More stories

  • in

    Rapid website-blocking power for violent material proposed for eSafety Commissioner

    A new Online Safety Bill could see Australia’s eSafety Commissioner be given powers to implement targeted blocks of terrorist or extreme violent material during an online crisis event and order the removal of image-based abuse within 24 hours.
    The federal government on Wednesday opened consultation on the new Bill [PDF] which would also create a cyber abuse take-down scheme for Australian adults.
    Following the eSafety Commissioner in September 2019 issuing a direction to the nation’s ISPs to continue blocking websites that host the video of the Christchurch terrorist attack, and agreeing on new protocols with ISPs in March to block such content, the new Bill proposes further action.
    It would introduce a specific and targeted power for the eSafety Commissioner to direct ISPs to block certain domains containing terrorist or extreme violent material, for time-limited periods, in the event of an online crisis event.
    Must read: Christchurch terrorist’s radicalisation shows the limits of surveillance and censorship
    As flagged at the start of consultation a year ago, online platforms would also see the amount of time that they have to pull down content after receiving a missive from the Australian eSafety Commissioner halved under the new Bill.
    Take-down notices for image-based abuse, cyber abuse, cyberbullying, and seriously harmful online content would now need to be actioned within 24 hours, instead of 48 hours.

    If a website or app systemically ignores take-down notices for class 1 material under the online content scheme, such as child sexual abuse material, the eSafety Commissioner can require search engines and app stores to remove access to that service.
    These protections will be backed by civil penalties — up to AU$550,000 for companies and AU$111,000 for individuals.
    The Bill expands the cyberbullying scheme for children, enabling eSafety to order the removal of material from further online services such as games, websites, messaging, and hosting services — not just social media platforms.
    The Bill will also extend cyber abuse take-down to adults.
    According to the legislation, cyber abuse material in an adult context is when “an ordinary reasonable person would conclude that it is likely that the material was intended to have an effect of causing serious harm to a particular Australian adult”.
    The scheme will empower the eSafety Commissioner to order the removal of seriously harmful online abuse when websites, social media, and other online services do not remove it after a complaint is made.
    In addition, the eSafety Commissioner will have the power to require online services to provide contact or identifying information for individuals using anonymous accounts to abuse, bully, or share intimate images without consent.
    A set of Basic Online Safety Expectations will also be set in law. The Act will establish mandatory reporting requirements that will allow the eSafety Commissioner to require online services to provide specific information about online harms, such as their response to terrorism and abhorrent violent material, or volumetric attacks where “digital lynch mobs” seek to overwhelm a victim with abuse.
    Services will have to report on how they will uphold these expectations and can be penalised if they fail to do so.
    The government will also update Australia’s Online Content Scheme to “better reflect the modern digital environment”.
    Under this, sections of the tech industry will be tasked with creating new and strengthened industry codes to keep users safe. Industry will be given six months to establish the new codes, with the eSafety Commissioner also having the power to create industry standards within 12 months if industry fails to do so itself.
    RELATED COVERAGE More

  • in

    Law enforcement take down three bulletproof VPN providers

    Image: ZDNet
    Law enforcement agencies from the US, Germany, France, Switzerland, and the Netherlands have seized this week the web domains and server infrastructure of three VPN services that provided a safe haven for cybercriminals to attack their victims.

    ZDNet Recommends

    The best VPNs for 2021
    VPNs aren’t essential only for securing your unencrypted Wi-Fi connections in coffee shops and airports. Every remote worker should consider a VPN to stay safe online. Here are your top choices for best VPNs in 2020 and how to get set up.
    Read More

    The three services were active at insorg.org [2014 snapshot], safe-inet.com [2013 snapshot], and safe-inet.net before the domains were seized and replaced with law enforcement banners on Monday.
    The services have been active for more than a decade, are believed to be operated by the same individual/group, and have been heavily advertised on both Russian and English-speaking underground cybercrime forums, where they were sold for prices ranging from $1.3/day to $190/year.
    According to the US Department of Justice and Europol, the three companies’ servers were often used to mask the real identities of ransomware gangs, web skimmer (Magecart) groups, online phishers, and hackers involved in account takeovers, allowing them to operate from behind a proxy network up to five layers deep.

    Image: ZDNet
    Law enforcement described the three as “bulletproof hosting services,” a term typically used to describe web companies that don’t take down criminal content, despite repeated requests.
    “A bulletproof hoster’s activities may include ignoring or fabricating excuses in response to abuse complaints made by their customer’s victims; moving their customer accounts and/or data from one IP address, server, or country to another to help them evade detection; and not maintaining logs (so that none are available for review by law enforcement),” the DOJ said today.
    Servers were seized this week across five countries where the three VPN providers had hosted content. Europol said it plans to analyze the collected information and start cases to identify and take action against some of the services’ users.

    The investigation, codenamed “Operation Nova,” was coordinated by Europol officials, and led by officers from the German Reutlingen Police Headquarters.
    “The investigation carried out by our cybercrime specialists has resulted in such a success thanks to the excellent international cooperation with partners worldwide. The results show that law enforcement authorities are equally as well connected as criminals,” said Udo Vogel, Police President of the Reutlingen Police Headquarters.
    No charges were announced against the individuals behind the three VPN services. More

  • in

    Farmers get their own security advice as cyberattacks increase

    The UK’s National Cyber Security Center (NCSC) has issued its first-ever guidance for farmers to help protect their industry from malware and ransomware. 
    With an eye on the future of agriculture and tech, the NCSC has published guidance to help the farming sector respond to the same threats many other organizations face. NCSC notes key systems in use in the sector include email, online account tools, online payment systems as well as internet-connected farming equipment that could come under a cyberattack.

    More on privacy

    “Whilst we can’t guarantee that you’ll be protected from all forms of cyberattack, following this advice will significantly increase the protections you have from the most common cyber crimes,” NCSC notes. It said their official statistics show a rise in reports of cyberattacks against the farming community.
    SEE: Network security policy (TechRepublic Premium)
    The new guidance was developed alongside the National Farmers’ Union (NFU), which is urging farmers to review the document.
    “Rural crime is a huge issue for farm businesses and we rightly look to protect our farm buildings, machinery and our livestock. However, we all live and work in a digital world and we must be conscious of the threats this can bring to our businesses,” said Stuart Roberts, NFU deputy president. 
    The guidance asks the agricultural sector to consider all aspects of their business that networked technology touches today, from automated machinery to security cameras and smartphones — basically every piece of technology that helps farmers go about their business. 

    NCSC’s first piece of advice is to patch and update devices and software, including Windows, macOS, iOS and Android. It advises farmers to, where possible, set the operating system to install updates automatically and offers a reminder that older versions of an OS, such as Windows 7, will eventually no longer receive security updates.
    The second piece of advice is to make regular backups so that, for example, a ransomware attack does not cause the loss of emails, invoices, contacts, orders and quotes. 
    NCSC also recommends password-protecting each computing device and to use encryption like BitLocker on Windows or FileVault on macOS to protect data. 
    The document outlines the risks that farmers face from a ransomware attack, which include making a device unusable, immobilizing farm vehicles, data loss, interference with automated systems, and leaking confidential farm data. 
    The guidance also recommends enabling antivirus and switching on the firewall to separate the local network from the internet. 
    Other handy but oft-forgotten tips include to change all default passwords for devices, such as the internet router, and to choose strong passwords. 
    “Combine three random words to make a short, memorable phrase,” NCSC advises. 
    SEE: How do we stop cyber weapons from getting out of control?
    It adds that farmers should pick a different password for each online account, especially for their primary email account. 
    “If criminals are able to access and control your email, they may be able to reset passwords and gain control of your other accounts,” it notes. 
    NCSC notes that if farmers do write down their passwords, they should store them securely, away from their device. It also urges farmers to use a password manager and not to use weak passwords. Specifically, it advises against using family name, a pet’s name, a place of birth, a favorite holiday, details related to a favorite sports team, and words like “password”, and “qwerty”. 
    Finally, it recommends farmers enable two-factor authentication (2FA) for their online accounts. 
    “It means that even if a criminal knows your password, they won’t be able to access your accounts. So, if you are given the option to turn on 2FA, you should do it,” NCSC says.  More

  • in

    Microsoft and McAfee headline newly-formed 'Ransomware Task Force'

    A group made up of 19 security firms, tech companies, and non-profits, headlined by big names such as Microsoft and McAfee, have announced on Monday plans to form a new coalition to deal with the rising threat of ransomware.

