Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Hacker makes mobile phone snooping affordable
by Staff Writers
Las Vegas (AFP) Aug 1, 2010


Hack attack hits ATM jackpots
Las Vegas (AFP) July 31, 2010 - Computer security researcher Barnaby Jack jokes that he has resorted to hiding cash under his bed since figuring out how to crack automated teller machines remotely using the Internet. The New Zealand native on Saturday demonstrated his "ATM jackpotting" discovery for an overflow crowd of hackers during a presentation at the infamous DefCon gathering in Las Vegas. "You don't have to go to the ATM at all," Jack told AFP after briefing fellow software savants. "You can do it from the comfort of your own bedroom." Jack proved his findings using two kinds of ATMs typically found in corner stores, bars or other "stand-alone" venues in the United States but said the flaw likely exists in machines at banks.

Banks use "remote management" software to monitor and control their ATMs, and Jack used a weakness in that kind of code to take control of machines by way of the Internet. He found a way to bypass having to submit passwords and serial numbers to access ATMs remotely. Once in the machines, he could command them to spit out cash or transfer funds. He could also capture account data from magnetic strips on credit or bank cards as well as passwords punched in by ATM users. "When you think about ATM security you generally think about the hardware side; is it bolted down and are the cameras in position," Jack said.

"This is the first time anyone has taken the approach of trying to attack the underlying software. It is time to find software defenses rather than hardware defenses." Jack did his research on ATMs he bought on the Internet. He also found master keys for stand-alone machines available for purchase online, meaning hackers could walk up and tinker with ATM software, he added. "We shouldn't dwell on the walk-up attack, because no physical access is required," Jack said. "They have a flaw that lets me bypass all authentication on the device on the Internet, and I am the ATM at that stage."

He didn't reveal specifics of the attack to hackers even though the ATM makers were told of the flaw and have bolstered machine defenses. "I might get my butt in hot water if I released the code," said the IO Active software security researcher who did the ATM hack 'as a hobby.' "I was careful not to release the keys to the kingdom." Jack said he doesn't know if criminals have exploited the software flaw "in the wild" but that it is tough to be certain. "It is not an easy attack to replicate but I am not naive enough to think I am the only one who can do it," Jack said, admitting he has grown wary of ATMs. "I just keep my cash under the bed now, mate."

A hacker on Saturday brought mobile phone snooping to the modestly financed, showing how to build a call-catching system for about 1,500 dollars (US).

Chris Paget demonstrated his creation for more than a thousand people crammed into a grand room at a DefCon gathering of hackers in Las Vegas, warning them to turn off their phones if they wanted to be spared.

"I can intercept cell phone calls with 1,500 dollars worth of radio gear and a laptop," Paget said after the talk.

"You handset thinks I'm your cell phone tower and I get to control your calls. These attacks used to cost millions of dollars, now you can do it for a lot less."

The gear included an antenna and radio equipment and broadcast a GSM signal that imitated a legitimate telecom service tower, prompting handsets to automatically connect.

A hacker could then pretend to be the telecom service provider, forwarding calls to intended recipients and listening in.

"I can target specific people if I want to spy and I can command only certain types of phones to connect," Paget said. "An attacker could easily take advantage of this."

Mobile phone snoops with this gear could snag credit card or account information from calls made to shops or banks. Companies could be staked out in the hope insiders would reveal valuable information during calls.

His creation worked only on mobile phones using the GSM network and not more secure 3G, third generation, networks.

"GSM is broken," Paget said. "It is up to telecom providers when to shift from GMS to 3G networks. GMS is widely deployed with millions of handsets in use."

However, someone could use a noise generator and a power amplifier could easily jam a 3G network and prompt handsets to resort to GSM systems commonly used as backup systems, according to Paget.

He gestured to a noise generator he bought online for 450 dollars and a power amplifier purchased on the Internet for 400 dollars.

"I'm not turning this thing on," Paget said. "It would knock out pretty much every cell phone there is for most of Las Vegas."

The system only grabs outgoing calls since it has fooled handsets.

Since the phones have disconnected from real telecom service providers, they are considered gone from the networks and incoming calls are routed directly to voice mail boxes.

There is a way for hackers to use credentials from duped handsets to impersonate the phones to carriers, according to Paget.

His talk was almost scuttled by the US Federal Communications Commission, which reached out to him with concerns about the danger it might pose or statutes it might violate.

