Sponsor

2014/08/05

| 08.05.14 | Heartbleed scan shows most large companies still vulnerable

If you are unable to see the message below, click here to view.

Editor's Corner:
Black Hat: Will any talks be left?

What's New:
1. Heartbleed scan shows most large companies still vulnerable
2. Backoff malware infects POS systems at 600 retailers
3. Virtual currency has real-world security implications, warns HP
4. No jive: Java is king of exploited programming language, says Cisco
5. Personal data on tens of thousands of Mozilla developers exposed

Spotlight:
P.F. Chang's comments on data breach at 33 restaurants

Also Noted:
Attackers get superuser powers; Paddy Power takes 4 years to tell breach victims; Much more...

News From The Fierce Network:
1. Business units are wagging the enterprise mobility dog
2. Enterprise apps are cash cows for developers
3. Report: Apple and Visa could team on mobile payments

FierceITSecurity

August 5, 2014

Subscribe | Website
Refer FierceITSecurity to a Colleague

This week's sponsor:
PGi
AT&T



 Follow @fierceitsec on Twitter


This week's sponsor is PGi.

Webinar: IT and Marketing: Extreme Collaboration
Tuesday, August 26th, 2pm ET / 11am PT | New Editorial Event!

Media outlets love to focus on the tension between IT and marketing. But if it's a war, both sides lose. Instead, CIOs have to partner with CMOs to help deliver on aggressive business goals in an ever-changing landscape. Register Today!


Editor's Corner

Black Hat: Will any talks be left?

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

I'm donning my Black Hat this week. I hope to hear at least a few of the talks, assuming they haven't been pulled from the agenda by the time I show up at the meeting room.

Researchers have already pulled talks on how to hack into home alarm systems, the Russian espionage campaign known as Snake and how to de-anonymize Tor users.

"It sort of comes with the territory when you have the latest and sometimes controversial research scheduled to be presented on stage," conference spokeswoman Meredith Corley tells Reuters.

My question in the headline is obviously facetious, since Black Hat is chock full of informative talks that are definitely taking place. But the number of canceled talks is curious, if not unusual.

One topic that will gain attention at Black Hat is hacking into planes, trains and automobiles. Security researcher Ruben Santamarta will demonstrate how a hacker can take over systems within a plane through the on-board Wi-Fi system, explains a report by Slash Gear.

Developer Silvio Cesare will show how to break into a car using fairly inexpensive off-the-shelf equipment and the wireless entry key fob, the report adds. Okay, maybe hacking into trains is not on the Black Hat agenda, but it should be.

Of course, there will be demonstrations on hacking into smartphones, connected devices, critical infrastructure and pretty much anything else you can imagine. One thing I know is that I won't be using Wi-Fi when I'm there. I have enough troubles without getting hacked by expert hackers while reporting on what expert hackers are doing to hack into things. Was that clear?

Well, enjoy the coverage. Viva Black Hat! - Fred

Read more about: NSA, Black Hat

Webinars

> IT and Marketing: Extreme Collaboration - Tuesday, August 26th / 2pm ET / 11am PT

Marketplace

> Whitepaper: ESG Solution Brief
> Whitepaper: Supporting VDIs and Thin Clients
> eBook: eBrief | Making BYOD Work: 4 Critical Strategies for Midmarket and SMB Companies

This week's sponsor is AT&T.

eBrief | Best Practices in Mobile Application and Management Delivery

Your organization knows that mobile productivity is important, and it may have already started down the road toward Mobile Device Management (MDM) and Mobile Application Management (MAM). But have you developed a holistic view of application management and delivery -- and its impact on the business? Download this free eBrief to learn about best practices for your mobile deployment.

What's New

1. Heartbleed scan shows most large companies still vulnerable

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

Most major companies have done little to fix vulnerabilities exploited by the Heartbleed bug, according to a study by security firm Venafi.

Venafi finds that 97 percent of Global 2000 organizations remain vulnerable to Heartbleed because they have not replaced vulnerable keys or revoked and replaced digital certificates--measures that experts say are needed to fully protect the organization from Heartbleed.

