A New Hope for Victims of Data Breaches

A New Hope for Victims of Data Breaches

Victims of data breaches have a small reason to rejoice this week.

The post A New Hope for Victims of Data Breaches appeared first on WIRED.

Patch Your OnStar iOS App to Avoid Getting Your Car Hacked

Patch Your OnStar iOS App to Avoid Getting Your Car Hacked

GM admits its fix for a wireless OnStar hack was incomplete and is urging iOS users to update their RemoteLink app.

The post Patch Your OnStar iOS App to Avoid Getting Your Car Hacked appeared first on WIRED.

New attack on Tor can deanonymize hidden services with surprising accuracy

Computer scientists have devised an attack on the Tor privacy network that in certain cases allows them to deanonymize hidden service websites with 88 percent accuracy.

Such hidden services allow people to host websites without end users or anyone else knowing the true IP address of the service. The deanonymization requires the adversary to control the Tor entry point for the computer hosting the hidden service. It also requires the attacker to have previously collected unique network characteristics that can serve as a fingerprint for that particular service. Tor officials say the requirements reduce the effectiveness of the attack. Still, the new research underscores the limits to anonymity on Tor, which journalists, activists, and criminals alike rely on to evade online surveillance and monitoring.

"Our goal is to show that it is possible for a local passive adversary to deanonymize users with hidden service activities without the need to perform end-to-end traffic analysis," the researchers from the Massachusetts Institute of Technology and Qatar Computing Research Institute wrote in a research paper. "We assume that the attacker is able to monitor the traffic between the user and the Tor network. The attacker’s goal is to identify that a user is either operating or connected to a hidden service. In addition, the attacker then aims to identify the hidden service associated with the user."

Read 6 remaining paragraphs | Comments

Beer and Tequila forever! #SophosRetroWeek looks at old-school malware…

Join us on a visit to the past, when malware was...well, different!

Wi-Fi-enabled sniper rifle hacked to change target

Researchers tricked a computer-assisted sniper rifle into firing off-target - specifically, with bulls-eye accuracy at a target they substituted.

OwnStar: Researcher hijacks remote access to OnStar

Samy Kamkar's OwnStar can gain access to GM OnStar cars.

Samy Kamkar, a Los Angeles-based security researcher and hardware hacker, has created a device called OwnStar that can find, unlock, and remote start General Motors cars equipped with OnStar. The hack, which is based on an exploit of OnStar's mobile software communications channel, exposes the credentials of a car's owner when it intercepts communications with OnStar's service. The device will be demonstrated at next week's DefCon security conference in Las Vegas.

The OwnStar device can detect nearby users of the OnStar RemoteLink application on a mobile phone and can then inject packets into the communication stream to the phone, getting it to give up additional information about the user's credentials. Those credentials can then be used to gain access to the vehicle's OnStar account and the full functionality of the OnStar RemoteLink app.

Kamkar says the vulnerability is in the app itself and not the OnStar hardware in GM vehicles. He added that GM and OnStar are working to correct the flaw in the vulnerable mobile application. GM customers who use OnStar can protect themselves for the time being by not using the RemoteLink app.

Read 1 remaining paragraphs | Comments

Major flaw could let lone-wolf hacker bring down huge swaths of Internet

A recently disclosed vulnerability in Bind, the most widely used software for translating human-friendly domain names into IP addresses used by servers, makes it possible for lone-wolf attackers to bring down huge swaths of the Internet, a security researcher has warned.

The flaw, which involves the way that Bind handles some queries related to transaction key records, resides in all major versions of the software from 9.1.0 to 9.8.x, 9.9.0 to 9.9.7-P1, and 9.10.0 to 9.10.2-P2. Attackers can exploit it by sending vulnerable servers a malformed packet that's trivial to create. Vulnerable servers, in turn, will promptly crash. There are no indications that the vulnerability is being actively exploited in the wild, and the bug wasn't disclosed until a fix was in place. Still, the critical vulnerability underscores the fragility of Bind, which despite its three decades in use and unwieldy code remains the staple for the Internet's domain name system.

Rob Graham, CEO of penetration testing firm Errata Security, reviewed some of the Bind source code and the advisory that Bind developers issued earlier this week and made this sobering assessment:

Read 2 remaining paragraphs | Comments

Hackers Could Heist Semis by Exploiting This Satellite Flaw

Hackers Could Heist Semis by Exploiting This Satellite Flaw

Remember the opening scene of the first Fast and Furious film? Heists like these could become easier to pull off.

