A Long-Awaited IoT Crisis Is Here, and Many Devices Aren’t Ready

A Long-Awaited IoT Crisis Is Here, and Many Devices Aren’t Ready

https://ift.tt/2IB0K9m

You know by now that Internet of Things devices like your router are often vulnerable to attack, the industry-wide lack of investment in security leaving the door open to a host of abuses. Worse still, known weaknesses and flaws can hang around for years after their initial discovery. Even decades. And Monday, the content and web services firm Akamai published new findings that it has observed attackers actively exploiting a flaw in devices like routers and video game consoles that was originally exposed in 2006.

Over the last decade, reports have increasingly detailed the flaws and vulnerabilities that can plague insecure implementations of a set of networking protocols called Universal Plug and Play. But where these possibilities were largely academic before, Akamai found evidence that attackers are actively exploiting these weaknesses not to attack the devices themselves, but as a jumping off point for all sorts of malicious behavior, which could include DDoS attacks, malware distribution, spamming/phishing/account takeovers, click fraud, and credit card theft.

To pull that off, hackers are using UPnP weaknesses in commercial routers and other devices to reroute their traffic over and over again until it’s nearly impossible to trace. This creates elaborate “proxy” chains that cover an attacker’s tracks, and create what Akamai calls “multi-purpose proxy botnets.”

“We started talking about how many of these vulnerable devices are out there and what can they be leveraged for, because most people seem to have forgotten about this vulnerability,” says Chad Seaman, a senior engineer on the security intelligence response team at Akamai. “As part of that we had to write some basic tools to find what was vulnerable. And some of these machines did have very abnormal [activity] on them. It was not something that we honestly expected to find and when we did it was kind of like ‘uh oh.’ So this theorized problem is actually being abused by somebody.”

Down With UPnP

UPnP helps devices on a network find and essentially introduce themselves to each other, so that a server, say, can discover and vet the printers on a network. You can find it both on internal, institutional networks and on the larger internet, handling things like IP address routing and data flow coordination. UPnP works with and incorporates other network protocols to negotiate and automatically configure these network communications, and it can be used when applications want to send each other large quantities of data to facilitate a sort of unrestricted firehose—think video streaming, or a gaming console talking to its web server.

‘This theorized problem is actually being abused by somebody.

Chad Seaman, Akamai

When IoT devices expose too many of these mechanisms to the open internet without requiring authentication—or when credential checks are easily guessable or can be brute forced—attackers can then scan for devices that have implemented a few of these protocols badly all in one device, and then exploit this series of manufacturer missteps to launch an attack.

That’s also how the Akamai researchers found the malicious UPnP proxy schemes. Akamai says it found 4.8 million devices on the open internet that would improperly return a certain query related to UPnP. Of those, about 765,000 also had a secondary implementation issue that created a bigger network communication vulnerability. And then on more than 65,000 of those, Akamai saw evidence that attackers had exploited the other weaknesses to inject one or more malicious commands into the router mechanism that controls traffic flow. Those final 65,000 devices were grouped together in various ways and ultimately pointed to 17,599 unique IP addresses for attackers to bounce traffic around to mask their movements.

Uptick in Attacks

Just because they haven’t been seen until recently, that doesn’t mean UPnP attacks haven’t been around. Last month, for example, Symantec published evidence that an espionage group it tracks known as Inception Framework uses UPnP proxying to compromise routers and obscure its cloud communications. But observers note that the strategy is probably not more common because the schemes are difficult to set up.

“In particular it’s annoying to build these attacks against hundreds of personal routers, and testing these attacks is hard too,” says Dave Aitel, who runs the penetration testing firm Immunity. “I’ve not seen it in the wild. That said, a working version would get you significant access.” He notes, though, that data leaks stemming from implementation mistakes, like the ones Akamai detected, make it easier for attackers to craft their attacks. For the manufacturers who developed vulnerable devices? “It falls under the ‘WTF were they thinking’ category,” Aitel notes.

Notably, the Akamai researchers saw evidence that UPnP proxying isn’t just being used for malicious activity. It also seems to be part of efforts to skirt censorship schemes in countries like China to gain unfettered web access. Even when a user is behind the Great Firewall, they can use a proxy network built on exposed devices to query web servers that would normally be blocked. Akamai’s Seaman notes that the group approached publishing its research carefully, since plugging these holes will limit people’s ability to exploit them for access to information. Ultimately, though, they concluded that the risks must be addressed, especially given how long the vulnerabilities have been known for.

‘It falls under the “WTF were they thinking” category.’

