The Dark Escrow

Total Page:16

File Type:pdf, Size:1020Kb

The Dark Escrow Security Now! Transcript of Episode #820 Page 1 of 22 Transcript of Episode #820 The Dark Escrow Description: This week we examine Firefox's just-released and welcome re-architecture under codename "Fission." We look at a new and recently active ransomware player named "Conti" and at a recently paid, high-profile mega ransom. We then ask the question, "When they say IoT, do they mean us?" We examine the implications of a new industry term, "mean time to inventory." We'll then lighten things up a bit with a new form of CAPTCHA and, of all things, a screensaver I discovered that I cannot take my eyes off of. (Leo, it's not quite as bad as whatever that game is that you cannot stop playing, but still.) We'll then share an ample helping of closing-the-loop feedback from our terrific listeners, after which I want to conclude by predicting what I would bet we're probably going to next see emerge from the evolving ransomware business model sad though it is to utter the phrase "ransomware business model." High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-820.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-820-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We've got a great show for you. Brand new feature in Firefox. It's called Firefox Fission. Steve explains it and shows you how to turn it on. I did immediately. We'll also talk about a new form of CAPTCHA that involves playing Doom. I like this. Even has the sound. And then Steve's vision for the future of ransomware. Sort of. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 820, recorded Tuesday, May 25th, 2021: The Dark Escrow. It's time for Security Now!, the show where we cover your security, your privacy, your safety online with Mr. Steven Gibson of GRC.com. Hello, Steve. Steve Gibson: And yes, ladies and gentlemen, those of you listening and watching live, check your clocks. It's actually not quite 1:30 a.m. Wait, p.m. Leo: We're early. Shall we just stop and wait for three minutes? Steve: No, no, no, no. Let's see how much we can cram in before the clock hits 1:30 and the official start time. This is Episode 820 for May 25th. And I titled this "The Dark Escrow" just because dark is cool; you know? I mean, you can kind of have like dark anything, and it's neat. Like the dark melon. Well, maybe not that. But anyway, as a consequence of some of the aftermath of what happened with the DarkSide ransomware Security Now! Transcript of Episode #820 Page 2 of 22 when they tiptoed into the Colonial Pipeline mess, and some things that have happened since, which we're going to talk about, I have sort of some thoughts about where we're probably going to go next. So I wanted to share that. But we've got lots of interesting stuff to talk about. We've got Firefox's just-released and welcome re-architecture under codename "Fission." We've been waiting for this for a while. They're a little late to the game. It turns out - we'll talk about this - it's difficult to do what they've done. Chrome did it, and the Firefox, we've been waiting for them to follow. And it's now something that all Firefox users can turn on. I immediately did. And it's a good thing. We're going to look at a new and recently active ransomware player named Conti since they're looking like they're going to be something we'll be talking about to some degree in the future. So I thought I would introduce our listeners to Conti. And also at a recently paid, high-profile, what you would have to call literally a "mega ransom." We then ask the question, when they say IoT, do they mean us? And we examine the implications of a new industry term, "mean time to inventory." And it's not good. We'll then lighten things up a bit with a new form of CAPTCHA. And anyone who wants to cheat can - I'll tell you that it's this week's GRC shortcut. So those who've been paying attention know what the URL would be for this week's shortcut, and it's kind of fun. Then, of all things, I want to share a screensaver that I discovered, that I cannot take my eyes off of. And Leo, it's not quite as bad as whatever that game is that you cannot stop playing. But still it's absorbing more of my time than I want to admit, just sitting there, like, whoa, look at that. Leo: I don't know if staring at a screensaver's worse than playing a game. But, all right. Steve: Yeah, I'm not getting any points for it, that's for sure. Okay. Then we're going to share an ample helping of closing-the-loop feedback from our terrific listeners because there was just a bunch of stuff that came in that I wanted to share. And then we're going to conclude by predicting what I would bet we're probably going to next see emerge from the evolving ransomware business model, sad though it is to even utter the phrase "ransomware business model." Oh, and we do have a great Scott Adams cartoon as our Picture of the Week. So I think another great podcast for our listeners. And we can begin officially, now that it is now 1:30. I've had this one in the queue for a while, and I thought, yeah, now is the time. This is on the theme of being careful what you ask for. So we have a three-frame cartoon by the brilliant Scott Adams. We have the boss is addressing three of his employees. And so in the first frame we have the boss saying, "Our goal is to write bug-free software. I'll pay a $10 bonus for every bug you find and fix." And then in the middle frame we have the three employees. The first one, "Yahoo!" And then the second one says, "We're rich." And the third one says, "Yes! Yes! Yes!" And then, sort of wondering if he's come up with the right policy, we see the boss saying, "I hope this drives the right