CyberheistNews Vol 4 #48 Dec 16, 2014
Scam Of The Week: Spike In Hoax News Spreading Malware
The year 2014 has seen a boom on hoax news stories, as these are particularly successful social engineering tactics used by hackers to get people to click on links, and worse, share the news with their friends and become part of the infection vector. Many of these hoax stories infect the device with some kind of malware. It's particularly bad at the moment.
As an illustration how hoax news has boomed, since Facebook's shift into becoming a major news platform, it attracted so much cybercrime interest that Facebook decided to cut a deal with ESET to automatically scan Facebook's user's devices for malware.
Facebook software engineer Chetan Gowda stated: "If the device you’re using to access our services is behaving suspiciously and shows signs of a possible infection, a message will appear offering you an anti-malware scan for your device."
It's obvious that not getting infected in the first place is by far the best way to deal with this, so I suggest you send this to your friends, family and employees. Feel free to edit any way you like, mentioning the KnowBe4 Blog would be nice but is not needed.
"At the moment, there is a spike in hoax news stories that spread malware and infect your phone and computer. The bad guys use all the tricks in their black book to get you to click on and share hoax stories with your friends. This happens on Facebook, popular websites, they are sent straight to your inbox, and even major news outlets are sharing them unthinkingly. So, be on the lookout for these five hoaxes:
- Stories that urge you to share something before you have even read them. Step away from that keyboard.
- Celebrity deaths are increasingly being used to shock people into clicking on links and making a zombie out of their PC or lock their smartphone with ransomware. Recent example: Will Smith.
- Very violent video news reports that draw your attention with "Warning: Graphic Content" and lurid titles like "Giant snake swallows zookeeper". Don't touch 'em.
- Outrageous stories about Facebook itself, like it will start charging for the service, it sells your personal information, a way to show you who looked at your page, or other claims that might upset you and click on a link.
- And last, especially in this season of charity, heart-rending reports about dying girls that beg you for "likes" so they can obtain drugs or hospital treatment. Think Before You Click!
Cybercrime is moving into mobile malware with astonishing speed so be especially careful clicking/tapping on suspicious things on your smartphone. Anything you received but did not ask for, watch out because your phone may get locked with mobile ransomware.
To train employees to be on the lookout for social engineering attacks year-round, use effective security awareness training. Find out how affordable this is for your organization:
http://info.knowbe4.com/kmsat_get_a_quote_now
Breaking News - 2 New Ransomware Strains
#1 OphionLocker
The first one is a new strain of ransomware named OphionLocker. It encrypts your data using strong open source Crypto++ Elliptical Curve Cryptography and then ransoms the files for about 1 Bitcoin. The infection vector is limited to hacked websites, utilizing exploit kits that hack into unpatched computers. The ransom amount varies between countries where the victim is located, with the U.S. having the highest rates.
A new wrinkle is that when a workstation is infected with OphionLocker, it will generate a unique hardware ID based on the serial number of the first hard drive, the motherboard's serial number, and other information. It will then contact the malware's Control & Command server via TOR site and check if this particular hardware ID has been encrypted already. When you go to the ransomware site, it will prompt you to enter your hardware id. Once entered it will display the amount of ransom you are required to pay and provide a Bitcoin address that you should send the payment to.
The good news: This ransomware does not (yet) securely delete your files or remove the shadow volume copies. Therefore it is possible to recover your files using a file recovery tool or a program like Shadow Explorer. For more information on how to do this, please see this section in the CryptoLocker guide over at BleepingComputer.
http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information#shadow
#2 TorrentLocker
The cybercrime gang behind TorrentLocker, a fast-growing strain of ransomware has earned $40 million between March and December 2014. Researchers from IT security company ESET have tracked the Bitcoin wallet that received the ransom payments, and since March a whopping 82,000 Bitcoins have been paid to that wallet.
TorrentLocker was first uncovered in August by iSight Partners and was seen to be using phishing attacks targeting the UK and Australia, but has since expanded its reach to target more countries including Italy, Czech Republic, Germany, and Turkey. It looks this is another eastern European cyber gang that is getting ready for their assault on the U.S.
From ESET's main office in Bratislava, malware researcher Robert Lipovsky said that the TorrentLocker was sophisticated with the cryptography aspect of the malware "done quite well", using AES with 256-bit keys, and those keys are stored on a remote sever meaning there is no way of decrypting the victim' s files like CryptoWall. ESET plans to publish an extensive report on the development of TorrentLocker next week.
