STE WILLIAMS

Snowden picks up ‘Epic 0wnage’ gong in Vegas… well, not literally

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Security researcher Barnaby Jack, famous for his “jackpot” hack on ATMs, which forced them to spit out cash, has won a lifetime achievement award less than a week after his death.

The honour was announced yesterday at the Pwnie awards, Infosec’s equivalent to the Oscars.


Jack, 35, died last Thursday just days before he was due to give a talk on electronic medical implants for humans at Black Hat. The slot at the Las Vegas conference was left open, allowing friends and colleagues to gather together and swap anecdotes about the famed white hat hacker.

Chris Valasek, director of security intelligence at IOActive – where Jack had worked as director of embedded device security – paid tribute to the famed ATM and medical device ethical hacker during the award ceremony.

Friends of Barnaby Jack have set up a fund which aims to raise $25,000, with donations thus far topping $13,000. “While there are no words to ever fully capture the man that Barnaby was, this fund is here to address any needs that the family may have and allow them to choose the way in which they feel best honors their beloved son,” a statement on the donation page explains.

The Pwnie awards take place each year at the Black Hat conference, celebrating both the best and worst in the field of information security.

NSA leaker Edward Snowden unsurprisingly won the Pwnie for “Epic 0wnage” at this year’s ‪ceremony.‬ General Keith Alexander, director of the NSA, who delivered to opening conference keynote, was mischievously named at the joint nominee for the award.

An award for the most innovative research went to Mateusz “j00ru” Jurczyk and Gynvael Coldwind for their study into Windows kernel vulnerabilities that resulted in the discovery of 37 previously unknown flaws.

An Adobe Reader buffer overflow and sandbox escape flaw (CVE-2013-0641) won a gong for best client-side bug, while Ben Murphy scooped the equivalent server-side award for unearthing serious vulnerabilities in a Ruby on Rails library (CVE-2013-0156).

David Wang (AKA planetbeing) and the evad3rs team scored the Best Privilege Escalation Bug accolade for developing ways to circumventing code signing in iOS.

The Pwnie for Epic Fail went to Hakin9 magazine, a publication best known for spamming security researchers with requests to write articles without payment that has made it the target of the occasional prank.

Best Song Pwnie went to ‪Dual Core’s ‬All The Things rap, ‪which features the chorus “We drink all the booze, hack all the things”, showing if nothing else a keen awareness of the target audience.‬

The full list of winners of this year’s Pwnies is here. A list of nominees for the awards can be found here. ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/02/pwnie_awards/

Terror cops visit family who Googled ‘backpacks’ and ‘pressure cooker’

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Freelance writer Michele Catalano thought she might get herself a pressure cooker to prepare Quinoa, the south American wonder-grain. Her husband wanted a new backpack.

Both did what you do these days: go online and search for them. Catalano’s husband did so from his work computer, and later left his job.


Nothing to see here, you say to yourself … except for the nasty coincidence that alleged Boston bombers Dzhokhar and Tamerlan Tsarnaev are said to have hidden pressure cookers in backpacks. But when Catalano’s husband left a job and his old boss looked at his search history, he or she decided to tip off the authorities.

The Catalanos found that out the hard way when, as Michele has blogged her husband “saw three black SUVs in front of our house; two at the curb in front and one pulled up behind my husband’s Jeep in the driveway, as if to block him from leaving.”

Here’s what happened next:

“Six gentleman in casual clothes emerged from the vehicles and spread out as they walked toward the house, two toward the backyard on one side, two on the other side, two toward the front door.”

Catalano says the six men were from the “joint terrorism task force” and asked her husband “Have you ever looked up how to make a pressure cooker bomb?” and numerous other questions to identify him, discern if he possessed a pressure cooker or has any interest in bombs.

After about 45 minutes, the agents left, leaving a shaken man, a very-viral blog post and a fascinating little insight into the war on terror behind them.

The last, Catalano says, was an utterance by one of the agents that “They mentioned that they do this about 100 times a week. And that 99 of those visits turn out to be nothing.”

