Category Archives: Internet Security
EHGO to Apply for Iconic Labs Administrators to Be Removed, General Meeting to Proceed – Business Wire
LUXEMBOURG--(BUSINESS WIRE)--European High Growth Opportunities Securitization Fund (EHGO), an institutional investment fund based in Luxembourg, has announced that it will be making an application for the Iconic Labs (Iconic) administrators to be removed and for Iconics General Meeting (GM) to proceed.
In the statement, EHGO said: As previously announced, we wrote to the administrators informing them that we would pay the debt of 184,295.04 demanded by the secured creditor which appointed them, and requesting that they vacate office. We also communicated our view that their cancellation of Iconics GM was a breach of their duties, given that holding the GM is necessary for the company to have a viable financial future.
As we have received no substantive response, and given the wider circumstances, we will be making an application to the High Court on the grounds that the administrators were appointed with an improper motive and seeking to remove them from office. Interim relief will be sought to enable the GM to proceed, either on 15 June 2021 as originally planned, or on a later date.
We believe that it is now likely that the GM will go ahead, whether on 15 June or a later date. We believe it is critical that shareholders vote on the resolutions set out in the original notice for the GM which are necessary for Iconic to have a viable financial future.
We would therefore urge shareholders to appoint a proxy by completing the Form of Proxy sent to them with the shareholder circular, naming the chair of the meeting as their proxy. This needs to be received by 2pm on Friday 11 June. It can be sent to the companys registrars, SLC Registrars, at proxy@slcregistrars.com.
As previously noted, we were in discussions with Iconic to provide substantial new financing arrangements involving a facility of up to 50 million and have tremendous faith in the vision for the company set out by CEO Brad Taylor to be a cutting-edge media, data, information, internet, security and technology company. We hope that shareholders in the company will join us in supporting this vision and passing the necessary resolutions at the GM.
Should shareholders wish to attempt to obtain information from the administrators, for ease of reference their contact details are:
Mr Hugh Jesseman & Mr Antony BattyAntony Batty & Company LLP3 Field Court, Gray's Inn, London WC1R 5EFEmail: hugh@antonybatty.com & antonyb@antonybatty.com Tel: +44 (0)207 831 1234"
Ends
Notes to editors
About European High Growth Opportunities Securitization Fund
European High Growth Opportunities Securitization Fund is an institutional investment fund based in Luxembourg which focuses on financing innovative companies globally that are deemed to be significantly undervalued.
Read more here:
EHGO to Apply for Iconic Labs Administrators to Be Removed, General Meeting to Proceed - Business Wire
These iPhone apps have scammed people out of millions – Komando
Apple prides itself on a strict app review process, but it seems even the strongest measures cant stop scams from slipping under the radar. A recent report from the Washington Post exposed some glaring holes in the App Stores defense. Reporters said nearly 2% of the 1,000 highest-grossing apps were a form of scam.
This news comes after Apple claimed its stopped over $1.5 billion in potentially fraudulent transactions in 2020. Despite its best efforts, Apples store is still vulnerable to app scams and they cost users like you a ton of money. In fact, market research firm Appfigures says fraudulent apps defrauded users out of around $48 million.
The worst part about these apps is how hard they are to spot. They can pop up as fun and exciting apps on entertainment, news, or exercise or they can even claim to boost your cybersecurity (while in reality, theyre just weakening your defenses). Since it seems scammy apps are here to stay, weve got some helpful tips you can use to recognize dangerous ones.
Many of them masquerade as real companies, hoping you wont notice the names are slightly different.
For instance, if you own a Samsung television, you can go to your iPhones App Store to download the remote control app SmartThings. One software engineer named Simon Willison told the Washington Post that he found an app called Smart Things.
Learn the tech tips and tricks only the pros know.
Notice the difference? Two apps popped up: one with a space and one without. The copycat app, Smart Things, will charge you $19. Fall for the trick and youve lost money as well as your faith in Apples review process.
Willison told the Washington Post his trust in Apples review process tricked him into dropping his hard-earned cash. By assuming the App Store was thorough enough to recognize and expel fake apps masquerading as the real deal, he was down $19.
I thought, Wow, Samsung has gone downhill. Theyre nickel and diming me for my remote control?'
Let this be a lesson to you. When youre looking up apps, dont let your eyes glaze over the titles. Many copycat apps rely on you not double-checking the title. Thats an easy way for you to fall into big trouble.
Its similar to the concept of typosquatting. Its also known as URL hijacking when a bad faith actor misspells a popular domain name to garner traffic and scam visitors. Theyre banking on users misspelling URLs and other important information on the web.
