BF-SIRT Newsletter 2015-22

The top stories from this week consist of stories such as how a new iOS Bug can shut down iPhones and Apple Watches simply by receiving a text message, tweet or anything else that is delivered to the notification system, and how a study reveales how 86 percent of websites contain at least one ‘serious’ vulnerability.

Amongst the top stories you can also find how the total cost of average data breach reaches is now $3.8 million, and how a full Adult Friend Finder database is being sold for for $17,000 after a breach.

Top 5 Security links
New iOS Bug Crashing iPhones Simply by Receiving a Text Message [Includes Fix]
Study: 86 percent of websites contain at least one ‘serious’ vulnerability
Bank-heist malware’s servers phone home to Russian spookhaus
Hackers steal 80000 EURO from Belgium Metal Company
Forget passwords; Japanese users can buy online with their Eyeballs

Top 5 Business Intelligence links
Total cost of average data breach reaches $3.8 million
Full Adult Friend Finder database offered for $17,000
Recent Breaches a Boon to Extortionists
POS Malware Nitlove Seen Spreading Through Spam Campaign
Account recovery via secret questions is a bad idea

BF-SIRT Newsletter 2015-21

The top stories from the last two weeks consist of stories such as how Feds Say That Banned Researcher Commandeered Plane and Hacking Starbucks for unlimited coffee
Amongst the top stories you can also find how Russia and China seal cyber non-hack pact and how Panda Security has uncovered an ongoing attack against Oil Tankers
Patch Tuesday has also come up, and you can read about that in our blog post

Top 5 Security links
Feds Say That Banned Researcher Commandeered Plane
Hacking Starbucks for unlimited coffee
Who’s Scanning Your Network? (A: Everyone)
Security Firm Redefines APT: African Phishing Threat
High-level, state-sponsored Naikon hackers exposed

Top 5 Business Intelligence links
Russia and China seal cyber non-hack pact
Panda Security Uncovers Ongoing Attack Against Oil Tankers
Apple, Google urge Obama to reject encryption back doors
mSpy Denies Breach, Even as Customers Confirm It
Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign

Basefarm SIRT Posts
Patch Tuesday April 2015

Patch Tuesday May 2015

Another month, another patch Tuesday!
Microsoft and Adobe has both released a large amount of updates (Microsoft update fixes 46 flaws in Windows, Internet Explorer, Office and other Microsoft products), and some of these will enable malicious code execution if abused.

Also, this week’s newsletter will be postponed for next week due to holidays in Sweden.

You can find links to the updates below:
Microsoft
Adobe

BF-SIRT Newsletter 2015-19

This week you can read about how US hospitals will treat medical device malware with AC power probes, and that 90% of Java black hats migrate to footling Flash

In other news, you can read about how the Tesla attack started with a single phone call, and you could also see a day in the life of a stolen healthcare record.

Top 5 Security links
Actively exploited WordPress bug puts millions of sites at risk
Netflix open-sources security incident management tool
OpenSSL Past, Present and Future
US hospitals to treat medical device malware with AC power probes
90% of Java black hats migrate to footling Flash

Top 5 Business Intelligence links
Tesla attack started with a single phone call
Police breaks up cybergang that stole over $15 million from banks
Crimeware infects one-third of computers worldwide
What’s Your Security Maturity Level?
A Day in the Life of a Stolen Healthcare Record

Shortcut towards a secure site

Criminal activities and hacks are increasing on the internet, and companies have to increase the levels of security in routines and habits when it comes to passwords and online behavior.

Most of us know the dangers of this, but it seems we are not able to improve in this area.

Phishing attacks trick people daily into revealing their passwords, and users on unsecured networks can have their passwords sniffed. Malicious spyware can capture passwords and send them over the network to attackers. Identity theft is one of the fastest growing white-collar crimes in the world.

Going after user details is still easier than hacking the actual perimeters This is by far the preferred method of breaking and entering. Verizon (backed by all other major companies in this field) states in its latest study that stolen credentials are used in over 50% of attacks or hacks on websites.

 

Source: Verizon Data Breach Investigation Report 2015

The same study shows that in the financial services market, over 95% of the incidents follow the process: Phish customer -> get credentials -> abuse web application -> empty account

Facts:

  • Easy passwords can be cracked – and we use them all the time;
  • Sharing of passwords make it impossible to know who did what;
  • Same accounts and passwords are used at multiple places;
  • Passwords that need to be continuously changed are not user-friendly enough – so we don’t bother;
  • Hackers are using user names and passwords to steal data;
  • Random passwords cannot be remembered.

What is the recommendation?

Security experts worldwide suggest the usage of a strong, two-factor authentication to protect organizations assets. The same is also recommended by various compliances/certifications like PCI-DSS, HIPAA, SAS 70, ISO 27001 and others.

The strongest and closest to fool-proof safety against identity theft is Two Factor Authentication. And, it is also one of the remedies that could be labelled low-hanging in terms of return on investment.

The table shows the means (functions) one can implement to secure the service (critical security controls), and in percentage how much this can contribute towards an optimal solution security-wise (100%). We see that patching web services also rate as a highly effective means to a secure solution.

Source: Verizon Data Breach Investigation Report 2015

The two main benefits of Two Factor Authentication are that you get protected access to your solution and know who has accessed it and you also protect your end customers or members by offering Two Factor Authentication to them.

Why Multi Factor Authentication (MFA) from Basefarm

  • Fast implementation – we set it up for you so you will be up-and-running very fast with little effort;
  • Save time – we can manage and administrate your solution for you;
  • Cost effective – as a service OPEX only;
  • Stable and secure solution – with SLA from Basefarm.

Read more about our Multi Factor Authentication solutions.