Since Catalano’s first post, she’s popped out another explaining the source of the tip was not PRISM-style surveillance, but a tip from hubby’s employer to the local Suffolk Police Department. The fine men and women of that department have confirmed the source of the tip.

Her post concludes “All I know is if I’m going to buy a pressure cooker in the near future, I’m not doing it online.

“I’m scared. And not of the right things.”

Since that post it’s emerged that her fears should be directed at the climate of paranoia that led hubby’s employer to join the dots and find the image of a terrorist. Which of course is just how the terrorists want us to feel. ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/02/michele_catalano_home_visit_after_googling_backpacks_and_pressure_cookers/

‘Mm, we do love tweeters’ private info, we’ll take 40% more,’ say world’s g-men

Magic Quadrant for Enterprise Backup/Recovery

Twitter has seen a 40 per cent rise in requests from governments around the world for users’ personal information in the first half of this year, with the United States topping the list.

Apparently, snooping all over folks’ web and phone calls with its NSA PRISM project hasn’t sated Uncle Sam’s thirst for knowledge. Twitter said the US had accounted for over three-quarters of the 1,157 data requests it racked up.


The governments usually ask for the emails or IP addresses of Twitter accounts, such as in the case where the French government asked the microblogging site to give up the details of an account that posted anti-Semitic tweets.

The site’s transparency report doesn’t include the numbers on the secret information demands made by the US under the Patriot Act, since American firms aren’t allowed to acknowledge the existence of those requests.

The company said in a blog post that it had “joined forces with industry peers and civil liberty groups to insist that the United States government allow for increased transparency into these secret orders”.

“We believe it’s important to be able to publish numbers of national security requests – including FISA disclosures – separately from non-secret requests. Unfortunately, we are still not able to include such metrics,” manager for legal policy Jeremy Kessel said.

He also said that Twitter was facing increased efforts to censor content posted there by its users.

“Over the last six months, we have gone from withholding content in two countries to withholding content (ranging from hate speech to defamation) in seven countries,” he added. ®

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/01/twitter_transparency_government_demands/

Security breach at Opscode as attackers download databases

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Updated Opscode, the commercial side of the open source Chef configuration management tool beloved by Google, Facebook, and IBM, has warned customers that a flaw in an unnamed third-party application has left its wiki and ticketing system pwned.

“The attacker gained escalated privileges and downloaded the user database for the wiki and ticketing system,” the company said in a blog post on Thursday. “The user database that was accessed contained usernames, email addresses, full names, and hashed passwords.”


“We believe these passwords are adequately secure (the software in question uses the PBKDF2 algorithm), but we will be forcing a password change on the ticketing and wiki systems. If you use this password on other systems, we suggest choosing a new password on those systems as well. We will also contact the affected users via email today.”

The company was alerted to the attack by internal security monitoring, the attacker has been kicked out, and now a full investigation is underway using forensics the team has gathered. There’s no word as to whether the police are involved.

Opscode says there’s “currently no evidence” that hosted data has been copied or compromised, but it recommends users who use the same username and password for hosted accounts should also change passwords.

It’s an embarrassing issue for a company that has become something of a cloud and datacenter darling of late, but it could happen to anyone these days and such openness is to be commended.

The company promises more details as they become available. ®

Update

Opscode has provided more details about the hacking attack, and says that all hosted Chef data is now confirmed to be secure and untouched.

“The attack happened around 1pm yesterday, and our security systems picked it up in under five minutes,” Pauly Comtois, director of operations, told El Reg. “Once we were alerted that someone was running a script in the system, we pulled the plug on the box and took it offline immediately.”

Overnight, two Opscode teams worked on the problem. The first set about rebuilding the wiki and ticketing system from the ground up so that normal services wouldn’t be interrupted, while a second team took the original system and started gathering forensic evidence.

It appears the attacker used a vulnerability in the wiki software and ran a JavaScript program from the Uniform Resource Identifier. In the short time before being spotted, the attacker was able to download some database data, but nothing too serious.

While the attacker got some information, all passwords are secure from anything but a brute force attack requiring significant processing time, but Comtois said the company wants to let users know about the breach so that they could take precautions – just in case.

