. Military Space News .
CYBER WARS
Hacker makes mobile phone snooping affordable

Hack attack hits ATM jackpots
Las Vegas (AFP) July 31, 2010 - Computer security researcher Barnaby Jack jokes that he has resorted to hiding cash under his bed since figuring out how to crack automated teller machines remotely using the Internet. The New Zealand native on Saturday demonstrated his "ATM jackpotting" discovery for an overflow crowd of hackers during a presentation at the infamous DefCon gathering in Las Vegas. "You don't have to go to the ATM at all," Jack told AFP after briefing fellow software savants. "You can do it from the comfort of your own bedroom." Jack proved his findings using two kinds of ATMs typically found in corner stores, bars or other "stand-alone" venues in the United States but said the flaw likely exists in machines at banks.

Banks use "remote management" software to monitor and control their ATMs, and Jack used a weakness in that kind of code to take control of machines by way of the Internet. He found a way to bypass having to submit passwords and serial numbers to access ATMs remotely. Once in the machines, he could command them to spit out cash or transfer funds. He could also capture account data from magnetic strips on credit or bank cards as well as passwords punched in by ATM users. "When you think about ATM security you generally think about the hardware side; is it bolted down and are the cameras in position," Jack said.

"This is the first time anyone has taken the approach of trying to attack the underlying software. It is time to find software defenses rather than hardware defenses." Jack did his research on ATMs he bought on the Internet. He also found master keys for stand-alone machines available for purchase online, meaning hackers could walk up and tinker with ATM software, he added. "We shouldn't dwell on the walk-up attack, because no physical access is required," Jack said. "They have a flaw that lets me bypass all authentication on the device on the Internet, and I am the ATM at that stage."

He didn't reveal specifics of the attack to hackers even though the ATM makers were told of the flaw and have bolstered machine defenses. "I might get my butt in hot water if I released the code," said the IO Active software security researcher who did the ATM hack 'as a hobby.' "I was careful not to release the keys to the kingdom." Jack said he doesn't know if criminals have exploited the software flaw "in the wild" but that it is tough to be certain. "It is not an easy attack to replicate but I am not naive enough to think I am the only one who can do it," Jack said, admitting he has grown wary of ATMs. "I just keep my cash under the bed now, mate."
by Staff Writers
Las Vegas (AFP) Aug 1, 2010
A hacker on Saturday brought mobile phone snooping to the modestly financed, showing how to build a call-catching system for about 1,500 dollars (US).

Chris Paget demonstrated his creation for more than a thousand people crammed into a grand room at a DefCon gathering of hackers in Las Vegas, warning them to turn off their phones if they wanted to be spared.

"I can intercept cell phone calls with 1,500 dollars worth of radio gear and a laptop," Paget said after the talk.

"You handset thinks I'm your cell phone tower and I get to control your calls. These attacks used to cost millions of dollars, now you can do it for a lot less."

The gear included an antenna and radio equipment and broadcast a GSM signal that imitated a legitimate telecom service tower, prompting handsets to automatically connect.

A hacker could then pretend to be the telecom service provider, forwarding calls to intended recipients and listening in.

"I can target specific people if I want to spy and I can command only certain types of phones to connect," Paget said. "An attacker could easily take advantage of this."

Mobile phone snoops with this gear could snag credit card or account information from calls made to shops or banks. Companies could be staked out in the hope insiders would reveal valuable information during calls.

His creation worked only on mobile phones using the GSM network and not more secure 3G, third generation, networks.

"GSM is broken," Paget said. "It is up to telecom providers when to shift from GMS to 3G networks. GMS is widely deployed with millions of handsets in use."

However, someone could use a noise generator and a power amplifier could easily jam a 3G network and prompt handsets to resort to GSM systems commonly used as backup systems, according to Paget.

He gestured to a noise generator he bought online for 450 dollars and a power amplifier purchased on the Internet for 400 dollars.

"I'm not turning this thing on," Paget said. "It would knock out pretty much every cell phone there is for most of Las Vegas."

The system only grabs outgoing calls since it has fooled handsets.

Since the phones have disconnected from real telecom service providers, they are considered gone from the networks and incoming calls are routed directly to voice mail boxes.

There is a way for hackers to use credentials from duped handsets to impersonate the phones to carriers, according to Paget.

His talk was almost scuttled by the US Federal Communications Commission, which reached out to him with concerns about the danger it might pose or statutes it might violate.

"There was so much shenanigans involved making sure I could get on stage," Paget said after the DefCon briefing. "The good news is that it is all over and I haven't been arrested."

earlier related report
Hackers crack high-tech locks
Las Vegas, Nevada (AFP) July 31, 2010 - Security maverick Marc Tobias showed hackers on Saturday how simple it is to defeat some of the world's top high-tech locks.

