recentpopularlog in

itsicherheit_exploit_flaw

« earlier   
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Mobile communications are used by more than two thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide standardization of mobile communication has designed and mandated the use of the AKA protocol to protect the subscribers' mobile services. Even though privacy was a requirement, numerous subscriber location attacks have been demonstrated against AKA, some of which have been fixed or mitigated in the enhanced AKA protocol designed for 5G. In this paper, we reveal a new privacy attack against all variants of the AKA protocol, including 5G AKA, that breaches subscriber privacy more severely than known location privacy attacks do. Our attack exploits a new logical vulnerability we uncovered that would require dedicated fixes. We demonstrate the practical feasibility of our attack using low cost and widely available setups. Finally we conduct a security analysis of the vulnerability and discuss countermeasures to remedy our attack.
03.12.2018
uni_de_tu_berlin  uni_ch_eth  tech_mobilfunk_lte_ngmn  tech_mobilfunk_standard  krypto_key_agreement_exchange  krypto_algo_aka  überwachung_lokalisierung_bewegung  überwachung_mobilfunk  überwachung_mobilfunk_imsi_catcher  privatsphäre  itsicherheit_by_obscurity  itsicherheit_exploit_flaw  itsicherheit_implementierung  npo_3gpp  verband_gsma  überwachung_verhalten  überwachung_itk_verkehrs_metadaten  wissenschaft_forschungsinstitut_sintef  überwachung_person_profil 
6 days ago by kraven
GCHQ opens kimono for infosec world to ogle its vuln disclosure process
In a briefing note today the agency revealed it may keep vulns in unsupported software to itself. "Where the software in question is no longer supported by the vendor," it said, "were a vulnerability to be discovered in such software, there would be no route by which it could be patched." When it decides whether or not to give up a vuln, GCHQ said three internal bodies are involved: the Equities Technical Panel, made up of "subject matter expert" spies; the GCHQ Equity Board, which is chaired by a civil servant from GCHQ's public-facing arm, the National Cyber Security Centre (NCSC), and staffed by people from other government departments; and the Equities Oversight Committee, chaired by the chief exec of the NCSC, Ciaran Martin. Broadly speaking, Martin gets the final word on whether or not a vuln is "released" to be patched. Those decisions are "regularly reviewed at a period appropriate to the security risk" and, regardless of the risk, "at least every 12 months". Today a post-Snowden legal tweak comes into force: state employees wanting to hack targets' networks and devices must now get a judge-issued warrant, under section 106 of the Investigatory Powers Act. Using hacking tools to investigate alleged crimes that fall under sections 1 to 3 of the Computer Misuse Act 1990 is now subject to the "equipment interference warrant" procedure, rather than the bog-standard Police Act 1997 "property interference authorisation". "In exceptional cases, the CEO of the NCSC may decide that further escalation via submissions to Director GCHQ and, if required, the Foreign Secretary should be invoked," said the GCHQ press briefing note.
register, 29.11.2018
land_uk  geheimdienst_uk_gchq_ncsc  geheimdienst_uk_gchq_jtrig_cna_cne  geheimdienst_polizei_infiltration_tech  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  gesetz_uk_ipa  recht_richtervorbehalt  geheimdienst_uk_gchq_cne_equipment_interference 
12 days ago by kraven
My name is Johann Wolfgang von Goethe – I can prove it
The German government-issued identity card (nPA) allows German citizens to not only prove their identity in person, but also against online services (by using the embedded RFID chip). SEC Consult conducted a short security test on a software component commonly used to implement this authentication mechanism. A critical security vulnerability was found during this security test, allowing an attacker to impersonate arbitrary users against affected web applications. To start an authentication, the web application sends a request to the eID client, which then initiates all further steps needed for the authentication. It requests a PIN from the user, communicates with an authentication server (eID-Server or SAML-Processor), the web application and the RFID chip and finally sends a response to the web application. This response contains the data retrieved from the id card, e.g. the name or date of birth of the citizen. To prohibit an attacker from manipulating this data, the response is digitally signed by the authentication server (which takes on the role of a trusted third party). The SEC Consult Vulnerability Lab identified a vulnerability that allows an attacker to arbitrarily manipulate the response without invalidating the signature. An attacker could therefore abuse this vulnerability e.g. to alter data coming from the id card, fool age verification or authenticate as any other citizen. We have informed the CERT-Bund about this vulnerability in July 2018. The CERT-Bund (BSI) took on further communication and coordination with the vendor. In August 2018, Governikus released a patched version (3.8.1.2) of the Autent SDK and informed affected customers.