Its such a big deal the Better Business Bureau sounded the alarm. But its not just for websites. App store tricksters use typosquatting to trick you into thinking theyre representing a trustworthy brand. That way, its easier for them to snatch your money.
Not all of these scams are this easy to spot, though. Others are confident enough to stand on their own without hiding behind the mask of a reputable company. Some will even buy fake customer reviews to trick users like you into thinking youre buying a good service.
Scammers gravitate towards spying and internet security apps. (Ironic, huh?) They also love to create fake dating apps, which makes sense people are less concerned with security when it comes to matters of the heart.
Many of these apps hide in plain sight. Some will steal your money, while others want to snatch a lot more than that. Here are some more scammy apps youll find:
As you can see, cheap or free VPN apps cant be trusted. Remember, if the service is free, youre most likely the product. Or worse. The app could be malicious and infect your device with malware. Thats why its important to use a VPN that you can trust.
We recommend trying the VPN that Kim trusts and uses. Our sponsor,ExpressVPN.Get 3 months free when you sign up for one year at ExpressVPN.com/Kim.
It looks like Apple has a lot of work on its plate. If it really wants to scrub viruses and scams away for good, its going to need some new techniques.
If you want to boost your iPhones security, weve got you covered. We gathered five tips and tricks for tweaking your iPhones settings in the name of safety. Tap or click here for new ways to secure your iPhone.
Use an iPhone? Best new features coming to iOS 15
Warning: Email promising protection from ransomware is actually malware
See the article here:
These iPhone apps have scammed people out of millions - Komando
Protecting a New Vulnerable Population on the Internet – Security Boulevard
On a Mission of Protecting
Abraham Lincoln is credited with saying that A lawyers time and advice are his stock and trade. Whether the quote is mis-attributed to Lincoln is irrelevant to the greater message, which is that attorneys are knowledge workers. To state it as bluntly as one attorney once explained to an executive where I worked, My knowledge will keep you out of jail. As a cybersecurity professional, you too are a knowledge worker.Many times, your job is probably occupied with advising rather than creating.This specialized knowledge and the sharing of it is what makes you the subject matter expert. Protecting others from the perils of the internet has always been the primary responsibility of cybersecurity professionals.
Whether working for a large corporation, a government agency, or in an individual capacity, helping others to become better educated about online threats has always been a core part of the job.
Of course, many non-security people (often our friends and family) think that a cybersecurity professional is someone who can fix their computer, and while that is true in many cases, recent newsworthy security events have raised awareness about the differences between the skills of a computer technician and that of a cybersecurity professional.Now, when a news organization interviews a computer security expert to explain a breach event, the exclamation, Oh, so thats what you do! is heard more often.
Do you recall just 10 years ago when the task of protecting the most vulnerable people on the internet meant going into schools to teach children about cyber-bullying prevention?At the time, young people who were newly joining the Internet community needed to be educated about the correct way (Read more...)
Read the original:
Protecting a New Vulnerable Population on the Internet - Security Boulevard
CIS Awards Cimcor With First-Ever Benchmarks Configuration Certification – pdclarion.com
MERRILLVILLE, Ind. and EAST GREENBUSH, N.Y., June 8, 2021 /PRNewswire-PRWeb/ -- Cimcor is pleased to announce that it is the recipient of the first-ever Center for Internet Security (CIS) Benchmarks Configuration Certification. The Center for Internet Security has provided this certification for the CimTrak Integrity Suite running on CIS CenOS Linux 7 Benchmark Level 1 and Level 2.
Providing a comprehensive set of security, auditing, and compliance tools to ensure the integrity of an IT infrastructure, the CimTrak Integrity Suite provides a streamlined way to bring Benchmark security to customers without impacting product, service, or system performance. The CIS Configuration Certified program certifies a product or service's configuration is in conformance with or can run in an environment configured to the CIS Benchmarks, which are consensus-based, vendor-agnostic, secure configuration guidelines for the most commonly used systems and technologies.
"We believe that systems that have been hardened in accordance to CIS Benchmarks, are the foundation of a secure infrastructure. We are proud to be the first security company to receive CIS Benchmarks Configuration Certification," said Robert E. Johnson, III, President and CEO of Cimcor, Inc. "This certification validates our commitment to CIS best practices and our commitment to creating world-class security software to deliver integrity, security, and compliance throughout the enterprise."
The new CIS Benchmarks Configuration Certification enables vendors to develop new products with the CIS Benchmarks built-in, tested, and certified at outset. Building this confidence into the products takes the guesswork out of knowing whether or not a CIS Benchmarks-hardened environment will work without impact.
