from the funding if local education authorities consider it to be essential for their activities. It is estimated that approximately 18.3 million students and 1.5 million teachers will benefit from the measures set out in the proposals. The priority groups to receive the government-funded connectivity provided by the state are the beneficiaries of social programs, as well as pupils and teachers of schools in indigenous communities, or quilombolas, which are habitants of black rural communities made by the descendants of African Slaves.A survey launched in May 2020 by the Brazilian Internet Steering Committee (CGI.br) noted that 71% of households in Brazil have access to the Internet. However, more than 20 million households are digitally excluded, with schoolchildren in vulnerable families being the most impacted. The issue of lack of connectivity is particularly noticeable in households in the poorest areas of the country: 35% of homes in the Northeast region don’t use the Internet, and that is also a reality for 45% of Brazilian families on minimum wage.Separate research from the Brazilian Institute of Geography and Statistics has found that millions of citizens are digitally excluded due to factors such as lack of technical knowledge to access the web and availability of Internet services. More

  • in

    Most people do not approve of companies profiting from their data

    People around the world are getting upset at how their data is being collected and used. Data is often harvested and sold for profit — often without the person’s consent.

    Special feature

    Turning Big Data into Business Insights

    Businesses are good at collecting data, and the Internet of Things is taking it to the next level. But, the most advanced organizations are using it to power digital transformation.

    Read More

    The UK government wants to extract the medical history of every patient in England if they do not opt-out before July 1, 2021. That is a huge amount of data that potentially can be shared. So, it is not surprising that people are not keen to have their online data shared — often for profit. People are becoming increasingly concerned with and distrustful of how companies use, manage, and protect their personal data, and a new survey has revealed how much people know about data gathering and what happens to their data.From April 23 to May 3, 2021, St. Louis-based market research firm Invisibly surveyed 1,320 people to gauge whether they approve of having their data sold for profit. It wanted to find out whether people want to have more control over what happens to their data and if they had any interest in monetizing their data.The survey showed that four in five (79%) do not approve of companies profiting from their data. Respondents under 25 years of age were less likely to disapprove (74%) compared to older respondents (85% to 87%).
    Invisibly
    Seven in 10 (71%) were aware that companies profit from selling their data, and 46% felt that they should be able to earn money from their own data instead of companies.

    Over three in four (77%) do want to control who has access to their data, yet 81% of consumers will share their personal information for online personalization from a brand. Dr. Don Vaughn, Ph.D., Head of Product at Invisibly said: “Data consent is a huge industry issue right now and we are on a mission to give people control and consent over the data they share.”So how can people be made aware of issues around data control? Anyone who understands data collection and online advertising understand just how difficult, if not impossible it currently is to have total control over your own data. There are several platforms such as SavvyShares, which compensates consumers for access to their data, and Killi Paycheck, which offers direct payments for data use. It is not surprising that data privacy is a hot topic right now. Most businesses are tracking customers yet don’t tell them. Invisibly is launching a consumer-consented data platform where people can choose what data they share and get compensated for it.It would be fantastic if all data that is collected by any company has been consented to by the owner of the data — and that people are being compensated for giving companies access to their data. Being able to choose which data can be shared — and being able to completely protect your data, like the GDPR across Europe — will empower owners of data to choose what happens to their information.Data protection should not be something offered to the few but the many. But will paying people for their data stop companies also profiting from it? Only time will tell. More

