DSL router patch merely hides backdoor instead of closing it

DSL router owners got an unwelcome Christmas present. Now, the same gift is back as an Easter egg. The same security researcher who originally discovered a backdoor in 24 models of wireless DSL routers has found that a patch intended to fix that problem doesn’t actually get rid of the backdoor—it just conceals it. And the nature of the “fix” suggests that the backdoor, which is part of the firmware for wireless DSL routers based on technology from the Taiwanese manufacturer Sercomm, was an intentional feature to begin with.

back-door

Back in December, Eloi Vanderbeken of Synacktiv Digital Security was visiting his family for the Christmas holiday, and for various reasons he had the need to gain administrative access to their Linksys WAG200G DSL gateway over Wi-Fi. He discovered that the device was listening on an undocumented Internet Protocol port number, and after analyzing the code in the firmware, he found that the port could be used to send administrative commands to the router without a password.

After Vanderbeken published his results, others confirmed that the same backdoor existed on other systems based on the same Sercomm modem, including home routers from Netgear, Cisco (both under the Cisco and Linksys brands), and Diamond. In January, Netgear and other vendors published a new version of the firmware that was supposed to close the back door.

However, that new firmware apparently only hid the backdoor rather than closing it. In a PowerPoint narrative posted on April 18, Vanderbeken disclosed that the “fixed” code concealed the same communications port he had originally found (port 32764) until a remote user employed a secret “knock”—sending a specially crafted network packet that reactivates the backdoor interface.

The packet structure used to open the backdoor, Vanderbeken said, is the same used by “an old Sercomm update tool”—a packet also used in code by Wilmer van der Gaast to “rootkit” another Netgear router. The packet’s payload, in the version of the backdoor discovered by Vanderbeken in the firmware posted by Netgear, is an MD5 hash of the router’s model number (DGN1000).

The nature of the change, which leverages the same code as was used in the old firmware to provide administrative access over the concealed port, suggests that the backdoor is an intentional feature of the firmware and not just a mistake made in coding. “It’s DELIBERATE,” Vanderbeken asserted in his presentation.

There are some limitations to the use of the backdoor. Because of the format of the packets—raw Ethernet packets, not Internet Protocol packets—they would need to be sent from within the local wireless LAN, or from the Internet service provider’s equipment. But they could be sent out from an ISP as a broadcast, essentially re-opening the backdoor on any customer’s router that had been patched.

Once the backdoor is switched back on, it listens for TCP/IP traffic just as the original firmware did, giving “root shell” access—allowing anyone to send commands to the router, including getting a “dump” of its entire configuration. It also allows a remote user to access features of the hardware—such as blinking the router’s lights.

Just how widely the old, new backdoor has been spread is unknown. Vanderbeken said that because each version of the firmware is customized to the manufacturer and model number, the checksum fingerprints for each will be different. While he’s provided a proof-of-concept attack for the DGN1000, the only way to find the vulnerability would be to extract the filesystem of the firmware and search for the code that listens for the packet, called “ft_tool”, or the command to reactivate the backdoor (scfgmgr –f ).

We attempted to reach Sercomm and Netgear for comment on the backdoor. Sercomm did not respond, and a Netgear spokesperson could not yet comment on the vulnerability. Ars will update this story as more details are made available by the device manufacturers.

(via Arstechnica.com)

Linux Mint Desktop Wallpaper

Have been playing around with GIMP and assembled this from other images:

Image

Click for full size and right-click to download.

Learning from history

Or not.

history

Nobody cares about Windows anymore

Can you guess what the biggest problem facing Windows is? Here’s a clue: It’s probably not what you think it is.

It’s not the lackluster response to Windows 8. Yes, pundits, analysts, and apparently even the general public were routinely antagonistic about Windows 8, a system that was force-fed to an unwitting audience in 2012 so that Microsoft could quickly make up lost ground in the new market for mobile personal computing devices. But while most of these critics begrudgingly admit that 2013’s release of Windows 8.1 fixed most of the issues they had with the original Windows 8 release, it’s fair to say that even this improved update doesn’t go far enough.

It’s not Linux, which never emerged as a force on the PC desktop.

It’s not Mac OS X, which despite strong sales growth over the past decade never hit double-digit market share worldwide, though Mac PCs sell strongly in very rich nations like the United States.

It’s not tablets, though I’d pinpoint this latest move to simpler personal computing to be a major contributing factor: People realize that they don’t just not need the complexity of Windows, they don’t even need most of the power of Windows.

