Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Monday, September 4, 2023

The importance of Information Security in our lives – Part 6

 

6. In our relaxing time

In these moments even our relaxing time is related to the use of a PC or to an streaming service, we should be more careful in the following:

6.1. As mentioned in Part 5, do not lick on links that are coming from any of the services your are registered to

6.2. Always confirmed, as possible, when you received emails where there are requests to provide personal information like bank accounts, credit cards, etc. if possible, call the requesting organization to confirm if the data request is official

6.3. If you receive messages to your mobile phone requesting personal information like bank accounts, credit cards, etc. either via text messages, or through another applications like WhatsApp, Line, etc. do not take action and confirm with the requesting organization of the veracity of the request

6.4. Be careful of the sites you visit. Due to there are several illegal copies of those where users could be redirected to illegally obtain personal information.

6.5. Do not click on ads of doubtful origin. There are several available technics to force malicious software package installations in the user’s PC with only visiting a page.

La importancia de la seguridad de la información en nuestras vidas – Parte 6

 


6. En nuestros tiempo de ocio

En estos momentos en los que inclusive en nuestros momentos de ocio estajos ligados a una PC o a un servicio de transmisión en línea, debemos de tener cuidado en los siguientes aspectos:

6.1. Así como el punto anterior, no hacer click en enlaces que provengan de estos servicios de transmisión en línea

6.2. Siempre confirmar, en la medida de lo posible, cuando se reciben correos en el que se hacen pedidos de cuentas bancarias, datos personales, tarjetas de crédito, etc., si es posible comuníquese por teléfono con su entidad bancaria para poder confirmar si es oficial el pedido de estos datos.

6.3. En el caso del teléfono móvil si se reciben mensajes con pedidos de cuentas bancarias, datos personales, tarjetas de crédito, etc., ya sea por mensajes de texto o por medio de aplicaciones de chat como: WhatsApp, Line, etc., no tomar acción y confirmar con la entidad bancaria por teléfono si ese tipo de pedido es oficial.

6.4. Tener en cuenta los sitios web que se visitan, ya que existen muchas copias ilegales de estos en los que los usuarios pueden ser redirigidos para obtener de manera ilegal datos personales

6.5. No hacer click en publicidad de dudosa procedencia. Existen muchas técnicas disponibles para poder forzar la instalación de paquetes de software de carácter malicioso en la computadora del usuario con tan solo hacer que este visite una página web.

Monday, August 28, 2023

La importancia de la seguridad de la información en nuestras vidas – Parte 5

 


5. En nuestros viajes – Published August 14

Si bien es cierto que la pandemia del Covid-19 detuvo la gran mayoría de los viajes de negocios y de turismo, desde mediados del 2022 los viajes comenzaron a retomar su frecuencia aunque no a los mismos niveles de la pre-pandemia. De esta manera se tienen que tomar diversas medidas para proteger nuestros datos cuando hacemos reservas de pasajes de avión o de hoteles. Estas medidas son por parte del usuario, las medidas relacionadas a las empresas fueron descritas anteriormente. Estas medidas son un complemento a las medidas descritas anteriormente en la sección de comercio electrónico.

5.1. Revisar que la empresa en la que se decida realizar la reserva, es una empresa confiable y con una cierta reputación

Debido a la existencia de diversas empresas que son usadas de fachada para poder obtener datos del usuario así como los detalles del método de pago (usualmente tarjetas de crédito), se debe de tener doble cuidado en seleccionar la empresa a ser usada, algunos detalles a confirmar son

a. Reputación de la empresa

Búsqueda de la reputación de la empresa en Google

b. Confirmación del uso de certificados SSL (el candado que aparece a la izquierda de la dirección https

c. Confirmación de la política de uso y devolución de la empresa

5.2. Nunca hacer click en los enlaces que provienen de estas empresas

Antes de hacer la transacción y habiendo confirmado los pasos descritos en el punto anterior, usualmente es necesario un registro de usuario, es usual que se envíe una confirmación al correo electrónico del usuario para confirmar la identidad de este y dar por terminado el proceso de registro de usuario. Pero después de este registros, nunca, y es bueno remarcarlo nunca, se deben de hacer click en los enlaces que provienen de estas empresas así se haya confirmado su reputación. La razón es que a pesar que estas empresas puedan ser respetadas en su respectiva industria, no se puede saber si estas han sido víctimas de ataques que hayan tenido como consecuencia la extracción ilegal de datos, especialmente los datos de usuarios, de esta manera es recomendable confirmar la información de marketing incluida en el correo mediante el acceso a la página web de la empresa.

The importance of Information Security in our lives – Part 5

 


5. In our trips

While it is true that the Covid-19 pandemic stopped almost all business and leaisure trips, from the middle of 2022 travel increased in frequency although not at the same pre-pandemic levels. Due to this, we need to take additional measures to protect our data when we make online flight or hotel reservations. These measures are from the user side, company side measures where described in a previous post. These measures represent complements of the previously described measures in the ecommerce section.

5.1. Confirm that the Company to use to make reservations is a reliable Company and with a strong reputation

Due to the fact that many companies are used as front companies to obtain illegally customer data as well as payment methods (usually credit cards), we should be very careful when we select the company, some of the details to confirm are:

a. Company reputation

Search for the company’s reputatio in Google

b. SSL Certificate existence confirmation (the locker that appears to the left of the wen address

c. Use Policy and reimbursment confirmation

5.2. Never click on links that come from these companies

Before making the transaction and having comfirmed the above described points, usually is required to make a registration, it is usual to received a confirmation email to confirm the user’s identity and to finalize the registration process. After this registration process, never, and is important to emphasize it, never, make a click on links that are coming from these companies even though their reputation is confirmed. The reason is that spite of these companies are well respected in their respective business niches, it is not easy to find if they were victims of an attacked that includes data leakage, especially customer data, therefore it is advisable to confirm the marketing information included in the mail from these companies by accessing the company’s web site.

