29.9.17

Your Android lock screen pattern isn’t as safe as a PIN code


What’s safer? Using a numeric PIN code to unlock your Android smartphone or relying on a finger squiggle?
Newly-released research suggests that, at least when someone close by could be looking over your shoulder, you might be safer with an old-fashioned PIN.
The research, presented in a paper entitled “Towards Baselines for Shoulder Surfing on Mobile Authentication” by the United States Naval Academy and the University of Maryland, tested what could best secure smartphones from so-called “shoulder surfing attacks”.
So, if you’re worried about someone peeking over your shoulder while you unlock your phone, would you be wiser to use a PIN or a pattern?
According to this research at least, the answer to that question is pretty clear.
Lurkers who have a single observation of your screen as you unlock it with a swipe pattern will be successful in determining your security squiggle 64.2% of the time (rising to an alarming 79.9% with multiple observations). Security can be improved somewhat by removing feedback lines on the pattern lock (35.3% success rate for shoulder surfers, rising to 52.1% with multiple observations).
By comparison, use of a six digit PIN dramatically reduces the chances for an attacker to determine how to unlock your Android smartphone, with just 10.8% successful attacks (rising to 26.5% with multiple observations).
In tests, viewers were able to determine the Android users’ lock screen patterns from up to six feet away, from a variety of different angles, even after a single viewing.
Indeed, past research has determined that the “randomness” of a unlock pattern is about the same as a three-digit PIN – something I hope that none of us would rely upon.
The researchers’ conclusion is that PIN of six digits or more is the most secure defence against shoulder surfing attacks, and while both types of pattern lock are poor, patterns without lines provide greater security. The length of the input also has an impact; longer authentication is more secure to shoulder surfing. Additionally, if the attacker has multiple-views of the authentication, the attŠacker’s performance is greatly improved.
Unsurprisingly, the research confirmed that phones with larger screens were found to provide less security against shoulder-surfing attacks, and longer authentication (lengthier swipe patterns or longer PIN codes) make life harder for criminals.
Of course, that doesn’t mean that *any* PIN code should be considered secure, or that all swipe patterns are as safe as each other. Past studies have revealed the most common PIN numbers, and it’s clear that a six digit PIN like “123456” is going to be easier for an attacker to crack than a truly randomly-generated code.
Just as hackers have built databases of the most common passwords used to secure accounts, they have also learnt the most common PIN codes and swipe patterns use to protect their phones.
It’s worth bearing in mind that if you’re really worried about someone close by looking over your shoulder to snoop on your PIN code or lock screen pattern maybe you would be better off protecting your mobile device with a biometric (such as your fingerprint) instead. Biometrics are not impossible to bypass, but in many cases they will be more than enough to defeat anything less than a sophisticated attacker.



28.9.17

CALLIGO ACQUIERT AMS SYSTEMS PSF, UNE ENTREPRISE DE SERVICES INFORMATIQUES BASÉE AU LUXEMBOURG



Calligo, fournisseur mondial d’infrastructures d’hébergement, annonce aujourd’hui qu’elle est parvenue à un accord en vue du rachat d’AMS Systems PSF, une entreprise de services informatiques très respectée et basée au Luxembourg, qui fournit des services de gestion déléguée et des infrastructures hébergées au secteur de la finance.  

Créée en 2011, Calligo propose des solutions en matière d’infrastructures, sûres et soucieuses du respect de la vie privée, dans le monde entier.  Calligo met l’accent sur les services de GDPR (Règlement général sur la protection des données) et la résidence des données, permettant ainsi à ses clients de bénéficier des avantages qui peuvent être tirés de la combinaison de technologies innovantes dans le cloud, d’une expertise incomparable et d’un engagement à garantir les plus hautes normes de conformité et de protection de la vie privée. L’entreprise propose ses services à des centaines de clients dans le monde depuis ses bureaux à Jersey, à Guernesey, au Royaume-Uni, en Suisse, à Singapour, aux Bermudes et maintenant au Luxembourg.

