id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
411 | As that trend shows no sign of slowing down anytime soon, we can expect this to remain a very lucrative avenue for attackers. | [] | [] | [] |
412 | Unlike other cybersecurity threats we’re used to bracing for around the holiday season, unauthorized coin mining attacks can affect shoppers who are up-to-date with security patches and even some running some security protections. | [
{
"id": 46110,
"label": "attack-pattern",
"start_offset": 89,
"end_offset": 121
}
] | [] | [] |
413 | And unlike spam or phishing, these attacks also don’t require any lapse in vigilance by the user: they can happen simply by going to websites users know and trust. | [
{
"id": 46111,
"label": "attack-pattern",
"start_offset": 11,
"end_offset": 15
},
{
"id": 46112,
"label": "attack-pattern",
"start_offset": 19,
"end_offset": 27
}
] | [] | [] |
414 | The good news for retailers is that these attacks are wholly preventable. | [] | [] | [] |
415 | And for shoppers, the impact of a successful attack is minimal: there are no lasting effects or impact, making it an annoyance at worst. But because of the potential impact on holiday shopping and the ease of attacks, unauthorized coin mining is an attack that retailers need to be aware of and take active steps for prevention this holiday season. | [
{
"id": 46113,
"label": "attack-pattern",
"start_offset": 219,
"end_offset": 243
}
] | [] | [] |
416 | What Is Unauthorized Coin Mining? | [
{
"id": 46114,
"label": "attack-pattern",
"start_offset": 9,
"end_offset": 33
}
] | [] | [] |
417 | The best way to understand the threat of unauthorized coin mining is to first understand its impact. | [
{
"id": 46115,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 66
}
] | [] | [] |
418 | Unauthorized coin mining is an attack that can cause a user’s system to suddenly and unexpectedly slow down, sometimes significantly, when visiting a website. | [
{
"id": 46116,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 24
}
] | [] | [] |
419 | In a worst case, the slow-down can be so severe that it can make a website basically unusable. | [] | [] | [] |
420 | Obviously, this impact is potentially dire for shoppers and retailers as it directly impacts and harms the online shopping experience. | [] | [] | [] |
421 | What causes this impact is when the website the user visits is running “coin miner” code. | [
{
"id": 46117,
"label": "malware",
"start_offset": 72,
"end_offset": 82
}
] | [] | [] |
422 | “Coin miner” code is code used to “mine” for digital currency like bitcoin. | [
{
"id": 46118,
"label": "malware",
"start_offset": 2,
"end_offset": 12
},
{
"id": 46119,
"label": "SOFTWARE",
"start_offset": 68,
"end_offset": 75
}
] | [] | [] |
423 | Mining provides the computing necessary to power the digital currency’s infrastructure. | [] | [] | [] |
424 | Mining is also a computationally intensive process, meaning it takes a lot of system resources. | [] | [] | [] |
425 | Because of this, people can earn digital currency credit in exchange for the use of their computing resources to power that digital currency’s infrastructure. | [] | [] | [] |
426 | There are many kinds of coin mining software. | [] | [] | [] |
427 | In this case, we are concerned about coin mining code that’s used on websites. | [] | [] | [] |
428 | When the user visits the website, the code runs on their system and “mines” on behalf of others – either the website or someone else. | [] | [] | [] |
429 | When this is done with the visitor’s full knowledge and consent, it’s a fair and reasonable exchange. | [] | [] | [] |
430 | For instance, there are some websites that now use coin mining as an alternative to digital advertising to generate revenue. | [] | [] | [] |
431 | In these cases, the coin mining is authorized; the website informs the user that, while on the site, his or her computing resources will be used to “mine” digital currency, and the site will receive the credits. | [] | [] | [] |
432 | While the user will experience a slow-down as the coin mining software is run, it is (or should be) expected, because of the notification, and so done with the site visitor’s consent. | [] | [] | [] |
433 | Where this becomes a problem is when coin mining is done without the user’s knowledge and consent. | [] | [] | [] |
434 | In this case the coin mining is unauthorized: in essence, it’s an attack against the user’s resources. | [] | [] | [] |
435 | How Do Unauthorized Coin Mining Attacks Happen? | [
{
"id": 44748,
"label": "attack-pattern",
"start_offset": 8,
