STE WILLIAMS

Google Palestine hijacked: hackers say rename Israel to Palestine, listen to RiRi

Google’s domain serving the Palestinian territories, Google Palestine, was hijacked on Monday by hackers urging Google to rename Israel to Palestine in Google Maps (and the rest of us to listen to Rihanna).

It seems that the DNS entries for google.ps (the records that associate a user-friendly name like example.com with a computer-friendly IP address like 203.0.113.42) were somehow altered so that users were directed to a server in Morocco instead of the servers hosting Google’s services.

Visitors directed to the interloping server were shown a web page with the familiar Google logo and  a screen shot of Google Maps alongside a missive from the triumphant hijackers.
Screenshot of Google Palestine after it was hijackedThe hackers’ text read:

Google Owned
No News Is a Good News
Cold z3ro – Haml3t – Sas – Dr@g
From Palestine: We are the Best of the Rest

uncle google we say hi from palestine to remember you that the country in google map not israel. its called Palestine

#Question : what would happens if we changed the country title of Israel to Palestine in Google maps !!!

it would be revolution …

So Listen to rihanna and be cool :P

The perpetrators identified themselves only as Cold z3ro, Haml3t, Sas and Dr@g but their page featured a link to the Palestine Anger Network’s website (a website notable if nothing else for its proud use of the marquee tag – a bit of code so rare and inelegant that it could be considered the Kakapo of the HTML world).

By Tuesday the offending page had gone and normal service had been restored.

Speaking to The Washington Post, Google offered the following explanation for the hijack.

Some users visiting google.ps have been getting redirected to a different website; Google services for the google.ps domain were not hacked. We’re in contact with the organization responsible for managing this domain name so we can help resolve the problem.

We don’t know how the google.ps domain name records were compromised but recent attacks on high profile websites have shown that attacking a site’s DNS is often easier than attacking the site itself.

Google’s tormentors remind us that no matter who you are your security is only ever as strong as the weakest link in the chain.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Y27t3jUjyjQ/

Surprise! First ever Facebook "Government Requests" report reveals the most inquisitive authorities…

Facebook Government Requests logo on flagFacebook has released its first ever Transparency Report, listing all the national governments that have requested access to information on its members. The report includes how many requests were made, how many users the requests affected, and how many resulted in data being handed over.

In the wake of the ever-expanding PRISM kerfuffle, many of the web giants we trust with huge amounts of information about ourselves have gone out of their way to deny or minimise any bulk sharing of that data with government snoops, in the USA or elsewhere.

Statements have emerged from Microsoft, Apple, Google and Yahoo, vigorously denying granting the USA’s National Security Agency unfettered snooping rights to their servers. Back in June babyfaced Facebook head honcho Mark Zuckerberg added his own promises, reassuring his followers that information was only passed on in response to carefully vetted legal demands.

Now Facebook has followed up by producing a detailed breakdown of those demands, similar to the data Microsoft and Google have been publishing for some time. Google recently added details of malware and phishing issues observed in their trawling of the web.

Click to see Facebook's report [HTML]

The stats, covering the first half of 2013, show a significant chunk of the data is demanded by US authorities – somewhere between 11,000 and 12,000 requests received, referencing over 20,000 US-based members, of which some 79% resulted in data being handed over.

The closest rival is India, with 3,245 requests for data on 4,144 citizens and a 50% hit rate. The other big hitters are the expected big European countries, with the UK, Germany, Italy and France next in sequence on the list.

Of course in interpreting the figures we need to remember that Facebook users are not evenly distributed around the world – the US has by far the biggest number of Facebook users, with over 160 million at the end of 2012, more than half the total population of the country.

India is in second place, although its 62 million users are barely noticeable among the country’s vast population. Brazil, not far behind India in user base with 58 million members, had only 715 data requests of which 33% resulted in data being handed over.

Those wondering where China is in these figures may need reminding that Facebook is pretty much banned there, although there are occasional reports of opening up.

The US is the only country not to provide precise counts, so it is listed as having 11,000-12,000 requests about 20,000-21,000 users, apparently for legal reasons.

As Facebook explains:

We have reported the numbers for all criminal and national security requests to the maximum extent permitted by law. We continue to push the United States government to allow more transparency regarding these requests, including specific numbers and types of national security-related requests. We will publish updated information for the United States as soon as we obtain legal authorisation to do so.

