id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
611
Globalizing the Attacks Figure 3 below is a map showing where our Unit 42 researchers have found webistes involved in Hancitor attacks.
[ { "id": 46204, "label": "malware", "start_offset": 120, "end_offset": 128 }, { "id": 46205, "label": "identity", "start_offset": 68, "end_offset": 87 } ]
[]
[]
612
Figure 3: Hancitor distribution servers globally thus far in 2017 Table 1 – Number of Distribution Servers by Country
[ { "id": 44799, "label": "malware", "start_offset": 11, "end_offset": 19 }, { "id": 44800, "label": "TIME", "start_offset": 62, "end_offset": 66 } ]
[]
[]
613
The hot spots in the United States represents distribution servers which are created using fraud based accounts at various hosting providers that are hosting the Hancitor documents while the hotspots in Asia represent legitimate sites for small and medium businesses that have been compromised by the actors behind Hancitor campaign to host the malicious Hancitor documents.
[ { "id": 46207, "label": "malware", "start_offset": 162, "end_offset": 170 }, { "id": 46208, "label": "location", "start_offset": 203, "end_offset": 207 }, { "id": 46206, "label": "location", "start_offset": 21, "end_offset": 34 }, { "id": 46210, "label": "campaign", "start_offset": 315, "end_offset": 332 }, { "id": 46211, "label": "malware", "start_offset": 355, "end_offset": 363 } ]
[ { "id": 168, "from_id": 46207, "to_id": 46206, "type": "targets" }, { "id": 169, "from_id": 46207, "to_id": 46208, "type": "targets" } ]
[]
614
Conclusion Attackers are always making business decisions to optimize their attacks in ways that are most successful and profitable.
[]
[]
[]
615
What is most interesting about Hancitor is the way these decisions so clearly reflect an awareness of business realities (by targeting peak working times) and dividing up the “work” of their attacks in a way that so clearly mirrors mainstream business decisions around globalizing operations.
[ { "id": 45796, "label": "malware", "start_offset": 31, "end_offset": 39 } ]
[]
[]
616
In the end, while Hancitor may not be sophisticated, these steps to adapt and stay effective seem to be succeeding.
[ { "id": 46212, "label": "malware", "start_offset": 19, "end_offset": 27 } ]
[]
[]
617
And we expect to continue to see Hancitor be a global threat for the foreseeable future.
[ { "id": 46213, "label": "malware", "start_offset": 33, "end_offset": 41 } ]
[]
[]
618
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
619
Please mark, I'm not a robot!
[]
[]
[]
620
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
621
This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world.
[ { "id": 2073, "label": "identity", "start_offset": 58, "end_offset": 65 }, { "id": 2074, "label": "malware", "start_offset": 144, "end_offset": 149 }, { "id": 44803, "label": "malware", "start_offset": 144, "end_offset": 160 }, { "id": 44804, "label": "location", "start_offset": 198, "end_offset": 205 }, { "id": 44805, "label": "location", "start_offset": 207, "end_offset": 213 } ]
[ { "id": 27, "from_id": 44803, "to_id": 44805, "type": "targets" }, { "id": 26, "from_id": 44803, "to_id": 44804, "type": "targets" } ]
[]
622
On June 27th, 2017 we became aware of a new variant of the Petya malware which is spreading through multiple lateral movement techniques.
[ { "id": 2081, "label": "malware", "start_offset": 60, "end_offset": 65 }, { "id": 46214, "label": "TIME", "start_offset": 4, "end_offset": 19 } ]
[]
[]
623
One technique includes the ETERNALBLUE exploit tool.
[ { "id": 2083, "label": "malware", "start_offset": 28, "end_offset": 39 } ]
[]
[]
624
This is the same exploit the WanaCrypt0r/WannaCry malware exploited to spread globally in May, 2017.
[ { "id": 2086, "label": "malware", "start_offset": 29, "end_offset": 40 }, { "id": 2087, "label": "malware", "start_offset": 41, "end_offset": 49 }, { "id": 44808, "label": "TIME", "start_offset": 90, "end_offset": 99 } ]
[]
[]
625
At least 50 organizations have reported impacts from the malware, including government and critical infrastructure operators.
[]
[]
[]
627
Palo Alto Networks is documenting our prevention capabilities with regard to this threat in the Palo Alto Networks Protections for Petya Ransomware blog post.
