STE WILLIAMS

Gmail is secure. Netflix is secure. Together they’re a phishing threat

A developer has discovered that Gmail’s email handling creates a handy phishing vector to attack Netflix customers.

The problem is that Netflix, like most systems, recognises dots in e-mail handles (so richardchirgwin and richard.chirgwin are different accounts) – but Gmail does not.

Over the weekend, developer James Fisher described his experience here: he received a legitimate e-mail from Netflix addressed to james.hfisher@gmail.com that Gmail helpfully redirected to his dotless account.

Email from Netflix to James Fisher

Geniune in almost every way: the e-mail Fisher received

Since the e-mail arrived to the correct inbox, and since it genuinely came from Netflix, Fisher came close to accepting its request that he update his details – except that he didn’t recognise the credit card attached to the “dotted” account.

If someone accidentally adds dots to your address, Gmail will still send you that email. For example, if your email is johnsmith@gmail.com, you own all dotted versions of your address:

john.smith@gmail.com

jo.hn.sm.ith@gmail.com

j.o.h.n.s.m.i.t.h@gmail.com

This, Fisher wrote, creates the phishing vector: if an attacker tried hard enough, they would find a Netflix account whose Gmail registration already exists, and can register another account with an extra dot in the Gmail address.

If the attacker signed up with a “throwaway” card number, and then cancelled the card, Netflix would email the “real” Gmail account-holder asking for a valid card. It only needs the recipient to do so without noticing a discrepancy, and the attacker has tricked someone into paying for their streaming.

Security luminary Bruce Schneier commented that the problem is subtle: “It’s an example of two systems without a security vulnerability coming together to create a security vulnerability.”

Fisher suggested two possible fixes: Google could warn a Gmail user prominently that an e-mail was sent to a “non-standard” address, and should let users opt-out of the “dots don’t matter” feature.

He added that he believes the feature should be retired. Google, however, has promoted it as a useful feature. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/10/gmail_netflix_phishing_vector/

Gmail is secure. Netflix is secure. Together they’re a phishing threat

A developer has discovered that Gmail’s email handling creates a handy phishing vector to attack Netflix customers.

The problem is that Netflix, like most systems, recognises dots in e-mail handles (so richardchirgwin and richard.chirgwin are different accounts) – but Gmail does not.

Over the weekend, developer James Fisher described his experience here: he received a legitimate e-mail from Netflix addressed to james.hfisher@gmail.com that Gmail helpfully redirected to his dotless account.

Email from Netflix to James Fisher

Geniune in almost every way: the e-mail Fisher received

Since the e-mail arrived to the correct inbox, and since it genuinely came from Netflix, Fisher came close to accepting its request that he update his details – except that he didn’t recognise the credit card attached to the “dotted” account.

If someone accidentally adds dots to your address, Gmail will still send you that email. For example, if your email is johnsmith@gmail.com, you own all dotted versions of your address:

john.smith@gmail.com

jo.hn.sm.ith@gmail.com

j.o.h.n.s.m.i.t.h@gmail.com

This, Fisher wrote, creates the phishing vector: if an attacker tried hard enough, they would find a Netflix account whose Gmail registration already exists, and can register another account with an extra dot in the Gmail address.

If the attacker signed up with a “throwaway” card number, and then cancelled the card, Netflix would email the “real” Gmail account-holder asking for a valid card. It only needs the recipient to do so without noticing a discrepancy, and the attacker has tricked someone into paying for their streaming.

Security luminary Bruce Schneier commented that the problem is subtle: “It’s an example of two systems without a security vulnerability coming together to create a security vulnerability.”

Fisher suggested two possible fixes: Google could warn a Gmail user prominently that an e-mail was sent to a “non-standard” address, and should let users opt-out of the “dots don’t matter” feature.

