Archive for author: makoadmin

Why managed service providers (MSP) are critical for business continuity

With the threat landscape becoming more hostile to businesses, small- and medium-sized businesses (SMBs) are often finding it difficult to cope. Hence, they turn to managed service providers (MSPs) for help, not only to keep their businesses going—the concept known as business continuity—but also to offer salve to known pain points that encompass all industries.

Short-staffed

One of the recognized pain points for SMBs is the apparent lack of skilled security professionals who can implement processes and procedures that snap back businesses to their original state of operations after experiencing a disruptive or business-ending event. With the cybersecurity industry experiencing a stunning zero percent unemployment rate with millions of opened positions, SMBs often have a hard time finding, or affording, “the right candidates.” Unfortunately, this staffing challenge is foreseen to continue through 2021. This could spell bad news for SMBs.

This doesn’t mean that there is no talent out there, however. Positions aren’t filled because many employers are underpaying for skilled specialistsMore remain open because employers and recruiters are looking inside a small bubble of candidates instead of exploring candidates with similar training and many of the appropriate “soft” skills, whose importance should not be overlooked in running IT and security teams. In addition, many current employees suffer from burnout, quitting their jobs after feeling overworked and underappreciated.

Conventional hiring trends, such as requiring experience and certifications at entry-level positions, plus a near-unreachable wish list of skills candidates must possess are other potential causes contributing to the shortage.

If an organization lacks the manpower to address their need to be resilient in the face of a threat landscape that is becoming more hostile toward business growth and evolution, a fully vetted MSP that offers tools and services that address an organization’s unique needs should step in to lighten the load.

Short budgets

SMBs are not known to set aside budget for security—another pain point. Unlike enterprises, we know that SMBs normally lack the resources they need to defend against cyberattacks. Whether that’s hiring the appropriate number of skilled staff, paying them a competitive salary, investing in security infrastructure, or purchasing enterprise-grade antivirus, network, and firewall protection, tight budgets typically mean corners must be cut.

Cybercriminals know this, and they are keen to pluck the low-hanging fruit. Therefore, it’s not a surprise to see an uptick of threat actors, particularly those behind ransomware campaigns, targeting SMBs—another reason why SMBs might consider using MSPs as an affordable alternative to full-blown security software suites to combat sophisticated malware attacks on-demand.

No training

Some businesses may be lucky enough to have the manpower, but still lack the foresight to provide staff with the knowledge and training in cybersecurity they will need and use throughout their entire tenure. While it is understandable to a degree, it’s also disconcerting to know that some organizations in industries severely targeted by malware attack campaigns, such as hospitals, schools, and government bodies, have little to no knowledge of what a phish looks like. And while it’s concerning that companies with IT security teams may not be as prepared as we expect them to be, even more worrying is the faith organizations put into their cybersecurity readiness, when it may not be as good as they thought.

Staff unskilled in cybersecurity cannot provide organizations the help they need to prevent security incidents. Time may be the key factor in deciding whether an organization should get some outside help or not. While they recognize the need to address the lack of training in their workforce, MSPs can help take charge and get things moving with little overhead.

Compliance, compliance

Cybersecurity standards are in place for a reason. Companies of all sizes need to know what it takes to build up their cybersecurity efforts, which in turn, makes a positive dent in their business resilience plans. MSPs may just be the answer they’re looking for.

MSPs are subject to well-known compliance regimes. This means that they don’t just follow one standard but many, and they likely overlap one another. For example, an organization based in New York who deals with clients in EU countries are subject to both the GDPR and regulations under the New York Department of Financial Services (DFS).

Helping take charge

SMBs have been feeling the pressure for years to respond to serious cybersecurity challenges their businesses face on a regular basis. They also know that such problems take time to address—they cannot be solved overnight. In the meantime, well-vetted MSPs can step in and help. Their fully qualified and trained staff can bridge the skills gap until a larger society shift happens (if it does); their resources, processes, and procedures make organizations they service compliant to known standards; and their overall service makes it easier for organizations to implement and manage in the long run.

The post Why managed service providers (MSP) are critical for business continuity appeared first on Malwarebytes Labs.

A week in security (February 17 – 23)

Last week on Malwarebytes Labs, we highlighted the benefits and concerns of identity-as-a-service (IDaaS), an identity management scheme deployed from the cloud; reported on scammers and squatters taking advantage of Rudy Giuliani’s Twitter typos; and gave a high-level overview of RobbinHood, the latest ransomware baddie to specifically target organizations.

Other cybersecurity news

Stay safe, everyone!

The post A week in security (February 17 – 23) appeared first on Malwarebytes Labs.

Threat spotlight: RobbinHood ransomware takes the driver’s seat

Despite their name, the RobbinHood cybercriminal gang is not stealing from the rich to give to the poor. Instead, these ransomware developers are more like big game hunters—attacking enterprise organizations and critical infrastructure and keeping all the spoils for themselves.

In 2019, the RobbinHood ransomware creators successfully attacked and received ransom payouts from the cities of Baltimore, Maryland, and Greenville, North Carolina. Not ones for humility, they now mention those successes in revised ransom notes, pointing out to victims that it’s useless to try recovering their files in any other way than paying the ransom.

And the ransom isn’t exactly cheap. RobbinHood ransom demands can range from 3 Bitcoins for a single computer up to 13 Bitcoins for a complete network, which translates to tens of thousands of dollars.

robbinhood ransom note
“It’s impossible to recover your files without private key and our unlocking software. You can google: Baltimore City, Greenville city and RobbinHood ransomware.”

How RobbinHood ransomware works

Like many other ransomware families, RobbinHood, which Malwarebytes detects as Ransom.RobbinHood, has been observed gaining access to organizations’ networks through brute force of Remote Desktop Protocols (RDP) or by using other Trojans that provide access to the attackers.

Once the attacker has gained sufficient access to the system, researchers found that in some cases they introduce a vulnerable kernel driver from Gigabyte. This driver is signed by the motherboard manufacturer and will be accepted by Windows because of the digital signature. But the driver has a long-standing vulnerability listed as CVE-2018-19320, which allows a local attacker to take complete control of the affected system.

