AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to Computer Support/Help/Discussion... <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
TheCivvie | All | CRYPTO-GRAM, March 15, 2022 |
March 15, 2022 3:11 PM * |
|||
Crypto-Gram March 15, 2022 by Bruce Schneier Fellow and Lecturer, Harvard Kennedy School schneier@schneier.com https://www.schneier.com A free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. For back issues, or to subscribe, visit Crypto-Gram's web page. Read this issue on the web These same essays and news items appear in the Schneier on Security blog, along with a lively and intelligent comment section. An RSS feed is available. ** *** ***** ******* *********** ************* In this issue: If these links don't work in your email client, try reading this issue of Crypto-Gram on the web. Secret CIA Data Collection Program Vendors are Fixing Security Flaws Faster Possible Government Surveillance of the Otter.ai Transcription App Stealing Bicycles by Swapping QR Codes A New Cybersecurity "Social Contract" Bypassing Apples AirTag Security An Elaborate Employment Con in the Internet Age Privacy Violating COVID Tests Insurance Coverage for NotPetya Losses Decrypting Hive Ransomware Data Vulnerability in Stalkerware Apps Details of an NSA Hacking Operation Samsung Encryption Flaw Hacking Alexa through Alexas Speech Using Radar to Read Body Language Fraud on Zelle Wheres the Russia-Ukraine Cyberwar? Leak of Russian Censorship Data Upcoming Speaking Events ** *** ***** ******* *********** ************* Secret CIA Data Collection Program [2022.02.15] Two US senators claim that the CIA has been running an unregulated -- and almost certainly illegal -- mass surveillance program on Americans. The senators statement. Some declassified information from the CIA. No real details yet. ** *** ***** ******* *********** ************* Vendors are Fixing Security Flaws Faster [2022.02.16] Googles Project Zero is reporting that software vendors are patching their code faster. tl;dr In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago. In addition to the average now being well below the 90-day deadline, we have also seen a dropoff in vendors missing the deadline (or the additional 14-day grace period). In 2021, only one bug exceeded its fix deadline, though 14% of bugs required the grace period. Differences in the amount of time it takes a vendor/product to ship a fix to users reflects their product design, development practices, update cadence, and general processes towards security reports. We hope that this comparison can showcase best practices, and encourage vendors to experiment with new policies. This data aggregation and analysis is relatively new for Project Zero, but we hope to do it more in the future. We encourage all vendors to consider publishing aggregate data on their time-to-fix and time-to-patch for externally reported vulnerabilities, as well as more data sharing and transparency in general. ** *** ***** ******* *********** ************* Possible Government Surveillance of the Otter.ai Transcription App [2022.02.17] A reporter interviews a Uyghur human-rights advocate, and uses the Otter.ai transcription app. The next day, I received an odd note from Otter.ai, the automated transcription app that I had used to record the interview. It read: Hey Phelim, to help us improve your Otters experience, what was the purpose of this particular recording with titled Mustafa Aksu created at 2021-11-08 11:02:41? Customer service or Chinese surveillance? Turns out its hard to tell. EDITED TO ADD (3/12): Another article. ** *** ***** ******* *********** ************* Stealing Bicycles by Swapping QR Codes [2022.02.21] This is a clever hack against those bike-rental kiosks: Theyre stealing Citi Bikes by switching the QR scan codes on two bicycles near each other at a docking station, then waiting for an unsuspecting cyclist to try to unlock a bike with his or her smartphone app. The app doesnt work for the rider but does free up the nearby Citi Bike with the switched code, where a thief is waiting, jumps on the bicycle and rides off. Presumably theyre using camera, printers, and stickers to swap the codes on the bikes. And presumably the victim is charged for not returning the stolen bicycle. This story is from last year, but I hadnt seen it before. Theres a video of one theft at the link. ** *** ***** ******* *********** ************* A New Cybersecurity "Social Contract" [2022.02.22] The US National Cyber Director Chris Inglis wrote an essay outlining a new social contract for the cyber age: The United States needs a new social contract for the digital age -- one that meaningfully alters the relationship between public and private sectors and proposes a new set of obligations for each. Such a shift is momentous but not without precedent. From the Pure Food and Drug Act of 1906 to the Clean Air Act of 1963 and the public-private revolution in airline safety in the 1990s, the United States has made important adjustments following profound changes in the economy and technology. A similarly innovative shift in the cyber-realm will likely require an intense process of development and iteration. Still, its contours are already clear: the private sector must prioritize long-term investments in a digital ecosystem that equitably distributes the burden of cyberdefense. Government, in turn, must provide more timely and comprehensive threat information while simultaneously treating industry as a vital partner. Finally, both the public and private sectors must commit to moving toward true collaboration -- contributing resources, attention, expertise, and people toward institutions designed to