More stories

  • in

    Sky ECC denies police have ‘cracked’ encrypted messaging platform

    Sky ECC has denied that the encrypted messaging platform has been compromised by European law enforcement. 

    Sky ECC advertises itself as a secure, end-to-end encrypted service and the “most secure messaging platform you can buy.” The vendor offers a subscription and either Android and iOS handsets that are paid for in Bitcoin (BTC) and shipped worldwide. 
    According to Europol, there are approximately 170,000 Sky ECC users and roughly three million messages are sent via the platform on a daily basis. In total, over 20% of the Sky ECC user base is said to be located in Belgium and the Netherlands. 
    On March 10, Europol announced that together with various law enforcement agencies in Belgium, France, and the Netherlands, it has been possible to “unlock the encryption” of Sky ECC. 
    The law enforcement agency said that since roughly mid-February, chat sessions established between approximately 70,000 users have been monitored, leading to a “large number of arrests” in a crackdown on March 9. House searches and seizures took place across Belgium and the Netherlands and the mobile phones of suspects were seized.
    “The continuous monitoring of the illegal Sky ECC communication service tool by investigators in the three countries involved has provided invaluable insights into hundreds of millions of messages exchanged between criminals,” Europol says. “This has resulted in the collection of crucial information on over a hundred planned large-scale criminal operations, preventing potential life-threatening situations and possible victims.”
    In July 2020, the UK’s National Crime Agency (NCA) seized the servers of EncroChat, an encrypted platform that the NCA says was used to coordinate criminal activity. 

    Over 700 arrests were made at the time. According to Europol, following the seizure, many EncroChat users then moved over to Sky ECC. 
    Sky ECC has pushed back against Europol’s claims, referring to a Dutch police press release that is accompanied by a photo allegedly showing the app in use on a mobile device. 
    The vendor claims that the image — which appears to relate to a device advertised on the skyecc.eu domain, rather than .com — is the work of an “imposter” and a “disgruntled” former reseller. 
    Sky ECC says that the “crack or hack” of its encrypted communication software are “false allegations.” 
    Furthermore, Sky ECC CEO Jean-François Eap said in a statement that the company has not been contacted by the authorities “in connection with any investigations currently being reported,” and “the confusing references to Sky ECC instead of skyecc.eu are very damaging.”
    “We know that someone has been passing themselves off as an official reseller of Sky ECC for some time and we have been trying to shut it down through legal channels for almost two years,” Eap commented.
    Instead, the vendor claims a malicious phishing application is being distributed under the Sky ECC name, with the implication being that law enforcement has been able to monitor messages sent via the unauthorized app, rather than the official version. Sky ECC claims this app has been illegally created, modified, and side-loaded onto devices.  
    However, the company also noted “temporary interruptions in connection with its servers” on March 8.
    “All Sky ECC phones purchased directly from Sky ECC or its authorized distributors remain secure,” the vendor added. “We continue to stand by our promise of secure devices, secure networks and secure communications.”
    Previous and related coverage
    Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Senators concerned 'hacking' Bill powers could be used beyond intended scope

    Senators are concerned that they are yet to hear a convincing argument as to why the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 has omitted definitions for the categories of offences it would be used for by two of Australia’s law enforcement bodies.
    The Bill, if passed, would hand the Australian Federal Police (AFP) and the Australian Criminal Intelligence Commission (ACIC) three new computer warrants for dealing with online crime.
    The first of the warrants is a data disruption one; the second is a network activity warrant; and the third is an account takeover warrant.
    With representatives from the Department of Home Affairs, the AFP, ACIC, and Australian Signals Directorate facing the Parliamentary Joint Committee on Intelligence and Security (PJCIS) and its review of the Bill, Labor Senator Kristina Keneally on Wednesday sought to confirm whether the Bill would not be used to target low-level offences.
    “What I’m seeking to understand here … the Bill outlines a number of crimes — child abuse and exploitation, terrorism, the sale of illicit drugs, human trafficking, identity theft, and fraud, assassinations, and the distributions of weapons — as the examples of the crimes that would be prosecuted,” she asked.
    “What safeguards beyond just pointing to capacity constraints or the good intentions of government can you point to that would assure this committee that these three warrants would not be used for other types of crime, other categories of crime … considered by the community to be lower level offences?”
    Keneally pointed to previous legislation, such as the Telecommunications (Interception and Access) Act 1979 (TIA Act), and noted the PJCIS has yet again been asked to take at face value that the latest legislation under consideration would not extend to minor offences despite hearing similar arguments in the past in relation to the TIA Act.