Monday, August 14, 2023

La importancia de la seguridad de la información en nuestras vidas – Parte 4

 


4. En nuestros estudios

El uso de herramientas de clases virtuales incrementó de gran manera en Perú durante la Pandemia del Covid-19, lo que hizo que muchas entidades educativas modificaran su manera de entregar conocimiento a sus alumnos. Existen diferentes estudios que confirman la falta de preparación tanto de las organizaciones educativas como de los recursos disponibles para los alumnos, aunado con la considerable brecha digital que Perú tiene como país, hizo que la educación sufriera un gran impacto negativo que posiblemente se evidenciará en los siguientes decenios.

Desde el punto de vista de la Seguridad de la Información, esta es importante debido a los siguientes puntos:

4.1. Desde el punto de vista de la organización educativa

a. Protección de los datos del alumnado

Nuestra identidad digital representa información de gran interés para los diferentes grupos cibernéticos ilegales. La obtención ilegal de la identidad de los alumnos puede acarrear consecuencias como extorsión por la información, o establecer comunicación con los padres para extorsionarlos usando ilegalmente la identidad de sus hijo/as

b. Protección de la información de la institución educativa

Las Instituciones públicas y privadas poseen una gran cantidad de información atractiva para los grupos cibernéticos ilegales, desde acceso a propiedad intelectual, cuentas bancarias de la institución educativa, cuentas bancarias de los trabajadores, detalles personales de trabajadores y alumnos, detalles de organizaciones nacionales, información de la identidad de todas los trabajadores y alumnos, etc. Esta información, si es obtenida ilegalmente, puede ser usada con distintos fines que afectarán negativamente la tranquilidad mental y económica de las personas afectadas

c. Establecimiento de canales de comunicación oficiales

Las organizaciones educativas deben de establecer canales de intercambio de información oficiales, así como canales de enseñanza oficiales. El establecimiento de canales oficiales de intercambio de información o determinación de uso de protocolos de intercambio de información seguros puede hacer más difícil ataques como Man-in-the-middle (MIM) en el que las comunicaciones entre dos puntos se interceptan para poder tener acceso a los datos que están siendo transferidos o para poder desviar las comunicaciones hacia servidores o sitios web ilegales, donde los datos serán capturados para ser usados de manera ilegal.

Ahora bien, debido a la repentina decisión de poner a la población en cuarentena, el uso de canales gratuitos de Zoom u otros similares fue la primera decisión para poder seguir brindando conocimiento a los alumnos, pero estos canales no son 100% seguros y deben de ser reemplazados por canales oficiales de las organizaciones educativas. Además de lo último, se deben de entrenar de manera obligatoria en el uso de estas nuevas herramientas digitales a los profesores a cargo de las clases para evitar cualquier ataque debido a malas configuraciones. 

4.2. Desde el punto de vista del alumno

a. Protección de la identidad y datos del alumno

Deben de crease contraseñas seguras usando caracteres alfanuméricos, caracteres especiales y letras en mayúscula y minúscula, de una considerable longitud y que solo sea lógico o familiar para el usuario; otra estrategia es el uso de frases como contraseñas, lo cual puede ser válido pero se debe de fortalecer esta contraseña con los consejos dados anteriormente. 

b. Protección de la red del hogar del alumno

Debemos de tener en cuenta los mínimos requerimientos para poder proteger nuestra red en casa, desde la modificación de la configuración del router de la empresa proveedora de internet, para hacer solo uso de canales de comunicación seguros (puertos, DNS, etc.), hasta tener nuestros sistema operativos permanentemente actualizados así como todos los paquetes de software instalados en nuestra PC.

The importance of Information Security in our lives – Part 4

 


4. In our studies

The use of virtual tools increased dramatically in Peru during the Covid-19 pandemic, which made a number of educational organizations to modify the way they share knowledge to their students. There are diverse research papers published which confirmed the lack of preparation of the educational organizations as well as the available resources for their students, together with the considerable digital gap that Peru has as a country, it made a monumental negative impact which consequences could be felt in the next decades.

From the Information Security point of view, this is important due to the following points:

4.1. From the educational organization point of view

a. Students data protection

Our digital identities represent important information for the different cybernetic malicious groups. The gathering of the students’ identity could carry negative consequences like information extortion, or establish communication with the parents to extort them using their sons/daughters identities illegally. 

b. Protection of the educational organization information 

Public and private organizations hold a large amount of attractive information for illegal cybernetic groups, from the intellectual property access, organization bank account, workers bank accounts, personal details of workers and students, national organization details, identity information of all workers and students, etc. This information, if obtained illegally, could be used in negative actions that will produce mental and economic distress to the impacted people.

c. Establishment of oficial communication channels

Educational organizations should established official communication to Exchange information. Establishing these safe official channels o protocols to exchange information could make attacks like Man-in-the-middle (MIM) where communications between two points are intercepted to have access to the data being transferred or to deviate those communications to illegal servers or sites, where data will be captured to be used illegally. 

Now, due to the sudden decision to enforce lockdowns to all population, the use of free channels like Zoom or similar was the first decision to be able to continue teaching to students, but these channels are not 100% secure and should be replaced by official channels by educational organizations. In addition to that, there must be a mandatory training to use these new digital tools to all professors to avoid attacks or misconfigurations.

4.2. From the student point of view

a. Students data an identity protection

Strong passwords should be created using alphanumeric characters, special characters and capital/lower letters, of a considerable length and to be only logical or familiar to the user: another strategy is the use of phrases as passwords, which could be valid but still should be strength with the advice provided early. 

b. Student’s home network protection

We should keep in mind the mínimum requirements to protect our network at home, from the router settings modification of the internet service provider company, to use secure communication channels (ports, DNS, etc.), to have our operative systems constantly updated as well as all software packages installed in our PCs.


Tuesday, May 9, 2023

The importance of Information Security in our lives – Part 3


3. In our jobs

IT is used in almost all Enterprise environments, from multinational corporations to the smallest startups; moreover, new startups are focused in enterprise solution creation that use IT as their supportive platforms. Services like: online banking, service payment, money transfer, tax payments, contracts negotiation and signing, client generation and engagement, marketing methods, etc., IT are used as support strategies to the main business idea.

In this environment, Information Security is represented by similar points as the ones described in the second part. The difference relies in the fact that all size companies are attractive targets for a cybersecurity attack.

