Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382
{"id":186,"date":"2014-11-15T21:40:57","date_gmt":"2014-11-15T21:40:57","guid":{"rendered":"http:\/\/tedstechshack.com\/?p=186"},"modified":"2014-11-15T21:40:58","modified_gmt":"2014-11-15T21:40:58","slug":"attacks-are-becoming-much-more-sophisticated","status":"publish","type":"post","link":"https:\/\/tedstechshack.com\/2014\/11\/15\/attacks-are-becoming-much-more-sophisticated\/","title":{"rendered":"Attacks Are Becoming Much More Sophisticated"},"content":{"rendered":"

Earlier this week Kaspersky Lab posted a press release<\/a>\u00a0elucidating a sophisticated attack their labs discovered last Fall. \u00a0Kaspersky has dubbed the attack \"Darkhotel<\/em>\". \u00a0It is a fascinating tale of a modern espionage ring that sounds like something out of the seminal cyberpunk novel\u00a0Neuromancer<\/em>. \u00a0It is hard to tell who is behind these attacks targeting globe-trotting corporate executives and government agents. \u00a0It seems likely that it is both organized crime and government sponsored spy rings that are behind these attacks. \u00a0The sophistication gives me pause because I could see myself falling into their trap.<\/p>\n

the \u201cDarkhotel\u201d espionage campaign<\/a>, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate executives travelling abroad. Darkhotel hits its targets while they are staying in luxury hotels. The crew never goes after the same target twice; they operation with surgical precision, obtaining all the valuable data they can from the first contact, deleting traces of their work and fading into the background to await the next high-profile target.<\/p><\/blockquote>\n

The attackers infect and utilize hotel wi-fi networks, which is nothing new, but they then infect the target's computer via what appears to be a standard software update using a real but cracked authentication certificate. \u00a0So, you get something like click to update\u00a0Adobe Acrobat<\/em>, etc. and if you check the authentication certificate, it looks to be valid. \u00a0There are a couple of real good lessons we can all learn from this.<\/p>\n

    \n
  1. Use a Virtual Private Network (VPN).<\/li>\n
  2. Do NOT<\/strong> install apps on an untrusted<\/em> network.<\/li>\n<\/ol>\n

    The US Government just released an alert<\/a>\u00a0about a vulnerability on iOS (iPhones) in which a user installs a third-party app, i.e. not from the iOS App Store, and then utilizing a security weakness, the malware app replaces a legitimate app with full access to the legitimate app's data.<\/p>\n

    Stuxnet<\/em> is a computer worm that was discovered in 2010. \u00a0Stuxnet is considered the first cyber weapon after it damaged Iranian uranium enrichment equipment. \u00a0It is generally considered that the Stuxnet attack was far too complex to be developed by anyone other than a State sponsored effort. \u00a0Most likely involving the United States and Israel. \u00a0While the Iranian enrichment facilities were the original target, Stuxnet has since evolved and escaped into the wild.<\/p>\n

    As the cyber world becomes more and more enmeshed upon our reality the stakes become higher and higher. \u00a0This has brought many new players into cyber warfare. \u00a0What was once the exclusive realm of the curious hacker has become one in which organized crime and Nation States must invest in.<\/p>\n

    Just this morning the\u00a0Wall Street Journal<\/em> posted an article<\/a> about how the US Government is using airplanes that pretend to be cell phone towers in order to intercept cell phone data. \u00a0The US Government is reportedly using the information to locate\u00a0persons of interest<\/em> without the need to go through your cell phone provider or obtain a warrant. \u00a0In another disturbing report, the EFF is reporting that ISPs are removing email encryption<\/a> from their users emails without their knowledge and for no known good reason.<\/p>\n

    An integral part of computer security is assessing the value of potential targets. \u00a0The higher the value, the more likely attackers will pour more resources into the attack, and the greater the security measures need to be to defend against such attacks. \u00a0But what about the average user?<\/p>\n