sec consult, 20.11.2018
eid_dokument_npa  land_deutschland  itsicherheit_authentisierung  eid_dokument_software  itsicherheit_exploit_flaw  staat_egovernment  unternehmen_governikus  itsicherheit_authentisierung_saml  itsicherheit_authentisierung_sso  itsicherheit_authentisierung_protokoll  itsicherheit_implementierung  internet_protokoll_http 
20 days ago by kraven
Spectre, Meltdown researchers unveil 7 more speculative execution attacks
A research team—including many of the original researchers behind Meltdown, Spectre, and the related Foreshadow and BranchScope attacks—has published a new paper disclosing yet more attacks in the Spectre and Meltdown families. The result? Seven new possible attacks. Some are mitigated by known mitigation techniques, but others are not. That means further work is required to safeguard vulnerable systems. In the new research, these Meltdown variants are joined by a new one using Intel's "Protection Keys for Userspace" (PKU). Similarly, another Intel extension is the Memory Protection eXtensions (MPX). Just as all the Meltdown variants follow a similar pattern, so, too, do the Spectre variants. In total, five different misprediction scenarios were identified (four based on branch predictors, one based on stores to memory being overlooked momentarily). Of the four branch predictor attacks, each attack can be used either against the same address space or a different one, and it can be used against the same branch or one that's related. This creates 16 branch predictor-based variants as well as the store-based attack. In particular, one of the variants of the original Spectre attacks has been shown to have greater applicability against AMD's latest processors than previously known; likewise the attack has also been shown to be effective against ARM processors.
ars technica, 14.11.2018
itsicherheit_cpu_meltdown_spectre  itsicherheit_exploit_flaw  itsicherheit_seitenkanal_analyse_angriff  itsicherheit_verdeckterkanal_data_exfil 
27 days ago by kraven
Gesundheitsdaten: Krankenkassen-App Vivy hatte womöglich erhebliche Sicherheitslücken
Vor knapp sechs Wochen ist mit der Gesundheits-App Vivy diejenige gelauncht worden, die der bislang größte Kreis an Menschen in Deutschland nutzen könnte: 13,5 Millionen Menschen sind versichert bei den beteiligten gesetzlichen wie privaten Krankenversicherungen, die sie anbieten. Darunter sind die DAK, verschiedene Innungskrankenkassen, die BertelsmannBKK, Gothaer, Barmenia und Allianz. Letztere ist auch als Gesellschafter mit 70 Prozent beteiligt an der Betreiberfirma der App, der in Berlin ansässigen Vivy GmbH. Die hat am 22. September, fünf Tage nach dem Start der App, morgens um 9.45 Uhr eine Mail der schweizerisch-deutschen IT-Sicherheitsfirma modzero erhalten. Der Inhalt des Schreibens musste alarmierend sein: Die Vivy-App, verfügbar für die Smartphone-Betriebssysteme Android und iOS enthalte nach einer Analyse von modzero schwerwiegende Schwachstellen in Sachen Datensicherheit. Martin Tschirsich, ein bei modzero beschäftigter IT-Security-Analyst, hatte kurz nach dem Launch der App im September "schwere Sicherheitsmängel sowohl in der Smartphone-App als auch in der Cloud-Plattform und der Browser-Anwendung für Ärzte" gefunden – mithin also an allen nur erdenklichen Punkten, an denen Hacker ansetzen könnten. Am 25. Oktober verfasste Thorsten Schröder, Geschäftsführer von modzero, die finale Version eines 35-seitigen Berichtes, den seine Firma umgehend an die Vivy GmbH sandte. Die Mängelliste, die modzero zur Vivy-App erstellt hat, ist lang. So seien etwa Informationen darüber, wer wann mit welchem Arzt Gesundheitsdaten geteilt hatte, "ungeschützt für jede Person lesbar im Internet" gewesen. Versicherte seien identifizierbar gewesen "anhand von Namen, Foto, E-Mailadresse, Geburtsdatum und Versichertennummer", auch die Namen der von ihnen kontaktierten Medizinerinnen und Ärzte seien auslesbar gewesen. Schlimmer noch: "Unbefugte konnten über das Internet alle Dokumente, die an einen Arzt gesendet werden sollten, abfangen und entschlüsseln."
zeit, 30.10.2018
itsicherheit_datensicherheit  itsicherheit_implementierung  itsicherheit_by_obscurity  itsicherheit_mobil_apps  itsicherheit_mobil_os  datenschutz_patient_gesundheitsdaten  itsicherheit_exploit_flaw  unternehmen_vivy  unternehmen_modzero  unternehmen_allg_desinformation_propaganda  unternehmen_allg_versicherung_kk  staat_politik_gesundheit_ehealth_ega_epf  unternehmen_allianz  itsicherheit_audit  itsicherheit_prüfsigel_zertifizierung  land_deutschland 
5 weeks ago by kraven
Überwachungsexporte: Bundesregierung stellt Industrie vor Menschenrechte
Vor zwei Jahren startete die EU-Kommission auf Druck der Bundesregierung eine Initiative, um den Handel der europäischen Überwachungsindustrie mit autokratischen Regimen zu stoppen. Vertrauliche Verhandlungsprotokolle zeigen nun: Die Bundesregierung nutzt die laufenden Brüsseler Verhandlungen, um Wünsche der deutschen Industrie zu erfüllen – und wird bei Regelungen zum menschenrechtlichen Schutz vor Überwachung ausgetrickst. Gemeinsam mit der Menschenrechtsorganisation Reporter ohne Grenzen veröffentlichen wir die Dokumente im Volltext, die belegen, dass von den einstigen Versprechungen heute kaum noch etwas übrig geblieben ist. Tatsächlich hat die Bundesregierung nun in einigen Punkten sogar gegen Verbesserungsvorschläge gestimmt, die EU-Kommission und Europaparlament in jahrelangen Verhandlungsrunden erarbeitet hatten. In anderen Bereichen scheiterte die Strategie der deutschen Beamten in Brüssel durch taktische Fehleinschätzungen, sodass sich mittlerweile ein regelrechter Block gegen Deutschland gebildet hat. Die historische Reform steht damit vor dem Aus.
