IT NEWS

InfraGard infiltrated by cybercriminal

InfraGard, a partnership between the FBI and members of the private sector that was established to protect critical infrastructure in the US, has been infiltrated by a cybercriminal. As a result, its database of contact information is now for sale on an English-language cybercrime forum.

InfraGard

InfraGard is a partnership between the Federal Bureau of Investigation (FBI) and members of the private sector that was created to help protect US critical infrastructure. In its collaboration efforts, InfraGard connects those responsible for critical infrastructure to the FBI. The FBI provides education, information sharing, networking, and workshops on emerging technologies and threats. InfraGard’s membership includes business executives, entrepreneurs, lawyers, security personnel, military and government officials, IT professionals, academia, and state and local law enforcement.

Breached

A threat actor posted samples as proof that they have obtained access to the more than 80,000-member database of InfraGard. According to KrebsOnSecuirty, the threat actor is a member of the Breached forums using the handle USDoD. Pompompurin, the administrator of the cybercrime forum Breached, is providing an escrow service for the seller. An escrow service acts as a mediator between two parties making a financial transaction and is meant to ensure no one loses their funds due to a scam. They receive the funds from the buyer and hold on to that payment until the buyer has received the purchase in good order.

False account

When asked, the threat actor revealed that they gained access by registering a false account. The user USDoD told KrebsOnSecurity that they applied with the name and real phone number belonging to a CEO of a major US financial corporation, but with an email address that was under the threat actor’s control. The application was approved, apparently without any verification that the CEO was aware of.

Once they had access, the InfraGard user data was easily available via an Application Programming Interface (API) that is built into several key components of the website.

The FBI commented that they were aware of a false account but declined to provide any further comments.

“This is an ongoing situation, and we are not able to provide any additional information at this time.”

The data

The stolen data are not earth-shattering. The stolen database has the names, affiliations, and contact information for more than 80,000 InfraGard users, but only 47,000 of the stolen records include unique emails. Probably due to the security awareness of the members, the data contained neither Social Security numbers nor dates of birth. Although fields existed in the database for that information, many users had left them blank.

What’s maybe more worrying is that the threat actor has direct access to the other InfraGard members and can use this “trustworthy” platform to engage on other phishing expeditions. USDoD said they were hoping the imposter account would last long enough for them to finish sending direct messages as the CEO to other executives using the InfraGard messaging portal.

This story looks like it might be continued. We will keep you posted here of any new developments.

Is Apple about to embrace third-party app stores?

On Tuesday, Bloomberg reported that Apple is preparing to allow access to third-party app stores on all iPhone and iPad devices owned by EU users, in anticipation of a new EU competition law coming into force in mid-2024. If the reporting is correct, then in future users in the EU will no longer be confined to the “walled garden” of the App Store and will be free to download apps from stores owned by companies other than Apple. If it happens, the move will bring both increased freedom and increased security risks.

The Digital Markets Act

The Digital Markets Act (DMA), also referred to as Regulation (EU) 2022/1925, was introduced by the European Commission, the executive arm of the EU, in December 2020 and was recently signed into law, in September 2022. It aims to “ban certain practices used by large platforms acting as ‘gatekeepers’ and enable the Commission to carry out market investigations and sanction non-compliant behaviour”. 

It targets the most prominent “Big Tech” companies operating within the EU. The Commission has yet to provide a list of gatekeepers, but Apple is expected to be one of them.

A gatekeeper is defined by the DMA as a platform operating on one or more of the world’s digital core services, which includes advertising, search, and social networking, in at least three EU countries and satisfies the following criteria:

  • Has an annual turnover of 7.5B EUR ($8.2B) or a market capitalization of 75B EUR ($82B)
  • Provides certain services, such as browsers, messengers, and social media, that have 45M EU users per month minimum and 10,000 annual business users

Non-compliant gatekeepers could be subjected to fines of at least 10 percent of their previous year’s annual worldwide turnover (20 percent for repeat offenders). Systemic violations could lead to a ban on acquiring other companies for a particular time.

