A Nasty Instagram Bug Is Causing Lots Of People To Think Their Accounts Were Deleted

A bug is making people think their Instagram accounts were deleted, and they are pretty steaming mad about it.

The Facebook owned-social app is being bombarded with complaints on Twitter, Facebook and its own service from people who claim their accounts have been deleted without warning or cause.

Instagram says the culprit is a bug that not only logged people out of their accounts, but also hid them from view. When BuzzFeed News checked multiple account pages that users claimed were deleted, it saw a message stating that the content was unavailable, noting that the link might be broken or the page could've been removed.

No accounts have been deleted,” a company spokesperson told BuzzFeed News. “However, the bug logged some users out of their accounts, while also locking their accounts from view. When the bug is fixed and affected users are able to log back in, their accounts will be viewable again.”

Comments on Instagram's latest post

Even so, users are freaked out. “Please give me back my account @harryspinkflowers i worked so hard on it and had it for 2 years…. please give it back,” read a typical response to Instagram's latest post. Others were less diplomatic. “Give me my fucking account back bro,” Twitter user @_SaucySierra_ wrote.

It's unclear how many accounts were affected by this faux purge. Instagram says it's a very small percentage, but the complaints serve as useful a reminder that ultimately, free social media accounts belong to the companies you register them with. And these companies can do pretty much whatever they want with them.

That's a big problem, especially for businesses and other Instagam users whose accounts have a material tie to the offline world. Chocolate company ChocZero's business is suffering without access to its 6,500 follower account, according to its marketing director Rhea Monique. “I'm supposed to talk to wholesale distributors today and our Instagram along with our proof of sales is a big way to pitch relevancy, ” she told BuzzFeed News. “So it's devastating this happened.”

Quelle: <a href="A Nasty Instagram Bug Is Causing Lots Of People To Think Their Accounts Were Deleted“>BuzzFeed

Announcing Azure Service Health preview

Personalized guidance and support when issues in Azure services affect you.

We are excited to announce the preview of Azure Service Health, your new personalized service health dashboard in the Azure portal. It provides guidance and support when issues in Azure services affect you. Azure Service Health also helps you prepare for upcoming changes and maintenance scheduled for your Azure resources.

Watch this short video and continue reading to walk through the new Azure Service Health experience.

It’s easy to get started. Simply select the Service Health tile to launch your new Service Health dashboard.

The service issues view shows any ongoing issues in Azure services that are impacting your resources. Quickly understand when the issue began, and what services and regions are impacted.

Get the most recent update to understand what Azure is doing to resolve the issue. Get a link for the issue to use in your problem management system. Also, download a PDF summary of the issue to share with people who don’t have access to the Azure portal.

Review the list of your resources that might be impacted by this issue in the potential impact tab. Use the export action to download the list and share with your team.

Focus on what’s important. Filter Service Health to your business-critical subscriptions, regions, and resource types. Save the filter and pin a personalized health world map to your portal dashboard.

Checkout the planned maintenance and health advisories views. Here you’ll find information about upcoming maintenance and recommended actions to prevent downtime.

In the health history view, you’ll find all past events that affected your resources.

Now that you’re well-versed with your new Service Health dashboard, let’s create a Service Health alert. The alert will notify you and your team the next time there is a Service Health event affecting you. Stay in-the-know with Azure Service Health alerts.

We care deeply about what you think of Azure Service Health. Giving feedback is easy! Simply select the feedback action in the bottom right and let us know how we can improve. We are listening.

Quelle: Azure

Tracking configuration changes for your Azure VM

In this blog post, I will talk about how to use the Change Tracking solution to detect in-guest changes on your Azure VMs. Right from within your Azure VM you can quickly assess details of changes that occurred across your system. We currently support tracking Software, Files, Windows Registry, Windows Services, and Linux Daemons.

This feature is currently in private preview. If you’re interested in trying it, please sign up here!

Enabling change tracking

From your VM, you can select “Track Changes” on the virtual machines blade, under Automation + Control. After selecting it, validation is performed to determine if the Change Tracking solution is enabled for this VM. If it is not enabled, you will have the option to enable the solution.

The solution enablement process usually takes only a few minutes but can take up to 15 minutes. During this time, you should not close the browser window. Once the solution is enabled and log data starts to flow to the workspace, it can take more than 30 minutes for data to be available for analysis in the dashboard described in the next section. We expect this timing to significantly improve in the future.

Visualize change in your VM

From the Change Tracking dashboard, you can view the changes that have occurred on your VM. The main set of graphs displays the configuration changes by time and change type. The interactive table below it shows the changes that occurred during the specified time range. By clicking on the table rows, you can see the details of each change.

To change the viewable time window, click on “Filter”. The default time range is the last 24 hours, but you can also set the time range to the last 30 minutes, last 1 hour, last 6 hours, last 7 days, last 30 days, or a custom time range. The Change Tracking solution tracks all Windows Services, all Linux Daemons, all Software, and some Linux Files (/etc/*.conf) by default; however, if you would like to collect additional Files and Windows Registry changes across your machines you can add them to the solution’s collection settings by clicking “Configure”. Please note: the configuration settings are universal across all machines under that workspace.

Once in the collection settings, you can go to the change type you wish to modify via the tabs at the top of the page. You can click the plus (+) icon to add a new collection setting for the designated change type, or you can click on a pre-existing setting to edit its properties.

Correlate Azure Activity Log Events for Your VM

If you have the Azure Activity Log solution funneling data to your OMS workspace, you can enable the Azure Activity correlation line graph to see the trend of Activity Log events for your VM that occurred within your Change Tracking time window.

To receive Azure Activity Logs in your OMS workspace, follow the steps below (from http://www.deployazure.com/management/operations-management-suite/azure-activity-log-analytics-alerts-with-operations-management-suite/)

Add the Azure Activity Log Analytics solution in OMS
Go to your workspace in Azure and click on "Azure Activity log" beneath Workspace Data Sources
Enable a connection to the subscription(s) of your choice
Data should start collecting

You can click on the Activity Log graph points to see what Activity Logs events occurred around that time. The results will open in Log Search.

OS support

We support all operating systems that meet the OMS agent requirements. Both x86 and x64 versions are officially supported on a variety of distributions. However, the OMS Agent might also run on other distributions not listed.

Windows

Windows Server 2008 SP 1 or later
Windows 7 SP1 or later

Linux

Amazon Linux 2012.09 through 2015.09
CentOS Linux 5, 6 and 7
Oracle Linus 5, 6, and 7
Red Hat Enterprise Linux Server 5, 6, and 7
Debian GNU/Linux 6, 7, and 8
Ubuntu 12.04 LTS, 14.04 LTS, 15.04, and 15.10
SUSE Linux Enterprise Server 11 and 12

New to OMS Change Tracking

If you are new to OMS Change Tracking, you can view the current capabilities which include change detection across both Windows and Linux machines in our documentation.
Quelle: Azure

Mesosphere DCOS, Azure, Docker, VMware & Everything Between – SSH Authorized Keys

After clearing out all the security-related tweaks, configurations, and having all of our DC/OS cluster nodes installed with the Docker engine. We will dive into part 3 for this series, when it’s time to create the SSH authorized keys file and establish the trust relationships between the bootstrap node to all other nodes in the cluster.

In order for the bootstrap node to be able to securely communicate and open SSH tunnel to other nodes and for the other nodes to be able to pull the DC/OS configuration script during installation, we first need to generate private and public keys using ssh-keygen tool and add the public key into the bootstrap authorized_keys file.

Read more about all the details around DC/OS 1.9 SSH Authorized Keys in my personal blog.
Quelle: Azure

How Azure Security Center detects DDoS attack using cyber threat intelligence

Azure Security Center automatically collects, analyzes, and integrates log data from a variety of Azure resources. A list of prioritized security alerts are shown in Security Center along with the information you need to quickly investigate the problem along with recommendations for how to remediate an attack. In addition, a team of security researchers and experts often work directly with customers to gain insight into security incidents affecting Microsoft Azure customers, with the goal of constantly improving Security Center detection and alerting capabilities.

In the previous blog post "Azure Security Center adds Context Alerts to aid threat investigation," Ian Hellen described the context alerting feature that helps to automate security investigation and delivers relevant context about what else happened on the system during and immediately before an attack. In this blog post, we will focus on a real-world DDoS attack campaign and how it was detected using cyber threat intelligence.

Before we get into the details of our investigation, let’s quickly explain some terms that you’ll see throughout this blog. So, what is DDoS? DDoS (Distributed Denial of Service) is a collection of attack types aimed at disrupting the availability of a target. These attacks involve a coordinated effort that uses multiple Internet-connected systems to launch many network requests against targets such as DNS servers, web services, e-mail, and others. The attacker’s goal is to overwhelm system resources on the targeted servers so that they can no longer process legitimate traffic effectively, making the system inaccessible. Another term is “Brute Force” which is a type of attack that attempts to calculate or guess valid username/password combinations to gain unauthorized access to a computer host. Oftentimes, the sheer amount of Brute Force attempts can effectively result in DDoS of the targeted system.

Initial Azure Security Center alert details

We began our initial investigation when Azure Security Center alerted on a series of Failed RDP Brute Force Attacks followed by Successful RDP brute force Attack immediately afterward. Around the same time, we also observed consistent RDP Incoming BF Many to One & RDP Incoming BF One to One attack alerts in Azure Security Center. These attacks appear to originate from ~79-85 unique IP addresses trying to target the RDP service periodically. 

Below we see this series of alerts in Azure Security Center:

Azure Security Center also provides a threat intelligence report on alerts that provides detailed insight into the attack techniques being used like below:

After the successful brute force attack, we began our deeper investigation that revealed the attackers first created three new user accounts, all with the same password:

‘administrator’,
‘admin’,
‘adminserver’

That password for each was ‘lman321’.

Later, Azure Security Center detected that the attackers had executed processes associated with an unknown binary ‘wrsd.exe’ running from the user account’s %temp% directory.
Once downloaded, we observed wrsd.exe, running the whoami command which displays the current logged domainuser account.
Attackers then changed the below registry key to be able to bypass Network Level Authentication (NLA) to get to a generic RDP window, so that they could login from any Windows RDP client.

REG ADD “HKLMSYSTEMControlSet001ControlTerminal ServerWinStationsRDP-Tcp” /v UserAuthentication /t REG_DWORD /d 1 /f
"reg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp" /v UserAuthentication /t REG_DWORD /d 1 /f"

Attackers then delete Terminal Services registry key entries related to the display of LegalNoticeCaption and LegalNoticeText. These registry keys are used to enable and configure custom legal notices and start up messages that Windows displays to all remote RDP users upon logon. Attackers will typically delete these LegalNotice keys as the UI can sometimes break or interrupt attacker’s automation.

reg delete

"HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem" /v legalnoticecaption /f   

reg delete

"HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem" /v legalnoticetext /f

The Parent process then launches commands to terminate any running Chrome or Firefox processes using Taskill.exe with the /f (force) option. Please note, task kill (Taskill.exe) is a program used to end one or more tasks or processes. Processes can be killed by process ID or image name. The ‘/f’ parameter represents that it’s trying to terminate the processes forcefully.
After killing the processes, we see the following:

Attackers first attempt to log off using the “Shutdown /l /f” command. The /l switch indicates a “logoff” while the /f switch forces running applications to close.
This is followed by the “ping -n 3 127.0.0.1” command, pinging the localhost 3 times, which appears to be used to insert a delay of about 3 secs as each ping takes a second.
Finally, we see the attacker logging off using the “logoff” command.

Within an hour of compromise, Azure Security Center used Microsoft’s threat intelligence to detect that the compromised subscription was likely being used as a shadow server to perform outgoing DNS amplification attacks. 

DNS amplification attacks are a popular form of distributed DDoS attack that usually involves two sophisticated steps. Attackers first spoofs the IP address of the DNS resolver and substitute it with the victim's IP address. The result of this is that all DNS replies will be sent to the victim's servers. In the second step, attackers discover an Internet domain that is possibly registered with many DNS records.

Attackers will then send DNS queries that request the entire set of DNS records for that domain. The DNS server’s response is usually so large that it floods the target with large quantities of packets.

Considering the high severity and priority of cases like these, our team of security researchers and experts immediately reached out to the customer and worked with their security team in identifying the threat, performing forensic investigative steps to ascertain what activities took place on the victim host, the scope of the intrusion, and the motives behind it. Further remediation steps were also taken to prevent continued exposure and the possibility of further compromise in the customer’s network. All the recommended action taken are explained in detail in the remediation and mitigation section below.

Recommended remediation and mitigation steps

The initial compromise was the result of a successful RDP Brute force attack that resulted in complete compromise of the machine and was further used for DDoS- DNS Amplification Attack. In this case, the host was being used for nefarious purposes. Microsoft recommends investigating the source of the initial compromise via a review of available log sources, host-based analysis, and if needed, forensic analysis to help build a picture of the compromise. In the case of Azure ‘Infrastructure as a Service’ (IaaS) virtual machines (VMs), several features are present to facilitate the collection of data including the ability to attach data drives to a running machine and disk imaging capabilities. Microsoft also recommends performing a scan using malware protection software to help identify and remove any malicious software running on the host. If lateral movement has been identified from the compromised host, remediation actions should extend to these hosts.

In cases where the victim host cannot be confirmed clean, or a root cause of the compromise cannot be identified, Microsoft recommends backing up critical data and migrating to a new virtual machine. Additionally, new or remediated hosts should be hardened prior to being placed back on the network to prevent reinfection. However, with the understanding that this sometimes cannot be done immediately, we recommend implementing the following remediation/preventative steps:

Password Policy: Attackers usually launch brute-force attacks using widely available tools that utilize wordlists and smart rulesets to intelligently and automatically guess user passwords. So, the first step is to make sure to utilize complex passwords for all VMs. A complex password policy that enforces frequent password changes should be in place. Learn more about the best practices for enforcing password policies.
Endpoints: Endpoints allows communication with your VM from the Internet. When creating a VM in the Azure environment, two endpoints get created by default to help manage the VM, Remote Desktop and PowerShell. It is recommended to remove any endpoints that are not needed and to only add them when required. Should you have an endpoint open, it is recommended to change the public port that is used whenever possible. When creating a new Windows VM, by default the public port for Remote Desktop is set to “Auto” which means a random public port will get automatically generated for you. Get more information on how to set up endpoints on a classic Windows virtual machine in Azure.
Enable Network Security Group: Azure Security Center recommends that you enable a network security group (NSG) if it’s not already enabled. NSGs contain a list of Access Control List (ACL) rules that allow or deny network traffic to your VM instances in a Virtual Network. An endpoint ACL allows you to control which IP address, or CIDR subnet of addresses, you want to allow access over that management protocol. Learn more about how to filter network traffic with network security groups and enable Network Security Groups in Azure Security Center.
Using VPN for management: A VPN gateway is a type of virtual network gateway that sends encrypted traffic across a public connection to an on-premises location. You can also use VPN gateways to send encrypted traffic between Azure virtual networks over the Microsoft network. To send encrypted network traffic between your Azure virtual network and on-premises site, you must create a VPN gateway for your virtual network. Both Site to Site and Point to Site gateway connections allows us to completely remove public endpoints and connect directly to the Virtual Machine over secure VPN connection.

To learn more about Azure Security Center, see the following:

Azure Security Center’s detection capabilities
Managing and responding to security alerts in Azure Security Center
Managing security recommendations in Azure Security Center
Security health monitoring in Azure Security Center
Monitoring partner solutions with Azure Security Center
Azure Security Center FAQ
Get the latest Azure security news and information by reading the Azure Security blog.

Quelle: Azure

Flexible Container Images with OpenShift

Create containers that enable customization, fast adoption, and reuse of software components with this introduction to flexible containers, a concept that focuses on building container images consistently for more efficient product delivery.
Quelle: OpenShift