A Security Vulnerability in the KmsdBot Botnet

Read Time:26 Second

Security researchers found a software bug in the KmsdBot cryptomining botnet:

With no error-checking built in, sending KmsdBot a malformed command­—like its controllers did one day while Akamai was watching­—created a panic crash with an “index out of range” error. Because there’s no persistence, the bot stays down, and malicious agents would need to reinfect a machine and rebuild the bot’s functions. It is, as Akamai notes, “a nice story” and “a strong example of the fickle nature of technology.”

Read More

Dark Data: What is it? How can you best utilize it?

Read Time:7 Minute, 3 Second

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. 

Data continues to be a valuable asset for an organization and plays a crucial role in making operational and strategic business decisions. With the growth of hybrid, private, and multi-cloud models, much of the data is stored on these platforms and becomes vulnerable to malicious activities and potential data leaks.

Amid the vast volume of data, some of the data remains unknown, untapped, and unused with an organization’s architecture. This dark data is generated by users’ daily online interactions between several devices and systems.

Dark data might seem like a scary term, but it isn’t, though it poses some risks. Since its percentage of data is rising more quickly than organizational data, business organizations are getting concerned about it. Hence, to grasp what dark data is and what issues it signifies, it’s essential to understand it from a broader perspective.

What Is dark data?

Dark data is the type of organizational data whose value is not identified; hence, it can be crucial business data or useless data. A research report published by BigID reveals that 84% of organizations are seriously concerned about dark data. This data consists of the additional information collected and stored during daily business activities. But perhaps to your surprise, the organization may be unaware of the dark data and typically doesn’t use it.

Dark data tends to be unstructured data that contains sensitive and unclassified information. The research report further reveals that eight out of ten organizations consider unstructured data the most critical to handle and secure. Dark data can be classified as follows:

Emails, images, audio, video, and social media posts.
Application trials including API caches and encryption keys such as VPN or SSH support.
Data stored in overlooked virtual images activated or installed in local or cloud infrastructure.
Forgotten unstructured data created on various database engines a long time ago.
Customers and the company’s employees own data on the desktop and mobile devices.
The hidden data file in a file system can be in the form of old pictures, scanned documents, pdf forms, notes on MS Word documents, and signed files.

Dark data might seem benign, but it holds most of the organization’s information. Thus, it can pose significant security risks if it falls into the wrong hands, like leaking a company’s sensitive data and damaging its industry reputation. This is particularly alarming for organisations that do not use a reliable VPN or any other security tools to ensure data privacy and safety.

How can you utilize dark data to help your business?

Dark data seems challenging to handle and involves lengthy manual processes, but companies need to automate these processes. Technological advancements such as the use of AI have made it easier for companies to explore and process unstructured data.

Another important use of dark data is its role in boosting AI-powered solutions. As more and more data exists, the information that AI can analyse to produce even deeper insights. Alongside Artificial Intelligence, you can also use Machine Learning technology to discover untapped and unused data and insights. These insights might help organizations make more informed decisions regarding incoming data. Also, it guides them toward taking practical steps in response to their data.

Implementing AI and ML systems needs internal structural changes for businesses, costing organizations a great deal of time and money. However, the benefits will be a high return on investment, so do invest in it.

Besides this, organizations can use dark data to create management strategies around IoT technology to provide long- and short-term trend analyses to show possible results to managers and senior leadership.

Another way dark data can prove helpful is by developing new and productive business strategies. This helps enterprises analyse which department owns what type of data different employees and management hold. Moreover, it can help improve the quality assurance processes that detect and correct errors. Also, it looks for potential privacy loopholes, vulnerabilities, and compliance violations.

Dark data can improve business by creating revenue, streamlining processes, and reducing costs. It is capable of understanding the relationships between unrelated pieces of information.

Thus, analysing information like server log files can give insight into user behaviour, customer call records, geolocation data, and preferences that can reveal traffic patterns and help in further improving and expanding their business.

Hidden dark data cybersecurity risks

Dark data isn’t going away anytime soon; hence, organizations should consider it a big challenge and poses significant cybersecurity risks. Here are some of the issues that dark data brings along it:

Compliance violations

There are greater chances that the organization’s dark data might violate the data privacy compliance mandates and regulations like the GDPR, PCI DSS, or HIPAA. The organization itself has no idea about this violation unless a breach occurs. In such a situation, the regulators and the clients become extremely angry for not protecting the data. Also, the organization might face lawsuits, sanctions, and hefty fines.