behavior." And one of the employees says, "I'm going to write me a new minivan this afternoon." So, yeah, if your employees are able to find their own bugs, well, that may not be the best way to produce bug-free software, is the point. So Firefox has finally achieved sustained Fission. Fission is Mozilla's name for full-site isolation. That is, fission of course being breaking things apart. The original design for all web browsers was as a single app running on an operating system. Or a bit more formally, a process being hosted by the OS. And the trouble was browsers have kept Security Now! Transcript of Episode #820 Page 3 of 22 growing more and more complex, to the point that the line you know has become blurred between an OS app and what a browser can do with a web page. Case in point, the other day I followed a link to a drag-and-drop mechanical electrical circuit design page where, for example, a capacitor was emulated by a balloon being filled up. An inductor was created by a flywheel. A resistor was a narrowing pipe and so on. And I initially took the page for granted, until it occurred to me that this amazing, fully animated creation was not an app in a classic sense, but this was being entirely done on a web page in my browser. And we're all kind of getting used to that. So yeah. Today's browsers have become incredibly complex and capable. But as we know, complexity is the enemy of security. It's not impossible to have both. But it turns out that it's impractically expensive to actually have both. So we get features that mostly work. And as for security, we hope for the best while we fix the flaws that are later uncovered on the fly, after the fact. But browsers are sort of a special case for problems because the presence of the near certainty of flaws as we just keep fussing with our browsers, making them more and more capable, but more and more complex, raises the specter of containment. If flaws are inevitable, then what we want is to at least contain them. The last thing we want is for a flaw to be leveraged to reach across web browser pages, or really across domains, to infect an unrelated page to leverage its access to some other site, for example, where we're logged into our banking site. We don't want some sketchy page we're visiting to be able to peruse the other tabs we have open and say, oh, look what we found here. Let's go there. And a perfect analogy is, for example, of like this problem, the need for separation is my insistence upon applying network segmentation for IoT devices which are inherently high risk.
Recommended publications
  • Solarblizzard
    Security Now! Transcript of Episode #800 Page 1 of 27 Transcript of Episode #800 SolarBlizzard Description: This week we open the New Year taking a longer look at fewer topics since the bad guys were apparently enjoying their New Year holiday, too. So we look at an interesting kludge that's been forced upon Chrome by ill-mannered antiviral scanners. We need to warn all enterprise users of Zyxel network border security products of another recently discovered built-in backdoor. We look at the rise in IoT compromise swatting attacks and a series of new flaws and vulnerabilities in the PHP Zend and Yii frameworks. We have a quick bit of miscellany to share, then I want to explain a lot about the value of trimming SSDs and newer SMR drives. And we'll conclude by catching up with what will hopefully be the last news, for a while at least, of the disastrous SolarWinds breach and intrusions. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-800.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-800-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here with a defunct football; a very bad AV security practice that Chrome has had to do something maybe even worse to fix. We'll talk about the built-in password access in 100,000 Zyxel firewalls, VPN gateways, and access point controllers; an update on SpinRite 6.1; and a whole lot more. Security Now! is coming up next.
    [Show full text]
  • Internet Safety: Keeping Your Computer Safe on the Internet
    Copyright © 2003-2010 Puget Sound Software, LLC and Leo A. Notenboom 1 Internet Safety Keeping your Computer Safe on the Internet 3rd Edition by Leo A. Notenboom http://ask-leo.com Copyright © 2011 Puget Sound Software, LLC & Leo A. Notenboom All rights reserved. ISBN: 978-1-937018-03-0 Copyright © 2003-2010 Puget Sound Software, LLC and Leo A. Notenboom 1 Copyright and Disclaimer This book is protected by US and International copyright law, and is Copyright © 2011 by Leo A. Notenboom and Puget Sound Software, LLC, all rights are reserved. Having said that, the PDF electronic version (only) of this book is FREE. In fact, I encourage you to share this book with others as long as you share it: In its entirety (the book, the whole book and nothing but the book) In its original form (no changes made and no markups added) You may not charge for this book when you share it. Furthermore, you may not incorporate this book into any product or collection that is not free. (Drop me a line for pricing if you want to do something along those lines.) This book is based on my experience and anecdotal evidence. I've tried to ensure that everything written here is as accurate as possible at the time of publication, but I cannot assume any responsibility for mistakes or omissions. On top of that, I know nothing about your specific computer, your specific experience and your specific abilities to understand and act appropriately on the information herein. The bottom line is that you, and only you, are responsible for using this information appropriately, safely and as you see fit, and for any of the consequences of having done so.
