Connect with us

Featured

Cryptojacking rises

Published

on

BRENDAN MCARAVEY, Country Manager, Citrix South Africa, takes a look at what Cryptojacking jacking is, how it works and how it can be avoided.

Parasites in the digital world don’t kill, encrypt, or ransom the hosts as compared to the parasites in the real world. However, they do siphon off compute resources – preferably undetected. Compute resources are a valuable commodity in the world of crypto-mining. This stealthier malware phenomenon called ‘cryptojacking’ is becoming a popular payload since it’s an effective way to generate revenue with a lower chance of detection. The goal is to run undetected – stealing CPU cycles – essentially becoming a digital parasite.

Crafty adversaries driven by the opportunity of financial gain are weaponising crypto-mining to exploit the digital currency boom. Before we go any further, it is key to understand what ‘crypto-mining’ is? It is an intensive process – consistently running mathematical calculations that keep processors at 100% usage.

Professional miners make a large upfront investment in specialised hardware and infrastructure. Case in point, according to a South African gaming website, since the cryptocurrency boom, it has become extremely hard to get hands on graphics cards. They are mostly out of stock, with no guarantee on when they will be back in stock and sky-high prices are being asked for second-hand cards in local classifieds.

As more miners came online, the difficulty level adjusted so that running multiple graphics processing units (GPUs) became more effective at mining. Next came specialised chipsets or ASICs designed specifically for mining Bitcoin – these are getting smaller and more efficient. To increase the chances of pay-out, multiple miners join pools in which they are compensated based on their contribution of compute resources or hash power.

A tell-tale symptom of your CPU being used by miners is sluggishness, high CPU usage, and the whine of maxed-out RPM on the cooling fans. Cryptojacking is not just limited to laptops and PCs, mobile devices and gadgets are also susceptible, even more so since the mining scripts can run in the background or are more difficult to identify.

As with other attacks, server side cryptojacking can be more complex and more complicated once it spreads. If the attacker gets access to the infrastructure, he or she may provision additional servers – in cloud environments, expect to see new servers with high end specs and cost.

Locally we haven’t as yet witnessed cryptojacking attacks, however, globally an example is WannaMine, where the attackers use ‘live off the land’ technique such as Windows Management Instrumentation (WMI) permanent event subscriptions as a persistence mechanism. It also propagates via the EternalBlue exploit popularised by WannaCry.

It’s fileless nature and use of legitimate system software such as WMI and PowerShell make it difficult, if not impossible, for organisations to block it without some form of next-generation antivirus. Defending against cryptojacking requires a holistic approach and building a security architecture with a secure digital perimeter. The approach must focus on prevention as well as detection. Citrix has partnered with multiple security companies that enhance endpoint, network, server, and cloud protection.

For enterprises, delivering a locked down Secure Browser as a service can help reduce the attack surface by blocking the mining scripts as well as blocking the periodic call-backs to the mining pools – which are the command and control for crypto mining.

A critical component is early detection of CPU spikes above normal range – typically sustained. IT Operations should have defined CPU thresholds and analytics with alerts sent to admins when the CPU usage rises above the threshold. A couple of side notes here are that the alerts should disregard the process names – the digital parasite wants to remain undetected and can be disguised to be a system service or process.

Secondly, more devious adversaries will tune down the CPU leeching to not stand out as dramatically – effectively flying under the radar. Establishing a baseline and identifying aberrations quickly is the goal. Once detected, restoring the server to a golden image makes the process easier – local backdoor accounts, services, other changes can be undone.

Protecting against cryptojacking is very much the same as protecting against other malware – however, we are looking for different symptoms and long-term effects in hardware wear and tear, user performance degradation and loss of scalability. Higher costs in electricity or cloud usage are both more intermediate financial symptoms. Stay vigilant even if there are no demand notes or immediate indicators of compromise.

Featured

5 Ways to get coding

SAP Africa Code Week will return this October to the Cape Town Convention Centre to spread digital literacy across the continent and aim to empower over 600 000 children and youth in the basics of coding.

Published

on

Fact: Did you know that by 2020, 80 percent of all jobs will be related to science, technology, engineering and mathematics (STEM)? By then, Africa would also have added 122 million younger people to its workforce, the most of any region in the world. This will provide the continent with the opportunity to be the fastest-growing digital consumer market on the planet, supported by the most youthful population.

