Wednesday, 27 July 2016

NATO on Cyber Defence : Time To Level Up

In a recent Warsaw Summit held by NATO , between 8th – 9th July, 2016,  among many issues a Cyber Defence Pledge was issued. In their press release of 8h July discussing the points of this Pledge.

The cyberspace has become a huge layer for threat in recent years with much of the economy, administration, society, communications and other crucial infrastructure being dependent on ICT systems for the efficient functioning. A few years ago, cyber-attacks would be more against financial institutions and surveillance was just someone stalking your social media, though the NSA showed us how to be the creepiest stalker of all times. But today, in the age of Cyber-warfare, tools can disrupt, damage and destroy any Government’s decision-making and protective capabilities.

Just two years ago, NATO website was affected by a cyber attack which blocked it. The huge amount of attack on German stateside computers, the attack against Ukraine power plants, the Stuxnet which was aimed at nuclear power plants, the propagation of radical ideologies through internet to carry out bombings and terrorism or mass surveillance of critical infrastructure are just a few examples of the size of the threats and the implications they could have on state security.

Thus, to defend against such cyber-attacks, NATO has decided to work towards a cooperative Cyber Defence where detection, analysis, prediction, strengthening and information sharing through real time “Malware Information Sharing Platform”  would jointly help towards better security. NATO’s Rapid Response Teams, Cyber Threat Assessment Cell and other expert bodies are ready to make a citizen’s in NATO allied countries cyber-safe.

Having signed the Technical Arrangement on cyber defence with European Union in February,2016 and intensifying industry cooperation through the NATO Industry Cyber Partnership , the bold steps seem towards solidifying and making cyber resilience and firm model. The experts in the Cyber Defence Committee who are subordinate to the North Atlantic Committee for governance, policy and oversight seems to have privacy in mind. But for now the details are not clear. The NATO Military Authorities (NMA) and NCIA , the N3C Board and the NCIRC Technical Centre in Belgium are here working towards this cyber defence activities.

The Cyber Defence was put forward in the 2002 Prague Summit but has taken massive attention recently when considering the attack surface of cyber-attack has increased., with countries developing the cyber weapons arsenal.

Many organizations, including NATO, are working on what defines an act of Cyber War, and though  vagueness is still there when it comes to its understanding. Even the United States will be deliberating on The Cyber Act of War Act soon to set definite understanding of it.
In closing look at why Cyber Defence is key by observing some data.
  • About 60 countries are developing tools for computer espionage and attacks.
  • 29 countries have an formal military or intelligence unit for offensive cyber efforts.
  • 49 countries have bought off-the shelf hacking tools.
  • 63 countries have tools for surveillance form either domestic or international.
“The first casualty when war comes is truth” , but could the first casualty of Cyber-warfare be the Web ?

Cyber Security: Red Team, Blue Team and Purple Team

Whenever we discuss Information Security from a defensive point of view, we are inclined to think about protection, damage control, and reaction. However, adopting an attacker’s mindset can effectively help businesses enhance their chances of securing themselves against ever-changing threats.

In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious rivals and/or enemies to the “regular” forces, the Blue Team.

Basically, the Red Team relied on its own expertise to explore any possible way to plan and carry out an attack – thus trying to espouse the standpoint, the attitude of potential assailants. Such simulations aimed at both reproducing a real emergency and improving the troops’ ability to fend off an aggression.At the same time, Blue Team members were trained and expected to detect, to oppose and to weaken the Red Team’s efforts.

All of these concepts have been given a peculiar status in the Cybersecurity field, as well: in this case, the Red Team’s hostile activities take the form of sophisticated penetration tests, whose results constitute a reliable assessment of a business/organization’s defensive capabilities and its safety status. Generally speaking, the Red Team is given a very specific task – for example, evaluating the possibility of accessing sensitive data stored in a database.

In such a scenario, the group would have to act as an external threat actor, by recognizing any opportunity to exploit bugs and weaknesses of the infrastructure, the target being the extraction of the required pieces of information.