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/01/security_breach_at_opscode_means_all_change_for_customer_passwords/

Facebook: ‘Don’t worry, your posts are SECURE with us’

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Facebook has announced that it has finished migrating its users to secure browsing, with all 1.15 billion active user accounts now accessing the site over encrypted HTTPS by default.

The social network first offered secure browsing as an option in January 2011, and then slowly began making it the default in various regions. It flipped the switch for North American users in November 2012, but it took several more months for it to follow suit for the rest of the world.


“Now that https is on by default, virtually all traffic to www.facebook.com and 80% of traffic to m.facebook.com uses a secure connection,” Facebook engineer Scott Renfro wrote in a blog post on Wednesday. “Our native apps for Android and iOS have long used https as well.”

The migration process took as long as it did, Renfro explained, because switching all of Facebook over to secure browsing wasn’t as simple as just switching the URL protocol from HTTP to HTTPS.

There were a variety of up-front engineering puzzles to solve, such as how to ensure that Facebook’s authentication cookies were only visible over secure connections, and how to upgrade users to secure connections “in flight” if they happened to navigate to a Facebook page from an insecure link.

Zuck Co. also needed to give its application-development partners time to upgrade their apps to support HTTPS, because insecure third-party apps would stop working if they were embedded in secure Facebook pages. Typically, developers were given 150 days to switch their apps over.

And then there was the problem of mobile devices that lacked full support for HTTPS. Because Facebook dare not scare away mobile users – mobile ads made up 41 per cent of its ad revenue in its most recent quarter – there needed to be a way to downgrade the user’s connection to HTTP on phones that couldn’t handle the encryption.

But the biggest issue, Renfro said, was performance. Secure sessions require extra chitchat between client and server, which can bog down connections if you’re in a part of the world where network conditions are poor. To help alleviate the problem, Facebook has been deploying custom load balancers around the world to help route traffic to its data centers, while simultaneously improving the efficiency of its secure session handshaking.

The move sees Facebook join a growing number of companies that have made secure connections standard for their online services. Google made HTTPS the default for all web searches in 2011, for example, and Twitter switched to always-on encryption the following year.

But there are still additional hurdles ahead. Like many other companies, Facebook has committed to switching to 2048-bit encryption keys for additional security. It also hopes to switch to elliptic-curve cryptography algorithms in the near future, which are more computationally efficient, and to implement stricter session controls as it phases out the option to opt out of HTTPS.

“Turning on https by default is a dream come true, and something Facebook’s Traffic, Network, Security Infrastructure, and Security teams have worked on for years,” Renfro wrote. “We’re really happy with how much of Facebook’s traffic is now encrypted and are even more excited about the future changes we’re preparing to launch.” ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/01/facebook_https_by_default/

Hackers induce ‘CATASTROPHIC FAILURE’ in mock oil well

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Black Hat 2013 Security researchers have demonstrated how to exploit widely deployed SCADA systems to spoof data to the operator, and remotely control equipment such as pumps in oil pipelines.

The exploits were demonstrated live at Black Hat 2013 in Las Vegas on Thursday, and saw security engineers from energy sector process automation company Cimation remotely control the valves within a pretend oil well.


The simulation rig consisted of a liquid container that stood in for an oil well, connected to a pump that connected to an isolation valve, which then connected to a simulated tank; the system was controlled by a programmable logic controller (PLC) within a SCADA system.

Engineers Eric Forner and Brian Meixell demonstrated a way to remotely control the PLC that sends signals to devices on the simulated pipeline, and were able to turn pumps on and off – which in the real world could cause an oil pipeline to rupture. They also were able to send contrasting data to the Human Machine Interface (HMI) that sends data up to an operator.

“It’s not rocket science, but it’s extremely dangerous,” Forner says. “In real life that would be a pipe blowout. That could be oil or acid or anything.”

The researchers were able to do this because many PLCs are exposed to the internet with public IP addresses, and they frequently don’t have Ethernet built-in, but instead have an old Ethernet module that plugs into their backplane. These Ethernet modules typically run an ancient version of Linux and are very easy to exploit, Forner says.

