Being Hacked

Last week my Yahoo account was hacked and 5000 or so of my closest friends got infected emails from me. Yikes. How did this happen? Beats me. Somehow I had downloaded something nasty myself.

My Yahoo account has been around since several CEOs ago, and it isn’t an account that I do much with. I was surprised by several things that were present in my Yahoo profile though that gave me some pause. For example: my contacts list. I didn’t think that I had many email addresses in my contacts but I saw that I had 5000 entries now. Apparently, sometime ago I had experimented with the bulk import feature and had imported my contact list to this account. Gulp. Well, let’s fix that and I thought I would delete the entries. That produced a mysterious error message. Strike one.

Next, I saw that I actually had the right birthday in my Yahoo profile. Okay, lets change that. Well, you can’t. Or at least not that I could immediately see. Strike two.

Okay, well, at least I could just login and change my account password. That was fine until I realized that I picked a password that I had used on some other accounts. Oops. Strike three.

Alright, enough fooling around. This was crazy. Do I really need a Yahoo email account? Not at all, this isn’t an account that I use for any correspondence. I can create a new one for free anyway that doesn’t have any contacts at all. So let’s just close the darn account. Not so easy. I first had to change my password again and then visit a special page to terminate the account.

Before I did this, I went to the Yahoo Groups page where I run several email mailing lists. One of the lists had my Yahoo ID as the group “owner” which means that I have to assign the group to a new Yahoo ID. So I set up a new Yahoo email address and tried to transfer ownership to this new ID. That wasn’t enough – I still had no Yahoo ID attached to this account. Why? I have no idea. It was a Yahoo.com email address. You would think it would be obvious, but it wasn’t. I used to like Yahoo Groups, but now I was getting ready to just close all of them that I administer, I was so frustrated.

So far my security efforts have been to waste a lot of time signing in and out of Yahoo and trying to understand their systems. There is actually a helpful page of what you have to do if your account has been compromised. (Although it stops short of recommending any specific scanning products to see if your computer has been infected.)

Last week I wasn’t alone: the New York Times ran its own mea culpa article that describes how Chinese hackers targeted several reporters’ email addresses after it ran some critical articles last fall. I found the article interesting in that it specifically mentioned that the Times uses Symantec anti-virus software to protect its computers, only they weren’t really protected. There are lots more information in the piece about what happened and what it took for the Times to clean up after this exploit.

I have written about this before, how anti-virus has become outmoded, on my Dice Security forum that I manage.

I welcome your suggestions on a simple tool that can help in these situations. I haven’t found any that really work all that well.

Self promotions dep’t

Last week I had several articles posted on the various places that I write for. You might be interested in reading one or more of them.

If you want your telecommuter IT team members to feel like they’re part of the same team that works at the company offices, then take a look at these tips in a piece I wrote for a new Mendix blog.

You can read my report posted this month in Techtarget’s Modern Infrastructure ezine here about why the move to faster Ethernet is and isn’t happening across the land.

I tested one of their midrange devices last month and came away impressed. Overall, Cisco has done a superior job at its next generation of firewall technology. There is a written report and a screencast video.

When I travel, I remember to turn off the file sharing setting on my PC for precisely this reason. It is a simple step, but a critical one. Here is what happened to one of my fellow guests when he left sharing on his computer turned on. This was for Internet Evolution.

In this ebook for Fierce Enterprise Communications, I wrote articles talking about how you want to take the next steps from your voice over IP telephony and does SIP trunking really mean the end of the public switched phone network.

N.B. Looks like I wasn’t alone. This might be the explanation for the Yahoo hack:

Email attack exploits vulnerability in Yahoo site to hijack accounts

Cisco Moves to the Next Generation with its ASA CX Firewall

We all know that the bad guys are getting more sophisticated and determined to invade business networks. The first week of 2013 started out with a bang: a series of well-publicized Java exploits, watering hole campaigns, and denial of service attacks – and that was just business as usual for the modern cyber-crook.