The message is patch your systems diligently, be religious about Backup/Restore and step your users through effective security awareness training to make sure they don't fall for social engineering tricks.
Ransomware on National Public Radio: To Pay Or Not To Pay?
This is an excellent item to send to your management, it will get them some exposure to the recent ransomware explosion and make the threat real to them.
Aarti Shahani, the tech reporter of National Public Radio created a compelling story about the scourge of ransomware that is taking over America. The title of the story is: "Ransomware: When Hackers Lock Your Files, To Pay Or Not To Pay?"
She started out with: "A lot of computer viruses hide inside your system. Hackers stealing your data go out of their way to operate quietly, stealthily, under the radar.
"But there's another kind of attack that makes itself known — on purpose. It sneaks into your network and takes your files, holding them for ransom. It's called ransomware, and, according to cybersecurity experts, this kind of attack is getting more sophisticated.
Stick 'Em Up
"Eric Young, who manages the computer network for a small business in Hermitage, Tenn., got a call from work. It was a Monday morning and, he says, it was "a very bad way to start the week."
"Somebody in the office opened an email that looked legit. "It has the exact background of like PayPal," Young recalls, "and it says, somebody paid you money."
"The employee clicked the link, and out popped a red alert that took up most of the screen. It was a threat: Pay ransom to an anonymous hacker, or all the files in the company network will be encrypted — locked up with a digital key that's so strong, no one can open them ever again."
I was also interviewed for this story and KnowBe4 is mentioned in both the article and the radio interview, about how we help organizations to pay ransom that have been infected and have no or failed backups.
Again, this is a great story to forward to management, either the website or the radio interview. It makes the problem of ransomware very real! Here is the link:
http://www.npr.org/blogs/alltechconsidered/2014/12/08/366849122/ransomware-when-hackers-lock-your-files-to-pay-or-not-to-pay?
Quotes of the Week:
"The secret of genius is to carry the spirit of the child into old age, which means never losing your enthusiasm." - Aldous Huxley, Novelist
"Too often we underestimate the power of a touch, a smile, a kind word, a listening ear, an honest compliment, or the smallest act of caring, all of which have the potential to turn a life around." - Leo Buscaglia, Author
Thanks for reading CyberheistNews! But if you want to unsubscribe, you can do that right here [UNSUBSCRIBE]
Warm Regards, Stu Sjouwerman | Email me: feedback@knowbe4.com
What's Really The #1 Hot InfoSec Topic?
There is an enormous amount of noise in the security space, so how do you know what people really talk about and think is the most important topic? Well, we created the Hackbusters site for that. Hackbusters grabs feeds from hundreds of security sites, blogs and other sources.
We track which topics are most liked, shared, retweeted and favored, and we built an algorithm that bubbles up the -real- hot topics. We tweet when a #1 hot security topic bubbles up. Follow this new channel called @Hackbusters on Twitter and you will get tweets with the actual breaking hot security news:
https://twitter.com/hackbusters
PS: If you want this data via a browser instead of twitter, you can go here:
http://hackbusters.com/breaking
Ransomware Beats APT In Terms Of Severe Impact
MalwareBytes Research showed that in the year 2014, 82% of companies were attacked online. Their research also showed that browser vulnerabilities will be the biggest challenge going forward in 2015.
But the most salient point that came out of this research was that the threat from ransomware to the enterprise environment was shown to weigh heavily on the minds of those whose businesses were infected.
Despite being the least prevalent specific threat in terms of overall numbers, Infosec pros who did experience ransomware rated it as most severe in terms of impact, beating even APTs.
In addition, the survey outlines growing concerns around traditional security suites. An overwhelming majority of respondents, 84%, agreed that traditional anti-virus has become less effective in the face of modern threats. This has seemingly forced those in charge of security budgets to consider a layered approach, with 78% of businesses questioned planning to deploy multiple endpoint solutions by the end of 2015.
“It’s sobering to see such a large number of companies suffering from attacks,” said Marcin Kleczynski, CEO of Malwarebytes. “The growing concerns over browser vulnerabilities are a particularly notable trend, speaking volumes about their effectiveness as an attack method. Given the ever-advancing threat landscape, it should be obvious by now that an endpoint security strategy built around a single traditional anti-virus solution isn’t enough.”
