Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Hackers turn Square readers into crime tools
By Glenn CHAPMAN
Las Vegas (AFP) Aug 6, 2015


New hacks strike at heart of mobile innovations
Las Vegas (AFP) Aug 7, 2015 - As fierce competition leads to rapid innovation in the smartphone market, hackers have pounced on cracks in defenses of developments on devices at the heart of modern lifestyles, experts say.

Smartphones have become increasingly targets for cyber criminals as people cram the gadgets with troves of personal information and go on to use them for work.

"Mobile devices are taking a bigger place in businesses and in our lives," Avi Bashan of Tel Aviv based cyber defense firm Check Point Software Technologies told AFP on Thursday at a Black Hat computer security conference in Las Vegas.

"As more people use them for more things, attackers gain interest."

Check Point has seen attacks rise during the past three years on the world's leading mobile operating systems - Apple iOS and Google-backed Android, according to Bashan.

Check Point researchers at Black Hat revealed a vulnerability that allows hackers take over Android smartphones by taking advantage of a tool pre-installed that was intended to give tech support workers remote access to devices.

"It effects every version of Android," Check Point mobile threat prevention director Ohad Bobrov said.

The hack can be triggered by tricking a smartphone user into installing an application rigged to reach out and connect with the pre-installed support tool, Bobrov explained.

In some cases the hack can be accomplished by sending a text message that a recipient doesn't even have to open, he warned.

The text message tricks a smartphone into thinking it is connecting with a legitimate support technician remotely when it is actually linking to an online server commanded by a hacker.

"I need your phone number and that is it," Bashan told AFP.

Bobrov said the flaw in Android software architecture has been disclosed to Google and smartphone makers.

- Dealing with Stagefright -

The Check Point revelation came a week after cyber security firm Zimperium warned of a "Stagefright" vulnerability in the world's most popular smartphone operating system that also lets hackers take control with a text message.

Zimperium research senior director Joshua Drake took a stage at Black Hat to discuss Android code at the heart of the problem.

Stagefright automatically pre-loads video snippets attached to text messages to spare recipients from the annoyance of waiting to view clips.

Hackers can hide malicious code in video files and it will be unleashed even if the smartphone user never opens it or reads the message, according to Drake.

Stagefright imperils some 95 percent, or an estimated 950 million, of Android phones, according to the security firm.

Zimperium reported the problem to Google and provided the California Internet firm with patches to prevent breaches. Updates have started hitting Android devices, according to Drake.

Computer security firm Secunia on Thursday said about 80 vulnerabilities were discovered in Apple mobile operating software so far this year and about 10 were found in Android.

"There has been a big boom in mobile," Drake said.

"When there is a big boom, people take a lot of shortcuts, when you take shortcuts you build up a lot of technical debt."

Mobile operating system makers who raced ahead now have to backtrack to squash bugs, some of which are exposed by good-guy hackers.

Check Point's Bashan sees it as a case of smartphone rivals moving so fast to add features and improvements that innovation trumped security at times in the process.

"The operating systems developed so quickly," Bashan said.

"And when you develop quickly, some things get developed badly."

Hackers on Thursday showed how to turn the latest model Square mobile payments readers into crime tools.

Independent security researchers and self-described hackers Alexandrea Mellen and John Moore were at the Black Hat computer security conference in Las Vegas to demonstrate hacks targeting Square software or the dongle that plugs into audio jacks to read credit card magnetic strips.

"We converted a Square Reader into a credit card skimmer in under 10 minutes," Mellen told AFP.

"Any layman could do it."

She said the hardware hack can be done with simple tools including a screwdriver, wire and soldering iron, and that most of the time involved was spent carefully popping open the reader that Square provides to users of its mobile payments application.

Inside the reader, a wire is soldered between two points to bypass an encryption chip.

After that, unscrambled information from swiped credit cards can be collected, essentially stolen, to be sold on a black market or abused in other ways, according to Mellen.

- Playback attack -

On the software side, Moore provided details about a mobile application that enables a "playback attack" that allows merchants to charge customs for bogus transactions in the weeks or months after legitimate purchases are completed.

"We find this troubling because unless you are closely watching your credit card statements, you might not notice," said Moore, a recent Boston University graduate on his way to a job with Google.

Moore said that he and Mellen, also a recent Boston University graduate, targeted the Square Reader because the company, headed by Twitter co-founder Jack Dorsey, is a leader in a booming trend of using smartphones for real-world financial transactions.

"Square, given its size and a bug bounty program, is no easy target," Moore said.

"We suspect the vulnerabilities we found in Square might easily apply to other mobile point-of-sale service providers."

An array of major Internet firms offer cash rewards, or bounties, for software bugs that can be exploited by hackers.

New hardware and software is quickly being fielded in the competitive mobile payments market, with pressure on to keep plug-ins compact and inexpensive, according to Moore.

Mobile payments software needs to be compatible with a variety of mobile phones, which can't be secured as easily since they are used for many more purposes than making purchases.

Moore referred to the combination of factors as "a recipe for disaster."

The hackers said they made their findings available to San Francisco-based Square but are not convinced fixes are planned.

Moore said Square told him they were watching for the kinds of bogus transactions that could be generated by "playback" hacks.

"They have the information to see the swipe of the credit card was taken weeks ago," Moore said.

- Credit cards need upgrade -

In a statement to AFP, Square put the fault on credit cards that continue to rely on storing data on magnetic strips, the technology for which dates back to the bygone era of cassette tapes.

"It should not surprise us that a system using essentially the same technology as cassette tapes is vulnerable," a Square spokesperson said.

"That is why major credit card companies, lenders and businesses are now embracing new, more secure, authenticated payment technologies."

Those technologies include embedding cards with chips that transmit data wirelessly to sensors at checkouts.

Square maintained that any credit card reader on the market could be tampered with, but that the company takes precautions to protect cards swiped on unencrypted readers.

"We have processes in place to prevent malicious behavior on damaged readers," Square said.

"If our encrypted readers are damaged, they will not work with Square."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
US bill requiring carriers to report 'terror' criticized
Washington (AFP) Aug 4, 2015
A coalition including civil liberties and human rights activists urged US lawmakers Tuesday to reject a bill that would require Internet companies to report signs of "terrorist activity" on their networks. More than 30 organizations endorsed an open letter urging the Senate to reject the measure included in an intelligence authorization act which cleared a committee and had been on track for ... read more


CYBER WARS
NASA Could Return Humans to the Moon by 2021

Smithsonian embraces crowdfunding to preserve lunar spacesuit

NASA Sets Sights on Robot-Built Moon Colony

Technique may reveal the age of moon rocks during spaceflight

CYBER WARS
Buckingham astrobiologists to look for life on Mars

NASA Mars Orbiter Preparing for Mars Lander's 2016 Arrival

New Website Gathering Public Input on NASA Mars Images

Antarctic Offers Insights Into Life on Mars

CYBER WARS
Third spaceflight for astronaut Paolo Nespoli

New rocket could one day launch flight to Europa

ISU Educates Future Space Leaders

Domes Arrive for CST-100 Test Article Assembly

CYBER WARS
Chinese earth station is for exclusively scientific and civilian purposes

Cooperation in satellite technology put Belgium, China to forefront

China set to bolster space, polar security

China's super "eye" to speed up space rendezvous

CYBER WARS
Space Kombucha in the search for life and its origin

Political Tensions Have No Impact on Space Cooperation- Roscosmos

RED epic dragon camera captures riveting images on space station

Launch, docking returns ISS crew to full strength

CYBER WARS
Payload fit-check for next Ariane 5 mission

SMC goes "2-for-2" on weather delayed launch

China tests new carrier rocket

Arianespace inaugurates new fueling facility for Soyuz upper stage

CYBER WARS
Microlensing used to find distant Uranus-sized planet

NASA's Spitzer Confirms Closest Rocky Exoplanet

Finding Another Earth

Kepler Mission Discovers Bigger, Older Cousin to Earth

CYBER WARS
Photoaging could reverse negative impact of ultraviolet radiation

New device converts DC electric field to terahertz radiation

A droplet's pancake bounce

Cooking up altered states




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.