Enable MFA: 1.2 million Azure Active Directory (Office 365) accounts compromised every month, reckons Microsoft

Microsoft reckons 0.5 per cent of Azure Active Directory accounts as used by Office 365 are compromised every month.

The Window giant’s director of identity security, Alex Weinert, and IT identity and access program manager Lee Walker revealed the figures at the RSA conference last month in San Francisco.

“About a half of a per cent of the enterprise accounts on our system will be compromised every month, which is a really high number. If you have an organisation of 10,000 users, 50 will be compromised each month,” said Weinert.

It is an astonishing and disturbing figure. Account compromise means that a malicious actor or script has some access to internal resources, though the degree of compromise is not stated. The goal could be as simple as sending out spam or, more seriously, stealing secrets and trying to escalate access.

Password spray attacks account for 40% of compromised accounts

Password spray attacks account for 40% of compromised accounts

How do these attacks happen? About 40 per cent are what Microsoft calls password spray attacks. Attackers use a database of usernames and try logging in with statistically probable passwords, such as “123” or “p@ssw0rd”. Most fail but some succeed. A further 40 per cent are password replay attacks, where attackers mine data breaches on the assumption that many people reuse passwords and enterprise passwords in non-enterprise environments. That leaves 20 per cent for other kinds of attacks like phishing.

The key point, though, is that if an account is compromised, said Weinert, “there’s a 99.9 per cent chance that it did not have MFA [Multi Factor Authentication]”. MFA is where at least one additional identifier is required when logging in, such as a code on an authenticator application or a text message to a mobile phone. It is also possible (and preferable) to use FIDO2 security keys, a feature now in preview for Azure AD. Even just disabling legacy authentication helps, with a 67 per cent reduction in the likelihood of compromise.

Source: Enable that MF-ing MFA: 1.2 million Azure Active Directory accounts compromised every month, reckons Microsoft • The Register

Unfixable vulnerability in Intel CSME allows crypto key stealing and local access to files

An error in chipset read-only memory (ROM) could allow attackers to compromise platform encryption keys and steal sensitive information.

Intel has thanked Positive Technologies experts for their discovery of a vulnerability in Intel CSME. Most Intel chipsets released in the last five years contain the vulnerability in question.

By exploiting vulnerability CVE-2019-0090, a local attacker could extract the chipset key stored on the PCH microchip and obtain access to data encrypted with the key. Worse still, it is impossible to detect such a key breach. With the chipset key, attackers can decrypt data stored on a target computer and even forge its Enhanced Privacy ID (EPID) attestation, or in other words, pass off an attacker computer as the victim’s computer. EPID is used in DRM, financial transactions, and attestation of IoT devices.

One of the researchers, Mark Ermolov, Lead Specialist of OS and Hardware Security at Positive Technologies, explained: “The vulnerability resembles an error recently identified in the BootROM of Apple mobile platforms, but affects only Intel systems. Both vulnerabilities allow extracting users’ encrypted data. Here, attackers can obtain the key in many different ways. For example, they can extract it from a lost or stolen laptop in order to decrypt confidential data. Unscrupulous suppliers, contractors, or even employees with physical access to the computer can get hold of the key. In some cases, attackers can intercept the key remotely, provided they have gained local access to a target PC as part of a multistage attack, or if the manufacturer allows remote firmware updates of internal devices, such as Intel Integrated Sensor Hub.”

The vulnerability potentially allows compromising common data protection technologies that rely on hardware keys for encryption, such as DRM, firmware TPM, and Intel Identity Protection. For example, attackers can exploit the vulnerability on their own computers to bypass content DRM and make illegal copies. In ROM, this vulnerability also allows for arbitrary code execution at the zero level of privilege of Intel CSME. No firmware updates can fix the vulnerability.

Intel recommends that users of Intel CSME, Intel SPS, Intel TXE, Intel DAL, and Intel AMT contact their device or motherboard manufacturer for microchip or BIOS updates to address the vulnerability. Check the Intel website for the latest recommendations on mitigation of vulnerability CVE-2019-0090.

