securitywithoutborders / newsletter

This is where we work on the newsletter
28 stars 18 forks source link

Newsletter #2 #8

Closed botherder closed 7 years ago

botherder commented 7 years ago

Here we collect topics for the Newsletter #2.

lapsedordinary commented 7 years ago

Maybe something about WebEx plugin, and a general reminder to check plugins one doesn't need

jijames commented 7 years ago

I've had journalists asking about PGP. Basic intro + links to resources may be good.

lapsedordinary commented 7 years ago

I agree that it would be good to add something about PGP. Happy to write a short into and then find links to specific HowTos about various operating systems and mail providers.

In the meantime, it looks like we may want to make WordPress a regular feature. Another update has been released: https://make.wordpress.org/core/2017/02/01/disclosure-of-additional-security-fix-in-wordpress-4-7-2/

Te-k commented 7 years ago

It may be interesting to focus on one security tip for each newsletter even if it is not related to news. Like this month PGP, next month Signal and chat app etc.

adonis28850 commented 7 years ago

Will do a PR when I have some spare time:

https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2017-5521--Bypassing-Authentication-on-NETGEAR-Routers/

http://seclists.org/fulldisclosure/2017/Jan/89

mkind commented 7 years ago

In rough times with a lot of demonstrations, it might be of interest to give an introduction about GSM-like security issues, in particular how IMSI catcher work.

botherder commented 7 years ago

Security First Umbrella App: http://www.secfirst.org/

ghost commented 7 years ago

What about hardend live Systems like TAILS or SubgraphOS? I could drop a few lines for that.

I support the Idea of having a monthly Security tip or tutorial on topics like GPG or Signal etc.

adonis28850 commented 7 years ago

Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society - https://citizenlab.org/2017/02/nilephish-report/

lapsedordinary commented 7 years ago

I had said I'd write something about PGP - here is a first go at it. Feel free to use, take apart or completely ignore.

Though it is certainly not the case that any email sent over the internet can be read by anyone who wants to, email is not secure enough to send messages of which it is important the the content is not read by anyone but the sender and the recipient. A common way to protect this information is to use PGP. PGP can be integrated in many email clients, making its use relatively straightforward. However, before using PGP it is important to understand a few things:

If you are convinced that PGP is what you need, you may want to follow the guides on using PGP the Electronic Frontier Foundation (EFF) has written as part of its Security Self-Defense series. There are guides for Windows [https://ssd.eff.org/en/module/how-use-pgp-windows] Mac OS X [https://ssd.eff.org/en/module/how-use-pgp-mac-os-x] and Linux [https://ssd.eff.org/en/module/how-use-pgp-linux].

lapsedordinary commented 7 years ago

And two pieces that can be used for the newsletter (or can be safely ignored)

Citizen Lab writes about an ongoing phishing campaign against various Egyptian NGOs. Phishing is a technique where users are lured into entering their credentials of for example email, banking or social media accounts. It affects any internet user, but is of particular concern to those targeted by powerful adversaries such as governments. In this case, as was seen in Egypt, the senders already know quite a lot about their target and use this to make the emails that contained the phishing link look very credible. Those who are likely targets of such attacks should be very wary of clicking links in emails they receive; in case of the slightest doubt, they should consult a trusted security expert. To seriously increase the bar for the adversary, two factor authentication should be used for all accounts that give access to important information. https://citizenlab.org/2017/02/nilephish-report/

The Iran Threats project writes about new malware that targets Apple's Mac OS X operating system and that is written by an Iranian threat actor. For everyone, even those not particularly concerned about Iranian actors, this serves as an important reminder that malware on OS X is a real thing. Though malware targeting Windows is far more prevalent, Mac users should not consider themselves invincible and apply the same security hygiene as users of other operating systems. This especially applies to those with powerful adversaries. https://iranthreats.github.io/resources/macdownloader-macos-malware/ Another example of this was seen when security researchers found a piece of malware, of unknown origin, that was hidden inside a Word for Mac file. The malware would be activated when the user enabled macros. It is thus important, in Mac as much as in Windows, to never enable macros in Office files, no matter how much the document says it is needed to view hidden content. https://motherboard.vice.com/en_us/article/these-hackers-cleverly-disguised-their-malware-as-a-document-about-trumps-victory