    [Show full text]
  • SQRL: Anti-Phishing & Revocation
    Security Now! Transcript of Episode #426 Page 1 of 30 Transcript of Episode #426 SQRL: Anti-Phishing & Revocation Description: After following-up on a week chockful of interesting security news, Steve and Leo continue with their discussion of SQRL, the Secure QR code Login system, to discuss two recent innovations in the system that bring additional valuable features. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-426.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-426-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson has the latest - yes, another Java patch - and more information about Lavabit. More information about the NSA, too. What is a Ferret's Cannon? It's coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 426, recorded October 16th, 2013: SQRL, Anti-Phishing, and Revocation. It's time for Security Now!, the show that covers your privacy and security online. Somebody in the chatroom before we began the show today, Steve Gibson, Explainer in Chief, said we should call it "Insecurity Now!" since it really talks mostly about insecure. But not today. Today we're going to talk about better security. Steve Gibson: Well, yeah. Actually, this is one of those episodes where so much happened in the last week in security news that, I mean, we just - there's a whole bunch of really interesting stuff to talk about. And in the past when we've done that we've just said, okay, we're not going to have any major topic because too much happened.
    [Show full text]
  • Podcast Industry Audience Rankings July 2016
    PODCAST INDUSTRY AUDIENCE RANKINGS JULY 2016 2 INTRODUCTION With the growing popularity of podcasts, more and more brands and agencies are exploring the medium in search of opportunities that make the most sense for their brands. And publishers are making important content decisions about ways to expand or better serve their audiences across multiple shows. What is the most accurate measure of podcast audience size? An obvious place for advertisers to begin exploring podcast advertising is with understanding the relative audience sizes of podcast publishers and of podcasts individually. Podtrac has provided the leading measurement service for podcasts since 2005. In 2016, Podtrac introduced “Monthly Unique Audience” for the podcast ​ ​ industry. It's the same metric used for planning other types of digital media, and for the first time it's available for podcasts from Podtrac. Monthly Unique Audience from Podtrac is available: ● By podcast publisher across all of the podcast shows and episodes they produce ● By show for all of the podcast episodes they produce ● By global and U.S. audience counts “Monthly Unique Audience” is an important metric in digital media because it enables advertisers and publishers to consider monthly audience reach in addition to potential impressions served. And as with other media, the monthly unique audience metrics from Podtrac are consistent across publishers and shows whether the episodes post daily, twice a week, weekly, etc. Which podcasts are audiences listening to most? Podtrac produces a monthly Ranking Report showing the top publishers in the industry by US audience. Podtrac is in a unique position to produce this report, because of its podcast measurement technology and its 10+ years of measurement relationships with substantially all of the top publishers in the industry.
    [Show full text]
  • 700 & Counting
    Security Now! Transcript of Episode #700 Page 1 of 27 Transcript of Episode #700 700 & Counting Description: This week we discuss Chrome getting spell check for URLs; a bunch of Linux news with reasons to be sure you're patched up; some performance enhancements, updates, additions, and deletions from Chrome and Firefox; more Facebook nonsense; a bold move planned by the Japanese government; Ubiquiti routers again in trouble; a hopeful and welcome new initiative for the Chrome browser; a piece of errata; a quick SQRL update; and some follow-up thoughts about VPN connectivity. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-700.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-700-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. Lots to talk about, including new systemd vulnerabilities. Linux users, listen up. We'll also talk a little bit about Chrome, a new feature giving us URL spell checking, and why TLS 1.0 and 1.1 are soon to hit the highway. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 700, recorded Tuesday, February 5th, 2019: 700 & Counting. It's time for Security Now!, the show where we cover the latest developments in the world of security and privacy, help you understand how computing works, and have a little fun along the way with this guy right here, Steve Gibson. He's the commander in chief of the good ship Security Now!.
    [Show full text]
  • Ublock Origin
    Security Now! Transcript of Episode #523 Page 1 of 27 Transcript of Episode #523 uBlock Origin Description: Leo and I catch up with the week's major security events. We then examine the ecosystem of web page advertising by comparing it to other "opportunistic advertising" such as that appearing on public transportation, highway billboards, broadcast television commercials and other public venues - which consumers have no obligation to consume. I eschew the implication that visitors to a web page have an obligation to retrieve third-party content, over which the website has little or no control, which consumes bandwidth, reduces online privacy, hinders performance, and potentially exposes visitors to malicious exploitation. And I believe this remains true even when a visitor's retrieval of such despicable third-party content would generate much-needed revenue for the visited site. Finally, I review the many operational features of uBlock Origin, my chosen HTML firewall, which effectively returns control to web users. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-523.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-523-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson's here. This is the episode I've been waiting for all week. He's going to cover adblocking, why he thinks we need adblockers, and, I think, I'm guessing, his favorite ad blocker to date. Actually, I like it a lot, too. uBlock Origin, how it works, how to work it best, coming up next on Security Now!.
    [Show full text]
  • Security Now! #560 ­ 05­17­16 Z­Wave Goodbye
    Security Now! #560 ­ 05­17­16 Z­Wave Goodbye This week on Security Now! ● Steve's long love affair with Windows ● The Oracle/Google JAVA API lawsuit ● The pending registration of "burner" phones ● Surveillance microphones found in public areas ● John McAfee and team cracks WhatsApp encryption? ● The Ring Doorbell may need another update ● A security­related Kickstarter which Security Now listeners would never fall for. ● A controversial feature being removed from Windows 10 ● A worrisome and exploitable heap corruption in the popular 7­Zip application ● ... and a look at the Z­Wave Home Automation system What was last week’s 3035583 refresh all about? ​ ​ Security News “Why does Steve hate Windows 10 so much?” ● Let’s get this straight, everyone: I LOVE WINDOWS. Source: https://analytics.usa.gov/ ​ ● 83.60% = Win7/44.56% Win10/17.90% Win8.1/10.30% WinXP/7.46% Win8/3.38% ● My complaint is that Windows is a commercial, closed­source, profit center for a massive corporation which must keep finding ways to leverage Windows’ market share for its own ​ ​ profit. ● For me, Windows is not a curio, a toy, or a platform for instagram and social media. Windows is a tool. It is my chosen tool. But Microsoft needs to keep changing it, NOT ​ ​ TO MAKE IT BETTER, but only for the sake of making it new. ​ ​ ● So there is an inherent tension between Microsoft’s interests and my own. ● An operating system should manage file systems, manage the system’s memory, manage applications and services, provide I/O services… and more recently provide a comfortable and convenient desktop environment for its user.
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]
  • Breaches & Vigilante Worms
    Security Now! Transcript of Episode #528 Page 1 of 30 Transcript of Episode #528 Breaches & Vigilante Worms Description: With many massive Internet data breaches, and a prolific vigilante worm loose on the Internet, Leo and I spend a fun- and fact-filled podcast covering the past week's multitude of news. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-528.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-528-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. My goodness, it's been a busy week. This is going to be an all-news episode. We'll talk about the vigilante worm. We'll talk about security breaches at some very well-known sites. And we'll also talk a little bit about updates that make Marshmallow, Android 6.0, more secure. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 528, recorded Tuesday, October 6th, 2015: Breaches & Vigilante Worms. It's time for Security Now!, the show in which we protect you and your family and your loved ones online. We scour the Earth for new vulnerabilities, attempt to plug the holes, and it's all thanks to this guy. Steve Gibson: Actually, they find us, Leo. We need not scour. And if I thought I ever had to before, Twitter has solved that problem for me. Leo: Yeah. Steve: It's just - it's such a fabulous resource. I've got, you know, as I mentioned before - actually, I don't think I did mention that I mentioned we were nearly at - I.
