STE WILLIAMS

Smart meters are ‘massive surveillance’ tech

The European Data Protection Supervisor has warned that smart meters are a significant privacy threat and wants limits on the retention and use of customer data before it’s too late.

The EDPS is an independent authority figure tasked with identifying where EU policies might represent a risk to privacy. He reckons next-generation meters, which precisely monitor electricity use within homes, are a very likely candidate unless his concerns are addressed ahead of time.

Peter Hustinx, who fills the role with the assistance of Giovanni Buttarelli, admits there are advantages of smart metering, but warns that the technology will “also enable massive collection of personal data which can track what members of a household do within the privacy of their own homes”. He pulls up examples of baby monitors and medical devices, which have identifiable patterns of energy consumption and could therefore be used to monitor what people are doing.

That might sound fanciful, but researchers have already demonstrated that the pattern of energy consumed by a decent flat-screen TV can be used to work out what programme is being watched, and Hustinx is probably right that this isn’t information most of us would wish to share with our electricity providers.

Smart meters need to collect all that data in order to reduce our reliance on power – it’s now an article of faith that once we know how much energy we’re using we’ll magically reduce that consumption, so the EU is committed to mandating smart meters by 2020. Therefore the EDPS thinks we need legislation now, before it’s too late, stating what the data can be used for and how long it can be retained.

The real way to reduce power consumption is by using smart appliances – such as a washing machine that can be configured to run during the night – at the behest of electricity suppliers and with a suitably discounted rate. But this scenario is still a long way off from reality for the majority of us, so energy targets remain pinned to the idea we’ll voluntarily wash less.

The UK’s Department of Energy and Climate Change has taken some steps in this direction, promising that collected data won’t be shared with third parties, and requiring decent security to prevent it being stolen, but even that stops short of the limitations suggested by the EDPS.

The European Commission is preparing a document on the impact of all this new data, but as planned it’s limited to vague objectives rather than specific requirements, which is what the EDPS thinks will be necessary. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/11/smart_meter_privacy/

Facebook joins Google in warning DNSChanger victims

Federal authorities will not seek a further extension to a DNSChanger safety net, meaning an estimated 360,00 security laggards will be unable to use the internet normally unless they clean up their systems before a 9 July deadline.

DNSChanger changed the domain name system (DNS) settings of compromised machines to point surfers to rogue servers – which hijacked web searches and redirected victims to dodgy websites as part of a long-running click-fraud and scareware distribution racket. The FBI dismantled the botnet’s command-and-control infrastructure back in November, as part of Operation GhostClick.

In place of the rogue servers, a bank of duplicate machines was set up to resolve internet look-up queries from compromised boxes. This system was established under a court order, which has already been extended twice. The move meant users of compromised machines could use the internet normally – but the safety net by itself did nothing to change the fact that infected machines needed to be cleaned.

At its peak as many four million computers were infected by DNSChanger. An estimated 360,000 machines are still infected and there’s no sign that further extending the safety net will do any good, hence a decision to try other tactics while withdrawing the DNS safety net, which has served its purpose of granting businesses with infected machines time to clean up their act.

Last week Facebook joined Google and ISPs in notifying DNSChanger victims‎ that they were surfing the net using a compromised machine.

“The warnings are delivered using a ‘DNS Firewall’ technology called RPZ (for Response Policy Zones),” Paul Vixie, chairman and founder of Internet Systems Consortium, told El Reg. “This allows infected users (who are using the ‘replacement’ DNS servers) to hear different responses than uninfected users (who are using ‘real’ DNS servers). We can control how an infected user reaches certain websites by inserting rules into the RPZ,” he added.

More information – along with clean-up advice – can be found on the DNS Changer Working Group website here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/10/dnschanger/

Watchdog relieves iPhone 5 scammers of £10k

A British company who offered “iPhone 5s” to punters has been slapped with a £10,000 fine by regulator PhonePayPlus, which ruled that the adverts for the non-existent phone were misleading.

According to the judgment published today, the Bumbalee service run by Mobile Minded BV used “prizes” such as the iPhone 5 to lure punters into signing up to a premium subscription service that charged them £2 every time they received a message.

In the adverts investigated by PhonePayPlus, the regulator for the UK’s premium phone line industry, Mobile Minded offered £150 of “free” Morrisons vouchers in adverts put on Facebook in September/October 2011 – which turned out to be as illusory as the iPhone 5.

Morrisons disclaimed any knowledge of a vouchers deal with Bumbalee and the monitors found that it was impossible to claim the vouchers. Punters clicking on the offer were asked to fill in a survey, before being taken to the subscription site and offered the opportunity to win an iPhone 5.

