Cyber-threats keep evolving
Cyber-criminals have sent millions of fraudulent emails as crude, random attacks, hoping to trick people to reveal their personal or financial information. As organisations and people worked out how not to respond, cyber-criminals began switching to bespoke targeted attacks. These use advance reconnaissance, research and testing, using use specialised knowledge and details about targets to try by-pass defences and penetrate organisations’ networks. They’re more lucrative than random cyber-attacks.
Trend Micro, a global cyber-security firm, has published a white paper available through Health IT Security. Navigating the evolving threat landscape with a more complete approach to network security deals with:
- How targeted attacks change network security landscapes
- Responding to increasingly complex threats
- A cross-generational approach to network security
- Security fuelled by market-leading global threat intelligence
- Detection techniques comprising a smart network defence
- Integration with other security solutions
- Seamless threat intelligence sharing
- Centralised visibility and control.
Its findings from 264 organisations are alarming:
- 80% had experienced a network-based attack or exploit
- 90% had active command and control activity on their network
- 65% had been infected by zero-day or unknown malware
- 17% were being actively breached.
Zero-day vulnerability is an important concept in cyber-security. It’s an undisclosed software vulnerability that cyber-criminals and other hackers can exploit to disrupt computer programs, data, additional computers and networks.
An effective response, Trend Micro says, has to be “smart, optimized and connected.” Part of this is sophisticated cyber-security tools that operate alongside existing platforms and applications. Rigorous integration and interoperability ensures a stronger defence. These other technologies include:
- Security Information and Event Management (SIEM)
- Vulnerability assessment and management
- Application security
- Next-generation firewalls
- Breach detection
- Visibility and enforcement of Transport Layer Security (SSL), derived from Secure Sockets Layer and including encryption
- Software-defined networking and the cloud
- Network Packet Brokers (NPB) that optimise incident analyses by enabling ICT and security services to acquire situational awareness and security intelligence about intrusion and extrusion incidents, enabling faster incident responses
- Incident response automation.
Africa’s health systems should consider enhanced cyber-security as part of their eHealth strategies. It’s affordability can measured against the estimated costs of cyber-security breaches.
- 368 views
- September 19, 2017
- Tom Jones
Bitpaymer’s offspring disrupts hospitals
A variant of Bitpaymer ransomware’s been breaching hospital’s ICT. It’s been in Scotland’s Lanarkshire Trust, previously breached earlier this year by WannaCry, reported on eHNA. Some operations were cancelled, GPs’ work disrupted and patients asked to attend Accident and Emergency only if their needs were essential. ZDNet has a report saying systems were taken offline. Perpetrators say they’ve gathered "private sensitive data."
Unlike most hacks that prefer to be covert, ransomware makes contact with users to ask for a ransom in return for a decryption key. The ransom request was very high, some 50 bitcoins, about £168,000, US$218,000. Failure to pay may result in the cyber-crooks sharing data they’ve acquired.
ZDNet has short ransomware guide. Ransomware: An executive guide to one of the biggest menaces on the web. Other guides are Remove All Threats has a guide on removing Bitpaymer. Protect PC Health has a guide too. Both are for PCs.
- 634 views
- September 11, 2017
- Tom Jones
IBM’s cyber-threat index shows it’s increasing
eHNA’s covered many cyber-threats reports. The IBM X-Force Threat Intelligence Index 2017 puts them into perspective. It’s not good. It sees 2016 as a defining year for cyber-security.
Three themes are Distributed Denial of Service (DDoS) attacks, loads of records leaked through data breaches and a step up by organised cyber-crime on businesses. Over four billion records were leaked, more than the combined total 2014 and 2015.
Mega breach was redefined, with one source leaking over 1.5 billion records. The average cyber-security events of IBM® X-Force®’s clients exceeded 54 million, 3% up on 2015. An event’s illicit activity on a system or network detected by a security device or application.
Attacks are security events classified by correlation and analytics tools as malicious activity attempting to collect, disrupt, deny, degrade or destroy information system resources or its Information. X-Force found an average of 1,019 attacks, a 12% decrease compared to 1,157 attacks in 2015.
Incidents are security events worthy of further investigation by IBM security analysts. It’s better news. Average incidents were down to 94 in 2016, a 48% drop from 2015’s 178. This doesn’t automatically mean cyber-security’s safer. It may be that cyber-attackers rely more on proven attacks that need fewer attempts. It’s also inconsistent with the combination of huge record leaks and a record year of vulnerability disclosures.
There were many notable leaks in 2016 involving hundreds of gigabytes of email archives, documents, intellectual property and source code. They exposed organisations’ digital footprints. Previous data breaches were often fixed sets of structured information. Examples are credit card data, passwords, national ID numbers and Personal Health Information (PHI) data. This’s a paradigm shift.
X-Force’s report profiles a range of cyber-attack methods. They’re:
- Cross-Site Scripting (XSS)
- Physical access
- Brute force
- Watering hole
- Structured Query Language Injection (SQLi)
The analysis and overview are extremely valuable for Africa’s heath executive and ICT teams. Web application vulnerability disclosures made up 22% of all vulnerability disclosures in 2016. Injecting unexpected items manipulating data structures comprised 74% of all cyber-attacks. These are a few of the priorities.
- 1,059 views
- August 16, 2017
- Tom Jones
WannaCry and NotPetya don’t need eHealth users
Africa’s health systems need to match ransomware attacker’s sophistication. Neither Wanna Cry nor Not Petya, the latest types of attack, relies on files and users’ clicks to open email attachments. Instead, they seek systems vulnerabilities to access and spread across networks. Barkly, a cyber-security firm, describes it as misusing legitimate system tools and processes. Unlike previous methods of using suspicious executables, the new wave can avoid scrutiny from some cyber-security products. A Barkly’s video shows how they work.
Its solution includes:
- Learn how cyber-attackers exploit tools to spread ransomware without files and interaction instead of phishing emails
- Know why attacks that don’t use interaction are becoming more popular, with two thirds of ransomware in Q1 2017 using the Remote Desktop Protocol (RDP) from Microsoft.
- Test your security against fileless attack scenarios using a malware simulation tool.
This approach may help Africa’s eHealth programme to step up their cyber-security measures for ransomware. Simulation’s better than dealing with a ransomware aftermath.
- 666 views
- July 07, 2017
- Tom Jones
Is NotPetya a shift in ransomware’s goals?
After Wanna Cry, came NotPetya. A report from Forbes says it’s not typical ransomware that aims to make illicit money. It describes it as more devastating. It can inflict permanent damage to data and hard drives.
The Grugg, a research outfit, says NotPetya looks like Petya, ransomware. There’s code sharing, but Petya was a criminal, money-making enterprise. NotPetya’s designed to spread fast and cause damage under a plausible ransomware front. The Grugg says it was a direct attack on Ukraine.
It spread to organisations globally, so what does it mean for Africa’s eHealth? First, it could be collateral damage to an offensive cyber-attack on an external country. Next, it emphasises the need for regulate backups not connected to the eHealth networks. Third, it’s vital to keep systems and anti-virus and cyber-security services up to date with the latest upgrades and updates.
As a shift in emphasis for ransomware, NotPetya means that cyber-security measures and performance have to be increasingly effective and vigilant. It looks like there’s more and worse to come.
- 522 views
- July 05, 2017
- Tom Jones
Symantec’s issued advice about WannaCry
Now that the dust from WannaCry’s receded, but may not yet be settled, more information’s emerging. It’s an important part of Africa’s eHealth programmes build-up of cyber-security defences.
Symantec, the cyber-security firm says it’s confident it can beat WannaCry. The virulent ransomware strain breached hundreds of thousands of computers worldwide since it emerged on 12 May 2017. It’s much more dangerous than other ransomware types because it can spread rapidly across an organisations’ networks by exploiting vulnerabilities in Windows not patched by the Microsoft release MS17-010 in March 2017. The exploit, Eternal Blue, was released online in April as part of a series of leaks by the Shadow Brokers group that claimed it stole the data from the Equation cyber espionage group.
WannaCry searches for and encrypts 176 different file types, and appends .WCRY to the end of file names. It than asks users to pay a US$300 ransom in bitcoins. The ransom note says the amount will double after three days. If payment’s not made after seven days, it says the encrypted files will be deleted. Despite this, Symantec hasn’t found any code in the ransomware which would cause files to be deleted. Symantec does not recommend paying the ransom.
Decrypting encrypted files isn’t possible yet. Symantec’s researchers are investigating the possibility. If you have backup copies of affected files, you may be able to restore them.
Symantec’s identified two possible links loosely connecting WannaCry ransomware and the Lazarus Group. Shared code between Lazarus tools and the WannaCry ransomware’s a type of Transport Layer Security (SSL), a computing protocol to ensure data security sent by the Internet using encryption. Symantec sees this as justifying further investigation.
Some files may be recovered without backups. Files saved on Desktop, My Documents, or removable drives are encrypted and their original copies wiped, so not recoverable. Files stored elsewhere are encrypted and their original copies deleted. They could be recovered using an undelete tool.
Symantec and Norton customers are protected against WannaCry by a combination of technologies. Proactive protection was provided by:
- IPS network-based protection
- SONAR behaviour detection
- Advanced Machine Learning (AML)
- Intelligent Threat Cloud (ITC).
Customers should have these technologies enabled for full proactive protection. Symantec Endpoint Protection (SEP) customers are advised to migrate to SEP 14 to take full advantage of AML signatures.
- 553 views
- June 05, 2017
- Tom Jones
A checklist can help combat ransomware
As ransomware ratchets up as a cyber-security threat, extra and effective vigilance’s essential. WannaCry, reported on eHNA shows how it’s a bigger risk and priority. A ransomware checklist and kit as part of a seven file download from Sophos, a cyber-security firm provides timely advice. It has two main parts, essential technologies and best cyber-security practices. These are valuable for Africa’s eHealth.
There are two main types of ransomware attacks. One’s a plausible-looking email that’s booby-trapped email with a malicious attachment. The other’s from a compromised website. Both download ransomware when users click on links that work their way endpoints and servers. It seems that WannaCry stepped this up. It scans and hunts for vulnerabilities and includes a worm that extends across networks.
If ransomware reaches endpoints and servers it’s essential it’s blocked and removed promptly, This may need tools. An example’s CryptoGuard Technology. Solutions must:
- Complements existing cyber-security
- Block processes trying unauthorised changes to data
- Work against local and remote encryption
- Automatically undo changes to avoid data loss
- Exploit prevention by stopping ransomware exploiting weaknesses in other software products.
Host Intrusion Prevention System (HIPS) with behaviour and file analytics are important too. Tech Support Alert has a description of HIPS as a program that alerts users to malware programs such as a virus trying to run on users’ computers or that an unauthorised users such as a hacker may have accessed them. It achieve this by examining files’ components and structures of files for malicious elements and seeking code trying to modify registries.
Other cyber-security technologies include:
- Web security scans checking web content for ransomware code
- Malicious Traffic Detection (MTD) looking for traffic to ransomware command and control servers, then blocking it when it’s found
- Application control that restricts applications allowed to run
- Blocking Wscript often used by ransomware
- Application whitelisting to establishes a default deny policy on servers so only trusted applications can run, so preventing ransomware gaining a foothold
- Stopping email threats using defences blocks ransomware emails
- Time-of-click protection stops users clicking on links to websites hosting ransomware, even if they’re safe when they entered inboxes
- Cloud-sandboxing to find zero-day threats that exploit unknown vulnerabilities by rigorously testing files in safe environments before users run them
- Web gateways block web-borne ransomware before they reach users’ endpoints, such as:
o URL filtering that blocks websites hosting ransomware and stops ransomware communicating with its command and control servers
o Web filtering enforcing strict controls on ransomware file types, stopping them downloading
- Backup regularly and keep recent backup copies off-line and off-site to minimise data loss
- Don’t enable macros in document attachments in emails because many infections rely on turning macros on
- Always be cautious about unsolicited attachments, and check with senders
- Don’t have more login power than needed because admin rights may expand a local infection across networks
- Consider installing the Microsoft Office viewers to see what documents look like without opening them in Word or Excel
- Patch early and often so there are fewer holes for ransomware to exploit
- Keep up to date with new security features in business applications.
These activities reveal the considerable range of activities needed for effective cyber-security. As threats become more sophisticated and effective, Africa’s eHealth needs to keep up with modern cyber-security.
- 461 views
- May 22, 2017
- Tom Jones
Cyber-criminals like Ransomware
Ransomware’s a favourite with many cyber-criminals. It’s cheap to produce and can provide big, illegal returns by encrypting users’ data. Decryption comes with a fee, but experts say users should never pay, but fix it by relying on up to date offline back-ups. It offers good returns because it mainly relies on unsuspecting users clicking on illicit links in emails and webpages so malicious ransomware’s downloaded. Acfee’s cyber-security overview eBook reports that ransomware restricts access to computers, which is reinstated after paying a ransom often in Bitcoin to remove the restriction.. Cyber-criminals know this phishing approach that kidnaps information is significantly more profitable than stealing it. WannaCry made headlines when cybercriminals launched a global cyber-attack. It’s a step up on lucrative conventional ransomware, being extremely predatory, scanning and hunting for networks’ vulnerabilities. It’s not clear if it used phishing, or was more sophisticated and sought vulnerabilities.
An article in the NewYorkTimes says the cyber-attack affected more than 150 countries and inflicted 200,000 Windows computers. Hackers mainly targeted hospitals, academic institutions and high profile global companies. Perpetrators used a digital code previously leaked as part of a document dump. A report by News 24 says it explains the virus’s rapid spread
Healthcare news has an alarming estimate that 72% of malware attacks on healthcare used ransomware. Healthcare is particularly targeted by hackers as they know how crucial data is to daily hospital operations, and the gravely result it might have when leaked or placed in the wrong hands. Verizon researched this. Its 2017 Data Breach Investigation Report found that 602 of 2,000 breaches stemmed from phishing emails. Symantec identified ransomware’s growth. Its report said the number of ransomware detections increased by 36% during 2016, up from 340,000 in 2015 to 463,000 in 2016.
Any organisation can fall victim to these attack, so they must impose strict measures to increase cyber-security and ensure that all employees remain vigilant and alert.
- 685 views
- May 18, 2017
- Ndzalama Shivambu
WannaCry hack hits Africa
As big scale hacks go, WannaCry’s malicious spread’s approaching an unprecedented pandemic. Data Protection Report from Norton Rose Fulbright, a global law firm, says the ransomware attack started infecting companies and healthcare organisations across the US, Europe and Asia early Friday morning, 12 May. Then it was 70 countries affected. On Sunday, the head of Europol told the BBC there’s more than 200,000 victims in 150 countries. Hacker News has posted that WannaCry v2.0 can by-pass the kill switch that stops v1 from spreading. This global cyber-attack may keep expanding.
Hackatrick has an article saying it’s believed to be the biggest ransomware attack ever seen. Over 75,000 PCs in 99 countries were infected, including US, Russia, Germany, Turkey, Italy, Philippines, Vietnam, India and UK in less than 24 hours. It has a map showing organisations in Angola, Egypt, Kenya, Nigeria, Tunisia and South Africa are affected. Affected systems have six hours to pay up. Delayed responses lead to an increased ransom.
WannaCry’s spread by using a Windows vulnerability. On 14 March, Microsoft released a security patch, MS17-010, to close it. Some large organisations with far-reaching ICT networks can take up to four months to install it and update their systems, so can still be vulnerable. The attack’s huge scale means there are equivalent large-scale lessons to be learnt.
Initial ransom payments for the decryption key are about US$300, usually paid in Bitcoin within six hours. Delaying payment can result in increased ransoms. It seems the cyber-criminals haven’t raised much relative to the extent of the infections, maybe some US$20,000 in Bitcoins so far from under 200 payments, says the Guardian.
Basic advice from Hackatrick’s:
- Patch you operating system and reboot, especially MS17-010 for Windows machines and servers against EternalBlue exploit (MS17-010)
- Beware of bogus emails
- Backup your files remote from operational systems
- Always have an up to date anti-virus software.