  • in

    Microsoft acquires ReFirm Labs to boost its IoT security offerings

    Credit: ReFirm Labs
    Microsoft has acquired ReFirm Labs, the developer of the open-source Binwalk firmware security-analysis product, for an undisclosed amount. Microsoft officials announced the deal on June 2, saying that the acquisition of ReFirm will “enhance chip-to-cloud protection” capabilities that Microsoft offers on the IoT front. Fulton, Md.-based ReFirm Labs says that its Binwalk open-source technology has been used by more than 50,000 organizations worldwide. (The ReFirm team introduced Binwalk Open Source in 2010 and founded Refirm Labs in 2017.) Its tagline for Binwalk Enterprise is “Find the holes in your device security before attackers do.” Microsoft is touting ReFirm as enabling it to better provide firmware analysis and security on intelligent edge devices, ranging from servers to IoT. “The addition of ReFirm Labs to Microsoft will bring both world-class expertise in firmware security and the Centrifuge firmware platform to enhance our ability to analyze and help protect firmware backed by the power and speed of our cloud,” according to Microsoft’s blog post. Microsoft already offers Azure Defender for IoT and recently acquired CyberX to help bolster IoT security. Microsoft officials said last June that CyberX’s technology would provide a complement to other Microsoft Azure IoT services, as well as products like Azure Sentinel in a way that will help identify threats that may span converged IT and operational technology (OT) networks. More

  • in

    This is how attackers bypass Microsoft's AMSI anti-malware scanning protection

    Researchers have outlined the most popular tools and techniques used by threat actors to try and bypass Microsoft’s Antimalware Scan Interface (AMSI). 

    Making its debut in 2015, AMSI is a vendor-agnostic interface designed to integrate anti-malware products on a Windows machine and better protect end users, supporting features including scan request correlation and content source URL/IP reputation checks.  AMSI’s integration with Office 365 was recently upgraded to include Excel 4.0 (XLM) macro scanning to try and combat the increase of malicious macros as an infection vector.  Microsoft’s security solution is a barrier that today’s Windows malware developers often try to circumvent — either by methods such as obfuscation, steganography, or by preventing a file from being scanned and detected as malicious in initial attack stages.  In an investigation into techniques used to either avoid or disable AMSI, Sophos researchers said on Wednesday that threat actors will try everything from living-off-the-land tactics to fileless attacks.  Perhaps the opportunities AMSI bypass represents were highlighted in a tweet by security expert Matt Graeber in 2016, in which Sophos says a single line of code flipped a PowerShell attribute for AMSI integration and, in theory, may have stopped PowerShell-based processes from requesting scans.  While now integrated and flagged as malicious now for years, malware developers have taken inspiration from the one-line AMSI bypass and variations are still in use today that have been obfuscated to try and dance around signature-based scans. 

    In detections over 2020 – 2021, the majority appear to be focused on post-exploitation activities, including lateral movement. One method, for example, attempts to retrieve a PowerShell backdoor from a web server within a private IP address space.  The same bypass was traced back to a separate incident, linked to Proxy Logon attacks, in which a connection was forged to a remote server in order to grab a PowerShell-based malware downloader. Another technique used for AMSI bypass is the use of Seatbelt, an offensive security tool. A PowerShell script was used to create a delegate process that uses reflection to access the .NET interface for AmsiUtils. However, Sophos says that over 98% of AMSI circumvention attempts are made through tampering with the AMSI library. There are a variety of malware strains that will try to find AmsiScanBuffer, already loaded into memory, and then overwrite instructions to make sure scan requests fail.  Alternative versions may modify the memory component storing the code designed to return buffer scan results, prompting failure.  Other tactics include:Cobalt Strike: The memory patch technique is included under amsi_disable, and is viewable in the Agent Tesla Trojan family, alongside others. Command line remote scripts invoked in PowerShell prior to patch attempts.Creating fake DLLs designed to dupe PowerShell into loading a fake version of amsi.DLL, an old tactic now made more difficult due to improved Microsoft security. Downgrading script engines.Loading unsupported engines, or in extreme cases, virtual machines (VMs). “Given how prevalent those tactics have become, particularly in ransomware operator intrusions, AMSI can play a particularly important role in keeping Windows 10 and Windows Server systems from being compromised,” Sophos says. “But AMSI is not a panacea. And while Microsoft’s Windows Defender provides some protection against AMSI bypasses, attackers are continuously finding ways to obfuscate and conceal malicious content from anti-malware signature detections.”

    Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More