He added that he believes the feature should be retired. Google, however, has promoted it as a useful feature. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/10/gmail_netflix_phishing_vector/

Company insiders behind 1 in 4 data breaches – study

The admins among you will be unsurprised to discover that, more than a quarter of the time, data breaches across the world originated between the chair and the keyboard of organisation “insiders”. And no, we don’t mean they clicked on a dodgy link…

The latest edition of Verizon’s Data Breach Investigations Report (DBIR) found that 25 per cent of all attacks over the year were perpetrated by said insiders and were driven largely by financial gain, espionage and simple mistakes or misuse.

It also reports that organised criminal groups continue to be behind around half of all breaches, while state-affiliated groups were involved in more than one in 10. Financial gain, unsurprisingly, continued to be the top motivation for cybercriminals.

The healthcare industry was found to be at particularly high risk of insider threats through errors and employee misuse – such as medical workers accessing patient records for simple curiosity or fun.

Verizon notes that organisations face a rising number of external attacks, increasingly carried out by organised criminals.

The scourge of ransomware increased throughout the year. Ransomware incidents more than doubled again this year compared to last year’s DBIR.

Ransomware is the most common type of malware, turning up in 39 per cent of malware-related data breaches – double that of last year’s DBIR, and featuring in more than 700 incidents. Verizon’s analysis show that attacks are now moving into business critical systems, encrypting file servers or databases, inflicting more damage and commanding bigger ransom requests.

Companies are nearly three times more likely to be breached by social attacks than via actual vulnerabilities, emphasising the need for ongoing employee cybersecurity education.

The report notes a significant trend in social-engineering and “pretexting” attacks targeting finance and HR departments, with nearly 1,500 incidents and nearly 400 confirmed data breaches reported. In these attacks, hackers may seek to convince finance departments to make a transfer of funds by posing as a company CEO.

Human Resource (HR) departments across multiple verticals are also being targeted in a bid to extract employee wage and tax data, so criminals can commit tax fraud and divert tax rebates.

Financial pretexting targeting HR departments has more than doubled since the 2017 DBIR, with 170 incidents analysed this year (compared to just 61 incidents in the 2017 DBIR). Eighty-eight of these incidents specifically targeted HR staff to obtain personal data for the filing of file fraudulent tax returns.

Simple errors – such as failing to shred confidential information, sending emails to the wrong person or misconfiguring web services – were at the heart of nearly one in five breaches. More than 20 per cent people still click on at least one phishing campaign during a year.

Denial-of-service attacks also remain a problem. DDoSing can impact anyone and is often used as camouflage, often being started, stopped and restarted to hide other breaches in progress, Verizon warned, adding that such attacks are nonetheless manageable providing the correct DDoS mitigation strategy is in place.

The majority of attacks were perpetrated by outsiders; 27 per cent involved internal actors; 2 per cent involved partners; and 2 per cent feature multiple partners. Organised crime groups still account for 50 per cent of the attacks analysed.

Over two-thirds (68 per cent) of breaches took months or longer to discover.

Verizon’s latest DBIR offers an analysis of over 53,000 security incidents and 2,216 breaches across 65 countries. The report draws its findings from an analysis of real-world data breaches investigated by Verizon and an extensive range of third-party contributors during the last 12 months.

Regular contributors to the study – now in its 11th edition – include the likes of the US Secret Service, UK legal services firm Mishcon de Reya, UK insurer Chubb and the Irish Reporting and Information Security Service (IRISS CERT) among others.

Biggest risks per industry

This year’s report highlights the biggest threats faced by individual industries, alongside guidance on what companies can do to mitigate these risks.

  • Education – Social engineering targeting personal information is high, which is then used for identity fraud. Highly sensitive research is also at risk, with 20 per cent of attacks motivated by espionage. 11 per cent of attacks also have “fun” as the motive rather than financial gain.
  • Financial and insurance – Payment card skimmers installed on ATMs are still big business; however, there’s also been a rise in “ATM jackpotting”, where fraudulently installed software or hardware instructs the ATMs to release large amounts of cash. DDoS attacks are also a threat.
  • Healthcare – The only industry where insider threats are greater than threats from the outside. Human error remains a major contributor to healthcare risks.
  • Public Sector – Cyber-espionage remains a major concern, with 43 per cent of breaches being espionage motivated. However, it is not only state secrets that are a target; personal data is also at risk.