As FierceITSecurity reported, the Heartbleed bug enables a hacker to read the memory of systems "protected" by vulnerable versions of the OpenSSL software. "This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and user," explains Codenomincon, which uncovered the bug.

Venafi warns that many IT security pros believe that applying a patch is enough to protect their firms from Heartbleed. "But if someone walks into your house through an open door and steals your house keys, you don't then rely on the same locks once you've closed the door. Organizations must find and replace all of their keys and certificates--all of them. Otherwise significant security gaps and open doors remain," the security firm warns.

Of course, Venafi has an interest in promoting this remedy, since it provides services for firms to analyze the location of their keys and digital certificates and remediate any issues with them.

Venafi's is not the first study to find that organizations have not taken adequate steps to protect themselves against Heartbleed. As FierceITSecurity reported last month, a survey by CloudPhysics finds that more than half of deployments of certain VMware products such as vCenter 5.5 server and ESXi v5.5 are still vulnerable to Heartbleed, even though VMware issued a Heartbleed patch in April.

A July advisory from the Industrial Control Systems Cyber Emergency Response Team warns that critical industrial control systems made by Siemens remain vulnerable to Heartbleed. A hacker could use the bug to hijack a system or intentionally crash it, it warns.

For more:
- check out the Venafi study
- read the ICS-CERT advisory

Related Articles:
Is the Heartbleed bug still lurking behind your firewall?
Target breach, Heartbleed bug cause high anxiety among IT security pros
Heartbleed underscores need for open source bug bounties
Heartbleed bug could bleed millions of usernames, passwords

Read more about: data theft
back to top


2. Backoff malware infects POS systems at 600 retailers

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

The Backoff malware, detailed in a US-CERT alert on Friday, has already infected point-of-sale, or POS, systems at 600 retailers, according to security firm Trustwave.

Some of the 600 retailers are large retail chains, Karl Sigler--threat intelligence manager at Trustwave--tells TIME magazine. The Department of Homeland Security, which worked with Trustwave and other federal agencies in uncovering the Backoff malware, declined to comment on Sigler's estimate.

As reported by FierceITSecurity, the Backoff malware is able to infect POS systems through remote desktop software used by retailers to enable remote workers to access their corporate networks. Once the cybercriminals find this software, they launch brute force attacks against their login feature, gain access to the networks, deploy the malware, steal customer payment data and hide the theft using encryption.

All of the retailers identified as being infected with the malware are aware of the breach, says Trustwave.

Backoff is just one of a number of POS malware attacks over the last few years, notes Jaime Blasco, labs director of security startup AlienVault. He says that most remote desktop software uses common usernames and passwords by default--which are often not changed by the retailers.

"The lessons to learn from the latest retailer breaches are: don't expose critical systems such as POS devices to the Internet, especially if you are running Remote Desktop or similar. If for some reason you have to do it, try to create access lists so that only certain IP addresses can access those devices and use strong passwords or even two-factor authentication. Lock all the data and monitor all of your network traffic. Deploy detection technology to be able to look for suspicious traffic," Blasco writes in a statement emailed to FierceITSecurity.

Eric Chiu, president and co-founder of cloud security firm HyTrust, agrees. "Companies need to shift their approach to security from an 'outside-in' mentality of perimeter-based security to an 'inside-out' model where they assume the bad guy is already on the network. Access controls, role-based monitoring and data encryption are critical requirements to protect critical systems from insider threats," Chiu says in a statement emailed to FierceITSecurity.

For more:
- read the TIME article
- check out the US-CERT alert

Related Articles:
Remote desktop software opens retailers' doors to POS malware
No quick fix for point-of-sale security
Infographic: Top 3 POS attack vectors

Read more about: malware, Department of Homeland Security
back to top


3. Virtual currency has real-world security implications, warns HP

By Robert Bartley Comment | Forward | Twitter | Facebook | LinkedIn

In the latest HP Security Briefing, an expert from the company discusses Bitcoin and the real world security implications of cryptocurrency as a widely used mode of transaction.

John Park, a senior security researcher at HP and author of the report, writes that with the increased adoption of Bitcoin--the current market capitalization of BTC is estimated at over $7.8 billion, with $2.2 million added every day--the average user needs to educate himself on how the system works.

"In order to secure Bitcoin, we need to know what we need to protect--that is, where the value is held in the Bitcoin system--since the attacker will go where the value is stored," the report states.

First on the list of value stores is a user's bitcoin wallet. Most often, cybercriminals will infiltrate a system using a backdoor Trojan and then abscond with the wallet key. While the process is similar to a "typical impersonation attack" there are few options for the victim to retrieve their cryptocurrency afterwards, unlike a traditional bank account.

A situation known as a "51% attack"--which almost occurred earlier this year with mining pool GHash.IO--occurs when one entity owns a simple majority of all hashing power in the Bitcoin system. The entity conceivably has the power to block all transactions, undermining the authenticity of the market. While there's no danger of the entity stealing bitcoins from wallets, it can essentially nullify their use or cause a run on the value.

With Bitcoin's hashrate mining system, another store of value is an operating computer itself. As we've discussed before, there exist several forms of malware that commandeer computing power in order to join a larger mining pool. Park writes that this kind of crime pays off as the perpetrator is not using his own electricity or systems to earn an extra couple of dollars.

However, amid all the problems with Bitcoin, Park thinks cryptocurrency will continue to find a niche in an evolving digital market.

"There are clearly a number of things that could go wrong with Bitcoin. The good news is that none of the issues we've listed are crippling flaws, and for the foreseeable future, we can reasonably expect the Bitcoin system to keep rolling along," he writes.

For more:
- read the report from HP

Related Articles:
Bitcoin brings extortion to the digital age
Scams that take over smartphones for cryptocurrency mining just not worth it
Doomsday scenario '51% attack' threatens Bitcoin stability

Read more about: Bitcoin, cryptocurrency
back to top


4. No jive: Java is king of exploited programming language, says Cisco

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

Java continues to be the most exploited programming language by attackers, according to the Cisco Midyear Security Report released on Tuesday.

Java exploits rose to 93 percent of all indicators of compromise in May of this year; up from a previous high of 91 percent in November of last year. An indicator of compromise is a forensic artifact or remnant of an intrusion that can be identified on a host or network.

"Java continues to be the frontrunner for web exploitation," Levi Gundert, technical lead at Cisco, tells FierceITSecurity. "Because so many applications use Java, and because so many organizations run Java and embed it in the browser, it is a wide attack surface for threat actors to leverage," he adds.

After examining 16 large multinational organizations, Cisco found that nearly 70 percent of their networks were identified as issuing domain name system (DNS) queries for dynamic DNS domains. This shows evidence of networks misused or compromised with botnets using dynamic DNS to alter their IP address to avoid detection or blacklisting.

"The best way for malware to communicate with a command and control server is to use a dynamic DNS service because if the server gets taken down, they can stand up a new server with a new IP address and instantly change where that domain points to," Gundert tells FierceITSecurity. "There is an extremely high correlation between malicious activity and specific dynamic DNS subdomains," he adds.

The Cisco report also finds an "unusual uptick" in malware within vertical markets. Media and publishing was the top vertical for web malware encounters, experiencing four times the median number of encounters in the first half of 2014, followed by pharmaceuticals and chemicals in second, and aviation in third. 

"Analyzing and understanding weaknesses within the security chain rests largely upon the ability of individual organizations, and industry, to create awareness about cyber risk at the most senior levels," says John Stewart, chief security officer at Cisco, in a statement.

For more:
- see Cisco's release

Related Articles:
FBI crackdown has not lessened enthusiasm for Blackshares RAT blackmail toolkit
Spotlight: Software vulnerability disclosures on the rise, says Microsoft
Spotlight: Oracle plugs more than 100 security holes

Read more about: Java, network security
back to top


5. Personal data on tens of thousands of Mozilla developers exposed

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

Personal information on tens of thousands of Mozilla developers was posted on a public server for 30 days, Mozilla admits in a blog post.  

The personal information included email addresses of 76,000 developers and encrypted passwords of 4,000 developers, according to a blog by Stormy Peters, director of developer relations, and Joe Stevenson, operations security manager, with Mozilla, maker of the Firefox browser.

