Blogs

COVID-19 Cyber Threats: Observations, OSINT and Safety Recommendations

COVID-19 Cyber Threats: Observations, OSINT and Safety Recommendations Here at AUSCERT, we have been regularly covering appropriate COVID-19 (aka coronavirus) articles and its development in the various editions of our AUSCERT Daily Intelligence Report (ADIR) and Week in Review (WIR) emails.  The purpose of this blog post is to:  Remind readers that it is common for threat actors to use the most compelling or big news topics of the times to be used in malspam attacks to incite their targets to open a crafted attachment linked to a website. Inform readers of the various vectors or attack angles that threat actors have deployed using COVID-19 as their theme so they (organisations) can make informed decisions and take appropriate actions. AUSCERT have been made aware from either direct reports or via OSINT research that related threats have been seen relating to emails, mobile apps, web-applications; and social engineering scams. Some articles have pointed to the need for minitoring anomalous remote access attempts. Summary of general recommendations AUSCERT’s recommendations to aid resilience during these times of COVID-19 themed attacks are as follows: Avoid clicking on promotional links in emails Beware of COVID-19 related phishing schemes and fake alerts/health advisories Don’t click on baits such as an “80% discount on an exclusive cure” or “treatment for coronavirus“ Enforce multi-factor authentication where possible If there is some general information that can be found searching through an online search, do that instead of clicking the link from a suspicious sender. If unsure about the authenticity of a website, don’t proceed with any login procedures Log all remote access events Monitor data exfiltration points Monitor for land speed anomalies or credential sharing Monitor remote access devices Organisations should ensure VPN and RDP servers are up-to-date Detail In more detail, we reiterate that COVID-19 as the latest trending news has been no exception to the trend of opportunistic crime. When threat actors consider which lures to use on their campaigns; it is no wonder that any related permutation of an event relating to COVID-19 will likely be very attractive.   Emails AUSCERT has been made aware of Australian organisations receiving malspam related to COVID-19 as a subject header. Some (non exhaustive) examples include:  Working from home statements from supervisors Recommendations to avoid infection Statements from Health Authorities (World, Federal, State or Employment related) One recent example showed an email disguised to be from the Director of Milan University surfaced in the pretense of steps to be undertaken to prevent further spread of the virus. The threat actor motivation became clear when a malicious URL link asked for the user login details and password.  Another sophisticated attack method that researchers reported contained an MS Word document from the World Health Organisation with an embedded URL that lead to a fake MS Office website.   Web applications Threat actors are cloning, impersonating or crafting websites to facilitate their COVID-19 related scams. Researchers have found that more than 4000 COVID-19 related domains were registered globally. Of those, around 5% could be malicious and an additional 5% are suspicious. A recent example as reported by industry journalists from security organisations and featured in a recent edition of our ADIR;  stated that a clone of the (legitimate) Johns Hopkins University coronavirus map was used to spread malware. This is a call for people to be careful about which websites to trust.  In addition to this, security researchers at Malwarebytes reported finding malicious code hiding behind the fake website that claimed to have the look-and-feel of the legitimate map yet able to show an up-to-date global heatmap of COVID-19 reports.  Malwarebytes reported that the malicious code skims for passwords and credit card details, as a variant of the AzorUlt spyware. Advice is to be sure to only use trusted AND verified information sources from government and research institution’s websites.   Social Media Social media users need to be wary of two specific scams that are likely to play off the current COVID-19 situation. The first is fake fundraising initiatives. “Fundraising” threat actors will use stories and images of real people to tap into society’s pathos. Notably, these scammers will utilise legitimate fundraising platforms like GoFundMe to solicitate donations. Be cautious of any individuals asking for donations. The second threat for COVID-19 related scams deals with investments. As the Securities and Exchange Commission (SEC) recently warned, criminals will use social media to promote microcap stocks which they claim have a product or service that can help prevent or treat COVID-19 patients. These are what is known in industry as pump-and-dump scams that could cost investors a lot of money. Be sure to perform some independent research. A quick search will help clear any cloudiness about the proposed investment. In conclusion, stay alert on social media. Even though these websites are intended for social interactions and help people connect to each other in times of need, stay conscious when scrolling through your news feed.   Malware and mobile apps Lures of downloading mobile apps related to COVID-19 have also turned into a suspicious platform.  The use of these tactics have been seen to be used at every level of the threat actors and encompasses the spreading of a well-known set of malware. It is important to ensure that a high level of vigilance is used on any related malspam. This is even more so for any workforce that is going to be working from home as there may be further limited channels to cross check statements from emails. Recorded Future recently observed an extensive list of actors and malware employing various techniques’ including Trickbot, Lokibot, and Agent Tesla, targeting a broad set of victims, including those in the USA, Italy, Ukraine, and Iran in particular. Threat actors have also endeavoured to gain the trust of victims using branding associated with the U.S. Centres for Disease Control and Prevention (CDC) and the World Health Organization (WHO), as well as country-specific health agencies such as the Public Health Centre of the Ministry of Health of Ukraine and China’s Ministry of Health, and companies such as FedEx. COVID-19 Android ransomware application such as Covidlock have impacted individuals and has been subject of industry analysis. The Covidlock application was named as such because of the malware’s capabilities and its background story. It uses techniques to deny the victim access to their phone by forcing a change in the password used to unlock the phone. This is also known as a screen-lock attack and has been seen before on Android ransomware. Please ensure that you download mobile applications only from official stores (Apple/Android). There is a much higher risk of downloading malware from untrusted 3rd party stores.   Phishing kits Often the COVID-19 campaigns are highly convincing due to cyber criminals using professional phishing kits. For example, these kits are programmed to use perfectly matched logos and email formats of legitimate organisations. Additionally, threat actors will incorporate “combosquatting” and “typosquatting” tactics to fool users into thinking the link is legitimate. One example of typosquatting is when an attacker uses popular domains that are misspelled incorrectly but look like real a domain name. For example, faecbook.com or wellsfagro.com. Combosquatting and typosquatting have similar tactics used to fool users, however, the domain name is appended with -security. For example, wellsfargo-security.com or security-chase.com. Notice the domains are not misspelled but prepended or appended with the word security.   Phone and text messages Threat actors are already impersonating the UN’s health agency to carry out a variety of scams, from account takeovers to phony donation requests and the spread of malware. The FTC is also warning of spoofed emails, text messages, and phone calls that claim to be from the Centre for Disease Control (CDC).   