Newsflash maandag 25 juni 2018
Blok: Internationale wetten gelden ook voor cyberspace
(security.nl)

International wetten gelden ook voor cyberspace en het is niet nodig om hier aparte regels voor te maken, zo liet minister Blok van Buitenlandse Zaken deze week tijdens een bijeenkomst in Den Haag over het zogenoemde "Tallinn Manual 2.0" voor internationaal recht weten.

Het Tallinn Manual 2.0 bevat een internationaal rechterlijk kader voor cyberoperaties. Volgens Blok is het belangrijk dat voor alle landen dezelfde regels gelden en ze zich hieraan houden.

"Dit principe is niet anders voor cyberspace. Het is niet de technologie die de regels bepaalt; Wij doen dat: de gebruikers", aldus de minister. Hij ging verder door te stellen dat het niet nodig is om nieuwe internationale wetten voor dit doel op te stellen.

Overheid waarschuwt voor valse e-mails van MijnOverheid
(nu.nl)

De Fraudehelpdesk en de overheid waarschuwen voor bedrieglijk echt lijkende e-mails van MijnOverheid, waarmee de verzender probeert de DigiD-gegevens van ontvangers te ontfutselen.

In de mail staat dat dat de ontvanger een bericht "van de Belastingdienst in uw Berichtenbox op MijnOverheid" heeft. Het e-mailbericht lijkt betrouwbaar, omdat het potentiële slachtoffer in de aanhef met voor- en achternaam wordt genoemd.

In werkelijkheid leidt een link in de e-mail naar een nepwebsite met een aanmeldscherm van DigiD. MijnOverheid maakt op de website duidelijk dat het om een phishingmail gaat. "Deze e-mail is een goede imitatie van berichten die daadwerkelijk vanuit MijnOverheid worden verstuurd", waarschuwt de Fraudehelpdesk.

Autoriteit Persoonsgegevens waarschuwt voor AVG-oplichting via 'boetes'
(tweakers.net)

De Autoriteit Persoonsgegevens krijgt meldingen van organisaties dat ze gebeld worden met het verzoek boetes te betalen omdat hun website niet aan de algemene verordening gegevensbescherming zou voldoen. Volgens de AP gaat het om een oplichter.

Volgens de Autoriteit Persoonsgegevens gaat het niet om een incident. "Het is moeilijk in te schatten hoeveel organisaties benaderd zijn door de oplichter. We hebben er vijf telefoontjes over gekregen. Dat was voor ons voldoende aanleiding hiervoor te waarschuwen", zegt AP-woordvoerster Sandra Loois tegen Tweakers.

De oplichter dreigt uit naam van de Autoriteit Persoonsgegevens telefonisch met boetes van duizend euro omdat de websites van de organisaties niet aan de AVG zouden voldoen.

Meet TLBleed: A crypto-key-leaking CPU attack that Intel reckons we shouldn't worry about
(theregister.co.uk)

Intel has, for now, no plans to specifically address a side-channel vulnerability in its processors that can be potentially exploited by malware to extract encryption keys and other sensitive info from applications.

A team of researchers at the Systems and Network Security Group at Vrije Universiteit Amsterdam, in the Netherlands, say they were able to leverage the security weakness to extract crypto keys from another running program in 99.8 of tests on an Intel Skylake Core i7-6700K desktop CPU; 98.2 percent of tests on an Intel Broadwell Xeon E5-2620 v4 server CPU; and 99.8 per cent of tests on a Coffeelake part.

Their code was able to lift a secret 256-bit key, used to cryptographically sign data, from another program while it performed a signing operation with libgcrypt’s Curve 25519 EdDSA implementation.

PageUp 'victimised' by disclosure laws: MacGibbon
(itnews.com.au)

Australia’s national cyber security adviser has blamed a “conflict of laws” for forcing PageUp People to disclose last month’s malware infection before it could properly assess the damage caused.