Enterprise network managers have to fight these exploits with better tools, and one ray of hope is a new context-aware firewall from Cisco called ASA CX. I tested one of their midrange ASA-5525-X devices this month and came away impressed. Overall, Cisco has done a superior job at its next generation of firewall technology. The user interface of the Prime Security Manager is, well, prime and one of the best pieces of software I have seen from them, and the features are on par if not better than what their competitors offer.

Here is my report.

There is also an accompanying video screencast review where you can see the firewall in action.

Internet Evolution: Turn File Sharing Off When You Travel, Puh-Leaze!

Has this happened to you? I am staying at a hotel where the Wifi creates one flat network, and of course, there are numerous people who don’t know the first thing about basic security practice. Why do I know this? Because I can see several of them who have file sharing turned on for their PCs. They are listed by name in my Mac’s Finder (John Jones Computer, Sid Smith Computer, etc.) and it is a bit scary.

When I travel, I remember to turn off the file sharing setting on my PC for precisely this reason. It is a simple step, but a critical one.

So last night I was in this hotel in Silicon Valley and I was feeling somewhat puckish. I noticed that one person’s computer was listed. I clicked on his computer to see if file sharing was turned on. It was, and in a moment, I could see his entire hard drive, including a “private” folder filled with PDFs of his credit card and other banking statements, loads of business documents, and the bonus: before/after pictures of his wife’s implants. (I Had To Look. Nice work, btw.)

So I took one of my newfound friend’s documents, it was a boating license or something, and copied it to a USB key and printed it out at the business center. I put it and a note to my friend and left it at the front desk, suggesting that:

a) He turn off file sharing tout suite if he didn’t want anything else shared with the entire hotel for the rest of his stay and

b) He might want to invest in some hard disk encryption, particularly for all the stuff that he very conveniently left in his “private” folder for everyone to see.

Most hotels don’t really spend the time and energy to lock down their networks, and most business travelers don’t spend the time and energy to lock down their computers. The result is a boon for any corporate spy that has a laptop and minimal skills. Go to any center city convention hotel today and within minute you can collect Powerpoints, secret documents, and business plans on just about any industrial topic. And you don’t need any skill, other than showing up at the right time and place.

As I saw this week, many hotels typically don’t segment their guest LANs – meaning that everyone in the hotel is on the same segment, has the same access, and can see anything across the entire network. This is true for wired and wireless access. Obviously, if a wireless user can sit in the parking lot of the hotel and gain access to the entire hotel LAN, this is even more trouble waiting to happen. The best situation is to have every single guest on a separate virtual LAN so they can’t see anyone else’s traffic. This requires them to use more expensive switching hardware, of course.

How prevalent is all of this? Two colleagues, Lisa Phifer and Craig Mathias, traveled around the northeast and tested 24 hotels back in 2006. They found trouble almost everywhere they went. Just one in four sites could prevent wireless eavesdropping and block all notebook probes. Sadly, the situation isn’t much different in 2013.

“Hotspot users might be unpleasantly surprised to discover they are reachable from the Internet [when they choose public IP addresses]. We expected paid networks would protect users from each other or Internet attacks more often than free hotspots, but this was not the case. Several free hotspots had noteworthy exposures, but so did paid networks, including the most expensive sites. “

The only two Internet providers that passed all their security tests were I-Bahn and T-Mobile. They segregate traffic by user and prevent people from inadvertently sharing their connection. The others, including Guest-Tek, Passsym, Starwood, TurboNet, StayOnline, and Wayport, all had security problems when the pair did their original research.

So don’t forget the security basics when you travel. Don’t leave your USB key drives lying around with all sorts of private stuff on them. Use a simple PIN to protect your phones. This isn’t rocket science: it is just basic Security 101, or not even but still something that everyone should just do and internalize. And if you stay at a hotel that has a flat network, use disk encryption and a VPN to keep people like me from looking around your computer’s hard drive.

