Featured Posts

<< >>

Master Email for Business Efficiency

Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.

Turkey Revenge

The turkeys are pissed this Thanksgiving they are seeking revenge.

Germs Infest 60% of Americas Phones

60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.

Smartphone Sanitizing: A Practical Guide

Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.

Why Soft Skills Matter in Today’s Job Market

Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.

DIY Ransomware

DIY RansomwareSophos has recently uncovered a new trend of cyber DIY’ers who are breaking into computers one at a time and manually running ransomware on them. Apparently, these purveyors of bespoke malware are tired of the mass distribution channels employed by WannaCry and NotPetya.

cybercriminalWhy bother using stolen NSA exploits or sending millions of booby-trapped email attachments when you can do it yourself. For whatever reason, some cyber-criminals have decided that if you want something doing properly, you have to do it yourself.

The Naked Security blog points out that many companies, notably small businesses, outsource their IT to, or pay for lots of help from, outside contractors. These contractors might live in another part of town, or elsewhere in the country, or even on the other side of the world. To let remote sysadmins look after your Windows networks, the most widely used tool is Microsoft‘s (MSFT) own Remote Desktop Protocol or RDP for short.

Microsoft Remote Desktop ProtocolFor those who haven’t used it, the author describes RDP as a tool that allows remote use even of fully graphical applications that can’t be scripted or operated via a command prompt. They can work like being right on-site.  That means that the RDP password you’ve chosen for your remote sysadmin (or that you’ve let them choose for themselves) is essentially the key to your office – a weak password is like a server room door that’s propped open, inviting any passing snooper to take a look inside.

brute force attackSo, if the crooks using a network search engine such as Shodan, notice that you’ve got RDP open to the internet, they’ll take a poke around. Sophos security experts who’ve investigated a number of recent RDP attacks have often found evidence that a tool called NLBrute was used to try a whole range of RDP passwords – a so-called brute force attack – in the hope of sneaking in.

Once they’ve got your RDP password – whether they use NLBrute, or simply look you up on Facebook to find your birthday and your pet’s name – they’ll log on and immediately create various brand new administrative accounts. That way, even if you get rid of the crooks and change your own admin password, they’ve already got backup accounts they can use to sneak back in later.

Here’s what you can expect to happen next, based on what Sophos has seen in the attacks they have investigated:

Female hacker - teachprivacy.comStep 1: The crooks download and install low-level system tweaking software, such as the popular Process Hacker tool. Tools of this sort are regularly used by legitimate sysadmins for troubleshooting and emergency recovery. The bad guys can also use it for no good. They can modify the operating system, kill off processes, delete files, and change configuration settings that are usually locked down.

Step 2: The cybercriminals turn off or reconfigure anti-malware software, using the newly installed tweaking tools.

Step 3: The bad guys go after the passwords of administrator accounts. If they can’t get an admin password, they may try logging in as a regular user and running hacking tools that try to exploit unpatched vulnerabilities to get what’s called EoP, or elevation of privilege.

EoP means that already logged-on users can sneakily promote themselves to more powerful accounts to boost their powers. Sophos has seen EoP tools left on attacked systems that tried to abuse vulnerabilities dubbed CVE-2017-0213 patched by Microsoft in May 2017 and CVE-2016-0099, patched by Microsoft back in March 2016.

database servers

Step 4: The crooks turn off database services (e.g. SQL) so that vital database files can be attacked by malware. Files such as SQL databases are usually locked while the database server software is active, as a precaution against corruption that could be caused by concurrent access by another program. The side-effect of this is that malware can’t get direct access to database files either, and therefore can’t scramble them to hold them to ransom.

Step 5: The crooks turn off Volume Shadow Copy (the Windows live backup service) and delete any existing backup files.  Shadow copies act as real-time, online backups that can make recovery from ransomware a quick and easy process. That’s why crooks often go looking for shadow copies first to remove them.

Step 6: The crooks upload and run ransomware of their choice. Because these DIY criminals have used their illegitimate sysadmin powers to rig the system to be as insecure as they can, they can often use older versions of ransomware, perhaps even variants that other crooks have given up on and that are now floating around the internet “for free”.

These bespoke hacks mean the crooks don’t have to worry about using the latest and greatest malware, or setting up a command-and-control server, or running a hit-and-hope spam campaign.

In one attack, Sophos saw a folder on the desktop containing four different types of ransomware. The crooks ran each in turn until one of them worked.

Many ransomware attacks are distributed indiscriminately, and therefore rely on a “pay page” – a Dark Web server set up specially to tell victims how much to pay, and how to pay it.

But the author notes these RDP crooks are already personally involved to the extent of logging into your network themselves, so there’s often what you might call a “personal touch”.