3.1. Enterprise size companies

Obviously, these types of organizations have the most attractive information for the different group of hackers around who they could use the below attack techniques:

- Ransomware

- Phishing

- DDoS

- Malware

- Man In the Middle (MIM)

- Worms, etc.

These attacks have as their objective, through enterprise information kidnapping to obtain an illegal payment (ransomware), to illegally obtain enterprise information (malware, phishing, worms, etc.), or capture of the information exchange channel to deviate user transactions or requests to illegal sites (MIM). These are only a small set of the different cybersecurity attacks available for which organizations need to be prepared and take preventive measures, not only to protect their data, but even more important, to protect their customers information. 

3.2. Small or medium size business (SMBs)

Many people think small or medium size business do not represent an attractive target to the different attackers in existence, but it is not like that.

From the point of view of the organization itself, an small or medium business has as a main target to grow, these types of organizations make all possible efforts to establish commercial relationships with enterprise size organizations already established in their particular business niche of interest. When SMBs organizations are able to become business partners it is the time they become attractive to the different cybersecurity attacks due to the trust relationship established between the enterprise size organization and the SMB. The different hacker groups take advantage of these trust relationship in order to attack the SMB, establishing a persistent method and confirm the communication channel used to modify the worm payload to do a lateral movement and impact the enterprise size organization.

As you can see Information Security plays a key role in the data interchange between same niche organizations and associated sectors. Information Security controls must be installed in both organizations’ group, in addition to this, enterprise size organizations need to establish frequent third party security assessment process with their, all size, business partners.

La importancia de la seguridad de la información en nuestras vidas – Parte 3


3. En nuestro trabajo

La TI es usada en casi todos los ambientes empresariales, desde las grandes corporaciones hasta las más pequeñas startups, más aún, las nuevas startups están enfocadas en la creación de soluciones empresariales que usan como plataforma base las TI. Servicios desde banca electrónica, pago de servicios, transferencia de dinero, pago de impuestos, negociación y firma de contratos, generación de clientes, métodos de marketing, etc., las TI son usados como estrategias de soporte a la idea principal del negocio.

En este ambiente, la Seguridad de la Información está representada por puntos similares a los descritos en segunda parte. La diferencia radica en que empresas de cualquier tamaño son objetivos atractivos para un ataque cibernético.

3.1. Grandes empresas

Obviamente, este tipo de empresa posee información atractiva para los diferentes grupos de hackers los cuales pueden ejecutar ataques como:

- Ransomware

- Phishing

- DDoS

- Malware

- Man In the Middle (MIM)

- Worms, etc.

Estos ataques tienen como objetivo, ya sea el secuestro de la información de la empresa en pos de obtener un pago (ransomware),  la obtención ilícita de información de la empresa (malware, phishing, worms, etc.), o la captura del canal de intercambio de información para poder desviar las transacciones de usuarios hacia un sitio ilegal (MIM). Estos son solo una pequeña muestra de los diferentes ataques cibernéticos disponibles para los que las empresas tienen que estar preparadas y tomar iniciativas de prevención para no solo proteger sus datos, pero más importante aún, para proteger los datos de sus clientes. 

3.2. Pequeñas empresas

Mucha gente tiene el pensamiento de que las empresas pequeñas no representan un objetivo atractivo para los diferentes grupos cibernéticos ilegales que existen, pero no es así.

Desde el punto de vista del negocio en sí, una empresa pequeña tiene como objetivo el crecimiento, y para lograr esto, este tipo de empresas hacen todos los esfuerzos posibles para poder generar relaciones comerciales con empresas grandes ya establecidas en el rubro particular de operación. Cuando estas empresas logran convertirse en socio de negocios es cuando las pequeñas empresas se convierten en un objetivo atractivo para los ataques cibernéticos debido a la relación de confianza establecida entre la empresa de gran tamaño y la pequeña empresa. Los diferentes grupos cibernéticos ilícitos toman ventaja de esta relación de confianza para poder atacar la pequeña empresa y esperar hasta confirmar el canal de intercambio de datos establecido entre las empresas para poder modificar el ataque a usar (worm payload) y realizar un movimiento lateral para poder trasladarse hacia la red de TI de la empresa de tamaño grande. 

Como se puede observar la Seguridad de la Información juega un papel titular en el intercambio de datos entre empresas del mismo sector y de sectores relacionados. Controles de Seguridad de la Información deben de ser implementados en ambas organizaciones, además de que las empresas de tamaño grande especialmente tienen que tener procesos de evaluación de Seguridad de la Información de Terceras empresas o de Socios de Negocios. 

Monday, April 24, 2023

The importance of Information Security in our lives – Part 2


 

2. In our shopping

According to an ECommerceNews study, there was an increase of 53% in Electronic Commerce [1].  This percentage not only is the reflect of the E-Commerce impulse had during the Covid-19 Pandemic, but it reflect Peruvians’ comfortable feelings towards making their shopping through the internet. 

Now, in that context, Information Security is represented by different factors, such:

    2.1. From the end user point of view

           a. Having their PC’s Operative System updated

           b. Having updated all software packages installed in the PC

           c. Have an updated anti-virus software package installed

    2.2. From the point of view of the E-Commerce Company service provider

           a. Have updated SSL Certificates

           b. Have a Vulnerability Management Program

           c. Have security controls to be able to protect the internet facing web site from external attacks (e.g. WAF, etc.)

           d. Have an information Security Team (internal or external) that could take control of the situation in the case of a cybersecurity attack

           e. Have secured backups of the Web application and critical data bases

           f. Have an industry standard certified network environment with PCI-DSS Specifications in case user credit cards are being used in the electronic transactions

           g. Being compliant with all local Information Security regulatory requirements 

References

[1] https://www.ecommercenews.pe/ecosistema-ecommerce/2022/al-cierre-del-2022-el-ecommerce-en-el-peru-movera-us-20-millones-y-crecera-53.html




Saturday, April 22, 2023

La importancia de la seguridad de la información en nuestras vidas – Parte 2

 

2. En nuestras compras

De acuerdo con el estudio de ECommerceNews,  el 2022 tuvo un aumento del 53% en el Comercio Electrónico [1]. Este porcentaje no solo es reflejo del impulso que tuvo el Comercio Electrónico durante la pandemia del Covid-19, pero refleja que los peruanos se sienten cada vez más cómodos en realizar sus compras por internet. 