"end_offset": 32
}
] | [] | [] |
436 | Unauthorized coin mining attacks happen very simply: the website the user is visiting has special code on it that performs coin mining operations on the visitor’s computer while they’re on the website. | [
{
"id": 46120,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 33
}
] | [] | [] |
437 | And, as noted before, this happens without the user’s knowledge or consent. | [] | [] | [] |
438 | Because these attacks happen due to code on the website, that code is either there with the site owner’s knowledge and permission or not. | [] | [] | [] |
439 | When unauthorized coin mining happens with the site owner’s knowledge and permission, it’s basically a malicious site. | [
{
"id": 46121,
"label": "attack-pattern",
"start_offset": 6,
"end_offset": 30
}
] | [] | [] |
440 | That site’s owner is the attacker. | [] | [] | [] |
441 | When we’re talking about online shopping, clearly there’s no threat here to the retailer: they’re the ones doing the attacking. | [] | [] | [] |
442 | And for the shopper, it means you’re on an untrustworthy site and so open to all manner of risks beyond just unauthorized coin mining. | [
{
"id": 46122,
"label": "attack-pattern",
"start_offset": 109,
"end_offset": 133
}
] | [] | [] |
443 | The real, significant situation shoppers and retailers need to think about this season is when unauthorized coin mining code is on a site without that site owner’s knowledge and permission. | [
{
"id": 46123,
"label": "attack-pattern",
"start_offset": 96,
"end_offset": 120
}
] | [] | [] |
444 | Here the site itself has been attacked, and the site owners are also victims. | [] | [] | [] |
445 | This is an attack against not just shoppers but the retailers operating online shopping sites. | [] | [] | [] |
446 | How You Can Prevent Unauthorized Coin Mining Attacks If you’re a shopper, there are three things you can do to protect yourself against unauthorized coin mining attacks this holiday season: If you’re a retailer, preventing unauthorized coin mining attacks comes down to focusing on two tasks, both of which you should be doing anyway: Finally, if you’re a legitimate website that has chosen to implement coin mining to raise funds from your visitors, you can ensure that your visitors don’t think you’re engaged in unauthorized coin mining by doing three things: Conclusion Working to prevent cybercrime threats during the holiday season has become a standard part of what shoppers and retailers do every year. | [] | [] | [] |
447 | This year, for the first time in many years, shoppers and retailers are facing a new threat, unauthorized coin mining, driven by the surge in digital currency prices. | [] | [] | [] |
448 | While this threat can have a clear, negative impact on retailers and shoppers, the good news is that this threat is easily preventable and poses no lasting harm to consumers. | [] | [] | [] |
449 | This is a case where forewarned is forearmed, and that forearming can result in effective prevention. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
450 | Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
451 | This post is also available in: 日本語 (Japanese) Intro | [] | [] | [] |
452 | One of the most important “innovations” in malware in the past decade is what’s called a Domain Generation Algorithm (“DGA”)”. | [] | [] | [] |
453 | DGA is an automation technique that attackers use to make it harder for defenders to protect against attacks. | [] | [] | [] |
454 | While DGA has been in use for over 10 years now, it’s still a potent technique that has been a particular challenge for defenders to counter. | [] | [] | [] |
455 | Fortunately, there are emerging technologies now that can better counter DGAs. | [] | [] | [] |
456 | What is it? | [] | [] | [] |
457 | A Domain Generation Algorithm is a program that is designed to generate domain names in a particular fashion. | [] | [] | [] |
458 | Attackers developed DGAs so that malware can quickly generate a list of domains that it can use for the sites that give it instructions and receive information from the malware (usually referred to as “command and control” or C2). | [] | [] | [] |
459 | Attackers use DGA so that they can quickly switch the domains that they’re using for the malware attacks. | [] | [] | [] |
460 | Attackers do this because security software and vendors act quickly to block and take down malicious domains that malware uses. | [] | [] | [] |
461 | Attackers developed DGA specifically to counter these actions. | [] | [] | [] |
