Here’s how the NSA spied on Cisco firewalls for years

Edward Snowden leaks revealed that the NSA had the ability to spy on Cisco firewall traffic for years , but just how did the agency do it? We now have a clearer idea. An analysis of data from the Equation Group hack shows that the NSA used a specialized tool, BenignCertain, that uses an exploit in Cisco’s Internet Key Exchange implementation to extract encryption keys and read otherwise secure virtual private network data. Cisco has confirmed that the attack can compromise multiple versions of its old PIX firewalls, which were last supported in 2009. The issue doesn’t crop up in PIX 7.0 or in Cisco’s newer Adaptive Security Appliance, but that isn’t going to reassure many security experts. Ars Technica warns that there appear to be over 15, 000 networks still clinging on to PIX, and there’s a real possibility that many of them are vulnerable. Other platforms have comparable security holes , too, suggesting that the NSA might have snooped on many VPNs . To make matters worse, the Equation Group breach lets any would-be hacker use the exploit. While the past surveillance is alarming, you may need to worry more about everyday criminals going forward. Via: Ars Technica Source: Musalbas , Cisco

View original post here:
Here’s how the NSA spied on Cisco firewalls for years

TSA Paid $1.4 Million For Randomizer App That Chooses Left Or Right

An anonymous reader writes: For those of you who have traveled through U.S. airports in recent years, you may have noticed the Transport Security Administration (TSA) use a Randomizer app to randomly search travelers in the Pre-Check lane. The app randomly chooses whether travelers go left or right in the Pre-Check lane so they can’t predict which lane each person is assigned to and can’t figure out how to avoid the random checks. Developer Kevin Burke submitted a Freedom of Information Act request asking for details about the app. The documents he received reveals the TSA purchased the Randomizer iPad app for $336, 413.59. That’s $336, 413.59 for an app, which is incredibly simple to make as most programming languages of choice have a randomizing function available to use. What may be even more intriguing is that the contract for the TSA Randomizer app was won by IBM. The total amount paid for the project is actually $1.4 million, but the cost is not broken down in Burke’s documents. It’s possible IBM supplied all the iPads and training in addition to the app itself. Read more of this story at Slashdot.

Read More:
TSA Paid $1.4 Million For Randomizer App That Chooses Left Or Right

Hackers get Linux running on a PlayStation 4

In the two years since the PlayStation 4 first went on sale, hackers have enjoyed limited success in their efforts to open up the console. In June, a Brazilian team claimed the first PS4 “jailbreak, ” which involved the cumbersome process of copying the entire hard drive of a hacked machine using a Raspberry Pi, but it took until this month for a tinkerer to fully circumvent Sony’s content protections . With a proper exploit in the wild, homebrew group fail0verflow took on the challenge of installing a full version of Linux on the system. It achieved its goal this week, giving the homebrew community hope that the PlayStation 4 will soon become a worthy tool in their arsenal. Although exact details of the exploit have yet to be disclosed, it appears that the fail0verflow team took a WebKit bug recently documented by GitHub user CTurt and then turned things up a notch. CTurt’s workaround focuses on the PlayStation 4’s Webkit browser, which is tricked into freeing processes from the core of the console’s operating system by an improvised webpage. The PS4 is powered by Sony’s Orbis OS, which is based on a Unix-like software called FreeBSD and is therefore susceptible to common exploits. With a route into the console’s system, fail0verflow then identified weaknesses in the PlayStation 4’s GPU. Engineers from semiconductor company Marvell were called out specifically and accused of “smoking some real good stuff” when they built the PlayStation 4’s southbridge chip. Before you start dreaming up your next DIY computing project, you should know that this proof-of-concept relies on PS4 firmware 1.76. Sony recently issued firmware 3.11 to consoles. While the bug has now been patched, it’s believed the jailbreak could be altered to achieve the same outcome on more recent firmwares. Incidentally, the WebKit bug identified here is the exact same one that affected Apple’s Safari browser, which put iOS 6.0 and OS X 10.7 and 10.8 at risk in 2013. It shows just how common WebKit-based software now is. While PS4 owners won’t be able to install pirated games anytime soon, fail0verflow’s achievement shouldn’t be dismissed. Sony went to a lot of trouble to ensure that unsigned code could not be run on the console. The company requires that the machine runs on the very latest software, meaning hacker groups still have a long way to go before the PlayStation 4 is made truly open to hobbyists — just like the PlayStation 3 officially was when it first hit shelves almost a decade ago. Via: VentureBeat

See the article here:
Hackers get Linux running on a PlayStation 4

New Android exploit can hack any handset in one shot

Hackers have discovered a critical exploit in Chrome for Android reportedly capable of compromising virtually every version of Android running the latest Chrome. Quihoo 360 researcher Guang Gong demonstrated the vulnerability to the PSN2OWN panel at the PacSec conference in Tokyo yesterday. While the inner workings of the exploit are still largely under wraps, we do know that it leverages JavaScript v8 to gain full administrative access to the victim’s phone. Source: The Register