“The agreement ushers in a new era of tech regulation worldwide. The Digital Markets Act puts an end to the ever-increasing dominance of Big Tech companies,” said Andreas Schwab, an Internal Market and Consumer Protection Committee of the Parliament rapporteur. “From now on, they must show that they also allow for fair competition on the internet. The new rules will help enforce that basic principle. Europe is thus ensuring more competition, more innovation and more choice for users.”

“As the European Parliament, we have made sure that the DMA will deliver tangible results immediately: consumers will get the choice to use the core services of Big Tech companies such as browsers, search engines or messaging, and all that without losing control over their data.”

New laws, new risks

Indeed, the DMA could usher in new business opportunities for small businesses and app developers, and give European users access to more apps and different pricing models. But with change comes challenges. Apple’s move to open the platform for other app stores threatens its services business and could introduce security risks.

Apple told Reuters that “allowing sideloading, bypassing its App Store, exposes users to security and privacy dangers”. On the other hand, some regulators and Apple critics say these are overblown.

Thomas Reed, Malwarebytes Director for Mac and Mobile, disagrees, and thinks Apple may take extra steps to beef up security around apps from third-party stores.

There’s a lot of potential for this to undermine Apple’s security, so I’d expect there to be a lot of effort put into securing it. It’s possible third-party app stores, and apps downloaded from them, will have to run in some kind of sandbox that limits what they’re able to do,”

Alternatively, says Reed, Apple might let users embrace a less secure environment.

It’s also possible Apple will create a less-secure mode, somewhat like Android’s developer mode, that users have to turn on explicitly. Although I don’t think this is likely and seems more out-of-character for Apple, as it would open up the device to more abuse.

He sees problems with potentially unwanted programs (PUPs) either way though.

Regardless of how they do it, I expect to see a big problem with PUPs in those third-party stores. Apple already has a problem policing its store, and they have way more resources to throw at it than any third-party would. I also see the potential for bogus third-party stores, not just app scams.

We’ll be entering a whole new world where users will be able to download from numerous untrustworthy sources. I predict security issues will abound as a result.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Is an outsourced SOC worth it? Looking at the ROI of MDR

In the turbulent world of cybersecurity, one thing is for certain: Threats are evolving in ways that make them harder for organizations to predict—and stop.

For businesses with scarce security staff resources and disconnected, complex toolsets, keeping up with today’s cyberthreats is even harder. That’s why an outsourced Security Operations Center (SOC) is a great option for resource-constrained organizations.

A SOC, or team of professionals who monitor and respond to threats for your business, is a staple of Managed Detection and Response (MDR) services. MDR is an outsourced service which provides organizations with 24×7 attack prevention, detection, and remediation, as well as targeted and risk-based threat hunting.

If you’re an organization wanting to reap the benefits of a 24/7 SOC, then MDR might just be the best bang for their buck. But hold up.

How much can you really save leveraging an outsourced SOC versus building your own in-house? How much ROI can MDR provide over the long-term? And are there any downsides to consider?

In this post, we’ll answer each of these questions and more.

In-house SOC vs outsourced SOC costs

In-house SOC costs

Spoiler alert: building an in-house SOC costs a heck of a lot more than partnering with an MDR provider. There’s quite a long (and expensive) checklist of things you’ll need to have, including:

  • Hire a minimum of five, full-time employees to provide 24/7 coverage.
  • Identify effective avenues to find, hire, and replenish high-caliber security talent.
  • Develop an employee loyalty and retention program.

If we really get down to the nitty-gritty, there’s a slew of other costs and logistical hurdles you’ll have to take on:

  • Purchase, implement, and maintain the hardware and software for your SOC.
  • Project manage the facility operations and day-to-day functions.
  • Provide ongoing security training, certifications, and red team exercises to expand staff expertise.
  • Purchase and manage third-party security intelligence feeds.
  • Engage periodic outside consultation to assess the caliber of your detection and response services and invest in appropriate items to make any recommended improvements

Some estimates place the capital costs to establish a SOC at close to $1.3 million USD—and annual recurring costs running up almost $1.5 million USD. Not exactly dirt-cheap, to say the least.

