IT NEWS

How to remove adware on an Android phone

It shouldn’t be surprising that Android devices are the targets of threats like adware and other Potentially Unwanted Programs (PUPs). After all, there are millions of apps on the Google Play Store, servicing billions of monthly active users globally. And, as we have noted with Mac virus trends, platforms with rising popularity tend to attract threats.

What is adware?

Adware is a type of bothersome malware that sits quietly on your device, generating revenue for its authors through unwanted marketing campaigns. Usually, adware hits your screen with advertisements, but some adware can be sneakier.

What can adware do to Android phones?

While adware isn’t as threatening as more dangerous malware like spyware, stalkerware, or ransomware, it can be unpleasant. Most commonly, adware throws up advertisements on your screen in the shape of irritating popups. It may also hijack your browser, redirect you to different web pages, install toolbars, extensions, or plugins, and track your activity for marketers. Here are some other potential signs of an adware infection on your Android phone:

  • Your phone slows down or crashes inexplicably
  • Your browser slows down or crashes inexplicably
  • Downloading, uploading, and browsing takes longer than usual
  • You need to recharge your device more often
  • Apps take longer to load or run sluggishly
  • Your data usage is higher than usual
  • New software is on your phone that you didn’t download or install

Of course, many of these symptoms are also signs of an aging Android device, or could be a sign of a different type of malware infection than adware. A few of these symptoms, combined with core signs of adware like popups or browser redirection, are a red flag. Check out the next section to see how to get rid of adware on Android devices.

How to remove adware and malware on an Android phone

Removing any malware from your phone requires a holistic approach. For example, even if you remove an infection with mobile device security tools, you may attract new threats if some problematic apps remain. Here are some steps that can help you remove adware from Android devices, and protect your device from future infections:

1. Use adware removal tools

The most obvious first step is to use a cybersecurity tool, such as Malwarebytes for Android, that protects against adware on Android devices. When selecting an adware removal app, ensure that it has the following traits:

  • It scans and removes adware quickly.
  • It’s light, doesn’t hog your system resources, and runs seamlessly in the background.
  • It alerts you about suspicious apps.
  • It keeps an eye on URLs and warns you against unsafe websites.
  • It doesn’t create false positives to appear more valuable.

Of course, adware is just one type of malware that can infect an Android device. An exhaustive cybersecurity app will find all kinds of malware, including viruses, spyware, stalkerware, Trojans, ransomware, rootkits, and adware. So dig into the details of the app you are considering to make sure you’re protected against all of these.

It’s also a good idea to check your cybersecurity app’s reputation before you download it. For example, some cybersecurity tools were criticized for harvesting user data to supply it to marketers. There’s little point in downloading software to remove adware if it also takes a page out of the adware playbook.

2. Remove dubious apps

You can check out what suspicious apps you already have lurking on your phone by doing the following:

  1. Hold down the power button on the side of your phone.
  2. Tap and hold the Power Off icon on your screen.
  3. Tap Safe mode to restart your device in Safe mode.
  4. Tap Settings.
  5. Tap Apps.
  6. Select Suspicious apps.
  7. Hit Uninstall.
  8. Restart your phone.

3. Clean your browser

Your browser may carry data or plugins that leave your Android device susceptible to adware. Remove all unnecessary extensions, clear your browsing history, and delete stored data. You can also uninstall your browser entirely and reinstall it to start afresh.

Where do Android adware and malware come from?

Hundreds of thousands of instances of new malware are detected every day, according to some experts. The authors of malicious software include online trolls, hackers, blackmailers, thieves, and other cybercriminals. Threat actors often hide adware and other malware in shady links, untrustworthy websites, and even on apps in the official Google Play Store.

Tips to safeguard Android devices from adware

  • Make sure you have security software installed.
  • Keep your operating system, security tools, and apps updated.
  • Only download apps from trustworthy sources.
  • Even when downloading apps from Google Play Store, check reviews.
  • Avoid apps that are new or ask for unnecessary permissions.
  • Don’t visit untrustworthy websites.
  • Avoid opening suspicious links, emails, and text messages.

The post How to remove adware on an Android phone appeared first on Malwarebytes Labs.