    Named the Ransomware Task Force (RTF), the new group will focus on assessing existing technical solutions that provide protections during a ransomware attack.
    The RTF will commission expert papers on the topic, engage stakeholders across industries, identify gaps in current solutions, and then work on a common roadmap to have issues addressed among all members.
    The end result should be a standardized framework for dealing with ransomware attacks across verticals, one based on an industry consensus rather than individual advice received from lone contractors.
    The 19 initial founding members reflect the RTF’s dedication to putting together a diverse team of experts:
    Aspen Digital (policy maker group)
    Citrix (networking equipment vendor)
    The Cyber Threat Alliance (cybersecurity industry sharing group)
    Cybereason (security firm)
    The CyberPeace Institute (non-profit dedicated to help victims of cyberattacks)
    The Cybersecurity Coalition (policy maker group)
    The Global Cyber Alliance (non-profit dedicated to reducing cyber risk)
    The Institute for Security and Technology (policy maker group)
    McAfee (security firm)
    Microsoft (security firm)
    Rapid7 (security firm)
    Resilience (cyberinsurance provider)
    SecurityScorecard (compliance and risk management)
    Shadowserver Foundation (non-profit security organization)
    Stratigos Security (cybersecurity consulting)
    Team Cymru (threat intelligence)
    Third Way (think tank)
    UT Austin Stauss Center (research group)
    Venable LLP (law firm)
    Currently, ransomware is neither the most widespread form of malware nor the type of cyber-attack that causes the largest financial losses to companies each year. That title goes to BEC scams, according to the FBI.
    Nevertheless, ransomware is still a major threat and one that has been trending up, with ransom demands growing from quarter to quarter.

    “This crime transcends sectors and requires bringing all affected stakeholders to the table to synthesize a clear framework of actionable solutions, which is why IST and our coalition of partners are launching this Task Force for a two-to-three month sprint,” the Institute for Security and Technology said on Monday.
    The Ransomware Task Force website, including full membership details and leadership roles, will be launched next month, in January 2021, followed by a two-to-three month sprint to get the task force off the ground. More

  • in

    Microsoft, Google, Cisco, and others file amicus brief in support of Facebook's NSO lawsuit

    Tech giants including the likes of Microsoft, Google, Cisco, and VMWare have signed today an amicus brief in support of Facebook’s lawsuit against the NSO Group, an Israeli company that makes and sells hacking tools to foreign governments.
    Besides the four, the amicus brief was also signed by Microsoft subsidiaries GitHub and LinkedIn, but also by the Internet Association, an industry lobby group representing tens of other tech companies, such as Amazon, Twitter, Reddit, Discord, PayPal, eBay, Uber, and many others.

    The amicus brief was filed in a lawsuit Facebook filed against the NSO Group in October 2019.
    At the time, Facebook said the NSO Group developed an exploit against the WhatsApp mobile app that it later sold to its government contractors.
    A subsequent investigation discovered that the exploit was used to install malware on the phones of more than 1,400 WhatsApp users, including attorneys, journalists, human rights activists, political dissidents, diplomats, and other senior foreign government officials.
    Facebook argued that the NSO Group was committing a crime. In the months that followed the initial lawsuit, the NSO Group fought the legal case by arguing that it was merely providing software to its government contractors.
    With today’s amicus brief, the signatories want to show the judge they stand with FAcebook’s position on the matter of third-party-developed hacking tools.

    In a blog post published earlier today explaining its decision to sign the amicus brief [PDF], Microsoft argued that companies like the NSO Group, which are often referred to as cyber mercenaries or PSOAs (private-sector offensive actors), are currently operating in a legal grey area, with no rules.
    Tom Burt, Microsoft’s Corporate Vice President of Customer Security & Trust, says that the NSO Group is trying to establish a dangerous legal precedent in the Facebook case by “attempting to cloak itself in the legal immunity afforded [to] its government customers, which would shield it from accountability when its weapons inflict harm on innocent people and businesses.”
    Burt, along with the other amicus brief signatories, argued that the creation, use, and management of hacking tools should be restricted to governments only, as governments are subject to international laws and diplomatic consequences for their actions that a company like the NSO Group is not.
    “We believe the NSO Group’s business model is dangerous and that such immunity would enable it and other PSOAs to continue their dangerous business without legal rules, responsibilities or repercussions,” Burt said.
    A spokesperson for the NSO Group did not return a request for comment. More

  • in

    Partial lists of organizations infected with Sunburst malware released online

    Image: NASA
    Multiple security researchers and research teams have published over the weekend lists ranging from 100 to 280 organizations that installed a trojanized version of the SolarWinds Orion platform and had their internal systems infected with the Sunburst malware.

    ZDNet Recommends

    The best VPNs for 2021
    VPNs aren’t essential only for securing your unencrypted Wi-Fi connections in coffee shops and airports. Every remote worker should consider a VPN to stay safe online. Here are your top choices for best VPNs in 2020 and how to get set up.
    Read More

    The list includes the names of tech companies, local governments, universities, hospitals, banks, and telecom providers.
    The biggest names on this list include the likes of Cisco, SAP, Intel, Cox Communications, Deloitte, Nvidia, Fujitsu, Belkin, Amerisafe, Lukoil, Rakuten, Check Point, Optimizely, Digital Reach, and Digital Sense.
    MediaTek, one of the world’s largest semiconductor companies, is also believed to have been impacted; although, security researchers aren’t 100% on its inclusion on their lists just yet.
    Cracking the Sunburst subdomain mysteries
    The way security researchers compiled these lists was by reverse-engineering the Sunburst (aka Solorigate) malware.
    For ZDNet readers learning of the Sunburst malware for the first time, this malware was injected inside updates for the SolarWinds Orion app released between March and June 2020.
    The boobytrapped updates planted the Sunburst malware deep inside the internal networks of many companies and government organizations which relied on the Orion app to monitor and keep inventories of internal IT systems.

    According to deep-dive reports published last week by Microsoft, FireEye, McAfee, Symantec, Kaspersky, and US Cybersecurity and Infrastructure Security Agency (CISA), on infected systems, the malware would gather information about the victim company’s network, wait 12 to 14 days, and then send the data to a remote command and control server (C&C).
    The hackers — believed to be a Russian state-sponsored group — would then analyze the data they received and escalated attacks only on networks that were of interest to their intelligence gathering goals.

    Image: Microsoft
    Last week, SolarWinds admitted to the hack and said that based on internal telemetry, almost 18,000 of its 300,000 customers downloaded versions of the Orion platform that contained the Sunburst malware.
    Initially, it was thought that only SolarWinds would be able to identify and notify all the impacted organizations. However, as security researchers kept analyzing Sunburst’s inner-workings, they also discovered some quirks in the malware’s operations, namely in the way the malware pinged its C&C server.
    According to research published last week, Sunburst would send the data it collected from an infected network to a C&C server URL that was unique per victim.
    This unique URL was a subdomain for avsvmcloud[.]com and contained four parts, where the first part was a random-looking string. But security researchers said that this string wasn’t actually unique but contained the encoded name of the victim’s local network domain.