[ { "id": 44809, "label": "identity", "start_offset": 1, "end_offset": 19 }, { "id": 44810, "label": "identity", "start_offset": 97, "end_offset": 115 }, { "id": 44811, "label": "malware", "start_offset": 132, "end_offset": 148 } ]
[]
[]
628
Windows users should take the following general steps to protect themselves:
[ { "id": 46217, "label": "SOFTWARE", "start_offset": 0, "end_offset": 7 } ]
[]
[]
629
This is a developing situation, we will update this blog as new information becomes available.
[]
[]
[]
630
AutoFocus users view samples using the Petya tag.
[ { "id": 2102, "label": "malware", "start_offset": 39, "end_offset": 44 } ]
[]
[]
631
Petya is a ransomware family that works by modifying the Window’s system’s Master Boot Record (MBR), causing the system to crash.
[ { "id": 2103, "label": "malware", "start_offset": 1, "end_offset": 6 }, { "id": 46218, "label": "SOFTWARE", "start_offset": 58, "end_offset": 100 } ]
[]
[]
632
When the user reboots their PC, the modified MBR prevents Windows from loading and displays a fake “chkdisk” screen which indicates the computer's hard drive is being repaired, but the malware is actually encrypting the user's files.
[ { "id": 46220, "label": "SOFTWARE", "start_offset": 58, "end_offset": 65 }, { "id": 46219, "label": "SOFTWARE", "start_offset": 45, "end_offset": 48 } ]
[]
[]
633
When this process completes, the malware displays an ASCII Ransom note demanding payment from the victim (Figure 1). Figure 1: Latest Petya Ransom note displayed on a compromised system.
[ { "id": 2109, "label": "malware", "start_offset": 136, "end_offset": 141 } ]
[]
[]
634
The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017.
[ { "id": 2111, "label": "malware", "start_offset": 27, "end_offset": 32 }, { "id": 2113, "label": "malware", "start_offset": 102, "end_offset": 113 }, { "id": 2116, "label": "threat-actor", "start_offset": 188, "end_offset": 206 }, { "id": 46221, "label": "SOFTWARE", "start_offset": 62, "end_offset": 73 }, { "id": 46222, "label": "vulnerability", "start_offset": 143, "end_offset": 156 }, { "id": 46223, "label": "TIME", "start_offset": 216, "end_offset": 226 } ]
[ { "id": 171, "from_id": 2111, "to_id": 46222, "type": "exploits" }, { "id": 170, "from_id": 2111, "to_id": 46221, "type": "targets" }, { "id": 172, "from_id": 2116, "to_id": 2113, "type": "authored-by" }, { "id": 173, "from_id": 46222, "to_id": 46221, "type": "targets" } ]
[]
635
After the system is compromised the victim is asked to send US $300 in Bitcoin to a specific Bitcoin address and then send an e-mail with the victim’s bitcoin wallet ID to wowsmith123456@posteo[.]net to retrieve their individual decryption key.
[ { "id": 46226, "label": "SOFTWARE", "start_offset": 94, "end_offset": 101 }, { "id": 46224, "label": "EMAIL", "start_offset": 173, "end_offset": 200 }, { "id": 46225, "label": "SOFTWARE", "start_offset": 72, "end_offset": 79 } ]
[]
[]
636
Posteo (a free e-mail provider) has already shut down this e-mail address, and as such victims should not even attempt to pay the ransom.
[ { "id": 44816, "label": "SOFTWARE", "start_offset": 1, "end_offset": 7 } ]
[]
[]
637
As of 13:00 UTC on June 28thth, approximately 4 Bitcoin have been transferred to the attacker's wallet.
[ { "id": 46227, "label": "TIME", "start_offset": 6, "end_offset": 28 } ]
[]
[]
638
Unit 42 is unaware of ANY successful recovery after paying the ransom.
[ { "id": 2124, "label": "identity", "start_offset": 1, "end_offset": 8 }, { "id": 2125, "label": "location", "start_offset": 64, "end_offset": 70 } ]
[]
[]
639
Additionally, ongoing research by the industry is showing that specific actions this malware takes makes it technically infeasible, if not impossible, for recovery to occur.
[]
[]
[]
640
This means that even though this malware is functionally ransomware, for threat assessment purposes, it should be functionally considered a “wiper”.
[]
[]
[]
641
We are aware of the following information about how the Petya attack lifecycle works.