    It was previously revealed that three councils in NSW, one in Queensland, the RSPCA, the Environment Protection Authority, and state coroners, to name a few, accessed metadata under Section 280 of the Telecommunications Act 1997.
    The Communications Alliance previously labelled this as “examples of entities that have managed to subvert the intended scope of the legislation”.
    “There’s the safeguards built into the legislation. If you look at data disruption warrant for example, the issuing officer has to be satisfied that the activities authorised for the warrant are justified and proportionate with regard to the offences being targeted,” AFP deputy commissioner Ian McCartney said.
    Keneally was not convinced that in a few years’ time it wouldn’t emerge that the warrants were issued for a range of other offences, like they were with the data retention legislation, simply because they attract a three-year threshold.
    Pointing to the scenario of an outlaw motorcycle gang, Police commissioner Reece Kershaw said in such a situation, with the peripheral and crime-adjacent activities, it makes it very difficult “if you’re going to attack the outer perimeter of these organised crime networks” to narrow down or define the scope.
    “These powers will assist us to dismantle those networks, especially now,” he said.
    Home Affairs Electronic Surveillance Reform Taskforce acting first assistant secretary Andrew Warnes said one of the first considerations of the ATT member or eligible judge when granting a warrant would be the nature and gravity of the conduct constituting the kinds of offences in relation to which the information would be obtained.
    “We’ve then also added additional safeguards to say, ‘That’s not enough just to go and get a warrant because an offence is three years’, it has to be of such the nature and gravity in terms of the conduct constituting those offences, that information can be sought,” Warnes explained.
    “And then they have to give consideration to whether the access to that data will assist in the collection of intelligence, that is actually then relevant to the protection, detection, frustration of those offences and the intelligence value of that.”
    The approver, Warnes said, would also have to make sure that what is authorised by the warrant is proportionate to the likely intelligence value of any information sought to be obtained. They would also have to consider whether the information could be garnered using alternative or less intrusive means.
    “All of that together makes it very difficult to envisage a circumstance where you could have an offence that is subjectively considered not serious three-year offence,” he continued.
    Keneally said she heard similar assurances when the TIA Act was being probed.
    “It does raise a question to me as to why the government is not willing, if they are, if you are upfront in saying we are not going to use these powers to investigate subjectively low-level offending, why that can’t be prescribed in legislation to give the community that assurance,” she said.
    MORE ON THE ‘HACKING’ BILL More

  • in

    NSW Police to use SMS geo-targeting tool to find 'high-risk' missing persons

    The New South Wales Police Force has teamed up with Australia’s major telcos — Telstra, Optus, and TPG — to launch a national SMS geo-targeting alert system to enhance the search for “high-risk” missing persons across the state.
    Using the new system, mobile devices in defined areas where police hold grave concerns for the missing person will be sent alerts, a brief description, and information on how to report any sighting of the individual.
    NSW Police Force stated the system would be used in cases when a “high-risk” person is missing, which include cases involving people with dementia, children with disabilities, and young people who go missing in large crowds.
    “Police always act as quickly as possible to find anyone who is reported missing and this tool will mean the public will be able to assist almost immediately,” Minister for Police David Elliot said.
    “The community should never underestimate the crucial role they can play in potentially saving someone from harm and if you receive this message we ask that you keep your eyes out and help police to reunite someone with their loved ones.”
    Telstra, Optus, and TPG will roll out the tool by using the existing emergency framework.
    “We’re thrilled to be assisting the NSW Police Force Missing Persons Registry with the ability to notify the community in critical missing persons cases and hope it will help our first responders make some happy reunions,” Telstra Enterprise chief customer officer John Ieraci said.

