CyberWire Daily - Cyber espionage: many operations and many targets. Misinformation and online fraud during the pandemic. Beer and conviviality versus operational security.

Episode Date: May 20, 2020

Cyber spies steal prototype missile data. Others hack into South Asian telecoms, and still others go after easyJet passengers’ travel data. Cyberattacks, misinformation, and cyber fraud continue to ...follow the COVID-19 pandemic. Joe Carrigan weighs in on the Thunderspy vulnerability. Our guest is James Dawson with insights on DMARK threats and why it’s worse during COVID-19. And think twice before you post, no matter how good or bad you think the beer is. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/9/98 Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. Air Transat presents two friends traveling in Europe for the first time and feeling some pretty big emotions. This coffee is so good. How do they make it so rich and tasty? Those paintings we saw today weren't prints. They were the actual paintings. I have never seen tomatoes like this. How are they so red? With flight deals starting at just $589, it's time for you to see what Europe has to offer.
Starting point is 00:00:31 Don't worry. You can handle it. Visit airtransat.com for details. Conditions apply. AirTransat. Travel moves us. Hey, everybody. Dave here.
Starting point is 00:00:44 Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers. So I decided to try Delete.me. I have to say, Delete.me is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Delete.me's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Delete.me.
Starting point is 00:01:22 Now at a special discount for our listeners. private by signing up for Delete Me. Now at a special discount for our listeners, today get 20% off your Delete Me plan when you go to joindeleteme.com slash n2k and use promo code n2k at checkout. The only way to get 20% off is to go to joindeleteme.com slash n2k and enter code n2k at checkout. That's joindeleteme.com slash N2K, code N2K. Cyber spies steal prototype missile data. Others hack into South Asian telecoms. And still others go after EasyJet passengers' travel data. Cyber attacks, misinformation, and cyber fraud continue to follow the COVID-19 pandemic.
Starting point is 00:02:12 Joe Kerrigan weighs in on the Thunder Spy vulnerability. Our guest is James Dawson with insights on DMARC threats and why it's worse during COVID-19. And think twice before you post, no matter how good or bad you think the beer is. From the CyberWire studios at DataTribe, I'm Dave Bittner with your CyberWire summary for Wednesday, May 20th, 2020. Japan's Defense Ministry is investigating the possible theft of technical details from a proposal concerning a missile designed by Mitsubishi Electric. Reuters says the details of the cyber espionage are sparse, but that the data stolen probably included certain performance specifications. The report adds that the missile won't be produced.
Starting point is 00:03:01 The material stolen appear to have been from files associated with a proposal, and apparently Mitsubishi Electric didn't get the contract. Researchers at Broadcom's Symantec unit are attributing attacks on South Asian telecommunications companies to Greenbug, an espionage group associated with Iran, and thought to be connected to the group responsible for Shamoon. CyberScoop reports that most of the activity was directed against Pakistan's telecommunications system. Telcos are attractive targets because of the value of the data they carry. The focus on Pakistan suggests a service with a strong interest in the region.
Starting point is 00:03:40 The Jerusalem Post, considering the recent cyber attack on an Iranian port as retaliation for a cyber attack on Israeli water treatment facilities, sees the exchange as typifying a new approach to cyber war, continuous engagement. Sources tell Reuters that Chinese intelligence services were responsible for the easy jet hack that affected some 9 million passengers. The anonymous sources say that the same threat group had tracked travelers before and was interested in their movements, not in financial gain from credit card theft. Australia's government has condemned unnamed nation states for conducting and supporting
Starting point is 00:04:20 cyber attacks under the cover of the coronavirus, the Australian Financial Review reports. The countries may be unnamed, but the prospect of arousing China's ire, the article alludes to, suggests that the subtext indicates a bad conscience somewhere in the vicinity of Beijing. Either that, or, of course, injured innocence, since it goes without saying that China denies any involvement in cyberattacks conducted during the pandemic. COVID-19 misinformation continues to find alternative outlets. Increased fact-checking and content moderation by social media providers may have pushed misinformation into other channels where it can circulate without much hindrance.