Meanwhile, the Blue Team would be in charge of any defensive step. The Red Team is supposed to both identify any vulnerability in the PPT (People, Process and Technology)defensive system and help the organization improve its own defensive abilities. While the Red Team’s role is usually well-defined, the Blue Team’s (and hence, the SOC analysts andresponse handlers‘) task is mutable, it is not known a priori: therefore, the former’s simulated assaults are expected to test and enhance the latter’s skills, igniting a virtuous circle.

The Blue Team’s work routine includes accessing log data, using a SIEM, garnering threat intelligence information, performing traffic and data flow analysis; we may compare their mission to finding the well-known needle in the haystack…

On the other hand, Red Team members have to be aware of any potential opponent’s TTP (Tactics, Techniques, Procedures), which the Blue Team is expected to detect and counter.
While automation can prove to be useful at this stage, the Blue Team shouldn’t rely on technology alone: on both sides, human intuition, expertise and cleverness cannot be replaced (yet) – social engineeringtechniques (i.e. Spear phishing) being a strong reminder of this.

Let’s go back to our simulated data theft – in such a situation, Red Team members would have to act as relentless cyber criminals. A first step might be targeting a final user’s PC, thus getting useful credentials for gathering information from within the network. This could lead to an attempted privilege escalation, aimed at seeking privileged credentials which might grant access to the central database. Should said database be accessed, the effective data exfiltration could take place, usually via a network connection to the outside, to the Web.

The Blue Team should be able to notice such efforts, the lateral movements, and any typical step of the so-called kill chain as early as possible – basically, it ought to oppose the attack and prevent the Red Team from reaching its goal.

While this short overview might make the Team’s tasks look quite simple, this is not the case.
Red Team vs Blue Team – what makes their confrontation successful?
As we have seen, both teams have to accomplish complex tasks – but what makes their activities effective?

A crucial element for the Red Team’s success is its ability to espouse an aggressive mindset, a true hacker‘s point of view. Therefore, its members shouldn’t be chosen among those who have contributed (or are still contributing) to defending the business’s infrastructure, as it would produce a patent conflict of interest which could stifle a genuine hostile effort and a fair security assessment.
An “outsider mindset” is needed, and this necessity can be better addressed by relying on either external assistance or uninvolved personnel.

A real assailant is going to overlook any rule, etiquette and ethical issue (he/she may be a terrorist, a criminal, or even a resentful former employee) – adopting such a mentality may be difficult.
In some cases, the confrontation between the teams starts as a pure abstract exercise, in a meeting room; however, this should just be the beginning – a real test entails real attacks, which cannot overlook the organization’s physical security.

Truth be told, reproducing a real-life scenario isn’t always an option – for example, a serious assault on critical locations and infrastructures might result in irreparable damage or even in human losses.
However, whenever possible, actual tests ought to be considered, and they should also focus on the weakest spot in the security system – human beings (i.e., the employees).
The Red Team may have the chance of observing the employees’ response to some given inputs – malicious e-mail attachments, a “strange” USB drive left in the HQ facilities (parking or restroom).given inputs – malicious e-mail attachments, a “strange” USB drive left in the HQ facilities (parking or restroom).

If the company has already issued its own security policy, the Red Team’s efforts will be able to assess the employees’ knowledge, awareness and discipline of it, and also the business’s capability of enforcing the rules. While the employees’ physical security and behavior must not be neglected, wireless networks compose another battlefield which deserves the utmost attention.
The migration from wired to Wi-Fi networks has been transparent and plain, despite the need for a distinct, specific security approach to each solution.

One of the most serious threats to wireless network is the so-called Wardriving, which paves the way for following malicious and exploitative activities.

Cooperation, Mutual Feedback and Continuous Improvement
The usefulness of the Red Team vs Blue Team approach lies in interaction and mutual feedback, in its ability to turn the challenge into a way to ameliorate an organization’s capability of detecting and counter threats.

Such a cooperation should strive for continuous improvement, the Blue Team should see the Red Team’s activities as an opportunity to understand potential assailant’s tactics, techniques, and procedures.

While a SOC’s failure to notice a breach may depend on its staff members’ shortcomings, it may also be the outcome of inadequate measures against really refined or even previously unknown methods.
The Red Team attack can expose these weaknesses before real criminals may take advantage of them. As each team has different purposes, their means will be different, too.
The Red Team is expected to master the use of offensive tools (for example, Meterpreter or Metasploit), to know what a SQL injection is, to employ network scanning tools (Nmap), to use scripting languages, to recognize router and firewall commands, etc.
On the other hand, the Blue Team is supposed to understand any single phase of an Incident Response, to master its own share of tools and languages, to notice suspicious traffic patterns, to identify the Indicators of Compromise, to use an IDS properly, to carry out analyses and forensic  testing on different Operating Systems.

A New Color on the Horizon
Since each team strives to reach its own goals – and, when defined, its own KPIs – having the two of them work synergically is not an easy task.
However, the ultimate aim is helping the business attain a higher level of security; therefore, a new Team – more correctly, a new “function” has been getting more and more attention.
This new actor, the “Purple Team”, would have to maximize and guarantee the effectiveness of the “traditional” groups’ activity, by combining the Blue Team’s defensive routine with the weaknesses exposed by the Red Team, thus producing coherent efforts aiming at maximizing the results and common, business-led KPIs and metrics.

References:

Tuesday, 26 July 2016

Expect more hack attacks in SA - Anonymous

Hacktivist group Anonymous Africa says it has inspired others to launch cyber attacks for political purposes in South Africa and across the region.
Anonymous is a loose global network of hackers who launch attacks on targets for activist purposes. Their targets have previously ranged from the Vatican to the Ku Klux Klan (KKK).
This year, a group dubbed Anonymous Africa has launched hack attacks on websites belonging to the SABC and the Gupta-owned Oakbay Investments.
Anonymous Africa targeted the SABC for censorship at the broadcaster while the group attacked the Gupta websites because of corruption allegations swirling around the family.
Amid protests in Zimbabwe this year, Anonymous Africa has also claimed responsibility for the downing of the likes of the Zanu-PF website.
And Anonymous Africa has told Fin24 that it expects other hackers to take up similar causes in the region.
“There will be a lot more attacks coming and not from us, we have started traction, just like we were inspired by the work of The Jester, hopefully others will follow our example,” said Anonymous Africa in an email to Fin24.
‘The Jester’ is an unidentified computer hacker who has previously claimed responsibility for attacks on the likes of WikiLeaks.
“As long as the rule of law is not complied to from the top, don’t expect those at the bottom to comply,” Anonymous Africa said.
Anonymous Africa also said that it is currently “very focused on the ground war in Zimbabwe” amid recent civil protests in that country.
“Our activists are busy with reality. The attacks helped amplify the #ThisFlag movement and we hope to use that as the catalyst to bring spring to our part of the world,” said Anonymous Africa.
“We still have not gone after the ANC like we promised, and we are not politicians, so we like keeping to our promises, we are just distracted by what is happening on the ground now which is very close to our lives,” said the group.
Separate Armscor attack
But Anonymous Africa is seemingly not the only hacktivist group targeting South African websites.
Earlier this month, a separate group of Anonymous hackers using the #OpAfrica flag leaked data belonging to South African arms supplier Armscor.
“We are not involved in #OpAfrica. We support them as long as their activities are in the public’s interest and not pushing special interests,” Anonymous Africa told Fin24 in an email interview.
Anonymous Africa told Fin24 that it thought the Armscor hack was “impressive” and that it “looks like people took advantage of the noise we created”.
“We avoid Armscor and Denel, but I am sure there are secrets there that need to be exposed,” Anonymous Africa told Fin24.
“So we support them as long as their intent is clear, however, we have noticed a couple of anons jumping on the bandwagon that have zero understanding of the local geopolitics that are hitting targets we do not agree with,” said Anonymous Africa.
Anonymous Africa has further said that its “main division” with the Anonymous #OpAfrica group centres on ideology.
In a blog post earlier this year, the Anonymous #OpAfrica group announced 'Operation Green Rights', which tackles corporations that push “GMOs (genetically modified organisms), wholesale processed foods and exploit Africa as well as her people and resources”.
“Anyone who is an anti-GMO nut - ie, going against the volumes of science - is someone we would rather not get too close with as we do not trust their reasoning abilities,” said Anonymous Africa.
Meanwhile, Fin24 has also recently contacted the Anonymous #OpAfrica group to ask if they are linked to Anonymous Africa.
“Anonymous is very loose and decentralised containing of many factions that have different views also there is no central command structure, this is linked as a anonymous action," the Anonymous #OpAfrica grouping told Fin24.