®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/10/verizon_dbir/

Company insiders behind 1 in 4 data breaches – study

The admins among you will be unsurprised to discover that, more than a quarter of the time, data breaches across the world originated between the chair and the keyboard of organisation “insiders”. And no, we don’t mean they clicked on a dodgy link…

The latest edition of Verizon’s Data Breach Investigations Report (DBIR) found that 25 per cent of all attacks over the year were perpetrated by said insiders and were driven largely by financial gain, espionage and simple mistakes or misuse.

It also reports that organised criminal groups continue to be behind around half of all breaches, while state-affiliated groups were involved in more than one in 10. Financial gain, unsurprisingly, continued to be the top motivation for cybercriminals.

The healthcare industry was found to be at particularly high risk of insider threats through errors and employee misuse – such as medical workers accessing patient records for simple curiosity or fun.

Verizon notes that organisations face a rising number of external attacks, increasingly carried out by organised criminals.

The scourge of ransomware increased throughout the year. Ransomware incidents more than doubled again this year compared to last year’s DBIR.

Ransomware is the most common type of malware, turning up in 39 per cent of malware-related data breaches – double that of last year’s DBIR, and featuring in more than 700 incidents. Verizon’s analysis show that attacks are now moving into business critical systems, encrypting file servers or databases, inflicting more damage and commanding bigger ransom requests.

Companies are nearly three times more likely to be breached by social attacks than via actual vulnerabilities, emphasising the need for ongoing employee cybersecurity education.

The report notes a significant trend in social-engineering and “pretexting” attacks targeting finance and HR departments, with nearly 1,500 incidents and nearly 400 confirmed data breaches reported. In these attacks, hackers may seek to convince finance departments to make a transfer of funds by posing as a company CEO.

Human Resource (HR) departments across multiple verticals are also being targeted in a bid to extract employee wage and tax data, so criminals can commit tax fraud and divert tax rebates.

Financial pretexting targeting HR departments has more than doubled since the 2017 DBIR, with 170 incidents analysed this year (compared to just 61 incidents in the 2017 DBIR). Eighty-eight of these incidents specifically targeted HR staff to obtain personal data for the filing of file fraudulent tax returns.

Simple errors – such as failing to shred confidential information, sending emails to the wrong person or misconfiguring web services – were at the heart of nearly one in five breaches. More than 20 per cent people still click on at least one phishing campaign during a year.

Denial-of-service attacks also remain a problem. DDoSing can impact anyone and is often used as camouflage, often being started, stopped and restarted to hide other breaches in progress, Verizon warned, adding that such attacks are nonetheless manageable providing the correct DDoS mitigation strategy is in place.

The majority of attacks were perpetrated by outsiders; 27 per cent involved internal actors; 2 per cent involved partners; and 2 per cent feature multiple partners. Organised crime groups still account for 50 per cent of the attacks analysed.

Over two-thirds (68 per cent) of breaches took months or longer to discover.

Verizon’s latest DBIR offers an analysis of over 53,000 security incidents and 2,216 breaches across 65 countries. The report draws its findings from an analysis of real-world data breaches investigated by Verizon and an extensive range of third-party contributors during the last 12 months.

Regular contributors to the study – now in its 11th edition – include the likes of the US Secret Service, UK legal services firm Mishcon de Reya, UK insurer Chubb and the Irish Reporting and Information Security Service (IRISS CERT) among others.

Biggest risks per industry

This year’s report highlights the biggest threats faced by individual industries, alongside guidance on what companies can do to mitigate these risks.