    Image: Microsoft
    Since last week, several security firms and independent researchers have been sifting through historical web traffic and passive DNS data to collect information on traffic going to the avsvmcloud[.]com domain, crack the subdomains and then track down companies that installed a trojanized SolarWinds Orion app — and had the Sunburst malware beaconing from inside their networks back to the attackers’ server (now sinkholed thanks to Microsoft and FireEye).
    A growing list of first-stage and second-stage victims
    Cybersecurity firms TrueSec and Prevasio, security researcher Dewan Chowdhury, and Chinese security firm QiAnXin are among the several who have now published lists of Sunburst-infected organizations or tools to decode the avsvmcloud[.]com subdomains.

    Companies like Cisco and Intel have formally confirmed they got infected in interviews with reporters over the weekend. Both companies have said they found no evidence that the hackers escalated access to deliver second-stage payloads on their systems.
    VMWare and Microsoft, whose names were not on these public lists, also confirmed they installed trojanized Orion updates on their internal networks but also specified that they also did not find any evidence of escalation from the attackers.
    However, the hackers did escalate their attacks on the networks of some of their targets. In an interview on Friday, FireEye CEO Kevin Mandia, whose company discovered the SolarWinds hack when investigating a breach of its internal systems, said that hackers, despite infecting almost 18,000 networks, only escalated access to around 50 targets, based on FireEye’s visibility.
    In a separate report, also published on Friday, Microsoft also said it identified 40 of its own customers that had installed infected Orion apps and where attackers escalated access.
    “Escalation” usually happened when the avsvmcloud[.]com C&C server replied to an infected company with a very specific DNS response that contained a special CNAME field.
    This special DNS CNAME field contained the location of a second C&C server from where the Sunburst malware would get additional commands and sometimes download other malware.
    Currently, the only publicly known company where hackers escalated access is FireEye, whose breach response helped uncover the entire SolarWinds hack.
    Making the difference between the two (a simple Sunburst infection and escalation) is crucial for incident responders. In the first case, they might only need to remove the Sunburst malware, while in the second, they might need to review logs to identify what internal systems hackers escalated access to and what data was stolen from their networks.
    Several security researchers have told ZDNet today that a large part of the cybersecurity community is now working with content delivery networks, internet service providers, and other internet companies to collect passive DNS data and hunt down traffic to and from the avsvmcloud[.]com domain in order to identify other victims where attackers escalated access.
    Below is a table compiled by security firm Truesec with the decoded internal domain names of some of the SolarWinds victims.
    Decoded Internal Name
    Possible Organization(may be inaccurate)*
    Response Address Family
    Command
    First Seen
    mnh.rg-law.ac.il
    College of Law and Business,Israel
    NetBios
    HTTP Backdoor
    2020-05-26
    ad001.mtk.lo
    Mediatek
    NetBios
    HTTP Backdoor
    2020-08-26
    Aeria

    NetBios
    HTTP Backdoor
    2020-06-26
    Ameri

    NetBios
    HTTP Backdoor
    2020-08-02
    ank.com
    Ankcom Communications
    NetBios
    HTTP Backdoor
    2020-06-06
    azlcyy

    NetBios
    HTTP Backdoor
    2020-08-07
    banccentral.com
    BancCentral FinancialServices Corp.
    NetBios
    HTTP Backdoor
    2020-07-03
    barrie.ca
    City of Barrie
    NetBios
    HTTP Backdoor
    2020-05-13
    BCC.l

    NetBios
    HTTP Backdoor
    2020-08-22
    bhq.lan

    NetBios
    HTTP Backdoor
    2020-08-18
    cds.capilanou.
    Capilano University
    NetBios
    HTTP Backdoor
    2020-08-27
    Centr

    NetBios
    HTTP Backdoor
    2020-06-24
    chc.dom

    NetBios
    HTTP Backdoor
    2020-08-04
    christieclinic.
    Christie Clinic Telehealth
    NetBios
    HTTP Backdoor
    2020-04-22
    CIMBM

    NetBios
    HTTP Backdoor
    2020-09-25
    CIRCU

    NetBios
    HTTP Backdoor
    2020-05-30
    CONSO

    NetBios
    HTTP Backdoor
    2020-06-17
    corp.ptci.com
    Pioneer TelephoneScholarship Recipients
    NetBios
    HTTP Backdoor
    2020-06-19
    corp.stingraydi
    Stingray (Media andentertainment)
    NetBios
    HTTP Backdoor
    2020-06-10
    corp.stratusnet
    Stratus Networks
    NetBios
    HTTP Backdoor
    2020-04-28
    cosgroves.local
    Cosgroves (Building servicesconsulting)
    NetBios
    HTTP Backdoor
    2020-08-25
    COTES
    Cotes (Humidity Management)
    NetBios
    HTTP Backdoor
    2020-07-25
    csnt.princegeor
    City of Prince George
    NetBios
    HTTP Backdoor
    2020-09-18
    cys.local
    CYS Group (Marketing analytics)
    NetBios
    HTTP Backdoor
    2020-07-10
    digitalsense.co
    Digital Sense (Cloud Services)
    NetBios
    HTTP Backdoor
    2020-06-24
    ehtuh-

    NetBios
    HTTP Backdoor
    2020-05-01
    escap.org

    NetBios
    HTTP Backdoor
    2020-07-10
    f.gnam

    NetBios
    HTTP Backdoor
    2020-04-04
    fhc.local

    NetBios
    HTTP Backdoor
    2020-07-06
    fidelitycomm.lo
    Fidelity Communications (ISP)
    NetBios
    HTTP Backdoor
    2020-06-02
    fisherbartoninc.com
    The Fisher Barton Group(Blade Manufacturer)
    NetBios
    HTTP Backdoor
    2020-05-15
    fmtn.ad
    City of Farmington
    NetBios
    HTTP Backdoor
    2020-07-21
    FWO.I

    NetBios
    HTTP Backdoor
    2020-08-05
    ggsg-us.cisco
    Cisco GGSG
    NetBios
    HTTP Backdoor
    2020-06-24
    ghsmain1.ggh.g

    NetBios
    HTTP Backdoor
    2020-06-09
    gxw

    NetBios
    HTTP Backdoor
    2020-07-07
    htwanmgmt.local

    NetBios
    HTTP Backdoor
    2020-07-22
    ieb.go.id

    NetBios
    HTTP Backdoor
    2020-06-12
    int.ncahs.net

    NetBios
    HTTP Backdoor
    2020-09-23
    internal.jtl.c

    NetBios
    HTTP Backdoor
    2020-05-19
    ironform.com
    Ironform (metal fabrication)
    NetBios
    HTTP Backdoor
    2020-06-19
    isi

    NetBios
    HTTP Backdoor
    2020-07-06
    itps.uk.net
    Infection Prevention Society (IPS)
    NetBios
    HTTP Backdoor
    2020-08-11
    jxxyx.

