Friday, May 2, 2008

[ISN] Counter-intelligence officers show how stupid they are


http://www.wbj.pl/?command=article&id=40583

Warsaw Business Journal
28th March 2008

Six officers of the SKW, the new military counter-intelligence service,
have uploaded photos of themselves while on a secret mission to
Afghanistan onto their personal accounts at nasza-klasa.pl, the popular
school reunion website.

Although they did not specify they worked for the SKW they made clear
that the photos were taken during a military mission in Afghanistan. The
pictures, which showed them sporting local robes as well as uniforms,
attracted appreciative comments from their former school mates. The
personal details of SKW officers are a closely guarded secret and are
not even known to many Polish soldiers stationed in Afghanistan. "By
doing such a thing, these people endangered themselves, the soldiers and
their families," said General Marek Dukaczewski, the last head of WSI,
SKW's predecessor, adding: "I cannot imagine a secret operation carried
out by people whose names and faces can be seen on the internet." "I
thought nothing could happen to heighten our sense of the chaos at the
SKW. I was wrong," commented Paweł Graś, the former secret services
minister. SKW was established in 2006. Antoni Macierewicz, its first
head, was criticized for hiring inexperienced people and dismissing
seasoned former WSE officers. (Gazeta Wyborcza, p. 4) R.M.



___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


Traditional Auction Companies Making the move to Online Sales

When Stiles Auction, LLC opened it's doors three years ago it didn't seem like internet sales were going to be a part of the business plan.

Mike McNabb and his partner Charles Mcnabb a father and son team, obtained their State of Wisconsin Auctioneers License, went on to auction school and opened their doors to the world. At first Charles an owner of an antiques store supplied all of the items for their bi-weekly auctions. Later friends and aquantances started bringing their items and things moved along smoothly but after the first couple of years their local following wasn't growing enough to keep up with the barage of items that kept pouring in.

Mike a long time internet marketer and publicist started building a website that would allow bids to come in from around the world. The website www.stilesauction.com is much like an ebay style website except all of the items are backed by one single company. “All of the items on our site are either owned or contracted directly by us”

Having someone to hold responsible for the items listed has been a part of the huge success of our online venture. Buyers feel more comfortable knowing they can return items if they aren't represented properly.

Stiles Auction, LLC specializes in art, antiques, complete estates and real estate auctions. Their website can be found at www.stilesauction.com or you can reach them by phone at 920 373 6171

Nilaam.pk - Pakistan’s #1 Auction Site

Atlanta, GA - Nilaam, a newly launched auction web site, is poised to bring the rich benefits of e-commerce to Pakistan's growing base of Internet users.

"Nilaam will make social commerce a reality in Pakistan," says Akber Mithani of Mithani Capital Partners, the U.S. private investment firm that is launching the web site. "We want to expand economic opportunities in Pakistan by fostering an emotionally satisfying experience for Pakistanis to explore, learn, shop, share and talk with each other."

Nilaam will be launched on April 15, 2008, at http://www.nilaam.pk, with the intention of transforming Pakistani shops and business owners into e-commerce enterprises and entrepreneurs. Nilaam will offer a wide selection of electronics, apparel, automobiles, real estate, gaming, jewelry, music, clothing, and other services.

Nilaam will offer its users many of the features of eBay, such as seller reviews, seller feedback, seller history, buy-now options, and bidding options. The web site will primarily reach out to individuals looking to dispose of goods they no longer want, and as well as small business owners. Shop owners or business owners in Lahore can now sell to buyers not just in close proximity but to anyone even as far away as Karachi or the United Arab Emirates.

"Pakistan has grown from 133,000 Internet users in 2000 to over 18 million today," says Mithani. "There are no Wal-Marts, No Home-Depots, No Remax’s, No Japanese car dealerships, But now there will be Nilaam, which will bring buying and selling to the consumer's desktop."

[ISN] Hacker gets prison for false 911 report


http://www.ocregister.com/articles/ellis-call-caller-2006151-calls-team

By ERIKA I. RITCHIE
The Orange County Register
March 26, 2008

A Washington state computer hacker – who misled police with a wild tale
of threats and a possible murder scenario – pleaded guilty Wednesday in
Orange County Superior Court.

Randal T. Ellis, 19, of Mulkiteo, Wash., was charged with computer
access fraud, false imprisonment by violence, falsely reporting a crime
and assault with a firearm.

Ellis was sentenced to three years in prison and ordered to pay $14,765
in restitution. Fourteen thousand dollars will go to the Orange County
Sheriff Department to cover the cost of the investigation, as well as
the SWAT team dispatched as a result of Ellis's actions. The remaining
amount is slated for the city of Mulkiteo, Wash. to cover the cost of
the search warrant for and arrest of Ellis.

Sheriff's Sgt. Mike McHenry, who credits Lead Investigator Brian Sims
for his diligent work in following the case, was pleased to hear that
Ellis pleaded guilty.

"There needs to be significant punishment," said McHenry. "There was
grave risk to the people involved and the deputies who responded. This
wasn't a simple prank call. It was elaborate, thought-out and scripted
to illicit significant armed response and endanger the lives of everyone
involved."

Almost a year ago on March 29, 2007, Ellis began his "swatting" call by
reporting a drug-overdose. The call came into the Orange County Fire
Authority at 11:30 p.m. The Sherriff's Department was asked to assist.

Ellis' hoax twisted and turned as patrol cars and fire department
paramedics rolled to the home of a Lake Forest couple and their two
toddlers.

The caller changed stories from reporting a drug overdose to talking
about shooting and killing his sister after she fired a shot at him.

With law enforcement fearing the worst, the Lake Forest home was
surrounded by patrol cars, the sheriff's Critical Incident Response
Team, SWAT team members as well as police dogs and helicopters.

The result ended up in a confrontation with the residents at gunpoint,
detainment and a search of the house.

Officers realized it was a hoax when they found no signs of anything the
caller had reported.

Ellis' plot was completed by using a service provider on the Internet.

"It didn't take a lot of technical hacking skills," said McHenry. "All
it required was knowledge of certain services that he used for the wrong
purpose. I hope this deters other people emulating Mr. Ellis. I would
hope they think twice before engaging in cyber terrorism."

McHenry said this hoax was one of almost 200 calls Ellis had made. While
investigators aren't sure all were swatting calls, three other calls
appeared similar.

Each of the three calls was lengthy and described similarly violent
scenarios.

Two calls – to Bullhead City, Ariz., and Milcreek Township, Pa., were
placed in 2005.

In the Arizona incident, a caller said he shot someone and had law
enforcement officers who came to investigate in the crosshairs of his
scope on his machine gun.

In this case, police detained three people until the call was determined
to be a hoax.

In Pennsylvania, the 911 caller claimed to have shot his sister, leading
officers to make a forced entry into an unoccupied home.

Authorities said Ellis made another call this year that targeted his
hometown – Mukilteo, Wash.

The caller claimed to have shot his family with an AK-47 and threatened
to shoot any officers who came to his address. He said he had a hostage
and demanded a getaway car. Police sent a SWAT team and hostage
negotiators



___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] RCMP computer security breached, documents reveal


http://www.canada.com/vancouversun/news/story.html?id=20ae6f79-876e-4bec-9a1f-e6b6ca111893

By Robert Koopmans
Kamloops Daily News
March 29, 2008

KAMLOOPS -- The security of RCMP computers used to process evidence for
a looming multimillion-dollar trial was breached from outside the
agency, exposing sensitive files to the possibility of theft and
tampering, Crown documents reveal.

The police computers were also used to view pornography and download
music and illegal software, a letter from senior Kamloops Crown
prosecutor Don Mann states.

The three-page letter, obtained by the Kamloops Daily News Thursday, was
provided to four men accused of being part of a national auto-theft ring
during a court hearing Wednesday.

The information in the letter relates to six computers that handled the
massive volumes of Project Eau evidence.

The computers, which stored and processed more than 250,000 pieces of
evidence, were exposed to viruses and the possibility of tampering after
an officer with the investigating unit hooked the computers to the
Internet, contrary to orders.

The Crown document reveals the computers were hooked to the Internet in
October 2003 and remained connected until May 2005, when Shaw notified
the RCMP that the police agency's computers were spamming e-mail to the
Internet. The breach was discovered and the connection to the Internet
shut down.