Unused business security intelligence

Another drawback of dark data stored within your organization is that enterprises fail to utilize all security intelligence. For instance, the dark data assets also include system log files that can be used to create more accurate threat and anomaly detection or cyber risk assessment models. But when it goes overlooked, enterprises might experience a hacking or data breaching incident, and they regret it later because they have a way to secure themselves but ignore it.

Increased risk of cyber-attacks

As you store more and more business data on local servers and within the cloud environment, it becomes more challenging to discover, reuse, or retrieve user data – which may increase the risk of a data breach.

When people within an organization don’t know what information each data set contains, it can result in confusion about who can access it and who is unauthorized. Moreover, the poorly categorized data even lead to significant permission challenges. Any unauthorized person accessing sensitive information simply puts your business on the verge of a possible data breach or leaks of critical business data. If the wrong individuals are accessing sensitive information, you’re putting your business at risk of a data breach.

Besides this, dark data also causes opportunity costs to an organization. If a company decides not to invest in the evaluation and processing of dark data, but its competitors do so, they likely fall behind. Hence, the organization pays the cost of lost opportunities.

How to handle dark data?

Despite using dark data constructively, there are some other ways that you can adopt to handle dark data more efficiently and in a well-organized manner. Here are some of these ways:

Use strong encryption standards for your business data to prevent data security issues and add an extra security layer to your online data. Organizations need to apply this practice to in-house servers and data shifting in the cloud environment. Using a reliable VPN provider can provide a top-notch level of encryption and online security.
Organizations must implement data retention policies and remain compliant with the data protection regulation. This allows them to store users’ data for a limited time and helps prevent lawsuits or fines. Also, good data retention policies retain valuable data for later use.
You need to perform regular audits of the database. It includes classifying and structuring data and gives an idea of where what kind of data is stored. Later if you need the data, you can find it easily in an organized database instead of an unorganized form.
Organizations need to take control of dark data with an appropriate data governance plan. Companies can improve compliance and overall productivity with a robust plan in function.

Final thoughts

An organization produces lots of data every day. In an era where cyberattacks are increasing at an unprecedented rate, protecting and governing different data types is an uphill task. Dark data is one of the data types that’s tough to handle and secure. It brings multiple cybersecurity risks like legal and regulatory issues, intelligence risks, and increased attack surface.

However, if you know the appropriate strategies, you can make good use of the dark data as discussed above. If used constructively, dark data can bring increased success to your business; if not, it can cause havoc, so now the choice is yours.

Read More

Microsoft Exchange ProxyNotShell vulnerability explained and how to mitigate it

Read Time:45 Second

Last year, two high severity, easily exploitable Microsoft Exchange vulnerabilities dubbed ProxyLogon and ProxyShell made waves in the infosec sphere. Nearly a year later, Exchange Server admins are met with another threat: ProxyNotShell, which in fact is a vulnerability chain comprising two actively exploited flaws:

CVE-2022-41040 is a server-side request forgery (SSRF) vulnerability that an authenticated attacker can exploit for privilege escalation. This vulnerability occurs because the root cause of ProxyShell’s path confusion flaw remains, as explained further below.
CVE-2022-41082 is a deserialization flaw that can be abused to achieve remote code execution (RCE) in Exchange’s PowerShell backend once it becomes accessible to the attacker. 

Both vulnerabilities impact Microsoft Exchange Server on-premises and hybrid setups running Exchange versions 2013, 2016, and 2019 with an internet-exposed Outlook Web App (OWA) component.

To read this article in full, please click here

Read More

How to Browse Privately on Your Phone

Read Time:5 Minute, 29 Second

Your phone is likely a daily companion, giving you access to work emails, chats with friends, weather reports, and more — all in the palm of your hand. You can also use your phone for browsing online, looking up everything from your favorite recipes to your most-read media webpages. 

While being able to browse whenever and wherever you want is convenient, you might prefer that your phone doesn’t save all your online searches. For example, if you frequently let other people use your phone, you may not want them to have access to a history of your Google searches. In this case, you can use private browsing or “incognito mode.” 

This allows you to browse online without leaving any trace of your browsing activity on your mobile phone. Configuring your phone to use incognito mode can give you greater confidence while surfing online, as you’ll enjoy the peace of mind that comes with knowing your browser history isn’t recorded on your device.  

