Friday, 5 September 2014

IT Technology: Nimble Storage

Nimble Storage's Adaptive Flash platform is the first storage solution to eliminate the flash performance and capacity tradeoff. The Adaptive Flash platform is based on Nimble's CASL architecture, and InfoSight, the company's data sciences-based approach to the storage lifecycle.


<< Key Benefits >>
1.  Performance and Capacity
  • Virtual Desktop Scalable Storage and Performance Capacity Flexible scaling of storage resources to satisfy the changing demands of business-critical applications
  • Five times greater performance and capacity density than legacy storage systems
  • Up to a 75% reduction in data footprint, and a 10x reduction in datacenter rack space

2.  Seamless Scalability
  • Non-disruptive and independent scaling of performance and capacity, within a single array or a cluster

3.  Integrated Data Protection
  • As many as 90 days of hourly snapshots on a single array
  • WAN-efficient replication of snapshot data for disaster recovery

4.  Proactive Wellness
  • Peak storage health driven by powerful data sciences
  • Greater than five nines system uptime


Reference:
Nimble Storage Products Overview
http://www.nimblestorage.com/products/overview.php

Wednesday, 3 September 2014

IT Technology: Backoff POS Malware

One of the earliest most persistent forms of cybercrime today focuses on the highly successful Point-of-Sale (POS) hack, prevalent in many variations. Organized gangs and some led by notable individuals, such as Albert Gonzalez (who was convicted in 2010 and is serving a 20 year sentence), have used sophisticated orchestrations of small changes and detectable breach activity to steal vast amounts of credit card and personal data over long periods of time.

“Backoff” Point-of-Sale (POS) malware techniques have been found across a number of recent investigations, and Friday, August 22, 2014, US-CERT issued an updated Alert TA14-212A with the stated purpose “…to provide relevant and actionable technical indicators for network defense against the POS malware dubbed ‘Backoff,’ which has been discovered exploiting businesses’ administrator accounts remotely and exfiltrating consumer payment data.”


<< BACKOFF IMPACT >>
According to the Secret Service, Backoff malware has affected an additional 1,000 businesses, hit by the same type of cyberattack that stole the personal information of millions of Target customers last year. “There are a lot of retailers out there that have been compromised by this and they simply don’t know it yet,” said Tripwire security researcher Ken Westin.

Westin added that many businesses simply don’t have the tools in place to monitor for these types of attacks. Furthermore, it’s clear that nearly any retailer conducting business with credit card transactions could be a target for Backoff malware, including hospitals, universities, hotels, restaurants, government organizations, etc.


<< WHAT IS IT? >>
Backoff is a recent discovery, but upon forensic investigation has been seen as early as October 2013. It’s a family of malware that scrapes memory of POS devices and has been seen across three separate forensic investigations. It continues to be seen in operation and in various versions.

Researchers have identified three specific variants of Backoff: v1.4, 1.55 (multiple flavors of this one), and 1.56. Across the capabilities of all the variations, it has been seen to have the capacity to install itself, get its own software updates, can inject malicious code into the explorer.exe process (thereby making it persistent and able to access other processes), exfiltrate data and delete itself.


<< STEP 1 – INFILTRATION >>
First of all, and especially important, cybercriminals frequently do not have access to the POS device directly in their initial infiltration activity. This is typical of so many attacks on critical assets – they infiltrate often through phishing emails with a malware payload and then make their way to the customer data environment (CDE).

In the case of Backoff, recent investigations showed that the primary attack vector used was through a variety of remote desktop applications to brute force the login feature. Applications included Microsoft Remote Desktop, Apple Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway and LogMEIn Join.Me. Once a valid set of credentials are in hand, the attacker just looks like an insider.

These factors make a case for installing an agent and monitoring all systems, including desktops, not just critical assets. Further, Westin advises segmenting POS systems away from more sensitive portions of their infrastructure and installing monitoring software that can detect and notify them of any changes made to their systems. He adds that organizations must make sure customer credit card information is always encrypted.


<< STEP 2 – TRAVERSING THE INFRASTRUCTURE >>
Following a successful payload, there are indicators to look for all along the path as the Backoff malware executes and the attacker makes way to the goal of POS systems. What they’re searching for is customer data environment (CDE) – any people, processes and/or technology that store, process or transmit cardholder data (CHD) or sensitive authentication data (SAD). Once inside the CDE, malware can be executed to steal card data from the POS systems.
“WEAK, STOLEN, OR MISUSED CREDENTIALS – THE ATTACKER’S CHOICE NEARLY 80% OF THE TIME.”– 2013 VERIZON DBIR
The most effective and least sophisticated method of traversing the network is through valid user credentials – essentially becoming an “insider threat.” Methods used include keylogging, password hash extraction, cracking, replaying login sequences, or even brute force can ultimately help an attacker reach administrative level credentials, domain controllers which would give them powerful access to all the computers in the network.


<< WHAT TO SEARCH FOR >>
Seeking out any desktop or other system using one of the remote desktop login applications would be a smart start, since that’s the prime attack vector for Backoff. Assure that password hygiene in your organization is hardened, making credentials more difficult to compromise. Setting monitoring software to look for specifics typical of Backoff malware is also a good idea, both for the initial investigation and for future possible attack.

Here’s a list of specific files and system changes that can be indicators of compromise (IOCs) when attackers are using Backoff malware. Checking for these can be added to network security systems like Tripwire Enterprise to search for whether these are already in place.

Even if these IOCs are not found on initial investigation, it would be prudent to have continuous monitoring with real-time alerting on these changes if credit card information is being processed. These and other IOCs are available directly from the US-CERT Alert TA14-212A:
BACKOFF  V1.4Packed MD5: 927AE15DBF549BD60EDCDEAFB49B829E
Unpacked MD5: 6A0E49C5E332DF3AF78823CA4A655AE8
Install Path: %APPDATA%\AdobeFlashPlayer\mswinsvc.exe
Mutexes:
uhYtntr56uisGst
uyhnJmkuTgD
Files Written:
%APPDATA%\mskrnl
%APPDATA%\winserv.exe
%APPDATA%\AdobeFlashPlayer\mswinsvc.exe
Static String (POST Request): zXqW9JdWLM4urgjRkX
Registry Keys:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier
HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service
User-Agent: Mozilla/4.0
URI(s): /aircanada/dark.php


<< SUMMARY >>
Improvements in credit card security technologies and infrastructure (EMV chips or Point-to-Point encryption); the continuous security configuration monitoring required of the current Payment Card Industry Data Security Standard (PCI DSS) version 3.0; and stronger corporate internal security, infrastructure and maintenance are all needed to combat this cyber threat and others like it.

Payment systems expert Slava Gomzin discusses different components of payment systems, terms and protocols in his new book, “Hacking Point of Sale: Payment Application Secrets, Threats & Solutions,” in a way that is easily understandable by business leaders and technical audiences alike. A free chapter is available here, covering overall payment system architecture, vulnerabilities and threats in retail payment systems.


Reference:
BACKOFF POS MALWARE: ARE YOU INFECTED AND DON’T KNOW IT?
http://www.tripwire.com/state-of-security/incident-detection/backoff-pos-malware-are-you-infected-and-dont-know-it/

Monday, 1 September 2014

Microsoft: Migrate Your Windows Profile Easily with User Profile Wizard 3.7

User Profile Wizard 3.7 is the latest version of ForensiT's powerful workstation migration tool. User Profile Wizard will migrate your current user profile to your new domain account so that you can keep all your existing data and settings. The Personal Edition of User Profile Wizard is free to download!

Go to http://www.forensit.com/Downloads/Profwiz3.zip and download User Profile Wizard 3.7 Personal Edition for Windows XP/Vista/Windows 7 and Windows 8.

Go to http://www.forensit.com/Downloads/User%20Profile%20Wizard%203.7%20User%20Guide.pdf and download User Profile Wizard User Guide.


Reference:
Forensit
http://www.forensit.com/downloads.html

Thursday, 28 August 2014

Apple: Black Box Around Icon on The iPhone


<< Problem >>
There are strange black selection box whenever you try to use the touchscreen. You have to double tap anything and you can't scroll. It has made the iPhone unusable.

<< Solution >>
Tapping the home button three times, that will usually turn it off.


Reference:
Can't select apps, strange boxes around icons
http://forums.macrumors.com/showthread.php?t=1124383

Monday, 25 August 2014

Microsoft: Export Information of Distribution List Members from Microsoft Exchange

The Powershell script below allows you to export the information of the distribution list members from Microsoft Exchange:
$saveto = "C:\\listmembers.txt"
Get-DistributionGroup | sort name | ForEach-Object {
"`r`n$($_.Name)`r`n=============" | Add-Content $saveto
Get-DistributionGroupMember $_ | sort Name | ForEach-Object {
If($_.RecipientType -eq "UserMailbox")
{
$_.Name + " (" + $_.PrimarySMTPAddress + ")" | Add-Content $saveto
}
}
}

Reference:
Export Distribution List Members
http://community.spiceworks.com/scripts/show/1388-export-distribution-list-members

Wednesday, 20 August 2014

VMware: Amount of Free Space Reported on The Host is Incorrect in vCenter Server

<< Symptoms >>

  • In a VMware vSphere 4.1 Update 1 or newer environment, the Datastores view and the Summary tab in vCenter Server report an incorrect amount of free space on the host. 
  • In a direct vSphere Client connection to an ESXi/ESX host, the values may be reported correctly if you manually refresh.
  • Even after a manual refresh, the values may eventually be shown incorrectly.

<< Cause >>
The design of the vCenter Server environment in vSphere 4.1 Update 1 and later may show freespace of datastores in various resource windows which are out of sync from the actual value on the host for a period of five minutes. The vpxa agent on each host schedules a thread to monitor the free space on the datastore every five minutes; if the change in value is greater than 100 MB, it re-syncs this value on the vCenter Server.

<< Resolution >>
This is a known issue. This behavior is by design.

To work around this issue, use one of these methods:

Refresh the data using a PowerCLI Script
Execute a PowerCLI script which invokes the Get-Datastore -Refresh command on an hourly schedule to the host.

This is an example of running this command from the PowerCLI command line:

C:\Program Files\VMware\Infrastructure\vSphere PowerCLI> Get-Datastore -Refresh

Name         FreeSpaceMB    CapacityMB
----         -----------    ----------
isos         138986         554355
datastore1   2438           236544
MSCS-share   3298           3584
LH-iSCSI-0   15660          102144
LH-iSCSI-1   16612          50944

Change the refresh interval
To change the refresh interval, edit the configuration file and change the refreshInterval value to the desired interval.

To change the refreshInterval value:
1.  Using a text editor, open the /etc/vmware/hostd/config.xml file on the host.
2.  Locate the <datastore> element. This element in the default file is similar to:
<datastore>
   <!-- default datastore inventory-->
   <!-- <inventory>/etc/vmware/hostd/datastores.xml</inventory> -->
   <!-- default datastore refresh interval in minutes -->
   <!-- use 0 to disable the auto refresh -->
   <!-- <refreshInterval>0</refreshInterval> -->
   <!-- default datastore list refetch interval, after getting a VMFS event, in seconds-->
   <!-- <refetchVMFSDatastoreListInterval>30</refetchVMFSDatastoreListInterval> -->
</datastore>

3.  Remove the comment indicators and replace the 0 (zero) in the <refreshInterval> element with the desired number of minutes. For example, to set the refresh interval to one hour, change this line:
<!-- <refreshInterval>0</refreshInterval> -->
to:
<refreshInterval>60</refreshInterval>

4.  Save and close the file.
5.  Restart the host for the changes to take effect.


Reference:
Amount of free space reported on the host is incorrect in vCenter Server (2008367)
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2008367

Monday, 14 July 2014

Microsoft: Change Local Administrator Password of Windows or Windows Server

These two methods allow you to change the local administrator password of Windows or Windows Server:

<< Method 1 >>
  1. Log on to the computer using the Administrator account.
  2. Click Start, click Control Panel, and then double-click User Accounts.
  3. In User Accounts, in Make changes to your user account, click Change your password.
  4. In Change your password, in Current Password, type your password.
  5. In New password, type a new password.
  6. In Confirm new password, retype the password.
  7. In Type a password hint, type a word or phrase that will remind you of your password or, optionally, leave this field blank.
  8. Click Change password.

<< Method 2 >>
  1. Log on to the computer using the Administrator account.
  2. Click Start, right-click Administrative Tools, and then click Open. Administrative Tools opens.
  3. Double-click Computer Management, click Local Users and Groups, and in the details pane, double-click Users. The Users folder opens.
  4. In the details pane, right-click the account that you want to change, and click Set Password. A warning dialog box opens. Read the information to determine whether you want to proceed with the step to change the password.
  5. In New Password, type a password. In Confirm password, retype the password, and then click OK.


Reference:
Change the Administrator Password
http://technet.microsoft.com/en-us/library/cc754651(v=ws.10).aspx