29 January 2013

Activists urge Skype: Tell us who is spying on us


Microsoft mum on privacy, security policies
Among the group's concerns is that although Skype was founded in Europe, its acquisition by a US-based company – Microsoft – may mean it is now subject to different eavesdropping and data-disclosure requirements than it was before.
The group claims that both Microsoft and Skype have refused to answer questions about what kinds of user data the service retains, whether it discloses such data to governments, and whether Skype conversations can be intercepted.
The letter calls upon Microsoft to publish a regular Transparency Report outlining what kind of data Skype collects, what third parties might be able to intercept or retain, and how Skype interprets its responsibilities under the laws that pertain to it. In addition it asks for quantitative data about when, why, and how Skype shares data with third parties, including governments.
.......




Click here to read more ...... 

17 January 2013

"Red October" Diplomatic Cyber Attacks Investigation


Executive Summary

In October 2012, Kaspersky Lab’s Global Research & Analysis Team initiated a new threat research after a series of attacks against computer networks of various international diplomatic service agencies. A large scale cyber-espionage network was revealed and analyzed during the investigation, which we called «Red October» (after famous novel «The Hunt For The Red October»).
This report is based on detailed technical analysis of a series of targeted attacks against diplomatic, governmental and scientific research organizations in different countries, mostly related to the region of Eastern Europe, former USSR members and countries in Central Asia.
The main objective of the attackers was to gather intelligence from the compromised organizations, which included computer systems, personal mobile devices and network equipment.
The earliest evidence indicates that the cyber-espionage campaign was active since 2007 and is still active at the time of writing (January 2013). Besides that, registration data used for the purchase of several Command & Control (C&C) servers and unique malware filenames related to the current attackers hints at even earlier time of activity dating back to May 2007.




Main Findings

Advanced Cyber-espionage Network
Unique architecture
Broad variety of targets
Importation of exploits:
Attacker identification

Anatomy of the attack

General description

These attacks comprised of the classical scenario of specific targeted attacks, consisting of two major stages:
  1. Initial infection
  2. Additional modules deployed for intelligence gathering
The malicious code was delivered via e-mail as attachments (Microsoft Excel, Word and, probably PDF documents) which were rigged with exploit code for known security vulnerabilities in the mentioned applications.
Right after the victim opened the malicious document on a vulnerable system, the embedded malicious code initiated the setup of the main component which in turn handled further communication with the C&C servers.
Next, the system receives a number of additional spy modules from the C&C server, including modules to handle infection of smartphones.
The main purpose of the spying modules is to steal information. This includes files from different cryptographic systems, such as «Acid Cryptofiler», (see https://fr.wikipedia.org/wiki/Acid_Cryptofiler) which is known to be used in organizations of European Union/European Parliament/European Commission since the summer of 2011. All gathered information is packed, encrypted and only then transferred to the C&C server.

.......

Another noteworthy fact is in the first line of this file, which is a command to switch the codepage of an infected system to 1251. This is required to address files and directories that contain Cyrillic characters in their names.
The «LHAFD.GCP» file is encrypted with RC4 and compressed with the "Zlib" library. This file is essentially a backdoor, which is decoded by the loader module (svchost.exe). The decrypted file is injected into system memory and is responsible for communication with the C&C server.
...........


There is a notable module among all others, which is essentially created to be embedded into Adobe Reader and Microsoft Office applications. The main purpose of its code is to create a foolproof way to regain access to the target system. The module expects a specially crafted document with attached executable code and special tags. The document may be sent to the victim via e-mail. It will not have an exploit code and will safely pass all security checks. However, like with exploit case, the document will be instantly processed by the module and the module will start a malicious application attached to the document.
.....

Timeline

We have identified over 1000 different malicious files related to over 30 modules of this Trojan kit. Most of them were created between May 2010 and October 2012.
There were 115 file-creation dates identified which are related to these campaigns via emails during the last two and a half years. Concentration of file creation dates around a particular day may indicate date of the massive attacks (which was also confirmed by some of our side observations):
Year 2010
  • 19.05.2010
  • 21.07.2010
  • 04.09.2010
Year 2011
  • 05.01.2011
  • 14.03.2011
  • 05.04.2011
  • 23.06.2011
  • 06.09.2011
  • 21.09.2011
Year 2012
  • 12.01.2012
We used two approaches to identify targets for these attacks. First, we used the Kaspersky Security Network (KSN) and then we set up our own sinkhole server. The data received using two independent ways was correlating and this confirmed objective findings.