prevent, counter, and recover from cyber-incidents. The devil is in the details, of course, but hes 100% right when he writes that the market cannot solve this: that the incentives are all wrong. While he never actually uses the word regulation, the future he postulates wont be possible without it. Regulation is how society aligns market incentives with its own values. He also leaves out the NSA -- whose effectiveness rests on all of these global insecurities -- and the FBI, whose incessant push for encryption backdoors goes against his vision of increased cybersecurity. Im not sure how hes going to get them on board. Or the surveillance capitalists, for that matter. A lot of what he wants will require reining in that particular business model. Good essay -- worth reading in full. ** *** ***** ******* *********** ************* Bypassing Apples AirTag Security [2022.02.23] A Berlin-based company has developed an AirTag clone that bypasses Apples anti-stalker security systems. Source code for these AirTag clones is available online. So now we have several problems with the system. Apples anti-stalker security only works with iPhones. (Apple wrote an Android app that can detect AirTags, but how many people are going to download it?) And now non-AirTags can piggyback on Apples system without triggering the alarms. Apple didnt think this through nearly as well as it claims to have. I think the general problem is one that I have written about before: designers just dont have intimate threats in mind when building these systems. ** *** ***** ******* *********** ************* An Elaborate Employment Con in the Internet Age [2022.02.24] The story is an old one, but the tech gives it a bunch of new twists: Gemma Brett, a 27-year-old designer from west London, had only been working at Madbird for two weeks when she spotted something strange. Curious about what her commute would be like when the pandemic was over, she searched for the companys office address. The result looked nothing like the videos on Madbirds website of a sleek workspace buzzing with creative-types. Instead, Google Street View showed an upmarket block of flats in Londons Kensington. [...] Using online reverse image searches they dug deeper. They found that almost all the work Madbird claimed as its own had been stolen from elsewhere on the internet -- and that some of the colleagues theyd been messaging online didnt exist. [...] At least six of the most senior employees profiled by Madbird were fake. Their identities stitched together using photos stolen from random corners of the internet and made-up names. They included Madbirds co-founder, Dave Stanfield -- despite him having a LinkedIn profile and Ali referring to him constantly. Some of the duped staff had even received emails from him. Read the whole sad story. Whats amazing is how shallow all the fakery was, and how quickly it all unraveled once people started digging. But until theres suspicion enough to dig, we take all of these things at face value. And in COVID times, theres no face-to-face anything. ** *** ***** ******* *********** ************* Privacy Violating COVID Tests [2022.02.25] A good lesson in reading the fine print: Cignpost Diagnostics, which trades as ExpressTest and offers �35 tests for holidaymakers, said it holds the right to analyse samples from seals to learn more about human health -- and sell information on to third parties. Individuals are required to give informed consent for their sensitive medical data to be used but customers consent for their DNA to be sold now as buried in Cignposts online documents. Of course, no one ever reads the fine print. EDITED TO ADD (3/12): The original story. ** *** ***** ******* *********** ************* Insurance Coverage for NotPetya Losses [2022.02.28] Tarah Wheeler and Josephine Wolff analyze a recent court decision that the NotPetya attacks are not considered an act of war under the wording of Mercks insurance policy, and that the insurers must pay the $1B+ claim. Wheeler and Wolff argue that the judge did the right thing for the wrong reasons.. ** *** ***** ******* *********** ************* Decrypting Hive Ransomware Data [2022.03.01] Nice piece of research: Abstract: Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in exchange for decryption. As data recovery is impossible if the encryption key is not obtained, some companies suffer from considerable damage, such as the payment of huge amounts of money or the loss of important data. In this paper, we analyzed Hive ransomware, which appeared in June 2021. Hive ransomware has caused immense harm, leading the FBI to issue an alert about it. To minimize the damage caused by Hive Ransomware and to help victims recover their files, we analyzed Hive Ransomware and studied recovery methods. By analyzing the encryption process of Hive ransomware, we confirmed that vulnerabilities exist by using their own encryption algorithm. We have recovered the master key for generating the file encryption key partially, to enable the decryption of data encrypted by Hive ransomware. We recovered 95% of the master key without the attackers RSA private key and decrypted the actual infected data. To the best of our knowledge, this is the first successful attempt at decrypting Hive ransomware. It is expected that our method can be used to reduce the damage caused by Hive ransomware. Heres the flaw: The cryptographic vulnerability identified by the researchers concerns the mechanism by which the master keys are generated and stored, with the ransomware strain only encrypting select portions of the file as opposed to the entire contents using two keystreams derived from the master key. The encryption keystream, which