“It’s usually just an embedded piece of hardware and runs VxWorks or some BusyBOX distro or RTOS, or some of them – God forbid – write their own OSs”

Once inside the Ethernet system, the engineers can then start to send commands to the PLC itself. Though companies implement safety logic in their PLCs that is designed to avoid damaging scenarios such as a pump being turned on in an already highly-pressurized system, this can be worked around, they said. Once the researchers gain access to the PLC, they can simply overwrite the logic with new safety logic that lacks these protections, and then enter malicious commands.

As of 2012, there are some 93,793 nodes on the public internet listening on port 502, according to the 2012 Internet Census, and the researchers suspect a large number of these are PLCs out in the field.

They were also able to spoof data to the Human Machine Interface (HMI) system which allows field workers and remote administrators to monitor the system. HMIs are frequently vulnerable to trivial attacks.

“A lot of them are Windows-based machines and woefully out of date, and the reason is you’re in production and you never want them to go down. Every day you’re not producing oil or some chemical is money down the drain,” Forner says.

The team was able to start overloading the pretend oil tank, while outputting data to the HMI that said the fluid level in the tank was falling. This would cause an operator to typically pump more into the tank, so even if the underlying PLC has not been compromised, this provides another route of attack. In a final flourish, they uploaded their own binaries to the cracked HMI and had a game of Solitaire.

They also discussed ways to get at PLCs not kept on the company network. Hackers can do this by cracking their way into a company’s enterprise network, then proceeding down the stack until they reach the PLC.

In an admission sure to induce brown trousers in people who live near oil pipelines, the researchers said that energy networks are very pooly protected.

“A lot of the firewalls that are implemented are put in place because people need to comply to a standard, and they end up leaving all traffic to pass,” Meixell says.

“Even worse is no firewalls, where everything is on a flat network – anything from your SAP up to your WebSphere can talk directly. It’ll be on the same LAN as your PLCs and controller hardware,” Forner says with a hint of maniacal glee – an emotion that he radiated throughout the presentation, and which climaxed when the test rig began spraying dyed-green water onto the assembled cheering audience. ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/01/scada_plc_vulnerability/

Gmail, Outlook.com and e-voting ‘pwned’ on stage in crypto-dodge hack

Cloud storage: Lower cost and increase uptime

Black Hat 2013 Security researchers say they have developed a trick to take over Gmail and Outlook.com email accounts by shooting down victims’ logout requests – even over a supposedly encrypted connection.

And their classic man-in-the-middle attack could be used to compromise electronic ballot boxes to rig elections, we’re told.


Ben Smyth and Alfredo Pironti of the French National Institute for Research in Computer Science and Control (INRIA) announced they found a way to exploit flaws in Google and Microsoft’s web email services using an issue in the TLS (Transport Layer Security) technology, which encrypts and secures website connections.

Full details of the attack are yet to be widely disseminated – but it was outlined for the first time in a demonstration at this year’s Black Hat hacking convention in Las Vegas on Wednesday.

In short, we’re told, it uses a TLS truncation attack to block victims’ account logout requests so that they unknowingly remain logged in at their PC: when the request to sign out is sent, the attacker injects an unencrypted TCP FIN message to close the connection. The server-side therefore doesn’t get the request and is unaware of the abnormal termination.

The pair explained:

In essence, we block encrypted messages that are sent over the network to de-synchronize authorisation: we force Gmail and Hotmail [Outlook.com] to display on your browser the page that announces that you have successfully signed-out, whilst ensuring that your browser maintains authorisation with Gmail and Hotmail [Outlook.com].

Given such an announcement, you should be assured that you are secure, in particular, a hacker should not be able to access your email, even if you [log out and] leave your computer unattended. However, we can violate this basic security premise and access your Gmail and Hotmail [Outlook.com] accounts just by reloading the web page.

The attack does not rely on installing malware or similar shenanigans: the miscreant pulling off the trick must simply put herself between the victim and the network. That could be achieved, for example, by setting up a naughty wireless hotspot, or plugging a hacker-controlled router or other little box between the PC and the network.

