End-users should ensure that all devices in their infrastructure are kept patched and updated with the latest firmware. Devices of higher criticality should use multi-factor authentication for an additional layer of security.
(88)
End-users should ensure that all devices in their infrastructure are kept patched and updated with the latest firmware. Devices of higher criticality should use multi-factor authentication for an additional layer of security.
(88)
Automotive company Honda has exposed approximately 26,000 vehicle owner record belonging to North American customers, due to an ElasticSearch cluster misconfigured on October 21, 2019. The publicly-accessible server, discovered by a Security Discovery researcher on December 11, was secured within hours by Honda’s security team in Japan. The server is said to have housed information such as customer names, email addresses, phone numbers, mailing addresses, and car service information. The company has said that no financial information was exposed.
You can read more here: https://www.bleepingcomputer.com/news/security/honda-exposes-26-000-records-of-north-american-customers/
Peter Draper, technical director EMEA at Gurucul comments:
“The plethora of databases (especially MongoDB and Elatsic) that have been made publicly available with no security is staggering. You would expect every company using the technologies that are constantly reported on for breaches they would actively seek out and secure their own services. But no, it’s still happening.
Misconfiguration is one of the main reasons resources get compromised. Let’s hope that during the period mentioned that the information was not accessed by nefarious individuals other than the security researchers.
Enterprises must be more focused on protecting users data and have the right tools, personnel and processes to do so robustly.”
(62)
Cyber-attacks have targeted nearly 75 percent of large companies across Europe and North America over the last twelve months. According to PreciseSecurity.com research, almost 40 percent of all cyber-attacks in 2019 was performed by using cross-site scripting, which is hackers’ favorite attack vector globally.
Challenge and Opportunity to Learn are Main Reasons for Hacking Companies
Cross-site scripting or XSS is a type of injection attack, in which malicious scripts are injected into trusted websites. Most of the XSS attacks are performed by using a web application to send malicious code, mostly in the form of a browser side script, to a different end-user. The statistics show SQL injection is the second most used attack vector globally, followed by fuzzing.
However, the 2019 surveys revealed some interesting facts about the global hacker’s reasons for choosing the company to hack. Nearly 60 percent of them named the challenge and the opportunity to learn as the primary reason for doing cyber-attacks. Forty percent of hackers perform the attacks because they simply like the company, while 36 percent of them want to test the security team’s responsiveness.
More than 72 Percent of Hackers Attack Websites
With 72.3 percent of all cyber-attacks happening on the websites, the 2019 data indicates this is the hackers’ favorite platform to perform attacks globally. Because of its massive user-base, WordPress is one of the prime targets of hackers, and 98 percent of WP platform vulnerabilities are related to plugins.
An application program interface (API) is the second most targeted platform with a 6.8 percent share in the global hacking incidents list. The statistics show that around 7 percent of hackers choose Android mobile and operating systems for performing attacks. Attacks aiming at downloadable software and the Internet make only 3.9 percent of all hacking incidents globally.
The full story can be read here: https://www.precisesecurity.com/articles/cross-site-scripting-xss-makes-nearly-40-of-all-cyber-attacks-in-2019/
(62)
(84)
By Peter Barker, 3M
Information security management should include all ways in which data is shared or viewable, and that includes visual privacy. With so much focus on cyber-threats, visual privacy has maybe not been given the attention it needs, but that is changing fast, with organisations of all kinds embracing this form of physical information security into their overall security strategies.
This has partly been driven by the fact that visual privacy is implicit within the General Data Protection Regulation (GDPR), which as it is a principle-based regulation, puts the onus on organisations to think about GDPR requirements, rather than regulators given them a list of specific actions to follow. So, it does not matter whether an unauthorised data disclosure results from a hacker launching a sophisticated cyber-attack, or due to a stranger taking a picture of potentially highly sensitive data displayed on an employee’s laptop screen. As well as the GDPR, ensuring visual privacy is implicit or explicit in a variety of industry-specific guidelines or standards, including financial services, legal, healthcare education and public sector.
Compliance is not, however, the only reason that organisations are taking visual privacy more seriously. There is a growing realisation of just how easy ‘visual hacking’ or ‘shoulder-surfing’ is to achieve. The most robust security software in the world is immediately undermined should someone view or even photograph confidential information on a document or screen. Company information can be sold, identities stolen and user credentials used to hack into a corporate network.
In the Global Visual Hacking Experiment conducted in 2016 by global security specialist The Ponemon Institute and sponsored by 3M, the science-based technology company, a white hat hacker posed as a temporary officer worker in offices in eight countries (with the participating organisations’ permission). The hacks were successful in more than 90 per cent of attempts, with 49 per cent taking 15 minute or less. The hacker was only challenged in approximately a third of attempts. This shows just how easy visual hacks are to achieve: no specialist skills are required. Alarmingly, anyone can be a visual hacker.
That study was conducted inside open plan offices, but the potential risk landscape expands with people increasingly working in public spaces. According to a 2019 Quocirca survey of more than 1500 organisations, 66 per cent believe their workforces will be mobile by 2025. In the Open Spaces surveyed conducted by the Ponemon Institute, nine out of ten people questioned had caught someone looking at data on their laptops in public.
Stop visual hacks in their tracks
Fortunately, improving visual privacy is achievable through a number of methods. Here are some of the steps that banks, fintech vendors and other firms involved in the financial sector are already implementing.
1. Awareness and management support – ensure that employees are not only aware of the visual hacking risk, but also their own responsibility to keep information secure from prying eyes. Plus, as is often the case in so many initiatives, visual privacy measures are more likely to be followed if they are backed at executive level.
2. Clear it away – paper can be a visual security risk too, so make sure that confidential papers are not left where they can be observed or photographed. Likewise, make sure that mailroom, copier, printer trays and fax machines do not contain documents yet to be collected. ‘Pull printing’ is a technique built into some modern machines that ensures documents can only be collected by an authorised person. Shredding and reduction of paper usage should be routine by now.
3. Speak up – employees should feel empowered to politely confront or report anyone they do not recognise, is not displaying clear ID, or is in an unauthorised location.
4. Make it hard – angle screens away from easy viewing. In public, sit with backs to a wall. Screensavers and automatic log-ins are nothing new, but are highly effective at reducing the amount of time displays can be seen.
5. Use privacy filters – the latest generation of these are designed to be easily flipped up or down, depending on when someone wants to share their screen. When down, on-screen data is only visible straight on and at close range, so someone taking a sideways glance or from a seat in the row behind will see just a blank image. Filters can be applied to monitors, laptops, tablets and even smartphones.
Security management is a multi-faceted challenge, but reducing the risk of visual hacking is one measure that is relatively simple, fast and cost-effective. For any organisation, whether in the financial sector or not, building better visual privacy into security policies is a smart decision.
(65)
The personal information of 15 million Canadians may have been exposed after a company that performs diagnostic, naturopathic, and genetic tests had its computer systems hacked.
LifeLabs announced the breach on its website, saying it discovered the hack through proactive surveillance.
The company says it paid a ransom in order to secure the data, including test results from 85,000 Ontarians. It says that the majority of affected customers are from B.C. and Ontario, and the breach was discovered at the end of October.
The compromised test results were from 2016 and earlier and LifeLabs says there is no evidence that results were accessed in other provinces aside from Ontario, it was reported.
In response, Javvad Malik, security awareness advocate at KnowBe4 comments:
“There are few details available at the moment, so it’s difficult to say how the breach occurred. All that we know at the moment is that an unauthorised third party managed to gain access to a large dataset of customer information.
It looks like the criminals were successfully able to extort money from LifeLabs, but paying criminals is no guarantee they won’t re-sell the data, or use it to compromise users further. So customers should be wary of any emails they receive, particularly ones which may claim to be from LifeLabs.
Additionally, customers should take advantage of any identity theft protection that is offered and keep an eye on their credit records. “
(52)
It has been reported that Ring and Nest security cameras are being targeted by hacking group who harass homeowners and broadcast the abuse on podcast – including a chilling ‘I’m Santa Claus’ threat to eight-year-old girl. The string of hacks are being linked back to a podcast that broadcasts the intrusions for laughs. According to a report from Motherboard, a podcast dubbed NulledCast, has been involved in a number of hacks on the Amazon-owned Ring security cameras in which hackers commandeer the device’s microphone to harass victims on the other side.
Commenting on this, Gavin Millard, VP of intelligence at Tenable, said “This week, we’ve seen a number of stories of Ring cameras being compromised. These intrusions aren’t due to vulnerabilities in the firmware but how the devices have been set up. According to a blog post from Ring, attackers are using stolen credentials from previous, unrelated breaches against Ring accounts to see if the ‘keys’ work, often referred to as credential stuffing.
(73)
Three attacks that targeted organizations in this type of attack with the end goal of scraping payment card data were observed during the summer of 2019, according to the Visa Payment Fraud Disruption (PFD).
In response, Nigel Stanley, CTO at TUV Rheinland, commented:
(79)
(56)
More than 460,000 credit cards and accompanying information has been discovered for sale on the Dark Web by security researchers at Group-IB. The cards for sale included the expiration date, CVV code (card verification value), card number, and the name of the person on the card.
The full story can be found here: https://www.bleepingcomputer.com/news/security/batch-of-460-000-payment-cards-sold-on-black-market-forum/
Robert Capps, VP of Market Innovation for NuData Security, a Mastercard company comments:
“Many websites are suffering from Magecart-like attacks as hackers deploy malware within the merchant checkout process, in an effort to steal credit card information as it’s entered by the consumer. Once stolen, this card data, including card number, expiration date, CVV and consumer information are sold on the dark web to hackers who are amassing this stolen information for card-not-present fraud. Unfortunately, these types of attacks are not going away. Consumers should check their credit card statements frequently, and contact their bank regarding any suspicious transactions they might see. Companies need to do more to verify the legitimacy of their buyers, by also identifying consumers by their online behaviour, instead of just relying on credentials or consumer information like credit card numbers. This method allows companies to more easily identify potentially fraudulent transactions that use credit cards that have been stolen, before the transaction is completed.”
(42)