Tuesday, 12 July 2016

Anonymous ‘hacks’ Armscor website

UPDATE: Armscor has responded for comment saying the following in a statement:
"Armscor, the acquisition agency for the department of defence is aware of the data breach of its website. A team of cyber experts has been convened to conduct a forensic analysis to determine the full extent of this incident. This is to ensure that tighter measures and interventions are in place to prevent similar attempts from recurring. While the investigation is being undertaken, Armscor can confirm at this stage that information accessed does not contain sensitive and classified content."
Lulu Mzili, the general manager for marketing and business development, also said that Armscor is "aware of the increase in cyber threats, globally; hence IT infrastructure renewal is one of Armscor’s trategic focus areas.” 
Johannesburg - Hacktivists claiming to be linked to Anonymous have breached the website of South African government owned arms supplierArmscor.
The hacktivists, working under the banner of ‘Operation Africa’, told website HackRead.comthat they breached Armscor’s settlement and invoicing system.
Armscor is the officially appointed acquisition organisation for the South African department of defence.
The hacktivists allegedly used a “simple SQL injection” to breach this data and leak 63MB in HTML files on the dark web - a part of the internet that is not made public.
The files are said to include ordering and payment details for companies ranging from Airbus, Thales Group, Rolls Royce and Denel.
The Anonymous hacker also told HackRead.com that the hacktivists have access to 19 938 supplier IDs, names and their passwords.
These passwords allow anyone to log in to the Armscor system as supplier or manager.
Meanwhile, Armscor told Fin24 that it is still investigating the alleged hack and that it will comment further on the matter later on Tuesday.
"I don't have any comments currently because we are still verifying the situation,” Lulu Mzili, general manager for marketing and business development at Armscor told Fin24.
"So, I don't have any comment for now,” Mzili told Fin24.
Armscor has come under the spotlight recently for issues such as a controversial tender for the lease of an intercontinental VIP Aircraft for government.
Earlier this year, Anonymous hacktivists under the Operation Africa or ‘#OpAfrica’ banner also announced their plan to target ‘corrupt’ African governments.
The group also said that “Operation Green Rights, run by Anonymous SA, has been tackling many corporations that push GMOs (genetically modified organisms), wholesale processed foods and exploit Africa as well as her people and resources.”
Meanwhile, a seemingly separate group of hacktivists dubbed Anonymous Africa also targeted websites belonging to the SABC and the controversial Gupta family last month.
But in a tweet last week, Anonymous Africa distanced itself from the #OpAfrica hackers.
“We are not involved with #OpAfrica and their anti-GMO hysteria. Our targets are corrupt governments and corrupt corps, not science,” said Anonymous Africa.