Smart TV adverts put a wrinkle in your programming

Smart TVs are back in the news due to the potential pitfalls of embedded advertising. It may come as a surprise to some, but these devices aren’t particularly new. As far back as 2013, security researchers were already exploring the issues related to internet connected televisions in a home environment.

In 2016, we looked at an LG brand TV which sent a variety of information related to files and viewing habits despite telling it not to. Even then, we can see similar tactics used to block ads on home video game consoles, and desktop PCs. It’s all about blocklists, and domains shut down at the router.

A privacy versus convenience mashup

Yes, it’s cool that you can control your TV with your voice and use hand gestures to change the channel. However, advertising built into the fabric of a TV is something people don’t pay much attention to. You can try and block these ads in increasingly sophisticated ways. Realistically though, most folks aren’t rushing to spin up a Pi-hole. And hey, why should they? This is the kind of problem solved by a “No, I don’t want that but thanks anyway” button.

Unfortunately, those buttons appear to be in short supply.

Today, in ad land…

The owner of a new Samsung TV noticed a huge chunk of ad space on one of the menu screens.

To be clear, the ad banner in the picture isn’t serving up brands of washing up liquid or footwear. It’s a feature which essentially lists things to watch on the device. Caveat: some of those options are paid, and there are several more general ad-specific domains requiring a block to be ad free.

It’s adverts all the way down

Smart TVs generally have multiple layers of advert options, banners, and dashboards. They may offer downloadable apps for popular streaming services or other products used to watch, or buy products unrelated to television. Whatever you do, some form of analytics/tracking is inevitable. It’s not all bad news…sort of. Certain brands will allow you to switch off many of these features. Have you ever set your Android to low power mode and watched as all the apps disabled themselves? Televisions can do the same thing.

Again, this isn’t perfect. Assuming you want to use the apps displayed, there’s going to be an element of analytics under the hood even if just specific to the app and not the television as a whole. For example: does this reference content inside the apps which are still functional, or somewhere on the dashboard unrelated to the apps?

Even the device owner doesn’t know, because they don’t currently see any ads. Is it regional specific? Or have they yet to hit the random button or screen which finally pops an advert?

All good questions, and ones which most of us don’t have answers for.

Tech downgrades as a solution

Some folks don’t want to mess around at a network level. They’re turning to other methods instead to bypass ads altogether. This is certainly one (expensive) way to do it:

Others choose to buy up so-called “hotel” televisions, which may have all internet capability stripped out of them. Even with these measures taken, there’s no real guarantee you can avoid ads and tracking. You may have an ad-free television, as far as built in popups go. But what if it’s plugged into a cable TV box from a provider who also provides your broadband? Your ISP knows what you’re doing online and also potentially what you’re watching, at a bare minimum.

You can read more about this latest round of TV advertising here. One thing is for certain: ads in the home aren’t going to go away anytime soon. People who disagree with this type of televisual promotion may wish to object via tech solutions, or downgrades, or simply buying something else instead.

Perhaps the advert revolution will not be televised.

The post Smart TV adverts put a wrinkle in your programming appeared first on Malwarebytes Labs.

A week in security (Nov 1 – Nov 7)

Last week on Malwarebytes Labs

Other cybersecurity news

Stay safe, everyone!

The post A week in security (Nov 1 – Nov 7) appeared first on Malwarebytes Labs.

Why we fail at getting the cybersecurity basics right, with Jess Dodson: Lock and Code S02E21

The cybersecurity basics should be just that—basic. Easy to do, agreed-upon, and adopted at a near 100 percent rate by companies and organizations everywhere, right?

You’d hope. But the reality is that basic cybersecurity blunders continue to affect businesses of all sizes, which has led to embarrassing vulnerabilities, hacks, and attacks. And some of those very mishaps have been the focus of the Lock and Code podcast for months.

In August, Luta Security CEO Katie Moussouris told us about simple security oversights at the company that develops the popular “social listening” app Clubhouse. After poking around with the app on two separate devices, Moussouris discovered that she could easily eavesdrop on conversations without having her user icon present in a room. That same month, hacker Sick Codes told us about how he and roughly 10 other hackers gained extensive reach in just a few days into John Deere’s data operations center, revealing data about farms, farm equipment, and the equipment’s owners. And in July, the chair of the Dutch Institute for Vulnerability Disclosure Victor Gevers told us that he and his organization had found “seven or eight” zero-days in the popular managed service provider tool Kaseya VSA. What’s worse is that Gevers said that he and his volunteers had been finding similar vulnerabilities in many remote networking tools for months.