[ { "id": 46228, "label": "malware", "start_offset": 57, "end_offset": 62 } ]
[]
[]
642
Delivery/Exploitation
[]
[]
[]
643
We have not yet confirmed the initial infection vector for this new Petya variant.
[ { "id": 2132, "label": "malware", "start_offset": 69, "end_offset": 74 } ]
[]
[]
644
Previous variants were spread through e-mail, but we have not identified this latest sample carried in any e-mail related attacks.
[]
[]
[]
645
While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL.
[ { "id": 46229, "label": "location", "start_offset": 90, "end_offset": 99 }, { "id": 44817, "label": "SOFTWARE", "start_offset": 128, "end_offset": 133 }, { "id": 44818, "label": "malware", "start_offset": 171, "end_offset": 176 } ]
[ { "id": 174, "from_id": 44818, "to_id": 44817, "type": "uses" } ]
[]
646
The software is heavily used in Ukraine it appears the company’s systems may have been compromised and used to issue a malicious update to systems running the program on the morning of Jun 27th.
[ { "id": 46230, "label": "TIME", "start_offset": 174, "end_offset": 193 }, { "id": 46231, "label": "location", "start_offset": 32, "end_offset": 39 } ]
[]
[]
648
Installation
[]
[]
[]
649
This variant of Petya is spread as a DLL file, which must be executed by another process before it takes action on the system.
[ { "id": 2145, "label": "malware", "start_offset": 16, "end_offset": 21 } ]
[]
[]
650
Once executed, it overwrites the Master Boot Record and creates a scheduled task to reboot the system.
[ { "id": 46233, "label": "SOFTWARE", "start_offset": 33, "end_offset": 51 }, { "id": 46234, "label": "attack-pattern", "start_offset": 66, "end_offset": 80 } ]
[]
[]
651
Once the system reboots, the malware displays a fake “chkdisk” scan which tricks the victim into believing the program is repairing their hard drive.
[]
[]
[]
652
In reality, the malware is encrypting the NTFS Master File Table in the background.
[]
[]
[]
653
Once the fake chkdisk completes, the malware displays a ransom note which demands a payment of $300 in bitcoin.
[]
[]
[]
654
Command and Control Petya contains no Command and Control mechanisms that we know of.
[ { "id": 2153, "label": "malware", "start_offset": 21, "end_offset": 26 } ]
[]
[]
655
After a host is infected, there is no communication from the malware back to the attacker.
[]
[]
[]
656
Lateral Movement Petya uses three mechanisms to spread to additional hosts.
[ { "id": 2156, "label": "malware", "start_offset": 19, "end_offset": 24 }, { "id": 46235, "label": "attack-pattern", "start_offset": 1, "end_offset": 17 } ]
[]
[]
657
Ransomware attacks are very common, but they are rarely coupled with an exploit that allows the malware to spread as a network worm.
[]
[]
[]
658
The WannaCry attacks in May, 2017 demonstrated that many Windows systems had not been patched for this vulnerability.
[ { "id": 2160, "label": "malware", "start_offset": 4, "end_offset": 12 }, { "id": 46236, "label": "TIME", "start_offset": 24, "end_offset": 33 }, { "id": 46237, "label": "SOFTWARE", "start_offset": 57, "end_offset": 64 } ]
[]
[]
659
The spread of Petya using this vulnerability indicates that many organizations may still be vulnerable, despite the attention WannaCry received.
[ { "id": 2163, "label": "malware", "start_offset": 14, "end_offset": 19 }, { "id": 2166, "label": "malware", "start_offset": 126, "end_offset": 134 } ]
[]
[]
660
As always if you have any questions, please come to the Threat & Vulnerability Discussions on our Live Community. Version Summary June 27, 2017: June 27, 2017 – 1:08 PM PT June 28, 2017 – 8:40 AM PT June 29, 2017 - 5:00 PM PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "id": 46238, "label": "TIME", "start_offset": 133, "end_offset": 146 }, { "id": 46241, "label": "TIME", "start_offset": 177, "end_offset": 203 }, { "id": 46242, "label": "TIME", "start_offset": 205, "end_offset": 231 }, { "id": 46240, "label": "TIME", "start_offset": 149, "end_offset": 175 } ]
[]
[]
661
Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
662
Nearly all of us have a use for Microsoft Office documents.