The attacker uses this vulnerability to stop 181 specific services, disabling many protective programs, backup software, and deleting files that would normally be locked. System services often keep critical files in use, so they can’t be deleted or modified. Being able to stop these services from the kernel driver level makes taking full control of a system much easier.

Before the actual encryption begins, RobbinHood also disconnects all network shares, deletes all shadow copies, clears event logs, and disables Windows automatic repair.

For the encryption process itself, it fetches a public key from the file pub.key in the Windows temp folder. While encrypting files, an AES key is created for each separate file. The ransomware will then encrypt the AES key and the original filename with the public RSA encryption key and append it to the encrypted file. Each encrypted file will then be renamed using the format:

Encrypted_[randomstring].enc_robbinhood

During encryption, these folders are skipped:

  • ProgramData
  • Windows
  • bootmgr
  • Boot
  • $WINDOWS.~BT
  • Windows.old
  • Temp
  • tmp
  • Program Files
  • Program Files (x86)
  • AppData
  • $Recycle.bin
  • System Volume Information

Four different ransom notes are dropped in every folder that contains encrypted files. Most of the notes contain information similar to the one below:

What happened to your files?
All your files are encrypted with RSA-4096, Read more on https://en.wikipedia.org/wiki/RSA_(cryptosystem)
RSA is an algorithm used by modern computers to encrypt and decrypt the data. RSA is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of the keys can be given to anyone:
1 -We encrypted your files with our “Public key”
2 -You can decrypt, the encrypted files with specific “Private key” and your private key is in our hands ( It’s not possible to recover your files without our private key )
Is it possible to get back your data?
Yes, We have a decrypter with all your private keys. We have two options to get all your data back.
Follow the instructions to get all your data back:
OPTION 1
Step 1: You must send us 3 Bitcoin(s) for each affected system
Step 2: Inform us in panel with hostname(s) of the system you want, wait for confirmation and get your
OPTION 2
Step 1: You must send us 13 Bitcoin(s) for all affected system
Step 2: Inform us in panel, wait for confirmation and get all your decrypters
Our Bitcoin address is: xxx BE CAREFUL, THE COST OF YOUR PAYMENT INCREASES $10,000 EACH DAY AFTER THE FOURTH DAY
Access to the panel ( Contact us )The panel address: hxxp://xbt4titax4pzza6w[.]onion/
Alternative addresses
hxxps://xbt4titax4pzza6w.onion[.]pet/
hxxps://xbt4titax4pzza6w.onion[.]to/
Access to the panel using Tor Browser
If non of our links are accessible you can try tor browser to get in touch with us:
Step 1: Download Tor Browser from here: https://www.torproject.org/download/download.html.en
Step 2: Run Tor Browser and wait to connect
Step 3: Visit our website at: panel address
If you’re having a problem with using Tor Browser, Ask Google: how to use tor browser
Wants to make sure we have your decrypter?
To make sure we have your decrypter you can upload at most 3 files (maximum size allowance is 10 MB in total) and get your data back as a demo.
Where to buy Bitcoin?
The easiest way is LocalBitcoins, but you can find more websites to buy bitcoin using Google Search: buy bitcoin online

 Decrypting may not be enough

As a warning to those who might consider paying the ransom, as Baltimore and Greenville did: Simply decrypting the files may not be enough to bring systems back online. The introduction of the vulnerable kernel driver and changing the behavior of the kernel may cause other problems on affected systems, which may result in deprecated performance or BSODs.

Reportedly, the recovery from the ransomware attack cost the city of Baltimore over US$10 million, which dwarfs the paid ransom of 13 Bitcoin (roughly US$80,000).

How to prevent RobbinHood ransomware

As with all ransomware families, the best method of protection is preventing the infection from happening in the first place. Since RobbinHood targets organizations, IT and security teams should take the following common precautions to secure against its attack:


Recommended reading: How to protect your RDP access from ransomware attacks


How Malwarebytes protects against ransomware

Malwarebytes can protect systems against RobbinHood ransomware in several ways.

The Malwarebytes Anti-Malware technology detects malicious files, browser modifications, and system modifications on Windows PCs using a combination of signature-based and signatureless technologies. This layer of protection detects the RobbinHood binary itself. Detections can happen in real time as the binary is run or the infection can be rooted out from an already-compromised machine by conducting a full system scan.

realtime protevtion

Anti-Ransomware is a signatureless technology in charge of monitoring system activity of processes against a certain subset of data in specific locations on the endpoint. Using patented technology, Anti-Ransomware assesses changes in those data files. If an internal scoring threshold is crossed by a monitored process, it triggers a detection from the Anti-Ransomware component.

ARW detection
Malwarebytes Anti-Ransomware recognizes and stops ransomware behavior.

For those already infected, Ransomware Rollback can help recover encrypted files within 72 hours of the attack. Rollback creates a local cache on the endpoint to store changes to files on the system. It can use this cache to help revert changes caused by a threat. The Rollback feature is dependent on activity monitoring available in Malwarebytes Endpoint Detection and Response.

IOCs

Files (SHA256 hashes):

  • 791c32a95f401f7464214960e49e716656f6fd6fff135ac2a6ba607236d3346e
  • 99c3cc348f8ee4e87bce45b1dd185d31830c370ac43fd3e39ac50340f029ef79
  • e9188ace227b00cbf1f6fba3ceb32af8e4d456c3a0815300a224a9d9e00778a8
  • 47d892da6a49b02a2904bdc0d03ecef66c076481d19ab19251d86d11be494765

Ransom notes:

  • _Decrypt_Files.html
  •  _Decryption_ReadMe.html
  • _Help_Help_Help.html
  • _Help_Important.html

Extension of encrypted files:

.enc_robbinhood

Stay safe everyone!

The post Threat spotlight: RobbinHood ransomware takes the driver’s seat appeared first on Malwarebytes Labs.

Rudy Giuliani’s Twitter mishaps invite typosquatters and scammers

Former cybersecurity czar Rudy Giuliani has been targeted by typosquatters on Twitter, thanks to copious misspellings and other keyboarding errors made in a number of his public tweets. In a tweet sent out on Sunday, Giuliani meant to send his 650,000-plus followers to his new website, RudyGiulianics.com. Instead, a space added after “Rudy” sent users on a redirection quest that ultimately landed on a web page laced with adware.

Typosquatting has long been used as a way to capitalize on mistakes made by those with clumsy fingers. A mistyped URL, which would normally lead users to a 404 error page, is instead redirected to a completely unrelated site—often one designed for ill intent. For example, let’s say you enter yotube.com into your browser’s address bar instead of youtube.com. Rather than seeing the normal YouTube portal, you will instead be redirected via a few ad networks and most likely end up to a scam page, thanks to the handy work of enterprising typosquatters.

Typosquatting can be a profitable business, as threat actors will register domains lexically close to big brand names or popular websites for heavy traffic gains. The end goal isn’t always to monetize via malvertising redirections—it could be phishing, data theft, or even hacktivism.

In Giuliani’s case, a public political figure has been identified by cybercriminals for his tendency toward typo-laden tweets. In fact, Giuliani’s Twitter account contains numerous tweets with misspellings around his personal website that sometimes lead to trolling attempts or redirect to malvertising schemes. We examine a few of these instances.

Typo leads to political trolling

Here’s a tweet sent from Giuliani’s account using an iPad. Whoever composed that tweet forgot to add a space between the word “Watch” and “rudygiulianics.com”.

tweet1

As a result, the website becomes Watchrudygiulianics.com which was registered a day after the tweet:

Domain Name: watchrudygiulianics.com
Registrar: GoDaddy.com, LLC
Creation Date: 2020-02-16T05:23:50Z

Visiting the site immediately redirects users to https://www.drugrehab.com/treatment/, a site for help with substance abuse.

redir1

In another example, we see a much more subtle typo for Giuliani’s website, where a single ‘i’ is missing in RUDYGIULIANCS.com (the correct site is rudygiulianics.com).

tweet2

The domain rudygiuliancs.com was also registered recently (but before the tweet came out, so it either was preemptive registration for a forthcoming typo or perhaps the typo had been made already).

Domain Name: rudygiuliancs.com
Registrar: Wild West Domains, LLC
Creation Date: 2020-02-07T16:30:38Z

This time, visiting this link redirects visitors to a Wikipedia page for the Trump-Ukraine scandal:

redir2

Malvertising and other traffic schemes

As mentioned earlier, typosquatters will typically watch popular domain names and register new ones that are likely going to be a result of a typo. Because Giuliani has over 650,000 followers on Twitter and is a well-known political figure regularly in the headlines, scammers know he’s a good source of potential web traffic purely from typosquatting.

In Sunday’s example, a typo led to a malvertising scheme. This time, a space was inserted between “Rudy” and “Giulianics.com”.

tweet3

This typo resulted in a link to Giulianics.com, a domain registered at the end of January.

Domain Name: giulianics.com
Registrar: GoDaddy.com, LLC
Creation Date: 2020-01-31T20:29:50Z

As seen in the image above, a series of redirects will happen once you visit that domain. This is typical for malvertising chains that fingerprint your browser and other settings in order to deliver the appropriate payload.

traffic

In this instance, visiting from the United States via Google Chrome, we were served a browser extension called Private Browsing:

extension

Although we did not examine the extension in detail, several comments from the Google Play Store say the extension was forced while browsing the web.

extensiondetails

Among other capabilities, it can read your browser history, the data you enter on sites, and can change your default search engine. As a rule of thumb, it is generally recommended to refrain from installing too many browser extensions, especially when they are promoted via unwanted redirects.

In late January, there was a report that visiting Giuliani’s website distributed malware. We weren’t able to confirm it at that time, but in light of the current typo situation, we believe it’s more likely that one of the tweets containing the wrong link led to a malvertising chain, and possibly to a browser locker.

Monitoring popular accounts for mistakes

Many attacks we see in the wild are opportunistic, praying on the latest news or events likely to draw attention. There’s also always been great interest in popular social media accounts, but typically by hacking them directly. In this case, opportunistic actors are waiting for the next typo to happen in order to push out their own message or to monetize on it via malicious redirects.

This serves as a reminder that even well-known or verified social media accounts can send users in unintended directions leading to scams or malware. In a sense, any kind of communication can be abused for an attacker’s own gain by recognizing a pattern of predictable mistakes and immediately acting upon them.

For those wanting protection against such redirections and other malicious website activity, Malwarebytes offers a free browser extension that takes an aggressive stance on blocking malvertising and other dubious schemes.

The post Rudy Giuliani’s Twitter mishaps invite typosquatters and scammers appeared first on Malwarebytes Labs.

A week in security (February 10 – 16)

Last week on Malwarebytes Labs, we explained how to battle online coronavirus scams with facts, discussed the persistent re-infection techniques of Android/Trojan.xHelper and how to remove it, provided cyber tips for safe online dating, and showed how Hollywood teaches us misleading cybersecurity lessons.

We also released the 2020 State of Malware Report describing the threat landscape of the year in detail, including top threats for Mac, Windows, Android, and the web, as well as the state of data privacy in commerce and legislation.

Other cybersecurity news

  • Medical transportation vendor, GridWorks experienced a burglary that resulted in a laptop stolen, which contained the personal identifiable information (PII) of 654,362 members. (Source: Security Boulevard)
  • Four members of China’s military were charged on with hacking into Equifax and stealing trade secrets and the personal data of about 145 million Americans in 2017. (Source: The New York Times)
  • Critical vulnerabilities addressed in the Accusoft ImageGear library could be exploited by remote attackers to execute code on a victim machine. (Source: Security Week)
  • Dell has copped to a flaw in the pre-installed program SupportAssist that allows local hackers to load malicious files with admin privileges. (Source: TheRegister)
  • The owner of the Helix Bitcoin Mixer was charged with laundering over $310 million in Bitcoin cryptocurrency while operating the dark web mixer between 2014 and 2017. (Source: BleepingComputer)
  • Emotet has found a new attack vector: using already infected devices to identify new potential victims that are connected to nearby Wi-Fi networks. (Source: The Hacker News)
  • A digitally signed Gigabyte driver has been discovered to be in use by Ransom.RobbinHood to fully encrypt the files on a computer. (Source: Guru 3D)
  • Chief Information Security Officers (CISOs, or CSOs) across the industry are reporting high levels of stress resulting in an average tenure of only 26 months. (Source: ZDNet)
  • The Czech data protection authority announced an investigation into antivirus company Avast for harvesting the browsing history of over 100 million users. (Source: Vice.com)
  • Hackers are demanding nude photos to unlock files in a new ransomware scheme targeting women. (Source: FastCompany)

Stay safe, everyone!