To build this educated workforce, children & youth must be provided the opportunity to acquire digital skills from a very young age. This is what led SAP to give birth to Africa Code Week (ACW) and work closely with UNESCO YouthMobile, Google, Governments, educational institutes, schools, businesses, Tech-Hubs, Start-Ups and NPOs to drive sustainable learning impact and make digital skills a core pillar of basic education across Africa. In partnership with SAP these stakeholders are joining forces to power opportunities through digital inclusion in support of the United Nations Sustainable Development Goals- SDGs (#1 – No Poverty, #4 – Quality Education and #5 – Gender Equality) through what Nelson Mandela described as “the most powerful weapon which we can use to change the world”: education.

With over 1.8 million youth introduced to coding over the past three years, ACW returns to the continent this year with a core focus on driving increased sustainability of the programme through its Train-the-Teacher sessions and female skills development in support of the #eskills4girls initiative, which was launched to help overcome the gender digital divide and promote education, skills and employment for girls and women in a digital world. In October 2018, ACW will support thousands of free workshops organized for youth aged 8-16 years across 36 African countries.

Computer Coding, Artificial Intelligence, Data Science, Machine learning, Virtual Reality; the list of today’s digital skillset is ever-evolving within a fast-paced digital economy. Whether a technophile or technophobe – here’s how you can get involved:

Attend a Live Workshop

Taking place at schools, universities, science centers or community centers, ACW’s free digital workshops address specific age groups regardless of learner levels. Get yourself up to speed with fun learning tools and passionate teachers! Visit the ACW Map to locate a workshop near you.

  • Access a Free Online Course

Learn Coding from Scratch: If you are between 12 and 16 years old and would like to learn computer programming, openSAP is the place to start. This free online course will teach you how to create your own animations and games using the famous Scratch interface, a free programming language designed by the MIT Media Lab to simplify the face of coding for the young generation.

Teaching coding using Scratch: If you would like to learn the skills to teach youth coding using the famous Scratch interface described above, openSAP also has a free course for teachers.

  • Both courses are also available in French on openSAP for teachers and youth in Francophone Africa.

Host a Coding Workshop in Your Community

Why not support the planning and execution of workshops in your own venue community? You can visit the ACW website to download your full partner guide including a checklist of what you’ll need to host a successful coding workshop in your school or community.

Become a Coding Instructor

Use your teaching skills for the greater good and visit the ACW website to see where Train-the-Trainer workshops are taking place in your country. While ACW takes place over a one-week period every year, it is the local capacity building within schools and communities that will ensure sustainable 21st century skills development across the continent.

Become a Corporate Sponsor

ACW relies on a global network of likeminded companies. By becoming a sponsor, your organisation will be able to engage customers, partners and employees as skilled volunteers as part of its own series of workshops and help expand the scope to more African countries. You can reach out to info@africacodeweek.org for further details.

Together We Can Make the World Run Better

“There is so much we can do to empower our youth in the digital age,” says Sunil Geness, Project Lead for Africa Code Week. “ACW creates awareness about the importance of digital skills through creative and interactive learning. It also fosters the rise and growth of a community training culture which supports Government and Education institutions with the integration of coding into existing school curricula.”

He adds that it is not enough to rely on traditional teaching tools to equip our children with the skills they need for the future. “Beyond the activities taking place across the continent, Africa Code Week is also a fast-growing and powerful ecosystem that enables teachers and learners to connect and collaborate with their peers. This sustainable approach is a powerful contributor to realising the potential of Africa’s immense talent pool.”

Feeling inspired? Join SAP and partners; the Cape Town Science Centre, the Camden Education Trust, UNESCO Youth Mobile, Google, The German Federal Ministry of Economic Cooperation and Development and a fast-growing network of over 150 private and public partners on their Africa Code Week mission to bridge the digital skills and gender gap. Simply visit www.africacodeweek.org to find our more.

Continue Reading

Featured

How AI can save elephants

Deep in the rainforest in a northern corner of the Republic of Congo, some of the most sophisticated monitoring of animal sounds on earth is taking place. Acoustic sensors are collecting large amounts of data around the clock for the Elephant Listening Project.

Published

on

These sensors capture the soundscape in Nouabalé-Ndoki National Park and adjacent logging areas: chimpanzees, gorillas, forest buffalo, endangered African grey parrots, fruit hitting the ground, blood-sucking insects, chainsaws, engines, human voices, gunshots. But researchers and local land managers who placed them there are listening for one sound in particular — the calls of elusive forest elephants.

Forest elephants are in steep decline; scientists estimate two-thirds of Africa’s population has likely been lost to ivory poaching in recent decades. Africa’s savannah elephants have also declined by 30 percent over a recent seven-year period, primarily because of poaching, according to results released in 2016 from Paul G. Allen’s Great Elephant Census.

But those working to save these species, which are critical to keeping ecosystems in balance and that also draw wildlife tourists, have a powerful new tool at their disposal: artificial intelligence.

Conservation Metrics, a Microsoft AI for Earth grantee based in Santa Cruz, California, uses machine learning to monitor wildlife and evaluate conservation efforts. It is applying its sophisticated algorithms to help the Elephant Listening Project, based at Cornell University’s Lab of Ornithology, distinguish between forest elephant calls and the other sounds in a noisy tropical rainforest. It’s a perfect job for AI — looking for these rare patterns in terabytes of data that would take humans years.

Researchers use the elephant call data to build more accurate and frequent population estimates, track their movements, provide better security and potentially to identify individual animals, which can’t be easily seen from the air.

It is one of many ways biologists, conservation groups and Microsoft data scientists are enlisting artificial intelligence to prevent the illegal killing of elephants across Africa, stop the global trade in their parts and preserve critical habitat. Efforts include using machine learning to detect real-time movement patterns that could alert rangers to poaching and blocking online ads that attempt to sell illegal ivory or elephant parts.

Scientists with the Elephant Listening Project estimate that Africa’s population of forest elephants has dropped from roughly 100,000 animals in 2011 to fewer than 40,000 animals today. But those numbers are largely based on indirect evidence: ivory seizures, signs of poaching and labor-intensive surveys that are too expensive to be done regularly.

The Elephant Listening Project has spent more than three decades researching how elephants use low-frequency rumbling sounds to communicate with one another. More recently, those scientists began to use acoustic sensors at research sites to build population estimates and, ultimately, to track and protect forest elephants across their ranges in Central and West Africa.

If scientists find, for example, that at specific times of year elephants are using clearings in an unprotected logging concession to access scarce minerals or find mates, scientists can work with the loggers to schedule their work to minimize disturbance and reduce conflicts.

But there has been a bottleneck in getting data out of these remote African forests and analyzing information quickly, says Peter Wrege, a senior research associate at Cornell who directs the Elephant Listening Project.

“Right now, when we come out of the field with our data, the managers of these protected areas are asking right away, ‘What have you found? Are there fewer elephants? Is there a crisis we need to address immediately?’ And sometimes it takes me months and months before I can give them an answer,” says Wrege.

Conservation Metrics began collaborating with the Elephant Listening Project in 2017 to help boost that efficiency. Its machine learning algorithms have been able to identify elephant calls more accurately and will hopefully begin to shortcut the need for human review. But the volume of data from the acoustic monitors is taxing the company’s local servers and computational capacity.

Microsoft’s AI for Earth program has given a two-year grant to Conservation Metrics to build a cloud-based workflow in Microsoft Azure for analyzing and processing wildlife metrics. It has also donated Azure computing resources to the Elephant Listening Project to support its data-processing costs for the project. The computational power of Azure will speed processing time dramatically, says Matthew McKown, the CEO of Conservation Metrics. The platform also offers new opportunities for clients to upload and interact with their data directly.

It takes about three weeks for computers to process a few months of sound data from this landscape-scale study, says McKown. Once the Azure migration is complete later this year, that same job may take a single day.

“It’s a huge improvement. We’re really interested in speeding up that loop between having equipment monitoring things out in the field and going through this magic process to convert those signals into information you can send into the field where someone can take action,” says McKown. “Right now, that process can take a really long time.”

‘We’ve only scratched the surface’

Across the continent in East Africa, Jake Wall, a research scientist with Save the Elephants who collaborates with the Mara Elephant Project and other conservation groups, typically has more immediate access to data about the savannah elephants he studies in Kenya and seven other countries. That’s because animals in those populations have been outfitted with GPS tracking collars that transmit location data via satellites and cell networks.

That information is uploaded to the Domain Awareness System (DAS), a real-time data visualization and analysis platform now used in protected areas across Africa. It integrates data from about 15 different sources today, including ranger vehicle and radios, animal trackers, camera traps, drones, weather monitors, field reports, snare locations and satellite imagery. The tool was developed by Paul G. Allen’s Great Elephant Census, another AI for Earth partner that is moving the DAS system and its data onto the Azure cloud, to give managers a real-time dashboard that can inform tactical decisions for interdiction against suspected illegal activity or apparent threats to endangered wildlife.

In some areas, DAS also powers a Save the Elephants tracking app that can alert rangers when an animal has slowed or stopped moving via email or text message. The app can also warn when animals are heading toward human settlements where they might raid a farmer’s crops. Reserve managers or the farmer can then help herd the animals back to safety. From Gabon to Mozambique to the Congo, some 463 animal tracking devices are deployed, of which 358 are on elephants.

In other projects, Microsoft has worked with the Peace Parks Foundation, which combats rhino and other wildlife poaching in South Africa, to create remote sensing systems that can detect and evaluate poaching risks. Microsoft, through a NetHope Azure Showcase grant, is also helping move the open-source SMART (Spatial Monitoring and Reporting Tool) Connect to the Azure cloud. It is used in dozens of conservation sites across Africa to improve the effectiveness of wildlife patrols.

AI for Earth has also provided grants to researchers at the USC Center for AI in Society (CAIS) and Carnegie Mellon University, who have created and are continuing to improve Protection Assistant for Wildlife Security (PAWS). It uses machine learning to create patrol routes based on where poaching activity is most likely to occur. USC CAIS has also created and is continuing to improve the Systematic Poacher Detector, which detects poachers and wildlife in nighttime drone footage, now being used by organizations including Air Shepherd.

Even with advances in radio collar technology, sensors and imagery collection, a lot of additional work is needed to turn that data into scientific insights or actionable intelligence, says Wall.

“I think we’ve only scratched the surface of what’s possible,” says Wall. “We’re really excited because the expertise that Microsoft and AI for Earth can bring to the table includes skillsets that field biologists don’t typically have.”

“Machine learning could be applied to seven or eight immediate things that I would love to know more about, whether it’s recognizing individual elephants or picking up on changes in movement behavior or figuring out what’s happening on a landscape level with human expansion and deforestation,” says Wall.

Wall has been collaborating with Dan Morris, a Microsoft researcher working with AI for Earth, on a half dozen project ideas. One examines how to use machine learning to identify streaking behaviors — when elephants run fast and in an unusually straight line — that can be a sign of poaching or other threats.

Morris has also been working to apply machine learning algorithms to camera traps, which are remote field cameras that are triggered by motion and photograph anything that crosses their path. But finding an animal of interest can be like looking for a needle in a haystack.

“Sometimes no one has time to look through these images and they end up sitting on a grad student’s shelf somewhere,” says Morris. “The potential for machine learning to rapidly accelerate that progress is huge. Right now there is some really solid work being done by computer scientists in this space, and I would guess that we’re less than a year away from having a tool that biologists can actually use.”

Wall and Morris are also beginning to work on using AI to distinguish between elephants and other animals like buffalo or giraffes in aerial photography. Knowing when and where elephants are coming into contact with other wildlife — and particularly domesticated animals like cattle — can help rangers minimize conflicts with humans and help scientists better understand disease vectors.

These insights can also inform land-management decisions, such as where to lobby for protected areas and where to locate human infrastructure like roads and pipelines. That’s one of the most significant yet least understood threats to elephant survival, says Wall. With access to the right imagery data, AI tools could help begin to keep tabs on, and draw useful insights into, human encroachment into their habitat.

“We’re always focused on poaching and these acute problems, but really it’s the expansion of human settlements and the advancements of roads and railways and pipelines that are going to affect African elephant populations going forward,” says Wall.

‘AI is really the key piece’

Saving elephants isn’t just about stopping poachers where they hunt. Disrupting the global marketplace that rewards them economically is equally important.

Microsoft and other tech companies have joined the Global Coalition to End Wildlife Trafficking Online, organized by the World Wildlife Fund (WWF) and partners TRAFFIC and the International Fund for Animal Welfare. After observing that trafficking in wildlife parts like elephant ivory, animal skins and live pets had largely moved from physical marketplaces to the internet, they convened companies from across the online landscape to combine forces to stop it.

Along with targeting the illegal trade in elephant products, the coalition partners target criminal transactions such as the sale of tiger cubs for pets and the trade in pangolin scales and illegal coral.

“Previously cybercriminals were able to operate pretty freely on the internet because there wasn’t much risk,” says Giavanna Grein, a wildlife crime program officer at WWF. “But now we’re creating deterrents and consistency across all the different platforms — if every time a criminal creates a new account and puts up a new post, it’s taken down immediately, that’s going to be really frustrating for that criminal.”

The coalition has since worked with search engines like Bing, e-commerce sites and social media companies to adopt strong and consistent policies about what products are prohibited on their platforms. WWF also provides training to help companies recognize and shut down advertisements and customer accounts that traffic in illegal wildlife.

That involves some mix of human detective work and algorithms that search for keywords associated with wildlife trafficking. In September, Microsoft’s AI for Earth team will host an AI-focused workshop for tech companies and academics working to enhance automation to detect illegal wildlife and their products online. The goal is to advance technologies to identify and root out endangered species posts before anyone has a chance to see and purchase them.

“AI is really the key piece in combating wildlife trafficking online. While it’s not the only solution needed, automating the review of posts containing illegal wildlife and their products would drastically increase the barrier to entry for wildlife cybercriminals,” says Grein.

Continue Reading

Trending

Copyright © 2018 World Wide Worx