Privacy, Security Archive

How can journalists and activists (and regular folks) reduce their susceptibility to surveillance?

The recent news of a savvy UAE-based activist thwarting an attempt to compromise his iPhone raises the important issue of state-based surveillance actors and their private sector contractors having sophisticated and effective ways of intercepting communication and using their targets' own devices against them. One problem with modern mobile computing technology is that it's been built around expansive and convenient features, with security and privacy as an afterthought. On the same day I learned about the iPhone exploit, I happened to listen to a re-run of a 2014 Planet Money podcast in which an NPR journalist volunteered to fall victim to his unencrypted internet traffic being captured and analyzed by experts, and what they were able to learn about him, and specifically about the sources and topics of a story he was working on, was alarming.

As the podcast mentions, mobile OS vendors and online services are getting a lot better at encrypting traffic and obscuring metadata, and one of the primary reasons for this was Edward Snowden's revelations about the ubiquity and sophistication of the NSA's surveillance, and by extension, the dangers of surveillance from other state agencies, black hat hackers, and legions of scammers. The Snowden revelations hit Silicon Valley right in the pocketbook, so that did impel a vast new rollout of encryption and bug fixing, but there's still a long way to go.

As a way of both highlighting and trying to fix some of the inherent vulnerabilities of smartphones in particular, Ed Snowden teamed up with famed hardware hacker Bunny Huang have been working on a hardware tool, specifically, a mobile phone case, that monitors the radio signals from a device and reports to the user what's really being transmitted. They explain their project in a fascinating article at PubPub.

Mobile phones provide a wide attack surface, since their multitude of apps are sharing data with the network at all times, and even if the core data is encrypted, a lot can be gleaned from metadata and snippets of unencrypted data that leak through. Journalists and activists generally know this, and often use Airplane Mode when they're worried their location may be tracked. Problem is, when agencies are using spearphishing attacks to remotely jailbreak iPhones and install tracking software, and there are even fears that OS vendors themselves might be cooperating with authorities, Snowden and Huang set out to allow users to monitor their devices in a way that doesn't implicitly trust the device's user interface, which may be hiding the fact that it's transmitting data when it says it's not. The article goes into great detail about the options they considered, and the specific design they've worked down to, and it looks terrific.

Apple releases security patch after iPhone zero day exploit used on UAE political dissident

Ahmed Mansoor is an internationally recognized human rights defender, based in the United Arab Emirates (UAE), and recipient of the Martin Ennals Award (sometimes referred to as a “Nobel Prize for human rights”). On August 10 and 11, 2016, Mansoor received SMS text messages on his iPhone promising “new secrets” about detainees tortured in UAE jails if he clicked on an included link. Instead of clicking, Mansoor sent the messages to Citizen Lab researchers. We recognized the links as belonging to an exploit infrastructure connected to NSO Group, an Israel-based “cyber war” company that sells Pegasus, a government-exclusive “lawful intercept” spyware product. NSO Group is reportedly owned by an American venture capital firm, Francisco Partners Management.

The ensuing investigation, a collaboration between researchers from Citizen Lab and from Lookout Security, determined that the links led to a chain of zero-day exploits (“zero-days”) that would have remotely jailbroken Mansoor’s stock iPhone 6 and installed sophisticated spyware. We are calling this exploit chain Trident. Once infected, Mansoor’s phone would have become a digital spy in his pocket, capable of employing his iPhone’s camera and microphone to snoop on activity in the vicinity of the device, recording his WhatsApp and Viber calls, logging messages sent in mobile chat apps, and tracking his movements.

Getting started with Tails, the encrypted operating system

A step-by-step guide on how to download, install, and start using Tails, the world's most secure platform.

Tails, an encrypted and anonymous OS that bundles widely used open source privacy tools on a tiny device, is one of the most secure operating systems in the world. The Linux distribution rose to popularity when it was revealed Edward Snowden relied on Tails to secure his identity while sharing NSA secrets with journalists Glenn Greenwald and Laura Poitras. In the past half decade, Tails has been embraced as an essential security suite by journalists, hackers, and IT workers.

“Antivirus products could let hackers hijack computers”

Symantec and Norton are among the most popular security tools, but the U.S. Department of Homeland Security warns of critical flaws that could pose great risks.

A slew of corporate, government and personal computers are protected by Symantec, but are they really protected? Homeland Security believes there's reason to worry, and has issued a warning this week.

"Symantec and Norton branded antivirus products contain multiple vulnerabilities. Some of these products are in widespread use throughout government and industry," notes the alert. "Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system."

