Security

Largest advertising company in the world still wincing after NotPetya punch

Lack of patches and enabling local admin rights blamed


The huge cyber attack that swept from Ukraine last week is still affecting companies, and several have been hit pretty hard, including the world's largest advertising business, UK-based WPP.

The malware attack, dubbed NotPetya because it masquerades as the Petya ransomware, affected several multinationals running Microsoft Windows. Most, if not all, confirmed cases stemmed from a malicious update to MeDoc, Ukraine's most popular accounting software.

One week after the attack and a number of WPP's agencies are still locked out of their network, with some staff only able to access webmail. It is not alone: Maersk, AP Moller-Maersm, Reckitt Benckiser and FedEx are also struggling to get back on their feet. It has prompted analysts to wonder why some were more susceptible than others.

WPP said it is "making steady progress towards resuming normal operations in parts of the Group that continue to experience some disruption". It said systems have been brought back online "in a measured and prudent way, again in line with good practice".

Outsourced support

The advertising and PR group has hundreds of small agencies grouped into six larger companies. The business signed an £800m cloud deal with IBM at the end of 2014, which led to its in-house IT team being transferred over to the company. Once the TUPE period ended, hundreds of staff were made redundant or left, according to multiple sources.

One insider claimed the lack of technical support remaining at WPP may have exposed the company to the attack.

He said IBM had not implemented a crucial central patch management system yet, meaning one of its agencies had not had a Windows patch for six months. Users were also given local admin rights, enabling the malware to spread like wildfire on the network.

He claimed the agencies not affected had taken a more proactive approach to maintaining systems because they either had a few IT support staff left, or had legacy policies in place that meant they were up to date. Others were unaffected because they mostly used MacBooks.

The insider said: "The lack of technical experts on the ground certainly exacerbated the problem."

IBM declined to comment.

WPP said it "had broadly patched as a response to WannaCry". However, external and internal analysis showed that the malware could utilise multiple vectors to spread, and the Microsoft-issued patch from March 2017 only mitigates one of these vectors.

"Upon becoming aware of the attack, WPP immediately shut down certain systems to implement all precautionary measures to protect business and client systems and data," the insider said. "It also deployed new antivirus updates, designed specifically for this malware, as soon as our global antivirus partner, Sophos, made them available.

"IBM has been working alongside our staff and IBMers have been invaluable in working tirelessly to help WPP resolve this issue."

Mysterious malware

Andy Patel, security expert at F-secure, said if a machine was infected by the malware, but the user did not have admin rights and other machines were patched, then the network would generally be safe.

He noted the most modern version of Windows contains a feature that prevents passwords from being stored in plain text (instead storing the hashes), which means the virus would not have been able to use lateral movements to spread.

Some companies, such as Maersk, did direct business with Ukraine, which would explain how the malware got on its system, the F-Secure man added. "However, one victim we spoke to had no ties to the Ukraine at all, so it is a mystery as to how they got infected. Its spread via VPN is one possibility."

Patel also blamed a lack of resourcing as being one factor in leaving some organisations more exposed. "So many companies under resource cyber security and IT, or they outsource it. In my earlier career every company had their own IT department, now we are seeing companies forgoing that. But if you have your IT guys, it is their job to make sure things don't go wrong."

Brian Honan, independent security consultant and founder of Ireland's Computer Security Incident Response Team, agreed that enabling local admin rights, a lack of network segmentation and inadequate patching are the emerging reasons as to why some organisations were more exposed than others.

Wake-up call

However, he cautioned against blaming outsourcing, adding that it's possible for a company with a large in-house IT team to be vulnerable too. "Organisations should never outsource responsibility for security," he said.

He added that although patching systems and removing local admin rights were simple steps to prevent exposure, in many enterprises it might not be as easy as it sounds. "For example, they may have legacy in-house applications that run on certain versions. And then if you patch a system, it may stop applications from running. So there is an inherent cost.

"Likewise, with local admin access there are many accounting applications that require local admin for applications to run. Also, from an IT support point of view it can be easier to allow local access rather than incur the cost of centralising it.

"Companies have to sit down and review the environments. I hate to use the phrase 'a wake-up call' as there have been so many, but hopefully after Petya and WannaCry people realise there are pretty basic things can do to increase security and make themselves resilient against attacks." ®

Send us news
98 Comments

How hot is it right now? 'Water park catching fire and burning down' hot

It's a Jersey thing, you wouldn't understand

A New Jersey water park has had to modify its summer reopening plans after one of its star attractions caught fire and partially burned down.

The 'High Anxiety' waterslide lived up to its name when it was engulfed in flames on Tuesday night, as you can see below.

Continue reading

Mayflower, the AI ship sent to sail from the UK to the US with no humans, made it three days before breaking down

Plus: Canon has cameras that only let employees into meeting rooms if they smile, and more

In brief The Mayflower Autonomous Ship (MAS), which set sail this week from the UK to the US, failed just three days into its journey. It appears a mechanical fault occurred, something the Mayflower's AI can't fix itself.

Continue reading

Spyware, trade-secret theft, and $30m in damages: How two online support partners spectacularly fell out

Chat-bot maker LivePerson wins lawsuit against call-center outfit [24]7.ai

On Thursday, a jury in a federal court in Oakland, California, found call center biz [24]7.ai – as in, 24/7 – guilty of unfair competition and stealing trade secrets from chatbot maker LivePerson, awarding the company more than $30m in damages.

The case was filed in 2014. In its complaint [PDF], LivePerson described how its partnership with 24/7 went bad.

LivePerson provides online engagement technology, which takes the form of chatbots that corporate clients add to their websites to field questions, gather interaction data, and reduce customer support costs.

Continue reading

Amazon notices Apple, Google cutting app store commission rates, follows suit

Keeps small-time devs on the reservation with AWS credits, too

Amazon this week said it would reduce its Appstore commission rate for less successful developers, following recent similar moves by Apple and Google, and is sweetening its deal by offering AWS credits to support apps' backend services.

"Starting in Q4, for developers that earned less than $1m in revenue in the previous calendar year, we are increasing developer revenue share and adding AWS credit options," said Palanidaran Chidambaram, director of the Amazon Appstore, in a blog post. "This brings total program benefits up to an equivalent of 90 percent of revenue."

Amazon will allow developers to retain 80 per cent of app revenue, keeping 20 per cent for itself. The company suggests those using AWS credits will add another 10 per cent to the developer take. It's calling its largesse the Amazon Appstore Small Business Accelerator Program.

Continue reading

FCC pushes forward on rules to block the certification of new telecoms gear from ZTE and Huawei

Crackdown on loopholes that allow 'high-risk' vendors to have equipment approved for use in the US

The US Federal Communications Commission is pressing forward with a proposal that would ban telecommunications providers [PDF] from using equipment made by manufacturers deemed to present a risk to national security.

The agency has opened a request for comments on rules that would revoke the certification of any equipment listed by the Secure and Trusted Communications Networks Act of 2019. This probe has also sought to gauge the temperature for withdrawing certification for "high-risk" equipment already deployed by carriers.

Both Huawei and ZTE were listed in the notification, as well as smaller entities that have earned the ire of US government. These include the Hytera Communications Corporation, which produces radio systems for cellular and industrial users, as well as video surveillance vendors Dahua and Hikvision.

Continue reading

New York congressman puts forward federal right-to-repair bill

Fair Repair Act targets all varieties of electronic devices

A New York congressman has introduced a federal right-to-repair bill, just a week after the state's Senate passed a bill addressing the same issue. That state bill has failed to progress, we note.

The proposed federal-level legislation, though, would compel original equipment manufacturers to provide consumers and independent businesses access to the tools, schematics, and parts required to fix broken devices.

Dubbed the Fair Repair Act, and proposed by House Rep Joe Morelle (D-NY), the bill would provide an equal basis for all consumers and independent repair shops. Although great strides have been made pushing similar legislation on the state level, with bills introduced or passed in 27 states this year alone, progress has not been evenly divided.

Continue reading

Petition instructs Jeff Bezos to buy, eat world's most famous painting

Booze-fuelled Change.org campaign implores Amazon founder to 'GOBBLE DA LISA!'

Ultra-billionaire Amazon founder Jeff Bezos has already been the subject of a petition asking him not to return to Earth after he blasts off in his New Shepard rocket on July 20, but even if he is allowed back, Bezos is now facing an even more difficult prospect.

The aerodynamically-pated arch-villain archetype and his vast fortune are increasingly becoming subjects of fascination for the denizens of campaign website Change.org, with multiple petitions currently running, mostly trying to persuade him to divert some of his almost-limitless resources toward good causes.

However, some users are suggesting more novel and entertaining uses for his immense wealth. Change.org user Kane Powell has chosen to use the platform to attempt to persuade Bezos to buy and eat the Mona Lisa, the supposedly priceless Leonardo da Vinci masterpiece housed in the Louvre in Paris.

Continue reading

Microsoft: Try to break our first preview of 64-bit Visual Studio – go on, we dare you

Plus: Updates to .NET 6, ASP.NET Core, and .NET MAUI

Microsoft has unveiled a slew of developer tools, including a preview of the 64-bit Visual Studio 2022, ahead of that developer event set for 24 June.

Preview 1 of Visual Studio 2022 comes direct from the department of never-say-never following version after version of the toolset remaining staunchly 32-bit, even as the hardware world changed around it.

The move to 64-bit was announced earlier this year and is an ambitious one considering the ecosystem and sheer size of the Visual Studio codebase.

Continue reading

Racist malware blocks The Pirate Bay by tampering with victims' Windows hosts file

Hello, 2002 called with one of the oldest low-tech tricks in the book

Malware laced with racial epithets tries to block Windows-based victims from visiting file-sharing sites associated with copyright infringement, according to new Sophos research.

The malicious software amounts to a "goofy process to block people from going to the Pirate Bay," according to Sophos researcher Andrew Brandt, who stumbled across the malware after a colleague mentioned it in passing.

Rather than opening a backdoor for a ransomware gang to exploit or dropping a malicious payload, however, this malware merely sinkholes a bunch of Pirate Bay domain names by adding them to the Windows hosts file and pointing them at 127.0.0.1 – meaning they'll be inaccessible from the victim's machine.

Continue reading

UK gets glowing salute from Bezos-backed General Fusion: Nuclear energy company to build plant in Oxfordshire

Biz will develop Magnetized Target Fusion technology at the site

General Fusion – the Canadian-based atomic outfit backed by Jeff Bezos and a battalion of other major investors – is to build a test facility in Oxfordshire to showcase its power-generating technology.

Following a COVID-friendly handshake, the UK Atomic Energy Authority (UKAEA) has given General Fusion the green light to proceed with its Fusion Demonstration Plant (FDP) at UKAEA's Centre for Fusion Energy Campus in Culham.

The campus – a Royal Navy airbase until it was handed to the UKAEA in 1960 – is home to a cluster of fusion development technologies.

Continue reading

UK financial watchdog dithers over £680k refund from Google (in ad credits, mind you) for running anti-fraud ads

MPs give FCA a telling-off for wasting taxpayer money

The UK's financial regulator is refusing to say whether it will accept an offer by Google to pay back more than £600,000 spent on online ads warning people about the dangers of money scams.

News that Google made the offer came to light earlier this week during oral evidence [PDF] to the Treasury Committee hearing on economic crime. Among those giving evidence was Mark Steward, director of enforcement and market insight at the Financial Conduct Authority (FCA).

He was quizzed by Rushinara Ali, Labour MP for Bethnal Green and Bow, who wanted to know about the £600,000 the FCA is paying Google to run ads warning about online financial scams.

Continue reading