{"id":7756,"date":"2017-05-24T11:10:07","date_gmt":"2017-05-24T19:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/05\/24\/news-1541\/"},"modified":"2017-05-24T11:10:07","modified_gmt":"2017-05-24T19:10:07","slug":"news-1541","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/05\/24\/news-1541\/","title":{"rendered":"5 Unsettling cyberthreats"},"content":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Wed, 24 May 2017 18:39:46 +0000<\/strong><\/p>\n<p>Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter who\u2019s trying it.\u00a0 But what about the outliers? What about threats that impact you, but you can\u2019t remediate, or establish a policy to cover?<\/p>\n<p>Here are 5 cyberthreats that if you\u2019re not frightened by, you should be.<\/p>\n<ol>\n<li>VNC roulette. This was a website that scanned for computers that allowed for remote sessions, but were unsecured by passwords or encryption. A fair amount of screenshots the site collected were from average users who simply failed to set up proper security settings. But there were also machines for which that failure was <a href=\"https:\/\/www.theregister.co.uk\/2016\/03\/25\/vnc_roulette\/\" target=\"_blank\" rel=\"noopener noreferrer\">much more serious<\/a>, like SCADA systems, CCTVs, and <a href=\"http:\/\/curious.stratford.edu\/2016\/03\/29\/vnc-roulette-prepare-to-be-hacked-if-you-dont-use-a-password-for-vnc\/\" target=\"_blank\" rel=\"noopener noreferrer\">water treatment plants<\/a>.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li>A public drone feed? <a href=\"http:\/\/blog.networkedinference.com\/2017\/05\/ranger-and-bonker-predator-drones.html\" target=\"_blank\" rel=\"noopener noreferrer\">Last week<\/a> a security blogger discovered what appeared to be a publically accessible Predator drone feed. As it turned out, the video was actually an unclassified demo page created by a defense contractor using a misconfigured web server. While not exactly the OPSEC blunder viewers thought, the amount of critical infrastructure exposed to the internet and managed via unaccountable third parties is food for thought.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>Mirai botnet. Used in some of the largest DDoS attacks ever, including one to silence <a href=\"https:\/\/krebsonsecurity.com\/2016\/11\/akamai-on-the-record-krebsonsecurity-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Brian Krebs<\/a>, Mirai scans the internet for Internet of Things devices using factory default credentials and infects them. What\u2019s the scope of a Mirai attack?\u00a0<a href=\"https:\/\/arstechnica.com\/security\/2016\/09\/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ars technica<\/a> reported a Mirai DDoS on French web host OVH of 1.7 <em>terabytes<\/em>.\u00a0 That\u2019s not the scary part. The scary part is that the IoT market is booming, they have one of the most abysmal records of security engineering and <a href=\"http:\/\/www.npr.org\/sections\/alltechconsidered\/2016\/12\/20\/506208146\/this-doll-may-be-recording-what-children-say-privacy-groups-charge\" target=\"_blank\" rel=\"noopener noreferrer\">poor judgment<\/a> ever seen. And as of 2016, the most conservative estimation for IoT devices on the market was <a href=\"http:\/\/spectrum.ieee.org\/tech-talk\/telecom\/internet\/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated\" target=\"_blank\" rel=\"noopener noreferrer\">6.4 billion<\/a>.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li>RATs. Some of us are familiar with remote access tools used to spy on the unwitting and sometimes take compromising pictures. But what happens when a RAT is embedded in a SaaS tool? Tech Support scammers <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/12\/tech-support-scams-stolen-data-and-botnets\/\" target=\"_blank\" rel=\"noopener noreferrer\">have been hit<\/a> by third-party business services who sold their service with an extra addition of DarkComet. Given how tough it can be to vet a SaaS offering, the potential to impact legitimate businesses is very large.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"5\">\n<li>The Computer Fraud and Abuse Act. Nobody likes fraud and abuse, so what\u2019s the big deal an act designed to keep them off of computers? Well, the act was written in 1986, prompted by a White House screening of the movie <em>WarGames<\/em> (<a href=\"https:\/\/www.nytimes.com\/2016\/02\/21\/movies\/wargames-and-cybersecuritys-debt-to-a-hollywood-hack.html?_r=0\" target=\"_blank\" rel=\"noopener noreferrer\">no, really<\/a>) and criminalized those who<\/li>\n<\/ol>\n<p style=\"text-align: center\">\u201chaving knowingly accessed a computer without authorization or <strong>exceeding authorized access\u201d<\/strong><\/p>\n<p>That bold part has proved problematic in recent years, as the automated scraping of content, saving public data that the owner didn\u2019t intend to make public, and landing on unexpected pages due to a web sites misconfiguration have all been interpreted as violations of the law at one point or another. This is absolutely scary, as the act and its capricious enforcement have led to a chilling effect over vulnerability disclosure and introduced a risk to researchers who might otherwise work with law enforcement.<\/p>\n<p>These are all scary cyberthreats not because of their technical sophistication, but more because they are failures of organizations and institutions that manage technology. Your security team can patch a zero-day vulnerability, but not the executive that insists his password be set to \u20181234\u2019 for \u2018convenience.\u2019 When you have strong organizations, the cyberthreats you face suddenly get much less scary.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/5-unsettling-cyber-threats\/\">5 Unsettling cyberthreats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/5-unsettling-cyber-threats\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Wed, 24 May 2017 18:39:46 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/5-unsettling-cyber-threats\/' title='5 Unsettling cyberthreats'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/shutterstock_163989638.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. Here are 5 cyberthreats that if you\u2019re not frightened by, you should be.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/technology\/\" rel=\"category tag\">Technology<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cyberthreats\/\" rel=\"tag\">cyberthreats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ddos\/\" rel=\"tag\">ddos<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot\/\" rel=\"tag\">IoT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/law\/\" rel=\"tag\">law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mirai\/\" rel=\"tag\">mirai<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mirai-botnet\/\" rel=\"tag\">Mirai botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rats\/\" rel=\"tag\">RATs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vnc\/\" rel=\"tag\">vnc<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/5-unsettling-cyber-threats\/' title='5 Unsettling cyberthreats'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/5-unsettling-cyber-threats\/\">5 Unsettling cyberthreats<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10410,12362,10514,10495,601,10400,12363,41,10497,1331,12364],"class_list":["post-7756","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-botnet","tag-cyberthreats","tag-ddos","tag-iot","tag-law","tag-mirai","tag-mirai-botnet","tag-rats","tag-security-world","tag-technology","tag-vnc"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7756"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7756\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7756"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}