"Cimcor has demonstrated a strong commitment in providing customers with the ability to ensure their assets are secured according to consensus-based best practice standards," said Curtis Dukes, CIS Executive Vice President and General Manager, Security Best Practices. "Their customers won't have to reconfigure anything because the certification has demonstrated it will work straight out of the box."
The new Configuration Certification pilot is open to a number of environments and use cases, including:
Cimcor develops innovative, next-generation, compliance, and system integrity monitoring software. The CimTrak Integrity Suite monitors and protects a wide range of physical, network, cloud, and virtual IT assets in real-time while providing detailed forensic information about all changes. CimTrak helps reduce configuration drift and ensure that systems are in a secure and hardened state. Securing your infrastructure with CimTrak helps you get compliant and stay that way. For more information, visit http://www.cimcor.com/cimtrak.
The Center for Internet Security, Inc. (CIS) makes the connected world a safer place for people, businesses, and governments. We are a community-driven nonprofit, responsible for the CIS Controls and CIS Benchmarks, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously refine these standards to proactively safeguard against emerging threats. Our CIS Hardened Images provide secure, on-demand, scalable computing environments in the cloud. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities, and the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), which supports the cybersecurity needs of U.S. elections offices. To learn more, visit CISecurity.org or follow us on Twitter: @CISecurity.
Read the original:
CIS Awards Cimcor With First-Ever Benchmarks Configuration Certification - pdclarion.com
Securing Industrial Automation and Control Systems Starts in Software Development – Security Boulevard
Following the IEC 62443 standard for security software development ensures quality, safety and security
The importance of industrial automation and control systems (IACS) to the critical operations we rely on cannot be overstated. From manufacturing of consumer and commercial products to power generation and water supply to HVAC for the offices where we once worked in before COVID-19 (well be back) to smart utility metering for our homes and so much more, these systems are essential to our lives and our economy. It goes without question that keeping these systems secure is a must.
A cybersecurity event targeting ICAS has the potential to have a devastating impact. And, as these devices and systems become smarter, more interconnected and exposed to the Internet, security challenges continue to rise and risk becomes exponentially greater. In fact as highlighted by its Year in Review 2020 report, industrial cybersecurity company, Dragos, saw a threefold increase of cyber threats to ICAS last year.
As stated earlier, these ICAS devices are becoming smarter. This is a result of more complex embedded software enabling remote functionality, automation and analytics. With more complex software, there are now more lines of code which can introduce N-day and 0-day vulnerabilities if not diligently tested throughout the software development life cycle (SDLC).
Thankfully, there are standards for developing secure software, such as IEC 62443, designed to help ensure software code embedded in ICAS devices is free of vulnerabilities. The IEC 62443-4-1 standard (Security for industrial automation and control systemsPart 4-1: Secure product development lifecycle requirements) defines specific requirements for using a secure development lifecycle in the design, implementation, maintenance and testing of products used in industrial automation and control systems.
GrammaTech together with Exida, a leading certification company specializing in ICAS functional safety and cybersecurity, recently issued a joint whitepaper, Using GrammaTech CodeSentry and CodeSonar to Improve Software Security and Comply with IEC 62443.
In this whitepaper, Exida details how GrammaTechs CodeSentry (Binary Software Composition Analysis SCA) and CodeSonar (Static Application Security Testing SAST) tools can be integrated into an ICAS suppliers SDLC and DevSecOps processes to help comply with the IEC 62443 standard.
Exida describes two major contributors to security vulnerabilities found in products today, which are implementation weaknesses in programs created in languages such as C and C++ and the use of Third-Party Software (TPS). The CodeSentry and CodeSonar tools can address both of these issues.
CodeSonar can be seamlessly integrated into the SDLC to continually find and remediate errors and vulnerabilities in code. With CodeSentry, you can perform a binary analysis to identify the open-source and third-party software components of the software to generate a software bill of materials (SBOM) and vulnerability report.
This whitepaper introduces common causes of security vulnerabilities including implementation programming weaknesses in programing languages and TPS. In addition, it describes TPS types, specific TPS security challenges and provides guidance on how to use the GrammaTech CodeSentry and CodeSonar tools in a workflow to select and manage TPS and overall product security.
If developing secure and vulnerability free code is your priority, we encourage you to the download and read our whitepaper.
To see CodeSentry and CodeSonar in action and how our solutions can solve your specific requirements, book an evaluation today.
