Friday 31 May 2013

Smartphone Sensors Could be Used to Activate Malware, Research Shows

Mobile phone sensors such as microphones, accelerometers and cameras might be used to initiate a malware outbreak on smartphones, according to researchers at the University of Alabama at Birmingham.
Fear not – it’s not the end of the digital world, but rather a what-if scenario to prepare the user for the next generation of mobile malware that circumvents the limitations of TCP/IP communications and evades intrusion detection mechanisms.
According to the researchers, the mobile phone’s sensor peripherals could be used for out-of-band communication to receive a trigger message that activates dormant bots on devices within range. Of course, in order for the communication to succeed, malware needs to be planted in advance via old-fashioned mechanisms (such as downloading apps via official or unofficial markets, social engineering attacks or platform exploitation).
“Unlike the traditional command and control communication over a centralized infrastructure (such as a cellular network), out-of-band communication is very hard to detect and even harder to prevent infected mobile bots,” claims the paper.
While the assumptions are interesting, the researchers left out a serious part of the business: the communication channel between the bot and the mothership. Modern malware is highly dependent on two-way communication, so if you’re planning to actually steal data, you’ll still need to send it via the Internet.

Common Virtualization Vulnerabilities and How to Mitigate Risks



Virtualization has eased many aspects of IT management but has also complicated the task of cyber security.The nature of virtualization introduces a new threat matrix, and administrators need to address the resulting vulnerabilities in their enterprise environments.

Critical Virtualization Vulnerabilities

Some attacks against virtual machine, or VM, environments are variations of common threats such as denial of service. Others are still largely theoretical but likely approaching as buzz and means increase. Keep an eye on these critical weaknesses:
VM sprawl:VMs are easy to deploy, and many organizations view them as hardware-like tools that don’t merit formal policies.This has led to VM sprawl, which is the unplanned proliferation of VMs.Attackers can take advantage of poorly monitored resources.More deployments also mean more failure points, so sprawl can cause problems even if no malice is involved.
Hyperjacking:Hyperjacking takes control of the hypervisor to gain access to the VMs and their data. It is typically launched against type 2 hypervisors that run over a host OS although type 1 attacks are theoretically possible. In reality, hyperjackings are rare due to the difficulty of directly accessing hypervisors.However, hyperjacking is considered a real-world threat, and administrators should take the offensive and plan for it.
VM escape:A guest OS escapes from its VM encapsulation to interact directly with the hypervisor.This gives the attacker access to all VMs and, if guest privileges are high enough, the host machine as well. Although few if any instances are known, experts consider VM escape to be the most serious threat to VM security.
Denial of service:These attacks exploit many hypervisor platforms and range from flooding a network with traffic to sophisticated leveraging of a host’s own resources.The availability of botnets continues to make it easier for attackers to carry out campaigns against specific servers and applications with the goal of derailing the target’s online services.
Incorrect VM isolation:To remain secure and correctly share resources,VMs must be isolated from each other.Poor control over VM deployments can lead to isolation breaches in which VMs communicate.Attackers can exploit this virtual drawbridge to gain access to multiple guests and possibly the host.
Unsecured VM migration:This occurs when a VM is migrated to a new host, and security policies and configuration are not updated to reflect the change.Potentially, the host and other guests could become more vulnerable.Attackers have an advantage in that administrators are likely unaware of having introduced weaknesses and will not be on alert.
Host and guest vulnerabilities:Host and guest interactions can magnify system vulnerabilities at several points.Their operating systems, particularly Windows, are likely to have multiple weaknesses.Like other systems, they are subject to vulnerabilities in email, Web browsing, and network protocols.However, virtual linkages and the co-hosting of different data sets make a serious attack on a virtual environment particularly damaging.