is created from an XOR operation of the two keystreams, is then XORed with the data in alternate blocks to generate the encrypted file. But this technique also makes it possible to guess the keystreams and restore the master key, in turn enabling the decode of encrypted files sans the attackers private key. The researchers said that they were able to weaponize the flaw to devise a method to reliably recover more than 95% of the keys employed during encryption. ** *** ***** ******* *********** ************* Vulnerability in Stalkerware Apps [2022.03.02] TechCrunch is reporting -- but not describing in detail -- a vulnerability in a series of stalkerware apps that exposes personal information of the victims. The vulnerability isnt in the apps installed on the victims phones, but in the website the stalker goes to view the information the app collects. The article is worth reading, less for the description of the vulnerability and more for the shadowy string of companies behind these stalkerware apps. ** *** ***** ******* *********** ************* Details of an NSA Hacking Operation [2022.03.03] Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to map it with Equation Group tools published by the Shadow Brokers (aka some Russian group). ...the scope of victims exceeded 287 targets in 45 countries, including Russia, Japan, Spain, Germany, Italy, etc. The attack lasted for over 10 years. Moreover, one victim in Japan is used as a jump server for further attack. News article. ** *** ***** ******* *********** ************* Samsung Encryption Flaw [2022.03.04] Researchers have found a major encryption flaw in 100 million Samsung Galaxy phones. From the abstract: In this work, we expose the cryptographic design and implementation of Androids Hardware-Backed Keystore in Samsungs Galaxy S8, S9, S10, S20, and S21 flagship devices. We reversed-engineered and provide a detailed description of the cryptographic design and code structure, and we unveil severe design flaws. We present an IV reuse attack on AES-GCM that allows an attacker to extract hardware-protected key material, and a downgrade attack that makes even the latest Samsung devices vulnerable to the IV reuse attack. We demonstrate working key extraction attacks on the latest devices. We also show the implications of our attacks on two higher-level cryptographic protocols between the TrustZone and a remote server: we demonstrate a working FIDO2 WebAuthn login bypass and a compromise of Googles Secure Key Import. Here are the details: As we discussed in Section 3, the wrapping key used to encrypt the key blobs (HDK) is derived using a salt value computed by the Keymaster TA. In v15 and v20-s9 blobs, the salt is a deterministic function that depends only on the application ID and application data (and constant strings), which the Normal World client fully controls. This means that for a given application, all key blobs will be encrypted using the same key. As the blobs are encrypted in AES-GCM mode-of-operation, the security of the resulting encryption scheme depends on its IV values never being reused. Gadzooks. Thats a really embarrassing mistake. GSM needs a new nonce for every encryption. Samsung took a secure cipher mode and implemented it insecurely. News article. ** *** ***** ******* *********** ************* Hacking Alexa through Alexas Speech [2022.03.07] An Alexa can respond to voice commands it issues. This can be exploited: The attack works by using the devices speaker to issue voice commands. As long as the speech contains the device wake word (usually Alexa or Echo) followed by a permissible command, the Echo will carry it out, researchers from Royal Holloway University in London and Italys University of Catania found. Even when devices require verbal confirmation before executing sensitive commands, its trivial to bypass the measure by adding the word yes about six seconds after issuing the command. Attackers can also exploit what the researchers call the FVV, or full voice vulnerability, which allows Echos to make self-issued commands without temporarily reducing the device volume. It does require proximate access, though, at least to set the attack up: It requires only a few seconds of proximity to a vulnerable device while its turned on so an attacker can utter a voice command instructing it to pair with an attackers Bluetooth-enabled device. As long as the device remains within radio range of the Echo, the attacker will be able to issue commands. Research paper. ** *** ***** ******* *********** ************* Using Radar to Read Body Language [2022.03.08] Yet another method of surveillance: Radar can detect you moving closer to a computer and entering its personal space. This might mean the computer can then choose to perform certain actions, like booting up the screen without requiring you to press a button. This kind of interaction already exists in current Google Nest smart displays, though instead of radar, Google employs ultrasonic sound waves to measure a persons distance from the device. When a Nest Hub notices youre moving closer, it highlights current reminders, calendar events, or other important notifications. Proximity alone isnt enough. What if you just ended up walking past the machine and looking in a different direction? To solve this, Soli can capture greater subtleties in movements and gestures, such as body orientation, the pathway you might be taking, and the direction your head is facing -- aided by machine learning algorithms that further refine the data. All this rich radar information helps it better guess if you are indeed about to start an interaction with the device, and what the type of engagement might