Ahora bien, en este contexto, la Seguridad de la Información se ve representada por muchos factores, como:

    2.1. Desde el punto de vista del usuario

           a. Tener el Sistema Operativo actualizado
           b. Tener todos los paquetes de software que se usan frecuentemente actualizados
           c. Tener un antivirus actualizado

    2.2. Desde el punto de vista de la empresa proveedora del servicio de Comercio Electrónico

a. Contar con Certificados SSL

b. Tener un programa de Gestión de Vulnerabilidades

c. Tener controles de Seguridad para poder proteger la página web de ataques externos (por ejemplo: WAFs, etc.)

d. Tener un equipo de Seguridad de la Información (interno o externo) que pueda tomar el control en caso de un ataque cibernético

e. Tener sistemas de respaldo de datos de la aplicación Web y de Bases de datos críticas

f. Tener un entorno de red homologado con especificaciones PCI-DSS en caso se usen tarjetas de crédito de los usuarios para las transacciones electrónicas

g. Tener implementados los requerimientos relacionados con Seguridad de la Información provenientes del Regulador Gubernamental 

Referencias

[1] https://www.ecommercenews.pe/ecosistema-ecommerce/2022/al-cierre-del-2022-el-ecommerce-en-el-peru-movera-us-20-millones-y-crecera-53.html



Monday, April 10, 2023

The importance of Information Security in our lives – Part 1


Societies, including the Peruvian one, are adopting digital solutions not only at an enterprise level, but also in the personal. From the enterprise point of view, there are different digital solutions that when adopted not only become part of the available technology in the enterprise, but also they could be part of the specific niche’s regulatory requirement. This will require the enterprise to send periodic specific KPI (Key Performance Indicators) reports, which should be aligned with specific incident report times, especially when these are associated with service availability and information security.

In the personal case, there are a plethora of available of digital solutions, from food deliver, e-commerce, online banking, and a long etcetera. Due to the nature of the diverse application, it is necessary to register personal information (e.g.: names, last names, birth date, ID documents, etc.), payment methods (credit cards, debit cards, etc.), and other in our accounts. This fact of the account creations and personal data registration creates a trust relationship with the service provider, for which our data will reside in their data bases. These companies, as mentioned before, could be under regulatory requirements in their respective business niches, but this doesn’t mean they are 100% secure.

To better understand the different threats our data could suffer, I prepared a series of entries to share and hopefully, will create a Little of awareness about how to protect our date through simple processes. These are divided in seven parts y an additional one for conclusions.

  1. In our home

We all Heard of information viruses and how they can damage our computers, and/or how these could infect our computers, keep silent for a long period of time and extract specific information from our bank accounts, social media, email, etc. In this case information security, represented by an antivirus and updated Operative System (OS), could serve as a preventive measure against these types of attacks. 

In addition to the above, we should keep in mind that our digital identity has to be secured, in that sense; we should learn how to identify potentially malicious or illegal websites that are used to steal our identity and payment methods. 

See you in the second part.






Sunday, April 9, 2023

La importancia de la seguridad de la información en nuestras vidas - Parte 1


Las sociedades, incluida la peruana, están adoptando soluciones digitales no solo a nivel empresarial, pero también en el personal. Desde el punto de vista empresarial, existen diferentes soluciones digitales que al ser adoptadas pasan a ser no solo parte del abanico tecnológico de la empresa, sino que puede entrar dentro del ámbito normativo del regulador del nicho específico de negocio. Esto último requerirá que la empresa además de reportar periódicamente Indicadores clave de rendimiento (KPI por sus siglas en inglés) específicos, esté alineado con tiempos específicos de reporte de incidentes, especialmente cuando estos se tratan de disponibilidad de servicios y de seguridad de la información.

En el caso de uso personal, las soluciones digitales son mucho más variadas, desde entrega a domicilio de comida, comercio electrónico, banca en línea, y un largo etcétera. Debido a la naturaleza de las diversas aplicaciones, es necesario el registro de datos personales (como: nombres, apellidos, fecha y lugar de nacimiento, documentos de identificación, etc.), métodos de pago (tarjetas de crédito, tarjetas de débito, etc.), y demás en nuestras cuentas. Este hecho de la creación de la cuenta y el registro de datos, crea una relación de confianza con el proveedor del servicio, por el cual nuestros datos radican en sus bases de datos. Estas empresas, como se indicó anteriormente, pueden estar bajo la observación de los reguladores locales de sus respectivos nichos de negocio, pero esto no significa que estén 100% seguros.

Para poder entender un poco mejor los diferentes peligros que nuestros datos pueden sufrir, he preparado esta serie de entradas para poder compartir, y, ojalá, crear un poco de conciencia de cómo proteger nuestros datos mediante simples procesos. Estas estarán separadas en siete partes y una de conclusiones.

  1. En nuestro hogar
Todos hemos escuchado de los virus informáticos y de cómo estos pueden dañar nuestras computadoras, y/o como estos pueden infectar nuestras computadoras, permanecer silenciosos por un buen tiempo y después extraer información específica de nuestras cuentas bancarias, social media, correos electrónicos, etc. En este caso la seguridad de la información, representada por un antivirus y Sistema Operativo actualizado, puede servir como una medida preventiva ante este tipo de ataques.

Además de esto tenemos que tener en cuenta que nuestra identidad digital tiene que ser bien resguardada, en este sentido, debemos de aprender a identificar sitios web de dudosa procedencia o sitios web ilegales que son usados para robar nuestra identidad y métodos de pago.

Nos vemos en la segunda parte.




Monday, February 13, 2023

The lack of direction when it comes to Cybersecurity in Peru


 Peru is a country with a great diversity of natural resources, and strategically located, which makes a variety of professional paths available that graduates from the different secondary schools can choose to follow. Obviously, the decision to study a specific career depends not only on the applicant's skills, but also on the economic benefit that the career in question can provide in the future, the country's industry requirement for these professionals, etc.

