More stories

  • in

    Flash version distributed in China after EOL is installing adware

    Although the Flash Player app formally reached its end of life on December 31, 2020, Adobe has allowed a local Chinese company to continue distributing Flash inside China, where the application still remains a large part of the local IT ecosystem and is broadly used across both the public and private sectors.
    Currently, this Chinese version of the old Flash Player app is available only via flash.cn, a website managed by a company named Zhong Cheng Network, the only entity authorized by Adobe to distribute Flash inside China.
    But in a report published earlier this month, security firm Minerva Labs said its security products picked up multiple security alerts linked to this Chinese Flash Player version.
    During subsequent analysis, researchers found that the app was indeed installing a valid version of Flash but also downloading and running additional payloads.
    More precisely, the app was downloading and running nt.dll, a file that was loaded inside the FlashHelperService.exe process and which proceed to open a new browser window at regular intervals, showing various ad- and popup-heavy sites.

    Image: Minerva Labs
    The spammy behavior obviously didn’t go unnoticed. Both regular users and other security firms noticed it as well.
    Users complaining that Flash has now started showing popups have been spotted on the Adobe support forum, several local blogs, and in many other places.

    Furthermore, besides Minerva Labs, other security firms have also started picking up suspicious activity related to the FlashHelperService.exe. Cisco Talos ranked this process as its most widely detected threat for the weeks ending on January 14 and January 21, and the file also ranked in its Top 10 on the weeks ending on January 7, February 11, and February 18.
    This particular threat doesn’t impact western users since the Flash version they download from flash.cn won’t work on systems outside China, but in light of Minerva’s report, they shouldn’t even try to test it, as this may lead to installing adware and compromising the security of their systems/networks. More

  • in

    Google's Password Checkup feature coming to Android

    Image: Google
    Android users can now take advantage of the Password Checkup feature that Google first introduced in its Chrome web browser in late 2019, the OS maker announced today.

    On Android, the Password Checkup feature is now part of the “Autofill with Google” mechanism, which the OS uses to select text from a cache and fill in forms.
    The idea is that the Password Checkup feature will take passwords stored in the Android OS password manager and check them against a database containing billions of records from public data breaches and see if the password has been previously leaked online.
    If it has, a warning is shown to the user.
    Google says that users have nothing to fear when it comes to this password-checking mechanism, which does not share their credentials in cleartext over the network, and works as follows:
    Only an encrypted hash of the credential leaves the device (the first two bytes of the hash are sent unencrypted to partition the database)
    The server returns a list of encrypted hashes of known breached credentials that share the same prefix
    The actual determination of whether the credential has been breached happens locally on the user’s device
    The server (Google) does not have access to the unencrypted hash of the user’s password and the client (User) does not have access to the list of unencrypted hashes of potentially breached credentials.
    The Password Checkup feature is rolling out today for all Android 9+ users. To enable Password Checkup, users should make sure Autofill with Google is activated on their devices by following the steps below:
    Open your phone’s Settings app
    Tap System  > Languages & input  > Advanced
    Tap Autofill service
    Tap Google to make sure the setting is enabled
    A similar password-checkup feature is already present in iOS 14 since last summer. Most web browsers also have similar password-breach-checking features for years, such as the ones found in Firefox, Chrome, Safari, and Microsoft Edge. More

  • in

    These hackers sell network logins to the highest bidder. And ransomware gangs are buying

    A growing class of cyber criminal is playing an important role on underground marketplaces by breaching corporate networks and selling access to the highest bidder to exploit however they please.
    The buying and selling of stolen login credentials and other forms of remote access to networks has long been a part of the dark web ecosystem, but according to analysis by cybersecurity researchers at Digital Shadows, there’s been a notable increase in listings by ‘Initial Access Brokers’ over the course of the last year.
    These brokers work to hack into networks but rather than making profit by conducting their own cyber campaigns, they’ll act as a middleman, selling entry to networks on to other criminals, making money from the sales.
    Access via Remote Desktop Protocol (RDP) is the most sought after listings by cyber criminals. This can provide stealthy remote access to an entire corporate network because by allowing attackers to start from legitimate login credentials to remotely control a computer, so are much less likely to arise suspicion of nefarious activity.
    This demand – and the potential access it offers – is reflected in the price of listings, with an average selling price for access via starting at $9,765. It’s likely that the higher the price, the higher the number of machines the buyer would be able to access – providing more opportunity for exploitation.
    SEE: Cybersecurity: Let’s get tactical (ZDNet/TechRepublic special feature) | Download the free PDF version (TechRepublic)    
    This method of access is particularly popular among ransomware gangs, who can potentially make back what they pay for access many times over by issuing ransom demands of hundreds of thousands or even millions of dollars: $10,000 on initial access is almost nothing, if the target can be squeezed to pay a bitcoin ransom.