  • Education – Social engineering targeting personal information is high, which is then used for identity fraud. Highly sensitive research is also at risk, with 20 per cent of attacks motivated by espionage. 11 per cent of attacks also have “fun” as the motive rather than financial gain.
  • Financial and insurance – Payment card skimmers installed on ATMs are still big business; however, there’s also been a rise in “ATM jackpotting”, where fraudulently installed software or hardware instructs the ATMs to release large amounts of cash. DDoS attacks are also a threat.
  • Healthcare – The only industry where insider threats are greater than threats from the outside. Human error remains a major contributor to healthcare risks.
  • Public Sector – Cyber-espionage remains a major concern, with 43 per cent of breaches being espionage motivated. However, it is not only state secrets that are a target; personal data is also at risk.

®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/10/verizon_dbir/

Death in paradise: ‘Cyber attack’ takes out national government’s IT

Eeek! A nation’s entire government is staggering to its feet after being shut down for a week due to a “cyber attack”.

The nation in question is Sint Maarten, an independent country within the Kingdom of the Netherlands. It is otherwise known as the southern “Dutch bit” of the Caribbean island Saint Martin and has an area of a mere 34km2. (The northern “French bit”, the république of Saint-Martin, measures 53 km2.) Sint Maarten has a population of just over 42,000 and tourism dominates its economy.

Local organ The Daily Herald reported the “attack” struck on 2 April, but yesterday said public services were to “resume” shortly.

News has since dribbled out on Facebook, as follows.

The nature of the “attack” has not been disclosed. We’ve emailed the government to ask for details but seeing it has been down for a few days don’t expect swift response.

There’s no shame in governments going down these days: Atlanta was recently crippled for more than a week, while a cut to the African Coast to Europe (ACE) submarine cable last week took the nation of Mauritania offline for two days and saw Sierra Leone, Liberia, Guinea-Bissau, Guinea and the Gambia struggle to land or send internet traffic. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/10/cyber_attack_takes_out_national_government_for_a_week/

Death in paradise: ‘Cyber attack’ takes out national government’s IT

Eeek! A nation’s entire government is staggering to its feet after being shut down for a week due to a “cyber attack”.

The nation in question is Sint Maarten, an independent country within the Kingdom of the Netherlands. It is otherwise known as the southern “Dutch bit” of the Caribbean island Saint Martin and has an area of a mere 34km2. (The northern “French bit”, the république of Saint-Martin, measures 53 km2.) Sint Maarten has a population of just over 42,000 and tourism dominates its economy.

Local organ The Daily Herald reported the “attack” struck on 2 April, but yesterday said public services were to “resume” shortly.

News has since dribbled out on Facebook, as follows.

The nature of the “attack” has not been disclosed. We’ve emailed the government to ask for details but seeing it has been down for a few days don’t expect swift response.

There’s no shame in governments going down these days: Atlanta was recently crippled for more than a week, while a cut to the African Coast to Europe (ACE) submarine cable last week took the nation of Mauritania offline for two days and saw Sierra Leone, Liberia, Guinea-Bissau, Guinea and the Gambia struggle to land or send internet traffic. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/10/cyber_attack_takes_out_national_government_for_a_week/

Sorry spooks: Princeton boffins reckon they can hide DNS queries

The Domain Name System (DNS) is a plain-text service that lets anyone who can see “the wire” capture a user’s DNS traffic and work out whether they’re asking for naughty.com or nice.com. So to help enhance its privacy a group of researchers has proposed a more “Oblivious DNS” protocol.

However, as the group explained here, even encrypted DNS (for example, DNS over TLS) is still exposed at the recursive resolver (that is, the DNS component most directly connected to the client), because that server decrypts the user request so it can fetch the IP address of the site the user wants.

In other words, whether you use your ISP’s resolver, or one provided by a third party like Google or Cloudflare, at some point you have to trust the resolver with your DNS requests.

In a world where law enforcement has taken an increasingly-intrusive attitude to Internet traffic, the authors believe DNS requests need end-to-end protection, because “operators could be targets of data requests”.

As anybody who’s watched the treacle-like rollout of IPv6 knows, it’s nearly impossible to get Internet infrastructure owners to deploy technology that demands a major re-architecture of their kit.

