Archive for April, 2023

Just-in-Time Logistics And Cybersecurity – How To Reduce The Attack Surface

Posted in Commentary with tags on April 20, 2023 by itnerd

Inspired by the most recent Toyota third party breach, Snehal Antani, CEO of Horizon3.ai, has come up with defensive suggestions for enterprises concerned with these third-party risk exposures.

Here’s some background on this from Bloomberg: 

“Kojima is a small company and little-known outside Japan, where it produces cup holders, USB sockets and door pockets for car interiors. But its modest role in the automotive supply chain is a critical one. And when the company was hacked in February 2022, it brought Toyota Motor’s entire production line to a screeching stop. The world’s top-selling carmaker had to halt 14 factories at a cost of about $375 million.”

That’s not a good place to be. Here’s what Snehal Antani, CEO and Co-Founder of Horizon3.ai suggests to try and mitigate this threat:

 “JIT Logistics, made popular by Walmart’s efficiency in the 2000’s, now poses a significant cybersecurity risk to global organizations. An interesting example occurred with a Toyota supplier recently:

   “Large organizations have the resources to build a world-class security operations center (SOC), but their suppliers often don’t have the talent or resources to defend against cyber-attacks effectively. Often these smaller suppliers are barely treading water, with IT Operations and CyberSecurity being a single team (or person!)

   “This is especially challenging in the era of cyber-enabled economic warfare, where nation-states will execute cyberattacks to cause internal strife and economic pain that is below the threshold for war. Companies in manufacturing, pharmaceuticals, agriculture, energy production, etc, that have embraced just-in-time logistics are ripe targets, where a small action leads to outsized impact.

   “So what? As security practitioners, we often default to thinking of SBOM when discussing supply chain security. However, that’s an orthogonal issue. As a CEO or COO, I would work closely with my CISO and procurement team to do the following:

  1. Map my suppliers
  2. Conduct sensitivity analysis to determine which suppliers pose the greatest impact on my operations if they are disrupted due to a cyberattack
  3. Identify the exploitable attack surface of my critical suppliers, while also assessing their ability to detect & respond to cyber attacks
  4. Expand the scope of the SOC to include security overwatch for those critical suppliers unable to defend themselves.
  5. Subsidize cybersecurity investments for the critical suppliers that lack the ability to harden, detect, and respond to breaches
  6. Invest in diversifying those suppliers to reduce the operational impact if any one supplier is disrupted
  7. Ultimately transform the vendor risk assessment process to hold suppliers truly accountable for their security posture: their exploitable attack surface, their ability to detect & respond, and improvements to both over time

   “Early adopters in this space are leveraging autonomous pentesting to identify the exploitable attack surface of their critical suppliers and making investments to proactively harden their systems and improve their detection & response time.

Point32Health Gets Pwned…. And The Way They Handled Disclosing It Is Sub Optimal

Posted in Commentary with tags on April 20, 2023 by itnerd

New England based Point32Health, the parent company for both Tufts Health Plan and Harvard Pilgrim Health Care, confirmed they experienced a ransomware incident on Monday. The attack affected systems it uses to service members, accounts, brokers and providers.

Patients reported issues accessing the system as far back as last Thursday and as of yesterday, the web site remained down. The company did not confirm the technical problems were a ransomware attack until their statement issued on Wednesday.

On April 17, Point32Health identified a cybersecurity ransomware incident that impacted systems we use to service members, accounts, brokers and providers. At this time, most systems impacted are on the Harvard Pilgrim Health Care side of our business. After detecting the unauthorized party, and out of an abundance of caution, we proactively took certain systems offline to contain the threat. We have notified law enforcement and regulators, and are working with third-party cybersecurity experts to conduct a thorough investigation into this incident and remediate the situation.

Roy Akerman, Co-Founder & CEO, Rezonate had this to say:

   “Attackers continue to target Health Care businesses mainly for two reasons: the first, the criticality of restoring business operation is of first degree. It has direct impact on life saving operations and critical telemetry both doctors and patients are in need. Second, Health Care PII (personal Identifiable Information) is of high-demand in malicious forums and dark web. While a compromised credit card goes on sale for $1.99, an unreplaceable “human print” remains the highest cost, and respectively value, for the attacker to use and compromise.

