Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Submission + - Minnesota Legislature Takes Up ISP Privacy Regulations

BenFranske writes: After the recent US Senate vote to kill FCC broadband privacy rules which would require customers to opt-in to the sale of customer tracking data the Minnesota state legislative bodies have adopted an amendment to an appropriations bill that would prohibit

[The] collect[ing of] personal information from a customer resulting from the customer's use of the telecommunications or internet service provider without express written approval from the customer. No such telecommunication or internet service provider shall refuse to provide its services to a customer on the grounds that the customer has not approved collection of the customer's personal information.

Submission + - Those IRS Scam Calls May Soon Disappear

Trailrunner7 writes: The FCC has moved one step closer to implementing a system that would prevent robocalls that spoof the caller ID of numbers that don’t initiate outbound calls, a move that could significantly reduce the volume of scam calls reaching businesses and consumers.

The commission on Thursday issued a notice that seems public comment on the concept of a Do Not Originate list, which would establish a set of phone numbers that never are used to initiate calls. This would help prevent fraudsters from spoofing the caller IDs of numbers owned by organizations such as the IRS, FBI, banks, and charities, a tactic that they use regularly to make their phone fraud schemes seem more plausible. The policy would allow carriers to block calls from numbers on the DNO list, something that they’re not allowed to do under FCC rules right now.

The proposal is an outgrowth of work done by the Robocall Strike Force, a group that the FCC and a number of carriers established last year in an effort to find answers to the robocall problem. The group has come up with a number of ideas, but the one that has the best potential to have an immediate effect is the DNO list. A trial of the DNO list concept last fall produced a 90 percent decrease in the number of IRS scam calls. Now, the commission is looking to allow carriers to implement this system on a permanent basis.

Submission + - Android Trojan Spreads Through Fake Cell Towers

Trailrunner7 writes: Attackers in China are using rogue cell base stations to spread versions of an Android banking Trojan that steals user credentials and has the ability to bypass two-factor authentication.

The malware, known as the Swearing Trojan for some impolite language found in the Chinese code, has been in circulation for several months and uses a number of different methods to spread, including traditional phishing emails and SMS messages. The most sophisticated method, though, is the use of the fake base transceiver stations, which the attackers employ to send SMS messages to victims. The texts appear to come from a Chinese telecom operator and contain a link that will infect the user’s device with the malware.

Submission + - Half of Android Devices Didn't Get Security Patches in 2016

Trailrunner7 writes: Google has made several changes to the Android security ecosystem recently, including providing monthly updates and working with manufacturers to get those patches in the hands of users more quickly. But despite those efforts, about 50 percent of Android devices didn’t install a single security update in 2016.

One of the issues with Android security over the years has been the way that patches are delivered to users. Google distributes updates directly to the Nexus and Pixel devices it sells, but carriers and other manufacturers are responsible for getting updates to their own customers. Some handset makers, including LG and Samsung, follow Google’s lead and send monthly updates to some of their devices on the day they’re released. But many others either deliver them much later or not at all.

In its annual report on Android security, Google said that while the monthly update schedule has helped, it hasn’t fixed the problem entirely.

Submission + - NSA: We Disclose 90% of the Flaws We Find

Trailrunner7 writes: In the wake of the release of thousands of documents describing CIA hacking tools and techniques earlier this month, there has been a renewed discussion in the security and government communities about whether government agencies should disclose any vulnerabilities they discover. While raw numbers on vulnerability discovery are hard to come by, the NSA, which does much of the country’s offensive security operations, discloses more than nine of every 10 flaws it finds, the agency’s deputy director said.

NSA has both defensive and offensive roles in cybersecurity and does its own vulnerability research and exploit development. Some of the flaws NSA finds are kept private and used for intelligence-gathering purposes in targeted exploitation operations. But many others are disclosed to the affected vendors as soon as possible, said Richard Ledgett, deputy director of NSA.

“Our historic numbers are around 90 percent, or a little better than 90 percent toward disclosure,” Ledgett said during a roundtable discussion on cybersecurity issues Tuesday hosted by the Aspen Institute.

Submission + - Critical Cisco Flaw Found Buried in Vault 7 Documents

Trailrunner7 writes: Hundreds of models of Cisco switches are vulnerable to a remote-code execution bug in the company’s IOS software that can be exploited with a simple Telnet command. The vulnerability was uncovered by company researchers in the CIA hacking tool dump known as Vault 7.

The bug is a critical one and an attacker who is able to exploit it would be able to get complete control of a target device. The flaw lies in the Cluster Management Protocol (CMP) that’s used in IOS, and Cisco said it’s caused by the incorrect processing of CMP-specific Telnet options, as well as accepting and processing these commands from any Telnet connection.

“An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device,” the Cisco advisory says.

Submission + - US-CERT Says SSL Interception Boxes Weaken TLS Security

Trailrunner7 writes: The Department of Homeland Security’s US-CERT group has issued an advisory warning enterprises that many security appliances that perform HTTPS inspection through a man-in-the-middle position don’t correctly verify certificate chains before forwarding traffic, weakening the security benefits of TLS in the process.

The advisory comes after a recent paper by security researchers from Google, Mozilla, Cloudflare, University of Michigan, and elsewhere looked at traffic interception appliances and their effect on secure connections. The researchers built a set of heuristics to enable servers to detect HTTPS interception, and found that interception boxes “drastically reduce connection security.”

Submission + - Congressmen Push DHS For Answers on SS7 Security 1

Trailrunner7 writes: year after flaws in SS7, one of the underlying protocols in the cell network came to the public’s attention, two powerful members of Congress are asking the secretary of Homeland Security how DHS has addressed the threat and whether the department has sufficient resources to detect and defeat SS7-related attacks.

The flaws in SS7, a protocol that’s designed to connect various telecom carriers, can enable anyone with access to the system to carry out discreet surveillance against a victim, knowing only the target’s phone number. Many people at each of the carriers have access to the system, and security researchers have been warning about the problem for years. Last year, researchers demonstrated an attack on the phone of Rep. Ted Lieu (D-Calif.) using this technique, prompting Lieu to call on congressional leaders to address the issue.

Now, a year later, Lieu and Sen. Ron Wyden (D-Ore.) have sent a letter to John F. Kelly, secretary of Homeland Security, to detail what the department has done to address the SS7 problem and whether the federal government understands how this vulnerability could be used for surveillance.

“We are deeply concerned that the security of America’s telecommunications infrastructure is not getting the attention it deserves. Although there have been a few news stories about this topic, we suspect that most Americans simply have no idea how easy it is for a relatively sophisticated adversary to track their movements, tap their calls, and hack their smartphones. We are also concerned that the government has not adequately considered the counterintelligence threat posed by SS7-enabled surveillance,” the letter says.

Submission + - Google Roots Out Chamois Ad Fraud Botnet From Play Store

Trailrunner7 writes: Fraudsters and cybercriminals continue to target mobile app stores with garbage apps disguised as benign ones, and Google has just identified a large family of potentially harmful apps in the Play marketplace and banned the apps and some people who were trying to take advantage of the company’s ad system to make money on the apps.

Google has identified the family of PHAs as Chamois and said that it caught them through the use of traffic analysis, which determined that the apps were trying to evade the company’s security systems. The goal behind the apps appears to have been ad fraud, and the developers employed a few different techniques to get around Google’s detection and prevention systems.

“We analyzed malicious apps based on Chamois, and found that they employed several methods to avoid detection and tried to trick users into clicking ads by displaying deceptive graphics. This sometimes resulted in downloading of other apps that commit SMS fraud. So we blocked the Chamois app family using Verify Apps and also kicked out bad actors who were trying to game our ad systems,” Bernhard Grill, Megan Ruthven, and Xin Zhao, security software engineers at Google, said

Submission + - Confide App Full of Security Holes, Researchers Find

Trailrunner7 writes: Researchers at IOActive have uncovered a number of serious security flaws in the Confide secure messaging app, some of which could allow an attacker to hijack a user’s session or impersonate a target user.

Confide is one of the group of encrypted chat apps that have emerged in the last few years and promises end-to-end encryption and self-destructing messages. But the team at IOActive discovered a group of vulnerabilities in the app that make users susceptible to a range of attacks that could result in account compromises, message disclosure, and other problems. The vulnerabilities are across a number of different areas in the app, but one of the main issues is the way Confide handles SSL certificates.

“The application’s notification system did not require a valid SSL server certificate to communicate, which would leak session information to actors performing a man-in-the-middle attack,” the IOActive bulletin says.

Submission + - Bill Would Legalize Active Defense Against Hacks

Trailrunner7 writes: A new bill intended to update the Computer Fraud and Abuse Act would allow victims of computer attacks to engage in active defense measures to identify the attacker and disrupt the attack.

Proposed by Rep. Tom Graves (R-Ga.), the bill would grant victims of computer intrusions unprecedented rights. Known as the Active Cyber Defense Certainty Act, the legislation seeks to amend the CFAA, the much-maligned 1986 law that is used in most computer crime prosecutions.

The proposed legislation includes the caveat that victims can’t take any actions that destroy data on another person’s computer, causes physical injury to someone, or creates a threat to public safety. The concept of active defense has been a controversial one in the security community for several years, with many experts saying the potential downside outweighs any upside. Not to mention that it’s generally illegal.

Submission + - Email Scam Losses Pass $3 Billion, FBI Says

Trailrunner7 writes: The amount of money that enterprises in the United States are losing to business email compromise scams is growing at an alarming rate, and is now well into the billions of dollars, according to the FBI.

BEC scams, also known as CEO or executive impersonation schemes, are the evolution of phishing attacks and rely on the criminals’ ability to convince a key member of an organization to transfer money to an account the attackers control. As simple as the scam is in concept, there are a number of moving parts that all must work in unison for the theft to succeed. Most importantly, someone inside the target organization has to fall for the ruse.

Based on the FBI’s data, plenty of people are doing just that. The bureau said that since the beginning of 2015, businesses in the U.S. have lost more than $3 billion to BEC scams. These schemes can be crippling for victimized businesses, as some of the incidents involve losses in the tens or hundreds of thousands of dollars. Last year, one firm lost $98 million in a BEC scam that lasted several months.

Submission + - Google Pushes Encrypted Email System Out Into the World

Trailrunner7 writes: People have been trying to find a replacement for PGP almost since the day it was released, and with limited success. Encrypted email is still difficult to use and painful to implement in most cases, but Google has just released a Chrome plugin designed to address those problems.

The new E2EMail extension doesn’t turn a user’s Gmail inbox into an encrypted mail client. Rather, it is a replacement that gives users a separate inbox for encrypted messages. The system is built on Google’s end-to-end encryption library, and the company has released E2EMail as an open-source project.

Submission + - Wyden to Introduce Bill to Prohibit Warrantless Phone Searches at Border

Trailrunner7 writes: A senator from Oregon who has a long track record of involvement on security and privacy issues says he plans to introduce a bill soon that would prevent border agents from forcing Americans returning to the country to unlock their phones without a warrant.

Sen. Ron Wyden said in a letter to the secretary of the Department of Homeland Security that he is concerned about reports that Customs and Border Patrol agents are pressuring returning Americans into handing over their phone PINs or using their fingerprints to unlock their phones. DHS Secretary John Kelly has said that he’s considering the idea of asking visitors for the login data for their various social media accounts, information that typically would require a warrant to obtain.

“Circumventing the normal protection for such private information is simply unacceptable,” Wyden said in the letter, sent Monday.

Submission + - Security Lessons From Snowden

Trailrunner7 writes: orking in the security field offers ample opportunity to learn from your mistakes, and perhaps no organization has had to go through that process more publicly and painfully than the National Security Agency.

The failures that led to Edward Snowden walking out the door with a massive cache of NSA data four years ago were not the kind that normally make their way into the public’s line of sight. Those failures were organizational, technical, and procedural, and the agency had to take a hard look at itself in the aftermath of Snowden’s theft, the NSA’s former deputy director said.

“If you’d asked me in the spring of 2013 what’s the state of your defense of the business, I would’ve said it’s good but not perfect. We don’t take our eye off the ball, we don’t assume we can chase everything down. We’d have said we vet the insiders the old-fashioned way,” Chris Inglis, the former deputy director of NSA, said in a talk at the RSA Conference here Thursday.

Slashdot Top Deals

Things are not as simple as they seems at first. - Edward Thorp