Everyday thousands of otherwise sensitive information is being exchange over email or stored on disk not even realising that someone could intercept it on transit or while on rest, causing devastating consequences. Securing sensitive data in either state is imperative as attackers find increasingly sophisticated tools and techniques to compromise systems and gain access. While different tools and techniques are available that can be used to protect data in either state, encryption plays a vital role in maintaining data confidentiality. Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is...
Securing SSH
SSH is a software package that enables system administrators to securely administer their systems from a remote network with user authentication, commands, output, and file transfers being encrypted to protect against attacks in the network. While it is much more secure than common login services such as telnet, ftp, rlogin, rsh, and rcp, its default installation isn’t hardened. This advisory covers some of the hardening measures you can take to secure ssh. For details Securing SSH...
The memcached Reflection/Amplification DDoS Attack
Description Memcache is temporary data storage service used to improve the overall performance of the website by storing chunks of data in a cache. If misconfigured memcached on port 11211 UDP & TCP is used to cause reflection DOS attack (send a spoofed packet to a device and have it reflected back). Memcached allows access to the data stored in the cache without any form of authentication and the attacker can easily access data in the corresponding caches and even modify them. How to Fix: Bind the Memcache server to a particular Source IP Only. Don’t expose this service in...
Safer Internet Day 2018
Tuesday 6th of February 2018 is globally marked as Safer Internet Day 2018 with the theme: ” Create, Connect and Share Respect: A better Internet starts with you“ . Every individual internet user has a role to play in making the internet a safer space. BtCIRT encourages everyone to review following advisories at BtCIRT website and remember simple steps you as an individual cyber citizen can take to secure internet world. Protecting-Privacy-on-the-internet Browser Security Protection from Phishing Mobile Security We also recommend you to visit childnet-safer-internet-day and https://www.saferinternet.org.uk/safer-internet-day/2018 to gain insight on how to be safer online....
Money Muling
Money Mules are people who consciously or innocently serve as intermediaries to move stolen/illegal money using their bank account(s) on behalf of criminals/fraudsters. While we have known of only rare cases in Bhutan, lots of these are happening around the globe. How does it happen: The criminal will get in touch with the victim via email, instant messaging apps, job website, blogs or even phone calls. They will convince the victim into providing their bank account details with either an attractive job , commissions or by seeking sympathy. The Fraudsters will transfer an amount into the victims account. Then...