The post A week in security (February 10 – 16) appeared first on Malwarebytes Labs.

Harnessing the power of identity management (IDaaS) in the cloud

Sometimes, consumers have it easy.

Take, for example, when they accidentally lock themselves out of their personal email. Their solution? Reset the password. With one click, they’re able to change their old, complicated password with a new, more memorable one.

Self-service password reset is awesome like this. For users on a business network, it’s not so simple. That is, unless they’re using identity-as-a-service (IDaaS).

What is IDaaS?

IDaaS—pronounced “ay-das”—stands for identity-as-a-service. Essentially, it is identity and access management (IAM)—pronounced “I-am”—deployed from the cloud.

Organizations use IAM technology to make sure their employees, customers, contractors, and partners are who they say they are. Once confirmed via certain methods of authentication, the IDaaS system provides access rights to resources and systems based on permissions granted. And because it’s deployed through the cloud, business entities can request access securely wherever they are and whatever device they’re using.

Giving its own users self-service access to portals is just one of the ways an IDaaS system can provide support for businesses. In fact, the need to better engage with customers while securing their data and conforming to established standards has become the main driving force behind the move to IDaaS.

IDaaS vs. traditional IAM

While traditional, on-premise identity management systems offer levels of self-serve access for employees at the office, their benefits are limited in comparison to cloud-based options. This is because IAMs are:

  • Expensive to create and maintain. It costs more if the organization supports global users due to complexity of infrastructure. IAMs can also be unsustainable overall as the business grows. Both cost and infrastructure complexity increases, making IAMs more difficult to support.
  • Inefficiently managed, security-wise. IAMs that must be placed on legacy systems, for example, put organizations at risk because patching these systems is a challenge, leaving the door open for vulnerabilities at access points.
  • Time-consuming. Upgrading IAM hardware is time-consuming. Sometimes, the upgrade doesn’t happen if it means long downtimes and lost productivity. Also, IT teams are faced with significant time-consuming (and patience-testing) tasks, from password resetting to user provisioning.
  • Not future-proofed. Although some traditional IAMs can provide limited cloud support, they’re essentially designed to handle on-premise resources. Since IAMs inherently lack support for modern-day tech (mobile devices, IoT) and business disruptors (Big Data, digital transformation), they don’t address what current users need and want.

Benefits of IDaaS

Businesses can benefit from IDaaS in so many ways. For the sake of brevity, keep in mind these three main drivers for adapting IDaaS: new capabilities, speed of implementation, and innovation. Not only would these make them more attractive to potential customers, but also helps to retain current ones.

New capabilities, such as single sign-on (SSO), gives business customers the ease and convenience of accessing multiple resources using only a single login instance. Logging in once creates a token, which the IDaaS system then shares with other applications on behalf of the customer, so they would not need to keep logging in.

SSO also removes the burden of remembering multiple login credentials from users, which usually drives them to create memorable but also easily breakable passwords. Needless to say, SSO—and other protocols like Security Assertion Markup Language (SAML), OAuth (pronounced “oh-auth”), and OpenID Connect (OIDC)—will greatly enhance an organization’s security.

Since IDaaS is cloud-based, implementing it in your organization is a lot quicker. For one thing, hardware provisioning is already with the IDaaS provider. What usually takes a couple of years to realize will only take several months—sometimes even a few weeks.

Organizations that are still unsure of whether they want to fully embrace IDaaS but are curious to try it out can temporarily use the solution as a subset of their applications. Should they change their minds, they can pull back just as easily as they pushed on.

And finally, IDaaS removes the barriers that inhibits organizations from moving forward on innovation. Understaffed IT teams, the mounting costs surrounding IT infrastructure that only gets more complicated over time, and insufficient support for modern technologies are just a few of problems that hold modern businesses back from innovating in their own workforce processes, product offerings, and marketing and sales techniques.

Business leaders need to get themselves “unstuck” from these problems by outsourcing their needs to a trusted provider. Not only will doing so be lighter on their pockets, but they can also customize IDaaS’s inherent capabilities to fit their business needs and improve their customer engagement. It’s a win-win for all.

Note, however, that a pure IDaaS implementation may not be for every organization. Some organizations are simply not ready for it. In fact, the majority of enterprises today use hybrid environments—a combination of on-premise and cloud-based applications. This is because some organizations believe that there are some resources best kept on-premise. And when it comes to IDaaS adoption, utilizing the best of both worlds is increasingly becoming the norm.

My organization is small. Is IDaaS still necessary?

Absolutely. Small- and medium-sized businesses experience many of the same IAM issues enterprise organizations face. Every employee maintains a set of credentials they use to access several business applications to do their jobs. An SSO feature in IDaaS will significantly cut back on the number of login instances they have to face when switching from one app to another.

It’s a good question to ask if your business needs IDaaS. But perhaps the better—or bigger—question is whether your business is compliant enough to established security and privacy standards. Thankfully, having IDaaS will help with that issue as well. The caveat is that organizations, regardless of size, must evaluate potential IDaaS providers based on their maturity and their capability to offer a great solution. No two IDaaS offerings are the same.

Mike Wessler and Sean Brown, authors of the e-book “Cloud Identity for Dummies”, propose some questions to consider when deciding:

  • Are they a new company on a shoe-string budget catering to lower-end clients with cost as the primary driver?
  • Are they relatively new in either the cloud or IAM field where they gained those capabilities via recent acquisitions and are simply rebranding someone else’s products and services?
  • Do they have legitimate experience and expertise in cloud and IAM services where offering IDaaS is a logical progression?

What are the possible security problems?

Despite the good that IDaaS could bring to your organization, it is no cure-all. In fact, some security researchers have already noted concerns on some of its key capabilities. Using our previous example, which is the SSO, it is argued that this has become a “single point of failure” should the authentication server fails. Or it can also act as a “single breach point,” waiting to be compromised.

