Protecting Your Ham Shack's Computing Resources
Total Page:16
File Type:pdf, Size:1020Kb
HAM SHACK FU! Protecting Your Ham Shack’s Computing Resources Chris Miltenberger W5CMM May 25, 2017 IDENTIFYING THE RISKS • Self-inflicted harm • Support scams • Security Breaches • Wireless networks • Data Leaks • Internet of Things (IoT) • Phishing • Hardware failure • Malware • Weather and Infrastructure SELF-INFLICTED HARM • File sharing / Warez • Poor security practices • Poor equipment maintenance • Lack of situational awareness SECURITY BREACHES • Yahoo • Target • Home Depot • TJ Maxx DATA LEAKS •Chelsea Manning •Edward Snowden •Wikileaks •Shadow Brokers PHISHING Email that appears to come from an acquaintance, coworker, customer, delivery company, etc. but actually comes from an impersonator. • Your mailbox is full. • You need to verify your account. • You have a package waiting from UPS, FedEx, DHL, etc. • Please authorize a financial transaction. MALWARE • Viruses – Must be executed by the user. • Worms – Can spread without any user intervention. • Trojans – Provide attacker with remote control of your system. • Bots – Use your computer for DDoS attacks (distributed denial of service) attacks. • Scareware – Threatens the user with a phony notification from FBI, DHS, etc. • Ransomware – Encrypts your data and holds it for ransom. WANNACRY? • Launched 5/12/2017 • Spreads through Server Messenger Block version 1 (SMB v1) using the ETERNALBLUE exploit. • Installs the DOUBLEPULSAR remote access Trojan and Tor to facilitate communications with the ransomware author. WANNACRY? • Attempts to infect all connected drives, mapped network shares, and remote desktop sessions. • This is a worm so it can spread by itself to vulnerable computers across your network. WANNACRY? • ETERNALBLUE and DOUBLEPULSAR were part of the Shadow Brokers release of the NSA Equations Group hacking tools earlier this year. • MS17-010 patch released in March. • Windows Vista, 7, 8.1, and 10 systems without MS17-010 are vulnerable. WANNACRY? • Microsoft released a patch for older unsupported systems (XP, 8, Server 2003) the afternoon of 5/12/2017. • Windows 10 is mostly invulnerable due to forced updates. • Keep your computers behind a router that blocks SMB v1. • Uninstall SMBv1. WANNACRY? • Originally thought to be the work of a nation-state, but now thought to be the work of the Lazarus Group. • The same group is responsible for the 2014 Sony Pictures hack and the 2016 siphoning of $81M from Central Bangladesh Bank. SUPPORT SCAMS • Typically a call from Microsoft or some other respected company. • Typical social engineering claims are “you are infected” or “your neighbors are using your internet connection”. • Attacker tries to social engineer access to victim’s computer • Convinces victim to download and install a remote access tool to gain and retain access to your computer. • Shows victim large list of network connections or errors in event logs. • Offers to fix the problems, install a product, etc., often as a monthly service. WIRELESS NETWORKS • Insecure home wireless network. • Using an public, insecure, untrusted, or open wireless network. • Not updating or patching wireless drivers with known vulnerabilities. INTERNET OF THINGS • Smart TVs Samsung and Visio have both had issues with insecure or out-of-date applications, or with spying on customers. • Smart Appliances PornHub was found running on a smart refrigerator in Home Depot. HARDWARE FAILURE • Hardware can fail at any time. • Power surges can destroy multiple computer components. • Failing power supplies can cause other components to fail. • Hard drives crash. Data recovery is sometimes possible, but requires an expert. Recovery of SSDs (solid state drives) are much more difficult, if not impossible. • Data recovery services are expensive ($300 and up). WEATHER • Hurricanes – We live in Louisiana…no big surprise here. • Tornados – More in recent memory. • Floods – Again…we live in Louisiana. • Lightning – A major threat to amateur radio equipment. INFRASTRUCTURE • Aging power distribution infrastructure can cause voltage spikes and outages. • Older homes have poor/substandard wiring. • Squirrels and other varmints can destroy wires. WHAT CAN WE DO? • Improve our security awareness. • Improve our security posture. • Improve our security practices. • Prepare and follow a plan. SECURE YOUR WIRELESS NETWORK FACT: Wireless networks can be breached. Understand and accept this, but do everything you can to make it as difficult as possible for attackers. • Upgrade your router’s firmware or replace it with a new router. • Disable WPS (Wi-Fi Protected Setup). An attacker can exploit WPS to get on your wireless network in a matter of minutes. • Don't bother hiding your SSID or using MAC address filtering. An attacker can sniff the wireless