The post Hackers Could Heist Semis by Exploiting This Satellite Flaw appeared first on WIRED.

This Gadget Hacks GM Cars to Locate, Unlock, and Start Them

This Gadget Hacks GM Cars to Locate, Unlock, and Start Them

Hacker Samy Kamkar shows that the problem of internet-connected cars being vulnerable to hacks just keeps getting bigger.

The post This Gadget Hacks GM Cars to Locate, Unlock, and Start Them appeared first on WIRED.

New vulnerability can put Android phones into permanent vegetative state

Researchers have developed an attack that puts more than 50 percent of Android phones into the digital equivalent of a persistent vegetative state in which they're almost completely unresponsive and are unable to perform most functions, including making or receiving calls.

The vulnerability, which resides in the mediaserver service Android uses to index media files, can most easily be exploited by luring a vulnerable phone to a booby-trapped website. Presumably, the phone can be revived by restarting it, but according to a blog post published Wednesday by a researcher from security firm Trend Micro, the bug can also be exploited by malicious apps. In this latter scenario, the malicious app could be designed to automatically start each time the phone is turned on, causing it to crash shortly after each restart.

Trend Micro researcher Wish Wu wrote:

Read 2 remaining paragraphs | Comments

Hackers Can Disable a Sniper Rifle—Or Change Its Target

Hackers Can Disable a Sniper Rifle—Or Change Its Target

If a hacker attacks your TrackingPoint smart gun over its Wi-Fi connection, you may find the weapon is aiming at a different target than you think.

The post Hackers Can Disable a Sniper Rifle—Or Change Its Target appeared first on WIRED.

[webapps] – Tendoo CMS 1.3 – XSS Vulnerabilities

Tendoo CMS 1.3 - XSS Vulnerabilities

[webapps] – phpFileManager 0.9.8 – CSRF Vulnerability

phpFileManager 0.9.8 - CSRF Vulnerability

Malware on Linux – When Penguins Attack

If you really want to fan the flames of controversy, ask the question, "What about malware on Linux?" We asked...here's what we found out.

How the way you type can shatter anonymity—even on Tor

Security researchers have refined a long-theoretical profiling technique into a highly practical attack that poses a threat to Tor users and anyone else who wants to shield their identity online.

The technique collects user keystrokes as an individual enters usernames, passwords, and other data into a website. After a training session that typically takes less than 10 minutes, the website—or any other site connected to the website—can then determine with a high degree of certainty when the same individual is conducting subsequent online sessions. The profiling works by measuring the minute differences in the way each person presses keys on computer keyboards. Since the pauses between keystrokes and the precise length of time each key is pressed are unique for each person, the profiles act as a sort of digital fingerprint that can betray its owner's identity.

The prospect of widely available databases that identify users based on subtle differences in their typing was unsettling enough to researchers Per Thorsheim and Paul Moore that they have created a Chrome browser plugin that's designed to blunt the threat. The plugin caches the input keystrokes and after a brief delay relays them to the website in at a pseudo-random rate. Thorsheim, a security expert who organizes the annual PasswordsCon conference, and Moore, an information security consultant at UK-based Urity Group, conceived the plugin after thinking through all the ways the typing profiles could be used to compromise online anonymity.

Read 6 remaining paragraphs | Comments

Group that hacked Anthem shared weaponized 0-days with rival attackers

An attack in early 2014 on Anthem, the No. 2 US health insurer, was by most measuring sticks a historic hack, leading to the biggest healthcare data breach ever. New evidence unearthed by researchers from security firm Symantec, however, shows it was business as usual for the hacking group, which over the past three years has carried out more than a dozen similar attacks.

Dubbed Black Vine, the group is well financed enough to have a reliable stream of weaponized exploits for zero-day vulnerabilities in Microsoft's Internet Explorer browser. Since 2012, the gang has brazenly infected websites frequented by executives in the aerospace, energy, military, and technology industries and then used the compromises to siphon blueprints, designs, and other intellectual property from the executives' organizations. The targeting of Anthem appears to reflect more of a secondary interest that was intended to further advance a primary interest in aerospace, energy, and other similar industries rather than to target healthcare information for its own sake.

"If someone just has Vikram's healthcare records, overall there's very little gain," Vikram Thakur, senior security researcher with Symantec, told Ars, as he described the motivations of the Black Vine group hacking Anthem. "But then you get healthcare information about a Vikram working for a government entity or a defense contractor, there is substantial value in that. This is the kind of data that's used in combination with something else to reach an entirely non-healthcare related goal."

