Microsoft 1, Lenovo 0 (or minus 1?)

Lenovo is getting more than it’s share of attention these days.

Microsoft has released an update to it’s free Windows Defender anti-malware software that classifies Lenovo’s Superfish as the malicious software that it is, removes the certificate from the Windows certificate store (which is the hard part, so yeah, Microsoft – and I don’t say that very often) and gives you instructions for removing the Superfish software.

Lenovo is now in hyper damage control mode and likely will be for a while.

There are plenty of other brands out that – perhaps choosing a brand that is not controlled by the Chinese government/military might be a wise move anyway.  I know that Lenovo claims that they are not controlled by the government, but what would you expect them to say?

Mitch

Facebooktwitterredditlinkedinmailby feather

2014 Breach Report – Over A Billion Records Exposed

Risk Based Security released their 2014 data breach report (available here) with some impressive numbers.  I am just going to highlight a few;  read the report if you would like more details.

  • 3,014 data breach incidents (up 28.5%)
  • 1.1 Billion records breached (up 22.3%)
  • 72.5% of the incidents released less than 10,000 records
  • 55.3% of the incidents released less than 1,000 records
  • 83.3% were lost due to traditional hacking, with fraud and social engineering making up another 14.3%, so the breaches are overwhelmingly malicious (out for the money).
  • There were 5 incidents in the all time 10 worst list

To have breaches go up by around 25% year over year is not a good sign.  That 55% of the breaches released less than a thousand records and 72% released less than 10,000 records supports other statistics that small and medium businesses are the targets of hackers.  This supports the First Data numbers of 70% of the breaches are against small and medium businesses.

That there were 5 breaches that made the all time top 10 list is unfortunate and they include several you probably have never heard about (the NYC taxi commission lost 173 taxi trip records).

The message is that just because you are not Home Depot or Sony, it doesn’t mean the hackers are not coming after you.

Mitch

Facebooktwitterredditlinkedinmailby feather

The Lenovo Problem is NOT just Lenovo

I wrote the other day (see post) about malware (called Superfish) that Lenovo intentionally installed on their computers in the name of improving your customer experience.  Well, they admit that it was poorly thought out, but only for one of the two reasons I am concerned about.

They admit that snooping on your private conversations to present you with ads is probably not a good plan.  The bigger problem is the Komodia software is a security train wreck.

Marc Rogers, the guy who tipped us to the problem, has done more research on Komodia and the problem is much bigger.  Komodia makes a bunch of products that eavesdrop on your traffic for a bunch of different reasons and they all have the same issue.  Some of the products that use this same toolkit include:

  • Komodia’s “Keep My Family Secure” parental control software.
  • Qustodio’s parental control software
  • Kurupira Webfilter
  • Staffcop (version 5.6 and 5.8)
  • Easy hide IP Classic
  • Lavasoft Ad-aware Web Companion
  • Hide-my-ip (note: this package does not appear to utilize the SSL MITM, and the certificate is slightly different from the one found in other packages however it still utilizes an unrestricted root certificate with a simple plaintext password.

All of these products suffer from some common illnesses which include:

  • They intercept your private communications
  • The secret key for the software is embedded in the software and it is the same for every one of the installations around the world (no hacker would ever take advantage of that)
  • The password for the secret key, which is also embedded in the software, is also the same for everyone and it is a stupid password – Komodia .  I guess that is better than using 123456, but not much better.
  • The Komodia software which negotiates a connection with, say, your bank on your behalf, allows a whole bunch of weak cryptographic methods that are old, weak and modern browsers eliminated them years ago.  That means that on top of everything else, your traffic is susceptible to hacking.
  • The Komodia software does not check (not correctly, anyway) whether the certificate of the web site you are going to is valid.  This means, that, on top of everything else, you might be sent to a bogus web site and not even know it.

The web site that I reported last week (link above) has a test to see if the Superfish software is installed on your computer.  The site has been updated to reflect this news and the address is:

https://filippo.io/Badfish/ 

If you do have this software on your computer, not only do you need to remove the software, but you also need to remove their certificate (basically, a skeleton key into your computer) as well.  Marc has instructions for doing that on his web site.

All I can say is ARGH!!!!!

As I have said before, the internet merchants want to fool you into believing that SSL is secure.  It is less unsecure when you implement it correctly, but is totally unsecure when you implement it the way Komodia implemented it.  Worse than being unsecure, Komodia puts your computer at risk because of their actions.

The U.S. Computer Emergency Readiness Team (part of DHS, but run by intelligent people at Carnegie Mellon University) is now involved as well, so we may yet see more news about this.

If you are using any of these products, I would definitely uninstall them and remove the root certificate as well.

SOOORRY!

Mitch

Facebooktwitterredditlinkedinmailby feather

The simplest hack

CSO Magazine is reporting on an experiment conducted by the Ponemon Institute.  They sent researchers disguised as temporary employees, with temporary badges, into 43 offices belonging to 7 companies.  The management was aware of the plan but the office staffs were not aware.

The researchers went into the offices, wandered around, took pictures of computer screens, picked up documents marked confidential and put them in their briefcases.  The researchers even brought spreadsheets up on their computer screens and took pictures of the screens.  All in full view of the office staff.

The security industry calls these ops red teams.  Been there.  Done that.  I know they work.  Almost 100% of the time.

And the results ….

But out of 43 trials, the researcher was confronted by a company employee only seven times when taking pictures of the screen, only four times when it looked like they were stealing confidential documents, and only twice when wandering around looking at things on people’s desks, computer monitors, and at printers, copiers and fax machines.
And there was only one case where the strange behavior was actually reported to management.