   “Together, alongside a distributed and dynamic infrastructure as we usually encounter with Health Care providers, protecting the infrastructure and at the same time being ready to react fast remains a challenge.

   “While info about the initial access techniques into how the attacker was able to deploy the ransomware and propagate across the network, methods have not changed, and we believe that the same common techniques as seen recently used by leading ransomware groups will be similar here as well.”

The way that this was disclosed by Point32Health was sub optimal seeing as problems were seen last week. It really seems that based on the available facts that they were hoping to get this sorted and not admit to anything. But they were ultimately forced to. I don’t know if that is actually the case, but Point32Health needs to explain this better than they have. Otherwise the trust level that patients have with Point32Health will nosedive.

API and App Attacks Triple In 2022 For Social Media, Tech, & Retail

Posted in Commentary with tags on April 20, 2023 by itnerd

In Akamai’s State of the Internet report, API and application-based attacks had a record year on the EMEA in 2022 compared to 2021. 

Web application and API attack growth has been primarily driven by Local File Inclusion (LFI) and XSS. The report found that LFI remained the top attack silo in EMEA, with attacks growing 115% and 193% globally. 

48% of organizations stated that they release vulnerable applications into production because of time constraints and that only 14% of developers prioritize application security during coding. 

82% of IT executives noted that their organization experienced a data breaches when introducing new technology.

Notable spikes in attacks included:

  • Retail sector – up 189% 
  • Tech – up 176% 
  • Social Media – up 404%

Globally, the financial services sector saw an increase in attacks, but the UK’s recorded threats declined by 4%. Akamai suggests the decrease may be attributed to threat actors targeting individual accounts instead of the institutions.

Furthermore, organizations’ expanding attack surfaces with the adoption of IoT equipment has driven attacks on the healthcare industry by 82% and manufacturing by 76%.

George McGregor, VP, Approov had this comment:

   “Because it is based on data from the Akamai WAF this research is very much focused on traditional web apps and their vulnerabilities. 

   “Increasing use of mobile apps rather than browsers should really be taken into account especially as their use presents a particular set of security challenges which cannot easily be addressed or even seen from server-side reporting.”

Given how pervasive attacks are these days, it makes sense to look at your entire attack surface and make sure that your defences are aligned to that attack surface.

Microsoft Has Observed Retaliatory Iranian Hackers Attacking US Infrastructure

Posted in Commentary with tags on April 20, 2023 by itnerd

Microsoft has discovered an Iranian hacking group known as ‘Mint Sandstorm’ conducting cyberattacks on US critical infrastructure as a possible retaliation for recent attacks on their infrastructure including Iran’s railway system in June 2021 and a cyberattack causing an outage at Iranian gas stations in October 2021.

Microsoft says the attacks commonly use PoC exploits as they become public. Once they gain access to a network the threat actors determine if it is high-value then they deploy two attack chains to steal the target’s Windows Active Directory database to obtain users’ credentials and deploy custom backdoor malware allowing the intruders to maintain persistence on the compromised networks and deploy additional payloads.

Microsoft says the attackers also conducted low-volume phishing attacks against a small number of targeted victims.

“Capabilities observed in intrusions attributed to Mint Sandstorm are concerning as they allow operators to conceal C2 communication, persist in a compromised system, and deploy a range of post-compromise tools with varying capabilities,” warns Microsoft.

Matt Mullins, Senior Security Researcher, Cybrary had this comment:

   “Mint Sandstorm exhibits tell-tale marks of a more sophisticated adversary approach. Their attack process relies on timing, since they are racing against patch timing for publicly disclosed new CVEs. With this being said, there is an obvious effort to scour the internet for information on the latest PoCs, weaponizing them, and then swiftly launching campaigns to gain an initial foothold into networks. Outside of this initial access vector, the utilization of template injection in tandem with small batches of phishing emails leads to a cautious and furtive approach to initial access using traditional phishing methods.

   “Once inside, they appear to execute more standard post-exploitation operational procedures: recon, credential theft and lateral movement, then escalation leading to exfiltration. None of this tradecraft is particularly advanced at this stage but merely standard and sufficient operation to maneuver in an internal network. Detection of tools like Impacket isn’t anything new with a number of endpoint protections giving a specific perspective of what this activity could look like on a compromised host. Further, the exfiltration of a dumped AD database could be surmised as simply the attackers DCSync’ing or shadowing and with this vector there are robust detections available as well.

   “Custom malware is always a bit harder but as the toolkits are more publicly shared, ensuring that properly updated signatures will help a great deal with this aspect. While initial payload detection is difficult at times, there are a number of ways to detect threat actors once they begin to execute on the box. There is no way to be 100% invisible! There are always tell-tale marks left and thus as defenders we must use defense in depth and have well trained analysts and threat hunters who are capable to look closer at escalated tickets.”

Zach Hanley, Chief Attack Engineer, Horizon3.ai follows up with this:

   “Threat actors are identifying and increasingly exploiting processes, or lack of processes, in vulnerability management. They can invest in discovering 0-days, or they can abuse known, recent vulnerabilities that become public. The continuous intelligence loop of identifying emerging threats and acting on the new risks before your adversary can, will become a more critical investment that organizations will have to weigh in their overall security model. Gone are the days where an annual penetration test sufficed for reducing an organization’s risk.”

I suspect that this sort of behaviour is going to become increasingly more common. Whether it’s by Iran or Russia or by some other nation state is irrelevant. It’s clear that this sort of “tit for tat” hacks are going to become the new normal going forward.

Elon Musk Goes Off The Deep End Again By Threatening To Sue Microsoft

Posted in Commentary with tags on April 19, 2023 by itnerd

This whole Twitter/Elon Musk thing gets more bizarre by the day. Late today, Elon threatened to sue Microsoft.

No, seriously. He really did threaten to sue Microsoft. Here’s why:

Elon Musk says he’ll sue Microsoft after claiming the software giant ‘trained illegally’ using the social networking site’s data, amid a row about Microsoft’s refusal to pay Twitter’s new fees.

Musk issued the threat after it was revealed Microsoft had dropped Twitter from its advertising platform following a row over its refusal to pay Twitter’s API fees.

Responding to a story from the Twitter Daily News feed, Musk wrote: ‘They trained illegally using Twitter data. Lawsuit time.’

Here’s the Tweet in question:

This is a pretty dumb move by Elon on a number of fronts. For starters, if he’s hoping to intimidate Microsoft into getting back onto Twitter from an ads perspective, that’s going to fail as Elon won’t scare them. Second, Microsoft has way more cash than Twitter or Elon. So they’ll have no problem seeing him in court as the legal costs will be a rounding error to them. On top of that, Elon has a habit of just saying stuff that isn’t true. Which if his accusation of Microsoft using Twitter data is false, then they will be suing Elon.

So why would Elon say this? My guess is he’s salty about Microsoft dropped Twitter from their advertising platform and they won’t cut him a cheque for API access. And he’s reacting badly. And that’s going to come back to haunt him. Just like a lot of other things that Elon has done.

My bet: There will be no lawsuit. Though given Elon’s history of poor decision making, I suppose anything is possible.

March 2023 Had The Most Ransomware Attacks In Three Years

Posted in Commentary with tags on April 19, 2023 by itnerd

Analysts at the NCC Group report that the March ransomware victim numbers were the highest in any month over the past three years. The February to March numbers surged 91% from 240 to 459 due largely to the highly publicized GoAnywhere MFT vulnerability that the CLOP ransomware group exploited as a zero-day across 130 known victims in just ten days.

The month’s activity surge in ransomware attacks continues the upward trend NCC has observed since the beginning of the year and illustrates a 62% increase, year-on-year, when compared to March of 2022.

At 147, the industrial sector received the most ransomware attacks, accounting for 32% of all recorded attacks. Though this was an 87% increase in the number from January, proportionally it remained within 1% of all attacks, confirming that the industrial sector remains the most popular target for ransomware.

“Industrials contains possibly the widest variety of industries that provide threat actors with opportunities to extort PII/IP and cause operational disruption to incentivize ransom payments” reads the report.

Naveen Sunkavalley, Chief Architect, Horizon3.ai:

   “A significant proportion of vulnerabilities, including CVE-2023-0669, have been exploited by threat actors as zero-days. This will continue to be the case. This means that, no matter how well companies harden their perimeter, they must be prepared for the eventuality of being breached. 

   “The NCC report lists several tactical steps to protect against the GoAnywhere MFT vulnerability. But the real question is, what are you doing to prepare for the next zero-day? We recommend all companies take a hard look at their internal networks to shore up their threat detection and defense-in-depth practices to prevent a ransomware-type event after breach.”

