Connect with us

Featured

Hidden malware targets enterprises

Published

on

Research has revealed that banks, telecommunication companies and government organisations in Africa, the US, South America and Europe are among the top targets, with the GCMAN and Carbanak groups being the primary suspects. 

Kaspersky Lab experts have discovered a series of “invisible” targeted attacks that use only legitimate software: widely available penetration-testing and administration tools as well as the PowerShell framework for task automation in Windows – dropping no malware files onto the hard drive, but hiding in the memory. This combined approach helps to avoid detection by whitelisting technologies, and leaves forensic investigators with almost no artefacts or malware samples to work with. The attackers stay around just long enough to gather information before their traces are wiped from the system on the first reboot.

At the end of 2016, Kaspersky Lab experts were contacted by banks in CIS which had found the penetration-testing software, Meterpreter, now often used for malicious purposes, in the memory of their servers when it was not supposed to be there. Kaspersky Lab discovered that the Meterpreter code was combined with a number of legitimate PowerShell scripts and other utilities.

The combined tools had been adapted into malicious code that could hide in the memory, invisibly collecting the passwords of system administrators so that the attackers could remotely control the victim’s systems. The ultimate goal appears to have been access to financial processes.

Kaspersky Lab has since uncovered that these attacks are happening on a massive scale: hitting more than 140 enterprise networks in a range of business sectors, with most victims located in the USA, France, Ecuador, Kenya, the UK and Russia.

In total, infections have been registered in 40 countries. It is not known who is behind the attacks. The use of open source exploit code, common Windows utilities and unknown domains makes it almost impossible to determine the group responsible – or even whether it is a single group or several groups sharing the same tools.  Known groups that have the most similar approaches are GCMAN and Carbanak.

Such tools also make it harder to uncover the details of an attack. The normal process during incident response is for an investigator to follow the traces and samples left in the network by the attackers. And while data in a hard drive can remain available for a year after an event, artefacts hiding in the memory will be wiped on the first reboot of the computer. Fortunately, on this occasion, the experts got to them in time.

“The determination of attackers to hide their activity and make detection and incident response increasingly difficult explains the latest trend of anti-forensic techniques and memory-based malware. That is why memory forensics is becoming critical to the analysis of malware and its functions. In these particular incidents, the attackers used every conceivable anti-forensic technique; demonstrating how no malware files are needed for the successful exfiltration of data from a network, and how the use of legitimate and open source utilities makes attribution almost impossible,” said Sergey Golovanov, Principal Security Researcher at Kaspersky Lab.

The attackers are still active, so it is important to note that detection of such an attack is possible only in RAM, the network and registry – and that, in such instances, the use of Yara rules based on a scan of malicious files are of no use.

Details of the second part of the operation, showing how the attackers implemented unique tactics to withdraw money through ATMs will be presented by Sergey Golovanov and Igor Soumenkov at the Security Analyst Summit, to be held from 2 to 6 April, 2017.

Kaspersky Lab products successfully detect operations using the above tactics, techniques and procedures. Further information on this story and Yara rules for forensic analysis can be found in the blog on Securelist.com.

unnamed-3

Technical details, including Indicators of Compromise were also provided to customers of Kaspersky Intelligence Services.

 

Combatting attacks by groups like GCMAN or Carbanak requires a specific set of skills from the security specialist guarding the targeted organisation. During the Security Analysis Summit 2017, Kaspersky Lab’s top-notch specialists will be running exclusive security training sessions designed to help specialists detect sophisticated targeted attacks. Apply for training on “Hunting targeted attacks with Yara rules” here. Apply for training on Malware reverse engineering here.

Featured

Data gives coaches new eyes in sports

Collecting and analysing data is entering a new era as it transforms both coaching and strategy across sports ranging from rugby to Formula 1, writes ARTHUR GOLDSTUCK

Published

on

Coaches and managers have always been among the stars of any sports. They become household names as much as the sports heroes that populate their teams. Now, thanks to the power of data collection and analysis, they are about to raise their game to unprecedented levels.

The evolution of data for fine-tuning sports performance has already been experienced in Formula 1 racing, baseball and American football. All are known for the massive amount of statistic they produce. Typically, however, these were jealously guarded by coaches trying to get an edge over their rivals. Thanks to the science of “big data”, that has changed dramatically.

“American baseball has the most sophisticated data science analytics of any sports in the world because baseball has this long history of stats,” said Ariel Kelman, vice president of worldwide marketing at Amazon Web Services (AWS), the cloud computing giant that is working closely with sports teams and leagues around the world. “It’s an incredibly opaque world. I’ve tried for many years to try and get the teams to talk about it, but it’s their secret sauce and some of these teams have eight, nine or ten data scientist.”

In an interview during the AWS Re:Invent conference in Las Vegas last week, Kelman said that this statistical advantage was not lost on other sports, where forward-thinking coaches fully understood the benefits. In particular, American football, through the National Football League there, was coming on board in a big way.

“The reason they were behind is they didn’t have the player tracking data until recently in in the NFL. They only had the player tracking data three years ago. Now the teams are really investing in it. We did an announcement with the Seattle Seahawks earlier this week; they chose us as their machine learning, data science and cloud provider to do this kind of analysis to help figure out their game strategy. 

“They are building models predicting the other teams and looking at players and also evaluating all their practices. They are setting up computer vision systems so that they can track the performance of the players during their practices and have that inform some of the game strategies. The teams then even talk about using it for player evaluation, for example trying to figure out how much should we pay this player.”

Illustrating the trend, during Re:Invent, Kelman hosted a panel discussion featuring Rob Smedley, a technicalconsultant to Formula 1, Cris Collinsworth, a former professional footballer in the NFL and now a renowned broadcaster, and Jason Healy, performance analytics managerat New Zealand Rugby.

Healey in particular represents the extent to which data analysis has crosses sporting codes. He has spent four yearswith All Blacks, after 10 years with the New Zealand Olympic Committee, helping athletes prepare for the OlympicGames. 

“The game of rugby is chaos,” he told the audience. “There’s a lot of a lot of things going on. There’s a lot of trauma and violence and it can be difficult to work out the load management of each player. So data collection is a big piece of the technical understanding of the game.

“A problem for us in rugby is the ability to recall what happened. We have to identify what’s situational and what’s systemic. The situational thing that happens, which is very unlikely to be replicated, gets a lot of attention in rugby. That’s the sensational big moment in the game that gets talked about. But it’s the systemic plays and the systemic actions of players that lies underneath the performance. That’s where the big data starts to really provide some powerful answers. 

“Coaches have to move away from those sensational andsituational moments. We’re trying to get them to learn what is happening at that systemic level, what is actually happening in the game. How do we adjust? How do we make our decisions? What technical and defensive strategies need to change according to the data?”

Healey said AWS was providing platforms for tracking players and analysing patterns, but the challenge was to bring people on this technology journey.

“We’re asking our coaching staff to change the way they have traditionally worked, by realising that this data does give insights into how they make their decisions.”

Kelman agreed this was an obstacle, not just in sport, but in all sectors.

“Across all of our customers, in all industries, one of the things that’s often underestimated the most is that getting the technology working is only the first step. You have to figure out how to integrate it with the processes that us humans, who dislike change, work with. The vast majority of it is about building knowledge. There’s ways to transfer that learning to performance.”

Of course, data analytics does not assure any side of victory, as the All Blacks discovered during the recent Rugby World Cup, when they were knocked out in the semi-finals, and South Africa went on to win. We asked Healey how the data-poor South Africans succeeded where the data-rich All Blacks couldn’t.

“You have to look at how analytics and insights and all thesetechnologies are available to all the coaches these days,” he said. The piece that often gets missed is the people piece. It’s the transformation of learning that goes into the player’sactual performance on the field. We’re providing them with a platform and the information, but the players have to make the decisions.. We can’t say that this particular piece of technology played a role in winning or losing. It’s simply just a tool.”

The same challenge faces motor racing, which generates massive amounts of data through numerous sensors and cameras mounted in vehicles. Rob Smedley, who spent 25 years working in engineering roles for Formula 1 teams, quipped that his sport had a  “big data” problem before the phrase was invented. 

“We’ve always been very obsessive about data. Take car telemetry, where we’ve got something like 200 to 300 sensors on the car itself. And that goes into something like two to three thousand data channels. So we’re taking about around 600 Gigabytes of data generated every single lap, per car. 

“On top of that, where we’ve also got all the time data and GPS data. The teams are using it for performance advantage. We’re into such marginal gains now because there are no bad teams in Formula 1 anymore. Data analytics provide those marginal gains.”

• Arthur Goldstuck is founder of World Wide Worx and editor-in-chief of Gadget.co.za. Follow him on Twitter and Instagram on @art2gee

Continue Reading

Featured

IoT faces 5-year gap

Published

on

In five years, the world will have more than 40 billion devices. Locally, IoT specialist,Eseye, says that South African CIOs are recognising IoT (Internet of Things) and M2M (Machine to Machine) technologies as strategic imperatives, but the journey is still in its infancy.

“As legacy systems start to reach end of life, digital shifts will become inevitable. This, coupled with an increasing demand for improved bottom line results from existing and new markets, makes IoT a more viable option over the next five years. This is particularly prevalent in manufacturing, especially where time to market and product diversification has become necessary for business survival,” says Jeremy Potgieter, Regional Director – Africa, Eseye.

He says that within this sector one thing matters – output: “Fulfilling the product to market lifecycle is what makes a manufacturer successful. Addressing this functionality and production optimisation through technology is becoming more critical as they focus on increasing output and reducing downtime. By monitoring machinery and components in the production line, any concerns that arise, which impacts both the manufacturer and consumers alike, will be more efficiently dealt with by using an IoT approach.”

Potgieter says that there is also the growing strategic approach to increase the bottom line through new markets. As manufacturers seek new revenue streams, Eseye is encouraging the use of rapid IoT enabled device product development : “By addressing the connectivity aspects required at deployment, manufacturers are immediately diversifying their portfolios. Eseye, as an enabler, assists by providing market ready SIMs, which can be embedded into IoT connected devices at OEM level, connecting them to a plethora of services (as designed for) upon entry to market, anywhere in the world.”

In addition, Potgieter says that organisations are increasingly looking towards IoT connectivity managed services to capitalise on specialist expertise and ensure the devices are proactively monitored and managed to ensure maximum uptime, while reducing data costs.

Impacting IoT adoption though, is undoubtedly the network infrastructure required. Potgieter says that this varies significantly and will depend on criteria such as sensor types and corresponding measurements, the overall communication protocols, data volume, response time, and analytics required: “While the majority of IoT implementations can be enabled using cloud-based IoT platform solutions, the infrastructure required still remains important. A cloud platform will simplify infrastructure design and enable easy scaling capability, while also reducing security and data analytics implementation issues.”

Continue Reading

Trending

Copyright © 2019 World Wide Worx