    NetBios
    HTTP Backdoor
    2020-06-26
    kcpl.com
    Kansas City Power andLight Company
    NetBios
    HTTP Backdoor
    2020-07-07
    keyano.local
    Keyano College
    NetBios
    HTTP Backdoor
    2020-06-03
    khi0kl

    NetBios
    HTTP Backdoor
    2020-08-26
    lhc_2f

    NetBios
    HTTP Backdoor
    2020-04-18
    lufkintexas.net
    Lufkin (City in Texas)
    NetBios
    HTTP Backdoor
    2020-07-07
    magnoliaisd.loc
    Magnolia IndependentSchool District
    NetBios
    HTTP Backdoor
    2020-06-01
    MOC.l

    NetBios
    HTTP Backdoor
    2020-04-30
    moncton.loc
    City of Moncton
    NetBios
    HTTP Backdoor
    2020-08-25
    mountsinai.hosp
    Mount Sinai Hospital
    NetBios
    HTTP Backdoor
    2020-07-02
    netdecisions.lo
    Netdecisions (IT services)
    NetBios
    HTTP Backdoor
    2020-10-04
    newdirections.k

    NetBios
    HTTP Backdoor
    2020-04-21
    nswhealth.net
    NSW Health
    NetBios
    HTTP Backdoor
    2020-06-12
    nzi_9p

    NetBios
    HTTP Backdoor
    2020-08-04
    city.kingston.on.ca
    City of Kingston,Ontario, Canada
    NetBios
    HTTP Backdoor
    2020-06-15
    dufferincounty.on.ca
    Dufferin County,Ontario, Canada
    NetBios
    HTTP Backdoor
    2020-07-17
    osb.local

    NetBios
    HTTP Backdoor
    2020-04-28
    oslerhc.org
    William Osler Health System
    NetBios
    HTTP Backdoor
    2020-07-11
    pageaz.gov
    City of Page
    NetBios
    HTTP Backdoor
    2020-04-19
    pcsco.com
    Professional Computer Systems
    NetBios
    HTTP Backdoor
    2020-07-23
    pkgix_

    NetBios
    HTTP Backdoor
    2020-07-15
    pqcorp.com
    PQ Corporation
    NetBios
    HTTP Backdoor
    2020-07-02
    prod.hamilton.
    Hamilton Company
    NetBios
    HTTP Backdoor
    2020-08-19
    resprod.com
    Res Group (Renewableenergy company)
    NetBios
    HTTP Backdoor
    2020-05-06
    RPM.l

    NetBios
    HTTP Backdoor
    2020-05-28
    sdch.local
    South DavisCommunity Hospital
    NetBios
    HTTP Backdoor
    2020-05-18
    servitia.intern

    NetBios
    HTTP Backdoor
    2020-06-16
    sfsi.stearnsban
    Stearns Bank
    NetBios
    HTTP Backdoor
    2020-08-02
    signaturebank.l
    Signature Bank
    NetBios
    HTTP Backdoor
    2020-06-25
    sm-group.local
    SM Group (Distribution)
    NetBios
    HTTP Backdoor
    2020-07-07
    te.nz
    TE Connectivity (Sensormanufacturer)
    NetBios
    HTTP Backdoor
    2020-05-13
    thx8xb

    NetBios
    HTTP Backdoor
    2020-06-16
    tx.org

    NetBios
    HTTP Backdoor
    2020-07-15
    usd373.org
    Newton Public Schools
    NetBios
    HTTP Backdoor
    2020-08-01
    uzq

    NetBios
    HTTP Backdoor
    2020-10-02
    ville.terrebonn
    Ville de Terrebonne
    NetBios
    HTTP Backdoor
    2020-08-02
    wrbaustralia.ad
    W. R. Berkley Insurance Australia
    NetBios
    HTTP Backdoor
    2020-07-11
    ykz

    NetBios
    HTTP Backdoor
    2020-07-11
    2iqzth

    ImpLink
    Enum processes
    2020-06-17
    3if.2l
    3IF (Industrial Internet)
    ImpLink
    Enum processes
    2020-08-20
    airquality.org
    Sacramento MetropolitanAir Quality Management District
    ImpLink
    Enum processes
    2020-08-09
    ansc.gob.pe
    GOB  (Digital Platform ofthe Peruvian State)
    ImpLink
    Enum processes
    2020-07-25
    bcofsa.com.ar
    Banco de Formosa
    ImpLink
    Enum processes
    2020-07-13
    bi.corp

    ImpLink
    Enum processes
    2020-12-14
    bop.com.pk
    The Bank of Punjab
    ImpLink
    Enum processes
    2020-09-18
    camcity.local

    ImpLink
    Enum processes
    2020-08-07
    cow.local

    ImpLink
    Enum processes
    2020-06-13
    deniz.denizbank
    DenizBank
    ImpLink
    Enum processes
    2020-11-14
    ies.com
    IES Communications (Communications technology)
    ImpLink
    Enum processes
    2020-06-11
    insead.org
    INSEAD Business School
    ImpLink
    Enum processes
    2020-11-07
    KS.LO

    ImpLink
    Enum processes
    2020-07-10
    mixonhill.com
    Mixon Hill (intelligenttransportation systems)
    ImpLink
    Enum processes
    2020-04-29
    ni.corp.natins

    ImpLink
    Enum processes
    2020-10-24
    phabahamas.org
    Public Hospitals Authority,Caribbean
    ImpLink
    Enum processes
    2020-11-05
    rbe.sk.ca
    Regina Public Schools
    ImpLink
    Enum processes
    2020-08-20
    spsd.sk.ca
    Saskatoon Public Schools
    ImpLink
    Enum processes
    2020-06-12
    yorkton.cofy
    Community Options forFamilies & Youth
    ImpLink
    Enum processes
    2020-05-08
    .sutmf

    Ipx
    Update config
    2020-06-25
    atg.local

    No Match
    Unknown
    2020-05-11
    bisco.int
    Bisco International(Adhesives and tapes)
    No Match
    Unknown
    2020-04-30
    ccscurriculum.c

    No Match
    Unknown
    2020-04-18
    e-idsolutions.
    IDSolutions (video conferencing)
    No Match
    Unknown
    2020-07-16
    ETC1.

    No Match
    Unknown
    2020-08-01
    gk5

    No Match
    Unknown
    2020-07-09
    grupobazar.loca

    No Match
    Unknown
    2020-06-07
    internal.hws.o

    No Match
    Unknown
    2020-05-23
    n2k

    No Match
    Unknown
    2020-07-12
    publiser.it

    No Match
    Unknown
    2020-07-05
    us.deloitte.co
    Deloitte
    No Match
    Unknown
    2020-07-08
    ush.com

    No Match
    Unknown
    2020-06-15
    xijtt-

    No Match
    Unknown
    2020-07-21
    xnet.kz
    X NET (IT provider in Kazakhstan)
    No Match
    Unknown
    2020-06-09
    zu0

    No Match
    Unknown
    2020-08-13
    staff.technion.ac.il

    N/A
    N/A
    N/A
    digitalreachinc.com

    N/A
    N/A
    N/A
    orient-express.com

    N/A
    N/A
    N/A
    tr.technion.ac.il

    N/A
    N/A
    N/A
    lasers.state.la.us

    N/A
    N/A
    N/A
    ABLE.

    N/A
    N/A
    N/A
    abmuh_

    N/A
    N/A
    N/A
    acmedctr.ad

    N/A
    N/A
    N/A
    ad.azarthritis.com

    N/A
    N/A
    N/A
    ad.library.ucla.edu

    N/A
    N/A
    N/A
    ad.optimizely.

    N/A
    N/A
    N/A
    admin.callidusc

    N/A
    N/A
    N/A
    aerioncorp.com

    N/A
    N/A
    N/A
    agloan.ads

    N/A
    N/A
    N/A
    ah.org

    N/A
    N/A
    N/A
    AHCCC

    N/A
    N/A
    N/A
    allegronet.co.