Entrants paid to do surveys or quizzes and were charged £2 a message with five messages sent a week.

PhonePayPlus estimated that the scammers made between £50,000 and £100,000 out of the service.

As well as the £10,000 fine, the company have two weeks to make all their advertising compliant and have been commanded to refund all complainants for the full amount of money spent by them on the service.

Mobile Minded BV have not responded to our request for comment. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/08/iphone_5_offer_attracts_regulator_fine/

Germany reveals secret techie soldier unit, new cyberweapons

CyCon 2012 Germany has confirmed that its military maintains an operational cyberwarfare unit with offensive capabilities.

The admission, which appeared in parliamentary documents published on Tuesday, gave no details of the size of the unit much less any operations that it might have run. However documents delivered to the German federal defence committee did reveal that the unit has been operating for six years since 2006, a year before the cyber-attack on Estonia and four years before the discovery of the infamous Stuxnet worm.

“The initial capacity to operate in hostile networks has been achieved,” the papers explain, adding that the Computer Network Operations Unit had carried out “simulations” of attacks in a “closed laboratory environment”, German press agency DPA reports.

The unit reports to the joint forces strategic intelligence command. Legislators reportedly expressed surprise at the existence of the unit and questioned whether military commanders had the legal authority to launch attacks on foreign networks.

Prof Dr Wolff Heintschel von Heinegg, a professor of law at European University Viadrina Frankfurt in Germany, told El Reg that the armed forces of many nations are probably building up an offensive cyber capability. The only difference is that Germany and (also recently) the Obama administration is the US are publicly talking about it.

“The German MoD see a potential in having an offensive cyber-op capability as well as an ability to defend critical infrastructures”, most notably military systems, Dr Heintschel von Heinegg explained.

The broader category of information warfare can be divided into “electronic warfare” – such as jamming enemy radar – and cyber-warfare, attacking a target’s cyber-infrastructure. “There is no clear dividing line between the two,” the prof explained, adding that cyber-espionage activities are not prohibited by codes of international law but only national criminal laws. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/08/germany_cyber_offensive_capability/

LinkedIn dials 911 on password mega-leak hackers

LinkedIn has turned to the FBI for help after 6.5 million of its users’ passwords were dumped online by hackers.

The business network said “a small subset” of the hashed data had been deduced and revealed, but the rest is “hard to decode”. Security biz Sophos estimated that as much as 60 per cent of the leaked list had been cracked.

It is relatively trivial to work out the original passwords from the unsalted SHA-1 hashes, and LinkedIn has tacitly reiterated that it is upping its database security by sprinkling in some cryptographic salt.

The social network for suits is still silent on what other information the hackers may have lifted. It gave a somewhat slippery statement to the effect that punters’ email addresses have not been revealed – as far as it knows – which doesn’t answer the question of whether or not that information was stolen.

“To the best of our knowledge, no email logins associated with the passwords have been published, nor have we received any verified reports of unauthorised access to any member’s account as a result of this event,” the company stated in a blog post.

Yesterday, members reported that they were being inundated with spam and phishing emails pretending to originate from LinkedIn, which would suggest that their email addresses had been stolen or that the hackers still had access to the network’s databases.

LinkedIn has yet to return today’s or yesterday’s requests from The Register for comment on the spam. The company said on its blog that users whose passwords were leaked had had their accounts locked down for now, but also said it was going to cancel other passwords as well.

“As a precautionary measure, we are disabling the passwords of any other members that we believe could potentially be affected,” it said, without giving the criteria for how LinkedIn will figure out which accounts might be in trouble.

Any members who need to come up with yet another new password will be told to do so by email, but there will be no links in the email to click – just the instructions of what to do next.

LinkedIn said it was still looking into things and was also helping law enforcement with its investigation of the breach.

Meanwhile, dating site eHarmony and music site Last.fm have also reported hack attacks in which user passwords were nicked. eHarmony users say they are being spammed as well, although again only passwords have been confirmed stolen by the site. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/08/law_investigates_linkedin_breach/

LinkedIn users buried in spam after database leak

LinkedIn users are being bombarded by spam emails after the social network was hacked and hashed passwords of users dumped online.

Members of the business network told The Register that they had received scores of invitations to “link in” with new connections, often flagged with warnings from their email provider that the missive couldn’t be verified as coming from LinkedIn.com.

One user, consultant Peter Baston, told El Reg that he was receiving invitations in groups, which isn’t normal, and was frustrated by the lack of advice on LinkedIn’s front page.

While the network has put up two blog postings about the data breach, which saw a list of 6.5 million hashed passwords posted on a Russian Dropbox-alike, there isn’t any information on its actual website.

