In this short video, view the major features of our encrypted LINK app.
LINK is integrated with iManage, NetDocuments, and eDocs DMS as well as Outlook and SharePoint. LINK enables essential workflows in a single app. Review, annotate, compare, and email files. Edit securely with the Word App.
Want to learn more? Email us at: contact at mobilehelix dot com.
Kaseya VSA is used by IT organizations and many Managed Service Providers (MSPs) to track IT assets and to deliver software installations and patches to a network of endpoint nodes.
Over the 4th of July weekend, a ransomware attack perpetrated by the REvil gang and its affiliates was delivered through the Kaseya VSA remote management software.
Each Windows node on the network runs a Kaseya agent, which is responsible for downloading and installing patches and software packages from the VSA server. It is common practice for an MSP to use a single VSA server to manage all of the MSP’s client networks, meaning that one compromised VSA server can create a downstream impact on hundreds of individual businesses.
1,500 businesses may be effected.
The fascinating anatomy of the hack
REvil’s successful hack began with an SQL injection attack against the VSA server. The attacked VSA servers were exposed to the Internet, presumably to allow for remote access to the VSA server by an MSP’s employees. An SQL injection attack was crafted by the hackers to (a) bypass authentication, (b) upload a file, and (c) inject a command to distribute a malicious software patch. This software patch was then dutifully downloaded by Kaseya agents installed on Windows endpoints attached to the compromised VSA server. The technical details of how this was accomplished are explained quite clearly in this article by Sophos.
The hack itself is fascinating from a technical perspective in multiple ways. First, an authentication bypass renders an entire stack of security technology (authentication providers and MFA) entirely irrelevant. There is no password guessing or credential stealing involved in this attack. Second, the MSP model where client networks are intermingled in a single VSA instance is inherently dangerous in that a single compromised server (whether it be a via a 0-day exploit or a more traditional stolen credential) can spread malicious software across many disparate organizations, geographies, and networks. Third, it is perturbing that a piece of software like the VSA server was directly exposed to the Internet. The lack of any intervening, independent authentication (e.g., a VPN or IIS authentication using certificates or Kerberos) places an inordinate amount of trust in the security architecture of a single piece of software (the VSA server).
In general, the best way to mitigate hacks of all varieties is to apply a few principles:
Keep independent networks as separate as possible, and always require authentication to move between them.
Authenticate users and devices in layers that rely on disparate software stacks. Software is built by humans, and humans make mistakes that cause security vulnerabilities. Using independent software stacks to layer together multiple forms of authentication ensures that a hacker has to find multiple, independent mistakes that are exploitable in conjunction.
Because there is still no perfect way to prevent endpoint attacks from happening, effective endpoint protection is essential. The Kaseya exploit relied on anti-virus exceptions on the endpoint to allow a malicious file to be downloaded, decoded into an executable, and run via a shell command. This malicious executable then executed a side loading attack to actually launch the encryption process. Effective anomaly detection could have shut down the encrypting process before it got too far, and an alternative approach to using an anti-virus exception would have stopped the attack when it tried to execute the downloaded executable.
A collective reconsideration of how we protect networks and endpoints is overdue
This latest attack from REvil confirms the obvious – the business of ransomware is here to stay. Whether it is REvil, a spinoff from REvil, or an entirely new organization that is inspired by REvil’s success, a collective reconsideration of how we protect networks and endpoints is overdue. It has become standard practice to disable security software in order to enable functionality, rather than demanding the opposite – that software declare its intended behaviors in order to enable security software to detect anomalous behavior.
A system of specific access vs. access to the entire network
Our LINK system is architected with this last principle in mind. Rather than assume that all mobile devices need access to the company network (e.g., via VPN), LINK assumes that only a small number of applications and data repositories should be mobilized. To configure LINK, IT specifies exactly what intranet applications, email servers, and file repositories (Document Management Systems, One Drive, SMB shares, etc.) should be accessible from a mobile device, and this specification is role-based so that IT can take a pessimistic approach to mobile access (i.e., you can’t access anything unless permission is explicitly granted to you). LINK also uses multiple, independent layers of authentication – SSL certificates to authenticate the device, then traditional password-based authentication if the SSL authentication succeeds. Finally, each LINK installation acts as its own certificate authority for the purposes of SSL authentication. Hence, stealing a certificate for one installation does not grant access to any other installations.
As we expand LINK beyond mobile, our goal is to promote a different approach to endpoint computing. This approach starts with the idea that users, applications and data need to be integrated explicitly, rather than implicitly. This creates a work environment that is easily encapsulated, encrypted, and protected with limited entry points and exit points to move data in and out of this environment. While no approach is perfect, the more explicit we are about how users, applications, and data interact, the better chance we have to stop the ransomware business before it expands any further.
We have developed several editing workflows using the Word app over the years. Our newest one is the easiest one which we have seen anywhere. This is in part because our LINK app securely integrates your Document Management System and Email with the Word app. Therefore, you can choose to edit a file from DMS or an email attachment and it will open directly in Word.
Take a look at our 2 minute, 44 second video to see this workflow.
Here’s what you don’t have to do in our workflow:
No need to copy the file in the Word app. LINK encrypts the file and moves it to Word.
No need to save the file as .docx in the Word file. LINK converts .doc to .docx for you.
No need to delete the file from the Word app after editing. LINK deletes it.
This video shows how straightforward it is to edit from LINK with the Word app.
LINK is integrated with iManage Work® 10, on-prem and in the Cloud; NetDocuments DMS; OneDrive; Network File Shares; and OpenText eDocs is in development. LINK is also integrated with Microsoft Exchange, therefore, you have your Outlook Email, Contacts, Calendar, Tasks, and Notes within the LINK App.
If your attorneys are looking for a simple way to edit files in DMS or in Outlook email with the Word app, email me. We are happy to show you a demo of this workflow.
Attorneys have always loved the annotation in LINK because anytime you open a file in LINK, annotation is immediately on the same screen. Whether the file is in DMS or another file share, or whether it’s an attachment to email, it just takes a tap to bring up the annotation menu. Annotate, then tap to email or upload to DMS or a file share.
You can even save your signature and initials in LINK so that you can sign a file with a couple of taps on the annotation menu.
In our new release you’ll see:
Improved location of the annotation menu
New features, including page display settings and grid view
Enhanced layout of the annotation tools, for clearer discoverability
A lighter interface.
We’ve gotten wonderful feedback on these improvements. Thank you!
You can get a quick look at the new UI in this 17 second video:
To see LINK’s annotation in a full workflow, watch this video.
You will see how to use LINK’s split screen, then how to annotate a PDF, and email it.
If it looks simple, that’s because it really is. If you would like to see a demo via Zoom, write to me at: contact at mobilehelix dot com.
This is a fun week for us! With this new release LINK gives you the ability to multi-task on a tablet. We have also refreshed the LINK UI with a lighter look. The feedback has been fantastic. We appreciate the enthusiasm!
The key feature which enables multi-tasking is Split Screen Mode:
Multiple live tabs in each screen
Tabs are files and apps like DMS, Email, Intranet
Drag and drop a file or app
Annotate or compare files in either screen
Keep email open while you work
Here is a 14 second preview of LINK’s new Multi-tasking capabilities.
Let us know if you would like to see a demo of LINK.
Is remote work merely a short-term necessity or will it have legs when it is again safe to work in the law firm office? As we head into one full year of remote work, I set out to see if there were data which would substantiate the direction of remote work.
What I learned paints a compelling rationale for remote work continuing. For some people, it might be for only one or two days a week. But the preference for a hybrid work model is clear.
There are two supporting dynamics:
The economics of remote work were positive in 2020. Law firms will likely make changes, for instance in leases, to capitalize on this going forward.
Attorneys made a positive adjustment to working from home and would like to retain some of that flexibility in the future.
A key law firm financial metric is Profitability per Equity Partner. The results show that for Big Law and mid-sized law firms profitability grew significantly in the 12 months leading up to November of 2020. In part this was due to law firm rate increases established in December 2019 and to the Paycheck Protection Program (PPP), both on the income side.
However, on the expense side, it is also due to law firms cutting overhead expenses in all but two categories, technology and Knowledge Management.
Both of the above charts are from a terrific resource, “2021 Report on the State of the Legal Market” by Thomson Reuters and Georgetown Law Center on Ethics and the Legal Profession. This report is chock full of data. I highly recommend reading it if you work in a law firm. And, as good attorneys say, “read the footnotes” for gems. You may also listen to the podcast, “Was the Pandemic a Tipping Point for Law Firms?” which is based on the report. Bob Ambrogi interviewed Jim Jones, Senior Fellow at Georgetown and Director of its Program on Trends in Law Practice. Mr. Jones is a contributor to the report. He adds interesting color to the report findings in this interview.
A funny thing happened while attorneys toiled from home. They appreciated the benefits. The greatest benefit to attorneys and staff is the time gained by not commuting. For time-keepers the extra hours per week can add up to several days per year of additional billable hours plus additional leisure time to boot.
Now 85% of attorneys want to work from home at least one day per week.
Each year I look forward to Okta’s Businesses at Work report. Okta anonymizes data from its more than 9,400 customer entities. These are customers which use the Okta Identity Network (OIN) with its over 6,500 integrations with cloud, mobile, and web apps, and with IT infrastructure providers. The report is free, not even a registration is needed. To my knowledge no other public report provides this level of data on cloud application usage.
For data lovers it’s a treasure trove of facts about cloud usage. There are over 28 charts and tables. Download it here. I’ll share a few of my favorite insights from the report.
Most Popular Apps by Number of Customers
Microsoft 365 wins. I attended a legal technology conference in 2014. In a session on SharePoint, hosted by Microsoft, the roadmap showed that Outlook, Exchange, and, yes, SharePoint were all moving to the cloud in the form of Office 365. People exited the room in fury. At that time, most law firms were adamant – No Cloud. While there will always be law firms, especially “Big Law,” which will keep Outlook, SharePoint, and the Office Suite on-premises, the adoption of Office 365 or Microsoft 365 in the legal sector has been swift over the past two years. The Okta data reflects this.
This chart shows that the gap in usage between Microsoft 365 and all other applications, including AWS and Salesforce, has only widened in the past 5 years.
Most Popular Video Conferencing Apps
This graph highlights the steep curve in Zoom usage which we all lived through in 2020. At Mobile Helix, we started using Zoom heavily in 2017. We even perform our LINK system deployments remotely over Zoom in about two hours. When the pandemic hit, we were easily able to deploy LINK with IT staff who were themselves working from home. Customers favor our over-Zoom deployment over an on-site visit as it ends up taking less of their time.
Customers Authenticating With Each Factor
Phishing has been up 220% during the pandemic per F5’s2020 Phishing and Fraud Report (an excellent report on phishing). The Okta report quotes, “F5 warns that the login page of our most popular app, Microsoft 365 (M365), is one of the most popular targets for generic phishing because attackers know that stealing Office 365 credentials can grant them access not only to email but also corporate documents, finance, HR, and many other critical business functions.”
Strong Multi-Factor Authentication (MFA) should be used with M365. The chart above shows that of Okta customers authenticating with a factor in addition to, or instead of a password, 82% use Okta Verify. The good news here is that weaker factors such as SMS and security questions are on the decline.
One of the positive conclusions from Okta’s 2021 Businesses at Work report has to be that as difficult as 2020 was, with 38M people applying for unemployment, if it had happened even 10 years earlier, how many people would have been unable to work from home? The growth of web-based applications, cloud-based services, and mobile apps resulted in most office jobs successfully transitioning to work-from-home in two or three weeks.
iOS has solid encryption, there is no backdoor, hence, your firm’s data is safe under lock and key, correct? Not necessarily. Enlightening new research by cryptographers at Johns Hopkins University (1) has surfaced weaknesses in the iOS and Android encryption schemes. Ironically, in the case of iOS, part of the weakness is related to a security hierarchy which is often unused.
“Apple provides interfaces to enable encryption in both first-party and third-party software, using the iOS Data Protection API. Within this package, Apple specifies several encryption “protection classes” that application developers can select when creating new data files and objects. These classes allow developers to specify the security properties of each piece of encrypted data, including whether the keys corresponding to that data will be evicted from memory after the phone is locked (“Complete Protection” or CP) or shut down (“After First Unlock” or AFU) …
… the selection of protection class makes an enormous practical difference in the security afforded by Apple’s file encryption. Since in practice, users reboot their phones only rarely, many phones are routinely carried in a locked-but-authenticated state (AFU). This means that for protection classes other than CP, decryption keys remain available in the device’s memory. Analysis of forensic tools shows that to an attacker who obtains a phone in this state, encryption provides only a modest additional protection over the software security and authentication measures described above.” (JHU – bold is our addition)
The reality is that most of our iPhones are commonly in “After First Unlock” state because we rarely reboot our phones. To achieve maximum security, we would have to power down our iPhones and authenticate after each use. That is, scores or hundreds of times per day. Otherwise, all data in the AFU state is vulnerable to law enforcement agencies or criminals with the right forensic tools. As the Hopkins researchers noted, “Law enforcement agencies, including local departments, can unlock devices with Advanced Services for as cheap as $2,000 USD per phone, and even less in bulk, and commonly do so.”
“There’s great crypto available, but it’s not necessarily in use all the time,” says Maximilian Zinkus, Johns Hopkins University. The Hopkins researchers also extended their analysis to include the vulnerability of iCloud services and device backups:
Device owners may take actions to ensure greater security. Apple Insider cites a few user actions including: Use SOS mode; use the setting which locks iOS devices after 10 failed login attempts; and don’t use iCloud back-ups. But these user-optional mitigations are not adequate for enterprise security, and they don’t address the forensic techniques used to steal data in the AFU state. Enterprises need systematic approaches across all firm-managed devices.