« Nous sommes très heureux d’avoir trouvé le partenaire idéal en AMS Systems PSF pendant cette période stimulante de croissance pour notre entreprise », déclara Julian Box, Directeur général de Calligo. « Je suis convaincu que l’expérience avérée d’AMS Systems, ses services technologiques complémentaires et son excellente réputation   appuieront le développement stratégique de Calligo au Luxembourg. Cette acquisition nous apporte une équipe formidable et des clients respectés tout en déverrouillant le marché luxembourgeois. Nous sommes également heureux d’annoncer que nous serons le premier fournisseur d’infrastructures à héberger Azure Stack au Luxembourg. Avec le soutien de notre investisseur Investcorp Technology Partners, nous cherchons activement à réaliser d’autres acquisitions complémentaires stratégiques dans les mois à venir dans le cadre de l’expansion de notre empreinte dans le monde. »

Mark Gillies, fondateur d’AMS déclara : « Nous sommes très heureux de cet accord avec une entreprise aussi respectée et dynamique que Calligo, car il réunit deux organisations très entreprenantes, nous donnant ainsi une occasion unique de développer nos services tout en partageant le succès du réseau international d’infrastructures hébergées en pleine expansion de Calligo. »

Après l’acquisition, AMF Systems PSF sera intégrée dans Calligo. La société rebaptisée continuera à exercer ses activités depuis ses bureaux existants sans changement de personnel afin d’assurer la continuité du service pour ses clients. Au cours des prochains mois, Calligo élargira la gamme de ses services, notamment en étant le premier fournisseur de services à proposer Azure Stack au Luxembourg.

KPMG à Jersey et au Luxembourg et AMMC Law au Luxembourg sont intervenus en tant que conseillers lors de la transaction.

AMS SYSTEMS PSF
AMS Systems PSF fournit et gère des services informatiques pour des petites et moyennes entreprises au  Luxembourg. Ses services couvrent tous les aspects des besoins informatiques des entreprises. En assistant les employés dans le cadre de leurs besoins courants pour le déploiement de nouvelles applications de gestion, AMS soulage le stress lié à l’informatique, permettant aux organisations de se concentrer sur leur activité principale. AMS Systems PSF est réglementée par la CSSF au Luxembourg en tant que « Professionnel du Secteur Financier », ce qui lui permet de proposer des services spécialisés aux organisations financières qui sont soumises à des normes réglementaires rigoureuses. 

Calligo

Calligo est un fournisseur de servicescloud innovants qui proposent à des sociétés de taille moyenne les plus hauts niveaux de protection et de sécurité des données. Elle offre des garanties incomparables en matière de performance des applications et de souplesse commerciale, ainsi qu’un service d’assistance personnalisé depuis ses plateformes cloud situées dans le monde entier. Les entreprises peuvent être assurées que la plateforme proposée par Calligo, qui se concentre sur 4 piliers, garantira le haut niveau de service et de protection qu’elles attendent et qui fait défaut dans de nombreuses propositions de nuages. 

27.9.17

Tekort aan douanespecialisten dreigt: AEB geeft advies over slimme oplossingen tijdens het Nationaal Douanecongres


      Groeiend behoefte aan slimme software door dreigend tekort aan douanespecialisten.
      Gratis advies over douaneprocessen tijdens themasessies en speed-dates met AEB-experts

De komende jaren dreigt een tekort aan douanespecialisten bij handels- en productiebedrijven te ontstaan. Volgens Evofenedex worden douanespecialisten steeds belangrijker door vele veranderingen in het internationale speelveld. AEB laat tijdens het Nationaal Douanecongres op donderdag 12 oktober zien hoe slimme softwareoplossingen deze douanespecialisten kunnen ondersteunen en ontlasten. Andere voordelen: snellere goederenstromen, lagere douanerechten en veiligere en transparantere supply chains.

Het belang van export voor de Nederlandse economie groeit. Tegelijkertijd wordt het exporteren van producten steeds ingewikkelder. Branchevereniging Evofenedex wijst op de gevolgen van Brexit: de op twee na grootste handelspartner van Nederland stapt uit de Europese douane-unie. Ook de handel met Rusland is door de vele sancties steeds ingewikkelder geworden. Maar er ontstaan tegelijkertijd ook nieuwe kansen nu markten als Iran en Cuba opengaan.

De verwachting is dat douanespecialisten het steeds drukker krijgen. Bovendien zullen zij voortdurend moeten investeren in het bijspijkeren van hun kennis. AEB ondersteunt hen met slimme softwareoplossingen, onder meer voor geautomatiseerde douaneaangifte, classificatie, exportcontroles en beheer van oorsprong & preferentie. Op het Nationaal Douanecongres 2017 laat AEB zie hoe deze softwareoplossingen bijdragen aan een versnelde en gecontroleerde internationale goederenstroom, lagere douanerechten en veilige en transparantie supply chains.

Themasessies over exportcontrole
Tijdens het Nationaal Douanecongres duikt Richard Groenendijk, General Manager van AEB Nederland, samen met de deelnemers in het thema exportcontrole. Samen met Sander van Lent van adviesbureau Customs Knowledge laat hij zien wat het belang is van een juiste classificatie voor een zorgvuldige exportcontrole. Aan de hand van diverse cases wordt duidelijk wat de valkuilen zijn en hoe die kunnen worden vermeden.

In een aansluitende sessie gaan Groenendijk en Van Lent in op de vergaande impact van de Amerikaanse exportcontroleregels. Ze leggen uit wat de verschillen zijn tussen de regels van de Europese Unie en de Verenigde Staten. Daarnaast maken ze duidelijk hoe verstrekkend de VS-regels zijn, zelfs voor bedrijven uit de EU. Deelnemers aan deze sessie leren vast te stellen wat de impact van de VS-regels voor hun eigen bedrijf is.

Speeddates met AEB-experts
Deelnemers met specifieke vragen over douaneprocessen kunnen een speeddate aanvragen met één van de drie experts van AEB Nederland. René Wijnants is beschikbaar voor vragen over het vastleggen en up-to-date houden van geclassificeerde goederen; een lastig probleem, omdat goederencodes en dual-use codes zelfs binnen de EU per land kunnen verschillen. Uwe Henning beantwoordt vragen van bedrijven die willen weten wat de mogelijkheden zijn om met één softwareoplossing douaneaangiften in verschillende landen te doen. Carsten Amtrup tot slot is de expert in inzicht en transparantie: hoe krijgt u zonder al te veel inspanning inzicht in uw internationale handelsstromen

Het Nationaal Douanecongres vindt plaats op donderdag 12 oktober in het WTC Rotterdam. Het congres start om 10.00 uur en eindigt rond 17.15 uur met een netwerkborrel. Kijk voor meer informatie en voor een online inschrijfformulier op www.douanecongres.nl.


