New Olympics Cyber Threat Targets VIP Transport Companies

Posted in Commentary with tags on July 23, 2024 by itnerd

Abnormal Security has revealed that French businesses, particularly those in the hospitality, transport, and tourism sectors, are at high risk of being targeted as they experience an influx of customers and transactions, making them prime targets for cybercriminals seeking to exploit the situation.

Abnormal Security researchers have additionally identified a worrying trend in online chat rooms as the threat extends beyond Olympic ticket buyers with an observation of an uptick in data offered for sale and trade.

In an example of the growing cyber threat that emerged at the beginning of this month, a user on a popular cybercrime forum contacted an undercover security researcher, offering access to VIP transport companies in the Paris area. The seller highlighted the expected booking surge as the Olympics drew closer and disclosed they had access to the company’s Stripe, email, and invoice software.

Cybercriminals can exploit this type of access to send fraudulent emails impersonating Stripe, making customers susceptible to phishing attacks. They can also target employees within the business, exposing the company to risks such as invoice fraud, compromised financial information, and operational disruptions.

You can read the details here: https://abnormalsecurity.com/blog/french-companies-olympics-threats

L.A. County Courts Pwned In Ransomware Attack

Posted in Commentary with tags on July 22, 2024 by itnerd

This isn’t a good look. The L.A. County Courts, as in all of them, have been shut down because they were hit with a pretty devastating ransomware attack:

The attack was detected Friday and doesn’t appear to be related to the CrowdStrike software update that paralyzed Windows computers around the world and affected governments, airlines and other agencies last week, court officials said in a Sunday news release. 

This closure extended to all 36 courthouses in the county, and officials did not expect it to last beyond Monday.

“While the Court continues to move swiftly towards a restoration and recovery phase, many critical systems remain offline as of Sunday evening,” presiding Judge Samantha Jessner said in the release. “One additional day will enable the court’s team of experts to focus exclusively on bringing our systems back online so that the Court can resume operations as expeditiously, smoothly and safely as possible.”

The affected court systems span the My Jury Duty Portal and the court’s website, as well as the court’s case management systems, according to the release.

Rogier Fischer, CEO, Hadrian had this to say:

It was prudent from the court’s side to clarify that the whole incident is unrelated to the Crowdstrike-Microsoft incident, noted Rogier Fischer, CEO of Netherlands-based cybersecurity company Hadrian.”Apart from the legal obligations, it becomes a moral obligation of the key stakeholders of a cybersecurity incident to clear the air and shut the possibilities of any form of miscommunication,” he said.According to him, organizations hit by a ransomware attack must immediately execute these basic defense steps: isolate the infected systems and notify the respective IT department, senior management, and relevant authorities such as the FBI or CISA.”Investigate the scope of the attack, document your actions, and carefully decide whether to pay the ransom, consulting legal counsel and cybersecurity experts. Finally, restore systems from clean backups, implement stronger security measures, and communicate transparently with stakeholders while reviewing the incident to improve future responses,” he added. 

It appears that even the justice system isn’t immune from cybercrime. Thus it reinforces that everyone needs to take action to make cybercrime less devastating than it is now.

A New And Slightly Different Canada Post Delivery #Scam Email Is Making The Rounds

Posted in Commentary with tags on July 22, 2024 by itnerd

Today in my inbox I got a new Canada Post delivery scam email that I want to share with you. Let’s dive in.

Let’s start with what’s wrong with this email. For starters, Canada Post would never send you an email like this. Besides that, that there’s no name, address or tracking number on this email. Those should be immediate red flags. Then there’s this:

    An email address that isn’t Canada Post. #Fail.

    So far this is a pretty low effort scam email that is likely to have a success rate that is close to zero. But what would they be after. Not that you should, but I clicked on the “My Package” button and I got taken to this website.

