Newsflash donderdag 24 september 2015
Ransomware verschuift van consument naar mkb
(security.nl)

De makers van ransomware richten zich niet langer op consumenten, maar hebben steeds vaker het midden- en kleinbedrijf (mkb) als doelwit, zo stelt het Japanse anti-virusbedrijf Trend Micro.

Het mbk is een aantrekkelijk doelwit, aangezien het vaak niet over de beveiliging van grote ondernemingen beschikt.

De eigenaren zijn daarentegen wel vaak in staat om het gevraagde losgeld te betalen als hun bestanden door ransomware worden versleuteld. Ook speelt mee dat mkb-bedrijven vaak geen uitgebreide back-upoplossingen gebruiken, wat de kans vergroot dat er geen actuele back-up is en het losgeld uiteindelijk wordt betaald.

4G in Nederland in half jaar flink sneller geworden
(nu.nl)

De Nederlandse 4G-netwerken van KPN, T-Mobile, Vodafone en Tele2 zijn in een half jaar tijd een stuk sneller geworden, maar de gemiddelde dekking is niet verbeterd.

Dat blijkt uit een rapport van Opensignal over het derde kwartaal van 2015. Opensignal laat mensen hun 4G-dekking en -snelheid meten via apps.

In maart was de gemiddelde 4G-snelheid in Nederland nog 14 Mbps waarmee Nederland op de dertiende plaats wereldwijd stond. Inmiddels is die gemiddelde snelheid toegenomen naar 19 Mbps, maar Nederland blijft daarmee op de dertiende plek staan omdat andere landen ook sneller 4G hebben.

Hachers Took Finberprints of 5.6 Million U.S. Workers, Government Says
(nytimes.com)

Just a day before the arrival of President Xi Jinping here for a meeting with President Obama that will be focused heavily on limiting cyberespionage, the Office of Personnel Management said Wednesday that the hackers who stole security dossiers from the agency also got the fingerprints of 5.6 million federal employees.

The attack on the agency, which is the main custodian of the government’s most important personnel records, has been attributed to China by American intelligence agencies, but it is unclear exactly what group or organization engineered it.

Before Wednesday, the agency had said that it lost only 1.1 million sets of fingerprints among the records of roughly 22 million individuals that were compromised.

OPM data breach's big question: What's fingerprint data worth in future cyber attacks?
(zdnet.com)

How much value will fingerprint data have in future cyberattacks?

That question looms large as the Office of Personnel Management said Wednesday that about 5.6 million fingerprints were stolen in its summer data breach, up from the 1.1 million estimate previously given.

In a statement, the Office of Personnel Management (OPM) said its investigation with the Department of Defense (DoD) found archived records with additional fingerprint data. These archives were tapped by hackers too.

Hey Apple, were you hosting hacked copies of Xcode?
(cio.com)

Yesterday morning, Apple sent out an email to developers advising them that Apple had “removed apps from the App Store that were built with a counterfeit version of Xcode, which had the potential to cause harm to customers.”

Apple also suggested, as Fahmida Rashid reported Monday, that counterfeit copies of Xcode downloaded from third-party servers, not Apple’s, were responsible for creating the malware-infected apps.

Concurrent with the email, a post on the Apple developer blog appeared suggesting that developers validate their copy of Xcode to ensure it wasn’t a counterfeit copy spewing XcodeGhost malware.

EU data transfer deal with US may be illegal, says Europe's top legal counsel
(cnet.com)

A 15-year-old pact that allows the transfer of data between the United States and European Union may be illegal, according to an opinion from the European Court of Justice's top legal counsel .

The decision could have far-reaching consequences for Facebook, Google, Twitter and thousands of other US companies.

Countries should be able to prevent data about their citizens from being sent to the US if that data will be used in ways that violate citizens' rights, Advocate General Yves Bot said Wednesday in his recommendation to the ECJ.

What Goes Around Comes Around: Russia Gets Hacked
(technewsworld.com)

Russia has been a prime suspect in recent cyberattacks launched against U.S. government targets. However, Russia has been poked with the other end of the hacker stick.

For more than two months, hacker attacks originating in China have bedeviled Russia's military and telecom sectors, researchers at Proofpoint revealed last week.

"We also observed attacks on Russian-speaking financial analysts working at global financial firms and covering telecom corporations in Russia, likely a result of collateral damage caused by the attackers' targeting tactics," wrote Thoufique Haq and Aleksy F, authors of the report.

Revealed: Why Amazon, Netflix, Tinder, Airbnb and co plunged offline
(theregister.co.uk)

Netflix, Tinder, Airbnb and other big names were crippled or thrown offline for millions of people when Amazon suffered what's now revealed to be a cascade of cock-ups.

On Sunday, Amazon Web Services (AWS), which powers a good chunk of the internet, broke down and cut off websites from people eager to stream TV, or hookup with strangers; thousands complained they couldn't watch Netflix, chat up potential partners, find a place to crash via Airbnb, memorize trivia on IMDb, and so on.

Today, it's emerged the mega-outage was caused by vital systems in one part of AWS taking too long to send information to another part that was needed by customers.

