Crytolocker is highly destructive and emerged as one of top threats of 2013, as it holds users hostage to pay for unencrypting and returning data back to user
QUOTE: A virulent form of ransomware has now infected about quarter of a million Windows computers, according to a report by security researchers. Cryptolocker scrambles users’ data and then demands a fee to unencrypt it alongside a countdown clock. Dell Secureworks said that the US and UK had been worst affected.
It added that the cyber-criminals responsible were now targeting home internet users after initially focusing on professionals. The firm has provided a list of net domains that it suspects have been used to spread the code, but warned that more are being generated every day. Ransomware has existed since at least 1989, but this latest example is particularly problematic because of the way it makes files inaccessible. “Instead of using a custom cryptographic implementation like many other malware families, Cryptolocker uses strong third-party certified cryptography offered by Microsoft’s CryptoAPI,” said the report.
Cryptolocker is highly destructive as once data is encrypted, the system can usually only be recovered from backups (or one must pay the bad guys for keys to decrypt data). This new variant improves the capability to spread from system to system.
QUOTE: We recently came across a CryptoLocker variant that had one notable feature—it has propagation routines. Analysis of the malware, detected as WORM_CRILOCK.A, shows that this malware can spread via removable drives. This update is considered significant because this routine was unheard of in other CRILOCK variants. The addition of propagation routines means that the malware can easily spread, unlike other known CRILOCK variants. Aside from its propagation technique, the new malware bears numerous differences from known CryptoLocker variants. Rather than relying on a downloader malware—often UPATRE— to infect systems, this malware pretends to be an activator for various software such as Adobe Photoshop and Microsoft Office in peer-to-peer (P2P) file sharing sites. Uploading the malware in P2P sites allows bad guys to easily infect systems without the need to create (and send) spammed messages.
Distributed denial of service attacks are likely to increase in 2014 based on current trends.
QUOTE: 2013 will go down in IT security history as the year when a large number of high-profile organisations were very publicly hacked. And in parallel with this, the integrity of tens of millions of debit and credit card holders’ accounts around the world were put at risk because of these breaches.
Walker said that one of the key issues he has seen CSOs and CISOs express their concern about is the problem of DDoS attacks – which he predicts will only get worse in 2014, owing to the lack of defensive systems that most organisations have in place to guard against this type of attack. The problem with denial of service attacks, he said, is not so much that people are not able to visit the company’s web site or conduct business – bad though this issue is in revenue terms – but that brand reputation is damaged in the longer run.
The PhishMe blog was recently discovered and highlights key attack methods used during the holidays
QUOTE: The holidays are a busy time for everyone… especially for hackers trying to phish your employees. Phishing is most effective when it exploits human emotions—fear, greed, anxiousness, curiosity, compassion, getting a good deal—and the holidays tend to bring these emotions out more than other times of the year. Which tactics should you train your employees look out for?
Product or Service Online Discounts
Spoofed holiday party invitations
Holiday party info/registration
Fake Package Delivery Notifications
Package delivery/update notification
Year end: PTO balance notification
Unfiled expense reports
Urgent year-end deadline/requirements
Fake Charity fundraisers
An effective corporate security approach uses sophisticated technical defense systems as well as emphasizing the important of security to their workers. This recent study notes that while some companies are not actively involved, many now use online training resources.
QUOTE: Delving into the research – which was conducted in late November – reveals that companies seem to be letting the side down on the security training front, with 18.7 percent of office workers polled in the late November survey admitting their employers did not provide them with security training, and just 5.1 percent saying their company conducted phishing testing as part of their training. It’s not all doom and gloom on the anti-phishing front, however, as the survey found that 27% of employers are conducting online security training for their staff. With 27.4% integrating some form of security training in their employee induction courses, and 11.8 percent using the traditional approach of classroom security training to get the message across.
The ZBOT family and other related malware are still actively circulating and use highly sophisticated botnet command-and-control techniques. Usually, after one malware family diminishes, a more sophisticated attack is launched in it’s place.
QUOTE: Money talks big. The industry of financial Trojans has been steadily growing as money is moving to online banking applications. In its latest blog post and whitepaper, security software company Symantec looks at this year’s state of financial threat. Within the first nine months of this year, infections by the most common financial Trojans rose by 337 percent. This means almost half a million computers that are infected every month are susceptible to fraud. Symantec analyzed eight online banking Trojans’ recent configuration files to better understand which URLs the Trojans attack and the perpetrators’ strategies. The study reveals the wide reach of Trojans; they can and will target anything that the attacker can get a monetary profit from.
During recent research saw that version 3.0 of PCI/DSS standards were finalized during NOV 2013. Some key links are noted below:
PCI/DSS HOME PAGE
FIVE KEY CHANGES
QUOTE: The PCI Security Standards Council offers robust and comprehensive standards and supporting materials to enhance payment card data security. These materials include a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step. The keystone is the PCI Data Security Standard (PCI DSS), which provides an actionable framework for developing a robust payment card data security process — including prevention, detection and appropriate reaction to security incidents
Hackers are already launching targeted attacks and are likely performing brute force attacks on the encrypted PIN numbers. Once both credit card and PIN# information is disclosed, hackers can register charges as desired. As shared earlier affected Target customers should change their PIN# immediately to reduce risks.
QUOTE: Target said criminals had made off with customers’ encrypted PIN information as well. But Target said the company stored the keys to decrypt its PIN data on separate systems from the ones that were hacked. Target customers’ credit and debit card data on the black market, where a single card is selling for as much as $100. Criminals can use that card data to create counterfeit cards. But PIN data is the most coveted of all. With PIN data, cybercriminals can make withdrawals from a customer’s account through an automatic teller machine. And even if the key to unlock the encryption is stored on separate systems, security experts say there have been cases where hackers managed to get the keys and successfully decrypt scrambled data.
Reuters shares that BBC server was briefly compromised on Christmas Day
QUOTE: A hacker secretly took over a computer server at the BBC, Britain’s public broadcaster, and then launched a Christmas Day campaign to convince other cyber criminals to pay him for access to the system. While it is not known if the hacker found any buyers, the BBC’s security team responded to the issue on Saturday and believes it has secured the site, according to a person familiar with the cleanup effort. Reuters could not determine whether the hackers stole data or caused any damage in the attack, which compromised a server that manages an obscure password-protected website. It was not clear how the BBC, the world’s oldest and largest broadcaster, uses that site, though ftp systems are typically used to manage the transfer of large data files over the Internet.