    The first #Fail with this website is that if you look at the address bar, this website isn’t Canada Post as the real website is https://www.canadapost-postescanada.ca. So that should scare you into running from this website as quickly as possible. But let me go deeper to find out what their game is.

    I haven’t typed in a single thing and it somehow knows that a delivery attempt was made. How is that possible? It isn’t is the correct answer. But if you ignore that, I apparently owe $2.99. Seeing as there’s nothing that identifies me, I don’t know how that is possible as well.

    First it asks for your name and address. You can see that I filled in some information.

    And here we go. It’s asking for my credit card info. That’s interesting seeing as the email that I got said this.

    I guess they’re hoping that you won’t notice that part. Now I couldn’t get past this point as this website had code to validate that the credit card was legitimate. But I think that you get the point. It’s one of many Canada Post delivery scams that has a slightly different flavour in order to fool you. Thus if you see this email hit your inbox, delete it and move on with your life.

    769 Million Records Exposed in Mexico’s Largest ERP Software Provider Data Breach 

    Posted in Commentary with tags on July 22, 2024 by itnerd

    Documents belonging to ClickBalance, Mexico’s largest Enterprise Resource Planning (ERP) technology providers, were exposed as reported by cybersecurity researcher Jeremiah Fowler.

    What happened: 769,333,246 records with a total size of 395 GB were exposed. The database contained email addresses, API keys, IP addresses, payments indicating the bank name, account number, ID numbers, and much more.

    Why it matters: A data breach of any company that provides ERP or data services can have severe potential long term consequences, as cyber criminals could exploit exposed credentials to gain unauthorized access to applications, databases, and other services.

    If you want to know more about Jeremiah’s findings you can read the full report here: https://www.websiteplanet.com/news/clickbalance-breach-report/

    UPDATE:  BullWall Executive, Carol Volk had this comment:

    “There is no escaping our reliance on the supply chain. The fact that so many links in that chain have not even the most basic cyber defenses in place, assures us that our data will be used against us and our networks in future attacks. Being prepared for that eventuality is our only option if we wish to remain in business. 

       “With the average recovery cost from a ransomware attack exceeding $2.7 million in 2024, events such as the ClickBalance data exposure remind us that Cyber defensive systems are table stakes and not optional. Seriously, when your data is freely available to hackers, including access tokens, API keys, secret keys, bank account numbers, tax identification numbers, and email addresses, you’d better be following best practices in your defensive stack and make sure you’ve included a ransomware containment system for the day your exposed data comes back to attack you.”

    HP launches world’s highest performance AI PC and only trusted-integrated AI model development platform

    Posted in Commentary with tags on July 22, 2024 by itnerd

    HP recently announced two new innovations to make it easier for business leaders, IT decision makers and users to unlock the power of AI, including the world’s highest performance AI PC and the first integration of a trust framework into an AI model development platform.

    With only 33% of data scientists who are satisfied with their current AI tools and 81% who lack confidence in their company’s ability to deploy them, both products underscore the company’s commitment to make AI real for organizations and people with transformative experiences across its PCs, software and partner ecosystem.

    • New Updates to Z by HP AI Studio: HP is adding new capabilities to the Z by HP AI Studio, the world’s most comprehensive workstation solution for AI development. The platform empowers data scientists and AI creators to create models they trust with the integration of Galileo by Z, making HP the only manufacturer to develop an AI platform for workstations with built-in generative AI trust for LLM development.
    • Experiencing AI on HP PCs:
      • The new HP OmniBook Ultra enables users to run workloads faster, customize models and maintain privacy – all locally on the device.
      • The HP OmniStudio X All-in-One Desktop PC offers creation and entertainment in a sleek modern design with built-in-AI features.

    Canadian Pricing + Availability:

    • Z by HP AI Studio with Galileo integration is expected to be available in the fall of 2024.
    • The HP OmniBook Ultra 14-inch Next Gen AI PC will be available in mid-September starting at $1,899 CAD.
    • The HP OmniStudio X 27- and 31.5-inch All-In-One Desktop PCs will also be available in September starting at $2,299 CAD.