In addition to the careers already established in the country, for example: medicine, law, various engineering, economics, etc., there are many careers that are destined for the future due to the greater use of technology in this era of the world, especially Information Technologies (IT). But IT, in its vast variety, has a discipline that is very important at the moment, but apparently in Peru only two higher education institutions in the leading sector are making efforts to create Peruvian professionals in this discipline, it is the Information Security, these are ESAN University (Master's level) and the National Engineering University (UNI for its acronym in Spanish) (Undergraduate level) [1, 2].

It is important to mention that Cybersecurity is a discipline in high demand around the world, due to many reasons, but basically due to the fact that a good part of the banking and commercial transactions that we do every day use electronic systems, either from the web or mobile phone [3]. This high demand discipline which is based on the constant use of the acquired knowledge, frequent updating, and an environment full of challenges, means that these professionals can work from Peru in other countries as well.Despite the fact that our country has been the victim of different computer attacks (including attacks against armed forces) in which personal data was illegally extracted, there is little or no interest from other educational institutions in properly creating this professional career, in addition It is more than disappointing that the Peruvian government, through its regulators of the different business areas, do not have clear and mandatory Cybersecurity regulations [4]. An additional factor is the little or no interest that private companies have in protecting consumer data, which significantly increases the risk of identity theft that consumers can suffer since there is no communication when companies suffer computer attacks with illegal data extraction.

It is this lack of awareness about the importance of Cybersecurity that not only makes educational institutions have no interest in creating these faculties, which will have negative consequences in the near future. Now, it is not only the fact of creating awareness in the governmental and private sphere, but also educating ordinary citizens that our digital identity is more than important in a world in which data will soon completely replace an identity in a printed card.

References:

  1. https://www.esan.edu.pe/conexion-esan/esan-graduate-school-of-business-presenta-la-maestria-en-gestion-de-la-ciberseguridad-y-privacidad
  2. https://rpp.pe/tecnologia/mas-tecnologia/uni-inaugura-carrera-de-ingenieria-de-ciberseguridad-noticia-1428538
  3. https://www.isc2.org/News-and-Events/Press-Room/Posts/2022/10/20/ISC2-Research-Reveals-the-Cybersecurity-Profession-Must-Grow-by-3-4-Mil-to-Close-Workforce-Gap#:~:text=Despite%20adding%20464%2C000%20more%20cybersecurity,not%20have%20enough%20cybersecurity%20employees.
  4. https://larepublica.pe/politica/gobierno/2022/10/08/hackers-en-la-dini-roban-secretos-militares-peruanos-de-ultimos-cinco-anos-guacamaya-leaks-ejercito-fuerzas-armadas
  5. https://rpp.pe/tecnologia/mas-tecnologia/peru-tercer-pais-mas-ciberatacado-en-america-latina-noticia-1359003






Monday, February 6, 2023

La falta de Norte cuando a Ciberseguridad se trata en Perú


Perú es un país de gran diversidad de recursos naturales, y ubicado estratégicamente, lo cual hace que se tenga disponible una variedad de caminos profesionales que los egresados de las diferentes organizaciones educativas de educación secundaria pueden optar por seguir. Obviamente, la decisión de estudiar una carrera específica no solo depende de las habilidades del postulante, sino también del beneficio económico que la carrera en mención pueda brindar en el futuro, el requerimiento de la industria del país de estos profesionales, etc. 

Además de las carreras ya establecidas en el país, por ejemplo: medicina, derecho, varias ingenierías, economía, etc., existen muchas carreras que son destinadas para el futuro debido al mayor uso de la tecnología en esta época del mundo, en especial Tecnologías de la Información (TI). Pero TI, en su vasta variedad, tiene una disciplina que es muy importante en este momento, pero al parecer en Perú solo dos instituciones educativas de nivel superior del sector líder están poniendo esfuerzos para poder crear profesionales peruanos en esta disciplina, se trata de la Seguridad de la Información, estas son la Universidad ESAN (Maestría) y la Universidad Nacional de Ingeniería (UNI) (Pre-grado) [1, 2]. 

Es importante indicar que la Ciberseguridad es una disciplina de alta demanda alrededor del mundo, esto por muchos motivos, pero básicamente por el hecho de que una buena parte de las transacciones bancarias y comerciales que hacemos día a día usan sistemas electrónicos, ya sea desde la web o en el teléfono móvil [3]. Esta alta demanda, basada en el uso constante del conocimiento adquirido, actualización frecuente, y ambiente llenos de retos, hace que estos profesionales puedan trabajar desde el Perú en otros países también.

A pesar de que nuestro país ha sido víctima de diferentes ataques informáticos (inclusive las fuerzas armadas fueron objetivos de estos) en los cuales datos personales fueron extraídos ilegalmente, existe un poco o nulo interés de otras instituciones educativas en crear debidamente esta carrera profesional, además es más que decepcionante que el gobierno peruano a través de sus reguladores de las diferentes áreas de negocios no tengan regulaciones de Ciberseguridad claras y de cumplimiento obligatorio [4]. Un factor adicional es el poco o nulo interés que las empresas privadas en proteger los datos del consumidor, lo que incrementa de manera significativa el riesgo de robo de identidad que los consumidores pueden sufrir ya que no hay ninguna comunicación cuando las empresas sufren ataques informáticos con extracción ilegal de datos. 

Es esta falta de conciencia acerca de la importancia de la Ciberseguridad que no solo hace que las instituciones educativas no tengan interés en crear estas facultades, lo cual tendrá negativas consecuencias en un futuro cercano. Ahora bien no solo es el hecho de crear conciencia en el ámbito gubernamental y privado, pero también educar al ciudadano de a pie que nuestra identidad digital es más que importante en un mundo en el que los datos pronto reemplazarán de manera completa a una identidad en una tarjeta impresa.