jaegeral commented 7 years ago

https://www.theguardian.com/us-news/2017/feb/08/border-security-facebook-password-trump-travel-ban People travelling to US might be forced to reveal their credentials. This policy is now in place

http://www.theverge.com/2016/12/22/14066082/us-customs-border-patrol-social-media-account-facebook-twitter

lapsedordinary commented 7 years ago

These are two separate things. The Verge link talks about the fact that when you apply for an ESTA visa waiver (most - not all - Europeans can do this) you can fill in your social media accounts. This has been in place since December, before the current government took over, and is clearly marked as "optional". I find it very dubious, especially since the whole process is rather opaque, but so far I've not heard any reports of people being refused a visa because they didn't provide the information, or because their social media activity was deemed unsuitable.

The Guardian link talks about a suggestion made by gen. Kelly (the head of DHS) that customers from some countries (the now famous seven countries) may be asked to provide their social media credentials if they apply for a visa. I think this policy would be wrong on so many levels, but so far it's not a policy, nor even an official proposal. I don't think it would be helpful to suggest otherwise.

botherder commented 7 years ago

https://medium.com/@geminiimatt/how-to-give-a-digital-security-training-4c83af667d40#.6m2z4iww9

adonis28850 commented 7 years ago

New ooniprobe Mobile App: Measure Internet Censorship & Performance: https://ooni.torproject.org/post/ooni-mobile-app/

botherder commented 7 years ago

https://citizenlab.org/2017/02/bittersweet-nso-mexico-spyware/

gomex commented 7 years ago

https://www.aclu.org/blog/speak-freely/aclu-dublin-ireland-today-defending-right-privacy-europeans-and-americans-alike

botherder commented 7 years ago

https://medium.com/amnesty-insights/operation-kingphish-uncovering-a-campaign-of-cyber-attacks-against-civil-society-in-qatar-and-aa40c9e08852#.3tdq16dxg

lapsedordinary commented 7 years ago

Newsletter stories about the ASLR bypass and the Bittersweet campaign:

A group of academic researchers has found a way to use JavaScript to bypass ASLR, a technique that makes it much harder for malicious websites to install malware. As this bypass uses properties of modern computers that are hard to change, this isn't something that can be patched easily, if at all. It is important to note that an attacker would still need to find a vulnerability in a browser or a browser plugin (such as Flash Player) before being able to install malware; this new discovery only makes it easier to install malware given such a vulnerability. It is thus even more important to keep your browser and its plugins up-to-date (and, ideally, uninstall plugins such as Flash Player and Java, as these are often exploited). Those who think they may be targeted by very powerful adversaries, would do best to use the NoScript browser plugin (which by default blocks all JavaScript) or even the Tor browser and should consider the fact that this makes browsing the web a less pleasant experience a price worth paying. https://arstechnica.com/security/2017/02/new-aslr-busting-javascript-is-about-to-make-drive-by-exploits-much-nastier/

CitizenLab wrote about the use of NSO Group exploits to target the mobile devices of a number of Mexican individuals all of whom have campaigned for a tax on sugary drinks ("soda tax"). NSO Group malware had previously been used to target UAE-based human rights defender Ahmed Mansoor. This malware, which is exclusively sold to governments, is known to be both very powerful and very stealthy; in practice this means that the usual advice about keeping your devices and software up to date, while still important, is not always good enough. Those who suspect they could be the target of these kinds of attacks are adviced to take extreme caution and look for help locking down their devices. Advanced though the malware was, the infection techniques weren't. The targets recevied a number of SMS messages, each of which contained a link clicking on which would have infected their phone with the malware. Given the targeted nature of the campain, the messages appeared very relevant to the targets. The same technique has been used in many less sophisticated malware and phishing campaigns. It is important to err on the side of caution before opening links sent in messages. In case of doubt, contact the apparent sender of the messages through a different channel. Matters of life and death are rarely, if ever, solved by clicking on a link. https://citizenlab.org/2017/02/bittersweet-nso-mexico-spyware/

lapsedordinary commented 7 years ago

I may find time to write something about Operation Kingpin later today, not 100% sure though

lapsedordinary commented 7 years ago

Quick one about Kingphisher (that I accidentally called Kingpin above)