The Crown letter indicates one of the Project Eau investigating officers
connected the computers to the Internet, then used some of the machines
for a variety of personal purposes, including viewing pornography,
downloading music and video files, visiting a dating service and chat
sites and a modelling agency site. The officer also visited online
auction sites and a variety of other websites.

The name of the officer was not revealed.

The officer also downloaded various pieces of software, including
LimeWire and Free Proxy, Paint Shop Pro, an Internet chat program knows
as MIRC, the latest versions of Adobe software and WordPerfect. Some of
the downloaded software was pirated.

During the nearly 20 months that the computer bank was improperly
connected to the Internet, one of the six computers became infected by
at least four viruses.

One of the viruses was running a script that made it a part of what is
described in the letter as a "zombie network" used to distribute spam
e-mail unknown to the RCMP.

The nature of the spam e-mail or where it originated isn't known, but
spamming e-mail is widely considered an unethical or illegal activity.

Individuals often use spam to market or sell, among other things,
pornography and gambling sites and grey-market, or illegal, drugs.

A team of investigators from the RCMP's Integrated Technical Crime Unit
examined the computers after the RCMP was notified of the breach.

"A detailed examination of the infected computer revealed that three
known virus programs and one unknown virus program had been running ....
The viruses in question include the ability to open a backdoor whereby
the computer can be controlled for an intended purpose, which would
include the ability to view, copy, delete or change any file on the
infected computer," the Crown's letter to the accused men reveals.

The letter also states the examiners could not conclude that the files
on the computers were not compromised. The team was of the view,
however, the likelihood of files being affected was "extremely low."

Copyright The Vancouver Sun 2008


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Gone in 2 minutes: Mac gets hacked first in contest


http://www.infoworld.com/article/08/03/27/Gone-in-2-minutes-Mac-gets-hacked-first-in-contest_1.html

By Robert McMillan
IDG News Service
March 27, 2008

It may be the quickest $10,000 Charlie Miller ever earned.

He took the first of three laptop computers -- and a $10,000 cash prize
-- Thursday after breaking into a MacBook Air at the CanSecWest security
conference's PWN 2 OWN hacking contest.

Show organizers offered a Sony Vaio, Fujitsu U810, and the MacBook as
prizes, saying that they could be won by anybody at the show who could
find a way to hack into each of them and read the contents of a file on
the system using a previously undisclosed "0day" attack.

Nobody was able to hack into the systems on the first day of the contest
when contestants were only allowed to attack the computers over the
network, but on Thursday, the rules were relaxed so that attackers could
direct contest organizers using the computers to do things like visit
Web sites or open e-mail messages.

Miller, best known as one of the researchers who first hacked Apple's
iPhone last year, didn't take much time. Within 2 minutes, he directed
the contest's organizers to visit a Web site that contained his exploit
code, which then allowed him to seize control of the computer, as about
20 onlookers cheered him on.

He was the first contestant to attempt an attack on any of the systems.

Miller was quickly given a nondisclosure agreement to sign, and he's not
allowed to discuss particulars of his bug until the contest's sponsor,
TippingPoint, can notify the vendor.

Contest rules state that Miller could only take advantage of software
that was preinstalled on the Mac, so the flaw he exploited must have
been accessible by, or possibly inside, Apple's Safari browser.

Last year's contest winner, Dino Dai Zovi, exploited a vulnerability in
QuickTime to take home the prize.

Dai Zovi, who congratulated Miller after his hack, didn't participate in
this year's contest, saying it was time for someone else to win.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Identity breach affects hospital


http://www.whittierdailynews.com/news/ci_8710866

By Airan Scruby
Staff Writer
Whitter Daily News
03/26/2008

WHITTIER - About 5,000 past and current employees at Presbyterian
Intercommunity Hospital had their private information stolen, officials
said Wednesday.

The data included Social Security numbers, birth dates, full names and
other records stored on a desktop computer that was stolen from a
Fullerton data management group on Feb. 11.

In addition to the 5,000 employees, another 35,000 identities from 18
other companies were stored on the computer, officials said.

According to hospital Human Resources Vice President Lon Orey, the
employees will be given a one-year subscription to LifeLock, a group
which tracks the user's information and guards it from illegal use.

"We take the treatment of employee information very seriously," Orey
said, "and we will continue to do everything we can to protect them."

A letter informing employees that their information was in jeopardy was
dated March13, more than a month after the breach.

Spokeswoman Terri Starkman said the hospital would not comment about the
lapse between the theft and notification.

"I really don't have any further information other than that," Starkman
said.

Police arrested Todd Irvine of La Habra on March 7 after they tracked
the stolen computer to his house through an IP address. They found other
stolen computers and equipment, according to Fullerton police.

Sgt. Mike MacDonald said it was unlikely that the identities stored in
the computer were the target of the thief. The suspect probably just
wanted the electronics, he said.

Irvine, 43, was arraigned and remains in custody, MacDonald said.

Those affected either work or have worked for Presbyterian
Intercommunity Hospital and received health benefits through that
employer, Orey said.

Among those groups are the Los Angeles Department of Water and the
Modesto City School District, police said.

According to Orey, the sensitive information was given to Systematic
Automation, Inc., so that the company could relay information to health
insurance providers on behalf of employees. Orey said the hospital did
not ask for permission to give the information to Systematic Automation.

"It's just an automatic kind of thing," Orey said.

A Systematic Automation representative said the company immediately
notified its partners that were affected and were working with police.
The representative declined to give his name.

In an official statement, the hospital said that it "like any large
company, relies on the services of outside experts to perform various
functions on its behalf."

Orey said the incident has prompted a closer look at employee security.

Many affected by the breach have requested coverage through LifeLock to
last more than one year, and Orey said the hospital is considering
extending the benefits. He said the hospital may even give coverage to
all of its current 3,000 employees, just to be safe.

"There is a high probability," he said, "we're going to make this an
ongoing program for employees."


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] BLACK HAT - Analyst: Money will fuel mobile spying programs


http://www.pcworld.idg.com.au/index.php/id;1126249158

By Jeremy Kirk
IDG News Service
31/03/2008

Spying programs for mobile phones are likely to grow in sophistication
and stealth as the business around selling the tools grows, according to
a mobile analyst at the Black Hat conference on Friday.

Many of the spy programs on the market are powerful, but aren't very
sophisticated code, said Jarno Niemela, a senior antivirus researchers
for Finnish security vendor F-Secure, which makes security products for
PCs and mobile phones.

But there is increasing evidence that money from selling the tools will
create a stronger incentive for more accomplished programmers to get
into the game, which could make the programs harder to detect, Niemela
said.

Niemela said his prediction follows what has happened with the malware
writers in the PC market. Many hackers are now in the business of
selling easy-to-use tools to less technical hackers rather than hacking
into PCs themselves.

One of the latest tools on the market is Mobile SpySuite, which Niemela
believes is the first spy tool generator for mobiles. It sells for
US$12,500 and would let a hacker custom-build a spy tool aimed at
several models of Nokia phones, Niemela said.

The number of mobile spyware programs pales in comparison to the number
of such programs available for PCs. However, mobile spying programs are
harder to track, since security companies such as F-Secure don't see as
many samples circulating on the Internet as they do of malicious
software for PCs.

Anecdotal evidence has emerged that enterprises may be increasingly
encountering mobile spyware on their fleets of phones. The clues have
come from companies that are relatively cagey when talking about what
they have seen.

"There have been certain cases of corporate customers asking very
detailed questions about spy tools and not mentioning why they need the
information," Niemela said.

Some of the more well-known spy programs are Neo-cal land FlexiSpy.
Neo-call is capable of secretely forwarding SMS (Short Message Service)
text messages to another phone, transmitting a list of phone numbers
called, and logging keystrokes. FlexiSpy has a neat, Web-based interface
that shows details of call times, numbers and SMSes, and it can even use
a phone's GPS (Global Positioning System) receiver to pinpoint the
victim's location.

Hackers usually need to have access to the phone itself to install the
software. And OS manufacturers such as Symbian have enabled security
features such as application signing, which is intended to prevent rogue
programs from being installed on a phone.

Most rogue spying programs leave traces on the phone, and analysis tools
can be used to check a phone's processes and file system to see if
something is there that shouldn't be, Niemela said.

But there are ways that less technical users can get a hint they've been
hacked. One simple clue is if a colleague of the victim knows something
that they shouldn't, Niemela said.

Also, mobile spying programs have to transmit their data. If the spy
program sends data over GPRS (General Packet Radio Service), the network
operator will demand payment. "As long as it has to use a paid channel,
it can not escape the operator's bill," Niemela said.

Another way is to replace the phone's SIM card with one that allows for
real-time monitoring. SMSes can then be sent to the phone, which in many
countries are free to receive. If the monitoring reveals outgoing data
traffic after SMSes are received, the phone could be hacked. It's also
possible to check if the GPRS connection icon lights up after a message
is received, Niemela said.

Niemela offered some defenses against mobile spyware: Keep the OS up to
date, as manufacturers are usually working to counter new devious
software. The use of a mobile antivirus program is also prudent, he
said. People should also use password protection to block access if
someone gets a hold of the device.

Administrators can also regularly "flash" phones to wipe off malware, as
well as ensuring that phones only install signed applications.

And when the phone is out of a person's hands, another option is to put
the device in a tamper-proof container. But "for most people, this is
way too James Bond," Niemela said.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Laptops, weapons missing at DEA


http://washingtontimes.com/apps/pbcs.dll/article?AID=/20080329/NATION/670184430/1001

By Jerry Seper
The Washington Times
March 29, 2008

More than 90 weapons and 230 laptop computers belonging to the Drug
Enforcement Administration have turned up missing over the past five
years and, despite efforts by the agency to address weaknesses in
tracking the items, "significant deficiencies" remain, a report said
yesterday.

The lost and stolen weapons include pistols, rifles, shotguns and a
submachine gun, said a 105-page report by the Justice Department's
Office of Inspector General, which also noted that DEA officials could
not say how 198 of the 231 laptop computers came to be missing.

Inspector General Glenn A. Fine said the DEA was unable to provide
assurance that 226 of the 231 lost or stolen laptop computers did not
contain "sensitive or personally identifiable" information, adding that
few of the missing laptops were protected by encryption software.

"The DEA has made improvements to its internal controls over weapons and
laptop computers since our 2002 audit, such as conducting physical
inventories and reconciling these inventories to its financial system
records," Mr. Fine said. "However, we concluded that the DEA still
requires significant improvement in its overall controls on weapons and
laptops."

DEA spokesman Garrison K. Courtney said yesterday the agency has made
significant improvements in its rate of loss for laptops, adding that in
instances when weapons were lost or stolen, "appropriate disciplinary
actions" were taken. He noted that the IG's report said the DEA was
following the appropriate methodology in regard to the inventory of
weapons and laptops.

"DEA has recently implemented new interim policy regarding the detailed
reporting of lost, stolen and missing laptop computers by all DEA
personnel, as well as reporting potential losses of sensitive
information ... that may have been contained on lost and stolen
laptops," Mr. Courtney said.

Mr. Fine blamed "carelessness" by DEA agents as resulting in many of the
instances of lost or stolen weapons, saying some agents had failed to
follow policy regarding not leaving their weapons unattended or
temporarily stored. He said 64 percent of the stolen weapons were taken
from official government or privately owned vehicles.

According to the report, one weapon was stolen after the agent left it
on a boat loading dock, walked away and came back later to discover it
was gone; three weapons were stolen from the DEA's traveling road
museum; two others were taken by unknown moving company employees; one
was lost when an agent left it on the top of his car and drove off; and
another was lost after an agent said it might have "fallen into trash
basket at work."

Mr. Fine also said that while the DEA could not provide the
circumstances under which the vast majority of laptop computers turned
up missing, many of the documented computer losses could have been
avoided if employees were more careful and complied with DEA policies.
He said one laptop was left in a taxi and another was stolen from
checked luggage.

In its written response to the IG's report, the DEA disagreed with a
recommendation that all its laptop computers be encrypted, saying that
as of December 2007, DEA laptops that process sensitive information
already have full disk encryption but others . including those used to
support electronic surveillance, computer forensics, polygraph
examinations and other digital monitoring functions . are exempt from
the security requirements.

The DEA said the exemption was required because of problems discovered
during attempts to load mission-support applications on laptops
installed with encryption software. The agency said the software caused
video surveillance and control capabilities to be slowed down to a point
of inoperability.

"The majority of DEA's laptops are used as stand-alone computing
devices," Mr. Courtney said. "DEA's policy, prior to 2007, did not allow
sensitive data or classified information to be processed on stand-alone
laptops."

In his report, Mr. Fine said DEA employees were not internally reporting
lost or stolen weapons and laptops in a timely manner and the agency was
not informing the Justice Department of weapon and laptop losses. He
said the DEA was not ensuring that relevant information about the lost
weapons and laptops was being entered in the National Crime Information
Center (NCIC) database,.

"The DEA's failure to report losses and enter relevant information in
the NCIC database also reduces the DEA's chances of recovering this lost
property," he said.

Mr. Courtney said that in April 2007, the DEA implemented a new policy
regarding the loss or theft of firearms and that all reported incidents
are now being "reported accurately and entered into NCIC."


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] ITL Bulletin for March 2008


Forwarded from: Elizabeth Lennon <elizabeth.lennon (at) nist.gov>

ITL BULLETIN FOR MARCH 2008

HANDLING COMPUTER SECURITY INCIDENTS: NIST ISSUES
UPDATED GUIDELINES

Shirley Radack, Editor
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
U.S. Department of Commerce

Today, organizations that operate and manage information technology (IT)
systems are spending more time than ever before in responding to
security incidents. New incidents and threats that arise daily have the
potential to seriously damage and disrupt the security of the
organizationÂ's information and IT systems.

Security incidents are violations or threats of violation of the
organizationÂ's computer security policies, acceptable use policies, or
standard computer security practices. Organizations should consider
carefully their ability to handle these security incidents and threats
effectively when they plan, develop, and implement their IT security
programs.

Applying risk management procedures, organizations should identify and
assess the risks of security incidents and identify effective ways to
deal with them. The first approach is to prevent security incidents
whenever possible. But since not all incidents can be prevented,
organizations should take steps to establish an incident response
capability for rapidly detecting incidents, minimizing loss and
destruction, identifying any weaknesses in their systems that may have
been exploited, and restoring IT services. This is a complex
undertaking, requiring considerable planning and the commitment of
resources to carry out the plans.

Intrusion detection and prevention systems (IDPSs) and other mechanisms
can be used to monitor threats. Clear procedures are needed to assess
the current and potential impact of incidents and to implement effective
methods for collecting, analyzing, and reporting data. Specific
communication channels should be established with internal groups, such
as human resources and legal staffs, and with external groups, such as
law enforcement, the media, and other incident response teams.

Security Threats to IT Systems

The many security-related threats that organizations must address
include:

- Denial of Service (DoS)­an attack that prevents or impairs the
authorized use of networks, systems, or applications by exhausting
resources.

- Malicious Code­a virus, worm, Trojan horse, or other code-based
malicious entity that successfully infects a host.

- Unauthorized Access­a person gains logical or physical access without
permission to a network, system, application, data, or other IT
resource.

- Inappropriate Usage­a person violates acceptable use of any network
or computer policies.

- Multiple Component­a single incident that encompasses two or more
incidents; for example, a malicious code infection leads to
unauthorized access to a host, which is then used to gain unauthorized
access to additional hosts.

Updated Guide on Handling Security Incidents

NISTÂ's Information Technology Laboratory recently issued NIST Special
Publication (SP) 800-61 Revision 1, Computer Security Incident Handling
Guide: Recommendations of the National Institute of Standards and
Technology. Written by Karen Scarfone and Tim Grance of NIST and by
Kelly Masone of Booz Allen Hamilton, NIST SP 800-61 Revision 1 provides
practical guidance to help organizations establish an effective incident
response program, analyze and respond to information security incidents,
and reduce the risks of future incidents. The recommendations in the
guide are useful for those organizations that are just setting up their
incident handling teams, as well as those that have already done so.

The updated guide, which replaces NIST SP 800-61, Computer Security
Incident Handling Guide, focuses primarily on the procedures and
solutions for detecting, analyzing, prioritizing, and handling
incidents. The guidelines and recommended solutions can be used on many
different hardware platforms, operating systems, protocols, or
applications and can be tailored to meet the specific security and
mission requirements of different organizations.

NIST SP 800-61 Revision 1 provides in-depth information on the need for
incident response capabilities. It covers the structures of incident
response teams and discusses the other groups within an organization
that might participate in incident handling activities. The basic steps
of handling incidents effectively, including incident detection,
analysis, containment, eradication, and recovery, are presented.
Separate sections in the guide provide specific recommendations for
handling the five types of incidents: denial of service (DoS), malicious
code, unauthorized access, inappropriate usage, and multiple component
incidents. All of these incidents are defined, and examples of each are
given. The preparation, detection, analysis, containment, eradication,
and recovery steps for each type of incident are detailed. Checklists
for handling each of the five types of incidents are included.

The appendices bring together useful information sources that assist
organizations in their incident handling programs. Included are a
consolidated list of the recommendations that are discussed in the
guide, incident response scenarios, and questions for use in incident
response exercises. Also provided are suggested items of information to
be collected about each incident, a glossary, an acronym list, lists of
in-print resources, online tools, and other resources that help
organizations in planning and performing incident response activities.
In addition, the appendices present frequently asked questions about
incident response activities and the steps to be followed in incident
handling. The final section of the appendices contains incident
reporting guidelines for federal agencies from the United States
Computer Emergency Readiness Team (US-CERT) in the Department of
Homeland Security.

This ITL bulletin summarizes the updated guide, which is available at:

http://csrc.nist.gov/publications/PubsSPs.html.

Basics of Incident Handling

Organizations face major decisions and actions when they develop their
computer security incident response capabilities (CSIRC). One of the
first considerations should be to create an organization-specific
definition of the term Â"incidentÂ" so that the scope of the term is
clear. The organization should decide what services the incident
response team should provide, consider which team structures and models
can provide those services, and select and implement one or more
incident response teams. An incident response plan, and associated
policies and procedures, should be developed when a team is established
so that the incident response process is performed effectively,
efficiently, and consistently. The plan, policies, and procedures should
identify the teamÂ's interactions with other teams within the
organization as well as with external parties.

The incident response process is composed of several phases. The initial
phase involves establishing and training an incident response team, and
acquiring the necessary tools and resources to enable the team to carry
out its responsibilities. During this preparation activity, the
organization also attempts to limit the number of incidents that will
occur by selecting and implementing a set of controls based on the
results of risk assessments. However, residual risk will inevitably
persist after controls are implemented, and no control is foolproof.

The next phase is detection and analysis of security breaches, which
alerts the organization whenever incidents occur. A
containment/eradication/recovery phase follows. Depending upon the
severity of the incident, the organization can act to mitigate the
impact of the incident by containing it and ultimately recovering from
it. After the incident is adequately handled, the organization issues a
report that details the cause and cost of the incident and the steps the
organization should take to prevent future incidents. This last phase is
post-incident activity.

The organizationÂ's incident response team should be available for
contact by anyone who discovers or suspects that an incident involving
the organization has occurred. One or more team members, depending on
the magnitude of the incident and availability of personnel, should
handle the incident. The incident handlers analyze the incident data,
determine the impact of the incident, and act appropriately to limit the
damage to the organization and restore normal services. Although the
incident response team may have only a few members, the teamÂ's success
depends on the participation and cooperation of individuals throughout
the organization.

NIST Recommendations for Handling Security Incidents

NIST advises that organizations implement the following recommendations
in planning and developing their incident response capabilities:

Establish and operate a formal incident response capability.

Federal agencies and departments are specifically directed to establish
incident response capabilities under the Federal Information Security
Management Act (FISMA) of 2002. Federal organizations are required to
develop and implement procedures for detecting, reporting, and
responding to security incidents. Federal civilian agencies are
responsible for designating a primary and secondary point of contact
(POC) to report all incidents to the United States Computer Emergency
Readiness Team (US-CERT) and for documenting corrective actions that
have been taken and their impact. Each agency is responsible for
determining specific ways in which these requirements are to be met.

Also, policy guidance issued by the Office of Management and Budget
(OMB) requires that agencies have a capability to provide help to users
when security incidents occur in their systems and to share information
concerning common vulnerabilities and threats (OMB Circular No. A-130,
Appendix III). OMB Memorandum M-07-16, Safeguarding Against and
Responding to the Breach of Personally Identifiable Information,
provides guidance on reporting security incidents that involve
personally identifiable information.

Federal Information Processing Standard (FIPS) 200, Minimum Security
Requirements for Federal Information and Information Systems, specifies
minimum security requirements for federal information and information
systems, including incident response. The specific requirements for the
implementation of security controls are defined in NIST SP 800-53,
Recommended Security Controls for Federal Information Systems.

Organizations should take the following steps in establishing an
incident response capability:

- Create an incident response policy and plan;

- Develop procedures for performing incident handling and reporting,
based on the incident response policy;

- Set guidelines for communicating with outside parties regarding
incidents.

- Select a team structure and staffing model;

- Establish relationships between the incident response team and other
groups, both internal to and external to the organization;

- Determine the services that the incident response team should provide;
and

- Staff the incident response team and provide staff members with
appropriate training.

Reduce the frequency of incidents by effectively securing networks,
systems, and applications.

It is less costly and more effective to prevent incidents than to try to
fix the problems that occur when security controls are inadequate. Many
security incidents can overwhelm the resources and capacity of the
organization to respond, and can result in delayed or incomplete
recovery. Extensive damage may occur, and systems and information may
not be available for long periods. When the security of networks,
systems, and applications is effectively protected and maintained, the
incident response team can focus on handling serious problems.

Document the organizationÂ's guidelines for interactions with other
organizations regarding incidents.

Clear procedures should be established to guide incident handling team
members who may need to communicate with outside parties, including
other incident response teams, law enforcement, the media, vendors, and
external victims. These communications often must occur quickly, and
guidelines are needed so that only the appropriate information is shared
with the right parties. The inappropriate release of sensitive
information can lead to greater disruption and financial loss than the
incident itself. Creating and maintaining a list of internal and
external POCs, along with backups for each contact, can help
organizations to make the communications among the involved parties
easier and faster.

Emphasize the importance of incident detection and analysis throughout
the organization.

Organizations might experience thousands or millions of possible
indications of security incidents each day. These incidents are recorded
mainly by logging and computer security software. Centralized logging
and event correlation software can be effective in automating the
initial analysis of the voluminous data that is collected and in
selecting the events of interest that require human review. To assure
the quality of the data collected, organizations should establish
logging standards and procedures that facilitate the collection of
adequate information by logs and security software. This data should be
reviewed regularly by the appropriate staff members.

Develop written guidelines for prioritizing incidents.

Prioritizing the handling of individual incidents is a critical decision
point in the incident response process. Incidents should be prioritized
based on the following:

- Criticality of the affected resources and data, such as whether a
public Web server or a user workstation is affected; and

- Current and potential technical effect of the incident, such as
root compromise or destruction of data.

Combining the criticality of the affected resources and the current and
potential technical effect of the incident determines the impact of the
incident to the organization. For example, data destruction on a user
workstation might result in a minor loss of productivity; however, root
compromise of a public Web server might result in a major loss of
revenue, productivity, access to services, and reputation, as well as
the release of sensitive data. The latter breach could result in the
release of credit card numbers, Social Security numbers, and other forms
of personally identifiable information. Since incident handlers may be
under great stress during incidents, it is important to make the
prioritization process clear. Organizations should decide how the
incident response team should react under various circumstances and then
create a Service-Level Agreement (SLA) that documents the appropriate
actions and maximum response times. This documentation is particularly
valuable for organizations that outsource components of their incident
response programs. Documenting the guidelines should facilitate faster
and more consistent decision making.

Review the lessons learned from security incidents to improve the
organizationÂ's security incident handling processes.

After a major incident has been handled, the organization should hold a
meeting to review the lessons learned from the incident and the
effectiveness of the incident handling process. Then it is possible to
identify necessary improvements to existing security controls and
practices. Meetings to review lessons learned should also be held
periodically for lesser incidents. The information accumulated from all
of the meetings to review the lessons learned should be used to identify
systemic security weaknesses and deficiencies in policies and
procedures. Follow-up reports generated for each resolved incident can
be important not only for evidentiary purposes but also for reference in
handling future incidents and in training new members of the incident
response team. An incident database, with detailed information on each
incident that occurs, can be another valuable source of information for
incident handlers.

Seek to maintain situational awareness during large-scale incidents.

Organizations often are challenged to maintain situational awareness for
handling of large-scale incidents because these incidents are very
complex. Many people within the organization may play a role in the
incident response, and the organization may need to communicate rapidly
and efficiently with various external groups. Collecting, organizing,
and analyzing all the pieces of information, so that the right decisions
can be made and executed, are not easy tasks. The key to maintaining
situational awareness is to prepare to handle large-scale incidents by:

- Establishing, documenting, maintaining, and exercising on-hours
and off-hours contact and notification mechanisms for various
individuals and groups within the organization, such as the chief
information officer (CIO), head of information security, IT
support staff, and business continuity planning staff. Mechanisms
are also needed for contacts outside the organization, such as
US-CERT, incident response organizations, and counterparts at
other organizations;

- Planning and documenting guidelines for the prioritization of
incident response actions based on business impact;

- Preparing one or more individuals to act as security incident
leads with responsibility for gathering information from the
incident handlers and other parties, and distributing relevant
information to the parties that need it; and

- Practicing the handling of large-scale incidents through exercises
and simulations on a regular basis. Since these incidents happen
rarely, incident response teams often lack experience in handling
them effectively.

More Information

See Appendix J of SP 800-61 Revision 1 for information about federal
incident reporting guidelines, including definitions and reporting time
frames. The US-CERT Web page can be found at:

http://www.us-cert.gov/federal/reportingRequirements.html.

OMB directives and guidelines are available at:

http://www.whitehouse.gov/omb/.

NIST publications assist organizations in planning and implementing a
comprehensive approach to information security. See NISTÂ's Web page for
information about NIST standards and guidelines that are referenced in
the Computer Security Incident Handling Guide and other security-related
publications, covering related topics, such as security planning, risk
management procedures, security controls, intrusion detection systems,
and firewalls. http://csrc.nist.gov/publications/index.html


Disclaimer
Any mention of commercial products or reference to commercial
organizations is for information only; it does not imply recommendation
or endorsement by NIST nor does it imply that the products mentioned are
necessarily the best available for the purpose.



Elizabeth B. Lennon
Writer/Editor
Information Technology Laboratory
National Institute of Standards and Technology
100 Bureau Drive, Stop 8900
Gaithersburg, MD 20899-8900
Telephone (301) 975-2832
Fax (301) 975-2378



___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] GPO: Article 'misstated' facts of offshoring e-passport production


http://www.govexec.com/story_page.cfm?articleid=39630

By Jill R. Aitoro
Govexec.com
March 27, 2008

A recent media report that said the Government Printing Office put
national security at risk by relying on foreign companies to process the
latest U.S. biometric passports "mischaracterized and misstated the
facts significantly," according to GPO's inspector general.

On March 26, The Washington Times posted on its Web site an article that
questioned whether GPO had placed " cost savings ... ahead of national
security" because the agency outsourced some e-passport production
processes to overseas companies. The article referred to an "internal
Oct. 12 report" from the GPO inspector general's office, saying the
report noted "significant deficiencies with the manufacturing of blank
passports, security of components and the internal control for the
process."

"No internal or external October [2007] report exists," said GPO
Inspector General J. Anthony Ogden. He said that the quote about
"significant deficiencies" was from a March 31, 2005, GPO inspector
general report that outlined concerns with legacy operations used to
process passports.

"All of those security concerns, which predate the electronic passports,
were addressed at the time they were brought to the agency's attention
[and] will be closed out with this reporting period," Ogden said. "The
agency has continued to cooperate with our office and has asked for our
assistance in oversight because we both take the passport operations
seriously. The Washington Times article frankly has mischaracterized and
misstated the facts significantly."

In response to Ogden's claims, Bill Gertz, the Washington Times defense
and national security reporter who wrote the article, said, "I stand by
my reporting."

Gertz added that the Oct. 12 internal report is available online. A
search using the entire "significant deficiencies" quote pointed to the
March 31, 2005, semiannual report to Congress that Ogden referred to.
The search results also included the inspector general's "Semiannual
Report to Congress," dated April 1, 2007, to Sept. 30, 2007, in which
the quote appears under a heading referring to the 2005 report and
restates the security shortcomings. In that section, the inspector
general concluded, "GPO management provided documentation during this
reporting period that closed two of the four open recommendations.
Management is working on implementing corrective actions for the
remaining two open recommendations."

In response to the Times article, GPO released on March 26 a document
about work processes it used to produce passports. According to the
document, and reiterated by GPO spokesman Gary Somerset, the agency
manufactures passports at its facilities in Washington. The agency will
soon produce passports at a second secure facility it is constructing in
Mississippi.

Production of the electronic chip, which is embedded in the cover and
contains the same information printed on the passport, was outsourced to
two overseas companies, Amsterdam-based Gemalto and Infineon, based in
Neubiberg, Germany. No American company meets the standards developed by
the International Civil Aviation Organization and required by the State
Department for border crossing procedures that involve the computer
chip, according to GPO.

The ICAO standards for electronic passports are extensive, including
requirements for "a machine-readable zone," in which a computer can read
the data on the chip; one for advanced digital signature protection and
an integrated circuit chip that stores data. ICAO requires technologies
for data storage to be non-proprietary, maintain document integrity,
allow for easy access to the stored data, support quick transmission
times and provide 20 kilobytes or more of storage on a chip. GPO did not
specify which ICAO requirements American companies failed to meet.

Raising concern, however, are the Asian locations used for chip
production. While GPO did not provide details, Somerset noted a CNN
broadcast that aired on Wednesday, which noted that chips from Gemalto
and Infineon are made in Singapore and Taipei, then shipped to Thailand,
where a wireless antenna is inserted by SmartTrac, a Dutch-based
company. All the components are shipped back to United States, where
data and photos are attached and downloaded onto the chips.

According to the GPO document, SmartTrac intends to move its production
plant to the United States in the near future.

"The passports are not manufactured overseas," Somerset said. "A
component with the chip and inlay [of the antenna] comes from various
places overseas, but manufacturing is done in Washington and soon-to-be
Mississippi."

He noted that vendors were fully vetted with inspections of facilities
and employee background checks, and that all passport components are
moved via secure transportation, including armored vehicles.

The GPO inspector general said the agency is following other procedures
to increase security. The agency plans to deploy an inventory tracking
system, which will authenticate chips embedded in passports when
delivered to GPO, according to the agency's October 2007 Work Plan. The
system will be integrated with GPO's network, enabling communication
with chip manufacturers and the State Department for coordinated
production and tracking of passports, according to the plan. As part of
the effort, the Office of the Inspector General will assess the
performance of controls provided through the system, including chip
inventory and unusable passport books.

Ray Bjorklund, senior vice president and chief knowledge officer for
McLean, Va.-based consulting firm FedSources, said offshoring is
inevitable in a global economy, and issues of security are far more
complicated than geography.

"You may have brilliant software developers in a less-than-favorable
nation who are so concerned about their personal integrity to create
elegant code that you end up with a beautiful set of software," he said.
"Then you may have nations that have been our friends for centuries with
rogue software programmers."

Bjorklund said a large enterprise software company headquartered in the
United States, which he declined to identify, writes the majority of its
code overseas, and another headquartered overseas that writes most of
its code in the United States. Both sell to the federal government.

"There's no black-and-white answer," he said. "It's the degree to which
the customer -- the federal government -- is willing to take on a
certain level of risk in the context of what that product or system is
supposed to do."

Members of Congress are looking into the issue, including House Homeland
Security Committee Chairman Bennie Thompson, D-Miss., and Energy and
Commerce Committee Chairman John Dingell, D-Mich., who stated in a
letter to the GPO inspector general that processes could pose "a
significant national security threat and raises questions about the
integrity of the entire e-passport program."

Congress has yet to ask the Government Accountability Office to
investigate the issue. Unless a specific vulnerability is detected, Jess
Ford, GAO director of international affairs and trade, doesn't expect
that to change.

"My understanding is that lots of chips used not only for passports but
other forms of identification are manufactured overseas," he said.
"Besides, I'm not sure if someone even got hold of the chip, how they
would use them. There's a lot of security that happens here in the
United States."


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] NIST unveils tool to foil attacks via DNS


http://www.gcn.com/online/vol1_no1/46004-1.html

By Dan Campbell
Special to GCN
GCN.com
03/25/08

Network researchers at the National Institute of Standards and
Technology (NIST) have unveiled a method that federal systems
administrators can use to protect their systems from increasingly
complex attacks launched via the Domain Name System (DNS) of the
Internet and private IP networks.

DNS has long been a critical function of the Internet and private IP
networks, but one that tended to operate somewhat incognito. That may be
changing as more complex network attacks targeted at DNS emerge.

In a recently published paper, authors Scott Rose and Anastase Nakassis,
writing under the auspices of NIST and the Homeland Security
Department's Science and Technology Directorate, contend that DNS
security extensions (DNSSEC) originally intended to protect DNS zone
data contain an unintended side effect that facilitates an attack
precursor called zone enumeration.

Attackers use DNSSEC responses to determine the Resource Records (RR) in
a DNS zone, and then launch attacks more quickly against specific hosts
in the zone. The attack potential gets worse when DNS host names give
hints to the content, application or operating system, and consequently
the vulnerabilities, that reside on the hosts. Rose and Nakassis added
that the security or privacy concerns of intercepting information in
newer DNS RRs go beyond an attacker simply identifying the host IP
address and name.

The authors state that zone enumeration is possible without the help of
DNSSEC. They cautioned that such traditional methods often become
impractical because they rely on time-consuming or processor-intensive
brute force techniques often thwarted by intrusion detection systems.

The authors also describe several techniques that allow networks to reap
the intended authentication and integrity benefits of DNSSEC while
reducing DNS information leakage. These techniques are important
because, as DNS becomes more and more vital to network operation, the
need to protect it with techniques offered by DNSSEC increases.

As federal agencies continue to deploy IPv6 technology, DNS will move
from its current critical-but-inconspicuous status to the forefront, the
NIST analysts said. The spread of IPv6 will generate a demand for
network protection methods that are as secure as they are robust. The
enormous IPv6 address size makes memorization impractical and
address-to-hostname mapping vital, Internet specialists agree. Address
subnet scanning becomes all but impossible in the IPv6 environment. As a
result, DNS zone data becomes much more desirable to intercept and
decipher as a prelude to launching an attack.

The techniques described by the NIST scientists likely hold forth the
promise of improving DNSSEC authentication and integrity protection, so
as to shield DNS zones and foil attempts to compromise data.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


Re: [ISN] What spooks Microsoft's chief security advisor


Forwarded from: security curmudgeon <jericho (at) attrition.org>

: http://www.networkworld.com/news/2008/032608-microsoft-security-concerns.html
:
: By Bob Brown

[..]

: Speaking at the Boston SecureWorld conference Wednesday, the 19-year
: Microsoft veteran whose job includes protecting enterprises,
: developers and Microsoft itself said there actually is plenty of good
: news on the security front. For example, his outfit scans a half
: million devices (with customer permission) per month and in the first
: half of last year saw the first period-over-period decline in new
: vulnerabilities disclosed across Microsoft and non-Microsoft software
: since 2003.
:
: However, 3,400 new vulnerabilities were discovered and "it's still a
: big number," Arsenault says. .So if vulnerability rates are down,
: where are they?.

Oh where to begin..

The drop in vulnerabilities disclosed in 2007 seems to be a 'fact' that
many journalists and some industry denizens latched on to at some point
over the last few months. As with many statistics/metrics, once boiled
down to a soundbyte they lose a lot of the caveats, disclaimers and
warnings.

The number '3400' likely comes from CVE/NVD which is a specialized
vulnerability database (VDB) designed to assign a tracking number and
standard naming scheme to vulnerabilities. In doing so, CVE will merge
multiple vulnerabilities into a single entry if the vulnerability is
essentially the same (10 scripts all vulnerable to RFI) or if there is
no actionable information due to a vague disclosure (10 Oracle vulns).
Even though one CVE may have as many as 80 or more distinct
vulnerabilities, they get counted as *1* vulnerability by many people
using CVE as their source for vulnerability disclosure metrics.

What happens when you take the 3,400 from CVE and expand it to account
for the above, and then throw in vulnerabilities that they did not
catalog due to a lack of resources? At least 8,252 in 2007 that I know
of. Yes, that is 'down' from the previous year (10,553) but still
doesn't consider changes in the vulnerability disclosure world. The
value of working 0-day has gone up and the incentive to disclose is
going down. In addition to financial value of such information, the
threat of lawsuit from vendors, the trends in disclosure (it's no longer
"RFI year") and the resources assigned to track all of this, there are a
lot more factors that must be considered before throwing such numbers
out. To do so is irresponsible and misleading at best.

Next, Arsenault slips up even worse by saying "3,400 new vulnerabilities
were DISCOVERED" which is just blatantly false. We know vulnerabilities
are discovered and not disclosed. Sometimes they are used for the
dreaded "0-day", sometimes they are quietly fixed by the vendor. Either
way, the number of vulnerabilities in any VDB is not a reflection on
what was discovered, just what was disclosed in specific forums.

: One trend that pops out is that attackers are increasingly laying off
: operating systems and exploiting applications instead. One reason for
: this, Arsenault says, is that vendors like Microsoft, Apple and RedHat
: have done a good job in recent years securing the IP stack and
: operating system.

Or one may argue that increasingly, these operating systems and TCP/IP
stacks sit behind cheap routers provided with broadband access. You can
no longer remotely pop a Windows box as easy as you could years ago
simply because you can't pass traffic directly to it.

Since the applications are originating the connection outbound, the
router is happily passing traffic back to it per the user's request. The
exploit vector is much more likely to work. Even better, that fancy
browser based bug may be cross-platform!

: "This is not a problem that people should be thinking is just an
: Office problem," he said. "It's anybody who uses file formats that are
: not XML based going forward." Adobe, Corel and Google are among others
: facing similar challenges, Arsenault said.

Uh, is Arsenault implying that using XML is somehow safe from file
handling vulnerabilities?

Apple Mac OS X Foundation NSXML XML File Handling Arbitrary Code
Execution - http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0059

Opera XML Document Handling Crafted Attribute Sanitization Filter Bypass
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-1082

Mozilla Multiple Products XML Document XMLDocument.cloneNode() Function
Arbitrary Script Code Execution
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0415

: On a positive note, Microsoft is seeing the amount of publicly
: exploitable code, at least for its own software, shrink. But Arsenault
: does sweat over whether there.s really less exploitable code, or
: whether it.s more a case of such code just being kept secret by nation
: states looking to wage cyberwar.

See above. There is a serious financial value to working exploit code
for such vulnerabilities. Even the most public pay-for-vuln shops like
iDefense and TippingPoint/ZDI will pay *tens of thousands of dollars*
for Microsoft Windows exploit code.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Portals Withhold Leak Info From Members


http://english.chosun.com/w21data/html/news/200803/200803270021.html

March 27,2008

Hacker attacks on Korean Internet giants Daum and Auction have comprised
the personal information of large numbers of website members, yet the
companies have neglected to inform their members of the leaks. The
companies, each boasting tens of millions of members, are now under fire
for having failed to control the damage.

In the wake of an attack by hackers on its computer security system in
late September last year, Daum (www.daum.net), Korea's second-largest
portal with about 38 million members, found that large amounts of its
members' personal information had been leaked, it emerged on Wednesday.

Six months later Daum has still not informed its members of the attack.
The details of the attack were confirmed recently by the Seoul
Metropolitan Police Agency during an investigation of hacker attacks.

Meanwhile, Korea's largest online shopping mall Auction
(www.auction.co.kr) with around 18 million members, was attacked by
Chinese hackers on Feb. 4. That attack resulted in the leak of millions
of files of members' personal information. Auction faced harsh criticism
from its members for having concealed the attack for more than 20 hours.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Facebook security lapse allows Paris Hilton pictures to be leaked


http://technology.timesonline.co.uk/tol/news/tech_and_web/article3617360.ece

By Jonathan Richards
Times Online
March 25, 2008

A security lapse on Facebook has allowed its users to gain access to
vast libraries of private photographs, including one of Paris Hilton
drinking beer with her friends.

A Canadian hacker exploited a recent upgrade to the networking site's
privacy settings to view pictures that were intended to be private,
including some of Paris Hilton partying with her brother, Barron
Nicholas, at the recent Emmy awards.

Facebook was told about the problem yesterday afternoon, and said it had
since fixed the bug.

Byron Ng, a computer technician from Vancouver, began looking for flaws
in the site's security after an upgrade last week purportedly gave
Facebook's 40 million users greater control over the way they shared
material such as photographs with their friends.

Mr Ng found that he was able to pull up recent pictures posted by
Facebook users, even if the owners intended them only to be seen by a
select group of friends.

In a subsequent test, the Associated Press reported [1] that it was able
to access several private albums, including one posted by Mark
Zuckerberg, Facebook's founder, in November 2005.

The breach comes on the same day that children's charities urged
ministers to ban companies from trawling websites such as Facebook to
gain access about potential employees, in a process known as "digital
dirt-digging".

Record numbers of people are posting intimate details about their lives
online, despite warnings from privacy campaigners that photographs are
extremely difficult to erase once uploaded to the internet.

The Information Commissioner's Office recently reiterated its warning
[2] about the risk of posting details on social networking sites after a
study found that the amount of information stored about us on the web
will grow by a factor of ten between now and 2011.

In a statement acknowledging the security flaw, a Facebook spokesman
said: "We take privacy very seriously and continue to make enhancements
to the site.

In June last year, Facebook was forced [3] to update its privacy
settings after it was revealed that certain information about users -
such as their sexual preference and religious beliefs - could be
ascertained by searching the site.

[1] http://ap.google.com/article/ALeqM5ijANq3fmx9AZNNrf7Q1PwCN1cKUAD8VK51UG1
[2] http://technology.timesonline.co.uk/tol/news/tech_and_web/article3529108.ece
[3] http://technology.timesonline.co.uk/tol/news/tech_and_web/article2005618.ece


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Advanced tactic targeted grocer


http://www.boston.com/news/local/articles/2008/03/28/advanced_tactic_targeted_grocer/

By Ross Kerber
Globe Staff
The Boston Globe
March 28, 2008

A massive data breach at Hannaford Brothers Cos. was caused by a "new
and sophisticated" method in which software was secretly installed on
servers at every one of its grocery stores, the company told
Massachusetts regulators this week. more stories like this

The unauthorized intrusion the company disclosed on March 17 stemmed
from software that intercepted card data from customers as they paid
with plastic at store checkout counters, and sent the data overseas,
Hannaford's top lawyer said in a letter sent to Attorney General Martha
Coakley and Governor Deval Patrick's Office of Consumer Affairs and
Business Regulation.

The software was installed on computer servers at each of the roughly
300 stores operated by Hannaford and its partners. Hannaford did not say
how the software might have been placed on so many servers, and company
spokeswoman Carol Eleazer said the company continues to investigate how
the software was installed and other specifics of the breach. The Secret
Service, which pursues currency crimes, is conducting its own
investigation.

Data security specialists say the new details show how hackers have
grown more adept at penetrating weak links in the systems that connect
merchants and banks. In previous breaches, such as the record-setting
intrusion at TJX Cos. of Framingham, where as many as 100 million card
numbers were compromised, hackers took advantage of merchants who stored
customer names and card data - sometimes in violation of payment
industry standards - at central locations in their computer networks.

In contrast, Hannaford says it did not store customer information. The
hackers who struck Hannaford mined a stream of data that the merchant
and banks were not responsible for protecting under industry rules,
industry specialists said.

The Hannaford breach "was markedly more sophisticated," said Steve
Rowen, a partner at Retail Systems Research of Miami, which does
consulting work for merchants.

The Hannaford breach also poses worrisome questions for the payment
industry as it struggles to tighten security. Hannaford, for example,
had met compliance standards set by Visa Inc. and other card companies,
but that did not stop the breach.

"Just because they are compliant, it doesn't mean they are safe," said
Graham Cluley, technology consultant for Sophos Inc., a Burlington
computer security firm. Card issuers and others need to find other ways
to improve security, he added.

"Clearly, consumer confidence is being shaken by this constant stream of
breaches," Cluley said.

Hannaford said in the letter that the problem potentially compromised
the account numbers and expiration dates on all 4.2 million credit and
debit card numbers used at its stores in six states between Dec. 7 and
March 10, though the actual number taken may be smaller. Hannaford said
it knows of about 2,000 cases of fraud related to the intrusion.

Hannaford's letter was sent by its general counsel, Emily D. Dickinson.
more stories like this

Dickinson wrote that an "illicit and unauthorized computer program"
known as "malware" was installed on the servers of each of the stores
the company operates in Maine, Vermont, New Hampshire, Massachusetts,
and New York, plus at stores elsewhere, including the Sweetbay chain in
Florida, that use its payment systems. Hannaford and Sweetbay are owned
by Belgium's Delhaize Group.

The malware intercepted the "track 2" data stored on the magnetic stripe
of payment cards as customers used them at the checkout counter,
Dickinson wrote. This track includes the card's number and expiration
date, but not the customer's name.

The data were taken "in transit for authorization from the point of
sale," the letter states, meaning as it was transmitted from the cash
register to one of the institutions that Hannaford uses to process
transactions. Eleazer said these include major card networks and First
Data Corp. of Denver, a major processor.

The malware on the store servers stored up records of these purchases in
batches, then transmitted them to an unnamed offshore Internet service
provider, the letter states. Foreign crime rings have been blamed in a
number of other payment card fraud cases.

"Law enforcement officials and others report that the method of illicit
acquisition is a new and sophisticated method in that it obtains data in
transit during the course of the authorization process," the letter
states.

Cluley said the software could have been installed remotely. This could
have been accomplished through a breach of the company's firewall.
Alternatively, the servers may not have been running the latest security
patches, or may have had antivirus programs that weren't updated.
Hannaford stated in the letter that it has replaced the hardware on
which the malware was installed. Cluley said that could suggest a
company insider or a technician for one of its vendors could have placed
the code.

Executives of Visa Inc. of San Francisco, the largest payment card
company, issued a statement yesterday saying it is working with
Hannaford, banks, and law enforcement.

Hannaford said in its letter that it was certified a year ago as meeting
card security standards and was recertified on Feb. 27. Eleazer said
that was the day Visa first notified Hannaford of unusual card activity
and began its investigation. That the standards did not stop the
thieves, she said, "speaks to the increasing sophistication of the
criminal element that propagates these attacks," she said.

Copyright 2008 Globe Newspaper Company.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] Safari 3.1 For Windows Vulnerable To Hackers


http://www.informationweek.com/news/showArticle.jhtml?articleID=207000123

By Paul McDougall
InformationWeek
March 27, 2008

Researchers at software security firm Secunia said they've found two
"highly critical" vulnerabilities in Apple's Safari 3.1 For Windows
browser.

In one instance, files with long names downloaded via the browser "can
be exploited to cause memory corruption," according to Secunia. That
could result in the host computer becoming vulnerable to arbitrary code
execution -- a situation where intruders can remotely execute commands
on the targeted machine.

The other vulnerability lets hackers display their own content in pages
loaded into Safari 3.1 without changing what's displayed in the
browser's URL address bar.

Secunia notes that neither vulnerability has been patched by Apple.

Word of the problems is the latest black eye for Safari 3.1.

A number of users have complained that the browser functions poorly, or
crashes altogether, on computers running Microsoft (NSDQ: MSFT)'s
Windows XP operating system.

"When I try to start Safari 3.1 in Windows XP, it crashes right away,"
said SakJosep, in a post currently on Apple's online support forum.

Such complaints are echoing across a Safari support forum thread on
Apple's Web site.

Apple's also been hit with criticism for the way it launched the new
browser last week. The company included it as a stealth update for users
of its iTunes and QuickTime software. Mozilla CEO John Lilly likened the
strategy to tactics used by hackers to insert malicious code into
downloads.

"Apple has made it incredibly easy -- the default, even -- for users to
install ride along software that they didn't ask for, and maybe didn't
want," said Lilly, in a blog post. "This is wrong, and borders on
malware distribution practices."

Safari competes with Mozilla's Firefox product in the Web browser
market.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


[ISN] DoT asks RIM to set up server in India


http://www.thehindubusinessline.com/2008/03/29/stories/2008032951860400.htm

By Thomas K Thomas
The Hindu Business Line
March 29, 2008

Goa, March 28 -- The Department of Telecom has asked Research In Motion
(RIM), the Canadian company which owns Blackberry services, to look at
the possibility of setting up a server in India in case they are not
willing to share the decryption code.

The DoT's request has been supported by Indian mobile operators who are
also putting pressure on RIM to amicably resolve the issue at the
earliest.


Meeting in Capital

At a meeting between DoT and RIM in the Capital on Friday, the
Government has asked the company to make necessary arrangements to allow
monitoring by security agencies. Officials from the Canadian High
Commission were also present during the meeting. RIM has sought more
time to respond to DoT.s request.

DoT officials told Business Line that the company has been told that
only Blackberry to Blackberry traffic needs to be monitored.

DoT has given a clean chit to data being sent from a Blackberry device
to another device or through the Internet as this can be decrypted by
the security agencies without getting the codes from RIM. Security
concerns

Blackberry services had run into rough weather after security agencies
expressed concern that they could not monitor the data being sent
through the device due to the high encryption codes.

According to Indian Internet services rules, operators are not allowed
to use more than 40 bit encryption code unless they submit a decryption
key to the Government.

RIM, which uses more than 128 bit encryption codes to make the
transmission secure, has refused to submit the decryption codes on the
grounds that it was proprietary.


Support for stand

We are also putting pressure on RIM to do whatever it takes to enable
monitoring by security agencies. We support the request to set up a
server in India,. said a GSM industry representative.

At present, Bharti Airtel, Vodafone, BPL and Reliance Communications are
offering Blackberry services in the country to about 4 lakh subscribers.

Tata Teleservices also wants to offer the service but was stopped by DoT
after security agencies raised concerns about monitoring.

Locating a server in India will allow the security agencies to monitor
traffic at the gateway without having to break into the Blackberry.s
secure transmission codes. According to industry estimates, a server
would cost $500,000 at the most.

Earlier, DoT had said that the Government was not interested in banning
Blackberry in the country.


ISP's. request

The fallout of the RIM controversy will have a major ramification for
the Internet-based application service providers in the country at
large. Most of the service providers use 128 bit encryption codes and
not all of them have submitted their decryption codes to the Government.

Meanwhile, the Internet Service Providers have asked DoT to raise the
permitted encryption levels from 40 bits to 128 bit at least.


___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn


Microsoft claims victory in OOXML standards battle

The official results won’t be released until tomorrow, but Microsoft today claimed victory in their prolonged effort to get their Office Open XML document format declared an ISO standard:

After more than 14 months of intensive review, a Joint Technical Committee of the International Standardization Organization (ISO) and the International Electrotechnical Commission (IEC) has concluded its formal process to evaluate Ecma International's submission of the Draft International Standard (DIS) 29500: Office Open XML (Open XML).

While the final vote has not yet been announced formally, publicly available information appears to indicate the proposed Open XML standard received extremely broad support. According to documents available on the Internet, 86 percent of all voting national body members support ISO/IEC standardization, well above the 75 percent requirement for formal acceptance under ISO and IEC rules. In addition, 75 percent of the voting Participating national body members (known as P-members) support standardization, also well above the 66.7 percent requirement for this group. Open XML now joins HTML, PDF and ODF as ISO- and IEC-recognized open document format standards.

It’s not over until the fat lady sings, but a variety of leaks from the national standards bodies who got the results today indicate that the long nasty battle is over. Except for Neelie Kroes and the EU Competition Cops of course.

Microsoft is predictably ecstatic that they won’t get beat out of government and other contracts where office software is required to save documents in formats defined by “open standards,” but the continued bad vibes associated with the way this 6,000 page standards monstrosity was jammed through the “fast track” process will continue to rankle. Microsoft promises to implement the standard now known as IS 29500 (which differs and will differ further from the Open XML implemented in Office 2007) in the next version of Microsoft Office. It will be interesting to see if anyone else attempts it.

Update (April 2, 2008): The official announcement.


Microsoft and Yahoo agree on acquisition price

Galen Gruman at Infoworld has the April 1, 2008 scoop:

After much internal debate and industry speculation, Yahoo today agreed to be acquired by Microsoft, adding $2.6 billion to Redmond’s original offer of $44.6 billion on Jan. 31.

Yang will join Microsoft as "chief Yahoo," with specific duties to be determined later. Employees that Microsoft decides to retain will be offered an Xbox 360 game platform and a Zune music player as tokens of appreciation, in addition to cash grants and stock-option incentives for higher-level employees, Johnson said.

Golly! What can this portend?

Reaction from analysts and consumers ranged from disbelief to praise.

"This signals the death of Yahoo as it becomes part of Microsoft's proprietary, awkward Live strategy," said Mark Kelly, an analyst at The Buckeye Group research firm.

This talent is what Microsoft bought, and the company can afford to be tolerant of a distinct Yahoo culture, at least for a while, because it is contained in the Silicon Valley,” Ruiz said. "It can't infect Redmond as easily from there, even though Redmond could stand a little infection."

"Microsoft said the same thing about its slew of small business applications such as Great Plains a decade ago, yet nothing really came out of them," Hydecomb said.

Buckeye's Kelly said he believes the acquisition was nothing more than a platform purchase to replace the anemic Microsoft MSN, ad platform, and search-engine businesses, and that once Microsoft learned to run them, it would not need to retain the Yahoo culture.

"This is a liver transplant, not a brain transplant," Kelly said.

There’s much more by following the link, but the really scary part is how April Fool imitates reality when it comes to the Microsoft acquisition of Yahoo.


Microsoft acquires rootkit security vendor Komoku

On Thursday, Microsoft announced that they had acquired Komoku, a Maryland firm that produces rootkit detection software, for an undisclosed sum. “Microsoft expects to add Komoku's functionality into upcoming versions of the Forefront line of enterprise security products and Windows Live OneCare, Microsoft's all-in-one PC care solution.”


Microsoft mostly releases Vista SP1

Sometimes I think that what Microsoft’s Vista operating system really needs is an exorcist given the amount of unnatural occurrences plaguing it, but what it got this week was a disorderly rollout of Service Pack 1:

[Y]ou can now download Windows Vista SP1 via Windows Update. For those of you eager to receive the benefits of Windows Vista SP1 - you can now do so! We’ve seen quite a bit of questions in our comments so we want to communicate as much as possible surrounding Windows Vista SP1 and today’s release to Windows Update as we can.

For those of you happy to wait - sit tight because SP1 will start downloading to PCs automatically beginning in mid-April (Remember, this happens only if you have your Windows Update configured to automatically download updates and SP1 will automatically download but not automatically install).  But if you want to get the benefit of a year’s worth of improvements right now, go check Windows Update today…(Hit the Start Menu, All Programs, and select Windows Update).

If in running Windows Update you do not see Windows Vista SP1 listed, there are a number of good reasons for this (Eight in fact, see the whole list).

And there’s the rub as everything from an installation of a wrong language to a troublesome device driver could potentially hold up the parade. Microsoft says they are working on these problems and have recalled last month’s prerequisite Servicing Stack Update (KB937287) which caused some Vista systems to continually reboot, but the whole thing has a chancy feel when what Microsoft wants out of SP1 is an impression of solidity.

Adding to to the uncertainty were the mixed messages concerning retail availability of SP1 in boxed copies of Vista and on OEM hardware. It appears that Vista with SP1 is now available at some retailers including Amazon, but OEM PCs with SP1 won’t start showing up until April. As for current users that don’t want or whose connectivity can’t take a huge download from the Internet, the plans for a DVD copy are still up in the air.

The puzzling thing is that Microsoft knows how to do this right, but can never seem to put it all together for Vista. As for SP1 being what it takes to get the vaunted enterprise customers on board the Vista train, add at least 6 months for them to qualify Vista with SP1 for internal use.

Update (March 23): See “So Microsoft, Why Can't I Get Windows Vista SP1?” for an example of some SP1 driver incompatibility pain and yes, PC OEMs share the blame with Microsoft.


The Desktop Computer Revolution

Get to know all the main features of a desktop computer, and the points that may work as a checklist to help you make a good purchase.

Read Full Article Here: http://www.articlesbase.com/hardware-articles/the-desktop-computer-revolution-365207.html

Notebook - Why Do Business Executives Like It?

Notebooks have become an all time companion of many business executives around the world largely because of its portability, sleek design and user-friendly features.

Read Full Article Here: http://www.articlesbase.com/hardware-articles/notebook-why-do-business-executives-like-it-365206.html