Referencias:

  1. https://www.esan.edu.pe/conexion-esan/esan-graduate-school-of-business-presenta-la-maestria-en-gestion-de-la-ciberseguridad-y-privacidad
  2. https://rpp.pe/tecnologia/mas-tecnologia/uni-inaugura-carrera-de-ingenieria-de-ciberseguridad-noticia-1428538
  3. https://www.isc2.org/News-and-Events/Press-Room/Posts/2022/10/20/ISC2-Research-Reveals-the-Cybersecurity-Profession-Must-Grow-by-3-4-Mil-to-Close-Workforce-Gap#:~:text=Despite%20adding%20464%2C000%20more%20cybersecurity,not%20have%20enough%20cybersecurity%20employees.
  4. https://larepublica.pe/politica/gobierno/2022/10/08/hackers-en-la-dini-roban-secretos-militares-peruanos-de-ultimos-cinco-anos-guacamaya-leaks-ejercito-fuerzas-armadas
  5. https://rpp.pe/tecnologia/mas-tecnologia/peru-tercer-pais-mas-ciberatacado-en-america-latina-noticia-1359003


Tuesday, June 7, 2022

Addressing the Cyber Security Insurance dilemma



Addressing the Cyber Security Insurance dilemma

Mainly due to the increase of ransomware attacks around the world during the last years, companies providing Cybersecurity Insurance or Cyber Risk Insurances are witnessing an increase in their products demand. 

Cisco defines Cybersecurity Insurance as: “Cyber insurance is an insurance product designed to help businesses hedge against the potentially devastating effects of cybercrimes such as malware, ransomware, distributed denial-of-service (DDoS) attacks, or any other method used to compromise a network and sensitive data. Also referred to as cyber risk insurance or cybersecurity insurance, these products are personalized to help a company mitigate specific risks.” [1]

Those organizations that are able to afford the cost of a specific Cybersecurity Insurance Policy need to understand that the Cybersecurity Insurance does not represent a holistic solution for any Cybersecurity attack they could be become victims of. 

In general terms, Cybersecurity Insurances should be a part of a well-structured Incident Response plan that organizes IT and non-IT departments across an organization including their respective senior or C-level management and aligned with a wider Business Continuity Program (BCP). While the complexity of the Incident Response Process is undeniably high, independently of the organization size, efforts should be made to have them in place and ready to go in the case of a severe attack against the organization’s IT infrastructure. Cybersecurity Insurances are the last resource in the established and practiced Incident Response Plan since it is designed to alleviate the cost of a successful attack and prevent the impacted organization to bankrupt [2]. In this regards, usual costs covered by the Cybersecurity Insurance are: investigation, crisis communication, legal services, and refund to customers [2].

Growing demand on Cybersecurity Insurances

Reportedly, ransomware attacks increased dramatically during 2021 and are still in the raise during 2022. Organizations impacted due to this type of attack are paying the ransom in order to reduce the time to obtain back their business related information, which triggers a different problem where organizations that decided to pay the ransom become again targets of a ransomware attack [3].

Moreover, the only problem is not only ransomware but the increased threat landscape due to the adoption of remote work due to the Covid 19 pandemic. Therefore, Security organizations around the world have witnessed an increase of complexity when it comes to their security strategies and the cost associated to those. 

Main function of the Cybersecurity Insurance

The main function of the Cybersecurity Insurance is to protect the organization of the cost associated with an attack that could have a considerable impact in the organizations operations. CSO indicates that “A Cyber insurance policy coverage usually includes costs related to the remediation process, such as paying for the investigation, crisis communication, legal services, and refunds to customers.” [2].

Having a Cyber Security Insurance could make me a target?

While there is no evidence that proves that malicious actors are able to obtain firsthand information of which organizations have acquired Cyber Security Insurances, there are some unscientific evidence that shows that malicious actors are more than ager to find ways to know which organizations have hired a Cyber Security Insurances and the Premium amounts of those.

Therefore, while hiring a Cyber Security Insurance could give C level executives some peace of mind, it should be accompanied by a solid security strategy and awareness.

Since Cyber Security Insurances could bring some level of last resources of protection to all size companies, it should not be understood as to have that in your Security Strategy as the only measure available against a Cyber Security attack.

Before even considering hiring Cyber Security insurance, organizations must create/review/improve their Incident Response Plans as mentioned in the beginning. Practicing that process in yearly internal drills is a good strategy to create muscle memory and be prepared when a real Security incident occurs. In addition of that, increases awareness and allow organizations to have their contact list updated. We will have more entries about Incident Response in the near future [8].

Conclusion

Cyber Security Insurances represent, if your organization is able to afford them, an additional layer where the organization could prevent bankruptcy as a consequence of a Cyber Security attack, but it should not be considered as the only available resource to handle a Cyber Security Incident.

Careful assessment is required in order to hire a Cyber Security Insurance, which might have some requirements in terms of Vulnerability Management, Security Controls, Security Operations, etc., in order to calculate the Premium.

References

[1] https://www.cisco.com/c/en/us/solutions/security/cyber-insurance/what-is-cyber-insurance.html 

[2] https://www.csoonline.com/article/3654216/is-cyber-insurance-an-invitation-to-cybercriminals.html#tk.rss_all

[3] https://www.techtarget.com/searchsecurity/news/252502519/Repeat-ransomware-attacks-hit-80-of-victims-who-paid-ransoms

[4] https://redcanary.com/blog/cyber-insurance/

[5] https://hbr.org/2021/01/cybersecurity-insurance-has-a-big-problem

[6] https://www.csoonline.com/article/3643054/cyber-insurance-explained.html#tk.rss_all

[7] https://www.darkreading.com/attacks-breaches/cyber-insurance-and-war-exclusions

[8] https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf


Saturday, July 4, 2020

ICS Attacks in Japan


ICS Attacks in Japan

Japan is well known internationally as a peaceful, well organized society where citizens obey the law and are compliant with rules across different governmental institutions. Spite of some internal problems like ageing society, sinking birthrate and now the economic consequences of the ongoing Covid-19 pandemic, Japan has done a great job into keeping its society under very traditional structures. Examples of how Japan is keeping parts of their society traditional is the banking system which continue using passbooks in order to allow the users to have records of their transactions, the existence of paper based processes in the governmental and private sector, the use of Hanko (a personal stamp used for personal/business/public documents), etc. In that traditional environment, the use of credit cards and other electronic payment methods have been introduced in the recent quinquennium without bumps in the road, like the loss of customer’s money to hackers from the Seven-Eleven Payment System 7Pay [1]. One of the factors that contribute to have such slow adoptions of electronic payment systems, for example, is the false sensation of security when it comes to transactions due to the image of safety society that Japan shows to the world [2].

