Busting cyber security myths. Not everything is as it seems.

Your passwords aren’t safe, the internet of things is ripe for abuse, and hackers don’t always wear hoodies – this is some of the wisdom shared by cyber security expert and creator of the Have I Been Pwned website, Troy Hunt at the ACS Reimagination Thought Leaders’ Summit 2022.

In an entertaining talk delivered to a full house at the Hilton Hotel Sydney, Hunt dispelled some of the myths about cyber security and offered a poignant reminder that keeping your devices and data safe isn’t always as complex or scary as it looks.

“What does a hacker look like?” he asked the crowd.

“I think everyone’s got a picture in their mind from movies or the press that hackers look a certain way, often wearing dark hoodies and with a dark setting in order to evoke a sense of fear.

“The press wants to make them look scary because that’s what they do, cyber security companies want to make them look scary so they can sell their products, but the reality behind this is often very different.”

Hunt described how, in the fallout of the 2015 breach of UK telecommunications provider TalkTalk, pundits attributed the attacks to “Russia-based Islamic jihadists” – with some news outlets naturally including the ubiquitous hacker-in-a-hoodie image trope in their reporting.

In reality, the breach that cost tens of millions of dollars was triggered by a 16-year-old who bragged about finding vulnerabilities in the company’s systems to show off to his friends.

Your passwords are bad

The point of much of Hunt’s Reimagination talk was to serve as a reminder that cyber security threats are varied and need not always be the result of nation-state hackers or nefarious criminal masterminds.

And it doesn’t help that so much of our online world is protected by passwords and the enforcement of restrictions on what your new password should look like.

“When you have that six-character password that you’re trying to use, something you use everywhere, and a website says you have to have to have at least one uppercase character – what do you do?”

Hunt posed the question to the Reimagination conference and noticed the audience looking nervously around at each other.

“You capitalise the first letter,” he continued. “And then you need a number, so you put a one at the end. And you need a non-alphanumeric so you put an exclamation mark at the end.

“I know you do it, I’ve seen all your passwords.”

The result of enforced password composition rules, Hunt said, is a series of common behaviours among users.

People take the path of least resistance, trying to find shortcuts around the system that is getting in their way, with the result being a weaker security posture.

“There are other things we can do to authenticate users that are much more clever,” he said.

“Such as ubiquitous transport layer security, second-factor controls, and user-behaviour analytics.

“Bob normally comes in, logs into work and starts on his Excel spreadsheet. But one day Bob remotes in from Beijing and starts poking around the firewall – that’s probably not Bob.”

Beware the internet of things

As part of his presentation, Hunt shared a story about testing a child smart watch sold by an Australian company in order to demonstrate why people should be wary when buying internet-enabled devices.

The watch markets itself as a way to safely monitor your child’s location through a cellular-enabled smart watch with limited features – including that it can only send and receive calls to limited users.

But when he and a fellow security tester started poking around in the watch’s software, they found some interesting uses of its APIs.

One problem was that user identification was done through by assigning user numbers which meant they could change the number in the watch app’s API requests and be able to track other children.

“It’s not like there was a complete lack of access controls,” he said.

“The access controls went like this: are you logged in? Yes. Cool, do whatever you want.”

“There was nothing like: are you logged in? Is this your family?”

A similar lack of access controls meant somebody could remotely call the watch and speak to the child directly, without the child even having to answer the call.

“Anybody could call a child because of a really, really simple programming mistake,” Hunt said.

“Disclosing these bugs to the company was very good in one way – they took it offline quickly – and in another quite bad because it was very hard to get the organisation to understand the gravity of their mistakes and the role they played in creating what was ultimately dangerous software.”

READ MORE

New Phishing Campaign Angles for Monzo Banking Customers

phishing campaign is targeting users of the UK-based digital banking company Monzo, BleepingComputer reports. Security researcher William Thomas came across an SMS phishing (smishing) campaign that’s sending text messages that purport to come from Monzo.

“The users are taken to a phishing site that displays a fake email login form and then requests information about their Monzo account, including full name, phone number, and the Monzo PIN,” BleepingComputer says. “If these details are provided, the threat actors now have everything needed to begin taking over victims’ Monzo accounts. When installing the Monzo app on a new device, like the threat actor’s smartphone, the service sends a device verification link for the first login to the user’s email address. As the threat actors now have access to victims’ email accounts, they can click on this ‘golden link’ and verify their device, giving full access to the Monzo account. The severity of gaining access to this link is illustrated in the emails sent by Monzo, who warn that the link should never be shared with other people.”

Thomas wrote in a blog post that the attackers can then attempt to bypass users’ multifactor authentication to gain access to their accounts.

“These details are enough to compromise a user’s email account and Monzo account,” Thomas wrote. “Additional social engineering steps might be involved, but there are many one-time passcode (OTP) stealing bots and other guides on how to trick victims into giving up access to the attacker.”

BleepingComputer explains that Monzo has a process for contacting users that users should be aware of.

“When Monzo wants to inform users about anything, it uses built-in app notifications or the account portal on the official website,” BleepingComputer says. “Monzo doesn’t use SMS to send notifications, and the platform would never urge users to follow any links from outside the app. If you’ve tapped on these links and provided any login details to the actors, reset your account passwords immediately and activate MFA on both your email and Monzo accounts.”

Multi-factor authentication is an important layer of defense, but users should know that it’s not foolproof. New-school security awareness training can enable your employees to recognize social engineering attacks.

READ MORE

When the Phishers Want a Reply, not a Click

A sextortion phishing campaign is targeting French speakers accusing them of viewing child abuse content, according to Paul Ducklin at Naked Security. The emails purport to come from the French police, and are designed to frighten users into replying to the email to assert their innocence. After a user replies, the scammer will attempt to convince them to pay a bogus fine to have the matter dropped.

Ducklin offers the following advice to help people avoid falling for these scams.

  • “How likely does the message really seem? The sender of this email was given as Jean-Luc Godard, who in real life is a world-famous left-wing French filmmaker now in his 90s. The investigating officer you are told to email directly is Frédéric Veaux, the Director General of the French Police. If you were being charged, you would have to be formally accused by name, not simply sent an email starting simply Monsieur/Madame. (Interestingly, the subject line said Mr/Mme, mixing up English and French in an obvious mistake.)
  • “If in doubt, don’t give it out. If this were a genuine criminal investigation, you would not be invited to submit evidence in mitigation informally via email. That would be insecure both for you and the police, and would almost certainly be useless in court anyway.
  • “Don’t be afraid to check with a trusted source. If this email were genuine, and there really were police charges against you, then emailing back information of your own to defend yourself against as-yet unspecified, unknown claims against you would be a very bad idea. The police themselves would not ask you to do that, which makes it obvious that this email doesn’t come from the police in the first place.”

It’s not just France, either. We’ve seen an email from the Grand Ducal Police of Luxembourg, also in French, and better French than one usually sees. No one was named in the letter beyond “Madame/Monsieur,” but at least the hoods got rid of that “Mr.” Needless to say, it’s still not very plausible. Next time they may try Andorra, or Monaco, or the Sûreté du Québec.

New-school security awareness training can teach your employees to follow security best practices so they can thwart phishing attacks.

READ MORE

What’s the best anti-virus software?

In a fiercely competitive market driven by hype and fear, security software vendors live or die by their reputation – so when Czech antivirus firm Avast Software recently feted an independent testing report that put its tools well ahead of its rivals, its stellar detection rate seemed like a marketing slam-dunk.

The company’s Avast Free and Avast One products both blocked 99 per cent of the 250 phishing URLs thrown at them by independent Austrian antivirus-testing firm AV-Comparatives, the report found, putting it ahead of rivals like Avira (97 per cent), McAfee (93 per cent), Kaspersky (90 per cent), Bitdefender (89 per cent), NortonLifeLock (70 per cent), and Malwarebytes (61 per cent).

Its Avast Secure Browser also rated highly, blocking 95 per cent of threats compared to Microsoft Edge (80 per cent), Mozilla Firefox (77 per cent), Opera (56 per cent), and Google Chrome (34 per cent).

“For many years, Avast’s threat detection engine has been a standout performer,” said AV-Comparatives founder and CEO Andreas Clementi in a glowing appraisal as the results were published.

“Recently, Avast has excelled in the anti-phishing category, which is bad news for opportunistic cybercriminals who often depend on the high success rates of phishing attacks as a means of generating greater return on investment.”