Starting point is 00:05:03 The Washington Post takes the documentary Plandemic as its example. The documentary, whose long trailer has been pushed from YouTube and other social media, has been circulating using apps such as Google Drive. Short comments on the trailer, written to avoid language that would trip content moderation alerts, appear on major social media platforms, and these in turn direct visitors to the sites where the trailer is available. Plandemic, which retails a complex and implausible conspiracy theory about the alleged corporate and government interests that the filmmakers
Starting point is 00:05:36 claim are behind the pandemic, has provided a popular example of COVID-19 misinformation. It's often cited as an example of the dangerous potential of misinformation. Its recent distribution also affords an example of the difficulty of controlling such misinformation spread. Unemployment relief assistance designed to compensate workers who've lost their jobs during the economic stress of the pandemic are being targeted by scammers. Agari reports that much of the criminal fraud against such relief programs observed by the U.S. states of Florida, Massachusetts, North Carolina, Oklahoma, Rhode Island, Washington, and Wyoming are the work of the Scattered Canary
Starting point is 00:06:17 Gang, a criminal group based in Nigeria. The researchers outlined a few of the approaches. Nigeria. The researchers outlined a few of the approaches. They found that 82 fraudulent claims for CARES Act economic impact payments were filed between April 15 and 29. Since April 29, at least 147 fraudulent unemployment claims were filed in the state of Washington. Between May 15 and 16, 17 fraudulent unemployment claims were filed in Massachusetts. And most recently, Agari has observed signs that the criminals are turning their attentions toward Hawaii, where on the evening of May 17th, two claims were registered with the state's Department of Labor
Starting point is 00:06:55 and Industrial Relations. The techniques Scattered Canary is using are the grubby, low-tech stuff of petty cybercrime. Bleeping Computer says that the gang is using social security numbers and other personal data stolen from identity theft victims to create bogus accounts on assistance sites. As the Washington Post points out, state relief agencies are under the gun to provide assistance to people who need it in a hurry, and haste is usually accompanied by a certain relaxation of vigilance. James Dawson is a contractor and advisor to Donska Bank, working in the IT Business Risk
Starting point is 00:07:32 and Controls Division in the office of the CISO. He shares his insights on DMARC and DKIM threats and why particular vigilance is in order in the midst of the COVID-19 pandemic. vigilance is in order in the midst of the COVID-19 pandemic. Every bank and financial service organization right now, Dave, is trying to manage the crisis. That's one thing. Everybody working from home and all of the challenges of having your workforce completely remote. There's all sorts of technical challenges that you've got to face, you've got to solve. But then there's also the threats. The threats change. So during the crisis, during the COVID-19 crisis, we've noticed that the threats have changed to much more intensive phishing and spoofing campaigns are going on. Well, take us through that. What sort of things are you addressing?
Starting point is 00:08:20 Well, generally, I think that most organizations are relying upon center policy framework, which is SPF, that and domain key identified mail, and also domain message authentication reporting and conformance. So that's DKIM and DMARC. Along with TLS, those are the most preferred methods of trying to fight against spoofing or phishing. So during the crisis, it's one thing to be able to protect your own domain. So you already apply those protocols so that you can protect your own domain. Just as an example, take Citibank.com. You have methods of protecting that domain, and you can also train the individuals within your organization to, even though they see a message coming from what looks like the bank's domain, to question it. Is it really something that I need to address, or is it something that I would even click on or something that I would act upon?
Starting point is 00:09:20 So that's one thing. And then the other thing is to have your threat professionals and those that are doing your research and doing the settings for your revision to your TKIM protocols and your DMARC, to have them start thinking like a criminal. And I know we've discussed this before in your program. as before in your program. Now, you know, I've seen in email correspondences with folks that a lot of enterprises will have a feature in their email where if something comes from outside of the organization, that gets flagged, you know, in unambiguous terms within the email that says, you know, this message came from outside of the organization. Is that sort of thing helpful for tracking those spoofed emails, the ones that look close to the name of the organization. Is that sort of thing helpful for tracking those spoofed emails, the ones that look close to the name of the organization but aren't quite right? Yeah, I like those. Even the ones that look like they're actually coming from the authority
Starting point is 00:10:15 can still be spoofed. And I like those warnings on any message that comes from outside the bastion of the organization. And so those little messages, those little tags, we call them mitered messages. They're mitered onto the mail as it goes to the production server to route the message. If they're short and sweet, if they're clear and simple, then people will read them and act upon them. If they're verbose and lots of scary words and letters in them, people just think that there's some sort of warning and they skip over them.
