• Windows Vista Recovery Console and the Password

    Every once in a while I am left scratching my head. Over the last few days a few blog postings have popped up on a subject and I am at a loss to understand why. I’m not the only one – several security industry colleagues have been in touch and have said they are just as puzzled.

    The subject in question is that the Windows Vista installation medium and especially the Recovery Console of it is the biggest vulnerability of Vista. Why? Well because the Recovery Console on the installation medium does not require a password anymore and makes the whole disk accessible.

    So I wanted to give my perspective, and that of a number of security industry colleagues both inside and outside of Microsoft:

    1. There are the 10 Immutable Laws of Security. Law #3 says: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore. This is well known by everybody having just the slightest security knowledge. There are a lot of tools on the web, where you can boot from and access a disk. Being it Linux distributions, Windows PE, or any other OS that can mount an NTFS partition.
    2. If you have physical access to a disk you can attach it to any computer and mount the disk from there to access the data.
    3. We have a process called "Security Development Lyfecycle" where all the decisions which concern security have to be approved by the Secure Windows Initiative Team. The decision to remove the password was taken in this process and approved there. The reason is an obvious one: This password does not add any security - not a tiny little bit. But it added a lot of hassle: A lot of times, where you would need the Recovery Console, the disk is corrupt in one way or an other. This might lead to the point, where the Recovery Console does not find the Windows installation any more and therefore not Registry and therefore no password and therefore no Recovery Console. As this adds no security but a lot of problems we removed it. This was a conscious decision.
    4. Finally, if you want to protect your computer, do what we said since a long time: Use a BIOS password, use disk encryption (like Bitlocker) and/or EFS. I am using these technologies and am not afraid at all by the whole discussion.

    So, I understand that this is scary for people not being too deep in security but as I said: I was pretty surprises that it was even taken up by security sites.

    Any comments?

    Roger

  • Crime on SecondLife - a Surprise?

    There were recently different articles about crime on SecondLife. What is interesting to me is that a lot of these started to express their surprise.In certain blogs I read statements like: SecondLife is so cool, how could somebody even think of this.

    Well if time showed us something we have to learn, it is the fact that crime - especially organized crime - is wherever the money is. If you can commit fraud on SecondLife it will happen. Probably rather sooner than later. What is disgusting is that we started to see pedophiles on SecondLife - but again not surprising.

    Is SecondLife to blame: Not as far as I can judge at the moment. If they collaborate with the police, they are fine but the key problem is more on the social side and the question might be asked whether law enforcement as well as our legislation is able to cope with the speed the criminals are looking for new ways for making money. It again shows that a collaboration within the different players (technology vendors, ISPs, operators, police) is the only way to build trust on the Internet.

    Two articles you might want to read:

    Roger

  • OEMs: Join in to "Secure by Default"

    I recently purchased a PC for my parents and then started to install it – well actually used the OEM installation to get it up and running with Windows Vista Home Premium. I was pretty surprised how easy it was to actually have a running system (I usually re-format the disk if I have to install a PC for myself). But then I had a deeper look at the installation base and was pretty surprised. There were a gazillion of products installed on the PC I never wanted.

    So I started to think about security of this setup. If I am looking back to earlier versions of our Operating System, one of the key problems with the earlier versions was that we enabled everything we thought a user could ever use. Remember Code Red? It actually attacked our web server and spread incredibly fast – on File Servers, Print Servers, any other server (sometimes it even hits a web server)… IIS was installed by default and the users and the administrators were not even aware of having IIS on the box – and mostly did not update it at all. We changed heavily and went down the "Secure by Default" road.

    Taking this back to the OEM installation above, we (being the industry) just do a big step back to the old days. Why do I have to have a dictionary, train schedule, etc. to be installed by default? Who is taking care of these applications and makes sure that they will be properly managed and updated? Why is a AV-solution forced on my PC (yes, I want one but I want to have choice)?