traffic to find the SSID and the MAC addresses of authorized clients as they reauthenticate, and then clone the MAC address to gain access. SECURE YOUR WIRELESS NETWORK • Use WPA2-PSK with AES encryption. If you use anything weaker, like WEP or WPA1-PSK with TKIP, your wireless network is much easier to breach. • Use a long and complex passphrase. Include upper and lower case letters, numbers, and special characters. Shorter passphrases can be attacked quickly with rainbow tables (tables of precomputed hashes). • Change the default SSID and passphrase. There are rainbow tables for default SSID/passphrase combinations. SECURE YOUR WIRELESS NETWORK • Most newer wireless routers have guest networks separate from the main network. Make use of that feature especially if you have kids/grandkids! • Some wireless routers have personal VLANs (where wireless clients can't talk to each other). This is sometimes called wireless client isolation. Leveraging this feature can prevent malware from spreading. • Remember…if you give someone the passphrase to your main wireless network they have access until you change the passphrase. If you type it in for them the passphrase can be easily recovered. PUBLIC WI-FI • Avoid using public Wi-Fi. • Some public hotspots are unencrypted and can be sniffed for usernames and passwords. • Rogue access points that broadcast a “trusted” SSID use man-in- the-middle attacks to steal your credentials. • Use the cellular data or a personal hotspot on your device. • If you must use public Wi-Fi consider using a trusted VPN. USE DEDICATED COMPUTERS IN YOUR SHACK. • Restrict your shack computer to rig control, logging, QRZ lookups, connections to clusters, etc. • Avoid casual web surfing, emails, videos, etc. • Use Linux or MacOS – less prone to infections than Windows. • Advanced – Put your shack systems on an isolated VLAN. PATCH YOUR OPERATING SYSTEM • Use a supported operating system. • Fully patched versions of Windows 7, 8, and 10, and Server 2008 R2, 2012, 2012 R2, and 2016 are supported. • Earlier versions of Windows are not supported and usually do not get security patches. The WannaCry patch released 5/12/2017 was an exception. • Most machines that came with Windows XP can run Windows 7 or Linux. • Patch Tuesday – 2nd (and possibly the 4th) Tuesday each month. • Allow the operating system to automatically check for and install patches. PATCH YOUR APPLICATIONS • Go for the low hanging fruit first. Java, Flash, and Acrobat are the most often exploited attack vectors by malware/ransomware. • Java will notify you when there's an update available. Unless there's an extremely good reason for not updating Java (some programs need a specific version of Java to run) you should update it ASAP. If you don’t need Java then uninstall it. • Flash will ask about installing new updates after a reboot. Install the update ASAP. If you don’t need Flash uninstall it (or disable the plug-in in Chrome). • Acrobat can check for updates (under Help > Check for Updates…). Consider using a different PDF reader like Foxit Reader or CutePDF. PATCH YOUR APPLICATIONS • Uninstall software you don't need or use with an uninstall tool like Revo Uninstaller. It uninstalls the software and removes all remaining files and registry entries. • Use an application like Personal Software Inspector to check for, and apply, application updates. • Allow trusted applications to automatically update themselves. • Use a utility like Snappy Driver Installer to update your drivers. USE A GOOD ANTIMALWARE UTILITY (OR TWO) • Primary - Malwarebytes (free/paid), Microsoft Defender (free), Avira (free/paid), BitDefender (free/paid), Avast (free/paid), ESET (paid), Norton (paid), ZoneAlarm (free/paid), etc. • Secondary – RansomFree, CryptoPrevent, SUPERAntiSpyware, SpyBot Anti Beacon, etc. DON'T RUN AS AN ADMINISTRATOR (OR ROOT) • Using a regular user account will block over 90% of all current Windows vulnerabilities. • Create unprivileged guest accounts for anyone* that uses your computer. *Your kids or grandkids will infect your system! FILE SHARING • Are you sure what you're up/downloading isn't copyrighted, illegal, or contains child pornography or malware? • File sharing uses a large amount of data. • Sharing copyrighted material can result in your ISP terminating your Internet account and leave you open to legal action by the copyright holder. • Sharing child pornography will send you to prison. WAREZ • Almost 100% of hacked or cracked software contain malware. • Almost 100% of keygens (registration key generators) contain malware. • If the program is worth stealing it's probably worth buying. • Most commercial (for pay) amateur radio programs have equivalent low cost, free, or open source alternatives. EMAIL • Don't open attachments unless you are certain they are safe. • Download