    The system was first introduced by states and territories after the 2009 Victorian Black Saturday bushfires where alerts within specific areas were sent in the event of likely emergency situations, such as flood, bushfire, or other extreme weather conditions.
    Extending the use of the system to missing persons was established following a review of the state’s police operations that led to the establishment of the Missing Persons Registry and the implementation of new systems and procedures that came into effect in July 2019.
    The introduction of such a tool comes at a time when several concerns are being raised about the legislative framework that governs Australia’s intelligence community and the power that they could potentially hold over entities such as those in telecommunications. Some that are currently under the microscope include the pending Critical Infrastructure Bill, Online Safety Bill, and the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020.
    Related Coverage More

  • in

    Australia's answer to thwarting ransomware is good cyber hygiene

    The federal government has provided advice on how to counter ransomware in Australia, encouraging the use of multifactor authentication and urging businesses to keep software up to date, archive data and back-up, build in security features to systems, and train employees on good cyber hygiene.
    The advice was provided in Locked Out: Tackling Australia’s ransomware threat, which is a 14-page document [PDF] prepared by the Cyber Security Industry Advisory Committee. It’s touted by the Department of Home Affairs as “[building] awareness for all Australians and their businesses on the current ransomware threat landscape”.
    “Ransomware attacks today present a major threat to Australian organisations,” the paper declared. “In 2020, cyber criminals conducted successful attacks on major Australian organisations at a volume never before experienced.”
    The paper presents case studies on attacks, such as the one experienced by Toll last year, in addition to advice on how to protect against ransomware attacks.
    “Early detection of a ransomware attack is paramount to minimising impact,” it says.
    It also says many of the most impactful ransomware attacks could have been avoided with foundational cybersecurity controls and good cybersecurity hygiene.
    “For small businesses, which make up 93% of employing businesses in Australia and provide employment for nearly 45% of Australia’s workforce, the challenge is different,” it continued.

    “They don’t have chief security officers, an IT team. or possibly even an IT qualified team member, which is understandable when over half employ less than four people.
    “All businesses have valuable data and systems they need to protect. It is vital that they establish strong foundational controls and practice good cybersecurity hygiene practices.”
    The paper then pointed readers to the Australian Cyber Security Centre’s (ACSC) not-so essential Essential Eight controls for mitigating cyber attacks.
    Dipping its toes into cyber insurance, the paper stated that the critical takeaway is organisations should see cyber insurance as one component of a holistic cybersecurity program, not as a replacement for one.
    Two Labor shadow ministry members last month called for a national ransomware strategy focused on reducing the number of such attacks on Australian targets. Shadow Minister for Home Affairs Kristina Keneally and Shadow Assistant Minister for Communications Tim Watts declared that due to ransomware being the biggest threat facing Australia, it was time for a strategy to thwart it.
    On Thursday, Watts called the government’s ransomware paper a missed opportunity.
    “While Labor welcomes the government’s acknowledgement of the ransomware problem, this report falls short of acknowledging the scale of the AU$1 billion problem,” he said.
    “Instead of using the opportunity to launch a debate about the role government can play in shaping the calculus of ransomware gangs sizing up Australian organisations, the Morrison government continues its approach of playing the blame game.”
    To Watts, it’s not good enough to tell businesses to defend themselves by “locking their doors to cyber-criminal gangs”.
    “As the Australian Cyber Security Centre has warned, ransomware gangs are employing increasingly sophisticated organisational models and pressure tactics to reap record illicit profits,” he said.
    Such response, Watts said, was particularly disappointing in the face of the state-backed Hafnium campaign against Microsoft Exchange servers.
    “Thousands of Australian servers are potentially vulnerable to a further wave of ransomware attacks exploiting this vulnerability and potentially financially devastating Australian businesses,” Watts continued. “The Morrison Government must do more to actively tackle the ransomware threat and develop a National Ransomware Strategy.”
    Following the Microsoft Exchange Server hack, Assistant Minister for Defence Andrew Hastie on Wednesday asked Australian organisations to take immediate steps to urgently patch vulnerable systems.
    “The ACSC has identified a large number of Australian organisations yet to patch affected versions of Microsoft Exchange, leaving them exposed to cyber compromise,” Hastie said.
    “Australian organisations cannot be complacent when it comes to cybersecurity, which is why all users of Microsoft Exchange are being urged to patch their vulnerable systems.”
    Watts called the government’s response delayed.
    “Issuing a media release seven days after the vulnerability is disclosed is the cyber equivalent of telling people to shut the gate after the horse has bolted,” he added.
    HERE’S MORE More

  • in

    Cyber criminals targeting hospitals are 'playing with lives' and must be stopped, report warns

    Cyberattacks targeting healthcare are putting patients at unnecessary risk and more must be done to hold the cyber criminals involved to account, warns the CyberPeace Institute, an international body dedicated to protecting the vulnerable in cyberspace.
    The healthcare industry has been under increased strain over the past year due to the impact of the COVID-19 pandemic, which has prompted some cyber criminals to conduct ransomware campaigns and other cyberattacks.

    More on privacy

    Faced with a ransomware attack, a hospital might pay the cyber criminals the ransom they demand in return for the decryption key because it’s perceived to be the quickest and easiest way to restore the network – and, therefore, the most direct route to restoring patient care.
    SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)
    That doesn’t stop the incident being traumatic for staff, who might suddenly find themselves unable to be involved in procedures, while patients may get sent to other hospitals for treatment – something that could prove risky if time is a factor. But even months on from a cyberattack, patient care can remain affected.
    “There’s a real-time impact and a long-lasting impact,” Stéphane Duguin, CEO of the CyberPeace Institute, told ZDNet.
    “When hospitals and healthcare are hit by ransomware, what is the quality of care you could hope for in these entities like six months afterwards, or one year afterwards? It’s quite concerning because you have more chance to get care of less good quality, if you go into this hospital with a condition, the care might take longer than it did before an attack,” Duguin said.

    Because of this, the CyberPeace Institute paper, entitled ‘Playing with Lives’, argues that cyberattacks on healthcare are attacks on society as a whole, potentially creating threats to human life – particularly when campaigns are targeting hospitals and healthcare organisations during a pandemic.
    One of the key reasons why cyber criminals target healthcare is because it’s often based around what the report describes as “fragile digital infrastructure”. Healthcare networks are complex because of the variety of specialist devices connected to them. They’re also vulnerable because of the amount of legacy infrastructure on the network, which might not even be supported with security updates.
    It was the continued use of legacy infrastructure across the network that left the UK’s National Health Service (NHS) so vulnerable to the WannaCry ransomware attack. Although a patch was available before the incident, the nature of healthcare meant it was difficult to shut down sections of the network in order to apply the update.
    The use of legacy infrastructure is tied to what the report describes as a “resource gap” in healthcare, which means that cybersecurity in the sector is under-financed, making it hard to distribute the necessary resources to fully protect hardware and software across the network.
    SEE: Cybercrime groups are selling their hacking skills. Some countries are buying
    Ultimately, cyber criminals are carrying out campaigns like ransomware attacks because they’re seeking easy money; extorting funds from hospitals whose networks have been compromised provides a means of gaining exactly that.
    Unfortunately, ransomware gangs rarely face consequences for their actions, and Dunguin argues that governments and law enforcement should put more resources into bringing cyber-criminal gangs to justice.
    “Government should also play a part in reducing the number of attacks by going after criminal groups and making sure that it’s not a risk-free crime for cyber criminals,” he said.
    MORE ON CYBERSECURITY More

  • in

    2020 was a ‘record-breaking’ year in US school hacks, security failures

    A new analysis on the state of cybersecurity in K-12 schools across the US has revealed a record-breaking number of security incidents in 2020. 

    On Wednesday, during the K-12 Cybersecurity Leadership Symposium, the research, titled “The State of K-12 Cybersecurity: 2020 Year in Review,” was released. 
    The 25-page report is the result of work between the K12 Security Information Exchange, led by Doug Levin as National Director, and the K-12 Cybersecurity Resource Center. 
    The independent research focuses on the infrastructure supporting primary and secondary-level education in the United States. 
    Last year, students and teachers worldwide were forced to abandon the classroom and shift to remote learning platforms without warning. This disruption continues, and while the report acknowledges the “heroic” efforts of IT staff, the analysis also says that “school district responses to the COVID-19 pandemic also revealed significant gaps and critical failures in the resiliency and security of the K-12 educational technology ecosystem.”
    “Indeed, the 2020 calendar year saw a record-breaking number of publicly-disclosed school cyber incidents,” the report says. “Moreover, many of these incidents were significant: resulting in school closures, millions of dollars of stolen taxpayer dollars, and student data breaches directly linked to identity theft and credit fraud.”
    The K-12 Cyber Incident Map, as shown below, cataloged 408 school incidents across the year that have been publicly disclosed. These include student and staff data breaches, ransomware outbreaks, phishing and social engineering, denial-of-service (DoS) attacks, and more. 

