in the "In the field" category.
Comment: 2021/07/20 - NSO Group targets.
There is some speculation that the Israeli cyber-arms manufacturer, NSO Group has been hacked. It seems more likely that a whistle-blower has leaked a bunch of documents to Amnesty International and a French organisation, Forbidden Stories. Amongst the details are a list of phone numbers targetted by NSO since 2016 and they make for interesting reading.
NSO Group refute the assertions.
You can also check to see if your phone has been infected by Pegasus.
It is also worth noting this Microsoft 'blog post about another Israeli company, Candiru.
Comment: 2021/07/17 - REvil off-line?
The New York Times is reporting that one of Russia's most aggressive ransomware groups has disappeared.
Comment: 2021/07/08 - More good guys acting like the bad guys.
Seemingly, for years, the FBI have been offering a "secure", honeypot device to criminals. Just to be clear, this isn't about law enforcement breaking an existing network; this is about the FBI offering their own, compromised version. More from The Register here
Comment: 2021/06/25 - Dangers posed by evidential software.
An excellent article highlighting that flaws in code can raise legitimate questions over evidential integrity - just as we speculated back in April.
Comment: 2021/06/19 - Original GPRS algorithm deliberately weakened.
A new paper describing a cryptanalytic attack on the General Packet Radio Service GEA-1 and GEA-2 algorithms. The author strongly speculates that GEA-1 was deliberately weakened.
More here and here.
Comment: 2021/06/15 - Emphasising that the good guys can sometimes act like bad guys....
A good summary of the pros of the encryption and privacy debate that every government appears to ignore.
Comment: 2021/06/07 - Attack traffic, part 3.
As I mentioned previously, we're seeing a number of low-complexity attacks against one of our SSH hosts. It's easily blocked, but we saw a significant drop in attack traffic when we blocked two /16 addresses:-
- 209.141.*.*; &
- 205.185.*.*.
116.110.*.* and 199.19.*.* are also careering towards black-listing at the time of typing this.
Comment: 2021/05/18 - So unlikely, it might be true.....
I had not heard this before. It's so unlikely it might be true. Indeed, there is evidence to support that it is.....
Comment: 2021/05/07 - Attack traffic part 2.
For Carlos, Obkio, Dimitri, Ho and all the others who are repeatedly knocking on the door of a BladeSec IA SSH server:-
- It is pointless trying to log in with "root", "admin", "ubuntu", "pi" or any other user ID. Default user IDs have been disabled. Oh, and logging in with *any* user ID has been disabled.
- It is pointless trying to offer weak crypto exchange keys. They have all been disabled. The server also has FIPS-certified crypto libraries - just in case you were curious.
- It is pointless hoping that a config error in SSH will creep in. The config is tested daily.
- It is pointless hoping that a vulnerability will appear. The server automatically downloads and installs updates every hour. It is also subject to enterprise management that will push security patches to it as soon as they become available.
- It is pointless trying to spray lots of traffic at it. The server is on a narrow bandwidth DSL line, so the rate limiting on the upstream firewall will prevent you flooding the server. Yes, we know a dDOS would take it off the Internet, but that's not really cricket, is it? Neither is it compromising the host.
- The server runs Tripwire and so any changes made to it will be discovered and reverted.
- The server will aggressively block all IPs that attempt to circumvent the security on it and an abuse complaint shall be made to your service provider.
- There is absolutely nothing of interest on it. Please move along.... It exists simply to attract "interesting" traffic.
It really does go to show that there is one born every minute.
Comment: 2021/05/04 - Spectre has risen from the dead.
The bottom line is that Spectre was always going to be difficult to fix despite the performance hit, and it's still not.
Comment: 2021/04/29 - First challenges to prosecutions.
There now appears to be reasonable doubt for any prosecution that has featured a Cellebrite product and as we predicted, prosecutions are being challenged. This is to be expected as Cellebrite's security engineering falls far below where it should be, and evdential integrity can no longer be guaranteed.
Comment: 2021/04/22 - Insight into Cellebrite.
The word "Cellebrite" has become known for it's for near mythological ability to unlock a fully patched Android device or Apple iPhone; never mind an older Window or BlackBerry phone. They claim to only sell their tools to law-enforcement agencies, but equally, it has been well reported that they don't deny some of those regimes are authoritarian, military juntas and oppressive governments.