Advice to Facebook users on maintaining their privacy may thus need a small addendum: don’t share anything sensitive with strangers, and if you don’t want “the man” to know about it, don’t share it at all, especially if you’re in the US.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/5ayggrWlSew/

Facebook pays out $20 million in personal ads settlement; each user gets $15

Facebook logo with dollar barsA US District Judge, Richard Seeborg, ruled on Monday that Facebook must pay out a total of $20 million over its Sponsored Stories adverts.

The settlement is the conclusion to a class action lawsuit brought over two years ago over the social networking giant’s use of members’ names and pictures without consent.

The total settlement amount will be divided between some of the affected users as well as attorneys and non-profit groups such as the Electronic Frontier Foundation and Berkman Centre for Internet and Society.

The case (Angel Fraley et al., individually and on behalf of all others similarly situated vs. Facebook Inc) was originally brought before the courts in April 2011.

Five users accused Facebook of using their names and images to advertise products and services through the Sponsored Stories program, without them either opting in or receiving any kind of payment in return. Users have subsequently been able to opt out of appearing in such ads since June last year.

A Sponsored Story is an advertisement that appears on a user’s Facebook page and typically includes a friend’s name and profile picture along with a comment suggesting that they ‘like’ the advertiser in question.

In an official statement on the ruling, Judge Seeborg said:

Although the monetary relief to each class member is relatively small and the percentage of class members who submitted claims is limited, the settlement as a whole provides fair, reasonable, and adequate relief to the class, in light of all the circumstances, including the low probability that a substantially better result would be obtained through continued litigation.

The judge also highlighted how the plaintiffs “faced a substantial burden in showing they were injured by the Sponsored Stories” and that, “in attempting to quantify the value of the settlement’s injunctive relief, plaintiffs have repeatedly relied primarily on their argument that Facebook benefited, rather than that class members were harmed.”

Under the terms of the settlement, Facebook will also have to change the Statement of Rights and Responsibilities which governs how user information can be used on the site.

The social giant will also be required to provide more information about similar programs in the future at an estimated cost of $145 million in advertising revenue, according to lawyers for the plaintiffs.

It’s estimated that around 150 million Facebook users had their names and pictures used to promote Sponsored Stories, earning the company a profit of around $73m in total. However, only around 614,000 of those users are eligible to receive the compensatory amount of $15 set by the court – those who responded to an email from Facebook earlier this year.

Given how much Facebook makes from Sponsored Stories – $234 million between January 2011 and August 2012 – i wonder if a rapid restructuring of the program will be now be seen.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/OfP7IsVARkg/

Schools hire snoopers to monitor kids on social networks. Is it OK? [POLL]

School children. Image courtesy of Shutterstock.Are you worried about what your child is up to on social media?

Well, if you live in Southern California, you may have a few extra people watching your child’s back.

That’s because the Glendale Unified School District is investing $40,000 over the next year to monitor its students’ social media activity on sites like Twitter, Facebook and Instagram.

The program was introduced after a 15-year old student committed suicide at Crescenta Valley High School. And what started as a pilot project in three schools last year is now being rolled out to all middle and high schools across the district.

It has enlisted the help of Geo Listening, which describes itself as an “always monitoring” service that keeps an eye out for cyber bullying, truancy and substance abuse, among other things.

The service will listen in on all public posts made on social networks while in the school campus grounds and then produce a daily report ready for school staff to read and react.

Geo Listening is keen to remind us that it’s only public posts it listens in on:

All of the individual posts we monitor on social media networks are already made public by the students themselves. Therefore, no privacy is violated.”

District Superintendent Dr Richard Sheehan told NBC they’re doing it to keep up with new trends:

“With modern technology, unfortunately we have to try and stay a step ahead of the kids,

“We’re not trying to hide anything, because the whole point of this is student safety.”

Some parents are supportive of the idea, including Felicia Collins who said, “I think it can nip it in the bud if someone is being attacked or something negative is being said about a student.”

But the children are understandably less keen. Some students have started a Facebook page called Remove Your School and as 14-year-old Matilda Sinany said, “I think it’s a bad idea because everybody deserves their privacy.”

So is this a good idea? Is it worth it if it can help intervene when there is a problem, or will it encourage bullies to be more sneaky about the ways they pick on other children?

It feels just a bit *too* Big Brother for me – are we going to bring in eavesdroppers in lessons to listen in on conversations between students? Do we need to start having people follow children home in case they stumble across the school bully outside the local shop?

Let us know what you think in our poll below and leave a comment too.

And if you’ve got children yourself, you might like to show them our top tips to help keep them safe online.

Images of school children and boy on tablet courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/024zYEG5b9s/

Secure Google Docs email results in mailbox compromise

GDocs170A large scale phishing attack has been making the rounds this week pretending to be a “Secure Document” being sent to you via Google Docs.

While those of us in the security industry might not be surprised, phishing attacks are consistently proving themselves to one of the most effective ways to evade traditional defenses.

As many organizations move to the Google cloud, this type of phishing lure will continue to yield results for the criminals.

GDocsPhish

The email reads:

Hello,
A Secure Document was sent to you by your financial institute using Google Docs.
Follow the link below to visit Google Docs webpage to view your Document
Follow Here. The Document is said to be important.
Regards.
Happy Emailing,
The Gmail Team

Phishing emails aren’t exactly rare, but this one caught my eye. In addition to being a somewhat plausible lure, it is an equal opportunity exploit.

If you click the link you are presented with a phishing page hosted in Thailand.

The page not only asks for your Google credentials, it also suggests it will accept Yahoo!, Outlook.com, Hotmail, AOL, Comcast, Verizon, 163.com or any other email account.

GDocsphish500

Of course filling out this form can only end in tears. Your details are sent off to the compromised servers for whatever purposes these thieves desire.

PhishTrap500
You might think, so what, my Gmail isn’t full of secrets that will destroy my nation/life/career.

You would likely be wrong… Your email is the key to unlocking much of your online identity. Forget your banking password? No worries, they will email you a password reset link.

Does your company utilize cloud services? Your email account is likely key to accessing these systems.

Phishing is an amazingly successful technique, just ask the Syrian Electronic Army, who with little technical talent have been able to compromise some of the most powerful media organizations in the world.

As an IT administrator these are opportunities to educate your staff on the risks. This might not be the most convincing of the phishes that are out there, but it is a useful tool to educate your staff.

Many organizations are using Google and other cloud service providers to provide critical IT services. At first glance this could be very believable.

What do I do to avoid being a victim? I create shortcuts in my browser for all sensitive services.

If I need to access my email, bank or other online service I don’t click the link… I click the favourite.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/TcKo65OttXc/

Reality TV mother-of-eight Kate Gosselin sues husband for "hacking" email, phone, revealing private info

Kate Gosselin. Image courtesy of s_bukley and Shutterstock.Kate Gosselin, who shot to fame in the US after appearing in a reality TV docusoap ‘Jon Kate Plus 8’ about her life with her eight children, including sextuplets, is suing her husband for allegedly hacking into her personal email account, her phone and her bank account, as well as stealing a hard drive full of personal files including family photos.

The information yielded by the alleged hacking and data theft went into a much-hyped book on the couple’s very-publicised divorce, written by Robert Hoffman, a tabloid journalist and friend of Jon Gosselin, the celebrity husband who is also named in the suit.

The book was pulled by Amazon after allegations that it relied on improperly-sourced information.

Hoffman claims to have found the information by rummaging through Ms Gosselin’s bins, but is also quoted as hinting he has over 5,000 personal photos belonging to her – an unlikely find for a dumpster-diver.

The story has been carried by huge numbers of celeb-loving media outlets, including the notorious Mail Online website, probably mainly as an excuse to carry plenty of photographs of the plaintiff in a variety of outfits.

All stories of course refer to the heinous act of hacking.

The legal papers on the case, filed in the US District Court Eastern Division of Philadelphia and dug out by celeb site Radar Online among others, also make occasional use of the terms “hacking” and “hack”, but as so often in these cases it would appear that the words are being used in the loosest possible sense.

A more accurate way of describing the husband’s activities might perhaps be “guessing her password”, and possibly even “knowing the password having been married to her for 10 years”. There certainly seems to be no evidence of any special technical skill involved in accessing the information.