Starting point is 00:10:49 That's a problem with that sort of thing. That's James Dawson from Donska Bank. Last Line this morning released the results of a study that focused on NRDS, newly registered domains, with an evident COVID-19 theme. newly registered domains with an evident COVID-19 theme. They've concluded that there's less novelty about these efforts than might have been expected. While fishing is up, it appears the criminals are devoting more effort to refreshing and re-emphasizing existing campaigns to match the times than they are in coming up with innovative approaches. The UK's contact tracing app undergoing trials on the Isle of Wight is attracting further skepticism about its efficacy. While download rates during the trials have been reported to be satisfyingly high,
Starting point is 00:11:33 Computer Weekly reports that recent studies have cast doubt on the willingness of British users to install the app. The existing NHS app, not the contact tracing app, but rather the app through which patients access health care data and book appointments with their doctors, is being considered for adaptation into an immunity passport, the Telegraph writes. According to the app's developer, iProve, addition of facial recognition software to the tool could be used to verify the identity and immunity status of users. could be used to verify the identity and immunity status of users. Finally, some security advice for military and intelligence professionals. Treat beer as a commodity and be content. Bellingcat points out the risks of using the Untapped app to rate brews.
Starting point is 00:12:19 You can be tracked. Untapped engages in what Bellingcat calls meticulous location tracking, showing the locations where the users consumed the beer they were raiding. It's not so much that Untapped is irresponsible. In fact, Bellingcat describes the app's privacy settings as being pretty decent. It's just that it's possible to correlate locations and movements with other social media, and as is almost always the case, people want to upload pictures of the places where they're enjoying themselves. So resist the temptation, military and intelligence professionals. Enjoy your beer responsibly and privately.
Starting point is 00:13:00 Calling all sellers. Salesforce is hiring account executives to join us on the cutting edge of technology. Here, innovation isn't a buzzword. It's a way of life. You'll be solving customer challenges faster with agents, winning with purpose, and showing the world what AI was meant to be. Let's create the agent-first future together. Head to salesforce.com slash careers to learn more. Do you know the status of your compliance controls right now? Like, right now? We know
Starting point is 00:13:37 that real-time visibility is critical for security, but when it comes to our GRC programs, we rely on point-in-time checks. But get this, more than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the gist. Vanta brings automation to evidence collection across 30 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows
Starting point is 00:14:06 like policies, access reviews, and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get $1,000 off Vanta when you go to vanta.com slash cyber. That's vanta.com slash cyber for $1,000 off. And now a message from Black Cloak.
Starting point is 00:14:41 Did you know the easiest way for cyber criminals to bypass your company's defenses is by targeting your executives and their families at home? Black Cloak's award-winning digital executive protection platform secures their personal devices, home networks, and connected lives. Because when executives are compromised at home, your company is at risk. In fact, over one-third of new members discover they've already been breached. Protect your executives and their families 24-7, 365 with Black Cloak. Learn more at blackcloak.io.
Starting point is 00:15:19 And joining me once again is Joe Kerrigan. He's from the Johns Hopkins University Information Security Institute and also my co-host over on the Hacking Humans podcast. Hello, Joe. Hi, Dave. We have seen stories coming from many, many different directions about this new attack that is being called Thunder Spy. Yep.
Starting point is 00:15:38 And this has to do with Thunderbolt ports. You and I have been looking at some research from the folks over at Duo, but this is being written about all over the place the place. What is your take on this? First of all, can you describe to us what's going on here? The research comes from a master's student at Eindhoven University of Technology. His name is Bjorn Reitenberg, and I hope I'm saying that right. But it's a vulnerability in Thunderbolt, and at the very root of the vulnerability is a design decision that the chips on a Thunderbolt controller do not run signed code. So that's really the root of the problem. So that means that if I can have physical access to that controller, I can change the software that runs on that controller.
Starting point is 00:16:26 And Thunderbolt is a protocol. I mean, I suppose it's probably more widely known with Mac users. There's a whole generation of Macs that had Thunderbolt ports on them, and you use that for things like external hard drives or external monitors. It's a sort of a high-speed port. Right. It's a high-speed port. It's the same external port as a display port, although more recent versions actually run over a USB-C port. I don't know. I'm not a big fan of dual-purposing port designs. I think that's a bad idea, but, you know, that horse has left the barn on this one. And that's just, I think that might just be me old man, but, you know, that horse has left the barn on this one. And that's just, I think that might just be me old manning it, you know, going.
