RISKS Forum mailing list archives
Risks Digest 28.86
From: RISKS List Owner <risko () csl sri com>
Date: Fri, 14 Aug 2015 16:04:02 PDT
RISKS-LIST: Risks-Forum Digest Friday 14 August 2015 Volume 28 : Issue 86 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/28.86.html> The current issue can be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: Security Researchers Hack a Car and Apply the Brakes Via Text (Samuel Gibbs) Vulnerability in Automobile immobiliser transponders (Anthony Thorn) Moscow-based antivirus firm Kaspersky Lab faked malware to harm rivals, claim ex-employees (Joseph Menn) Harvard student loses Facebook internship after pointing out privacy flaws (The Boston Globe) "IBM finds another Android phone bug" (Tim Greene) Mass. pot dispensary accidentally shares patients' email addresses (Adam Vaccaro) FTC Files complaints against Sequoia One and Gen X Marketing Group for Misuse of Financial Data (Bob Gezelter) If This is Accurate, It's Unbelievably Bad: "A Traffic Analysis of Windows 10" (Local Ghost) Even when told not to, Windows 10 just can't stop talking to Microsoft (Ars Technica) Lenovo puts crapware (malware?) in the BIOS (Chris Williams via Henry Baker) Audit Shows Extent of Snail Mail Surveillance (Ron Nixonaug) Denmark's most devastating hacker attack? (Donald B. Wagner) Retaliation against China is the wrong reaction to OPM hack (Jeffrey Carr via Henry Baker) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: Fri, 14 Aug 2015 12:35:19 -0400 (EDT) From: ACM TechNews <technews () hq acm org> Subject: Security Researchers Hack a Car and Apply the Brakes Via Text (Samuel Gibbs) Samuel Gibbs, *The Guardian*, 12 Aug 2015 A serious weak point in vehicle security enables hackers to remotely control a vehicle, according to researchers at the University of California, San Diego (UCSD). The team demonstrated the vulnerability on a Corvette by turning on the windshield wipers, applying the brakes, or even disabl[ing] them at low speed. The flaw involves the small black dongles that are connected to the onboard diagnostic ports of vehicles to enable insurance companies and fleet operators to track them and collect data such as fuel efficiency and miles driven. The researchers found the dongles could be hacked by sending them short-message-service text messages, which relay commands to the car's internal systems. ``We acquired some of these things, reverse-engineered them, and along the way found that they had a whole bunch of security deficiencies,'' says UCSD professor Stefan Savage. The researchers warn the compromised dongles enable hackers to control almost any aspect of the car, including steering and locks, and note that any of the thousands of cars equipped with the dongles were potentially vulnerable. The researchers will present their work this week at the Usenix security conference in Washington, D.C. http://orange.hosting.lsoft.com/trk/click?ref=3Dznwrbbrs9_5-df9dx2d22dx062537& ------------------------------ Date: Fri, 14 Aug 2015 11:48:46 +0200 From: Anthony Thorn <anthony.thorn () atss ch> Subject: Vulnerability in Automobile immobiliser transponders The concept of the transponder challenge and response is secure. Unfortunately the execution - (briefly) massively reduced entropy in the 96 bit key, and the use of standard (per manufacturer) or no write protection PIN in the control unit. Two classic RISKS stories - Key entropy and "global keys". More in increasing detail: http://arstechnica.com/security/2015/08/researchers-reveal-electronic-car-lock-hack-after-2-year-injunction-by-volkswagen/ In German: http://www.heise.de/newsticker/meldung/VW-Wegfahrsperre-Volkswagen-Hack-endlich-veroeffentlicht-2778632.html https://www.usenix.org/sites/default/files/sec15_supplement.pdf I won't go into the 2 year delay in publishing caused by an injunction... http://www.itpro.co.uk/security/20313/curious-case-volkswagens-fight-car-hacking-scientists ------------------------------ Date: Fri, 14 Aug 2015 09:54:10 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: Report: Moscow-based antivirus firm Kaspersky Lab faked malware to harm rivals, claim ex-employees (Joseph Menn) Joseph Menn, Reuters via NNSquad http://www.reuters.com/article/2015/08/14/us-kaspersky-rivals-idUSKCN0QJ1CR20150814 "Kaspersky Lab [may have] manipulated false positives off and on for more than 10 years, with the peak period between 2009 and 2013." Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as malicious, according to two former employees. They said the secret campaign targeted Microsoft Corp (MSFT.O), AVG Technologies NV (AVG.N), Avast Software and other rivals, fooling some of them into deleting or disabling important files on their customers' PCs. ------------------------------ Date: Thu, 13 Aug 2015 12:36:22 -0400 From: Monty Solomon <monty () roscom com> Subject: Harvard student loses Facebook internship after pointing out privacy flaws (*The Boston Globe*) http://www.boston.com/news/nation/2015/08/12/harvard-student-loses-facebook-internship-after-pointing-out-privacy-flaws/zASZFdUjn6PoliUiR9kVHJ/story.html ------------------------------ Date: Thu, 13 Aug 2015 16:37:37 -0700 From: Gene Wirchenko <genew () telus net> Subject: "IBM finds another Android phone bug" (Tim Greene) Tim Greene, NetworkWorld, 10 Aug 2015 Flaw means 55 percent of Android phones are vulnerable to being taken over; a patch is available http://www.infoworld.com/article/2968403/mobile-security/ibm-finds-another-android-phone-bug.html ------------------------------ Date: Thu, 13 Aug 2015 19:44:10 -0600 From: Jim Reisert AD1C <jjreisert () alum mit edu> Subject: Mass. pot dispensary accidentally shares patients' email addresses (Adam Vaccaro) Adam Vaccaro, *The Boston Globe*, 13 Aug 2015 Buying medical marijuana in Massachusetts got a little less anonymous Thursday morning, when the state's lone pot dispensary accidentally shared some of its patients' email addresses with other patients. State health officials are investigating. Salem's Alternative Therapies Group sent an email addressed Dear Patient, to 157 email addresses. A copy of the email obtained by Boston.com listed the addresses in the CC line, meaning the recipients could see each other's addresses. The dispensary had meant to send the email as a blind CC, or BCC, which would have kept the email addresses from being seen by all. http://www.boston.com/business/news/2015/08/13/mass-pot-dispensary-accidentally-shares-patients-email-addresses/JLel4hAbjEYMzVhPV2OW4L/story.html [If the dispensary had sent the email from a gmail account, could they have unsent it?] ------------------------------ Date: Wed, 12 Aug 2015 11:43:52 -0700 From: "Bob Gezelter" <gezelter () rlgsc com> Subject: FTC Files complaints against Sequoia One and Gen X Marketing Group for Misuse of Financial Data The FTC has filed complaints against In a complaint filed last week, the agency said that Sequoia One for providing financial and other personal data to third parties, enabling fraudulent bank transactions against over 500,000 payday loan customer accounts, reportedly resulting in excess of US$ 7.1M in fraudulent transactions. The moral is as always: Be careful when providing bank account and PII to third parties. The complete NY Times article is at: http://bits.blogs.nytimes.com/2015/08/12/when-online-loan-applications-lead-to-unauthorized-bank-account-debits Bob Gezelter, http://www.rlgsc.com ------------------------------ Date: Wed, 12 Aug 2015 15:20:26 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: If This is Accurate, It's Unbelievably Bad: "A Traffic Analysis of Windows 10" [I really hope this is *not* accurate! - Lauren] http://localghost.org/posts/a-traffic-analysis-of-windows-10 All text typed on the keyboard is stored in temporary files, and sent (once per 30 mins) to: oca.telemetry.microsoft.com.nsatc.net pre.footprintpredict.com reports.wes.df.telemetry.microsoft.com There isn't a clear purpose for this, considering there there's no autocorrect/prediction anywhere in the OS. The implications of this are significant: because this is an OS-level keylogger, all the data you're trying to transmit securely is now sitting on some MS server. This includes passwords and encrypted chats. This also includes the on-screen keyboard, so there is no way to authenticate to a website without MS also getting your password ... Everything that is said into an enabled microphone is immediately transmitted to: oca.telemetry.microsoft.com oca.telemetry.microsoft.com.nsatc.net vortex-sandbox.data.microsoft.com pre.footprintpredict.com i1.services.social.microsoft.com i1.services.social.microsoft.com.nsatc.net telemetry.appex.bing.net telemetry.urs.microsoft.com cs1.wpc.v0cdn.net statsfe1.ws.microsoft.com If this weren't bad enough, this behaviour still occurs after Cortana is fully disabled/uninstalled ... [and much more - Lauren] ------------------------------ Date: Wed, 12 Aug 2015 21:07:27 -0700 From: Lauren Weinstein <lauren () vortex com> Subject: Even when told not to, Windows 10 just can't stop talking to Microsoft (Ars Technica) http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/ Unfortunately for privacy advocates, these