The moral of the story will of course be that you should ensure your passwords are fit for purpose and kept private.

Padlock. Image courtesy of Shutterstock.If you are a celebrity with oodles of private information you don’t want leaked in a bestselling memoir – and you have a grumpy and possibly vindictive former partner who might know (or have enough knowledge of you to guess) that your email account password is 12345 – you are best advised to change it as soon as possible.

And to change it to something that cannot be guessed, even by someone who knows the names of all your favourite pets, former teachers and most beloved sports teams.

The same advice holds true for normal people, as well as celebrity octomoms. Better still, let a password manager utility create properly complex passwords for you, different ones for all sites, and all hidden behind a single extra-strong passphrase.

There is of course another side to this story, as it would be unkind to put the blame entirely on someone who seems to be guilty of nothing more than the almost universal crime of poor password hygiene.

There have been many cases of partners falling out and using their intimacy to get at information about their estranged other halves that they really should not be seeing, and many of these cases, quite apart from being rather sad, involve some sort of crime being perpetrated.

In a lot of cases, those involved are not fully aware of the criminal nature of their activities.

So if you find yourself on the other side, trying to get at information which is not rightfully yours, ask yourself, should I really be doing this?

If it were, say, an expensive wristwatch or a fancy pair of shoes, rather than some digital bank records or racy celeb photos, would that make a difference? If it was secured by a physical lock rather than a password, would it be right to bust in and make off with the swag?

The answer should be, probably not – so leave that data alone.


Image of Kate Gosselin courtesy of s_bukley / Shutterstock.com. Image of padlock courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/foJ7I1z0ApY/

Anatomy of a dropped call

When you think of “signal jamming,” you probably imagine some kind of steel mesh that blocks out radio transmissions altogether, or a source of electromagnetic noise that interferes enough to make legitimate communication impossible.

But a paper presented by a trio of German researchers at the recent USENIX Security Symposium reveals a much more subtle approach to jamming mobile phone calls.

They were able to convert a single mobile phone into a denial of service (DoS) device that could be turned against another subscriber, perhaps wherever they roamed through a whole town or city.

The paper is quite technical, and unavoidably filled with the jargon of mobile telephony, yet the authors have done an excellent job of making it into a comprehensible read that teaches you a number of useful security lessons.

As they point out very clearly, many of the security decisions taken in the early days of the GSM (Global System for Mobile) system were based at least in part on security through obscurity.

You couldn’t just go out and buy your own base station, any more than you could get hold of your very own planet to experiment with plate tectonics.

And independent researchers couldn’t easily make their own customisable handsets in order to muck about with GSM in the privacy of their own laboratories, either.

All of that’s changed, with open source implementations available for both base stations and handsets.

As a result, security shortcuts that didn’t seem to matter much 20 years ago have come back to haunt us.

How your phone receives a call

Mobile phones aren’t in a perpetual state of readiness to receive calls or SMSes (text messages) instantaneously.

Instead, your phone spends most of its time in a low-power mode, from which it can be signalled to wake up fully to accept a call or message. (That’s why your phone battery may well last for days when you aren’t making or receiving calls, but typically only hours when you are.)

Rather casually simplified, and with apologies to the authors of the USENIX paper, this is what happens when a nearby cell tower decides it’s time for you to get a call:

  1. The base station sends out a broadcast page containing an identification code for your phone.
  2. Your phone recognises its own identification code.
  3. Your phone wakes up and responds to the base station.
  4. The base station and your phone negotiate a private radio channel for the call.
  5. Your phone authenticates to the base station.
  6. Your phone starts ringing (or an SMS arrives).

How an attacker can “jam” your calls

You can probably spot what computer scientists call a race condition in the sequence above, caused by the fact that authentication happens late in the game.

Every device in range can listen in to the broadcast pages inviting your phone to wake up, so a device that’s faster than yours can race you to step 5 and win, causing your phone’s attempt to authenticate to be rejected.

Of course, the “jamming” phone doesn’t know how to authenticate, but that doesn’t matter; in fact, it can deliberately fail the authentication, causing the process to bail out at step 5.

There is no step 6, so the call is lost – invisibly to you, because you lost the race to reply – and service is denied.

The authors got this attack working with a tweaked open source baseband (mobile phone firmware) that was adapted to ensure that it ran faster than a wide range of commercial handsets, including the Apple iPhone 4s, Samsung Galaxy S2 and Blackberry 9300 Curve.

How an attacker finds your phone

There is no authentication or encryption during the “are you there?” message and the “here I am!” reply, so an attacker doesn’t need any cryptographic cleverness to work out which messages are meant for what devices.

There is a slight complication, however: the attacker probably doesn’t know your phone’s identification code in advance.

To be strictly correct: the code is tied to your SIM card, not to the phone hardware itself, since every SIM has a unique code called an IMSI (International Mobile Subscriber Identity) burned into it, rather like the MAC address in a network card.

But GSM phones deliberately minimise the frequency with which unencrypted IMSIs are visible on the network, in order to provide you with some safety and privacy against being tracked too openly.

Instead, occasional exchanges involving your true IMSI are used to produce a regularly changing TMSI, where T stands for Temporary.

The TMSI is a pseudorandom, temporary identifier that varies as a matter of course as you turn your phone off and on or roam through a network.

The network operator maintains a list to keep track of which TMSI relates to what IMSI at any moment, but that database is unlikely to be accessible to an attacker.

The authors used traffic analysis to get round this problem.

While sniffing all the TMSIs being broadcast on the network, they call your number 10 to 20 times in quick succession, but deliberately drop each call after a few seconds.

The TMSI that suddenly appears 10 to 20 times in quick succession in the sniffer logs is almost certainly yours.

Easy, isn’t it?

→ As long as they drop the call after the TMSI has sent in a broadcast page but before your phone gets to step 6 above, your phone won’t ring and the imposter calls won’t show up. That means you won’t be aware that anything dodgy is going on. The authors used trial and error to determine a suitable call-drop delay for the network provider they targeted, finding that 3.7 seconds worked well.

How the attacker finds out which cell you are in

Here’s the thing: he doesn’t need to know more than your general location.

When you receive a call, the mobile network doesn’t page for your phone only in one cell of the network – it pages throughout your location area, which is a cluster of base stations in the vicinity.

This means that the network doesn’t need to keep precise tabs on you all the time, which in turn means that your phone doesn’t have to tell the network exactly where it is from moment to moment, thus extending battery life.

So as long as I know you are somewhere, say, in the City of Sydney, I can sit in a coffee shop at the Opera House and sniff for your TMSI wherever you go in town, because the broadcast pages that go out when I make those 10 to 20 bogus calls are duplicated everywhere in the location area.

fonez-maps-960

The authors did some warmapping drives around Berlin, their home turf, and determined that location areas can be very extensive, ranging from 100km2 to 500km2.

(For comparison, the City of Sydney, which stretches from the Harbour Bridge south as far as Central Station, is just 25km2.)

How the attacker can amplify the attack

Instead of looking out for your TMSI and blocking your calls, what if the attacker wanted to block every call to knock a large metro area out in one go?

One rigged sniffer phone alone couldn’t do it.

The authors found that although their tweaked phone baseband could beat many popular mobile phones in the race to authenticate, it still took about one second to “jam” each broadcast page, limiting each phone to about 60 “jammed” pages per minute.

So they built a rig with eleven tweaked phones, thus allowing them to subvert more than 600 broadcast pages per minute.

Their measurements suggested this would be enough to knock out the service of at least some of the four major German operators across one location area (100km2 – 500km2) in metro Berlin.

Remember that the eleven attack phones don’t have to be distributed through the location area, since all broadcast pages are replicated through all cells in the area.

The only problem the authors faced was how to allocate the TMSI broadcasts amongst their eleven tweaked phones.

Using a messaging system to hand out each successively sniffed TMSI to the next phone on the list required the use of a serial connection to each phone, which was too slow.

In the end, they simply allowed each phone to select TMSIs by a bit pattern, so that phone 1, for example, might handle TMSIs starting with the bytes 0x00 to 0x1F, and so on.

→ As an amusing side-effect of tuning the partitioning algorithm to ensure that each phone handled about the same quantity of broadcast pages, the authors noticed that the bytes in most TMSIs were far from randomly distributed. Ironically, in this case, the lack of randomness made the partitioning job harder, not easier.

What about interception, not just jamming?

As the authors note, in some mobile networks, they could go one step further than just cancelling your calls and knocking you off the network.

They observed that some networks, presumably for performance reasons, cheat a little on step 5, and don’t authenticate every call.

In these cases, an attacker who can win the race to step 5 can do more than cancel your call – he can accept it instead (or receive your SMS), from anywhere in your location area, and you won’t realise.

Also, some networks still use outdated, broken versions of the A5 encryption algorithm that is part of the GSM standard.

On these networks, your calls can be sniffed and decrypted anyway, but in a busy metro area, an attacker is faced with problems of volume: how to home in automatically only on the calls he really wants to intercept, without having to listen to everyone else’s chatter too.

The authors’ “jamming” firmware could be modified to do just that job, used as a call alerting mechanism instead of for a denial of service.

→ Sniffing the call data for later decryption can’t be done from anywhere in the location area, which is a small mercy, so an attacker needs to be in the same cell as you.

What to do about it?

You can probably guess what mitigations the authors proposed, because they are obvious and easy to say; you will also probably wonder if they will ever happen, because they involve change, and potentially disruptive change at that, so they are hard to do.

Defending against the eavesdropping and call hijacking problems is straightforward: perform authentication for every call or SMS, and don’t use broken versions of the GSM cipher.

The system already supports everything that’s needed; all that is required is for it to be turned on and used by every operator.

Defending against the denial of service problem is slightly trickier, as it needs a protocol change: move authentication up the batting order to prevent the race condition.

The authors propose a technically simply way to do this, but it means shifting some of the cryptographic operations from step 5 above into steps 1 and 2.

Will it happen?

Or will backward compatibility, the thorn that is making Windows XP so hard to dislodge, get in the way yet again?

Image of No Mobile Phones sign courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/95M9VGpCH6w/

Quantum crypto nearly ready to go mobile

Win a Samsung 40-inch LED HDTV with The Reg and HP!

While the world is still waiting for a full-blown quantum communications setup, quantum key distribution – QKD – is already a contested product market. Now, an international collaboration has shown that QKD can be brought to the smartphone.

The project, carried out by the University of Bristol, Cambridge, Griffith University in Queensland and , Xi’an Jiaotong University in China, has published a paper on Arxiv outlining its work.


The researchers have, essentially, split the QKD problem into a client-server architecture, allowing most of the “heavy lifting” to be carried out server-side so that a resource-constrained client like a smartphone. It wouldn’t work on any of today’s smartphones, since there’s still one somewhat exotic component needed at the client end, an on-chip polarisation rotator.

And the client device wouldn’t be able to use QKD over the air, since it would need to tether to a fibre to receive the quanta from the far end.

Whereas most QKD kit on the market today has quantum optics equipment at both ends, the scheme proposed in the Arxiv paper would do most of the quantum work at one end only. “Alice” creates the photons and sends them down the fibre to “Bob”, who only needs the capability to change the photons’ polarisation and send them back.

The protocol devised to make this work is called rfiQKD, “reference frame independent quantum key distribution”, and it works without needing to align Alice and Bob’s equipment. As it’s described at MIT’s Arxiv Blog:

“Instead Alice and Bob make measurements in random directions and then publish the list of directions for anyone to see. Only those measurements that happened to be aligned contribute to the code.”

As the researchers note in their paper, “the results significantly broaden the operating potential for QKD outside of the laboratory and pave the way for quantum enhanced security for the general public with handheld mobile devices.”

And before readers poke fun at the idea of a smartphone containing quantum polarisers on-board, think of this: how many of us carried around accelerometers ten years ago? ®

Win a top of the range HP Spectre laptop

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/29/quantum_crypto_nearly_ready_to_go_mobile/

Python regurgitates Dropbox secrets to boffins

Win a Samsung 40-inch LED HDTV with The Reg and HP!

A couple of security researchers have set spines shivering in the cloud world by demonstrating that Dropbox’s obfuscated code can be reverse-engineered, along the way capturing SSL data from the service’s cloud and bypassing the two-factor authentication used to secure user data.

However, as is clear from the Usenix research paper and has been confirmed by Dropbox, their work doesn’t create a generic attack vector. The attacks only work if the attacker already has unfettered access to the target machine.


As Dropbox puts it: “In the case outlined here, the user’s computer would first need to have been compromised in such a way that it would leave the entire computer, not just the user’s Dropbox, open to attacks across the board.” (More on this in a minute.)

Perhaps the most interesting aspect of the work by Openwall’s Dhiro Kholia and CodePainters’ Przemyslaw Wegrzyn is that they were able to reverse-engineer the heavily protected Dropbox Python code.

“Our work reveals the internal API used by Dropbox client and makes it straightforward to write a portable open-source Dropbox client,” they write. As a result, they say, it should be possible for researchers to subject Dropbox to more rigorous security analysis.

The researchers also observe that Dropbox’s two-factor authentication, used for accessing its Website, is not supported in the client software. “This implies that it is sufficient to have only the host_id value to gain access to the target’s data stored in Dropbox.”

However, the host_id value is stored on the local machine in an encrypted SQLite database – meaning it can only be recovered by someone with access to that machine. ®

Win a top of the range HP Spectre laptop

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/28/python_regurgitates_dropbox_secrets_to_boffins/

Tor usage up by more than 100% in August

Win a Samsung 40-inch LED HDTV with The Reg and HP!

The privacy-enhancing Tor network has seen its total number of users per day more than double in the last month, reaching the highest levels since the project first began compiling usage statistics.

Graph of Tor users for August 2013

Tor traffic was up all over the globe in August 2013 – and we do mean up (Source: Tor Project)


The network, which anonymizes internet traffic by routing it through a series of encrypted relays, had been humming along with an average base of around 500,000 directly connected users for most of the year.

But that started to change around mid-August, and the results were both sudden and dramatic. As of Wednesday, the Tor network was seeing more than 1,200,000 users connecting daily, a figure that topped the previous record of around 950,000 global daily users in January 2012.

The reasons for the usage spike are not clear, but you can pretty much take your pick. The figures come on the heels of a seemingly never-ending series of revelations about security agencies in the US and UK and their roles in spying on internet traffic, both at home and abroad.

In early August, Lavabit and Silent Circle both shut down their secure email services, citing government pressure and the difficulty involved in plugging all the leaks inherent in the internet email protocols.

Then, as the month rolled on, the US National Security Agency’s surveillance activities were revealed to have far surpassed the agency’s mandate to keep an eye on foreign agitators. We learned that NSA agents secretly yet routinely shared intelligence with the Drug Enforcement Administration, spied on thousands of US citizens who had no relationship to ongoing terror investigations, and even allegedly bugged the United Nations.

Across the pond, Blighty’s Government Communications Headquarters stormed the offices of The Guardian newspaper and smashed some of its computer equipment in an apparent attempt to intimidate it into not reporting on the GCHQ’s surveillance activities at home.

Sure enough, Tor users in the US and the UK made up a large portion of the total in August. Around 90,000 Americans were connecting to Tor daily at the start of the month, but that figure grew to around 150,000 daily users by the end. UK daily users grew from around 16,000 to more than 35,000.

But other countries saw similar increases, too. India’s Tor usage skyrocketed from just 7,500 daily users to over 32,000. In Brazil, usage climbed from around 15,000 to more than 85,000 users. Even China’s Tor usage was on the rise – though, given the PRC government’s tight control over internet access, there remain fewer than 400 confirmed Chinese Tor users per day, on average.

Mind you, there have been similar spikes in Tor usage before, and they have generally been short lived. It’s entirely possible that this latest increase may have nothing to do with public concern over domestic spying, but stems from some other cause.

For example, in early August the Tor Project admitted that the network had come under attack by a previously unknown malware exploit. A similar assault could potentially be possible for late August’s sudden surge in Tor usage.

The Reg will keep you posted if we learn anything new. But whatever the cause, as the Tor Project’s Roger Dingledine observed on Tuesday, “It’s not just a fluke in the metrics data – it appears that there really are twice as many Tor clients running as before.”

“Anybody know details?” Dingledine wrote. “It’s easy to speculate … but some good solid facts would sure be useful.” Indeed. ®

Win a top of the range HP Spectre laptop

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/29/tor_usage_up_by_more_than_100_in_august/