BayPay Forum BayPay Forum

Menu

  • Home
  • Events
    • Past Events
  • News
    • Payments News
    • Crypto News
    • Fintech News
    • Retail News
    • Fraud News
    • Regulation News
    • Security News
    • Markets News
  • Our Podcasts
    • Our Weekly Podcast
    • Our Daily Podcast
  • Join Us
  • Login
BayPay Forum BayPay Forum
  • Home
  • Events
    • Past Events
  • News
    • Payments News
    • Crypto News
    • Fintech News
    • Retail News
    • Fraud News
    • Regulation News
    • Security News
    • Markets News
  • Our Podcasts
    • Our Weekly Podcast
    • Our Daily Podcast
  • Join Us
  • Login

Did Russia Put Angler Out of Business?

Details
Category: Security News
31 December 1969

Anti-Malware , Fraud , Technology

Commercial Version of Exploit Kit No Longer for Sale Jeremy Kirk (jeremy_kirk) • June 14, 2016     Did Russia Put Angler Out of Business?

One of the most potent tools for hacking computers, the Angler exploit kit, effectively disappeared one week ago, and many experts believe that development is connected to a large roundup of suspected cybercriminals in Russia. But Angler isn't necessarily going away; it may just be retrenching.

See Also: The Inconvenient Truth About API Security

Known in underground circles as "XXX," Angler is an exploit kit, which is a server-based framework that quickly scans a computer for browser-related software vulnerabilities and silently delivers malware through web-based attacks.

Exploit kits have dramatically changed the computer security landscape. Engineered by highly skilled cybercriminals, the kits are offered for rent to other hackers who want to spread their malware.

Angler was one of the most-seen exploit kits last year. It cost as much as $5,000 per month to rent and in part was responsible for the prevalence of file-encrypting malware known as ransomware.

Around June 6, however, attacks linked to Angler almost completely vanished. Five days prior, Russia's security agency, the FSB, said it arrested 50 people for allegedly stealing 1.7 billion rubles ($25.5 million) from several Russian financial services firms over a five-year period using the "Lurk" malware (see Russian Police Bust Alleged Bank Malware Gang).

Angler's developers have long been suspected to be operating from Russia or Eastern Europe.

The exploit kit's disappearance "is not coincidental, that's what we think," says Andrei Barysevich, director of Eastern European research and analysis for Flashpoint, a company that specializes in cybercrime intelligence. "At first we have 50 guys arrested in Russia, then within a week, Angler literally disappears."

Just Laying Low?

It appears that Angler's developers have just decided to lay low following the arrests. Andrew Komarov, chief intelligence officer at InfoArmor, says an Angler administrator wrote on an underground forum following the arrests that sales of Angler have been stopped, for now.

The group that was arrested in Russia was apparently one of the biggest customers of Angler, Komarov says. Angler's operators fear law enforcement may lean on those who were arrested to get close to them.

"They simply made the decision to stop sales to prevent infiltration from customers they don't know," Komarov says.

There are two versions of Angler: a private one used for the Angler gang's own operations and a commercial one. Komarov said it's the latter that is temporarily being withdrawn from the market while the group makes technical adjustments to their infrastructure to prevent them from being discovered.

"They're panicking," Komarov says.

At the Top of its Game

Angler's disappearance ironically comes as it had achieved a number-one market position ahead of competitors, including the Neutrino and Nuclear exploit kits.

Part of the reason for Angler's dominance is that its developers have quickly incorporated exploits for zero-day vulnerabilities - often for Adobe's oft-targeted Flash browser plug-in - into its framework. Zero-day vulnerabilities are those that have not been patched by a software vendor, meaning most computers are defenseless against an attack, and Flash's wide install base makes it a natural target.

"We really saw Angler pull out from the back middle of the pack out to the front by the end of the year," says Christopher Budd, global threat communications manager for Trend Micro.

Budd says Angler's complexity and fast development illustrates how security companies are fighting very agile adversaries. "Arguably, there's more professionalization in malware than in startup app development," he says.

Angler was closely held by its creators, Komarov of InfoArmor says. Those who rent it only communicate using encrypted instant messaging, and customers are carefully vetted before a rental deal gets agreed.

Even then, other cybercriminals who rent it do not actually have access to the exploit kit software. Instead, Angler's operators arrange technical access to their own servers that host the kit by providing a configuration file.

A hacker who rents Angler provides a domain name for a compromised website to Angler's operators. If a victim goes to the compromised website, the traffic is then tunneled through various proxies to a server hosting Angler, in order for the exploits to be delivered.

It's a complicated procedure, and one that isn't easy for security experts to untangle. Furthermore, a malware payload - which is what is delivered after an attack, such as ransomware - is often encrypted and won't necessarily be detected at first by security software.

"If you think about it, [Angler] is so turnkey, and it has the ability to really protect itself and protect its backend services," says Wayne Crowder, director of threat intelligence at RiskAnalytics. "It's hard to track, hard to trace. It shows its value. I hate to say that when cybercriminals are doing it."

