{"id":6101,"date":"2015-08-13T08:35:43","date_gmt":"2015-08-13T12:35:43","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=6101"},"modified":"2017-11-08T07:39:03","modified_gmt":"2017-11-08T07:39:03","slug":"security-week-digest-32","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/security-week-digest-32\/6101\/","title":{"rendered":"Security Week 32: Android Stagefright, new car hacks, Do Not Track 2.0"},"content":{"rendered":"<p>Merely 23 years ago Microsoft released Windows 3.1 <s>operating system<\/s>, Apple showed its first <s>iPhone<\/s> PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with a detailed description of next to all known at that time virii and methods of their removal, among them \u2014 by using the program known then as -V. The threat landscape then wasn\u2019t a big deal: all virii could be described in a relatively small book, and even over the next couple of years it was quite relevant.<\/p>\n<div id=\"attachment_6107\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/08\/05195005\/infosec-digest-32-book.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6107\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/08\/05195005\/infosec-digest-32-book-1024x1024.jpg\" alt=\"The Complete \u0421atalogue of Malware, written by Eugene Kaspersky in 1992\" width=\"1024\" height=\"1024\" class=\"size-large wp-image-6107\"><\/a><p id=\"caption-attachment-6107\" class=\"wp-caption-text\">The Complete \u0421atalogue of Malware, written by Eugene Kaspersky in 1992<\/p><\/div>\n<p>Those were good times. Now we have 325,000 new malware pieces arriving daily, and the industry on almost a weekly basis faces new proofs of system-wide security failures \u2014 from cars and skateboards to nuclear power plants. This is both bad and good at the same time: the more people who think of security of their data, business and their own lives, which is dependent on computers these days, the more chances are there things will turn to the better.<\/p>\n<p>And now, lean back and relax, watch the things going on. Moving forward, each Monday we\u2019re going to present the three most important news with extensive commentary and trolling. The stories will be hand-picked from Threatpost and Kaspersky Daily.<\/p>\n<h3>Stagefright: an Android flaw that hasn\u2019t changed anything yet<\/h3>\n<p>The Threatpost story. Google\u2019s feedback. CERT Advisory. The Kaspersky Daily advice on how to prevent this vulnerability.<\/p>\n<p>Wired calls it one of the \u201cworst Android vulnerabilities discovered to date,\u201d but it is wrong: it can be worse. The main difference of this flaw from, say, Heartbleed and Shellshock, is that there was no need to invent a fancy name, Stagefright is an Android engine for audio and video playback, a part of Android Open Source Project. Technically, it is an entire set of vulnerabilities (the Zimperium experts who discovered this reserved seven IDs at CVE base), mostly related to buffer overflow.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/08\/05195010\/infosec-digest-33-stagefright.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/08\/05195010\/infosec-digest-33-stagefright.png\" alt=\"infosec-digest-33-stagefright\" width=\"640\" height=\"556\" class=\"alignnone size-full wp-image-6104\"><\/a><\/p>\n<p>The engine\u2019s task is to play back various sounds and videos, and as ZDNet mentioned, it is tailored in a way to be ready to play the video \u201cbefore you even think about watching it.\u201d For some mysterious reason all these tasks are sometimes performed at \u201cGod\u201d access level. The reasons, actually, are not too mysterious: it was easier to code it that way. Regardless, it was quite easy to escape the Android\u2019s sandbox, prepared specifically for the tricks like these.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">95% of <a href=\"https:\/\/twitter.com\/hashtag\/Android?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Android<\/a> phones can be hacked with one just <a href=\"https:\/\/twitter.com\/hashtag\/MMS?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#MMS<\/a>, millions at risk <a href=\"https:\/\/t.co\/BJg5e7ss8N\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/BJg5e7ss8N<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"http:\/\/t.co\/DGBSkhQdDo\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/DGBSkhQdDo<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/628620894395629568?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 4, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As a result we have an illustrious proof of concept: send MMS to the phone \u2013 and gotcha. It\u2019s not even necessary to open the \u201cloaded\u201d MMS: the phone will break itself since it is manufactured that way for the users\u2019 convenience. Is it all so bad? Not exactly. First, in the Android 4.1 and later, Address Space Layout Randomization technology prevents the mess from happening, or at least \u201cdismantles the problem\u201d partially.<\/p>\n<p>Second, following the rules of responsible vulnerabilities disclosure, Zimperium held back the exploit code. Although, thanks to the published patches, it\u2019s all quite clear.<\/p>\n<p>The Google\u2019s reaction is interesting here. Here is the short summary of the relevant post from the official Android blog: \u201cEverything\u2019s fine. Our Sandbox is terrific. Only 0.15% of Android-based devices have the malicious app (lots of asterisks, fine prints and clauses go here). But in order for the things to be alright, Nexus devices will receive security updates monthly\u201d.<\/p>\n<p>\u2018Tis great, but what about all the rest Android-based smartphones and tablets? Google\u2019s initiative doesn\u2019t help with Android fragmentation problem, constant delays with updating of the newest devices to the latest OS versions and terminal non-updating the older hardware.