Wednesday, 29 April 2015

Cyber extortion: A growth industry

The traditional philosophy of never negotiating with extortionists has had to adapt to the realities of cybercrime – if you don’t pay, your data may be lost forever

The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Cave to their demands and all you’re doing is encouraging more extortion. And you don’t even have a guarantee that paying a ransom will produce the return of your loved one unharmed, or your stolen assets.

Better to refuse the demands, find the criminals and punish them in a way that will discourage them and others from doing the same thing.

But, in the digital world, where criminals encrypt data and then demand a ransom to provide the key, that prevailing wisdom is getting a forcible adjustment.

The first reality is that, much of the time, cyber extortionists are far beyond the reach of domestic law enforcement. Second, most of them actually make good on unlocking the data once the ransom has been paid, because they want future victims to pay up as well.

In some cases, it is law enforcement itself that is paying the ransoms. The Boston Globe reported recently that the police department in Tewksbury, a Boston suburb, had paid a $500 ransom to criminals who had encrypted data including arrest and incident records.

“(S)pecialists from federal and state law enforcement agencies – plus two private Internet security firms – could not unscramble the corrupted files,” the paper reported.

There have been similar stories in police departments near Chicago, in Tennessee, New Hampshire and Alabama.
MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers

In short, this is a growth industry. Most thieves have learned that if they keep the ransom relatively low – a few hundred dollars – and get a reputation for providing the encryption key once the ransom has been paid, those few hundred dollars per victim can add up to thousands per month.

Val Saengphaibul, security response manager at Symantec, said his firm knows of one cyber gang that makes, “at least $35,000 a month. Other cyber-gangs have taken note and there are quite a few of them running this scam,” he said, noting that, “payment is not easily traced or stopped, and targeting specific data files that are valuable to people and organizations increases the likelihood of payment.”

Indeed, a recent survey by ThreatTrack Security found that 30% of the security professionals who responded said they would negotiate with the extortionists. And that percentage rose to 55% among organizations that have already fallen victim to cyber-extortionists.

Some of that was conditional. When asked if organizations should set aside funds for paying ransoms to recover their data, 45% gave a conditional “yes,” but nearly half of them said it would “depend on the data.” The most important, in their view, were employee Social Security numbers, addresses and salaries.”
"Cybercriminals’ No. 1 priority is making money, not keeping their word."

Stuart Itkin, senior vice president, ThreatTrack

Stuart Itkin, ThreatTrack’s senior vice president, said there is obviously no guarantee that criminals will unlock the encrypted data, but that it is in their, “best interest to keep their word so victims succumb and they continue making money by infecting more people.”

He said ransomware developers have even, “created safeguards to ensure their malware doesn’t infect the same victims again after they’ve paid a ransom.”

Jody Westby, CEO of Global Cyber Risk, also said in her experience, cyber extortionists have kept their side of the deal. She said for most of her clients, it comes down to a business decision.

“I have seen IT guys say, ‘No way, we aren't negotiating or paying a dime,’” she said. “But then the CFO or another C-suite executive gets involved, evaluates the amount of money requested, and says it is a no-brainer: They are going to pay and keep the business running. It would cost more to have the system down.”

Of course, not all extortionists are so “honorable”. According to Saengphaibul, “if you look hard enough, you’ll find numerous victims experiences showing hackers not upholding their end of the deal by not unlocking computers after ransom is paid.”

Saengphaibul said Symantec sticks with the more traditional law enforcement philosophy – don’t pay up.

“Paying the ransom just further promotes this illegal activity,” he said. “It’s unlikely that victims will get their files back anyway, so don’t put money in the criminals’ pockets. If we deny the criminals profit, then there is no point in running the scam. They move on.”

He said if extortion targets have regularly backed up their files, they can’t be victimized in the first place. “When there is no demand on the underground economy for ransomware attack services, hackers will ultimately be out of business,” he said.

But, particularly for businesses, it is not always as simple as having backup files.

“Everyone should have backups,” Westby said. “But that is not the issue. The issue is having the data disclosed. They pay to get it back so it won't be disclosed.”

She said if a company refuses to pay the demanded ransom, extortionists can start making it public. “They can start disclosing data in pieces, or send some of the most damaging to the press, they can sell the data on the black market or to a competitor company,” she said.

