Upload
vobao
View
215
Download
1
Embed Size (px)
Citation preview
FBI Claims Hacker Made Plane Fly Sideways
P1
Phantom Menace Attacker Set Sights on Oil
Companies P2
United Airlines Rolls Out Bug Bounty P2
Hackers Target Starbucks Mobile Payments
App P3
Google: Account Recovery Security Questions
Not Very Secure P4
More bad news: The bad guys are getting
better P5
InfoSEC Times Abu Dhabi Polytechnic’s Monthly Newsletter on Information Security Issues
Infosec times completed one year
Welcome to the thirteenth edi-
tion of our new newsletter from
the Abu Dhabi Polytechnic
Information Security Engineer-
ing Technology (ISET) Depart-
ment.
In this edition we have collected
news about latest trends in
information security
We would like to encourage
and invite our readers in con-
tributing to the development of
this newsletter so that we may
keep everyone informed with
the current issues that may
affect us all in the ever increas-
ing world of computers and
technology.
FBI Claims Hacker Made Plane Fly Side-
ways The FBI has accused a security researcher of hacking a
plane’s on-board computers to make it fly sideways during
a flight.
The details emerged in a search warrant applica-
tion produced by the Feds to examine the accused’s lap-
tops, hard drives and other computer equipment for evi-
dence.
It claims that in two interviews with the FBI in February
and March this year, One World Labs founder Chris Rob-
erts admitted identifying vulnerabilities in the in-flight
entertainment (IFE) systems on Boeing 737-800, 737-900,
757-200 and Airbus A-320 aircraft.
He’s said to have compromised these systems 15 to 20
times between 2011 and 2014, gaining physical access by
“wiggling and squeezing” the seat electronic box (SEB)
installed under the seat in front of him.
After doing so, Roberts would apparently use an Ethernet
cable to hook up his laptop and then hack the IFE system.
The affidavit continues:
“He stated that he then overwrote code on the airplane’s Thrust
Management Computer while aboard a flight. He stated that he
successfully commanded the system he had accessed to issue the
‘CLB’ or climb command. He said that he thereby caused one of
the airplane engines to climb resulting in a lateral or sideways
movement of the plane during one of these flights. He stated that
he used Vortex software after compromising/exploiting or
‘hacking’ the airplane’s networks. He used the software to moni-
tor traffic from the cockpit system.”
Although he admits hacking planes’ IFE systems, Roberts
has taken issue with the above.
“That paragraph that’s in there is one paragraph out of a
lot of discussions, so there is context that is obviously miss-
ing which obviously I can’t say anything about,” he
told Wired.
“It would appear from what I’ve seen that the federal guys
took one paragraph out of a lot of discussions and a lot of
meetings and notes and just chose that one as opposed to
plenty of others.”
Roberts was first detained for questioning after sending a
now infamous tweet about his activities which got him
kicked off a United Airlines flight in April.
He maintains that he managed to make a plane climb in a
simulated test but has never interfered with these systems
during a real flight.
A statement from Boeing would seem to indicate that such
a hack would be impossible:
“IFE systems on commercial airplanes are isolated from flight
and navigation systems. While these systems receive position
data and have communication links, the design isolates them
from the other systems on airplanes performing critical and
essential functions.”
There’s been widespread condemnation of Roberts’ re-
search in certain quarters, although some security experts
have backed him.
“Research is the lifeblood of the security industry and it is
absolutely imperative for protecting the virtual front line,”
Bloxx CEO Charles Sweeney told Infosecurity.
“The majority of security researchers know and under-
stand the valuable contribution they make, but also re-
spect their role and the need to draw a line between re-
sponsible research and the temptation to ‘have a bit of
fun.’ Yes, this researcher has got a bit carried away but the
incident shouldn't detract from the invaluable work of
researchers in keeping us all safe online.”
18 May 2015
Source: Infosecurity-magazine.com
I S S U E
J u n e 2 0 1 5
13
Security researchers have uncovered a major new targeted attack seemingly
originating from Nigeria and designed to steal official documents which can be
used in follow up 419 scams against oil brokers.
Spain-based Panda Security claimed in a new report, Operation Oil Tanker: The
Phantom Menace, that 10 companies had been hit by the campaign.
However, police can’t begin investigating because none of the firms affected
are prepared to report the crime – preferring to keep quiet for fear of harming
their corporate reputation.
Researchers at Panda managed to trace the attack back to a single actor operat-
ing from a suburb of Nigerian capital Lagos, by tracing the FTP connection
used to send out the stolen data.
They believe that the motive behind the attacks is to grab official proof of prod-
uct documents, used by vendors selling oil to prove the authenticity of their
product to potential buyers.
Such documents can be used in 419 scams, where fraudsters pretending to be
sellers try to persuade brokers to transfer large sums of money as an advance
on the cost of buying oil which doesn’t exist.
The targeted attack campaign was first uncovered when an oil transportation
company in the north-east of England took part in a pilot program to trial a
new advanced endpoint security tool.
They picked up the presence of a suspicious PDF file which had been opened
by a secretary at the company and which led to an attempt to steal her log-in
credentials and send them to a remote computer.
Curiously, the attack did not feature any malware but simply a self-extracting
file, Panda said.
It uses legitimate tools and scripts to modify the Windows registry, collect
usernames and passwords stored in the local mail client and internet browser,
and save them to a text file before uploading them to an external FTP server.
That server contained over 800 files belonging to 10 companies in the same
industry, indicating a sustained targeted attack campaign, the report claimed.
The attack could be traced back to August 2013, meaning it was six months old
by the time Panda Security got involved.
18 May 2015
Infosecurity-magazine.com
Phantom Menace At-
tacker Set Sights on Oil
Companies
In the wake of a high-profile frequent flier account hack, United Airlines
has rolled out a bug bounty program, promising airline miles for vulnera-
bilities. A lot of miles too: up to 1 million for a remote code execution flaw.
“At United, we take your safety, security and privacy seriously,” the airline
said in its announcement. “We utilize best practices and are confident that
our systems are secure. We are committed to protecting our customers'
privacy and the personal data we receive from them, which is why we are
offering a bug bounty program — the first of its kind within the airline
industry.”
In January, it was revealed that high-flying thieves with stolen usernames
and passwords had broken into customer accounts at both American Air-
lines and United, booking trips for themselves using peoples’ stores of fre-
quent flier miles. The login information was pilfered through a third-party
source, and mileage transactions were made on about three dozen United
accounts, and about 10,000 AA accounts were hacked. Talk about flying the
unfriendly skies.
United said that it’s looking for issues that affect the confidentiality, integri-
ty and/or availability of customer or company information. The eligible list
includes: Authentication bypass; bugs on customer-facing websites, the
United app or third-party programs loaded by united.com or its other
online properties; cross-site request forgery (CSRF) and cross-site scripting
(XSS); potential for information disclosure; remote code execution; timing
attacks that prove the existence of a private repository, user or reservation;
and the ability to brute-force reservations, MileagePlus numbers, PINs or
passwords.
Non-customer-facing sites, partner or third-party websites or apps and a
few others are not eligible for bounties. But notably, neither are those in
critical systems like onboard Wi-Fi, entertainment systems or avionics.
The payout structure is based on the severity and impact of bugs (all bugs
must of course be new discoveries). It ranges from the aforementioned 1
million frequent miles to 50,000 for CSRF, XSS and third-party code loaded
by United sites.
Award miles will be provided only to the first researcher who submits a
particular bug, who must be a MileagePlus member in good standing.
“We believe that this program will further bolster our security and allow us
to continue to provide excellent service,” the airline said. “If you think you
have discovered a potential bug that affects our websites, apps and/or
online portals, please let us know. If the submission meets our require-
ments, we’ll gladly reward you for your time and effort.”
18 May 2015
Infosecurity-magazine.com
United Airlines Rolls
Out Bug Bounty
Credit-card hackers are reportedly targeting Starbucks gift card and
mobile payment users around the country. Taking advantage of weak
passwords and the Starbucks auto-reload function, they can steal hun-
dreds of dollars in a matter of minutes—without even knowing the
account number of the card they’re hacking.
The ramifications can be significant: Last year, Starbucks said it pro-
cessed $2 billion in mobile payment transactions, and about one in six
transactions at Starbucks are conducted with the Starbucks app.
Several users have complained of hacking via Facebook. “My account
was hacked this morning,” said one on a page devoted to the issue.
“They got my balance and tried to reload the card with the saved credit
card but the bank stopped it. Had all the hassle of canceling the credit
card, and also because my address and email and phone number was on
there, put in a fraud alert to the credit report companies as well just in
case.”
According to security blogger Bob Sullivan, based on conversations with
an anonymous source who is familiar with the crime, any criminal who
obtains username and password credentials to Starbucks.com can drain
a consumer’s stored value, and attack their linked credit card. And, this
issue has been going on since the beginning of the year, the source told
him.
The issue likely goes back to brute-force password attacks, he said in a
blog. “Because Starbucks’ mobile payment app is so popular, any large
set of stolen credentials is bound to have at least a few combinations
that unlock Starbucks accounts,” he said. “Criminals could also be steal-
ing credentials in other ways—through phishing emails, or keylogging
programs.”
In any event, once logged in, criminals have several options for draining
card values—and this is where Starbucks can come in to help remedy
the issue. The most common: they can transfer balances from the gift
card to another, or combine balances from multiple cards onto a single
other card. It just takes a special, one-time emailed authentication code
to do so, but the two-factor approach is fundamentally flawed. By using
the settings in the Starbucks.com account, hackers can change the email
address linked to the app to one that they control—and can thus have
the code that Starbucks requires for transfers sent directly to them.
There is also a further risk in that the app also stores and displays per-
sonal information about the user, such as their name, full address, phone
number and email address. Criminals could then use this information or
sell it for use in more targeted larger-scale spear-phishing or identity
theft attacks.
As for Starbucks, a spokesperson issued the following statement, and
noted that customers are not responsible for charges or transfers they
didn’t make:
“While I’m not able to comment on an individual customer’s account,
what you’re describing is not connected to mobile payment—linking the
two is inaccurate. We take the obligation to protect customers’ infor-
mation seriously and have safeguards in place to constantly monitor for
fraudulent activity, working closely with financial institutions like all
major retailers. For obvious reasons, we are unable to discuss specific
security measures. Our customers’ security is incredibly important to us
and we take all these concerns seriously.”
But the problem is not that the mobile payments themselves are insecure.
Rather, with auto-reload, accounts are automatically topped up from a
linked bank account when the balance falls below a certain level, offering
an endlessly replenishing pool of cash to steal. And according to Sullivan,
those stolen, auto-funded Starbucks cards—or more specifically, the elec-
tronic codes behind them—can then be sold on the black market for cash.
Consumers would be none the wiser until they notice the extra transac-
tions coming out of their bank accounts.
“Because the crime is so simple, can escalate quickly, and the consumer
protections controlling the transaction are unclear, I recommend all Star-
bucks consumers immediately disable auto-reload on the Starbucks mo-
bile payments and gift cards,” Sullivan said.
Gavin Reid, VP of threat intelligence at Lancope, said that this highlights
problems with using consumer cards and accounts that are backed up
with either a high limit credit card, or even worse, a checking account.
“Ideally vendors would make this form of compromise harder by using
multi-factor authentication, and the banks themselves would issue one-
time-use account numbers that contain a fixed amount of cash limiting
the loss,” he said via email. “This type of small amount theft can be auto-
mated reusing already exposed credentials.”
Source:Infosecurity-magazine.com
13 May 2015
Hackers Target Starbucks Mobile Payments App
Google: Account Recovery Security Questions Not
Very Secure
An analysis of millions of answers to security questions
show many are predictable and easily guessable, says
Google.
The security questions that many websites ask to help
users gain or recover access to online accounts do little to
improve security. In fact, they are neither reliable nor
secure enough to be used as a standalone authentication mechanism for
account recovery purposes, Google said in a new report.
Researchers at the company analyzed hundreds of millions of answers to
secret questions that people have provided to Google over the years after
forgetting their passwords or being asked to provide additional authenti-
cation to gain access to their accounts.
They then set out to see how easy or difficult it would be for malicious
actors to try and guess those answers and discovered that it is easier than
many might assume.
With a single guess, an attacker would have a nearly 20 percent chance of
accurately guessing that an average English-speaking user’s answer to
the security question “What is your favorite food” would be "pizza."
In about 10 guesses, they’d have the correct answer to an Arabic-
speaking user’s first teacher’s name, a 21 percent chance of guessing a
Spanish-speaking user’s father’s middle name, a nearly four in 10 chance
of guessing a Korean user’s city of birth and a 43 percent chance of cor-
rectly guessing their favorite food.
One problem, according to Google researchers Elie Bursztein and Ilan
Caron is that people often tend to fib when choosing their responses to
security questions. A survey of Internet users that Google conducted
showed that about 37 percent admitted to providing fake answers to
security questions apparently in a bid to make them harder to guess, the
two researchers wrote in their blog post announcing the results of their
analysis.
Ironically, this behavior only has the effect of making such answers easier
to guess because people on aggregate tend to make their answers harder
in a predictable way, the researchers said. Many users for instance had
identical answers even to questions that should have generated unique
responses, like "what’s your frequent flier number." That’s because in
choosing to provide a fake answer, people tend to gravitate towards a
predictable set of answers, the Google researchers said.
“People intentionally provide false answers to their questions thinking
this will make them harder to guess. However this ends up backfiring
because people choose the same (false) answers, and actually increase the
likelihood that an attacker can break in.”
At the same time, people who chose difficult secret questions had a hard
time coming up with the correct response when they needed it. For exam-
ple, secret questions like ‘what’s your library card number’ or ‘what is
your frequent flier number’ are generally very secure but had recall rates
of just 22 percent and 9 percent, Google said. In contrast, easier questions
like those pertaining to a parent’s middle name had a much higher suc-
cess rate.
What the research showed, according to Bursztein and Caron, is that an-
swers to security questions are either somewhat secure or easy to remem-
ber, but seldom both.
Asking users to respond to more than one question can make it much
harder for attackers to break into an account through guesswork, they
noted. But it makes things difficult for users as well. Most users for exam-
ple have little problem remembering the city they were born in or their
father’s middle name. An attacker would only have a 6.9 percent chance
and a 14.6 percent chance of correctly guessing either in 10 tries and an
even slimmer 1 percent chance when confronted with both questions at
the same time.
But the ability for users to remember both answers correctly too drops
from an average of around 75 percent to about 59 percent. “Piling on
more secret questions makes it more difficult for users to recover their
accounts and is not a good solution, as a result,” Bursztein and Caron
said.
A more secure approach for website owners may be to use other authenti-
cation mechanisms such as one time codes sent via SMS or to secondary
email addresses, they said. “These are both safer, and offer a better user
experience,” the researchers said.
Source:darkreading.com
May 22nd 2015
suggests attackers have been developing better ways to maximize the impact
of their work.
At the rate attacks are progressing, Akamai said, security researchers are
concerned about what attackers may be able to accomplish by this time next
year. Add to that the fact that employing current attacks techniques “has not
required much skill,” and even relatively inex-
perienced attackers could be capable of creat-
ing major damage as more potent tools enter
the picture and attack bandwidth increases.
And what, then, to make of the recent news
that the Defense Department is going to take a
“no holds barred” approach with users who
threaten security with sloppy cyber habits?
Bad cyber hygiene “is just eating our shorts,”
according to David Cotton, deputy CIO for
Information Enterprise at the Pentagon.
Users will be given a very short time to comply
with DOD password-security policies or to
change behavior that invites phishing attacks
while using third-party social media accounts. The Pentagon is also pushing
vendors to come up with more timely patches for security vulnerabilities,
though recent research also points to the need to make sure patches are up-
dated on all hosts at the same time.
The DOD, along with the intelligence agencies, is considered to be better at
security than most other parts of the government, so it’s a little startling to
read that the Pentagon’s crackdown as aimed at giving department leader-
ship “a consolidated view of basic network vulnerabilities.”
Isn’t this supposed to be the very first thing organizations do when assessing
security needs? And if the DOD doesn’t even have this bit of the puzzle sort-
ed out, how is it ever going to successfully defend against the threats indicat-
ed by the G Data and Akamai reports?
Perhaps it’s finally time for government organizations to give up on security
that is user focused. The Cloud Security Alliance’s “Dark Cloud” project
could be one way of doing that.
Source: Gcn.com
May 22
If there’s one lesson to be gained from all the security breaches and
revelations of major bugs in security protocols in 2014, it’s that at-
tackers are upping their game and finding more opportunities.
That’s only reinforced by several new studies.
German security company G Data, for example, reported a huge
increase in the number of new malware
strains in the second half of the year -- on
average, a new type was discovered every
3.75 seconds! For the year as a whole, just
under six million new malware strains
were seen in the wild, some 77 percent
more than 2013's total.
Not all kinds of malware saw an increase.
Those using backdoor vulnerabilities in
software fell, for example, and worms and
spyware remained relatively flat. But root-
kits, while still a very small percentage of
the overall number of malware, jumped
more than ten-fold in the second half of
the year.
Rootkits are software included in malware that help to embed the
malicious part of the package in a system and ensure the persistence
of additional attacks by helping the malware evade the scanners and
monitors now used to detect it.
Not surprisingly, malware developers are mainly targeting the ubiq-
uitous Microsoft platforms, with malware programmed as .NET
applications continuing to rise. Overall, new variants for Windows
platforms made up 99.9 percent of the new malware variants.
More problems could arise with Microsoft’s withdrawal of support
for Windows XP in April last year, G Data said, because systems still
using this operating system are “unprotected against attacks on ex-
isting or newly discovered security holes going forward.”
Akamai Technologies' most recent State of the Internet survey simi-
larly reported more than double the number of distributed denial of
service attacks in the first quarter of 2015 compared to first quarter
2014, and over 35 percent the number in the final quarter.
DDoS attacks may not be such a big deal for the public sector, which
gets only around two percent of the total. But Akamai noted a poten-
tially dangerous trend in the 2015 attacks, with peak DDoS attacks of
100 Gbps making up a significantly bigger part of the total. That
More bad news: The bad guys are getting better
InfoSEC Times Issue 13 June 2015
Abu Dhabi Polytechnic, Mohammed Bin Zayed City, PO BOX 111499, Abu Dhabi, UAE
For information and to get involved in the next issue contact :
Dr. Jamal Al-Karaki at:
Phone: +971 2-6951047
Abu Dhabi Polytechnic has success-
fully conducted National Trisec 2015
Cyber security Contest on 20-21
April 2015 from MBZ campus Ab-
udhabi
Students from different universities
and schools in UAE has participated
for coding, hacking and Fixing com-
petition. Welcome note was given by
Dr. Ahmad Al-Awar, managing Di-
rector of IAT.
Winners for the contest were
awarded cash prize. There was
separate competition for Uni-
versity and school level stu-
dents.