It is also well known that Japanese organizations have been impacted due to different information security attacks during the last decade, being the ones that generated a great deal of media attention: the leaked of 12.6 million personal records in 2016, the previously mentioned 7Pay, etc. [3].

In addition to the dramatic increase in number of attacks due to the Covid-19 Pandemic, Japan has the same problem as other G7 countries, shortage of Cyber Security, which is projected to be around 193,000 professionals in 2020 and increasing due to Covid-19 is pushing companies to move their business online [4, 5, 6, 7].

With this increased in Security attacks, also attacks that are directed to Industrial Control Systems (ICS) have increased dramatically as well [8].  It is interesting to note that Japan has its own story of Security attacks against Industrial Control Systems (ICS), although not as abundant as US or Europe. The main officially reported incidents were (until 2017) [9]:

Year: 2005

Case Summary: Leak of atomic power plant’s confidential information via file sharing software.

Cause: Malware infection of an employee’s home PC storing confidential information.

Year: 2006

Case Summary: Leak of thermal power plant’s confidential information via file sharing software.

Cause: Malware infection of an employee’s home PC storing confidential information.

Recently, the attack against Honda’s factories indicates a new level of attack where the kinetic impact on the target was considerable [10]. IT related consequences of the attack payload were: employees were not able to use internal systems, inability to access servers, and inability to use email; while the kinetic impact of this attack was associated to halt operations in Honda’s factories located in Japan, UK, Turkey, USA and Italy [10, 11]. While there is no conclusions from the internal investigation on the attack, Honda had RDP accessible server facing the internet, which based on the analysis of Malwarebytes, there is clear evidence this could have been the attack vector used in order to compromise Honda’s IT infrastructure and cause economic losses as a potential collateral damage by the EKANS ransomware [12, 13].

Figure 1. Function responsible for performing DNS query [12]

Here are two important differences between the attack to Honda and the one to Enel:

While the ransom email is the same in both cases, here are two important differences between the attack to Honda and the one to Enel [12]:

Honda

Resolving internal domain: mds.honda.com

Exposed RDP: /AGL632956.jpn.mds.honda.com

Enel

Resolving internal domain: enelint.global

Exposed RDP: /IT000001429258.enelint.global

Interestingly enough, the same EKANS ransomware is also responsible for the attack against Edesur S.A., a company who belongs to Enel an Argentinian Electric Company, which could prove that Industrial Control Systems (ICS) became one of its main targets [12, 13, 14].

Additional screenshots of the RDP access to the specific Honda and ENEL publicly accessible servers can be found here: https://twitter.com/1ZRR4H/status/1270066266137559042?s=20

Conclusions:

  1. Japan false sensation of secured information (which comes from the false Japanese society’s sensation of security) needs to be updated in the near future in order to improve the methods and controls used to secure information across different organizations
  2. Attacks are increasing in general during the Covid-19 period, not only against company information but also against Industrial Control Systems (ICS)
  3. Reasons of the Honda and Enel attacks could vary from specific business purposes to attempts to disrupt normal operations in those specific targets
  4. Ransomware campaigns are still having great impact in organizations around the world, the more complex the organization is (with large number of assets) the more important is to have multi layer controls in place and a well-tested DR environment
  5. As the same as Stuxnet, EKANS is the newest member of a small family of highly targeted attacks against ICS infrastructure where specific entry points or payloads strategies are embedded in the malicious code
  6. EKANS differentiate itself from other ICS targeted attacks in using a more common entry points as RDP in order to deliver the malicious payload in the impacted machine/network
  7. The attack against Honda represents (based on officially reported information) the first large size ICS attack against a Japanese automaker
  8. Previous ICS related attacks against Japanese organizations were infections in company endpoints connected to user’s home internet connection
  9. Attacks originated in not secure home network environments against not-well managed or BYOD devices will increase due to ongoing Covid-19 Pandemic and the new Working from Home (WFH) company strategy
  10. Japanese organizations, of all sizes and business niches, need to see the opportunities available in their organizations to improve security methods and controls


References

[1] Another 7pay system defect left personal data of users exposed The Asahi Shimbun 

[2] Four firms with links to Japan's Defence Ministry hacked - The Straits Times

[3] 12.6 million cases of personal information leaked in Japan in 2016, survey shows - Japan Times

[4] What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

[5] Cyber Security Talent Shortage in Japan - Accenture Security

[6] 71% of Security Pros See Threats Jump Since COVID-19 Outbreak - Dark Reading

[7] Addressing the Cyber Security Talent Gap - Dennis Ludena

[8] Critical infrastructure cyber attacks on the rise - EET Asia

[9] An Analysis of the Actual Status of Recent Cyberattacks on Critical Infrastructures, NEC, Matsuo Noguchi, and Hirofumi Ueda, NEC Security Research Laboratory, NEC Technical Journal, Vol. 2, 2017

[10] Honda's global operations hit by cyber-attack - BBC News

[11] ICS Threat Snake Ransomware Suspected in Honda Attack - Dark Reading

[12] Honda and Enel impacted by cyber attack suspected to be ransomware - Malwarebytes Labs

[13] EKANS Ransomware and ICS Operations - Dragos

[14] Edesur Argentina - Twitter

 



Tuesday, February 26, 2019

Japanese Government to probe insecure IoT devices - Part 2



Japanese Government to probe insecure IoT devices - Part 2

The Japanese government released the technical details regarding the IoT probing devices. Here is an extract of the most important information.

Starting date: February 20, 2019.

Important Contents:

Scope of the probe:
  1. Devices that can be accessed from the Internet using IPv4 addresses assigned to the Japanese territory
  2. Easy to guess ID and password
  3. Devices without a password
  4. There are about 200 million devices that match the above mentioned scope
  5. Devices: routers, web cameras, sensors, etc.
The National Institute of Communications and Technology (NICT) is going to use an approximately a set of 100 IDs and Passwords for this investigation. Here are the samples published in the referred site [1].

Commonly used for Cyber attacks

ID Password
admin admin
admin1 admin1
root root
supervisor supervisor


Identical characters, consecutive numbers, etc.