Outsourced SOC costs

Outsourced SOCs, such as those provided by MDR services, are much more cost-efficient than building out your own.

Pricing for MDR is typically calculated based on the number of assets in your environment, somewhere in the ballpark of $8-12 USD per device/log source.

Some vendors will look at additional factors for pricing, including number of ingress/egress points and the daily rate of ingestion for SIEM. Cost will also be influenced by any customer-specific pricing (including any discounts) and the breadth of services contracted (more features, for example).

Assuming the average number of endpoints (servers, employee computers, mobile devices) for a small to mid-sized company is 750, you’re looking at dishing out a cool 6K to 9K a month for MDR.

All in all, the cost of MDR comes out at around 100K annually—quite a difference from the 7 figures we talked about with in-house!

Long-term ROI of MDR

Sure, when it comes to reaping the benefits of a 24×7 SOC, MDR is cheaper than building out your own—but that’s only one part of the picture. We should also look at the ROI of MDR and break down any savings we can expect over the long-term.

The two most obvious examples of the ROI of MDR are:

  1. It removes the full-time employee staffing costs of hiring five analysts to run a 24/7 SOC, and;
  2. It alleviates the capital expenditures of purchasing a SIEM or other security tools.

But that’s not all. There’s several other aspects of cost avoidance with MDR, including:

  • Reduced risk of data breach: With a team of seasoned professionals monitoring your network 24×7, you’re less likely to get hit with a data breach. In 2022 the average cost of a data breach was $4.35 million.
  • Savings attributed to reduction in security incidents: Infected (and therefore inoperable) devices greatly impacted worker productivity. MDR can reduce worker downtime and reduce necessary IT resources for remediation.
  • Savings on cyber insurance: Cyber insurers want 24/7 detection and response in an environment. MDR satisfies this requirement for businesses, saving you potentially tens of thousands of dollars in premiums and other costs annually.

All this being said, there is one big factor to consider before jumping into MDR, and it has to do with control.

MDR providers will have access to sensitive network and endpoint data in order to monitor your infrastructure for threats. And although many MDR vendors have ways to secure/obfuscate that data, some organizations may still be wary of having their data handled by an outside organization.

When it comes to great security and high ROI, MDR is tough to beat

MDR is a cost-efficient way to reap the benefits of a 24/7 SOC for organizations who lack the budget to set one up themselves.

With MDR, organizations have access to a round-the-clock team of experts to threat hunt, stay on top of the latest adversary tools, techniques, and procedures (TTPs), and quickly remediate threats as necessary, among other things.

Get a deep dive into the Malwarebytes MDR service

Want to learn more MDR, but not sure where to start? We’ve got you covered. Here are list of resources we think you’ll find helpful:

Uber data stolen via third-party vendor

Uber is facing a new cybersecurity incident after threat actors stole some of its data from Teqtivity, a third-party vendor that provides asset management and tracking services.

“We are aware of customer data that was compromised due to unauthorized access to our systems by a malicious third party,” said Teqtivity in a statement. “The third party was able to gain access to our AWS backup server that housed Teqtivity code and data files related to Teqtivity customers.”

The investigation is ongoing, but Teqtivity would like you to know that it doesn’t collect or retain personal information, banking information or government identification numbers. As you’d expect, it says it has already notified affected clients and is taking steps to ensure a similar incident can’t happen again.

“We sincerely apologize for any inconvenience this may cause and very much regret this situation has occurred. Your confidence in our ability to safeguard your company data and your peace of mind are very important to us,” the company said.

Attack dates against Teqtivity and Uber have yet to be established; however, a threat actor named “UberLeaks” began leaking the stolen data on BreachForums, a site infamous for posting data breaches, around early Saturday morning, according to BleepingComputer.

UberLeaks claimed the data came from Uber and Uber Eats. However, the leaks are said to have included archives containing source code associated with mobile device management (MDM) platforms for Uber, Uber Eats, and Teqtivity. The leaks also had employee email addresses, corporate reports, data destruction reports, IT asset management reports, Windows domain login names and email addresses, and other corporate information.

UberLeaks created separate topics for the MDMs for the brands above, with each referencing a member of Lapsus$, the hacking group involved in the Uber breach in September

Uber told BleepingComputer that it did not believe the files were related to the September security incident. “Based on our initial review of the information available, the code is not owned by Uber; however, we are continuing to look into this matter.”

The leaked data may not contain customer information, but security researchers who analyzed it said there’s enough to create targeted phishing attacks against Uber employees who may be tricked into giving away their credentials.

Uber has had its share of data breaches and controversies. In September, a purported teen hacker breached its network, compromised an employee’s access, and gained access to its internal Slack chat app. Six years before that, the personal data of 7 million drivers were exposed, including 600,000 driver’s license numbers. In July of this year, Uber confessed to a cover-up of the 2016 data breach with the help of its former chief security officer (CSO), Joe Sullivan. Sullivan was charged with obstruction of justice.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Play ransomware attacks city of Antwerp

The city of Antwerp’s digital systems have come to a grinding halt. The Flemish government under which Antwerp resides has confirmed that this is the result of a ransomware attack.

The consequences for the city’s inhabitants are drastic, as hundreds of city employees revert to working on paper instead of on their computers. This is creating complications for everything from the obvious to the not-so-obvious. 

For example: There are problems with payments to people that depend on city benefits (which are not expected to be resolved before the end of the year); libraries and recycling centers are closed; there is no way to obtain new IDs; and students with special needs are unable to use their laptops.

The Play ransomware group is claiming credit on its dark web leak site.

Play leak site
The Play leak site claims the attack on the city of Antwerp

Play is a relatively new ransomware group and first attracted media attention a few months ago, when it attacked Argentina’s Judiciary of Córdoba. Play can be recognized by the .play extension it adds to encrypted files and a very simple ReadMe.txt ransom note which is only dropped at the root of the C: drive, that simply contains the word ‘PLAY’ and a contact email address.

According to the leak site, 557 GB of information was stolen, including personal information, passports, other IDs, and financial documents.

ITdaily claims the attackers gained initial access through Digitalis, the digital partner of the city of Antwerp. From there they were able to encrypt essential files which rendered databases and applications unreachable.

The large amount of stolen data suggests that the threat actor must have had access over a longer period of time.

The city has been given until December 19, 2022 to pay the ransom or the threat actor will start publishing the stolen data.

Government warning

In a newsletter to Belgian government employees, staff were cautioned to be alert and careful. This was prompted by recent attacks on the systems of the Zwijndrecht police by Ragnar Locker, and an attack on the municipality of Diest which has not been claimed by a specific ransomware group yet.

The Belgian government’s warning is specifically about actionable items for the staff:

  • Be alert about phishing attempts.
  • Use secure and unique passwords.
  • Identity verification during contact. Make sure the person you are communicating with is who they claim to be.
  • Use updated devices, only permitted software, and limit administrator privileges to where they are strictly necessary.

We concur. For organizations we would like to add:

  • Always use active anti-virus/anti-malware protection.
  • Limit Internet access to critical devices and systems where possible.
  • Ask the same prudence of your service providers.
  • Maintain offsite, offline backups and test that you can restore from them

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Introducing quarantine for Cloud Storage Scanning in Nebula

We’re excited to announce quarantine for Malwarebytes Cloud Storage Scanning (CSS), a new feature which allows you to automatically quarantine threats found in your cloud storage repositories.

Malwarebytes Cloud Storage Scanning is an add-on service in Nebula that scans for malware on cloud storage repositories across supported cloud storage providers, using multiple anti-malware engines to monitor and protect the health of all your enterprise data.

By toggling on Enable Quarantine toggle in the Cloud Storage Scan configuration, malicious files are automatically quarantined to the configured folder. You can manage these detections from the Storage Quarantine page. For more information, see Manage Cloud Storage Scanning quarantine in Nebula.

Let’s dive to learn more about how quarantine for Cloud Storage Scanning works.

Configuring quarantine in a new Cloud Storage Scan

In Nebula, go to “Settings” and click “Cloud Storage Scans”. Here you can see existing scans and the providers being checked. Click “Add a Scan” to create a new scan. For our full article on how to configure Cloud Storage Scans in Nebula, check our previous blog post.

easset upload file18403 252202 e

In the Quarantine tab, toggle Enable Quarantine on to automatically move detected malware to a selected user’s storage.

easset upload file4328 252202 e

Select a user to transfer all quarantined files to. A quarantine folder will be created in their cloud storage location.

easset upload file45576 252202 e

Quarantined files will no longer be accessible to original owners, collaborators, or others with access.

Select the default tombstone message or customize it. A tombstone file is created and replaces the original file when it is quarantined. The tombstone file is designed to provide information or instructions for users.

easset upload file13797 252202 e

Manage Cloud Storage Scanning quarantine in Nebula

The Cloud Storage Quarantine page displays quarantined files from your cloud storage providers and allows you to manage them. Review the files detected by Cloud Storage Scans and moved to quarantine here.easset upload file57778 252202 e

easset upload file20266 252202 e
If the file is a false positive, select it and go to Actions > Restore. This will place the file back in its original location.

easset upload file38858 252202 e

easset upload file39789 252202 e

To delete the file from quarantine, go to Actions > Delete. The file is sent to the administrator’s trash in the cloud storage provider.

easset upload file74912 252202 e

easset upload file20087 252202 e

Reduce risk from cloud-based malware, without slowing down your business.

Malwarebytes Cloud Storage Scanning (CSS) service enables Malwarebytes IR/EP/EDR customers to use our cloud-native Nebula console to detect (and now quarantine) threats across multi-vendor cloud storage repositories, such as Box and OneDrive.

With Malwarebytes CSS, customers gain centralized visibility across cloud storage repositories and the ability to generate reports to confirm the security of their cloud-stored data.

Learn more about CSS: https://www.malwarebytes.com/business/cloud-storage-scanning

Further resources

5 SaaS security best practices

Cloud data breaches: 4 biggest threats to cloud storage security

Benefits of a malware scanner for cloud storage

Cloud-based malware is on the rise. How can you secure your business?

Update now! Two zero-days fixed in 2022’s last patch Tuesday

In numbers, the patch Tuesday of December 2022 is a relatively light one for Windows users. Microsoft patched 48 vulnerabilities with only six considered critical. But numbers are only half the story. Two of the updates are zero-days with one of them known to be actively exploited.

Windows SmartScreen

Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services).

The vulnerability that is exploited in the wild is listed under CVE-2022-44698 and described as a Windows SmartScreen Security Feature bypass vulnerability. To understand how this works, you need to understand that files can be cryptographically signed in order to confirm who created them, and to confirm that they have not been changed since they were signed. Mark-of-the-Web (MOTW) is the name for the Windows technology that warns users of potential harm when downloading and opening a file from the internet or an email attachment. In other words, it’s a safety precaution in the form of a reminder that the user is about to use a risky file that might harm their computer. The problem is that a malformed signature bypasses all the warnings you should get, so you are bound to assume everything is dandy while it’s not.

DirectX Graphics Kernel

The other zero-day is labeled as “Exploitation Less Likely” but information about the vulnerability has been made public. The vulnerability is listed as CVE-2022-44710 and described as a DirectX Graphics Kernel Elevation of Privilege (EoP) vulnerability. To successfully exploit it the attacker would need to win a race condition. But if they succeed they could gain SYSTEM privileges.

A race condition, or race hazard, is the behavior of a system where the output depends on the sequence or timing of other uncontrollable events. It becomes a bug when events do not happen in the order the programmer intended. Sometimes these bugs can be exploited when the outcome is predictable and works to the attackers’ advantage.

Windows Secure Socket Tunneling Protocol

Two critical vulnerabilities we want to highlight were found in the Windows Secure Socket Tunneling Protocol (SSTP). CVE-2022-44670 and CVE-2022-44676 are remote code execution (RCE) vulnerabilities. Successful exploitation of these vulnerabilities requires an attacker to win a race condition but when successful could enable an attacker to remotely execute code on a remote access server (RAS).

A RAS is a type of server that provides a suite of services to remotely connected users over a network or the Internet. It operates as a remote gateway or central server that connects remote users with an organization’s internal local area network (LAN).

PowerShell

One more vulnerability we want to highlight because exploitation is more likely is listed as CVE-2022-41076 and described as a PowerShell RCE vulnerability. Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment and to be authenticated. If these conditions are met, the attacker could escape the PowerShell Remoting Session Configuration and run unapproved commands on the target system. This seems a very likely candidate to be chained or exploited in combination with leaked or stolen login credentials.

Other vendors

As per usual, other vendors also released important updates:

Adobe released updates for Adobe Campaign Classic, Adobe Experience Manager, and Adobe Illustrator.

Apple released several updates. More on that later.

Cisco released updates for Cisco IP Phone 7800 and 8800 phones.

Citrix released updates for Citrix ADC and Citrix Gateway.

Fortinet released an update to patch for an actively exploited FortiOS SSL-VPN vulnerability.

Google released an Android security bulletin we discussed last week.

Mozilla released updates for for Thunderbird 102.6Firefox ESR 102.6, and Firefox 108.

SAP has released its round of December 2022 updates.

VMWare has released security updates for multiple products. Users should review the VMware Security Advisories VMSA-2022-0031VMSA-2022-0033, and apply the necessary updates.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Silence is golden partner for Truebot and Clop ransomware

A recent rise in the number of Truebot infections has been attributed to a threat actor known as the Silence Group. The Silence Group is an initial access broker (IAB) that frequently changes tools and tactics to stay on top of the game. An IAB’s primary task is to find a weakness or vulnerability, create a foothold in a network, and do some exploratory work to find out how attractive the target is. Once this is done they can sell the access to another threat actor, like a ransomware group. For these tasks Truebot is the tool of choice in the Silence Group.

The Silence Group seems to have a strong relation with the group behind Clop ransomware, often referenced as TA505. Which, in turn, has a large overlap with the FIN11 group.

Truebot

The researchers identified two separate Truebot botnets. One of which appears to be focused on the US, while the other is predominantly focused at Mexico, Pakistan, and Brazil.

We touched on the second one when we wrote about the recent activities of the Raspberry Robin worm. The use of this worm, in combination with an attack vector leveraging a Netwrix vulnerability, seems the have laid the ground work for the creation of a botnet of over 1,000 systems that is distributed worldwide.

The other botnet is almost exclusively composed of Windows servers, directly connected to the internet, and exposes several Windows services such as SMB, RDP, and WinRM. The attack vector that was used to establish this botnet has not yet been identified, although the researchers are confident that it is different from those used for the other botnet, Raspberry Robin and the Netwrix vulnerability (CVE-2022-31199).

New version

At its core, Truebot is a Trojan.Downloader. As such, it is an ideal malware for IAB groups that want to plant a backdoor on a system and do some basic reconnaissance of the network. For those purposes, this new version of Truebot collects this information: a screenshot, the computer name, the local network name, and active directory trust relations. Active Directory trust relations allow organizations to share users and resources across domains.

What’s also new is that this version is now capable of loading and executing additional modules and shellcodes in memory, making the payloads fileless malware which is less likely to be detected.

Exfiltration

Besides the usual suspects designed to act as a backdoor, Cobalt Strike and Grace, the researchers also found a new data exfiltration tool. Finding Grace as a payload seems to confirm the close ties between the Silence Group and TA505 since Grace was almost exclusively used by TA505.

The exfiltration tool, dubbed Teleport, was used extensively by the attackers to steal information from the network. It seems to be a custom data exfiltration tool built in C++ , containing several features that make the process of data exfiltration easier and stealthier. It has some features that are not commonly found in remote copying tools but which make it very useful to an attacker stealthily exfiltrating data.

  • It limits the upload speed, which can make the transmission go undetected by tools that monitor for large data exfiltration and avoids slowing down the network.
  • The communication is encrypted to hide what information is being transmitted.
  • Limiting the file size, which can maximize the number of stolen files by avoiding lengthy copies of files that may not be interesting.
  • The ability to delete itself after use, which is ideal to keep it as unknown as possible.

Clop

Ransom.Clop was first seen in February of 2019. Besides encrypting systems, the Clop ransomware also exfiltrates data that will be published on a leak site if the victim refuses to pay the ransom. In February of 2021, the group made headlines by targeting executives’ systems specifically to find sensitive data.

Mitigation

The tools that are used by Silence are versatile, but there are a few logical steps you can take to protect yourself and your organization:

  • Do not insert USB drives of unknown or unreliable origin into your systems. 
  • In Windows, the autorun of USB drives is disabled by default. However, many organizations have widely enabled it through legacy Group Policy changes. If you enabled it, this is a policy worth re-thinking.
  • Install patches as soon as possible, especially for internet facing devices.
  • Run an anti-virus/anti-malware solution that actively monitors and scans your systems.

Malwarebytes blocks the download URLs and detects Truebot as Malware.AI.{id.nr.}. Clop ransomware is detected as Malware.Ransom.Agent.Generic.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Electronic Sales Suppression Tools are cooking the books

When you see point of sale software in the news, it’s usually because the terminal has been compromised and is now stealing payment details used in the device. Insecure stores, whether compromised as part of an inside job or a phishing attack, are a big problem for both buyers and the store itself when the attack comes to light.

This time around, it’s a little bit different. The point of sale software here allegedly emerged during the pandemic and is designed to be an “Electronic Sales Suppression Tool”. It doesn’t steal payment details from shoppers. Rather, it enables the shop owner to potentially get up to a bit of tax dodging. The continued growth of these tools has resulted in the arrest of five individuals which tax authorities allege to be involved in the design and sale of said software.

Taxing times for scammers

The raids in Australia were spearheaded by the Australian Tax Office, alongside simultaneous raids undertaken in the US and UK. So-called Electronic Sales Suppression Tools (ESST) were outlawed in Australia back in 2018. From ATO Deputy Commissioner John Ford:

These dodgy sales suppression tools allow retailers to keep a separate set of books and launder the money in one transaction. They conceal and transfer this income anonymously, sometimes offshore.

How do these tools work?

ESSTs are designed to manipulate sales data in a way which allows the business to reduce the value of transactions. When this happens over a period of time and not all sales are being recorded properly, the business is making money but it is also shirking responsibility for paying its tax correctly.

This became a particular problem during the COVID-19 outbreak, where businesses in the UK were found to be committing specific kinds of pandemic fraud. The UK ran a Coronavirus Job Retention Scheme (CJRS), where employers could receive financial assistance in situations where employees were unable to work or the business had to reduce its capacity.

By using ESSTs, you could potentially show that your sales were down (when they’d actually been tampered with) and then claim against the CJRS scheme.

Targeting the suppliers

By and large, tax agencies and governments are focusing on the sellers, the coders, and the distributors of the tools. Having said that, businesses currently using ESST are being urged to notify the tax office before the tax office catches them in the act where penalties are likely to be more severe. From the ATO statement:

The ATO strongly encouraged businesses using ESST to come forward voluntarily rather than hope they won’t be discovered by ATO investigators.

Businesses that come forward voluntarily may be provided with an opportunity to receive a reduction in penalties. Information about how to do this is on the ATO website.

Businesses that have used ESS tools or software will need to review their past tax returns and activity statements to amend or correct them. They may also wish to discuss next steps with their registered tax professional.

According to The Register, 35 locations have been raided by Australian authorities in connection with ESST activities. Meanwhile Dutch tax agencies are branching out into exploring cryptocurrency and virtual assets. The slow shift away from cash to digital payments and processing in the post-pandemic world has encouraged a new arena of tax evasion and money laundering for both tax authority and scammer. It’ll be interesting to see who gains the upper hand. For now, the advantage seems to be with the tax agencies slowly closing the net on anyone looking to turn a dubious profit.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Man watches as stolen phone travels from UK to China

Have you ever wondered what happens to your phone if it’s stolen while on vacation or a business trip? The answer may surprise you, as it did one Mastodon user who graciously shared a tale of a smartphone gaining some serious air miles. Our intrepid business traveller was in London when their phone was snatched from their hand in the street.