be. [...] The ATAP team chose to use radar because its one of the more privacy-friendly methods of gathering rich spatial data. (It also has really low latency, works in the dark, and external factors like sound or temperature dont affect it.) Unlike a camera, radar doesnt capture and store distinguishable images of your body, your face, or other means of identification. Its more like an advanced motion sensor, Giusti says. Soli has a detectable range of around 9 feet -- less than most cameras -- but multiple gadgets in your home with the Soli sensor could effectively blanket your space and create an effective mesh network for tracking your whereabouts in a home. Privacy-friendly is a relative term. These technologies are coming. Theyre going to be an essential part of the Internet of Things. ** *** ***** ******* *********** ************* Fraud on Zelle [2022.03.09] Zelle is rife with fraud: Zelles immediacy has also made it a favorite of fraudsters. Other types of bank transfers or transactions involving payment cards typically take at least a day to clear. But once crooks scare or trick victims into handing over money via Zelle, they can siphon away thousands of dollars in seconds. Theres no way for customers -- and in many cases, the banks themselves -- to retrieve the money. [...] Its not clear who is legally liable for such losses. Banks say that returning money to defrauded customers is not their responsibility, since the federal law covering electronic transfers -- known in the industry as Regulation E -- requires them to cover only unauthorized transactions, and the fairly common scam that Mr. Faunce fell prey to tricks people into making the transfers themselves. Victims say because they were duped into sending the money, the transaction is unauthorized. Regulatory guidance has so far been murky. When swindled customers, already upset to find themselves on the hook, search for other means of redress, many are enraged to find out that Zelle is owned and operated by banks. [...] The Zelle network is operated by Early Warning Services, a company created and owned by seven banks: Bank of America, Capital One, JPMorgan Chase, PNC, Truist, U.S. Bank and Wells Fargo. Early Warning, based in Scottsdale, Ariz., manages the systems technical infrastructure. But the 1,425 banks and credit unions that use Zelle can customize the app and add their own security settings. ** *** ***** ******* *********** ************* Wheres the Russia-Ukraine Cyberwar? [2022.03.10] It has been interesting to notice how unimportant and ineffective cyber operations have been in the Russia-Ukraine war. Russia launched a wiper against Ukraine at the beginning, but it was found and neutered. Near as I can tell, the only thing that worked was the disabling of regional KA-SAT SATCOM terminals. Its probably too early to reach any conclusions, but people are starting to write about this, with varying theories. I want to write about this, too, but Im waiting for things to progress more. EDITED TO ADD (3/12): Two additional takes. ** *** ***** ******* *********** ************* Leak of Russian Censorship Data [2022.03.14] The transparency organization Distributed Denial of Secrets has released 800GB of data from Roskomnadzor, the Russian government censorship organization. Specifically, Distributed Denial of Secrets says the data comes from the Roskomnadzor of the Republic of Bashkortostan. The Republic of Bashkortostan is in the west of the country. [...] The data is split into two main categories: a series of over 360,000 files totalling in at 526.9GB and which date up to as recently as March 5, and then two databases that are 290.6GB in size, according to Distributed Denial of Secrets website. ** *** ***** ******* *********** ************* Upcoming Speaking Events [2022.03.14] This is a current list of where and when I am scheduled to speak: Im participating in an online panel discussion on Ukraine and Russia: The Online War, hosted by UMass Amherst, at 5:00 PM Eastern on March 31, 2022. Im speaking at Future Summits in Antwerp, Belgium on May 18, 2022. Im speaking at IT-S Now 2022 in Vienna on June 2, 2022. Im speaking at the 14th International Conference on Cyber Conflict, CyCon 2022, in Tallinn, Estonia on June 3, 2022. Im speaking at the RSA Conference 2022 in San Francisco, June 6-9, 2022. Im speaking at the Dublin Tech Summit in Dublin, Ireland, June 15-16, 2022. The list is maintained on this page. ** *** ***** ******* *********** ************* Since 1998, CRYPTO-GRAM has been a free monthly newsletter providing summaries, analyses, insights, and commentaries on security technology. To subscribe, or to read back issues, see Crypto-Gram's web page. You can also read these articles on my blog, Schneier on Security. Please feel free to forward CRYPTO-GRAM, in whole or in part, to colleagues and friends who will find it valuable. Permission is also granted to reprint CRYPTO-GRAM, as long as it is reprinted in its entirety. Bruce Schneier is an internationally renowned security technologist, called a security guru by the Economist. He is the author of over one dozen books -- including his latest, We Have Root -- as well as hundreds of articles, essays, and academic papers. His newsletter and blog are read by over 250,000 people. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc. Copyright 2022 by Bruce Schneier. ** *** ***** ******* *********** ************* --- GoldED+/W64-MSVC 1.1.5-b20180707 * Origin: TC on Micronet Daily (618:500/14.1) |
||||||
|
Previous Message | Next Message | Back to Computer Support/Help/Discussion... <-- <--- | Return to Home Page |
Execution Time: 0.0168 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |