Openssh has released a few days ago version 9.0 (here the announcement) which features the “hybrid Streamline NTRU Prime + x25519 key exchange method by default.” In other words, the key exchange is performed by the standard X25519 ECDH key exchange algorithm (the previous default) paired with the NTRU Prime, a Post Quantum Crypto algorithm “believed to resist attacks enabled by future quantum computers.” If one of the two algorithms fails to protect the confidentiality of the encryption key, the other should continue to protect it, even if a quantum computer will be able to successfully attack X25519 ECDH alone.
Category Archives: Security
Is “Post Quantum Crypto” Going Mainstream?
We do not know if or when Quantum Computers will arrive: 10 years “at best” for Quantum Computing, “at worst” for Cryptography.
Today Post Quantum Cryptography (PQC) aims to provide algorithms resistant to Quantum Computers but it is still in an development phase (see eg. NIST for details).
Concerning information security and Quantum Computer, today we should worry about at least two issues:
- how long it will take to perform the transition to Post Quantum Crypto algorithms;
- how to protect information encrypted today with standard algorithms but that should still be protected in 10 or more years.
For the second point, one possibility is to adopt already today the emerging PQC algorithms and “double encrypt” sensitive long-term data with a current algorithm and PQC-devel algorithm, with the hope that if one of the two fails the other will keep protecting the data. And based on this IBM announcement (see also here), this seems to be starting right now.
Defeating MFA with MFA Prompt Bombing
And the the weak link is … the human factor.
Not surprisingly, recent reports (see eg. here) describe how attackers abuse even MFA processes based on Authenticator Apps (on mobile phones). Of course it requires anyway some work, in a generic scenario it requires to know already the username and password of the account or service under attack and protected by MFA. But after that, bombing the user with second factor authentication requests on the mobile App (in the middle of the night) sometimes leads to receive access (by someone who actually would like to sleep).
This should not be possible with FIDO2 token or biometrics based MFA, but the “human factor” is often very little predictable…
CISA “List” of Free Cybersecurity Services and Tools
The American Cybersecurity & Infrastructure Security Agency (CISA) has published here a list, more precisely a “living repository”, of free Cybersecurity services and tools. It is worth a reading (both the list and the “Foundational Measures”), and to keep it in the bookmarks/favorites’ list.
Managing Security “in the Clouds”
The number of Cloud security management platform solution categories (according to Gartner) continues to grow. As far as I know, this is the current list:
- Cloud Access Security Broker (CASB)
- Cloud Workload Protection Platform (CWPP),
- Cloud Security Posture Management (CSPM),
- Cloud Infrastructure Entitlement Management (CIEM),
- Cloud-Native Application Protection Platform (CNAPP)
(For details on what they are, look for example here.) And the list is growing… This means on one side that the market for Cloud security management solutions is growing rapidly, on the other side that Cloud security is really an issue and that we haven’t really yet found a good way to manage it.
Fixing Cryptography is not Always Easy
The latest version of the Zloader banking malware is (also) exploiting a Microsoft Signature Verification bug (CVE-2013-3900) for which the bugfix exists since 2013 (see for example here for more details). In this case the security issue is not due to users not updating their systems with the mandatory security patches but to the fact that the patch is optional and should be installed manually.
The problem is that the stricter signature verification implemented by the Microsoft Authenticode patch which fixes this bug, has an extremely high risk of false positives in many situations, for example some installers can be identified as having an invalid signature. So Microsoft decided to let the user decide if the patch would create more problems than solving some.
The Zloader malware uses this “bug” to be able to run some modified (and then unsigned) libraries. But this requires that the malware is already on the system, so applying this patch does not prevent a system from being infested by this malware.
The issue that, again, this event points out, is how difficult it is to balance strict security, in particular if cryptography is involved, and usability / availability of systems and services.
CISA Catalogue of Known and Exploited Vulnerabilities
The Cybersecurity & Infrastructure Security Agency (CISA) has recently published the “Binding Operational Directive 22-01” which has the purpose of identifying the known and exploited vulnerabilities and address their resolution so to reduce the associated risks.
In other words, CISA has identified the most risky and exploited vulnerabilities creating a catalogue (here) which can be used by everybody to identify the vulnerabilities which must be patched first. Indeed running a vulnerability scanner (or performing a penetration test) too often produces an extremely long list of vulnerabilities, classified by severity typically according to the CVSS-v3 standard: but which ones are really important / risky / even scary? A catalogue of vulnerabilities actually exploited by attackers can help to select the ones which really matter and that should be patched as-soon-as-possible.
Again Social Engineering and Fraud
Interesting article by Brian Krebs (here) about a social engineering fraud which obviously uses “human as the weakest link” but also some aspects of “using security to defeat security” itself.
In very few words, the scammer calls by phone the victim and asks the victim to prove to be the rightful owner of her/his bank account by providing the username and a code that she/he will receive as a 2nd factor authentication code. What the scammer is actually doing with the username and the 2FA code is to reset the password of the victim’s bank account and then to transfer some money out of the bank account.
What goes wrong here is, first, that the victim should identify the caller, not viceversa, and that the victim should never divulge to a person a 2FA code. Thus by abusing the human weakest link and a “secure” reset password process, the scammer manages to perform the fraud.
On the technical side, one should be very careful on evaluating security risks associated to a self-service reset password process, including social engineering attacks like this one.
On AI/ML Failures
Interesting article on “7 Revealing Ways AIs Fail”
NSA FAQs on Quantum Computing and Post-Quantum Cryptography
Interesting reading: here the NSA “Quantum FAQs”.