The researchers warned that shared machines – even un-compromised computers – cannot guarantee secure access to systems operated by Helios (an electronic voting system), Microsoft (including Account, Hotmail, and MSN), nor Google (including Gmail, YouTube, and Search).

“This blocking can be accomplished by a so-called ‘man in the middle’,” Pironti told El Reg.

“Technically, whatever piece of hardware is relaying data between you and Google could decide to stop relaying at some point, and do the [logout] blocking.

“In practice, this is very easy to do: with wireless networks (e.g. setting up a rogue access point) or with wired networks (e.g. by adding a router between your cable and the wall plug – alternatively this could be done with custom-built hardware, which could be very small).”

Block and tackle

Several attacks might be possible as a result of the vulnerability, according to Pironti.

“In the context of voting, a single malicious poll station worker could do the attack, voting at his pleasure for any voter. He sets up his man-in-the-middle, then waits for a designated victim to enter the voting booth. The man-in-the-middle device blocks the relevant messages. Then the malicious worker enters the voting booth (e.g. with the excuse to check that the machine is operational) and votes on the victim’s behalf.”

Webmail attacks on shared computers in settings such as libraries are also possible. An attacker simply needs to access a computer after a mark incorrectly believes she has signed out.

Unbeknown to the user, the hacker’s hardware will have blocked the relevant messages, yet the user must be shown what appears to be a “you’ve signed out” page – the core element of the con. After that, it’s easy for an adversary to use the computer to access the user’s email.

“We believe this [problem] is due to a poor understanding of the security guarantees that can be derived from TLS and the absence of robust web application design guidelines. In publishing our results, we hope to raise awareness of these issues before more advanced exploits, based upon our attack vector, are developed,” the researchers concluded.

The attack developed by INRIA is apparently possible thanks to a de-synchronisation between the user’s and server’s perspective of the application state: the user receives feedback that her sign-out request has been successfully executed, whereas, the server is unaware of the user’s request.

“It follows intuitively that our attack vector could be exploited in other client-server state transitions,” Smyth and Pironti explained.

Mitigating the attack could be achieved by reliably notifying the user of server-side state changes. “Unfortunately, the HTTP protocol is unsuited to this kind of notification”, we’re told, so the researchers advocate the use of technologies such as the SPDY networking protocol and AJAX (asynchronous JavaScript and XML, a web development framework).

The two researchers shared their findings with Google and Microsoft; the web advertising giant acknowledged the discovery in its application security hall of fame.

Smyth and Pironti’s presentation of their research was titled Truncating TLS connections to violate beliefs in web applications. The researchers were seemingly able to exploit the Helios electronic voting system to cast ballots on behalf of voters, take full control of Microsoft Live accounts, and gain temporary access to Google accounts.

Subtle reasons make Microsoft’s webmail service more exposed than its Google equivalent, Pironti explained.

“Google happens to be less exposed for two reasons,” Pironti told El Reg. “First, our attack relies on a de-synchronisation at the server side: it happens that Google ensures synchronisation every five minutes, which makes our attack [only] work within this five minutes window. Second, Microsoft allows you to change your password without re-typing the old one, so once we access the user account, we can change its password and get full control.”

Pironti said the research didn’t look at other popular webmail systems, such as Yahoo!’s, so he can’t say for sure whether they are vulnerable or not.

“We suspect many other services are broken, but we didn’t look into details,” he said. ®

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/01/gmail_hotmail_hijacking/

Edward Snowden skips into Russia as Putin grants him asylum

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

NSA whistleblower Edward Snowden has been granted temporary asylum in Russia.

Russia’s decision to grant the former CIA technician temporary political asylum has allowed the 30-year-old to leave the transit area of Moscow’s Sheremetyevo airport – where he has been stuck in limbo for weeks following his flight from Hong Kong on 23 June.


US authorities revoked his passport shortly after Snowden outed himself as the source of leaks about the NSA‘s controversial planet-wide internet surveillance programs.

The resulting lack of travel documentation meant Snowden could neither leave Russia nor enter it, dumping him in the airport’s neutral transit area.

Snowden’s legal representative in Russia, Anatoly Kucherena, confirmed that papers allowing the ex-NSA contractor to live and work in Russia for a year had been obtained. Snowden has already fled the transit zone of Moscow’s Sheremetyevo Airport, Russia Today reports, citing eyewitness reports from a crew on the scene.

RT further claims to have obtained a picture of Snowden’s temporary visa, in a still captured by one of its news crews at the airport:

Edward Snowdens asylum documents. Source: RT

Edward Snowdens asylum documents, as claimed by Russia Today

Wikileaks, which has been providing legal assistance to Snowden, confirmed his exit:

Kucherena said that Snowden’s location would remain a secret due to ongoing concerns for his well-being and safety.

Moscow was supposed to be a stopover for Snowden en route to permanent asylum in either Ecuador and Venezuela, it is understood. Ecuador, which gave Snowden papers that allowed him to fly between Hong Kong and Moscow, got cold feet about extending an offer of permanent asylum after the US threatened it with trade and diplomatic sanctions.

The private jet of the Bolivian president was denied clearance to fly over Spanish, French or Portuguese airspace last month over suspicions Snowden might be on board. These rumours proved to be groundless, but illustrated the practical problems Snowden faced if he wanted to reach any of the three South American countries, including Venezuela and Bolivia, which had offered him asylum.

Snowden applied for political asylum in Russia last month, announcing the move during a press conference in the Moscow airport’s transit area. Russian President Vladimir Putin previously said asylum for Snowden would only be possible possible if the leaker stopped harming the US (he must “cease his work aimed at inflicting damage on our American partners”, as the ex-KGB officer put it). It’s unclear if Snowden has agreed to this condition.

Snowden’s extended stay in the Moscow Airport’s transit area frequently started resembling scenes from a Hollywood movie. Attempts by international journalists to locate him went amusingly awry when the press pack boarded a non-stop alcohol-free flight to Havana that Snowden was booked on but never took. Best of all was an impromptu marriage proposal by ineffective Russian spy-turned-TV-presenter Anna Chapman. ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/01/snowden_russian_asylum/

Mm, we do love tweeters’ private info, we’ll take 40% more, say world’s g-men

Magic Quadrant for Enterprise Backup/Recovery

Twitter has seen a 40 per cent rise in requests from governments around the world for users’ personal information in the first half of this year, with the United States topping the list.

Apparently, snooping all over folks’ web and phone calls with its NSA PRISM project hasn’t sated Uncle Sam’s thirst for knowledge. Twitter said the US had accounted for over three-quarters of the 1,157 data requests it racked up.


The governments usually ask for the emails or IP addresses of Twitter accounts, such as in the case where the French government asked the microblogging site to give up the details of an account that posted anti-Semitic tweets.

The site’s transparency report doesn’t include the numbers on the secret information demands made by the US under the Patriot Act, since American firms aren’t allowed to acknowledge the existence of those requests.

The company said in a blog post that it had “joined forces with industry peers and civil liberty groups to insist that the United States government allow for increased transparency into these secret orders”.

“We believe it’s important to be able to publish numbers of national security requests – including FISA disclosures – separately from non-secret requests. Unfortunately, we are still not able to include such metrics,” manager for legal policy Jeremy Kessel said.

He also said that Twitter was facing increased efforts to censor content posted there by its users.

“Over the last six months, we have gone from withholding content in two countries to withholding content (ranging from hate speech to defamation) in seven countries,” he added. ®

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/01/twitter_transparency_government_demands/

Syrian Electronic Army no longer just Twitter feed jackers… and that’s bad news

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

The Syrian Electronic Army is starting to pose a serious risk to enemies of the Assad regime in both Syria and further afield, according to security watchers.

Reports that the SEA managed to take over three personal email accounts of White House employees remain unconfirmed. However, recent worrying attacks on VoIP apps Viber and Tango mean that officials and security researchers need to keep a closer eye on the group, argues anti-malware tools firm FireEye.


The security company warns that in graduating from compromising the Twitter feeds of various media outlets – albeit with costly consequences – to attacking VoIP apps, the group has emerged as a much more serious threat.

