NotPetya2 – Cont.

So significant ransomware attacks on Ukraine right now. Dark Reading notes that 77% of organizations have poor segmentation, 70% have exposed Industrial Control System connections and 44% shared credentials:
https://www.darkreading.com/attacks-breaches/ransomware-trained-on-manufacturing-firms-led-cyberattacks-in-industrial-sector

Most of last year also saw scans of TCP Port 502, which is used by a protocol called Modbus, the transportation systems of Ukraine. (That is SCADA devices as well.)

Significant was the use of a new data wiper called “HermeticWiper” (aka KillDisk.NCV) with evolving attacks over the past two months. Over 121 unsuccessful cyber attacks took place last month, one which was called “WhisperGate.”

The prep for the main event was overwhelming distributed denial-of-service (DDoS) attacks on Ukrainian government offices and banks. The Russian Main Intelligence Directorate (GRU) was fingered by U.S. and U.K. officials, with subsequent denial of course by the Kremlin.

The propaganda war is trying to sow panic and spread miss information.

“President Joe Biden said last month the US could respond with cyberoperations of its own if Russia conducts additional cyberattacks in Ukraine.”

This is not about websites. This is about basic economic processes and transportation.  ICS and SCADA systems are being compromised.
The attacks began Feb12. The second version of NotPetya? I have a feeling that we will know the damages more than anything ever before. Alarming is the data wiping that happened before the kinetic events.

Key Ukrainian government websites hit by series of cyberattacks – CNN

NotPetya 2

https://apnews.com/article/russia-ukraine-joe-biden-technology-business-hacking-5eadc06062f8c7acfc7b7302ec4c4478

Biden notes that a physical war could result from cyber breaches. In spite of NATO, Putin and crew could do some damages that would cost billions.

NotPetya was the largest and most expensive cyberattack ever and was perpetrated largely on Ukraine by Russian criminals working for the government. It caused more than $10 billion in damages in 2017. Is part 2 in order?

I’m hoping that now we will be ready and that NATO will act together. This is all new territory though. We haven’t seen physical war yet, but I think it will be tit-for-tat unless it takes down some infrastructure that is critical and/or relies on IRL human processes.

Do you have a dark web presence?

Heard this radio interview yesterday with BorderLAN. Among the notes:
1. Don’t be lazy in getting your cyber. Don’t say “we’re just a small company and hackers are not after us.”
2. In order to get cyber insurance, you are first going to have to:
   A. Perform on/offsite backups
   B. Get effective anti-malware
   C. Have you even blocked certain IPs, like from North Korea?
“Do what you do as a small business and leave us to do our job, what we do to protect you,” said the company rep.
The dark web is filled with data. There are supercomputers out there doing continual scans for vulns. We can search for your data out there. It’s like Amazon/auction for hackers. Free hacking tools for script kiddies (no experience needed).
The government just spent $2-3 trillion but $5-6 trillion is already out there on the dark web (ransomware and other data hostage, things like free videos of porn, human trafficking, software serial numbers, free stuff!)

REvil stops momentarily but then…?

After Russian security forces arrested some of REvil’s operators, “You can hit the jackpot once, but provoke such a geopolitical conflict that you will be quickly found. It is better to quietly receive stable small sums from mid-sized companies.”
The up-and-coming local cyber provider for whom I am working is targeting its marketing toward SMBs, which are vulnerable more than ever now to ransomware.

Ransomware gangs are changing their tactics. That could prove very expensive for some victims | ZDNet

Pegasus and the Israeli Left

For those who think that Israel is some kind of right-wing regime, here the Israeli Left and right–and the public at large–are united in their alarm at police actions in using NSO’s Pegasus software to spy on top officials without a court order. Just more proof that Israeli politics are democratic, the worst kind of politics other than every other one.

Israel Police used NSO’s Pegasus spyware against top gov’t officials, journalists and activists – Israel News – Haaretz.com

 

Pegasus enables warfare

Cyber war is evolving to a state where there could be conventional warfare in retaliation for a cyber attack. You can use my paywall hack to view this article if you are not a NYT subscriber (https://www.digibrill.com/2021/10/14/hacking-paywalls/):
“Cyberweapons have changed international relations more profoundly than any advance since the advent of the atomic bomb. In some ways, they are even more profoundly destabilizing — they are cheap, easily distributed and can be deployed without consequences to the attacker. Dealing with their proliferation is radically changing the nature of state relations, as Israel long ago discovered and the rest of the world is now also beginning to understand.
“More than 75 years after the invention of nuclear weapons, only nine countries appear to have a usable one. But dozens of countries already have cyberweapons. ‘Everybody seems to want them,’ Mark told me, ‘and this gives enormous power to the countries who sell them and can use them for diplomatic advantage.’
“It has also led to a huge increase in government spying, for good and for ill.”