    N/A
    N/A
    N/A
    alm.brand.dk

    N/A
    N/A
    N/A
    amalfi.local

    N/A
    N/A
    N/A
    americas.phoeni

    N/A
    N/A
    N/A
    amr.corp.intel

    N/A
    N/A
    N/A
    apu.mn

    N/A
    N/A
    N/A
    ARYZT

    N/A
    N/A
    N/A
    b9f9hq

    N/A
    N/A
    N/A
    BE.AJ

    N/A
    N/A
    N/A
    belkin.com

    N/A
    N/A
    N/A
    bk.local

    N/A
    N/A
    N/A
    bmrn.com

    N/A
    N/A
    N/A
    bok.com

    N/A
    N/A
    N/A
    btb.az

    N/A
    N/A
    N/A
    c4e-internal.c

    N/A
    N/A
    N/A
    calsb.org

    N/A
    N/A
    N/A
    casino.prv

    N/A
    N/A
    N/A
    cda.corp

    N/A
    N/A
    N/A
    central.pima.g

    N/A
    N/A
    N/A
    cfsi.local

    N/A
    N/A
    N/A
    ch.local

    N/A
    N/A
    N/A
    ci.dublin.ca.

    N/A
    N/A
    N/A
    cisco.com

    N/A
    N/A
    N/A
    corp.dvd.com

    N/A
    N/A
    N/A
    corp.sana.com

    N/A
    N/A
    N/A
    Count

    N/A
    N/A
    N/A
    COWI.

    N/A
    N/A
    N/A
    coxnet.cox.com

    N/A
    N/A
    N/A
    CRIHB

    N/A
    N/A
    N/A
    cs.haystax.loc

    N/A
    N/A
    N/A
    csa.local

    N/A
    N/A
    N/A
    csci-va.com

    N/A
    N/A
    N/A
    csqsxh

    N/A
    N/A
    N/A
    DCCAT

    N/A
    N/A
    N/A
    deltads.ent

    N/A
    N/A
    N/A
    detmir-group.r

    N/A
    N/A
    N/A
    dhhs-

    N/A
    N/A
    N/A
    dmv.state.nv.

    N/A
    N/A
    N/A
    dotcomm.org

    N/A
    N/A
    N/A
    DPCIT

    N/A
    N/A
    N/A
    dskb2x

    N/A
    N/A
    N/A
    e9.2pz

    N/A
    N/A
    N/A
    ebe.co.roanoke.va.us

    N/A
    N/A
    N/A
    ecobank.group

    N/A
    N/A
    N/A
    ecocorp.local

    N/A
    N/A
    N/A
    epl.com

    N/A
    N/A
    N/A
    fremont.lamrc.

    N/A
    N/A
    N/A
    FSAR.

    N/A
    N/A
    N/A
    ftfcu.corp

    N/A
    N/A
    N/A
    gksm.local

    N/A
    N/A
    N/A
    gloucesterva.ne

    N/A
    N/A
    N/A
    glu.com

    N/A
    N/A
    N/A
    gnb.local

    N/A
    N/A
    N/A
    gncu.local

    N/A
    N/A
    N/A
    gsf.cc

    N/A
    N/A
    N/A
    gyldendal.local

    N/A
    N/A
    N/A
    helixwater.org

    N/A
    N/A
    N/A
    hgvc.com

    N/A
    N/A
    N/A
    ia.com

    N/A
    N/A
    N/A
    inf.dc.net

    N/A
    N/A
    N/A
    ingo.kg

    N/A
    N/A
    N/A
    innout.corp

    N/A
    N/A
    N/A
    int.lukoil-international.uz

    N/A
    N/A
    N/A
    intensive.int

    N/A
    N/A
    N/A
    ions.com

    N/A
    N/A
    N/A
    its.iastate.ed

    N/A
    N/A
    N/A
    jarvis.lab

    N/A
    N/A
    N/A
    -jlowd

    N/A
    N/A
    N/A
    jn05n8

    N/A
    N/A
    N/A
    jxb3eh

    N/A
    N/A
    N/A
    k.com

    N/A
    N/A
    N/A
    LABEL

    N/A
    N/A
    N/A
    milledgeville.l

    N/A
    N/A
    N/A
    nacr.com

    N/A
    N/A
    N/A
    ncpa.loc

    N/A
    N/A
    N/A
    neophotonics.co

    N/A
    N/A
    N/A
    net.vestfor.dk

    N/A
    N/A
    N/A
    nih.if

    N/A
    N/A
    N/A
    nvidia.com

    N/A
    N/A
    N/A
    on-pot

    N/A
    N/A
    N/A
    ou0yoy

    N/A
    N/A
    N/A
    paloverde.local

    N/A
    N/A
    N/A
    pl8uw0

    N/A
    N/A
    N/A
    q9owtt

    N/A
    N/A
    N/A
    rai.com

    N/A
    N/A
    N/A
    rccf.ru

    N/A
    N/A
    N/A
    repsrv.com

    N/A
    N/A
    N/A
    ripta.com

    N/A
    N/A
    N/A
    roymerlin.com

    N/A
    N/A
    N/A
    rs.local

    N/A
    N/A
    N/A
    rst.atlantis-pak.ru

    N/A
    N/A
    N/A
    sbywx3

    N/A
    N/A
    N/A
    sc.pima.gov

    N/A
    N/A
    N/A
    scif.com

    N/A
    N/A
    N/A
    SCMRI

    N/A
    N/A
    N/A
    scroot.com

    N/A
    N/A
    N/A
    seattle.interna

    N/A
    N/A
    N/A
    securview.local

    N/A
    N/A
    N/A
    SFBAL

    N/A
    N/A
    N/A
    SF-Li

    N/A
    N/A
    N/A
    siskiyous.edu

    N/A
    N/A
    N/A
    sjhsagov.org

    N/A
    N/A
    N/A
    Smart

    N/A
    N/A
    N/A
    smes.org

    N/A
    N/A
    N/A
    sos-ad.state.nv.us

    N/A
    N/A
    N/A
    sro.vestfor.dk

    N/A
    N/A
    N/A
    superior.local

    N/A
    N/A
    N/A
    swd.local

    N/A
    N/A
    N/A
    ta.org

    N/A
    N/A
    N/A
    taylorfarms.com

    N/A
    N/A
    N/A
    thajxq

    N/A
    N/A
    N/A
    thoughtspot.int

    N/A
    N/A
    N/A
    tsyahr

    N/A
    N/A
    N/A
    tv2.local

    N/A
    N/A
    N/A
    uis.kent.edu

    N/A
    N/A
    N/A
    uncity.dk

    N/A
    N/A
    N/A
    uont.com

    N/A
    N/A
    N/A
    viam-invenient

    N/A
    N/A
    N/A
    vms.ad.varian.com

    N/A
    N/A
    N/A
    vsp.com

    N/A
    N/A
    N/A
    WASHO

    N/A
    N/A
    N/A
    weioffice.com

    N/A
    N/A
    N/A
    wfhf1.hewlett.

    N/A
    N/A
    N/A
    woodruff-sawyer

    N/A
    N/A
    N/A
    HQ.RE-wwgi2xnl

    N/A
    N/A
    N/A
    xdxinc.net

    N/A
    N/A
    N/A
    y9k.in

    N/A
    N/A
    N/A
    zeb.i8

    N/A
    N/A
    N/A
    zippertubing.co

    N/A
    N/A
    N/A
    undefined

    SolarWinds Coverage More

  • in

    Cryptocurrency 101: What every business needs to know

    You could be forgiven for wondering whether there’s anything actually legitimate about cryptocurrencies. 

    If 2017 was the year that Bitcoin, and other cryptocurrencies such as “Ether,” broke big as mainstream phenomena, 2018 was the year crypto’s risks became commonplace. 
    As ZDNet’s Charlie Osborne has related, crackers last year increasingly broke into “wallets,” the software programs that store Bitcoin and other currencies, absconding with funds, and compromised exchanges, where traders of currency meet to place buy and sell orders.
    In a sign of the spread of confusion and chaos, one cryptocurrency software startup, Taylor, which has been trying to create improved programs for trading currencies, was entirely cleaned out of its investment backing, all held in virtual currency, by a cracking attack. The craze for “initial coin offerings,” or ICOs — the issuance of novel currencies — ran into serious trouble in 2018 as some efforts collapsed amidst accusations of fraud on the part of the offering parties. 
    The chaos caused the price of Bitcoin, which soared at the end of 2017, to plunge in 2018, dropping from a high price for each Bitcoin equivalent to over $19,000 to a low of under $4,000. Bitcoin is the coin of the realm, as they say, and represents over half of all trades by value, so it sets the standard. Other currencies followed the decline. The COVID-19 pandemic really pumped up Bitcoin, whose spot price has rebounded strongly: as of December, 2020, it currently trades for just under $23,000. Nvidia, a computer chip maker, and competitor Advanced Micro Devices, both of whose graphics processing units are the basis of crunching the codes for crypto, saw their publicly-traded stocks buffeted in the past year by the volatility in the crypto market.  
    In spite of that chaos and in spite of what seems outright fraud, a lot of activity still happens with cryptocurrencies, billions of it on a daily basis, in fact. There is an estimated $643 billion worth of all cryptocurrencies in circulation, and over $184 billion worth of the things changing hands around the world every day. Crypto potentially has tons of benefits for business: the ability to create trading technologies for conducting transactions unique to a given industry, without the need for a central authority, is one of the biggest promises.   
    It makes sense to keep an eye on the action, as the sheer volume of activity means that crypto will find some role in business and society for years to come. The announcement by Facebook that it will introduce its own cryptocurrency, the “Libra,” some time next year, cements the significance of the field. 

    What follows is a review of the basics and the leading edge of crypto that you need to know. 
    Benefits: What is cryptocurrency?
    The best way to think about Bitcoin, and Ether, and other currencies, is as a contract between buyer and seller. They represent tacit agreements to conduct an exchange between counterparties, just as the U.S. dollar and other fiat currencies have always been representations of the implicit promise of governments to uphold transactions. 
    The big appeal is that crypto money doesn’t need to be issued by banks, and exchange rates don’t need to be controlled by a central bank. A company can create its own contracts, just like creating a new programming language. As long as counterparties will agree to uphold the contract, a whole system of transactions can be set in motion without having to be ruled by the processes of normal monetary and banking authorities.
    It’s often said that Bitcoin is three things all rolled into one:
    It’s a store of value, first, in that one can convert fiat currencies — money issued by governments, such as the U.S. dollar — into a corresponding amount of Bitcoin, as well as storing the value of other items by exchanging them for Bitcoin. 
    It’s a means of enacting transactions, in that one can present Bitcoin in exchange for goods and services, where it is accepted. 
    And thirdly, it’s a record of transactions, given that each Bitcoin comes out of the operation of computers that track the global flow of all transactions in Bitcoin, via the digital ledger software called blockchain. 
    See: Coin Dance’s resources for getting started with 
    Bitcoin and things like it are dubbed “crypto” because at the heart of the global software system of the blockchain is a cryptographic function that encodes successive transactions as “hashes,” which are codes formed with cryptographic functions that transform the data of successive transactions in such a way that no single computer can reverse the process. It is this transformation, by multiple computer users, that serves as a third set of books to keep two parties to a transaction honest without a central authority. 

    The idea that started everything: all the world’s bitcoin transactions recorded one after another in a long chain of interlocking cryptographic hashes. This is the underlying technology that maintains the integrity of crypto-currencies.
    Bitcoin.org
    Bitcoin alternatives
    Although Bitcoin dominates cryptocurrency activity, like any software program, it has strengths and weaknesses; some would prefer a contract between participants that has different attributes from what Bitcoin has. Some don’t like it as a store of value, or a means of transactions, and so alternatives have been proposed. There are now thousands of new currencies, and more keep being made, including another version of Bitcoin, called “Bitcoin Cash”; Ether, introduced in 2014 by a developer Vitaly Dmitriyevich as part of a new distributed application platform; “EOS,” a coin that comes with a new computing protocol, from the Hong Kong-based startup Block.one; “Litecoin,” created by a Google engineer; and “Ripple,” created by startup Ripple Labs, to name just a few of the most prominent. 
    See: A tiny tutorial on cryptocurrencies

    Each of these has its appeal, the same way one or another programming language attracts followers. According to data gathered by popular news site CoinDesk in its “Crypto-Economics Explorer,” a kind of almanac of crypto, there are only a few currencies whose volume of trading, total value, and interest by developers comes anywhere close to Bitcoin, among them EOS, Ether, and Ripple. Most others have tiny fractions of the market capitalization as measured in dollar-denominated assets placed into them. The various offerings can have different advantages, such as being able to transact faster. 
    One big thing to keep in mind is that less-popular currencies will naturally have lower liquidity in cryptocurrency exchanges. As a result, it may be harder to cash out of them when you want to exchange them back for fiat currencies. 
    Accepting Bitcoin at some point will be an important decision for many businesses simply because of the sheer volume of fiat currencies placed into these instruments. $260 billion or so worth of dollars and euros and pounds sterling means there is opportunity for a business that accepts payment in crypto to reap some of the money looking to be transacted.
    Getting started with wallets
    The easiest way to get involved with Bitcoin, Ether or another currency is to get some digital wallet software. The wallet program gives you a unique “public key,” a string of characters, which serves as an address you can give to a counter-party to which they can send you Bitcoin or other money, much the way you would give out an email address. Wallets such as Mycelium and Coinomi are available on mobile devices running Android and iOS. 
    There are also desktop programs such as Electrum, and web-based wallets you can use through a browser, such as the one offered for free by a Google-backed, Silicon Valley startup named Blockchain. (Blockchain also has a mobile app version of the wallet.)
    Facebook’s forthcoming wallet software, for use with its proposed Libra currency, will be called “Calibra,” the company said. It’s useful to try out some wallets to get a sense of what’s involved before Facebook’s offering lands.
    Because you can load these wallets up with tiny amounts of money, you try several of them for a nominal expense and see how you like the user interface. Testing the user interface is an important element in selecting a program given that you want to be very clear about how and when you are placing orders to purchase or sell crypto. 
    In the wallet you will see a list of accounts. This starts with an initial public key address, but you can have the program create new public keys if you want to store money received in separate keys. Some wallets, in fact, propose generating multiple addresses as a way to separate and to cloak transactions, a practice that will be useful to anyone wanting to obscure their total record of transactions, given that the global blockchain records transactions by public key address. 

    Splash screen for the Coinomi mobile wallet for iOS. The first task will be to create the wallet words that will secure your wallet and then to back them up. 

    ×
    coinomi-wallet-startup.png

    Coinomi generation of random wallet words — record them somewhere else so you can always recall them if needed, and don’t show them to anyone! (Unlike this article is doing!)

    ×
    coinomi-wallet-words.png

    When you first install a wallet program such as Mycelium or Coinomi, they will ask you to record a unique string of several words whose combination will be used if you ever need to recover a wallet, such as if you lose your phone with the program on it. You should carefully note the words and record them in a safe place, as these words are the only way to recover a wallet, and without them, your wallet account and any money you have in the wallet will be lost. Once you’re through that procedure, you will create a password of your own invention, which is the normal kind of procedure. The password is what you use with the wallet on a day-to-day basis, and is separate from your recovery set of words. 
    To receive bitcoin, you give someone your public key or keys, a string of characters you can see in the program. To send money, you enter into the program a public key that someone provides to you. In this way, you can also use multiple wallet programs and transfer funds between them. 
    With each transaction, either sending or receiving, a fee is extracted. The fee goes to the global “mining” community, those computer users who form the third party, the blockchain, that participate in verifying all transactions for a given currency. When you send or receive, it takes some time for the amounts to be verified by miners, hence, your wallet may show grayed-out amounts until they are final. This can take up to several minutes for each transaction. 