A report from the BBC says WannaCry seems to have spread like a worm. It can move around network unaided. It’s more sophisticated that basic ransomware that relies on phishing emails to tricking users into clicking on attachments that download malicious code. When WannaCry’s inside a network, it scans and hunts for vulnerable machines to infect.
WannaCry seems to stem from a bug found by the US National Security Agency (NSA). When its details were leaked, many security researchers predicted it would trigger the production of self-starting ransomware worms.
Africa’s health systems must learn and act on the lessons from WannaCry. Its wrecking effect on parts of the UK’s NHS is salutary, and partly attributed to using obsolete software, such as Windows XP.
- 825 views
- May 15, 2017
- Tom Jones
Phishing attacks are a challenge for South Africa
Phishing is one of the most common, dangerous and frequent cyber-attacks that poses serious threats. Phishingbox has an estimate saying that at least one in 1,846 emails is a phishing attack. Emails are not the only source. Cyber-criminals use fake websites and adverts to trap people too.
In Acfee’s cyber-security overview eBook phishing is when cyber-criminals send apparently legitimate emails or website adverts to entice recipients to respond either by clicking on malicious links that can download ransomware, or by providing sensitive information like passwords, usernames and personal data, that can be used mainly for email fraud. Cyber-criminals are increasingly using invitations to connect to bogus websites to entrap unsuspecting users too.
This form of cyber-attack is successful because some users are easily fooled by the emails or adverts which appear legitimate. These hoaxes convey a sense of urgency which prompt a respone for security reasons by clicking on a link in the email that directs them to the spoofed website. This type of bogus website is designed to acquire information and identity theft and encrypt users for a ransom payment.
An article in ITNewsAfrica says South Africa’s the second most targeted for phishing attacks. In 2013, phishing cost South Africa about US$320 million, about ZAR4,256,340,017 billion. Since then, spear phishing has become aa common form of phishing. It bypasses most security defences by sending emails that are significant to users. Anyone can fall victim to this scam. Banking has some tips to avoid phishing:
- Keep online IDs, passwords and PINs private and never write them down or share them with anyone
- Always log off or sign out at the end of a sessions
- Never respond to emails that request personal details. Never use links in emails or adverts to access websites, always use web address provided by their organisations
- Type web addresses in browsers and ensure sites are secure by looking for the lock icon on browsers before logging on
- Don’t open emails from unknown sources, even if the email addresses, titles and sender details look legitimate, and delete them immediately
- Create longer passwords that combine letters, both lowercase and capitals, numbers and symbols that cannot be attributed to you
- Avoid passwords that are too personal, too simple such as 1234 and don’t duplicate one password for several accounts
- Ensure up-to-date anti-virus software and frequently update security patches your operating systems.
While these are generic, they’re essential for all Africa’s eHealth users. They fit personal use too. They require constant vigilance.
- 528 views
- May 12, 2017
- Ndzalama Shivambu
eHealthAFRO 2-4 Oct 2017
Engage with leaders. Exchange ideas. Join the eHealth (r)evolution. #AreYouReady?
Call for Papers
Submit your Abstract today for SAHIA's HISA academic track at eHealthAFRO 2017
Rome Business School eHealth Masters
Better managers for a better world
Health Information Systems South Africa (HISP-SA)
HISP-SA develops and implements sustainable, integrated Health Information Systems that empower communities, patients and healthcare workers.
African Centre for eHealth Excellence
The African Centre for eHealth Excellence (Acfee) is an network of eHealth professionals...
eHealthALIVE 2016 Report
eHealthALIVE 2016 was about showcasing eHealth excellence in Africa, debating the challenges...
Cyber-security: themes for Africa's eHealth
Cyber-crime is on the increase, and Africa’s health sector is not immune to the growing and changing threats.
African eHealth Forum 2016 Report
Successful eHealth connects us with our information in ways that transform what we expect from our health...
African eHealth Forum 2015 Report
Acfee hosts the annual African eHealth Forum. It’s where Acfee’s Advisory Board, its industry partners...