April 28, 2015
General Keith B. Alexander, who retired as NSA Director in 2014, has become the founder and CEO of a new startup, Ironnet. During his RSA session this year, he talked about how to heal the wounds to the tech community and what gift he’d send Snowden if he were given the opportunity. For the tech community, he recommended classified briefings to get technology companies the facts. For Snowden, he said he would send him the oath, which was met with loud applause from the audience. Take a look at the FCW article here.
2. Breaches are happening, even during RSA
On the 2nd day of RSA, a major hotel chain notified their 18 million members via email that their accounts had been reset out of an abundance of caution. According to us at Shape, it seems possible, even likely, that account checkers had been used to hijack 200 accounts at the hotel chain. Take a look at the Shape blog post on account checkers.
3. Taking security up one level - to the Board
Everyone seemed to like and agree with what was said at the presentation, “A CISO's Perspective on Talking to the Board about Cybersecurity”. See what WSJ wrote about it here.
4. Password management is hard
Shape’s own Zhiwei Li spoke about password managers, exposing several vulnerabilities (now plugged) and discussing which manager would be the best manager in various cases. Take a look at his presentation slides.
5. Botnets are alive and well despite takedowns
Botnets are alive and well, despite takedowns. The federal agencies behind the takeover of a major Zeus botnet (12 governments, 13 companies, 4 non-profits and 3 USG federal agencies) said the criminal enterprises have learned and adapted to build more sophisticated and evasive botnets. Check out the list of agencies involved on the RSA session summary page.
It was a great show for Shape Security. If you go to a lot of conferences, like we do, then we'll be seeing you at Blackhat in Vegas, and again at RSA in San Francisco in 2016.
April 9, 2015
The Emperor’s New Password Manager: Security Analysis of Password Managers
Friday, April 24, 2015
9:00 AM – 9:50 AM
Session abstract: We conducted a security analysis of popular web-based password managers. Unlike local password managers, web-based password managers run in browsers. We identify four key security concerns and representative vulnerabilities. Our attacks are severe: in four out of the five password managers we studied, attackers can learn credentials for arbitrary websites. This work is a wake-up call for developers.
Speaker: Zhiwei Li, Research Scientist @ Shape
RSA 2015 is around the corner. Will you be attending? Come meet with Shape Security and learn more about our technology. We have a booth, are hosting a private meeting suite at the St. Regis hotel, and offering free expo passes to everyone with our discount code. Read more details below.
February 25, 2015
Use of stolen credentials is the biggest web threat, says the most recent Verizon Data Breach Report.
Learn more about this threat below.
February 19, 2015
But how much does it cost to actually execute this powerful attack?
Learn about how an adversary can hijack one million accounts for less than a fast food meal.
February 18, 2015
Read more about the rise of credential stuffing below.
February 2, 2015
Tweets like the one below are becoming more and more common. This frustrated consumer lost $100 from a gift card account he had with his favorite retailer. Besides the direct financial loss in replacing these stolen funds, the retailer also incurred call center costs and brand damage (this tweet represents just one of many related to hijacked accounts).
As web security moves from an IT problem to a C-Level and board problem, CISOs should create a strategy for protecting their customers and their enterprise from account hijackers. Below we provide 3 easy checks that companies can use to secure their customer credentials.
January 26, 2015
Avivah Litan, Gartner Research VP and Distinguished Analyst, highlights Shape Security her latest blog post.
To read more about her analysis on solutions for automated attacks, read below.
January 21, 2015
Today we introduce and explain an attack tool that is becoming more prevalent among our customers: the Account Checker.
This credential stuffing tool isn't new, but usage is rising sharply for reasons we'll discuss below. Although very conceptually simple and easy-to-use, account checkers are extremely powerful.