Endpoint Protector Appliance: Stop data theft on Windows and Mac

Facebook fixes data theft issue

February 4th, 2011 by Agent Smith (0) Data Theft & Loss,security breach

A security problem that allowed malicious web sites to access personal user information without their explicit permission has just been fixed by Facebook. This flaw has been reported by Rui Wang and Zhou Li, two student researchers.

According to Graham Cluley, senior technology consultant at Sophos, the security lapse could let malware spread between users,and abuse data as it goes by impersonating a legitimate site that already has the permission to take information.

“According to Wang and Li, it was possible for any web site to impersonate other sites which had been authorised to access user data, such as name, gender and date of birth,” he said. “Furthermore, the researchers found a way to publish content on the visiting users’ Facebook walls under the guise of legitimate web sites, a potential way to spread malware and phishing attacks.” Read more

New variations of the Stuxnet worm expected to emerge in 2011

January 3rd, 2011 by Agent Smith (0) Malware Infections

Due to the success the Stuxnet cyber worm has registered in slowing down the Iranian nuclear program and many other industrial systems around the world, variations of this malware are expected in 2011.

According to eWeek, the Stuxnet worm might have damaged up to 1,000 Iranian centrifuges, after infecting more than 62,000 computer systems in Iran alone. The very efficient and complex Stuxnet cyber worm raises serious concerns that its variants will manage to affect other systems around the world – beyond the traditional information technology targets. Read more

New concerning clues in the “Stuxnet” case

November 18th, 2010 by Agent Smith (0) Malware Infections
New and concerning discoveries have surfaced in the Stuxnet case. According to Symantec, the worm is apparently designed to sabotage specific types of facilities, like nuclear plants and other key locations. It employs a subtle sabotage technique that is meant to overload physical machinery by briefly speeding them up over a span of weeks.

Discovered this year in June in Iran, Stuxnet has already infected more then 100000 computer systems world wide and is not as it first seemed a sophisticated windows virus designed to steal data. It apparently contains code targeting Siemens Simatic WinCC SCADA systems, which are control systems that manage pipelines, nuclear plants and various utility and manufacturing equipment. Despite these discoveries, the specific sabotage function has no yet been discovered. Read more

Stuxnet and cyber warfare – the future is now

October 1st, 2010 by Agent Smith (0) In The Spotlight,Malware Infections

Back in 2008, assuming that the human factor would eventually fail at some point and people would make the mistake of plugging an unsecured memory stick into a military laptop, several memory sticks were scattered in a US military base in the Middle East that was providing support for the Iraq war. All these memory sticks were deliberately infected with a computer worm.

It resulted in the self-propagation of a computer worm into the computer system of Centcom – the central command of the US military. The eradication process took 14 months. Apparently this attack, acknowledged by the Pentagon only in august 2010, was very similar to a Stuxnet worm attack which was used in attempts against Iraq’s nuclear facilities and Iran’s nuclear programme. Read more

How to Stop Conficker/Stuxnet in four easy steps – Advisory by CoSoSys

September 28th, 2010 by Agent Smith (1) endpoint security,In the News,Malware Infections

As some of you may know, the Stuxnet worm (and Conficker) has been running amok on both private and corporate networks. The malware spreading via USB devices is always the source of new threats. The latest development of Stuxnet exploits zero day vulnerabilities to target supervisory control firms and data acquisition (Scada) and other industrial systems. Such systems are being used to control pipelines’ pressure or motor work rates on industrial factory floors. Typical environments can be oil pipelines and power-plants, factories etc.

Endpoint Security and Device Control Solutions with low TCO and great ROI.

Conficker/Stuxnet detects platforms with Scada systems installed on and uses Windows vulnerabilities to gain access and spread through the network. In the light of current events and the continuous spread of the worm through USB ports and USB portable devices, endpoint security and data loss prevention solution developer CoSoSys has created a four-step strategy against Stuxnet that’s extremely easy to implement: Read more

The employee: an essential cog in the security machine

September 22nd, 2010 by Agent Smith (0) In The Spotlight

Last week, a worm called “Here you have” has started spreading. Among the first targeted companies was Intel. The damages were minor, in part because of the companies traditional defenses, but mainly because of well trained employees.  Malcom Harkins, chief information security officer at Intel states that the employees started calling IT as soon as they saw the worm.

“The employee base saw it, they reacted really quickly, and helped us contain it by alerting us to it and then telling others not to click on it,” Harkins says.

Due to the fact that mobile devices nowadays allow more and more people to work from virtualy anywhere, companies need to start treating their employees as security partners. Read more

Stuxnet Worm: New threat targets Scada Systems and other industrial environments

September 20th, 2010 by Agent Smith (1) In the News,Malware Infections
Research in the area of malware has revealed a new and sophisticated threat that targets and exploits four zero-day vulnerabilities in an attempt do disrupt industrial systems. The new threat is caused by an older malware, the Stuxnet worm which appeared for the first time in July and was spread via USB devices. It now seems that it has been designed to target supervisory control firms and data acquisition (Scada) systems.

These systems have a mainly industrial usage. They are being used to control pipelines’ pressure or motor work rates on industrial factory floors. Typical environments can be oil pipelines and power-plants, factories etc. Read more

US Army bans USB devices to stop worm from spreading

The US Army has temporarily banned the use of USB devices, along with floppy discs, CDs, external drives, flash media cards and all other removable media devices, to prevent a worm from spreading through its networks. According to the Register, the worm that caused this extreme measure is Agent-BTZ, a variant of the SillyFDC worm.

While the ban itself is bound to cause some distress, as it would in any other organization, the work flow will be more extensively affected in the US Army because for some offices email or online file transfers are not allowed either.

The measure is a bit drastic, but at least something was done. I personally would have expected a safer endpoint security system and protected USB drives, given the Army’s impressive history with lost hardware and data breaches (see some examples here, here and here). Who knows, maybe this time they will learn :)

Mindblowing Data Breaches of 2007

March 17th, 2008 by Agent Smith (2) Data Theft & Loss,endpoint security,In The Spotlight

CSO Online has recently published a top 10 of the most significant data breaches of 2007. They have analyzed stolen hardware, malware infections and other such security breaching activities. CSO has also concluded the “most brilliant lunacy” of the year was to require the usage of social securities numbers as passwords.

If you haven’t guessed who the dark winner is, it’s the nasty TJX affair. But considering other data and facts we’ve recently told you about, the CSO estimated losses seem to be a bit off. Nevertheless, the top is quite interesting and a very good reminder security should never be taken lightly.