........

RUSSIAN FEDERATION35
KAZAKHSTAN21
AZERBAIJAN15
BELGIUM15
INDIA15
AFGHANISTAN10
ARMENIA10
IRAN7
TURKMENISTAN7
UKRAINE6
UNITED STATES6
VIET NAM6
BELARUS5
GREECE5
ITALY5
MOROCCO5
PAKISTAN5
SWITZERLAND5
UGANDA5
UNITED ARAB EMIRATES5
BRAZIL4
FRANCE4
GEORGIA4
GERMANY4
JORDAN4
MOLDOVA4
SOUTH AFRICA4
TAJIKISTAN4
TURKEY4
UZBEKISTAN4
AUSTRIA3
CYPRUS3
KYRGYZSTAN3
LEBANON3
MALAYSIA3
QATAR3
SAUDI ARABIA3
CONGO2
INDONESIA2
KENYA2
LITHUANIA2
OMAN2
TANZANIA2

Countries with more than one infections

From the point of view of country distribution of connections to the sinkhole, we have observed victims in 39 countries, with most of IPs being from Switzerland. Kazakhstan and Greece follow next.
I.......
Some of the victim organizations were identified using IP addresses and public WHOIS information or remote system names.
Most «interesting» out of those are:
Algeria - Embassy
Afghanistan - Gov, Military, Embassy,
Armenia - Gov, Embassy
Austria - Embassy
Azerbaijan - Oil/Energy, Embassy, Research,
Belarus - Research, Oil/Energy, Gov, Embassy
Belgium - Embassy
Bosnia and Herzegovina - Embassy
Botswana - Embassy
Brunei Darussalam – Gov
Congo – Embassy
Cyprus - Embassy, Gov
France - Embassy, Military
Georgia - Embassy
Germany - Embassy
Greece – Embassy
Hungary -Embassy
India – Embassy
Indonesia - Embassy
Iran – Embassy
Iraq – Gov
Ireland - Embassy
Israel - Embassy
Italy -Embassy
Japan - Trade, Embassy
Jordan - Embassy
Kazakhstan - Gov, Research, Aerospace, Nuclear/Energy, Military
Kenya - Embassy
Kuwait - Embassy
Latvia - Embassy
Lebanon - Embassy
Lithuania - Embassy
Luxembourg - Gov
Mauritania - Embassy
Moldova - Gov, Military, Embassy
Morocco - Embassy
Mozambique - Embassy
Oman - Embassy
Pakistan - Embassy
Portugal - Embassy
Qatar - Embassy
Russia - Embassy, Research, Military, Nuclear/Energy
Saudi Arabia - Embassy
South Africa - Embassy
Spain - Gov, Embassy
Switzerland - Embassy
Tanzania - Embassy
Turkey - Embassy
Turkmenistan - Gov, Oil/Energy
Uganda - Embassy
Ukraine - Military
United Arab Emirates - Oil/Energy, Embassy, Gov
United States - Embassy
Uzbekistan - Embassy

............


For instance, a top level XLS dropper presumably used against a Polish target, named “Katyn_-_opinia_Rosjan.xls” contains the hardcoded victim ID “F50D0B17F870EB38026F”. A similar XLS named “tactlist_05-05-2011_.8634.xls / EEAS New contact list (05-05-2011).xls” possibly used in Moldova contains a victim ID “FCF5E48A0AE558F4B859”.




Click here to read more ...

Fake LinkedIn notifications lead to phishing and malware


LinkedIn users are once again targeted with a massive and widespread spam campaign that takes the form of a notification about a supposedly received message from a potential new connection:

......

"Malware writers are again taking advantage of LinkedIn’s popularity and users’ social media engagement after the holidays. With many people back to work and eager to strengthen their professional connections, the malicious campaign comes in really handy for the attackers," Bitdefender


Click here to read more ....

Cyber-espionage campaign targeting diplomatic and government institutions


Kaspersky Lab identified an elusive cyber-espionage campaign targeting diplomatic, governmental and scientific research organizations in several countries for at least five years.

