NYU IT Security News and Alerts

NYU IT Security News and Alerts

Recent Adware Scam

Please be advised that NYU does not sponsor unannounced surveys.  If you have any questions about the legitimacy of a communication you receive, please do not reply to the communication or click any embedded links or options.   Instead, please contact security@nyu.edu

Adware can have the following characteristics:

  • Deceptive and full of malware that will install on your device as options are clicked
  • Deceptive and fairly benign, and will present users with multiple click-thrus

Pop-ups like these may mean that your device is infected.  If you see them, please contact your local System Administrator or NYU IT at AskIT@nyu.edu or 212.998.3333.

*Click images to enlarge

Screen Shot 2016-03-17 at 12.32.23 PM

 

Screen Shot 2016-03-17 at 12.37.20 PM

 

 

 

 

Recent Phishing Emails Claiming to be from File Sharing Services

We have noticed an increase in phishing messages from file sharing services.   Since the messages associated with legitimate file sharing can be brief, it may make these phishing attempts more challenging to recognize.  We’d like to share the following phishing examples.

*Please click any image to enlarge.

Example #1  (claiming to be from an NYU student)

Screen Shot 2016-03-07 at 10.47.45 AM

Example #2 (claiming to be from an NYU employee)

Screen Shot 2016-03-08 at 11.04.42 AM

Example #3

Screen Shot 2016-03-08 at 10.19.52 AM

Please be reminded/advised:

  • If you’re not expecting to receive a file share, please confirm the legitimacy of the message with the sender prior to opening.
  • If a shortened or tiny URL appears (e.g., http://tinyurl.com/zf7z5m) when you hover over an active link to documents in an email message, the email message is not legitimate, as file sharing services do not generate shortened URLs.
  • NYU Box is the recommended method for sharing restricted information or data whose unauthorized access or loss could seriously or adversely affect NYU, a partner, or the public.  For more information, please see:  NYU Box:  Best practices for sensitive data (permissions and security settings), http://www.nyu.edu/servicelink/KB0013199
  • Google Docs. is the recommended method for sharing data that’s public, confidential or protected.
    • For a description of data classifications or categories (the classifications/categories include: restricted, protected, confidential & public), as well as specific examples of data in each category, please see:  The Data Classification Policy

 

 

DROWN Attack (Decrypting RSA using Obsolete Weakened eNcryption)

A recently announced attack known as DROWN (Decrypting RSA using Obsolete Weakened eNcryption) exploits SSL/TLS vulnerabilities.  DROWN is an attack that allows decryption of intercepted data and can also allow man-in-the middle attacks.  

Vulnerable systems include:

  • Servers that support SSLv2 – allows for a cross-protocol attack whereby an attacker could decrypt TLS sessions between clients and hosts that support SSLv2 and export cipher suites.  This vulnerability also allows for the decryption of traffic between clients and even non-vulnerable servers, if another server supporting SSLv2 and export ciphers shares the RSA keys of the non-vulnerable server.
  • Unpatched OpenSSL servers  – This vulnerability dramatically increases the efficiency and danger of the DROWN attack by making it effective against even the stronger, non-export-grade cipher suites with very little computation time required.

 

Action Steps:

  • Disable SSlv2 protocol in all SSL/TLS servers.  Disabling all SSLv2 ciphers is also sufficient, provided the patches for CVE-2015-3197 (fixed in OpenSSL 1.0.1r and 1.0.2f) have been deployed. Servers that have not disabled the SSLv2 protocol, and are not patched for CVE-2015-3197, are vulnerable to DROWN even if all SSLv2 ciphers are nominally disabled, because malicious clients can force the use of SSLv2 with EXPORT ciphers.
  • Upgrade OpenSSL to the latest.  We strongly recommend eliminating all SSL support in favor of TLS.

References:

[1] https://www.openssl.org/news/secadv/20160301.txt

[2] https://www.drownattack.com/

[3] https://drownattack.com/#faq-factors

[4] http://arstechnica.com/security/2016/03/more-than-13-million-https-websites-imperiled-by-new-decryption-attack/

[5] https://www.openssl.org/news/secadv/20160301.txt

[6] http://arstechnica.com/security/2016/03/more-than-13-million-https-websites-imperiled-by-new-decryption-attack/

[7] https://drownattack.com/#faq-mitm

[8] https://drownattack.com/#faq-update

 

Locky Ransomware Alert

Ransomware dubbed “Locky” is spreading via email, in the form of a Word file attached to e-mail messages.  Locky email is translated to various languages and localized by region.  E-mails with this type of ransomware may look something like (*click images to enlarge):  

Screen Shot 2016-02-19 at 12.38.08 PM

Once the Word attachment is opened, users see scrambled content and are asked to enable macros.  When/if macros are enabled, the malware spreads, and encrypts nearly all file formats as hash.locky files including any mounted USB sticks and network file shares.  Once encrypted, users receive the following:

Screen Shot 2016-02-19 at 1.42.47 PM

Locky ransomware typically asks victims to pay between 0.5 and 2 Bitcoins ($208 – $800) for the decryption key.
The antivirus software available thru NYU, Symantec Endpoint Protection, may not provide full protection against all variants of this malware.  Google also checks for viruses, and you can see if one has been identified.  If so, the Gmail attachment will have “virus found”,  as in the image below:

Gmail Virus Warning

 

Therefore, if you see .locky extension files appearing on your computer, USB drives, or network shares, you should contact the NYU IT Service Desk immediately at 212.998.3333 or at AskIT@nyu.edu and disconnect the computer from the network.  System Administrators who see .locky extension files appearing on their network shares, may look up the file owner on _Locky_recover_instructions.txt file in each folder.  It is recommended that you lock these Active Directory user and computer accounts.

The best way to handle such an infection is to restore back-ups from external hard-drives or USB devices. You must wipe the machines before mounting back-up devices, and it is recommended that you check any files synched with services such as NYU Box, DropBox or Google Drive to ensure that these files have not been infected.

 

 

Google Chrome Safe Browsing Technology

Google Chrome is now using Safe Browsing technology to protect browsers from shady websites or deceptive advertising on legitimate sites.  This initiative by Google addresses the threat of social engineering, which could involve:

  • deceptive download buttons
  • an ad on a legitimate website pretending to offer an update
  • a warning claiming the system is out of date
  • a security alert for Chrome and third-party media players
  • an ad posing as a trusted entity, which tries to trick users into sharing credentials
  • buttons that mimic tv shows or sports video stream

all of which may be designed to encourage the installation of bogus software or malware.

The following is a Google Chrome warning message associated with deceptive content:

Screen Shot 2016-02-18 at 12.14.07 PM

For more information, please see:  https://googleonlinesecurity.blogspot.se/2016/02/no-more-deceptive-download-buttons.html

Gmail – New Authentication Features Make it Easier to Identify Email To/From Unsecured Connections

*Please note that these new features are currently available in free Gmail accounts, and are not yet available in Google Apps for Education.

Google has announced new authentication features for Gmail which will make it easier to identify emails that arrive from,  or are being sent to unsecured or unencrypted connections.  Emails arriving from unsecured connections are potentially harmful, and may be phishing attempts or other malicious campaigns designed to capture user data or information.  Emails being sent to unsecured connections are more easily hijacked by third parties.

Gmail on the web now  provides users with a visual alert (a lock symbol) when users send/receive email to/from unsecured connections, as follows:

Screen Shot 2016-02-14 at 11.25.53 AM

Clicking the lock symbol will display additional information, e.g.,

Screen Shot 2016-02-14 at 11.41.22 AM

If you see the red lock symbol when composing a message, do not send sensitive information.

Additionally, a sender’s profile picture is replaced by a question mark when Gmail is unable to authenticate the sender.

Screen Shot 2016-02-14 at 11.30.11 AM

If you receive an unauthenticated message, it may be forged.   Before replying, or clicking any embedded links, or opening any associated attachments, please confirm message authenticity by contacting the sender directly.

For more information, please see: https://support.google.com/mail/answer/6330403?p=tls&hl=en&rd=1

 

Dell Security Phishing Self Assessment

The following is a Dell Security phishing self assessment tool which will allow you to test, and hopefully refine your phishing detection skills and knowledge.

Once you click the link below, you will be presented with ten sample e-mails in succession.  You will have the opportunity to  mark each as “Legitimate’ or “Phishing”.  Upon completion, you will see your score, and will be able to view the rationale behind why each email was considered legitimate or phishing.

Please feel free to share this link!

https://www.sonicwall.com/phishing/

Phishing Message Claiming to Be from NYU

A number of people have reported receiving the phishing message below, with the subject “New NYU Spam Security Check”. This message is fraudulent, and included a link to a compromised site.

If you haven’t clicked, then you can mark the message as Spam by clicking the button at the top of the NYU Email window. This will help prevent such messages in the future.

If you did click on the link, you should change your password at the Start page (start.nyu.edu) and check for any changes to your account. If you would like assistance with this process, contact the NYU IT Service Desk, open 24×7.

Remember, NYU IT will never ask you for your username and password. And, if you click on a login link, be sure that the login page goes to https://shibboleth.nyu.edu with the green lock symbol, as highlighted in the image below (click to enlarge).

NYU Login edited

 

 

 

 

Copy of phishing message:

———- Forwarded message ———-
From: NYU
Date: Thu, Jan 28, 2016 at 11:40 AM
Subject: New NYU Spam Security Check
To:

[image: NYU]

Dear User,

IT Services have reviewed the existing security controls in place, in light
of a recent increase in fraudulent emails (often referred to as _phishing
emails_) received by staff and students.

As part of this review, we have extended the _spam_ checking and filtering service. As well as checking email coming in from outside the University we will also be checking emails sent from within the University.

This should increase our ability to detect fraudulent emails and mark them as spam.

Click to effect this upgrade.

Note: If you are unable to click the link, please move this email to your
inbox .

© Copyright 2016.

Direct Deposit Scams

NYU has seen several recent scams that involve obtaining an employee’s NetID and password, which are then used by the scammer to alter the employee’s Direct Deposit information, resulting in the employee’s paychecks being re-directed to the scammers’ bank accounts. We want you to be aware of these scams, what we are doing to protect your Direct Deposit, and what you should do to protect yourself.

These scams usually occur as a result of:

  • A “phishing” email that sends the recipient to a website to “update” their Direct Deposit information, or
  • A compromised account, where the scammer obtains the employee’s NetID and password, signs on and changes the Direct Deposit instructions.

This can then result in funds going to the scammer’s bank account instead of the employee’s bank account.

NYU Payroll has a process in place for detecting Direct Deposit changes; when changes are made to an employee’s Direct Deposit instructions, Payroll sends a confirmation email and asks employees to notify Payroll if anything is amiss. Please pay attention to any email of this sort from NYU Payroll, and if you have not authorized a change to your Direct Deposit, follow-up by contacting PeopleLink (AskPeopleLink@nyu.edu or 212-992-5465) immediately.

In the event of any unauthorized attempt to change your Direct Deposit, it is very important that you promptly change your NYU NetID password to ensure the integrity of your account. This Knowledge Base article describes how to change your password. Should you have any questions or trouble, please contact the IT Service Desk, open 24×7.

Do not fall victim to phishing attempts:

  • Keep your eyes open for any email requesting that you “confirm” your sign-on credentials or threatening immediate account closure.
  • Remember that NYU IT/HR/Payroll personnel will never send you an email asking for your NYU NetID password. If you receive email that you think is a phishing, please forward it to phishing@nyu.edu.
  • Make sure, when you are logging into a single sign-on NYU service, that the URL displayed on your browser starts with https://shibboleth.nyu.edu.

If you do respond to a phishing attack, change your password immediately and check your Direct Deposit information in PeopleSync (Workday), which you can access from the NYUHome Work tab.

NYU is working on methods for adding another authentication step, as many banks have done, to ensure additional security.

NYU Email: Recognizing and Reporting Spam and Phishing

Spam is unsolicited bulk email. The key term is “unsolicited” — if you signed up for a mailing list (commercial or otherwise) which you no longer wish to receive, that is not spam. The easy differentiation is that legitimate businesses will have a mailing policy posted on the site where you sign up for the mail, and will give you correct information about how to unsubscribe. NYU Email powered by Google features built-in spam filtering. For more information on spam, please see our NYU Email: Removing spam from your inbox.

NYU Email, powered by Google, features built-in spam filtering. To read more about how it works and how to use it, see the ServiceLink knowledge base.

NYU recommends that you use the NYU Email web interface instead of email programs (Outlook, iPhone Mail, etc.). However, if you choose to use a desktop email client, you must create a filtering rule based on specific spam rating levels. Mail that matches the rule is then redirected into a folder of your choice and you can decide how you wish to handle the redirected messages. The filter level you select will determine the amount of spam you receive. If you find that you are receiving too much spam in your Inbox, try adjusting the level of filtering to be more strict. If you find that desired mail is being filtered, select a level that is less strict.

IMPORTANT: Keep in mind that some legitimate messages will end up in your spam folder if they exhibit characteristics of spam, for example, lots of capital letters, many exclamation points, or phrases such as “click here.” Therefore, it is important to check your spam folder regularly to ensure that you receive messages that may have been inadvertently flagged as spam.

Phishing messages appear to be sent from NYU, NYU IT, or other organizations affiliated with NYU requesting your personal information such as name, date of birth, password, etc. Do not reply to these messages. NYU IT will never request your password information. If a message informs you of an impending account closure or similar action unless you comply with its demands, it is often a sign that the message is a phishing scam. Do not comply with the request. To report phishing or spam attempts, please follow the instructions in the ServiceLink knowledge base.

This is an example of a Phishing email:

*From:* Abul Mohammed, Majeed (2014) [mailto: Majeed.AbulMohammed.2014@live.rhul.ac.uk]

*Sent:* Thursday, October 08, 2015 12:10 PM

*Subject:* NEW YORK UNIVERSITY.

Access to your e-mail account is about to expired.

Please Click here <http://maillonyuedu.weebly.com/> to restore access to

your e-mail account.

We apologize for any inconvenience and appreciate your understanding.

Regards.

New York University
70 Washington Square South
New York, NY 10012 (This is NOT our zipcode)
212.998.1212

 

To report phishing or spam attempts and for security tips for using email, see:

www.nyu.edu/servicelink/041202716305490