new Ads

Fileless Malware: Why You Should Care

Fileless Malware: Why You Should Care

https://www.technewsworld.com/article_images/story_graphics_xlarge/xl-2017-malware-1.jpg

It's a truism that just like organizations adapt, so too do criminals. For example, anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attempt robbing a Brink's truck on horseback? While that strategy might have worked well in the days of the Pony Express, attempting it in now would be out of touch and inefficient.
This is an intentionally extreme example to make a point: Criminals adapt to keep pace in the same way that organizations adapt. With a veritable renaissance in technology use under way, criminals have been advancing their methods of attack just like organizations have been advancing their methods for conducting business.
One of the more recent developments in attacker tradecraft is so-called "fileless malware." This trend -- which emerged a few years ago but gained significant prominence in late 2016 and throughout 2017 -- refers to malware that is designed specifically and architected to not require -- or in fact interact with at all -- the filesystem of the host on which it runs.
It is important for technology pros to be alert to this, because it impacts them in several different ways.
First, it alters what they should watch for when analyzing attacker activity. Because fileless malware has different characteristics from traditional malware, it requires looking for different indicators.
Second, it impacts how practitioners plan and execute their response to a malware situation. One of the reasons attackers employ this method is that it circumvents many of the techniques that typically are employed to mitigate attacks.
However, there are some things practitioners can and should do to keep their organizations protected.

What Is It?

Also sometimes referred to as "non-malware," fileless malware leverages on-system tools such as PowerShell, macros (e.g. in Word), Windows Management Instrumentation (i.e., the apparatus in Windows designed for telemetry gathering and operations management), or other on-system scripting functionality to propagate, execute and perform whatever tasks it was developed to perform.
Because these tools are so powerful and flexible on a modern operating system, malware that employs them can do most of what traditional malware can do -- from snooping on user behavior to data collection and exfiltration, to cryptocurrency mining, or pretty much anything else that an attacker might want to do to forward an infiltration campaign.
By design, an attacker employing this technique will refrain from writing information to the filesystem. Why? Because the primary defense strategy for detecting malicious code is file scanning.
Think about how a typical malware detection tool works: It will look through all files on the host -- or a subset of important files -- searching out malware signatures against a known list. By keeping clear of the filesystem, fileless malware leaves nothing to detect. That gives an attacker a potentially much longer "dwell time" in an environment before detection. It's an effective strategy.
Now, fileless malware is by no means entirely new. Folks might remember specific malware (e.g., the Melissa virus in 1999) that caused plenty of disruption while interacting only minimally, if at all, with the filesystem.
What is different now is that attackers specifically and deliberately employ these techniques as an evasion strategy. As one might expect, given its efficacy, use of fileless malware is on the rise.
Fileless attacks are more likely to be successful than file-based attacks by an order of magnitude (literally 10 times more likely), according to the 2017 "State of Endpoint Security Risk" report from Ponemon. The ratio of fileless to file-based attacks grew in 2017 and is forecasted to continue to do grow this year.

Prevention Strategies

There are a few direct impacts that organizations should account for as a result of this trend.
First, there is the impact on the methods used to detect malware. There is also, by extension, an impact on how organizations might collect and preserve evidence in an investigation context. Specifically, since there are no files to collect and preserve, it complicates the usual technique of capturing the contents of the filesystem and preserving them in "digital amber" for courtroom or law enforcement purposes.
Despite these complexities, organizations can take steps to insulate themselves from many fileless attacks.
First is patching and maintaining a hardened endpoint. Yes, this is frequently offered advice, but it is valuable not only to combat fileless malware attacks, but also for a host of other reasons -- my point being, it's important.
Another piece of commonly offered advice is to get the most from the malware detection and prevention software that already is in place. For example, many endpoint protection products have a behavior-based detection capability that can be enabled optionally. Turning it on is a useful starting point if you have not already done so.
Thinking more strategically, another useful item to put in the hopper is to take a systematic approach to locking down the mechanisms used by this malware and increasing visibility into its operation. For example, PowerShell 5 includes expanded and enhanced logging capabilities that can give the security team greater visibility into how it's being used.
In fact, "script block logging" keeps a record of what code is executed (i.e., executed commands), which can be used both to support detective capability and to maintain a record for use in subsequent analysis and investigation.
Of course, there are other avenues that an attacker might leverage beyond PowerShell -- but thinking it through ahead of time -- investing the time to know what you're up against and to plan accordingly -- is a good starting point.
Source : www.technewsworld.com
How to Back Up iPhone Data to an External Drive

How to Back Up iPhone Data to an External Drive


A recent incident reminded me of the importance of backing up one's phone regularly. Soon after carrying my recycling out to the curbside, I realized I had misplaced my 6-month-old iPhone. Cue brief panic, followed by deep concern that I'd somehow tossed my device into that transparent bag I'd left outside for the world to see.