Read this article:
New Android exploit can hack any handset in one shot

Over 225,000 Apple Accounts Compromised Via iOS Malware

An anonymous reader writes: Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225, 000 valid Apple accounts have been compromised. The theft is executed via variants of the KeyRaider iOS malware, which targets jailbroken iOS devices. Most of the victims are Chinese — the malware is distributed through third-party Cydia repositories in China — but users in other countries have also been affected (European countries, the U.S., Australia, South Korea, and so on). “The malware hooks system processes through MobileSubstrate, and steals Apple account usernames, passwords and device GUID by intercepting iTunes traffic on the device, ” Palo Alto researcher Claud Xiao explained. “KeyRaider steals Apple push notification service certificates and private keys, steals and shares App Store purchasing information, and disables local and remote unlocking functionalities on iPhones and iPads.” Read more of this story at Slashdot.

See more here:
Over 225,000 Apple Accounts Compromised Via iOS Malware

WiFi Offloading is Skyrocketing

dkatana writes: WiFi Offloading is skyrocketing. This is the conclusion of a new report from Juniper Research, which points out that the amount of smartphone and tablet data traffic on WiFi networks will will increase to more than 115, 000 petabytes by 2019, compared to under 30, 000 petabytes this year, representing almost a four-fold increase. Most of this data is offloaded to consumer’s WiFi by the carriers, offering the possibility to share your home internet connection in exchange for “free” hotspots. But this article on InformationWeek Network Computing also warns that “The capacity of the 2.4GHz band is reaching its limit. the growing number of WiFi devices using unlicensed bands is seriously affecting network efficiency. Capacity is compromised by the number of simultaneously active devices, with transmission speeds dropping as much as 20% of the nominal value. With the number of IoT and M2M applications using WiFi continuously rising, that could become a serious problem soon.” Read more of this story at Slashdot.

See more here:
WiFi Offloading is Skyrocketing

Macs Vulnerable To Userland Injected EFI Rootkits

Bismillah writes that a new vulnerability in recent Macs — and potentially older ones — can be used to plant code such as rootkits into areas of EFI memory that shouldn’t be writeable, but become unlocked after the computer wakes up from sleep mode. The article explains that [The vulnerability] appears to be due to a bug in Apple’s sleep-mode energy conservation implementation that can leave areas of memory in the extensible firmware interface (EFI) (which provides low-level hardware control and access) writeable from user accounts on the computer. Memory areas are normally locked as read-only to protect them. However, putting some late-model Macs to sleep for around 20 seconds and then waking them up unlocks the EFI memory for writing. Read more of this story at Slashdot.

Continued here:
Macs Vulnerable To Userland Injected EFI Rootkits

Networking Library Bug Breaks HTTPS In ~1,500 iOS Apps

mrflash818 writes: A new report from analytics service SourceDNA found that roughly 1, 500 iOS apps (with about 2 million total installs) contain a vulnerability that cripples HTTPS and makes man-in-the-middle attacks against those apps easy to pull off. “The weakness is the result of a bug in an older version of the AFNetworking, an open-source code library that allows developers to drop networking capabilities into their apps. Although AFNetworking maintainers fixed the flaw three weeks ago with the release of version 2.5.2, at least 1, 500 iOS apps remain vulnerable because they still use version 2.5.1. That version became available in January and introduced the HTTPS-crippling flaw.” Read more of this story at Slashdot.

View post:
Networking Library Bug Breaks HTTPS In ~1,500 iOS Apps

LightEater Malware Attack Places Millions of Unpatched BIOSes At Risk

Mark Wilson writes Two minutes is all it takes to completely destroy a computer. In a presentation entitled ‘How many million BIOSes would you like to infect?’ at security conference CanSecWest, security researchers Corey Kallenberg and Xeno Kovah revealed that even an unskilled person could use an implant called LightEater to infect a vulnerable system in mere moments. The attack could be used to render a computer unusable, but it could also be used to steal passwords and intercept encrypted data. The problem affects motherboards from companies including Gigabyte, Acer, MSI, HP and Asus. It is exacerbated by manufactures reusing code across multiple UEFI BIOSes and places home users, businesses and governments at risk. Read more of this story at Slashdot.

See more here:
LightEater Malware Attack Places Millions of Unpatched BIOSes At Risk

New Linux Bug Could Cause "a Lot of Collateral Damage on the Internet"

Linux users around the world are scrambling to update their operating systems, as a new flaw known as GHOST has been shown to have the potential to cause “a lot of collateral damage on the Internet.” Read more…

Read the article:
New Linux Bug Could Cause "a Lot of Collateral Damage on the Internet"