26.9.17

Bankbot trojan returns to Google Play with new tricks


The dangerous Android banking trojan that we first informed about in the beginning of this year has found its way to Google Play again, now stealthier than ever.
Dubbed BankBot, the banking trojan has been evolving throughout the year, resurfacing in different versions both on and outside Google Play. The variant we discovered on Google Play on September 4, is the first one to successfully combine the recent steps of BankBot’s evolution: improved code obfuscation, a sophisticated payload dropping functionality, and a cunning infection mechanism abusing Android’s Accessibility Service.
Misuse of Android Accessibility has been previously observed in a number of different trojans, mostly outside Google Play. Recent analyses from SfyLabs and Zscaler have confirmed that the crooks spreading BankBot managed to upload an app with the Accessibility-abusing functionality to Google Play, only without the banking malware payload.
The “complete puzzle” featuring the banking malware payload managed to sneak into Google Play masqueraded as a game named Jewels Star Classic (it is important to note that the attackers misused the name of popular legitimate game series Jewels Star by the developer ITREEGAMER, which is in no way connected to this malicious campaign).
We have notified Google’s security team of the malicious app, installed by up to 5000 users before getting removed from the store.
How does it operate?
When the unsuspecting user downloads Jewels Star Classic by the developer GameDevTony (Fig. 1), they get a functioning Android game, only with some hidden extras – banking malware payload lurking inside the game’s resources, and a malicious service waiting to be triggered after a pre-set delay.
The malicious service is triggered after 20 minutes from the first execution of Jewels Star Classic. The infected device shows an alert prompting the user to enable something named “Google Service” (note: the malicious alert appears independent of the user’s current activity, and with no apparent connection to the game).
After clicking on OK, which is the only way to stop the alert from appearing, the user is taken to the Android Accessibility menu, where services with accessibility functions are managed. Among legitimate ones, a new service named “Google Service” is listed, created by the malware. Clicking on it displays a description taken from Google’s original Terms of Service.
When the user decides to activate the service, they see a list of required permissions: Observe your actions, Retrieve window content, Turn on Explore by Touch, Turn on enhanced web accessibility and Perform gestures Clicking on OK grants accessibility permissions to the malware’s own accessibility service. By granting these permissions, the user gives the malware a free hand – almost literally – to carry out any tasks it needs to continue its malicious activity.
In practice, after accepting the permissions, the user is briefly denied access to their screen due to “Google service update” – needless to say, not initiated by Google – running in the foreground.
The malware uses this screen to cover its next steps – clicking on user’s behalf using the previously obtained accessibility permissions. While the user waits for the fictitious update to load, the malware carries out the following tasks:
·         allow installing apps from unknown sources
·         install BankBot from assets and launch it
·         activate device administrator for BankBot
·         set BankBot as default SMS messaging app
·         obtain permission to draw over other apps
After these tasks are successfully carried out, the malware can start working towards its next goal: stealing the victim’s credit card details. As opposed to other BankBot variants that target an extensive list of specific banking applications and impersonate their login forms in order to harvest entered credentials, this one focuses exclusively on Google Play – an app every Android user has preinstalled on their device.
When the user launches the Google Play app, BankBot steps in and overlays the legitimate app with a fake form requesting user’s credit card details
If the user falls for the fake form and enters their credit card details, the attackers have essentially won. Thanks to BankBot setting itself as the default messaging app, it can intercept all SMS communication going through the infected device. This enables the attackers to bypass SMS-based two-factor authentication on the victim’s bank account – the last potential obstacle between them and the victim’s money.
What makes it so dangerous?
In this campaign, the crooks have put together a set of techniques with rising popularity among Android malware authors – abusing Android Accessibility Service, impersonating Google, and setting a timer delaying the onset of malicious activity to evade Google’s security measures.
The techniques combined make it very difficult for the victim to recognize the threat in time. Because the malware impersonates Google and waits for 20 minutes before displaying the first alert, the victim has very little chance to connect its activity to the Jewel Star Classic app they’ve recently downloaded.  On top of that, the many different names the malware uses throughout the infection process significantly complicate efforts to locate and manually remove it.
How to clean infected device?
If you’re downloading many different apps from Google Play and elsewhere, you might want to check if you haven’t reached for this malware.
Checking your device for Jewels Star Classic is not enough, as the attackers frequently change up the apps misused for BankBot’s distribution. To see if your device has been infected, we recommend you go after the following indicators:
·         Presence of an app named “Google Update” (shown in Fig. 8 and found under Settings > Application manager/Apps > Google Update)
·         Active device administrator named “System update” (found under Settings > Security > Device administrators).
·         Repeated appearance of the “Google Service” alert
If you find any of the mentioned indicators, your device may well have been infected with this BankBot variant.
To manually clean your device, you would first need to disable device administrator rights for “System update”, then proceed to uninstalling both “Google Update” and the associated trojanized app.
However, finding which trojanized app started the infection (like, in this case, Jewels Star Classic) is tricky due to the 20 minute delay of malicious activity, as well as the fact that the app works as expected. To detect and remove the threat with all its components, we recommend using a reliable mobile security solution.
ESET security products detect and block this variant of BankBot as Android/Spy.Banker.LA. 
How to stay safe?
Besides using a reliable mobile security solution, there are other things you can do to avoid falling victim to mobile malware:
·         Whenever possible, favor official app stores over alternative ones. Although not flawless, Google Play does employ advanced security mechanisms, which doesn’t have to be the case with alternative stores.
·         When in doubt about installing an app, check its popularity by number of installs, ratings and content of reviews.
After running anything you’ve installed on your mobile device, pay attention to what permissions and rights it requests. If an app asks for intrusive permissions – even more so if Accessibility-related – read them with caution and only grant them if absolutely sure of the app’s reliability.
What is BankBot?
First detected by ESET on December 26, and first analyzed by Dr. Web, BankBot is a remotely controlled Android banking trojan capable of harvesting banking details using phony login forms for a number of apps, intercepting text messages in order to bypass 2-factor-authentication, and displaying unsolicited push notifications.
Shortly after the discovery of the apps trojanized with BankBot on Google Play in the beginning of 2017, we have confirmed the malicious apps were derived from source code made public on underground forums in December 2016. The public availability of the code has led to a surge in both the number and sophistication of mobile banking trojans.

25.9.17

Cloud services: What to consider when migrating your infrastructure

I can barely remember the last time I installed a physical server at a company. These days, most companies have switched the majority of their services and information over to cloud services. There are many reasons for this, ranging from cost to practicalities — like trying to avoid buying hardware that will later become obsolete or lose its value, avoiding the costs of maintenance and energy, or simplifying the work of the IT department. Another advantage, from the perspective of smaller businesses, is the ability to add a server or a specific service at the touch of a button.
While this – now not so new – solution has made things much simpler for small and large companies alike, it has also led to new discussions and considerations about security.
If you have migrated your services and information to the cloud, or are thinking of doing so, here are a few considerations to keep in mind that could help you avoid a bad experience.
1. Know your service provider
With so many cloud computing services on the market these days, the first step is deciding who to entrust with your company’s information and systems.
To make this decision, it isn’t enough merely to consider which services and platforms the various providers offer; rather, it is also important to take into account their reputation and to carefully read the terms of their contract. Is the company responsible with the information it handles? What security measures do they apply? Do they have security certifications? Have they had any incidents? If so, how did they handle them?
A more prestigious company’s services may be more expensive than those of a smaller, less known company. However, we need to be aware that the maintenance tasks involved in keeping an infrastructure secure, requires time and energy, and this often translates into a higher cost for the customer. Remember, when it comes to security, what appears to be cheap can turn out to be very costly.
2. Understand your business and your needs
We have applied this tip to countless circumstances: Designing a security policy, certification of a standard, backup models, and the implementation of new technologies. The point is, before you make any important decision, you always have to think about how it will affect your business, and consider what your company’s goals are.
If you need a fast connection without lag or latency between your office and the cloud services, you could be in for some disappointment. Perhaps the ability to store files in the cloud and access them from anywhere is a tempting solution, but if we are talking about database queries, the response time could have an impact on your business.
If you deal with large volumes of information in real time, it may be worth considering an optimization option before taking those services to the cloud.
3. Encrypt your information
Encrypt data stored in the cloud as well as data in transit; basically, encrypt everything that can be encrypted! While this may require extra effort and increase the complexity of operations, what is certain is that doing so adds an additional layer of security to all your confidential information.
Remember that if you decide to take out services in the cloud and deposit your data there, you will also be delegating, to a large extent, the protection of this information. As secure and reliable as a provider might be, it is not a good idea to be completely dependent on one, and it is never overdoing it to encrypt critical data so that, in the event of a security breach, the data is not exposed.
 4. Control access to the cloud
Although your data and applications may no longer be located physically within your organization, it does not mean you can simply wash your hands of all management tasks. Your service provider may supply you with an array of security controls, and keep the infrastructure protected, but if you leave the door open, it will all be in vain.
Restrict access to the information, just as you would if it were located within your organization. Segregate functions and restrict user connections. In fact, it is highly recommended to use extra protection measures like two-factor authentication when starting a session on a cloud-based platform.
5. Back up your information
Today, backups are one of the most basic and fundamental protective measures in any security system. While this service tends to be included in the contract and forms part of the tasks performed by the provider, we must remember that it is not only a matter of safeguarding the information — but also of being able to recover it.
For this reason, it is recommended that you regularly restore the backed-up information. This way, not only will you be able to check that the provider is fulfilling this aspect of the contract, but also that the information will be complete and available when you need it.
6. Read the terms and conditions of service carefully
Pay special attention to the sections that talk about the handling of information, and about privacy and liability with regard to the information you store on the cloud. You would not be the first to come across phrases like: “You give us the right to access, retain, use, and divulge information from your account and your files for the purpose of providing you with support and resolving technical problems” or “We do not guarantee that your files will not be subject to misappropriation, loss or damage, and we will not be held liable if this should happen.”
Also check the response times and SLA (Service Level Agreement) promised by the provider and ensure that they are within the time frames and commitments you have with your customers. Avoid having these surprises crop up when an incident occurs, or when you make a complaint.
7. Remember: The cloud can get infected too
It is a common mistake to think that malware cannot affect equipment in the cloud. In fact, we have seen a number of variants of the Crisis malware, which infects equipment running VMWare systems. Just as there is malicious code out there that is designed for attacking virtualization platforms, like Venom, we also need to take into account the known threats that continue to spread through operating systems.
Having your infrastructure in the cloud does not exempt you from the need to use a good comprehensive security solution that includes protection for servers and services, as well as for the hardware which accesses that infrastructure.
Of course, the cloud can offer great advantages for your company, and it will depend on your individual business when it comes to the type of services and information you decide to migrate to this platform. Whatever your circumstances may be, don’t forget these tips to keep your information protected and to make your migration as secure as possible.