[ { "id": 46243, "label": "SOFTWARE", "start_offset": 32, "end_offset": 48 } ]
[]
[]
663
Whether they are work documents, e-receipts, or a lease on a new apartment – Office documents are useful to all of us, and this is part of the reason we’re very likely to open an office document we receive as an attachment in e-mail.
[]
[]
[]
664
Armed with the knowledge that many people will open nearly any document, even those from an untrusted source, adversaries commonly choose these files in attacks to compromise a system.
[]
[]
[]
665
In this threat brief we show you five different ways that Office documents can be subverted and abused to attack and compromise a Windows endpoint, some we’ve already posted about before, and some are new.
[ { "id": 46244, "label": "SOFTWARE", "start_offset": 130, "end_offset": 137 } ]
[]
[]
666
Macros Macros are the most straight-forward way for an attacker to weaponize Office documents.
[]
[]
[]
667
Office applications have a built-in script engine that can run VBA (Visual Basic for Applications) scripts.
[ { "id": 46245, "label": "SOFTWARE", "start_offset": 63, "end_offset": 98 } ]
[]
[]
668
These scripts can execute immediately as the document opens, without any user interaction (assuming the user has previously enabled macros) and run malicious code on the system.
[]
[]
[]
669
If the user has not enabled macros, a popup window will appear asking the user to click to do so.
[]
[]
[]
670
The pop-up is one of several security mechanisms added by Microsoft to mitigate the security risk that macros pose.
[ { "id": 46246, "label": "identity", "start_offset": 58, "end_offset": 67 } ]
[]
[]
671
Microsoft will also force a different file extension (.docm instead of .docx for new documents containing macros).
[ { "id": 46247, "label": "identity", "start_offset": 0, "end_offset": 9 } ]
[]
[]
672
Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign.
[ { "id": 2220, "label": "malware", "start_offset": 212, "end_offset": 218 }, { "id": 44819, "label": "campaign", "start_offset": 267, "end_offset": 282 }, { "id": 44821, "label": "threat-actor", "start_offset": 267, "end_offset": 273 } ]
[ { "id": 175, "from_id": 44819, "to_id": 44821, "type": "related-to" } ]
[]
673
Figure 1.
[]
[]
[]
674
The Sofacy document before & after the content is enabled
[ { "id": 46248, "label": "malware", "start_offset": 4, "end_offset": 10 } ]
[]
[]
675
As you can see in this example, attackers try to convince users to disable the security mechanisms added by Microsoft using social engineering, convincing the user to enable content for them to be able to see the full document.
[ { "id": 45797, "label": "attack-pattern", "start_offset": 125, "end_offset": 143 }, { "id": 44822, "label": "identity", "start_offset": 109, "end_offset": 118 } ]
[]
[]
676
In the Sofacy example, the attackers had simply made the font color white, so the text was present prior to the user enabling macros, just not clearly visible.
[ { "id": 46249, "label": "malware", "start_offset": 7, "end_offset": 13 } ]
[]
[]
677
Embedded Flash files In addition to built-in capabilities, like macros, Office documents can also be embedded with external objects, such as Adobe Flash files.
[ { "id": 2236, "label": "location", "start_offset": 91, "end_offset": 94 }, { "id": 46250, "label": "SOFTWARE", "start_offset": 143, "end_offset": 154 } ]
[]
[]
678
These objects are passed to the appropriate software for handling, thus any vulnerability that the software has can also be exploited by embedding it within the Adobe Flash content in the Office document.
[ { "id": 44823, "label": "SOFTWARE", "start_offset": 161, "end_offset": 172 } ]
[]
[]
679
An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents.
[ { "id": 46251, "label": "vulnerability", "start_offset": 66, "end_offset": 79 }, { "id": 46252, "label": "SOFTWARE", "start_offset": 84, "end_offset": 102 }, { "id": 46253, "label": "attack-pattern", "start_offset": 125, "end_offset": 173 } ]
[ { "id": 176, "from_id": 46252, "to_id": 46251, "type": "has" }, { "id": 177, "from_id": 46251, "to_id": 46253, "type": "uses" } ]
[]
680
In these types of attacks, the malicious Excel contains embedded Adobe Flash content which can trigger the Flash vulnerability and execute embedded shellcode.