    The public key, which you give to a counter-party, either by reading off the combinations of characters at the top of the screen or by having them scan the barcode. 

    ×
    coinomi-wallet-public-key.png

    Given that the spot price for a single Bitcoin is around $23,000 today, your first purchase will show only a fraction of one bitcoin in your wallet, something like “0.001” Bitcoin for a $10 purchase, after fees. Other currencies are cheaper but it still can cost hundreds of dollars for a single coin of any currency. 
    Be aware that that software wallets can be hacked. Crackers have used approaches such as sending false notice of software updates, to install malicious code. A wallet can be secured via two-factor authentication, such as a one-time passcode sent to a phone, however, crackers have compromised such authentication by what’s known as “SIM swapping,” getting a phone company to assign your cellular account to them, so that they can intercept such one-time codes. There’s no way to absolutely prevent such attacks, one just has to be vigilant for any sign of things irregular, such as sudden notices of password renewal messages or sudden interruptions in phone service. As explained in the next section, such attacks can be limited or they can be exacerbated by the use of crypto exchanges. 
    The world of Bitcoin ATMs
    Wallets only allow you to send and receive the crypto-currencies, they are not for converting fiat money into crypto. If you don’t have a counter-party from whom to receive your first Bitcoins or Ether coins, an easy way to get some is to locate one of the several thousand crypto ATMs installed in various cities, which will convert bills of fiat currency into crypto of your choice, depending on what the machine offers. These things often hang out in small shops, such as grocery stores, similar to normal ATMs.

    A General Bytes Bitcoin ATM.
    A directory of such machines is maintained by CoinATMRdar, with details about the features of the machines and whether a machine is in working order, updated by crowd-sourced reports. Using the machine starts with inserting money just like a slot machine. You then take out your smartphone wallet and bring up the bar code in the app that represents your public key. You hold the screen of the phone up to the machine’s barcode reader for it to be scanned. Within a few seconds, your crypto shows up in the wallet, with a record of the details of the transaction including the fees charge, and lots of technical details about the blockchain process that probably will not be that interesting to you in the beginning. 
    Such machines can vary quite a bit, but you can get a sense of the features by checking out the product literature of one popular manufacturer, General Bytes. Most machines are one-way, bills to crypto only, so you can’t cash out of Bitcoin and the rest, although newer machines from General Bytes incorporate that option. 
    The cold storage alternative
    Because accounts can be compromised, you may want to consider turning to what’s known as “cold storage,” a device that’s not connected to a network. Startups have created physical USB tokens, similar to a thumb drive, such as Trezor and KeepKey that you plug into a computer, and that ingest your crypto assets, acting as a hardware wallet that can be kept physically remote from your day-to-day activities. 
    Bear in mind that the companies offering such devices have somewhat vague and incomplete user documentation, which means knowing who is selling you the device and all the details about how it works can involve some extra web searches or Reddit discussions. 

    The Denarium gold coin comes pre-loaded with specified amounts of Bitcoin, as a “hard wallet” that’s off the grid, for cold storage of your money. 
    Finnish startup Prasos has a somewhat unique take on the whole matter: silver, platinum and gold coins, called “Denarium,” that are shipped by the company with an embedded hologram that counts as the tamper-resistant record of your collected coins. These are one-time devices, as once you rip open the cover of the hologram, if you want to spend it, the physical token loses its crypto value (though it’s still precious metal, for what that’s worth.)
    Another curious artifact is the “CryptoSteel,” from British firm Sword Ltd. The $79 steel slab, about the size of a credit card, comes with a set of tiny metal characters. You assemble the wallet words for your digital wallet by placing the type pieces into the grooves in the slab, rather like an old-fashioned type-setter laying out a print newspaper. It’s a durable, simple way to make a record of wallet words that secures your wallet. 
    Working with exchanges 
    At some point, being strictly peer-to-peer, exchanging Bitcoin and the other money with single individuals, may seem too limiting. You may be ready to check out one of the numerous exchanges that bring together buyers and sellers, places such as Bitstamp, Kraken, and Coinbase. (Bitcoincharts is one starting place to see the selection of exchanges out there.)
    These institutions theoretically inject liquidity into the system, by making it possible for counter-parties to come together, although they carry a whole other set of risks as well.  
    Connecting from your wallet to an exchange is a matter of setting up an account on the exchange and then copying a unique public key address as the address to use in the wallet as the target for transferring your coins.
    You may have to wait up to two months to deposit fiat currencies while your identity is verified by the exchange. This is so the exchange can comply with anti-money laundering and similar rules. For individuals, it’s a matter of standard proof of identification, proof of bank account, and proof of address.  