How to Mitigate Risk


Fortunately, security engineers can take several steps to minimize risk.The first task is to accurately characterize all deployed virtualization and any active security measures beyond built-in hypervisor controls on VMs.Security controls should be compared against industry standards to determine gaps.Coverage should include anti-virus, intrusion detection, and active vulnerability scanning.Additionally, consider these action steps:
VM traffic monitoring:The ability to monitor VM backbone network traffic is critical.Conventional methods will not detect VM traffic because it is controlled by internal soft switches.However, hypervisors have effective monitoring tools that should be enabled and tested.
Administrative control:Secure access can become compromised due to VM sprawl and other issues.Ensure that authentication procedures, identity management, and logging are ironclad.
Customer security:Outside of the VM, make sure protection is in place for customer-facing interfaces such as websites.
VM segregation:In addition to normal isolation, strengthen VM security through functional segregation.For example, consider creating separate security zones for desktops and servers.The goal is to minimize intersection points to the extent feasible.
Conclusion
Virtualization threats can seem abstract but are no more so than other attacks. Motives and methods are fundamentally the same, and administrators must counter with similar proven techniques.

Topera IPv6 analysis tool: the other side

What's Topera?

Topera is a new security tools for IPv6, with the particularity that their attacks can't be detected by Snort.
Snort is the most known IDS/IPS and is widely used in many different critical environments. Some commercial tools (Juniper or Checkpoint ones) use it as detection engine also.
Mocking snort detection capabilities could suppose a high risk in some cases.
All the community is invited to test it in any environment and we would be thankful if you send us any feedback.
This tool was presented in the second edition of the Security Conference "Navaja Negra" (http://www.navajanegra.com) by Daniel Garcia a.k.a cr0hn (@ggdaniel) and Rafa Sanchez (@r_a_ff_a_e_ll_o ).

What's new?

New version of Topera (0.0.2) include these improvements:
  1. Slow HTTP attacks (Slowloris over IPv6).
  2. Improved TCP port scanner.

Why?

Our intention is to promote awareness of and show the security implications of IPv6.

How to use it?

Help

topera help image

List plugins:

# topera.py -L
topera list modes

Topera loris mode:

Run with default options:
# python topera.py -M topera_loris -t fe80:b100:::c408
Run specifing: destination port, delay between connections, and number os extensions headers:
# python topera.py -M topera_loris -t fe80:b100:::c408 \
--dport 8080 --delay 0 --headers-num 0 -vvv
topera list modes

Topera in TCP port scanner mode:

Run with default options:
# python topera.py -M topera_tcp_scan -t fe80:b100:::c408
Run specifing: ports to scan, delay between connections, and number os extensions headers:
# python topera.py -M topera_tcp_scan -t fe80:b100:::c408 \
-p 21,22,23,80,8080 --scan-delay 0 --headers-num 0 -vvv
topera list modes

Detective Arrested for Hacking out of Obsessive Love

New York detective was arrested after allegedly spying on over 30 people, including police colleagues, to discover if any of them was sleeping with his ex, according to The Register. The 42-year-old cop hired hackers to get their usernames and passwords.
Detective Arrested for Hacking out of Obsessive Love Edwin Vargas allegedly spent over $4,000 for email-hacking services, and appeared before a magistrate judge charged with conspiracy to commit computer hacking.
“As alleged, Detective Edwin Vargas paid thousands of dollars for the ability to illegally invade the privacy of his fellow officers and others,” Manhattan U.S. Attorney Preet Bharara said. “He is also alleged to have illegally obtained information about two officers from a federal database to which he had access based on his status as an NYPD detective. When law enforcement officers break the laws they are sworn to uphold, they do a disservice to their fellow officers, to the department, and to the public they serve, and it will not be tolerated.”
The Bronx detective had suspected his ex-lover, with whom he had split after having a child together, had started a new relationship with another cop. To find out, Vargas paid between $50 and $250 to cyber-criminals.
The detective is also accused of paying hackers to spy on mobile phone records, and illegally accessing the National Crime Information Center’s database. After posting a $50,000 bond, Vargas was released on bail. He now faces a maximum sentence of one year in prison.