Logo 1 (1)

Accelerate digital transformation with 5G security testing

5G networks are currently deployed across the globe by telecom operators and private enterprises. The 5G network is more complex than the previous generation of networks. With its Enhanced Mobile Broadband (eMBB), Ultra Reliable Low Latency Communications (uRLLC) and Massive IOT capabilities, 5G supports new use cases such as virtual reality, tele surgery, autonomous transport, industry automation and connecting billions of devices.

5G networks are currently deployed across the globe by telecom operators and private enterprises. The 5G network is more complex than the previous generation of networks. With its Enhanced Mobile Broadband (eMBB), Ultra Reliable Low Latency Communications (URLLC), and Massive IoT capabilities, 5G supports new use cases such as virtual reality, telesurgery, autonomous transport, industrial automation, and connecting billions of devices.

5G rollout also comes with numerous security concerns. Virtualization of network functions may lead to vulnerabilities such as denial of service. Software Defined Networks (SDN) are prone to attacks such as control plane threats, forwarding device attacks, API vulnerabilities, fake traffic flows, etc. 5G network attacks may even begin with exploiting the vulnerabilities in previous-generation networks. 5G core uses service-based architecture utilizing microservices deployed in cloud infrastructure. Microservices and the APIs connecting them also can open doors for attacks.

5G security is sufficiently addressed with new security frameworks such as SASE (Secure Access Secure Edge) or Zero Trust Security for the known vulnerabilities. However, with the wide variety of new 5G devices and millions of IoT devices introduced in the market with considerably fewer security features, the attack surface and vulnerabilities are also expanding.

Understanding the business impact of security breaches, simulating security threats, and planning mitigation approaches are vital for successful 5G network operations. The essential first step would be to build a comprehensive threat model to assess the network and applications’ risks and recognize the consequences of not addressing the risks. After formulating a threat model, the next important step in securing a 5G network would be to perform 5G penetration testing. Developing a comprehensive 5G security strategy is integral to the 5G deployment and validation. It must include security analysis and extensive cybersecurity testing across the supply chain, including all layers (i.e., hardware, operating system, applications, APIs, protocols), ensuring baseline security of 5G infrastructure.

Security & Vulnerability Assessment involves scanning 5G network components, devices, and applications.

5G cybersecurity assessment involves

  • Assessment of systems for compliance with regulations and standards
  • Gap analysis to unveil security holes
  • Assessment of insider and external threat
  • Assessment of active defenses and systems hardening
  • Cybersecurity patching

Information Assurance Testing involves the assessment of an organization’s security policies and procedures for operating the 5G network. It is performed using industry best practices and frameworks.
Penetration Testing is focused on the non-radio parts of the network, such as IP, network, and physical security, and tests the resilience of the 5G network security. It involves hacking, testing, and identifying vulnerabilities in networks and applications to secure them from unauthorized access.

Security Compliance Testing involves security evaluation against relevant security standards such as 3GPP Security Assurance Specifications.

Automated Network Testing involves identifying common security issues such as unpatched software, unencrypted links, poor network addressing, etc. This testing is performed using automated network security tools on the 5G network.

Public Key Security Testing involves validating Public Key Infrastructure (PKI) that uses cryptographic public keys linked to a digital certificate to authenticate devices or users. PKI certificates play a vital role in establishing and securing IoT devices, providing a high level of control and enabling large-scale device authentication, integrity, and reliable encryption.

5G security spans applications, network functions, transport layers, and cloud environments. Hence a holistic approach to testing is key to addressing security challenges and requirements. However, many network operators need help to build CI/CD pipelines and automated test suites to conduct comprehensive security testing, requiring 3rd party specialist testing service providers. Tsaro labs is a specialist security testing service provider with domain experts in cybersecurity and telecom network and applications.

Cyber security for drone industries

The Unmanned Aerial Vehicles (UAV) or drones industry has become a vast worldwide technological sensation. The extensive use of drones and UAVs has made UAS very popular for the public and the private sector, like the Agricultural industry, Armed Forces, law enforcement, meteorological agencies, medical services, environmental companies, oil refineries, windmill manufacturers, farm owners, and many more. In the next decade, drones may become a norm in day-to-day life, just as cell phones are a norm today, which they were not only a few years ago. Cybercriminals are already aware of this and always searching for new ways to use drone technology to extract sensitive information and create chaos.

Since drones are remotely controlled, their chances of being hijacked by bad actors are considerable. Major cyber domain threats caused by drone activity are Downlink intercept, GPS spoofing, data exploitation, and many more. Therefore, organizations must also be conscious of the risks and take necessary measures to secure this valuable technology.

How can we mitigate the prevailing threats?

1. Understand The Security Risks To Your Business With A Managed Vulnerability Assessment every six months.

Organizations must identify, quantify and address the security vulnerabilities within their company’s infrastructure, including on-premise and cloud networks.

Securing your platform as you would do with any network device. Some valuable tips are-

  • Update the drone’s firmware and apply a manufacturer’s ppatch.
  • Use strong passwords for the base station application.
  • Use updated anti-virus software for your drone controller device.
  • Subscribe to a VPN service to encrypt your connection.
  • Limit the number of devices that can connect to the base station.
  • Use the “Return to Home” (RTH) mode to ensure drone recovery from a hijack situation.

Counter Drones
Countermeasures should focus primarily on space protection. It is important to be able to detect drones efficiently. Thermal cameras, RF scanners, high-frequency radars, acoustic sensors, and sophisticated machine learning and AI algorithms are used for this purpose. However, drones’ small size and low speed make their detection difficult within a highly cluttered environment.
Other techniques involve geofencing software, which creates a virtual border around an area, prohibiting unauthorized drone flight.

Workforce Training
Workforce training on cyber security is essential to help you better understand, detect, respond and monitor security risks across your business.

Enterprise Resource Planning (ERP) software
Integrating ERP solutions to provide enhanced visibility, integration, agility, and response. It also includes technology that helps maintain and sustain UAVs and other defense assets.

Demystifying Uber Hack! Never Underestimate Social Engineering Skills of Attacker!

Clearly, this is what happens even if bug bounty platforms cannot prevent attacks by not paying ample amount of $$ to personal (TA) for their work!

As its, developing information, found out that the person behind this attack is of 18 years old (remember there is no age limit for threat actors/hackers) & ultimately, he doesn’t even know what exactly to do with the data that he had accessed to. Still, he found a way in, that is why it makes us feel vulnerable.

According to The New York Times, the threat actor responsible for the Uber hack claims to have gained access simply by sending a text to an Uber employee pretending to be from the company’s corporate IT team and compromised the employee’s account he used the employee’s existing VPN access to pivot to the intranet network and talking about internal network infrastructure they are often less configured and less protected and less audited compared to external infrastructure, that leaves many doors open.

TA appears to have made themselves known to Uber’s employees by posting a message on the company’s internal Slack system. “I announce I am a hacker and Uber has suffered a data breach,” screenshots of the message circulating on Twitter read. The claimed hacker then listed confidential company information they said they’d accessed and posted a hashtag saying that Uber underpays its drivers. Once the attacker compromised an employee, they appear to have used that victim’s existing VPN access to pivot to the internal network. the attacker appears to have found an internal network share that contained scripts with privileged credentials, giving them the keys to the kingdom. They claim to have compromised Uber’s Duo, OneLogin, AWS, and GSuite environments.

The threat actor also breached the Uber Slack server, which he used to post messages to employees stating that the company was hacked. However, screenshots from Uber’s slack indicate that these announcements were first met with memes and jokes as employees had not realized an actual cyberattack was taking place.

The attacker shared several screenshots of Uber’s internal environment, including their GDrive, VCenter, sales metrics, Slack, and even their EDR portal.

Uber’s AWS environment appears to be compromised as well. This screenshot of their IAM portal appears to show that the attacker has administrative access. If true, cloud access could not only include Uber’s websites, but other critical internal services as well.

The fact that the attackers appear to have compromised an IR team member’s account is worrisome. EDRs can bake in “backdoors” for IR, such as allowing IR teams to “shell into” employee machines (if enabled), potentially widening the attacker’s access.

Previous incidents:

  1. Uber hacked by teenager demanding higher pay for drivers.
  2. Lapsus$ Cyberattacks Traced to Teenager in England.
  3. Teen who hacked Bill Gates Twitter account sentenced.
  4. Teenage hackers breached T-Mobile, grabbed 30k repos.
  5. Scots ‘hacker’ could be extradited to America after manhunt.

Lessons Learnt:

  • Organizations should start using Phishing resistant MFA.
  • Awareness, and regular phishing tests of employees.
  • Centralizing authentication like SSOs can be a single point of entry for any attackers.

So, how do you prevent social engineering ?

You don’t. Stop trying. This is the basic principle of security… it’s a every day process.

You assume it will happen and put in technical safeguards to prevent or minimize impact, here is how:

  • Using phishing resistant MFA (FIDO, passkeys, etc.)
  • Do not save your credentials as plain text.
  • Investing in automation.
  • Ensuring least privilege.
  • Designing with an assumption of breach: How do we detect, contain, …? (Threat model).
  • Education is a key to minimizing possible attack surface’s against Social Engineering.
  • MFA providers should by default automatically lock accounts out temporarily when too many prompts are sent in a short period of time.

List of social engineering types of attacks

  • Phishing
  • Smishing
  • Vishing
  • Spam
  • Spam over instant messaging (SPIM)
  • Spear phishing
  • Dumpster diving
  • Shoulder surfing
  • Pharming
  • Tailgating
  • Eliciting information
  • Whaling

Understanding The Human Element of Cyber Risk

Cyber programs often miss the significant risk generated by employees, and current tools are blunt instruments. A new method can yield better results.

Insider threat via a company’s employees (contractors and vendors) is one of cybersecurity’s most prominent unsolved issues. Almost 50 percent of breaches were reported in a recent study. Companies are undoubtedly aware of the problem but rarely dedicate the resources or executive attention required to solve it. In addition, most prevention programs fall short either by focusing exclusively on monitoring behavior or failing to consider cultural and privacy norms.

How fraudsters use vulnerable insiders

If a fraudster’s target is in a secured network, its focus is to achieve the privilege of an employee’s access. Fraudster Uses tactics and techniques to achieve desired credentials: phishing emails, watering holes, and weaponized malware, to name a few.

With those credentials, fraudsters can move laterally within a system, escalate their privileges, make changes, and access sensitive data or money. Fraudsters can access data or information from unsecured locations during outbound communication using a command-and-control (C2) server. They can make outbound attempt changes or perform volume outbound transfers.

How fraudsters attack:

Seek vulnerability

  • Deploy phishing emails or malware
  • Identify a rogue user
  • Attain compromised credentials

Exploit access

  • Move laterally to the desired target
  • Escalate privilege as needed
  • Access assets

Abuse Access

  • Obfuscate network activity
  • Alter data
  • Exfiltrate data

How to mitigate insider threats

here are different technical and non-technical controls that organizations can adopt to improve the detection and prevention of each insider threat type.
Each type of insider threat presents different symptoms for security teams to diagnose. But by understanding the attackers’ motivations, security teams can proactively approach insider threat
defense. To mitigate insider threats, successful organizations use comprehensive approaches.

They might use security software that:

  • Maps accessible data
  • Establishes trust mechanisms—granting access, revoking access, and implementing

Multi-factor authentication (MFA)

  • Defines policies around devices and data storage
  • Monitors potential threats and risky behavior
  • Takes action when needed

Know your users

  • Who has access to sensitive data?
  • Who should have access?
  • What are end-users doing with data?
  • What are administrators doing with data?

Know your data

  • What data is sensitive?
  • Is sensitive information being exposed?
  • What risk is associated with sensitive data?
  • Can admins control privileged user access to sensitive data

Mobile is the New Attractive Avenue for the SCAMMERS

Nearly 84 percent of the world’s population now own a smartphone, and our dependence on them is growing all the time. It becomes an unimaginable task to spend a second without your mobile.

What you may or might not know about these devices is that it is surfacing as one of the fastest-growing attack spaces along with all the intelligent benefits.

As per the global report commissioned by private company Zimperium, more than one-fifth of mobile devices have encountered malware. And four in ten mobiles worldwide are vulnerable to cyber-attacks.

Remember! It just takes One Device to Gain Access to Your Company’s Network.

Businesses may not realize that mobile security may be their weakest link. A cybercriminal must only break into one unprotected mobile device (mobile phone, laptop, or tablet) in a company to access the whole network. This type of intrusion can be crippling to an SMB, costing the company revenue, disrupting its operations, endangering its critically essential data assets, and ruining customer relationships.

What makes mobile devices a great deal of attraction for cybercriminals?

You carry mobile phones wherever you go, exposing them to more networks daily. Not to mention that mobile phones contain a great deal of personal information and give various access to cyber criminals.

Cybercriminals can get your bank details, email, social media accounts, text messages, and other sensitive information by assessing your phone. It is like using one device where cybercriminals can access your personal information.

But how will you keep your mobile phones safe from such cyber-attacks?

By now, you would have known why mobiles are prone to cyber-attacks; therefore, what can you think of doing to ensure that your mobile phones are secure?

 

Bring more security to your devices by following some essential yet very crucial tips

1. Stay alert for suspicious URL

If you get an email for clicking on a URL to win a prize/ free holiday trip, don’t click! These can lead to cybercrime and may release viruses on your mobile devices.

2. Do check the software you install on the device

You would have noticed that almost all application requires access to your mobile phone’s – photos, contacts, and camera. Don’t click to avoid big trouble until they are from a safer application provider.

3. Do avoid using the accessible WiFi networks

When you connect your device to the free public WiFi network, check with the staff what the network’s official name is and how secure it is. Cyber attackers can introduce fake WiFi access that would look similar to the original word. For instance, “sh0pping mall” instead of “shopping mall”. Such artificial WiFi networks can ask you to provide sensitive information and then, later, sell it on the dark web.

4. Use an anti-malware solution

To manage devices and ensure premier-level security, we recommend installing an anti-malware application for your mobile device. Such devices can give a triggered alarm when it finds something suspicious and wipes off the chances of getting attacked.

 

Final Verdict

While choosing the right cybersecurity solutions for businesses, make sure you look for answers:

Perimeter Protection

It is a method of threat management that allows you to create a firewall that protects the company networks, systems, and data from external threats – malware, viruses, and many more

Private Network Access

For secure access to specific company apps and data that would need it without opening the entire network

Mobile Device Protection

With cloud-based security solutions, it allows company employees to stay protected irrespective of how or where they access your internet.

Monitoring and Remediation

It uses artificial intelligence (AI) to search PCs, tablets proactively, and servers for threat, quickly detecting issues & providing remediation

IoT & The rise of Botnet Attacks

Before reading this article, take a minute to look for all the devices you own! In our day-to-day life, we use various electronic devices to make our life comfortable and intelligent but do we require as many devices-?

Just for “convenience” & “lazy,” we are leveraging cyber attackers to use our widgets to track down a system (DDoS attacks) and become a part of that crime ring without our intentions or acknowledgment.

The Internet of Things (IoT) elaborates the network of physical objects—”things”—embedded with software, sensors, and other technologies to c and interchange data with other devices and systems over the Internet. There’s a comprehensive range of ‘things’ that fall under the IoT umbrella:

  • Internet-connected innovative’ versions of traditional appliances such as refrigerators and light bulbs.
  • Gadgets like Alexa-style digital assistants could only exist in an internet-enabled world.
  • Internet-enabled sensors transform healthcare, factories distribution centers, and Transportation.

The IoT helps in information handling, web availability, and investigation of actual items. IoT can efficiently assemble cycles and conveyance frameworks in significant business settings that the web has long conveyed to information work. Billions of implanted web-empowered sensors give an unquestionably rich arrangement of information that organizations can use to work on the well-being of their tasks, track resources, and decrease manual cycles.

It can utilize machine information to foresee whether gear will separate, giving makers preemptive guidance to forestall extended lengths of personal time. Scientists can likewise use IoT gadgets to accumulate information about client inclinations and conduct. However, that can have severe ramifications for protection and security.

So, how big is IoT?

More than 50 billion IoT gadgets in 2020, creating 4.4 zettabytes of information. (A zettabyte is a trillion gigabytes.) In 2013, IoT gadgets delivered a simple 100 billion gigabytes. The IoT market also makes stunning cash; it gauges around $1.6 trillion to $14.4 trillion by 2025.

In the Global IoT Forecast, IoT analytics Research predicts 27 billion dynamic IoT connections by the year 25′.

IoT applications

Business-prepared and SaaS IoT Applications

IoT Intelligent Applications with prebuilt software-as-a-Service (SaaS) applications can investigate and deliver IoT sensor information to business clients through dashboards.

AI algorithms are used by IoT applications to examine gigantic measures of associated sensor information in the cloud. By availing of continuous IoT dashboards and alarms, you gain perceivability into crucial execution pointers, measurements for meantime among disappointments, and other data. AI-based calculations can distinguish gear inconsistencies, send cautions to clients, and trigger mechanized fixes or proactive countermeasures. With cloud-based IoT applications, business clients can rapidly improve existing cycles for supply chains, client support, HR, and monetary administrations. 

Some other applications are in: 

  • Manufacturing Industry – Product Monitoring
  • Tracking of Physical Assets
  • Human wearables – health monitoring
  • Geo-tagging & environmental conditions etc.

IoT security and vulnerabilities

IoT gadgets have procured a terrible standing concerning security. Laptops and cell phones are common computers intended to keep going for quite a long time, with complex, easy-to-understand OSes that presently have robotized fixing and security highlights. 

IoT gadgets are essential devices along with stripped-down OSes. They are intended for individual assignments and negligible human association and can’t be fixed, observed, or refreshed. Since numerous IoT gadgets are at last running a rendition of Linux in the engine with different organization ports accessible, they make enticing focuses for programmers.

The Mirai botnet, made by a young person telnetting into home surveillance cameras and child screens that had easy-to-figure default passwords, wound up sending off one of history’s most significant DDoS assaults.

Coming to Bots/Boatneck Attack:

A bot is a software program that executes an automated task and is usually repetitive. Bots make up 38% of all internet traffic, with bad bots generating one in five website requests. Bad bots perform malicious tasks that allow an attacker to take control of an affected computer remotely. Once infected, these machines may also be referred to as zombies. These days, bad bots are big business, with cybercriminals using them to access accounts, attack networks, and steal data fraudulently.  

Many types of malware infect end-user devices intending to enlist them into a botnet. Appliances that get infected start communicating with a Command and Control (C&C) center and can perform automated activities under the attacker’s central control. 

Botnet owners use them for large-scale malicious activity, commonly Distributed Denial of Service (DDoS) attacks. However, botnets can also be used for malicious bot activity, such as spam or social bots. 

Types of Bots: 

Both Legal and illegal malicious bots are present on the Internet, and below are some common examples of Bots,

Spider Bots

Spider bots are web spiders or crawlers that browse the web by following hyperlinks to retrieve and index web content. 

If you have numerous web pages, you can place a robots.txt file in the root of your web server and provide instructions to bots, specifying which parts of your site they can crawl and how frequently. 

Scraper Bots

Scrapers read the data from a website to save them offline and enable their reuse. This may take the form of scraping the entire content of web pages or web content to obtain specific data points, such as names and prices of products on eCommerce sites. 

Web scraping is a gray area -in some cases, scraping is legitimate and may be permitted by website owners. However, in other instances, bot operators may be violating website terms of use or leveraging scraping to steal sensitive or copyrighted content. 

Spam Bots

A spambot is an Internet application that manages to accumulate email addresses for spam mailing lists. A spam bot can collect emails from websites, social media websites, businesses, and organizations, leveraging the specific format of email addresses. 

After attackers have amassed an extensive list of email addresses, they can use them not only to send spam emails but also for other nefarious purposes: 

Credential cracking 

Pair emails with general passcodes to avail unauthorized account access.

Besides the damage to end-users and organizations affected by spam campaigns, spam bots can also choke server bandwidth and spike Internet Service Providers (ISPs) rates.

Social Media Bots

Social media these days is operated via such bots to generate messages automatically to gain followers and advocate ideas. For example, it is estimated that 9-15% of Twitter accounts are social bots. 

It can use social bots to infiltrate groups of people and used to propagate specific ideas. Since there is no rule against this activity, social bots play a significant role in online public opinion. 

Social bots can create fake accounts to amplify the bot operator’s message and generate fake followers/likes. Unfortunately, it isn’t easy to identify and mitigate social bots because they can exhibit very similar behavior to real users. 

Download Bots

Download bots are automated programs that can use to download software or mobile apps automatically. They are used to attack download sites, creating fake downloads as part of an application-layer Denial of Service (DoS) attack. 

Ticketing Bots

Ticketing Bots are our favorite ways to buy automated tickets for popular events and resell them for more money. Unfortunately, this method is illegal and annoys consumers, ticket sellers, and event organizers.

Ticketing bots tend to be very sophisticated, having the same human ticket-like behavior.

 

Bot Traffic detection

Below are some parameters to detect not traffic in web Analytics:

Traffic trends

An abnormal increase in traffic can sometimes signify bot activities and is particularly true if the traffic occurs during odd hours.\

Bounce rate

Abnormal highs or lows may signal a dangerous bot. 

For example, bots that appear on a particular page on the site and then switch IP will have a percent bounce.

Traffic sources

During a malicious attack, the primary channel giving traffic is “direct” traffic, and the traffic will consist of new users and sessions.

Server performance

a slowdown in server performance may signal bots.

Suspicious IPs/geo-locations

Spike in activity to an unknown IP range or region where you do not do business. Humans generally request a few pages and not others, whereas bots will often request all pages.

Language source

They see hits from other languages your customers do not typically use.

The above-discussed criteria only provide a rough idea of the bot activity. They require us to know that sophisticated malicious bots can generate a realistic, user-like signature in your web analytics. Therefore, it is advisable to use a dedicated bot management solution that provides a clear view of the Bot Traffic. 

Managing Bot Traffic: Basic Mitigation Measures

There are specific simple measures you can take to block at least some bots and reduce your exposure to bad bots:

  • Place robots.txt at the root of your website to define which bots can access your website.
  • Adding CAPTCHA on comment, sign-up, and download forms to prevent downloading spam bots.
  • We can get a bot alert using JavaScript notification as it can act as a buzzer whenever sees a bot entering a website.

 

Get a Consultation

Discover the many ways to enhance your organization security posture with TSARO Labs
Select service*