It’s a ringing endorsement, until you read the fine print – which explains that the report was not only sponsored by Avast, but that the company “selected the products to be tested”.

Look a bit further, and you’ll learn that Avast has become an asterisk in other companies’ comparative testing: tech-testing giant CNET, for one, failed to mention Avast in its latest list of recommended security tools, instead reminding prospective users of the recent discovery that Avast was collecting and selling user data through subsidiary Jumpshot.

That incident put consumer-affairs advocates into a tailspin, with Consumer Reports suggesting in early 2020 that it was time to stop using Avast software even as the software vendor argued that its founders “are passionate defenders of the right to privacy.”

Whether or not that is now true will be beside the point for many IT decision-makers at businesses large and small, who just want to know they can rely on their security software and on independent reports to choose the best protection they can find.

Is there really any difference?

Although the Avast-sponsored research suggests that company’s technology is head and shoulders above its rivals, larger tests suggest the race between security suites is in fact a photo finish.

AV-Comparatives’ latest Business Security Test, for example, found that 13 different vendors’ tools – including those from Avast – detected and blocked 99 per cent of malicious websites.

That was an improvement from the 2020 tests, in which only 10 vendors detected 99 per cent or more of threats, and security tools raised far more false alarms.

Avast scored well in both comparisons, while Kaspersky – which has, CNET also pointed out, long-fought insinuations that it has ties to Russian-government interests – topped the chart in both years.

Improvements in antivirus technology are tied to use of machine-learning technologies that have sped up the tracking and detection of new threats – but with so many strong options, how should IT decision-makers interpret and act upon comparative testing?

With current test results confirming that most security suites are functionally equivalent – scores in AV-TEST’s latest round of testing were so consistently high that the firm gave 14 of the 20 contenders its ‘Top Product’ badge – some experts are suggesting that paying for security tools these days is no longer necessary.

That, PCWorld recently argued, is because Avast’s top-rated security suite is free – as is Microsoft Windows Defender, a top-scoring security tool that is not only free, but already built into every single copy of Windows.

“Microsoft’s own built-in protections are no longer the joke they once were,” senior editor Mark Hachman said, warning that “consumers may be overspending for protection that other services provide for free.”

Other outlets have echoed the conclusion, with a Trusted Reviews analysis calling Defender “incredibly good” and “the most consistently reliable antivirus suite around”.

READ MORE

Phishing Campaign Targets NFT Speculators

Scams follow fashion because money follows fashion. So it’s no surprise that non-fungible tokens (NFTs), which have become a hot speculative property, have drawn scam artists for phishing campaigns. They’re not so much interested in the NFTs themselves as they are in the speculators’ cash. OceanSea, a leading NFT marketplace, has responded to panicky tweets from users to reassure them that it’s on top of rumors of “an exploit” connected to the smart contracts traders use.

CoinDesk writes that, “On Twitter, traders shared what they’d initially thought were official OpenSea emails about the migration process from contract A to contract B. ” But the links shared in the emails apparently led to malicious contacts masquerading as part of OceanSea’s contract migration process. Devin Finzer (@dfinzer), OceanSea’s CEO, offered this perspective over Twitter:

“Feb 19, 2022

I know you’re all worried. We’re running an all hands on deck investigation, but I want to take a minute to share the facts as I see them:

As far as we can tell, this is a phishing attack. We don’t believe it’s connected to the OpenSea website. It appears 32 users thus far have signed a malicious payload from an attacker, and some of their NFTs were stolen.”

“On Twitter, traders shared what they’d initially thought were official OpenSea emails about the migration process from contract A to contract B,” CoinBase explained, adding, “PeckShield, a blockchain security company that audits smart contracts, stated that the rumored exploit was “most likely phishing” – a malicious contract hidden in a disguised link. The company cited that same mass email about the migration process as one of the possible sources of the link.”

Fraud adapts quickly to new conditions and new opportunities, and NFT markets are, of course, not exempt. New-school security awareness training can help users recognize and avoid even novel scams.

READ MORE

Conti Ransomware Attacks Reap in $180 Million in 2021 as Average Ransomware Payments Rise by 34%

New analysis of ransomware attacks shows growth in the number of active strains, ransoms collected, and use of third-party services all adding up to a more organized and profitable industry.

