Saturday, March 14, 2009

Around The Horn vol.1,61

-- Aurora Report has been revamping its news sources and attempting to calibrate what has already been reported.  As such we have been delayed in posting for the last several days.

Alerts

New UDP Traffic with a Destination Port of 21713, (Sat, Mar 14th)

Barry B. today submitted a sampling of log files with a series of random source IP's and ports ...(more)...

MS09-008 Protection

By MSRCTEAM

Hi Bill here,

You may have seen reports regarding the effectiveness of Microsoft Security Bulletin MS09-008. I wanted to let everyone know that we have thoroughly reviewed these reports, and customers who’ve deployed this update are protected from the four vulnerabilities outlined in the bulletin. 

We’ve also been collaborating with several researchers regarding the effectiveness of this update, as it is a complex issue, and have released more details about these vulnerabilities and how the Security Update addresses them.

For those that want more information, please review the Microsoft Security Research and Defense blog http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx where there’s detailed information that will help customers better understand how the security update protects systems, clarifies the content of the security update and hopefully answers any questions you may have. Again, I want to assure you that MS09-008 protects from potential attacks that could exploit the vulnerabilities outlined in the bulletin.

Please continue to evaluate and deploy this update at your earliest convenience to help protect your environment.

Thanks, Bill

TA09-069A: Microsoft Updates for Multiple Vulnerabilities

Microsoft Updates for Multiple Vulnerabilities

Kundra takes leave of absence from federal CIO post (NetworkWorld Security)
Ubuntu users, today is a good day to patch, (Fri, Mar 13th)

If you are running Ubuntu systems, then today may be a good day to think about patching. Things bei ...(more)...

Kundra takes leave of absence from federal CIO post

The fallout from Thursday's arrests of a District of Columbia IT security official and contractor quickly raised questions about the fate of Vivek Kundra, the new federal CIO who until recently ran the office now mired in bribery allegations.

Bribery case creates possible IT security nightmare in D.C.

After being arrested on bribery charges Thursday, the District of Columbia's top information security official is being held without bail, partly because of uncertainty about whether he still has the ability to access the district's IT systems.

Security News

Brief: Better metrics needed for security, says expert (SecurityFocus News)
When web application security, Microsoft and the AV vendors all fail, (Fri, Mar 13th)

I just spent some time analyzing yet another incident and I was actually shocked about how the combi ...(more)...

Chris Petersen, Chief Technology Officer, LogRhythm

Chris gives us his vision on the current state of log and event management as well as some specifics about LogRhythm.

Anthony Giandomenico, Security Hero

Anthony Giandomenico weighs in on Data Loss/Data Leakage Protection (DLP).

Application Security Best Practices: A New Maturity Model for Building Security In (March 9 & 10, 2009)

The Building Security in Maturity Model (BSIMM) is "a set of best practices developed by Citigal and Fortify" that draws together data from nine software security initiatives to help software developers build more secure products.......

Romanians find cure for conficker

BitDefender has released what it claims is the first vaccination tool to remove the notorious Conficker virus that infected some 9 million Windows machines in about three months.

Conficker.C variant set for April 1st surprise, CA says

The third Conficker variant is set to activate April 1, says CA, generating 50,000 URLs daily with its download function poised for instructions.

IBM develops Facebook privacy application

IBM on Thursday unveiled an application that guides users toward strong privacy settings in Facebook's online marketplace and could be developed into a management tool for companies or across Web sites for users.

A way to sniff keystrokes from thin air

That PC keyboard you're using may be giving away your passwords. Researchers say they've discovered new ways to read what you're typing by aiming special wireless or laser equipment at the keyboard or by simply plugging into a nearby electrical socket.

Apple fixes security flaws, adds features in iTunes update

Apple Inc. updated iTunes Wednesday, fixing a pair of security vulnerabilities, adding support for the new line of iPod Shuffles and boosting performance when loading large libraries and browsing the online store.

The effects of corporate social media on overall network security

In today's increasingly communicative world, businesses face a dilemma. They have to find ways to be more engaging and communicate more directly to their customers and the public, while retaining close control of sensitive information.

Business process flaws seen posing security risks

Running a secure Web site means more than just guarding against cross-site scripting and SQL injection attacks. Flaws in the business processes that underlie Web sites can also present serious security risks, the CTO of a Web security company said Thursday.

Spot the Tiny Phishing Trick

The TinyURL service allows you to enter a long URL, such as one for a particular Google Maps location, and convert it into a short, easy-to-type or e-mail link. Good for sending links - or as Trend Micro reports, for hiding a malicious Web site URL in a phishing e-mail.

Keeping IT honest

Forrester thinks paid-for blogging is OK but Gibbs disagrees because … well, you’ll have to read it to find out. He also wonders about what you might do if you discover malfeasance in your company …

Foreign Web attacks change security paradigm

Traditional security systems may be ineffective and become obsolete in warding off Web attacks launched by countries, according to Val Smith, founder of Attack Research. New attack trends include blog spam and SQL injections from Russia and China, Smith said during his talk at the Source Boston Security Showcase on Friday.

L0phtCrack returns

By Michael S. Mimoso

Security expert Chris Wysopal explains why the L0phtCrack password cracking tool was unveiled once again after Symantec discontinued sales of L0phtCrack in 2006.

Number-driven risk metrics 'fundamentally broken'

By Michael S. Mimoso

A former national cybersecurity czar says risk models used by security organizations often lead to a faulty understanding of threats and flaws, and a misallocation of resources.

Financial expert sees value in new security firms

By Robert Westervelt

The global economy may be in a steep decline, but VC funding available to new software vendors demonstrates a sound business strategy.

Serious holes in Mac OS X memory, researcher shows

By Robert Westervelt

A demonstration of hacking techniques at the SOURCE Boston conference enables an attacker to execute arbitrary code and take full control of a computer.

Brief: Better metrics needed for security, says expert

Better metrics needed for security, says expert

Safe Mode: A Misnomer

By Nandi Kishore on Web and Internet Safety

Windows offers the useful option of “Safe Mode” to recover from any damage caused by various malfunctions in the system. Booting in Safe Mode loads limited drivers and services that are required for the basic operation of the system, but avoids adding many extras that complicate the environment. In general, Safe Mode is very helpful [...]

BBC cybercrime probe backfires

By Robert A. on IndustryNews

"The BBC hacked into 22,000 computers as part of an investigation into cybercrime but the move quickly backfired, with legal experts claiming the broadcaster broke the law and security gurus saying the experiment went too far. The technology show Click acquired a network of 22,000 hijacked computers - known as a...

The eroding enterprise boundary
Lock Down and Open Up

Businesses today function effectively only when the organisation supports effective collaboration between its staff and external parties, wherever they may be situated. Such is the nature of routine operations that they depend on complex interactions between people and their supporting IT systems that spread far beyond the IT firewall and, indeed, the business itself. Clearly this nature of working has profound implications for those charged with securing the operations of the business and the IT systems they use.

Multi-site bug exposes cloud computing's dark lining
One vuln fits all

More dark linings have been exposed in the cloud computing craze, this time by web security expert Russ McRee, who demonstrates how a flaw in a single provider can spell trouble for numerous customers it serves.

Former employee of Obama CIO pick busted for bribery
Appointee not linked to wrongdoing

An employee who worked for President Obama's pick for federal CIO has been arrested by the FBI and charged in a federal bribery sting, according to news reports.

Where to start with IT Security
Episode 1 Security Webcast Mini Series

In a short series of webcasts The Register's expert panel will be tackling the current state of the security market.

MS security chief becomes DHS cybersecurity boss
Hot seat

A senior Microsoft exec has been placed in charge of protecting the US's computer systems from hacking attacks

Visa yanks creds for payment card processing pair
RBS, Heartland no longer PCI compliant

Visa on Friday alerted the world that RBS WorldPay and Heartland Payment Systems are not on its list of payment card processors who are in good standing with industry-mandated standards for data security.

Kundra Takes Leave, Google Raises Privacy Flags

Well, at least the issue is not unpaid taxes this time -- but Vivek Kundra, the brand-new, first-ever federal CIO after just a...

Cybercrime-as-a-service takes off

Posted by InfoSec News on Mar 13

http://www.itnews.com.au/News/98524,cybercrimeasaservice-takes-off.aspx

By Ry Crozier
ITNews
12 March 2009

Malware writers that sell toolkits online for as little as $400 will now configure and host the attacks as a service for another $50, a security expert has said.

Speaking at the...

    Army database may have been breached

    Posted by InfoSec News on Mar 13

    http://fcw.com/articles/2009/03/12/army-breach.aspx

    By Doug Beizer
    FCW.com
    Mar 12, 2009

    An Army database that contains personal information about nearly 1,600 soldiers may have been penetrated by unauthorized users, Army officials have announced.

    Soldiers who registered with, or...

      D.C.s top IT security official charged with bribery

      Posted by InfoSec News on Mar 13

      http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9129582

      By Patrick Thibodeau
      March 12, 2009
      Computerworld

      WASHINGTON  Federal law enforcement officials filed bribery charges today against the District of Columbia's acting...

        Microsoft Security Strategist Named Cybersecurity Leader

        Posted by InfoSec News on Mar 13

        http://www.informationweek.com/news/security/cybercrime/showArticle.jhtml?articleID=215900014

        By K.C. Jones
        InformationWeek
        March 12, 2009

        The Department of Homeland Security has announced a new cybersecurity leader.  DHS Secretary Janet Napolitano has appointed Phil Reitinger as deputy ...

        BBC team exposes cyber crime risk

        Posted by InfoSec News on Mar 13

        http://news.bbc.co.uk/2/hi/programmes/click_online/7932816.stm

        BBC Click
        12 March 2009

        Software used to control thousands of home computers has been acquired online by the BBC as part of an investigation into global cyber crime. The technology programme Click has demonstrated just how at...

        Kremlin Kids: We Launched the Estonian Cyber War

        Posted by InfoSec News on Mar 13

        http://blog.wired.com/defense/2009/03/pro-kremlin-gro.html

        By Noah Shachtman
        Danger Room
        Wired.com
        March 11, 2009

        Like the online strikes against Georgia, the origins of the 2007 cyber attacks on Estonia remain hazy. Everybody suspects the Russian government was somehow behind the...

          Kremlin-backed youths launched Estonian cyberwar, says Russian official

          Posted by InfoSec News on Mar 12

          http://www.theregister.co.uk/2009/03/11/russian_admits_estonian_ddos/

          By Dan Goodin in San Francisco
          The Register
          11th March 2009

          Members of a Kremlin-backed youth group spearheaded the cyberattacks that paralyzed Estonia's internet traffic in May of 2007, a Russian government official...

          Team Edwards to devote day for network security

          Posted by InfoSec News on Mar 12

          http://www.edwards.af.mil/news/story.asp?id=123139253

          By 1st Lt. William Newby
          95th Communications Group
          3/11/2009

          EDWARDS AIR FORCE BASE, Calif. -- There is an Airman on the frontlines fighting a battle right now, battling an enemy who hides and launches attacks from more than 120...

            APWG suggests e-crime reporting system

            Posted by InfoSec News on Mar 12

            http://www.techworld.com/security/news/index.cfm?newsID=112534

            By Jeremy Kirk
            IDG News Service
            11 March 2009

            A group dedicated to fighting phishing scams has developed a way for police and other organisations to report e-crimes in a common data format readable by a web browser or other...

              CIA, NSA Adopting Web 2.0 Strategies

              Posted by InfoSec News on Mar 12

              http://www.informationweek.com/news/internet/web2.0/showArticle.jhtml?articleID=215801627

              By J. Nicholas Hoover
              InformationWeek
              March 10, 2009

              While the United States intelligence community may have gotten a lot of publicity for its Wikipedia-like Intellipedia Web site, agencies like the...

              NSA Dominance of Cybersecurity Would Lead to Grave Peril, Expert Tells Congress

              Posted by InfoSec News on Mar 11

              http://blog.wired.com/27bstroke6/2009/03/nsa-dominance-o.html

              By Kim Zetter
              Threat Level
              Wired.com
              March 10, 2009

              The government's national cybersecurity efforts would be in "grave peril" if they were dominated by the intelligence community, said Amit Yoran, former head of the...

                RE: Russia kinda-sorta owns up to Estonia cyberwar

                Posted by InfoSec News on Mar 11

                Forwarded from: "Denning, Dorothy (CIV)" <dedennin (at) nps.edu>

                This is not what RFL reported. RFL reported that Markov said that his assistant was operating on his own. Markov is quoted as saying that the "assistant happened to be in 'one of the unrecognized republics'...

                  NIST suggests areas for further security metrics research

                  Posted by InfoSec News on Mar 11

                  http://gcn.com/articles/2009/03/09/nist-security-metrics.aspx

                  By William Jackson
                  GCN.com
                  Mar 09, 2009

                  Computer security is a difficult thing to quantify because, if done
                  right, nothing happens. How, then, do you measure what didn't happen?

                  Nevertheless, meaningful metrics are necessary so...

                    British pair charged in industrial espionage row

                    Posted by InfoSec News on Mar 11

                    http://business.timesonline.co.uk/tol/business/industry_sectors/engineering/article5876588.ece

                    By David Brown
                    Times Online
                    March 9, 2009

                    A leading British manufacturer has been caught up in an industrial espionage row after two engineers used a mobile telephone to photograph a secret...

                    Symantec creates havoc with unsigned Norton patch

                    Posted by InfoSec News on Mar 11

                    http://news.cnet.com/8301-1009_3-10192899-83.html

                    By Elinor Mills
                    Security
                    News.com
                    March 10, 2009

                    Symantec released a diagnostic patch for some of its older Norton
                    products on Monday night that did not identify its origin and thus
                    triggered alerts on user firewalls, the company said...

                      Outlaws and terrorists amplify security challenges, Motorola security chief says

                      Posted by InfoSec News on Mar 11

                      http://www.networkworld.com/news/2009/031009-infosec-motorola-boni.html

                      By Ellen Messmer
                      Network World
                      03/10/2009

                      ORLANDO -- The current era is marked by tumultuous change, high speed and huge danger, said Motorola's corporate security officer Bill Boni, based on his perspective of...

                        DDoS attack damaged public civil service for the first time

                        Posted by InfoSec News on Mar 11

                        http://english.etnews.co.kr/news/detail.html?id=200903100005

                        2009/03/10 By Jang, Dong-joon, Kim, In-soon

                        Interne attack has caused unprecedented incident in which on line civil service of public agencies suspended for 5 days before restoration.

                        On March 4, the home page of Game Rating Board...

                        Feds file new felonies against alleged Sarah Palin hacker

                        Posted by InfoSec News on Mar 10

                        http://www.theregister.co.uk/2009/03/09/palin_hacker_recharged/

                        By Dan Goodin in San Francisco
                        The Register
                        9th March 2009

                        A University of Tennessee student accused of illegally breaking into the email account of Alaska governor Sarah Palin has been hit with three new felony charges in...

                          NSA Chief Continues Bid to Take Over Cybersecurity

                          Posted by InfoSec News on Mar 10

                          http://blog.wired.com/27bstroke6/2009/03/nsa-continues-b.html

                          By Kim Zetter
                          Threat Level
                          Wired.com
                          March 09, 2009

                          In the wake of the resignation on Friday of National Cyber Security Center (NCSC) Director Rod Beckstrom over concerns that the National Security Agency plans to take over...

                          Re: Best attack strategy for a Red Team?

                          Posted by krymson_at_gmail.com on Mar 10

                          ('binary' encoding is not supported, stored as-is) This likely won't help, but if you can get access to a target server, don't throw that away right away; dig deeper like you mentioned.

                          I think too often red teams will get all excited about a shell and soon everyone on the team is trying to use...

                          WarVOX - Wardialing Tool Suite (Explore, Classify & Audit Telephone Systems)

                          By Darknet on warvox

                          WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems. Unlike normal wardialing tools, WarVOX works with the actual audio from each call and does not use a modem directly. This model allows WarVOX to find and classify a wide range of interesting lines, including modems, faxes, voice mail boxes, PBXs, loops, [...]


                          Read the full post at darknet.org.uk

                          New 'Spam King' Linked to SMS Campaign

                          New Zealand spammer Brendan Battles is apparently connected to an SMS bulk marketing campaign.

                          Biggest Worries When Shopping Online

                          Security firm F-Secure reports that consumers are wary of using credit cards on sites, but like online banking.

                          New Conficker Expected April 1

                          The next wave of the Conficker malware attacks are likely as an unpleasant April 1 surprise, say security researchers at Computer Associates.

                          Russian youth organization cops to 2007 Estonian cyberattacks

                          By jhruska@arstechnica.com (Joel Hruska) on Russia

                          companion photo for Russian youth organization cops to 2007 Estonian cyberattacks

                          In May 2007, the websites of a number of prominent Estonian politicians were attacked and crippled for several weeks. The attacks came at a time when Estonian/Russian relations were already chilly, thanks in part to the Estonian government's plan to move a Russian war memorial statue from the city center and into a cemetery. Ars has covered the issue since the attacks began, including the arrest of an Estonian student last year in connection with the prolonged DDoS siege. The arrest of 20-year-old Dmitri Galushkevich in January, 2008 raised doubts as to whether he was solely responsible for weeks of disruptions. On Wednesday, January 11, the doubters were victorious; comments from Konstantin Goloskokov, a commissar with the Russian youth movement Nashe, has admitted that the group organized and masterminded the Estonian barrage.

                          No comments:

                          Post a Comment

                          My Blog List