Angler's use in spreading ransomware has helped make that type of malware one of the biggest threats on the internet. Over the past couple of years, Angler has been used to deliver ransomware variants including CryptoWall, TelsaCrypt, AlphaCrypt and most recently, CryptXXX.

"Anti-virus in general has reasonably poor coverage against Angler," says Craig Williams, security outreach manager at Cisco.

Neutrino Fills the Void

In the absence of the commercial version of Angler, developers of another exploit kit have moved quickly to pick up the slack.

Experts have seen an increase in attacks using Neutrino, also one of the top exploit kits. The security company Malwarebytes has seen several recent large malvertising attacks using Neutrino, writes Jerome Segura, a senior security researcher.

Malvertising is the practice of placing malicious ads with online advertising companies. It's one of the most powerful methods for infecting mass numbers of computers quickly, especially if a high-traffic website displays such an ad. Victims can be infected with malware merely by viewing a malicious ad that is connected to an exploit kit server.

The cost of renting Neutrino has increased following Angler's pullback, says Flashpoint's Barysevich. Neutrino was renting for around $1,500 a month, but that price has spiked in the last few days to $4,000 a month.

"Neutrino is there to take [Angler's] place," he says.

Original link

Disrupt Attack Campaigns with Network Traffic Security Analytics

Details
Category: Security News
31 December 1969

Cybersecurity , Data Breach , Risk Management

Disrupt Attack Campaigns with Network Traffic Security Analytics Presented by Arbor Networks     60 Minutes     Disrupt Attack Campaigns with Network Traffic Security Analytics Security leaders annually spend millions of dollars on new solutions to protect their endpoints and perimeters - and yet they still get breached. What's wrong with this picture? Register for this session to get the latest insights on how detecting incidents of compromise using network traffic - which sees all malicious activities - can help your organization uncover and stop advanced threats more effectively. Sam Curry of Arbor Networks and Doug Cahill of Enterprise Strategy Group will discuss: The fatal flaw in many organizations' cybersecurity investment plans; The power of new network traffic security analytics; How organizations are maximizing their spend - and security - with smart new investments in these emerging solutions. Enterprise organizations spend millions of dollars on security technologies like antivirus software, firewalls, IDS/IPS, and SIEM systems, yet they continue to experience cyber-attacks and data breaches. Can adding additional data analytics capabilities help address this issue? There are lots of security analytics technologies to choose from, but network traffic security analytics systems have some distinct advantages. Since malicious activities crisscross over networks, network traffic security analytics can act as a source of truth for modelling normal network behavior, detecting anomalies, investigating malicious patterns, and hunting for stealthy cyber-attacks in progress. You might also be interested in … Critiquing FDA Medical Device Cybersecurity Guidance Critiquing FDA Medical Device Cybersecurity Guidance
After Russia Hacks DNC: Surprising Candor
After Russia Hacks DNC: Surprising Candor
Report: Russia's 'Best' Hackers Access DNC's Trump Research
Report: Russia's 'Best' Hackers Access DNC's Trump Research
Securing Against Advanced Threats
Securing Against Advanced Threats
Did Russia Put Angler Out of Business?
Did Russia Put Angler Out of Business?
Symantec to Buy Blue Coat for $4.65 Billion
Symantec to Buy Blue Coat for $4.65 Billion
Cybercrime Victims: Please Come Forward
Cybercrime Victims: Please Come Forward
University of Calgary Pays Ransom
University of Calgary Pays Ransom
Monitoring of Medical Device Security to Be Scrutinized
Monitoring of Medical Device Security to Be Scrutinized
Original link

Advanced Threats, the Board and You

Details
Category: Security News
31 December 1969

Cybersecurity , Data Breach , Risk Management

Advanced Threats, the Board and You Presented by Lockheed Martin & Cybereason     60 Minutes     Advanced Threats, the Board and You As a security leader, if you have been in front of your board to talk about advanced threats, acceptable risk and staying out of the headlines, you know it's not a walk in the park. To convey the challenge, even for the most savvy security executive, requires a complex chess game of technology, business and risk management. Join a diverse and experienced panel of security leaders for this frank discussion of Advanced Threats, the Board, and You - a rich dialog on the ugly truth of APTs and how to get the board fighting on your side as you battle the cyber war. Register for this session and gain new insights on: Advanced threat intelligence and its impact on your business; How to build a military-grade strategy to fight virulent threats; How to have the conversation with your board about the balance between risk and defense. Beginning with RSA breach, continuing with the Target hack and advancing with the past year's headline news of attacks on Anthem, Sony and TalkTalk, cybersecurity in recent years has become a mainstream discussion topic. And business leaders worldwide have come to accept the grim reality: A destructive breach on their watch could cost them their job. But it isn't enough just to be aware of the potential business impact of a breach. Security leaders need to be engaging their boards and line-of-business peers on a regular basis to ensure cybersecurity awareness and controls are current and satisfactory. Yet, how should security leaders start, sustain and measure the results of this dialogue? Join this panel of veteran leaders for a frank discussion about advanced threats, defense and managing business risks. Through interactive dialogue, understand how your peers currently are dealing with today's top advanced threats, and walk away with new insights and ideas for how to better educate, interact with and win support from your board. You might also be interested in … Critiquing FDA Medical Device Cybersecurity Guidance Critiquing FDA Medical Device Cybersecurity Guidance
After Russia Hacks DNC: Surprising Candor
After Russia Hacks DNC: Surprising Candor
Report: Russia's 'Best' Hackers Access DNC's Trump Research
Report: Russia's 'Best' Hackers Access DNC's Trump Research
Securing Against Advanced Threats
Securing Against Advanced Threats
Did Russia Put Angler Out of Business?
Did Russia Put Angler Out of Business?
Symantec to Buy Blue Coat for $4.65 Billion
Symantec to Buy Blue Coat for $4.65 Billion
Cybercrime Victims: Please Come Forward
Cybercrime Victims: Please Come Forward
University of Calgary Pays Ransom
University of Calgary Pays Ransom
Monitoring of Medical Device Security to Be Scrutinized
Monitoring of Medical Device Security to Be Scrutinized
Original link

