Cable Forum

Cable Forum (https://www.cableforum.uk/board/index.php)
-   Security & Virus Discussion (https://www.cableforum.uk/board/forumdisplay.php?f=38)
-   -   'Two weeks' to block cyber-attack (https://www.cableforum.uk/board/showthread.php?t=33697820)

Hugh 02-06-2014 16:57

'Two weeks' to block cyber-attack
 
BBC

Quote:

People have "two weeks" to protect themselves from a "powerful computer attack", the UK's National Crime Agency (NCA) has warned.

Users are being told to take "immediate" action to protect their computers after US authorities seized a major criminal network.

The FBI, working with the NCA, has taken control of a botnet used to steal personal and financial data.

More than 15,000 machines in the UK are thought to have been infected to date.

Internet service providers (ISPs) will be contacting customers known to have been affected by either letter or email. The first notices were sent out on Monday, the BBC understands.

The action related to a strain of malware - meaning malicious software - known as Gameover Zeus. Its alternative names include GOZeus and P2PZeus.

qasdfdsaq 02-06-2014 21:42

Re: 'Two weeks' to block cyber-attack
 
So the botnet is under control of the FBI, so we have two weeks to prepare for an attack? Are the FBI going to attack us?!

I'm confused.

Qtx 02-06-2014 21:45

Re: 'Two weeks' to block cyber-attack
 
The authorities can take over C&C's but not that great at doing much beyond that. They could send updates to the zombies that made the infection inert but they would need to know the right keys and Zeus uses encryption which is different per zeus-customer.

Gameover variant of Zeus can update over peer-to-peer so it doesnt really need the domains and control centre box's. They need to take down the infection methods or the botnet will still grow. The Cutwail spam botnet and servers with Magnitude exploit kit's are still adding more zombies to the gameover botnet every day.

Malware writers are winning the technical game but they can't code around arrest warrants...

qasdfdsaq 02-06-2014 23:34

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Qtx (Post 35703644)
Malware writers are winning the technical game but they can't code around arrest warrants...

Sure they can, write the code to point the finger elsewhere so someone else gets arrested :P

Ignitionnet 03-06-2014 00:16

Re: 'Two weeks' to block cyber-attack
 
What happens in two weeks?

Paul 03-06-2014 01:06

Re: 'Two weeks' to block cyber-attack
 
Somebody gets attacked, I think, but Im not really very clear on who.

Toto 03-06-2014 06:26

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Ignitionnet (Post 35703670)
What happens in two weeks?

The two weeks is an estimate as to how long it will take the malware writers to regain control of their command and control systems and start re-infecting. Some are claiming it could be a few days not two weeks, they don't really know.

The current cut off is allowing authorities to understand the level of infection, and get ISP's to make contact with effected customers, hopefully giving those infected a chance to get their systems cleaned.

Two weeks as a conservative estimate is not enough time though, but at least the issue is getting media coverage.

Full NCA article here.

tizmeinnit 03-06-2014 10:50

Re: 'Two weeks' to block cyber-attack
 
I also find it strange how there does not appear to be any direct links to anything that tells users how to detect and get rid of this. Not fully read the article but all I can see it is saying to look for Get Safe Online on facebook and google+

---------- Post added at 11:50 ---------- Previous post was at 11:48 ----------

anyway Get Safe Online link to these toolshttp://www.symantec.com/security_res...052915-1402-99

http://www.f-secure.com/en/web/home_...online-scanner

and a few others

Ignitionnet 03-06-2014 12:06

Re: 'Two weeks' to block cyber-attack
 
Right I think I get the idea, they've probably done a takeover in a similar manner to how Torpig was taken over, except given it's law enforcement they seized the domains the botnet was chatting to rather than spotting a window in the malware where domains weren't registered.

I look forward to reading the reports. Usually there's the malware itself, the bot, and a downloader. When Torpig was taken over they managed to take over the botnet however the downloader was still under the control of the miscreants who pushed a new version of the malware with updated domains.