    Expensive access listings are likely reflected in the quality of the target, Stefano De Blasi, threat researcher at Digital Shadows told ZDNet, “for example, RDP access with admin privileges and access to sensitive data.”
    Selling RDP access isn’t a new trend, but the rise in remote working over the last year has seen enterprises suddenly switch to using much more RDP access, providing cyber criminals with additional avenues of attack.
    Often, it’s relatively simple for the cyber criminals acting as access brokers to find insecure RDP connections with publicly available tools. And it’s still common for RDP to be set-up with easy-to-guess or default passwords. Ultimately, it’s easy money for the seller to take these details and pass them on.
    Analysis of some of the most popular forums for selling RDP credentials found that education, healthcare, technology, industrial and telecommunications are the most popular targets. Organisations in any of these industries would be a potentially lucrative target for a ransomware attacker.
    Cyber criminals will continue to exploit RDP as a means of breaching networks, so it’s important that organisations have a strategy to ensure the security of remote access when it’s required – that can be as simple as applying multi-factor authentication and avoiding the use of easily guessable passwords.
    “In practice, the fundamentals of protecting information such as one-time complex passwords and IT monitoring practices can go a long way in thwarting most superficial attacks,” said Blasi.
    MORE ON CYBERSECURITY More

  • in

    Ransomware: Sharp rise in attacks against universities as learning goes online

    The number of ransomware attacks targeting universities has doubled over the past year and the cost of ransomware demands is going up as information security teams struggle to fight off cyberattacks.
    Analysis of ransomware campaigns against higher education found that attacks against universities during 2020 were up 100 percent compared to 2019, and that the average ransom demand now stands at $447,000.

    More on privacy

    The sharp rise in the number of ransomware attacks, combined with the six-figure sums ransomware gangs demand in exchange for the decryption key means ransomware represents the number one cybersecurity threat for universities, according to the research by tech company BlueVoyant.
    SEE: Network security policy (TechRepublic Premium)
    Ransomware is a problem across all sectors, but for higher education it currently represents a particular problem because the ongoing COVID-19 pandemic means that students are receiving their teaching online while many academics are also working from home.
    Overstretched IT departments might not have the ability to fully address security, providing cyber criminals with an opening to exploit.
    “Operating in the middle of the pandemic provides even greater opportunity for the adversary,” Austin Berglas, global head of professional services at BlueVoyant told ZDNet.

    Berglas said IT staff are already busy ensuring students and staff have the necessary tools to conduct remote learning, from device configurations and the installation of new software and cameras to assisting end users that are having problems with the new technology. “These schools may not have the resources to properly secure the network,” he said.
    That means that universities could be considered an easy target for cyber attackers – and the lack of IT resources, combined with students and staff being reliant on the network being available, means that many victims of ransomware attacks in higher education will consider paying a ransom demand of hundreds of thousands of dollars in Bitcoin in order to restore the network as quickly as possible.
    Researchers suggest that in many cases, cyber criminals are specifically targeting universities because they perceive them to be a soft target, and one from which it is easier to extract a ransom payment than businesses in other areas, which might potentially provide more lucrative targets, but that require more effort from attackers.
    According to the report, more than three-quarters of the universities studied had open remote desktop ports, and over 60% had open database ports – both of which provider cyber attackers with an entry point into networks and a means to eventually deliver and execute ransomware attacks.
    SEE: Phishing: These are the most common techniques used to attack your PC
    While cyberattacks and ransomware continue to pose a threat to universities – and will continue to do so even after in-person teaching resumes – there are things that can be done in order to improve cybersecurity and reduce the chances of falling victim to malicious hackers.
    This includes applying multi-factor authentication across all email accounts, so if cyber criminals can breach login credentials, it’s much more difficult to exploit them for access around the network.
    “Ensure multi-factor authentication using a single sign-on solution. Multi-factor authentication will prevent the majority of phishing attacks, which is one of the top ways ransomware is being deployed,” said Berglas.
    It’s also recommended that universities monitor networks for abnormal behaviour, such as fast logins or logins to multiple accounts from the same location, as that could indicate suspicious activity.
    MORE ON CYBERSECURITY More

  • in

    Qualcomm, Sophos ink deal to secure 5G Snapdragon PCs

    Qualcomm has signed up Sophos to provide cybersecurity solutions for the next wave of 5G-enabled PCs. 

    Announced on Tuesday, the US chipmaker said Sophos, a British endpoint security firm, will supply Intercept X endpoint protection software for 5G PCs. 
    “The combination of Sophos Intercept X with Snapdragon compute platforms will provide users next-generation security through an always on, always connected PC environment,” the companies say. 
    Sophos Intercept X is endpoint detection and threat response software, including the prevention of malicious code deployment such as ransomware. According to the firm, the Snapdragon processor series — used to power light, 5G-supportive PCs — will come in useful in combating security blackspots as the software will leverage connected standby functions. 
    The cybersecurity firm says this will mean that “security investigations have fewer unknowns as data won’t be missed due to devices being offline.”
    In addition, Qualcomm’s artificial intelligence (AI) engine, used to enhance connectivity, gaming, and photography, will be leveraged by Intercept X for optimization purposes. 
    Security, too, should start at the hardware level. Sophos’ solution will be applied to root of trust systems in Snapdragon PCs to bolster “cryptographic integrity.”

    “By working with Sophos, we are taking on-device security to a new level by enhancing their industry-leading endpoint protection with AI accelerated threat detection on our solutions,” commented Miguel Nunes, senior director of Product Management at Qualcomm. “We’re excited for Sophos to transform computing with next-generation enterprise-grade security on 5G powered Snapdragon compute platforms.”
    Intercept X for Snapdragon platforms will be available in the second half of 2021.
    Previous and related coverage
    Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    IBM issues patches for Java Runtime, Planning Analytics Workspace, Kenexa LMS

    IBM has issued security patches designed to resolve high- and medium-severity bugs impacting the tech giant’s enterprise software solutions. 

    This week, the tech giant published a set of security advisories laying out fixes for vulnerabilities that impact IBM Java Runtime, IBM Planning Analytics Workspace, and IBM Kenexa LMS On Premise. 
    The first advisory addresses CVE-2020-14782 and CVE-2020-27221, two security flaws in IBM Runtime Environment Java 7 and 8 which are used by IBM Integration Designer — enterprise software used to integrate data and applications into existing business processes — in IBM’s Business Automation Workflow and Business Process Manager software suites. 
    CVE-2020-14782 is a bug in Java SE’s library component that could allow attackers to compromise Java SE via multiple protocols, but this takes a sandbox environment to trigger and so is considered difficult to exploit. 
    CVE-2020-27221, however, is of far more concern and has been issued a CVSS base score of 9.8, a critical rating. This stack-based buffer overflow vulnerability relates to Eclipse OpenJ9 and could be used by remote attackers to execute arbitrary code or cause an application crash. 
    The second advisory focuses on IBM Planning Analytics Workspace, a component of Planning Analytics, the firm’s collaboration and management planning software. In total, five vulnerabilities that impact the software have been resolved, including a Node.js HTTP request smuggling issue (CVE-2020-8201), CVE-2020-8251 — a Node.js denial of service flaw — and a Node.js buffer overflow bug, CVE-2020-8252, that could be exploited by attackers to execute arbitrary code. 
    Two further vulnerabilities, a data integrity weakness that can be triggered via XML external entity (XXE) attacks in FasterXML Jackson Databind (CVE-2020-25649), and CVE-2020-4953, a problem in Workspace that could allow remote — but authenticated — attackers to steal sensitive data exposed in HTTP responses — have also been tackled.

    IBM also posted a security advisory describing vulnerabilities affecting IBM Kenexa LMS On Premise, an enterprise learning management system. In total, five low-impact bugs have been patched, all of which relate to the use of Java SE and could lead to problems including denial of service and potential data theft if combined with other attack vectors. 
    Last week, IBM issued security bulletins for IBM Spectrum Symphony 7.3.1 and IBM Spectrum Conductor 2.5.0 and upgrades to third-party libraries that are susceptible to a wide range of vulnerabilities.
    Previous and related coverage
    Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Keybase patches bug that kept pictures in cleartext storage on Mac, Windows clients

    Keybase has resolved a security flaw in the messaging client that preserved image content in the cache for cleartext viewing.