Read 8 remaining paragraphs | Comments

The “Stagefright” hole in Android – what you need to know

Here's what you can do to deal with the much-talked-up "Stagefright" messaging vulnerability on Android

iTunes and AppStore remote exploit fixed by Apple

The vulnerability posed "a significant risk to buyers, sellers or Apple website managers/developers".

[webapps] – phpFileManager 0.9.8 – Remote Command Execution Vulnerability

phpFileManager 0.9.8 - Remote Command Execution Vulnerability

A public marketplace for hackers—what could possibly go wrong?

Last November, Charles Tendell quietly launched a website called Hacker's List. Its name was literal. In this online marketplace, white-hat security experts could sell their services in bite-size engagements to people with cyber-problems beyond their grasp.

"Hacker's List is meant to connect consumers who have online issues to hackers or professionals out there who have the skills to service them," Tendell told Ars. "Consumers get bullied online, they lose personal information, they have things stolen from them, they get locked out of things, and they have people post negative things or post personal information. They didn't have a place to go to be able to get help and make sure they're getting the right price or the best person for a particular job. That's what Hacker's List is for."

The idea seemed clever enough. Soon after launch, The New York Times found the site and brought a stampede of traffic that initially caused it to go down under the strain. In the six months or so since, Hacker's List has been running without technical hitches. (The site is also utilizing CloudFlare's content delivery network nowadays.)

Read 19 remaining paragraphs | Comments

Stagefright Android Bug: ‘Heartbleed for Mobile’ But Harder To Patch

Critical vulnerability in Android's multimedia playback engine is easy to exploit, requires no user interaction, and affects 95 percent of Android devices.

The First 24 Hours In The Wake Of A Data Breach

950 million Android phones can be hijacked by malicious text messages

Almost all Android mobile devices available today are susceptible to hacks that can execute malicious code when they are sent a malformed text message or the user is lured to a malicious website, a security researcher reported Monday.

The vulnerability affects about 950 million Android phones and tablets, according to Joshua Drake, vice president of platform research and exploitation at security firm Zimperium. It resides in "Stagefright," an Android code library that processes several widely used media formats. The most serious exploit scenario is the use of a specially modified text message using the multimedia message (MMS) format. All an attacker needs is the phone number of the vulnerable Android phone. From there, the malicious message will surreptitiously execute malicious code on the vulnerable device with no action required by the end user and no indication that anything is amiss.

In a blog post published Monday, Zimperium researchers wrote:

Read 8 remaining paragraphs | Comments

Valve patches security hole that enabled takeover of Steam accounts

Valve has patched a bug in its Steam system that let an attacker easily take over an arbitrary account using nothing but the account's username.

The hijacking exploit took advantage of a hole in Steam's password recovery feature, which sends a recovery code to the registered e-mail address associated with the account. That e-mailed code needs to be entered on a form through the Steam website, but an attacker could simply skip that code entry step, leaving the recovery code area blank, and have full access to the password change dialog, as demonstrated in this video.

In a statement to Kotaku, Valve said it quickly fixed the bug when made aware of it on Saturday, July 25 but that "a subset of Steam accounts" could have been affected since July 21. It's hard to know precisely how often the attack was used in that time, but a number of prominent Counter-Strike: GO streamers and others with well-known Steam usernames seem to have been affected.

Read 2 remaining paragraphs | Comments

Dark web drug dealer pleads guilty, gets 2 years to ponder “anonymity”

He was an online dealer who made use of the so-called Dark Web, shielded by the apparent anonymity of Tor, or The Onion Router. He's not anonymous any more.

[webapps] – Xceedium Xsuite – Multiple Vulnerabilities

Xceedium Xsuite - Multiple Vulnerabilities

[webapps] – WordPress Unite Gallery Lite Plugin 1.4.6 – Multiple Vulnerabilities

WordPress Unite Gallery Lite Plugin 1.4.6 - Multiple Vulnerabilities

[webapps] – WordPress Count Per Day Plugin 3.4 – SQL Injection

WordPress Count Per Day Plugin 3.4 - SQL Injection

[dos] – Libuser Library – Multiple Vulnerabilities

Libuser Library - Multiple Vulnerabilities

Researchers claim they’ve developed a better, faster Tor

Tor, the world's largest and most well-known "onion router" network, offers a degree of anonymity that has made it a popular tool of journalists, dissidents, and everyday Internet users who are trying to avoid government or corporate censorship (as well as Internet drug lords and child pornographers). But one thing that it doesn't offer is speed—its complex encrypted "circuits" bring Web browsing and other tasks to a crawl. That means that users seeking to move larger amounts of data have had to rely on virtual private networks—which while they are anonymous, are much less protected than Tor (since VPN providers—and anyone who has access to their logs—can see who users are).

