{"id":211308,"date":"2017-08-11T18:18:54","date_gmt":"2017-08-11T22:18:54","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/carbon-black-may-be-leaking-terabytes-of-customer-data-updated-healthcare-it-news\/"},"modified":"2017-08-11T18:18:54","modified_gmt":"2017-08-11T22:18:54","slug":"carbon-black-may-be-leaking-terabytes-of-customer-data-updated-healthcare-it-news","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/mind-uploading\/carbon-black-may-be-leaking-terabytes-of-customer-data-updated-healthcare-it-news\/","title":{"rendered":"Carbon Black may be leaking terabytes of customer data (UPDATED) &#8211; Healthcare IT News"},"content":{"rendered":"<p><p>    Security firm Carbon Black awoke to a damning report Wednesday    morning about a severe flaw in one of its top software    products: Sensitive corporate data from some major companies --    clients of Carbon Black -- have been found on multi-scanner    services.  <\/p>\n<p>    The report from DirectDefense, a managed    security strategies provider, ties the data leak to an API key    that the company claims belongs to Carbon Black Cb Response, a    next-generation anti-malware endpoint detection and response    tool.  <\/p>\n<p>    Cb Response is responsible for leaking hundreds of thousands    of files comprising terabytes of data, according to the    report.  <\/p>\n<p>    [Join Your Peers at HIMSS Healthcare Security Forum!    Register Today]  <\/p>\n<p>    Researchers sampled 100 files and identified leaks in several    major companies, including: a large streaming media company, a    social media company and a financial services business.  <\/p>\n<p>    The leak contains a wide range of company data: cloud keys,    single sign-on passwords, two-factors keys, customer data,    proprietary internal applications like custom algorithms and    trade secrets, app store keys, internal usernames, passwords    and network intelligence and customer data.  <\/p>\n<p>    DirectDefense left impacted company names out of the report to    protect identities. However, the researchers did contact all    customers found on the database.  <\/p>\n<p>    The leaked data exist primarily around various executable    formats (we havent seen evidence of this in documents or pdfs    yet), the report authors wrote. However, if handled    incorrectly, even executables can easily contain serious data    leakage of information that can be hazardous to a companys    security posture.  <\/p>\n<p>    Carbon Black provides security tools to a wide range of    companies, almost 2,000 customers globally -- including those    in the healthcare industry.  <\/p>\n<p>    The issue stems from data collected about potential threats    that are aggregated into a central location to be later    analyzed by researchers. Carbon Black separates the good files    from the bad files to prevent harmful files from running.  <\/p>\n<p>    However, it relies on whitelisting to ward off threats --    forcing Carbon Black to continuously analyze a rapidly    increasing pool of data. DirectDefense researchers said the    issue is when the security firm encounters new files from    clients and is unsure of whether a file is good or bad -- it    sends the file to a secondary cloud-based multi-scanner to be    scored.  <\/p>\n<p>    Translation: All new files from clients are uploaded to Carbon    Black at least once. The result of gaining access to the    multiscanner would allow a hacker to also gain access to the    files submitted to the database.  <\/p>\n<p>    Welcome to the worlds largest pay-for-play data exfiltration    botnet, the report authors wrote.  <\/p>\n<p>    And to make matters worse, the report wasnt able to    definitively conclude whether this flaw is specific to Carbon    Black. What the researchers do know is that Carbon Blacks    prevalence in the marketspace and the design of their    solutions architecture seems to be providing a significant    amount in data exfiltration.  <\/p>\n<p>    Carbon Black customers should review the data being collected    through the Cb Response product and evaluate the type of data    that exists on the network. Those concerned about third-party    access, like healthcare organizations, could also utilize    disabling cloud uploads. But keep in mind that it will    negatively impact security, as new files cant be scored.  <\/p>\n<p>    In a blog post, Carbon Black Co-founder and CTO Michael Viscuso    said: Theres an optional, customer-controlled configuration    (disabled by default) that allows the uploading of binaries    (executables) to VirusTotal for additional threat analysis.  <\/p>\n<p>    This option can be enabled by a customer, on a per-sensor    group basis, he continued. When enabled, executable files    will be uploaded to VirusTotal, a public repository and    scanning service owned by Google. We appreciate the work of the    security research community.  <\/p>\n<p>    Carbon Black was not informed about the issue brought to light    by DirectDefense before it was published. Specifically, Viscuso    explained that DirectDefense asserts that this an    architectural flaw in all Cb products.  <\/p>\n<p>    But this is exclusively a Cb Response feature  not included    in Cb Protection or Cb Defense, said Viscuso. Its also not a    foundational architectural flaw. Its a feature, off by    default, with many options to ensure privacy and a detailed    warning before enabling.\"  <\/p>\n<p>    This post was updated to include comments from Carbon Black    CTOMichael Viscuso.  <\/p>\n<p>    Twitter:@JessieFDavis    Email the writer: <a href=\"mailto:jessica.davis@himssmedia.com\">jessica.davis@himssmedia.com<\/a>  <\/p>\n<p>    Like Healthcare IT News on Facebook and LinkedIn  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.healthcareitnews.com\/news\/carbon-black-may-be-leaking-terabytes-customer-data-updated\" title=\"Carbon Black may be leaking terabytes of customer data (UPDATED) - Healthcare IT News\">Carbon Black may be leaking terabytes of customer data (UPDATED) - Healthcare IT News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Security firm Carbon Black awoke to a damning report Wednesday morning about a severe flaw in one of its top software products: Sensitive corporate data from some major companies -- clients of Carbon Black -- have been found on multi-scanner services. The report from DirectDefense, a managed security strategies provider, ties the data leak to an API key that the company claims belongs to Carbon Black Cb Response, a next-generation anti-malware endpoint detection and response tool <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/mind-uploading\/carbon-black-may-be-leaking-terabytes-of-customer-data-updated-healthcare-it-news\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187745],"tags":[],"class_list":["post-211308","post","type-post","status-publish","format-standard","hentry","category-mind-uploading"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211308"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=211308"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211308\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=211308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=211308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=211308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}