Cyber Risk Assessment, Pt. II

Cyber Risk Assessment, Pt. I

3. Vulnerability Assessment (also known as “security posture assessment”) – An in-depth examination of the assets from the inventory to gauge their weaknesses or vulnerabilities. [Our] vulnerability assessments uncover gaps in your security and drive our overall risk management. While threats can come from both inside and outside your organization, vulnerabilities are internal factors. We look for your organization’s structural flaws and weaknesses, how effective your current safeguards are (vulnerability appraisal), and the weaknesses that remain in spite of them. We captures a picture of your network’s and data’s security. Every possible contingency will be gauged for multiple vulnerabilities. Our team’s diverse backgrounds and experience enables us to consider all the weaknesses specific to your organization. Testing cyber infrastructure is an indispensable part of what we do. We use industry-standard tools like Nessus, Nmap, and Metasploit to test for vulnerabilities, examining every available host, services, OS, ports, firewalls, software and firmware vulnerabilities, unencrypted and sensitive data, and permissions. We may also conduct penetration testing and red team-blue team exercises, and examine your data that is online right now that may aid in a threat actor’s social engineering tactics. Continue reading “Cyber Risk Assessment, Pt. II”

Business Continuity in the Age of Ransomware

The goal of Disaster Recovery Planning is to enable a company to continue doing business in the least amount of interruption. Parts of the plan should include:

1. Which data and systems are backed up, as well as specific details like where the backups should be kept, how frequently are they made, and how the data can be recovered.
2. Details on network topology, redundancy and agreements with Internet Service Providers.
3. Contact information for the team who are charged with response and recovery.
4. The process for testing the DRP.
5. A plan for managing the crisis, including dealing with outside contacts, and communicating with the media, law enforcement and legal counsel.

The goal is to decrease the risks of losing critical data.

Ransomware disaster recovery is one of the essential tasks that a company should engage in, but other crises can also be averted or dealt with through this sort of plan.

Makes sure to keep MalwareBytes NY resolutions

Per MalwareBytes (and me):

Say “yes” to updates
Installing updates promptly is one of the best ways to be more cybersecure. Next time an app offers you an update, click “yes” instead of “no”, “cancel” or “remind me later”. (Do you know where it came from?)

Say “no” to feeble passwords
Strong passwords keep your data safe, so don’t let yourself choose feeble passwords in 2022, and if somebody shares a password with you, or asks for yours, just say “no.” (My passwords are generally very strong with financial, job or security sites.)

Say “woah” to unexpected messages
Scams come in all shapes and sizes, but no matter how they’re dressed up, they always want something valuable, URGENTLY. So don’t be rushed—take your time in 2022.
(Remember: if it sounds too good to be true…)

Geek risk management

An asset provides value to user or company and has a relative worth.

Assets are people, physical assets (computers, network equipment), and IT assets (HW, SW, data). An asset’s relative worth is determined through its positive economic value and can have different values based on criticality to the organization.

Asset – in this case Joe Dork’s 1990s collection of Star Trek TOS VHS cassettes.
Vulnerability – Unlocked basement door to Dork’s room in parents’ home.
Vector – Going through the unlocked door.
Threat Actor – Beautiful cosplay girl.
Threat – Theft of tapes.
Risk – Stolen VHS.

Not only are your direct assets something to catalog, but you should also assess your supply chain assets, in all steps from supplier to consumer. Vendors should be cataloging their assets and the threats to it. The SolarWinds hack came from a supply chain vulnerability.

There’s zero chance that Dork’s VHS assets will be stolen by any cosplay girl, but you must perform a continuing asset inventory before any exploitation of vulnerabilities takes place.

We should be concerned about IoT devices

The Internet of Things (IoT) sounds like some kind of set of devices which we don’t have to be concerned about, e.g. “it’s only a thermostat (or a bedroom light).” But IoT can also be comprised of smartphones, printers, self-driving cars, Google Home, Amazon Alexa, Apple Homekit, wearables, door locks, connected LEDs, laptops, pacemakers, hospital devices, assisted living companions, microchipped animals, smart padlocks (possibly accessed by fingerprint), smart toys and other sensors. So systems that were intended to make life easier can also make security and privacy a concern. (Baby monitors and toys listening or talking to your child). Continue reading “We should be concerned about IoT devices”

Americans lost $148 million to gift card scams this year

Gift cards should never be used to pay bills or the government for taxes, etc. Gift cards should always be used to buy gifts.

This goes to show you the wisdom of the elders: if something sounds too good to be true, it probably is. Don’t let your guard down.

Report Gift Cards Used in a Scam | Federal Trade Commission – YouTube

Reminder: Phishing still way up there in terms of compromise

Reminder: Phishing is still the method of compromise most widely used. 91% of cyberattacks use phishing emails. With ransomware, the number is about 70%.

Phishing is really sophisticated sometimes. You may get phishing emails that look exactly like the real thing and the sites they lead to can have images and layouts stolen from the mimicked website.

Spearphishing is a targeted attack against certain individuals at an organization. Whaling is directed at big names at an org, typically a CEO or CFO–or someone with purchasing power since money transfers are the goal.

Smishing uses SMS (text) messages to get you to click and vishing uses phone calls or voice messages to get a target to do something the threat actor wants.

Don’t click. Don’t open attachments. Don’t even respond.

Encrypted messaging apps mostly keep your privacy

Overall, these services – iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp, and Wickr do indeed keep your content encrypted–unless you are using WeChat IN China.
 

Log4j continued

Merry Christmas.

CISA “published an emergency directive on Friday urging all government agencies to immediately ‘patch’ computer systems to address the Log4j flaw. ‘The Log4j vulnerability is the most serious vulnerability that I have seen in my decades-long career,’ CISA Director Jen Easterly.”

“Even the Microsoft-owned online video game Minecraft has been affected. Some hackers were apparently able to breach victims by typing a single line of code into the game’s chat box, according to Wired. Microsoft says it has since fixed the issue and is urging players to update their Minecraft software.”

Why is the Log4j cybersecurity flaw the ‘most serious’ in decades? (nypost.com)