Tuesday, 5 July 2016

Hacker found a flaw in the UK Defence Gateway that exposes army data

The security researcher from Government Lab Mohammed Adel has found a vulnerability in the UK Defence Gateway, an application only for the staff use, that could be exploited by attackers to gain access to the system as a staff member.
Mohammed Adel told me that he exploited the vulnerability in a kind of Filtering Bypass attack, He was able to get into the UK Defence Gateway without using the @MOD.uk email, a condition implemented to allow the authentication only the internal staff.
Below image the researcher shared to proof the existence of the bug.
UK Defence Gateway bug
The hacker was able to view the material used by the UK Defence to train its personnel, he accessed the private lessons that the Defence Gateway delivers to its staff. Adel was also able to access other information, including news and the internal announcements.
This Defence Gateway is a platform used by all of the army units, it is also used to allow the Defence UK staff can communicate privately. I reached the hacker for a comment:
“The severity of this Vulnerability has allowed me to see the sensitive information, including training army data that could allow attackers to study the tactic British Defence. A hacker can exploit the vulnerability to to access the information and sell it to threat actors.”
“I can’t tell how I have found the vulnerability, it’s a classified issue, but the vulnerability is kind of Filtering Bypass attack and redirect files” 

SA votes against internet freedoms in UN resolution

South Africa has joined China and Russia in voting against a United Nations (UN) resolution on the “promotion, protection and enjoyment of human rights on the internet”.

On Friday, the UN held a vote on the resolution, which seeks to bring political commitment from member states to protect human rights online such as freedom of expression and privacy.
The resolution further seeks to ensure the release of those imprisoned for the “legitimate” freedom of expression online.
Other key points of the resolution include investigating attacks against bloggers or other internet users, and refraining from preventing access to information online by, for example, shutting down the internet during key times such as elections or terror attacks.
Countries such as Russia and China requested four amendments to the draft resolution to remove, for instance, text on freedom of expression and the shutting down of internet access.
However, the amendments weren’t adopted and most countries voted for the human rights resolution, which will be adopted by the UN Human Rights Council (UNHRC).
But the results of the vote have put the spotlight on some nations’ commitment to internet freedoms.
“We are disappointed that democracies like South Africa, Indonesia, and India voted in favour of these hostile amendments to weaken protections for freedom of expression online”, said Thomas Hughes, the executive director of global free press organisation ARTICLE 19.
The resolution, meanwhile, was written and supported by countries ranging from the likes of Australia, the US, UK, Nigeria, Senegal and Turkey.
“A human rights based approach to providing and expanding internet access, based on states’ existing international human rights obligations, is essential to achieving the Agenda 2030 for Sustainable Development, and no state should be seeking to slow this down,” Hughes added.
Apart from South Africa, India and Indonesia, other countries that voted in favour of the amendment and against the resolution included the likes of Kenya, Qatar, Russia, China, Cuba, Venezuela and Saudi Arabia.
Independent watchdog organisation Freedom House rates China and Russia as not having free press environments with censorship being present in both countries.
South Africa, though, has joined Russia and China in previous controversial votes at the UN.
In November last year, South Africa voted against adopting a resolution that would recognise threats against defenders of human rights.
South Africa also forms part of the 'Brics' bloc, an economic alliance that includes Brazil, Russia, India and China. 

Saturday, 2 July 2016

Pawn Storm APT group targets thousands Google Accounts

The Pawn Storm APT group is once again in the headlines, this time the hackers targeted a significant number of Google accounts belonging to individuals in Russia, former Soviet Union countries, the United States, Europe. Security experts follow a long time the operations of the Russian-linked Pawn Storm cyber spies, aka APT 28, Sednit, StrontiumSofacyFancy Bear and Threat Group-4127.

In October 2014, security experts at Trend Micro spotted a cyber espionage operation targeting military, government and media agencies across the world.
Pawn Storm APT group Google accounts hacking
In May researchers at Trend Micro discovered that Pawn Storm threat actor targeted the political party of Chancellor Angela Merkel, the Christian Democratic Union. Now security experts at SecureWorks reported that Pawn Storm targeted more than 4,000 Gmail accounts between October 2015 and May 2016. Among the people targeted by the hackers there are also individuals working for or associated with the DNC and Hillary Clinton’s presidential campaign.

In June 2016, CTU experts  published a detailed analysis of a TG-4127 campaign that targeted email accounts linked to Hillary Clinton’s 2016 presidential campaign and the U.S. Democrat National Committee. The researchers noticed many similarities with a 2015 spearphishing campaign that targeted more than 1,800 Google Accounts.

“The threat group used the Bitly URL-shortening service to hide the location of a spoofed Google login page. Many of the accounts in the 2015 campaign belonged to individuals in Russia and the former Soviet states, but some belonged to current and former military and government personnel in the U.S. and Europe, individuals working in the defense and government supply chain, and authors and journalists, particularly those with an interest in Russia.” states the report published by the SecureWorks.

The experts believe that the Pawn Storm APT group was gathering intelligence from military personnel, authors and journalists, NGOs, and individuals involved in government and defense sectors and political activists. Most of the victims of this last campaign where people from the United States and NATO member countries.

CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September 2015. The bad news is that 59% the recipients accessed the URL and opened the phishing page. We have no certainty that the Google Accounts were compromised.
Most of the targeted accounts received multiple phishing URLs, 35% of the accounts that accessed the malicious links were not subject to additional attempts, a circumstance that suggests the accounts were successfully compromised.

“Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.” states the report.
The Pawn Storm APT group exploited users’ bad habits to don’t check the full URL associated with URLs generated by a URL-shortening service.
It is crucial for organizations to assume a proper security posture, educating users about the risks of spearphishing and shortened links.

Facebook malware infected more than 10,000 users in two days

Security experts from Kaspersky monitored a phishing campaign that hit Israeli media since June 26th.
facebook malware phishing
Thousands of Facebook users reported that they had been infected by a malware spread through the Facebook platform after they received a message from a friend claiming they had mentioned them in a comment.
“On the morning of 26th June, news of a phishing campaign hit the Israeli media. Thousands of Facebook users complained that they had been infected by a virus through their accounts after they received a message from a Facebook friend claiming they had mentioned them in a comment.” reported Kaspersky.”The Kaspersky Security Network (KSN) recorded almost ten thousand infection attempts around the globe in the space of just 48 hours.”
facebook malware fake notification
The researchers that investigated the issue confirmed the attack and discovered that numerous infections were observed also Brazil, Poland, Peru, Colombia, Mexico, Ecuador, Greece, Portugal, Tunisia, Venezuela, Germany.

The researchers explained that the Facebook malware was spread in a two-stage attack:
In the first stage when the victim clicked on the “mention,” a malicious file seized control of their browsers, terminating their legitimate browser session and replacing it with a malicious one that included a tab to the legitimate Facebook login page. Of course, the fake login page was used to steal login credentials to the victims. When the victims logged in into the Facebook account, their session was hijacked in the background and a new file was downloaded. This represented the second stage of the attack, as embedded in this file was an account-takeover script that included a second stage of the attack, a script embedded in the file downloaded in the first stage is executed. The script allows the attackers to take over the victim’s account script, is included a privacy-settings changer, account-data extractor and other utilities that could be used for further malicious activities, like spamming and generating fraudulent ‘likes’ and ‘shares’.

After logging in, the victims can see that the attack is launched against the user’s entire Facebook list. All the victims’ friends receive a notification by the victim about a new URL. Upon clicking on this URL, the user’s friends will also be infected by the Facebook malware too and the attack chain loops again.
The Facebook malware mainly targeted users with Windows-based machines, but also those using Windows OS phones could have been at risk too. Android and iOS users were not impacted since the Facebook malware doesn’t user libraries compatible with these mobile OSs.

Bad story, isn’t it? Do you want to know if have been infected by the Facebook malware?
Kaspersky suggests the following actions to check if the Facebook malware compromised your account too:
  • Open your Chrome browser.
  • Look for the extension named thnudoaitawxjvuGB.
  • For a more thorough check, click Start > Run > copy the following command:%AppData%\Mozila if the folder and files such as “autoit.exe” and “ekl.au3” are in it, the computer is infected.