“The damage is to reputation, loss of market share, loss of customer and pricing data or other strategic business data that could have a real impact on the bottom line.”

Itkin agrees. “Data breach headlines, lawsuits, eroded customer trust and other collateral damage a breach can cause gives (extortionists) tremendous leverage,” he said.
MORE ON CSO: What is wrong with this picture? The NEW clean desk test

“All you have to do is look at the fallout from the Sony breach. First, the extortionists succeeded in manipulating Sony’s release of a major motion picture, which had financial consequences for not just Sony, but the theaters that planned to screen it, among others. Second, their data was perfect for wide-spread media appeal – dripping with Hollywood gossip.”
"I have seen IT guys say, ‘No way, we aren't negotiating or paying a dime. But then the CFO or another C-suite executive gets involved, evaluates the amount of money requested, and says it is a no-brainer: They are going to pay and keep the business running."
jody westby

Jody Westby, CEO, Global Cyber Risk

That means, while data backups ought to be regular and automatic, they are not enough. Rigorous, end-to-end encryption ought to be mandatory as well, since it can make most stolen data useless to extortionists.

With stolen encrypted data, “criminals don't even know what they have to ask ransom for it,” Westby said, adding that, “cyber extortion insurance also is good, because we are in a new era of cybercrime.”

But beyond backups and encryption, experts including Saengphaibul say that, “security is multilayered and requires an encompassing approach – endpoint security, employee training, system updates, etc.”

Security, he said, should include not just traditional anti-virus, but also, “download protection, browser protection, heuristic technologies, firewall and a community sourced file reputation scoring system.”

And when it comes to negotiation, Itkin said security pros should, “always be aware that cybercriminals’ No. 1 priority is making money, not keeping their word.”

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, 17 April 2015

Google to pull Chrome plug on Windows XP at year's end

Another browser on XP bites the dust

Google on Thursday announced it will shut down support for Chrome on Windows XP at the end of the year.

"We will continue to provide regular updates and security patches to Chrome on XP through the end of 2015," said Mark Larson, Chrome's director of engineering, in a short blog post Thursday.

A year and a half ago, Larson pledged to support Chrome on the even-then-aged operating system until "at least April 2015."

"We know that not everyone can easily switch to a newer operating system," Larson said of Google's decision to continue supporting Chrome on XP after the latter's retirement. "Millions of people are still working on XP computers every day [and] we want those people to have the option to use a browser that's up-to-date and as safe as possible on an unsupported operating system."

But enough was apparently enough.
Microsoft called it quits on Windows XP a year ago Tuesday, when it issued the final scheduled security updates for the 2001 OS. (The company made a one-time exception shortly thereafter when it shipped an emergency patch for its Internet Explorer (IE) browser.)

Because Microsoft halted security fixes for IE on Windows XP on April 14, 2014, security professionals urged the OS's users to switch to another browser. Dropping IE for Chrome, Mozilla's Firefox or Opera Software's Opera was one way to minimize -- but not eliminate -- risk, they said.

Neither Mozilla or Opera have publicized end-of-support dates for their browsers on Windows XP.

According to Web metrics vendor Net Applications, approximately 18.5% of all Windows PCs ran XP in March, slightly more than half the 34.5% the OS accounted for in October 2013, when Larson set Chrome's earliest support demise at this month.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, 7 April 2015

Review: 7 excellent mobile app builders

Alpha Anywhere, AnyPresence, and Salesforce1 lead a rich field of low-code mobile development tools

Over the last six months, I’ve been examining and testing a variety of mobile app builders and mobile back ends. In some cases, the app builders and back ends were part of a single product. In other cases, the app builders or back ends stood on their own.

In this roundup, I’ll summarize seven products that are at least partially a mobile app builder. Some have IDEs that run locally on your computer; others give you a Web IDE that lives in the cloud. Some are aimed at enterprise development, others at individual developers or even students.

As we’ll see, they can have almost any level of complexity for the developer, ranging from drag-and-drop simple like EachScape, NSB/AppStudio, and Salesforce1, to providing an API for the developer to code against in Xcode or Eclipse, which is the way Appcelerator supports native SDK developers.

