A new strain of ransomware, named ‘Bad Rabbit’ has been found spreading in Russia and the Ukraine. The malware has affected systems at three Russian websites, an airport in Ukraine and an underground railway in the capital city of Kiev.
Bad Rabbit bears similarities to the WannaCry and Petya outbreaks earlier this year. It is not yet known just how far this malware will be able to spread. US officials said they had received multiple reports of Bad Rabbit ransomware infections in many countries (such as Turkey and Germany) around the world.
The US computer emergency readiness team said it “discourages individuals and organisations from paying the ransom, as this does not guarantee that access will be restored”.
A privately owned Russian news agency, Interfax, was particularly hit hard. Its website displayed the ‘our service is temporary unavailable’ message for over twenty-four hours.
On the morning of 25 October, it transpired that Russian banks had also been targeted but, luckily, were not compromised.
Bad Rabbit encrypts the contents of a computer and asks for a payment – in this case 0.05 bitcoins, or about $280 (£213).
Cyber-security firms, including Russia-based Kaspersky, have said they are monitoring the attack.
www.bbc.co.uk/technews (25th October 17)
The Norwegian Consumer Council (NCC) has warned that some smartwatches designed for children have security flaws that make them susceptible to hackers. Watches from brands including Gator and GPS were tested and it was discovered that attackers could track, eavesdrop or even communicate with the users. The smartwatches serve as basic smartphones, allowing parents to communicate with their children as well as track their location. Some of the watches include an SOS feature that allows the child to instantly call their parents.
The NCC said it was concerned that Gator and GPS kid’s watches transmitted and stored data without encryption. This means that strangers could track children as they moved, or could make a child appear to be in a completely different location.
Consumer rights watchdog Which? criticised the watches and said that parents would be shocked if they knew the risks. ‘Safety and security should be the absolute priority – if that cannot be guaranteed then the products should not be sold,’ said spokeswoman Alex Neill.
As a precautionary measure, John Lewis has withdrawn one of the named smartwatch models from sale in response and is waiting for further advice and reassurance from the supplier.
GPS for Kids said it had resolved the security flaws for new watches and that existing customers were being offered an upgrade.
The UK distributor of the Gator watch said it had moved its data to a new encrypted server and was developing a new, more secure app for customers.
www.bbc.co.uk (19th October 17)
Belgian researchers have discovered a major weakness in the security protocol WPA2 – used to protect the vast majority of Wi-Fi connections.
Mathy Vanhoef, a security expert at KU Leuven University in Belgium, discovered the flaw and published details to highlight the problems. ‘Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted,’ he said. ‘This can be used to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on.’
Depending on the network configuration, it is also possible to inject and manipulate data. Any attackers may well be able to inject ransomware or other malware into websites.
Britain’s National Cyber Security Centre is looking into the matter. ‘Research has been published into potential global weaknesses to Wi-Fii systems. The attacker would have to be physically close to the target and the potential weaknesses would not not compromise connections to secure websites, such as Wi-Fi safety, device management and browser security.
www.the guardian/technews.co.uk (17th October 18)
If you have a device that uses public Wi-Fi, you are at a higher risk. Shopping centres, airports, hotels, public transport, coffee shops, and restaurants all see hundreds of people connecting to the same Wi-Fi access points. It is a prime hunting ground for anyone trying to intercept personal information.
The advice is to avoid public Wi-Fi at the moment whilst vendors work on patches to allow all devices to be updated. Hackers will develop software quickly to take advantage of any vulnerabilities. Therefore updating all devices is a must.
If you have any questions about the state of the security of your devices, or indeed if you have any concerns in general, please call and talk to one of our team. We will be happy to advise and help in any way we can. (adecsmaple – 024 7699 5930)
Many carmakers are adopting ‘over the air’ (OTA) software for their increasingly connected and autonomous cars. Does this mean that there is increase in the risk of hacker hijackers?
Two years ago, hackers showed that they could remotely take control of a Chrysler Jeep. Earlier this year, Tesla boss Elon Musk warned about the dangers of hackers potentially taking control of thousands of driverless cars. Speaking at a National Governors Association meeting he said, ‘ I think one of the biggest concerns for autonomous vehicles is somebody achieving a fleet-wide hack. In principle, if someone was to hack all the autonomous Teslas they could send them all to Rhode Island as a prank. That would be the end of Tesla, and there would be a lot of angry people in Rhode Island.’
Mr Musk was quick to insist that a kill switch would ensure that the driver was able to gain control of the car and cut any links to the servers.
As cars become more sophisticated, incorporating features such as lane keeping, automatic braking and self parking, their systems are connected to the internet and the amount of software needed to control these systems is increasing. Also, It is much easier to use online updates – rather than repair-shop visits – for both automakers and customers.
OTA updates give manufacturers the ability to respond quickly as problems arise. Chrysler was criticised for sending out USB sticks with updates to patch the Jeep. Critics pointed out that criminals could easily intercept the USB sticks and infect them with malware.
Research consultancy IHS Markit estimates that by 2022, 160 million vehicles globally will have the capability to upgrade their onboard computer systems over the air.
‘Ultimately, as cars have become more connected, it does potentially create a bigger target and hackers have always altered their techniques as technology changes,’ said Robert Moran, an expert in car connectivity and security at NXP Semiconductors. ‘The fact that we can provide over-the-air updates is a security feature in itself, as it gives us the ability to respond and make changes’
Consumer trust is crucial, so security is paramount.
www.bbc.co.uk./technews (6th October)
Microsoft appears to have abandoned its smartphone operating system ambitions after Joe Belfiore (chief of the company’s Windows 10) sent a tweet stating that developing new features and hardware for the Mobile version of the OS was no longer a focus. He also added that he had also switched to Android himself.
Mr Belfiore said that Microsoft would support the many companies that had adopted the platform in terms of bug fixes, security updates, etc.
Windows 10 Mobile tried to attract users by letting them run the same ‘universal apps’ on both their PCs and handsets, but the concept failed to catch on. It has been reported that there wasn’t a wide range of devices running Windows 10 Mobile thus making it unattractive to retailers or operators. Consumers had reported that the operating system didn’t provide as good an experience as Android or iOS.
Mr Belfiore posted Microsoft had tried “very hard” to incentivise other companies to release universal apps – even writing their software for them in some cases – but the number of users had been too low for most to bother.
bbc.co.uk/technews (10th October 2017)
Equifax has revealed the extent of a security breach that occurred earlier this year. It is thought that 2.5 million more Americans than previously thought may have had information compromised in the huge cyber security breach at the firm. This means that a total of 145.5 million customers were affected.
Critics say that the company failed to take proper steps to guard information – such as Social Security numbers, birth dates and addresses – and waited too long to inform the public.
Equifax disclosed the attack last month, estimating that around 400,000 Britons and 100,000 Canadians may also have had data compromised.
Richard Smith, former boss of Equifax, is to testify in Congress about the attack. He apologised ahead of the hearing for the firm’s failing and urged the US to adopt new standards for customer credit information. Mr smith said that the attack made him believe that consumers should have sole control over when their credit information may be accesses.
Mr Smith also offered a timeline of events of the incident –
- first attack occurred in May – with hackers taking advantage of a software vulnerability that Equifax was warned about in March and did not address
- An intrusion was identified on the 29th July
- An investigation ordered by the company revealed the enormity of the attack by mid-August
Mr Smith said Equifax faced a huge task to prepare to respond to customers. The firm was overwhelmed by calls after the breach became public and faced problems with the website it created to address customer complaints.
Equifax holds data on more than 820 million consumers as well as information on 91 million businesses.
www.bbc.co.uk/technews (2nd October)