*** This is a Security Bloggers Network syndicated blog from Blog authored by Christian Simko. Read the original post at: https://blogs.grammatech.com/iec-62443-securing-industrial-automation-and-control-systems-starts-in-software-development
Working from home blamed for rise in cyber hits on organisations – The Straits Times
While working from home has become the norm for many people amid the Covid-19 pandemic, it might have also caused many organisations in Singapore to fall victim to cyber attacks.
About eight in 10 public-and private-sector organisations here attributed such a working arrangement to a rise in cyber attacks across the board, said a report by software company VMware last week.
This is comparable to the global figure across 14 markets.
Nearly seven in 10 here said the attacks were serious enough to report to regulators or to call in an incident response team. Globally, this is higher - at eight in 10.
"Digital transformation programmes advanced rapidly as the cyber-attack surface expanded to include living rooms, kitchens, home networks and personal devices," explained principal cyber-security strategist Rick McElroy of VMware's security business unit.
Mr McElroy added that while remote employees' work laptops are usually well secured, home Wi-Fi networks used to go online can pose serious security risks.
"Updates to home router software are often overlooked, and many home networks do not have a firewall installed. These unsecured and unpatched networks can result in network security gaps," he said, pointing also to issues with the use of other Internet-connected devices on home networks for work.
The remote workforce behaves very differently from the office workforce - its members access the organisation's network at unpredictable hours as they strive to stay productive while caring for their families and following government restrictions.
This means network traffic has "changed beyond recognition", and organisations must adapt monitoring systems or risk leaving an opportunity for hackers to use atypical patterns to mask their infiltration attempts, Mr McElroy said.
What is key is that companies need to understand how people interact with technology, he said. This can include when an employee usually works, the applications he normally uses and the websites he commonly visits.
So for example, when an employee who usually works in California logs in 10 minutes later from Singapore, which is humanly impossible, the company knows something is amiss.
"Knowing this baseline helps better detect a malicious login," said Mr McElroy.
The VMware-commissioned study polled about 250 chief information officers, chief technology officers and chief information security officers here last December.
They came from the financial, healthcare, government, retail, manufacturing and engineering, food and beverage, utilities, professional services, and media and entertainment sectors.
The study found that organisations here reported more cyber attacks in the previous 12 months, with 64 per cent saying so.
About a year ago, the figure was 43 per cent.
More organisations globally saw more cyber attacks than those in Singapore in this year's report, with 76 per cent reporting this.
However, the Republic had more breaches on average per organisation - 3.3 versus 2.35 globally.
The leading cause of breaches reported here was a weakness in processes, with 22 per cent of respondents citing this. One example is companies not deploying patches on a regular basis.
The next top causes of breaches were using out-of-date security (20 per cent) and third-party apps (13 per cent).
Outdated security includes operating systems that are no longer supported by their developers, such as those found in manufacturing systems.
Some cases involved an old critical application that is not updated because doing so might mean taking vital systems offline.
These legacy systems and old apps could remain unpatched for vulnerabilities, and using modern security solutions to protect them is difficult at times.
Third-party apps that can lead to breaches include externally developed ones used for sharing files, which can allow crooks to access sensitive data if hacked.
These top causes of attacks generally boil down to how organisations' information technology and security operations teams interact and work in silos when solving issues, said Mr McElroy.
To address some of these issues, he advised organisations to have security in place "wherever and whenever humans interact with systems", including online programs and applications.
Kenny Chee
Follow this link:
Working from home blamed for rise in cyber hits on organisations - The Straits Times
[PDF] Internet Security Industry Growth Analysis, Segmentation, Share, Trend, Future Demand and Leading Players Updates The Courier – The Courier
Recent Updates of Internet Security Market 2021
The Internet Security Market throws light on business drivers, restraints, opportunities, challenges, and key statistics factors. The report has been designed and presented in the form of tables and figures and other statistical to generate higher reader perception. The research report study on important details about key players, current trends, future scope, development expansion strategies. The report also covers the future timelines, accurate growth predictions, and forecast estimations, and fast-changing market forces.
Increasing usage of Internet globally is a major factor driving growth of the internet security market. This is due to rapid expansion in wireless communication technology across numerous verticals. For instance, according to report by Coherent Market Insights, the number of internet users across the world were around 3.38 billion and 3.25 billion in 2016 and 2015, respectively. Internet security solutions are widely used in industries such as BFSI (Banking, Financial Services and Insurance), telecommunication, and healthcare to protect large volume of data from increasing cyber-attacks, which fuels growth of the market of internet security. Growing cyber-attacks that causes damage to organizations data and can result in loss of revenue is a primary driver boosting adoption of internet security solutions across aforementioned verticals.