    Example trading screen from exchange Bitstamp. 
    Once your account is set up, depositing money with which to buy and sell on the exchange introduces its own wait time. A wire transfer is required to put U.S. dollars and other fiat currencies into your exchange account. It can take 48 hours to submit the paperwork just to get the ball rolling, and another five business days for the wire transfer to actually go through and the funds to show up in your account. 
    The exchange method can vary quite a bit. Places such as Bitstamp feature “Buy” and “Sell” buttons for placing trades, much like online trading software. These exchanges support trading in a variety of different coins, not just Bitcoin, and they offer different quotes for both the spot price of a given coin — its value in fiat currency — as well as the fees that will be charged for each transaction.
    Also: Want a job in bitcoin or blockchain? These 10 companies have the most openings TechRepublic 
    A somewhat different approach is a service called LocalBitcoins. It’s a kind of marketplace of buyers and sellers rather than a true exchange. It lets sellers of currency post listings of what currencies they will sell and for how much. When you go to buy the currency, or if you become a seller, any exchange of fiat currency with the other party is done via a variety of transfer mechanisms that can include Western Union, MoneyGram, or traditional bank transfers, so it expands your options for funding your trades. You can drill down into details about the counter-parties as well, if you want to geek out on the reputations of the other party. 
    Taking out funds when you want to cash out to fiat currencies can take a week to two weeks, depending on the internal processes of the exchange you use. It’s especially important to keep in mind these time frames for opening, funding, and cashing out, as they will be a drag to your momentum.
    In addition to individual trading, exchanges have been adding capabilities for enterprise accounts. These can include dedicated network connections and co-located server equipment for trade processing. 
    How to pick exchanges
    There are tons of different exchanges, and picking one will involve a mix of assessing features and assessing operating history. On the first score, exchanges vary by the currencies they support, the prices they list for buying and selling, the volume of trading they offer (a proxy of liquidity), and, for companies, the enterprise features they offer. 
    In the latter case, some time spent with the exchanges is required to get a sense of the true security they can offer over time.
    Exchanges bring both safety and risk. On the one hand, professionals who manage infrastructure could keep your holdings safer than you would as an individual or a company, because it’s their job. And some exchanges can insure deposits as a practice. 
    See: Will blockchain be mainstream by 2025?
    One the other hand, it is possible for the virtual currencies of exchanges to be compromised, something that has happened with many exchanges on numerous occasions. Just last month, an exchange named Binance was cleaned out of $41 million worth of Bitcoin because of a massive security breach, echoing attacks in past such as the 2013, $350-million theft that shut down exchange Mt. Gox.
    In many cases, exchanges continue to function, despite past problems. The example of Bitfinex, an operation run by Hong Kong-based iFinex Inc., is salutary. The company in the summer of 2016 suffered a loss of over $60 million in customer funds. Bitfinex has also been accused of artificially inflating the price of Bitcoin, and the New York Attorney General obtained a court order in April against parent iFinex enjoining the company against continuing certain actions that may have defrauded customers.
    Risks: How to make cryptocurrency safer
    Given risks to both individual wallets and exchanges, it’s important to consider best practices to mitigate the disasters that can happen. Those best practices include starting with only nominal amounts in crypto, to gain a convincing history of the quality of both wallet software and trading platforms. Consider experimenting with the offerings over a period of time that may be several months to a year. As a contract, a cryptocurrency, including both Bitcoin and newer offerings, is established via the evidence of stability over time. 
    Given that the biggest risks have come from things that are all too common in the software world, such as cracked passwords and backdoor software installs, it’s important to both observe best practices in the maintenance of secrets but also to test out various offerings to establish the quality of programs and platforms.
    And perhaps the best thing one can do is to avoid the mindless urge known as “fear of missing out,” or FOMO. A good part of the danger in crypto comes from the continually shifting nature of currencies and technologies. Jumping into anything increases risk. Avoiding rushing into anything crypto that is new simply because it is new will most likely greatly reduce the headaches and the heartache.
    The future of crypto: An evolving landscape
    Understanding the landscape of crypto is only ever partial, as things continue to evolve. The currencies are evolving, the technology is evolving, and the rule of law is trying to evolve. 
    On the currency front, people continue to come up with new coins, especially for the purposes of supposed stability. Startup Tether, Ltd., which is owned by iFinex, promised to back all “Tether” coins in circulation with more hard currency than the dollar value of the coins, over $2 billion in assets. With the A.G.’s action in New York, others are rushing in to propose alternative ways to make such “stable coins,” as they’re called.
    Also: Your systems, their profit: How IT rights can be abused for shadow mining of cryptocurrency TechRepublic 
    A competitor, Anchor AG, claims the real challenge is to make trading more stable. It proposes to do so by tying its novel currency, the “Anchor” coin, to the total economic production of the world. Anchor is promoting something called the “Monetary Measurement Unit,” or MMU, which the company claims is calculated based on global gross domestic product using a unique, proprietary algorithm. 
    That’s all well and good, but as mentioned with Facebook’s Libra, larger parties are getting into the crypto game. The company’s blog post claims Libra will be “stable” because it is “backed by a reserve.” 
    A companion white paper offers a lot more detail. The reserve will be created via a private placement of a second class of coin, which is a way to inject initial funds into the reserve. Facebook says this reserve will limit the extent of the fluctuations in Libra, though whether it prevents the wild swings seen with Bitcoin and the rest is an open question.
    There are whole other bunch of changes coming with Libra. Facebook’s crypto will come with a whole new programming language, called “Move,” and there will be an association of founding member companies, such as Visa and Mastercard and Vodafone, that will control the mining of new coins, unlike Bitcoin, where anyone with enough computing power can mint new currency.

    Bottom line, Facebook’s entry looks to be a seminal event for crypto, and will have an impact on the other coins in circulation and the future directions for existing wallet software and exchanges. With other tech giants besides Facebook offering technology related to crypto, such as Amazon’s blockchain service, and Apple’s “CryptoKit,” there could be a wave of major-party crypto offerings. After all, cryptocurrencies are little more than a digital contract, something big tech should be able to provide to its loyal user base. That could lead to a fractured landscape, or perhaps some organization like Libra’s will unite the various efforts.
    See: Amazon Managed Blockchain now generally available
    The evolution of the mining community, those computer users who spend compute cycles on maintaining the blockchain, will be another continuing matter in coming years. Recent years have seen the concentration of compute power in the hands of single parties such as AntPool, Bixin, and CoinGeek. Their dominance of the blockchain for currencies feels long in the tooth and ripe for innovation. 
    Regulation and taxes
    And then there’s regulation. The wave of popularity in 2018 has resulted in a wave of scrutiny. The city of Vancouver, British Columbia, the site of the very first Bitcoin ATM, is considering a ban on crypto ATMs, which police say is an “ideal money-laundering vehicle,” following a raft of theft incidents with the machines. 
    China, whose government has banned crypto trading, is reportedly considering outlawing mining activity, which would be a big development, given that China is where the majority of mining takes place. 
    And don’t forget taxes. Crypto today is treated as capital gains, which basically means a 15% tax on users’ profits. The U.S. Internal Revenue Service issued long-awaited guidance on crypto in October of 2019. The IRS  has been getting more aggressive this year in going after people about their holdings. If you exchanged Bitcoin, or another crypto currency, into fiat currency, you will have a complex process of calculating a “cost basis” for your holdings. You may want to start with the IRS’s FAQ to know what’s expected of you.
    It’s entirely possible that tax rates will change as legislation evolves to reflect the expanding practice of trading in crypto.  
    When it comes to crypto, keep an open mind but be careful. This is an immature technology, and an immature marketplace, so keeping your head amidst the chaos is essential. 
    Related coverage More

  • in

    Security vendors: It’s time to come clean about intrusions

    The intrusion into SolarWinds, FireEye, and multiple US Government agencies continues to roil the cybersecurity world. In the past week, a slew of additional details have emerged about the scope of the intrusions with more surely to come. 

    SolarWinds Coverage

    Security vendors spend all their time talking about security, but not in a way that’s useful right now. As we wrote in our prior blog, no vendor should turn what happened to these companies into a marketing opportunity. Let us repeat for emphasis: no vendor should turn what happened to these companies into a marketing opportunity. Other security vendors should also understand that this is not a time to throw stones at FireEye — a breach like this could happen to any vendor. 
    But security vendors do need to have a conversation with customers. Security leaders need answers. 
    Security vendors are notoriously close mouthed about attempted intrusions against them as a vendor. Despite a series of intrusions on vendors — RSA and Lockheed Martin, MeDoc, SolarWinds, and FireEye — it is virtually impossible to get a vendor to talk about what they deal with. And as the prior examples demonstrate that vendor intrusions are often a mechanism into their customers as well. Here’s why this matters now: 
    If the threat actors went after FireEye — what other security vendors did they go after? 
    Does anyone doubt that other security vendors were on the list of potential targets? 
    End users should ask the following of their security vendors: 

    Does the vendor use SolarWinds? If so, what specific products are in use? 

    Does the vendor have any (3rd parties) suppliers, partners, contractors, or outsourcers that use SolarWinds? If so, what specific products and versions are in use? 

    If the vendor does use SolarWinds, did they detect any evidence of this activity? If they don’t use SolarWinds have they checked to be thorough? 

    For companies that aren’t using SolarWinds — how would those vendors thwart a similar intrusion? Does the vendor have plans to do a red team, purple team, or tabletop exercise to figure that out? 

    Some other interesting security vendor questions: 

     The intrusions began in March — if someone reverses signatures, IOCs, and other detection rules, are they going to discover any that were created by a security vendor prior to this being public? 

    If the vendor did see this — what is their notification process like for SolarWinds? What is their process for notification in situations like this for their vendors? 

    What are the most successful intrusions against them they have experienced? What did they do as a result? What changes were made? 

    This is an opportunity for vendors to offer transparency — and demonstrate empathy — by sharing that what happens to them, also happens to their customers, their competitors, and their peers. FireEye has largely received community praise for the openness and transparency exhibited when announcing its breach. Sharing lessons learned, anti-patterns, and changes made as a result will help everyone get better. 
    Other vendors should learn this lesson and recognize that this is a community. 
    To understand the business and technology trends critical to 2021, download Forrester’s complimentary 2021 Predictions Guide here.      
    This post was written by VP, Principal Analyst Jeff Pollard and Principal Analyst Sandy Carielli, and it originally appeared here.  More