[ { "id": 46255, "label": "vulnerability", "start_offset": 107, "end_offset": 126 }, { "id": 46254, "label": "SOFTWARE", "start_offset": 65, "end_offset": 76 } ]
[]
[]
681
Microsoft Equation Editor
[ { "id": 45798, "label": "SOFTWARE", "start_offset": 1, "end_offset": 26 } ]
[]
[]
682
In a similar way to embedding Adobe Flash files into an Office document, you can also embed equations in documents that will be parsed by Microsoft Equation Editor - a program that lets you easily write mathematical equations: Figure 2. Microsoft Equation Editor As in our previous example, vulnerabilities in the equation editor can be exploited by leveraging malicious Office documents.
[ { "id": 46257, "label": "SOFTWARE", "start_offset": 30, "end_offset": 41 }, { "id": 46258, "label": "SOFTWARE", "start_offset": 138, "end_offset": 163 }, { "id": 46256, "label": "SOFTWARE", "start_offset": 238, "end_offset": 263 } ]
[]
[]
683
We’ve seen examples of this just recently, when CVE-2017-11882 was exploited in the wild, paving the way to other exploits like CVE-2018-0802, both of which exploit flaws in the equation editor, enabling attackers to get from the user opening an Office document to remote code execution.
[ { "id": 46259, "label": "vulnerability", "start_offset": 48, "end_offset": 62 }, { "id": 46260, "label": "vulnerability", "start_offset": 128, "end_offset": 141 }, { "id": 46261, "label": "SOFTWARE", "start_offset": 178, "end_offset": 193 } ]
[]
[]
684
While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers.
[ { "id": 2275, "label": "identity", "start_offset": 149, "end_offset": 156 }, { "id": 44827, "label": "SOFTWARE", "start_offset": 54, "end_offset": 79 }, { "id": 44824, "label": "vulnerability", "start_offset": 97, "end_offset": 110 }, { "id": 44825, "label": "vulnerability", "start_offset": 115, "end_offset": 128 } ]
[ { "id": 29, "from_id": 44827, "to_id": 44825, "type": "has" }, { "id": 28, "from_id": 44827, "to_id": 44824, "type": "has" } ]
[]
685
Note that since the Microsoft Equation Editor runs as its own process (eqnedt32.exe), protections specific to Microsoft Office such as EMET and Windows Defender Exploit Guard are not effective by default, as they only protect Microsoft Office processes (such as winword.exe). OLE Objects & HTA Handlers
[ { "id": 46263, "label": "SOFTWARE", "start_offset": 144, "end_offset": 174 }, { "id": 46264, "label": "SOFTWARE", "start_offset": 20, "end_offset": 45 }, { "id": 46262, "label": "SOFTWARE", "start_offset": 110, "end_offset": 126 }, { "id": 46265, "label": "FILEPATH", "start_offset": 71, "end_offset": 83 }, { "id": 46266, "label": "SOFTWARE", "start_offset": 226, "end_offset": 242 }, { "id": 46267, "label": "FILEPATH", "start_offset": 262, "end_offset": 273 } ]
[]
[]
686
OLE Objects & HTA Handlers are mechanisms Office documents use to make references to include other documents in their content.
[]
[]
[]
687
They can be used to compromise an endpoint in the following way: This functionality was leveraged in exploitation of CVE-2017-0199 - a Microsoft Office/WordPad remote code execution (RCE) vulnerability patched by Microsoft in September 2017, and was used in multiple campaigns, like this OilRig campaign.
[ { "id": 2292, "label": "identity", "start_offset": 136, "end_offset": 145 }, { "id": 2293, "label": "tools", "start_offset": 146, "end_offset": 152 }, { "id": 2298, "label": "malware", "start_offset": 289, "end_offset": 295 }, { "id": 44828, "label": "vulnerability", "start_offset": 118, "end_offset": 131 }, { "id": 44830, "label": "campaign", "start_offset": 289, "end_offset": 303 }, { "id": 44829, "label": "TIME", "start_offset": 227, "end_offset": 241 }, { "id": 44831, "label": "tools", "start_offset": 136, "end_offset": 152 }, { "id": 44832, "label": "tools", "start_offset": 153, "end_offset": 160 } ]
[ { "id": 30, "from_id": 44831, "to_id": 44828, "type": "has" }, { "id": 31, "from_id": 44832, "to_id": 44828, "type": "has" }, { "id": 32, "from_id": 44830, "to_id": 44828, "type": "exploits" } ]
[]
688
Figure 3.