    Most of us are not trying to protect State or corporate secrets. \u00a0Our value is typically financial, i.e. credit cards, identity theft, bank accounts, etc. \u00a0However, protecting ourselves and our children from\u00a0sextortion<\/em> has become a sad reality. \u00a0There are a couple of major things that we can do to protect ourselves. \u00a0One is to use a properly implemented VPN. \u00a0Another is to use properly implemented strong encryption on our sensitive data.<\/p>\n

    A VPN encrypts the information traveling from your computer to the VPN server. \u00a0If you are on a wireless network, odds are that your information is being broadcast in the open. \u00a0Which means that anyone with a little technical know how can capture and read your information. \u00a0A VPN will encrypt this open data, making it virtually useless to capture. \u00a0But you need to have a well trusted VPN service, because the operator of the VPN service has the ability to view and capture your unencrypted traffic. \u00a0Another nice aspect of a VPN is it usually will mask your IP with that of the VPN server, offering you even more protection. \u00a0So, if you are surfing from your favorite coffee shop, laundry mat, airport, hotel, etc. and you are not using a VPN you are vulnerable to prying eyes. \u00a0But just like your ISP can disable security features, as some appear to have with encrypted email, your VPN provider can also fail to protect you. \u00a0However, a reputable VPN provider is risking their business if they do.<\/p>\n

    Strong encryption is a bit more under the end user's control. \u00a0Yet, the user still has to have a certain amount of faith that the encryption software is truly working as intended. \u00a0There have long been rumors of a\u00a0back door<\/em> existing in PGP. \u00a0The creator of PGP, Phil Zimmerman, has responded to these accusations repeatedly<\/a> over the years. \u00a0PGP and GPG source code is available to the public. \u00a0Like Open Source software, this makes the software more secure in that anyone can find a vulnerability and gain fame and possibly fortune by doing so.<\/p>\n

    These days most operating systems come with some sort of filesystem encryption options. \u00a0Encrypting your filesystem has its advantages. \u00a0For example if you encrypt your laptop drive and your laptop is stolen, encryption will make it much more difficult to retrieve the data off your laptop. \u00a0Yet again, the more secure you make your system the harder it will be to use. \u00a0In order to make the encryption on my laptop very secure, I would store the key on a USB stick, and have a very complicated passphrase. \u00a0Now, every time I boot the laptop, I will need my key (USB stick) and have to enter my complicated passphrase. \u00a0And of course, once I am logged in my data is still vulnerable to remote attacks. \u00a0And should I ever lose my encryption key, I would no longer be able to access my own data!<\/p>\n

    Most filesystem or disk encryption stores the key on the drive itself. \u00a0So, you won't lose your encryption key, but that also means the thief will have your key. \u00a0At that point, it just comes down to how good of a passphrase you used. \u00a0Another option is to encrypt only your sensitive files. \u00a0Perhaps you have a master password list, and since you are using unique strong passwords and usernames on all your accounts, there is little chance that you can remember all these credentials. \u00a0However, you can encrypt your master password list with a strong passphrase to keep it secure. \u00a0Then all you have to remember is your passphrase. \u00a0Even if someone is remotely attacking your computer they will only be able to read your encrypted file when you have it unencrypted. \u00a0Even if they steal your encrypted file, they will need your key and passphrase to decrypt it.<\/p>\n

    All of these are great examples of usability vs. security. \u00a0See my blog\u00a0Data, Data, Everywhere<\/a><\/em> for more on this.<\/p>\n

    I realize that all of this can be a bit complicated, but it is my job to help figure out what the right solution is for you and to help you implement it. \u00a0After all, attacks are only going to gain in prevalance and sophistication.<\/p>\n

     <\/p>\n

     <\/p>\n

     <\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"

    Earlier this week Kaspersky Lab posted a press release\u00a0elucidating a sophisticated attack their labs discovered last Fall. \u00a0Kaspersky has dubbed the attack “Darkhotel”. \u00a0It is a fascinating tale of a modern espionage ring that sounds like something out of the seminal cyberpunk novel\u00a0Neuromancer. \u00a0It is hard to tell who is behind these attacks targeting globe-trotting […]<\/p>\n","protected":false},"author":1,"featured_media":191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":""},"categories":[4],"tags":[],"jetpack_featured_media_url":"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/darkhotel.jpg","jetpack_publicize_connections":[],"yoast_head":"\nAttacks Are Becoming Much More Sophisticated - Ted's Tech Shack<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tedstechshack.com\/2014\/11\/15\/attacks-are-becoming-much-more-sophisticated\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attacks Are Becoming Much More Sophisticated - Ted's Tech Shack\" \/>\n<meta property=\"og:description\" content=\"Earlier this week Kaspersky Lab posted a press release\u00a0elucidating a sophisticated attack their labs discovered last Fall. \u00a0Kaspersky has dubbed the attack "Darkhotel". \u00a0It is a fascinating tale of a modern espionage ring that sounds like something out of the seminal cyberpunk novel\u00a0Neuromancer. \u00a0It is hard to tell who is behind these attacks targeting globe-trotting […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tedstechshack.com\/2014\/11\/15\/attacks-are-becoming-much-more-sophisticated\/\" \/>\n<meta property=\"og:site_name\" content=\"Ted's Tech Shack\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tedstechshack\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/tedstechshack\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-15T21:40:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-11-15T21:40:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/darkhotel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tedstechshack.com\/#website\",\"url\":\"https:\/\/tedstechshack.com\/\",\"name\":\"Ted's Tech Shack\",\"description\":\"Solving your technology needs!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/tedstechshack.com\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/15\/attacks-are-becoming-much-more-sophisticated\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/darkhotel.jpg\",\"width\":512,\"height\":288},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/15\/attacks-are-becoming-much-more-sophisticated\/#webpage\",\"url\":\"https:\/\/tedstechshack.com\/2014\/11\/15\/attacks-are-becoming-much-more-sophisticated\/\",\"name\":\"Attacks Are Becoming Much More Sophisticated - Ted's Tech Shack\",\"isPartOf\":{\"@id\":\"https:\/\/tedstechshack.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/15\/attacks-are-becoming-much-more-sophisticated\/#primaryimage\"},\"datePublished\":\"2014-11-15T21:40:57+00:00\",\"dateModified\":\"2014-11-15T21:40:58+00:00\",\"author\":{\"@id\":\"https:\/\/tedstechshack.com\/#\/schema\/person\/fd220ee0fee205cc1f2f3658953bfef5\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tedstechshack.com\/2014\/11\/15\/attacks-are-becoming-much-more-sophisticated\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/tedstechshack.com\/#\/schema\/person\/fd220ee0fee205cc1f2f3658953bfef5\",\"name\":\"Ted Parvu\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tedstechshack.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/04344bf248172739a95607c68db267dc?s=96&d=retro&r=pg\",\"caption\":\"Ted Parvu\"},\"description\":\"My hacking career began at age 12, when my father brought home a Sinclair ZX-81 computer kit and a lifelong fascination with computing was born. I became a privacy and security advocate after learning of the US Government's criminal investigation against Phil Zimmermann. Years later I found myself in Silicon Valley being paid to hack Phil's PGP code. I soon tired of the rat race and moved to the Northwoods of Minnesota where I have over 2 million acres of protected wilderness to roam. Here I indulge in my passions for wilderness and technology and as an advocate for computer security and privacy.\",\"sameAs\":[\"https:\/\/www.facebook.com\/tedstechshack\",\"https:\/\/www.linkedin.com\/pub\/ted-parvu\/41\/b22\/25\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5bhup-30","_links":{"self":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/186"}],"collection":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":7,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/186\/revisions"}],"predecessor-version":[{"id":234,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/186\/revisions\/234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/media\/191"}],"wp:attachment":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/media?parent=186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/categories?post=186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/tags?post=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}