"These locks might be winning awards but they are forgetting the basics," Tobias said while giving AFP a first-hand look at how to crack several models. "They might be clever, but they aren't secure."

A Biolock model 333 designed to scan fingerprints and unlock for chosen people was opened by simply pushing a paper clip into a key slot.

An Amsec ES1014 digital safe was breached by sliding a flat metal file folder hangar through through a crack at the edge of the door and pressing an interior button allowing the access code to be reset.

Tobias grew passionate when it came to an award-winning electromagnetic lock made in China for Finland-based iLoq.

The innovative iLoq used the action of a key being pushed into the lock to generate power for electronics that then checked data in a chip on the key to determine whether the user is cleared for access.

Tobias and lock-cracking colleague Tobias Bluzmanis pointed out that the iLoq design counted on a small hook being tripped to reset the devices as a key was removed.

In what they referred to as a viable inside attack possible on locks geared for office settings, someone could borrow a key and shave tiny bit of metal from the tip and it would no longer catch the iLoq reset hook.

A pocket-sized tool available in US stores for about 60 dollars could be used to grind down the hook in seconds, the men demonstrated.

With either method, the result would be that once a valid key is used to open the iLoq it will yield to any key or even a screw driver stuck in the slot because it remains stuck in the unlocked position.

An audit trail left by a compromised iLoq would stop at the person whose key legitimately opened the lock.

"It is really clever, but it is also very defective," said Tobias, a longtime advocate for tougher standards in the lock industry.

"Electromechanical locks are more secure if done right. The question is whether the technology is implemented properly."

The security.org crew opened a Kwikset programmable "smartkey" lock with a key blank, a screw driver and a vice grip tool.

Tobias and his team consistently show up at the annual DefCon gathering in Las Vegas to pop locks with wires, magnets, air, shock, screw drivers and other improvised tools.

Their presentation this year was met with hoots and applause.

Lock-picking holds a natural appeal to hackers, who thrive on bending hardware or software to their wills.



Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


CYBER WARS
Elite US cyber team courts hackers to fight terrorists
Las Vegas (AFP) Aug 1, 2010
An elite US cyber team that has stealthily tracked Internet villains for more that a decade pulled back its cloak of secrecy to recruit hackers at a notorious DefCon gathering here Sunday. Vigilant was described by its chief Chet Uber as a sort of cyber "A-Team" taking on terrorists, drug cartels, mobsters and other enemies on the Internet. "We do things the government can't," Uber said. ... read more







CYBER WARS
Washington backs Israeli Arrow II upgrade

US to activate missile shield over southern Europe: report

India's defense shield tested

Israel eyes more Iron Dome systems

CYBER WARS
Russia denies S-300 missile system export

Vinson Uploads And Launches Missiles For Qualifications

Dynetics Completes Test On Multipurpose NanoMissile System Rocket Engine

Raytheon-Boeing Team On Target During First Government-Funded Test Of JAGM

CYBER WARS
ZALA AERO Unveils ZALA 421-20

EODMU-1 Tests UUVs For Use In Anti-Mine Warfare

Boeing Signs MOU With Aeronautics For DA42 Dominator UAS

US drone strikes kill eight militants in Pakistan

CYBER WARS
Raytheon's ASTOR Saving Lives In The Counterinsurgency Battle

Testing Of Australia's Network Centric Command And Control System Completed

Thales UK wins Congo army radio contract

Savi Ships Compact Mobile Tracking Systems For Marine Afghan Forces

CYBER WARS
Cubic Delivers Latest Air Combat Training System To MCAS Miramar

U.S. orders new unmanned combat vehicles

Boeing P-8A Poseidon Aircraft T3 Enters Flight Test

BAE IMX-101 Explosive Approved To Replace TNT In US Army Artillery

CYBER WARS
Russia's Defense Spending To Rise By 60% By 2013

India inks Hawk deal with Britain

Russia back in Latin American arms market

French defense giants see profits rise

CYBER WARS
US lawmaker calls for sanctions on China, Russia

US cannot afford to withdraw from global role: Mullen

China grooms Latin nations as springboard

Britain to fight for Turkish EU bid

CYBER WARS
Truck-borne laser weapon to be on way soon

Maritime Laser Demonstration System Proves Key Capabilities For Shipboard Operations

Phalanx Sensors Used In Laser Shoot Down Of Airborne Targets

Boeing Accepts Delivery Of Key Component For US Army's HEL TD


The content herein, unless otherwise known to be public domain, are Copyright 1995-2010 - SpaceDaily. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement