The internet is racing to cut ties with 8chan after another deadly shooting

https://www.engadget.com/2019/08/05/8chan-cloudflare-internet-services-pull-support/

Less than an hour before this weekend’s deadly mass-shooting in El Paso, Texas, the suspect appears to have posted a rambling post filled with white nationalist and racist statements on 8chan. After a day of waffling, Cloudflare announced it would cut the security services it had provided the far-right site. That exposed 8chan to distributed denial of service (DDoS) attacks, and for a time, the site was down. But 8chan soon found a way back online. Now, internet infrastructure companies are playing whack-a-mole, pulling the plug as other services step in to help 8chan get back online.

Soon after Cloudflare terminated its support for 8chan, another host and anti-DDoS protection company BitMitigate stepped in. BitMitigate’s owner, Epik, is notorious for providing services to sites like Gab and Daily Stormer, both known for their far-right supporters, including neo-Nazis and white supremacists. But Voxility, which was effectively providing service to Epik and BitMitigate, pulled its backend support for both. According to New York Times reporter Kevin Roose, Tucows, 8chan’s domain name registrar, will no longer support the site, either. At the time of this writing, 8chan is down.

This isn’t the first time Cloudflare has been urged to end its support for 8chan. In fact, the shooting in El Paso was the third mass shooting this year in which the suspect is believed to have posted about the attack on 8chan before carrying it out. 8chan was linked to the Christchurch shooting in New Zealand and another in California.

In the past, Cloudflare has been reluctant to pull its services from extremist websites, claiming it didn’t want to violate free speech. According to a report by The Guardian, Cloudflare also believed that by keeping "bad" sites in the company’s network, it could notify law enforcement when necessary. Other companies, it said, may not do the same. Cloudflare did make an exception when it terminated its contract with the Daily Stormer. But CEO Matthew Prince told Ars Technica that he hated doing so. "The pressure to take it down just kept building and building," he said.

In a blog post explaining Cloudflare’s most recent exception, CEO Matthew Prince wrote, "The rationale is simple: they have proven themselves to be lawless and that lawlessness has caused multiple tragic deaths."

But those who pick up after Cloudflare may use the same free-speech argument. In a statement released today, Epik’s CEO Rob Monster said, "Freedom of speech and expression are fundamental rights in a free society. We enter into a slippery slope when we start to limit speech that makes us uncomfortable." Monster said Epik did not solicit 8chan’s business, and at the moment it’s only providing registration services. It hasn’t decided whether or not to provide DDoS protection. "From what little we know so far, the Chans are not lawless and do have moderation," Monster added.

Now, it’s unclear if Epik will be able to provide support for 8chan. Because Epik and BitMitigate only have a small percentage of the server capacity of Cloudflare, they rely on renting it from providers like Voxility. Whether or not they support 8chan might actually be up to those providers. In a statement to The Washington Post, Voxility executive Maria Sirbu said, "As soon as we were notified … we proceeded with (completely) removing" BitMitigate. She said Voxility is taking a "firm stand" and urged others to take more action in "keeping the internet a safer place."

But as Prince pointed out in his blog post, 8chan will likely find a way back online. After all, Cloudflare pulled support from the Daily Stormer years ago, and the site continued on seemingly unimpeded, until today. "I have little doubt we’ll see the same happen with 8chan," Prince wrote. "While removing 8chan from our network takes heat off of us, it does nothing to address why hateful sites fester online."

Still, now that there’s so much awareness for the level of hate and violence that 8chan and sites like it breed, it will probably be harder for 8chan to find the services it needs. Even if it can find support from a company like Epik, other internet infrastructure companies, like Voxility, might step in and pull the plug.

Source: Epik

via Engadget http://www.engadget.com

August 5, 2019 at 02:24PM

Ransomware, “wiper” malware attacks have more than doubled, IBM team says

https://arstechnica.com/?p=1546117

RYAZAN, RUSSIA - JUNE 28, 2017: The silhouette of a young man against a red background with a projected message related to the Petya ransomware; on 27 June 2017 a variant of the Petya ransomware virus hit computers of companies in Russia, Ukraine, and other countries in a cyber attack. Alexander Ryumin/TAS (Photo by Alexander Ryumin TASS via Getty Images)
Enlarge /

RYAZAN, RUSSIA – JUNE 28, 2017: The silhouette of a young man against a red background with a projected message related to the Petya ransomware; on 27 June 2017 a variant of the Petya ransomware virus hit computers of companies in Russia, Ukraine, and other countries in a cyber attack. Alexander Ryumin/TAS (Photo by Alexander Ryumin TASS via Getty Images)

Alexander RyuminTASS via Getty Images

It would be hard to miss the rise of ransomware attacks given how visible some have been this year. With multiple state and local governments set back on their heels by ransomware—including the RobbinHood ransomware attack in May that the City of Baltimore is still recovering from, to the tune of $10 million in recovery costs and $8 million in lost revenue—ransomware attacks have become an almost daily part of the news. But these attacks against municipal and state governments are only the most high-profile part of a much larger trend, according to a report issued by IBM’s X-Force Incident Response and Intelligence Services (IRIS) today.

According to data from X-Force IRIS, the ransomware problem is part of a much larger overall increase in destructive malware attacks that has been spiking over the past six months. X-Force’s response to cases of destructive malware increased 200% between January to July 2019 in comparison to the previous six-month period.

“Of those destructive malware cases, 50% targeted organizations in the manufacturing industry,” the researchers noted. “Other sectors significantly affected included oil and gas and education. Most of the destructive attacks we have observed hit organizations in Europe, the United States, and the Middle East.”

IRIS has witnessed ransomware attacks—criminal attacks where a ransom is demanded in exchange for a key—specifically increase by 116%. “While not all ransomware attacks incorporate destructive malware,” the IRIS team wrote, “the simultaneous increase in overall ransomware attacks and ransomware with destructive elements underscores the enhanced threat to corporations from ransomware capable of permanently wiping data.”

Going low

The line between ransomware and purely destructive malware has been blurred ever since the WannaCry and NotPetya attacks used ransomware-based attacks solely for destructive purposes. Ransomware itself can be considered destructive malware, since it renders data irretrievable if victims don’t pay for an encryption key. But there has also been a rise in the use of purely destructive attacks by cybercriminals—a type of attack usually associated with state-backed attackers in the past, such as the Iran-attributed Shamoon, the US-Israel-attributed Stuxnet (which actually destroyed hardware with malicious commands), and the North Korea-attributed Dark Seoul attacks.

“Wiper” capable ransomware like LockerGoga and MegaCortex still have a financial component, but these initiatives go after industrial systems as well as data. And attacks such as the GermanWiper malware use the same “faux ransomware” approach as NotPetya—they offer a key in exchange for a ransom but are irreversible. Additionally, the IRIS team noted that they had seen “financially motivated attackers switch to destructive tactics when they perceive they are not achieving their objective…using destruction as a means of revenge.”

“There are two forms of targeted attacks in the destructive world—’I need to be low and slow until I gather the information I need and plan out my attack,’ or ‘I’m going to drop in, release it, and let it go wild,'” as Christopher Scott, IBM X-Force IRIS’ Global Remediation Lead, put it. But the latter are not in the majority. IRIS observed attackers “reside” within targeted organizations’ networks for up to over four months before launching their destructive payloads—giving the malicious actors plenty of time to perform reconnaissance of the network and stealthily spread their access. And the attackers will go to great lengths to preserve access to key bits of infrastructure within the network throughout their intrusion, allowing them “to maintain control of their strongholds for as long as possible, and to cause as much damage as they can.”

This extended time on the network also gives defenders more time to detect the attacks before they move to the destructive climax. And finding and knocking out their points of access early can help prevent or reduce the blow of an attack in progress.

While some non-targeted ransomware attacks have exploited vulnerabilities in servers to gain access to their victims’ networks, the majority of targeted ransomware and destructive attacks begin either with a spear-phishing email, “credential stuffing” (guessing or outright brute-force attacks with passwords), “watering-hole” attacks (using a site related to a job or industry to spread malware, sometimes through malvertising or compromise of the website), or through some other compromise of a third-party system (such as a cloud service or software-as-a-service provider).

PowerShell scripts are still heavily used by ransomware attacks to spread across networks. But with PowerShell scripts increasingly being blocked by organizations on typical users’ systems, destructive attackers are more often targeting “privileged accounts”—those with administrative access across a wide range of systems. “Unlike attempting remote access, which can generate significant noise,” the X-Force IRIS report noted, “moving laterally with a privileged account can allow the adversary to stealthily move between devices while appearing to be legitimate administrative activity.”

In some cases that the IRIS team responded to, an attacker used administrative access to “wipe an organization’s entire email system,” making it even more difficult to respond to the attack.

Defensive measures

Preventing ransomware and destructive attacks outright would be the ideal solution, but it may not be realistically possible for many organizations—especially as more attacks come in from third-party networks. So instead, isolating the parts of network infrastructure that are affected is essential to limit the damage, the IRIS report noted.

“Even in cases where an attack materializes, if the affected parts of the infrastructure are isolated, an organization can significantly limit the damage and prevent some of the impact to its operations,” the team wrote. “Reducing the number of devices affected by a destructive attack can also drastically reduce the cost and time associated with reconstitution.” Isolating critical parts of network infrastructure from third-party networks is an important part of that—using multiple layers of security control and network defenses.

IRIS’ other advice to organizations includes running tests of response plans “under pressure” and using threat intelligence resources to get a better idea of the potential risks they face. But all of these seem like a lot to ask for some of the types of organizations that have been falling to ransomware. Nowadays, ransomware-targeted organizations are ones that fall below the information security poverty line in terms of administrative and security resources, have shallow IT expertise internally, and can’t even manage to train users on potential threats from phishing attacks.

via Ars Technica https://arstechnica.com

August 5, 2019 at 12:54PM

French Inventor Hoverboards Across the English Channel, Manages Not to Crash This Time

https://gizmodo.com/french-inventor-hoverboards-across-the-english-channel-1836951967

Image: Michel Spingler ((AP)

We all know that age-old adage: if you don’t succeed, try, try again. Sometimes you’ve just got to pick yourself up by your bootstraps, get back on your hoverboard, and give crossing that English Channel another go.

After Franky Zapata wiped out mid-way through his inaugural attempt last month, the French inventor finally completed the journey on his second try Sunday, the Guardian reported, turning the possibility of hoverboard invasion into a completely valid fear.

You can check out Zapata’s flight—or rather, hover—in the video below.

The 40-year-old military reservist used his self-designed Flyboard to make the 22-mile trip, stopping halfway to refuel the supply of kerosene strapped to his back that was powering his flight (the device can only run for 10 minutes; otherwise France would have conquered the world by now). Zipping between Sangatte, France and Dover, England took him all of about 20 minutes. Eat that, Marty McFly.

“We made a machine three years ago… and now we’ve crossed the Channel, it’s crazy. Whether this is a historic event or not, I’m not the one to decide that, time will tell,” Zapata told the BBC after completing his sojourn straight out of science fiction.

He’s been tinkering with the technology for this Flyboard model for three years (a water-powered hoverboard he invented in 2011 shared the same name) in part with the help of a French military grant he received last year totaling roughly $1.4 million. Last month, Zapata also dazzled onlookers when he buzzed around at this year’s Bastille Day military parade wielding a hopefully unloaded rifle, prompting France’s armed forces minister to posit the gizmo could be used “as a flying logistical platform or, indeed, as an assault platform,” according to a Guardian report.

But if you’re worried about an invasion of hoverboarding supersoldiers, fear not: Zapata also said in 2017 he was working with the U.S. military creating a similar device for combat. Hopefully, they’ll have figured out the 10-minute flight limit by then, otherwise we’ll have a Vine-length World War 3. 

via Gizmodo https://gizmodo.com

August 4, 2019 at 12:54PM