That led me to yelling "Hey, Siri" a few times around my apartment until the familiar chime sounded, revealing my trusty phone was hiding on a stepladder underneath a coat. Phew.
I have no idea how or why I managed to leave my phone there, but had I not found it, the situation could have been much worse: It had been months since I'd backed up my data. I was lucky to escape what could have been a potential disaster caused by my absent-minded tendencies.

Save Main Drive Space

I bought my current laptop a little over a year ago and actually had some trouble managing backups at first. My partner and I use the same computer for backing up our phones, but with ever-increasing device storage capacities and solid-state hard drives still somewhat expensive, despite featuring in more and more systems, space is at a premium.
Apple demands a lot of storage for its backups, especially since it often stores multiple versions. A 256-GB hard drive to run one's system and keep data safe is just not enough anymore.
The thing is, Apple does not make it easy to sync backups to an external drive automatically. Typically, iPhone owners will plug in their devices, and Apple will create a directory on the main hard drive and stuff the backup there. That's easy, and it's probably enough for most people. Forcing iTunes to store the backup elsewhere requires a redirect trick.

Using Windows 10

Here's how I solved the problem on my Windows 10 machine. First, since I had the capacity on my current drive (but only just), I created an iPhone backup using the regular iTunes sync method to the default location, just in case any mishaps should occur. I went to the folder Apple uses to store backups, typically this one:
C:\Users\[Username]\AppData\Roaming\Apple Computer\MobileSync\Backup
You should replace [Username] with your own actual username, naturally.
You'll want to copy that folder to your desired new backup location, and then either delete the original Backup folder or rename it as "BackupOld." Then hold the shift key and click the right mouse button to open a command window. There, enter the following:
mklink /J "%APPDATA%\Apple Computer\MobileSync\Backup" "[External Drive]:\iTunes Backup"
Of course, you'll replace [External Drive] with your actual drive letter.
You can add subfolders here too if you like to keep your storage as organized as possible. So, something like this would work just fine:
E:\MyBackups\iTunes Backup
Then you can close the command prompt window, and try an iPhone backup to see if it works.

Using macOS

The steps are similar for Mac systems. You should find the standard backup folder here:
~/Library/Application Support/MobileSync/
Copy, then remove or rename the Backup folder. Then open a terminal and type this:
ln -s /Volumes/[External Drive]/MobileSync/Backup ~/Library/Application\ Support/MobileSync/Backup
Close the terminal and then try an iPhone backup to see if it works.

Better Safe Than Sorry

Even if you have a main hard drive large enough to handle your backups without any concern, shuttling your data to an external drive has its advantages. It can act as an off-system failsafe in case your computer's drive collapses beyond repair. It also frees up the main drive, which hopefully will keep your computer working snappily for a little longer.
In either case, please remember to back up your phone regularly. And maybe don't put yourself in a situation where you wonder for 15 minutes if you tossed it out with the recycling.
Source :
www.technewsworld.com


PGP: 'Serious' flaw found in secure email tech


A widely used method of encrypting emails has been found to suffer from a serious vulnerability, researchers say.
PGP (Pretty Good Privacy) is a data encryption method sometimes added to programs that send and receive email.
Details about the vulnerability were released by the Suddeutsche Zeitung newspaper prior to a scheduled embargo.
Previously, the Electronic Frontier Foundation (EFF) had advised immediately disabling email tools that automatically decrypted PGP.
The problem had been investigated by Sebastian Schinzel, at Munster University of Applied Sciences.
After the embargo on releasing details about the vulnerability was lifted, Mr Schinzel and colleagues published their research revealing how the attack on PGP emails worked.
website explaining the issue has also now been made public.
Mr Schinzel has been contacted by the BBC for comment.
There was initially concern among cyber-security researchers that the issue affected the core protocol of PGP - meaning that all uses of the encryption method, including file encryption, could be made vulnerable.
However, one provider of software that can encrypt data using PGP explained the problem specifically concerned email programs that failed to check for decryption errors properly before following links in emails that included HTML code.
The issue had been "overblown" by the EFF, said Werner Koch, of GnuPG.
His colleague Robert Hansen said on Twitter that the issue had been known about for some time.
He argued it wasn't really a vulnerability in the OpenPGP system but rather in email programs that had been designed without appropriate safeguards.

'Real secrets' risked

Security expert Mikko Hypponen, at F-Secure, said his understanding was that the vulnerability could in theory be used to decrypt a cache of encrypted emails sent in the past, if an attacker had access to such data.
"This is bad because the people who use PGP use it for a reason," he told the BBC.
"People don't use it for fun - people who use it have real secrets, like business secrets or confidential things."
Alan Woodward, at the University of Surrey, agreed, adding: "It does have some big implications as it could lead to a channel for sneaking data off devices as well as for decrypting messages."
The researchers have said that users of PGP email can disable HTML in their mail programs to stay safe from attacks based on the vulnerability.
It is also possible to decrypt emails with PGP decryption tools separate from email programs.
Source : 
http://www.bbc.com/news/technology-44107570

silkroaddialogue.com

banner image

Follow Me On Facebook

banner image