Sunday, April 26, 2015

QUIC and transport delivery and encryption.

We at Canada Cyber have noticed an increased amount of traffic using the QUIC UDP protocol delivery system that is provided by google.

http://blog.chromium.org/2015/04/a-quic-update-on-googles-experimental.html

Canada cyber logs from a one of our sensors also confirm this.

It’s exciting to see what security implications this bring, as things like Session Hijacking for standard UDP is considerably easier than TCP. Since UDP does not use packet sequencing and synchronizing; it is easier than TCP to takeover UDP session. The hijacker has simply to falsify a server reply to a client UDP request before the backend server can reply. If wire sniffing is used then it will be easier to control the traffic generating from the side of the server and therefore limiting server’s reply to the client in the first place.

Now with this new QUIC protocol it's going to be harder to do the above as the sessions as it encrypts the entire transport channel.

The winners:
1. If you are using a google server, and the Chrome browser, you will notice a much faster internet experience.

The losers:
1. Other Browsers, that do not currently support QUIC.
2. Firewall and IDS systems as its much harder to inspect the current  QUIC UDP sessions.
3. Competing TCP sessions. as they are going to lose when compared with QUIC UDP sessions that most current security Sensors do no inspect at all yet.

https://docs.google.com/document/d/1g5nIXAIkN_Y-7XJW5K45IblHd_L2f5LTaDUDwvZ5L6g/edit

Wednesday, February 18, 2015

Thank you for your payment


THIS fake e-mail came to one of our system .. today .. do not click on the attachment.exe


This is confirmation that your payment on Wed, 18 Feb 2015 16:32:42 +0000 for USD 7900.00 has been
accepted by the NYC Department of Finance. Your Credit Card statement will show
an entry from Parking Fines NYCGOV. Please read the attachment and save it in case
you have any questions about the items that you have paid.

Name: sol chaimovits

Payment Date: Wed, 18 Feb 2015 16:32:42 +0000

Receipt Number: WWW87523543

Payment Amount: USD 7900.00

Credit Card: Visa

Account ending in: 1440

Your payment was for the following items:

Agency                             Item                              Amount
------------------------------     --------------------     ---------------
PVO                                1160025162                        USD 3000.00
PVO                                7247746580                        USD 4500.00
DOF                                Convenience Fee                    USD 400.00

Thank you for using New York City's website to process your payment.
Please do not reply to this email.  You may contact us by visiting
http://nycserv.nyc.gov/NYCServWeb/ContactUs.html if you have questions
or need further assistance.



Hash and Link .... https://www.virustotal.com/en/file/EF74C90EAF5BAD3B27C12991C05D858173E7C5971655CB2E3FB165738B311E69/analysis/
 https://www.virustotal.com/en/file/EF74C90EAF5BAD3B27C12991C05D858173E7C5971655CB2E3FB165738B311E69/analysis/

Wednesday, February 11, 2015

IPS in Action, Canada Cyber managed services.

This is a example of a automated e-mail sent from 1 of our managed clients IDS system.  In this example it's is a inline IPS .. so the attack is blocked in real time, Then the duty tech receives an automated e-mail with <body> of the below information.

This exact data is from a Hotel in Ottawa Canada, as you are all aware hotels are a hot spot for malware as most users, usually do things the should not do......

later on investigation, revealed that the triggers first came from a user, that was looking for escort services in Ottawa using backpage.com.


Oh yah . .do not try to Google for this, as this is part of the other web or dark web .... XXX are not known on search engines. Just like TOR and IP2, Google doesn't really index these things. unless you are looking for a one time love. ;-) .


 
 logid=021100 type=virus subtype=infected level=warning msg="File is infected." status="blocked" service=UNKNOWN(255) srcip=x.x.0.129 dstip=x.x.222.194 srcport=60509 dstport=80 srcintf="internal" dstintf="wan1" policyid=1 identidx=0 sessionid=56909525 direction=N/A quarskip="No skip" virus="Zeus" ref="https://en.wikipedia.org/wiki/Zeus_%28malware%29" profile="default" srcname="PerryXXXX" osname="Windows" analyticssubmit="false" 

Friday, February 6, 2015

Current Cyber attacks on Canada

Current Cyber-attacks against Canada Cyber Canadian servers,This is from the Last 24 hours as of Feb 6th 2015,  This is a sample from 6 unique servers that are also unique in Ip address across eastern Canada. The Map below shows the top source Country’s attacking. This Data is derived from triggers based on SSH TCP port 22, Telnet TCP port 23 and RDP Port 3389 attacks against our honey bots. 
https://en.wikipedia.org/wiki/Honeypot_%28computing%29



Tuesday, January 6, 2015

Please secure your cookies,



For the love of god, please secure your cookies.

  1. If you are going to pass login information via cookie back to the client to insure that the client is going to make it easier for them to login .. Please pass it back via same secure channel over the same SSL stream not over a diff http stream.
  2. 2nd thing, always and always hash or encrypt the contents of the cookie. So if it is in the clear or if the client gets owned the cookie is that much harder to get Personally Identifiable Information (PII).
  3. Last, this is as easy as grade 5 HTML class.. Do not name things username, user, pass, password, pw, usr. as these key words are easy to find. It’s better to hide in code.

For all the bad coders out, we love you. You keep us busy and employed. 

Saturday, January 3, 2015

Hacking as a service !!!!!



-=ALERT=- do not visit this sites from your computer as due embedded malware. -=ALERT=-

A New Russian hacking site, promises to sell you hacking account to Facebook, classmate and the popular Russian social media site ВКонтакте. 
CanadaCyber have discovered this after one of our underground contact informed us about a new website that is selling services to allow users to hack into other users accounts.  
The innovative thing about this is the service model. Previously most Russian hacking sites would sell you just tools, so you would pay, then you get some link to download the tools and that would be the end of it.  Also for the most part the tools usually would stop working after 1-2 weeks as they are then detected by Av vendors.
Now this is a different as the site does the work. And not the tools you have downloaded that can easily be identified. So you have no idea what new exploit they are doing at that time.
This also insure if the advisories have found a 0 day in something like Facebook only they know how to use it and exploit for financial gain. As the clients is pivoting through the hackers and the hackers are doing the work in a service model aspect.
Below are screens from the site, after using Google translator to translate it. 



As we at Canada cyber continue to fight the cyber threats we have submitted this to some of the big vendors we deal with.




We also love this part LOL.
Информация указанная Вами при регистрации полностью конфиденциальна и не подлежит разглашению третьим лицам.

In English .. 

The information provided by you at registration is completely confidential and will not be divulged to third parties.
We started looking deeper in what is this site exactly doing. And we noticed that the source code they are using comes from another site that offers the same thing. 



So we went to the site and it’s the same thing.
And this is what they do:
1.     You place an order on hack
Leave an order for hacking the account in our system and it will be available to carry out by the hackers. You can pay money for hacking the account when it will be done.
2.     A hacker will fulfill your order
A hacker gets your order and then after breaking he informs our system login, password, and a screenshot of the victim whose account he has hacked.
3.     We will check the hacked account
We will check the hacked account (login and password whether they are valid). If the login and password are hacked, then the system will change the status of your order for Done.
4.     Get login and password from a hacked account
As soon as the order is given the status Done, you can see a screenshot from the personal account of the victim, so we affirm the fact of a successful hack. You need to make a payment for your order and our system will automatically inform you login and password from a compromised account. 


-=ALERT=- do not visit this sites from your computer as due embedded malware. -=ALERT=-