    The security-focused end-to-end encrypted chat app, which was acquired by remote videoconferencing tool developer Zoom in May last year, contained a vulnerability that could have compromised private user data. 
    Tracked as CVE-2021-23827, the bug is described as an issue which “allows an attacker to obtain potentially sensitive media (such as private pictures) in the cache and uploadtemps directories.”
    “It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the “Explode message/Explode now” functionality,” the CVE description reads. 
    Identified by John Jackson, the penetration tester and Sakura Samurai founder said in a blog post on Monday that Keybase clients before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, are impacted. 
    Jackson examined the client and saw that inside the Keybase uploadtemps and cache directories, photos that had previously been pasted into conversations were available and were not encrypted. Even if a user had set the content to ‘explode’ or delete, the cache still contained residual image files as Keybase failed to adequately clear them. 
    On Mac machines, all it took to recover this content was to view the directory, but on Windows, image file extensions would need to be changed to .png or .jpg. This does mean that the issue remains local; however, even local vulnerabilities need to be patched rapidly by services that promote themselves as privacy-centric. 

    “An attacker that gains access to a victim machine can potentially obtain sensitive data through gathered photos, especially if the user utilizes Keybase frequently,” Jackson said. “A user, believing that they are sending photos that can be cleared later, may not realize that occasionally pasted photos are not cleared from the cache and may send photos of credentials, etc, to friends or may even send other sensitive data. The photos then can be stored insecurely on a case-by-case basis.”
    The vulnerability was reported through Keybase’s bug bounty program on HackerOne on January 9, 2021. A fix was issued on January 23 which resolved the bug and also cleared out all of the images on clients that should have been previously wiped. Public disclosure was held back until February 22 to give users time to apply the update and Jackson was awarded $1,000 for his report. 
    Update 17.14 GMT: A Zoom spokesperson told ZDNet:
    “Zoom takes privacy and security very seriously and appreciates vulnerability reports from researchers. We addressed the issue identified by the Sakura Samurai researchers on our Keybase platform in version 5.6.0 for Windows and macOS and version 5.6.1 for Linux. Users can help keep themselves secure by applying current updates or downloading the latest Keybase software with all current security updates.”
    Previous and related coverage
    Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Transport for NSW confirms data taken in Accellion breach

    Transport for New South Wales (TfNSW) has confirmed being impacted by a cyber attack on a file transfer system owned by Accellion.  
    The Accellion system was widely used to share and store files by organisations around the world, including Transport for NSW, the government entity said on Tuesday afternoon.
    “Before the attack on Accellion servers was interrupted, some Transport for NSW information was taken,” it wrote.
    TfNSW said Cyber Security NSW is managing the state government investigation with the help of forensic specialists. 
    “We are working closely with Cyber Security NSW to understand the impact of the breach, including to customer data,” it said.
    It said the breach was limited to Accellion servers and no other TfNSW systems have been affected, including those related to driver’s licence information or Opal data.
    “We recognise that data privacy is paramount and deeply regret that customers may be affected by this attack,” TfNSW said.

    The Australian Securities and Investments Commission (ASIC) in January said one of its servers was breached earlier in the month in relation to Accellion software used by the agency to transfer files and attachments.
    Accellion was also used as the vector to breach the Reserve Bank of New Zealand (RBNZ) earlier last month.
    Accellion recently announced the end-of-life for its FTA product after the software has been abused in recent attacks to breach many companies and government agencies across the world since December 2020.
    The NSW government is not new to breach notifications. In April 2020, Service NSW, the state government’s one-stop shop for service delivery, experienced a cyber attack that compromised the information of 186,000 customers. Following a four-month investigation that began in April, Service NSW said it identified that 738GB of data, which comprised of 3.8 million documents, was stolen from 47 staff email accounts.
    It was also revealed in September that information on thousands of NSW driver’s licence-holders was breached as a result of an AWS cloud storage folder that had over 100,000 images being mistakenly left open.
    MORE FROM NSW More