86.3 F
Washington D.C.
Sunday, May 26, 2024
Home Blog Page 3234

Exploit Kits: The Silent Web Threat Affecting Billions

When we talk to people whose computers have been infected, they often ask how it happened. In a growing number of cases, they have been doing nothing more than reading a news website or browsing for some online shopping. They haven’t clicked a bad link, visited a risky website or installed anything strange. Yet, the next thing they know is their credit card details have been stolen, Facebook account hijacked or the pictures on their laptop are being held for ransom.

This kind of experience is increasing among everyday computer users because of the growing threat from Exploit Kits. This article digs into the dark world behind this problem, which contributes to a fast growing proportion of all new malware we are now seeing, and tries to provide a bit of education.

What is an Exploit Kit?

These clusters of criminal code are secretly dotted around the Internet, hiding on invisible landing pages. When you encounter one, your computer is automatically catalogued. The Exploit Kit builds up a picture of what everyday software you have running, such as browsers, PDF readers, Flash Player, Java, and, most importantly, whether any of them have flaws called vulnerabilities. It is basically looking at your computer for known holes to exploit.

Editor’s note: To view a larger version of the graphic at the right, click here.

After figuring out which of these weaknesses are present, it uses pre-built “exploit” code to force this hole wide open, which essentially leaves your computer at the mercy of the attacker, allowing them to install whatever malicious software they want, bypassing many security software programs.

How do I encounter an Exploit Kit?

People most often get to Exploit Kits from booby-trapped high-traffic websites. These sites redirect you in the background, without opening any new browser windows or alerting you in any other way, so that each visitor can be scanned for their suitability for infection. Based upon this, you are either compromised or discarded.

This doesn’t happen overtly and it typically works in one of two different ways. Either a piece of malicious code is hidden in plain sight on the website, or an advert displayed on the page itself is infected. Both methods immediately redirect you to the Exploit Kit without showing any signs to the user. Once there, if you have vulnerabilities on your computer, it’s game over.

This means the news sites you read, the website you get your recipes from, or the online store you buy your shoes from, are all possible candidates.

So what software is vulnerable?

In theory, given enough time, every piece of software is vulnerable. Specialist criminal teams spend lots of time pulling apart software so they can find vulnerabilities to use against people. However, they typically focus on the software applications with the highest user-base, as thispresents the richest possible target. It’s a numbers game.

What about Zero-Days, what are they?

A Zero-Day is an exploit for a vulnerability that has not been patched yet. In essence, even the most up-to-date computer could get compromised. Zero-Days are rare in mainstream Exploit Kits, but cannot be forgotten.

We recently did a bit of research into the top Exploit Kits being used at the moment and found that:

  • Two thirds of new malware are delivered by Exploit Kits;
  • An estimated 2 billion visitors are exposed to Exploit Kits during a monthly malicious campaign;
  • Internet Explorer Is the most commonly abused browser by today’s most well used Exploit Kits;
  • Usage of Adobe Flash Player exploits is growing in popularity;
  • Exploits of up to 5 years old are still being commonly used in popular Exploit Kits, meaning people are still not patching effectively; and
  • Criminals are turning away from Java in favor of Flash and Internet Explorer exploits

Who makes Exploit Kits?

Cyber criminals usually specialize in a specific area. For example, there are people whose job is to focus on hacking websites and placing malicious redirection code on them. The Exploit Kit authors focus on building the most effective cyber weapons they can based on the current vulnerabilities available.

They are software developers — coders who could effectively be working in the software industry but chose a different path. It’s important to note that they are not the same criminals who make malware (i.e. ransomware, keyloggers, etc.). To use a metaphor, they build a weapon which other people use to cause harm.

What makes Exploit Kits so effective?

Exploit Kits are made of different parts that can be updated as time goes on. That is one critical part as most software programs evolve and new vulnerabilities are discovered. Since there is a high demand to have the most effective exploitation tools, there is a lot of money that goes into making the Exploit Kits better.

Why aren’t my favorite sites doing anything about it?

To some extent, major websites are victim of external factors such as malicious advertising, also known as malvertising. A site owner may have the most secure site there is, but if third party content is displayed on his pages (as a source of revenues) it can bring the overall safety down.

What can I do about it?

To fend off attacks from Exploit Kits, there are some simple but yet effective measures anyone can take. By keeping your computer up-to-date you drastically cut the chances for any exploits to work because all known vulnerabilities have been patched.

For the security conscious, using browser add-ons that block Flash or disable scripts is also an effective way of thwarting most malicious redirections although it makes the browsing experience less enjoyable.

For a convenient and yet effective solution, using a layered defense makes a lot of sense. A fully patched computer with antivirus and anti-malware is a solid protection. For peace of mind, an additional layer that specifically addresses exploits and Zero-Days is also recommended.

Jerome Segura is senior security researcher at Malwarebytes Labs, whose product, Anti-Exploit Premium, blocks dangerous exploit-based malware and prevents the damage it can do.

White House: To Support Police, Fund DHS

The White House on Thursday invoked the death of two New York City police officers late last month while arguing that congressional Republicans should pass legislation funding the Department of Homeland Security throughout the remainder of the year.

Read complete report here.

Former N. Virginia Cabdriver Added to ‘Most Wanted Terrorist’ List

The FBI on Thursday announced it was adding a former taxi driver with Northern Virginia ties to its “Most Wanted Terrorists” list, saying the 29-year-old was suspected of providing support to Al Shabab, as well as Al Qaeda, and was believed to have fled to Somalia to join up with a terrorist group.

Read complete report here.

US Firms Concerned About China’s New Cyber Regulations

US business groups have sent a letter to China’s top security policy body, calling for “urgent discussions” and “dialogue” over new cybersecurity regulations that would force them to hand over technology secrets in order to keep doing business in China.

Read complete report here.

EU Ministers Propose Tougher Counterterrorism Measures

European Union Justice and Interior Ministers are discussing ways to strengthen information sharing and border control, among other measures to crack down on terrorism. Their two-day meeting ends Friday in Riga, Latvia.

Read complete report here.

London Needs ‘Tens Of Millions’ For Security Following Paris Attacks

London’s Metropolitan Police Commissioner Sir Bernard Hogan-Howe said the British government must spend tens of millions in order to prepare the capital for incidents like the Paris attacks.

Speaking at a police and crime assembly on January 29, he said terrorists’ increasing use of online networks was putting a huge strain on the police force and that multiple suspects could not be followed all of the time without an increase in resources.

Following the Paris attacks, the UK government announced an additional £130m on top of the £564m national counterterrorism budget. The Home Office is yet to allocate the additional £130m which is set to be distributed to police and security services over the next two years.

In tandem, Stephen Greenhalgh, London’s Deputy Mayor for Policing and Crime, is calling for an extra £20 million of government funding to protect London. Greenhalgh said the amount currently earmarked for the capital is insufficient to cope with the threat from homegrown extremists and fighters returning from Syria.

“We are having an arrest nearly every day, 50 percent of the undercover counterterrorism work is here in London and half of the people returning from Syria are in London so there is a huge volume of activity that needs to be carried out,” Greenhalgh said.

In addition to increasing manpower, Sir Bernard said the Metropolitan Police is currently reviewing the number of armed officers in the wake of the Paris attacks andlooks set to train hundreds more officers to deal with possible gun attacks in London.

He admitted the number of police marksmen had fallen in recent years — currently, 2,700 officers are authorized to carry guns in London — and said one option was to train members of the Territorial Support Group as a firearms reserve.

The assembly also heard how Metropolitan Police officials are speaking to television stations amid fears that live coverage of police raids could compromise operations.

In Paris there was live TV coverage as officers engaged in near-simultaneous raids on two terror hostage sites. There was similar coverage in Australia during the Sydney siege and the fear is that hostage takers could be tipped off about an impending rescue mission, with the police or military losing any element of surprise.

In 2008, planners of the Mumbai attack based in Pakistan, watched live TV coverage and gave instructions via mobile phones to the terrorists on the ground.

A voluntary agreement with UK broadcasters is already in place but Sir Bernard said the recent talks were needed to refine this.

Meanwhile, the London Evening Standard revealed the results of a YouGov survey into capital punishment. The survey found nearly half (49 percent) of Londoners support the death penalty for murder during terrorist attacks, such as the killing of Fusilier Lee Rigby.

The gender divide showed 55 percent of London males believe terrorist murderers should be executed, with 42 percent of women voting the same. Britain abolished the death penalty for all crimes in 1965 and a return to execution would surely be a propaganda coup for the likes of the Islamic State and Al Qaeda.

ICE Needs Public’s Help in Locating 10 Human Trafficking Fugitives

In Fiscal Year 2014, Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HIS) identified more than 440 victims of human trafficking, and arrested 1,770 individuals involved in trafficking humans, including young women kidnapped by transnational criminal organizations (TCOs) — many of which are criminal enterprise offshoots of Mexican cartels and Central American-based TCOs — and sold into a worldwide slavery black market.

With human trafficking rising, HSI this week made public the names and photographs of 10 fugitives wanted for human trafficking crimes in the hope that tips from the public will lead to the identification and arrest of these individuals.

“The Department of Homeland Security and ICE take the crime of human trafficking very seriously. We have invested countless investigative hours and victim support resources into more than 1,000 cases this past year alone,” said ICE Director Sarah R. Saldaña. “Now we are asking you to assist us in bringing these fugitives to justice.”

HSI is a leading agency in the fight against human trafficking and routinely works with federal, state, local and international law enforcement agencies, as well as non-governmental organizations, to identify and prosecute human traffickers and rescue their victims.

The agency’s victim assistance program also ensures victims receive services and access to resources in accordance with US law.

This week, Homeland Security Today reported, the House passed 12 bipartisan bills aimed at combating human trafficking worldwide. Most of the bills approved Monday and Tuesday passed the House in the last Congress, but didn’t get votes in the Senate. Republicans are hopefulthat will change this time around given the growing seriousness of the threat.

One of the bills, the Human Trafficking Detection Act of 2015 (H.R. 460), introduced by Rep. Mark Walker (R-NC) would require DHS to specifically provide a human trafficking awareness-training program for Customs and Border Protection (CBP), Transportation Security Administration (TSA) and other relevant personnel.

The bill would require appropriately trained personnel to “regularly receive current information on matters related to the detection of human trafficking, including information that becomes available outside of the department’s initial or periodic retraining schedule, to the extent relevant to their official duties and consistent with applicable information and privacy laws.”

“It is absolutely incumbent upon us to do everything within our means to protect our children from this unthinkable crime and to help those terrorized by it,” said Rep. Candice Miller (R-Mich.), vice chair of the House Committee on Homeland Security Committee and chairman of the Subcommittee on Border and Maritime Security.

“Human trafficking victims are essentially modern-day slaves,” HSI said in its announcement, noting that, “They can be of any age, race, nationality or gender, although most sex trafficking victims are women. Victims of human trafficking are forced into prostitution, labor and other forms of servitude to repay debts. Vulnerable populations include at-risk youth, runaways and undocumented immigrants who may have been smuggled into the United States to an unfamiliar culture and fear law enforcement.”

HSI stressed that, “A significant part of combatting human trafficking is public education and awareness. By presidential proclamation, January is National Slavery and Human Trafficking Prevention Month.

Human trafficking investigations often result from a tip from the general public. HSI encourages the public to report suspicious activity by calling its toll-free number: 1-866-347-2423. From outside the US and Canada, callers should dial 802-872-6199. Tips can also be submitted online at www.ICE.gov/tips.

Editor’s note, also read the report, ICE Victim Assistance Program Working to Meet Trafficked Womens’ Needs.

Our Overreaction to Terrorist Attacks Like Paris Is Only Making Things Worse

I am troubled by what the Paris terror attacks say about our country’s continuing failure to properly understand terrorist methodologies and formulate more effective counterterrorism responses. I’m particularly troubled by the sensationalistic .. media coverage of them. If we continue to aggrandize the violent acts of a handful of marginalized individuals into existential threats to western civilization, our over-reactions will continue sapping our resources while empowering extremists of all sorts.

Read complete op-ed here.

FAA Prohibits Drones, Other Aircraft Near Super Bowl

The Federal Aviation Administration is calling a penalty for drones at the Super Bowl.

Read complete report here.

Criminals, Terrorists Find Uses for Drones, Raising Concerns

Drones are becoming a tool for criminals and terrorists, worrying authorities who say the small unmanned aircraft are difficult to detect and stop, a concern heightened this week by the accidental crash of a drone at the White House.

Read complete report here.

Editor’s note: For more on this issue, read the special section on drones in the current issue of Homeland Security Today here.