LinkedIn admitted that at least some of the passwords on the list were genuine and told people who were affected that their old passwords would be deleted and that they’d get an email prompting them to reset.

Unfortunately some of the emails urging people to input a new password by clicking on a link have turned out to be phishes. The real LinkedIn password-reset email has no links in it.

Although many companies of at least a half decent size seem to get hacked these days, LinkedIn has come in for criticism because the passwords were only hashed and not salted, a weak encryption process.

“For eons we have reminded companies that security and connectivity are opposites and the more you move in one direction the other is affected… and when you have an enforced connectivity regardless model pushed to the master revenue plan added to antiquated security systems and zip due diligence like LinkedIn – that’s a FUBAR train wreck waiting to happen,” said Baston, who runs his own quality assurance consultancy.

In the same blog posting that told users about the password reset, LinkedIn said that its databases were now salted as well as hashed.

About two thirds of the hashed passwords dumped online have now been cracked, according to estimates from security biz Sophos.

Passwords alone are not enough to give hackers the chance to spew spam, meaning fears that the cyber-crims have lifted email addresses as well are well-founded. Alternatively, the hackers, or the people to whom they flogged the info, may still have access to LinkedIn’s databases.

The social network for suits had not responded to a request for comment at the time of publication. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/07/linkedin_spam_emails_data_breach/

Last.fm tell users to change passwords IMMEDIATELY

Last.fm users are the latest internet community to get the “change your password” message as the music streaming site investigates a “leak of some user passwords”.

However, unlike LinkedIn or eHarmony, Last.fm has jumped on the suspicion that something’s wrong, rather than waiting for user passwords to appear on the Internet. In this post, the service tells all users to change their passwords.

“We’re sorry for the inconvenience around changing your password; Last.fm takes your privacy very seriously,” the company said.

Further updates will be made available on Twitter “as we get to the bottom of this”, Last.fm added.

On its Naked Security blog, Sophos notes that Last.fm is giving the same advice to all users at login.

The service also emphasises that it will not ask for passwords or send direct links to users’ settings in emails.

Password-reset frenzy

This follows recent hack attacks on business networking platform LinkedIn and dating site eHarmony, where user passwords were published online.

LinkedIn users are now suffering a spam deluge following the attack, including phishing messages directing users to fake password-reset links.

In the case of LinkedIn, a Russian hacker posted 6.5 million users passwords on a Russian Dropbox-type site and users have since complained of being swamped by spam emails.

As for eHarmony, around 1.5 million users passwords were stolen and published.

The Register is also receiving reports from eHarmony users that the spam messages are arriving, indicating that the attackers have accessed user IDs as well as the password file.

One user has told The Register the spam has arrived to an email account, only used for eHarmony, that “remained spam-free until the last 36 hours”.

“Not surprisingly, eHarmony haven’t answered my requests for more information,” the user told us. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/07/last_fm_passwords_may_have_leaked/

Flame gets suicide command

The controllers of the Flame malware have apparently reacted to the publicity surrounding the attack by sending a self-destruct command.

According to Symantec, some command-and-control machines have sent a command designed to wipe Flame from compromised computers.

The command, which Symantec has dubbed “urgent suicide”, was captured on honeypots (since an ordinary machine would have the malware removed without the user noticing).

The CC server shipped a file called browse32.ocx, which acts as a Flame uninstaller, complete with a list of files and folders to be deleted. After deletion, the module overwrites the disk with random characters. As Symantec notes, the uninstaller “tries to leave no traces of the infection behind”, in an attempt to thwart anyone capturing and analyzing the malware.

The module is instructed to remove more than 160 files and four folders. Symantec says Flame had originally shipped with a suicide module, and they don’t know why a new suicide module was used.

“The version of this module that we have was created on May 9, 2012,” Symantec’s post notes, which was “just a few weeks” before the malware became known. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/07/flame_suicide_command/

1,000 Foxconn iPad workers trash dorms in riot against guards

A riot broke out at a Foxconn workers’ dormitory in Chengdu after hundreds of workers got involved in a clash with security guards, according to reports from Chinese human rights website Molihua [English version in the Want China Times here].

The incident at the dorm started at about 9pm on Monday and escalated into a full-scale riot involving three to four male dormitories, and up to 1,000 employees, reports claimed.

Bottles, trash cans, chairs and fireworks were thrown from the upper floors of the male dormitory that housed workers from the Foxconn Chengdu plant. It lasted for two hours before local police quelled the disturbance, say reports.

The disturbance broke out after two security guards “tried to stop a thief”, according to the story on Molihua, and then escalated after workers took advantage of the trouble to air long-held dissatisfaction with the guards.

Apparently dozens of arrests have been made.

In a statement to The Reg, Foxconn distanced itself from the disturbance, saying that the Chengdu police had informed it that the riot had been caused by a dispute with a local restaurant owner.

We were informed by local law enforcement authorities that late Monday night, several employees of our facility in Chengdu had a disagreement with the owner of a restaurant located in that city.

Foxconn also said that the dormitories were run by a third party and that the security guards were not Foxconn employees.

We were also informed that the employees subsequently returned to their off-campus residence, owned and managed by third-party companies, at which time a number of other residents also became involved in the disagreement and local police were called to the scene to restore order. Foxconn is cooperating with local law enforcement authorities on their investigation into this incident.

The Foxconn Chengdu factory manufactures electronic parts for various vendors, including iPhone and iPad components for Apple. Foxconn is one of the biggest electronics manufacturers in China and also makes kit for Sony, Microsoft, Nokia and many, many more. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/07/foxconn_workers_riot/

Hackers, bloggers ‘bunged cash to spin for Iran 2.0’

CyCon 2012 The Iranian government is investing heavily in hacking expertise and online propaganda in order to promote its way of life under the country’s post-Islamic Revolution regime – as well as using its new resources to tighten up control and surveillance of its citizens.

This is according to Jeff Bardin, chief intelligence officer at Treadstone 71, a US-based intelligence analysis firm. He told delegates to the International Conference on Cyber Conflict (CyCon) that intelligence divisions within the Iranian military are working together with former members of hacking groups to fight “Western cultural influences” and online dissidents as well as promoting Iranian foreign policy objectives.

Key groups in the move include the Islamic Revolutionary Guard Corps (IRGC), the paramilitary Basij militia and the hacker group Ashiyane, according to Bardin. Ashiyane, which maintains an active forum, denies any affiliation with the IRGC or the Iranian government. But Bardin claimed that, contrary to its denials, Ashiyane actually offers training courses in IT security to Iranian government organisations as a preferred supplier.

Bardin said he believes the core members of Ashiyane were drawn from a hacker group that cut its teeth defacing Western websites and running more elaborate hacks as the so-called Iranian Cyber Army.

The Iranian Cyber Army used a DNS attack to hijack Twitter back in 2010 before using much the same techniques in order to redirect surfers towards a defaced version of the home page of Chinese search engine Baidu weeks later.

Ashiyane appears to have expertise in running DDoS attacks to knock websites offline, web page defacement, infiltration and credit card theft, says Bardin.

The IRGC is an overarching organisation whose role in Iranian society has expanded behind its origins as a type of national guard to become a huge business empire and lynchpin of President Mahmoud Ahmadinejad’s administration.

Shortly after playing a key role in suppressing dissent following the disputed presidential election of June 2009, the IRGC, by way of a company it is tied to, acquired a majority $8bn stake in the Iran Telecommunications Company. By controlling the telecoms infrastructure, the IRGC can now apply even heavier censorship controls on Iranian web access.

The Revolutionary Guard was established in 1979 to suppress counter-revolutionary forces but what it has become is similar to what it was created to eliminate: the Shah’s Imperial Guards. Bardin described the organisation as employing a “communist-style model” featuring regular “purges” and constant-jockeying for position and favour, a process often affected by external events.

“The IRGC didn’t foresee the power of social networking” in the run-up to the 2009 Iranian presidential elections but is now pushing heavily to promote a Web2.0 version of its brand of Islam.

Bardin said that the IRGC is paying online activists and bloggers to promote the Islamic Republic in forums, Facebook pages and elsewhere online, an assessment shared by Israeli intelligence analysts – but they reckon reckon cyber workers are paid $4.30 (£2.70) an hour, which is higher than the average wage. Iran is seeking to promote its version of Islamic Revolution to the Shia populations of neighbouring Gulf states, such as Bahrain, as well as influencing political groups in Syria, Lebanon and Palestine – including Hezbolah and Hamas.

IRGC is very capable and the West shouldn’t “underestimate its adversary,” Bardin concluded.

Other IRGC operations may have included planting a back door in a Trojanised version of the Simurgh privacy tool to spy on Iranian surfers and the infamous Diginotar and Comodo digital certificate hacks, Barbin suggested.

Bardin’s well-attended talk limited itself to Iran’s information warfare and propaganda capabilities and deliberately skirted any reference to the infamous Stuxnet worm or the recently uncovered Flame worm, aside from a brief reference to Iran’s development of a home-grown anti-virus capability. Bardin said he didn’t want to discuss (presumed) US or Western capabilities in cyber-espionage. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/06/07/iran_infowar/