It’s one thing to see one metric measuring ransomware up “up and to the right”. But when you start seeing multiple indicators that the ransomware “industry” as a whole is growing, it’s a real problem. New data from Chainalysis’ preview of their 2022 Crypto Crime Report shows some pretty unnerving growth from ransomware gangs.

According to the report:

Ransomware payments grew 34% from $88K in 2020 to $118K in 2021

chart-5-avg-payment-size-1536x1011

Ransomware threat actors are engaging with third parties to leverage tools and services that increase the chances of successful attack and payment – up 166% from 6% of ransomware funds in 2020 to 16% in 2021.

chart-6-ransomware-third-parties-1536x1006

Conti, by far, was the top ransomware strain, seeing success in its ransomware-as-a-service model, taking in $180 million in 2021.

chart-2-top-strains-1536x838

The number of active ransomware strains grew 17%, from 119 in 2020 to “at least” 140 (according to Chainalysis) in 2021.

chart-3-active-strains-by-year-1536x1005

Lastly, it was interesting to see that the average lifespan of a ransomware variant is down to just 60 days, down 64% from 2020’s 168 days.

chart-9-lifespan-1536x999

Put all this together and you quickly realize cybercriminals are getting smarter; leveraging partnerships, best-of-breed tools, constantly changing their malware, and seeing greater results.

Both Conti and Darkside (the second place “contender” according to Chanalysis) use phishing and spear phishing as an initial attack vector – something that can be defeated with a combination of a defense-in-depth approach around malicious email content and Security Awareness Training to employ your users in stopping attacks by not engaging with phishing content in email and on the web.

READ MORE

Latest tech no longer a competitive advantage

Companies have long seen new technologies as a competitive advantage – and a way of attracting and keeping talent – but new research suggests that after four years of heavy IT investment, Australian and New Zealand companies need to find new ways to stand out, now that modern technologies have become “the minimum cost of doing business”.

Fully 88 per cent of ANZ companies had modernised the way they build applications by using APIs and microservices, according to the Infosys Digital Radar 2022, which found them to be the most widely-adopted of 19 technologies embraced by companies reinventing themselves for the new normal.

Most companies also invested heavily in Internet of Things (IoT) (implemented in 80 per cent of firms), augmented and virtual reality (78 per cent), cloud technologies (77 per cent), and enterprise applications (77 per cent).

That was a big change from the 2018 survey, when around a third of respondents said they still hadn‘t started embracing DevOps and Agile development, enterprise service management (ESM), legacy modernisation, data and analytics, cloud or IoT.

By 2021, almost none of the 2,700 C-level and senior executives from eight countries had invested in these areas.

Once seen as a way of breaking through a ‘digital ceiling’, those technologies had defined a new ‘digital floor’ – table stakes for any company hoping to be relevant in today’s digitally-enabled, customer-focused business environment.

“The technologies more readily adopted in Australia and New Zealand are those that promote enterprise agility via the rapid deployment of apps and microservices, as well as those that enrich customer experience to the greatest degree,” noted Andrew Groth, executive vice president and ANZ region head with Infosys.

“This new concept of the digital floor…. means that it’s no longer considered innovative or industry leading for companies to invest in digital. It’s now a prerequisite – and locally, investment in 5G, DevOps and Agile, and ESM are the minimum cost of doing business.”

Consistent with reports that digital transformation accelerated during the pandemic, Infosys also found many companies started implementing technologies like automation, cloud, and AR/VR between 2019 and 2021.

Significantly, AI investment appeared to have stalled during the pandemic – with 18 per cent of respondents saying they had yet to start AI implementations in 2019 and this proportion moving only marginally, to 16.4 per cent, last year.

Companies piled onto the AI bandwagon between 2018 and 2019, but the new numbers suggest many were forced to hit the pause button as two pandemic years forced them to divert resources to operational issues such as ESM.

Whereas 15 per cent of companies hadn’t started implementing ESM in 2019, by 2021 every company had done so.

ESG as a differentiator

When three-quarters of companies have implemented a particular technology, just buying that technology is no longer a strategic differentiator.

Differentiation, Infosys argues, will come more from the potential business value of human-focused investments in areas such as environmental, social, and governance (ESG).