Major Key players In this Industry: IBM Corporation, Hewlett Packard Enterprise, McAfee LLC, Trend Micro, Inc., Symantec Corporation, Cisco Systems, Inc., Palo Alto Networks, Inc., Dell EMC, Fortinet, Inc., Sophos Ltd., Rapid7, Inc., CyberArk Software Ltd., Splunk, Inc., and Imperva, Inc.
The report offers a detailed assessment of Internet Security industry research profiles that understand trending data and covers production, consumption, status & forecast, and market growth. The study analyzes the leading companies and several other prominent companies operating in the market. The report features detailed information including market size, growth rate, market value, price, share by (regions, type, application), production and market share by major countries, market consumption, and market share by (regions, type, application), export and import data.
Get the Sample Report PDF with Detail TOC & List of Figures @
https://www.coherentmarketinsights.com/insight/request-pdf/1930
Key Features of Internet Security Report Are:-
Get Discount Before Buying
https://www.coherentmarketinsights.com/insight/buy-now/1930
Market Scenario:-
The report covers historical and forecasts market data, demand, application details, price trends, and company shares of the leading by geography. It supplies detailed information on the established market with a clear perceptive of global Internet Security market players and emerging market associations. The report content includes technology, industry drivers, geographic trends, market statistics, market forecasts, producers, and equipment suppliers.
Go Through Our Trusted Clients List:-
https://www.coherentmarketinsights.com/trusted-by
About Coherent Market Insights:-
Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunities.
Contact Us:-
If you need more customization, reach us. You can get a point by point of the whole research here. If you have any special requirements, dont mind, let us know and we will offer you the report as you need.
Contact Here: sales@coherentmarketinsights.com || +1-206-701-6702 (US-UK Toll Free).
Takeaways from the Senate report on January 6 security failures – WTOP
This 95-page report is the first comprehensive offering from the long list of Senate and House committees that are investigating various matters related to the Capitol insurrection. It's by far one of the most thorough fact-finding efforts and was released Tuesday in a bipartisan fashion.
Two Senate committees on Tuesday released the most comprehensive government report on the security failures leading up to the US Capitol insurrection on January 6, revealing new details about unheeded warnings, critical miscommunications and intelligence shortcomings.
Congressional investigators pored through thousands of documents, received written statements from 50 police officers who defended the Capitol and received testimony from a wide array of current and former officials who played a role in the security preparations and response.
READ: Bipartisan Senate report investigating January 6 Capitol attack
Here are six takeaways from the report and its recommendations, which were released on a bipartisan basis by the Senate Rules Committee and the Senate Homeland Security Committee.
The report concluded that the US Capitol Polices main intelligence unit was aware of the potential for violence in the days and weeks ahead of January 6. Period. Full stop. They were warned.
But not everyone was aware. The inquiry determined that USCPs decentralized intelligence operation meant some people saw these warnings while other officials were left in the dark.
RELATED: Injured Capitol Police officer in emotional statement to court: You have stolen moments away from me that I cant get back
The Metropolitan Police Department in Washington, DC, told Capitol Police that hotel bookings roughly doubled in comparison to pro-Trump rallies in November and December, the Senate report said.
It was becoming clear to security officials and ordinary citizens alike that January 6 would be different. A private citizen emailed USCPs general mailbox on December 28 saying there were tweets from people organizing to storm the Capitol on January 6th, according to the report.
Still, USCP maintained its assessment that January 6 would likely resemble the minor pro-Trump rallies in November and December.
The report said, The USCP Chief has no unilateral authority to request assistance from the National Guard. This is a simple statement, but it explains a lot about the failures that day.
Then-Capitol Police Chief Steven Sund wanted to call in the troops for backup but needed to coordinate with other Hill security officials. When the officials tried to deal with the request, they were unfamiliar with the laws and regulations that needed to be followed, the inquiry found.
The red tape hindered the much-needed National Guard response, according to the report. And thats why one of the first recommendations from the Senate report is to empower the Capitol Police chief to have unilateral authority to request military support in emergency situations.
It seems like a no-brainer, but for this to happen, Congress will need to pass a new law.
The Senate inquiry uncovered some embarrassing failures within the civil disturbance unit of the Capitol Police, which is essentially the forces riot police or emergency response squad.
The Capitol Police activated seven of these special units in advance of January 6, but only four of those platoons were outfitted special protective equipment like helmets and shields, the report said. And when one of the platoons tried to get its equipment, it was on a locked bus.
The senators recommended that the special unit receive better training and more funding.
Plenty of Trump supporters posted plenty of violent threats and dangerous assertions on the internet in the run-up to January 6. The report said these were found on message boards, social media, memes, or hashtags. But intelligence officials struggled with how aggressively to police political speech, and how to differentiate the real threats from typical internet nonsense.
FBI and (Department of Homeland Security) officials stressed the difficulty in discerning constitutionally protected free speech versus actionable, credible threats of violence, the report said, noting that officials have said they need to make improvements and do better in the future.
Weve already heard from many of the brave police officers who risked their lives defending the Capitol, including some who were injured and others who engaged in hand-to-hand combat.
But the report fleshed this out, providing new accounts from the frontlines of the battle.
We did what we could against impossible odds and a volatile crowd which many times threatened us with phrases like Were gonna kill you!' one officer told the committees. I felt at this time a tangible fear that maybe I or some of my colleagues might not make it home alive.
Another officer described how they were called a Nazi. Black officers have spoken out about the racial abuse at the hands of the mob, including being called the N-word. In a previously unreported incident, one officer said they saw someone give a Nazi salute to the Capitol.
This 95-page report is the first comprehensive offering from the long list of Senate and House committees that are investigating various matters related to the Capitol insurrection. Its by far one of the most thorough fact-finding efforts and was released Tuesday in a bipartisan fashion.
But as comprehensive as it is, it only examined one piece of the bigger puzzle. It looked at the security, planning and response failures by law enforcement. But what about efforts by extremist groups to plan for violence in DC? What about former President Donald Trump and the Republican officials who fanned the flames? Congress isnt equipped to probe these issues.
Senate aides said investigators intentionally avoided the most politicized topics like Trumps culpability because they wanted to keep the probe bipartisan. Sources told CNN that to keep Republicans in the fold, the report avoided using the word insurrection to describe the attack.
Apparently, the Senate investigation was significantly watered down before it even started.
This is one the many reasons why so many Democrats, Republicans, former US officials, national security experts, and US Capitol Police officers agree that there should be an independent commission to investigate January 6. Not just to look at narrow questions but to examine the big picture extremism, disinformation, radicalization, incitement, and much more.
Senate Republicans blocked a bill to establish a commission, which now appears to be dead.
Read the original here:
Takeaways from the Senate report on January 6 security failures - WTOP
Microsoft buys ReFirm Labs to boost IoT security with firmware analysis – VentureBeat
Elevate your enterprise data technology and strategy at Transform 2021.
Microsoft has acquired firmware security startup ReFirm Labs to boost its security capabilities for protecting internet of things and intelligent edge devices.
The intelligent edge made up of cloud-connected devices capable of specialized tasks have opened up a new attack surface, David Weston, Microsofts director of enterprise and operating system security, told VentureBeat. Attacks targeting sensitive information such as credentials and encryption keys stored in memory are on the rise, and Microsoft has spent the past few years securing the operating system below the operating system, he said.
Microsoft believes that firmware is not a future threat, but an imperative to secure now as more devices flood the market and expand the available attack surface. We are committed to helping customers protect from these sophisticated threats now and in the future, which is why were announcing that we have acquired ReFirm Labs, Weston wrote in a blog post on Tuesday. Microsoft declined to disclose the terms of the acquisition.
Microsoft has been focused on IoT security on multiple fronts, including Azure Defender for IoT, Azure Sentinel, and devices such as Edge Secured-core and Azure Sphere. The company has pledged to invest $5 billion in IoT by 2022. The acquisition of ReFirm Labs, with its expertise in firmware security and the Centrifuge firmware platform to analyze and detect security issues, is a culmination of that [IoT] strategy, Weston said, and will enhance the companys chip-to-cloud protection capabilities.
ReFirm allows us to assess all the code running on the device and provide a security rating before you connect the device, Weston said. The tool is a a key piece of the missing puzzle to make it easier for organizations to feel comfortable about deploying IoT. Today, you plug [the device] into the Internet and you say YOLO, I hope everythings cool.'
ReFirm Labs develops the open source Binwalk firmware security analysis tool, which has been used by more than 50,000 organizations around the world to analyze thousands of IoT and embedded devices to identify firmware security issues. System builders and device owners use the tool to assess device risk by looking for known vulnerabilities that have not yet been patched, uncovering exposed secrets (security keys, tokens, and passwords), flagging default passwords, and detecting other security problems.