Using Cisco ASA CX Firewall To Protect Your Network

My latest screencast video review is of the Cisco ASA CX next generation firewall. It has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports than its predecessors. I tested the ASA-5525-X and found a much improved user interface and lots of content-aware features.

Dice: My favorite security stories of the week

Here are links to some of my favorites from the trades in the past week. You can get more information on other links for security professionals, upcoming conferences, and security experts on Twitter to follow from my Dice Security Community here.

  1. Protecting Data In The Cloud Without Making It Unusable
  2. In ex-Soviet states, Russian spy tech still watches you
  3. BYOD Policies Need Implementation, Enforcement
  4. Don’t Click the Left Mouse Button: Introducing Trojan Upclicker
  5. Poor SCADA security will keep attackers and researchers busy in 2013
  6. PowerPoint about the Mayan “end of the world” secretly boobytrapped with malware
  7. SDN: Is Big Data a Killer App?
  8. Patching Metro apps on a wing and a prayer
  9. Data Wiping: A New Trend in Cyber Sabotage?

Network World: Okta, OneLogin top single sign-on review

We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes. One solution is a single sign-on (SSO) tool to automate the logins of enterprise applications and also beef up password complexity, without taxing end users to try to remember dozens of different logins.

In this review for Network World, I tested eight products: SecureAuth, OneLogin, Okta, Symplified, Intel’s McAfee Cloud Identity Manager, Numina Application Framework, SmartSignin and Radiant Logic. Okta and OneLogin came out on top.

You can see the various screenshots on my Pinterest Board here.

Dice: Is Anti-Virus Passe?

Last month, security firm Imperva released its November Hacker Intelligence report “Assessing the Effectiveness of Anti-Virus Solutions,” which collected and
analyzed more than 80 unreported viruses against more than 40
anti-virus solutions. Imperva found that none of the tested anti-virus solutions
were able to detect previously unreported viruses and that 75 percent
of solutions took up to a month or longer to update its signatures.

That isn’t good news, but while Imperva obviously has some vested self-interest here, I think their report is worthy of a closer read nonetheless. What it means is that we have to depend on a variety of protective solutions to keep our computers safe and infection-free, and that as the bad guys get more sophisticated with their attacks, we have to get more sophisticated with our defenses.

Let’s look more closely at the tests that were done. First, the team at Imperva collected 82 viruses from various evil places. As the authors state, “A number of sources which assisted us in getting our hands on no small amount of relatively new viruses were forums in Russian, whose purpose was to enable hackers to discuss viruses and obtain assistance in developing them. The availability of malicious code and viruses in these forums was extremely high. Any kid could build a virus by themselves or download one ready-made.” That is pretty scary, but nothing new if you have been following security news postings over the past few years.

They then made sure that none of them had signatures that were already on their books or could be accounted for by their competitors, through a service called VirusTotal.com. This notion of signature matching is becoming obsolete, anyway. There are a number of virus construction kits that are readily available online that can customize a virus for each particular desktop, meaning that each virus has a separate and unique signature.

  • Lag times are long. Imperva found that it can take typical AV solutions three weeks to update their databases to recognize one of the viruses in their collection, and some took up to a month or even longer. As the authors state, “the rate of update for their signature databases is very slow and even viruses that are already known to most anti-virus products are still not identified by these insufficient products.”
  • Freeware is best. Imperva found the most optimal protection included two freeware anti-virus products, Avast and Emsisoft. Although for commercial products, both McAfee and Symantec also excelled in detecting their set of viruses.
  • Behavior instead of signatures is needed. Imperva does not recommend completely eliminating it from an effective security posture. Instead, they suggest that “security teams should focus on detecting abnormal behavior such as unusually fast access speeds or large volume of downloads and adjust its security spend on modern solutions to address today’s threats.”

So what are the key take-aways for security teams? First of all, if all you have is AV, then you are exposed and you should quickly start to add additional protective technologies. Focus more on detecting badly-behaved apps, looking at those situations where you are doing massive downloads or fast flux conditions. Next, look for network-level intrusion detection and prevention products, and also beef up your desktop-based firewalls. Some of the more popular security products from Symantec and others have these features included in their desktop AV products too. Finally, don’t be complacent: security is a continuous process, and a constant challenge to stay ahead of the bad guys.