Starting point is 00:17:18 But yeah, I've used Windows computers all my life and Linux computers more recently for the past five years. And I have never had a computer with a Thunderbolt port on it at all. So it's not something that's all that common. This attack does require physical access to the device. Not only that, but you have to open the device up, and then you have to attach your own malicious device onto it to rewrite the firmware on this chip. And because this chip runs unsigned firmware, you can run arbitrary code on it if you can get that level of access. Yeah, and that's the part that I think people are drawing attention to here is that the whole fact that you need access to the machine, and this is commonly referred to as an evil maid attack, where the notion is you've left your computer in your hotel room
Starting point is 00:17:58 while you've gone down to the bar or out to have a bite to eat, and an evil maid can come in and do what they want to do with your machine. or out to have a bite to eat, and an evil maid can come in and do what they want to do with your machine. And so people, I think, raise their eyebrows over the odds of that being an issue for folks in their everyday lives. Yeah, there's an old saying we used to say, physical access is root access, right? If I can touch a machine, I can do anything I want to it. But one of the main protections against physical access being root access is you can encrypt your hard drive, right? And that way your data at rest is secure. If someone steals your laptop and they can't access it, then they can't get to the data. But apparently
Starting point is 00:18:37 with this attack, if someone steals your laptop while it's maybe in sleep mode and then they open it up or they perform this malicious attack on it they can actually get into all the files that are encrypted on your hard drive because those those files have already been accessed by the operating system through the encryption protocol right through whatever encryption workflow to access those files because encrypted files are of no use to you unless you can actually access them when you need to and you're authorized to right right so Right, right. So that's, I think, the biggest single interesting thing about this is that if I have access to a computer
Starting point is 00:19:11 that I know has data that I want on it, then I can get that data, even if that data has been encrypted using whole disk encryption. Yeah, yeah. I guess a lot of the articles have pointed out that more recent machines, machines made in the past few years, don't seem to be susceptible to this. So if you're concerned, it's a good excuse to upgrade.
Starting point is 00:19:31 Right. to someone coming into your hotel room, for example, or your office or wherever, and using the physical access to alter that machine, then you're going to know about that. You're going to have protections in place to try to minimize the likelihood of that happening. Absolutely. You know, we've heard stories about people who have left, I think it was Kevin Mitnick who told the story about leaving his hotel or his computer in his hotel and then giving it to somebody else to work on it. And the person who was working on it said, why did you open this up and tighten the screws down so hard? And he said, I didn't do that. And somebody had done that to his computer. I think that was Kevin. But if you know who that
Starting point is 00:20:20 is, if you know that you're that kind of person that is at risk for that, then yeah, you're going to do, you're going to take other measures. Yeah. It's interesting that they make the point in one of these articles that while the odds of someone falling victim to this may be low, it's still a good thing that we know about this because it advances our knowledge of types of attacks that we need to be aware of. Right. It is interesting research. And Intel should actually, and I think they probably are in the future, design their chips to only run with signed versions of their firmware.
Starting point is 00:20:51 That should be standard security practice by now. But, you know, it's going to take some time to implement these practices across all this hardware. And that hardware has to age out. But over time, we'll move in a more secure direction against things like this. Yeah, absolutely. All right. Well, Joe Kerrigan, thanks for joining us. It's my pleasure, Dave. Cyber threats are evolving every second and staying ahead is more than just a challenge.
Starting point is 00:21:22 It's a necessity. That's why we're thrilled to partner with ThreatLocker, a cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default-deny approach can keep your company safe and compliant. And that's the CyberWire. For links to all of today's stories, check out our daily briefing at thecyberwire.com.
Starting point is 00:22:09 And for professionals and cybersecurity leaders who want to stay abreast of this rapidly evolving field, sign up for Cyber Wire Pro. It'll save you time and keep you informed. Listen for us on your Alexa smart speaker, too. The Cyber Wire podcast is proudly produced in Maryland out of the startup studios of DataTribe, where they're co-building the next generation of cybersecurity teams and technologies. Thanks for listening. We'll see you back here tomorrow. Your business needs AI solutions that are not only ambitious, but also practical and adaptable. Thank you. AI agents connect, prepare, and automate your data workflows, helping you gain insights, receive alerts, and act with ease through guided apps tailored to your role. Data is hard. Domo is easy. Learn more at ai.domo.com. That's ai.domo.com.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.