Archive for the ‘Security’ Category


A highly recommended skim from BleepingComputer:
The BlueKeep remote code execution vulnerability in the Windows Remote Desktop Services is currently exploited in the wild. Vulnerable machines exposed to the web are apparently compromised for cryptocurrency mining purposes.

The attempts have been recorded by honeypots that expose only port 3389, specific for remote assistance connections via the Remote Desktop Protocol (RDP).

Attacks are not wormable

Security researcher Kevin Beaumont noticed on Saturday that multiple honeypots in his EternalPot RDP honeypot network started to crash and reboot. They’ve been active for almost half a year and this is the first time they came down. For some reason, the machines in Australia did not crash, the researcher noted in a tweet.

First details about BlueKeep being the cause of these events came from MalwareTech, who investigated the crash dumps from Beaumont’s machines. He said that he “found BlueKeep artifacts in memory and shellcode to drop a Monero Miner.”

According to early analysis from MalwareTech, an initial payload runs an encoded PowerShell command that downloads a second PowerShell script, also encoded. The researcher says that the final payload is a cryptocurrency miner, likely for Monero, currently detected by 25 out of 68 antivirus engines on the VirtusTotal scanning platform.

Talking to BleepingComputer, the researcher said that the malware may not be a worm but it is mass-exploiting the BlueKeep bug. This indicates that the cybercriminals are using a BlueKeep scanner to find vulnerable systems exposed on the web and drop the cryptocurrency miner on them.

In an update, MalwareTech says that analysis of the network traffic does not indicate self-propagation, meaning that the server doing the exploitation gets the target IP addresses from a predefined list.

The first public BlueKeep exploit was added to Metasploit in September but scanners for the bug have been available before that date. MalwareTech’s analysis confirmed that the same code in the Metasploit module is also present in the malware.

It is likely that whoever is behind these attacks is using public resources and did not develop a reliable, wormable threat, as proved by Beaumont’s honeypot crashes.

A combination of cryptocurrency miner and a BlueKeep scanner was reported in July in a piece of malware called Watchbog, which typically focused on vulnerable Linux servers.

At the time, cybersecurity company Intezer said that integrating the scanner module for the RDP vulnerability alongside the Linux exploits “suggests that WatchBog is preparing a list of vulnerable systems to target in the future or to sell to third party vendors for profit.”

MalwareTech told us that the indicators of compromise Intezer provided for Watchbog do not seem to match the malware currently hitting machines vulnerable to BlueKeep.

These assaults generated over 26 million events on Beaumont’s honeypot infrastructure, which makes determining the indicators of compromise a more time consuming task. However, the researcher promised to sort through them for the relevant sequence and provide the data.

Brief BlueKeep history

BlueKeep (CVE-2019-0708) is a serious vulnerability that can allow malware to spread across connected systems without user intervention. Microsoft patched it on May 14, followed by a barrage of alerts about its severity from governments and security companies, some reiterating their concern.

Exploiting this RDP flaw for remote code execution (RCE) is not easy and the most common result of this endeavor is a crash of the target system. Security researchers that created a working exploit kept the details private to delay attackers creating their version and compromise still unpatched systems.

Two private exploit modules were developed in June and July, for Metasploit and CANVAS penetration testing tools. Both were hard to get as the former was private and the latter was delivered to subscribers that paid at least $32,480.

At the enterprise level, the worldwide update rate was 83% in June. However, this statistic did not count consumer machines. This suggests that the cybercriminals are likely hitting consumer computers.

The vulnerability does not affect all versions of Windows operating system. Microsoft’s advisory lists Windows 7, Windows Server 2008 R2, and Windows Server 2008.

Update [11/03/2019]: Article updated with information from MalwareTech’s analysis of the malware on Kryptos Logic blog

 



General Information

Executive Summary

Microsoft is releasing this security advisory to inform customers that an update to the Microsoft Malware Protection Engine addresses a security vulnerability that was reported to Microsoft. The vulnerability could allow denial of service if the Microsoft Malware Protection Engine scans a specially crafted file. An attacker who successfully exploited this vulnerability could prevent the Microsoft Malware Protection Engine from monitoring affected systems until the specially crafted file is manually removed and the service is restarted.

The Microsoft Malware Protection Engine ships with several Microsoft antimalware products. See the Affected Software section for a list of affected products. Updates to the Microsoft Malware Protection Engine are installed along with the updated malware definitions for the affected products. Administrators of enterprise installations should follow their established internal processes to ensure that the definition and engine updates are approved in their update management software, and that clients consume the updates accordingly.

Typically, no action is required of enterprise administrators or end users to install updates for the Microsoft Malware Protection Engine, because the built-in mechanism for the automatic detection and deployment of updates will apply the update within 48 hours of release. The exact time frame depends on the software used, Internet connection, and infrastructure configuration. Read More…


Sep 13

Is your unoptimized website bleeding money due to a slow average page load time?

Just a one second delay in page response can result in a 7% reduction in conversions, and 40% of users abandon shopping carts that takes more than 3 seconds to load, according to KissMetrics. With more users making purchase decisions on mobile devices each year, page load optimization won’t patiently wait on your back burner any longer without affecting your bottom line.

Fortunately, there are several effective tactics to speed up your website without even touching your main website code. Even if you have little experience with .htaccess oakley sunglasses outlet or server modification, Cheap Jordan Shoes this wholesale jerseys detailed guide will Cheap Jerseys give you the tools and knowledge to take a bite out of your page load.

What is .htaccess?

Glad you asked. An .htaccess file allows you to modify Apache web server configuration settings without modifying the main configuration file – in other words, you can customize the way the server behaves while keeping the core settings intact, much like using a child theme in WordPress. Most webhosts allow clients to use .htaccess files, but if Fake Oakleys you’re not sure, check with your host.

How Do You Use .htaccess?
Simply open any text editor and create a new file called .htaccess. Could it really be that simple? Well, yes and no. Most likely, your computer will perceive the .htaccess file as an operating-system file and hide it from view. To see the file, you’ll need to follow a guide like this one from SitePoint to show hidden files. Once you have that taken care of, you’re ready to move on!



After holding Windows 8.1 discount Cheap Oakleys ray ban sunglasses sale oakley back from developers, Microsoft relented and made Windows 8.1 and Windows 8.1 Pro RTM available to IT professionals and application developers through the TechNet and MSDN network this week.

The company changed its mind based on feedback from the IT community and will make available Windows 8.1, Windows 8.1 Pro and even Windows Server 2012 R2 RTM builds to the developer and IT pro community, said Steven Guggenheimer, Microsoft’s corporate vice president and chief evangelist, in a blog post.

“We heard from you that our decision to not initially release Windows 8.1 or Windows Server 2012 R2 RTM bits was a big challenge for our developer partners as they’re readying new Windows 8.1 apps and cheap oakleys sunglasses for IT professionals who are preparing for Windows 8.1 deployments…As we refine our delivery schedules for a more rapid release cadence, we are working on the best way Wholesale NFL Jerseys to support early releases to the various audiences within our ecosystem,” he wrote.

Microsoft’s Windows RTMs are typically available to developers, but the Windows 8.1 RTM was only made available to PC manufacturers a few cheap nfl jerseys weeks ago.

What was Microsoft thinking? If you want enterprises to deploy Windows 8, you need the IT community to test the <a уже href=”http://www.cheap-jordans-shoes-stores56.com/” target=”_blank”>jordan retro 11 latest version of the operating system in their own environment. If you cheap jerseys want Windows 8.1 bug-free apps available in the Microsoft Store Cheap MLB Jerseys when the operating system hits, developers need the latest RTMs. It’s really not rocket science.

Giving IT pros and app developers the Windows 8.1 RTMs is PROVED not just ray ban outlet about creating bug-free apps. New Windows 8-based mobile devices will become available Cheap Jordans Sale throughout the fourth quarter. Do you think those devices are going to sell without apps? We all know Windows 8 mobile devices are just a fraction of the OS and Android-based app ecosystem. Microsoft Cheap Jordan Shoes needs Free all the help they can get.

Given that enterprises are not Ray Ban Outlet deploying Windows 8 in droves, Microsoft really should have considered how NFL Jerseys Cheap their Windows 8.1 RTM release strategy could affect the entire ecosystem. Holding the Windows 8.1 and Windows 8.1 Pro RTM versions from developers clearly Ray Ban Outlet wasn’t the right move.
Posted by: Diana Hwang Original article

check this link right here now



Distributed Denial-of-Service attacks of the old already have mitigation steps being practiced by network professionals today. Internet service providers have disabled accepting ICMP echo requests, used ingress filtering for spoofed source address and have limited their opened ports. All of this mitigation affects only the network and transport layer of the OSI protocol stack.Плиты погреба

The techniques described above don’t work against bot threats which use a legitimate way in retrieving Internet resources. It does not spoof its source address, it does not send ICMP packets, and it does jordans for cheap not use ports other than the HTTP port. The attacks usually originate from a Cheap Ray Ban Sunglasses compromised machine with multiple threads or processes that connects to a website simultaneously.

The HTTP port is used by browsers to access a web page and this port sits on the application layer of the OSI protocol stack which does not have any established mitigation steps against DDoS attacks. The application layer is where data have been decapsulated or stripped of its transmission details between machines and protocols.

Mitigation steps against HTTP-based DDoS attack varies between internet service providers (ISPs) and network administrators. The reason behind this is because it is hard to distinguish legitimate traffic from an attack coming from a botnet. The botnet DDoS mimics an event that a flash crowd visitor creates.

The obvious solution for this is to have bigger bandwidth to support all the requests; the same way that a hosted website upgrades to a costlier hosting plan as it grows in popularity and wholesale football jerseys generates huge traffic. Instead of upgrading the subscription, there cheap nfl jerseys are already commercial anti-DDoS services which provide additional bandwidth in the event of flash crowds.

Companies serving DDoS defense also have services which involve packet scrubbing. This uses high performance network appliances and computers to inspect packets content and behavior before forwarding the packets to its destination. It hooks the website IP address and catches all the packets in the event of DDoS and inspects them of how they react to responses sent by the defense. If the connecting host is legitimately accessing the site, the packet is then forwarded to the באשלים hosting server.

In case the website is hosted via a web-hosting provider, the site owner does not Как have any access to the network devices to control and filter traffic. For the site owners on the budget, there have been proposed solutions that can be used by their site developers.

It involved the use of a reverse Turing test, which gives a challenge to the connecting hosts. One example of reverse Turing test is the use of CAPTCHA which contains Zuid-Afrika words or sound that humans can easily understand but not computers. When a source IP address tries to access a URL repeatedly within a short time frame, the challenge routine is triggered. If the machine does not reply or incorrectly answers, an HTTP 503 response (Service Unavailable) is always sent to the source IP address until the DDoS subsides. The Service Unavailable response is the cheapest way to send to a connecting host in terms of bandwidth.

For network administrators that don’t have access to high performance network appliances or services, there’s a passive way to mitigate DDoS and it’s called tarpitting. It is deployed by network administrators in cheap football jerseys china their gateway firewall which is the boundary cheap nfl jerseys wholesale of their intranet and their ISP.

Tarpitting works by taking advantage of TCP, nfl jerseys china a protocol which the botnet must follow to send and receive packets. Once the offending source is detected, the victim’s firewall forwards the Cheap Football Jerseys connection to a tarpitted address. The tarpitted address has its TCP window size set at the minimum. This causes the offending machine to send further data having the wholesale jerseys same size that it received from the tarpitted address. The result more bandwidth is ray ban outlet served to legitimate users.

In normal DDoS attack where an attacker initially sends a synchronization packet (SYN), the victim replies with a synchronization and acknowledgment packet (SYN-ACK) which is completed by the offending machine with an custom jerseys acknowledgment packet (ACK). Completing this three-way handshake is what differentiates this attack from SYN floods which already have defense technology built in routers and operating systems.

In a tarpitted Cheap Oakleys connection, the victim only replies to SYN packets with a SYN-ACK having a zero TCP window size. Without the victim replying to other packets, the attacking machine will have multiple open connections. These connections made by the offending machine will only be closed when time-out is reached or if the attacking machine can’t handle too many open connections causing it to crash – sort of like attacking itself with DoS.

Security and network professionals agree that the best thing to mitigate, if not eradicate, DDoS attacks is to have cooperation. Information sharing Cheap nfl Jerseys between security and network community will help standardize the best practices how systems and applications interact to process data efficiently. Information from the victim network should be relayed to the ISP nearer to the attacking machine in order to block DDoS packet. Cybercrime laws should be enforced to get the cooperation of ISPs and infected companies’ intranets that send DDoS packets to clean their networks. Until Ray Ban sale we get this to reality, we just have to accept that DDoS threats from botnets are unstoppable if handled alone.