It is clear that antivirus can't keep up anymore. It's time for additional layers at the endpoint. Obviously MalwareBytes is a good idea, but you should also think about whitelisting technology that only allows known-good code to run. Full article at DarkReading:
http://www.darkreading.com/endpoint/82--of-companies-attacked-online-in-2014-malwarebytes-research/d/d-id/1318004
Phishing Quiz: Can You Spot A Scam? Don't Be So Sure
CBSNews wrote: "Phishing emails have gotten so convincing that even the experts can be taken in by a well-crafted fake. That's what executives at Intel Security discovered when they circulated a version of their Email Phishing Quiz to 100 attendees at the RSA Internet security conference earlier this year.
"The quiz displayed 10 real emails collected by analysts at McAfee Labs -- some of which were legitimate correspondences from major companies, and some of which were phishing emails that look amazingly believable -- and asked, real or ruse?
"Even if you're a security professional, it's hard to just look at these emails and say whether they're phishing or not. Every single one looks like a good email," said Gary Davis, vice president of global consumer marketing (a.k.a. Chief Consumer Security Evangelist) for McAfee, which is part of Intel Security.
On average, industry insiders were only able to pick out two-thirds of the fakes. A slim six percent of quiz-takers got all the questions right, and 17 percent got half or more wrong. Remember, this is their job. Would you fare any better? Take the quiz in the article to find out, I only found out at the end you can hover over the links to see where they go to, so I only got 80% right. You will probably do better!
http://www.cbsnews.com/news/mcafee-intel-security-phishing-quiz-can-you-spot-a-scam-dont-be-so-sure/
eWeek Alerts IT Pros About Self-Replicating Ransomware
Wayne Rash at eWeek picked up on the news and explained to his readers that this is a nasty new hybrid ransomware strain that needs to be protected against rather sooner than later. He has a few good hints and tips regarding this and it's a recommended story to read and forward to your friends:
http://www.eweek.com/security/new-self-replicating-ransomware-poses-threat-to-corporate-networks.html
More About The Sony Hack, And They Were Not The First
Famous IT columnist Robert X. Cringely at BetaNews wrote: "Sony was hacked because some president or vice-president or division head or maybe an honest-to-God movie star didn’t want something stupid like network security to interfere with their [..] workplace obsession. Security at Sony Pictures wasn’t breached, it was abandoned, and this recent hack is the perfectly logical result.
"I used to run IT for Sony Pictures Digital Entertainment", confirmed a guy named Lionel Felix in a recent blog comment, "and (I) know that there were a number of simple vectors for this kind of attack there. They ran IT there like a big small office with lots of very high-maintenance execs who refused to follow any security protocols. I’m surprised it took this long for this to happen". More:
http://betanews.com/2014/12/10/executive-ego-and-the-sony-pictures-network-hack/
More astounding is the news that last February, Iranians hacked into the Sands Casino after the CEO Sheldon Adelson said Iran needed to be nuked, and the Iranians hackers destroyed thousands of machines.
"What I would do," Adelson said during a panel, rather than negotiating, "would be to say, ‘Do you see that desert over there? I want to show you something.’ You pick up your cell phone and you call somewhere in Nebraska and you say ‘OK let it go.’…Then you say, ‘See? The next one is in the middle of Tehran."
This statement given by Adelson circulated on all over the Internet and reached Iran’s Supreme Leader Ayatollah Ali Khameeni, who responded two weeks later and said that the American government should "slap these prating people in the mouth and crush their mouths."
The cyber attack occurred 10 months ago but the details of damages were not publicized until Bloomberg Businessweek exposed it in a story last Thursday. Hackers crippled thousands of servers and workstations across the network of the giant Las Vegas Sands Casino by wiping them with highly destructive malware. Ouch. Here is the story:
http://www.businessweek.com/articles/2014-12-11/iranian-hackers-hit-sheldon-adelsons-sands-casino-in-las-vegas
PCI Compliance - What's "Significant Change" And "Periodic" Mean?
No words or phrases in the PCI standard elicit more comments and questions than “significant change”, “periodic” and “periodically”.
So what do these mean? Whatever you want to define them to mean as it is up to each organization to come up with formal definitions. Those definitions should be based on your organization’s risk assessment.
Very similar to NIST wording of 'organizationally defined frequency' peoples mindset has to change from implementing a checklist of things to implementing reasonable and expected controls to protect sensitive information. Here are some suggestions as to appropriate definitions...
http://www.infosecisland.com/blogview/24129-Significant-Change-And-Periodic.html
Report Says Business Lags In Security Awareness Training
Shirley Siluk at CIO Today wrote: "If 2014 could be described as the 'Year of the Breach,' it's also the year in which companies of all sizes need to realize that IT security is a "full-on business imperative."