462 | In the past, attackers would maintain a static list of malicious domains; defenders could easily take that list and start blocking and taking down those sites. | [] | [] | [] |
463 | By using an algorithm to build the list of domains, the attackers also make it harder for defenders to know or predict what domains will be used than if they had a simple list of domains. | [] | [] | [] |
464 | To get that list of domains that the malware will use, defenders have to decode the algorithm which can be difficult. | [] | [] | [] |
465 | Even then, taking down sites that malware using a DGA can be a challenge as defenders have to go through the process of working with ISPs to take down these malicious domains one by one. | [
{
"id": 46124,
"label": "identity",
"start_offset": 134,
"end_offset": 137
}
] | [] | [] |
466 | Many DGAs are built to use hundreds or even thousands of domains. | [] | [] | [] |
467 | And these domains are often up for only limited periods of time. | [] | [] | [] |
468 | In this environment blocking and taking down DGA-related domains quickly becomes a game of “whack a mole” that is sometimes futile. | [] | [] | [] |
469 | Why should I care, what can it do to me? | [] | [] | [] |
470 | DGA by itself can’t harm you. | [] | [] | [] |
471 | But it is an important piece that enables modern malware to try and evade security products and countermeasures. | [] | [] | [] |
472 | The importance and usefulness of DGA is best shown by the fact that it’s been in regular and constant use since at least 2008. | [
{
"id": 46125,
"label": "TIME",
"start_offset": 121,
"end_offset": 125
}
] | [] | [] |
473 | DGA was a key component in the Conficker attacks in 2008 and 2009 and part of its success. | [
{
"id": 46126,
"label": "malware",
"start_offset": 31,
"end_offset": 40
},
{
"id": 46127,
"label": "TIME",
"start_offset": 52,
"end_offset": 56
},
{
"id": 46128,
"label": "TIME",
"start_offset": 61,
"end_offset": 65
}
] | [] | [] |
474 | What can I do about it? | [] | [] | [] |
475 | Because DGA is a technique the fuels malware attacks, the things you can do to help prevent malware can also help prevent DGA-fueled malware attacks: In addition, new technologies are being developed that can more directly counter DGA-fueled attacks, particularly for organizations. | [] | [] | [] |
476 | In particular, security vendors are bringing automation to bear to counter the attackers’ automation. | [] | [] | [] |
477 | New anti-DGA technologies that leverage machine learning and big data are capable of countering DGA’s automation with automated prediction of their own that can anticipate, block, assist with malicious site takedowns or even, in some cases, prevent those malicious sites from being used in the first place. | [] | [] | [] |
478 | You can also learn more about these new technologies and look at deploying them as an additional layer of protection. | [] | [] | [] |
479 | About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives. | [] | [] | [] |
480 | They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family? | [
{
"id": 45787,
"label": "identity",
"start_offset": 25,
"end_offset": 43
},
{
"id": 45789,
"label": "identity",
"start_offset": 44,
"end_offset": 51
},
{
"id": 45790,
"label": "identity",
"start_offset": 25,
"end_offset": 72
}
] | [] | [] |
481 | Email us at u42comms@paloaltonetworks.com. | [
{
"id": 1630,
"label": "EMAIL",
"start_offset": 12,
"end_offset": 41
}
] | [] | [] |
482 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
483 | Please mark, I'm not a robot! | [] | [] | [] |
484 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
485 | Unit 42 released details about a vulnerability that affects Android devices running operating systems older than 8.0 Oreo. | [
{
"id": 1635,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 46129,
"label": "SOFTWARE",
"start_offset": 60,
"end_offset": 67
},
{
"id": 46130,
"label": "SOFTWARE",
"start_offset": 113,
"end_offset": 121
}
] | [] | [] |
486 | The vulnerability leaves Android users at risk of falling victim to an Android Toast Overlay attack. | [
{
"id": 44751,
"label": "SOFTWARE",
"start_offset": 25,
"end_offset": 32
},
{
"id": 44753,
"label": "attack-pattern",
"start_offset": 71,
"end_offset": 99
}
] | [
{
"id": 155,
"from_id": 44753,
"to_id": 44751,
"type": "targets"
}
] | [] |
487 | Patches are available that fix this vulnerability, so Android users should get the latest updates as soon as possible. | [
{
"id": 46131,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 61
}
] | [] | [] |
488 | How it Works | [] | [] | [] |