Pay ransomware in bitcoinRather than automatically squeezing you via a website, the blog says you’ll probably see a pop-up telling you to make contact via email to “negotiate” the release of your data. At the time of writing the Bitcoin address used by that attacker contained BTC 9.62, with 1 bitcoin valued at $11,388.33 (11-28-2017) currently worth almost $110,000.

The Sophos investigators found that the victims of this kind of attack are almost always small-to-medium companies: the largest business in our investigation had 120 staff, but most had 30 or fewer. With small-scale comes a dependence on external IT suppliers or “jack-of-all-trades” IT generalists trying to manage cybersecurity along with many other responsibilities.

In one case a victim was attacked repeatedly, because of a weak password used by a third-party application that demanded 24-hour administrator access for its support staff.

Sophos recommends these steps to cut your risk of becoming a victim of DIY Ransomware:

  1. If you don’t need RDP, make sure it’s turned off on every computer on the network: RDP can be used to connect to servers, desktops, and laptops.
  2. Consider using a Virtual Private Network (VPN) for connections from outside your network. A VPN requires outsiders to authenticate with the firewall first and to connect from there to internal services. This means software such as RDP never needs to be exposed directly to the internet.
  3. Use two-factor authentication (2FA) wherever you can. To log on with 2FA you need a one-time logon code every time. If crooks steal or guess your password, it’s no use on its own.
  4. Patch early, patch often. This prevents crooks from exploiting vulnerabilities against your network reducing your exposure to danger.
  5. After an attack, check to see what the crooks have changed. Don’t just remove the malware or apply the missed patches and be done with it. Especially check for added applications, altered security settings, and newly created user accounts.
  6. Set a lockout policy to limit password guessing attacks. With three guesses at a time followed by a five-minute lockout, a crook can only try out 12 × 3 = 36 passwords an hour, which makes a brute force attack impractical.
  7. If you’re using a third-party IT company and they haven’t already suggested the precautions Sophos listed above, why not ask them why, and ask yourself if they’re the right people to be looking after your network?

Related article

  • Hackers have cashed out on $143,000 of bitcoin from the massive WannaCry ransomware attack (CNBC)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A Printer for Rocket Scientists

A Printer for Rocket ScientistsWe all dream about the elusive paperless office. Seems even rocket scientists can’t figure it out. Mashable is reporting that the rocket scientists aboard the International Space Station (ISS) research laboratory which orbits 254 miles above Earth and travels at more than 17,500 miles per hour print a lot. The astronauts print roughly 1,000 pages a month on two printers; one is installed on the U.S. side of the ISS, the other in the Russian segment. They print critical mission information, emergency evacuation procedures, and sometimes, photos from home on a 20-year-old printer.

The international space station is one of humanity's great engineering triumphs. washingtonpost.comNASA IT techs just ordered new printers for the International Space Station (ISS) to replace the Epson 800 Inkjet printers which have been on-board the ISS since the people moved in, in November of 2000. ISS told the author, “When the printer was new, it was like 2000-era tech and we had 2000-era laptop computers. Everything worked pretty good … the printer’s been problematic for the last five or six years.”

Stephen Hunter, Manager of ISS Computer Resources, called the Epson 800 Inkjet printer, “a museum piece.”  NASA had dozens of this printer and, as one failed, they’d send up another one.

Epson 800 Inkjet printerBut now it’s time for something new. In 2018, NASA will send two brand new, specialized printers up to the station. Mr. Hunter, who has been updating the ISS’s office technology for the last two years, told Mashable that the ISS printers have needed to be replaced for a long time. However, he can’t drive over to Best Buy, buy a new printer, and launch it into space.

He started working with HP (HPQ) on an ISS IT overhaul, replacing over 100 existing ISS workstations with HP Gen 2 Z-Book laptops for the crew, so it was only natural they would turn to HP again for the printer project. Enrique Lores, President of HP’s Imaging, Printing, and Solutions business welcomed the opportunity, “We couldn’t pass up the opportunity to do this … It was an incredible technical challenge.”

By Hewlett-Packard Company [Public domain], via Wikimedia CommonsHP couldn’t just suggest that NASA launch any ordinary laser printer into space. Its friable toner dust and significant power consumption would make it a poor fit for life in micro-gravity. Ronald Stephens Research and Development Manager for HP’s Specialty Printing Systems Division explained, “NASA had a very unique set of requirements that we had to meet.”

NASA wanted a printer that could:

• Print and handle paper management in zero gravity – On Earth printers rely on gravity for paper management. Whatever HP provided would have to hold the paper, so it didn’t jam in the printer or float away when the printer’s done with it according to Mashable.

NASA• Handle ink waste during printing – NASA’s Hunter explained that typical inkjet printers do deposit some extra ink during the printing process. With gravity in place, the ink typically stays in the printer or even on the printed sheet. In zero gravity, it floats out. The NASA IT expert said astronauts could ingest the ink or it could contaminate the crew’s numerous onboard experiments.

• Be flame retardant – HP replaced the printer’s shell with fire-retardant plastic.

• Be power-efficient – The ISS generates all its own electricity through solar panels. That means they must tightly manage power consumption. The article says any new device they bring on board must be power efficient. One bit of good news: HP doesn’t have to change the power configuration on the printer. The ISS can supply a standard 110 AV outlet.

Instead of building a specialized printer from scratch. HP recommended the HP Envy 5600. It’s a standard, all-in-one device you can buy at retail for $129.99. But the printers heading up to the ISS underwent significant modification.

We removed the capability to do scanning, fax, and copy out of it to reduce weight and remove glass portions,” said NASA’s Hunter.

Removing what could weigh the printer down or break and become a space disaster was only the start. The most challenging part was related to zero gravity. Ultimately, HP went through every printer system and component to analyze how it would be affected by zero gravity.

HP turned to 3D printing and developed, experimental 3D material — nylon filled with glass beads. Its unique properties allowed HP to swap out the multiple parts that make up the printer output tray and turn it into one that’s both lighter, flexible, and more reliable.

HP ISS PrinterAfter all the modifications, the HP space printer still looks like a printer. It’s 20 inches wide, 16 inches deep, and five inches high. There’s no lid or glass, but, aside from the 3D printed materials, the ISS’s next printer looks pretty unremarkable. The HP ENVY Zero-Gravity Printer still uses standard inkjet ink.

To work out the kinks of the new ISS printer, HP worked with a small team from NASA that included Pettit and three other astronauts. Astronauts’ concerns about printing in space are much the same as they are on the ground. “You want it to be uneventful… you want to hit print and have a hard copy,” said Pettit.

The Vomit Comet flies a parabolic flightUp to this point, all of NASA and HP’s work was theoretical. They did all they could to make the space printer space-ready. However, the only way to know if this printer is suitable for use on the space station before actually sending it to space is by testing it in zero gravity and the only way to do that is on NASA’s Vomit Comet.

The Vomit Comet is a plane that flies a parabolic flight. As it loops up and down, passengers achieve, at the peak of the curve, about 20 seconds of near-weightlessness. During those times, the team tested printing and that the paper flowed through the printer and ejected in the right way. NASA’s Hunter said, “It went flawlessly. Everything works to our expectation.”

By SpaceX (transferred from English Wikipedia) [Public domain], via Wikimedia CommonsNASA plans to send the first two printers up to the station on Elon Musk’s Space-X Dragon C16 rocket as part of Space X mission CRS-14 scheduled for launch in February 2018.

NASA and HP have retrofitted roughly 50 HP Envy printers and expect each one to last roughly two years. “We want to use this through the remainder of the ISS program. Officially through 2024, with plans through 2028,” said NASA’s Hunter.

This will be the last printer they get in the space station,” predicated HP’s Stephens.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Are You a Human

Are You a HumanDetroit-based Are You a Human was recently purchased by Virginia-based Distil Networks. The purchase is part of Distil’s efforts to expand its bot-detection capabilities. As part of the acquisition, the Human Tag will be re-branded as Distil Bot Discovery. Distil will open an office in Detroit and increase its presence in Motown. All 10 of Are You A Human’s employees are staying on, according to reports.

The firm’s website describes the Are You Human technology;

[Are You Human] collects hundreds of fingerprinting metrics and analyzes user’s device, software, and natural behavior to develop robust behavioral metrics on each page view in real-time … Only through an expert understanding of natural human characteristics and behavior is it possible to identify the 99% of non-human traffic caused by new and unique bots that fraud detection and verification systems can’t find

suite of bot-detection productsDistill Networks will add A You a Human’s real-time analysis technology and biometric information to its own suite of bot-detection products and use it to launch a free bot-discovery plugin for Google Analytics. Detecting bots is important because they can inflate website traffic numbers or present a security risk by searching for sensitive information.

The firm cited the Motor City as being:

… incredibly helpful and supportive to us, and we can’t imagine doing this anywhere else. Being able to build this company in Detroit has been hugely meaningful to all of us, and we’ll still be part of that awesome community going forward.

