#vulnerabilities

danie10@squeet.me

SIM swappers hijacking phone numbers in eSIM attacks: Protect your cellular service account

Smartphone lying face down, with SIM tray next to it, with a loose SIM card
Previously, SIM swappers relied on social engineering or worked with insiders at mobile carrier services to help them port a target’s number. However, as companies implemented more protections to thwart these takeovers, cybercriminals turned their attention to emerging opportunities in new technologies.

Now, attackers breach a user’s mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim’s number to another device on their own.

They can do this by generating a QR code through the hijacked mobile account that can be used to activate a new eSIM. They then scan it with their device, essentially hijacking the number.

To defend against eSIM-swapping attacks, researchers recommend using complex and unique passwords for the cellular service provider account and enabling two-factor authentication if available.

But it also does show that banks should not be relying solely on SMS or authentication by SIM.

See https://www.bleepingcomputer.com/news/security/sim-swappers-hijacking-phone-numbers-in-esim-attacks/
#Blog, #eSIM, #technology, #vulnerabilities

danie10@squeet.me

Your fingerprints can be recreated from the sounds made when you swipe on a touchscreen — Chinese and US researchers show new side channel can reproduce fingerprints to enable attacks

Blue coloured image showing a fingerprint ona finger, with the word security overlaying it, and an icon of a pointing finger below it.
An interesting new attack on biometric security has been outlined by a group of researchers from China and the US. PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound [PDF] proposes a side-channel attack on the sophisticated Automatic Fingerprint Identification System (AFIS). The attack leverages the sound characteristics of a user’s finger swiping on a touchscreen to extract fingerprint pattern features. Following tests, the researchers assert that they can successfully attack “up to 27.9% of partial fingerprints and 9.3% of complete fingerprints within five attempts at the highest security FAR [False Acceptance Rate] setting of 0.01%.” This is claimed to be the first work that leverages swiping sounds to infer fingerprint information.

Biometric fingerprint security is widespread and widely trusted. If things continue as they are, it is thought that the fingerprint authentication market will be worth nearly $100 billion by 2032.

Importantly, PrintListener went through extensive experiments “in real-world scenarios,” and, as mentioned in the intro, can facilitate successful partial fingerprint attacks in better than one in four cases, and complete fingerprint attacks in nearly one in ten cases. These results far exceed unaided MasterPrint fingerprint dictionary attacks.

I have to say, though, I’m struggling to understand how this can really work. It talks about fingerprint friction audio – does that mean the press of a fingerprint, as it sounds more like some form of swiping? The report states: “It only needs to record users’ fingertip friction sound and can be launched by leveraging a large number of social media platforms.”

But it seems though they are using swiping actions to reconstruct the fingerprint, as they state this also: “In this work, we propose a new side-channel attack on fingerprints, called PrintListener, which leverages users’ swiping actions on the screen to extract fingerprint features and synthesize a stronger MasterPrint sequence based on these features to conduct dictionary attacks on users’ fingerprints”.

There is a link to the original report, where it goes into some detail about how the acoustics are interpreted.

No authentication process is perfect, but fingerprints have been one of the more trusted options. But we are also learning that phone sensors such as cameras, microphones, light, vibration, etc can all be exploited in various ways. These are actually all very clever hacks. Not all can be exploited easily in the real world, but one hopes that OEMs are working to keep these exploits pinned down.

See https://www.tomshardware.com/tech-industry/cyber-security/your-fingerprints-can-be-recreated-from-the-sounds-made-when-you-swipe-on-a-touchscreen-researchers-new-side-channel-attack-can-reproduce-partial-fingerprints-to-enable-attacks
#Blog, #biometrics, #technology, #vulnerabilities

citoyen_candide@diaspora-fr.org

#Apple knew #AirDrop users could be identified and tracked as early as 2019, researchers say
#ITSecurity researchers warned Apple as early as 2019 about #vulnerabilities in its AirDrop wireless sharing function that Chinese authorities claim they recently used to track down users of the feature, in a case that experts say has sweeping implications for global privacy.

https://edition.cnn.com/2024/01/12/tech/china-apple-airdrop-user-encryption-vulnerability-hnk-intl/index.html

danie10@squeet.me

The Mystery of the Apple Zero-Day Vulnerability CVE-2023-38606

Security Now podcast logo with blue background and title in white stating TWIT SECURITY NOW
I just finished listening to the analysis by Steve Gibson in Security Now episode 955, and it is very interesting. No surprises actually at all, but it does put things more in perspective and out in the open. Unless Apple actually spills the beans, which is most certainly not going to happen (and possibly legally they may not be able to anyway), we will not know for sure why this happened.

The technical explanation in the podcast is worth listening as it gives context as to why this was no ordinary accidental vulnerability that was discovered. It also explains quite clearly why this was not a debugging back door as Apple claimed. The very final conclusion is rather chilling, though: A new such vulnerability could be introduced in newer models, and we cannot be certain that there is actually a Plan B and C backdoor that still exists.

The end discussion included a possibility that China and/or Russia may have mandated such a backdoor to be put in place, but they have also started to ban the use of the iPhone by their own officials as far back as two years ago. If this were the case, two other possibilities then exist: Apple as a US company could not be legally mandated not to mention what had happened, and secondly that Apple products are no safer than any Android products and maybe worse off if it were an OEM introducing secure back doors.

Marketing hype about security and privacy seem a bit thin now, given the type of vulnerability this is. In fact, it would have put many other countries and governments at their ease by believing what was being claimed.

Even if the claims about the backdoors being put in place for Russia/China, I’m pretty sure that the US legislation around the Patriot Act and the CLOUD Act would have allowed this to have been kept away from the US NSA. Those Acts place a muzzle over any US owned company too, so that they are not allowed to mention or report any such access.

So, it is all very interesting and the facts are we will probably never know who or why, and we can now safely assume that all mobile devices are insecure by nature and due to their complexity (no surprises). What we don’t know, just has not been discovered yet. We also cannot trust any government to not spy on its own citizens, or other governments (including their own allies) – again so surprises at all as we’ve seen the evidence over the last 10 years of this as well.

But, I did find this analysis very fascinating, as it just demonstrated the depth and extent that these measures actually go to. We live in intriguing times as we have also been learning last year we cannot trust video and images that we see posted online. All this makes the 20th Century censorship, propaganda, and spying look like nursery school stuff. Today’s propaganda and spying is extremely technical, and is being performed by nation level actors. Citizens have very little hope of figuring out for themselves what is what with all the deflection going on.

See https://twit.tv/shows/security-now/episodes/955
#Blog, #Appe, #security, #technology, #vulnerabilities

anonymiss@despora.de

How #Hamas exploited #Israel’s #reliance on tech to breach barrier on Oct. 7

source: https://www.washingtonpost.com/investigations/2023/11/17/how-hamas-breached-israel-iron-wall/

Hamas exploited #vulnerabilities created by Israel’s reliance on #technology at the “Iron Wall” to carry out the deadliest single assault in Israel’s #history. The video details how Hamas fighters neutralized long-range cameras, sophisticated sensors and remote-control weapons — a tactic known inside the group as the “blinding plan” — to breach the high-tech fence.

#war #terror #conflict #Palestine #warfare #hightech #news #middleEast #military

anonymiss@despora.de

#Qualcomm warns of extensive #security #vulnerabilities in drivers for its chips ...

source: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2023-bulletin.html

Please contact the device #manufacturer for information on the #patching status of released devices.

Thanks for this useless hint, because the vast majority of older #Android devices never receive a #patch.


#software #bug #danger #warning #problem #fail #news #smartphone #wifi

danie10@squeet.me

Both the TETRA radio and Microsoft Azure Cloud vulnerabilities are ‘Negligent Security Practices’ and ‘Security Through Obscurity’ is not secure

The cover screen for the Security Now podcast showing the title Revising Global Privacy Control - Voyager 2, MS Security, keyboard acoustic side-channel attacks, and a red button to open it to listen in Pocket Casts.
Listening to Steve Gibson’s feedback today on the Security Now podcast #934 made me realise that both companies knew about the vulnerabilities but were extremely lax about doing anything (probably both trusting in their security by obscurity). Both also put government data and communications at risk globally.

It’s yet again a lesson on two fronts:
1. Obscurity is no good defence against, especially, state level actors. The same goes for proprietary encryption algorithms. You actually require transparency and interrogation around what is used, and re-inventing the wheel yourself is risky. The same goes for security backdoors, as they’re going to become known at some point.
2. There needs to be some legislative requirement for companies to urgently declare vulnerabilities, and to patch them. In both the cases here, months went by without any action.

Maybe both these companies are just too big, but it also goes to show that bigger, or more secretive, is just not better. I suppose both don’t want to risk their global government business, but this could actually have put lives at risk.

Security through obscurity is no reliable strategy, and should again be a warning against those who think it is fine to have a security backdoor just for governments to use. It’s a bad idea. You either have security, or you don’t. There is no such thing as 80% secure.

The Microsoft case is highly embarrassing, and it is no wonder that the US is going to try to investigate it. All the noise about Huawei, and the real problems were right in the US’s own backyard, committed by US companies. All products need the same levels of scrutiny, no matter what country they belong to. Intention and negligence can often amount to the identical consequences.