About these flaws, Gevers said: “I am sorry, but these vulnerabilities—these are not advanced. Not advanced at all.”

The big problem about these vulnerabilities is that, because they are so basic, they are so easy to abuse.

The zero-days that Gevers and his team found in Kaseya VSA led to one of the most catastrophic ransomware attacks in recent history. A failure to differentiate user passwords on a remote access tool used by a Florida water plant likely led to the attack on that plant’s chemical treatment facilities, and though the attack was caught and prevented, it was still a bit worrisome. And when the meat supplier JBS was hit with ransomware, even though it reportedly had backups in place—which are the single most effective defense against ransomware—the company still chose to pay $11 million to its attackers for a decryption key.

Many of these problems could have been prevented—or at least better mitigated—if the organizations in question had a better grasp on the cybersecurity basics. As our guest on today’s episode of Lock and Code explains, there are huge risks in failing to get these basics right. Jess Dodson, who described herself as a “recovering Windows systems administrator” (ha), said:

If you are not doing these things, I would say that there is a high chance that you already have a threat actor in your environment. That is the risk.

Today, on the Lock and Code podcast with host David Ruiz, we speak with Dodson about what are the most commonly-missed cybersecurity basics, which are the most foolish ones to get wrong, and why do we keep failing at what we can all agree is, after all, pretty basic stuff.

Tune in to hear all this and more on this week’s Lock and Code podcast, by Malwarebytes labs.

This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select “Click Here” to open the Privacy Preference Center and select “Functional Cookies” in the menu. You can switch the tab back to “Active” or disable by moving the tab to “Inactive.” Click “Save Settings.”

You can also find us on Apple PodcastsSpotify, and Google Podcasts, plus whatever preferred podcast platform you use.

The post Why we fail at getting the cybersecurity basics right, with Jess Dodson: Lock and Code S02E21 appeared first on Malwarebytes Labs.

Multiple video games break after domain name snafu

We’ve seen quite a few complaints from gamers this past weekend, unable to load up and play games on the Steam platform. The problem wasn’t hackers, or DDoS attacks, or anything else. Rather, the issue is something bundled with the game by default designed to keep titles “secure” from tampering. When something simple is overlooked, the fallout can be significant and that’s what we’re going to dig into.

What is Digital Rights Management?

This is something generally designed to protect copyrighted works or certain types of hardware. You’ve almost certainly encountered it going about your daily business. If you bought MP3 files from a music store but were unable to copy the files to different drives, or they only used the store’s own music player? That’s DRM. If you tried to copy a DVD and were prevented? That too is DRM.

If you tried to pirate a video game and all your attempts were thwarted? That is most definitely DRM. There’s been lots of somewhat peculiar DRM tactics in gaming land down the years. Who could forget Monkey Island’s Dial-A-Pirate? With always-on internet, things aren’t quite so peculiar anymore. Everything is typically done with software and digital/hardware identity verification.

The many forms of DRM

There are many different types of DRM for video games. Some of them are called plain old DRM. Others may be anti-tamper, or anti-cheat. Some might be a combination of all three.

One company, Denuvo, doesn’t want to be seen as DRM, and emphasizes the anti-tamper approach. Eventually, everything gets cracked. It’s one of those inevitable happenings. At that point, the DRM/anti-tamper/anti-cheat people go back to the drawing board. They then come back with something designed to last a little longer. And on it goes.

Still, whether you call it DRM, or anti-tamper, or anything else: if something goes wrong, the game(s) may not work for a while. Sometimes there are hotly contested claims about game performance, or degradation of certain types of hard drive. No matter your own opinion on these issues, if the game has something bundled in as DRM/anti-tamper, you’re stuck with it. Unless the developer relents and you don’t intend to sail the piracy high-seas, it’s a case of learning to live with the additions.

What happens when the additions fall over?

DRM additions to games have been in the news recently. Roughly 50 games broke on the new Alder Lake CPUs due to Denuvo tech not being compatible. The software saw two types of cores running and assumed they were from different PCs instead of the same processor. At this point the game would exit or crash out because the protection software thought someone was trying to run the game on two PCs sharing the same game key.