This article explains what incognito mode is and how you can set it up on your mobile phone. 

What is Incognito Mode?

Incognito mode allows you to browse online without leaving certain data on the device you’re using. Also referred to as private browsing mode, it makes sure there’s no record of your search engine history, websites you visited, and even login details (and related passcodes) on that device.  

As soon as you close the incognito web browser window, any cookies are erased and all these details disappear instead of being saved. 

That said, if you leave an incognito browser window open on your phone — and then hand your phone to someone else — they’ll be able to see the activity. So, if you want to make the most of incognito mode, make sure to close the browser window after every surfing session.  

Further, if you actively bookmark a page, it will be saved — even if you’re in incognito mode. Read on for some more caveats surrounding incognito mode and the extent of privacy it gives you. 

Is incognito mode really private browsing?

It’s important to note that incognito mode or private browsing mode is a device-specific privacy measure. It makes sure that your search and web browsing history isn’t visible on the device itself.  

However, your traffic and activity are both still visible to third parties beyond your device, such as your network admin, internet service provider (ISP), and the websites and search engines that you visit. 

Viewing in private or incognito mode also won’t disguise your unique IP address from these parties. Incognito mode further doesn’t secure your device against cyberthreats like hackers.  

That said, there are plenty of other tools you can use to safeguard your device against cybercriminals. For example, McAfee+ helps to secure your Wi-Fi connection, shield you from malicious websites or links, and detect malware. 

Can I Get Incognito Mode on my Phone?

You may already be familiar with incognito mode through your computer. For example, many people set up incognito mode through browsers like Mozilla Firefox, Google Chrome, Safari, Microsoft Edge, or Internet Explorer.  

However, incognito mode isn’t just for computers — you can also use it on your phone’s web browsing apps. 

How to turn on incognito mode

The steps to setting up incognito mode are fairly straightforward. That said, it depends largely on which type of device you have.  

Setting up private browsing or incognito mode for an Android isn’t the same as setting it up for iOS. Read on to learn how to go incognito whether you’ve got an Apple iPhone or an Android phone like Samsung. 

Private browsing on your Android device

The process for setting up incognito mode also varies based on the browser you’re using. Here’s how to set it up in the Google Chrome browser for your Android (note that the Google Chrome app is the default browser for most Android phones): 

Open Chrome. 
Tap the three dots at the top-right corner of the screen. 
Tap “New incognito tab.” This will open up a new incognito window. 
Close the incognito window to end the incognito session. 

Remember, for Google Chrome’s incognito mode to do the trick, you need to close your browsing session after each use. If you leave the tab open and someone else uses your phone, they can see your activity. 

Private browsing on your iPhone 

For iPhones, the default browser is Safari. Here’s how to set up private browsing in Safari for your iPhone: 

Open Safari. 
Tap the tab icon at the bottom right of the screen (it looks like two overlapping squares). 
Tap “private” at the bottom-left of the screen. 
To exit private mode, tap “private” again. 

Again, remember to close your browser’s private tabs when you’re done surfing. This makes sure that cookies are deleted and the private session is safely hidden from your device’s history. 

Do certain apps offer incognito mode?

The above steps can help you set up incognito mode on your Apple or Android phone’s browser. However, you probably use your phone for much more than browsing.  

You might have apps for watching videos, getting driving directions, listening to music, and more. And the tips above will only protect your privacy when using the phone’s browser — not apps. 

That said, some apps offer their very own in-app incognito mode. Examples include YouTube, Google Maps, Spotify, and Instagram. Other apps simply offer the option of private sessions, requiring you to log in with a dedicated username and password if you’re going to use the app. These include Whatsapp, Dropbox, Amazon, PayPal, and Evernote.  

Some of these apps can even be configured so they’re only unlockable with touch ID or face ID. 

Enhance Your Device’s Security

Browsing in incognito or private mode on your phone allows you to surf online without leaving any trace of your search history on that specific device. However, it doesn’t block third parties like your internet service provider or network administrator from seeing what websites you’ve visited. Only your phone is affected. 

Incognito mode also doesn’t protect you against potential cyberthreats, like malware. To stay safe and browse with confidence, consider McAfee Mobile Security. It includes Wi-Fi privacy protection, browsing safeguards, shields against unauthorized third-party activities, and more — and it works for Android and iOS devices. Find out more. 

The post How to Browse Privately on Your Phone appeared first on McAfee Blog.

Read More