    Microsoft Comes Up With A Tool To Fix The Issues Caused By CrowdStrike

    Posted in Commentary with tags , on July 22, 2024 by itnerd

    Since Friday, I’ve been fixing the the issue where Windows computers blue screen on startup because of a bad antivirus update from CrowdStrike. The basic fix takes about five minutes. But it’s five minutes per computer that you need to have physical access to. Which means it will take days for a decent sized company to get back up and running.

    Enter Microsoft. They’ve come out with a recovery tool that creates a USB stick that fixes the issue faster than either you or I can. And on top of that, if the drive is encrypted with Microsoft’s BitLocker encryption, it will prompt for the BitLocker recovery key. Which hopefully you have handy. Regardless, this will speed up getting this issue dealt with. Kudos to Microsoft for helping to fix CrowdStrike’s screw up.

    You can get this tool here along with instructions on how to use it.

    CrowdStrike Puts Out Technical Details Of Their Epic Screw Up… Why This Should Be Required Reading For Everyone

    Posted in Commentary with tags on July 21, 2024 by itnerd

    After pretty much bricking every Windows 10/11 computer that ran CrowdStrike Falcon, CrowdStrike put out a post that details the technical ins and outs of what led up to what happened on Friday. You can read it here. In it they seem very open. And the company has committed to providing additional details and a root cause analysis.

    The thing is that what happened on Friday is a warning to the planet, and to the IT industry. CrowdStrike really screwed up here and disrupted the planet in the process. The mitigation for this is relatively easy to apply as I did that a whole bunch of times on Friday and Saturday. But because of the scale of this event, we’re talking about days before this problem is fully dealt with. In other words, this was bad. But it could have been worse. We need to learn from that and be prepared for the next event like this. Because there will be a next event. That starts with CrowdStrike being completely open to laying bare what happened and what they will do to ensure that it never happens again. And that’s followed up by other companies learning from this event and ensuring that they don’t become the next Crowdstrike.

    UPDATE: After I posted this, I got this commentary from John Gunn, CEO, Token:

    If anyone wants to know what a full-blown cyberattack from China or other enemy nations might look like, this event just gave us a small preview of the interruptions and havoc that could be inflicted. Every day we hear about new ransomware attacks, but these are revealed because of the immediate financial payoff the attackers seek. There are undoubtedly countless significant network intrusions throughout our infrastructure and essential services that are undetected which are like sleeper cells waiting to be activated if we enter a major conflict with these nations.

    Review: EnGenius Wifi 7 2x2x2 ECW526 Access Point

    Posted in Products with tags on July 20, 2024 by itnerd

    This review took way longer than it should have. That’s because I needed to find the right environment to properly test the EnGenius Wifi 7 2x2x2 ECW526 Access Point as my standard testing protocol that I’ve used in the past wouldn’t work for this WiFi 7 access point. In short, I had to call in a few favours to source WiFi 7 devices and find a network and Internet connection fast enough to really give this access point a proper test. Thus I ended up borrowing a Microsoft Surface Laptop 7 which came with WiFi 7 from a client who is going to have me deploy them to their workforce in the next 10 days or so. And I convinced a client who has a 10GB Internet connection and a 10GB backbone that I set up for them to leverage said Internet connection to let me use their set up on a Friday evening to test this access point. You’ll see why I went through all these hoops in a few minutes. Right now, let’s have a look at the access point.

    The access point looks like pretty much every other EnGenius access point. But it has a metal base for starters. And it only has a single light on the front.

    Here’s another area where things are different. It has a PoE port that does 10 Gigabit Ethernet. You read that correctly, 10 Gigabit Ethernet. There’s also a DC 12v plug. But if you’re using PoE, you won’t need it.

    There’s also a Kensington lock slot to ensure that this access point doesn’t grow legs and walk away.