The cybersecurity sector has a dizzyingly long laundry list of use cases where organizations are breached due to compromised credentials. Australia’s Early Warning Network, which was compromised a year ago, was caused by the misuse of stolen credentials. And there are many ways credentials can be leaked or stolen. Organizations can thwart this by requiring the use of multi-factor authentication (MFA).

The bottom line is this: IDaaS or no, businesses still have to adopt and practice safe computing habits to minimize their attack surface.

If you’d like a more in-depth reading on IDaaS, please visit the following:

Stay safe!

The post Harnessing the power of identity management (IDaaS) in the cloud appeared first on Malwarebytes Labs.

Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack

In pop culture, cybercrimes are often portrayed as mysterious and unrealistic. Hackers are enigmatic and have extraordinary tech abilities. They can discover top secrets in a short time and type at breakneck speed to hack into a database.

In real life, though, hacking is not that straightforward. Hackers may have technical capabilities and high intelligence, but they are otherwise normal human beings. It takes a lot of time and research to come up with foolproof strategies to break into an organization’s secret files.

In the last few decades, hacking and cybersecurity have become important topics of discussion, and pop culture has capitalized on this wave of interest. Many movies and TV shows now find ways to weave cybercrime into their storylines. At times, the depiction is realistic and informative; most of the time, it’s plain misleading and ludicrous.

In this article, we take a look at some pop culture hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.

Hackers are not always basement-dwelling nerds

Predominantly, male hackers are depicted in Hollywood movies to be either reclusive conspiracy theorists or super-smart, ex-intelligence officers. Picture Dennis Nedry from Jurassic Park or Martin Bishop in Sneakers. Their female counterparts—few and far between—tend toward the harsh, ass-kicking, boyish types, like Kate Libby in Hackers or Trinity in The Matrix.

The reality is, while we may be able to create criminal profiles for threat actors or even define skill sets and personality types that are attracted to hacking, there is no single stereotype that carries.

Hackers could be bubbly, social, feminine, sporty, narcissistic—the life of the party. They could also be relatively quiet, introverts, artists, compassionate, or deeply sensitive. Simply put, pop culture has a habit of stereotyping what it doesn’t understand, and hacking is still a widely misunderstood pastime/profession.

But there is one truth that unites all hacker types: Hacking requires strategic, conceptual thinking, so intelligence is required, as is practice. The best actual hackers spend years honing their craft, testing and testing code, working with mentors and peers, sometimes going to school or, yes, the military, for skills training.

However, cybercrime isn’t dominated by super-skilled hackers. Most criminals have softer code-writing skills, purchasing malware-as-a-service kits on the dark web or using social engineering techniques to scam users out of money. Meanwhile, there are hackers who use their skills for good, called white hats, often working as security researchers or in IT for businesses, schools, healthcare organizations, or the government.

Pop culture would benefit from seeing these more diverse representations of hackers, cybercriminals, and security professionals on TV and in the movies.

Hacking takes research and patience

Movies and TV shows are meant to be exciting and dramatic. As with most careers that aren’t well understood by those outside the industry—think theoretical physicist or brain surgeon—these professional portrayals are made out to be much more action-packed in pop culture than they are in the real world.

Real hackers and cybersecurity experts have to rely on patience and persistence gained through training and experience to strike gold—much more so than a magical solution that can resolve a plot point in five minutes or less.

3..2…1…”I’m in!”

Research is one of the most important parts of hacking or engineering or reverse-engineering, along with making mistakes. Real-world cybersecurity experts understand that failures are just as important as successes. Why?

Part of cybersecurity involves testing currently-active systems to find flaws and improve what needs improving. That can often take months or years of hard work, and not just a few minutes of elaborate schemes and computer wizardry. And even when criminals building the most sophisticated software discover that their cover is blown, they go back to the drawing table to advance on how best to come up with a better plan of infiltrating the host computer.

You can’t save a system by smashing buttons

When NCIS’ Abby is hacked, a million pop-ups fill her screen—Hollywood’s favorite “You’ve been hacked!” move. Thankfully, her friend heroically steps in, furiously typing on the keyboard until the problem is solved. Of course, that’s not quite how the scene would play out in real life.

When a computer is hacked, you cannot save it by pressing buttons aimlessly. You must, at minimum, unplug/shut down the computer and restart or install a USB drive or CD system. And you should also run a scan with an anti-malware program that can clean up infected devices. If you’re part of a business network, the process is more complicated: Alerting your company’s IT team is the best course of action if you suspect an infection. Button mashing will only make your fingers sore.

Hacking is not always flashy

Hollywood loves to make eye candy out of a hacking scene, often displaying colorful, polished graphic interfaces (GUIs) or 3D-immersive virtual reality experiences—neither of which have much to do with actual hacking. This infamous hacking scene in Swordfish, for example, shows Stanley completing some sort of digital Rubik’s Cube to “assemble crypto algorithm.” Whatever that means.

And there’s also this classic from Jurassic Park, where Ariana gains control of the automatic doors by “hacking” into the Unix security system in a matter of seconds.

Setting aside that saying, “It’s a Unix system, I know this” is like saying, “It’s a Windows system, I know this,” knowing Unix (or Windows) wouldn’t automatically bestow on someone the power to override security protocols—especially on custom GUIs reminiscent of a Minecraft beta.

Pop culture loves to spoon feed its audiences cheesy 3D visuals of viruses and authentication attempts. But these flashy visual interfaces, especially in 3D, are not accurate at all. What do your file systems look like on your home or work computer? How many of them are in 3D? How many times do you see a giant “ACCESS DENIED” painted across your whole screen when you enter an incorrect password or when your operating system can’t find a file?

A more accurate interface would be to show command line (code) displayed on a console or terminal, simply because it would be the most efficient way for hackers to obtain data quickly.

However,
as much as pop culture has misrepresented hacking to the general public, it has
also taught us varying real-life lessons about cybersecurity. Here are a few
examples:

Do not download and install untrusted applications

In Ex Machina, we learned that the CEO of Blue Book, Nathan Bateman, fast-tracked the emotional growth of Ava by taking data from smartphone cameras across the world. This scenario is currently playing out in real life, as there are applications that can be downloaded from third-party platforms and even from Google Play and Apple App Store that can spy on users and steal their personal information.