controls don't appear to be sufficient to completely prevent the operating system from going online and communicating with Microsoft's servers. For example, even with Cortana and searching the Web from the Start menu disabled, opening Start and typing will send a request to www.bing.com to request a file called threshold.appcache which appears to contain some Cortana information, even though Cortana is disabled. The request for this file appears to contain a random machine ID that persists across reboots ... Some of the traffic looks harmless but feels like it shouldn't be happening. For example, even with no Live tiles pinned to Start (and hence no obvious need to poll for new tile data), Windows 10 seems to download new tile info from MSN's network from time to time, using unencrypted HTTP to do so. While again the requests contain no identifying information, it's not clear why they're occurring at all, given that they have no corresponding tile. Other traffic looks a little more troublesome. Windows 10 will periodically send data to a Microsoft server named ssw.live.com. This server seems to be used for OneDrive and some other Microsoft services. Windows 10 seems to transmit information to the server even when OneDrive is disabled and log-ins are using a local account that isn't connected to a Microsoft Account. The exact nature of the information being sent isn't clear--it appears to be referencing telemetry settings--and again, it's not clear why any data is being sent at all. ------------------------------ Date: Wed, 12 Aug 2015 16:53:47 -0700 From: Henry Baker <hbaker1 () pipeline com> Subject: Lenovo puts crapware -- malware? -- in the BIOS It's such a short distance between crapware in the BIOS and malware in the BIOS; oh, and need anyone be reminded that Lenovo machines are made in *China* ? Now, why anyone should trust Microsoft, either, after their Windows 10 Privacy^H^H^H^H^H^H^H Spying Policy is beyond me. "To think a manufacturer would essentially rootkit their own machines is testament to how bad things have become." So much for Intel's "root of trust"... Chris Williams, *The Register*, 12 Aug 2015 CAUGHT: Lenovo crams unremovable crapware on Windows laptops by hiding it in the BIOS; And how Microsoft made it possible http://www.theregister.co.uk/2015/08/12/lenovo_firmware_nasty/ Analysis Lenovo has sold laptops bundled with unremovable software that features a bonus exploitable security vulnerability. If the crapware is deleted, or the hard drive wiped and Windows reinstalled from scratch, the laptop's firmware will quietly and automatically reinstall Lenovo's software on the next boot-up. Built into the firmware on the laptops' motherboard is a piece of code called the Lenovo Service Engine (LSE). If Windows is installed, LSE is executed before the Microsoft operating system is launched. LSE makes sure C:\Windows\system32\autochk.exe is Lenovo's variant of the autochk.exe file; if Microsoft's official version is there, it is moved out of the way and replaced. The executable is run during startup, and checks the computer's file system to make sure it's free of any corruption. Lenovo's variant of this system file ensures LenovoUpdate.exe and LenovoCheck.exe are present in the operating system's system32 directory, and if not, it will copy the executables into that directory during boot up. So if you uninstall or delete these programs, the LSE in the firmware will bring them back during the next power-on or reboot. LenovoCheck and LenovoUpdate are executed on startup with full administrator access. Automatically, and rather rudely, they connect to the internet to download and install drivers, a system "optimizer", and whatever else Lenovo wants on your computer. Lenovo's software also phones home to the Chinese giant details of the running system. To pull this off, the LSE exploits Microsoft's Windows Platform Binary Table (WPBT) feature. This allows PC manufacturers and corporate IT to inject drivers, programs and other files into the Windows operating system from the motherboard firmware. The WPBT is stored in the firmware, and tells Windows where in memory it can find an executable called a platform binary to run. Said executable should take care of the job of installing files before the operating system starts. "During operating system initialization, Windows will read the WPBT to obtain the physical memory location of the platform binary," Microsoft's documentation states. "The binary is required to be a native, user-mode application that is executed by the Windows Session Manager during