Thankfully, they’d taken the precaution of setting up Apple’s Find My service prior to making their trip.

In practical terms, this meant that the phone could be remotely wiped (via Find My) and essentially turned into a paperweight. This has a two fold advantage: Keeping valuable data out of the thief’s hands, and also making the phone considerably less useful to a criminal.

You might think a theft such as this stays local, and that’s what it looked like for a while with the phone coming to a halt a few miles away. I would have assumed the phone would be sold locally or scrapped, but in this story our thief had other ideas in mind. What followed was an attempt to revive the phone via phishing, and a very long flight.

When a theft gets phishy

The thief was not just interested in grabbing the device and selling it on in its bricked form. They wanted to reactivate the device too. This was attempted via a text message sent to the phone owner’s emergency contacts. The text reads as follows:

Your iPhone 13 Pro 256GB Sierra Blue has been found. View location: [URL]

Apple Support

The site, which spoofed the Find My website, was phishing for an Apple ID login to kickstart the reviving process. I’m sure the thief wouldn’t have objected to whatever data was locked behind that Apple ID too, but we can presume that getting the phone up and running is the primary concern.

Roughly a month after the phone was stolen, the activation lock for the device started pinging home. This is the feature which prevents random people from unlocking a lost or stolen device.

The victim of this crime was surprised to learn that the stolen device had travelled from the UK to Shenzen in China. You may wonder if the Find My service was perhaps malfunctioning and the stolen device was still in London somewhere, but as we’re about to see, this is far from the only example of this happening.

Why do stolen phones end up in China?

Stolen phones ending up in China is, perhaps surprisingly, not uncommon. In fact, searching for this kind of thing brings up a wealth of results (try it!) and they all tend to look something like this:

Phones make their way via “networks of black marketers” to their new owners in cities where phones, and modifications, are extremely cheap. In many cases, the final destination for the stolen iPhone is someone who has no idea a theft took place. Occasionally there’s a heartwarming story and meet up, but mostly it’s just a case of “My phone is gone and now I need to do something about it”.

What to do if your iPhone is stolen

There are some great tips gleaned from personal experience via the above tale, most importantly making sure you turn on Find My. This is the way you’ll be able to remotely scrub that device and make it unusable for the thief. The other great tip is to make sure you have a secondary (and fast!) way to access Find My. If you don’t have an additional device with you, then you may struggle to find a way to get online and remedy the situation. Every second counts. It’s worth noting that you can still take steps to protect your data even if you don’t enable Find My.

Apple provides several tips for what you should do in the event of a theft. Here’s some of the more pressing technical related suggestions:

  1. Lock your phone down. Use the previously mentioned Find My service. Do this in advance of any theft! In your Settings app, tap your name, and then select Find My.

     2. Mark your phone as lost. Doing this via the Find My app disables the Apple Pay service, and locks the device with a passcode like so:

  • Open the Find My app and choose the Devices tab or the Items tab.
  • Select your missing device or item.
  • Scroll down to Mark As Lost or Lost Mode and select Activate or Enable.
  • Follow the onscreen steps if you want your contact information to be displayed on your missing device or item, or if you want to enter a custom message asking the finder of your missing device to contact you.
  • Select Activate.

Erase the device remotely. To do this:

  • Open the Find My app and choose the Devices tab.
  • Select the device you want to erase remotely.
  • Scroll down and choose Erase This Device.
  • Select Erase This [device].

What to do if your Android is stolen

This can be a bit trickier, as there are so many different models out there and often network carriers nudge you towards using their own bespoke tracking solutions. Despite this, the basic Android options should always be available. To enable Android’s find my device service:

  • Open Settings
  • Tap Security > Find My Device.
  • If you can’t see the Security option, tap Security > location or Google > Security.
  • Ensure Find My Device is enabled.
  • Test the service out on the Find my Device site.
  • From the map, you can select the “Lock and Erase” option. Note that it may not erase the contents of an SD card.

Losing your phone, laptop, or other device to a thief is never a pleasant experience but you’re never totally out of options. The trick is to ensure you put some time into setting these solutions in place long before the possibility of a theft happens. Stay safe out there!


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.