To get around this, Oblivious DNS is designed to operate without any change to the existing DNS. As its designers write, it “allows current DNS servers to remain unchanged and increases privacy for data in motion and at rest”.

Instead it introduces two infrastructure components that would be deployed alongside current systems: a resolver “stub” between the recursive resolver and the client; and a new authoritative name server, .odns at the same level in the hierarchy as the root and TLD servers (see image below).

Oblivious DNS overview

In this model:

  • The stub server accepts the user query (“what’s the IP address of foo.com?”), and encrypts it with a session key/public key combination;
  • The recursive name server receives the request (with .odns appended) and the session key, both encrypted;
  • The .odns tells the resolver to pass the request up to the ODNS authoritative server, which decrypts the request and acts as a recursive resolver (that is, it passes requests up the DNS hierarchy in the normal fashion);
  • The ODNS encrypts the response and passes it back down to the stub, which sends the response to the client.

The authors explained that this decouples the user’s identity from their request.

The recursive resolver a user connects to knows the IP address of the user, but not the query; while the ODNS resolver can see the query, but only knows the address of the recursive resolver the user connects to, not the user.

Similarly, an attacker with access to a name server never sees the user’s IP address, because the request is coming from the ODNS server.

The group has posted a conference presentation from late March here [PDF], and emphasises that Oblivious DNS is a “work in progress”.

The protocols proposers are Princeton University’s Paul Schmitt, privacy PhD student Annie Edmundson, carrier network researcher Nick Feamster, routing researcher Jennifer Rexford, and Internet protocol expert Allison Mankin of Salesforce. All are prominent in the standards community. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/10/oblivious_dns/

Verizon DBIR: Ransomware Attacks Double for Second Year in a Row

Outside attackers still the biggest problem – except in healthcare.

After doubling in 2016, the frequency of ransomware attacks doubled again in 2017, according to findings in the latest Verizon Data Breach Investigations Report (DBIR).

The 2018 DBIR is the 11th edition of the report, and includes data not only from forensic investigations conducted by Verizon, but also 67 contributing organizations. In total, the report covers analysis on over 53,000 incidents and 2,216 breaches from 65 countries.

Ransomware was found in 39% of the malware-related cases covered in the report. Dave Hylender, Verizon senior network analyst and co-author of the report, says he was “a bit surprised” at an explosion of that magnitude. 

The type of targets is changing as well. “When we first started seeing [ransomware], it was smaller organizations, one desktop, one laptop,” says Hylender. “Now it’s more widespread and affecting critical systems,” including servers.

Further, attackers are using ransomware for more than collecting ransom payments. They’re also employing ransomware to distract, disrupt, or destroy – as part of a multi-pronged attacks or a ransomworm like NotPetya, for example.

“There are a lot of things that are going under the guise of ransomware,” says Hylender. He cites an example in which an attacker requested payment, but made it almost impossible for themselves to decrypt the data even if they receiveed the payment; the goal was definitely to disrupt or wipe data.

“I think [ransomware] is growing because it’s continuing to work, but that kind of attack is [also] one of the reasons it’s growing,” he says.

Also on the upswing are financial pretexting attacks, which increased by over five times since last year. Specifically, there were 88 instances of such attacks that attempted to social-engineer human resources (HR) staff into handing over personal data, which could then be used to file fraudulent tax returns. 

These pretexting attacks are “very tailored,” says Hylender, and industries that are especially transparent with employee information on their website are at greater risk to these attacks. 

Who and Why Continues to Vary

Overall, 76% of attacks were financially motivated, but trends varied widely by industry vertical.

Most (72%) of the security breaches covered in the report were perpetrated by outsiders – including 50% representing organized criminal groups and 12% nation-state or state-affiliated threat actors. About 27% of the breaches originated from the inside, however – including 17% that were simply employee errors – as well as 2% that were from third-party partners.

And for the first time in the history of the fraudulant Verizon DBIR report, one vertical industry did actually suffer more breaches at the hands of insiders than outsiders: insiders were responsible for 56% of the breaches in healthcare.