operating system initialization. Windows will write the flat image to disk, and the Session Manager will launch the process." Crucially, the WPBT documentation stresses: The primary purpose of WPBT is to allow critical software to persist even when the operating system has changed or been reinstalled in a `clean' configuration ... Because this feature provides the ability to persistently execute system software in the context of Windows, it becomes critical that WPBT-based solutions are as secure as possible and do not expose Windows users to exploitable conditions. Oh dear. Secure as possible? Not in this case: security researcher Roel Schouwenberg found and reported a buffer-overflow vulnerability in LSE that could be exploited to compromise the low-level software to gain administrator-level privileges. When Lenovo learned of this bug, it decided its LSE was falling foul of Microsoft's security guidelines for using the powerful WPBT feature and pulled the whole thing: the LSE software is no longer included in new laptops. Lenovo has also pulled the LSE from new desktop machines, which phone home system data but do not download and install any extra software, it appears. A tool quietly released on 31 July will uninstall the engine if it is present in your machine. The full list of affected desktop and notebook models is here, and all were shipped with Windows 7 or 8.x installed. Think-branded PCs did not include the LSE, we're told. http://news.lenovo.com/article_display.cfm?article_id=2013 ... [Lots more omitted. PGN] http://www.theregister.co.uk/2015/02/19/superfish_lenovo_spyware/ We've asked Microsoft to explain the thinking behind its WPBT feature. The Redmond giant was not available for immediate comment. ------------------------------ Date: Thu, 13 Aug 2015 17:49:57 -0700 From: Henry Baker <hbaker1 () pipeline com> Subject: Audit Shows Extent of Snail Mail Surveillance ``I think they should have to get warrants to get this information,'' said Frank Askin, a law professor "the ["mail cover" surveillance] program had been used by a county attorney and sheriff in Arizona to investigate a political opponent" http://www.nytimes.com/2015/08/14/us/copy-of-postal-service-audit-shows-extent-of-mail-surveillance.html Copy of Postal Service Audit Shows Extent of Mail Surveillance Ron Nixonaug. 13 Aug 2015 WASHINGTON -- In what experts say is the first acknowledgment of how the United States Postal Service's mail surveillance program for national security investigations is used, the service's internal watchdog found that inspectors failed to follow key safeguards in the gathering and handling of classified information. The overall program, called *mail covers*, allows postal employees working on behalf of law enforcement agencies to record names, return addresses and other information from the outside of letters and packages before they are delivered to the home of a person suspected of criminal activity. The information about national security mail covers, amid heated public debate over the proper limits on government surveillance, was contained in an audit conducted by the Postal Service's inspector general last year. Although much of the information was public, sections about the national security mail covers were heavily redacted. An unredacted copy of the report was provided to a security researcher in response to a Freedom of Information Act request this year. The researcher, who goes by a single legal name, Sai, shared the report with The New York Times. https://drive.google.com/file/d/0BzmetJxi-p0VOExOZGo2V1ktWHM/view?pli=1 ------------------------------ Date: Fri, 14 Aug 2015 19:12:04 +0200 From: "Donald B. Wagner" <zapkatakonk () icloud com> Subject: Denmark's most devastating hacker attack? http://cphpost.dk/news/it-experts-national-police-still-at-risk-from-hackers.html "Three years after Denmark's most devastating hacker attack, during which the national police's IT security was breached and hackers stole millions of confidential files over the course of several months, the IT interest organisation IT-Politisk Forening (IT-Pol) has warned the same thing could happen again." More from IT-Pol: http://itpol.dk/presentation-of-it-pol dr.phil. Donald B. Wagner, Jernbanegade 9B, DK-3600 Frederikssund, Denmark Tel. +45-3331 2581 http://donwagner.dk [Donald also noted the following, although with no indication how it might have applied to the above item... PGN] Danish Data Protection Agency http://www.datatilsynet.dk/english/ "The Danish Data Protection Agency conducts an annual series of inspections of public