This
teaches us to be careful when downloading applications online. Verify each
app’s capabilities and permission requests before installing them on your
devices. If a music app is asking for access to your GPS location, for example,
ask yourself why such information would be necessary for this app to function.
If it seems like an unnecessary amount of access, it’s better to forget downloading.

Small distractions could be a diversion

Sometimes cybersecurity lessons can be learned from movie scenes that don’t involve computers at all. For example, in Star Wars: The Last Jedi, Poe creates a diversion, distracting the general and the First Order armada before bombing the Dreadnought. In fact, military strategy is often well intertwined with that of cyberwarfare.

Small distractions were used to a great effect in the 2015 distributed denial of services (DDoS) attacks on ProtonMail, for example. A small ransom note was dropped as a precursor to a 15-minute test DDoS attack, which diverted ProtonMail’s IT team to customer service assistance. The threat actors then followed up with the true mission, jamming up ProtonMail servers with a 50 Gigabit-per-second wave of junk data that took down the datacenter housing servers while simultaneously attacking several ISPs upstream, causing serious damage that took the company offline for days.

The lesson you can take away from this is that a small disruption of services could just be the blip on the radar meant to pull attention away from the storm. Make sure you stay on alert, especially if you notice this at work, where cybercriminals are focusing more of their efforts for larger returns on their investments.

Always use two-step verification

Always use two-factor authentication (2FA) to protect your online accounts—that cannot be overemphasized. In Mr. Robot, 2FAs were used to guard access to the company’s data and keep hackers out. Many IoT devices, password managers, and other applications have recognized the power of 2FA, or multi-factor authentication, in shielding user and proprietary data from hackers who are able to exploit bad password habits.

Hollywood tends to misrepresent what hacking and cybersecurity are to the general public. But it has also taught us valuable lessons about how to protect ourselves, our devices, and our information on the Internet. We hope that, as cybersecurity awareness increases, the misrepresentations are reduced to the barest minimum. That way, TV and movies can do to cybersecurity what they do best: educate, inform, and entertain the public about its importance to our daily lives.

The post Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack appeared first on Malwarebytes Labs.

Cyber tips for safe online dating: How to avoid privacy gaffs, exploits, and scams

Research and reporting on this article were conducted by Labs writers Chris Boyd and David Ruiz.

Dating apps have been mainstream for a long time now, with nearly every possible dating scene covered—casual, long-term, gay, poly, of the Jewish faith, interested only in farmers—whatever you’re looking for. Sadly, wherever you find people trying to go about their business, you’ll also find others quite happy to intrude and cause problems.

Multiple pieces of research regularly highlight potential privacy flaws or security issues with dating apps galore. All this before we even get to the human aspect of the problem—no wonder online dating is exhausting.

Breaking into online dating circles

Dating apps are an unfortunate juicy target for cybercriminals, who will use any vulnerability—from software to psychological—to achieve their goal. Because it’s important to remember: Dating apps store more than just basic personally identifiable information (PII). They include sensitive data and images people might not be comfortable sharing elsewhere, which gives cybercriminals added leverage for blackmail, sextortion, and other forms of online abuse.

To start, the dating apps and sites themselves may not be safe from prying hackers looking to slurp user details. There’s the infamous 2015 compromise of cheating site Ashley Madison, or last year’s badly-timed announcement from dating app Coffee Meets Bagel, who informed users about a data compromise on Valentine’s Day.

How about location-based dating apps, like Tinder? In 2019, location-based dating app Jack’d allowed users to upload private photos and videos, but didn’t secure them on the backend, leaving users’ private images exposed to the public Internet. Now combine that with the ability to pinpoint a user’s exact location or track them on social media, and the end result is rather frightening.

Finally, online dating can wreak havoc in the workplace, too. If your organization supports a bring your own device (BYOD) policy, security vulnerabilities in dating apps could cause additional risk to your own reputation, as well as the company’s networks and infrastructure. (Though to be fair, you could argue “additional risk” is part and parcel of any BYOD policy.) A 2017 study by Kaspersky found that mobile dating apps were susceptible to man-in-the-middle attacks, putting any data or communications with the enterprise conducted via mobile device in danger.

Hints and tips for safe online dating

There are too many dating apps and websites out there to be able to give granular advice on privacy settings and security precautions for each and every one. However, a lot of security advice in this area is about common sense precaution, just as you would while dating in the real world. Many of these tips have been around forever; some require a little cybersecurity education, and a few rely on newer forms of technology to ensure things go smoothly.

Time to go hunting

Deploy some Google-Fu: One of the very first things you should do is a search related to your prospective date. There may well be multiple alarm bell–ringing search results for a troublesome dating site member all under the same username, for example. Or you could stumble upon multiple profiles begging for money on different sites, all using the same profile pic as your supposed date.

Checking photos and profile pics is a good idea in general. Use Google image search, Tineye, and other similar services to see if it’s been swiped from Shutterstock or elsewhere. It’s possible lazy scammers may start using deepfake images, which will be even harder to figure out, unless you read our blog and see some of the ways you can spot a fake.

Stay in on your night out

Don’t go outside the theoretical safety boundary of the app you’re using. This is one of the most common scam signs for any form of online shenanigans. Mysterious free video game platform gifts sent in your general direction? Surprise! You must receive the gift via dubious email link instead of the gaming platform you happen to be using. Making a purchase from a website you just discovered? Suddenly, you need to make a wire transfer instead of paying online—and so on.

Many dating apps restrict how much profile information you can reveal—that’s a good thing. However, that layer of privacy protection won’t work as well as it should if you’re convinced by a scammer to pass along lots of PII through other means. If the person on the other end of the communique is particularly insistent on this, that’s a definite red flag—for malware and for dating.

Hooking up with social media

A well-worn point, but it bears repeating: Sharing dating profiles with social media platforms may well open your data up to further scrutiny, thievery, and general tomfoolery. Your dating profile may be nicely locked down, but that approach again loses value if tied to public profiles containing a plethora of information on you, your friends, and your family. This just isn’t a risk worth taking.

Sharing is not always caring

Keeping your own dating data disconnected from social media platforms is just one step in protecting your sensitive information. Another step is awareness. When using dating apps, you should spend some time looking at their privacy policies and settings, as well as looking up news stories on them online, so that you know where your data is going, who is sending it around, and why.

For example, last month, the Norwegian Consumer Council revealed how the Android apps for Grindr, Tinder, and OkCupid sent sensitive personal information—including sexual preferences and GPS locations—to advertising companies, potentially breaching user trust.

The nonprofit’s report shone light on the digital advertising industry’s efforts to collect user information and channel it through a complex machine to find out who users are, where they live, what they like, who they support in elections, and even who they love. By analyzing 10 popular apps, the report’s researchers found at least 135 third parties that received user information.

Users’ GPS coordinates were shared with third parties by the dating apps Grindr and OkCupid. GPS “position” data was shared with third parties by the dating app Tinder, which also shared users’ expressed interest in gender. OkCupid also sent user information about “sexuality, drug use, political views, and much more,” the report said.

As to who received the information? The answers are less familiar. While Google and Facebook showed up in the report—both receiving Advertiser IDs—the majority of user data recipients were lesser-known companies, including AppLovin, AdColony, BuckSense, MoPub, and Braze.

Infographic showing which popular Android apps are sharing what information with third parties

There’s no cure-all to this type of data sharing, but you should know that privacy advocates in California are on it, having already asked the state’s Attorney General to investigate whether the data-sharing practices violate the California Consumer Privacy Act, which just came into effect at the start of this year.

General OPSEC tips

Operational security, or OPSEC for short, is pretty important as far as online dating is concerned. Some of the basic cybersecurity hygiene steps that we encourage our users to perform in their day-to-day business can help thwart unwanted digital access or steer you clear of physically dangerous situations. Here are a few examples:

Passwords, passwords, passwords

We all know password reuse is bad—across dating sites, apps, or any accounts—but depending on personal circumstances, it may also be bad to recycle usernames. If you don’t want people you’d rather avoid in the future tracking you down on social media, remember to use random names unrelated to your more general online activities.

While we’re on the subject, there are several other best practices for password security that we recommend, such as creating long passphrases that are unrelated to your name, birthday, or pets. If you can’t remember 85,000 different passwords, consider storing them in a password manager and using a single master password to control them all. If that seems like putting too much power in the hands of one password, we recommend using two- or multi-factor authentication.

The point is: Don’t reuse passwords on dating sites. There may be a plethora of intimate messages sent on these platforms, more so than on most other services you use. It makes sense to lock things down as much as possible.

Stranger danger

Meeting a date in person for the first time? Tell other people where you’re going on your date beforehand. It’s a basic, but invaluable safety step—especially if you have no way of vetting your date outside of the dating app constraints. Let your insider know the name/profile name/and anything else relevant to your date that might help them track you later, if necessary.

Also, try to obscure your literal latitude and longitude or home address from a virtual stranger before you get to know and trust them. Dating apps have taken those spammy “hot singles in your area” ads to their logical end point. Hot singles in your area really would be beneficial where dating is concerned, so why shouldn’t apps allow you to search on factors related to distance? However, on the flip side, this does rather tip your hand where revealing your general location is concerned.

So while your date will have some sort of idea as to where you’re based, you’ll want to have your first meeting(s) somewhere other than “the bar at the end of my street.” A little travel goes a long way to blocking some crucial details. Oh, and consider using public transport or your own vehicle to get to and from the date.

Ring, ring

If possible, don’t hand over your main phone number—especially when such a thing may be tied to SMS 2FA, which can lead to social engineering attacks on your mobile provider. If your mobile is your only phone, consider using a disposable phone specifically for dating that isn’t tied to anything important.

If that’s out of the question, you could try one of the many popular online services which provide their own number/voicemail.

Play it safe

After reading all of this, you may think that between potential security vulnerabilities, privacy exposures, and contending with awful scammers that it’s not worth the hassle to bother with online dating. That’s not our intention.

As long as you follow some of the advice listed above and keep in mind that dating apps can be compromised just like any other software, you should have a safe online dating experience. Just remember that anything you communicate online has the potential to drift offline—after all, that’s the whole goal of online dating in the first place.

Good luck, and stay safe out there!

The post Cyber tips for safe online dating: How to avoid privacy gaffs, exploits, and scams appeared first on Malwarebytes Labs.

Android Trojan xHelper uses persistent re-infection tactics: here’s how to remove

We first stumbled upon the nasty Android Trojan xHelper, a stealthy malware dropper, in May 2019. By mid-summer 2019, xHelper was topping our detection charts—so we wrote an article about it. After the blog, we thought the case was closed on xHelper. Then a tech savvy user reached out to us in early January 2020 on the Malwarebytes support forum:

“I have a phone that is infected with the xhelper virus.
This tenacious pain just keeps coming back.”

“I’m fairly technically inclined so I’m comfortable with
common prompt or anything else I may need to do to make this thing go away so
the phone is actually usable!”

forum user misspaperwait, Amelia

Indeed, she was infected with xHelper. Furthermore, Malwarebytes for Android had already successfully removed two variants of xHelper and a Trojan agent from her mobile device. The problem was, it kept coming back within an hour of removal. xHelper was re-infecting over and over again.

1
Photo provided by Amelia

If it wasn’t for the expertise and persistence of forum patron Amelia, we couldn’t have figured this out. She has graciously has allowed us to share her journey. 

All the fails

Before we share the culprit behind this xHelper re-infection, I’d like to highlight the tactics we used to investigate the situation, including the many dead ends we hit prior to figuring out the end game. By showing the roadblocks we encountered, we demonstrate the thought process and complexity behind removing malware so that others may use it as a guide. 

Clean slate

First off, Amelia was clever enough to do a factory reset before reaching out to us. Unfortunately, it didn’t resolve the issue, though it did give us a clean slate to work with. No other apps (besides those that came with the phones) were installed besides Malwarebytes for Android, thus, we could rule out an infection by prior installs (or so we thought).

We also ruled out any of the malware having device admin rights, which would have prevented our ability to uninstall malicious apps. In addition, we cleared all history and cache on Amelia’s browsers, in case of a browser-based threat, such as a drive-by download, causing the re-infection.

The usual suspect: pre-installed malware

Since we had a clean mobile device and it was still getting re-infected, our first assumption was that pre-installed malware was the issue. This assumption was fueled by the fact that the mobile device was from a lesser-known manufacturer, which is often the case with pre-installed malware.  So Amelia tested this theory by going through the steps to run Android Debug Bridge (adb) commands to her mobile device. 

With adb command line installed and the mobile device plugged into a PC, we used the workaround of uninstalling system apps for current user. This method renders system apps useless even though they still technically reside on the device. 

Starting with the most obvious to the least, we systematically uninstalled suspicious system apps, including the mobile device’s system updater and an audio app with hits on VirusTotal, a potential indicator of maliciousness.  Amelia was even able to grab various apps we didn’t have in our Mobile Intelligence System to rule everything out. After all this, xHelper’s persistence would not end.

2
Photo provided by Amelia of xHelper running on mobile device

Triggered: Google PLAY

We then noticed something strange: The source of installation for the malware stated it was coming from Google PLAY. This was unusual because none of the malicious apps downloading on Amelia’s phone were on Google PLAY. Since we were running out of ideas, we disabled Google PLAY. As a result, the re-infections stopped!

We have seen important pre-installed system apps infected with malware in the past. But Google PLAY itself!? After further analysis, we determined that, no, Google PLAY was not infected with malware. However, something within Google PLAY was triggering the re-infection—perhaps something that was sitting in storage. Furthermore, that something could also be using Google PLAY as a smokescreen, falsifying it as the source of malware installation when in reality, it was coming from someplace else.

In the hopes that our theory held true, we asked Amelia to look for suspicious files and/or directories on her mobile device using a searchable file explorer, namely, anything that started with com.mufc., the malicious package names of xHelper. And then…eureka!

The culprit

Hidden within a directory named com.mufc.umbtts was yet another Android application package (APK). The APK in question was a Trojan dropper we promptly named Android/Trojan.Dropper.xHelper.VRW. It is responsible for dropping one variant of xHelper, which subsequently drops more malware within seconds.

Here’s the confusing part: Nowhere on the device does it appear that Trojan.Dropper.xHelper.VRW is installed. It is our belief that it installed, ran, and uninstalled again within seconds to evade detection—all by something triggered from Google PLAY.  The “how” behind this is still unknown.

It’s important to realize that unlike apps, directories and files remain on the Android mobile device even after a factory reset. Therefore, until the directories and files are removed, the device will keep getting infected.

How to remove xHelper re-infections

If you are experiencing re-infections of xHelper, here’s how to remove it:

  • We strongly recommend installing Malwarebytes for Android (free).
  • Install a file manager from Google PLAY that has the capability to search files and directories.
    • Amelia used File Manager by ASTRO.
  • Disable Google PLAY temporarily to stop re-infection.
    • Go to Settings > Apps > Google Play Store
    • Press Disable button
  • Run a scan in Malwarebytes for Android to remove xHelper and other malware.
    • Manually uninstalling can be difficult, but the names to look for in Apps info are fireway, xhelper, and Settings (only if two settings apps are displayed).
  • Open the file manager and search for anything in storage starting with com.mufc.
  • If found, make a note of the last modified date.
    • Pro tip: Sort by date in file manager
    • In File Manager by ASTRO, you can sort by date under View Settings
  • Delete anything starting with com.mufc. and anything with same date (except core directories like Download):
5
  • Re-enable Google PLAY
    • Go to Settings > Apps > Google Play Store
    • Press Enable button
  • If the infection still persists, reach out to us via Malwarebytes Support.

Mobile malware hits a new level

This is by far the nastiest infection I have encountered as a mobile malware researcher. Usually a factory reset, which is the last option, resolves even the worst infection. I cannot recall a time that an infection persisted after a factory reset unless the device came with pre-installed malware. This fact inadvertently sent me down the wrong path. Luckily, I had Amelia’s help, who was as persistent as xHelper itself in finding an answer and guiding us to our conclusion.

This, however, marks a new era in mobile malware. The ability to re-infect using a hidden directory containing an APK that can evade detection is both scary and frustrating. We will continue analyzing this malware behind the scenes. In the meantime, we hope this at least ends the chapter of this particular variant of xHelper. 

Stay safe out there!

The post Android Trojan xHelper uses persistent re-infection tactics: here’s how to remove appeared first on Malwarebytes Labs.

Malwarebytes Labs releases 2020 State of Malware Report

Malwarebytes Labs today released the results of our annual study on the state of malware—the 2020 State of Malware Report—and as usual, it’s a doozy.

From an increase in enterprise-focused threats to the diversification of sophisticated hacking and stealth techniques, the 2019 threat landscape was shaped by a cybercrime industry that aimed to show it’s all grown up and coming after organizations with increasing vengeance.

The 2020 State of Malware Report features data sets collected from product telemetry, honey pots, intelligence, and other research conducted by Malwarebytes threat analysts and reporters to investigate the top threats delivered by cybercriminals to both consumers and businesses in 2019.

Our analysis includes a look at threats to Mac and Windows PCs, Android and iOS, as well as browser-based attacks. In addition, we examined consumer and business detections on threats to specific regions and industries across the globe. Finally, we took a look at the state of data privacy in 2019, including state and federal legislation, as well as the privacy failures of some big tech companies in juxtaposition against the forward-thinking policies of others.

Here’s a sample of what we found:

  • Mac threats increased exponentially in comparison to those against Windows PCs. While overall volume of Mac threats increased year-over-year by more than 400 percent, that number is somewhat impacted by a larger Malwarebytes for Mac userbase in 2019. However, when calculated in threats per endpoint, Macs still outpaced Windows by nearly 2:1.
  • The volume of global threats against business endpoints has increased by 13 percent year-over-year, with aggressive adware, Trojans, and HackTools leading the pack.
  • Organizations were once again hammered with Emotet and TrickBot, two Trojan-turned-botnets that surfaced in the top five threats for nearly every region of the globe, and in the top detections for the services, retail, and education industries. TrickBot detections in particular increased more than 50 percent over the previous year.
  • Net new ransomware activity is at an all-time high against businesses, with families such as Ryuk and Sodinokibi increasing by as much as 543 and 820 percent, respectively.

To learn more about the top threats of the year for Mac, Windows, Android, and the web, as well as the state of data privacy in commerce and legislation, check out the full 2020 State of Malware Report here.

The post Malwarebytes Labs releases 2020 State of Malware Report appeared first on Malwarebytes Labs.