Morgan Stanley staffer cops guilty plea over data breach
(theregister.co.uk)

The Morgan Stanley staffer fired in January over a massive data breach has now entered a guilty plea in the Federal Court in Manhattan.

Galen Marsh was being tried for taking hundreds of thousands of records of the bank's wealth management operation home. Some of the trove, affecting 900 individuals, then ended up on Pastebin as a pitch for the sale of the whole data set.

While early reports said six million accounts were offered for sale, complete with passwords (something Morgan Stanley denied in a statement), the prosecution's case said Marsh took a more modest 730,000 records away from the bank, affecting about 350,000 customers.

Healthcare Organizations Twice As Likely To Experience Data Theft
(darkreading.com)

Bad guys very willing to invest in attacking medical data, but healthcare not very willing to invest in defending it.

Healthcare institutions are twice as likely to experience data theft than other sectors, and already see 3.4 times more security incidents, according to a study released today by Raytheon and Websense.

Why is healthcare so popular with attackers? Perhaps because the balance sheet tips in their favor. Medical records are very desirable on the black market, because medical records, themselves, may be a treasure trove of PII, financial information, and insurance numbers.

Killing computer infrastructures with a bang!
(net-security.org)

In an attempt to demonstrate how easy it would be for attackers to perform a high-voltage attack against a company's computer infrastructure and take it down by damaging it, security researcher Grigorios Fragkos found a device that can easily be used to "fry" other appliances on the network: computers, switches, attached storage devices, etc.

"Due to my experience with physical security assessments, I noticed that there are many unattended Ethernet ports everywhere around a building. These ports might not be 'active' but most of the time they are connected at the far-end on a managed or unmanaged network switch," he explained.

He decided to use these ports as a way in, and initially experimented with a single cable that connected a power socket to the Ethernet one, sending current directly to it. This resulted in the network switch at the other end being "toasted" in a split second, but nothing more.

A diesel whodunit: How software let VW cheat on emissions
(cio.com)

Volkswagen AG CEO Martin Winterkorn announced today he is stepping down as the result of his company's cheating on emission tests, bypassing environmental standards and landing the company in regulatory hot water.

According to the U.S. Environmental Protection Agency, Volkswagen was able to cheat emissions tests for half a million of its U.S.-sold cars. The software that enabled cars to thwart emissions tests is in as many as 11 million other vehicles, Volkswagen admitted Tuesday.

Diesel cars from Volkswagen and Audi cheated on clean air rules by including software, likely a single line of code that made the vehicles' emissions look cleaner than they actually were.

Using external URL shorteners for internal needs may lead to sensitive data leaks
(net-security.org)

Using external URL shortener services to create better-looking links to internal company documents, sensitive files and internal websites is a practice that company employees should avoid, says security researcher Shubham Shah, as it can result in those documents being accessed by individuals with malicious intentions.

As Shah and social engineer Christina Camilleri were searching for bugs to submit to the Etsy bug bounty program, they noticed that the company uses a dedicated URL shortener domain (http://etsy.me), but that the service is actually provided by Bit.ly via a SaaS arrangement.

With dirs3arch, an open source command line tool designed to brute force directories and files in websites, they tested this URL shortener service, and discovered a number of links that have been generated by the Etsy staff.

Gartner: 75 Percent of Enterprises to Use Analytics by 2017
(eweek.com)

While moving to cloud services was the major trend for enterprise IT from 2006 to 2012 or so, building big data analytics, automation and mobility applications into the workforce are the two other megatrends since then.

However, even though investment in big data continues to increase in 2015, it's starting to level off a little. On Sept. 18, Gartner Research came out with a study of IT and business leaders that contends more than three-quarters of global companies are investing or planning to invest in big data analytics in the next two years.

This is a mere 3 percent increase over 2014, but so what? The fact that a full three-quarters of IT systems in global enterprises are—or will be—using regular analytics of business data is a pretty impressive metric. Safe to say that the category has officially gone mainstream.

ENISA provides details on the complex cybersecurity exercise carried out in 2014
(net-security.org)

ENISA released the public version of the After Action Report of the pan-European cybersecurity exercise Cyber Europe 2014 (CE2014). This report, approved by the Member States, gives a high-level overview of the complex cybersecurity exercise that was carried out in 2014.

The main goal of Cyber Europe 2014 was to train Member States to cooperate during a cyber-crisis. The three-phased exercise provided opportunities to assess the effectiveness of cooperation and escalation procedures during cross-border cyber incidents which impact the security of vital services and infrastructure, while testing national capabilities and contingency plans involving both public and private sector organizations.

The exercise, organised by ENISA on a biannual basis, was planned jointly with representatives from the participating countries and required six (6) planning conferences across Europe.

Google 'charges for YouTube adverts viewed by bots'
(bbc.com)

Google charges marketers even when its own checks indicate that adverts were not viewed by human beings, according to researchers.

The experts reported that YouTube did not count many of the "fake views" they directed at their own videos. But it still charged the researchers for many of them.

The case highlighted the need for more transparent analytics, said one expert. Google said it would work with the researchers to improve its performance.