If they don't have control of both the botnet C+C and the downloader C+C this may be a rather short 2 weeks but that's probably where the 2 weeks comes from, the period before the botnet moves onto a different domain that the authorities don't have control over.

qasdfdsaq 03-06-2014 12:55

Re: 'Two weeks' to block cyber-attack
 
So rather than two weeks to "block a powerful computer attack" what they really mean is things will be quiet for 2 weeks and then it'll be back to business as usual.

Rather exaggerated and sensationalist if you ask me...

Toto 03-06-2014 13:38

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by qasdfdsaq (Post 35703732)
So rather than two weeks to "block a powerful computer attack" what they really mean is things will be quiet for 2 weeks and then it'll be back to business as usual.

Rather exaggerated and sensationalist if you ask me...

Agreed.

BBC rolled out Graham Clueless earlier today, I really don't know why they give that man airtime. Anyway, essentially the advice is that during this small window of opportunity all Windows users should patch their O/S and run an up-to-date anti virus scan.

McAfee's Stinger application has been engineered to detect these particular malware types, although folks who already have their important files encrypted by cryptolocker will only be able to remove the malware, not recover their files.

Ignitionnet 03-06-2014 14:11

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Toto (Post 35703747)
Agreed.

BBC rolled out Graham Clueless earlier today, I really don't know why they give that man airtime. Anyway, essentially the advice is that during this small window of opportunity all Windows users should patch their O/S and run an up-to-date anti virus scan.

Nice placebo there.

30 days after release AV detects ~60% of new malware and variants.

If you already have this you're hosed so patching is an exercise in futility not least because the infection vectors tend to be dodgy plugins rather than the OS itself.

I really do regret that malware course at times like these. It's made me so cynical. :(

Anonymouse 03-06-2014 14:50

Re: 'Two weeks' to block cyber-attack
 
Ooh, things like this really get my goat! Once again, governments etc. are solving the wrong problem. Once again we have a story about hacking being reported, and once again, there is not one word about the real cause - namely people browsing the Internet with administrator accounts because the poor sods usually don't know any better!

I've never heard of a PC shop or store which takes the trouble to explain the difference between admin and user accounts, or why it's important. Yet browsing via a user account will stop all but the most sophisticated attacks in their tracks, because Windows itself simply won't let the scumware install in the first place.

Whenever I have someone asking me about a new PC, I always, always tell them to create one admin account and as many user accounts as they need, explaining why as simply as necessary. The best analogy is that it's the difference between having a ticket to a rock concert and having a backstage pass.

It's simple. DO NOT BROWSE USING AN ADMINISTRATOR ACCOUNT UNLESS YOU *KNOW* THE SITE IS SECURE AND/OR CLEAN. EVER.

If you need to install something you've downloaded, the safest way is to: download it via the user account; switch to the admin account; disable internet access unless the installation needs to be verified online or whatever; install the software; then log back onto your user account. As long as you keep firewall and antiviral software updated, your PC will be as secure as it can be without disconnecting it from the Internet altogether. Puting it behind a router is even better, as it adds hardware protection. Administrator accounts should be used only for installing software and making changes to system policies, not browsing.

And don't forget to secure your wireless networks, peeps!

Had Microsoft not elected to treat its users like know-nothing idiots and explained about admin and user accounts in the user manuals when the NT-based versions of Windows first came out, I suspect the global virus problem would be nowhere near as bad as it is. These damn botnets might never have had a chance to establish in the first place.

On the other hand, hindsight is of course as perfect as it is useless. :p:

qasdfdsaq 03-06-2014 15:44

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Anonymouse (Post 35703762)
Whenever I have someone asking me about a new PC, I always, always tell them to create one admin account and as many user accounts as they need, explaining why as simply as necessary. The best analogy is that it's the difference between having a ticket to a rock concert and having a backstage pass.

It's simple. DO NOT BROWSE USING AN ADMINISTRATOR ACCOUNT UNLESS YOU *KNOW* THE SITE IS SECURE AND/OR CLEAN. EVER.

Totally superflous advice.