Alastair MacGibbon told CEDA’s state of the nation conference in Canberra today that premature disclosure of the incident led to the Australian recruitment cloud service provider being “in a sense ... victimised”.

MacGibbon went beyond comments he made last week in support of PageUp - which also played down the the likelihood that data was exfiltrated when unauthorised entry to parts of its systems took place.

Cracking Cortana: The Dangers of Flawed Voice Assistants
(darkreading.com)

Researchers at Black Hat USA will show how vulnerabilities in Microsoft's Cortana highlight the need to balance security with convenience.

Security vs. convenience is a delicate balance to strike with new technology designed to make our lives easier. Vulnerabilities in voice assistants like Microsoft's Cortana and Amazon's Alexa are perfect examples of how the rush to simplify can cause complicated problems down the road.

Consider Cortana, which is enabled by default in Windows 10. Cortana was built to facilitate vocal interaction with laptops, desktops, smartphones, and IoT devices running Microsoft's newest OS, and it's becoming more common in the enterprise as organizations deploy Windows 10 across their environments.

You used to build a wall to keep them out, but now hackers are destroying you from the inside
(wired.com)

Some time in 2017, a casino in North America hired Darktrace, a British cybersecurity company, about a data leak it was experiencing. Most cybersecurity firms promise to block outside attackers from penetrating your organisation, but Darktrace, founded by former MI5 operatives and Cambridge mathematicians, deploys a subtler approach.

It uses machine learning to get to know a company from the inside – well enough that it can spot any deviation from the normal patterns of daily work. When the system spots something suspicious, it alerts the company.

Darktrace usually tells its customers not to expect much useful information in the first week or so, when its algorithms are busy learning. In this instance, though, the system almost immediately reported something odd: data leaking out of a fish tank.

Lloyds banking app crashes over weekend
(bankingtech.com)

Lloyds’ banking app crashed on Saturday (23 June) leaving customers unable to log in. On Twitter, users complained or seemed baffled by the situation:

“Anyone having an issue with Lloyds Online Banking / App it is saying it can’t show my account information and that my balance is N/A.” “Anyone else not able to get on Lloyds banking?”

A Lloyds spokesperson said: “We are aware that some of our customers have experienced intermittent problems logging on to their online banking this morning [23 June]. “We are working to resolve the issue as quickly as possible, and apologise for any inconvenience caused.”

Schneier warns of 'perfect storm': Tech is becoming autonomous, and security is garbage
(theregister.co.uk)

With insecure computers in charge, the healthcare and transportation sectors have become a nexus of security problems, infosec veteran Bruce Schneier warned delegates at Israel Cyber Week.

Schneier said that confidentiality attacks, such as leaks of personal information, are being replaced by more dangerous integrity and availability attacks.

Schneier told El Reg after his speech: "Everybody understands what might happen if your pacemaker is hacked and it delivers a lethal charge, but what if I took over some inter-connected robot toy and tripped you in your house? It's a little more subtle.

New Drupal Exploit Mines Monero for Attackers
(darkreading.com)

A new exploit of a known vulnerability gives an attacker control of the Drupal-hosting server.

A newly discovered vulnerability in Drupal has been exploited to turn infected systems into Monero mining bots. Worse, the vulnerability could easily be exploited to do far more than simply steal resources and performance.

Researchers from the Trend Micro Smart Home Network and IoT Reputation Service Teams found the exploits of CVE-2018-7602, a remote code execution vulnerability in Drupal 7 and 8. While the vulnerability was patched on April 25, 2018, many users have yet to move to the current version, leaving an unknown number of Drupal-based websites vulnerable.

GDPR forgive us, it's been one month since you were enforced…
(theregister.co.uk)

A month after the enforcement date of the General Data Protection Regulation – a law that businesses had two years to prepare for – many websites are still locking out users in the European Union as a method of compliance.

To celebrate the milestone, El Reg is casting a vulture's eye over the sites that are giving a new meaning to the phrase "barrier protection".