    In terms of speeds, here’s what EnGenius says that this access point can handle:

    • 6 GHz: 5800 Mbps 
    • 5 GHz: 2900 Mbps 
    • 2.4 GHz: 700 Mbps

    Those are pretty amazing numbers if they are accurate. And it explains why I needed to source a WiFi 7 compatible device and a network that could handle these speeds.

    I won’t bore you with the setup details as in typical EnGenius fashion, it is trivial to set up. There’s no reason why you shouldn’t have this up and running within 15 minutes or less. But what you’re here to see is if this access point lives up to the numbers that EnGenius says it should. I should say up front that I always take the claims of those who make wireless gear with a pinch of salt. But having said that, on the 6GHz band where WiFi 7 lives, I encountered some pretty impressive speeds during my testing which involved copying a 4.65 GB file from a computer that was wired to the 10GB backbone directly to the Surface Laptop 7 on WiFi 7. Here are the results:

    • 1 Meter from the access point: 1.95 Gbps per second
    • 5 Meters from the access point: 1.2 Gbps per second
    • 10 Meters from the access point: 1.03 Gbps per second

    All of this was within line of sight of the access point. Meaning that if it had to go through walls, the speeds will drop. Regardless, the worst result was slightly faster than wired Gigabit Ethernet. And if you plot out your deployment of WiFi 7 to have no WiFi 7 dead spots, you can likely do a whole lot better in terms of speed. Quite simply, this is the fastest WiFi device that I have ever tested.

    Is there a downside to the EnGenius Wifi 7 2x2x2 ECW526 Access Point? None that I can think of. And the price is right at $299.00 USD a copy. And if the price for one unit isn’t enough for you to jump on this bandwagon, EnGenius has a buy 2 get 1 free deal at the moment. Which means that you can deploy WiFi 7 without breaking the bank. Thus making this access point truly a cost effective way of getting cutting edge WiFi into your environment.

    The Challenge Of Fixing Computers Affected By The CrowdStrike Bug Is Going To Be MASSIVE

    Posted in Commentary with tags on July 19, 2024 by itnerd

    This CrowdStrike created nightmare via a bad antivirus update is a massive problem. How massive? Let me give you some perspective:

    • Plus or minus a billion computers are basically bricked worldwide.
    • These are mostly corporate ones as corporate computers are most likely to use the CrowdStrike AV software.
    • Every affected computer needs to be rebooted in Safe Mode and have a driver manually removed. That should take 4 to 5 minutes a computer. I know that because I’ve done that about 50 times today.
    • Smart companies take away the rights for common employees to do this.
    • Even if they had the rights to this, imagine the average end user trying to handle a moderately complex task like this.

    This is most non trivial event that could possibly exist. But there’s more. I sourced comments from a number of industry experts on this:

    Evan Dornbush, former NSA cybersecurity expert:

       “This is of course  a phishing attack opportunity. Don’t make a bad situation worse. Only follow recommended instructions direct from your CrowdStrike rep. There will be a lot of misinformation about how to reconfigure your computers or which critical system files to delete.  Don’t fall victim to downloading phony solutions.

       “Similarly, this is a great time to reflect on password management, since the fix may eventually require administrative access to systems that have not rebooted in quite some time.”

    Omdia Senior Director, Cybersecurity Maxine Holt

    The global IT outage crisis is escalating, and organizations everywhere are in full scramble mode, desperately implementing workarounds to keep their businesses afloat. Microsoft has pointed fingers at a third-party software update, while CrowdStrike admits to a “defect found in a single content update for Windows hosts” and is working feverishly with affected customers. Omdia analysts connect the dots: this isn’t a cyberattack, but it’s unquestionably a cybersecurity disaster.

    Cybersecurity’s role is to protect and ensure uninterrupted business operations. Today, on 19 July 2024, many organizations are failing to operate, proving that even non-malicious cybersecurity failures can bring businesses to their knees. The workaround, involving booting into safe mode, is a nightmare for cloud customers. Cloud-dependent businesses are facing severe disruptions.