Why Secure Containers Are Needed
Sophisticated attackers and government agencies have a variety of available tools at their disposable to extract sensitive data from a seized or stolen device. The preponderance of evidence shows that law enforcement is largely successful in cracking open a device and extracting sensitive information as needed. Evidence further suggests that these techniques are ported to even the latest iOS versions and devices (take a close look at https://www.grayshift.com/ – they offer the state-of-the-art in device forensics). What can you do to truly protect sensitive data? The built-in capabilities of the operating system are not sufficient.
Secure containers provide an additional layer of encryption by implementing an entirely independent encryption mechanism to protect data. To examine the protection offered by secure contain apps, we will refer to our LINK app in this discussion. LINK not only uses its own, independent encryption scheme, Link also uses its own built-in encryption technology. In other words, the LINK encryption software stands entirely independent from the operating system, regardless of whether that operating system is intact or compromised. As long as encryption keys are protected well, then secure containers can provide the kind of locked-down encryption that law firms want to protect email and documents, which encapsulate a large majority of a firm’s most sensitive data.
LINK’s data protection exceeds iOS in a few significant ways:
LINK is an app, and iOS apps are routinely removed from memory. Hence, while LINK does necessarily keep encryption keys in memory when the app is active, once the app is removed from memory its encryption keys are too. This stands in contrast to iOS’ “AFU” encryption.
LINK allows IT to identify data that is only accessible when the device is online. This makes it awfully difficult to get the encryption keys for that data, especially once the device has been identified as lost or stolen and flagged for a remote wipe.
LINK’s online encryption keys are really hard to guess. Offline keys are hard to guess too, as long as your organization uses complex A-D passwords. Online keys are not derived from a user’s passcode or even a user’s A-D password. LINK’s encryption keys are derived from randomized 32-character strings that are generated on the LINK servers using entropy available on the server. Brute-forcing the key derivation is unlikely to work, which means an attacker would have to compromise the LINK Controller that sits safely inside our customers’ networks, then break the encryption scheme protecting sensitive data stored in our Controller database. Getting LINK data is a lot more complicated than stealing or seizing a mobile device.
LINK aggressively limits the amount of data available on the device, online or offline. We do so by simply expiring away data that sits unused on the device. This is a really simple way to limit exposure without much practical impact on a user. Users can always go back to their email (via search) or to the document management system to find what they were working on. There is no practical reason to store lots of old, unused data on a device that is easy to steal and, as it turns out, compromise once stolen.
LINK’s data is useless when obtained from an iCloud backup or a local backup to a Mac device. LINK’s encryption keys are never backed up. An attacker’s best hope is to brute force both the iOS device passcode and the user’s A-D password before IT notices that the device is lost or stolen. This is incredibly difficult to accomplish given Apple’s built-in protections against brute-forcing passcode and given a reasonably complex, hard-to-guess A-D password.
The JHU research simply reminds us that Apple’s interests diverge widely from those of an individual law firm. Apple has to balance the needs of law enforcement and users to make data accessible while still providing a reasonable degree of protection. Law firms’ best interests lie in maximally protecting data against unauthorized access. In order to achieve this latter goal, Apple’s built-in technology simply won’t suffice.
Seth Hallem is the CEO, Chief Architect, and Co-Founder of Mobile Helix, makers of the LINK App. With LINK professionals can review, annotate, compare, and email files, as well as use the firm intranet, using a single secure container app. www.mobilehelix.com
We are updating the LINK App User Interface, starting with the Home, My Files, Settings, and Login screens. We are redesigning to give you a more polished and consistent appearance throughout LINK as well as to provide improved ease of use.
LINK’s new User Interface is lighter and in keeping with contemporary iOS and Android apps. LINK is now using the OS “system colors” so that features like Dark Mode will be supported in LINK.
Now users may choose their preferred home screen layout, per device. In Settings, select the familiar Grid mode with rows, or the new List mode. List mode is especially useful on a phone so that you can scroll through your apps.
In the LINK Controller the LINK Administrator may setview mode defaults
Always use Grid Mode
Always use List Mode
Grid Mode on Tablets; List Mode on Phones
Users can always override the defaults by using the Settings tab on the Home screen.
Go to the Home screen Settings tab to:
Select Grid or List Mode
Select a default app in LINK. For example, to have LINK open directly to DMS or Email.
We are excited to roll out to you these new enhancements in LINK.