Companies with strong ESG commitments were also the most effective users of technologies, Infosys found, estimating that improving the effectiveness of the average transformation could unlock $494b ($US357b) in incremental profits.

To realise these benefits, companies should focus on people-centric experience goals like better customer engagement, data-driven business culture, and increasing employee engagement.

They should also train and motivate employees to work in an agile way with “small behavioural nudges” that improve project delivery, Infosys recommended while also encouraging companies to build intellectually diverse, purpose-driven culture and evaluate business initiatives against ESG targets.

“The most successful businesses are no longer early digital adopters, nor those that invested the most in AI, blockchain, and IoT,” said Jeff Kavanaugh, vice president and global head of the Infosys Knowledge Institute.

“The most successful firms now see value in the relationship between digital technologies and the people they serve – and the companies best prepared to enter the post-pandemic era have already realised that technology itself isn’t a differentiator, but a commitment to people and purpose.”

READ MORE

Meta Files Lawsuit Over Phishing Attacks

Meta (Facebook’s corporate parent) and the digital banking company Chime have filed a joint lawsuit against two Nigerian citizens for allegedly impersonating Chime in phishing attacks, BleepingComputer reports. The defendants are accused of using “more than five Facebook accounts and more than 800 Instagram accounts” to direct users to spoofed Chime login pages in order to harvest their credentials.

“Many of these accounts used the Chime logo as their profile photo and the word “Chime” with varied spellings in the username, such as ‘_ch_im_e_’ and ‘chime942,’” the lawsuit says. “Between no later than March 2020 and October 2021, Defendants used their network of Chime-branded Facebook and Instagram accounts to impersonate Chime in violation of the Terms. For example, Defendants used Chime-branded usernames, domains, and/or profile photos in these accounts without Chime’s authorization.”

BleepingComputer says the phishing sites were designed to take over victims’ Chime accounts.

“One such phishing website is still online at chime62.godaddysites[.]com, asking visitors to enter their phone number, email, Social Security Number, and Chime password,” BleepingComputer says. “The end goal of the scheme was to withdraw money out of hijacked Chime accounts without the victims’ knowledge. These phishing websites prompted users to enter their Chime usernames and passwords to compromise users’ Chime member accounts and withdraw funds.”

BleepingComputer notes that Facebook and Instagram repeatedly blocked these accounts and phishing sites, but the defendants continued setting up new ones.

“Meta disabled Facebook and Instagram accounts used to impersonate Chime and blocked the phishing websites from its services,” BleepingComputer says. “On July 9, it also sent cease-and-desist letters notifying the two defendants that their conduct violated the platforms’ terms and revoking their Facebook and Instagram access.”

New-school security awareness training can give your employees a healthy sense of suspicion so they can avoid falling for phishing and other types of social engineering attacks.

READ MORE

Stop simply throwing money at cyber security

Australian companies may be increasing their spend on cyber security but four out of five executives doubt they can keep throwing money at the problem indefinitely, according to an Accenture survey that confirmed “investing well” in cyber security delivers better financial and operational outcomes.

Fully 55 per cent of the more than 4,400 large-company executives, surveyed for Accenture’s recent State of Cyber security Resilience reportbelieve they are not effectively stopping cyber security attacks; finding and fixing breaches quickly; or reducing the impact of breaches – all of which are key reasons for increasing cyber security spend.

The highest-performing chief information security officers (CISOs) – dubbed ‘Cyber Champions’ – had all worked to build and maintain close relationships with the CEO, CFO, and board of directors, the report found, noting that “this proximity resulted in increased trust, autonomy, and the ability to tap into these relationships when defining the broader security strategy and ensuring alignment within the business.”

Cyber Champions, Accenture found, demonstrated several common best practices that suggested they “viewed cyber security in a fundamentally different way than those who reported diminished effectiveness and value from their cyber initiatives.”

The difference, noted Accenture APAC cyber defence lead Mark Sayer, is that the most successful companies view cyber attacks not as a risk, but an ongoing threat to their operations.

“They adopt a holistic approach to cyber security,” he said, “and all business operations, from head office to the supply chain, are aligned to support an active and vigilant approach to threat prevention.”

