Bin Laden death results in malware spreading via social media, email and web

It will come as no surprise that anything newsworthy results in the creators of malware intensifying their efforts to spread their malicious code. The demise of Usama Bin Laden in no exception as various attempts to entice people to follow links through are being reported all over the place. I have seen 3 people I follow on social media who were posting malicious links already.

As always, if you see a link such as “See Bin Ladens last moments” on someone’s Facebook profile, don’t click it, it is likely not something you want.

Using a reliable and trusted anti-virus with web filtering capabilities, keeping your computer operating system up to date, as well as all supporting applications such as Java, Microsoft Office, Adobe products, etc is always a great idea. We recommend and offer Trend Micro for anti-virus for either your personal desktops or for your entire business network security! We also offer complete computer security, repair, support and sales in the Greenville & Upstate SC Area.

If you would like additional information, please contact us at 864.990.4748 or email info@homelandsecureit.com

While we are on the subject of Bin Laden, let me take a moment to thank our military and everyone involved in the events of the last 24hrs. I think we may all sleep a little better at night….

Huge Sony PSN Data Breach: What Should I Do? (From the WatchGuard Security Blog)

I am reposting this from WatchGuard Security Center blog in its entirety below.  I have kept fairly silent on this subject as everyone has said everything that needs to be covered. Corey did a fine job of outlining the situation though, so for your reading enjoyment:

 

Huge Sony PSN Data Breach; What Should I Do?

Corey Nachreiner | April 28, 2011 at 11:53 am | Tags: credit card, Data breach, PCI, PSN, Sony | Categories: Editorial Articles | URL: http://wp.me/pVP8E-aq

On Tuesday, Sony officially disclosed a humongous data breach against the Playstation Network or PSN (recently renamed to Qriocity), which allowed external attackers to get their hands on the Personally Identifiable Information (PII) of around 77 million gamers. Worse yet, they may have even stolen their credit card information, too.

If you read security news, or follow me (@SecAdept) on Twitter, you’ll know this incident has been brewing for around a week now. It first started last Wednesday, when PSN went down for all Playstation 3 users. At the time, I’d imagine that most customers assumed the outage was some sort of routine maintenance. However, with Sony recently coming out of a DDoS battle with “Anonymous” over the Geohot Playstation hacking lawsuit, paranoid security professionals like me suspected this outage might be related to more “Anonymous” hijinks. Unfortunately, we have since learned that that wasn’t the case (I wish it was).

Over the next few days, the story continued to slowly unfolded, mostly on security and gaming sites. Sony blog posts (some which were later removed) eventually admitted that the issue may be related to an “external intrusion.” However, Sony was not quick to confirm the details, or share what the attackers got. If you are interested in how the story slowly unfolded, PCWorld has a great timeline of the incident. In any case,  Sony finally sent an email to all its PSN subscribers Tuesday night, sharing exactly what the bad guys stole — and unfortunately the cretins hit pay dirt.

If you’d like to read Sony’s email in full, check out this forum post, but I’ll quickly highlight what it claims the attackers stole from all PSN subscribers:

  • Your name,
  • address (city, state, zip),
  • country,
  • email address,
  • birthdate,
  • PSN password and login
  • PSN online ID and handle
  • purchase history,
  • billing address (may be different than normal one),
  • security answers,
  • and possibly even your credit card information (excluding security code)

Unfortunately, this is a huge repository of valuable information for identity thieves and attackers wishing to target your other online accounts. On the surface, the biggest concern is whether or not attackers gained access to credit card (CC) numbers.  Sony is not very clear on this count. They claim they have no evidence to suggest so. However, they immediately backpedal, saying they cannot rule out the possibility. A more recent Sony Blog update has at least shared that the CC date was encrypted, and that they didn’t store any security code info for CCs. Well, at least that’s semi-good news.

So what’s a PSN subscriber to do?

Being one myself, I immediately asked myself that very question. Here’s what I’ve come up with:

  1. Do you follow best password handling practices? If not, change your passwords. One well known, but often ignored, password security practice is that you should NOT use the same password everywhere. Unfortunately, many people, including security professionals, don’t follow this practice. If you are one of those people, the first thing you need to do is go to all the important sites you visit and change your password. If someone has your email address and a password, that will get them into many popular sites you may frequent.
  2. Cancel/change your credit card. This one really sucks. It can be a pain to get new credit cards, mostly when you don’t know for sure whether it is entirely necessary. Unfortunately, I have to lean towards being safe and not sorry. If you shared your CC with PSN (it’s possible you may not have), you should probably get new cards. Granted, Sony does say the CC data was encrypted. So ultimately, it is up to you if you want to take the chance.
  3. Watch your credit information. There’s really nothing you can do about that fact that a lot of your PII data is out there. This is the same data bad guys use to setup fraudulent accounts in your name. Luckily, attackers didn’t get one crucial (at least in the US) piece of data; your social security number. Without this, they probably can’t setup financial accounts in your name. Nonetheless, you should still monitor your credit via your country’s credit agencies. You may even considering submitting a fraud alert or credit freeze, which will make it harder for attackers to create new accounts in your name.
  4. Remain vigilant for follow-up attacks. Since the attackers didn’t get Social Security numbers, they don’t have all they need to totally steal your identity. However, they often follow up there sorts of attacks with other attacks (email phishing), trying to gather any additional info they need. Furthermore, they can often leverage the information they’ve already stolen to help trick you into trusting them. So remain vigilant against phishing and social engineering attacks, asking you for private info.

The last question that I’m sure is one everyone’s mind, is how did Sony actually get hacked. The short answer is, we don’t know yet. Sony’s not sharing. There has been a number of rumors, though:

  • Geohot did it. This is the guy that hacked the Playstation 3’s DRM and copy protection. Sony sued him for it, and he settled the case (saying he’d leave Sony stuff alone). This guy’s smart enough to breach networks, but I’m pretty sure he didn’t go after PSN, mostly after settling with Sony. So I doubt this is the case.
  • “Anonymous” did it. Anonymous is that random group of hackers that went after HBGary. They also sided with Geohot during the PS3 hacking case, and likely launched DDoS attacks against Sony in early April. However, they claim they had nothing to do with this breach. I tend to believe it as Anonymous tends to stick more with headline grabbing stunts, than these highly illegal, malicious breaches. That said, some solo-Anonymous hackers may have acted alone.
  • The attack is the result of a custom PS3 firmware (called Rebirth). When Geohot hacked the PS3 DRM, he made it possible for homebrew coders (and pirates) to load their own modified firmware onto the PS3. These modification could allow playstation users to do all sorts of cool things that Sony didn’t originally intend the PS3 to do. However, some of the latest custom firmwares coming out of the PS3 “scene” included modifications that would allow hacked PS3 to regain access to PSN, or worse, the PSN developer network. One of those firmwares was called Rebirth. Due to the timing of Rebirth’s release, and some of it’s features, some people suspect it has something to do with how the PSN attackers were able to breach Sony’s PSN  network. In fact, it seems very likely that the modified firmware was at least used to fraudulently download PSN games without valid CCs. Of the rumors presented, this one seems most possible to me. That said, the creators of Rebirth have claimed they weren’t responsible either. However, they admit users have found interesting ways to use their firmware.

Besides those rumors, other experts have shared their own guesses about how this breach might have happened. For instance, one mentioned that it could have been a spear-phishing email, that got malware on an administrator’s computer. That guess is as good as any. After all, that’s basically how the Aurora attackers got into Google — it’s certainly possible.  Yet, it’s still just a guess. Until Sony, or someone else, shares the real story, all we can do is wonder.

Not  knowing exactly how the breach happened, makes it harder to give you a specific defense that can help prevent this from happening to you, but that’s where good ‘ole “Best Practices” come ins (something we also learned during the HBGary incident). Two things come to mind for me:

  1. Defense-in-Depth. Security guys hear this so often that it stops feeling relevant. It still is. It’s simple math. The more defensive layers you build up — things like Firewalls, IPS, AV, application control, cloud reputation, etc. — the better statistical chance you have of detecting and blocking an attack. That is why WatchGuard created our XTM appliance. We want to make it as easy as possible to incorporate as many defenses as possible, in one easy to manage appliance, and to have a platform that allows you to evolve your defenses in the future. That said, when most people think “Defense-in-Depth,” they only think about the hard, preventive technology measures, such as the ones I’ve mentioned above. They don’t think as much about the softer security measures, such as visibility tools that may also help you recognize unusual incidents, like security breaches. When you are building your layers of defense, don’t forget to include products that offer visibility tools as well (we have great visibility tools, and plan to make them even better).
  2. Focus your perimeter on your data center! One of my predictions for this year was that your perimeter will not go away. It will just shrink, harden, and focus on your data center. The huge increase in mobile workforce and technologies, has caused the security industry to largely focus on mobile security technologies — for good reason. However, just because you need mobile defenses, doesn’t mean you can tear down the walls around your castle. Instead, the huge increase in big data breaches, like this PSN incident, has shown that we need strong, evolving perimeter defenses around our data centers, today more than ever. Your perimeter shouldn’t only protect your data center from the world, but also from your own workforce. Based on what Sony’s doing to improve their PSN security, it sounds like they now agree with my prediction.

This PSN data breach will surely have resounding affects on network security for years to come. I wouldn’t be surprised to see it cause PCI changes, trigger politicians to suggest new laws, and result in new business regulations. I will continue to follow the story and post any interesting new details I find. —  Corey Nachreiner, CISSP. (@SecAdept)

Find more on the Watchguard Security Center blog…

Homeland Secure IT is a WatchGuard partner offering sales, service, support and consultation in Greenville & Upstate, SC. If you would like more information about WatchGuard products, please call 864.990.4748 or email info@homelandsecureit.com

1

“We’re from the government and we’re here to help!” – FBI in regards to removing Coreflood from infected computers

The FBI seized control of the Coreflood servers a couple weeks ago, drastically reducing the traffic that was being generated by the large botnet by stopping the update of the bot clients. This will allow anti-virus programs to begin to discover the presence on infected machines and hopefully remove it.

That’s awesome, but what’s next? The FBI is seeking to uninstall the malicious software, remotely, with the approval of the computer owners, or to optionally provide instructions for the removal to those affected.

Would you want the government accessing your computer in any way? I would love to hear your thoughts.

More information can be found here: http://www.ibtimes.com/articles/138659/20110427/coreflood-fbi-botnet-virus-microsoft.htm

If you feel your machine may be infected, please seek professional help immediately to insure your privacy remains intact and your system is not responsible for further spread of malicious software. You can call us at 864.990.4748 or email info@homelandsecureit.com – we provide computer and network security support in the Greenville and Upstate, SC area.

 

2

Password for life? Yeah, maybe…

I just read an interesting blog post over on http://www.baekdal.com/tips/password-security-usability which gives a good case for not using random letters, numbers, case and special characters… The writer claims the password of “this is fun” would take about 2500 years to hack.

Most business security policies require passwords that are a minimum of 8 characters, with upper and lower case, numbers and special characters, and on top of that, they require you to change your password every so many days.  Yes, very annoying, and people find not-so-creative ways to circumvent the password changes. For instance, if your password is “Fubar#70”, when prompted to do so, you may enter “Fubar#71” the next time, and just keep incrementing it.

But, if this person is right, and an 11 character, all lower case password would take hundreds of years to hack, then maybe businesses should rethink their security policies regarding passwords?

Three simple words like “pass the gravy” would be far more secure than your “Fubar#70”, in fact go to this URL and give it a try…  http://howsecureismypassword.net/

For the record, all my passwords are “p455w0rd” because I know nobody will ever guess that.