ID Password
admin 111111
root 123456
root 666666
root 54321
888888 888888

IP addresses to be used in the investigation

150.249.227.160-175

153.231.215.8-15

153.231.216.176-183

153.231.216.184-191

153.231.216.216-223

153.231.226.160-167

153.231.226.168 to 175

153.231.227.192 ~ 199

153.231.227.208-215

153.231.227.216-223

153.231.227.224-231

(96 total)

Communication:

In the case a device is identified, a communication will be sent to the ISP/owner of the IP.


References:

1. In Japanese https://notice.go.jp/
2. In Japanese https://www.nict.go.jp/info/topics/2019/02/13-2.html



Saturday, February 16, 2019

Japanese Government to probe insecure IoT devices



Japanese Government to probe insecure IoT devices


The Japanese government passed a law in which authorized to the National Institute of Communications and Technology (NICT) to use dictionary-alike attacks to IoT devices around the nation. Basically, default passwords list, overuse ones and easy to guess passwords will be used from February 2019 against internet-discoverable devices indistinctly of being public or private. The reason of this decision is to improve preparedness for different important events coming to Japan from this year:
  1. The new emperor coronation in April, which also will change the Era name in Japan from the current one Heisei to a new one that will be decided.
  2. The Rugby World Cup from September 2019, this is consider a rehearsal for the most important even next year.
  3. Tokyo Olympics in 2020, this is the main reason behind the decision of the government to take action this year finding weak passwords in IoT devices.

Additional concerns are coming from enterprises, the reason is simple, these activities could generate alerts in enterprise infrastructures depending on their configurations and monitoring level.
Therefore enterprises are concern; since the probing activity might use the same techniques and possible tools than potential malicious actors, moreover no technical details have been shared; therefore there is no way to correctly identify and whitelist (which could lead us to a very different discussion) the “suspicious” traffic, in this case attackers could use this probing activities in order to hide in plain sight. Security teams and SOCs are concern and expecting an increase of traffic.
This activity could prove itself useful, but at the same time bad actors could potentially take advantage. From behind all perimeter defenses, hopefully enterprises are ready and well organized for this, especially since they had 4 years to improve their infrastructure, process and human resources to face these activities.

References
  1. https://www.darkreading.com/attacks-breaches/japan-authorizes-iot-hacking/d/d-id/1333745
  2. https://threatpost.com/japan-insecure-iot-devices/141304/
  3. https://www.itpro.co.uk/policy-legislation/32848/japan-law-will-allow-government-to-hack-civilian-iot-devices




Tuesday, October 9, 2018

Increasing unsecured CIS levels




For edges, Industrial Controls were use in isolated modes, comparable to islands with an ocean between them, where there was a lack of transport media to establish communications between them.


After the boom of the Internet, senior managers wanted to have production statistics in almost real-time, which pushed the convergence of devices like: PLCs, DCSs or SCADAs and standard IT infrastructure, in order to communicate specific data to office buildings in sometimes remote areas, where those managers where located.

Most of the mayor players at that moment, decided to produce friendlier systems that could extract specific production information and located in a Database for the data to be accessible and able to be manipulated and formatted in specific “interesting” charts. In this young scenario the number of layers was limited to Sensor networks, control network, control management and couple of layers to be able to connect to the database.

Forwarding until our time, the above doesn’t look so much of a challenge anymore, but the different layers introduced above the control management, which in small terms represents a fully-fledged IT infrastructure, with all the pros and cons included, creates a much more complex environment in which the shared space between IT and ICS will become invisible in time.

In the case the IT area is correctly controlled and security controls are in place, the communication path to the lower ICS could be safe, but in real life that is not so common.

It is more common to find partially secure IT Networks with a much unclear level of Security in the ICS levels, giving a skillful attacker potential number of vulnerabilities to exploit that could lead to the discovery of the less Secure ICS network.

The damage? As many articles refer to, could be catastrophic not because of the security case itself, but more alarming, related to the physical damage that can be triggered if e.g. a power plant is compromised, a nuclear plant loses its basic control, main generators are damaged, etc. Those real-life consequences could have a bigger impact in an already defenseless population that won’t fully understand how to react.

Protecting IT infrastructure is already a challenging task, adding the ICS Security on top of that, and the tasks become not only more difficult but it will require different teams, IT Security, IT infrastructure, ICS Security, etc. to work together, which in some cases that itself is a human vulnerability.


Monday, August 27, 2018

The knowledge gap



Industrial Control Network (ICS) Security is a relatively new field, in which there is a growing knowledge gap among its different actors, in one side we have usual Control Systems devices and interconnecting networks with all their own complexity and particular problems/challenges, and in the other side we have the Information Security area in which by its current state is having a growing skills shortage. Moreover, an additional level of complexity is added when different non-standardized networks are working together in an Ethernet based network architecture, which is the case of different types of sensors sending digital signals (or digitized analog signals) through usually proprietary industrial networks to control devices, such: PLC, DCS, etc and from this to much more complex and once again non-standard SCADA systems; from which management can take different kinds of  processed or unprocessed data through standard Network devices to a specific or wide audience depending on the company structure.

Having that amount of devices, non-standard industrial networks, standard network devices, and proprietary network protocols doesn't make any easier different security related processes as risk assessment, vulnerability management, patching, logging and monitoring, etc., moreover the result of a Cyber Security Incident in ICS could humans life, e.g. Stuxnet [1],  and other attacks [2].

In an additional note, Incident Response will be heavily impacted in the first triage due to the above unique characteristics ICS Security has.

Although there are efforts towards the creation of a much wider curriculum that could create professionals with knowledge in both areas, finding professionals with both skills set is a growing challenge.

From other point of view this allows professionals from both areas, Control Systems and Information Security, to work together to find solutions in their own areas, although that could represent an additional cost for companies/organizations.

Critical infrastructure companies and governments should get together in order to create a collaborative platform in which support can be given according to specific needs. This is being done in many countries, but the efforts should be rapidly followed by the rest of the world.

References:
1. https://en.wikipedia.org/wiki/Stuxnet
2. https://www.cbronline.com/cybersecurity/top-5-infrastructure-hacks/



The importance of Information Security in our lives – Part 6

  6. In our relaxing time In these moments even our relaxing time is related to the use of a PC or to an streaming service, we should be mor...