Moxie Marlinspike, author of Signal has published an analysis of the Cellebrite software components having recently come into possession of what appears to be the full gamut of hardware and software. As well as being very readable, the content should be utterly alarming for any agency that has deployed a Cellebrite product as part of their legitimate interests. There now appears to be a reasonable concern that the device image generated by a Cellebrite product may not be as forensically sound as stated.
This is a bombshell for any prosecution that has relied upon Cellebrite to unlock, image or investigate a device, and it does appear that Signal will offer some resistance to any device being scanned. Expect the appeals process to kick off shortly.
Comment: 2021/03/11 - Exchange vulnerability timeline.
This is a scary analysis of the timeline associated with current MS Exchange vulnerability. It highlights that the original vulnerability was reported to Microsoft on 5/1, however it appears that exploits were in the wild from 3/1. Does this mean that the vulnerability was discovered by two researchers - one with integrity and the other malicious? Or does it mean that the research was stolen and exploited within hours? And days later, it iterates again and the vulnerability is weaponised by more than one criminal organisation?
Comment: 2021/03/10 - Attack traffic.
BladeSec IA maintain a number of small honeypots and the traffic analysis associated with that isn't normally terribly interesting. It is changing however:-
- There are a lot more attacks from the US than we'd expect. That can be written off to trojaned machines operating as friendly fire.
- The speed that the number of attacks ebb and flow is interesting. We'll see little directed traffic for at most, two days, and then the next day, we can be targetted by up to 15 different networks. Is that a fluke, or is there a brain behind that? Who knows - but it's interesting none-the-less.
- The most recent notable change has happened in the last 24 hours. There has been a widespread unilateral change to an attack vector that supports there being a single brain behind it. We might post some of the names associated with the attacks as they are not as universal as "administrator", "root", "anonymous" or "nobody". It's almost like the organ grinder has launched a new tool, and the monkeys driving it are using their real names!
Comment: 2021/01/16 - Are we at war?
Are we currently at "cyber-war"?
There doesn't seem to be a day goes by whereby we discover another organisation has been compromised by bad guys. And some of those organisations aren't even on the roadmap for nation-state attacks. What they all have in common is that they are all alleged to be be high-complexity, sophisticated attacks.
And that pings my BS indicator.
For an attacker to perpetrate a long-term, highly sophisticated attack, the payout has to be commensurate. Cyber vandalism, for the most part is about trashing the very low hanging fruit. Hence, whilst I accept that some of those attacks are likely to be from well resourced foreign armies of chaos, there will be another significant number that are just down to bad luck such as not patching in time, not patching fully, having an excuse not to patch, failing to apply a patch, infrastructure complexity, or failing to be able to patch upstream vulnerabilities. None of these are complex attacks, they're down to failing to give appropriate priority to what should be job zero of any given IT department.
It's also worth noting when these attacks are happening. We're at the point where we've largely been working from home for ten months. Organisations, for the most part, seem to have adapted well - but staff training will have taken a hit. Equally, moving the corporate boundaries out to vulnerable home networks won't have helped.
Are all these successful, highly complex attacks by nation-state threat actors just indicative of security atrophy rather than the stated truth? In my experience, the simplest solution is the correct one nine times out of ten.
Comment: 2021/01/02 - Happy New Year!
So this year will mark ten years since bladesec.net was registered. Whilst this year is only beginning, as we get closer to the end of the year, we will look back at the events that resulted in BladeSec IA being formed. I will, however, save the blushes of the folk that had a hand in that!
As usual here is our tongue in cheek look at the last twelve months:-
- Average distance travelled to work: 3 yards - unsurprisingly it's fallen considerably this year!
- Distance to farthest job: 411 miles (in March).
- Most popular colour of facemasks used by staff: Black followed by red.
- Amount of money received for anything other than consultancy: £280 (A refund for an unused train ticket).
- Number of customers assisted in the last twelve months: 5.
- Most interesting place visited: "The Rhoddy Strip", Balbirnie, Fife (whilst armed!)
- Value of donatations to Wikipedia as a result of Travel Advice: £13.
- Value of donations made by BladeSec IA to support other good causes: £245.
- Number of new tattoos sported by BladeSec IA staff: Two.
- Amount of time donated by BladeSec IA staff pro-bono: 6 days.
- Number of redundant BlackBerry phones in the "spare handsets box": 3 (A number were securely disposed of this year).
- Model number of oldest BlackBerry in that box: Pearl Flip 8220.
- Number of pages printed on the office colour laser this year: 187.
Click