Loggin in under an "administrator account" does not mean any program you run is given administrator priveleges. All current versions of explicitly prompt the user to allow an application administrative access and unless the user actually allows it all applications ARE run as a non-administrative user account.

All that changing to a user account does is change the privilege escalation dialog to require a user type their password instead of clicking OK. It makes no sodding difference in the grand scheme of things. If a user erroneously clicks "Allow" when they shouldn't they're going to type their password and click "Allow" under the same circumstances.

Your analogy is also totally incorrect. The real equivalent is the difference between having a backstage pass and having a backstage pass. Only in the latter the doorman asks to check your ID against your pass when you go backstage instead of checking your ID at the door.

Qtx 03-06-2014 18:57

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by heero_yuy (Post 35703792)
This vulnerability is spread as so many others by a malicious e-mail attach.

It uses email attachments from a spamming botnet but also uses drive by downloads using the Magnitude exploit kit. So you can get infected just by visiting a site too.

---------- Post added at 19:57 ---------- Previous post was at 19:56 ----------

Quote:

Originally Posted by Ignitionnet (Post 35703755)
30 days after release AV detects ~60% of new malware and variants.

<snip>

I really do regret that malware course at times like these. It's made me so cynical. :(

Yet people think you have a screw loose when you tell them AV is far from foolproof and easy to bypass....

Ignitionnet 03-06-2014 21:52

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by heero_yuy (Post 35703792)
Even then you can be vulnerable to malicious scripts if you use IE.

To be honest more often it's Java vulnerabilities and other plug-ins that are the problem rather than IE or any other browser per se.

A malware escaping the JRE sandbox is bad whichever browser the JRE is running through.

alanbjames 04-06-2014 08:06

Re: 'Two weeks' to block cyber-attack
 
Well i have just scanned my PC using the symantec tool and all it found were two problems which are false positives.

Incredimail & Update.exe which is to do with Nero.

alferret 04-06-2014 09:39

Scaremongering, panic stations Mr Mainwaring!

Stuart 04-06-2014 10:02

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Ignitionnet (Post 35703901)
To be honest more often it's Java vulnerabilities and other plug-ins that are the problem rather than IE or any other browser per se.

A malware escaping the JRE sandbox is bad whichever browser the JRE is running through.

That's one thing people forget.

It's easy to blame Windows (or any OS) or any particular browser because these have produced lots of attack vectors in the past. But, Microsoft, Apple, the various Linux maintainers, and the browser manufacturers have all spent a lot of time and money over the last few years hardening the security on their code. They've experienced the problems and have worked to solve them.

As such, it's often easier for the bad guys to attack other software (something made easier by the fact that software that really doesn't need it is demanding network access now). The companies behind this software haven't had the problems to do with, so probably aren't prepared for them. At the moment, browser plugins and Java are being attacked and I think both Adobe and Oracle are working hard to improve the security in their products as a result. Neither are quite there yet, but it took the OS manufacturers a few years to get their act together.

I don't know what the next attack vector will be but I suspect it'll be other devices (such as smart TVs) that are suddenly wanting internet access as the companies behind these may not have a lot of experience of developing secure software. Or they may not be willing to spend the cash required to update old devices. Think about that. Microsoft have not long stopped patching a 13 year old OS. How many devices do you know of that receive updates beyond a year or two after release, if they receive any at all (I have an old Philips Freeview box that I bought when Freeview launched and it has never received a software update).

Ignitionnet 04-06-2014 10:16

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Stuart (Post 35703979)
I don't know what the next attack vector will be but I suspect it'll be other devices (such as smart TVs) that are suddenly wanting internet access as the companies behind these may not have a lot of experience of developing secure software.

Android smartphones. What, you thought that you were the only person who wanted to root your phone? ;)

Smart TVs are pretty disinteresting as they don't hold any private data and aren't really used to do anything that involves it.

qasdfdsaq 04-06-2014 12:36

Re: 'Two weeks' to block cyber-attack
 
Botnets are just as useful for outputting data (spam, DDoS, etc.) on behalf of the controllers as they are for gathering data from infected machines.

Qtx 04-06-2014 13:01

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Ignitionnet (Post 35703901)
To be honest more often it's Java vulnerabilities and other plug-ins that are the problem rather than IE or any other browser per se.

If we ignore activeX....Java, Flash, PDF and office documents are the most common plugins that lead to a compromise through the browser or OS.

---------- Post added at 13:59 ---------- Previous post was at 13:53 ----------

Quote:

Originally Posted by Stuart (Post 35703979)
I don't know what the next attack vector will be but I suspect it'll be other devices (such as smart TVs) that are suddenly wanting internet access as the companies behind these may not have a lot of experience of developing secure software.

There are already vulnerabilities found in smart tv's, which are running a kind of sandboxed linux mostly. Attacking these is not very useful for the average hacker at the moment but that may change if banking apps become common. Tv's with microphones and built in cameras are becoming more common and the security agencies will like to pwn those :)

Mobile phones have software issues but there is still a fundamental problem relating to SIMs and sending a dodgy message via most networks, which not many people are shouting about. The phone networks can fix the problem easy but that would stop GCHQ from making use of it. It's the only reason I can see that they wouldn't block this backdoor which has been known about for about 2 or 3 years now.

Internet connected fridges and toasters could indeed in theory send out spam.

---------- Post added at 14:01 ---------- Previous post was at 13:59 ----------

Quote:

Originally Posted by Ignitionnet (Post 35703984)
Smart TVs are pretty disinteresting as they don't hold any private data and aren't really used to do anything that involves it.

It's not stored data, it's data they send via http or other protocols which is of interest. If you use your tv to login to your email or twitter, there is a good chance you use that password elsewhere. If you can get the email password then you could potentially have access to all the accounts of that person.

Ignitionnet 04-06-2014 14:19

Re: 'Two weeks' to block cyber-attack
 
Naturally but it is scraping the bottom of the barrel to go down that route just yet. Very few people use their TV to access anything interesting, about the most you might get are Netflix credentials.

For sure Smart TV security is awful but for now Android-based devices are way more lucrative and ubiquitous.

No doubt as soon as people start using the TVs for everything they'll get more attention. The best bet for those is probably to keep them in walled gardens to be honest.

Qtx 04-06-2014 15:06

Re: 'Two weeks' to block cyber-attack
 
That is what it boils down to and has for years, what is most popular and will lead to the most infections. Infect that. That is why Internet Explorer and windows were the main targets for drive by downloads. Not that many internet connected tv's out there at the moment, no point spending time getting those infected.

Again you have to differentiate between a targeted attack and mass infections. If you are targeting an individual then everything is useful and it could be beneficial to sniff Netflix logins in case the same password is used elsewhere like email. If you are after bank logins it's a numbers game and you try and infect as many people as possible knowing a percentage of those installs will give the goodies, while the others can still be used for DDoS, sending spam, ransomware or other activities.

Plenty of Android malware on the play store disguised as Antivirus software and Android is a very lucrative platform with a large number of potential victims. Some custom roms (particularly Chinese/China based) available for download are pre-rootkitted so are well hidden from being spotted too. Gonna get worse before it gets better :(

qasdfdsaq 04-06-2014 15:22

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Qtx (Post 35704102)
That is what it boils down to and has for years, what is most popular and will lead to the most infections. Infect that. That is why Internet Explorer and windows were the main targets for drive by downloads. Not that many internet connected tv's out there at the moment, no point spending time getting those infected.

I do see a lot more malware and spammy adverts targeting Android these days. Some specifically designed for certain brands' browsers as well on popular sites. It's definitely taking off, and indeed, mostly because there are just so many devices and a lot of manufacturers are really bad at updating/patching older models.

Ignitionnet 04-06-2014 15:41

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Qtx (Post 35704102)
Plenty of Android malware on the play store disguised as Antivirus software and Android is a very lucrative platform with a large number of potential victims. Some custom roms (particularly Chinese/China based) available for download are pre-rootkitted so are well hidden from being spotted too. Gonna get worse before it gets better :(

Heh there's at least one Android Malware that actually co-operates with PC malware to steal money from online banking. It uses a broadcast receiver to intercept SMS.

The malware between them steal online banking credentials for bank(s) that use SMS to authenticate online transfers, then after a C&C request initiate a transfer to an account to receive the cash.

The SMS authentication gets intercepted by the Android malware and is used to complete the transaction without the user's knowledge. :)

See how many members disconnect from the Internet after reading this thread.

Qtx 04-06-2014 15:55

Re: 'Two weeks' to block cyber-attack
 
That technique has been in use by a zeus banking variant for over three years now. There was a completely independent malware strain found at the beginning of this year that does the same and a big fuss was made about it. Was end of 2010/ or beginning of 2011 the method was first seen in malware.

Plenty of apps out there that anyone can download to intercept sms and forward them to another phone without the user knowing too. Probably find some of them on the play store too.

The more people use two factor authentication, the more common this will become in other malware. Time for 3 and 4 factor authorisation with passcode, fuzzy logic and quantum bits :LOL:

Hugh 04-06-2014 20:12

Re: 'Two weeks' to block cyber-attack
 
Unfortunately, security has to be easy/simple to use for the lay/less experienced user.

I use to work for a major Financial Services company, and we encrypted all laptops (this was in 2003) - the number of times the Chairman or the CFO would lock themselves out (once or twice a week).

qasdfdsaq 04-06-2014 21:19

Re: 'Two weeks' to block cyber-attack
 
Similarly some of our encryption hardware is, IMO, a bit overkill. Some encrypted memory sticks will, for example, destroy the decryption key after 10 incorrect password attempts, rendering it impossible to access your data if someone enters the wrong password a few times, even if you remember the correct one eventually.

Have to advise people not to store critical data on there, which sorta defeats the purpose of using encrypted sticks in the first place.

thenry 05-06-2014 20:11

Re: 'Two weeks' to block cyber-attack
 
A fair few attacks made to anti-virus support community forums gaining access to usernames, passwords, email addresses. I had an email from ESET earlier.

Stuart 06-06-2014 08:55

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Ignitionnet (Post 35703984)
Android smartphones. What, you thought that you were the only person who wanted to root your phone? ;)

Phones are the obvious target. Android phones currently attract the most malware, but while Apple is currently doing a good job of protecting non-jailbroken iOS devices, there's no guarantee they'll continue to be able to do so, so iOS devices are also a potential target.

Quote:

Smart TVs are pretty disinteresting as they don't hold any private data and aren't really used to do anything that involves it.
I think Smart TVs would only really be of any use if you wanted to spy on the owners (most seem to have webcams and microphones now), you wanted to send out a lot of spam, to sniff out (and infect) computers with ports open that may be blocked by the router's firewall or to act as very slow bitcoin miners.

---------- Post added at 09:55 ---------- Previous post was at 09:47 ----------

Quote:

Originally Posted by Hugh (Post 35704223)
Unfortunately, security has to be easy/simple to use for the lay/less experienced user.

I use to work for a major Financial Services company, and we encrypted all laptops (this was in 2003) - the number of times the Chairman or the CFO would lock themselves out (once or twice a week).

I think security also has to be appropriate for purpose. What I mean by this is what is there any point in spending the time and money (if needed) to set up a decent security system if all you are going to do on the computer is go on facebook or twitter from time to time and not store any sensitive data beyond photos of the owner falling around drunk in some sunny party island.

qasdfdsaq 06-06-2014 15:52

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Stuart (Post 35704630)
or to act as very slow bitcoin miners.


Lol.
Quote:

sensitive data beyond photos of the owner falling around drunk in some sunny party island.
Some people could use said pictures as blackmail.. ;)

Qtx 11-06-2014 18:08

Re: 'Two weeks' to block cyber-attack
 
Quote:

Originally Posted by Stuart (Post 35704630)
I think Smart TVs would only really be of any use if you wanted to spy on the owners (most seem to have webcams and microphones now), you wanted to send out a lot of spam, to sniff out (and infect) computers with ports open that may be blocked by the router's firewall or to act as very slow bitcoin miners.

