706-453-0402
BDManagedIT
  • Home
  • Services
    • Backup And Continuity
    • VOIP Telephones
    • Security Awareness Training
    • Networking
    • Multi-factor Authentication
    • Helpdesk
    • Endpoint Security
    • Email Protection
    • Cloud Services
    • Remote Monitoring
  • About Us
  • 706-453-0402
  • Customer Portal
  • Menu

Louisiana Declares Cybersecurity State of Emergency

July 30, 2019/in Uncategorized /by Ashley Robison
Dark Reading Staff
Dark Reading Staff

Louisiana Declares Cybersecurity State of Emergency

A series of attacks on school district systems leads the governor to declare the state’s first cybersecurity state of emergency.

Louisiana is no stranger to declarations of emergency, but it never had one for a cybersecurity emergency — until this week. A series of attacks on school districts around the state led Governor John Bel Edwards to issue the declaration that brings new resources and statewide coordination to what had been a collection of local cybersecurity events.

By issuing the formal declaration, the governor allows statewide resources from the Louisiana National Guard, Louisiana State Police, Louisiana Office of Technology Services, and Louisiana State University, led by the state Office of Homeland Security and Emergency Preparedness, to be brought to bear on defense, analysis, and remediation efforts. These state resources will join federal resources that have already been briefed, as well as local cybersecurity teams, to address the attacks.

This is not the first time a state emergency declaration has been issued for cyberattacks; in 2016, Colorado governor John Hickenlooper declared a state of emergency due to attacks on that state’s department of transportation.

For more, read here.

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

https://bdmanagedit.com/wp-content/uploads/favicon-96x96.png 96 96 Ashley Robison https://bdmanagedit.com/wp-content/uploads/logo_new-1.00.14-PM-300x61.png Ashley Robison2019-07-30 09:35:112019-08-13 14:56:02Louisiana Declares Cybersecurity State of Emergency

I found your data. It’s for sale.

July 22, 2019/in Uncategorized /by Ashley Robison
By Geoffrey A. Fowler
Technology columnist

July 18

I’ve watched you check in for a flight and seen your doctor refilling a prescription.

I’ve peeked inside corporate networks at reports on faulty rockets. If I wanted, I could’ve even opened a tax return you only shared with your accountant.

I found your data because it’s for sale online. Even more terrifying: It’s happening because of software you probably installed yourself.

My latest investigation into the secret life of our data is not a fire drill. Working with an independent security researcher, I found as many as 4 million people have been leaking personal and corporate secrets through Chrome and Firefox. Even a colleague in The Washington Post’s newsroom got caught up. When we told browser makers Google and Mozilla, they shut these leaks immediately — but we probably identified only a fraction of the problem. Extensions, little programs also known as add-ons and plug-ins, hang out in the top right corner of your browser. (Geoffrey Fowler/The Washington PostT)

The root of this privacy train wreck is browser extensions. Also known as add-ons and plug-ins, they’re little programs used by nearly half of all desktop Web surfers to make browsing better, such as finding coupons or remembering passwords. People install them assuming that any software offered in a store run by Chrome or Firefox has got to be legit.

Not. At. All. Some extensions have a side hustle in spying. From a privileged perch in your browser, they pass information about where you surf and what you view into a murky data economy. Think about everything you do in your browser at work and home — it’s a digital proxy for your brain. Now imagine those clicks beaming out of your computer to be harvested for marketers, data brokers or hackers.

Some extensions make surveillance sound like a sweet deal: This week, Amazon was offering people $10 to install its Assistant extension. In the fine print, Amazon said the extension collects your browsing history and what’s on the pages you view, though all that data stays inside the giant company. (Amazon CEO Jeff Bezos owns The Washington Post.) Academic researchers say there are thousands of extensions that gather browsing data — many with loose or downright deceptive data practices — lurking in the online stores of Google and even the more privacy-friendly Mozilla.

The extensions we found selling your data show just how dangerous browser surveillance can be. What’s unusual about this leak is that we got to watch it taking place. This isn’t a theoretical privacy problem: Here’s exactly how millions of people’s data got grabbed and sold — and the failed safeguards from browser makers that let it happen.

A ‘catastrophic’ leak

I didn’t realize the scale of the extension problem until I heard from Sam Jadali. He runs a website hosting business, and earlier this year found some of his clients’ data for sale online. Figuring out how that happened became a six-month obsession.

Jadali found the data on a website called Nacho Analytics. Just one small player in the data economy, Nacho bills itself on its website as a marketing intelligence service. It offers data about what’s being clicked on at almost any website — including actual Web addresses — for as little as $49 per month.

[Goodbye, Chrome: Google’s Web browser has become spy software]

That data, Nacho claims, comes from people who opt in to being tracked, and it redacts personally identifiable information.

The deeper Jadali looked on Nacho, the more he found that went way beyond marketing data. Web addresses — everything you see after the letters “http” — page titles and other browsing records might not seem like they’d expose much. But sometimes they contain secrets sites forget to hide away.

Jadali found usernames, passwords and GPS coordinates, even though Nacho said it scrubs personal information from its data. “I started realizing this was a leak on a catastrophic scale,” Jadali told me.

What he showed me made my jaw drop. Three examples:

  • From DrChrono, a medical records service, we saw the names of patients, doctors, and even medications. From another service, called Kareo, we saw patient names.
  • From Southwest, we saw the first and last names, as well as confirmation numbers, of people checking into flights. From United, we saw last names and passenger record numbers.
  • From OneDrive, Microsoft’s cloud storage service, we saw a hundred documents named “tax.” We didn’t click on any of these links to avoid further exposing sensitive data.

It wasn’t just personal secrets. Employees from more than 50 major corporations were exposing what they were working on (including top-secret stuff) in the titles of memos and project reports. There was even information about internal corporate networks and firewall codes. This should make IT security departments very nervous.

Jadali documented his findings in a report titled “DataSpii,” and has spent the last two weeks disclosing the leaks to the companies he identified — many of which he thinks could do a better job keeping secrets out of at-risk browser data. I also contacted all the companies I name in this column. Kareo and Southwest told me they’re removing names from page data.

I wondered if Jadali could find any data from inside The Washington Post. Shortly after I asked, Jadali asked me if I had a colleague named Nick Mourtoupalas. On Nacho, Jadali could see him clicking on our internal websites. Mourtoupalas had just viewed a page about the summer interns. Over months, he’d probably leaked much, much more.

I called up Mourtoupalas, a newsroom copy aide. Pardon the interruption, I said, but your browser is leaking.

“Oh, wow, oh, wow,” Mourtoupalas said. He hadn’t ever “opted in” to having his Web browsing tracked. “What have I done wrong?”

Follow the data

I asked Mourtoupalas if he’d ever added anything to Chrome. He pulled up his extensions dashboard and found he’d installed 17 of them. “I didn’t download anything crazy or shady looking,” he said.

One of them was called Hover Zoom. It markets itself in the Chrome Web Store and its website as a way to enlarge photos when you put your mouse over them. Mourtoupalas remembered learning about it on Reddit. Earlier this year, it had 800,000 users.

When you install Hover Zoom, a message pops up saying it can “read and change your browsing history.” There’s little indication Hover Zoom is in the business of selling that data.

I tried to reach all the contacts I could find for Hover Zoom’s makers. One person, Romain Vallet, told me he hadn’t been its owner for several years, but declined to say who was now. No one else replied.

Jadali tested the links between extensions and Nacho by installing a bunch himself and watching to see if his data appeared for sale. We did some of these together, with me as a willing victim. After I installed an extension called PanelMeasurement, Jadali showed me how he could access private iPhone and Facebook photos I’d opened in Chrome, as well as a OneDrive document I had named “Geoff’s Private Document.” (To find the latter, all he had to do was search page titles on Nacho for “Geoff.”)

In total, Jadali’s research identified six suspect Chrome and Firefox extensions with more than a few users: Hover Zoom, SpeakIt!, SuperZoom, SaveFrom.net Helper, FairShare Unlock and PanelMeasurement.

They all state in either their terms of service, privacy policies or descriptions that they may collect data. But only two of them — FairShare Unlock and PanelMeasurement — explicitly highlight to users that they collect browser activity data and promise to reward people for surfing the Web.

“If I’ve fallen in for using this extension, I know hundreds of thousands of other people easily have also,” Mourtoupalas told me. He’s now turned off all but three extensions, each from a well-known company.