This is most definitely not optimal, and can only be addressed by workarounds and/or official patches, all of which takes time. However, things can definitely get worse.

When things get worse

There were multiple reports of games suddenly breaking, or not being bootable on Sunday. The key factor between all the titles affected was that they used some form of Denuvo. For example, Back 4 Blood uses the anti-tamper system. So what happened to these games?

Expiration notice

Well, it definitely wasn’t hackers or some form of shenanigans.

DRM or anti-tamper systems will usually validate the install of a game on a PC the first time it runs. It may also do something similar anytime the game or the operating system updates, or you install the game onto another PC. Some games will only allow you to install on a handful of systems simultaneously. They may go down a different route and grant you a certain number of installs. Once you use them all up, you might have to contact the game developer for a new batch of installs, or re authenticate your account.

Why did so many games apparently break at the weekend? Fingers are pointing at a domain registration snafu. It seems as though a URL used for some form of authentication wasn’t renewed. It likely entered a form of grace period and then once it passed, everything stopped functioning as expected.

While this state of affairs existed, many games simply wouldn’t work anymore. It didn’t matter if the games in question were single or multiplayer titles. The domain in question has now been updated and games are working again, so that’s good news. Those of a nervous disposition may wish to pretend the new expiration date has been set years in advance, instead of 2022.

What could possibly go wrong…

The post Multiple video games break after domain name snafu appeared first on Malwarebytes Labs.

Wanted! US offers $10m bounty for ransomware kingpins

The US State Department is offering a massive $10 million reward if you can help bring DarkSide to justice.

The U.S. Department of State announces a reward offer of up to $10,000,000 for information leading to the identification or location of any individual(s) who hold(s) a key leadership position in the DarkSide ransomware variant transnational organized crime group.

And they aren’t just after the ransomware group members.

The State Department is also offering a reward of up to US $5 million for information leading to the arrest and/or conviction in any country of any individual conspiring to participate in or attempting to participate in a DarkSide variant ransomware incident. An incentive that seems to be aimed at capturing the affiliates that penetrate victims’ networks with the goal of deploying the ransomware later on.

The Department of State manages two US government programs that offer rewards of up to $25 million for information leading to the arrest and/or conviction of members of significant transnational criminal organizations and the disruption of other forms of transnational organized crime. 

DarkSide

DarkSide is thought to have originated in the Russian Federation and/or Ukraine, and was first observed in the wild in August 2020 and is thought to be a product of the FIN7 group.

DarkSide has targeted many organizations in almost every vertical in the Middle East, Europe, and the United States, but it is most notorious for its role in the attack on the Colonial Pipeline. The attack in May 2021 triggered a shutdown of the largest fuel pipeline on US east coast, which sparked a new urgency in the US government’s determination to tackle ransomware.

DarkSide ransomware was sold using the Ransomware-as-a-Service (RaaS) distribution model, so attacks were carried out by affiliates. Like many other modern ransomware families, DarkSide was mostly manually-operated. This means that the ransomware was executed by an actual person behind the screen, after they had successfully infiltrated a target network. Such attacks focus on extracting enormous ransoms from a relatively small number of victims, rather on extracting small ransoms from large numbers of victims, as was more common in the past.

Threat actors can spend weeks or even months inside victims’ networks before running the ransomware; moving laterally, scouring the entire network, elevating their privileges, deleting backups, and leaving backdoors in vulnerable systems. When an attacker has administrator credentials, and access to business-critical systems, they deploy DarkSide.

The DarkSide ransomware group called it quits after some of its servers and Bitcoin accounts were seized, and its DarkSide Leaks blog was shut down. This was believed to be the work of either the US government, local law enforcement, or other gangs looking to profit from DarkSide’s downfall.

Soon after, a new ransomware group who called themselves BlackMatter surfaced on the dark web, which was generally seen as the latest flavor in a long lineage of RaaS providers. Recently, the BlackMatter ransomware gang announced they are going to shut down their operation, citing pressure from local authorities.

Motives for the reward

One question that immediately popped into my head, is why they would offer such a reward for members of an organization that, officially, no longer exists?

Officially, the press statement tells us that in offering this reward, the United States demonstrates its commitment to protecting ransomware victims around the world from exploitation by cybercriminals. On top of that, it mentions the Colonial Pipeline incident as a prime example for how disruptive these ransomware attacks are.

But, given the timing and the unlikelihood of ever apprehending one of the key players, it stands to reason to speculate about possible other motives. One way to disrupt the ransomware industry might be to feed the growing distrust between groups and their affiliates.

With the recent announcement that BlackMatter is about to shut down its operation, and many security professionals expecting it to re-surface under yet another new name, you can imagine that having a price of $10 million dollars on your head might slow you down a bit. Not just because it becomes harder to trust new partners, but also because it might scare potential new partners away.

By creating unrest and spreading disinformation among ransomware groups and their affiliates, the US government can hope to slow down operations. And by going after the key players of the group and their affiliates, they may instigate some caution in the operators at the moment when they pick a target.

The size of the reward is perhaps a counterweight to the enormous ransoms feeding the ransomware epidemic. The ransomware model is so profitable that smaller rewards may not be enough to attract an insider willing to snitch.

Should you manage to cash in that reward, don’t forget where you read about it first.

Stay safe, everyone!

The post Wanted! US offers $10m bounty for ransomware kingpins appeared first on Malwarebytes Labs.

CISA sets two week window for patching serious vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued binding directive 22-01 titled Reducing the Significant Risk of Known Exploited Vulnerabilities. This directive applies to all software and hardware found on federal information systems managed on agency premises or hosted by third-parties on an agency’s behalf.

One of the most welcomed of the required actions set forth in the directive is that CISA will keep a catalog of vulnerabilities alongside timeframes in which they must be remediated. According to the plan, this catalog will list only the most important vulnerabilities that have proven to pose the biggest risks.

The scope

In the US, a binding operational directive is an instruction that federal, executive branch, departments and agencies have to follow. They also provide a strong indication of the kind of cybersecurity measures that CISA thinks are important, which other organizations may wish to follow. (It’s also easy to imagine that what’s required of federal agencies today may be required of the vast web of suppliers to federal agencies tomorrow.)

To that end, CISA strongly recommends that private businesses and state, local, tribal, and territorial (SLTT) governments review and monitor its catalog. CISA has done the hard work of identifying what should be patched first, and anyone who follows its guidance is likely to find their security and resilience posture improved.

The reason

It will come as no surprise that the continued cyberattacks against US entities are the reason for this directive: “The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.”

Many of the attacks against US organizations rely on vulnerabilities that could have been patched months or even years ago, but haven’t been. For example, earlier this year CISA issued a joint advisory with the FBI and NSA urging US organizations to patch five old vulnerabilities from 2018 and 2019 that were regularly exploited by the Russian Foreign Intelligence Service.

The idea is that better patch management, supported by the prioritization provided by the CISA catalog, can prevent future attacks.

The rules

The required actions are pretty simple and straightforward—to read at least. Execution of the rules may prove to be more difficult. The rules are:

  • Plan. Organizations have 60 days to come up with a vulnerability management plan.
  • Execute. CISA is giving notice that the clock is running on vulnerabilities it cares about. The affected departments and agencies have six months to fix anything with a CVE issued before 2021, and two weeks to fix everything else.
  • Report. Organizations have to report on the status of vulnerabilities through the Continuous Diagnostics and Mitigation (CDM) Federal Dashboard.

While 6 months may seem a long time for the CVE’s prior to 2021, that doesn’t mean they are less important than this year’s vulnerabilities. The grace period may reflect the difficulty that organizations have already had in fixing older bugs, or the fact that “everything prior to 2021” is just a much longer period of time than the ten months of 2021. After six months is up and all those vulnerabilities are fixed, presumably everyone will be on a much shorter lease, with just two weeks to fix anything CISA deems serious enough to put on its list.

In some cases the catalog already lists a vulnerability with a due date in the past, such as CVE-2019-11510. In August, 2019, scans performed by Bad Packets found a total of 14,528 Pulse Secure VPN endpoints vulnerable to CVE-2019-11510, four months after a patch became avaiable. Over 5,000 of those were in the US, including military, federal, state, and local government agencies—and this was after advisories have been issued by the NSA and the NCSC.