Windows is in trouble because people simply don’t care about it anymore. It’s not outright hostility; there’s far less of that than the anti-Microsoft crowd would like to believe. It’s ambivalence. It’s ambivalence driven by the nature of “good enough” mobile and web apps. It’s ambivalence driven by the allure of anytime/anywhere computing on tiny devices that are more cool to use and even cooler to be seen using.

And make no mistake, this is a serious issue. With businesses keeping Windows on life support and users spacing out their PC purchases for so long that there might never in fact be another PC purchase, Windows is in trouble. This ambivalence is worse for the platform than outright defeat. In its current state, Windows can limp along for years to come. And that’s just long enough for the platform to wither and effectively disappear.

Source

The plundering of the Internet of Things has commenced

From a command center in a non-descript high-rise here in the heart of Silicon Valley, security start-up Norse has been gathering shocking evidence of hackers usurping control of Internet-connected appliances, everything from web cams to climate-control systems.

This latest expansion of cybercrime revolves around the IP address assigned to each computing device connected to the Internet. Cybercriminals have begun capitalizing on the fact that many of the mundane digital devices we tie into the web are easy to locate and wide open to hacking.

“There’s only one way onto the Internet, and that’s through an IP address,” says Norse CEO Sam Glines. “The adversary just wants IP space to launch attacks and doesn’t really care if it’s a baby monitor or a server at a Fortune 1000 company.”

The bad guys are using automated programs to scan ranges of IP addresses for signs of vulnerable appliances. It’s often a simple matter to take control by installing a few lines of malicious coding.

A typical hack: traffic lights. Real screenshot, not fake.

A typical hack: traffic lights. Real screen shot, not fake.

Norse has devised innovative technology for monitoring such cyberattacks in real time. A tiny sampling of its data, extracted exclusively for CyberTruth, revealed 724 infected appliances actively carrying out fraudulent tasks.

The corrupted appliances included firewalls, routers, modems, printers, DVRs, surveillance cams, web cams, IP cameras, VPN appliances, VOIP phone systems, FM radio transmitters, storage drives, video conferencing systems and climate-control modules. One of the big things these corrupted devices are being used for: payment card fraud.

“We are seeing credit card transactions from baby monitors, DVRs, TVs, printers, medical devices, you name it,” says Tommy Stiansen, Norse founder and chief technology officer. “It’s coming from all types of industries and from homes.”

In a stunning demonstration, Stiansen clicked to the IP address for an activated ABS MegaCam, widely sold as a $220 baby monitor. The device was activated on the Internet by a resident of Glendale, Calif., who uses Charter Communications as an ISP.

Malicious software embedded on the web cam’s Linux operating system causes a live cam view of the homeowner’s living room to appear in the browser of anyone who clicks to the web cam’s IP address. During Stiansen’s demo, a woman and then a man enter the room and sit on a couch.

The bad guy who embedded the malware on the baby monitor probably doesn’t care much about snooping; the web cam’s computing power, instead, is being used to locate similar devices and help the attacker to control as many as 2,000 ABS MegaCams.

“This is happening at a large scale, and it’s growing hugely every day,” Stiansen says, “This is very powerful stuff, and the scariest part is this is only the tip of the iceberg.”

There’s clear logic behind methodically assembling digital appliances into niche networks, called botnets, under the control of a single operator.

Botnets have been the foundation of the cyber underground for more than a decade. Traditionally comprising infected personal and server computers, botnets are the engine that drives multibillion-dollar markets for spam, phishing, account hijacking, identity theft and denial-of-service attacks.

Norse’s findings show how the advance guard of cybercriminals has begun pulling digital appliances into botnet service because, at the moment, it’s easy to do so.

Norse notifies proper entities about problems. However, sheer numbers of issues make it impossible to notify everyone, says Glines. The company is working on processes to extend notifications. For the moment, there is no broad-based effort at defense, beyond what individual organizations are doing to protect themselves.

The Internet of Things has proved trivial to hack as the U.S. tech industry puts new consumer technologies on a fast track to store shelves, sometimes with meager quality control or accounting for security and privacy.

That trait is coming to the fore as the tech giants race to profit from the rising popularity of mobile devices and Internet-delivered services. Meanwhile, the cyber underground continues to mature into a smooth-running global industry that’s quick to pounce on fresh opportunities.

“Competitive struggles force manufacturers into early release cycles, networks are becoming increasingly complex, and the complexity is hard to overcome,” Stiansen says. “Meanwhile, hackers use social crowds to build hacker communities that allow them to move under the radar.”

Stiansen grew up tinkering with computers on a Norwegian farm, which led him to a career designing air-traffic control and telecom-billing systems. After immigrating to the U.S. in 2004, Stiansen began thinking about a way to gain a real-time, bird’s-eye view of the teeming world of botnet activity.

What he eventually came up with is IPViking, a globe-spanning network of millions of physical and virtual sensors — or honeypots — dispersed through 160 data centers in 40 countries. Each pot appears to be an Internet-connected web cam, router or other appliance — irresistible honey to hackers.

When an intruder tries to take control of a Norse honeypot, Norse grabs the attacker’s IP address and begins an intensive counterintelligence routine. The IP address is fed into automated programs, called web crawlers, that scour the bulletin boards and chat rooms where hackers congregate for snippets of discussions tied to that IP address.

Analysts also do manual research to construct a dossier on the attacking IP. Norse delivers this intelligence to its clients, which include large financial institutions. The companies are then able to cut off communications from suspicious IP addresses and be on the lookout for derivative attacks. Source 

Related posts: Shodan.

Steve Ballmer gone, Project F.A.R.T. Started

We will miss Steve, sure, but a new Microsoft development overshadows the news: Project F.A.R.T. (Fixing A Retarded Technology). The goal of Project F.A.R.T. is to make Windows 9 as fast and reliable as the competition.

Thanks to a leak within the MS organization I got hold of the official Developer T-shirt. I wonder if I have to wash it first.

 

Fart Loading

Arachnophobia? Then this is not for you.

More information: http://www.robugtix.com/

Adblock Plus doesn’t block everything (+fix)

adblockplus_iconNot really news for everyone, but Adblock Plus doesn’t block everything anymore. It blocks most ads on websites, providing a relatively clean browsing experience. However, some ads do get through, and Google is one player known to pay the makers of Adblock Plus to make that happen. Users of Adblock Plus, of course, aren’t amused.

Fortunately there’s a fix.

Step 1. Open a new browser screen and type:

about:config

Ignore the warning and search for:

extensions.adblockplus.subscriptions_exceptionscheckbox

Double click on the word “True” to change it into “False”. Close the screen.

Step 2: go to your add-on menu, select Adblock Plus

Click “Preferences / Filter Preferences”

Uncheck “Allow non-intrusive advertising

Close the screen. You’re done.

IE always unsafer? Sometimes not.

Let’s assume you want to prank your friend on a forum or on another website by using his/her identity. You could, of course, try to guess their username and password. You try using the name of the dog, mother, or anything else coming to mind. Sometimes this approach works, but more often it won’t. Well, there’s an easier way to do it.

The hole in ‘safe’ browsers
We all know that using Firefox or Chrome is generally safer than using the much-targeted Internet Explorer. However, IE does something right the other two browsers don’t – the amount of effort it takes to reveal saved passwords. Here is how it works. The example below assumes the use of Firefox.

Go to your friend’s house and ask if you can access the Internet from his computer. I never got “No” for an answer, and probably you won’t either. Surf to your favorite webmail application, and ask for a drink. While your friend is on his way to the kitchen, quickly do the following:

1. At the top of the Firefox window, click on the Edit menu and select Preferences
2. Click the Security panel.
3. Click Saved Passwords (the Password Manager will open)
4. To see the passwords which were saved, click Show Passwords.
5. Copy what you’re looking for and mail it to yourself.

passwords

Done!

You can do the same when using Chrome (just google for it). To get all saved passwords out of IE is a bit more difficult and requires extra software. In a sense, that makes IE safer on at least one count.

Windows 8 ‘Secure Boot’ not that secure

At least booting Windows 8 was secure – or so we thought.

Windows 8 TrashWindows 8 Secure Boot is based on UEFI 2.3.1. Secure Boot is considered to be an important step towards securing platforms from malware compromising the boot sequence before the OS starts.

However, there are certain mistakes platform vendors could make which can completely undermine protections offered by Secure Boot. And, of course, hardware vendors make these.

At Black Hat USA2013 Yuriy Bulygin will demonstrate an example of full software bypass of Windows 8 Secure Boot due to such mistakes on some of the latest platforms and explain how those mistakes can be avoided.

Follow

Get every new post delivered to your Inbox.