This number of attacks is crazy high. And it shows that more needs to be done to ensure that IT environments are as secure as possible to bring this number back down to a more “sane” level.

KAYAK reveals Canadians are saying sayonara and signing off on vaca with new Slack OOO

Posted in Commentary with tags , on April 19, 2023 by itnerd

Canadians are done working on vacation with 80% of employed Canadians saying they are willing to take a vacation to a destination with little to no cell service in order to unplug from work, according to a new survey from KAYAK, the world’s leading travel search engine. And despite half (50%) of employed Canadian adults having been contacted by their boss for a work-related matter while on vacation, over half (57%) don’t find it difficult to log off from work while on vacation, prioritizing self-care and signing off. 

With 40% of employed Canadians around the country setting up email auto-replies to unplug from work, KAYAK is launching theSlack Out of Office (OOO) Generator plugin – good for crafting custom colourful responses on the platform – so you can truly help keep your boss at bay and enjoy your next vacation. 

Here’s how it works:

  • Simply download the plugin (HERE
  • Enter /ooo into any Slack message 
  • Enter your days off and answer a few multiple-choice questions like where you’re going, your favorite way to unwind outside of work and how spicy you want the response to be and voila! Here’s mine 🙂 

From there, simply copy and paste the response into your Slack status and email auto-reply.

Here are additional survey findings on how Canadians are unplugging on vacation below:

  • Canadians are ahead of the curve (and it’s only April!), with 44 per cent having already taken a vacation 
  • Employed Canadians are less likely to check their work messages once a day or more compared to Americans while on vacation (42% vs. 52%)
  • Employed Canadians are more likely than employed Americans to be willing to take a vacation to a destination with little to no cell service in order to unplug from work (80% vs. 73%)
  • Employed Americans are less likely to show their cards and set an out-of-office reply, compared to employed Canadians (29% vs. 40%)

YouGov Survey Results Methodology

All figures, unless otherwise stated, are from YouGov Plc. Total sample size was 1059 adults. Fieldwork was undertaken between 31st March – 4th April 2023. The survey was carried out online. The figures have been weighted and are representative of all Canadian adults (aged 18+).

Venafi Launches Venafi Firefly to Deliver Machine Identities For Modern, Cloud Native Workloads

Posted in Commentary with tags on April 19, 2023 by itnerd

Venafi, the inventor of machine identity management, today introduced Venafi Firefly, the only lightweight machine identity issuer that supports highly distributed, cloud native environments. Part of the Venafi Control Plane for Machine Identities, Firefly enables security teams to easily and securely meet developer-driven machine identity management requirements for cloud native workloads by issuing machine identities, such as TLS and SPIFFE, locally at high speeds across any environment. By delivering added speed, reliability and security for machine identities in modern architectures, it helps organizations ensure identities adhere to corporate security policies, while accelerating application development and digital transformation.

Venafi Firefly is delivered as an easy-to-deploy container that can run in any cloud native environment, providing a fast, easy and secure way to issue machine identities. Machine identity policy is configured in the Venafi Control Plane and inherited by Firefly instances. Together, the Venafi Control Plane and Venafi Firefly provide a lightweight, distributed architecture that makes Firefly the only machine identity issuer for modern use cases requiring local high-speed autonomous issuance, low-latency cloud native use cases and advanced CI/CD with identity provider embedded in the pipeline.

Key capabilities include:

  • Observability – Through the Venafi Control Plane, Venafi Firefly delivers visibility into distributed issuance activity. This extends Control Plane observability of machine identities from the datacenter to the cloud and the edge.
  • Consistency – Venafi Firefly gives security teams control over policy for machine identities issued to modern applications in cloud native environments and ensures developers use a secure and consistent issuer.
  • Reliability – Venafi Firefly requires minimal infrastructure to deploy in production to achieve high availability and fault tolerance.
  • Freedom of Choice – Venafi Firefly has multiple deployment options, including cloud native, DevOps, cloud and federated PKI environments, giving developers flexibility to use Firefly wherever and whenever it’s needed.

Venafi Firefly is unmatched in reducing complexity and increasing the speed of development, while at the same time increasing security for machine identities needed for modern cloud native applications.

Venafi Firefly is generally available today to all customers. To download a free trial, please visit https://venafi.com/try-venafi/firefly/

Yikes! Open Source Red Team Tool Used By Hackers In Malware Attacks

Posted in Commentary with tags on April 19, 2023 by itnerd

In Google’s April 2023 Threat Horizons Report, security researchers in its Threat Analysis Group revealed that APT41 has been abusing the open-source GC2 red teaming tool in malware attacks.

The threat campaign interacts only with Google’s domains making it harder to detect, and it consists of an agent that is deployed on compromised devices, which then connects back to a Google Sheets URL to receive commands to execute.

These commands cause the deployed agents to download and install additional payloads from Google Drive or exfiltrate stolen data to the cloud storage service.

APT41’s use of GC2 is another indicator of a trend of threat actors using well intentioned, legitimate red teaming tools and RMM platforms as part of their attacks.

Matt Mullins, Senior Security Researcher, Cybrary provided this comment:

   “APT41’s use of GC2 is a shift into using more novel and off-the-shelf modern open-source projects. While most of the APT pool still relies on certain tried-and-true approaches (such as using PowerShell and macros), this change up of tactics shows a willingness to change approaches with the time. The GC2 program isn’t anything revolutionary to the Red Team community as the utilization of covert channels as a non-standard C2 is something that good Red Teams have been organically developing for years now. 

   “The tool, which uses Google’s trusted domains and applications, allows for the masquerading of legitimacy. This approach exposes an Achilles heel to using major providers like Google and Microsoft-enterprises essentially have to whitelist all domains and subdomains associated with these companies. By doing so, any service that can be abused is a free hall pass for attackers. I have personally used this on my own operations before and can say that it leaves even the best defenders blind to C2 communications.

   “The application also uses Go, which is a Google language (for extra insult), and in a similar vein it is a known compiled language to Red Teams. Go provides nice cross-compatibility with less robust detection maturity in most organizations. All of this makes for a great initial malware payload!

   “Times are changing and so are APT groups. As we see more research and development done by Red Teams, we will see more advanced vectors and approaches like this. Defenders need to make sure they have validated their detections, their detections are robust, and that we have security at all layers (instead of depending on one product or tool to save us). Above all else, having a good Red Team will help your Blue Team train up to defend against advanced threats like this! Investing into a good offensive security program for ANY organization will pay exponentially in the long run.”

Christopher Peacock, Principal Detection Engineer, SCYTHE followed up with this comment:

   “In this day and age, free and open-source hacking software is just that, hacking software. Any interesting capability posted publicly to GitHub will inevitably be used maliciously regardless of the projects’ intentions, licensing, or disclaimer.”

Clearly threat actors are becoming more and more dangerous by using tools to create even more novel and dangerous attacks. That means that those of us who are tasked with defending against these attacks need to work harder than ever to make sure that these attacks never succeed.

Waze Is Now Available In Your Volvo Car

Posted in Commentary with tags on April 19, 2023 by itnerd

Volvo Canada has announced that Waze is now available to all Volvo cars with Google built-in around the globe. Their collaboration also brings the in-car Waze app to drivers in the US and Asia Pacific for the first time.

The best of Waze’s real-time routing, navigation and alerts are accessible with nothing more than a one-time setup after downloading in the Google Play Store in your Volvo car. No matter who’s driving the car and what device they use, navigation with Waze will be just one simple tap away.

The in-car Waze app helps make your everyday journey easier by avoiding phone-related hassles and distractions, while continuing to offer the excellent functionalities that you’ve come to expect from the Waze app on your mobile phone.

Seamlessly displayed on Volvo Cars’ infotainment system, the in-car Waze app utilises more of the centre screen in the Volvo user interface you’re most familiar with, making navigation more comfortable with a bigger and bolder eye-level display area.

With the Android emulator offered on the Volvo Cars Developer Portal, Waze could develop and test the in-car app virtually, alongside the in-car infotainment system. This dual testing allowed the team to deliver a high-quality user experience before launching in customer cars today.

The small print

  • The Waze app is available for download in the Google Play Store on all Volvo cars with Google built-in in Volvo Cars’ markets globally except China, South Korea, and Vietnam.
  • Availability of the features and services mentioned above may differ between markets.
  • Google, Google Play, and Waze are trademarks of Google LLC.