The tip of the iceberg

After we disclosed the leaks to browser makers, Google remotely deactivated seven extensions, and Mozilla did the same to two others (in addition to one it disabled in February). Together, they had tallied more than 4 million users. If you had any of them installed, they should no longer work.

A firm called DDMR that made FairShare Unlock and PanelMeasurement told me the ban was unfair because it sought user consent. (It declined to say who its clients were, but said its terms prohibited customers from selling confidential information.) None of the other extension makers answered my questions about why they collected browsing data.

A few days after the shutdown, Nacho posted a notice on its website that it had suffered a “permanent” data outage and would no longer take on new clients, or provide new data for existing ones.

But that doesn’t mean this problem is over.

North Carolina State University researchers recently tested how many of the 180,000 available Chrome extensions leak privacy-sensitive data. They found 3,800 such extensions — and the 10 most popular alone have more than 60 million users.

“Not all of these companies are malicious, or doing this on purpose, but they have the ability to sell your data if they want,” said Alexandros Kapravelos, a computer science professor who worked on the study.

Extension makers sometimes cash out by selling to companies that convert their popular extensions into data Hoovers. The 382 extensions Kapravelos suspects are in the data-sale business have nearly 8 million users. “There is no regulation that prevents them from doing this,” he said.

[Alexa has been eavesdropping on you this whole time]

So why aren’t Google and Mozilla stopping it? Researchers have been calling out nefarious extensions for years, and the companies say they vet what’s in their stores. “We want Chrome extensions to be safe and privacy-preserving, and detecting policy violations is essential to that effort,” said Google senior director Margret Schmidt.

But clearly it’s insufficient. Jadali found two extensions waited three to five weeks to begin leaking data, and he suspects they may have delayed to avoid detection. Google recently announced it would begin requiring extensions to minimize the data they access, among other technical changes. Mozilla said its recent focus has also been on limiting the damage add-ons can do.

Just as big a problem is a data industry that’s grown cavalier about turning our lives into its raw material.

In an interview, Nacho CEO Mike Roberts wouldn’t say where he sourced his data. But Jadali, he said, violated Nacho’s terms of service by looking at personal information. “No actual Nacho Analytics customer was looking at this stuff. The only people that saw any private information was you guys,” Roberts said.

I’m not certain how he could know that. There were so many secrets on Nacho that tracking down all the ways they might have been used is impossible.

His defense of Nacho boiled down to this: It’s just the way the Internet works.

Roberts said he believed the people who contributed data to Nacho — including my colleague — were “informed.” He added: “I guess it wouldn’t surprise me if some people aren’t aware of what every tool or website does with their data.”

Nacho is not so different, he said, from others in his industry. “The difference is that I wanted to level the playing field and put the same power into the hands of marketers and entrepreneurs — and that created a lot more transparency,” he said. “In a way, that transparency can be like looking into a black mirror.”

He’s not entirely wrong. Large swaths of the tech industry treat tracking as an acceptable way to make money, whether most of us realize what’s really going on. Amazon will give you a $10 coupon for it. Google tracks your searches, and even your activity in Chrome, to build out a lucrative dossier on you. Facebook does the same with your activity in its apps, and off.

Of course, those companies don’t usually leave your personal information hanging out on the open Internet for sale. But just because it’s hidden doesn’t make it any less scary.

Geoffrey A. FowlerGeoffrey A. Fowler is The Washington Post’s technology columnist based in San Francisco. He joined The Post in 2017 after 16 years with the Wall Street Journal writing about consumer technology, Silicon Valley, national affairs and China. Follow 
https://bdmanagedit.com/wp-content/uploads/favicon-96x96.png 96 96 Ashley Robison https://bdmanagedit.com/wp-content/uploads/logo_new-1.00.14-PM-300x61.png Ashley Robison2019-07-22 10:24:382019-08-07 10:37:56I found your data. It's for sale.

20 Questions to Ask During a Real (or Manufactured) Security Crisis

July 9, 2019/in Uncategorized /by Ashley Robison

20 Questions to Ask During a Real (or Manufactured) Security Crisis

Joshua Goldfarb
Joshua Goldfarb

There are important lessons to be learned from a crisis, even the ones that are more fiction than fact.

I’ve heard the statement “society doesn’t deal with problems until they become a crisis” many times. Unfortunately, this is often the case in information security, but it doesn’t need to be this way. As security practitioners, we can’t fix the ills of society. We can, however, learn how to distinguish a real security crisis from a manufactured one. Furthermore, from each crisis (real or manufactured) that we go through, we can learn how to avert them all together.

In this spirit, I offer 20 questions to ask during a real or manufactured security crisis.

Image Credit: DuMont Television/Rosen Studios. Public domain, via Wikimedia

Image Credit: DuMont Television/Rosen Studios. Public domain, via Wikimedia

1. What is the threat that the issue at hand poses? Regardless of the noise surrounding a given situation, you need to understand the actual threat you’re dealing with. Conjecture and hype won’t help. Rather, you need to objectively understand how the threat could manifest itself as a risk to the organization.

2. What is the organization’s exposure to the threat? Once you understand the threat, you can evaluate your exposure to that threat. This needs to be done in order to fully understand the gravity of the situation.

3. What risk does this threat pose to the organization? Once you understand the organization’s exposure, you can assess the risk posed to the organization. This is where you really begin to understand how seriously to consider the threat and how aggressively to respond.

4. Is the hype surrounding this threat justified? Separating fact from fiction is important. If the facts support the hype surrounding a given threat, then it needs to be dealt with as such. However, if the facts tell a different story, it’s time to spin this one down.

5. Does the hype surrounding the threat translate to a real risk for the organization? If the risk is real, then it’s time to respond appropriately. That includes the communication necessary to keep the right stakeholders informed.

6. When did we first become aware of the issue? Were you just made aware of this, or have you been aware of it for quite some time? The difference is important. If you knew about a significant risk to the organization and didn’t act on it or escalate appropriately, that’s a fairly significant lapse in security.

7. Why wasn’t this raised earlier? If there is a reason, it can be addressed as part of continual process improvement. If there is no reason, it’s important to understand why.

8. Could we have avoided this issue? In many cases, issues can be avoided if risk assessment were done more proactively, or if the attack surface had been reduced significantly. Not in all cases, of course, but it’s good to ask the question.

9. Why didn’t we avoid this issue? Once you understand how you could have avoided an issue, you need to ask why you didn’t.

10. Has any damage to the organization occurred? This is, of course, the quintessential question. If no damage occurred, you need to remediate the risk, learn from your mistakes, and be thankful. If damage has occurred, then you still need to remediate the risk, learn from your mistakes, and, of course, perform incident response.

11. What are the steps required to remediate the issue? If you need to respond and remediate, the first step is to map out the steps required to do so properly. Taking a few moments to get organized and ensure all bases are covered yields a higher-quality result and saves time down the line.

12. What are the lessons learned from this issue? After any issue is dealt with, lessons need to be extracted and studied. This allows the security organization to improve and mature.

13. Can we apply those lessons to avoid a similar situation in the future?Obviously, crisis mode is a last resort. If you can apply lessons learned, you can avoid making the same mistake.

14. What other potential crises might we encounter? Post-crisis is a great time to think outside of the box and do some analysis. Understanding what other pitfalls you may encounter allows you to mitigate those risks ahead of time and improve the security posture of the organization.

15. What else can we tighten up to avoid future issues? You may have patched, tightened controls, or improved monitoring after the crisis, but what else can you do to keep from having to relive this or a similar experience?

16. How can we ensure that our remediation of the issue will be effective? Your plan may sound good on paper, but to be more certain, map the technologies and applications the issue affects, then conduct a sanity check to see whether it will achieve your desired goals.

17. Have we verified that remediation was effective? If you’ve already remediated, have you tested to ensure that the remediation was effective? If not, you could be exposed to a recurrence.

18. What steps have we taken to avoid a similar situation in the future?You need to ensure that whatever remediation you’ve done, whatever lessons you’ve learned, and whatever improvements you’ve made are lasting and not a one-time fix.

19. Have we precisely and effectively communicated actions to management and executives? Regardless of whether or not you had a real crisis, whether or not you handled it appropriately, and whether or not you’ve made improvements to the security organization, your actions need to be documented and communicated to management and executives. This builds confidence in the security team’s ability and avoids excessive spin-up when the next issue arises.

20. Have we taken steps to avoid future damage? In the end, it all comes down to whether or not you avoid or minimize damage to the organization. This is perhaps is the hardest question to answer. But it is likely the most important.

Josh (Twitter: @ananalytical) is an experienced information security leader who works with enterprises to mature and improve their enterprise security programs.  Previously, Josh served as VP, CTO – Emerging Technologies at FireEye and as Chief Security Officer for … View Full Bio

https://bdmanagedit.com/wp-content/uploads/favicon-96x96.png 96 96 Ashley Robison https://bdmanagedit.com/wp-content/uploads/logo_new-1.00.14-PM-300x61.png Ashley Robison2019-07-09 15:16:362019-08-07 10:37:4120 Questions to Ask During a Real (or Manufactured) Security Crisis

Ransomware Hits Georgia Court System

July 9, 2019/in Uncategorized /by Ashley Robison

Georgia court system hit by ransomware attack

Dark Reading Staff

The extent of it is not yet clear.
Author: Kaitlyn S Ross, Jonathan Raymond
Published: 11:24 AM EDT July 1, 2019
Updated: 10:47 AM EDT July 2, 2019

ATLANTA — At least a portion of the digital information systems for Georgia’s court system has been taken offline by a ransomware attack after a note was found requesting contact, officials confirmed Monday.

Authorities say the note contained no further details such as amounts or demands, but said they determined that it would be best to take the network offline.

It’s not clear to what extent the systems are affected, but the website for Georgia’s Administrative Office of the Courts and Judicial Council of Georgia – www.georgiacourts.gov – is currently down.

“Our systems have been compromised, so we have quarantined our servers and shut off our network to the outside,” said Administrative Office of the Courts spokesman Bruce Shaw.

He said not all systems have been impacted, but the network was taken offline to be safe. He said the IT department is meeting with “external agencies” to determine the severity of the attack. They also don’t know why they were targeted.

“We haven’t figured that out yet, we would love to,” he said. “It could be a matter of opportunity, I think.”

RELATED: What is Ransomware?

Officials stressed that they do not store private information that is not a public document in these systems, and that no social security numbers or other such sensitive information would be compromised.

“No private information has been taken, it’s not that type of attack,” Shaw added.

The Atlanta City digital systems were hijacked by a ransomware attack in 2018. Officials said this attack is much less serious than the one that affected the city. However, Cyber Security Expert Patrick Kelley said it is still a big deal.

“To me there’s a dramatic impact to this,”Kelley said.

Kelley is talking to some of the judges impacted by the hack, and they told him they can’t access any of their information. He also believes the judicial council likely doesn’t know the full scope of the attack.

Last year’s attack Atlanta wreaked havoc on city operations, including bringing down the municipal court system for three months. People weren’t able to pay traffic tickets online again until about six months after the attack.

In fact, Mayor Keisha Lance Bottoms testified before a congressional subcommittee on cybersecurity just last week. In all, the cost of recovery to the city from that attack – for which hackers demanded a $51,000 ransom in Bitcoin – has been $7.2 million, Bottoms said.

 

 

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

https://bdmanagedit.com/wp-content/uploads/favicon-96x96.png 96 96 Ashley Robison https://bdmanagedit.com/wp-content/uploads/logo_new-1.00.14-PM-300x61.png Ashley Robison2019-07-09 15:13:462019-07-30 09:35:27Ransomware Hits Georgia Court System

Pages

  • About Us
  • Backup And Continuity
  • Blog
  • Cloud Services
  • Email Protection
  • Endpoint Security
  • Get Started
  • Helpdesk
  • Home
  • Legal
  • Legal Archive
  • Levels
  • Multi-factor Authentication
  • Networking
  • Privacy Policy
  • Remote Monitoring
  • Security Awareness Training
  • Services
  • Solutions
  • VOIP Telephones

Categories

  • Featured
  • Uncategorized

Archive

  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019

Services

bd-Voice
bdSecur
bdBackup
bdSafeMail
bdAware
bdVerify

Solutions

Finance
Legal
Healthcare
Education
Construction
Government
Nonprofit
Engineering
Hospitality
Retail

Company

About Us
Contact Us
Blog

 

Location

288 S. Main St., STE 201
Madison, GA 30650
706-453-0402
706-707-8600 Fax

© bdManagedIT, all rights reserved. | Website by Madison Studios    
  • Facebook
  • Linkedin
  • Twitter
Scroll to top