ReFirms tool gives the end users an easy way to determine the basic security posture of the device. The analyzer Weston called it essentially a drag and drop tool unpacks the device firmware and performs nested scans looking for security issues. The tool is capable of scanning all kinds of IoT and edge devices, regardless of who built it, such as smart light bulbs, cars, printers, smart refrigerators, or servers running edge applications. The tool returns an assessment report as well as a software bill of materials explaining what components were used.
Enterprises can use the assessment to understand whether the devices meet security and compliance requirements before deploying them in the environment. Once the devices are connected, IT teams can monitor them with Azure Defender for IoT. And Azure Device Update, IoTs version of Windows Update introduced six months ago, lets users apply patches.
Now the customers have pretty much everything they need: They can assess the device, they can monitor it, and they can update it on Patch Tuesday, just as if it was a Windows device, Weston said.
In the Windows world, IT teams rely on Qualys Cloud Platform or Tenables Nessus vulnerability scanner to assess the security of the network before applying all the Patch Tuesday updates. Now you can do the same thing with IoT devices, Weston said.
System builders people building devices to sell will be able to use the analyzer to show their devices are secure, which would boost buyer confidence in these devices.
Microsoft has a vision of getting 50 billion intelligent edge devices connected to Azure, empowering digital transformation and running AI applications on the edge. The security issues are just getting worse. A recent Microsoft survey of 1,000 security decision makers found that 83% had experienced some level of firmware security incident. The Department of Homeland Securitys Cybersecurity and Infrastructure Agency (CISA) called out an increase in the number of attacks against difficult-to-patch firmware at the RSA Conference just last month.
Integrating ReFirms technology into Azure Defender for IoT is just the first step, Weston said. It was important to give customers all the various capabilities but to keep complexity low. He envisioned a future where firmware scanning was available across the Microsoft portfolio. Were going to stitch it through everywhere it makes sense. Were going to integrate it into all the products that we can where we think we can help the user, Weston said.
Originally posted here:
Microsoft buys ReFirm Labs to boost IoT security with firmware analysis - VentureBeat
Adventures in Contacting the Russian FSB Krebs on Security – Krebs on Security
KrebsOnSecurity recently had occasion to contact the Russian Federal Security Service (FSB), the Russian equivalent of the U.S. Federal Bureau of Investigation (FBI). In the process of doing so, I encountered a small snag: The FSBs website said in order to communicate with them securely, I needed to download and install an encryption and virtual private networking (VPN) appliance that is flagged by at least 20 antivirus products as malware.
The FSB headquarters at Lubyanka Square, Moscow. Image: Wikipedia.
The reason I contacted the FSB one of the successor agencies to the Russian KGB ironically enough had to do with security concerns raised by an infamous Russian hacker about the FSBs own preferred method of being contacted.
KrebsOnSecurity was seeking comment from the FSB about a blog post published by Vladislav BadB Horohorin, a former international stolen credit card trafficker who served seven years in U.S. federal prison for his role in the theft of $9 million from RBS WorldPay in 2009. Horohorin, a citizen of Russia, Israel and Ukraine, is now back where he grew up in Ukraine, running a cybersecurity consulting business.
Horohorins BadB carding store, badb[.]biz, circa 2007. Image: Archive.org.
Visit the FSBs website and you might notice its web address starts with http:// instead of https://, meaning the site is not using an encryption certificate. In practical terms, any information shared between the visitor and the website is sent in plain text and will be visible to anyone who has access to that traffic.
This appears to be the case regardless of which Russian government site you visit. According to Russian search giant Yandex, the laws of the Russian Federation demand that encrypted connections be installed according to the Russian GOST cryptographic algorithm.
That means those who have a reason to send encrypted communications to a Russian government organization including ordinary things like making a payment for a government license or fine, or filing legal documents need to first install CryptoPro, a Windows-only application that loads the GOST encryption libraries on a users computer.
But if you want to talk directly to the FSB over an encrypted connection, you can just install their own client, which bundles the CryptoPro code. Visit the FSBs site and select the option to transfer meaningful information to operational units, and youll see a prompt to install a random number generation application that is needed before a specific contact form on the FSBs website will load properly.
Mind you, Im not suggesting anyone go do that: Horohorin pointed out that this random number generator was flagged by 20 different antivirus and security products as malicious.
Think well before contacting the FSB for any questions or dealing with them, and if you nevertheless decide to do this, it is better to use a virtual machine, Horohorin wrote. And a spacesuit. And, preferably, while in another country.
Antivirus product detections on the FSBs VPN software. Image: VirusTotal.