    Personally I think OEM have to change the way a PC is set up. When I buy a box with Windows Vista on it, I would expect a screen that shows me all the tools that I could actually get during the setup. I will then pick and choose and the machine will be installed. We could finally argue about opt-in and opt-out. I hate those installers where I have to tell them between one and three times that I really do not want to have toolbar X installed on my computer (yes, I know, we have these kind of tools as well). I would expect the OEM to take their responsibility and ship a secure-by-default PC. Some of them even disable security functions…

    Coming back to my story above: The first thing I had to do after the successful installation of the PC is to de-install all the non-wanted software and update mechanism for all the active components and printer drivers and …. At the end it still left a bad feeling as I am not sure whether I actually really de-installed everything and no vulnerable component I will never use is still on the box…

    Roger

  • Digital Phishnet Conference 2007

    Last week the first Digital Phishnet Conference in Europe took place in Berlin. Basically Digital Phishnet is an initiative to help to exchange information about Phishing-Sites in order to help enforcement. This is the core mission: Supporting Law Enforcement with information. So the participants are basically able to enter URLs where they are phished on and the system them collects additional information about it and makes it ready for Law Enforcement, where all the participants can add additional information where applicable.

    To me the conference showed different things:

    • Phishing attacks are getting more and more sophisticated: Malware is involved into almost every attack; we see attacks where the site is downloaded locally, unpacked and displayed locally – thus circumventing most of the countermeasures against Phishing (especially site-takedowns). We just rarely see the classical phishing attack anymore in Europe.
    • The most pressing thing to make all the players collaborate. This is easier said as done as groups that historically are not too good in collaborating would have to: Law Enforcement, Banks, Vendors, ISPs, … Even worse: It means sharing of information and trusting each other.
    • This directly leads to networks: It is of outmost importance that we immediately start to build international networks. Key players have to know each other and have to want to collaborate.
    • There are technical means that are important: Things like Anti-Virus/Anti-Spyware and Phishing-Filters in one way or another. Unfortunately the bad guys learn how to circumvent there as well and hence, they become less efficient:
      • URL-Filters lose their importance if the attackers start to use malware and/or local webpages. Having this said, it is important to stress that there are still a lot of attacks using classical webpages and therefore the Phishing Filter has to stay but most probably additional functionality has to be built in. The question is: The more we build in there, how do we distinguish between malware-sites and the censoring of the Internet?
      • We see targeted attacks. How do the AV-vendors react on this?

    This actually leads me to some conclusive statements:

    • No one can solve this problem alone: The bad guys are working together as well – so will we!
    • Therefore there is a huge need for personal networks! We have to know each other and trust each other. This is the only way to achieve the collaboration
    • New approaches are needed. Most often, targeted malware does not make the cut for AV-vendors to include them into their signatures quickly – but this is what we need. If there is malware been built to target one single bank, this bank has to be able to let the AV-vendors include this malware into their signatures fast.

    Finally, let's just do it

    Roger

  • Security Trends on our Malware Portal

    I recently blogged about three major announcements we made: http://blogs.technet.com/rhalbheer/archive/2007/04/25/three-microsoft-announcements.aspx

    On that I got some comments (public and private) and some wishes. Thank you all forthis feedback. I linked it back to the resposible perons and we will definitely consider your input for future versions of the portal.

    One point was, however, worth taking up publically as it came up several times: The wish to see attack trends. Being it the trends with regards to the different kinds of malware or the trend with regards to where attacks come from or the trend...

    Well, there is little value - from out view - to do this realtime. But we definitely do research about it. Since some time we publish the Security Intelligence Report to give you just this kind of insight. If you are interested in that, it is mentioned in the referenced blog post as well or you could find the latest report here: http://www.microsoft.com/downloads/details.aspx?familyid=AF816E28-533F-4970-9A49-E35DC3F26CFE&displaylang=en

    Roger