Archive for November 29, 2017

DIY Ransomware

DIY RansomwareSophos has recently uncovered a new trend of cyber DIY’ers who are breaking into computers one at a time and manually running ransomware on them. Apparently, these purveyors of bespoke malware are tired of the mass distribution channels employed by WannaCry and NotPetya.

cybercriminalWhy bother using stolen NSA exploits or sending millions of booby-trapped email attachments when you can do it yourself. For whatever reason, some cyber-criminals have decided that if you want something doing properly, you have to do it yourself.

The Naked Security blog points out that many companies, notably small businesses, outsource their IT to, or pay for lots of help from, outside contractors. These contractors might live in another part of town, or elsewhere in the country, or even on the other side of the world. To let remote sysadmins look after your Windows networks, the most widely used tool is Microsoft‘s (MSFT) own Remote Desktop Protocol or RDP for short.

Microsoft Remote Desktop ProtocolFor those who haven’t used it, the author describes RDP as a tool that allows remote use even of fully graphical applications that can’t be scripted or operated via a command prompt. They can work like being right on-site.  That means that the RDP password you’ve chosen for your remote sysadmin (or that you’ve let them choose for themselves) is essentially the key to your office – a weak password is like a server room door that’s propped open, inviting any passing snooper to take a look inside.

brute force attackSo, if the crooks using a network search engine such as Shodan, notice that you’ve got RDP open to the internet, they’ll take a poke around. Sophos security experts who’ve investigated a number of recent RDP attacks have often found evidence that a tool called NLBrute was used to try a whole range of RDP passwords – a so-called brute force attack – in the hope of sneaking in.

Once they’ve got your RDP password – whether they use NLBrute, or simply look you up on Facebook to find your birthday and your pet’s name – they’ll log on and immediately create various brand new administrative accounts. That way, even if you get rid of the crooks and change your own admin password, they’ve already got backup accounts they can use to sneak back in later.

Here’s what you can expect to happen next, based on what Sophos has seen in the attacks they have investigated:

Female hacker - teachprivacy.comStep 1: The crooks download and install low-level system tweaking software, such as the popular Process Hacker tool. Tools of this sort are regularly used by legitimate sysadmins for troubleshooting and emergency recovery. The bad guys can also use it for no good. They can modify the operating system, kill off processes, delete files, and change configuration settings that are usually locked down.

Step 2: The cybercriminals turn off or reconfigure anti-malware software, using the newly installed tweaking tools.

Step 3: The bad guys go after the passwords of administrator accounts. If they can’t get an admin password, they may try logging in as a regular user and running hacking tools that try to exploit unpatched vulnerabilities to get what’s called EoP, or elevation of privilege.

EoP means that already logged-on users can sneakily promote themselves to more powerful accounts to boost their powers. Sophos has seen EoP tools left on attacked systems that tried to abuse vulnerabilities dubbed CVE-2017-0213 patched by Microsoft in May 2017 and CVE-2016-0099, patched by Microsoft back in March 2016.

database servers

Step 4: The crooks turn off database services (e.g. SQL) so that vital database files can be attacked by malware. Files such as SQL databases are usually locked while the database server software is active, as a precaution against corruption that could be caused by concurrent access by another program. The side-effect of this is that malware can’t get direct access to database files either, and therefore can’t scramble them to hold them to ransom.

Step 5: The crooks turn off Volume Shadow Copy (the Windows live backup service) and delete any existing backup files.  Shadow copies act as real-time, online backups that can make recovery from ransomware a quick and easy process. That’s why crooks often go looking for shadow copies first to remove them.

Step 6: The crooks upload and run ransomware of their choice. Because these DIY criminals have used their illegitimate sysadmin powers to rig the system to be as insecure as they can, they can often use older versions of ransomware, perhaps even variants that other crooks have given up on and that are now floating around the internet “for free”.

These bespoke hacks mean the crooks don’t have to worry about using the latest and greatest malware, or setting up a command-and-control server, or running a hit-and-hope spam campaign.

In one attack, Sophos saw a folder on the desktop containing four different types of ransomware. The crooks ran each in turn until one of them worked.