My deep dislike and mistrust for antivirus peddlers and their shady business practices are known around these parts, so none of this obviously surprises me in the slightest. These are companies fooling otherwise fantastic websites like Ars Technica into publishing FUD articles about OS X/iOS/Android/Linux/BeOS/MULTICS eating all your documents and murdering your firstborn unlessyoubuytheirproductswhichareototallynotresourcehogsandreallyarentuselesspiecesofjunk, so I'm not surprised their products are insecure.

Since I'm anything but oblivious to the irony of posting this story (in fact, it's one of the prime reasons to post this), be sure to read the source note from the U.S. Department of Homeland Security to make up your own mind.

Pokemon Go is a huge security risk on iOS

Let me be clear - Pokemon Go and Niantic can now:

  • Read all your email
  • Send email as you
  • Access all your Google drive documents (including deleting them)
  • Look at your search history and your Maps navigation history
  • Access any private photos you may store in Google Photos
  • And a whole lot more

What's more, given the use of email as an authentication mechanism (think "Forgot password" links) they now have a pretty good chance of gaining access to your accounts on other sites too.

This only applies to iOS, so Android users seem to have nothing to worry about. The fault lies with Niantic, so let's hope they fix it soon.

WhatsApp is now fully encrypted, end-to-end, on all platforms

Over the past year, we've been progressively rolling out Signal Protocol support for all WhatsApp communication across all WhatsApp clients. This includes chats, group chats, attachments, voice notes, and voice calls across Android, iPhone, Windows Phone, Nokia S40, Nokia S60, Blackberry, and BB10.

As of today, the integration is fully complete. Users running the most recent versions of WhatsApp on any platform now get full end to end encryption for every message they send and every WhatsApp call they make when communicating with each other. This includes all the benefits of the Signal Protocol - a modern, open source, forward secure, strong encryption protocol for asynchronous messaging systems, designed to make end-to-end encrypted messaging as seamless as possible.

WhatsApp is the most popular messaging protocol in the world (in my own country it's effectively at 100% market share), so to see it do end-to-end encryption is a huge deal.

New York Times, BBC, others hit by ‘ransomware’ malvertising

The attack, which was targeted at US users, hit websites including the New York Times, the BBC, AOL and the NFL over the weekend. Combined, the targeted sites have traffic in the billions of visitors.

The malware was delivered through multiple ad networks, and used a number of vulnerabilities, including a recently-patched flaw in Microsoft's former Flash competitor Silverlight, which was discontinued in 2013.

That's why we have adblockers.

New bill looks to save smartphone encryption from state bans

Rep. Ted Lieu (D-CA) and Rep. Blake Farenthold (R-TX) are introducing a bill today to effectively override bad state-level encryption bills. The ENCRYPT Act of 2016, or by its longer name, the Ensuring National Constitutional Rights of Your Private Telecommunications Act, would preempt state and local government encryption laws. The two men said today they are "deeply concerned" that varying bills surrounding encryption would endanger the country as well as the competitiveness of American companies. The argument is that it wouldn't be easy or even feasible to tailor phone encryption capabilities for specific states.

We're going to need a lot of these laws - all over the world.

Dutch government says no to backdoors, slides $540k to OpenSSL

The Dutch government has formally opposed the introduction of backdoors in encryption products.

A government position paper, published by the Ministry of Security and Justice on Monday and signed by the security and business ministers, concludes that "the government believes that it is currently not appropriate to adopt restrictive legal measures against the development, availability and use of encryption within the Netherlands."

The conclusion comes at the end of a five-page run-through of the arguments for greater encryption and the counter-arguments for allowing the authorities access to the information.

The word "currently" worries me, but this is good news.

Backdoors embedded in Juniper Firewalls

On Thursday, tech giant Juniper Networks revealed in a startling announcement that it had found "unauthorized" code embedded in an operating system running on some of its firewalls.

The code, which appears to have been in multiple versions of the company's ScreenOS software going back to at least August 2012, would have allowed attackers to take complete control of Juniper NetScreen firewalls running the affected software. It also would allow attackers, if they had ample resources and skills, to separately decrypt encrypted traffic running through the Virtual Private Network, or VPN, on the firewalls.

The security community is particularly alarmed because at least one of the backdoors appears to be the work of a sophisticated nation-state attacker.

Merry Christmas, everybody.

Superfish 2.0: now Dell is breaking HTTPS

From the good women and men over at the EFF:

Earlier this year it was revealed that Lenovo was shipping computers preloaded with software called Superfish, which installed its own HTTPS root certificate on affected computers. That in and of itself wouldn't be so bad, except Superfish's certificates all used the same private key. That meant all the affected computers were vulnerable to a "man in the middle" attack in which an attacker could use that private key to eavesdrop on users' encrypted connections to websites, and even impersonate other websites.

