This Week in Security #1

- 3 mins

Navigating the ever-evolving landscape of cybersecurity can feel like a whirlwind—new threats, innovations, and incidents are constantly reshaping the digital world. This week’s post breaks down some of the developments and that took place this past week.

UK bans default passwords on IoT devices

In 2016, a small group of hackers created the botnet “Mirai” and infected approximately 300,000 IoT devices to launch a DDoS attack on a DNS service provider, Dyn. Years later, the UK has become the first country to ban manufacturers from providing weak default passwords (e.g. “1234” or “admin”). The US doesn’t have any similar rules, but as noted by Bruce Schneier, manufacturers aren’t going to make different versions of this device for the UK and the rest of the world, which means this law should effectively change this globally.
Further Discussion: While this is a step in the right direction, a lot of the real concerns people in the field revolve around the possibility of manufacturers inserting backdoors into these simple products. Back in 2017 Trustwave found a backdoor in DblTek devices, allowing the manufacturer to access the hardware. This of course could be used by other malicious parties as well.

London Drugs Cyberattack

Closer to home, last week London Drugs said it was the “victim of a cybersecurity incident”. As a result they shuttered all of their ~80 stores across western Canada, and they are currently trying to figure out whether any data breaches occurred. For those who don’t know, the store functions as a pharmacy but also sells consumer goods. Chester Wisniewski from Sophos, mentioned it’s likely a ransomware attack but paying the ransom or not typically doesn’t affect how long it takes for the company (in this case London Drugs) to recover. David Gray followed up saying that retail companies now treat these attacks as a “normalized cost of business”.
Further Discussion: With the increasing ubiquity of the use of digital records, companies need to have security built into the fabric of their infrastructure rather than treating it as an add-on. Moreover, individuals should be more cautious with what websites and services they are willing to give their information to. Encrypting data, restricting access to it, and logging/monitoring usage are all ways to help reduce the chances of your data being leaked but it’s not perfect.

Rapidfire:

Dropbox Sign Breach: Dropbox Sign (formerly HelloSign) is Dropbox’s e-signature solution. On April 24th, the company became aware of a data breach affecting a segment of clients. This breach gave access to users’ phone numbers, API keys, multi-factor authentication, etc. Possibly more concerning, parties who signed documents but don’t have a DropBox Sign account still had names and email addresses exposed. While they investigate further, the DropBox Sign team has reset passwords, logged users out of accounts on all devices, and are trying to “[coordinate] the rotation of all API keys and OAuth tokens.

Cuttlefish Malware: Discovered by Lumen Technologies, this malware (which targets networking equipment) has two goals. The first is that it attempts to steal authentication information from web requests which go through the router. A secondary objective of this malware is DNS and HTTP hijacking. Given the wide-spread adoption of TLS making the first goal very difficult to achieve, the latter is probably the main objective.

Glossary:

Siddhantha Bose

Siddhantha Bose

Living, learning, and meeting people along the way

comments powered by Disqus