Among the sites that Reg readers have moaned to us about are talk show podcast DrLaura.com, vintage clothes outlet ModCloth and American sports shop Dick's Sporting Goods.

Supreme Court: Your digital location is protected by the Constitution
(computerworld.com)

The U.S. Supreme Court today ruled that access to historical cell-site records of a person's location based on their mobile phone will require law enforcement to obtain a warrant before searching a person's historical location records.

This is the first time the high court has ruled on whether a phone subscriber has a legitimate expectation of privacy regarding a telephone company's records of their cellphone location data, according to Aloke Chakravarty, a partner in the Denver-based law firm of Snell & Wilmer.

"This is a landmark case for privacy, and how the court will deal with emerging technologies going forward," Chakravarty said via email. "It creates a new lens through which to view a government's ability to obtain third-party records where a criminal defendant neither possesses the records, doesn't have a property interest in them, may not even know they exist, and he cannot personally even access them."

Smartphone batteries can reveal what you typed and read
(theregister.co.uk)

A group of researchers has demonstrated that smartphone batteries can offer a side-channel attack vector by revealing what users do with their devices through analysis of power consumption.

Both snitching and exfiltration were described in this paper (PDF), accepted for July's Privacy Enhancing Technologies Symposium.

Nobody needs to panic yet, because the attack isn't yet more than a decently-tested theory and it would be hard to execute. But there's also a real-world implication because the paper shows how a too-free API can help attackers in ways its designers never imagined.

Thermostats, Locks and Lights: Digital Tools of Domestic Abuse
(nytimes.com)

The people who called into the help hotlines and domestic violence shelters said they felt as if they were going crazy.

One woman had turned on her air-conditioner, but said it then switched off without her touching it. Another said the code numbers of the digital lock at her front door changed every day and she could not figure out why. Still another told an abuse help line that she kept hearing the doorbell ring, but no one was there.

Their stories are part of a new pattern of behavior in domestic abuse cases tied to the rise of smart home technology. Internet-connected locks, speakers, thermostats, lights and cameras that have been marketed as the newest conveniences are now also being used as a means for harassment, monitoring, revenge and control.

How Blockchain Can Disrupt The Card Payments Industry — And Why It Hasn’t Already
(hackernoon.com)

Blockchain is a buzzword that is starting to lose its buzz. The word is thrown around constantly, and often people have little idea what it means. But the technology does have value, and it doesn’t just have to be an esoteric term. Instead, the blockchain has the capability disrupt and change a number of industries.

The card payments industry is one of them. While card payments may be convenient for shoppers, the merchants have been footing the bill for this convenience with the high processing fees charged by the card processing intermediaries.

Since blockchain technology is based on the core principle of “decentralization,” it provides an opportunity to breakthrough the multiple “middlemen fees” with an alternative low-fee digital payments network. And, besides convenience, merchants can share these savings in processing fees with their shoppers to elevate their experience to a whole new level.

Microsoft turns to blockchain to track royalty payments
(itnews.com.au)

Microsoft is hoping blockchain will make it easier to keep track of who is owed royalties for their contribution to games.

The software vendor teamed up with EY to create the solution, which is built on the Quorum blockchain protocol and “Microsoft's Azure cloud infrastructure and blockchain technologies”.

Quorum itself is an enterprise-focused modification of the core software behind Ethereum. It is being led by JP Morgan.

Codebreaking Bombe moves to computer museum
(bbc.com)

The UK's National Museum of Computing has expanded its exhibits celebrating the UK's wartime code-breakers and the machines used to crack German ciphers. On Saturday it will open a gallery dedicated to the Bombe, which helped speed up the cracking of messages scrambled with the Enigma machine.

The Bombe was formerly on display at Bletchley Park next door to the museum. A crowd-funding campaign raised £60,000 in four weeks to move the machine and create its new home.

The replica Bombe is a copy of the electro-mechanical machines used in World War II at Bletchley. It was designed to discover the settings used by German Enigma machines to scramble messages, and make them unreadable.