Looks like any internet connected tv, smart or not, can be abused for DDoS or other uses en-mass via the Hybrid Broadband protocol standard most new tv's have implemented. It's basically like HTML for the tv that does the red button type graphic displays and such. Cheap bit of radio transmitting hardware attached to your latop lets you broadcast your malicious code to all the tv's in the surrounding area. An interesting read: From the Aether to the Ethernet –
Attacking the Internet using Broadcast Digital Television

Ignitionnet 30-06-2014 22:52

Re: 'Two weeks' to block cyber-attack
 
Well the Internet hasn't ended...

qasdfdsaq 01-07-2014 13:03

Re: 'Two weeks' to block cyber-attack
 
That's what they want you to think

Hugh 02-07-2014 00:06

Re: 'Two weeks' to block cyber-attack
 
It went down briefly, but they failed over to a synchronous image........

qasdfdsaq 02-07-2014 01:05

Re: 'Two weeks' to block cyber-attack
 
They should have used VMWare Fault Tolerant mode, which keeps both CPUs in lockstep not just the disk image.

Ignitionnet 02-07-2014 10:14

Re: 'Two weeks' to block cyber-attack
 
Latency was too high.

qasdfdsaq 02-07-2014 13:56

Re: 'Two weeks' to block cyber-attack
 
Still better than ending the internet, even if only briefly.

Qtx 15-07-2014 15:12

Re: 'Two weeks' to block cyber-attack
 
Gameover ZeuS botnet pulls dripping stake from heart, staggers back from the UNDEAD

Quote:

The Gameover ZeuS malware is back from the dead just six weeks after a takedown operations that aimed to put a stake through the heart of the botnet, which is linked to the even more infamous CryptoLocker ransomware
Quote:

Some features of the old version have been dropped, including parts that were supposed to make it more sophisticated, in a move towards greater simplicity. In particular, the latest variant of the malware swaps P2P for fast-flux communication.

The latest variant of the malware tries phoning home to 1,000 domain names per day in order to receive command-and-control instructions. The crooks seem to be leaving it until the last minute to register domains they intend to use, according to an analysis of the latest variant by James Wyke, a senior threat researcher at Sophos.
The domain registering trick is at least 5 years old, if not older. Going back to basics and hope the algorithm for domain name generating doesn't get figured out.

Quote:

Fast Flux is a technique that allows a criminal who controls many servers to obfuscate the true location of his server by building a tiered infrastructure.
https://www.cableforum.co.uk/images/...2014/07/25.jpg

Qtx 16-08-2014 23:38

Re: 'Two weeks' to block cyber-attack
 
Quote:

Researchers Dave Loftus and Dennis Schwarz found the bot, now reborn as newGOZ, had ramped up its defences, dumping command and control for a more robust domain generation algorithm (DGA) and a fast flux DNS technique.

The DGA registered new domains based on time and date to make the bot more elusive.

However, researchers from across the security industry have been able to crack the DGA configurations and register the domains before newGOZ had a chance to do so, meaning the researchers would receive – and thus be able to study – traffic from compromised machines.
New article shows that botnet is up to 12k zombies and still growing: http://www.theregister.co.uk/2014/08..._the_dead_as_/

qasdfdsaq 18-08-2014 01:59

Re: 'Two weeks' to block cyber-attack
 
12k zombies isn't really that many, I've worked in places that have had 12k living...

Qtx 18-08-2014 14:59

Re: 'Two weeks' to block cyber-attack
 
Looks like GCHQ/NSA etc have more innocent users as zombies than this botnet :P

http://www.theinquirer.net/inquirer/...enda-programme

One of the slides suggests they actually exploit the systems to have them ready for use hiding their attacks, rather then just having a list of vulnerable ones ready to exploit if needed. Either way, no difference between governments, hackers or crime-based botnet herders, except for the fact it's legal when one of them does it.


All times are GMT. The time now is 07:58.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2026, vBulletin Solutions Inc.
All Posts and Content are © Cable Forum