They can target mobile Web, mobile hybrid, or native apps for Android, iOS, and occasionally some of the less popular mobile device platforms, such as Windows Phone. They may integrate with one or more mobile security products. For instance, AnyPresence makes it easy to secure your app with Apperian.

They may be tied to an MBaaS (mobile back end as a service) platform or not. They may or may not be able to consume and modify data from systems of record. If they can, they may require the developer to write a RESTful interface, or they may take care of the connection themselves.

They might reduce the work required to support offline mobile operation with offline/online data synchronization and conflict resolution to checking a few boxes on a form, like Alpha Anywhere, or hand you a box of parts and an assembly diagram with pictures and instructions in Swedish -- sorry, that’s Ikea, but you know what I mean. In between those extremes, they may supply a framework that does part of the work, but leave out the rest and expect you to fill it in with code and forms.

If they support HTML5 apps, they might or might not support your favorite JavaScript framework. If they target native or hybrid apps, they might have their own online app building services, integrate with PhoneGap Build, or rely on you to build apps with the native SDKs on your development box.

They may be priced anywhere from $99 per developer to “low six figures per company per year.” In most cases, I’ve found the prices to be appropriate and the value to be good for the right audience, but a student can’t benefit from an enterprise-level app builder and MBaaS any more than an enterprise developer could get by with a simple app builder with no integration capabilities.

In short, the scope and complexity of these seven products vary widely, and no single product is ideal for everyone. With that in mind, I’ll try to emphasize what sort of developers and designers are most likely to enjoy and be productive with each app builder. Different strokes ...

Alpha Anywhere is a database-oriented rapid development tool that allows developers and designers to create Web and hybrid mobile apps that work offline. It allows less-experienced developers to create sophisticated apps with a combination of configurable components, visual design tools, code-generation “genies,” and a small amount of coding in Xbasic or JavaScript.

The Alpha Anywhere IDE runs on Windows. The tool targets iOS, Android, Windows Phone, and other mobile and desktop clients with HTML5-compliant Web browsers.

Alpha Five was a Web and desktop application development tool with an application and Web server, a PDF report generator, and strong support for dozens of SQL and desktop databases. Alpha Five in turn grew out of Alpha Four, which was an easy-to-use dBase clone.

Alpha Anywhere is an extension of Alpha Five that brings mobile Web and hybrid mobile app development to Alpha Five’s bag of tricks, including the recent addition of support for offline operation, offline-online data synchronization, and intelligent data conflict resolution. The folks at Alpha Software have thought through most of the cases a mobile device might encounter in the field -- trying to consume, modify, and generate server data with unreliable network connectivity -- and have reduced the choices you need to make as a developer to a matter of checking a few boxes.

To design a mobile UI with Alpha Anywhere, you typically drag panels, containers, and controls onto the tree view of a UX component, and set the properties of each element. This methodology is rapid, although not quite as intuitive as a WYSIWYG designer. You can see a working or live preview at any time, and you can see it simultaneously with the designer if you have enough screen space. The server-side Xbasic of an Alpha Web or mobile component generates HTML5 and JavaScript for rendering by a browser.

On the downside, the Alpha IDE and application server currently run only on Windows; Alpha’s application server is proprietary; Alpha lacks a scalable cloud service; and Alpha lacks native mobile client support. Mitigating factors for the lack of native iOS and Android code generation are integration with PhoneGap, and the fact that the Alpha Anywhere mobile components and controls have been crafted to look and feel native.

Overall, I rate Alpha Anywhere very good as a Web, mobile Web, and mobile hybrid development system. The IDE is powerful and easy to use, although it has so many features that it’s easy to forget where to find the one you need. The capabilities and integrations are very good.

Alpha has its own JavaScript client framework, which includes support for jQuery, but not for some newer frameworks such as Angular and Backbone. On the other hand, Alpha’s templating language has a distinctly Angular feel to it, and you can’t really complain about the framework when the system generates almost all of the code for you.

Companies that want to create mobile apps that use SQL and REST data sources will benefit from Alpha Anywhere, especially if ease of development and short time to market are important factors. Alpha’s strong support for offline mobile operation, offline-online data synchronization, and intelligent data conflict resolution helps it to stand out in a world where those important issues are too often ignored.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com