    [Show full text]
  • Take a Close Look at Windows Server 2008
    0208red_Cover.v9 1/17/08 3:37 PM Page C1 Foley: Is Silverlight the White Elephant in the Room? 64 FEBRUARY 2008 REDMONDMAG.COM TakeTake aa CloseClose LookLook atat WindowsWindows ServerServer 20082008 Will it be your next-generation platform? 26 > $5.95 02 • FEBRUARY +Beta Man Looks at Microsoft Search Server 1212 Get Ready for SQL Server 2008 37 25274 867 27 71 Searching for Enterprise Search Engines 45 Project2 1/14/08 12:46 PM Page 1 UB_CatchPhrase_Redmond.ai 1/11/08 12:03:14 PM ™ Reliability — Catch phrase or reality? Hot backups. Business continuity. Continuous data protection. These and other buzzwords have been generated by the technology industry to get your attention. But what do these terms mean to you? To UltraBac Software, they are another way of explaining the goal at the center of our business: perfect uptime. We invest the time and resources to offer solutions that ensure you have the fastest, most reliable access to your stored data, avoiding costly downtime waiting for failed machines to recover. Introducing Continuous Image Protection (CIP). UltraBac Software is so excited about our new technology that aids in this goal, we’re announcing CIP before its planned release. CIP is a form of continuous data protection (CDP) with a new innovation: it automatically backs up each sector on a disk as it is changed, unlike standard image backups which run only on a periodic basis. With CIP, your image backup never stops – so a system can be brought back to a point-in-time, rather than restoring a static image that could be up to 23 hours old.
    [Show full text]
  • Podcast Industry Audience Rankings Expanded Advertiser Edition: June 2016
    PODCAST INDUSTRY AUDIENCE RANKINGS EXPANDED ADVERTISER EDITION: JUNE 2016 2 INTRODUCTION With the growing popularity of podcasts, more and more brands and agencies are exploring the medium in search of opportunities that make the most sense for their brands. And publishers are making important content decisions about ways to expand or better serve their audiences across multiple shows. What is the most accurate measure of podcast audience size? An obvious place for advertisers to begin exploring podcast advertising is with understanding the relative audience sizes of podcast publishers and of podcasts individually. Podtrac has provided the leading measurement service for podcasts since 2005. In 2016, Podtrac introduced “Monthly Unique Audience” for the podcast ​ ​ industry. It's the same metric used for planning other types of digital media, and for the first time it's available for podcasts from Podtrac. Monthly Unique Audience from Podtrac is available: ● By podcast publisher across all of the podcast shows and episodes they produce ● By show for all of the podcast episodes they produce ● By global and U.S. audience counts “Monthly Unique Audience” is an important metric in digital media because it enables advertisers and publishers to consider monthly audience reach in addition to potential impressions served. And as with other media, the monthly unique audience metrics from Podtrac are consistent across publishers and shows whether the episodes post daily, twice a week, weekly, etc. Which podcasts are audiences listening to most? Podtrac produces a monthly Ranking Report showing the top publishers in the industry by US audience. Podtrac is in a unique position to produce this report, because of its podcast measurement technology and its 10+ years of measurement relationships with substantially all of the top publishers in the industry.
    [Show full text]
  • New Year's News Catch-Up
    Security Now! Transcript of Episode #437 Page 1 of 35 Transcript of Episode #437 New Year's News Catch-Up Description: This first podcast of 2014 catches us up on all of the news that transpired over the Christmas and New Year's holidays - and there was a LOT of it! (Like it or not, the NSA news just keeps on coming!) High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-437.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-437-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve is back. Our first show of the new year, what are we talking about: the NSA and the ANT protocols. Lots of security news. We'll catch up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 437, recorded January 7th, 2014: New Year's News Catch-Up. It's time for Security Now!, the show that covers your security and privacy online, your safety online, with the guy in charge, the "Explainer in Chief" we call him, Steve Gibson. Oh, my goodness, Happy New Year, Steve. Steve Gibson: Yes, indeed. And I was wearing my Explainer in Chief T-shirt for the day up there with you for... Leo: I loved that. Steve: I didn't make it 24 hours. Actually I had a lot of people asking me, "Where did you get that TNO T-shirt?" And it was from one of our listeners. I'm so sorry that I've, like, it was so long ago, it was a couple years ago, and I just kept the T-shirt for the right occasion.
    [Show full text]