"There was so much shenanigans involved making sure I could get on stage," Paget said after the DefCon briefing. "The good news is that it is all over and I haven't been arrested."

earlier related report
Hackers crack high-tech locks
Las Vegas, Nevada (AFP) July 31, 2010 - Security maverick Marc Tobias showed hackers on Saturday how simple it is to defeat some of the world's top high-tech locks.

"These locks might be winning awards but they are forgetting the basics," Tobias said while giving AFP a first-hand look at how to crack several models. "They might be clever, but they aren't secure."

A Biolock model 333 designed to scan fingerprints and unlock for chosen people was opened by simply pushing a paper clip into a key slot.

An Amsec ES1014 digital safe was breached by sliding a flat metal file folder hangar through through a crack at the edge of the door and pressing an interior button allowing the access code to be reset.

Tobias grew passionate when it came to an award-winning electromagnetic lock made in China for Finland-based iLoq.

The innovative iLoq used the action of a key being pushed into the lock to generate power for electronics that then checked data in a chip on the key to determine whether the user is cleared for access.

Tobias and lock-cracking colleague Tobias Bluzmanis pointed out that the iLoq design counted on a small hook being tripped to reset the devices as a key was removed.

In what they referred to as a viable inside attack possible on locks geared for office settings, someone could borrow a key and shave tiny bit of metal from the tip and it would no longer catch the iLoq reset hook.

A pocket-sized tool available in US stores for about 60 dollars could be used to grind down the hook in seconds, the men demonstrated.

With either method, the result would be that once a valid key is used to open the iLoq it will yield to any key or even a screw driver stuck in the slot because it remains stuck in the unlocked position.

An audit trail left by a compromised iLoq would stop at the person whose key legitimately opened the lock.

"It is really clever, but it is also very defective," said Tobias, a longtime advocate for tougher standards in the lock industry.

"Electromechanical locks are more secure if done right. The question is whether the technology is implemented properly."

The security.org crew opened a Kwikset programmable "smartkey" lock with a key blank, a screw driver and a vice grip tool.

Tobias and his team consistently show up at the annual DefCon gathering in Las Vegas to pop locks with wires, magnets, air, shock, screw drivers and other improvised tools.

Their presentation this year was met with hoots and applause.

Lock-picking holds a natural appeal to hackers, who thrive on bending hardware or software to their wills.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Elite US cyber team courts hackers to fight terrorists
Las Vegas (AFP) Aug 1, 2010
An elite US cyber team that has stealthily tracked Internet villains for more that a decade pulled back its cloak of secrecy to recruit hackers at a notorious DefCon gathering here Sunday. Vigilant was described by its chief Chet Uber as a sort of cyber "A-Team" taking on terrorists, drug cartels, mobsters and other enemies on the Internet. "We do things the government can't," Uber said. ... read more


CYBER WARS
NASA's ATHLETE Warms Up For High Desert Run

Japan experts call for robot expedition to moon

GRAIL Spacecraft Takes Shape

Caltech Team Finds Evidence Of Water In Moon Minerals

CYBER WARS
Opportunity Back To Normal Operations

NASA And ESA's First Joint Mission To Mars Selects Instruments

Caltech And CSA Awarded NASA Project To Develop Spectrometer Headed To Mars

Spirit May Never Phone Home Again

CYBER WARS
Wyle Scientist To Study Stress In Haughton-Mars Project Spaceflight Analog

Planetary Society Urges Debate On NASA Authorization Bill

Astronomer: Manned missions less likely

Panel considers cost of space tourism

CYBER WARS
China Contributes To Space-Based Information Access A Lot

China Sends Research Satellite Into Space

China eyes Argentina for space antenna

Seven More For Shenzhou

CYBER WARS
Spacewalk Preparations Continue After Loss Of Cooling Loop

Space station drama as cooling system fails

NASA plans two challenging spacewalks to fix ISS pump

A Perfect STORRM

CYBER WARS
New Rocket Launch Period In And Around Tanegashima

Kourou Spaceport Welcomes New Liquid Oxygen And Liquid Nitrogen Production Facility

Sea Launch Signs Agreement With EchoStar

Ariane 5 Is Ready For Its Payload Integration

CYBER WARS
Planets In Unusually Intimate Dance Around Dying Star

Detector Technology Could Help NASA Find Earth-Like Exoplanets

NASA Finds Super-Hot Planet With Unique Comet-Like Tail

Recipes For Renegade Planets

CYBER WARS
Ball Aerospace Ships STPSat-2 To Kodiak Launch Complex

Google phones gaining ground in US smartphone market

Research aims at making artificial silk

Africa, Mideast behind cellphone bonanza




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement