IT News

Explore the MakoLogics IT News for valuable insights and thought leadership on industry best practices in managed IT services and enterprise security updates.

Ban Pegasus spyware, urges European Union Data Protection Supervisor

The European Data Protection Supervisor (EDPS) has urged the EU to ban the development and deployment of spyware with the capabilities of Pegasus to protect fundamental rights and freedoms.

What is Pegasus?

On July 18, a group of 17 newspaper and media organizations—aided by Amnesty International’s Security Lab and the research group Citizen Lab—revealed that one of the world’s most advanced and viciously invasive spyware tools had been used to hack, or attempt to hack, into 37 mobile phones owned by human rights activists, journalists, political dissidents, and business executives.

This spyware, called Pegasus and developed by the Israeli company NSO Group, is reportedly instrumental to several governments’ oppressive surveillance campaigns against their own citizens and residents. Pegasus is designed to successfully attack almost any smartphone running either iOS or Android, based on specific yet very basic information like a telephone number. Pegasus effectively turns the smartphone into a 24/7 surveillance device by gaining complete access to all sensors and information on the smartphone, including messages before they are encrypted, geolocation, camera, and calls. As Amnesty International’s Security Lab put it:

“Pegasus can do more than what the owner of the device can do.”

For an in-depth look at Pegasus, have a listen to our podcast about the world’s most coveted spyware, Pegasus: Lock and Code S03E04.

This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select “Click Here” to open the Privacy Preference Center and select “Functional Cookies” in the menu. You can switch the tab back to “Active” or disable by moving the tab to “Inactive.” Click “Save Settings.”

What is the EDPS?

The European Data Protection Supervisor (EDPS) is the European Union’s (EU) independent data protection authority. The EDPS is an increasingly influential supervisory authority that aims to provide requested as well as unsolicited advice to EU institutions and bodies on all matters relating to the processing of personal data.

Besides monitoring and ensuring the protection of personal data and privacy when EU institutions and bodies process the personal information of individuals, one of the EDPS missions is to monitor new technology that may affect the protection of personal information.

Level of intrusiveness

The EDPS is convinced that the use of Pegasus might lead to an unprecedented level of intrusiveness, threatening the very essence of the right to privacy, since the spyware is capable of interfering with the most intimate aspects of our daily lives.

The EDPS warns against regarding Pegasus as yet another law enforcement interception tool, but more as a hacking tool that has to be seen as a government Trojan in the form of a permanent backdoor. Unfortunately, Pegasus is not the only spyware tool of this type that is marketed as a law enforcement tool. However, Pegasus is considered a game-changer that renders existing legal and technical safeguards ineffective and meaningless.

EU law

Targeted surveillance is regulated in the national legislation of virtually every EU member state. But Article 52(1) of the EU Charter of Fundamental Rights requires that any limitations on the exercise of the fundamental rights and freedoms of the individual are proportionate and necessary. Such limitations must in any event be provided for by law and respect the essence of the fundamental rights and freedoms as recognized by the Charter.

The EDPS considers that only in cases of a very exceptional nature could Pegasus meet the requirements of proportionality and even in those cases less intrusive surveillance tools would be preferable. Therefore, using information gathered with the help of Pegasus and similar tools is likely to be considered inadmissible in a court of law. Also, many forensic experts may not have the necessary knowledge to identify and examine such highly advanced technology developed by private companies.

The advice

In its conclusion, the EDPS states that:

 “Pegasus constitutes a paradigm shift in terms of access to private communications and devices, which is able to affect the very essence of our fundamental rights, in particular the right to privacy. This fact makes its use incompatible with our democratic values. “

The EDPS therefore believes that a ban on the development of spyware with the capability of Pegasus in the EU would be the most effective option to protect our fundamental rights and freedoms.

It goes on to provide a list of steps and measures to block the unlawful use of Pegasus and similar tools:

  • Strengthen the democratic oversight over surveillance measures.
  • A strict implementation of the EU legal framework on data protection.
  • Judicial review of surveillance order applications should not be a mere formality.
  • Criminal procedural laws should outlaw the use of highly intrusive hacking tools.
  • Reduce the risk of using data gained by such methods reaching the databases of the European Union (e.g. Europol).
  • Stop (ab)using “national security” purposes for legitimizing politically motivated surveillance.
  • Address deficiencies in the rule of law that create grounds for abuse of secret surveillance.
  • Bring awareness and public debate to support and empower civil society.

By publishing this document, the EDPS has made its contribution to the public discussion whether there is a place for spyware tools like Pegasus in a democratic society.

The ban

Given that some member states of the EU are listed as NSO Group customers, the reason for requesting this ban is clear. It should also be clear by now that the individuals targeted by using Pegasus are not terrorist organizations, drug cartels, human traffickers, pedophile rings or other criminal syndicates, but rather reporters, scientists, romantic partners, and potentially even heads of state.

But, knowing how hard it is to detect such tools on affected devices, and—even if they are detected—finding out who is behind the infection in the first place, there will be people and organizations that are willing to risk using such tools.

Stay safe, everyone!

The post Ban Pegasus spyware, urges European Union Data Protection Supervisor appeared first on Malwarebytes Labs.

Roblox Beamers steal items from kids

Roblox gamers are once again being warned to be on their guard against scammers plundering valuable digital items.

Most multiplayer titles are all about customization. You won’t find many popular games where digital items aren’t up for grabs. Some games lock the items, such as outfits, weapons, or valuables, to your account and/or characters. Other games allow players to trade them. Those trades can be straightforward item swaps, or paid for with in-game fictional currency. They might end up on marketplaces where they’re bought and sold with real world cash. It all depends. This isn’t new, but it is awful.

What’s happening with Roblox?

Roblox allows you to make your own games, or just take part in challenges created by others. It’s constantly changing, and there’s always something new to do. As a result, it’s hugely popular with young kids and teens. Their accounts and digital items are highly coveted by scammers and account compromisers. In Roblox land, these people are known as “Beamers”.

Beamers use a variety of tricks to compromise accounts, and then head off to various shady marketplaces. There, they try to sell or trade for US dollars or cryptocurrency. This is pretty commonplace for a large number of online titles, but ripping off kids is always going to leave a bad taste in the mouth.

How do scammers rip off Roblox players?

It’s a mixture of old and new techniques. Below, we’ve listed some from the Beamer article and a few which we’ve looked at ourselves. Forewarned is forearmed, and all that.

  • Phishing: Beamers use creation kits to whip up bogus sites for their imitation domains. As the article mentions, it often begins with a message sent to another player. While we don’t know the content of those messages, a popular trick is to pretend they’re a game admin or mod. The Beamer might claim the victim is in trouble, or has failed a safety check. Or they might claim to be offering a cool free item.
  • SIM swap: Another timeless classic. This is where attackers trick mobile networks into redirecting texts to their own device. By doing so, they can bypass SMS based two-factor authentication because the codes end up being sent to them, as opposed to the victim.
  • Generators: Never discount the allure of free in-game currency. Generators aren’t mentioned in the article, but they are a mainstay of scam tactics. Offer a bogus tool, claim to create as much currency as the victim requires, and have them run it. The executable may contain malware, or it may direct the user to a phish or survey scam.
  • Ransomware: Another one for the “I didn’t expect that” pile. In this particular instance, we’re talking bogus versions of real tools designed to automate certain functions.

Scammer hideouts and information gathering tools

It appears a lot of the Beamer activity takes place inside services such as Discord. This makes sense; it’s a fast, easy way to keep trades flowing with minimal set-up fuss for the creator to worry about. Tying Discord channels to phishing pages so the owner knows when someone has entered details is part of the trick.

Additionally, gaming data often feeds into third-party sites. This can be useful. If you play an MMORPG and need to buy low/sell high? There’s usually a site for that, and it’s possible you’ll be able to see the item owner’s character details, or the server they play on. Great for trades, but bad for painting a large target on your back. Years ago, scammers would filter Xbox360 gamers by prestigious achievements and high gamer scores and mark targets that way. Now it’s a lot more item/commodity centric, but despite this the account is still at risk of being hijacked and sold on.

Time to lock down your Roblox accounts

A good reminder, then, to keep yourself up to date with the security measures recommended on the Roblox security page. You can bet people are coming up with new and creative ways to relieve you of your account at any given moment. It’s up to you to ensure you’re always one step ahead of the item-stealing crowd.

The post Roblox Beamers steal items from kids appeared first on Malwarebytes Labs.

Update now! Chrome patches actively exploited zero-day vulnerability

Google has released an update for its Chrome browser that includes eleven security fixes, one of which has been reportedly exploited in the wild.

The vulnerability that is reported as being exploited in the wild has been assigned CVE-2022-0609.

CVE-2022-0609

The vulnerability is described as a Use-after-free (UAF) vulnerability in the Animation component. UAF is a type of vulnerability that is the result of the incorrect use of dynamic memory during a program’s operation. If, after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to manipulate the program. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. In this case, when the vulnerability is exploited, this can lead to corruption of valid data and the execution of arbitrary code on affected systems.

As a result, a remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger the UAF vulnerability and execute arbitrary code on the target system.

The researchers who found and reported the flaw are Adam Weidemann and Clément Lecigne of Google’s Threat Analysis Group (TAG). As usual, Google hasn’t gone into any more detail about the bug. Access to bug details and links are usually restricted until the majority of users are updated with a fix.

Other vulnerabilities

Other vulnerabilities that have been discovered by external researchers are;

  • CVE-2022-0603: Use after free in File Manager.
  • CVE-2022-0604: Heap buffer overflow in Tab Groups.
  • CVE-2022-0605: Use after free in Webstore API.
  • CVE-2022-0606: Use after free in ANGLE.
  • CVE-2022-0607: Use after free in GPU.
  • CVE-2022-0608: Integer overflow in Mojo.
  • CVE-2022-0610: Inappropriate implementation in Gamepad API.

How to protect yourself

If you’re a Chrome user on Windows, Mac, or Linux, you should update to version 98.0.4758.102 as soon as possible.

The easiest way to update Chrome is to allow it to update automatically, which basically uses the same method as outlined below but does not require your attention. But you can end up lagging behind if you never close the browser or if something goes wrong, such as an extension stopping you from updating the browser.

So, it doesn’t hurt to check now and then. And now would be a good time, given the severity of the vulnerability. My preferred method is to have Chrome open the page chrome://settings/help which you can also find by clicking Settings > About Chrome.

If there is an update available, Chrome will notify you and start downloading it. Then all you have to do is relaunch the browser in order for the update to complete.

Chrome up to date
Chrome is up to date

After the update the version should be 98.0.4758.102. Since Animations is a Chromium component, users of other Chromium based browsers may see a similar update.

Stay safe, everyone!

The post Update now! Chrome patches actively exploited zero-day vulnerability appeared first on Malwarebytes Labs.

Adobe patches actively exploited Magento/Adobe Commerce zero-day

Adobe has released an emergency advisory for users of its Commerce and Magento platforms. It explains that a critical zero-day vulnerability is actively being exploited in attacks against sites that use these two content management system (CMSs). Users should apply the patch as soon as possible.

The vulnerability

Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). This vulnerability has been assigned CVE-2022-24086.

The flaw is described as an improper input validation vulnerability which could lead to arbitrary code execution. The vulnerability is exploitable without credentials and is rated as critical. It has been rated with a CVSS score of 9.8 out of 10.

A remote and unauthorized attacker can send a malicious request to the application and execute arbitrary code on the target server. Successful exploitation of this vulnerability may result in complete compromise of the affected system.

Adobe says its own security team discovered the flaw but it is aware that CVE-2022-24086 has been exploited in the wild in very limited attacks. No other information has been provided about the vulnerability to limit the possibility of further exploitation.