“Successful attacks on international communications sites such as TrueCaller, Tango, and Viber could give Syrian intelligence access to the communications of millions of people,” Ayed Alqatarh, a system engineer at FireEye warns. “Such attacks can also put human beings in real danger through espionage, intimidation, and/or arrest.”

Who are the Syrian Electronic Army?

The SEA is a prolific hacker crew loyal to Syrian President Bashar al-Assad that sprung into life in mid-2011. Its antics since have included DDoS attacks, phishing against social media profiles and pro-Assad defacements. The group has targeted governments, online services and media that are perceived to be hostile to the Syrian government.

Its defacements and Twitter account hijackings are often carried out to push propaganda messages ranging from shock videos of alleged jihadist atrocities to (more recently) satirical cartoons.

The SEA has successfully targeted Twitter accounts and other social media profiles run by Al-Jazeera, the Associated Press, BBC, Daily Telegraph, Financial Times, The Guardian, Human Rights Watch, America’s National Public Radio, and more.

The group’s infamous hijack of AP’s eponymous Twitter account, spreading a false rumour that the White House had been bombed and President Obama injured, briefly wiped billions of dollars off the stock market.

Over the last two weeks alone, the SEA has recently compromised three widely used online communications websites, each of which could have serious real-world consequences for Syria’s political opposition.

The SEA hacked the Swedish site Truecaller, home to the world’s largest online telephone directory with over a billion phone numbers in over 100 countries, on 16 July. FireEye said the attack was pulled off using a vulnerable version of WordPress. After the attack, hacktivists boasted they had snatched access codes to more than a million Facebook, Twitter, LinkedIn and Gmail accounts.

Less than a week later, the SEA followed up with a successful hack against video and text messaging service Tango on 21 July, stealing more than 1.5 TB of user information, names, phone numbers, emails, and personal contacts for millions of accounts. Once again, a vulnerable version of WordPress (version 3.2.1), allowed hackers affiliated with the SEA to lift confidential information from a database server.

The trifecta of serious hacks was completed on 24 July when the SEA hacked Viber, a free online calling and messaging application used by more than 200 million users in 193 countries. Viber acknowledged but played down the significance of the attack, which it said had been pulled off using a phishing scam that gave the SEA access to Viber’s customer support site. The VoIP provider has denied any private user information was compromised.

FireEye’s Ayed Alqatarh argues that although the scope and number of assaults distinguishes the SEA from other patriotic hacking groups, it shares some similarities.

“The SEA, just like other ‘patriotic hackers’ around the world, is proving that a small group of expert hackers can be a force on the international stage,” Alqatarh writes. “SEA pays no attention to traditional international borders, attacking both Syrians and non-Syrians, inside Syria and in many other countries.”

The SEA’s make up or exact relationship to the Syrian government is unclear, however the domain name for the SEA’s website was registered by the Syrian Computer Society, which was previously led by President Bashar Assad. The group has targeted domestic dissidents and as well as foreign enemies of the Assad regime.

The hacktivists often send socially-engineered spear-phishing emails to lure opposition activists into opening fraudulent, malware-laden documents, says FireEye. Targeted Facebook users have also been tricked into giving up their login information.

The security researchers say the group has also been linked to the use of Trojans such as Blackshades, DarkComet, Fynloski, Rbot, Xtreme RAT, and Zapchast, which have all been deployed against dissidents in Syria to steal documents and passwords, install keylogging software onto computers and otherwise spy on targets.

Alqatarh speculates that the depth and diversity of the hacking crew’s activities make it likely that it has the support of many civilian volunteers.

“The SEA’s ability to operate within the same online spaces that are typically dominated by young, tech-savvy internet users has been key to its success,” he said. “And to some degree, as in other ‘patriotic hacker’ conflicts, the ambiguous nature of their relationship gives the Syrian government some protection from the legal and political consequences of SEA’s attacks.”

A blog post on the SEA by Alqatarh and Kenneth Geers, a senior global threat analyst at FireEye, can be found here. ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/01/sea_analysis/