By staying on a more proactive footing, Accenture found, companies were able to reduce the cost of successful cyber attacks significantly.

Cyber Champions reported a cost per cyber attack that was 48 per cent lower – equivalent to $294,000 – than the next best-performing group in the survey, and 65 per cent lower than the third best-performing cohort.

When is enough cyber security, too much?

For all the potential benefits of an adaptive cyber security strategy, many respondents indicated that pouring ever larger amounts of money into cyber was becoming problematic.

Despite increased spending, the number of attempted breaches increased by 31 per cent over the previous year – to 270 per company, on average – fuelling concerns that it is simply not possible to outspend determined cybercriminals.

Fully 81 per cent of the Accenture survey respondents agreed that “staying ahead of attackers” is a constant battle and that the cost is becoming “unsustainable” – up from 69 per cent in the previous year’s survey.

Executives are starting to push back, according to a recent survey of 207 Australian IT decision makers – part of a global study by Sapio Research for security firm Trend Micro – in which 89 per cent said their businesses would be willing to compromise cyber security and allocate funding to digital transformation projects instead.

Recognising that their superiors were becoming increasingly concerned about what they see as excessive cyber security spending, fully 87 per cent had felt pressured to downplay the severity of cyber risks to their boards.

“Australian IT leaders are self-censoring in front of their boards for fear or appearing repetitive or too negative,” Trend Micro ANZ vice president Ashley Watkins said in releasing the results, “but this will only perpetuate a vicious cycle where the C-suite remains ignorant of its true risk exposure.”

“We need to talk about risk in a way that frames cyber security as a fundamental driver of business growth – helping to bring together IT and business leaders who are both fighting for the same cause.”

Only 47 per cent of IT leaders believe their C-suite completely understands cyber security risks, Trend Micro found, with 28 per cent blaming executives for not trying hard enough and 19 per cent saying executives just don’t want to understand.

Accenture Security global lead Kelly Bissell agreed, noting that company’s analysis suggested that “organisations too often focus solely on business outcomes at the expense of cyber security, creating greater risk.

“While getting the right balance isn’t easy,” he said, “those who have a clear view of the threat landscape, and a strong alignment on business priorities and outcomes, achieve greater levels of cyber resilience.”

READ MORE

Brand Impersonation and the Healthcare Sector

The healthcare sector is particularly vulnerable to phishing attacks, according to Mike Azzara at Mimecast. Employees in the healthcare industry need to be wary of brand impersonation attacks designed to steal credentials or hijack payments.

“As employees get smarter about spotting common cyberattacks, hackers keep getting more creative,” Azzara says. “One of the more sophisticated types of attacks is brand impersonation, in which attackers pretend to be a well-known brand in an effort to get a user’s passwords, obtain sensitive information or install malware. Healthcare organizations face a far higher brand impersonation threat than other industries due to the combination of overworked staff, shifting IT priorities and an abundance of partners that can easily be impersonated.”

Azzara explains that IT employees at healthcare organizations are often more focused on keeping systems running, which can lead them to place less of an emphasis on cybersecurity.

“It’s common for IT teams at hospitals and health systems to focus on the knowledge base necessary for 24/7 operation of mission-critical systems such as telemetry, electronic health records and remote monitoring,” Azzara writes. “This can lead to gaps in security training among IT teams, which translates to gaps in training for the rest of the staff.”

Additionally, healthcare organizations must deal with a variety of third parties that can be easily impersonated by cybercriminals.

“Healthcare has a complex supply chain,” Azzara says. “Third-party vendors may supply everything from food and laundry to basic medical equipment to multimillion-dollar equipment for operating rooms. Individuals across the organization interact with these vendors every day. In their fast-paced work, they may not notice a slight change to a domain name, corporate logo or ‘Reply To’ address.”

Azzara adds that hospitals communicate with many other healthcare organizations, which further exposes them to phishing attacks.

“Hospitals and health systems share information with a wide range of other healthcare entities, including insurers, pharmacies and public health agencies,” Azzara says. “The need and desire to share sensitive information in a timely manner, combined with a heavy reliance on email communication, only adds to the degree of potential mistakes for attackers to exploit.”

New-school security awareness training can give your organization an essential layer of defense by enabling your employees to recognize phishing attacks.

READ MORE