The primary focus of this campaign targets countries in Eastern Europe, former USSR Republics, and countries in Central Asia, although victims can be found everywhere, including Western Europe and North America.

The main objective of the attackers was to gather sensitive documents from the compromised organizations, which included geopolitical intelligence, credentials to access classified computer systems, and data from personal mobile devices and network equipment.

In October 2012 Kaspersky Lab’s team of experts initiated an investigation following a series of attacks against computer networks targeting international diplomatic service agencies. A large scale cyber-espionage network was revealed and analyzed during the investigation.

Main research findings

The attackers have been active since at least 2007 and have been focusing on diplomatic and governmental agencies of various countries across the world, in addition to research institutions, energy and nuclear groups, and trade and aerospace targets.

The Red October attackers designed their own malware, identified as “Rocra,” that has its own unique modular architecture comprised of malicious extensions, info-stealing modules and backdoor Trojans.

The attackers often used information exfiltrated from infected networks as a way to gain entry into additional systems. For example, stolen credentials were compiled in a list and used when the attackers needed to guess passwords or phrases to gain access to additional systems.

To control the network of infected machines, the attackers created more than 60 domain names and several server hosting locations in different countries, with the majority being in Germany and Russia. Kaspersky Lab’s analysis of Rocra’s Command & Control (C2) infrastructure shows that the chain of servers was actually working as proxies in order to hide the location of the ‘mothership’ control server.

Information stolen from infected systems includes documents with extensions: txt, csv, eml, doc, vsd, sxw, odt, docx, rtf, pdf, mdb, xls, wab, rst, xps, iau, cif, key, crt, cer, hse, pgp, gpg, xia, xiu, xis, xio, xig, acidcsa, acidsca, aciddsk, acidpvr, acidppr, acidssa. In particular, the “acid*” extensions appears to refer to the classified software “Acid Cryptofiler”, which is used by several entities, from the European Union to NATO.

......


Click here to read more ....

New Java Exploit Fetches $5,000 Per Buyer


Less than 24 hours after Oracle patched a dangerous security hole in its Java software that was being used to seize control over Windows PCs, miscreants in the Underweb were already selling an exploit for a different and apparently still-unpatched zero-day vulnerability in Java, KrebsOnSecurity has learned.
....


The hacker forum admin’s message, portions of which are excerpted below, promised weaponized and source code versions of the exploit. This seller also said his Java 0day — in the latest version of Java (Java 7 Update 11) — was not yet part of any exploit kits, including the Cool Exploit Kit I wrote about last week that rents for $10,000 per month. From his sales pitch:
“New Java 0day, selling to 2 people, 5k$ per person
And you thought Java had epically failed when the last 0day came out. I lol’d. The best part is even-though java has failed once again and let users get compromised… guess what? I think you know what I’m going to say… there is yet another vulnerability in the latest version of java 7. I will not go into any details except with seriously interested buyers.
Code will be sold twice (it has been sold once already). It is not present in any known exploit pack including that very private version of [Blackhole] going for 10$k/month. I will accepting counter bids if you wish to outbid the competition. What you get? Unencrypted source files to the exploit (so you can have recrypted as necessary, I would warn you to be cautious who you allow to encrypt… they might try to steal a copy) Encrypted, weaponized version, simply modify the url in the php page that calls up the jar to your own executable url and you are set. You may pm me.”

.........


Click here to read more ....

Homeland Security warns to disable Java amid zero-day flaw


The U.S. Department of Homeland Security has warned users to disable or uninstall Java software on their computers, amid continuing fears and an escalation in warnings from security experts that hundreds of millions of business and consumer users are vulnerable to a serious flaw.
....


"We are currently unaware of a practical solution to this problem," said the DHS' Computer Emergency Readiness Team (CERT) in a post on its Web site on Thursday evening. "This vulnerability is being attacked in the wild, and is reported to be incorporated into exploit kits. Exploit code for this vulnerability is also publicly available."
Java users should disable or uninstall Java immediately to mitigate any damage.

....


Click here to read more ....

