When you ’ re as ginormous a target as the global telecommunications industry , and you ’ re sitting on a flaw as big as the one affectingVulnerability-related.DiscoverVulnerabilityits SS7 protocol , best not rely on “ security through obscurity ” . You and your customers could get badly bitten – and so they have . The Signalling System No . 7 ( SS7 ) telephony signaling protocol used to establish interoperability across some 800+ service providers worldwide , is deeply vulnerableVulnerability-related.DiscoverVulnerabilityto interception by hackers , criminals , and corrupt insiders . We ’ ve known this for years . Now , in Germany , someone ’ s used that vulnerability to raid consumers ’ online bank accounts . SS7 was designed back in the 1970s , when access to phone networks was viewed as rare and controllable : back then , for example , AT & T still had an essentially complete monopoly over all US phone service . But now , a world of internet , VoIP , and wireless providers can link into SS7 to do all manner of fascinating things , and mess-with-SS7 skills and tools aren ’ t nearly so scarce . The telecom industry , however , has been appallingly slow to react . Maybe they will now . As first reported by the German daily newspaper Süddeutsche Zeitung , this two-part attack zeroed in on SS7 call-forwarding features that allow networks to validate your SIM card when you travel internationally . First , according to Bank Info Security , hackers sentAttack.Phishingconventional fake phishing emails to victims , suckering them into visiting fake bank websites , where they were told to enter account numbers , passwords and the mobile phone numbers they had previously given their banks . Meanwhile , per The Register , the attackers “ purchased access to a rogue telecommunications provider and set up a redirect for the victim ’ s mobile phone number to a handset controlled by the attackers ” . Now , they could wait until late at night , log into the victims ’ online accounts , and start money transfers . As part of their SMS-based two-factor authentication ( 2FA ) systems , the banks would dutifully send one-time mobile transaction authentication number ( mTAN ) numbers to their customers . These would be hijacked by the criminals , who now had the second authentication factor they needed to complete the thefts . The short-term solution is for telecommunications service providers to turn off SS7 ’ s call forwarding features except for trusted providers . O2-Telefonica told Süddeutsche Zeitung that it blocked the specific foreign carriers who were the source of these attacks in January – but that doesn ’ t prevent similar attacks arising from other sources against other carriers .
A flaw in unpatched versions of Window 10 could leave machines vulnerableVulnerability-related.DiscoverVulnerabilityto EternalBlue , the remote kernel exploit behind the recent WannaCry ransomware attackAttack.Ransom. WannaCry targeted a Server Message Block ( SMB ) critical vulnerability that Microsoft patchedVulnerability-related.PatchVulnerabilitywith MS17-010 on March 14 , 2017 . While WannaCry damageAttack.Ransomwas mostly limited to machines running Windows 7 , a different version of EternalBlue could infect Windows 10 . Researchers at RiskSense stripped the original leaked version of EternalBlue down to its essential components and deemed parts of the data unnecessary for exploitation . They found they could bypass detection rules recommended by governments and antivirus vendors , says RiskSense senior security researcher Sean Dillon . This version of EternalBlue , an exploit initially released by Shadow Brokers earlier this year , does not use the DoublePulsar payload common among other exploits leaked by the hacker group . DoublePulsar was the main implant used in WannaCryAttack.Ransomand a key focus for defenders . `` That backdoor is unnecessary , '' says Dillon , noting how it 's dangerous for businesses to only focus on DoublePulsar malware . `` This exploit could directly load malware onto the system without needing to install the backdoor . '' EternalBlue gives instant un-credentialed remote access to Windows machines without the MS17-010 patch update . While it 's difficult to port EternalBlue to additional versions of Windows , it 's not impossible . Unpatched Windows 10 machines are at risk , despite the fact that Microsoft 's newest OS receives exploit mitigations that earlier versions do n't . The slimmed-down EternalBlue can be ported to unpatched versions of Windows 10 and deliver stealthier payloads . An advanced malware would be able to target any Windows machine , broadening the spread of an attack like WannaCry , Dillon explains . It 's worth noting WannaCry was a blatant , obvious attack , he says , and other types of malware , like banking spyware and bitcoin miners , could more easily fly under the radar . `` These can infect a network and you wo n't know about it until years later , '' he says . `` It 's a threat to organizations that have been targets , like governments and corporations . Attackers may try to get onto these networks and lay dormant … then stealAttack.Databreachintellectual property or cause other damage . '' Dillon emphasizes the importance of updatingVulnerability-related.PatchVulnerabilityto the latest version of Windows 10 , but says patchingVulnerability-related.PatchVulnerabilityalone wo n't give complete protection from this kind of threat . Businesses with SMB facing the Internet should also put up firewalls , and set up VPN access for users who need external access to the internal network . Businesses should have a good inventory of software and devices on their networks , along with processes for identifying and deployingVulnerability-related.PatchVulnerabilitypatches as they are releasedVulnerability-related.PatchVulnerability, says Craig Young , computer security researcher for Tripwire 's Vulnerability and Exposures Research Team ( VERT ) . This will become even more critical as attackers move quickly from patch to exploit . There will always be a window of opportunity for attackers before the right patches are installedVulnerability-related.PatchVulnerability, Young notes . EternalBlue is a `` very fresh vulnerability '' given that most breaches that use exploits leverage flaws that have been publicly knownVulnerability-related.DiscoverVulnerabilityfor an average of two years or more . `` EternalBlue is a particularly reliable exploit that gives access to execute code at the very highest privilege level , so I would expect that hackers and penetration testers will get a lot of use out of it for years to come , '' he says .
Half a million smart devices including webcams and baby monitors in the city are currently vulnerableVulnerability-related.DiscoverVulnerabilityto cyber attack . BARCELONA , Spain -- ( BUSINESS WIRE ) -- Avast , the leader in digital security products for consumers and businesses , today reveals the findingsVulnerability-related.DiscoverVulnerabilityfrom its latest research experiment into smart devices , including public and private webcam vulnerabilities in Spain , and , specifically , in Barcelona . Avast identifiedVulnerability-related.DiscoverVulnerabilitymore than 22,000 webcams and baby monitors in the city that are vulnerableVulnerability-related.DiscoverVulnerabilityto attack , which means that cybercriminals could livestream the videos directly to the internet . The findings identifiedVulnerability-related.DiscoverVulnerabilitymore than 493,000 smart devices in Barcelona and 5.3 million in Spain overall – including smart kettles , coffee machines , garage doors , fridges , thermostats and other IP-connected devices – that are connected to the internet and vulnerableVulnerability-related.DiscoverVulnerabilityto attacks . As webcams and other devices are vulnerableVulnerability-related.DiscoverVulnerability, there are a range of security , legal and privacy concerns to be addressedVulnerability-related.PatchVulnerability. Snoopers could easily access and watchAttack.DatabreachMobile World Congress visitors and Barcelona residents in private and public spaces , and streamAttack.Databreachthe video directly to the internet , or turn the device into a bot . When a device is infected , it can also be used to infect other devices , to add them to a botnet , or to take control over them and do harm to their owner . This includes kitchen and other household devices , to which cybercriminals can give remote orders , for example , to heat up water in a kettle . Smart device manufacturers also collect and store private user data , including behavioral data , contact information , and credit card details , which poses an additional risk if interceptedAttack.Databreachby cybercriminals . And while the problem is in no way confined to Barcelona , Spain , or indeed to webcams , it is particularly challenging for the city as it is hosting thousands of mobile and technology industry executives at Mobile World Congress 2017 this week . In the experiment , Avast found : Conducted in partnership with IoT search engine specialists Shodan.io , the experiment proves just how easy it is for anyone - including cybercriminals - to scan IP addresses and ports over the Internet and classify what device is on each IP address . And , with a little extra effort and know-how , hackers can also find out the type of device ( webcam , printer , smart kettle , fridge and so on ) , brand , model and the version of software it is running . “ With databases of commonly known device vulnerabilities publicly available , it doesn ’ t take a vast amount of effort and knowledge for cybercriminals to connect the dots and find outVulnerability-related.DiscoverVulnerabilitywhich devices are vulnerableVulnerability-related.DiscoverVulnerability, ” comments Vince Steckler , CEO at Avast . “ And even if the devices are password protected , hackers often gain access by trying out the most common user names and passwords until they crack it ” . Avast ’ s latest research experiment highlights a serious and growing problem which , unless addressed , will only worsen in line with the increasing number of devices connected to the Internet . Vince Steckler , Avast , continues : “ If webcams are set to livestream for example , hackers or anyone can connect , making it easy for cybercriminals to spy on innocent Mobile World Congress trade show visitors , or oblivious school pupils , workers or citizens nearby . In the future , we could also see cases where cybercriminals harvestAttack.Databreachpersonal data , including credit card information from unsuspected IoT users ” . To be aware of vulnerabilities and secure all connected devices against unwanted attacks , users need to contribute to making the online world a safer place by keeping software updated and choosing strong , complex passwords .