HTTPS standards still not standard across Industries

News and sports websites have some of the lowest levels of security adoption, a study has suggested.

A team of cyber-security experts looked at the security protocols used by the top 500 sites in various industries and online sectors.

They found that fewer than 10% of news and sports websites used basic security protocols such as HTTPS and TLS.

Even those that do are not always using the “latest or strongest protocols”, one of the study’s authors said.

“As time goes by, all encryption gets weaker because people find ways around it,” Prof Alan Woodward, a cyber-security expert at the University of Surrey, told the BBC.

“We tested the University of Surrey’s website using a site called Security Headersa couple of weeks ago and it got an A,” he explained, “but it’s only a C now.”

Shopping and gaming

The research, published in the Journal of Cyber Security Technology, shows that some sectors seem much more security-conscious than others.

The websites of computer and technology companies and financial organisations showed a much higher level of adoption than shopping and gaming sites, for example.

“In the financial sector, almost every one of the sites we looked at had encrypted links”, Prof Woodward said, “but even in retail the adoption of the very latest standards is low.”

A quarter of the shopping sites studied were using Transport Layer Security (TLS), which offers tools including digital certificates, remote passwords, and a choice of ciphers to encrypt traffic between a website and its visitors.

But among news and sport websites fewer than 8% were found to be using the protocol.

Among those that did, many failed to make use of some of the strongest tools available, such as HSTS, which automatically pushes users accessing an unsecured version of a website on to the encrypted version instead.

‘Click on the padlock’

“It’s like news and sport content providers don’t value the security of their content,” Prof Woodward said.

“They’re leaving themselves vulnerable to attacks like cross-site scripting, where an attacker can pretend something’s come from a website when it hasn’t.”

But Prof Woodward warned against putting too much faith in sites that appear to have the most up-to-date and comprehensive security protocols in place.

“People assume that because they’re using TLS they’re having a secure conversation, but there’s no guarantee about who they’re having that secure conversation with,” he explained.

“Some of those spoof sites are using more up-to-date security than the genuine sites. You’ve got to click on that padlock and check who it is you’re talking to.”

With PALSS we take HTTPS security very seriously and ensure that wherever possible we insist on the highest level of encryption while maintaining cross-platform compatibility. Contact us for more details or sign up for one of our plans and start protecting your traffic with Free SSL Encryption.

 

Amazon Web Services Hit By Outage

Several high-profile websites and services have been knocked offline by a failure at one of Amazon’s major US data centres.

Amazon Web Services (AWS) allows firms to rent cloud servers in order to host data on the internet without needing to invest in their own infrastructure.

On Tuesday, sites such as Quora, a Q&A forum, Trello, Slack, Splitwise, Soundcloud and Medium were among the popular internet services the were impacted.

Amazon said it is “working hard at repairing” the problem.

“We believe we understand root cause,” the company said.

Other services, including Slack, have also lost some key functionality.

Specifically, it was AWS’s S3 – which stands for Simple Storage Service – that was affected, in US-EAST-1.

To varying degrees it serves around 150,000 sites and services around the world, mostly in the US.

AWS is used by some of the web’s most recognisable and powerful names including Netflix, Spotify and Airbnb. While none of those services went offline on Tuesday, users did report performance issues and slowdown.

US government services such as the Securities and Exchange Commission (SEC) were also affected.

Downtime is a critical issue for any cloud service. Amazon competes with Google, Microsoft and others for what is an increasingly lucrative line of business for the web giants.

To help mitigate this PALSS can either load balance your traffic between provider and when an outage like this occurs, bypass the failed servers. Or simply provide a landing page to direct your clients to alternative methods to contact you.

And you can avoid

In this case, yes it is!

 

** UPDATED 03/02/2017 **

So it appears a single mistyped command from an operator was responsible

“The Amazon Simple Storage Service (S3) team was debugging an issue causing the S3 billing system to progress more slowly than expected. At 9:37AM PST, an authorized S3 team member using an established playbook executed a command which was intended to remove a small number of servers for one of the S3 subsystems that is used by the S3 billing process,” the team wrote in its message.

“Unfortunately, one of the inputs to the command was entered incorrectly and a larger set of servers was removed than intended. The servers that were inadvertently removed supported two other S3 subsystems.”

Cloudflare Bug

THE INTERNET INFRASTRUCTURE company Cloudflare, which provides a variety of performance and security services to millions of websites, revealed late Thursday that a bug had caused it to randomly leak potentially sensitive customer data across the internet.

The flaw was first uncovered by Google vulnerability researcher Tavis Ormandy on February 17, but could have been leaking data since as long ago as September 22. In certain conditions, Cloudflare’s platform inserted random data from any of its six million customers—including big names like Fitbit, Uber, and OKCupid—onto the website of a smaller subset of customers. In practice, it meant that a snippet of information about an Uber ride you took, or even your Uber password, could have ended up hidden away in the code of another site.

For the most part, the exposed data wasn’t posted on well-known or high-traffic sites, and even if it had been it wasn’t easily visible. But some of the leaked data included sensitive cookies, login credentials, API keys, and other important authentication tokens, including some of Cloudflare’s own internal cryptography keys. And as Cloudflare’s service spewed random information, that data was being recorded in caches by search engines like Google and Bing and other systems.

“Because Cloudflare operates a large, shared infrastructure, an HTTP request to a Cloudflare web site that was vulnerable to this problem could reveal information about an unrelated other Cloudflare site,” Cloudflare CTO John Graham-Cumming explained in a blog post on Thursday. The leak did not expose the transport layer security keys used in HTTPS encryption, but it does seem to have potentially compromised data protected in HTTPS connections. And while Graham-Cumming added that there’s no indication in Cloudflare’s logs or elsewhere that bad actors had taken advantage of the flaw, looking for leaked data that hasn’t yet been scrubbed has become something of an internet-wide scavenger hunt.

The good news is that Cloudflare acted quickly to address the bug. It pushed a preliminary fix less than an hour after learning about the issue, and permanently patched the flaw across all its systems around the world in under seven hours. But while the company has worked with Google and other search engines to scrub caches and rein in the exposed data—so that people can’t just run searches to find and collect sensitive information from the leak—the fallout remains.

As always with all breaches if you feel this may have impacted you, changing passwords etc is a recommendation. For further security, always enable One-Time-Password function if available.

WordPress Rest-API Vulnerability

At the end of January, WordPress 4.7.2 was released to fix four security issues, three of which were disclosed at the time of the release. These included a SQL injection vulnerability in WP_Query, a cross-site scripting (XSS) vulnerability in the posts list table, and the Press This feature allowing users without permission to assign taxonomy terms. The fourth and most critical issue, an unauthenticated privilege escalation vulnerability in a REST API endpoint, was fixed silently and disclosed a week after the release.

Contributors on the release opted to delay disclosure in order to mitigate the potential for mass exploitation, given that any site running 4.7 or 4.7.1 is at risk. This allowed time for users to update manually and for automatic updates to roll out.

“We believe transparency is in the public’s best interest,” WordPress Core Security Team Lead Aaron Campbell said. “It is our stance that security issues should always be disclosed. In this case, we intentionally delayed disclosing this issue by one week to ensure the safety of millions of additional WordPress sites.”

WordPress worked with Sucuri, the company that discovered the issue, along with other WAF vendors and hosting companies to add protections before the vulnerability was publicly disclosed.

The vulnerability has been public for less than a week and is now being actively exploited. Thousands of WordPress sites have been defaced with messages like “Hacked by NG689Skw” or “Hacked by w4l3XzY3” or similar. Googling for information about these particular hacks returns thousands of other hacked sites in the results.

Sucuri founder and CTO Daniel Cid said his team saw exploits in the wild less than 24 hours after the disclosure. The attacks are primarily simple defacements so far.

“There are some good bad guys updating the post excerpt with the message: ‘Update WordPress or you will be hacked,’ which is kind weird,” Cid said. “But overall we’re seeing just simple defacement attempts, using modified versions of the exploit that was shared publicly.”

 

The best course of action is always to stay upto date with the latest security fixes and patches from WordPress, Plugins, and Theme developers, however this is not always possible, at these times PALSS adds an additional layer of security to your website.

Contact us now to find out more

To find out more from Sucuri who found the original issue see this article.

SSL becoming the standard

Google Chrome to Shame HTTP sites in favour of HTTPS

From January 2017 Google Chrome will begin attaching warnings to all HTTP websites that ask for passwords or credit card details. This means any website without a security certificate will feature a red ‘Not Secure’ message in the web address toolbar.

 

The decision is part of a ‘long term plan’ hatched by Google ‘to mark all HTTP sites as non-secure’ and was confirmed the search giant on its Security blog. Secure websites will display a comforting green padlock in front of the web address.

What will happen to your HTTP site?

The impact will be purely cosmetic at first but Google has confirmed that site rankings will be better for HTTPS sites.

 

Your site’s functionality will not be affected but your visitors may not enjoy seeing the red warning flag over time. This is open to debate as NASA argues “users become blind to warnings that occur too frequently”.

Getting a Security Certificate

For a long time the only websites that deemed security certificates important were banks and businesses taking payments. But over time more websites jumped on the bandwagon, with more than 50% of websites accessed through Chrome now belonging to the HTTPS camp.

 

Getting a security certificate doesn’t completely guarantee security and does cost money – which is a potential hurdle for new and small businesses. But validation will become more of a necessity over time.

What about other browsers?

Firefox has also confirmed its intent to phase out non-secure HTTP, affirming ‘there’s pretty broad agreement that HTTPS is the way forward for the web.’ Mozilla is even going as far as ‘removing capabilities from the non-secure web.’