ABA: Retailers Should Meet Higher Cybersecurity Standards

Details
Category: Security News
31 December 1969

The American Bankers Association rejects the Retail Industry Leaders Association's contention that a legislative proposal to hold retailers to the same cybersecurity standards as banks is unfair (see Retailers: Don't Require Us to Meet Bank Security Standards).

Reacting to a letter RILA recently sent to Congress objecting to provisions in the Data Security Act of 2015, also known as H.R. 2205, Doug Johnson, a senior vice president at the ABA, says the criticisms of the legislation are tantamount to grasping at straws in an effort to prevent retailers from having to be subjected to more stringent regulatory scrutiny of their security measures.

"We're really trying to ensure that, to the greatest extent possible, all businesses adhere to the same level of data security," Johnson says in supporting the legislative proposal in an interview with Information Security Media Group.

"One of the things that we continually hear from the retail side is that banks have to have a higher level of security than the retail environment does. And our response to that has always been that even the smallest credit union has to abide by Gramm-Leach-Bliley," Johnson says. "The smallest credit union, which is maybe akin to the size of the smallest coffee shop, actually has the same requirements. But those requirements scale to the size of the institution and the risks that that institution presents to the overall environment and the kind of sensitive data that that entity has."

So why should retailers be expected to meet the same security standards as banks? "Because they have a lot of the same data," Johnson stresses.

Johnson says he's hopeful Congress will vote on compromise legislation establishing cybersecurity standards, as well as a national standard for breach notification, next year.

During this interview (see audio player below photo), Johnson also discusses:

Why he agrees with retailers that the Federal Trade Commission should be the enforcement body that regulates and enforces cybersecurity for retailers; How information sharing between bankers and retailers will help fuel stronger cooperation between the two groups; and Why protecting payment data along all points of the financial chain is increasingly critical.

Johnson leads the ABA's enterprise risk, physical security, cybersecurity, business continuity and resiliency policy and fraud deterrence efforts. He represents the ABA on the Financial Services Sector Coordinating Council, which advises the federal bank regulatory agencies on homeland security and critical infrastructure protection issues.

Original link

'Space Rogue' on Déjà Vu Security Failures

Details
Category: Security News
31 December 1969

Many breaches could have been prevented or better mitigated if organizations took basic security steps, such as properly salting and hashing passwords, getting users to pick strong passwords, requiring two-factor authentication for access and patching critical vulnerabilities in a timely manner. But so many breaches continue to demonstrate how even these no-brainer security controls so often aren't employed (see Why Are We So Stupid About Passwords?).

As a result, it can feel like information security déjà vu all over again as security professionals fight so many of the same battles that they were fighting 10 or even 20 years ago, says Cris Thomas, a strategist at vulnerability detection system provider Tenable Network Security who's better known by his "Space Rogue" white hat hacker handle. "We have the knowledge and technology, but for whatever reason, it's not being applied. That still leaves people at risk," he says.

Furthermore, it's unclear how this problem might get remedied, despite the mega-breaches of Target, Home Depot, the U.S. Office of Personnel Management and countless others. "We've had hundreds of wake-up calls," he says. "Either the alarm is not loud enough, or [we] just keep hitting the snooze button."

In this interview with Information Security Media Group at the recent Infosec Europe conference in London, Thomas discusses:

Organizations' failure to sort out passwords, patches and securing critical data; Why the "defense in depth" model is irrevocably broken; The never-ending need for greater visibility into systems and networks; and Internet of Things security challenges.

Before joining Tenable Network Security, Thomas served as threat intelligence manager at Trustwave and as the editor of Hacker News Network, which he created. He also was a member of pioneering security research think thank L0pht Heavy Industries and co-founder of internet security consultancy @stake.

Original link

More Articles …

  1. IBM Brings 'Watson' Supercomputer to Cybersecurity Fight
  2. Symantec's Latest Buy; Mobile App Woes
  3. PCI Turns 10: Will It Last Another 10 Years?
  4. LinkedIn Sale: Mega Bucks, No Matter Mega Breach
  • 3439
  • 3440
  • 3441
  • 3442
  • 3443
  • 3444
  • 3445
  • 3446
  • 3447
  • 3448

Page 3444 of 3546