04 January 2013

US - DHS to pick up $6 billion tab for cyber surveillance systems at every department

The Homeland Security Department is footing a potentially $6 billion bill to provide civilian agencies with the technology and expertise needed for near real-time threat detection, DHS officials said this week. The White House has demanded so-called continuous monitoring since 2010, but many agencies did not have the resources or know-how to initiate such surveillance.

Under the new five-year project, DHS, which is responsible for protecting civilian networks, will shoulder the financial burden to finish activating continuous monitoring governmentwide. More than 62 percent of the federal government, or 15 out of 24 major civilian agencies, do not have mature surveillance programs, according to internal watchdogs

......

Homeland Security plans to split the job among at least five teams, each comprising multiple companies supplying an array of technologies and experts. Military, state and local agencies will be urged to purchase services from the same contract packages to protect dot-mil and municipal government computer systems, but Homeland Security will not cover those costs.
“DHS is responsible for securing unclassified networks for federal executive branch civilian departments and agencies” on the dot-gov domain, Homeland Security spokesman SY Lee said.
....

Click here to read more ....

Fake Canadian police site 'fines' surfers for phony cyber crimes

A pop-up message seemingly from RCMP which accuses computer users of cyber crime is one of the latest computer scams to target Canadians.
The sophisticated virus locks your computer and demands a $100 fine for alleged crimes of copyright infringement, pornography, or even terrorism.




Click here to read more ....

UK to launch public cyber security awareness campaign

The Cabinet Office is to launch a public cyber security awareness programme early this year aimed at improving the online security of consumers and small and medium enterprises (SMEs).
The initiative is part of the government’s cyber security strategy, aimed at ensuring the UK can manage the risks and harness the benefits of cyberspace.

........
The programme will specifically target school children, as well as adults who take a reckless attitude to posting personal details online, according to The Guardian.
"The big goal for the next 12 months is to get somewhere transformative in terms of business and public understanding of this issue," the paper quotes a senior official as saying.
......

The government has rated cyber attacks as a Tier 1 threat and has committed £650m to the transformative National Cyber Security Programme to bolster the UK’s cyber defences.
In his one-year review of the cyber security strategy, Maude said a recent survey found that 93% of large corporations and 76% of small businesses had experienced a cyber security breach in the past year.

.....

Click here to read more ....

US Defense bill emphasizes cyber operations

The Defense Department is taking more aggressive steps in cyberspace, including clearer authorities, more oversight and a key partnership to identify and address gaps, due to provisions in the National Defense Authorization Act for fiscal 2013.
Those provisions in the NDAA, which President Barack Obama signed into law on Jan. 2, require DOD officials to report on cyber operations to Congress on a quarterly basis, beginning March 1. It also outlines authorities and expectations for military forces in cyberspace.

.......

‘‘The Secretary of Defense shall provide to the Committees on Armed Services of the House of Representatives and the Senate quarterly briefings on all offensive and significant defensive military operations in cyberspace carried out by the [DOD] during the immediately preceding quarter,” the NDAA text reads. It also orders the defense secretary to provide within 90 days “a briefing on the interagency process for coordinating and de-conflicting full-spectrum military cyber operations for the federal government,” as well as future cyber budgeting justification.
.....
That open-architecture, “plug-and-play” network defense system would need to be available for cloud environments as well as the battlefield, and would need to overcome shortfalls in current systems that “cannot address new or rapidly morphing threats; consume substantial amounts of communication capacity to remain current with known threats and to report current status; or consume substantial amounts of resources to store rapidly growing threat libraries.”

......

Click here to read more ....

India under grip of cyber-attacks: Report

India is under the grip of cyber attacks and there is an obvious peak in the growth of malware and their modifications on mobile devices, especially on the Android platform, according to a report.
Though PC is still the prevalent target for malware authors, there is an obvious peak in the growth of malware and their modifications on mobile devices, especially on the Android platform, The Quick Heal Annual Windows and Mobile Malware Report, 2012, released by Quick Heal Technologies, a leading player in India's anti-virus segment said Mumbai.

.........

The report reveals that India is under the grip of cyber attacks with increase of almost 90 percent in Windows malware and a mind-boggling increase of 170 percent in its modifications and the bad guys are also winning the war in the mobile platform.
Virus attacks in the mobile space have started soaring at a rapid pace with 30 percent growth registered in 2012 and 80 percent increase in its modifications.

....
Click here to read more ....