That's the key lesson for business leaders offered in Trustwave's just-released 2014 State of Risk report. Despite the many recent high-profile data breaches, including Sony Pictures Entertainment, Home Depot and Target, a large part of organizations aren't as careful as they could be when it comes to protecting financial and payment data, intellectual property and network access, according to the report, released by cybersecurity firm Trustwave.
Many are also lagging in security awareness training, incident response procedures and patch management. Trustwave surveyed 476 IT and security professionals --most of them in the U.S., the U.K. and the United Arab Emirates -- from July 2013 to November 2014. More:
http://www.cio-today.com/article/index.php?story_id=021000C6SI5F
Experts: The Human Factor Key Challenge To Information Security
The lack of awareness and understanding of risks is one of the biggest challenges to information security, according to a panel of experts.
Research showed that 93% of data security breaches between April and June 2014 were due to human error, attendees of the inaugural (ISC)2 EMEA Security Congress in London were told.
"Nearly half of those incidents involved data being emailed to the wrong recipient,” said Ray Stanton, security adviser and executive VP of professional services at BT.
No matter how good the IT security team and the technology is, security will remain weak if information security professionals fail to influence people in the business to get the basics right, said Stanton.
Information security awareness training should be a mandatory part of induction training for everyone who joins an organization, said former UK home secretary David Blunkett. More:
http://www.computerweekly.com/news/2240236390/The-human-factor-a-key-challenge-to-information-security-say-experts
Cyberheist 'FAVE' LINKS:
This Week's Links We Like. Tips, Hints And Fun Stuff.
Need a 1:28 min adrenaline shot? Watch this full screen, HD with sound up. Professional skier Cody Townsend descends 2,000 feet through a vertical chute in Alaska’s Tordrillo mountain range:
http://www.flixxy.com/worlds-narrowest-ski-descent.htm?utm_source=4
A Eurofighter Typhoon being filmed as close as it gets from the open hatch of a Lockheed C-130 Hercules four-engine turboprop transport plane:
http://www.flixxy.com/close-encounter-with-a-eurofighter-typhoon.htm?utm_source=4
Sos Petrosyan is a lucky guy - his wife Victoria can change into 16 different 'haute couture' dresses in two minutes:
http://www.flixxy.com/high-speed-costume-change-guinness-world-record-winners.htm?utm_source=4
More magic: A magician who got stopped for speeding performs such an amazing trick that the policeman forgets to write him a speeding ticket:
http://www.flixxy.com/amazing-magic-trick-gets-magician-out-of-a-speeding-ticket.htm?utm_source=4
An amazing Christmas light show at the Storm family home in Austin, Texas with over 25,000 lights blinking to the tune of 'Let It Go.':
http://www.flixxy.com/frozen-christmas-lights-let-it-go-2014.htm?utm_source=4
The US Embassy Warsaw (Poland) celebrates the holidays with a lip dub of Mariah Carey’s "All I Want For Christmas Is You." Cute:
http://www.flixxy.com/us-embassy-warsaw-all-i-want-for-christmas-is-you-lip-dub.htm?utm_source=4
Unsuspecting shoppers got a big surprise while enjoying their lunch. Over 100 singers took part in this awesome Christmas improv. Bravo for an inspired performance. Händel would be pleased:
http://www.flixxy.com/christmas-improv-hallelujah-chorus.htm?utm_source=4
An ingenious driver from Belovo, Russia, takes care of a flat tire by simply replacing it with a sled:
http://www.flixxy.com/russian-driver-fixes-flat-tire-with-a-sled.htm?utm_source=4
In a galaxy far, far away, Han Solo (Taran Killam), Princess Leia (Bobby Moynihan) and Luke Skywalker (James Franco) face a new foe - Old age:
http://www.flixxy.com/snl-star-wars-teaser-trailer-parody.htm?utm_source=4
National Geographic combined 38 triggers and 71 moving pieces such as a Volkswagen Beetle, globes, tires and bowling pins into a 4-ton scientific contraption. FUN:
http://www.flixxy.com/national-geographics-rube-goldberg-machine.htm?utm_source=4
Here is a fun new way to sell your house.... I guess. :-D
http://youtu.be/D2QOtnLdnLQ
A new planned for 2016, 1,000 mph car tests its rocket engine. Whoa!
http://arstechnica.com/cars/2014/12/1000-mph-car-tests-its-rocket-engine/