AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page
   Networked Database  Computer Support/Help/Discussion...   [606 / 1624] RSS
 From   To   Subject   Date/Time 
Message   Sean Rima    All   CRYPTO-GRAM, January 15, 2022   January 16, 2022
 10:11 PM *  

Crypto-Gram 
January 15, 2022

by Bruce Schneier 
Fellow and Lecturer, Harvard Kennedy School  schneier@schneier.com 
https://www.schneier.com

A free monthly newsletter providing summaries, analyses, insights, and 
commentaries on security: computer and otherwise.

For back issues, or to subscribe, visit Crypto-Gram's web page.

Read this issue on the web

These same essays and news items appear in the Schneier on Security blog, along
with a lively and intelligent comment section. An RSS feed is available.

** *** ***** ******* *********** *************

In this issue:

If these links don't work in your email client, try reading this issue of
Crypto-
Gram on the web.

More Log4j News
More on NSO Group and Cytrox: Two Cyberweapons Arms Manufacturers Stolen
Bitcoins Returned
Apple AirTags Are Being Used to Track People and Cars More Russian Cyber
Operations against Ukraine People Are Increasingly Choosing Private Web Search
Norton�s Antivirus Product Now Includes an Ethereum Miner Fake QR Codes on
Parking Meters
Apple�s Private Relay Is Being Blocked Faking an iPhone Reboot
Using Foreign Nationals to Bypass US Surveillance Restrictions Using EM Waves to
Detect Malware
Upcoming Speaking Engagements
** *** ***** ******* *********** *************

More Log4j News

[2021.12.16] Log4j is being exploited by all sorts of attackers, all over the 
Internet:

At that point it was reported that there were over 100 attempts to exploit the 
vulnerability every minute. �Since we started to implement our protection we 
prevented over 1,272,000 attempts to allocate the vulnerability, over 46% of 
those attempts were made by known malicious groups,� said cybersecurity company
Check Point.

And according to Check Point, attackers have now attempted to exploit the flaw
on 
over 40% of global networks.

And a second vulnerability was found, in the patch for the first vulnerability.
This is likely not to be the last.

** *** ***** ******* *********** *************

More on NSO Group and Cytrox: Two Cyberweapons Arms Manufacturers

[2021.12.20] Citizen Lab published another report on the spyware used against
two 
Egyptian nationals. One was hacked by NSO Group�s Pegasus spyware. The other was

hacked both by Pegasus and by the spyware from another cyberweapons arms 
manufacturer: Cytrox.

We haven�t heard a lot about Cytrox and its Predator spyware. According to
Citzen 
Lab:

We conducted Internet scanning for Predator spyware servers and found likely 
Predator customers in Armenia, Egypt, Greece, Indonesia, Madagascar, Oman, Saudi

Arabia, and Serbia.

Cytrox was reported to be part of Intellexa, the so-called �Star Alliance of 
spyware,� which was formed to compete with NSO Group, and which describes itself

as �EU-based and regulated, with six sites and R&D labs throughout Europe.�

In related news, Google�s Project Zero has published a detailed analysis of NSO
Group�s zero-click iMessage exploit: FORCED ENTRY.

Based on our research and findings, we assess this to be one of the most 
technically sophisticated exploits we�ve ever seen, further demonstrating that 
the capabilities NSO provides rival those previously thought to be accessible to

only a handful of nation states.

By the way, this vulnerability was patched on 13 Sep 2021 in iOS 14.8.

** *** ***** ******* *********** *************

Stolen Bitcoins Returned

[2021.12.22] The US has returned $154 million in bitcoins stolen by a Sony 
employee.

However, on December 1, following an investigation in collaboration with
Japanese 
law enforcement authorities, the FBI seized the 3879.16242937 BTC in Ishii�s 
wallet after obtaining the private key, which made it possible to transfer all 
the bitcoins to the FBI�s bitcoin wallet.

** *** ***** ******* *********** *************

Apple AirTags Are Being Used to Track People and Cars

[2021.12.31] This development suprises no one who has been paying attention:

Researchers now believe AirTags, which are equipped with Bluetooth technology, 
could be revealing a more widespread problem of tech-enabled tracking. They emit

a digital signal that can be detected by devices running Apple�s mobile
operating 
system. Those devices then report where an AirTag has last been seen. Unlike 
similar tracking products from competitors such as Tile, Apple added features to

prevent abuse, including notifications like the one Ms. Estrada received and 
automatic beeping. (Tile plans to release a feature to prevent the tracking of 
people next year, a spokeswoman for that company said.)

[...]

A person who doesn�t own an iPhone might have a harder time detecting an
unwanted 
AirTag. AirTags aren�t compatible with Android smartphones. Earlier this month,
Apple released an Android app that can scan for AirTags -- but you have to be 
vigilant enough to download it and proactively use it.

Apple declined to say if it was working with Google on technology that would 
allow Android phones to automatically detect its trackers.

People who said they have been tracked have called Apple�s safeguards 
insufficient. Ms. Estrada said she was notified four hours after her phone first

noticed the rogue gadget. Others said it took days before they were made aware
of 
an unknown AirTag. According to Apple, the timing of the alerts can vary 
depending on the iPhone�s operating system and location settings.

** *** ***** ******* *********** *************

More Russian Cyber Operations against Ukraine

[2022.01.05] Both Russia and Ukraine are preparing for military operations in 
cyberspace.

** *** ***** ******* *********** *************

People Are Increasingly Choosing Private Web Search

[2022.01.06] DuckDuckGo has had a banner year:

And yet, DuckDuckGo. The privacy-oriented search engine netted more than 35 
billion search queries in 2021, a 46.4% jump over 2020 (23.6 billion). That�s 
big. Even so, the company, which bills itself as the �Internet privacy company,�

offering a search engine and other products designed to �empower you to 
seamlessly take control of your personal information online without any 
tradeoffs,� remains a rounding error compared to Google in search.

I use it. It�s not as a good a search engine as Google. Or, at least, Google 
often gets me what I want faster than DuckDuckGo does. To solve that, I use use
the feature that allows me to use Google�s search engine through DuckDuckGo: 
prepend �!Google� to searches. Basically, DuckDuckGo launders my search.

EDITED TO ADD (1/12): I was wrong. DuckDuckGo does not provide privacy 
protections when searching using Google.

** *** ***** ******* *********** *************

Norton�s Antivirus Product Now Includes an Ethereum Miner

[2022.01.07] Norton 360 can now mine Ethereum. It�s opt-in, and the company
keeps 
15%.

It�s hard to uninstall this option.

** *** ***** ******* *********** *************

Fake QR Codes on Parking Meters

[2022.01.10] The City of Austin is warning about QR codes stuck to parking
meters 
that take people to fraudulent payment sites.

** *** ***** ******* *********** *************

Apple�s Private Relay Is Being Blocked

[2022.01.11] Some European cell phone carriers, and now T-Mobile, are blocking 
Apple�s Private Relay anonymous browsing feature.

This could be an interesting battle to watch.

Slashdot thread.

** *** ***** ******* *********** *************

Faking an iPhone Reboot

[2022.01.12] Researchers have figured how how to intercept and fake an iPhone 
reboot:

We�ll dissect the iOS system and show how it�s possible to alter a shutdown 
event, tricking a user that got infected into thinking that the phone has been 
powered off, but in fact, it�s still running. The �NoReboot� approach simulates
a 
real shutdown. The user cannot feel a difference between a real shutdown and a 
�fake shutdown.� There is no user-interface or any button feedback until the
user 
turns the phone back �on.�

It�s a complicated hack, but it works.

Uses are obvious:

Historically, when malware infects an iOS device, it can be removed simply by 
restarting the device, which clears the malware from memory.

However, this technique hooks the shutdown and reboot routines to prevent them 
from ever happening, allowing malware to achieve persistence as the device is 
never actually turned off.

I see this as another manifestation of the security problems that stem from all
controls becoming software controls. Back when the physical buttons actually did

things -- like turn the power, the Wi-Fi, or the camera on and off -- you could
actually know that something was on or off. Now that software controls those 
functions, you can never be sure.

** *** ***** ******* *********** *************

Using Foreign Nationals to Bypass US Surveillance Restrictions

[2022.01.13] Remember when the US and Australian police surreptitiously owned
and 
operated the encrypted cell phone app ANOM? They arrested 800 people in 2021 
based on that operation.

New documents received by Motherboard show that over 100 of those phones were 
shipped to users in the US, far more than previously believed.

What�s most interesting to me about this new information is how the US used the
Australians to get around domestic spying laws:

For legal reasons, the FBI did not monitor outgoing messages from Anom devices 
determined to be inside the U.S. Instead, the Australian Federal Police (AFP) 
monitored them on behalf of the FBI, according to previously published court 
records. In those court records unsealed shortly before the announcement of the
Anom operation, FBI Special Agent Nicholas Cheviron wrote that the FBI received
Anom user data three times a week, which contained the messages of all of the 
users of Anom with some exceptions, including �the messages of approximately 15
Anom users in the U.S. sent to any other Anom device.�

[...]

Stewart Baker, partner at Steptoe & Johnson LLP, and Bryce Klehm, associate 
editor of Lawfare, previously wrote that �The �threat to life; standard echoes 
the provision of U.S. law that allows communications providers to share user
data 
with law enforcement without legal process under 18 U.S.C. $ 2702. Whether the 
AFP was relying on this provision of U.S. law or a more general moral
imperative 
to take action to prevent imminent threats is not clear.� That section of law 
discusses the voluntary disclosure of customer communications or records.

When asked about the practice of Australian law enforcement monitoring devices 
inside the U.S. on behalf of the FBI, Senator Ron Wyden told Motherboard in a 
statement �Multiple intelligence community officials have confirmed to me, in 
writing, that intelligence agencies cannot ask foreign partners to conduct 
surveillance that the U.S. would be legally prohibited from doing itself. The
FBI 
should follow this same standard. Allegations that the FBI outsourced
warrantless 
surveillance of Americans to a foreign government raise troubling questions
about 
the Justice Department�s oversight of these practices.�

I and others have long suspected that the NSA uses foreign nationals to get 
around restrictions that prevent it from spying on Americans. It is interesting
to see the FBI using the same trick.

** *** ***** ******* *********** *************

Using EM Waves to Detect Malware

[2022.01.14] I don�t even know what I think about this. Researchers have 
developed a malware detection system that uses EM waves: �Obfuscation Revealed:
Leveraging Electromagnetic Signals for Obfuscated Malware Classification.�

Abstract: The Internet of Things (IoT) is constituted of devices that are 
exponentially growing in number and in complexity. They use numerous customized
firmware and hardware, without taking into consideration security issues, which
make them a target for cybercriminals, especially malware authors.

We will present a novel approach of using side channel information to identify 
the kinds of threats that are targeting the device. Using our approach, a
malware 
analyst is able to obtain precise knowledge about malware type and identity,
even 
in the presence of obfuscation techniques which may prevent static or symbolic 
binary analysis. We recorded 100,000 measurement traces from an IoT device 
infected by various in-the-wild malware samples and realistic benign activity. 
Our method does not require any modification on the target device. Thus, it can
be deployed independently from the resources available without any overhead. 
Moreover, our approach has the advantage that it can hardly be detected and 
evaded by the malware authors. In our experiments, we were able to predict three

generic malware types (and one benign class) with an accuracy of 99.82%. Even 
more, our results show that we are able to classify altered malware samples with

unseen obfuscation techniques during the training phase, and to determine what 
kind of obfuscations were applied to the binary, which makes our approach 
particularly useful for malware analysts.

This seems impossible. It�s research, not a commercial product. But it�s 
fascinating if true.

** *** ***** ******* *********** *************

Upcoming Speaking Engagements

[2022.01.14] This is a current list of where and when I am scheduled to speak:

I�m giving an online-only talk on �Securing a World of Physically Capable 
Computers� as part of Teleport�s Security Visionaries 2022 series, on January
18, 
2022.
I�m speaking at IT-S Now 2022 in Vienna on June 2, 2022. I�m speaking at the
14th International Conference on Cyber Conflict, CyCon 2022, 
in Tallinn, Estonia on June 3, 2022. I�m speaking at the RSA Conference 2022 in
San Francisco, June 6-9, 2022. The list is maintained on this page.

** *** ***** ******* *********** *************

Since 1998, CRYPTO-GRAM has been a free monthly newsletter providing summaries,
analyses, insights, and commentaries on security technology. To subscribe, or to

read back issues, see Crypto-Gram's web page.

You can also read these articles on my blog, Schneier on Security.

Please feel free to forward CRYPTO-GRAM, in whole or in part, to colleagues and
friends who will find it valuable. Permission is also granted to reprint CRYPTO-
GRAM, as long as it is reprinted in its entirety.

Bruce Schneier is an internationally renowned security technologist, called a 
security guru by the Economist. He is the author of over one dozen books -- 
including his latest, We Have Root -- as well as hundreds of articles, essays, 
and academic papers. His newsletter and blog are read by over 250,000 people. 
Schneier is a fellow at the Berkman Klein Center for Internet & Society at 
Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a

board member of the Electronic Frontier Foundation, AccessNow, and the Tor 
Project; and an Advisory Board Member of the Electronic Privacy Information 
Center and VerifiedVoting.org. He is the Chief of Security Architecture at 
Inrupt, Inc.

Copyright C 2022 by Bruce Schneier.

** *** ***** ******* *********** *************

Mailing list hosting graciously provided by MailChimp. Sent without web bugs or
link tracking.

--- BBBS/Li6 v4.10 Toy-5
 * Origin: TCOB1 at tcob1.duckdns.org BinkP / Telnet (618:500/14)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0165 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.241108