    Omdia’s Cloud and Data Center analysts have long warned about over-reliance on cloud services. Today’s outages will make enterprises rethink moving mission-critical applications off-premises. The ripple effect is massive, hitting CrowdStrike, Microsoft, AWS, Azure, Google, and beyond. CrowdStrike’s shares have plummeted by more than 20% in unofficial pre-market trading in the US, translating to a staggering $16 billion loss in value.

    Looking forward, there’s a shift towards consolidating security tools into integrated platforms. However, as one CISO starkly put it, “Consolidating with fewer vendors means that any issue has a huge operational impact. Businesses must demand rigorous testing and transparency from their vendors.”

    CrowdStrike’s testing procedures will undoubtedly be scrutinized in the aftermath. For now, the outages continue to rise, and the tech world watches as the fallout unfolds.

    Steve Hahn, Executive VP, BullWall:

       “This event, more than any other, is precisely why companies need a defense in depth strategy. One issue on your endpoint security and not only can your infrastructure go down, but you can be left wide open for a myriad of attacks. Ransomware uses endpoints, and other attack vectors, as their launch mechanism for their attack and you need layers of security over your critical data and fileshares.

       “It will be interesting to see if we have a ripple of downstream consequences. Right now we are dealing with outages at airlines and other critical businesses but will we also see a wave of Ransomware attacks that follow? Time will tell.”

    I wish every help desk globally well in dealing with this as this is going to be days if not a week or two of remediation. I also hope that CrowdStrike gets hauled in front of the relevant authorities globally to explain why this happened, and why corporate users should trust them again.

    UPDATE: Madison Horn for Congress (OK-5) adds this comment:

    With 15 years of experience in both the private and public sectors, I bring a deep insight into complex technological issues. If elected, I will be the most credentialed cybersecurity lawmaker in U.S. history. My leadership transcends partisan divides, focusing on practical solutions. By bridging the gap between technology and policy, I will address workforce development, AI regulation, and trust in government. My candidacy represents a path toward bipartisan cooperation to confront our nation’s complex challenges.” 

    “Today, we face the largest IT blackout in history, caused not by a cyber attack or malicious actor, but by human error. This outage has impacted communities and 911 operators, and what we can assume at this time, caused billion dollar losses across the global economy – starkly highlighting the fragility of our interconnected world. 

    While today’s events could not have been prevented with a single solution, any set of systems that have the potential to cause massive societal impact in the event of failure—such as the 9/11 communication outages for first responders—must have right-sized regulations that protect human life and ensure economic stability. 

    Presently, the critical infrastructure and financial sectors have requirements that ensure the classification of systems that could be single points of failure, yet misclassification and outdated regulations persist. In many cases, existing regulations are not properly tailored to specific industries. This issue is compounded by the fact that governing bodies struggle to keep pace with rapid technological change — leading to a disconnect in understanding the underlying technology, its dependencies, capabilities, cost of implementation, and workforce limitations. 

    This gap between our regulatory landscape and the demands of the rapid advancement of technology impacting society are widening. To address today’s critical challenges, we need leaders who have expertise in technology, enabling Congress to effectively collaborate with the private sector to drive solutions. The technology we use today, which fits in a device smaller than a deck of cards, has the potential to disrupt critical infrastructure like our electric grid. To safeguard our future, we need elected leaders who not only grasp the gravity of this technological reality but also have the expertise to address and mitigate these risks effectively. 

    UPDATE #2:  Tom Marsland, VP of Technology, Cloud Range adds this comment:

    Recovery is going to be painful, to put it lightly. The recovery steps outlined by CrowdStrike involve manually booting the affected PC into a recovery mode, deleting a file, and restarting.  This is not something that can be done remotely, and in many organizations, will require an administrator. This means someone from IT Support going computer to computer and doing this manually. This was most certainly preventable. This sort of release goes to the importance of change / configuration management.  This update should’ve been tested internally by CrowdStrike, then released to a small subset of users, then to their broader ecosystem. That is done specifically to catch problems with updates before they affect the entire ecosystem. Either that didn’t happen here at all, or that process failed to catch this bug, which is a  problem in and of itself.