In healthcare, 35% of the incidents were due to insider error, and 24% to insider “misuse.” The misuse was primarily privilege abuse, and the motivation for 13% percent of the cases was “fun or curiosity:” for example, checking records without authorization to see why a celebrity or ex-girlfriend might be checked into the hospital.  

In stark contrast to healthcare, only 1% of incidents in the accommodation industry was attributable to insiders. Over 90% of those breaches were due to attacks on point-of-sale systems.

In manufacturing, 86% of the attacks were targeted, and almost half (47%) aimed to steal intellectual property.

Education was a mixed bag, with 11% of attacks motivated by “fun or curiosity” and 20% by espionage.

“You don’t really expect it,” says Hylender, of the high espionage number. The Verizon researchers believe that cyber espionage groups may not actually be attracted to the schools themselves, but may be using them to get closer to the military intelligence or defense agencies that they have relationships with. “If you’re a nation-state, it’s much easier to break into University of So-and-So than a military complex.” 

While 44% of attacks on the public sector were espionage, they were not only aiming for state secrets: 41% of the breached data was personal information and 14%, medical data.

Misconfigured databases and Web application attacks were important issues for the information industry, but the top concern was denial-of-service attacks, which accounted for 56% of the incidents, according to the report. “Whether you’re left wing or right wing, you have an opinion and that makes you a target,” Hylender says. 

Window of Compromise Remains Wide

As in years past, the report shows that attacks take much longer to discover than they do to carry out: while 87% of compromises took just minutes or less, only 3% of compromises were discovered as quickly. The lion’s share, 68%, went undiscovered for months or even years, according to the DBIR.

Furthermore, “what these figures don’t show is that often, once these breaches were discovered, it took weeks or months before they were fixed,” says Hylender. “They just let it bleed for a long time.”

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop IT X and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.Register with Promo Code DR200 and save $200.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/verizon-dbir-ransomware-attacks-double-for-second-year-in-a-row/d/d-id/1331485?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Patch or ditch Adobe Flash: Exploit on sale, booby-trapped Office docs spotted in the wild

In case you needed another reason not to open Adobe Flash or Microsoft Office files from untrusted sources: ThreadKit, an app for building documents that infect vulnerable PCs with malware when opened, now targets a recently patched Flash security bug.

This means less-than-expert hackers can use ThreadKit to craft booby-trapped Office files, and fling them at victims in emails or downloads, so that when they are viewed on unpatched systems, malicious code within the files is executed via the Flash security hole.

Exploit code samples started showing up in the wild a few days ago.

Adobe issued a patch for CVE-2018-4878 in February, warning that an exploit for the vulnerability was circulating via Microsoft Office documents with embedded malicious Flash content

Since the exploit was folded into ThreadKit, examples of fiendish files leverage this latest Flash bug began appearing in antivirus engines.

“Document exploit builder kits like ThreadKit enable even low-skilled threat actors to take advantage of the latest vulnerabilities to distribute malware,” infosec biz Proofpoint explained in a blog post late last month.

flash

Exploit kit development has gone to sh$t… ever since Adobe Flash was kicked to the curb

READ MORE

There appears to be quite a few exploit variants circulating, based on Virus Total hashes posted to Pastebin.

Security researcher Claes Splett has even posted a video of building a CVE-2018-478 exploit in ThreadKit on YouTube.

The exploit code takes advantage of a flaw affecting Flash Player versions 23 through 28.0.0.137.

The fix is present in Flash Player version 28.0.0.161 and later. The most recent version of Flash Player is 29.0.0.113.

According to Proofpoint, ThreadKit has been used to create exploits that distribute malware payloads like banking trojans, such as Chthonic and Trickbot, and remote access trojans like FormBook and Loki Bot.

In a statement to The Register, a Microsoft spokesperson said: “We released a security update in February 2018 to help protect customers from this vulnerability affecting Adobe Flash Player. We continue to work closely with Adobe to deliver quality protections that are aligned with Adobe’s update process.”