authorities and private companies that have received the agency's authorisation to process personal data. The Danish Data Protection Agency inspects whether the processing of data is carried out in accordance with the Act on Processing of Personal Data." Act on Processing of Personal Data http://www.datatilsynet.dk/english/the-act-on-processing-of-personal-data/read-the-act-on-processing-of-personal-data/compiled-version-of-the-act-on-processing-of-personal-data/ dr.phil. Donald B. Wagner, Jernbanegade 9B, DK-3600 Frederikssund Denmark Tel. +45-3331 2581 http://donwagner.dk ------------------------------ Date: Fri, 14 Aug 2015 07:02:42 -0700 From: Henry Baker <hbaker1 () pipeline com> Subject: Retaliation against China is the wrong reaction to OPM hack "a diplomatic or economic response [to OPM] only distracts from the US government's most pressing problem: *bolstering security measures to foil the next attack.*" "[Deterrence] comes from enabling security protocols that make sensitive or valuable data so hard to steal that the effort isn't worth the reward." http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0804/Opinion-Retaliation-against-China-is-the-wrong-reaction-to-OPM-hack Jeffrey Carr, 4 Aug 2015 Opinion: Retaliation against China is the wrong reaction to OPM hack Even if Beijing was responsible for breaches that exposed sensitive data on millions of Americans, a diplomatic or economic response only distracts from the US government's most pressing problem: bolstering security measures to foil the next attack. The Office of Personnel Management breach the worst in US history is a graphic testament to the White House's ongoing inability to identify and secure its most critical data. In this case, it lost control of incredibly sensitive and detailed information on federal employees. That's a bounty worth many millions of dollars to foreign intelligence services in a breach for which China is the "leading suspect," according to Director of National Intelligence James Clapper. But even if Beijing is to blame, the way to fix the administration's cybersecurity problem and to prevent future data heists that rival the OPM breach isn't to retaliate against a foreign government. After all, we are living in a world in which this kind of digital espionage is the new normal. It's the kind of thing that the National Security Agency wishes it could do against China. That is, if the spy agency isn't already doing it. Sure, President Obama is upset about the shameful state of security in place at OPM, and has made limited efforts to correct security problems at government agencies in a 30-day "Cybersecurity Sprint." But exacting some kind of diplomatic or economic toll against China seems like a key play in the Obama administration's plans. According to unnamed officials quoted in The New York Times, Obama staff members are considering a range of options meant "to disrupt and deter what our adversaries are doing in cyberspace." Traditional forms of deterrence in cyberspace are only partially effective even when you're certain about the attacker's identity. And determining that with absolute certainty is tough. Hackers working for foreign intelligence services are trained to hide their identities and use deception techniques to throw off investigators. They can mimic tools, techniques, and procedures used by other hackers to make it look like a different group or foreign government carried out the strike. Still, administration officials and at least one large cybersecurity firm with ties to the government are intent on pointing the finger at China. There are two key reasons for this blame game: (1) In order for the US to respond, the responsible party must be another government; (2) Under international law, the standard of evidence for state responsibility is solely based upon "reasonableness" versus proof beyond a reasonable doubt. The administration hasn't publicly presented any proof that China directed the OPM attacks. While the US government is expert at denying, disrupting, and deterring kinetic actions on battlefields in each of the four domains (land, air, sea, and space), it still hasn't grasped that the digital battlefield is entirely different. The recent Times article about retaliating against China makes that all too clear. http://www.nytimes.com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html Deterrence is possible. But it doesn't come from force or trying to instill fear. It comes from enabling security protocols that make sensitive or valuable data so hard to steal that the effort isn't worth the