Advanced Persistent Threat (APT) Check Point Research discovered a new campaign against the Mongolian public sector, which takes advantage of the current COVID-19 scare, in order to deliver a previously unknown malware implant to the target. This specific campaign leverages the COVID-19 pandemic to lure victims to trigger the infection chain. The attackers updated their toolset from documents with macros and older RTF exploits to the latest variation of the RoyalRoad RTF exploit-builder observed in the wild. By taking a closer look at the campaign, Checkpoint was able tie it to other operations which were carried out by the same anonymous group, dating back to at least 2016. Over the years, these operations targeted different sectors in multiple countries, such as Ukraine, Russia, and Belarus. Campaign IOCs We highly recommend readers review this report. Checkpoint provides a full analysis of the TTPs utilised throughout this campaign, the infrastructure, and the new tools they uncovered during their research, of what they believe to be a Chinese-based threat actor. Source: https://research.checkpoint.com/2020/vicious-panda-the-covid-campaign/   Royal Road – Specifics/IOCs Royal Road is an RTF weaponiser, sometimes called “8.t RTF exploit builder”. This tool is shared between multiple threat actors and is known to exploit: CVE-2017-11882 CVE-2018-0798 CVE-2018-0802 The RTF file has a various of characteristics that help with attribution. There are many threat actors who use Royal Road, of whom can be divided into three groups and suppose connections between actors. To review documented IOCS – see “Appendix-1: IOC” in the article that follows. Source: https://nao-sec.org/2020/01/an-overhead-view-of-the-royal-road.html   COVID-19 Scams: further industry analysis Wired published an interesting article associated with coronavirus phishing scams. “It’s not surprising that they would attempt to incorporate the coronavirus into that playbook so quickly. But the move illustrates how phishing attempts so consistently hew to certain time-tested topics and themes”. The article went on to describe that “the success rate of seasonally themed phishing emails pales in comparison, though, to those pegged to a critical world event. People living through Brexit uncertainty or a natural disaster have disproportionate questions and concerns. Attackers can exploit those fears and doubts by suggesting they have answers”. The takeaway is to always be aware that “email scammers often try to elicit a sense of fear and urgency in victims”. Source: https://www.wired.com/story/coronavirus-phishing-scams/   As of March 11, 2020 Recorded Future following their own analysis believe that COVID-19 has been primarily used by cybercriminals as a theme for phishing lures. However, they observed that at least three cases where reference to COVID-19 was leveraged by possible nation-state actors. They assessed that as the number of COVID-19 cases, as well as publicity around the virus rises globally, both cybercriminals and nation-state actors will increasingly exploit the crisis as a cyberattack vector.  They further assessed that: “Cybercriminals will often use the branding of “trusted” organisations in these phishing attacks, especially the World Health Organization, in order to build credibility and get users to open attachments or click on the link” “For the duration of the outbreak, COVID-19 will continue to be used as a lure, and that new versions of these lures targeting new countries will emerge” Their analysis is interesting reading and in-depth, therefore readers should consider reading the full analysis available via the following link. Source: https://www.recordedfuture.com/coronavirus-panic-exploit/ Now that we’ve covered a list of observations and OSINT findings above, let’s look at the following safety recommendations from ACSC, ASD and US-CERT:  Australian Gov: ACSC and ASD In their article Cyber security is essential when prepping for COVID-19, the ACSC suggested considerations should be made to incorporate a set of defined proactive strategies to address cyber threats, which include those associated with COVID-19, quoting the ASD:   “The Australian Signals Directorate (ASD) would like to remind you to incorporate cyber security into your contingency planning. As more staff may work from home, and the use of remote access technology increases, adversaries may attempt to take advantage. ASD’s Australian Cyber Security Centre (ACSC) encourages Australians to remain vigilant and ensure sound cyber security practices.” Source: https://www.cyber.gov.au/news/cyber-security-essential-when-preparing-covid-19   USA Gov: US-CERT Organisations should be vigilant to COVID-19 themed cyber threats and consider your enterprise VPN security as it relates to staff working remotely (teleworking). The Cybersecurity and Infrastructure Security Agency (CISA) warns individuals to remain vigilant for scams related to Coronavirus Disease 2019 (COVID-19). Cyber actors may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or donating to fraudulent charities or causes. Exercise caution in handling any email with a COVID-19 related subject line, attachment, or hyperlink, and be wary of social media pleas, texts, or calls related to COVID-19. CISA encourages individuals to remain vigilant and take the following precautions: Avoid clicking on links in unsolicited emails and be wary of email attachments. See Using Caution with Email Attachments and Avoiding Social Engineering and Phishing Scams for more information. Use trusted sources—such as legitimate, government websites—for up-to-date, fact-based information about COVID-19. Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. Verify a charity’s authenticity before making donations. Review the Federal Trade Commission’s page on Charity Scams for more information. Review CISA Insights on Risk Management for COVID-19 for more information. Source: https://www.us-cert.gov/ncas/current-activity/2020/03/06/defending-against-covid-19-cyber-scams   US-CERT further addressed the case for enterprise VPN security within their security bulletin reference Alert (AA20-073A). As organisations prepare for possible impacts of Coronavirus Disease 2019 (COVID-19), many may consider alternate workplace options for their employees. Remote work options—or telework—require an enterprise virtual private network (VPN) solution to connect employees to an organisation’s information technology (IT) network. As organisations elect to implement telework, the Cybersecurity and Infrastructure Security Agency (CISA) encourages organisations to adopt a heightened state of cybersecurity. CISA encourages organisations to review the following recommendations when considering alternate workplace options Update VPNs, network infrastructure devices, and devices being used to remote into work environments with the latest software patches and security configurations. Alert employees to an expected increase in phishing attempts. Ensure IT security personnel are prepared to ramp up the following remote access cybersecurity tasks: log review, attack detection, and incident response and recovery. Implement MFA on all VPN connections to increase security. If MFA is not implemented, require teleworkers to use strong passwords. Ensure IT security personnel test VPN limitations to prepare for mass usage and, if possible, implement modifications—such as rate limiting—to prioritise users that will require higher bandwidths. Source: https://www.us-cert.gov/ncas/alerts/aa20-073a   Summary Individuals and organisations should expect to see a wide range of COVID-19 related phishing emails, smishing (text message phishing), and phone fraud scams over the coming weeks. These scams will focus on our insecurities about how the virus is spreading. The scams can take on several forms – for instance, fake health agency warnings about infections in your local area, vaccine and treatment offers, and alerts about critical supply shortages. In particular, individuals should avoid clicking on promotional links in emails. Don’t click on baits such as an “80% discount on an exclusive cure” or “treatment for coronavirus“ If unsure about the authenticity of a website, don’t proceed with any login procedures. If there is some general information that can be found searching through an online search, do that instead of clicking the link from a suspicious sender. Organisations should enforce multi-factor authentication where possible, and ensure VPN and RDP servers are up to date. IT/Security teams should log all remote access events and monitor data exfiltration points, monitor for land speed anomalies/credential sharing and monitor remote access devices. If there is any doubt to a received item, individuals should reach out to the appropriate teams within their organisations for reassurance. Organisations should be vigilant to COVID-19 themed cyber threats. Any organisation that believe they have been victim to a targeted attack should contact the ACSC.  And in turn, all AUSCERT member organisations know they can reach out to us here at AUSCERT for further assistance. We are here to help.   In the meantime during this time of change and challenge, please stay safe in both our physical and virtual worlds.   All the best, Colin Chamberlain CISSP Principal Analyst, AUSCERT   Other sources: https://www.grahamcluley.com/coronavirus-map-used-to-spread-malware/ https://krebsonsecurity.com/2020/03/live-coronavirus-map-used-to-spread-malware/ https://www.business2community.com/cybersecurity/coronavirus-covid-19-3-scams-to-watch-out-for-02293067 https://cointelegraph.com/news/covidlock-exploits-coronavirus-fears-with-bitcoin-ransomware https://twitter.com/hashtag/CovidLock?src=hash https://cyware.com/news/exploring-various-ways-in-which-hackers-are-milking-the-covid-19-scare-254d1f9b http://www.zumatech.com/email-spoofing-how-to-recognize-a-spoofed-email-message/ https://news.un.org/en/story/2020/02/1058381 https://www.domaintools.com/resources/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware https://cointelegraph.com/news/covidlock-exploits-coronavirus-fears-with-bitcoin-ransomware https://twitter.com/hashtag/CovidLock?src=hash

Learn more

Blogs

AUSCERT and the APCERT CYBER DRILL 2020

AUSCERT and the APCERT CYBER DRILL 2020 “BANKER DOUBLES DOWN ON MINING”   This year, AUSCERT took on a more proactive approach in the Asia Pacific region by taking on the lead role in coordinating this annual drill.  As the lead, AUSCERT created the scenario and orchestrated the creation of “the inject” – which are the prompts sent to all involved teams.  Of course, it goes without saying that the drill was not entirely AUSCERT’s contribution.   Contribution, either be it via infrastructure through ticketing systems; or communication as well as artefact creations came from various other national computer emergency response teams around the Asia Pacific. AUSCERT had the opportunity to lead these teams and coordinated the various resources to ensure that APCERT/CSIRT, as well as all invited partners and guest CERTs/CSIRTs spanning across the globe, through this cyber security drill are ready to cooperate in handling incidents as they come. Please see below for a copy of the official media release:      APCERT Secretariat: JPCERT/CCJapan Computer Emergency Response Team Coordination CenterContact: apcert-sec@apcert.orgURL: www.apcert.org   11 March 2020  MEDIA RELEASE  The Asia Pacific Computer Emergency Response Team (APCERT) today has successfully completed its annual drill to test the response capability of leading Computer Security Incident Response Teams (CSIRT) within the Asia Pacific economies. The theme of this year’s APCERT Drill is “Banker doubles down on Miner”. This exercise reflects real incidents and issues that exist on the Internet. The participants handled a case of a local business affected by malware infection which is triggered by data breach. Throughout the exercise, the participating teams activated and tested their incident handling arrangements. This drill included the need for the teams to interact locally and internationally, with CSIRTs/CERTs and targeted organizations, for coordinated suspension of malicious infrastructure, analysis of malicious code, as well as notification and assistance to affected entities. This incident response exercise, which was coordinated across many economies, reflects the collaboration amongst the economies in mitigating cyber threats and validates the enhanced communication protocols, technical capabilities and quality of incident responses that APCERT fosters in assuring Internet security and safety. 25 CSIRTs from 19 economies of APCERT (Australia, Bangladesh, Brunei Darussalam, People’s Republic of China, Chinese Taipei, Hong Kong, India, Indonesia, Japan, Korea, Lao People’s Democratic Republic, Macau, Malaysia, Myanmar, New Zealand, Singapore, Sri Lanka, Thailand, and Vietnam) participated in the drill. From the external parties, CSIRTs from 7 economies (Benin, Egypt, Jordan, Morocco, Nigeria, Pakistan and Tunisia) of OIC-CERT and AfricaCERT participated. About APCERT APCERT was established by leading and national Computer Security Incident Response Teams (CSIRTs) from the economies of the Asia Pacific region to improve cooperation, response and information sharing among CSIRTs in the region. APCERT Operational Members consist of 30 CSIRTs from 21 economies. Further information about APCERT can be found at: www.apcert.org/. ~ End ~ Original copy of this media release can be found HERE  

Learn more

Blogs

AUSCERT and the APCERT CYBER DRILL 2019

AUSCERT and the APCERT CYBER DRILL 2019   “Catastrophic Silent Draining in Enterprise Network”   Exactly a week a week ago, our team was involved in the 2019 APCERT Cyber Drill.    AUSCERT is proud to announce that we had some staff members as part of the running committee tasked with assisting the organization responsible for this drill and various other staff members as participants. Last but not least, AUSCERT will be running this drill next year in 2020 and the entire team is excited and looking forward to this opportunity.   Please see below for a copy of the official media release:      APCERT Secretariat: JPCERT/CCJapan Computer Emergency Response Team Coordination CenterContact: apcert-sec@apcert.orgURL: www.apcert.org   31 July 2019 MEDIA RELEASE The Asia Pacific Computer Emergency Response Team (APCERT) today has successfully completed its annual drill to test the response capability of leading Computer Security Incident Response Teams (CSIRT) within the Asia Pacific economies. The theme of this year’s APCERT Drill is “Catastrophic Silent Draining in Enterprise Network.” This exercise reflects real incidents and issues that exist on the Internet. This year’s scenario was inspired by a latest security attack on an organization, which relates to the vulnerability that could allow attackers to completely take over vulnerable websites to deliver malware backdoor and cryptocurrency miners. This drill included the need for the teams to interact locally and internationally, with CSIRTs/CERTs and targeted organizations, for coordinated suspension of malicious infrastructure, analysis of malicious code, as well as notification and assistance to affected entities. This incident response exercise, which was coordinated across many economies, reflects the collaboration amongst the economies in mitigating cyber threats and validates the enhanced communication protocols, technical capabilities and quality of incident responses that APCERT fosters in assuring Internet security and safety. Throughout the exercise, the participating teams activated and tested their incident handling arrangements.  This drill included the need for the teams to interact locally and internationally, with CSIRTs/CERTs and targeted organizations, for coordinated suspension of malicious infrastructure, analysis of malicious code, as well as notification and assistance to affected entities. This incident response exercise, which was coordinated across many economies, reflects the collaboration amongst the economies in mitigating cyber threats and validates the enhanced communication protocols, technical capabilities and quality of incident responses that APCERT fosters in assuring Internet security and safety. 26 CSIRTs from 20 economies of APCERT (Australia, Bhutan, Brunei Darussalam, People’s Republic of China, Chinese Taipei, Hong Kong, India, Indonesia, Japan, Korea, Lao People’s Democratic Republic, Macao, Malaysia, Mongolia, Myanmar, New Zealand, Singapore, Sri Lanka, Thailand, and Vietnam) participated in the drill. Original copy of this media release can be found HERE  

Learn more

Blogs

The Let's Encrypt CAA Code Bug – A Plain View

The Let's Encrypt CAA Code Bug – A Plain View What happened Let’s Encrypt recently found a bug in their CAA checking code and after remediating the bug [1] on 2020-02-29 UTC (the evening of Friday February 28, U.S. Eastern time), announced they would revoke approximately 2.6% of their active certificates that were potentially affected by the bug, totalling approximately 3 million certificates [2]. Let’s Encrypt company engineers provided a technical update [1]: “ On 2020-02-29 UTC, Let’s Encrypt found a bug in our CAA code. Our CA software, Boulder, checks for CAA records at the same time it validates a subscriber’s control of a domain name. Most subscribers issue a certificate immediately after domain control validation, but we consider a validation good for 30 days. That means in some cases we need to check CAA records a second time, just before issuance. Specifically, we have to check CAA within 8 hours prior to issuance (per BRs §3.2.2.8), so any domain name that was validated more than 8 hours ago requires rechecking. The bug: when a certificate request contained N domain names that needed CAA rechecking, Boulder would pick one domain name and check it N times. What this means in practice is that if a subscriber validated a domain name at time X, and the CAA records for that domain at time X allowed Let’s Encrypt issuance, that subscriber would be able to issue a certificate containing that domain name until X+30 days, even if someone later installed CAA records on that domain name that prohibit issuance by Let’s Encrypt. We confirmed the bug at 2020-02-29 03:08 UTC, and halted issuance at 03:10. We deployed a fix at 05:22 UTC and then re-enabled issuance. Our preliminary investigation suggests the bug was introduced on 2019-07-25. We will conduct a more detailed investigation and provide a postmortem when it is complete. “   Cert Revocation, Renewal and Replacement Let’s Encrypt report they are aiming to “complete revocations before the deadline of 2020-03-05 03:00 UTC, we are planning to start revoking affected certificates at 2020-03-04 20:00 UTC (3:00pm US EST)”. Those affected should continue to renew and replace affected with new certificates. [3]   Impact Whilst this might not be seen as critical on the surface, a certificate is fundamentally used to establish and maintain site trustworthiness between two parties.  Essentially, certificates are used by browsers to ensure that the site we intended to visit is really the one we’ve arrived at. Leaving a revoked certificate in-place could trigger errors in browsers and other applications, cause loss availability and/or trust, all potentially causing harm to the companies that rely on them.   Impacted Customer Communications From Let’s Encrypt Let’s Encrypted reported they “have sent notification emails to affected subscribers who have registered an email address”, although believe some customers “may not have received an email if they did not provide an email address while registering” their ACME account. [3] In this latter scenario, Let’s Encrypt are directing customers with any need to re-subscribe to email notifications to https://letsencrypt.org/docs/expiration-emails/ . [3] It is worth considering that email delivery issues or spam filtering may also be the cause of missing the email which ultimately advises affected customers to renew their certificates. [3]   If you are looking for the missing email you can search for the following subject line within your mailbox or email gateway logs: “ACTION REQUIRED: Renew these Let’s Encrypt certificates by March 4”   If you are unsure whether your hostname is affected, use the checking tools described in this post.   Via AUSCERT As a passionate not-for-profit CERT organisation, we routinely monitor industry updates, news and other intel feeds. Due to this practice, we were promptly aware of the public bug announcement from Let’s Encrypt and following a proactive course of action, we identified AUSCERT Members with affected certificates and are currently working with them.   Identifying an affected certificate Let’s Encrypt have published a page hosting the list of affected serial numbers relating to the 2020.02.29 CAA Rechecking Incident [3].  That page details the downloadable file contains a list of all affected certs, sorted by account ID. [4] Checking Tools/methods There are several methods or tools providing a means to check for an affected certificate. Online Common Tools Curl OpenSSL Purpose built script   Online If you want to double check whether a given hostname still needs its certificate replaced, you can use the tool seen in the screenshot below available at: https://checkhost.unboundtest.com/ .   Common Tools Curl The curl command on a linux system can be used in conjunction with online tool https://checkhost.unboundtest.com/ against a target website to show its current certificate serial number. The following two example indicate affected and non-affected certificate responses. Response 1: Affected Certificate $ curl -XPOST -d ‘fqdn=www.REDACTED.au’ https://checkhost.unboundtest.com/checkhost The certificate currently available on www.REDACTED.au needs renewal because it is affected by the Let’s Encrypt CAA rechecking problem. Its serial number is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. See your ACME client documentation for instructions on how to renew a certificate. Response 2: Non-Affected Certificate $ curl -XPOST -d ‘fqdn=letsencrypt.org’ https://checkhost.unboundtest.com/checkhost The certificate currently available on letsencrypt.org is OK. It is not one of the certificates affected by the Let’s Encrypt CAA rechecking problem. Its serial number is 03a1c95bdaa36a8268327f2253cbd3ba2436   OpenSSL As seen in the following examples, the openssl command (linux) can be used against a target website to show its current certificate serial number: openssl s_client -connect example.com:443 -servername example.com -showcerts </dev/null 2>/dev/null | openssl x509 -text -noout | grep -A 1 Serial Number | tr -d : Response:         Serial Number             0fd078dd48f1a2bd4d0f2ba96b6038fe   openssl s_client -connect letsencrypt.org:443 -servername letsencrypt.org -showcerts </dev/null 2>/dev/null | openssl x509 -text -noout | grep -A 1 Serial Number | tr -d : Response:         Serial Number             03a1c95bdaa36a8268327f2253cbd3ba2436   Purpose-Built Script Github – Let’s Encrypt CAA (lecaa) checking scripts [5] A purpose-built script hosted on Github [5] and created by Hanno Böck [6] “…allows you to efficiently check affected hosts”. Hanno Böck advised on his github page that the script was created after “Let’s Encrypt announced a bug in their system’s CAA checks, which forced them to revoke 3 million certificates on very short notice”.   Let’s Encrypt credit the lecaa script as useful tool and refer customer to use it by advising “if you have a large list of domains you need to check, this tool will be more effective. [3]   Where certificates are found that are not affected, Let’s Encrypt said “even if you received an email, it’s possible that the affected certificates have been replaced by newer certs not affected by the bug. (Either due to being issued in the last few days since it was fixed, or simply by not meeting the specific timing criteria necessary for the bug to trigger.) In that case, it’s not necessary to renew them again”. [3]   Questions Anyone who has questions should review the Q & A’s seen on Let’s Encrypt’s FAQ [2], then should questions remain after such review, they should contact Let’s Encrypt directly.   References [1] 2020.02.29 CAA Rechecking Bug https://community.letsencrypt.org/t/2020-02-29-caa-rechecking-bug/114591 [2] Revoking certain certificates on March 4 https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864 [3] Download affected certificate serials for 2020.02.29 CAA Rechecking Incidenthttps://letsencrypt.org/caaproblem/ [4] File containing serial number of the affected certificates https://d4twhgtvn0ff5.cloudfront.net/caa-rechecking-incident-affected-serials.txt.gz [5] Github – Purpose Built Checker (lecaa) https://github.com/hannob/lecaa [6] Hanno Böck https://hboeck.de/  

Learn more

Blogs

2019 Cyber Security Survey

2019 Cyber Security Survey Complete the 2019 Cyber Security Survey The cyber landscape is constantly changing, and the number and level of sophistication of attacks are increasing.  Being aware of the latest cyber security threats and trends in the industry can help your organisation put the right measures in place to protect against cyber threats.  Is your organisation prepared to manage the impact of a significant cyber event?  How do your cyber practices stack up against other organisations in your industry? The fourth BDO and AUSCERT Cyber Security Survey is now open. This annual survey, aimed at key decision makers, identifies the current cyber security trends, issues and threats facing businesses in Australia and New Zealand. Participation gives you direct access to our survey report, allowing you to: Compare your organisation’s cyber maturity against peers Benchmark your business’ current cyber security efforts with trends in your industry Identify potential gaps in your organisation’s cyber security approach Determine ways to improve your organisation’s cyber security culture, planning and response measures. Take part now Don’t miss out on your chance to gain free insight into the maturity of your organisation’s cyber security approach. The survey closes at midnight on Friday 1 November. The survey is anonymous and takes less than 10 minutes to complete. The survey also offers the chance to win one of three Apple Watches.* For more information about this survey contact our team: membership@auscert.org.au * Refer to the survey competition terms and conditions.    

Learn more

Blogs

AUSCERT at the APCERT Conference 2019

AUSCERT at the APCERT Conference 2019 AUSCERT was represented at the recent APCERT 2019 gathering in Singapore by Senior Information Security Analyst, Geoff Thonon and Senior Security System Administrator, Colby Prior.  Highlights of this work trip included the below initiatives.  _____________________________________________________________________________________________________________________________ APCERT-AGM 2019 Teams that are part of APCERT (Asia Pacific Computer Emergency Team)[1] took part in the APCERT Conference 2019 which kicked off on Sunday the 29th September.  This was Day One of the APCERT Annual General Meeting and like with all groups that meet once-a-year, the day was filled with reports on the years’ activities. Working Groups [2] were queued up and reported on the progress of various projects that makes the APCERT community more effective as a whole.  [1] http://www.apcert.org/[2] http://www.apcert.org/about/structure/groups.html   AUSCERT @ APCERT Drill-WG AUSCERT co-presented  with the convenor of ThaiCERT on the APCERT-Drill that took place in 2019 [1].  AUSCERT rallied the group to participate in and briefed them about the APCERT-Drill 2020, within a diverse set of roles.  Along with rallying the group for the coming Drill, some factors were highlighted in using the currently available platform(s) within APCERT in terms of communication and coordination, as well as using this event to further further promote cooperation with all new CERTs/CSIRTs in the Asia Pacific region.    [1] http://www.apcert.org/documents/pdf/APCERT_Drill2019_Press%20Release.pdf ______________________________________________________________________________________________________________________________ We look forward to hosting the APCERT-Drill in 2020 and to meeting our colleagues at the next APCERT annual conference!

Learn more

Blogs

Ryuk Ransomware and Action – Summary Information

Ryuk Ransomware and Action – Summary Information Hello! Welcome to my first blog post, today topic involves Ryuk Ransomware, which has had some press of late thought it might be useful to supply summary details about this ransomware variant to aid understanding and steps to aid mitigation. Written for quick absorption, without further ado, please find ready for consumption a non-exhaustive, best effort ‘Ryuk Ransomware and Action – Summary Information’ below the fold (popcorn optional).   ** Ryuk Ransomware and Action – Summary Information ** Meaning: “Gift of God”Highly complex ransomware, constantly under development Primary purpose: “Money Maker”Secondary purpose: Potential sald for further exploit (compromised host marketplace) Trojan Associations: – Emotet (modular malware, emerged in 2014, primarily used as downloader for other malware, i.e., trickbot & IcedID)– Trickbot (spyware, emerged 2016, mainly used to target banks, distributed via spam email or Emotet’s geo-based d/l function) *Highlevel Process Flow – Ryuk Ransomware (quick simple flow)*– Spam email /w malicious doc– Emotet and/or Trickbot malware installed– Credential theft– Create new Admin User– Lateral movement through network– Recon Active Directory– Attempts to disable host security protection and 3rd-party backup services– Deletes Windows VSS shadow copies– Ryuk ransomware deployed *Detail/Notes* Ryuk Stealth Aspect: – Dropper is deleted by payload– Encryption could occur days, weeks or year after infection– Activation delay presumed to be surveillance related / actors performing reconnaisance on their ‘big game’ – Known Anti-forensics include PowerShell anti-logging scripts, anti-analysis infinite loop Encrypted file extension: .RYK Ransom note filename: “RyukReadMe.txt”Ransom note includes: – Two private email addresses– In addition, variants observed, one includes payment related details, whilst another doesn’t and victim to make contact Lateral movement: – RDP Usage (via brute force and vulnerability exploit)– SMB exploit (MS17-010)– Continues until privileges recovered to reach DC. Makes use of any or all of following tools:– PsExec (free Microsoft sysinternals tool): To push Ryuk binary to individual hosts– PowerShell Empire: D/L and installed as a service, PowerShell agents and keyloggers– ‘pwgrab’ (Trickbot module) for recovering credentials– Mimikatz: Steal admin credentials and create persistent backdoors Persistence: – Early variants had persistence, – recent reports indicates newer variants do not persist after restart– be prepared for either Interesting: – TrickBot is leveraged for lateral movement and to infect as many machines as possible   (It then deploys Ryuk at a randomly determined time)– When TrickBot compromises a machine, it is bundled with a library of modules, used to:  – perform reconnaissance  – harvest credentials  – perform lateral movement – Ryuk:  – attempts to disable AV products and delete Windows VSS shadow copies before ransomware starts encryption procedure  – operates with a whitelist of three file extension types: exe, dll and hrmlog     (hrmlog believed to be a debug log filename created during development of Ryuk’s 2017 predecessor, Hermes ransomware)  – disables several 3rd-party backup services, including Acronis, SQLSafe, VEEAM, and Zoolz – PowerShell Empire, a well-known penetration-testing tool, is no longer maintained by its creators (respected members of the infosec community)   – its capabilities and behaviors closely resemble those used by current nation state advanced persistent threat actors   – evades security solutions, operating in a covert manner, and enabling attackers’ total control over compromised systems   – Empire’s use among cybercriminals grew exponentially and in 2018, the UK’s National Cyber Security Center included Empire on its shortlist of the five most dangerous publicly available hacking tools   – However, development of Empire framework stopped after creators said “project reached its initial goal” – Ryuk victims may have a small chance of getting free decryption through Security firm Emisoft’s free decrypt tools *Defending against Ryuk and other ransomware*Considerations that usual methods for delivering ransomware are rarely complicated, simply relying on tried and tested techniques such as:– exploiting vulnerabilities– sending spam and phishing emails– stealing user credentials (also consider obtained via credential stuffing) User/staff awareness!– enhance your user saviness and confidence in identifying and appropriately fielding suspicious emails– encourage users to be avid first line reporters ASD Essential 8 Mitigation Strategies:– preventing malware delivery and execution  – application whitelisting  – configure MS Office Macro setting  – patch Apps  – user app hardening– limiting the extent of cyber security incidents  – restrict administrative privileges  – MFA  – patch operating systems– recovering data and system availability  – daily backups Other Government produced advisories:– Follow ACSC “Guidelines for System Management” (October 2019), ensuring networks and systems are patched or appropriate measures are in place  – advice included under ‘When patches are not available’– Review NCSC guidance publication named “Mitigating Malware”, specifically section four titled (see references for url):  – “What to do if you (or your organisation) has been infected with malware” Enterprise deployment or configuration considerations include… Follow industry best practice wherever, or whenever possible, however specific recommendations as follows… Following good practice, non-exhaustive:– Restrict use of system administration tools, i.e., PsExec, do admins really need to use it?– Disable unnecessary services, i.e., RDP/terminal services Backups – you might have them, but recommend testing them during quiet times! Logging:– goes without saying, but logs are essential– ensure logging is enabled wherever possible (and you have capacity for it), inc PowerShell logging and security– sysmon is also a handy tool,   – free from MS sysinternals  – offers valuable capabilities, event collection, processes, netcons, hashes, registry mods, file creations and more!  – SIEM forwarding, i.e., a sysmon add-on for splunk exists Software Restriction Policy (SRP):– SRPs are a Group Policy-based feature that identifies software programs running on computers in a domain– controls the ability of those programs to run, including specific file path locations, e.g., %APPDATA% directory in the user profile – Software restriction policies are part of the Microsoft security and management strategy Perform annual policy reviews and enforce compliance Detecting Compromised Hosts:– review available Indicators of Compromise (IoCs)   – SIEM, security solution revews (searchable audit trail if not fed into SIEM), cloud analytic services (e.g., MS Defender ATP)– Email Security / Gateway reviews  – ID recipients of an identified phishing email, solutions such as Mimecast can track users interaction with rewritted urls, malware may not have activated yet– undertake appropriate scanning / log reviews   – outbound traffic f/w log reviews  – vulnerability scan assets within specified IP ranges to detect assets and associated vulns, especially SMB related, e.g., eternalblue    (shine your light in your network! did you know about all assets listed in results?)  – SCCM review, are you offering all appropriate patches?    – marry up what is listed vuln wise within your vulnerabilty scanning tool asset results, and what is offered by SCCM     – use automatic deployment rules (ADRs) rather than adding new updates to an existing software update group    – typically, you use ADRs to deploy monthly software updates Proactiveness:Configure alerting on detection of – anomalous command execution, e.g., “vssadmin.exe Delete Shadows /All /Quiet”– unusual administrative tool use within SIEM, e.g., PsExec, net commands – privileged and service account monitoring– obfuscated commands, see something obfucated? it can’t be good PsExec spotlight:– The service PSEXESVC will be installed on the remote system  – 4697 and/or 7045 event log entry    – Note, the 4697 event, if available, may also contain account information  – may also have 4624 and/or 4625 Windows Event log entries, capturing the logon events of the tool usage.– SIEM search Application Compatibility Cache / RecentFileCache.bcf– evidence of program execution in the Application Compatibility Cache (“AppCompat”) and/or Amcache,   – replaces the RecentFileCache.bcf in newer Windows operating systems Last note on the topic of ‘external providers’ or contractors, non-exhaustive considerations:– their need to following org policy– what access into Enterprise they have– their skill level *Reading List*https://resources.infosecinstitute.com/what-you-should-know-about-ryuk-ransomware/https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ryuk-ransomware-shows-diversity-in-targets-consistency-in-higher-payoutshttps://success.trendmicro.com/solution/1123892-ryuk-ransomware-informationhttps://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/examining-ryuk-ransomware-through-the-lens-of-managed-detection-and-responsehttps://blog.trendmicro.com/trendlabs-security-intelligence/trickbots-bigger-bag-of-tricks/https://blog.malwarebytes.com/cybercrime/malware/2019/01/ryuk-ransomware-attacks-businesses-over-the-holidays/https://blog.malwarebytes.com/botnets/2019/09/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign/https://blog.talosintelligence.com/2019/09/emotet-is-back-after-summer-break.htmlhttps://www.wired.com/story/what-is-credential-stuffing/https://www.sentinelone.com/blog/ryuk-ransomware-targets-av-solutions-not-just-files/https://www.zdnet.com/article/development-stops-on-powershell-empire-framework-after-project-reaches-its-goal/https://arstechnica.com/information-technology/2019/01/new-ransomware-rakes-in-4-million-by-adopting-a-big-game-hunting-strategy/https://arstechnica.com/information-technology/2019/09/worlds-most-destructive-botnet-returns-with-stolen-passwords-and-email-in-tow/https://news.sophos.com/en-us/2019/10/04/rolling-back-ryuk-ransomware/https://www.bleepingcomputer.com/news/security/dch-hospital-pays-ryuk-ransomware-for-decryption-key/https://www.emsisoft.com/ransomware-decryption-tools/https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-toolshttps://www.ncsc.gov.uk/guidance/mitigating-malwarehttps://www.secjuice.com/enterprise-powershell-protection-logging/https://docs.microsoft.com/en-us/windows-server/identity/software-restriction-policies/software-restriction-policieshttps://4sysops.com/archives/application-whitelisting-software-restriction-policies-vs-applocker-vs-windows-defender-application-control/http://woshub.com/how-to-block-viruses-and-ransomware-using-software-restriction-policies/https://docs.microsoft.com/en-us/sccm/sum/deploy-use/automatically-deploy-software-updateshttps://www.blackhat.com/docs/us-17/thursday/us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science-wp.pdfhttps://www.splunk.com/blog/2019/06/12/defending-against-common-phishing-frameworks-kits-with-splunk-enterprise-security-content-updates.htmlhttps://www.splunk.com/blog/2019/06/12/monitor-for-investigate-and-respond-to-phishing-payloads-with-splunk-enterprise-security-content-update.htmlhttps://www.splunk.com/blog/2017/07/06/hellsbells-lets-hunt-powershells.htmlhttps://digital-forensics.sans.org/blog/2012/12/17/protecting-privileged-domain-accounts-psexec-deep-divehttps://medium.com/@bromiley/digging-into-sysinternals-psexec-64c783bace2bEmotet:   https://attack.mitre.org/software/S0367/Trickbot: https://attack.mitre.org/software/S0266/PsExec:   https://attack.mitre.org/software/S0029/https://docs.microsoft.com/en-us/sysinternals/downloads/sysmonhttps://splunkbase.splunk.com/app/1914/https://github.com/MHaggis/sysmon-dfirhttps://www.zdnet.com/article/new-zealand-comcom-suffers-breach-after-laptop-theft/ *Further reading*https://www.cyber.gov.au/ism/guidelines-system-managementhttps://www.sans.org/reading-room/whitepapers/detection/disrupting-empire-identifying-powershell-empire-command-control-activity-38315https://www.cisco.com/c/dam/en/us/products/se/2019/2/Collateral/cybersecurity-series-threat.pdfhttps://www.staysmartonline.gov.au/   AUSCERT as a non-profit organisation aims to help all, and it is also my personal hope that this post will serve to empower Australians, even if in a small way.  Arriving during Stay Smart Online Week (7-13 October), it’s my pleasure to make this post to support the community, and their efforts in reversing or recovering from cybercrime.  For more information about Stay Smart Online week, please visit the dedicated Australian government website (see further reading). This post has been formed from a wide range of articles, blogs and publications (see reading list) and curious readers are encouraged to dig further if interested.  I will also highlight the important and informative efforts that those varying industry author groups or organisations have made, and continue to make. All efforts are critical in understanding the specific and evolving threats, and research made towards mitigation steps, or methodology formation.   Stay safe and stay smart! Colin Colin Chamberlain CISSP, GCFA, eCTHPSenior Information Security AnalystAUSCERT

Learn more

Blogs

AUSCERT: Whatโ€™s next in 2019?

AUSCERT: Whatโ€™s next in 2019? It’s been a month since the wrap up of our annual AUSCERT Cyber Security Conference and we’re now at the start of the second half of 2019. To kick things off for the rest of the year, allow us to recap a few initiatives we’ve accomplished in the industry and goals that our team’s looking forward to achieve in the next six months:  “It’s Dangerous to Go Alone” In honouring the theme from our conference, we have joined forces with the Council of Australasian Directors of Information Technology (CAUDIT) and Australia’s Academic and Research Network (AARNet) to create the Australasian Higher Education Cybersecurity Service (AHECS). Together with CAUDIT and AARNet, we are working together to address the industry’s unique cyber security challenges, with an aim to develop coordinated services that are tailored to the Australasian higher education and research sectors. This AHECS initiative will span across several tertiary institutions to build group strength and a trusted community through engagement, advocacy, and support. In addition to this, we continue to work with the Department of Premier and Cabinet and all of the Victorian Government workforce, one of the largest and most diverse enterprises in Australia – both in delivering our member services as well as providing their team with an in-house training module on the topic of ‘Incident Response Planning’ Both of these examples showcase our commitment for our members to “Empower their People, Capabilities and Capacities” by providing an extension of their workforces and channelling the expertise gained from an AUSCERT membership directly into their business processes.  Training courses with AUSCERT  We are continuing with our training workshop offerings to our members and the wider information security community by providing the following options:  Incident Response PlanningBe equipped with the tools to write a bespoke incident response plan for your organisation  MISPSet-up, configure and integrate Malware Information Sharing Platform into your organisation’s cybersecurity defense strategy  Cyber Security Risk ManagementGain the confidence to perform a risk assessment of cyber security risks and the ability to rate and assess business risks rather than technical vulnerabilities Introduction to Cyber Security for IT professionals Understand information security principles, cyber security as a risk to business objectives; and cultivate an appreciation of the current cyber threat landscape Cost $990 for members $1980 for non-members Customised in-house or group training options At AUSCERT we are also able to develop tailored industry and/or government content with each of our members and clients to ensure that the resulting workshop meets their needs and objectives – P.O.A  To find out more on each of these training courses – let us know what topic(s) you’re interested in, number of people from your organisation and city/state location – please contact us via membership@auscert.org.au  New services: MISP feed (AusISAC) and ADIR Over the past couple of years, AUSCERT has coordinated and run a highly-successful information sharing group for the tertiary education sector, and we are pleased to announce the establishment of an AUSCERT Information Sharing and Analysis Center (AusISAC); now available to general members. Members who join will be given access to our MISP platform, where we share a curated feed of threat intelligence gathered from multiple sources, and our own malware and threat analysis.  Cost of service: $20,000 Sign up now and receive a complimentary half-day remote MISP training session (we will cap these sessions at a maximum of 5 participants in each class!). Please note that members who subscribe to this service cannot use it for commercial purposes.  We have also launched the AUSCERT Daily Intelligence Report (ADIR) service. ADIR is a daily summary of information security news, with a focus on the Australian cyberspace. To sign up, send us an email via membership@auscert.org.au. UQ Cyber Security Initiative  One of the most exciting projects we’ve been lucky to be involved in this year has been our relationship and collaboration with colleagues from UQ’s School of Information Technology and Electrical Engineering through their Cyber Security Initiative. In the next six months or so, our collaboration with this team will continue to evolve in a few different ways:  1 August, public seminar by Professor Corey Schou from Idaho State University   30 September to 4 October, (ISC)2 and CISSP CBK training ‘UQ Cyber Squad’ – allowing students from any field of studies and course level to represent the University at local and international cyber-security competition  Mike Holm AUSCERT Operations Manager   

Learn more

Blogs

AUSCERT celebrates launch of new website

AUSCERT celebrates launch of new website AUSCERT is Australia’s original, and one of the world’s longest-serving, Cyber Emergency Response Teams (CERT). This year marks 26 years since we launched our specialist cyber-security services through The University of Queensland in 1993. Business Team Leader, Bek Cheb, said “We’ve seen so much change in the cyber-security industry over the past two and a half decades. In particular, the technology and people skills essential to providing high-quality cyber safety, data security and data protection have evolved radically. To mark our 26-year milestone, AUSCERT has launched a new brand image and website to further enhance the service we provide to members. The new site is easier to navigate and provides better access to security information. Members can download PGP/GPG signed versions of Security Bulletins; access information about member meetups hosted by AUSCERT; and keep up to date with industry news and the latest in information security issues. AUSCERT is a member-based not-for-profit organisation, so offers one of the best value threat intelligence and incident response services available. We are trusted by 500+ clients, including every university in Australia, a number of government departments and a variety of private companies. The AUSCERT services are numerous but revolve around providing specialist security support to help prevent, detect, respond to and mitigate cyber-based attacks. AUSCERT members receive timely threat and vulnerability alerts and access to a range of services including: Incident Management Service The Incident Management Service includes coordination and handling, providing assistance and expertise to help detect, interpret and respond to attacks from around the globe. AUSCERT acts as a trusted intermediary, coordinating communication about incidents between affected parties. Phishing Take-Down Service AUSCERT’s Phishing Take-down service works to reduce brand damage by requesting the removal of fraudulent websites. The service puts the safety of your brand at the forefront by detecting and acting immediately if your organisation is affected. Security Bulletin Service AUSCERT Security Bulletins contain information about threats, vulnerabilities, patches and workarounds of an IT security nature that AUSCERT believes would be of interest to our members (and the public). AUSCERT provides up-to-date information on a range of software and hardware products, published in a standardised format with a consistent approach to classifications of vulnerabilities, impacts and related operating systems. Member Security Incident Notifications (MSINs) AUSCERT provides Member Security Incident Notifications (MSINs) to members. These notifications are relevant and customised security reports containing notifications for organisations’ domains and IP ranges. These notifications can include more than one incident, so you remain up-to-date on the latest threats and vulnerabilities. A full list of services can be found here.

Learn more

Blogs

AUSCERT at 2019 FIRST Conference

AUSCERT at 2019 FIRST Conference I had the absolute pleasure of attending the 2019 FIRST Conference for the first time (no pun intended!) recently. FIRST is the Forum of Incident Response and Security Teams and it brings together a wide variety of security and incident response teams including especially product security teams from the government, commercial, and academic sectors. This year’s conference theme was “Defending the Castle” and there were approximately 1100 delegates, a very full program over 5 days and plenty of opportunities to meet other cyber security teams and share ideas across the board. One of the aspects I enjoyed thoroughly was my introduction to other CERTs from the Asia Pacific region and gaining a greater understanding of the role AUSCERT plays in this community.   (Photo credit: APCERT) I also wanted to take this opportunity to highlight a couple of my favourite speaker sessions here: “Waking up the Guards – Renewed Vigilance Needed to Regain Trust in Fundamental Building Blocks” by Merike Kaeo of Double Shot Security was my favourite keynote. Merike spoke about the days when trust was inherent and how we now see exploitation of fundamentals such as routing, DNS and certificates. She invoked the question of ‘How can we regain trust and control of where our data goes and by whom it is seen?’ and it really got me into thinking about the current cyber security landscape and how we can all do better in this space. The other speaker session I enjoyed was the talk presented by the Cisco Umbrella research team on the topic of “Detecting Covert Communication Channels via DNS”. I thought this was an absolutely fascinating subject and one that is worth further research within AUSCERT.  As the conference wrapped up at the end of last week, I walked away feeling very inspired about the fact that there is such a strong community spirit that fosters great collaboration within our industry. I am certain that AUSCERT and UQ can AND need to play an even more active role in the future! David Stockdale Director

Learn more

Blogs

AUSCERT2019: thatโ€™s a wrap!

AUSCERT2019: thatโ€™s a wrap! The annual AUSCERT Cyber Security Conference has wrapped up for another year. This industry-leading event was held across 4 days. More than 700 delegates heard from 50 speakers and attended an array of interactive workshops. They networked with industry professionals, learnt the latest and best practices in the cyber and information security industry, and some even got their hands on awesome prizes. Here’s a summary of conference highlights for those who couldn’t attend.   Sensational Keynotes AUSCERT2019 featured three legendary keynote speakers; Mikko Hypponen, Troy Hunt and Jessy Irwin. Each covered a different area within cyber security and shared their knowledge and expertise generously. Mikko is a globally-renowned tech security guru working as the CRO of F-Secure. He has written research for the New York Times, Wired and Scientific America also, frequently appearing on international TV. At the conference he spoke on ‘Computer Security: Yesterday, Today and Tomorrow’. A key takeaway from Mikko was on IoT devices. When observing data security, it is likely that in the future these devices will no longer tell you they are connecting to the internet, but will pass your data straight to the manufacturer. To view Mikko’s presentation, you can visit the AUSCERT YouTube channel here. Troy is an independent security trainer, speaker and Microsoft Regional Director. He’s most commonly recognised as the founder of the data breach monitoring and notification service ‘Have I Been Pwned’ (HIBP). Troy spoke on ‘The Data Breach Pipeline: How Our Data is Stolen, Distributed and Abused’. A key takeaway from his presentation was on password managers and how they can solve a lot of password-breach related issues. Changing your password regularly is no longer enough, you need more complex solutions. To find out more about Troy’s keynote, you can view his presentation here. Jessy is a security expert and Head of Security at Tendermint. Her role means she excels within translating complex cybersecurity problems into relatable terms and she also develops, maintains and delivers on comprehensive security strategy. Jessy spoke on ‘How Security Teams Can Evolve to Win Friends and Influence People’. Jessy’s intention was to challenge some standard ways of thinking within the cyber and information security industry and she certainly succeeded in doing so. To download a copy of Jessy’s presentation, please click here. Jessy’s presentation can be viewed here.   Networking Events The ‘Beers of the World’ session is the ceremonial welcome to all delegates attending AUSCERT2019. Attendees are encouraged to mingle with vendors, sponsors and other industry professionals while tasting an array of beers from around the globe. This is a great opportunity to connect with other industry professionals in a relaxing environment. On Thursday evening conference delegates were entertained at the venue’s poolside bar by the phenomenal crew from Jetpack Events who showcased their acrobatic prowess and delighted the audience with an amazing fireworks display. This year, the Gala Dinner theme ‘Legend of the Gala’ paid a subtle homage to our main conference theme and is derived from the ever popular Legend of Zelda video game franchise. We even saw a number of Zelda enthusiasts in full costume, kudos to them! Dinner guests were entertained by the talented speed painter Brad Blaze who wowed the audience with his Zelda inspired artworks.     Sponsors Booths Alongside the array of speakers were more than 50 sponsors and supporters of AUSCERT.. Each had their own designated booth space where they spoke to delegates and showcased their services. Some sponsors also engaged with delegates through interactive games and demos at their booth. There were hackathons, drone prizes and darts to name a few. A special shout-out to colleagues from Context Information Security who ran a PWNtoDrone CTF challenge which delegates enjoyed immensely. In between sessions, delegates were also able to engage in the annual lock-picking and lego building sessions. These interactive activities  provide a nice break for delegates to unleash their building and lock-picking skills; not to mention keeping the lego when you build it. Overall, AUSCERT2019 was huge success. We trust that all attendees enjoyed their time and ultimately learned new skills and strategies to keep their data and network safe in the new digital and mass-data era!

Learn more