In a little over two percent of the cases, someone spoke up.  97 percent of the time, they told no one.

The information they collected included staff directories, customer information, financial information, confidential documents and access credentials.

Open layout offices were easier to compromise than traditional offices.  Customer service, marketing and sales were the easiest targets;  legal and finance were the hardest.  IT was in the middle.

The sponsor was 3M and the mission was to see if their computer privacy screens made a difference – the answer is not much.

Things did make a difference included clean desk policies, standardized shredding policies and mandatory training.

And, they did not need to be in the offices so long.  They spotted their first target information in the first 15 minutes.

The moral of the story is that we need to deal with the simple stuff before we deal with the impossible.  If we fail at the simplest security tasks, there is no way that we will defeat an advanced persistent threat.

Mitch

Facebooktwitterredditlinkedinmailby feather

GCHQ Pilfers Encryption Keys To Cell Phones

We have known for a long time that the encryption on cell phone calls and text messages was relatively weak, but apparently, cracking that was more work than GCHQ, the British version of the NSA, wanted to do.

People have been beating up the NSA for being, well, the NSA.  I have said, whether we agree with them or not, they are just doing what they have been told to do and maybe they are a little smarter than some other spy agencies, but they are not doing anything that the other spy agencies are or want to do.

So now it is GCHQ’s turn in the spotlight.  Dark Reading is reporting (see article and article) that GCHQ, with NSA’s help, broke into the world’s largest SIM card manufacturer, Gemalto,   Gemalto’s cards are used by AT&T, Verizon, Sprint and T-Mobile, as well as bank cards, passports and other identity cards around the world.  Just to make sure they weren’t missing anything, they also had a project to break into the cell phone companies and grab their encryption keys as well.  The source of this information is … you guessed it … Edward Snowden.

The breaking in to the cell phone companies core networks also allowed them to supress charges that might have raised suspicions and have access to customer data.

Gemalto makes two billion SIM cards a year, all “owned” by GCHQ and the NSA.  Along with whoever else they shared this with.

The stolen keys give GCHQ and NSA the ability to read any text message or listen to any phone call without the need to have to crack the crypto involved.

Using very standard phishing attacks, GCHQ planted malware on Gemalto’s network that gave them complete remote access to the network.

Possession of these keys allows the spies to send fake text messages, sign malicious Java apps and set up fake cell towers, along with listening to all phone calls.

One question to ask, of course, is whether GCHQ and NSA are the only organizations who could and did do this – did any hackers do the same thing?  The only real answer is who knows, but from what is being reported, this hack did not require James Bond;  it is a relatively run of the  mill hack of a large organization with typical (i.e. poor) security.  In Gemalto’s defense, protecting any large organization from a well designed spear phishing attack is hard.

Having the encryption keys also relieves the spy agencies of the necessity of ask the FISA court, the secret court that the spies go to and ask permission to, well, spy, and ask for a warrant.  With warrant in hand they go to the cell phone company and ask for the data.  Now they don’t have to bother with that.  Convenient.

An interesting thought.  If these chips are used in passports and a hacker had done the same thing that Snowden reports GCHQ did, they could creat fake passports for terrorists.  They also could create fake chip and pin credit cards or hack real ones.

This is one reason why an enterprise risk assessment is so important.  An assessment would identify the company’s crown jewels (in this case, the encryption keys) and try to make that data more resistant to attack.

Now that is is known, it is unclear what the cell phone and identity card companies will do.

What this does point to is that the only encryption that is likely to have any remote chance of being secure is end to end encryption where you manage the keys and no provider has access to the keys.  Encryption provided by phone companies, dropbox, Facebook, Google and Microsoft is likely completely compromised.  This type of encryption is also the most inconvenient way for users to manage encryption – they would prefer to snap their fingers and have it be secure.  While the work of GCHQ and the NSA has privacy concerns, if they could do this, so could the Chinese, Russians and probably at least a large handful of hackers.  Among others.  THAT is a big concern.

Mitch

Facebooktwitterredditlinkedinmailby feather

State Department Still Pwned

Homeland Security Today and others are reporting that three months after the State Department admitted that hackers had gotten into their unclassified email system, the hackers are still there.  (see article)

While it is always fun to beat up government bureaucracies, it points out that sometimes getting hackers out is a hard thing to do.

There have to be a bunch of questions being asked at Foggy Bottom these days, such as:

  • How did the hackers get into the email in the first place – have we closed that door?
  • Where else are the hackers hiding that allow them to reinfect email?
  • Are there insiders helping the hackers?  Even unwittingly.

And so forth.

The article says that even though the NSA and outside contractors have been working on the problem, it is still a problem and it is not fixed.

Still, State Department employees are using that breached email system.  It is possible that NSA is watching what is going out – maybe – and that might make them feel better.  It is also possible that the NSA knows who the hackers are.  Hopefully, they have moved the more sensitive but still unclassified traffic to a different network.

As we watch Sony and Target and Home Depot and all the others wrestle with breaches and we look at the resources available to the State Department,  the fact that State can’t fix this problem after three months should make people concerned about what they would do if they were breached.

The statistics are that 60% (Experian) to 70% (First Data) of the small and medium size businesses that have a breach go out of business within six months.  I am certain that State is spending a LOT of money trying to get these guys out.  Without success.  What chance does the average business have of recovering from a significant breach?

Mitch

Facebooktwitterredditlinkedinmailby feather

Privacy, Security and Cyber Risk Mitigation in the Digital Age

Visit Us On FacebookCheck Our Feed