Since it is impossible to fully fix the vulnerability by modifying the chipset ROM, Positive Technologies experts recommend disabling Intel CSME based encryption of data storage devices or considering migration to tenth-generation or later Intel CPUs. In this context, retrospective detection of infrastructure compromise with the help of traffic analysis systems such as PT Network Attack Discovery becomes just as important.

Source: Positive Technologies: Unfixable vulnerability in Intel chipsets threatens users and content rightsholders

Apple pays piffling $500m to settle their performance decreases in old devices

Apple – which banked $55bn profit in its 2019 fiscal year – is willing to pay up to $500m to settle US claims that the company secretly slowed certain iPhone models to preserve battery life, according to a proposed class action settlement.

That’s about 18x more than the i-thing maker agreed to pay a month ago to settle a related legal claim in France.

On December 20, 2017, Apple revealed that it had implemented performance management code in iOS 10.2.1 and iOS 11.2 to prevent sudden shutdowns that could occur when age-diminished batteries failed to meet the requirements of apps demanding peak power from iPhone processors.

Source: Apple checks under the couch for $500m in spare change, offers it to make power-throttling gripes disappear • The Register

Hydro-Quebec To Commercialize Glass Battery Co-Developed By John Goodenough

A rapid-charging and non-flammable battery developed in part by 2019 Nobel Prize winner John Goodenough has been licensed for development by the Canadian electric utility Hydro-Quebec. The utility says it hopes to have the technology ready for one or more commercial partners in two years. Hydro-Quebec, according to Karim Zaghib, general director of the utility’s Center of Excellence in Transportation Electrification and Energy Storage, has been commercializing patents with Goodenough’s parent institution, the University of Texas at Austin, for the past 25 years.

As Spectrum reported in 2017, Goodenough and Maria Helena Braga, professor of engineering at the University of Porto in Portugal, developed a solid-state lithium rechargeable that used a glass doped with alkali metals as the battery’s electrolyte. (The electrolyte is the material between cathode and anode and is often a liquid in today’s batteries, which typically means it’s also flammable and potentially vulnerable to battery fires.) Braga said her and Goodenough’s battery is high capacity, charges in “minutes rather than hours,” performs well in both hot and cold weather, and that its solid-state electrolyte is not flammable. Hydro-Quebec’s Gen 3 battery “can be glass or ceramic, but it is not a [lithium] polymer,” Zaghib said of the Goodenough/Braga battery’s electrolyte. “So with Daimler (which is also working with Hydro-Quebec to develop a second-gen lithium solid-state battery), it’s an organic compound, and with John Goodenough, it’s an inorganic compound. The inorganic compound has higher ionic conductivity compared to the polymer.”

“That means the ions shuttle back and forth more readily between cathode and anode, which could potentially improve a battery’s capacity, charging speed, or other performance metrics,” adds IEEE Spectrum.

We interviewed John B. Goodenough soon after his solid-state battery was announced. You can read his responses to your questions here.

Source: Hydro-Quebec To Commercialize Glass Battery Co-Developed By John Goodenough – Slashdot

Browser Tool Erases People From Live Webcam Feeds in Real Time

Jason Mayes apparently likes to do things the hard way: He’s developed an AI-powered tool for browsers that can erase people from live webcam feeds in real-time but leave everything else in the shot.

Mayes is a Google web engineer who developed his Disappearing-People tool using Javascript and TensorFlow, which is Google’s free, open source software library that allows the terrifying potential of artificial intelligence and deep learning to be applied to less terrifying applications. In this case, the neural network works to determine what the static background imagery of a video is in order to develop a clean plate—a version without any humans moving around in the frame—without necessarily requiring the feed to be free of people to start with.

The neural network used in this instance is trained to recognize people, and using that knowledge it can not only generate a clean image of a webcam feed’s background, but it can then actively erase people as they walk into frame and move around, in real-time, while allowing live footage of everything else happening in the background to remain.

Mayes has created test versions of the tool that you can access and try yourself in a browser through his personal GitHub repository. The results aren’t 100 percent perfect just yet (you can still see quite a few artifacts popping up here and there in the sample video he shared where he walks into frame), but as the neural network powering this tool continues to improve, so will the results.

Source: Browser Tool Erases People From Live Webcam Feeds in Real Time

EU Commission to staff: Switch to Signal messaging app

The European Commission has told its staff to start using Signal, an end-to-end-encrypted messaging app, in a push to increase the security of its communications.

The instruction appeared on internal messaging boards in early February, notifying employees that “Signal has been selected as the recommended application for public instant messaging.”

The app is favored by privacy activists because of its end-to-end encryption and open-source technology.

“It’s like Facebook’s WhatsApp and Apple’s iMessage but it’s based on an encryption protocol that’s very innovative,” said Bart Preneel, cryptography expert at the University of Leuven. “Because it’s open-source, you can check what’s happening under the hood,” he added.

[…]

Privacy experts consider that Signal’s security is superior to other apps’. “We can’t read your messages or see your calls,” its website reads, “and no one else can either.”

[…]

The use of Signal was mainly recommended for communications between staff and people outside the institution. The move to use the application shows that the Commission is working on improving its security policies.

Promoting the app, however, could antagonize the law enforcement community.

Officials in Brussels, Washington and other capitals have been putting strong pressure on Facebook and Apple to allow government agencies to access to encrypted messages; if these agencies refuse, legal requirements could be introduced that force firms to do just that.

American, British and Australian officials have published an open letter to Facebook CEO Mark Zuckerberg in October, asking that he call off plans to encrypt the company’s messaging service. Dutch Minister for Justice and Security Ferd Grappehaus told POLITICO last April that the EU needs to look into legislation allowing governments to access encrypted data.

Cybersecurity officials have dismissed calls to weaken encryption for decades, arguing that it would put the confidentiality of communications at risk across the board.

Source: EU Commission to staff: Switch to Signal messaging app – POLITICO

Finally, an organisation showing some sense!

Scientists Find The First-Ever Animal That Doesn’t Need Oxygen to Survive

Scientists have just discovered that a jellyfish-like parasite doesn’t have a mitochondrial genome – the first multicellular organism known to have this absence. That means it doesn’t breathe; in fact, it lives its life completely free of oxygen dependency.

This discovery isn’t just changing our understanding of how life can work here on Earth – it could also have implications for the search for extraterrestrial life.

[…]

Exactly how it survives is still something of a mystery. It could be leeching adenosine triphosphate from its host, but that’s yet to be determined.

[…]

The research has been published in PNAS.

Source: Scientists Find The First-Ever Animal That Doesn’t Need Oxygen to Survive

After blowing $100m to snoop on Americans’ phone call logs for four years, what did the NSA get? Just one lead

The controversial surveillance program that gave the NSA access to the phone call records of millions of Americans has cost US taxpayers $100m – and resulted in just one useful lead over four years.

That’s the upshot of a report [PDF] from the US government’s freshly revived Privacy and Civil Liberties Oversight Board (PCLOB). The panel dug into the super-snoops’ so-called Section 215 program, which is due to be renewed next month.

Those findings reflect concerns expressed by lawmakers back in November when at a Congressional hearing, the NSA was unable to give a single example of how the spy program had been useful in the fight against terrorism. At the time, Senator Dianne Feinstein (D-CA) stated bluntly: “If you can’t give us any indication of specific value, there is no reason for us to reauthorize it.”

That value appears to have been, in total, 15 intelligence reports at an overall cost of $100m between 2015 and 2019. Of the 15 reports that mentioned what the PCLOB now calls the “call detail records (CDR) program,” just two of them provided “unique information.” In other words, for the other 13 reports, use of the program reinforced what Uncle Sam’s g-men already knew. In 2018 alone, the government collected more than 434 million records covering 19 million different phone numbers.

What of those two reports? According to the PCLOB overview: “Based on one report, FBI vetted an individual, but, after vetting, determined that no further action was warranted. The second report provided unique information about a telephone number, previously known to US authorities, which led to the opening of a foreign intelligence investigation.”

Source: After blowing $100m to snoop on Americans’ phone call logs for four years, what did the NSA get? Just one lead • The Register

Wi-Fi of more than a billion PCs, phones, gadgets can be snooped on. But you’re using HTTPS, SSH, VPNs… right?

A billion-plus computers, phones, and other devices are said to suffer a chip-level security vulnerability that can be exploited by nearby miscreants to snoop on victims’ encrypted Wi-Fi traffic.

The flaw [PDF] was branded KrØØk by the bods at Euro infosec outfit ESET who discovered it. The design blunder is otherwise known as CVE-2019-15126, and is related to 2017’s KRACK technique for spying on Wi-Fi networks.

An eavesdropper doesn’t have to be logged into the target device’s wireless network to exploit KrØØk. If successful, the miscreant can take repeated snapshots of the device’s wireless traffic as if it were on an open and insecure Wi-Fi. These snapshots may contain things like URLs of requested websites, personal information in transit, and so on.

It’s not something to be totally freaking out over: someone exploiting this has to be physically near you, and you may notice your Wi-Fi being disrupted. But it’s worth knowing about.

Source: Wi-Fi of more than a billion PCs, phones, gadgets can be snooped on. But you’re using HTTPS, SSH, VPNs… right? • The Register

Dutch package post will raise prices during gift season and Black Friday

PostNL will raise prices during SinterKlaas, Christmas and Black Friday. They claim that the package post infrastructure is not sufficient to cope with this raise in demand at those periods and so someone – the webshops, the consumers – have to pay for this spike.

PostNL increased turnover with 32m to 471m in the last quarter, with a 10% increase in volume. Doesn’t this mean that the extra capacity should be paid for using regular pricing?

Source: Pakketten PostNL met Sint en kerst extra duur – Emerce

Facebook’s privacy tools are riddled with missing data

Facebook wants you to think it’s consistently increasing transparency about how the company stores and uses your data. But the company still isn’t revealing everything to its users, according to an investigation by Privacy International.

The obvious holes in Facebook’s privacy data exports paint a picture of a company that aims to placate users’ concerns without actually doing anything to change its practices.

Data lists are incomplete — The most pressing issue with Facebook’s downloadable privacy data is that it’s incomplete. Privacy International’s investigation tested the “Ads and Business” section on Facebook’s “Download Your Information” page, which purports to tell users which advertisers have been targeting them with ads.

The investigation found that the list of advertisers actually changes over time, seemingly at random. This essentially makes it impossible for users to develop a full understanding of which advertisers are using their data. In this sense, Facebook’s claims of transparency are inaccurate and misleading.

‘Off-Facebook’ data is misleading — Facebook’s most recent act of “transparency” is its “Off-Facebook Activity” tool, which allows users to “see and control the data that other apps and websites share with Facebook.” But the reports generated by this tool offer extremely limited detail. Some data is marked with a cryptic “CUSTOM” label, while even the best-labeled data gives no context surrounding the reason it’s included in the list.

Nothing to see here — Facebook’s supposed attempts at increased transparency do very little to actually help users understand what the company is doing with their personal data. These tools come off as nothing more than a ploy to take pressure off the company. Meanwhile, the company continues to quietly pay off massive lawsuits over actual user privacy issues.

Facebook doesn’t care about your privacy — it cares about making money. Users would do well to remember that.

Source: Report: Facebook’s privacy tools are riddled with missing data

Turkey’s Killer Drone Swarm Poses Syria Air Challenge to Putin

The retaliation for the killing last week of 33 Turkish soldiers by Syrian forces involved an unprecedented number of drones in coordinated action, said the senior official in Turkey with direct knowledge of President Recep Tayyip Erdogan’s Syria policy. It was the first time a country had commanded the air space over such a large area using drone swarms, according to the official.

The series of strikes since Thursday by dozens of the remotely-controlled aircraft targeted Syrian bases and chemical warfare depots, the Turkish military said. But Turkey also located and destroyed some Syrian missile-defense systems, raising questions about the effectiveness of the Russian-made equipment intended to deter such air attacks.

“That’s something only Israel had been recorded publicly to have done until now,” Charles Lister, director of the Extremism and Counterterrorism Program at the Middle East Institute, said on Twitter, in reference to video footage taken by a Turkish drone allegedly showing the destruction of a Syrian army air-defense system. Turkey was waging an “air campaign run entirely by armed drones backed up” by heavy rocket artillery, he said.

The tactic threatens to bring NATO member Turkey into direct confrontation with Russia, adding to strains in relations between Erdogan and Russian President Vladimir Putin as they prepare to meet this week in an effort to ease tensions over Syria. The two leaders have worked together to try to end the Syrian civil war, despite backing opposing sides, but have repeatedly stumbled over who should control the northwestern Syrian province of Idlib that borders Turkey.

[…]

Turkey deployed an array of electronic jammers in Syria before it launched the drone strikes as part of its “Spring Shield” campaign.

Ankara appeared eager to show off its aerial firepower. The Defense Ministry posted a series of videos on Twitter showing Syrian tanks and artillery being destroyed in apparent drone attacks.

Source: Turkey’s Killer Drone Swarm Poses Syria Air Challenge to Putin

US Gov wants to spy on all drones all the time: they must be constantly connected to the internet to give Feds real-time location data

Drone enthusiasts are up in arms over rules proposed by the US Federal Aviation Administration (FAA) that would require their flying gizmos to provide real-time location data to the government via an internet connection.

The requirement, for drones weighing 0.55lb (0.25kg) or more, would ground an estimated 80 per cent of gadgets in the United States, and many would never be able to fly again because they couldn’t be retrofitted with the necessary equipment, say drone owners. Those that did buy new drones would need to buy a monthly data plan for their flying machines: something that would likely cost $35 or more a month, given extortionate US mobile rates.

There are also additional costs of running what would need to be new location databases of drones, which the FAA expects will be run by private companies but doesn’t exist yet, which drones owners would have to pay for through subscriptions. The cost of all this is prohibitive, for little real benefit, they argue.

If a device loses internet connectivity while flying, and can’t send its real-time info, it must land. It may be possible to pair a drone control unit with, say, a smartphone or a gateway with fixed-lined internet connectivity, so that the drone can relay its data to the Feds via these nodes. However, that’s not much use if you’re out in the middle of nowhere, or if you wander into a wireless not-spot.

Nearly 35,000 public comments have been received by the FAA, with the comment period closing later today. The vast majority of the comments are critical and most make the same broad point: that the rules are too strict, too costly and are unnecessary.

The world’s largest drone maker, DJI, is among those fighting the rule change, unsurprisingly enough. The manufacturer argues that while it agrees that every drone should have its own unique ID, the FAA proposal is “complex, expensive and intrusive.”

It would also undermine the industry own remote ID solution that doesn’t require a real-time data connection but utilizes the same radio signals used to control drones to broadcast ID information. It also flags that the proposed solution has privacy implications: people would be able to track months of someone’s previous drone usage.

Source: Drones must be constantly connected to the internet to give Feds real-time location data – new US govt proposal • The Register

Project Svalbard, Have I Been Pwned will not be sold after all

This is going to be a lengthy blog post so let me use this opening paragraph as a summary of where Project Svalbard is at: Have I Been Pwned is no longer being sold and I will continue running it independently. After 11 months of a very intensive process culminating in many months of exclusivity with a party I believed would ultimately be the purchaser of the service, unexpected changes to their business model made the deal infeasible. It wasn’t something I could have seen coming nor was it anything to do with HIBP itself, but it introduced a range of new and insurmountable barriers. So that’s the tl;dr, let me now share as much as I can about what’s been happening since April 2019 and how the service will operate in the future.

Source: Troy Hunt: Project Svalbard, Have I Been Pwned and its Ongoing Independence

Watch Elon Musk’s Mars ferry prototype explode on the pad during liquid nitrogen test

The Starship SN1 prototype was undergoing pressure testing at the Musketeers’ factory at Boca Chica in Texas, USA, by filling its tanks with liquid nitrogen. The base of the rocket appears to have ruptured, sending the structure crashing to the ground, which you can see here:

SpaceX supremo Elon Musk himself seemed sanguine about the whole affair, taking to Twitter to say: “It’s fine, we’ll just buff it out. Where’s Flextape when you need it!?”

It’s entirely possible this was a scheduled test-to-destruction for the prototype which, when ready and in its final form, Elon wants to use for regular trips to Mars. Or it could be that someone was lax on their welding, leading to Friday’s explosion.