Detroit skyline

 

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Biometrics Hype

Biometrics HypeFollowers of the Bach Seat know biometrics have a limited value in replacing passwords. Despite the technical flaws another round of biometric hype is rolling across the Intertubes. The latest round of biometric hype is coming from Samsung (005930). In the hope to revive their brand, Samsung has released the Galaxy S8. The Samsung Galaxy S8 includes the ability to use facial recognition software to unlock your brand new phone. CNet says that this idea “sounds awesome.”

However, this awesome idea appears to lower the bar for your security. CNet reports that the video blogger MarcianoTech demonstrated a pre-release version of the Galaxy S8 being unlocked using just a photo (at the 1:09 mark). To their credit, Samsung has acknowledged that the Face Unlock feature is more for convenience than for security. The biometric feature cannot be used for mobile payments. While weak facial recognition software may be a convenience for the user, it could also be very convent for others, too.

The troubles with Face Unlock date back to 2011.  In 2011 SlashGear reported that Google (GOOG) admitted the security system could be fooled by a picture of you and not the real thing. CNet reports that the technology was developed by PittPatt, a startup originating from Carnegie Mellon University, which was later acquired by Google.

FBI’s facial recognition database

Next Generation Identification databaseThe Guardian reports during testimony before congress the FBI admitted that about half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports from 18 states including Michigan.

The FBI first launched its advanced biometric database, Next Generation Identification (NGI), in 2010. NGI augmented the old fingerprint database with further capabilities including facial recognition. The bureau did not tell the public about its newfound capabilities nor did it publish a privacy impact assessment, required by law, for five years.

Unlike with the gathering of fingerprints and DNA, which is done following an arrest, photos of innocent civilians are being collected proactively. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos.

 

“I’m frankly appalled,” said Paul Mitchell, a congressman for Michigan. “I wasn’t informed when my driver’s license was renewed my photograph was going to be in a repository that could be searched by law enforcement across the country.

rb-

So anyone with a photo of you, or maybe even just access to your Facebook (FB) photos, could potentially access your phone. There are two important reasons why biometrics won’t work, and why the old-fashioned password is still a better option: a person’s biometrics can’t be kept secret and they can’t be revoked.

 

no real way to hide biometric data from the worldPeople expose their biometrics everywhere – they leave fingerprints behind at bars and restaurants, their faces and eyes are captured in photos and film, etc. There’s no real way to hide this data from the world. As far back as 2002, research led by Japanese cryptographer Tsutomu Matsumoto. Matsumoto and his team gummy bears to make artificial fingers that they then used to fool fingerprint scanners. The gelatin-based finger was successful in fooling all 11 devices tested. I wrote about spoofing fingerprints in 2016.

However, it’s the second problem with biometrics that is the really big one: once a person’s biometrics have been compromised, they will always be compromised. Since a person can’t change their fingerprint or whatever biometric is being relied upon, it’s ‘once owned, forever owned.’ That is biometrics’ major failing and the one that will be hardest to overcome.

Part of the reason is that it’s silly to only have 10 possible passwords your whole life (20, if you count toes) but unlike a password, once a biometric is compromised, it is permanent. Today, if your Twitter account gets hacked, you just change the password – but if you are using a biometric, you will be stuck with that hacked password for the rest of your life.

With the release of Windows 10, Microsoft stepped up its biometrics game. CNet reports that with the recent improvements in Windows 10 biometric security includes facial recognition software. Besides facial recognition, Windows Hello also supports other biometric factors to secure your PC. Some of the factors are fingerprints and iris recognition. For facial recognition though, Microsoft (MSFT) has partnered with chipmaker Intel (INTC) for its RealSense 3D camera tech to get the job done. RealSense uses depth-sensing infrared cameras to track the location and positions of objects. Microsoft uses RealSense to scan a person’s face or iris before unlocking the device in question.

To further push the biometrics agenda, more than 200 companies including Microsoft, Lenovo, Alibaba, and MasterCard have already come together to form a partnership known as the FIDO (Fast Identity Online) Alliance. FIDO was founded in 2013 to address issues such as a worldwide adoption of standards for authentication processes over the Web to help reduce reliance on passwords.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

60 Seconds Online

60 Seconds OnlineThe global internet economy is huge, really huge, and growing. Online provider of market and consumer data, Statista says that retail e-commerce sales worldwide will top 4 Trillion dollars in 2020. Right now the worldwide internet economy takes in an incredible $3.9 million every 60 seconds.

  • Amazon (AMZN) rakes in $204,000 every minute,
  • Ebay (EBAY) rings up $160,000 in sixty seconds, and
  • Cyber-criminals steal over $1000 of other people’s cash each second.

This infographic from E-Commerce fulfillment firm RedStag Fulfillment details what happens in 60 seconds of online e-commerce.RedStag Fulfillment infographic

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.