The notes column for this CVE references CISA’s ED 21-03 for further guidance and requirements. In that Emergency Directive you will find the due date of April 23rd of 2021. So, it was already required to be patched for organizations that are bound to follow emergency directives.

Patch management

Because patch management has proven to be a challenge, having a catalog to fall back on when you are looking for prioritization rules can be very helpful. On the other hand, by telling organizations what needs to be done, inadvertently they may skip necessary patches, simply because they were not listed. Or worse, they were listed but the people responsible for patching didn’t find them.

Either way, if this is a first step in setting up a compliance program, where all the vulnerabilities that are used in the wild get patched within two weeks we will certainly welcome it. We have seen the impact of, for example, the disclosure rules set forth by Google’s Project Zero on the generally accepted rules for responsible disclosure, and would love to see this directive have a similar effect on the average patching speed.

Stay safe, everyone!

The post CISA sets two week window for patching serious vulnerabilities appeared first on Malwarebytes Labs.

Update now! Mozilla fixes security vulnerabilities in Firefox 94

In a security advisory, Mozilla’s announced that several security issues in its Firefox browser have been fixed. Several of these vulnerabilities were listed as having a high impact.

Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). We’ll discuss some of the CVEs fixed in this update below.

XSLT in an iFrame

Listed as CVE-2021-38503, it fixes an issue where the iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. Attackers could handle manipulated XSLT stylesheets and be able to execute scripts or break out onto the main frame.

XSLT (Extensible Stylesheet Language Transformations) is a language for transforming XML documents into other XML documents, or other formats such as HTML for web pages, plain text or XSL Formatting Objects, which may subsequently be converted to other formats, such as PDF, PostScript and PNG.

Use-after-free in file picker dialog

The vulnerability listed under CVE-2021-38504 could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in file picker dialog. By persuading a victim to visit a specially-crafted website, a remote attacker could create an interaction with an HTML input element’s file picker dialog with webkitdirectory set. Use after free (UAF) is a vulnerability due to incorrect use of dynamic memory during a program’s operation. If after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to manipulate the program.

Windows 10 Cloud Clipboard

The vulnerability listed under CVE-2021-38505 only applies for users of Firefox for Windows 10+ with Cloud Clipboard enabled. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats. Firefox versions before 94 and ESR 91.3 did not implement these formats. This could have caused sensitive data to be recorded to a user’s Microsoft account.

Unsolicited full screen mode

CVE-2021-38506 describes a vulnerability in which, through a series of navigations, Firefox could have entered full screen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This type of attack is particularly useful for Tech Support scammers because they can make the browser page look like a security warning or BSOD, and trick the user into calling a specific number.

Opportunistic Encryption in HTTP2

Listed as CVE-2021-38507, the Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) doesn’t opt-in to opportunistic encryption, a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage.

QR code scan

The vulnerability listed under MOZ-2021-0003 does not have a CVE number assigned to it. The vulnerability only affects Firefox for Android. A Universal XSS vulnerability was present in Firefox for Android resulting from improper sanitization when processing a URL scanned from a QR code. Cross-Site Scripting (XSS) attacks are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites. QR codes are complicated barcodes that are popular among scammers. It’s advisable to use a QR scanner that checks or at least displays the URL before it follows the link.

Memory safety bugs

Several memory safety bugs were grouped under MOZ-2021-0007. Some of these bugs showed evidence of memory corruption and it was presumed that with enough effort some of these could have been exploited to run arbitrary code. These bugs were found by Mozilla developers and community members and have also been fixed in this update.

How to protect yourself

All of the issues listed above, and more, have been fixed in Firefox 94 and Firefox ESR 91.3. By default, Firefox updates automatically. You can always check for updates at any time, in which case an update is downloaded, but it is not installed until you restart Firefox.

  • Click the menu button, click Help and select About Firefox.
  • The About Mozilla Firefox window opens. Firefox will check for updates and, if an update is available, it will be downloaded automatically by default.

Stay safe, everyone!

The post Update now! Mozilla fixes security vulnerabilities in Firefox 94 appeared first on Malwarebytes Labs.

Credit card skimmer evades Virtual Machines

This blog post was authored by Jérôme Segura

There are many techniques threat actors use to slow down analysis or, even better, evade detection. Perhaps the most popular method is to detect virtual machines commonly used by security researchers and sandboxing solutions.

Reverse engineers are accustomed to encountering code snippets that check certain registry keys, looking for specific values indicating the presence of VMware or Virtual Box, two of the most popular pieces of virtualization software. Many malware families incorporate these anti-vm features, usually as a first layer.

For web threats, it is more rare to see detection of virtual machines via the browser. Typically threat actors are content with filtering targets based on geolocation and user-agent strings. But that feature does exist in modern browsers and can be quite effective.

In this blog post we show how a Magecart threat actor distributing a digital skimmer is avoiding researchers and possibly sandboxes by ensuring users are running genuine computers and not virtual ones.

Virtual Machine detection

Our investigation started by looking at a newly reported domain that could possibly be related to Magecart. Suspicious JavaScript is being loaded alongside an image of payment methods. Note that browsing directly to the URL will return a decoy Angular library.

load

There is one interesting function within this skimmer script that uses the WebGL JavaScript API to gather information about the user’s machine. We can see that it identifies the graphics renderer and returns its name.

For many Virtual Machines, the graphics card driver will be a software renderer fallback from the hardware (GPU) renderer. Alternatively, it could be supported by the virtualization software but still leak its name.

detection

We notice that the skimmer is checking for the presence of the words swiftshader, llvmpipe and virtualbox. Google Chrome uses SwiftShader while Firefox relies on llvmpipe as its renderer fallback.

By performing this in-browser check, the threat actor can exclude researchers and sandboxes and only allow real victims to be targeted by the skimmer.

Data exfiltration

If the machine passes the check, the personal data exfiltration process can take place normally. The skimmer scrapes a number of fields including the customer’s name, address, email and phone number as well as their credit card data.

skimmer

It also collects any password (many online stores allow customers to register an account), the browser’s user-agent and a unique user ID. The data is then encoded and exfiltrated to the same host via a single POST request:

Evasion and defenders

This is not surprising to see such evasion techniques being adopted by criminals, however it shows that as we get better at detecting and reporting attacks, threat actors also evolve their code eventually. This is a natural trade-off that we must expect.

In addition to code obfuscation, anti-debugger tricks and now anti-vm checks, defenders will have to spend more time to identify and protect against those attacks or at least come up with effective countermeasures.

Malwarebytes users are protected against this campaign:

block

Indicators of Compromise (IOCs)

cdn[.]megalixe[.]org
con[.]digital-speed[.]net
apis[.]murdoog[.]org
static[.]opendwin[.]com
css[.]tevidon[.]com
mantisadnetwork[.]org
static[.]mantisadnetwork[.]org
stage[.]sleefnote[.]com
js[.]speed-metrics[.]com
troadster[.]com
nypi[.]dc-storm[.]org
web[.]webflows[.]net
js[.]librarysetr[.]com
librarysetr[.]com
opendwin[.]com
app[.]rolfinder[.]com
libsconnect[.]net
artesfut[.]com
js[.]artesfut[.]com
js[.]rawgit[.]net
js[.]demo-metrics[.]net
demo-metrics[.]net
dev[.]crisconnect[.]net
m[.]brands-watch[.]com
graph[.]cloud-chart[.]net
hal-data[.]org
stage[.]libsconnect[.]net
app[.]iofrontcloud[.]com
iofrontcloud[.]com
alligaturetrack[.]com
webflows[.]net
web[.]webflows[.]net
tag[.]listrakbi[.]biz
api[.]abtasty[.]net
cloud-chart[.]net
graph[.]cloud-chart[.]net
cdn[.]getambassador[.]net
climpstatic[.]com
stst[.]climpstatic[.]com
marklibs[.]com
st[.]adsrvr[.]biz
cdn[.]cookieslaw[.]org
clickcease[.]biz
89.108.127[.]254
89.108.127[.]16
82.202.161[.]77
89.108.116[.]123
82.202.160[.]9
89.108.116[.]48
89.108.123[.]28
89.108.109[.]167
89.108.110[.]208
50.63.202[.]56
212.109.222[.]225
82.202.160[.]8
82.202.160[.]137
192.64.119[.]156
89.108.109[.]169
82.202.160[.]10
82.202.160[.]54
82.146.50[.]89
82.202.160[.]123
82.202.160[.]119
194.67.71[.]75
77.246.157[.]133
82.146.51[.]242
89.108.127[.]57
82.202.160[.]8
185.63.188[.]84
89.108.123[.]168
77.246.157[.]133
185.63.188[.]85
82.146.51[.]202
185.63.188[.]59
89.108.123[.]169
185.63.188[.]71
89.108.127[.]16
82.202.161[.]77

The post Credit card skimmer evades Virtual Machines appeared first on Malwarebytes Labs.

BlackMatter ransomware group announces shutdown. But for how long?

The BlackMatter ransomware gang has announced they are going to shut down their operation, citing pressure from local authorities.

And pressure there is. Only two weeks ago, we wrote about a warning that the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the National Security Agency (NSA) had issued over BlackMatter ransomware.

Missing staff

One revealing sentence in the posted message says that “part of the team is no longer available, after the latest news.” This could well be a reference to an announcement made by Europol last week, after it arrested 12 individuals “wreaking havoc across the world with ransomware attacks against critical infrastructure.”

Even though the announcement does not mention BlackMatter specifically, it says these individuals were known to have deployed LockerGoga, MegaCortex and Dharma ransomware, among others. And as we have published before, most of the major ransomware gangs are connected somehow.

The BlackMatter business model

BlackMatter is a ransomware-as-a-service (RaaS) that allows the developers to profit from cybercriminal affiliates who deploy it against victims. BlackMatter is a possible rebrand of DarkSide, and has some similarities to REvil. Both DarkSide and REvil have had to shut down.

It would not come as a surprise if the group decides to make some sort of comeback. This may be with an “improved” product, new staff, rebrand, or all three. Time will tell, but it is unlikely that the business model that allowed them to make a fortune, will be completely abandoned.

One of the disadvantages for such groups is that affiliates are unlikely to wait for a rebirth of the group and may flock to other groups rather than wait for BlackMatter to come back in some form.

How to protect yourself from ransomware

Last month, CISA published a joint Cybersecurity Advisory about BlackMatter Ransomware. The CISA alert lists technical details in the form of Tactics, Techniques, and Procedures (TTPs) based on the MITRE ATT&CK for Enterprise framework, detection signatures, and mitigations.

Most of the mitigation strategies will look very familiar to our regular readers, but it’s always worth repeating them. And you may spot some new ones.

  • Use strong and unique passwords. Passwords should never be reused across multiple accounts or stored on a system where an adversary may gain access. Devices with local administrative accounts should implement a password policy that requires strong, unique passwords for each individual administrative account.
  • Implement and require Multi-Factor Authentication (MFA) where possible, and especially for webmail, virtual private networks, and accounts that access critical systems.
  • Patch and update. Keep all operating systems and software up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.
  • Limit access to resources over the network. Remove unnecessary access to administrative shares, restrict privileges to only the necessary service or user accounts and perform continuous monitoring for anomalous activity. Use a host-based firewall to only allow connections to administrative shares via Server Message Block (SMB) from a limited set of administrator machines.
  • Implement network segmentation and traversal monitoring. This will hinder an adversary from learning the organization’s enterprise environment. Many attackers use system and network discovery techniques for network and system mapping.
  • Implement time-based access for accounts set at the admin-level and higher. BlackMatter operatives used compromised credentials during non-business hours, allowing them to go undetected for longer periods.
  • Disable command-line and scripting activities and permissions. Privilege escalation and lateral movement often depend on software utilities that run from the command line.
  • Implement and enforce backup and restoration policies and proceduresDoing backups right is not as easy as some may think. Make sure they are recent, cannot be altered or deleted, and cover the entire organization’s data infrastructure.

Furthermore, CISA, the FBI, and NSA urged critical infrastructure organizations to apply the following additional mitigations to reduce the risk of credential compromise:

  • Disable the storage of clear text passwords in LSASS memory.
  • Consider disabling or limiting New Technology Local Area Network Manager (NTLM) and WDigest Authentication.
  • Implement Credential Guard for Windows 10 and Server 2016.
  • Minimize the Active Directory (AD) attack surface to reduce malicious ticket-granting activity. Ticket Granting services can be used to obtain hashed credentials that attackers attempt to crack or use in pass-the-hash methods.

Stay safe, everyone!

The post BlackMatter ransomware group announces shutdown. But for how long? appeared first on Malwarebytes Labs.