A second prototype, SN2, is already being built, Musk said, and will be stripped down to the bare minimum of hardware before being filled with water and then cryogenic fuel for pressure testing. Many more iterations are planned before Musk can fulfill his dream of using the Starship as a vehicle to set up a self-sustaining colony on Mars.

Source: Starship bloopers: Watch Elon Musk’s Mars ferry prototype explode on the pad during liquid nitrogen test • The Register

Chinese security firm says CIA hacked Chinese targets for the past 11 years

China’s largest cyber-security vendor has published today a report accusing the CIA of hacking Chinese companies and government agencies for more than 11 years.

The report, authored by Qihoo 360, claims the CIA hacked targets in China’s aviation industry, scientific research institutions, petroleum industry, Internet companies, and government agencies.

CIA hacking operations took place between September 2008 and June 2019, and most of the targets were located in Beijing, Guangdong, and Zhejiang, Qihoo researchers said.

cia-hacking.png
Image: Qihoo 360

Qihoo claims that a large part of the CIA’s hacking efforts focused on the civil aviation industry, both in China and in other countries.

The Chinese security firm claims the purpose of this campaign was “long-term and targeted intelligence-gathering” to track “real-time global flight status, passenger information, trade freight, and other related information.”

Report based on Vault 7 leaks

Qihoo says it linked the attacks to the CIA based on the malware used in the intrusions — namely Fluxwire [1, 2, 3] and Grasshopper [1, 2].

Both malware strains came to light in early 2017 when Wikileaks published the Vault 7 dump, a collection of documentation files detailing the CIA’s arsenal of cyber-weapons.

WikiLeaks claimed it received the files from a CIA insider and whistleblower, later identified as Joshua Schultz — currently under trial in the US.

Weeks after the WikiLeaks Vault 7 revelations, Symantec confirmed that Fluxwire was the Corentry malware that they had been tracking for years.

Source: Chinese security firm says CIA hacked Chinese targets for the past 11 years | ZDNet

This wearable device camouflages its wearer from thermal cameras no matter the weather

 

Researchers at the University of California San Diego developed a wearable technology that can hide its wearer from heat-detecting sensors such as night vision goggles, even when the ambient temperature changes–a feat that current state of the art technology cannot match. The technology can adapt to temperature changes in just a few minutes, while keeping the wearer comfortable.

The device, which is at the proof-of-concept stage, has a surface that quickly cools down or heats up to match ambient temperatures, camouflaging the wearer’s body heat. The surface can go from 10 to 38 degrees Celsius (50 to 100.5 degrees Fahrenheit) in less than a minute. Meanwhile, the inside remains at the same temperature as human skin, making it comfortable for the wearer. The wireless device can be embedded into fabric, such as an armband. A more advanced version could be worn as a jacket.

Source: This wearable device camouflages its wearer no matter the weather

Scientists Found Breathable Oxygen in Another Galaxy for the First Time

Astronomers have spotted molecular oxygen in a galaxy far far away, marking the first time that this important element has ever been detected outside of the Milky Way.

This momentous “first detection of extragalactic molecular oxygen,” as it is described in a recent study in The Astrophysical Journal, has big implications for understanding the crucial role of oxygen in the evolution of planets, stars, galaxies, and life.

Oxygen is the third most abundant element in the universe, after hydrogen and helium, and is one of the key ingredients for life here on Earth. Molecular oxygen is the most common free form of the element and consists of two oxygen atoms with the designation O2. It is the version of the gas that we humans, among many other organisms, need to breathe in order to live.

Yet despite its ubiquity and significance to habitability, scientists have struggled for decades to detect molecular oxygen in the wider cosmos.

Now, a team led by Junzhi Wang, an astronomer at the Shanghai Astronomical Observatory, reports the discovery of molecular oxygen in a dazzling galaxy called Markarian 231, located 581 million light years from the Milky Way.

The researchers were able to make this detection with ground-based radio observatories. “Deep observations” from the IRAM 30-meter telescope in Spain and the NOEMA interferometer in France revealed molecular oxygen emission “in an external galaxy for the first time,” Wang and his co-authors wrote.

Source: Scientists Found Breathable Oxygen in Another Galaxy for the First Time – VICE

Ring doorbells to change privacy settings after study showed it shared personal information with Facebook and Google

Ring, the Amazon-owned maker of smart-home doorbells and web-enabled security cameras, is changing its privacy settings two weeks after a study showed the company shares customers’ personal information with Facebook, Google and other parties without users’ consent.

The change will let Ring users block the company from sharing most, but not all, of their data. A company spokesperson said people will be able to opt out of those sharing agreements “where applicable.” The spokesperson declined to clarify what “where applicable” might mean.

Ring will announce and start rolling out the opt-out feature soon, the spokesperson told CBS MoneyWatch.

Source: Ring to change privacy settings after study showed it shared personal information with Facebook and Google – CBS News

Facebook Cuts Off Some Mobile tracking Ad Data With Advertising Partners, should have done this long long ago

Facebook is tightening its rules around the use of raw, device-level data used for measuring ad campaigns that Facebook shares with an elite group of advertising technology partners.

As first spotted by AdAge, the company recently tweaked the terms of service that apply to its “advanced mobile measurement partner” program, which advertisers tap into to track the performance of their ads on Facebook. Those mobile measurement partners (MMPs) were, until now, free to share the raw data they accessed from Facebook with advertisers. These metrics drilled down to the individual device level, which advertisers could then reportedly connect to any device IDs they might already have on tap.

Facebook reportedly began notifying affected partners on February 5 and all advertising partners must agree to the updated terms of the program before April 22, according to Tencent.

While Facebook didn’t deliver the device IDs themselves, passing granular insights like the way a given consumer shops or browses the web—and then giving an advertiser free rein to link that data to, well, just about anyone—smacks hard of something that could easily turn Cambridge Analytica-y if the wrong actors got their hands on the data. As AdAge put it:

The program had safeguards that bound advertisers to act responsibly, but there were always concerns that advertisers could misuse the data, according to people familiar with the program. Facebook says that it did not uncover any wrongdoing on the part of advertisers when it decided to update the measurement program. However, the program under its older configuration came with clear risks, according to marketing partners.

Source: Facebook Cuts Off Some Ad Data With Advertising Partners

Your banks’ APIs are a major target for credential stuffing attacks

Automating connections from 3rd party providers makes it easy to access your financial data because people re-use their logins and these logins have been repeatedly leaked online.

New data from security and content delivery company Akamai shows that one in every five attempts to gain unauthorized access to user accounts is now done through application programming interfaces (APIs) instead of user-facing login pages. This trend is even more pronounced in the financial services industry where the use of APIs is widespread and in part fueled by regulatory requirements.

According to a report released today, between December 2017 and November 2019, Akamai observed 85.4 billion credential abuse attacks against companies worldwide that use its services. Of those attacks, around 16.5 billion, or nearly 20%, targeted hostnames that were clearly identified as API endpoints. However, in the financial industry, the percentage of attacks that targeted APIs rose sharply between May and September 2019, at times reaching 75%.

“API usage and widespread adoption have enabled criminals to automate their attacks,” the company said in its report. “This is why the volume of credential stuffing incidents has continued to grow year over year, and why such attacks remain a steady and constant risk across all market segments.”

The credential stuffing problem

Credential stuffing, a type of brute-force attack where criminals use lists of leaked username and password combinations to gain access to accounts, has become a major problem in recent years. This is a consequence of the large number of data breaches over the past decade that have resulted in billions of stolen credentials being released publicly on the internet or sold on underground markets as commodities.

Knowing that users reuse passwords across various websites, attackers have used the credentials exposed in data breaches to build so-called combo lists. These lists of username and password combinations are then loaded into botnets or automated tools and are used to flood websites with login requests in an attempt to gain access.

However, once access is gained, extracting information from the affected services by crawling the customer pages requires some effort and customization, whereas requesting and extracting information through APIs is standardized and well suited for automation. After all, the very purpose of an API is to facilitate applications talking to each other and exchanging data automatically.

Source: APIs are becoming a major target for credential stuffing attacks