Now it appears that Dell has done the same thing, shipping laptops pre-installed with an HTTPS root certificate issued by Dell, known as eDellRoot. The certificate could allow malicious software or an attacker to impersonate Google, your bank, or any other website. It could also allow an attacker to install malicious code that has a valid signature, bypassing Windows security controls. The security team for the Chrome browser appears to have already revoked the certificate. People can test if their computer is affected by the bogus certificate by following this link.

Did you buy a Dell computer during your Black Friday shopping thing over there in the US? Might want to look it over before handing it your loved one.

Alternatively, just buy a Mac and don't deal with this nonsense.

Email from a married, female Ashley Madison user

Ever since I wrote on Thursday about the Ashley Madison hack and resulting reactions and consequences, I've heard from dozens of people who used the site. They offer a remarkably wide range of reasons for having done so. I'm posting below one email I received that I find particularly illuminating, which I very lightly edited to correct a few obvious typographical errors.

It gets even worse than this email. There are gay men and women in countries where being gay is punishable by death, who were using this site to meet other gay men and women, in secret. This hack will out them, possibly leading to their death.

This hack and spreading of private information is just as bad as any other, similar hacks. Despicable as it is, cheating is not a crime, and even if it were, do we really want to live in a world with mob justice? And yes, the parent company in this particular case isn't exactly of clear conscience, but that's no reason to throw its users under the bus - or have them murdered by barbaric, mediaeval governments.

I know a lot of people like the world to be black and white, because it's simple, easy to understand, and doesn't strain the brain. Sadly for them, that's not how the world works.

Thunderstrike 2: Mac firmware worm details

This is the annotated transcript of our DefCon 23/BlackHat 2015 talk, which presented the full details of Thunderstrike 2, the first firmware worm for Apple's Macs that can spread via both software or Thunderbolt hardware accessories and writes itself to the boot flash on the system's motherboard. The original slides are available.

While I think it's unlikely this worm will pose any real threat in the real world, I find it amazing that we're living in a world where this is possible in the first place.

Online dating website for cheaters gets hacked

Ashley Madison, an online dating website that specifically targets people looking to have an affair, has been hacked by a group that calls itself Impact Team. A cache of data has been released by the Impact Team, including user profiles, company financial records, and "other proprietary information." The company's CEO, Noel Bilderman, confirmed with KrebsOnSecurity that they had been hacked, but did not speak about the extent of the breach.

I'm really surprised by the amount of comments online stating that this is not a problem, because they're just "cheaters" anyway, so they don't deserve privacy, right?

Cheating on your "loved" one is despicable, low, and disgusting (and an immediate, unequivocal relationship/friendship termination in my book), but one, it's not illegal, and two, even if it were, mob justice is not the way to go. This hack and possible release of personal information is just as bad as any other hack.

Hacking Team Android App Could Bypass Google Play Code Review

"Security researchers at Trend Micro's Trend Labs have uncovered a trick in a sample of a fake news application for Android created by the network exploitation tool provider Hacking Team that may have allowed the company's customers to sneak spyware through the Google Play store's code review. While the application in question may have only been downloaded fewer than 50 times from Google Play, the technique may have been used in other Android apps developed for Hacking Team customers--and may now be copied by others trying to get malware onto Android devices." OSNews readers would have never fallen for this ruse, since the name of the app was BeNews. Once we noticed there was nothing about BeOS in these, we discern its nefarious intent.

Hacking Team hacked, attackers claim 400GB in dumped data

On Sunday, while most of Twitter was watching the Women's World Cup - an amazing game from start to finish - one of the world's most notorious security firms was being hacked.

Specializing in surveillance technology, Hacking Team is now learning how it feels to have their internal matters exposed to the world, and privacy advocates are enjoying a bit of schadenfreude at their expense.

Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcement agencies.

Feels poetic.

‘Cyber is just pounding me from every direction’

Texas representative John Carter, chairman of the subcommittee on Homeland Security appropriations, and who sits on various other defense-related subcommittees, is hearing about cyber a lot these days. As he put it, "cyber is just pounding me from every direction." That's just the first few seconds of the very entertaining video, where Carter tries to find the right words to express his concern over new encryption standards from Apple and others.

You may laugh about this, but... These are the people running the most powerful military of the world.

The CIA campaign to steal Apple’s secrets

Researchers working with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple's iPhones and iPads, according to top-secret documents obtained by The Intercept.

The security researchers presented their latest tactics and achievements at a secret annual gathering, called the "Jamboree," where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.

Outrage something something not surprised exclamation point.