Needless to say, if you operate one of the affected products, patch now.

Affected products

Magento is an Adobe company that offers a hosted and self-hosted CMS for web shops. The free version of Magento is open source which offers users the option to make their own changes and allows developers to create extensions for the CMS.

The vulnerability affects Adobe Commerce and Magento Open Source 2.4.3-p1 and earlier versions, as well as 2.3.7-p2 and earlier versions.

Magecart

Only recently we published a blog about a new Magecart campaign which was aimed at Magento sites, but that campaign primarily targeted the Magento 1 version of the CMS which has reached end-of-life (EOL) and has not been supported since June 30, 2020. Were Magecart to get its hands on this vulnerability, that would raise the number of potential targets by hundreds of thousands.

Keeping your site safe

We have written an extensive post about how to defend your website against skimmers, but in summary, here’s what you need to do to keep your site safe:

  • Make sure that the systems used to administer the site are clean of malware.
  • Use strong passwords and do not reuse them.
  • Limit the number of administrators.
  • Keep your site’s software updated.
  • Use a Web Application Firewall (WAF).
  • Know that each dependency is a potential backdoor into your web pages.
  • Use a Content Security Policy (CSP).
  • Make sure you are made aware in case of problems, either by checking yourself or by having it done for you.

How to apply a patch

Unzip the relevant file which you can select here and follow the instructions in how to apply a composer patch provided by Adobe.

Stay safe, everyone!

The post Adobe patches actively exploited Magento/Adobe Commerce zero-day appeared first on Malwarebytes Labs.

Ransomware gang hits 49ers’ network before Super Bowl kick off

The San Francisco 49ers has confirmed that it has been hit by a ransomware attack. The announcement came just hours before the biggest football game of the year, Sunday’s Super Bowl between the Cincinnati Bengals and the Los Angeles Rams.

In a boilerplate statement to BleepingComputer, the 49ers revealed that the attack has caused temporary disruption to its IT network. As of this writing, it is in the process of recovering affected systems.

The San Francisco 49ers recently became aware of a network security incident that resulted in temporary disruption to certain systems on our corporate IT network. Upon learning of the incident, we immediately initiated an investigation and took steps to contain the incident.

The BlackByte ransomware gang has already claimed responsibility for the attack by leaking a small number of files it claims to have been stolen.

BlackByte

BlackByte ransomware is a relatively new ransomware-as-a-service (RaaS) tool, that has been around since July 2021. It is used by affiliates who breach organizations, steal valuable information, and then use ransomware to encrypt the organizations’ files—rendering them unusable. They then demand a ransom to decrypt the files, and threaten to leak the stolen data if it’s not paid.

Like other ransomware groups, the threat actors using Blackbyte have been known to use software exploits to breach victims’ networks, such as Microsoft’s well-publicised ProxyShell vulnerability. This only highlights the importance of applying software patches whenever they have been made available.

Our friends at Trustwave published a two-part [1] [2], in-depth analysis of the first version of BlackByte in October 2021. The analyses revealed a flaw in its code: The decryption/encryption key had been reused in multiple attacks. This allowed Trustwave researchers to create a free decyptor tool to help victims in the recovery of their files without paying the ransom.

Version two of BlackByte does not have this flaw, so the 49ers will likely have to rely on backups to recover its affected systems.

A timely FBI advisory

Just a couple of days before the attack, on Friday 11 February, the FBI released an advisory warning about the dangers of BlackByte ransomware:

As of November 2021, BlackByte ransomware had compromised multiple US and foreign businesses, including entities in at least three US critical infrastructure sectors (government facilities, financial, and food & agriculture). BlackByte is a Ransomware as a Service (RaaS) group that encrypts files on compromised Windows host systems, including physical and virtual servers.

The advisort includes a number of BlackByte indicators of compromise (IOCs)—digital clues such as files, hashes, file modifications, and registry changes—associated with BlackByte activity. These help IT and security professionals determine if it is on, or has been on, their systems.