Dice Security Community

Each week I look for a few of the more interesting security news stories and highlight them on my Dice Security Community portal here. If you are looking for a new job in the security field, or just want to stay on top of the latest security news, conferences, and trends, go take a look. This week’s stories include:

How to punish peer-to-peer pirates

My friend and supplier The Movie Pirate is worried. “What can they do to me?” he asked me over the holiday weekend, when he heard the news about something even more sinister than Black Friday or Cyber Monday: this coming Wednesday when AT&T, Time Warner and other broadband providers are going to start enforcing their “six strikes” proposal to stop illegal copies of movies, TV shows and other content from being downloaded from peer networking sites.

The Movie Pirate (let’s call him John) has been stealing movies and TV shows for many years, thanks to PirateBay and other BitTorrent sites that make it about as easy as the click of a mouse to download a file. He doesn’t sell any of his movies: they are just for his own amusement and for a few friends. But that doesn’t make his actions right. He thinks of it as a hobby. And while I have been a beneficiary of his downloads, I know what he is doing is illegal. So does he.

At the center of this issue is the Center for Copyright Information (CCI), a relatively new operation that is funded by the movie studios, the recording industry and several broadband providers. Their proposal to try to curb the illegal downloads involves several steps, such as sending multiple emails notifying users, then getting them to acknowledge their misdeeds, then various increasing forms of punishment. These include throttling connection speeds or blocking particular websites, but not outright disconnection or legal action.

The name “six strikes” that was first attached to this program originated from the original CCI memorandum of understanding establishing the CCI in July 2011 where it stated that each person will have six copyright alerts, each separated by a week’s grace period. These alerts come from the broadband provider who is monitoring IP addresses that source the content downloads.

On a panel that cNet’s Declan McCullagh moderated in New York last month, the broadband companies spoke about these steps and how they are after the little guy, like my friend John. CCI head Jill Lesser responded that the goal isn’t to stop those trying to avoid IP laws and make a living selling one-dollar DVDs on Asian streecorners. Rather, it’s to educate “the vast majority of the people for whom trading in copyrighted material has become a social norm, over many years.”

While I think this is misplaced, it will be interesting to see how many notices go out this week when the providers spin up their tracking systems. This is what got my friend worried, who uses an AT&T broadband connection that is shared amongst his neighbors. He doesn’t want one of these email notices going to the account holder, and I don’t blame him. He asked me: “So I can download all the kiddie porn that I want but movies are going to get me in trouble?” Well, for now that is true. That, and you probably don’t want to use Gmail as a dead drop for messages to your mistress either.

Of course, there is a next step in the peer-to-peer piracy war, and that is to start using VPNs to block your real IP address when you want to download illegal content. McCullagh asked this of his panel session. My friend John is investigating VPN providers at the moment. He is looking at this article from TorrentFreak that asked more than a dozen of them if they keep any IP logging information and under what circumstances would they share them with third parties.

The movie studios could learn from the mistakes of the whole peer music piracy debacle of the late 1990s. They could make it easier for folks to find and download legal content. But that would require some careful thought by people other than lawyers to build better systems, such as the ones that are operated by Pirate Bay and others.

Dr. Dobbs: SQL Injection: Think Like a Hacker

It is time to earn a little about SQL injection, a conceptually simple and very popular attack that can be mounted against many websites with a database back-end.

An earlier post on DITC by Tim Kellogg talks about actually experiencing the hacker ethos by attempting specific exploits. I’d like to second the notion, especially when it comes to SQL injection. This exploit turns on the ability to query your websites and get all sorts of useful information, such as your entire customer contact list or other sensitive data. And what makes this attack so troublesome is that it can be done without using any specialized tools other than a Web browser, and it doesn’t even require much in the way of programming knowledge.

You can read my article in Dr. Dobbs here.