Dave Aitel, Immunity

Users won’t realize if their devices are being exploited for UPnP proxy attacks, and there is little they can do to defend themselves if they have a vulnerable device besides getting a new one. Some devices will allow users to disable UPnP, but that can lead to functionality issues. Though more and more devices have improved their UPnP implementations over the years to avoid these exposures, Akamai found 73 brands and almost 400 IoT models that are vulnerable in some way. The United States Computer Emergency Readiness Team, which tracks and warns about vulnerabilities, wrote in a note to impacted brands that, “CERT/CC has been notified by Akamai that a large number of devices remain vulnerable to malicious NAT injections. …This vulnerable behavior is a known problem.”

The whole point of proxying is to cover your tracks, so a lot is still unknown about how attackers use UPnP proxying and for what. But Akamai’s goal is to raise awareness about the problem to ultimately reduce the number of vulnerable devices that exist. “It was one of those things where it was like, this would be bad and it could be used for these attacks, but no one ever actually found it being used for that,” Akamai’s Seaman says. Now that it has been, hopefully manufacturers will finally do something about it.

Internet of Threats

Tech

via Wired Top Stories https://ift.tt/2uc60ci

April 9, 2018 at 01:12PM

Upgrade Your Nintendo Switch With These Clever DIY Lego Accessories

Upgrade Your Nintendo Switch With These Clever DIY Lego Accessories

https://ift.tt/2EzIkDG

Nintendo’s upcoming Labo accessory for its portable Switch console certainly looks like it introduces some unique gameplay mechanisms. But do you really want to pay $70 for some cardboard origami? Not when you can build similar accessories using all the Lego you never stopped buying once you grew up.

Vimal Patel created a short video showing a handful of genuinely useful Nintendo Switch hacks using Lego Technic pieces, including a vastly improved kickstand, a better approach to mounting the Switch’s Joy-Cons, and a pair of steering wheels for mastering Mario Kart 8 Deluxe.

It’s important to note that these builds rely on one Lego piece you almost certainly don’t already have, because Lego has never made it. You’ll need a 3D-printed adapter that connects to the side rails the Switch’s Joy-Cons usually do, allowing Lego structures to be securely attached to the console. Further complicating things is the fact that you’ll have to modify existing Switch adapters to make them Lego Technic-friendly, and then find a place to 3D print them for you. On second thought, $70 for a stack of cardboard just sounds way easier.

[YouTube via Hackaday]

Tech

via Gizmodo http://gizmodo.com

April 10, 2018 at 10:12AM

Fire-Detecting Wallpaper Turns Entire Rooms Into a Better Smoke Detector

Fire-Detecting Wallpaper Turns Entire Rooms Into a Better Smoke Detector

https://ift.tt/2uYeA3G

Where there’s smoke, there’s fire, and that’s how most alarm systems are able to detect and warn of trouble. But Chinese researchers have developed a new kind of wallpaper, using ingredients found in bones and teeth, that sounds the alarm when heat and flames are detected, turning every wall in a room into a potential early warning system.

The problem with relying on smoke to detect a fire is that it’s not always the earliest sign of trouble. Other gases like carbon monoxide and nitrogen oxide are actually released first, but even before those emissions there’s heat and flames, and that’s where this wallpaper alternative could be a lifesaver.

Researchers at the Shanghai Institute of Ceramics, Chinese Academy of Sciences, found that by creating long nanowires of hydroxyapatite, a brittle material found in bone and teeth, it became highly flexible but strong enough to be used as the base for a new kind of wallpaper. The results are not only environmentally-friendly, they’re also highly heat and fire-resistant, actually helping to prevent the spread of flames.

But why stop there? As detailed in the paper “Fire Alarm Wallpaper Based on Fire-Resistant Hydroxyapatite Nanowire Inorganic Paper and Graphene Oxide Thermosensitive Sensor,” which was recently published in ACS Nano, the researchers also added thermosensitive sensors made from drops of a graphene oxide ink mixture. At room temperature, the ink works as an electrical insulator, preventing the flow of electricity. But when heat is introduced, it quickly becomes conductive, completing a circuit that sounds an alarm after about two seconds in the presence of a fire.

As with any product based on a new discovery, getting this wallpaper into the hands of consumers and safety-conscious interior designers is going to take some time. Creating those long hydroxyapatite nanowires isn’t a cost-effective process just yet, and developing a way to manufacture them en masse so that the wallpaper remains affordable will require further research. There’s also the issue that no one wants to decorate with wallpaper anymore because it’s such a giant pain to hang it straight, but the pain of installation might outweigh the jarring sound of your smoke detector going off in the middle of the night because its battery is dying.

[ACS Nano via Phys.org]

Tech

via Gizmodo http://gizmodo.com

April 10, 2018 at 12:24PM

Oregon governor signs net neutrality bill into law

Oregon governor signs net neutrality bill into law

https://ift.tt/2qgJhwo

It’s getting increasingly difficult for internet providers to take advantage of the FCC’s looming net neutrality repeal. Oregon Governor Kate Brown has signed the state’s recently passed net neutrality bill (HB 4155) into law, forcing ISPs to honor net neutrality if they want to secure government contracts. As with other states’ legislative campaigns (including Kansas, Tennessee and Wisconsin), the measure is a creative workaround that enshrines equal treatment of internet traffic without directly overriding the FCC’s order.

A slew of other states (such as Montana, New Jersey and New York) have implemented similar demands through their governors’ executive orders.

The Oregon law doesn’t represent bulletproof protection for consumers. It exempts companies when there’s only one fixed broadband option (and let’s face it, the US is full of regional telecom monopolies). And while it does prevent blocking or throttling outside of urgent situations, it does allow paid prioritization so long as there are "significant public interest benefits" and it doesn’t "harm the open nature" of the service. We’d expect telecoms to test the limits of these rules, and the USTelecom lobbying group (which represents carriers like AT&T and Verizon) have already threatened to sue local governments that pass net neutrality legislation.

All the same, the signing illustrates just how difficult it’s likely to be for the current FCC administration to achieve its anti-net neutrality goals. ISPs will typically have to act as if Tom Wheeler-era net neutrality protections are still in place, and any campaign to undo state measures will likely have to go through a protracted court battle. This doesn’t mean that net neutrality is safe — just that the battle over its fate will take a long while.

Via: Ars Technica

Source: Oregon.gov

Tech

via Engadget http://www.engadget.com

April 9, 2018 at 02:42PM

Web standard brings password-free sign-ins to virtually any site

Web standard brings password-free sign-ins to virtually any site

https://ift.tt/2GOmr5r

Tech companies have been trying to do away with web passwords for years, but now it looks like they’ve reached a key milestone. The FIDO Alliance and W3C have launched a Web Authentication standard that makes it easier to offer truly unique encryption credentials for each site. That, in turn, lets you access virtually any online service in a PC browser through password-free FIDO Authentication, not just specific services. You can continue to use familiar methods like fingerprint readers, cameras and USB keys, and it can serve both in place of and in addition to passwords.

It’s about more than convenience. That same uniqueness reduces the chances that a password compromised on one site can be used on another — intruders shouldn’t have free rein with your accounts even if they punch through a site’s defenses.

The functionality is useful right now in Mozilla’s Firefox browser, and should come to both Google Chrome and Microsoft Edge in the "next few months." Opera has also publicly committed to the technology (there’s no mention of Apple bringing it to Safari). No, you can’t immediately forego all your passwords, but this could let you depend on biometric logins much more consistently than you have in the past.

Source: W3C

Tech

via Engadget http://www.engadget.com

April 10, 2018 at 05:12AM

Check right now if Cambridge Analytica used your Facebook data

Check right now if Cambridge Analytica used your Facebook data

https://ift.tt/2GNR2Er

In the aftermath of the Cambridge Analytica scandal, you’re probably wondering: Was I actually affected? After all, the company obtained data on 87 million users (that’s the current estimate, anyway.) Facebook has, thankfully, started sending News Feed notifications to explain whether users’ accounts were affected. If you’re still waiting for yours to come through, however, you can visit this page and find out immediately. In short, it explains if you or your friends ever logged into This Is Your Digital Life — the quiz app developed by university researcher Dr Aleksandr Kogan, which Cambridge Analytica used to profile and manipulate users.

It’s the latest attempt by Facebook to apologise for what happened and ensure similar data harvesting doesn’t happen again. Chief executive Mark Zuckerberg has promised to investigate "every app that has access to a large amount of information." The company has already suspended AggregateIQ and CubeYou for Cambridge Analytica-style tactics, and strengthened a bunch of data policies, which include disabling the ability to search for users by email address and phone number, and restricting the information accessible through its Events API. Zuckerberg, if you need a reminder, is scheduled to testify at a joint Senate hearing later today.

Via: Matt Navarra (Twitter)

Source: Facebook

Tech

via Engadget http://www.engadget.com

April 10, 2018 at 07:06AM

Man Builds Hilariously Complex Rube Goldberg Style Cake Serving Machine [Video]

Man Builds Hilariously Complex Rube Goldberg Style Cake Serving Machine [Video]

https://ift.tt/2uYazfV

An overly complex machine that serves cake. The thing took around 3 months to build, so let’s just encourage this guy and watch the whole thing: It’s hilarous.

[Joseph’s Machines]

The post Man Builds Hilariously Complex Rube Goldberg Style Cake Serving Machine [Video] appeared first on Geeks are Sexy Technology News.

Tech

via [Geeks Are Sexy] Technology News https://ift.tt/23BIq6h

April 9, 2018 at 03:50PM