Researchers at Amnesty International discovered a campaign of phishing attacks against a group of people most of whom were involved in the issue of migrants’ rights in Qatar and Nepal. Though technically not very sophisticated, the attack was well planned and involved carefully crafted fake social media profiles that connected to the targets and used this trust to learn about them and deliver phishing messages. Social media can be really great to meet people who care about the same cause as you do, but if you handle sensitive information you should be wary of fake profiles trying to connect. As the article puts it: if you wouldn’t share it on Twitter, don’t share information with someone you don’t know, even if it is someone who appears to have friends on social media in common with you. https://medium.com/amnesty-insights/operation-kingphish-uncovering-a-campaign-of-cyber-attacks-against-civil-society-in-qatar-and-aa40c9e08852

botherder commented 7 years ago

https://blog.0day.rocks/operational-signal-d41d2c457d8d

lapsedordinary commented 7 years ago

Three short suggested entries - the former two are gaps in the current newsletter, the latter is the Signal+Tor post above.

There are many great sources on the internet about improving your (digital) security, but for many people, especially the less tech-savvy among us, face to face trainings are the best way to learn about digital safety and security. Four people with experience giving such trainings have written a brief document on how to give such security trainings. https://medium.com/@geminiimatt/how-to-give-a-digital-security-training-4c83af667d40

Security tip: no matter how secure your password is, it takes one convincing phishing email for an attacker to steal it. It is therefore vital that you protect all your important online accounts with two-factor authentication. The Electronic Frontier Foundation (EFF) has published a series of blog posts about how to do that for various popular services, including Facebook, Twitter and Gmail. https://www.eff.org/deeplinks/2016/12/12-days-2fa-how-enable-two-factor-authentication-your-online-accounts

The Signal messaging app is widely praised for its security and privacy properties. Using it should be sufficient for almost everyone who needs to care about their online security. However, a very small group of users could have reasons to be worried about the (small amount of) Metadata stored on Signal's servers. For those users, security researcher 'x0rz' published a simple guide on how to use Tor to use Signal pseudonymously. https://blog.0day.rocks/operational-signal-d41d2c457d8d

lapsedordinary commented 7 years ago

(Again, feel free to edit/ignore everything I write - they're all suggestions which I hope are helpful.)

botherder commented 7 years ago

Thanks for all those, I'm incorporating all of them.

We don't seem to have any urgent security alerts. I'm not sure how relevant the router and printers ones would be. I would much rather keep it concise to things that are relevant and are more likely to be a serious threat.

Thoughts?

lapsedordinary commented 7 years ago

I agree, that's why I didn't write anything about them. Router insecurity is an issue in general, and it may be worth mentioning in a future newsletter, but listing every individual vulnerability is likely going to be confusing.

botherder commented 7 years ago

https://www.blockade.io/

lapsedordinary commented 7 years ago

How useful would such a tool be for those being directly targeted by malware? As I read it, it's looking for "known indicators" which sounds like AV. I'm all for people using that, but one property of small scale attacks, even if not particularly advanced, is that there are no known indicators yet.

Te-k commented 7 years ago

http://www.forbes.com/sites/thomasbrewster/2017/02/16/government-iphone-android-spyware-is-the-same-as-seedy-spouseware/

lapsedordinary commented 7 years ago

That is a very good story on a very important issue that I'm glad is getting more attention, but it mostly says: this is really bad. It doesn't really say anything about what can be done to prevent these kind of things (and such advice would be pretty complicated too). So I wasn't sure if it was worth including. But then, ultimately that's not for me to say.