[]
[]
[]
689
RTF files will look exactly like regular Word documents
[ { "id": 46268, "label": "SOFTWARE", "start_offset": 41, "end_offset": 45 } ]
[]
[]
690
In addition to the previous OLE & HTA exploit, attackers discovered RTF files can also execute ‘text/html’ mime-type OLE objects using the MSHTML.
[ { "id": 44833, "label": "vulnerability", "start_offset": 28, "end_offset": 45 } ]
[]
[]
691
This means that RTF documents expose the same attack surface as Internet Explorer!
[ { "id": 46269, "label": "SOFTWARE", "start_offset": 64, "end_offset": 81 } ]
[]
[]
692
Leveraging this logical vulnerability, known as CVE-2018-8174, allows attackers to execute arbitrary HTML/JavaScript/VBScript.
[ { "id": 46270, "label": "vulnerability", "start_offset": 48, "end_offset": 61 }, { "id": 46271, "label": "attack-pattern", "start_offset": 83, "end_offset": 125 } ]
[]
[]
693
While code executed in this way is ‘sandboxed’ (where it cannot run new processes or write to the filesystem etc.), like other code running from Internet Explorer
[ { "id": 45799, "label": "SOFTWARE", "start_offset": 145, "end_offset": 162 } ]
[]
[]
694
, this flaw can be used to leverage other vulnerabilities, such as a memory corruption UAF vulnerability in the VBScript engine, to gain arbitrary code execution in the context of the Word application (winword.exe), allowing them to gain control on the system.
[ { "id": 46272, "label": "FILEPATH", "start_offset": 202, "end_offset": 213 }, { "id": 46273, "label": "SOFTWARE", "start_offset": 112, "end_offset": 127 }, { "id": 46274, "label": "SOFTWARE", "start_offset": 184, "end_offset": 200 } ]
[]
[]
695
Conclusion
[]
[]
[]
696
While document-based attacks have been a common attack vector for over a decade, we’re seeing a recent rise in their popularity and complexity.
[]
[]
[]
697
This rise may be a result of browser exploits becoming more difficult to use, due to the hardening done by browser developers.
[]
[]
[]
698
No matter the reason
[]
[]
[]
699
, it is important that organizations know how to defend against these common techniques.
[]
[]
[]
700
Prevention Palo Alto Networks Traps advanced endpoint protection offers multiple methods of malware and exploit prevention to protect against these threats:
[ { "id": 2316, "label": "identity", "start_offset": 12, "end_offset": 30 } ]
[]
[]
701
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
702
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
703
This has been a fun week.
[]
[]
[]
704
We have not had a significant cyber event like this – something that affects just about everybody on the Internet -- since the Kaminsky DNS vulnerability of 2008.
[ { "id": 46276, "label": "vulnerability", "start_offset": 127, "end_offset": 153 }, { "id": 46275, "label": "TIME", "start_offset": 157, "end_offset": 161 } ]
[]
[]
705
Everybody I know has been scrambling to understand what it means to their organization, to their business and to their immediate family.
[]
[]
[]
706
Yes, I said family.
[]
[]
[]
707
I am sure I am not the only one who has answered a question or two from his mother-in-law about how the Internet is melting down based on what she’s been reading in the press.
[]
[]
[]
708
There’s a lot out there already about what Heartbleed means for the Web and beyond, and I’ll point you to our own analysis written by Scott Simkin or an essay by Dan Goodin over at ars technica for that explanation.
[ { "id": 44834, "label": "identity", "start_offset": 135, "end_offset": 147 }, { "id": 44835, "label": "identity", "start_offset": 163, "end_offset": 173 }, { "id": 44836, "label": "identity", "start_offset": 182, "end_offset": 194 }, { "id": 44837, "label": "vulnerability", "start_offset": 44, "end_offset": 54 } ]
[]
[]
709
Instead, here are eight things I am doing right now to protect Palo Alto Networks and my home (and mother-in-law) and that you should be doing, too:
[ { "id": 46277, "label": "identity", "start_offset": 63, "end_offset": 81 } ]
[]
[]
710
If there’s a long-term consideration here, it’s to install perfect forward secrecy, as Twitter did last year.
[ { "id": 46278, "label": "SOFTWARE", "start_offset": 88, "end_offset": 95 } ]
[]
[]
711
That ensures that a session key derived from a stolen private key and a collected public key in the future will not be compromised.
[]
[]
[]
712
For more: Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]