Lastly the FBI has advised organizations to keep regular backups of their data. That’s good advice, but there are other things you should consider too: Network segmentation to limit an attacker’s ability to move through your network; patching all systems to to prevent breaches; using two-factor authentication and rate limiting to prevent brute force password guessing; and regular account audits to beef up account security.

Backups are a vitally important last line of defence against ransomware, but they often fail when people need them most. In a recent Malwarebytes Lock and Code podcast, host David Ruiz spoke with Matt Crape, technical account manager for VMware, about why backups are so hard to get right, and what the most basic missteps are when companies roll out a backup plan.

This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select “Click Here” to open the Privacy Preference Center and select “Functional Cookies” in the menu. You can switch the tab back to “Active” or disable by moving the tab to “Inactive.” Click “Save Settings.”

The post Ransomware gang hits 49ers’ network before Super Bowl kick off appeared first on Malwarebytes Labs.

Don’t let scammers ruin your Valentine’s Day

Today is Valentine’s Day, so we thought we’d show you how cybercriminals use special times like this one for phishing attacks.

Our Valentine’s story starts with a victim receiving an email message. The email urges them to open an attached file, and also contains well formatted content that tries to divert attention from the real scam:

image 1
Phising email

These emails were sent from a legitimate account owned by artifactuprising.com, a well known company located in Colorado that sells various gifts. The email contains several links to their website, and its content isn’t malicious by itself. The scam is placed in the first lines, where it says:

Hello,

Please find the attached details of the funds that will be deposited into your bank account within the next few days by electronic funds transfer (EFT).

Any questions related to invoices or payments, please contact our payables department..

*Please do not reply to this email as it was generated automatically.

Thank you,

The malicious artifact then is the attachment that supposedly contains details about funds deposited in the victim’s bank account. This malicious document is an HTML file. When opened with a regular text editor, the file appears to have just Javascript code:

jas
Malicious attachment

This one-liner JavaScript is just the means used by the attackers to hide the real malicious HTML document. Also, some security products will fail to detect it, as explicitly, no malicious strings are contained in the JS code.

Just unescaping the code, and after some deobfuscation work, we can now see suspicious elements contained in the file, giving us an idea about the attack:

image
Fragment of malicious HTML file after deobfuscation tasks

As expected, what is shown to the user is a page that mimics an Outlook login page. Unexperienced users, or in fact, anyone that won’t pay enough attention could enter their credentials in the form. Note that the email address shown is unique per victim, so that increases the legitimate look of the attack.:

maliciousForm edited
Form used in the phishing attack

In the end, the fake form will send the stolen credentials to the attacker through a plain HTTP request forwarded to a malicious IP address that is under control of the attackers. The ai form field will contain the victim’s email address, and pr field will contain the password:

credentials
Detonation in a controlled environment

The used IP address is also hosted in the USA, and was used in the past as a Cobalt Strike server. It looks like this IP hosts an outdated Apache server version which is being leveraged by different attackers in various attacks.

Conclusion

We wish you a happy and secure Valentines Day, surrounded by the ones that you love. As you can see, phishing attacks nowadays are better looking than ever, and every one of us could be tricked. So remember to be suspicious about any email received that is not expected. Other indicators will include topics like required payments, or offering free funds, like in this case. Moreover, be extra cautious when this emails urges you to respond quickly. And, when doubt arises, don’t hesitate sharing suspicious emails with your IT security department.

Malwarebytes users were already protected against this attack.

IOCs

162.33.178.57

The post Don’t let scammers ruin your Valentine’s Day appeared first on Malwarebytes Labs.

CISA Ransomware report warns “triple threat” attacks still on the prowl

Though we may be stuck with endless COVID-19 scams and a gradual visible rise in all manner of cryptocurrency hijinks, the old school attacks are as perilous as ever; CISA, the Cybersecurity & Infrastructure Security Agency, have released their 2021 report detailing the increasing globalised threat of the ransomware menace.

It covers a lot of ground, but many of the main findings won’t come as any surprise to those dealing with attacks over the last few years. Some of the more familiar efforts in the attack pipeline include:

  • Phishing and stolen RDP credentials used to break into networks and then fire up the ransomware cannon
  • Moving away from “big game” targets in order to go after much smaller ones. This keeps defenders with small security budgets on their toes, and also perhaps contributes to ransomware groups sailing under the radar. Nothing generates heat faster than major international attacks and lots of police involvement.
  • Attacking Managed Service Providers (MSPs). This allows Ransomware authors to potentially take down several targets at once, should they manage to compromise the MSP.

Attacking the cloud is also popular. Not just because many instances of cloud applications are vulnerable to exploits, but also because a lot of businesses have their backups in the cloud, too. Your corporate backup plan in case of a ransomware attack won’t help if threat actors manage to encrypt all of the backups.

These are some of the techniques and strategies we’ve all come to see and also expect. But what else are they getting up to?

The triple threat

One of the most interesting parts of the report is the shift in how ransomware authors demand money, and also how they receive it. The days of the standard “Your PCs are encrypted, give us X amount in Bitcoin or you don’t get your files back” are no longer how everyone does it. The CISA summary highlights a type of ransomware attack that’s been growing in popularity for a while now:

Diversifying approaches to extorting money. After encrypting victim networks, ransomware threat actors increasingly used “triple extortion” by threatening to (1) publicly release stolen sensitive information, (2) disrupt the victim’s internet access, and/or (3) inform the victim’s partners, shareholders, or suppliers about the incident. The [Australian Cyber Security Centre] continued to observe “double extortion” incidents in which a threat actor uses a combination of encryption and data theft to pressure victims to pay ransom demands.

Not just regular extortion, or double extortion, but triple extortion! Telling everyone how badly you got it wrong, doubling down on shame and embarrassment, is going to have an impact. They’re plugging into the fear of the “big reveal” in a way that makes organisations fail to disclose ransomware incidents, or even wire fraud or anything else for that matter.

Ransomware authors in the driving seat

Triple threat extortion attempts featured heavily in the news halfway through last year. Any hopes they may have become a passing phase seem to be sadly mistaken.

As the years pass, so too does the threat escalation. Informing people and organisations you know, or work with, is one final insult. It’s the sextortion panic technique applied to the business environment. There’s nothing to stop the ransomware authors from doing what they want after getting onto the network, so why not? It’s win-win for them, which makes it essential to ensure they don’t ever get that far.

There is no end to ransomware attacks, or the type of data leaked via double or triple threat extortion. Here’s one such double-hitter from last Friday, and you can bet there’s a lot more happening this very second. One wonders what the quadruple-threat ransom will bring…

The post CISA Ransomware report warns “triple threat” attacks still on the prowl appeared first on Malwarebytes Labs.

City: Skylines developers warn of rogue mod

Players of the popular city-building simulator and video game City: Skylines need to check devices for rogue code lurking in mods related to a rework of something called Harmony, essential for modding across several titles.

The threat arrives in a broader landscape—video game modding—already known for scams and malware. Whether looking for patches and fixes, or just more general alterations, gamers have to be careful when modifying how their games run. There’s a few long-standing sources for game modders, viewed as being safer than other ways of grabbing the latest mod. Even then, problems can arise due to site aspects unrelated to the mod files themselves.

That’s just how it goes in modification land.

What is Harmony?

Harmony is a “library for patching, replacing and decorating .NET and Mono methods during runtime”. As with many things mod related, people occasionally go off and make their own versions of mods, frameworks, individual files, the works. Sometimes it’s better, sometimes it’s worse. Occasionally it’s a necessity if a game has changed so much the original no longer works, and the author has abandoned the project. Of course, sometimes people do this without asking permission if needed first which is a whole other can of worms.

This particular can of worms is exclusively rogue file related.

A statement of (bad) intent

From the game developers:

In TM:PE 11.6.4.8 we are marking _all_ mods by Chaos / Holy Water / drok (same person) as incompatible for the following reasons:

  • Network Extensions 3 contains malware which directly targets multiple members of our team, dozens of other modders, employees of Colossal Order, and dozens of Steam users many of whom will not be aware that they are targets of malware.
  • While the malware is trivial (it randomly alters speed limits), it’s caused a lot of excess support workload and raises concerns about what other malware may be present (particularly in the Harmony “Redesigned” mod).
  • Network Extensions 3 was modified with “tripwire” code specifically designed to cause bugs in other mods.
  • Those bugs are affecting TM:PE users (we have several confirmed cases) and when TM:PE team go in to investigate we are hit by malware.
  • Upon bugs appearing in other mods, Chaos claims that they are badly written in order to gain more users for his mods – which in turn are designed to cause bugs in other mods.
  • Chaos has blocked former members of Network Extensions mod, including myself, from creating derivative works on his version of the mod.
  • Chaos has added code to his Harmony “redesigned” mod’s reporting tool which is highly misleading (often indicating the wrong mod being responsible for an error, when in most cases it’s _affected_ by an error from somewhere else)
  • Chaos is doxing and harrassing anyone who calls him out on his behaviour, adding them to his targeted malware system, and then claiming that _he_ is the actual victim (a technique called “DARVO” = deny, attack, reverse victim and offender)

In the interim there is a high likelihood that Holy Water will release his own version of TM:PE. It’s not our place to tell you which mods to use, but at least wait for the additional detail before making a decision.

What’s the short version?

To summarise, from the same thread (bold added by me):

  • When someone starts the game with the NExt3 mod enabled, it checks if the game is running in Steam portal and, if so, then checks the player’s Steam ID against two lists of Steam IDs[github.com].
  • One of the lists appears to be mostly modders and CO employees; the other is a list of ordinary steam users many of whom will not be aware that they are direct targets of malware.
  • If the player ID matches an entry on the list, the mod proceeds to change road speeds to a random – but always slow – value[github.com].
  • This gives the false appearance that it’s the other mods which contain bugs – a topic which I’ll cover in a later comment.

This is quite the attempt at discrediting rival mods, while also taking a peculiar swing at developers and what seem to be random Steam users. Have they annoyed the mod creator in some way? Or are they genuinely just random City: Skylines players? At any rate, this plus word of some sort of automatic updater thrown into the mix has made players and developers very wary at time of writing.

Rogue mods down, and hopefully out

The mods have apparently since been removed from the Steam Workshop by Valve. As many as 35,000 people may have subscribed to the rogue files before being taken down. Anyone who may have grabbed this version of Harmony is advised to unsubscribe to the mod, and then run full security checks and malware scans as a precaution.

It’s hoped that the aggravating speed up / slow down “feature” of the mod is about as bad as things get for anyone affected, but an abundance of checking won’t hurt at this stage.

Usually we warn about suspicious standalone mods from sites you’ve never seen before, or files on sites such as Nexus Mods with bad reputations and poor reviews. It’s a little unusual to have to warn about bogus mod actions offered up directly from the Steam Workshop, but sadly that’s how things are sometimes. Keep an eye on developer commentary, read reviews before downloading, and keep your security scanners handy before allowing unknown code to run on your PC. Stay safe and have a hopefully malware-free time of it while modding your games.

The post City: Skylines developers warn of rogue mod appeared first on Malwarebytes Labs.

Twitter cans 2FA service provider over surveillance claims

Twitter is transitioning away from from its two-factor authentication (2FA) provider, Mitto AG, a Swiss communications company.

The social media giant broke the news to US Senator Ron Wyden of Oregon. It is noted that Twitter’s decision to move away from Mitto AG came after allegations that its co-founder and Chief Operating Officer, Ilja Gorelik, sold access to Mitto’s networks to surveillance technology firms. Talking to Bloomberg, an aide close to Wyden said that Twitter cited media reports as a significant factor for its decision.

In December, Bloomberg reported that Gorelik had sold access to Mitto’s networks between 2017 and 2018. The companies that bought the access reportedly used it to help governments conduct secret surveillance against users through their phones.

Mitto AG is a top provider in its industry and boasts a roster of big-named clients like Alibaba, Google, LinkedIn, Telegram, Tencent, TikTok, and WhatsApp. Representatives of the company have told its clients that Gorelik departed the company after these allegations arose. It isn’t clear if Gorelik left of his own accord or was pressured.

As of this writing, Twitter has yet to name a new 2FA provider.

So where does that leave Twitter users who use SMS 2FA? Although Twitter hasn’t hinted at temporarily suspending this particular option, users may opt to use two other forms of 2FA on offer: An authentication app or a security key. Twitter has a ready help page here on how to sign up.

The curious case of Mitto AG

While many may have been shocked by events involving Mitto, critics argue that the mobile industry has been known for such abuses for years.

“For years mobile industry organizations such as the GSMA have been aware of operators selling network access resulting in targeted surveillance,” Gary Miller, a mobile security researcher at Citizen Lab, told Bloomberg. “The lack of regulation and accountability has brought unnecessary privacy and security risks to mobile users across the globe.”

The GSMA is an organization that represents the interests of the mobile industry with groups/chapters all around the globe. When interviewed about the Mitto case, a spokesperson from the group said that GSMA “takes network security and privacy very seriously and plays a leading role in creating a safer experience for mobile subscribers.”

Dario Betti, CEO of the Mobile Ecosystem Forum, of which Mitto is a member, didn’t comment on the Mitto case but said in a broader context that abuses pose “a threat to the market and the market has to close down all these bad behaviors.”

“This is an industry built on trust, and we need to maintain that trust,” he added.

The post Twitter cans 2FA service provider over surveillance claims appeared first on Malwarebytes Labs.

The world’s most coveted spyware, Pegasus: Lock and Code S03E04

Two years ago, the FBI reportedly purchased a copy of the world’s most coveted spyware, a tool that can remotely and silently crack into Androids and iPhones without leaving a trace, spilling device contents onto a console possibly thousands of miles away, with little more effort than entering a phone number.

This tool is Pegasus, and, according to recent reporting from The New York Times, the FBI purchased the tool for examination, but deferred from using it for any real investigations. Remarkably, at the same time, the US government was also considering a version of Pegasus that could allow for domestic spying on Americans—a new, upgraded Pegasus called “Phantom.”

Pegasus and Phantom were reportedly never deployed by the US government, but that doesn’t mean that these invasive hacking powers are rarely used. In fact, Pegasus has been sold to the governments of India, Saudi Arabia, Bahrain, Azerbaijan, Mexico, the United Arab Emirates, Morocco, Hungary, and Rwanda.

In the hands of those and many other countries, surveillance abuses abound.

On Lock and Code today, host David Ruiz provides an in-depth look at Pegasus: Who makes it, how much information can steal from mobile devices, how does it get onto those devices, and who has been provably harmed by its surveillance capabilities? Despite being billed as a tool to help curb criminal organizations and terrorist threats, Pegasus, through forensic analyses, has been found on the phones of journalists, human rights activists, and political dissidents. It is believed to have been used to target several heads of state, including presidents and prime ministers, along with nonprofit directors, lawyers, and at least one government scientist.

“These aren’t stories of investigating, or preventing, or solving, or addressing criminal activities. These are stories of the everyday people, with names, with careers, with families, who did something—who spoke up in a way, who lived in a way—that someone else didn’t like.”

David Ruiz, Lock and Code host, Malwarebytes online privacy advocate

This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select “Click Here” to open the Privacy Preference Center and select “Functional Cookies” in the menu. You can switch the tab back to “Active” or disable by moving the tab to “Inactive.” Click “Save Settings.”

You can also find us on Apple PodcastsSpotify, and Google Podcasts, plus whatever preferred podcast platform you use.

The post The world’s most coveted spyware, Pegasus: Lock and Code S03E04 appeared first on Malwarebytes Labs.