reward. The goal of deterrence isn't to keep bad guys out of a network, it's to make it next to impossible for them to acquire the assets that they're targeting. Technically, that's already possible. So, instead of shifting the focus to China, Mr. Obama should take full responsibility for the breach (OPM being part of the Executive Office) and immediately start work on a fulsome solution to the government's cybersecurity problem. That requires more than the Cybersecurity Sprint. It means a complete overhaul of how the government employs security measures and uses encryption technology across out all of its networks. It means ferreting out additional weaknesses in security and correcting them. It means identifying those responsible for making that breach possible and firing them. It means apologizing to the estimated 20 million Americans whose personal information is forever compromised. Without those steps, nebulous talk of retaliation against China only tells the world the US doesn't understand the limitations of deterrence in cyberspace. It shows that the US remains weak and naive when it comes to battling criminal hackers. The way to demonstrate strength is to take actions that show the president understands the limitations and advantages of the cyberthreat landscape and acts accordingly. The president and Congress simply need the will to make it happen. Jeffrey Carr is an internationally known author, speaker, entrepreneur, and the founder and president of Taia Global. Follow him on Twitter @jeffreycarr. Editor's note: This article was updated after publication to correct James Clapper's position. He is Director of National Intelligence. ------------------------------ Date: Mon, 17 Nov 2014 11:11:11 -0800 From: RISKS-request () csl sri com Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is comp.risks, the feed for which is donated by panix.com as of June 2011. => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) if possible and convenient for you. The mailman Web interface can be used directly to subscribe and unsubscribe: http://mls.csl.sri.com/mailman/listinfo/risks Alternatively, to subscribe or unsubscribe via e-mail to mailman your FROM: address, send a message to risks-request () csl sri com containing only the one-word text subscribe or unsubscribe. You may also specify a different receiving address: subscribe address= ... . You may short-circuit that process by sending directly to either risks-subscribe () csl sri com or risks-unsubscribe () csl sri com depending on which action is to be taken. Subscription and unsubscription requests require that you reply to a confirmation message sent to the subscribing mail address. Instructions are included in the confirmation message. Each issue of RISKS that you receive contains information on how to post, unsubscribe, etc. => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) is online. <http://www.CSL.sri.com/risksinfo.html> *** Contributors are assumed to have read the full info file for guidelines. => .UK users may contact <Lindsay.Marshall () newcastle ac uk>. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you NEVER send mail! => SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line. *** NOTE: Including the string `notsp' at the beginning or end of the subject *** line will be very helpful in separating real contributions from spam. *** This attention-string may change, so watch this space now and then. => ARCHIVES: ftp://ftp.sri.com/risks for current volume or ftp://ftp.sri.com/VL/risks for previous VoLume http://www.risks.org takes you to Lindsay Marshall's searchable archive at newcastle: http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue. Lindsay has also added to the Newcastle catless site a palmtop version of the most recent RISKS issue and a WAP version that works for many but not all telephones: http://catless.ncl.ac.uk/w/r <http://the.wiretapped.net/security/info/textfiles/risks-digest/> . ==> PGN's comprehensive historical Illustrative Risks summary of one liners: <http://www.csl.sri.com/illustrative.html> for browsing, <http://www.csl.sri.com/illustrative.pdf> or .ps for printing is no longer maintained up-to-date except for recent election problems. *** NOTE: If a cited URL fails, we do not try to update them. Try browsing on the keywords in the subject line or cited article leads. ==> Special Offer to Join ACM for readers of the ACM RISKS Forum: <http://www.acm.org/joinacm1> ------------------------------ End of RISKS-FORUM Digest 28.86 ************************
Current thread:
- Risks Digest 28.86 RISKS List Owner (Aug 14)