Blog Archive
-
2016
(1336)
-
April(1335)
- Samsung Galaxy S7: 2016's Finest Android Phones
- Samsung Galaxy S7, Galaxy S5, Galaxy Note Edge Wit...
- Apple updates MacBook, upgrades MacBook Air
- Apple iPad Air 2 review: Still a great tablet
- Apple iPad Air review
- Microsoft Surface Pro 4 review: A fantastic Window...
- Google.com is “partially dangerous”, says Google
- LG G5 review: Modular expansion and twin cameras s...
- Best hybrid cars 2016: The six best hybrid cars fo...
- Best smartphones of 2016: The best mobile phones i...
- iPhone 7 rumours, specs and features: 8 things to ...
- EU Google antitrust case: Everything you need to know
- LeEco Le 2, Le 2 Pro and Le Max 2: No headphone so...
- Samsung Galaxy TabPro S review: Super screen, but ...
- How to get American Netflix on all your devices in...
- Apple Car rumours and leaks: Former Tesla Vice Pre...
- How to install Exodus on Kodi: Get one of XBMC’s b...
- Recover all your forgotten passwords
- How to cancel Netflix: Stop your Netflix subscript...
- HTC 10 review: A great smartphone return to form b...
- President Barack Obama's UK visit shakes up the Lo...
- Should I upgrade to Windows 10?
- Microsoft, seagulls and magic: An interview with M...
- Opera just added a free VPN as a bonus feature for...
- HP Chromebook 14 review: Solid, reliable and depen...
- How to remove a device from Netflix: Here’s how to...
- Amazon Fire review: Now available with 16GB storage
- Xplova X5 (hands on) review: This cycling computer...
- Acer Chromebook 14 review (hands on): A Chromebook...
- Now there's an app to crowdfund your honeymoon
- Shell’s Concept Car uses petrol to save the planet
- Tesla Autopilot review: We test Elon Musk’s autono...
- iOS 10: Rumours, speculation, mock-ups, and what w...
- This AI is guessing who’s going to die next in Gam...
- Microsoft's Windows Phone results: Not pretty, but...
- Android N review (first look): Now available for t...
- Volvo wants to sell one million hybrid and electri...
- How GCHQ has been accessing YOUR personal data
- Nissan Leaf (2016) review: We drive the UK's most ...
- Raspberry Pi 3 vs Raspberry Pi 2 vs Raspberry Pi B...
- Best electric cars 2016: The four best electric ve...
- Tesla Model S (2016) review: Still the ultimate el...
- Amazon blocks sale of Fifa 16, GTA 5 and many othe...
- UK government wants to punish online pirates with ...
- Opera VPN: Can the privacy-enhanced browser really...
- Mobile game revenues set to overtake that of PC in...
- Ads trick and force Germans to listen to plight of...
- What became of the cartoon video game mascot?
- Google I/O 2016: What key announcements to expect ...
- Microsoft profits fall by 25% due to drop in Windo...
- Galaxy Note 6 rumoured to sport 5.8in curved scree...
- Mexican voter database containing 93.4 million rec...
- Bangladesh bank cyberheist was a hacker's dream af...
- China wants to visit Mars by 2020 and beat Nasa to...
- BTCC Bitcoin mining pool launches rapid connection...
- BLOCKCHAIN REVOLUTION by Don Tapscott and Alex Tap...
- Apple's Find My iPad tool leads Thai police to not...
- US agency steps up Twitter campaign against textin...
- Samsung Galaxy S7 Edge: Android security update fo...
- Blizzard offering 13 free Whispers Of The Old Gods...
- Apple iTunes Movies and iBooks go dark in China, c...
- Blizzard releases first free Overwatch comic featu...
- Google and Microsoft drop all regulatory complaint...
- Blizzard's Jeff Kaplan reveals how MMO Titan's 'de...
- Moto G4: Release date, specs and pricing expected ...
- Shakespeare's 400th Anniversary: Ian McKellen unve...
- Cortana on Windows 10: Tips and tricks for Microso...
- How to Turn Your Surface Pro 4 Into A Desktop PC
- Samsung Galaxy Note 6 Release: 6 Things to Know Ri...
- How to Change the LG G5 Lockscreen & Wallpaper
- Eclipse Black Ops 3 DLC Tips
- Best Samsung Galaxy S7 Deals
- 14 Best Samsung Galaxy S7 Cases
- HTC Vive Hands On: Three Things You Should Know
- 7 Apple Pencil Holders to Keep Your’s Safe
- Is Microsoft OneDrive Worth Buying?
- Minecraft Realms for iPhone, Android & More: What ...
- Another Android Smartphone with 6GB RAM Spotted in...
- LinkedIn Launches Android/iOS Application to Help ...
- Sony Expands Marshmallow to Xperia Z2/Z3 Variants,...
- ZUK Z2 Pro Official Image Teased Ahead of April 21...
- Nubia Z11 Mini Goes Official with Snapdragon 617 C...
- Samsung Galaxy C7 Specs Leak in Benchmark: Snapdra...
- Motorola Moto G (4th Gen) Caught on Video Ahead of...
- VLC for Windows 10 Mobile Public Beta Launching Ne...
- Opera Mini Won't Receive Any Major Updates for Win...
- Samsung Plans to Build Powerful 18-24MP Camera wit...
- Motorola Moto G4 Plus First Press Render Leaks Online
- Huawei Honor V8 with Dual-Camera Setup Coming on M...
- World’s Smallest Android Smartphone Comes with 2.4...
- LeEco Le Max2 with 5.7-Inch Quad HD Display and 6G...
- Facebook Messenger for Android and iOS Updated wit...
- ZUK Z2 Pro Goes Official as Another Smartphone wit...
- Huawei P9 Lite Announced with 5.2-Inch Display, 13...
- Acer Liquid Zest Plus Launched with Massive 5,000 ...
- Samsung Galaxy S7 Clone Looks Shockingly Real - Video
- LG G5 SE Goes Official with 5.3-Inch Quad HD Displ...
- Fallout Shelter for Android/iOS Updated with Scrap...
- Sony Xperia Z3 Is the First Non-Nexus Device to Re...
- Huawei and Leica Release Statement on P9 and P9 Pl...
- February(1)
-
April(1335)
Sumsung Galaxy User Guide
Android Tutorials
Labels
Recent Posts
Blog Archive
-
Apple Watch 2 fans have a happy news here: At last, the brand has opened the box and confirmed its launch date which will be during the Worl...
-
Apple has lowered the prices of all iPhones sold officially in Japan by 10%. There is no official statement on the reason for the price cut,...
-
By now you've likely heard that the latest Tesla vehicle, the Model 3 , has been in high demand almost immediately since its debut early...
-
In an effort to further improve its service, Facebook has yet again updated it News Feed ranking algorithm. The social networking company sa...
-
Everyone likes free apps, but sometimes the best ones are a bit expensive. Now and then, developers put paid apps on sale for a limited time...
-
By now you've likely heard that the latest Tesla vehicle, the Model 3 , has been in high demand almost immediately since its debut early...
-
Apple has announced its update of the MacBook with better specs and a new color. In a press release two days ago, Apple said it installed ...
-
[unable to retrieve full-text content] SIM only deals On this page you'll find links to the best SIM only deals currently available in t...
-
Privacy is always one of the biggest priorities in this time when everything can be searched with just a click of a button. Mobile messaging...
-
Google is the new Microsoft. At least as far as collecting antitrust lawsuits are concerned. In Europe, the tech giant is once again facing...
Like US On Facebook
Followers
Total Pageviews
Hacking Team is back in the news again. Last weekend, the person responsible for Hacking Team's meltdown posted a recap of the incident, including a detailed overview of how they hacked the Italian firm.
It's a fascinating read on its own, but the postmortem should be essential reading for anyone that supports or manages a security program.
Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcement agencies. Nine months ago, their world was rocked after someone exfiltrated nearly 400GB of data form their network, including source code and contracts.
The irony is that Hacking Team developed tools that enabled hostile governments to do the exact things that were done to them, so many in the security industry experienced no small amount of schadenfreude at their expense. Over the weekend, the person responsible for the Hacking Team data breach, Phineas Fisher, outlined the hack from start to finish.
"You used to have to sneak into offices to leak documents. You used to need a gun to rob a bank. Now you can do both from bed with a laptop in hand," Phineas Fisher wrote.
"That's the beauty and asymmetry of hacking: with 100 hours of work, one person can undo years of work by a multi-million dollar company..."
To be clear, what happened to Hacking Team is a classic example of a targeted attack. Few organizations could outlast an attacker with knowledge, time, and resources. At the same time, the way Hacking Team managed and developed their network did them no favors.
Fisher took the time to reverse engineer some firmware in an embedded device and develop a new exploit. This Zero-Day vulnerability enabled persistent access, because he used it once (and only once) to plant a backdoor into the network.
Ultimately, a poorly configured iSCSI was Hacking Teams downfall, but there were other issues too – such as services deep within the network exposed to less secure subnets, MongoDB instances with no authentication, backups that had passwords stored in plaintext, as well as weak passwords everywhere – including on critical systems.
So what are some takeaways form the post-hack outline? Sarah Clarke, from infospectives.co.uk, shared some of her thoughts on the matter, including the fact that everyone's threat level just went up a bit.
"Despite being almost a decade away from the network coalface, I, without much trouble, and a little help from my friends, could do everything listed. What will stop me is fear of prosecution, ethics, and a strong analytical ability to see short, medium, long-term implications," she said.
Considering the outline and processes documented by Phineas Fisher, Clarke did what many security leaders would and searched for "what's next" – what can organizations with concerns about these types of attacks monitor for?
If your organization faced a similar attack, what would common enterprise monitoring tools spot, if configured correctly? What amendments to IDS/IPS, log monitoring, vulnerability scanning, pen test scoping, SIEM alerting, or alert analysis need to be made or augmented?
Andy Settle, head of special investigations for Austin-based Forcepoint, had some additional thoughts, which are produced below.
"The attack was targeted and had every intention of getting in. This type of threat needs to be addressed by asking 'when?' and not simply 'if?' Once inside the company network, the hacker managed to traverse the company infrastructure with little difficulty," he said.
Read more: Google to stop patching Chrome for 60M Android users this May
"Protecting the soft-skinned inner workings of an organizational infrastructure is equally important. Minimizing the services within a company network is just as essential to minimizing those presented to the outside world."
Monitor & Assess:
Firewall logs can give advanced warning of these types of attacks. Network mapping, port scanning and enumeration may well be countered by the firewall and Intrusion Prevention Devices (IPS) but to not monitor and assess the data they produce is to lose the Indicators & Warnings (I&Ws) that could indicate that something was likely to happen.
Updates & Patching:
"There should be no surprise that updates and patching are essential. [Phineas Fisher] was able to exploit a known vulnerability within the network management system Nagios. Interestingly, the attacker became aware of the Nagios system only after they "spied" on the sysadmins," Settle explained.
Read more: Agile doesn't (necessarily) mean fragile
Separation of Networks:
This attack was possible because backup and management networks that should have been segregated were not. Separation of operational and management networks is a useful technique for protecting infrastructure, especially when the management network requires administrative privileges. In this attack, [Phineas Fisher] was able to interrogate and dump the email server backup images.
Watch and Protect the Privileged:
We often say that one of the greatest challenges is monitoring those with privileged accounts. Many organizations, especially government related require security clearances to protect from the insider threat. However, what this incident teaches us that once in, the bad guys make a beeline for the sysadmins to monitor their activities in order to gain greater knowledge and understanding of the company and its infrastructure.
"There is somewhat of a mind-set change here, should we not be monitoring the privileged users and their workstations? Not because we do not trust them, but for their own protection and to ensure they are too are not being watched by network sniffers, key-loggers etc.?" he added.
Egress Monitoring:
"One final observation is that a lot of data was ex-filtrated. Why was this not noticed? This is hardly uncommon in attacks where intellectual property is the target. Implementing a Data Theft or Data Loss Prevention (DTP/DLP) solution and monitoring will lessen the likelihood and potential impact of this type of attack," Settle said.
Join the CSO newsletter!
Error: Please check your email address.
Tags separationHacking TeamProtect the PrivilegedIDS/IPSNagiosNetwork Management Information System (NMIS)meltdownForcepointDLPmonitorMongoDBupdatesDTPgovernmentransomwaresubnetsAccesspatching
Source : www.cso.com.au/
0 comments:
Post a Comment