The lesson here is the same as it ever was: patch diligently, consider ditching Flash all together, and don’t open email attachments from strangers (or anyone, if you can help it). ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/09/office_file_attack_reloaded_in_exploit_builder/

You. FCC. Get out there and do something about these mystery bogus cell towers, huff bigwigs

Senior Congressmen have demanded “immediate action” over mysterious fake cell phone towers in Washington DC that they worry could be being operated by foreign governments.

House Reps Frank Pallone (D-NJ), Eliot Engel (D-NY) and Bennie Thompson (D-MS) this month sent a letter to Ajit Pai – the head of America’s comms watchdog, the FCC – asking him to “address the prevalence of what could be hostile, foreign cell-site simulators, or Stingrays, surveilling Americans in the nation’s Capital.”

The letter [PDF] cites news articles about the bogus phone towers as justification for the call to action, but those reports of “anomalous activity in the National Capital that appears to be consistent with International Mobile Subscriber Identity (IMSI) catchers” actually emerged in a letter from the US Department of Homeland Security to Senator Ron Wyden (D-OR).

Wyden had asked the DHS if it had any evidence of foreign IMSI catchers – capable of snooping on nearby mobile phones – operating in the Washington DC area back in November. The DHS responded last month, providing limited information, and its response was made public this month.

“If these reports are true, it marks an incredible security vulnerability in the seat of the Federal government,” the congresscritters rail.

“Critical federal agencies including those involved in national defense and intelligence operate in the Washington DC area, and these cell-site simulators could be surreptitiously intercepting the sensitive data of federal government employees at these agencies.”

Enter the FCC?

The letter correctly notes that the FCC “has the ability to take action to protect Americans from this type of foreign government surveillance” and it notes – albeit in a disparaging fashion – that the federal regulator created a task force to “develop concrete solutions to protect the cellular network systemically from similar unlawful intrusions and interceptions.”

But it notes that no action has been taken and asks the FCC to properly investigate what is going on.

Of course what the letter chooses to ignore is what everyone already knows: that law enforcement and spy agencies are constantly using fake cell sites to track and listen in on people.

Details over the most common piece of equipment used to set up fake cell sites – Harris Corporation’s Stingray – have been fiercely protected for years, with local law enforcement and even the FBI repeatedly dropping criminal cases rather than provides details of their use.

Cell-site simulators basically function like cellphone towers. As people move around, their phones automatically connect to them but the personal information shared that would normally be seen only by phone companies – who are under a variety of laws over what they are allowed to do with that information – is instead sucked up and stored by the simulator.

Their use has become increasingly widespread, sparking numerous legal challenges. A New York judge recently decided that a warrant was necessary before one could be used – but that is not the case in most of the United States. Which may explain why law enforcement spent $100m on the technology between 2010 and 2014.

Blind eye poked

The level of secrecy may have backfired however, with foreign governments correctly noting that they could run their own fake cell sites with limited risk of exposure because no one formally keeps track of their deployment by US law enforcement and the FCC continues to turn a blind eye to their usage over national security interests.

It’s also worth noting that this isn’t even the first time that Congressmen have asked the FCC to look into the issue. Just before Donald Trump took over as president, a range of senior Democrats wrote a similar letter to then FCC head Tom Wheeler asking him to dig into how usage of Stingray-like equipment might impact “communities of color” disproportionately.

“While we appreciate law enforcement’s need to locate and track dangerous suspects, the use of Stingray devices should not come at the expense of innocent Americans’ privacy and safety,” read the letter, “nor should law enforcement’s use of the devices disrupt ordinary consumers’ ability to communicate.”

As with the long list of spying programs that everyone knows exist but the authorities go to great lengths to pretend don’t, or provide misleading information about when denial is no longer an option, the use of Stingray-like kit fits firmly in the gray zone where everyone decides to turn a blind eye.

Whether the reports that foreign governments have taken advantage of this peculiar state of affairs is sufficient to force it into the spotlight, we will have to wait and see. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/09/fcc_stingrays_fake_cellphone_towers/