Transitioning from HTTP to HTTPS

Turning your HTTP site into a HTTPS one is very much like a site migration. 301 redirects will need to be set up so search engines can find your new address and users navigating to your old HTTP URLs are automatically transferred to your new HTTPs URLs.

 

The basic transition process is:

* Purchase and install an SSL certificate

* Install your SSL certificate on your hosting platform

* Amend website links from HTTP to HTTPs and deploy redirects

 

It may sound easy but the number of SSL packages and hosting solutions on the market quickly complicates things and the tech involved is more advanced than most businesses are open to.

 

PALSS can also offer LetsEncrypt service, free SSL certificates for life, this allows your business to present a fully secure site without the hassle, of course some links etc may need amending to avoid mixed content warnings, but we can help point you in the right direction for this.

Simple contact us to and we can talk through the options

Glastonbury site goes offline during ticket sales

From ITV 

During the sales of Glastonbury tickets, the website got overloaded due to the number of people trying to purchase tickets, leaving people staring at

 

 

Instead of

 

Luckily there is only one Glastonbury, so apart from the bad news, there likely won’t be any long term damage to the brand or sales.

However, if you are in a competitive market where your clients are one search away from your competitors then you can’t afford any downtime.

This is where PALSS can help, even if you only have a single server, we can host a landing page for you for when your server does have a little blip, which lets face it they all do from time to time. With that landing page you can provide contact details for your phone contact, or email. Reassuring your clients that you are always there for them.

Get in touch and we can help taking the first steps to maximizing your availability.

DDOS the new extortion

Originally posted Memeburn

It is a testament to the sustained evolution of the cybersecurity landscape that we are still regularly seeing the emergence of new threats. Distributed denial of service (DDoS) attacks and ransomware are both well-established methods of cyber-attack, but we have recently seen a new tactic that combines elements of both: DDoS extortion attacks.

From what we’ve seen of the attacks so far, there is an almost professional approach to the whole process; initially, an email will arrive at the target explaining who the attackers are and even linking to some recent blogs written about them and their extortion tactics.

The email goes on to state that unless a fee is paid (usually around 40 Bitcoin but demands can go into the hundreds), a large-scale DDoS attack will be launched. Alternatively, some emails will only arrive after the attack has started, stating that the attack will only be stopped if the ransom is paid, or the severity will be reduced if a portion of the fee is paid.

We’ve monitored some attacks that start slowly and increase in scale – DD4BC, the company behind the extortion, claims it can launch attacks up to 400-500 Gbps. Such attacks are very rarely that strong, but they are known to last up to 18 hours, however, which is definitely enough time to seriously impact a business.

At this point, it seems that no particular industry is being targeted specifically, but there is one general theme. The targets we’ve seen so far have been those that rely on online transactions to operate, such as financial institutions and currency exchanges.

One endgame to this that we’ve seen is that the extortion element could actually be a diversion tactic, meaning the customer concentrates on the sheer volumetric high-end type of attacks, when the offenders are actually targeting a local application with a different attack vector. This means that hackers could be conducting local application level attacks involving any form of penetration into the application itself. So often the target isn’t actually to bring down or disrupt a website or service but to gain access to an application in order to steal information, whether it’s credentials, financial information, personal data or something else.

It’s understandable that some targets may think the email is junk and ignore it, but that’s not necessarily the best course of action. Of course, that doesn’t mean that paying the ransom is advisable either. That leaves targets with the option of mitigating the attack, despite the emails specifically stating that attempting to mitigate the DDoS attack is pointless. Whilst the protagonists may claim that the attack is too big for even the best technology to cope with, that’s just not true.

Mitigation is possible through a combination of on-premises and cloud-based anti-DDoS technologies. A hybrid approach allows a company to mitigate DDoS attacks that are launched from outside the infrastructure and also cope with local-level attacks targeting the application layer.

A DDoS attack up to 500 Gbps in size can only be stopped with cloud-based technologies. The local network and application level attacks (which will happen if the DDoS is a diversion tactic) has to be stopped with on-premises technologies. So one or the other won’t do; a hybrid approach is the key to protecting your business from the ever-expanding arsenal of the cyber-criminal.

Welcome to the world of PALSS

After 10 years of building high availability web applications for clients, we kept hitting issues with how to connect clients to them, yes if you use the same platform in the same datacenter there are many options. Also, if you want to pay a high premium price there are option, but all these options make you work their way or pay for the service.

No single solution out there offered the total package, then about 4 years ago we were asked to supply a solution to a client that could offer multi server, multi data center loadbalancing and acceleration. Again, we went back to the market, and nothing jumped out at us, so, we built one ourselves, welcome to PALSS.

After running this for the last few years for a few private clients, we have decided to make the offering available to anyone who needs our services.  We’ve built the system to be resilient at every level and use different providers in different locations, across the entire globe to make sure our service will always be there to deliver the best service transparently for your clients and your business.

So please contact us and we can run thought our offerings, and lets see where it takes us, Say goodbye to downtime and site not found pages, and welcome to the world of PALSS