Its probably worth mentioning that the FSB is the same agency thats been sanctioned for malicious cyber activity by the U.S. government on multiple occasions over the past five years. According to the most recent sanctions by the U.S. Treasury Department, the FSB is known for recruiting criminal hackers from underground forums and offering them legal cover for their actions.
To bolster its malicious cyber operations, the FSB cultivates and co-opts criminal hackers, including the previously designated Evil Corp., enabling them to engage in disruptive ransomware attacks and phishing campaigns, reads a Treasury assessment from April 2021.
While Horohorin seems convinced the FSB is disseminating malware, it is not unusual for a large number of security tools used by VirusTotal or other similar malware sandbox services to incorrectly flag safe files as bad or suspicious an all-too-common condition known as a false positive.
Late last year I warned my followers on Twitter to put off installing updates for their Dell products until the company could explain why a bunch of its software drivers were being detected as malware by two dozen antivirus tools. Those all turned out to be false positives.
To really figure out what this FSB software was doing, I turned to Lance James, the founder of Unit221B, a New York City based cybersecurity firm. James said each download request generates a new executable program. That is because the uniqueness of the file itself is part of what makes the one-to-one encrypted connection possible.
Essentially it is like a temporary, one-time-use VPN, using a separate key for each download James said. The executable is the handshake with you to exchange keys, as it stores the key for that session in the exe. Its a terrible approach. But its what it is.
James said the FSBs program does not appear to be malware, at least in terms of the actions it takes on a users computer.
Theres no sign of actual trojan activity here except the fact it self deletes, James said. It uses GOST encryption, and [the antivirus products] may be thinking that those properties look like ransomware.
James says he suspects the antivirus false-positives were triggered by certain behaviors which could be construed as malware-like. The screenshot below from VirusTotal says some of the files contents align with detection rules made to find instances of ransomware.
Some of the malware detection rules triggered by the FSBs software. Source: VirusTotal.
Other detection rules tripped by this file include program routines that erase event logs from the users system a behavior often seen in malware that is trying to hide its tracks.
On a hunch that just including the GOST encryption routine in a test program might be enough to trigger false positives in VirusTotal, James wrote and compiled a short program in C++ that invoked the GOST cipher but otherwise had no networking components. He then uploaded the file for scanning at VirusTotal.
Even though James test program did nothing untoward or malicious, it was flagged by six antivirus engines as potentially hostile. Symantecs machine learning engine seemed particularly certain that James file might be bad, awarding it the threat name ML.Attribute.HighConfidence the same designation it assigned to the FSBs program.
KrebsOnSecurity installed the FSBs software on a test computer using a separate VPN, and straight away it connected to an Internet address currently assigned to the FSB (213.24.76.xxx).
The program prompted me to click on various parts of the screen to generate randomness for an encryption key, and when that was done it left a small window which explained in Russian that the connection was established and that I should visit a specific link on the FSBs site.
The FSBs random number generator in action.
Doing so opened up a page where I could leave a message for the FSB. I asked them if they had any response to their program being broadly flagged as malware.
The contact form that ultimately appeared after installing the FSBs software and clicking a specific link at fsb[.]ru.
After all the effort, Im disappointed to report that I have not yet received a reply. Nor did I hear back from S-Terra CSP, the company that makes the VPN software offered by the FSB.
James said that given their position, he could see why many antivirus products might think its malware.
Since they wont use our crypto and we wont use theirs, James said. Its a great explanation on political weirdness with crypto.
Still, James said, a number of things just dont make sense about the way the FSB has chosen to deploy its one-time VPN software.
The way they have set this up to suddenly trust a dynamically changing exe is still very concerning. Also, why would you send me a 256 random number generator seed in an exe when the computer has a perfectly valid and tested random number generator built in? Youre sending an exe to me with a key you decide over a non-secure environment. Why the fuck if youre a top intelligence agency would you do that?
Why indeed. I wonder how many people would share information about federal crimes with the FBI if the agency required everyone to install an executable file first to say nothing of one that looks a lot like ransomware to antivirus firms?
After doing this research, I learned the FSB recently launched a website that is only reachable via Tor, software that protects users anonymity by bouncing their traffic between different servers and encrypting the traffic at every step of the way. Unlike the FSBs clear web site, the agencys Tor site does not ask visitors to download some dodgy software before contacting them.
The application is running for a limited time to ensure your safety, the instructions for the FSBs random number generator assure, with just a gentle nudge of urgency. Do not forget to close the application when finished.
Yes, dont forget that. Also, do not forget to incinerate your computer when finished.
Excerpt from:
Adventures in Contacting the Russian FSB Krebs on Security - Krebs on Security