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">lol when ur Jeep gets updates faster than ur Android phone<\/p>\n<p>\u2014 SwiftOnSecurity (@SwiftOnSecurity) <a href=\"https:\/\/twitter.com\/SwiftOnSecurity\/status\/625810252038942720?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 27, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Fortunately, HTC, Samsung, Sony, LG and a couple of other developers also claimed they are going to update their smartphones and tablets more often than before. Still, there\u2019s lot of things remaining in the mist, all we know is that some devices will receive updates. Some day. Maybe. If we behave.<\/p>\n<p>But anyway it is a good sign. Sooner or later Android will have an update mechanism similar to Microsoft\u2019s Patch Tuesday. Just a year ago the same Adrian Ludwig, Android security chief at Google, said everything\u2019s fine with security, all it takes is to fix Google Play a bit. So it is to say, Stagefright will bring on really useful changes. At least we hope and believe so. What else is there to do, after all?<\/p>\n<h3>Keep hacking the cars<\/h3>\n<p>The Threatpost story. The previous Threatpost story. The Kaspersky Daily report form Black Hat. And another report from DEF CON.<\/p>\n<p>Last week we have a milestone event: the first-ever critical patch for the cars. Or, more specifically, for the Uconnect infotainment system used by Fiat Chrysler, which a) allowed for management of totally non-entertainment functions (specifically, it allowed to send the car into a ditch) and b) received the inbound connections via cellular networks. Can\u2019t help reposting this:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">WHY DOES A CAR EVEN HAVE INBOUND CONNECTIONS<\/p>\n<p>WHY IS THE STEREO CONNECTED TO THE IGNITION<\/p>\n<p>WHY DOES SOME IPHONE GUY HAVE TO POINT IT OUT<\/p>\n<p>\u2014 SwiftOnSecurity (@SwiftOnSecurity) <a href=\"https:\/\/twitter.com\/SwiftOnSecurity\/status\/623700831984955397?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 22, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Ye. But this was last week. This week yet another flaw has been discovered, not so epic, but also quite an interesting one. Imagine you are in sunny Spain. Or in Bulgaria. Or in Greece, no matter. You leased a car, came to a beach and went swimming. As you do it, somebody could have stolen your car keys. In a normal situation this won\u2019t help a thief much: try finding the car among the rest of them. But since your car is a leased one, it has its plate number on the keys.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BlackHat?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#BlackHat<\/a> 2015: The full story of how that Jeep was hacked <a href=\"https:\/\/t.co\/y0d6k8UE4n\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/y0d6k8UE4n<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/bhUSA?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#bhUSA<\/a> <a href=\"http:\/\/t.co\/SWulPz4Et7\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/SWulPz4Et7<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/629651596876644352?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 7, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In other words, use the hotel pool. Samy Kamkar, an independent security researcher, discovered that such a scenario is real if you use OnStar RemoteLink, which allows you to find the location and even remotely open the doors of GM\u2019s cars. Kamkar was quick to build a miracle device, which can intercept the connections between the mobile app and the car itself, just by standing next to the owner.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/3olXUbS-prU?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>It\u2019s not as bad as it looks: the researcher says that the problem is with the app, not the cars themselves, and a simple update would fix the problem. Another thing is important here. Many are familiar with multimedia systems in the modern autos: they are almost like Android and iOS, they have touchscreen, sometimes internet access and various multimedia tricks. The problem is that they are way, way worse \u2013 slow, buggy and dull. I\u2019d quote Wired again: compared to Android, automakers\u2019 own multimedia systems \u201cstink\u201d.<\/p>\n<p>Why? Because all these infotainment thingies evolve just too fast for the rather conservative automakers, and they lag behind. Fortunately, there\u2019re exceptions.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Tesla Model S being hacked and patched blazing-fast <a href=\"https:\/\/t.co\/ZuC0uzeKfn\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/ZuC0uzeKfn<\/a> <a href=\"http:\/\/t.co\/al9naQnsbx\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/al9naQnsbx<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/630751291342483460?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 10, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The automotive industry also lags behind with security. For a security professional an Unconnect bug is no less than a total facepalm. Besides, doing something new, security is low on your concerns lists, because \u201cinsecure\u201d coding is cheap and ease. And that\u2019s where the attacks on oilpump starter begin. The relative isolation of auto technologies from the world of computers saved them so far, but in time it will become their weakest spot: they would be hacked where nobody expected, then there is no security, do what you will.<\/p>\n<h3>How to stop tracking and start enjoying life<\/h3>\n<p>The story. EFF article.<\/p>\n<p>Do Not Track mechanism is supported by all of the popular browsers, but unfortunately does not work. It was a good idea, actually: if you, users, don\u2019t want the banner and social networks, Internet researchers and counters, Google, etc. to track you, check the box and enjoy your newly-gained privacy.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/08\/05195007\/infosec-digest-32-privacy-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/08\/05195007\/infosec-digest-32-privacy-1.png\" alt=\"infosec-digest-32-privacy-1\" width=\"396\" height=\"100\" class=\"alignnone size-full wp-image-6106\"><\/a><\/p>\n<p>Yeah, forget it. The idea has been promoted for 10 years already, and it hasn\u2019t moved on. Keep looking the ads of the goods you have already purchased, from the shop where you have bought them. The problem is that the industry can\u2019t agree on practical use of Do Not Track and respect for the users who don\u2019t want to be tracked.<\/p>\n<p>Electronic Frontier Foundation sees the solution in a new standard that toughens up the do-not-track demands for the websites. For instance if you announce you follow the principle, don\u2019t add the buttons from social networks who violate these principles. If you have a technical need to track the user\u2019s activities (to purchase something, to authorize, etc.) \u2013 ask for permission.<\/p>\n<p>New demands, however, remain voluntary, without control and enforcement. EFF relies on the fact that (in some countries) the violation of voluntarily taken obligations can lead to a lawsuit. But it\u2019s not mandatory. So the new policies announcement says candidly: it can help with targeted ads, but in order to ensure a really anonymous web-surfing VPN and TOR are the only things useful.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/08\/05195008\/infosec-digest-32-privacy-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/08\/05195008\/infosec-digest-32-privacy-2.png\" alt=\"infosec-digest-32-privacy-2\" width=\"666\" height=\"459\" class=\"alignnone size-full wp-image-6105\"><\/a><\/p>\n<p>The problem is further aggravated with the fact that most people don\u2019t care, whether they are being watched or not. Do Not Track rules are debated by the small group of activists, outside of which users wouldn\u2019t bother to check yet another box in settings. That\u2019s wrong. And it\u2019s not about big bad evil corporations willing to bulk-track you.<\/p>\n<p>New technologies, such as Cortana voice assistant in Microsoft, or Google Now, or Apple\u2019s Siri, in order to be of use, collect and process a ton of data on the device user, because it is necessary. Paranoids are hereby prohibited to read the Windows 10 Terms of Use, where all of these nuances are stated in a rigorous legal language. It is normal that our devices need to know a lot about us for our own convenience.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Security Week 32: #Android #Stagefright, new #car #hacks, Do Not Track 2.0 #privacy initiative<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FV3dY&amp;text=Security+Week+32%3A+%23Android+%23Stagefright%2C+new+%23car+%23hacks%2C+Do+Not+Track+2.0+%23privacy+initiative\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>But the more data about us companies collect, the more important is the work of those few, who seriously, without any zeal, wants to provide the possibility of limitations on data collection. Down to the necessary minimum.<\/p>\n<h3>What else?<\/h3>\n<p>Mac\u2019s BIOS hacked. Not for the first time, though.<\/p>\n<p>Some bad guys send out a ransomware instead of Windows 10 update.<\/p>\n<p>A VPN service is discovered in China, which, aside from its own servers, uses the hacked PCs <s>to bring the costs down<\/s> for criminal activities.<\/p>\n<h3>Oldies<\/h3>\n<p>\u201cProtect\u201d malware family<\/p>\n<p>Dangerous resident viruses, targeting .com and .exe files on execution. Intercept int 21h and int 1Ch or int 33h, depending on the version. Contain the string \u201cFile protection\u201d. \u201cProtect-1157\u201d removes the files attributes and blocks down the mouse. \u201cProtect-1355\u201d announces itself on EGA and VGA displays with petty and extremely pesky flicker.<\/p>\n<p><i>Quoted from \u201cComputer viruses in MS-DOS\u201d by Eugene Kaspersky, 1992.<\/i><\/p>\n<p><i>Disclaimer: this column reflects only the personal opinion of the author. It may coincide with Kaspersky Lab position, or it may not. Depends on luck.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with<\/p>\n","protected":false},"author":53,"featured_media":6103,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[1091,1089,1093,1092,1082,43,97,1090,559,268],"class_list":{"0":"post-6101","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-car-hacks","10":"tag-digest","11":"tag-do-not-track","12":"tag-eff","13":"tag-jeep","14":"tag-privacy","15":"tag-security-2","16":"tag-stagefright","17":"tag-tesla","18":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-week-digest-32\/6101\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/security-week-digest-32\/5019\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-week-digest-32\/5806\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/security-week-digest-32\/5973\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/security-week-digest-32\/6610\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/security-week-digest-32\/6451\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-week-digest-32\/9547\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/security-week-digest-32\/4775\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/security-week-digest-32\/5962\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-week-digest-32\/8551\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-week-digest-32\/9547\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-week-digest-32\/9547\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/car-hacks\/","name":"car hacks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6101"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6101\/revisions"}],"predecessor-version":[{"id":9100,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6101\/revisions\/9100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/6103"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}