Mozilla explains that a data sanitization process for the database of the Mozilla Developer Network, or MDN, site failed, resulting in the disclosure. A Mozilla developer discovered the breach last month.

"The encrypted passwords were salted hashes and they by themselves cannot be used to authenticate with the MDN website today. Still, it is possible that some MDN users could have reused their original MDN passwords on other non-Mozilla websites or authentication systems," the blog warns. "For those that had both email and encrypted passwords disclosed, we recommended that they change any similar passwords they may be using."

Mozilla is investigating the "process and principles" it uses to reduce the likelihood of a repeat of this breach of confidential developer information.

Of course, the blog made the obligatory apology following a data breach of this sort. "We are known for our commitment to privacy and security, and we are deeply sorry for any inconvenience or concern this incident may cause you."

Commitment, in this case, does not equal execution.

For more:
- read the Mozilla blog

Related Articles:
Chinese behind major breach at Canada's National Research Council
Can the FTC sue companies over lax IT security?
Data breaches, security bugs bad news for IT security pros, good news for PKI vendors

Read more about: personal information, Encrypted Passwords
back to top


Also Noted

TODAY'S SPOTLIGHT... P.F. Chang's comments on data breach at 33 restaurants

P.F. Chang's said this week that credit and debit card numbers appear to have been stolen from 33 of its U.S. restaurants between October of 2013 and June of this year. The restaurants are located in the following states: Arizona, California, Colorado, Florida, Illinois, Maryland, Missouri, Nevada, New Jersey, New York, North Carolina, Ohio, Oklahoma, Pennsylvania, Tennessee, Texas, Virginia and Washington. As FierceITSecurity reported in June, thousands of stolen credit and debit cards that appeared to have been used at P.F.Chang's restaurants were being sold on the underground store Rescator, according to security researcher Brian Krebs. In July, P.F. Chang's confirmed the data breach. Read more.

>> Critical code execution bug in Samba gives attackers superuser powers (Ars Technica)
>> Eight Steps to Eliminating Security Risks in WordPress (eWeek)
>> Gambling website Paddy Power took four years to tell 650,000 customers their data had been stolen (Graham Cluley)
>> Cisco Patches Security Vulnerability Impacting Multiple Products (Security Week)
>> Wireless Emporium customers notified of breach (Office of Inadequate Security)

And Finally… Best thinking done in shower (Wired)

Webinars

> IT and Marketing: Extreme Collaboration - Tuesday, August 26th / 2pm ET / 11am PT

Media outlets love to focus on the tension between IT and marketing. But if it's a war, both sides lose. Instead, CIOs have to partner with CMOs to help deliver on aggressive business goals in an ever-changing landscape. Register Today!

Marketplace

> Whitepaper: ESG Solution Brief

ESG details the current state of enterprises solving their mobility challenges and how to give users greater access to files and content from their mobile devices, maximizing employee productivity, while maintaining control over security and compliance. Download this brief today!

> Whitepaper: Supporting VDIs and Thin Clients

Companies have already begun deploying VDIs and thin clients (like Google's Chromebook) on a massive scale. The low-cost, easily deployed workstations present a significant cost savings for companies, but require unique tools to support them. This whitepaper, written by Proxy Networks, outlines the best way to do that. Download now.

> eBook: eBrief | Making BYOD Work: 4 Critical Strategies for Midmarket and SMB Companies

Bring-your-own-device (BYOD) can be a blessing for mid-size and small businesses. But getting the real payoff requires some attention to details that may differ from those at large enterprises. Download this eBrief to get more practical advice for making BYOD work.


©2014 FierceMarkets, a division of Questex Media Group LLC This email was sent to ignoble.experiment@arconati.us as part of the FierceITSecurity email list which is administered by FierceMarkets, 1900 L Street NW, Suite 400, Washington, DC 20036, (202) 628-8778.
Refer FierceITSecurity to a Colleague

Contact Us

Editor: Fred Donovan. VP sales and business development: Jack Fordi. Publisher: Ron Lichtinger.

Advertise

General advertising: Jack Fordi. Press releases: Fred Donovan. Request a media kit.

Email Management

Manage your subscription

Change your email address

Unsubscribe from FierceITSecurity

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts (Last 7 Days)