Many ransomware attacks are distributed indiscriminately, and therefore rely on a “pay page” – a Dark Web server set up specially to tell victims how much to pay, and how to pay it.

But the author notes these RDP crooks are already personally involved to the extent of logging into your network themselves, so there’s often what you might call a “personal touch”.

Pay ransomware in bitcoinRather than automatically squeezing you via a website, the blog says you’ll probably see a pop-up telling you to make contact via email to “negotiate” the release of your data. At the time of writing the Bitcoin address used by that attacker contained BTC 9.62, with 1 bitcoin valued at $11,388.33 (11-28-2017) currently worth almost $110,000.

The Sophos investigators found that the victims of this kind of attack are almost always small-to-medium companies: the largest business in our investigation had 120 staff, but most had 30 or fewer. With small-scale comes a dependence on external IT suppliers or “jack-of-all-trades” IT generalists trying to manage cybersecurity along with many other responsibilities.

In one case a victim was attacked repeatedly, because of a weak password used by a third-party application that demanded 24-hour administrator access for its support staff.

Sophos recommends these steps to cut your risk of becoming a victim of DIY Ransomware:

  1. If you don’t need RDP, make sure it’s turned off on every computer on the network: RDP can be used to connect to servers, desktops, and laptops.
  2. Consider using a Virtual Private Network (VPN) for connections from outside your network. A VPN requires outsiders to authenticate with the firewall first and to connect from there to internal services. This means software such as RDP never needs to be exposed directly to the internet.
  3. Use two-factor authentication (2FA) wherever you can. To log on with 2FA you need a one-time logon code every time. If crooks steal or guess your password, it’s no use on its own.
  4. Patch early, patch often. This prevents crooks from exploiting vulnerabilities against your network reducing your exposure to danger.
  5. After an attack, check to see what the crooks have changed. Don’t just remove the malware or apply the missed patches and be done with it. Especially check for added applications, altered security settings, and newly created user accounts.
  6. Set a lockout policy to limit password guessing attacks. With three guesses at a time followed by a five-minute lockout, a crook can only try out 12 × 3 = 36 passwords an hour, which makes a brute force attack impractical.
  7. If you’re using a third-party IT company and they haven’t already suggested the precautions Sophos listed above, why not ask them why, and ask yourself if they’re the right people to be looking after your network?

Related article

  • Hackers have cashed out on $143,000 of bitcoin from the massive WannaCry ransomware attack (CNBC)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A Printer for Rocket Scientists

A Printer for Rocket ScientistsWe all dream about the elusive paperless office. Seems even rocket scientists can’t figure it out. Mashable is reporting that the rocket scientists aboard the International Space Station (ISS) research laboratory which orbits 254 miles above Earth and travels at more than 17,500 miles per hour print a lot. The astronauts print roughly 1,000 pages a month on two printers; one is installed on the U.S. side of the ISS, the other in the Russian segment. They print critical mission information, emergency evacuation procedures, and sometimes, photos from home on a 20-year-old printer.

The international space station is one of humanity's great engineering triumphs. washingtonpost.comNASA IT techs just ordered new printers for the International Space Station (ISS) to replace the Epson 800 Inkjet printers which have been on-board the ISS since the people moved in, in November of 2000. ISS told the author, “When the printer was new, it was like 2000-era tech and we had 2000-era laptop computers. Everything worked pretty good … the printer’s been problematic for the last five or six years.”

Stephen Hunter, Manager of ISS Computer Resources, called the Epson 800 Inkjet printer, “a museum piece.”  NASA had dozens of this printer and, as one failed, they’d send up another one.

Epson 800 Inkjet printerBut now it’s time for something new. In 2018, NASA will send two brand new, specialized printers up to the station. Mr. Hunter, who has been updating the ISS’s office technology for the last two years, told Mashable that the ISS printers have needed to be replaced for a long time. However, he can’t drive over to Best Buy, buy a new printer, and launch it into space.

