Archive for December 5, 2022

Pediatric EMR Vendor Hacked…. 2.2 Million Affected

Posted in Commentary with tags on December 5, 2022 by itnerd

hacking incident at a cloud-based electronic health records software vendor has surfaced

Pennsylvania-based Connexin Software Inc., which does business as Office Practicum, reported the hack to the U.S. Department of Health and Human Services on Nov. 11 and said it involved a network server.

Connexin in its breach notification statement lists about 120 pediatric practices affected by the incident.

In the statement, Connexin says that on Aug. 26, it detected “a data anomaly” on its internal network. A forensics investigation determined that an unauthorized third party had gained access to an internal computer network, removing some data contained in an “offline” patient data set used for data conversion and troubleshooting.

Connexin’s “live” electronic medical record system was not accessed, and the incident also did not affect any pediatric practice groups’ systems, databases or medical records systems, the statement says.

In any case, the range of patient data potentially compromised in the incident is wide. Connexin says patient information affected may have included name, guarantor name, parent/guardian name, address, email address, date of birth, Social Security numbers, health insurance information and medical and/or treatment information – including procedures, diagnosis, prescription information and physician names.

Financial information – such as billing claims, invoices and patient account identifiers used by providers – was also contained in the affected data set.

John Gunn, CEO, Token says the following:

“Hackers are known for chasing quick scores and fast payoffs, but surprisingly they also “invest” for the future. They have spent years cultivating fake identities on Facebook, LinkedIn, and other social media to commit crimes and they harvest data for future crimes as they did in this instance. Each year, more of the victims of this breach will celebrate their 18th birthday and become prime targets to have their identity stolen because the hackers already have their SSN and other key information.”

Total number of people affected: 2.2 million. That’s not trivial. Hopefully someone investigates this data breach and holds any parties who allowed this to happen to account.

UPDATE: I have additional commentary from Chad McDonald, Chief of Staff and CISO, Radiant Logic:

     “A breach of this size will have insurmountable repercussions for pediatric patients long after this is reported. The information obtained in this attack can be used for years in social engineering attacks, phishing attempts and more. Furthermore, while data conversion and troubleshooting practices are necessary, real patient data should almost never be used for this.”

Rogers Releases New Internet Speed Tiers…. With The Same Pathetic Upstream Speed

Posted in Commentary with tags on December 5, 2022 by itnerd

Just this morning a reader of this blog pointed me towards this page on Rogers website where it appears that Rogers has released new Internet speed tiers:

It looks like Rogers has deleted the 1 Gbps tier and added a 1.5 Gbps and a 2.5 Gbps tier. As always, the Devil is in the detail. so if you go looking for detail, you’ll notice this:

Now I am using the 1.5 Gbps tier as an example of this as I couldn’t find an address where the 2.5 Gbps tier was available, but the first thing that should grab your attention is the upload speed which is a laughable 50 Mbps. Any of Bell’s Internet tiers will simply destroy this without breaking a sweat if a potential customer compares the two against each other. How Rogers can put this out there and try to sell it with a straight face is beyond me. The other thing that I notice is that they call this “Pure fibre to your home”. I find that unlikely to be the case given the upload speed. This sounds like Rogers existing cable infrastructure jazzed up to sound like it is competitive with Bell’s fibre to the home offering, when in actual fact it is not even in the same league.

What kills me is that Bell has had actual fibre to the home for five or more years now. Meanwhile Rogers fibre footprint is so tiny, it’s microscopic because I am guessing that they are trying to milk every last cent from copper cable that they can. That leaves Rogers at a significant disadvantage. At this point, Rogers really needs to suck it up and start rolling out fibre everywhere they operate, or just roll out DOCSIS 4.0 instead which may give them a fighting chance against Bell. And if somehow Rogers and Shaw manage to close their deal to merge, Rogers will face the same problem with Telus out west. The bottom line is that while this is a mildly interesting development, this does nothing to make Rogers more competitive with Bell in areas where the two compete against each other.

Nice try Rogers.

Major Android Security Leak Disclosed

Posted in Commentary with tags on December 5, 2022 by itnerd

Bad news for anyone who owns a Samsung, LG, Xiaomi among other Android phones. Apparently this phones have been left vulnerable to malicious apps with system-level privileges, following the leaking of their platform-signing keys:

As shared by Googler Łukasz Siewierski (via Mishaal Rahman), Google’s Android Partner Vulnerability Initiative (APVI) has publicly disclosed a new vulnerability that affected devices from Samsung, LG, and others.

The core of the issue is that multiple Android OEMs have had their platform signing keys leaked outside of their respective companies. This key is used to ensure that the version of Android that’s running on your device is legitimate, created by the manufacturer. That same key can also be used to sign individual apps.

By design, Android trusts any app signed with the same key used to sign the operating system itself. A malicious attacker with those app signing keys would be able to use Android’s “shared user ID” system to give malware full, system-level permissions on an affected device. In essence, all data on an affected device could be available to an attacker.

Notably, this Android vulnerability doesn’t solely happen when installing a new or unknown app. Since these leaked platform keys are also in some cases used to sign common apps — including the Bixby app on at least some Samsung phones — an attacker could add malware to a trusted app, sign the malicious version with the same key, and Android would trust it as an “update.” This method would work regardless of if an app originally came from the Play Store, Galaxy Store, or was sideloaded.

Google’s public disclosure doesn’t lay out which devices or OEMs were affected, but it does display the hash of example malware files. Helpfully, each of the files has been uploaded to VirusTotal, which also often reveals the name of the affected company. With that, we know the following companies’ keys were leaked (though some keys have not yet been identified):

  • Samsung
  • LG
  • Mediatek
  • szroco (makers of Walmart’s Onn tablets)
  • Revoview

Yikes! I have a pair of comments from Venafi on this:

Tony Hadfield, Sr. Director of Solutions Architects at Venafi“This is a great example of what happens when organizations sign code without a plan to manage code signing keys. If they keys fall into the hands of an attacker it can lead to catastrophic breaches. The only way to prevent this kind of problem is to have an auditable, ‘who/what/where’ solution: how do you control signing keys, where are they stored, who has access to them, and which kind of code gets signed? You need this information to protect your keys and also respond quickly to a breach by rotating your public and private keys.”

Ivan Wallis, Global Architect at Venafi: This is a great example that showcases the lack of proper security controls over code signing certificates, in particular the signing keys for the Android platform. These certificate leaks are exactly related to this, where these vendor certificates made it into the wild, allowing for the opportunity for misuse and the potential to sign malicious android applications masquerading as certain “vendors”, similar to Solarwinds. Bad actors can essentially gain the same permissions as of the core service. The lack of the who/what/where/when around code signing makes it difficult to know the impact of a breach, because that private key could be anywhere. At this point it must be considered a full compromise of the code signing environment and key/certificate rotation must happen immediately.”

The article that I linked to has some really good advice in terms of protecting yourself. Specifically”

While the details of this latest Android security leak are being confirmed, there are some simple steps you can take to make sure your device stays secure. For one, be sure that you’re on the newest firmware available for your device. If your device is no longer receiving consistent Android security updates, we recommend upgrading to a newer device as soon as possible.

Beyond that, avoid sideloading applications to your phone, even when updating an app that’s already on your phone. Should the need to sideload an app arise, be sure you completely trust the file you’re installing.

This is advice that you should be following anyway as it will keep you safe from exploits of any type.

Google Canada kicks-off the year early for startups, with applications for the 2023 Google for Startups Accelerator Canada cohort 

Posted in Commentary with tags on December 5, 2022 by itnerd

As we head into a season of holiday cheer, Google Canada today announces applications are open for the 2023 Google for Startups Accelerator Canada – helping Canadian startups begin the new year strong. 

The intensive ten-week bootcamp is designed to bring the best of Google’s programs, products, people and technology to Canadian startups that leverage machine learning and AI in their company today or plan to in the future. Up to 12  Canadian technology startups will be selected to participate. 

Through the equity free program, Google wants to make it possible for startups to continue to thrive in Canada’s tech ecosystem. The accelerator provides technical training and strategic counsel through one-to-on mentorship opportunities with Google experts. 

Google has provided more infomation in a blog post that was posted today. Applications for the program are now open to startups across all sectors until February 1st with the program kicking off March 2023.  

Skills Shortage and Integration Challenges Halt Cybersecurity Adoption: BlackFog

Posted in Commentary on December 5, 2022 by itnerd

BlackFog today released the latest findings in their CISO research which shows that half of CISOs (50%) have been prevented from adopting new security solutions due to problems with integration, whilst security teams now use an average of 20 tools to combat cybersecurity threats. 

This research, sponsored by BlackFog and conducted by Sapio Research, is the second part of an exploration into the many frustrations and challenges faced by CISO’s, IT Security Leaders and Cybersecurity Professionals in the UK and US.  

This research also found that: 

  • 32% stated a lack of skills within their team prevented deployment of a new solution 
  • 22% would consider leaving their current role due to lack of budget for investing in the latest technology   
  • 22% reported that securing additional budget for implementing new technology was one of their biggest priorities in the first 6 months 

This research continues to highlight the lack of cybersecurity investment and the effect it has on those in leading security positions. 

You can read their findings here.

Atlas VPN Windows app’s security gets verified in an independent audit

Posted in Commentary with tags on December 5, 2022 by itnerd

Atlas VPN has completed an independent security audit of its Windows application between July and November this year. The security assessment was conducted by global cybersecurity experts from MDSec.

MDSec’s cybersecurity specialists tested the 2.4.4 version of the Atlas VPN Windows app, looking for issues that could leave it susceptible to compromise. The thorough research did not detect any high or critical category threats within the app. The app’s developers have since implemented all the recommendations provided by the auditor, as confirmed in a retest by MDSec.

Windows application audit by MDsec is the second independent assessment of Atlas VPN, as in 2021, Atlas VPN’s iOS app received a positive review in a security audit by VerSprite. The company expects to complete even more independent tests of Atlas VPN service in the future.

Atlas VPN is a freemium VPN provider with a mission to make safe and open internet accessible to everyone. To protect the privacy of its users, the company uses military-grade encryption and protocols and has a no-logs policy. Today, Atlas VPN is trusted by users from more than 170 countries worldwide.

More information: https://atlasvpn.com/blog/independent-audit-verifies-the-security-of-our-windows-app