With both these vendors now, we’ve also seen their technology being pedalled to non-allies of the US, so that the vulnerabilities could be exploited. It’s also a lesson to other governments to be very careful about what promises are made, and to remember even your ‘allies’ are not your friends. It is no wonder that the BRICS countries all wanted to implement their own operating systems for use across their governments (mostly self-compiled and localised Linux distros). Now we know why…

And of course, with some of Microsoft’s products, once used, it may not be easy to actually switch to someone else (which is, in itself, possibly part of the problem on both sides). How does the US government actually carry through any threat not to use Microsoft? The cost, and time, to move off Huawei network hardware would pale into insignificance.

This is why security standards, interoperability standards, etc just cannot be compromised on. The standards need to be enforced no matter who the vendor is. I have myself seen standards being bent, where it is better just to say you won’t procure the product in the name of ‘modernisation’.

See https://www.grc.com/sn/SN-934-Notes.pdf
#Blog, #openstandards, #security, #technology, #vulnerabilities

danie10@squeet.me

Millions of Gigabyte motherboards were sold with a firmware backdoor to invisibly and insecurely downloads program updates

An open door surrounded my 1's and 0's
Hiding malicious programs in a computer’s UEFI firmware, the deep-seated code that tells a PC how to load its operating system, has become an insidious trick in the toolkit of stealthy hackers. But when a motherboard manufacturer installs its own hidden backdoor in the firmware of millions of computers—and doesn’t even put a proper lock on that hidden back entrance—they’re practically doing hackers’ work for them.

Researchers at firmware-focused cybersecurity company Eclypsium revealed today that they’ve discovered a hidden mechanism in the firmware of motherboards sold by the Taiwanese manufacturer Gigabyte, whose components are commonly used in gaming PCs and other high-performance computers. Whenever a computer with the affected Gigabyte motherboard restarts, Eclypsium found, code within the motherboard’s firmware invisibly initiates an updater program that runs on the computer and in turn downloads and executes another piece of software.

Because the updater program is triggered from the computer’s firmware, outside its operating system, it’s tough for users to remove or even discover.

The problem, too, is that lots of other brands use the Gigabyte motherboards, and any update pushed to fix this, may also end up aborting due to the complexities of matching hardware and firmware.

See https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/
#Blog, #Gigabyte, #technology, #vulnerabilities

danie10@squeet.me

BrutePrint: This $15 hacking device could be your fingerprint scanner’s worst nightmare, although they need physical access for a few hours

Fingerprint visible on a blue coloured glass background
Researchers have devised a low-cost smartphone attack that cracks the authentication fingerprint used to unlock the screen and perform other sensitive actions on a range of Android devices in as little as 45 minutes.

Dubbed BrutePrint by its creators, the attack requires an adversary to have physical control of a device when it is lost, stolen, temporarily surrendered, or unattended, for instance, while the owner is asleep. The objective: to gain the ability to perform a brute-force attack that tries huge numbers of fingerprint guesses until one is found that will unlock the device. The attack exploits vulnerabilities and weaknesses in the device SFA (smartphone fingerprint authentication).

So yes, you don’t want to leave your phone lying around, and you don’t want your fingerprint to be sitting in online databases (although normally only hashes of a fingerprint should be stored). But this does pose some really interesting possibilities for law enforcement… they can have you, your phone, and your fingerprints…

See https://arstechnica.com/information-technology/2023/05/hackers-can-brute-force-fingerprint-authentication-of-android-devices/
#Blog, #BrutePrint, #hacking, #security, #technology, #vulnerabilities

beaubobobonobo@diaspora.psyco.fr

Swiss Army's #threemaapp messaging app was full of holes – at least seven

A supposedly secure messaging app preferred by the #Swiss government and army was infested with bugs – possibly for a long time – before an audit by #ETHZurich researchers.

The university's applied #cryptography group this week published research detailing seven #vulnerabilities in Threema's home-grown cryptographic protocols.
#armeesuisse #gouvernementsuisse #cybersecurite #chiffrement #ibex
https://www.theregister.com/2023/01/11/swiss_army_threema_bugs/

0mega@social.c-r-t.tk

Image/photoHarald Eilertsen wrote the following post Tue, 12 Apr 2022 18:25:25 +0200

Multiple vulnerabilities in Hubzilla before version 7.2

Hubzilla < 7.2 - Multiple vulnerabilities : Harald Eilertsen's Homepage

While looking at the source code for Hubzilla, I discovered a few low-hanging security vulnerabilities. These are a Local File Inclusion vulnerability in the standard theme, and two vulnerabilities in the settings modules, a Cross-Site scripting (XSS) vulnerability and an Open Redirect vulnerability, both via the rpath URL query parameter.

Fixes for all of these issues were released in version 7.2 on March 29, 2022.

The full details at https://volse.net/~haraldei/infosec/disclosures/hubzilla-before-7-2-multiple-vulnerabilities/

If you haven't updated your hub to the latest version yet, I highly recommend that you do so as soon as possible.

#infosec #hubzilla #vulnerabilities

harald@hub.volse.no

If you create any kind of software—big, small, commercial, free, open or closed souce—please provide some useful contact info for reporting security issues.

No, I will not register anywhere to do so. Not your forum, not twitter, definitely not Facebook! A contact form works, but email is prefered. If you can't handle reports by email or an open contact form, I'm very tempted to just go full disclosure on you right away!

#infosec #vulnerabilities #coordinated-disclosure #email

danie10@squeet.me

Deepfence ThreatMapper: Open source platform for scanning runtime environments

Deepfence announced open source availability of ThreatMapper, a signature offering that automatically scans, maps and ranks application vulnerabilities across serverless, Kubernetes, container and multi-cloud environments.

ThreatMapper is an open source platform for scanning runtime environments for software supply chain vulnerabilities and contextualizing threats to help organizations determine which to address and when. Taking threat feeds from more than 50 different sources, the comprehensive suite of ThreatMapper capabilities and features are available on GitHub.

See ThreatMapper: Open source platform for scanning runtime environments - Help Net Security

#technology #security #threats #opensource #vulnerabilities

Imagem/foto

ThreatMapper is an open source platform for scanning runtime environments for supply chain vulnerabilities and contextualizing threats.


https://gadgeteer.co.za/deepfence-threatmapper-open-source-platform-scanning-runtime-environments

danie10@squeet.me

How to Prevent Ransomware: 18 Best Practices for 2021

A ransomware attack can shut down a business for weeks, damage reputation with customers and employees, and open the door for further data breaches. As an attack can be devastating, knowing how to prevent ransomware is an essential skill of any cybersecurity team. This has now become a serious reality for governments as well as corporates. Gone are the days of just planning for fire, theft or disasters. The game has totally changed and planning for ransomware attacks is now a fundamental part of vulnerability and risk assessments.

There are a number of best practices to employ but very obvious vulnerabilities are e-mail systems and patch management. Too many e-mail systems are out of date and not scanning for obvious problems. The easiest way for attackers to get in, is to use known vulnerabilities and exploit them via scripts. So the obvious thing is to have proper patch management in place, and test and apply them quickly. Attackers are pouncing the moment patches are released, as they know most organisations take weeks to apply the patches. This also means monitoring the patch status of all servers, computers, network OS's, etc.

See How to Prevent Ransomware: 18 Best Practices for 2021

#technology #security #vulnerabilities #ransomware

Image/photo

Learn how to prevent ransomware with a mix of safety precautions, company-wide culture of awareness, and a robust disaster recovery plan.


https://gadgeteer.co.za/how-prevent-ransomware-18-best-practices-2021

danie10@squeet.me

Major Amazon Kindle security flaw discovered - Are e-books yet another attack vector

An investigation by Check Point Research has found that a security vulnerability in Amazon’s Kindle e-reader could have allowed attackers to take over devices using maliciously crafted e-books. The cyber threat intelligence firm converted an e-book into malware that could lock users out of their devices and steal personal information, including billing details.

It makes a lot of sense if you consider that simple IoT devices (remember that connected fish tank in a casino) have long been known to be attack vectors into networks, and we've already seen what gets in via Microsoft Word documents. The question is whether such books may also place Android phones or iPads at a similar risk.

See Major Amazon Kindle security flaw discovered

#technology #malware #ebooks #vulnerabilities #virus

A security bug in Amazon’s Kindle e-reader could have allowed attackers to take over users’ devices using malicious e-books.


https://gadgeteer.co.za/major-amazon-kindle-security-flaw-discovered-are-e-books-yet-another-attack-vector

dredmorbius@joindiaspora.com

Computer scientists discover new vulnerability affecting computers globally

A team of computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced. ...

...

Since Spectre was discovered, the world's most talented computer scientists from industry and academia have worked on software patches and hardware defenses, confident they've been able to protect the most vulnerable points in the speculative execution process without slowing down computing speeds too much.

They will have to go back to the drawing board.

A team of University of Virginia School of Engineering computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced. ...

https://www.sciencedaily.com/releases/2021/04/210430165903.htm

HN discussion: https://news.ycombinator.com/item?id=27000570

#uva #spectre #microOps #infosec #security #vulnerabilities #cybersecurity