He started working with HP (HPQ) on an ISS IT overhaul, replacing over 100 existing ISS workstations with HP Gen 2 Z-Book laptops for the crew, so it was only natural they would turn to HP again for the printer project. Enrique Lores, President of HP’s Imaging, Printing, and Solutions business welcomed the opportunity, “We couldn’t pass up the opportunity to do this … It was an incredible technical challenge.”

By Hewlett-Packard Company [Public domain], via Wikimedia CommonsHP couldn’t just suggest that NASA launch any ordinary laser printer into space. Its friable toner dust and significant power consumption would make it a poor fit for life in micro-gravity. Ronald Stephens Research and Development Manager for HP’s Specialty Printing Systems Division explained, “NASA had a very unique set of requirements that we had to meet.”

NASA wanted a printer that could:

• Print and handle paper management in zero gravity – On Earth printers rely on gravity for paper management. Whatever HP provided would have to hold the paper, so it didn’t jam in the printer or float away when the printer’s done with it according to Mashable.

NASA• Handle ink waste during printing – NASA’s Hunter explained that typical inkjet printers do deposit some extra ink during the printing process. With gravity in place, the ink typically stays in the printer or even on the printed sheet. In zero gravity, it floats out. The NASA IT expert said astronauts could ingest the ink or it could contaminate the crew’s numerous onboard experiments.

• Be flame retardant – HP replaced the printer’s shell with fire-retardant plastic.

• Be power-efficient – The ISS generates all its own electricity through solar panels. That means they must tightly manage power consumption. The article says any new device they bring on board must be power efficient. One bit of good news: HP doesn’t have to change the power configuration on the printer. The ISS can supply a standard 110 AV outlet.

Instead of building a specialized printer from scratch. HP recommended the HP Envy 5600. It’s a standard, all-in-one device you can buy at retail for $129.99. But the printers heading up to the ISS underwent significant modification.

We removed the capability to do scanning, fax, and copy out of it to reduce weight and remove glass portions,” said NASA’s Hunter.

Removing what could weigh the printer down or break and become a space disaster was only the start. The most challenging part was related to zero gravity. Ultimately, HP went through every printer system and component to analyze how it would be affected by zero gravity.

HP turned to 3D printing and developed, experimental 3D material — nylon filled with glass beads. Its unique properties allowed HP to swap out the multiple parts that make up the printer output tray and turn it into one that’s both lighter, flexible, and more reliable.

HP ISS PrinterAfter all the modifications, the HP space printer still looks like a printer. It’s 20 inches wide, 16 inches deep, and five inches high. There’s no lid or glass, but, aside from the 3D printed materials, the ISS’s next printer looks pretty unremarkable. The HP ENVY Zero-Gravity Printer still uses standard inkjet ink.

To work out the kinks of the new ISS printer, HP worked with a small team from NASA that included Pettit and three other astronauts. Astronauts’ concerns about printing in space are much the same as they are on the ground. “You want it to be uneventful… you want to hit print and have a hard copy,” said Pettit.

The Vomit Comet flies a parabolic flightUp to this point, all of NASA and HP’s work was theoretical. They did all they could to make the space printer space-ready. However, the only way to know if this printer is suitable for use on the space station before actually sending it to space is by testing it in zero gravity and the only way to do that is on NASA’s Vomit Comet.

The Vomit Comet is a plane that flies a parabolic flight. As it loops up and down, passengers achieve, at the peak of the curve, about 20 seconds of near-weightlessness. During those times, the team tested printing and that the paper flowed through the printer and ejected in the right way. NASA’s Hunter said, “It went flawlessly. Everything works to our expectation.”

By SpaceX (transferred from English Wikipedia) [Public domain], via Wikimedia CommonsNASA plans to send the first two printers up to the station on Elon Musk’s Space-X Dragon C16 rocket as part of Space X mission CRS-14 scheduled for launch in February 2018.

NASA and HP have retrofitted roughly 50 HP Envy printers and expect each one to last roughly two years. “We want to use this through the remainder of the ISS program. Officially through 2024, with plans through 2028,” said NASA’s Hunter.

This will be the last printer they get in the space station,” predicated HP’s Stephens.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.