489 | The vulnerability affects the Toast feature on Android devices, an Android feature that allows display messages and notifications of other applications to “pop up,” and allows an attacker to employ an overlay attack. | [
{
"id": 45791,
"label": "SOFTWARE",
"start_offset": 47,
"end_offset": 54
},
{
"id": 45792,
"label": "SOFTWARE",
"start_offset": 67,
"end_offset": 74
}
] | [] | [] |
490 | An overlay attack happens when an attacker places a window over a legitimate application on the device. | [] | [] | [] |
491 | Users will interact with the window, thinking they are performing their intended function, but they are actually engaging with the attackers overlay window and executing the attacker’s desired function. | [] | [] | [] |
492 | You can see an example of how this would work in Figure 1. | [] | [] | [] |
493 | Figure 1: Bogus patch installer overlying malware requesting administrative permissions This interaction can install malware or malicious software on the device, grant malware full administrative privileges or lock the user out and render the device unusable. In the past successful overlay attacks were typically dependent on two conditions: However, with this particular vulnerability, these conditions are no longer required for a successful attack. | [] | [] | [] |
494 | This means that attackers can use this vulnerability in apps users get from places other than Google Play. | [
{
"id": 46132,
"label": "SOFTWARE",
"start_offset": 94,
"end_offset": 105
}
] | [] | [] |
495 | And when they install these malicious apps, they don’t have to ask for the “draw on top” permission. | [] | [] | [] |
496 | How to Defend Against It Keeping devices updated is a general security best practice. | [] | [] | [] |
497 | The Android Toast Overlay attack specifically targets outdated devices using versions prior to 8.0. | [
{
"id": 46133,
"label": "attack-pattern",
"start_offset": 4,
"end_offset": 32
}
] | [] | [] |
498 | In order to defend against the Android Toast Overlay attack, update all Android devices to the latest version. | [
{
"id": 44756,
"label": "attack-pattern",
"start_offset": 31,
"end_offset": 59
},
{
"id": 44757,
"label": "SOFTWARE",
"start_offset": 31,
"end_offset": 38
},
{
"id": 44758,
"label": "SOFTWARE",
"start_offset": 72,
"end_offset": 79
}
] | [] | [] |
499 | Additionally, avoid downloading malicious applications by only downloading from the Google Play store is another best practice you should always follow. | [
{
"id": 46134,
"label": "SOFTWARE",
"start_offset": 84,
"end_offset": 101
}
] | [] | [] |
500 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
501 | Please mark, I'm not a robot! | [] | [] | [] |
502 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
503 | This post is also available in: 日本語 (Japanese) Ransomware is one of the top threats in cybersecurity and a focus area for Palo Alto Networks. | [
{
"id": 46135,
"label": "identity",
"start_offset": 128,
"end_offset": 146
}
] | [] | [] |
504 | In the current threat landscape, ransom payments are rising and organizations are seeking to protect themselves from threat actors. | [] | [] | [] |
505 | In the 2021 Unit 42 Ransomware Threat Report, we detailed the observations and the trend of top ransomware families from January 2020-January 2021. | [
{
"id": 1681,
"label": "identity",
"start_offset": 12,
"end_offset": 19
},
{
"id": 46138,
"label": "TIME",
"start_offset": 134,
"end_offset": 146
},
{
"id": 46136,
"label": "TIME",
"start_offset": 7,
"end_offset": 11
},
{
"id": 46137,
"label": "TIME",
"start_offset": 121,
"end_offset": 133
}
] | [] | [] |
506 | This post supplements that information based on observations from the first three months of 2021, and will discuss the propagation of different ransomware families we observed in the wild and the different types of extortion used. | [
{
"id": 46139,
"label": "TIME",
"start_offset": 92,
"end_offset": 96
}
] | [] | [] |
507 | We hope the information will help readers get a clear picture of current directions in ransomware trends. | [] | [] | [] |
508 | In the first quarter (Q1) of 2021, Unit 42 detected 113 different ransomware families in the wild. | [
{
"id": 46140,
"label": "TIME",
"start_offset": 21,
"end_offset": 33
},
{
"id": 46141,
"label": "identity",
"start_offset": 35,
"end_offset": 42
}
] | [] | [] |
509 | Based on the statistical data, the top 15 ransomware families only cover 52.3% of total ransomware cases. | [] | [] | [] |
510 | This demonstrates the diversity of ransomware and emphasizes how difficult it is to expand ransomware detection coverage with static profiling. | [] | [] | [] |