A group of researchers—Chen Chen, Daniele Enrico Asoni, David Barrera, and Adrian Perrig of the Swiss Federal Institute of Technology (ETH) in Zürich and George Danezis of University College London—may have found a new balance between privacy and performance. In a paper published this week, the group described an anonymizing network called HORNET (High-speed Onion Routing at the NETwork layer), an onion-routing network that could become the next generation of Tor. According to the researchers, HORNET moves anonymized Internet traffic at speeds of up to 93 gigabits per second. And because it sheds parts of Tor's network routing management, it can be scaled to support large numbers of users with minimal overhead, they claim.

Like Tor, HORNET encrypts encapsulated network requests in "onions"—with each layer being decrypted by each node passing the traffic along to retrieve instructions on where to next send the data. But HORNET uses two different onion protocols for protecting anonymity of requests to the open internet and a modified version of Tor's "rendezvous point" negotiation for communication with a site concealed within the HORNET network.

Read 6 remaining paragraphs | Comments

What amateurs can learn from security pros about staying safe online

With the non-stop stream of zero-day exploits, website breaches, and criminal hacking enterprises, it's not always easy to know how best to stay safe online. New research from Google highlights three of the most overlooked security practices among security amateurs—installing security updates promptly, using a password manager, and employing two-factor authentication.

The practices are distilled from a comparison of security practices followed by expert and non-expert computer users. A survey found stark discrepancies in the ways the two groups reported keeping themselves secure. Non security experts listed the top security practice as using antivirus software, followed by using strong passwords, changing passwords frequently, visiting only known websites, and not sharing personal information. Security experts, by contrast, listed the top practice as installing software updates, followed by using unique passwords, using two-factor authentication, choosing strong passwords, and using a password manager.

"Our results show that experts and non-experts follow different practices to protect their security online," the researchers wrote in a research paper being presented at this week's Symposium On Usable Privacy and Security. "The experts' practices are rated as good advice by experts, while those employed by non-experts received mix[ed] ratings from experts. Some non-expert practices were considered 'good' by experts (e.g., install antivirus software, use strong passwords); others were not (e.g. delete cookies, visit only known websites.)"

Read 3 remaining paragraphs | Comments

Execs face the chop after being hit by data breach

With the often perceived need to hold someone to account for a data breach, the axe falls to the heads of senior executives.

Fiat Chrysler recalls 1.4 million cars over remote hack vulnerability

In the wake of the demonstration of a vulnerability in the "connected car" software used in a large number of Chrysler and Dodge vehicles in the United States, Fiat Chrysler NV announced today that it was recalling approximately 1.4 million vehicles for emergency security patches.

The company has already issued a patch on its website for drivers, and on Thursday it performed an over-the-air update of some vehicles to block unauthorized remote access, Bloomberg Business reports. The vulnerability, revealed in a report by Wired earlier this week, allowed security researchers Charlie Miller and Chris Valasek to take remote control of a Jeep Cherokee's onboard computer and entertainment system, remotely controlling the throttle of the vehicle while a Wired reporter was driving it at 70mph on a St. Louis-area interstate highway. Miller and Valasek also demonstrated that they could take control of the vehicle's brakes and (in some cases) even its steering, as well as the vehicle's windshield wipers, navigation, and entertainment systems.

The vehicles covered by the recall include the 2015 model year Dodge Ram pickup, Dodge's Challenger and Viper, and the Jeep Cherokee and Grand Cherokee SUVs. While Fiat Chrysler officials said that there was no known real-world use of the vulnerablity (outside Miller's and Valasek's proof of concept), they were taking the recall step out of "an abundance of caution."

Read on Ars Technica | Comments

SSCC 208 – (Cyber)crime and Punishment [PODCAST]

Join us for the weekly Chet Chat! In this episode: Cybercrime (and punishment), crimeware, the Angler exploit kit, and how the Fourth Amendment applies to social networks.