Archive

Monthly Archives: January 2016

No two-factor authentication is like asking to be hacked?

I am a firm believer with using two-actor authentication (2FA) with important business apps but what happens when you don’t? When you adopt cloud services such as Salesforce or Office 365, is not using two-factor authentication tantamount to inviting hackers to have a go?

If the company you worked for wouldn’t properly protect their cloud-based apps, what would you do?

See my more recent post as well - 'Use Two-Factor Authentication for cloud applications or risk fines and data breaches' for more commentary.

Continue reading

Ransomware goes open source causing havoc and what you can do about it

Learn what you can do to tackle ransomware and protect your business from this threat.  A recent story about an open source ransomware kit illustrates the reach of malware.  Here I cover the 'Magic' crime kit and tips on how you can protect your business from this menance.

Ransomware is everywhere, not only hurting consumers but businesses are getting hit hard as well. In the UK according to a recent report, ransomware is responsible for 42% of UK security breaches in 2015. This isn't that surprising, businesses aren’t immune to these threats.

The level of sophistication with ransomware varies with CryptoWall, TeslaCrypt, some of the big hitters in the ‘business’.  Then you have more homemade solutions, reusing code or kits, from wherever they can be obtained.

Ransomware kit released for research purposes goes horrible wrong 

Utku Sen, a Turkish security researcher, released an open source ransomware kit, EDA2, on GitHub. He was hoping it would be “suitable for education and attack simulation for companies” and used for good.

However this wasn’t just a few lines of code, EDA2 came with actual code including instructions on how to customize it.  Also included was an admin panel to set up a command and control server (C&C).  This is where all the encryption keys were sent, making it a complete crime kit.

What was meant as an educational tool became known as ‘Magic’ ransomware.  This was used by criminals, infecting PCs and holding data for ransom. Ultimately Utku Sen withdraw EDA2, acknowledging it’s failure and apologising.  This wasn’t going to help the people with infected computers already.

EDA2 MAGIC Ransomware

The plot thickened when Utku Sen himself was blackmailed, if he withdrew his other ransomware education project, hidden-tear also on Github, the ransomware operator would provide the Magic encryption keys, so victims could get their data back for free

“After further discussions, the blackmail attempt turned into full-on negotiations, but Utku Sen and the ransomware operator have come to an agreement. Utku will take down the Hidden Tear repository in three days while the author of the Magic ransomware will provide all the encryption keys for free for the next 15 days.”

So a happy ending of sorts but one that illustrates the toxicity of this threat and how pernicious these attacks are.

How to combat ransomware in your business

If as a business you haven’t been attacked, well done.  More than likely though, most business will get hit sooner or later. As an IT Pro, there are certain steps you can take to help mitigate ransomware, which I have outlined below:

  • User education – inform your staff with tail-tale signs to look out for, with web drive by downloads and email attachments being the main distributors.​
  • Patch everything – ransomware can come in via Exploit Kits which will take advantage of any vulnerable software, think Java, Adobe Flash Player or Reader, as well as Office, Windows etc.
  • Remote access – don’t ignore remote workers! Anyone beyond the protection of the corporate network is at risk. Using cloud file syncing like OneDrive for Business is a risk.  For example, files can be encrypted from staff members infected home PC.  Then these get synched up the cloud, destroying work documents in the process (you can disable off domain syncing to avoid this threat).
  • Supplement security with tools like Microsoft Enhanced Mitigation Experience Toolkit (EMET).  Also keep an eye on emerging tools like Malwarebytes Anti-Ransomware along with any perimeter security that might help.
  • Early detection systems  - there are some systems that will help you detect as certain files types get written to file servers.   Picking up known extensions that could signify the start of a ransomware attack.  This would then send out an alert. This won't always help, for example when filenames and extensions are randomly used. File Server Resource Manager in Windows Server is one option for this.
  • Read those AV notifications and reports – There are clues even in the threats that are intercepted & removed that may reveal certain patterns like staff opening attachments they shouldn't be.
  • Backups - these are you last line of defence from ransomware, so ​they should be treated with the respect they deserve.  Tested, off-site, disconnected from your day to day systems.
  • Protect admin accounts - If one of your admin accounts is compromised, it could cause a lot more havoc, with all the rights the account has.  'Just in time administration' allows you to have the rights you need when you need them but not all the time.  Azure AD Privileged Identity Management is one option that can help with this.
  • Harden where executable content can run from - Software restriction policies can be used to make it harder for ransomware to launch.  See here this article for gudiance on this - How to protect from CryptoWall.

Ransomware is a menace and evolving rapidly, you can reduce the likelihood of the damage they can inflict on a business by following some of the steps I have outlined above.

Welcome to my site

Thanks for visiting my site, a big hello if you know me already and if you don't, I hope you stick around for a while. I thought I'd tell you a few things about me and my interests.  This will give you some ideas on what you can expect from my site.

I am IT Professional , working for upwards of 15-20 years (gulp!) with computing.  I work for a charity, with around 1300 staff and over a hundred offices around England and Scotland. 

Now is a good time to say, anything I express on this site is my own opinion and isn't affiliated with my employer or anyone else for that mater.

The Modern IT Blog with a difference?

My current professional interests, which I'll start to post about include, in no particular order:

  • Docker
  • Windows Server 2016
  • Microsoft Azure
  • WordPress
  • Office 365
  • Data protection
  • Microsoft Enterprise Mobility Suite​

I am writing from the perspective of an IT Pro for other IT Pros and decision makers, people making a difference with IT delivery. I'll draw upon my experience rather just writing up by the numbers articles. Hopefully, I don't come across too preachy!

This site is experimental, it's running on Docker in a series of containers, which is new technology for me, so I'll be trying out different things.  If the site is down, that is probably why.  The site is rather rough at the moment, I'll be making it a bit more joined up as I go along.  I might even create a Twitter account, where I can get better connected.

Hope you like my site, look out for new articles over the coming weeks. I have already posted my first article about ransomware, which you could check out in the meantime.​