    This will take days, probably weeks for larger organizations. Unfortunately, as is the case in many cyber breaches as well, this is nothing new. Organizations failure to follow best practices with testing and deploying patches (both from a CrowdStrike side and from an organization receiving updates side) is the root cause of this.  When major patches roll out or become available, putting on auto-updates is one way to make sure your organization gets patched, but if there’s any concern about the operability or function of that update, organizations generally roll those out within their own businesses to a small set at first, and then to everyone else. The organizations affected today seem to be the ones that turned on automatic updates and that was it.

    UPDATE #3: Tom Siu, CISO, Inversion6

    This case with CrowdStrike Falcon and Microsoft Windows highlights one of the low-frequency and high-impact risks that don’t often rise to the top of your Risk Index. I call it the “auto-immune response risk” situation where your security tools and services misidentify normative files and services, and automated corrective actions lead to system outage. In the military, we called these “blue on blue” engagements.

    The lesson that cybersecurity professionals need to know is that in the real world, errors can happen and propagate throughout our environments. This is why cybersecurity and IT teams need to have clear shared objectives and cogent leadership to first recover the IT systems, avoid lowering the security posture, and then plan/execute a path forward.  Uptime may be important, and CISOs will have to justify arguments for extended outages caused by security tooling. Often the toughest call in an incident response scenario is to take systems offline due to a vulnerability; here we have them offline already. The planning and execution we see going on currently is basically a disaster recovery scenario.

    One risk mitigation for this scenario is to use mildly diverse portfolio of endpoint security solutions. For example, one product on your endpoints, and a different product on your infrastructure. I know vendors, and CISOs, often desire to unify these applications under “one pane of glass” (licensing simplicity is a big factor) but this type of low-frequency risk is going to a harder argument for a multiple solutions.  

    This doesn’t sound like a patch that went awry, but more of a more complex systems interaction that hasn’t been fully evaluated; I suggest we make our judgements about the vendors by the quality and transparency of their communications and assistance. Additionally, we as security professionals need to incorporate public and internal communications for this type of event into our Incident Response Plans.

    In conclusion, one question I’ve seen today is, “Is this an IT outage or a security incident?”

    My answer is, “Yes.”

    SolarWinds Mostly Beats The Rap When It Comes To An SEC Lawsuit Related To Their Epic Pwnage

    Posted in Commentary with tags on July 19, 2024 by itnerd

    Well, this isn’t good in terms of accountability.

    A U.S. judge dismissed most of a Securities and Exchange Commission lawsuit accusing software company SolarWinds of defrauding investors by concealing its security weaknesses before and after a Russia-linked cyberattack targeting the U.S. government. You can read the decision here.

    John Gunn, CEO, Token had this to say:

    The backdrop to this ruling is the recent SCOTUS decision in Loper that overturned the Chevron deference and placed a greater burden on regulatory agencies, including the SEC, to more clearly define regulatory requirements and to move decisions on penalties from agencies to the courts. 

    Anyone who sees this as SolarWinds being relieved from the consequences of their actions is overlooking the $26 million they paid to settle the shareholder class action lawsuit resulting from this incident and the staggering $2 billion loss in company value they have suffered since the incident was disclosed. These financial penalties have the biggest impact on other organizations’ motivation to pursue more stringent cybersecurity protections and disclosures.

    While SolarWinds did pay a financial price for this hack, I really think that this isn’t enough. Legal accountability has to be layered on top of this as a financial accountability will simply become a cost to doing business. That doesn’t happen with legal accountability. Hopefully this gets appealed.