 

Spring Cleaning??? Pffffffthththt

Every year about this time, millions of people spend hours or even days cleaning up their computers. They weed through mail, files and other data, trying to determine what is to be kept and what should be deleted.

I suggest NOT cleaning. Sure, you can ORGANIZE, but why risk losing an important file?

External hard drives are inexpensive and easy to connect, as in plugging in! Then you can use the built-in archive functions in your Microsoft Outlook to move mail to a .pst file that can be saved to the USB drive.

I also advise using MULTIPLE means of archiving, whether it is a DVD disk and a USB drive, or two USB drives, just something that will be stored elsewhere. You could try one of the various cloud computing solutions as well, like DropBox…

With files stored on your system, say in the Documents folder, you can sort them by the date they were last modified and then move them to an external drive. Again, having data in more than one place is always desirable. You can never have too many backups in my humble opinion!

What do YOU do to archive your data, mail or do you? Do you just delete it?

 

Trend Micro has released WFBS 7.0 Patch 1 Build B1435



If your business depends on Trend Micro Worry-Free Business Security, Advanced or Standard, then you should have received notification that WFBS 7.0 Patch 1 Build B1435 is now available.

The patches that have been released by Trend Micro allow for better integration into Microsoft Windows Small Business Server 2011 for one thing, but also fix important issues which have been reported.  Even if you are not experiencing the issues, such as slow saves of Microsoft Office documents, you should install the latest patch.

It is available from the Trend Micro download center, or you can call upon your favorite computer & network service and support experts to apply the patch to your server/s.

Should you wish to try Trend Micro WFBS for your business, or require assistance, we are a Trend Micro partner offering sales and support to Greenville and the Upstate of SC. Email info@homelandsecureit.com or call 864.990.4748 for more information

Homeland Secure IT will be taking Good Friday off!

What Friday isn’t good when you take it off?

Seriously though, in observation of Easter weekend, Homeland Secure IT will not open the office on Friday so everyone can spend time with family. We WILL be available via email and phone. Should the need arise, please do not hesitate to call us on Friday.

Have a very pleasant holiday weekend!

 

ShredDisk is offering FREE hard drive destruction at the Greenville Grow Expo!

Our friend Brent with ShredDisk is offering free hard drive shredding and computer recycling during the Grow Expo event on May 17th!

Please read his blog post at http://www.shreddisk.com/blog/?p=146

Hard drive destruction remains the only 100% effective way to insure your data is protected when decommissioning a hard disk drive and this is a great opportunity to get rid of one you might have laying around from a computer upgrade or replacement.

If nothing else, be sure to stop by and see how it works!

What doesn’t kill you… Doug Aamoth sticks tweezers in a wet surge protector.

Occasionally I find a product claim so outlandish that I scoff at it. When I saw the Wet Circuits surge protector claims a while back, I thought how I wouldn’t do what they were doing in the video. (If you have not seen their videos, they demonstrate them by sticking tweezers into them while they were wet, as in under water).

I even shared the link with a few people, and they too laughed at the thought. Some considered that there were ground fault breakers in place, but, the lights remained on, etc.

Welllll, one guy decided he would test it:

http://techland.time.com/2011/04/14/two-minute-video-wherein-i-stick-tweezers-into-a-wet-surge-protector/

Great little video…  And no, I’m still not going to test this power strip in that manner!

 

1

Bovinova…. That is all….

Today starts the epic culinary event of the season… Bovinova.

This thing is going to be a blast. But, unfortunately, I can’t tell you about it, until after the event.   There will be fire, meat, swords (not meat swords though), entertainment and a good time will be had by all.

The presenters have been working on this for months, and starting about now, and all through the night and into tomorrow, they will prep.

I’m just glad to be a part of it, but sorry I can’t tell you about it =)

A video link will be up in a bit at http://www.Bovinova.com   and you can follow the #bovinova hashtag for more info.