    K-12 incident rates have increased by 18% year-over-year. The most common cybersecurity incident was a form of data breach, followed by DoS and ransomware. In many data breach cases, sensitive information belonging to staff and students were compromised. 
    “Other” incidents include website defacement, unauthorized email account access, and remote class invasions — also known as Zoombombing. 

    Incidents increased the most during summer and fall, most likely due to the increased reliance by schools on technology to keep lessons on track. The research also notes that as school staff became remote employees, device and account privileges may have increased, creating a larger attack surface for threat actors. 
    “School districts should revisit their contingency plans for continuity of operations during emergencies, with a focus on IT systems used in teaching and learning and district operations,” the report notes. “While no one can predict whether another global pandemic will close schools to in-person learning, important lessons can and should be drawn from this experience to ensure that if such an event (or something like it) occurs again in the future, districts are better prepared.”
    Previous and related coverage
    Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Protect your online data with this decentralized VPN and firewall portable solution

    Cybersecurity experts have always recommended the use of VPNs whenever you go online. And while no one can contest their efficacy when it comes to protecting your data and rendering you anonymous on the internet, there’s no denying that VPNs cost a pretty penny. An annual subscription to a well-known VPN service can already set you back a hundred dollars.

    If you want to take cybersecurity into your own hands, you always have the option to go beyond a VPN subscription. The Deeper Connect Nano is a decentralized VPN and firewall device that eliminates the need to pay monthly fees for VPN services. An ultra-portable tool, you can bring it anywhere you go and still remain protected when you go online.
    Unlike a VPN that reroutes your connection to various servers, this device serves as client and server, and your IP address automatically changes based on routing rules. There’s no middle man that manages your network for you. It’s serverless and distributed, so none of your data be logged, leaked, hacked, or even subpoenaed. It also blocks ads, trackers, and malware across the entire network, as well as lets you browse and stream online without bottlenecks.
    Here’s a closer look at how it works:
    [embedded content]
    Since it’s primarily designed to protect your data, it’s worth noting that it has a 7-layer firewall that secures your entire home or business network. It even filters NSFW and NSFC on all internet devices, making it ideal for use in the workplace and at home. Set up is pretty straightforward, too. With a plug-and-play design, you can get immediate access to free, secure, and private internet wherever you go.
    The Deeper Connect Nano was so impressive that it managed to garner $1 million in contributions on IndieGogo. Now, you can also be a proud owner of this cybersecurity marvel for 33% off. For a limited time, you can get it on sale for $199.99.
    Prices subject to change.

    ZDNet Recommends More

  • in

    Microsoft expands AccountGuard ahead of elections, deepens Yubico partnership

    Microsoft has expanded advanced features in the AccountGuard service ahead of upcoming elections. 

    AccountGuard is a selective program for individuals and organizations that may face a higher risk of attack or account compromise due to their involvement in politics. 
    The service includes cybersecurity guidance, access to webinars and workshops, notifications when a threat or “compromise by a known nation-state actor” against an Office 365 account linked to a member occurs, alerts relating to Hotmail and Outlook accounts, and damage control recommendations if a cyberattack is successful.  
    Participants also have a point of contact in the Microsoft Defending Democracy Program team. 
    This week, Microsoft expanded the offering to all AccountGuard members in 31 democracies to include identity and access management protections at no further cost. 
    “The addition of new features to AccountGuard provides new ways to protect online accounts for political parties, candidates and their staff, health care workers, human rights defenders, journalists and certain other customers who are at greatest risk from nation-state hackers,” Microsoft says. 
    The company’s expansion includes multi-factor authentication, single sign-on services for cloud apps, conditional access policy implementation, and privileged identity management (PIM) — the creation of time and approval-based access policies for sensitive and important resources. 

    Microsoft’s access options were made available to political parties ahead of the US 2020 elections, and with similar events coming up in countries including the Netherlands, Finland, and Germany, the firm’s rollout is intended to stop “hack and leak” attempts before they have a chance to begin. 
    In addition, the Redmond giant has announced the expansion of an existing partnership with Yubico. Yubico manufactures YubiKey, a physical dongle for multi-factor authentication designed to reduce the risk of phishing attempts and account takeovers. 
    As of now, up to 25,000 YubiKeys will be offered to AccountGuard members. Depending on the size of the organization applying, a number of free keys may be on offer. 
    In April last year, Microsoft made the service available for healthcare entities and human rights groups, saying that these organizations would maintain access during the COVID-19 pandemic.
    Previous and related coverage
    Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More