netzpolitik, 29.10.2018
de_bundesregierung  eu_europäischer_rat_der_eu  land_europa  abkommen_waasenaar  recht_eu_vo_dual_use  land_deutschland  staat_politik_wirtschaft_förderung_schutz  staat_politik_wirtschaft_exportkontrolle  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  unternehmen_allg_exploit_malware_dealer  unternehmen_allg_lobbyismus  verband_bdi  staat_form_autoritarismus  staat_form_polizeistaat  staat_repression_medien_presse  staat_repression_opposition_dissidenz  staat_repression_politische_verfolgung  überwachung_ngo_npo  überwachung_medien_presse  überwachung_int_sigint_comint  geheimdienst_polizei_infiltration_tech  staat_politik_aktionismus_symbolisch  staat_politik_geheimhaltung  staat_politik_diplomatie  überwachung_itk_inhaltsdaten  überwachung_onlinedurchsuchung  überwachung_quellen_tkü  land_schweden  land_finnland  staat_repression_ngo_npo 
6 weeks ago by kraven
DarkPulsar
In March 2017, the ShadowBrokers published a chunk of stolen data that included two frameworks: DanderSpritz and FuzzBunch. DanderSpritz consists entirely of plugins to gather intelligence, use exploits and examine already controlled machines. Fuzzbunch on the other hand provides a framework for different utilities to interact and work together. It contains various types of plugins designed to analyze victims, exploit vulnerabilities, schedule tasks, etc. One of the most interesting Fuzzbunch’s categories is called ImplantConfig and includes plugins designed to control the infected machines via an implant at the post-exploitation stage. DarkPulsar is a very interesting administrative module for controlling a passive backdoor named ‘sipauth32.tsp’ that provides remote control, belonging to this category. We found around 50 victims located in Russia, Iran and Egypt, typically infecting Windows 2003/2008 Server. Targets were related to nuclear energy, telecommunications, IT, aerospace and R&D.
kaspersky labs, 19.10.2018
geheimdienst_us_nsa_tao_cna_cne  itsicherheit_botnetz_c&c  itsicherheit_exploit_flaw  itsicherheit_malware_spyware  geheimdienst_polizei_infiltration_tech  itsicherheit_verdeckterkanal_data_exfil  software_os_windows  überwachung_backdoor_software  software_server  itsicherheit_authentisierung 
7 weeks ago by kraven
If Supermicro boards were so bug-ridden, why would hackers ever need implants?
Whether spy chips reported by Bloomberg existed, attackers had much easier options. By now, everyone knows the premise behind two unconfirmed Bloomberg articles that have dominated security headlines over the past week. The complexity, sophistication, and surgical precision needed to pull off such attacks as reported are breathtaking, particularly at the reported scale. The other monumental effort required by the reported supply-chain attacks is the vast amount of engineering and reverse engineering. Based on Bloomberg’s descriptions, the attacks involved designing at least two custom implants (one that was no bigger than a grain of rice), modifying the motherboards to work with the custom implants, and ensuring the modified boards would work even when administrators installed new firmware on the boards. While the requirements are within the means of a determined nation, three hardware security experts interviewed for this story said the factory-seeded hardware implants are unnecessarily complex and cumbersome, particularly at the reported scale, which involved almost 30 targets. “Attackers tend to prefer the lowest-hanging fruit that gets them the best access for the longest period of time,” Steve Lord, a researcher specializing in hardware hacking and co-founder of UK conference 44CON, told me. “Hardware attacks could provide very long lifetimes but are very high up the tree in terms of cost to implement.” “I spoke with Jordan a few months ago,” Moore said, referring to Jordan Robertson, one of two reporters whose names appear in the Bloomberg articles. “We chatted about a bunch of things, but I pushed back on the idea that it would be practical to backdoor Supermicro BMCs with hardware, as it is still trivial to do so in software. It would be really silly for someone to add a chip when even a non-subtle change to the flashed firmware would be sufficient.”
ars technica, 11.10.2018
medien_presse_bloomberg  land_usa  land_china  überwachung_abhörschnittstelle  überwachung_backdoor_hardware  tech_computer_server  itsicherheit_verdeckterkanal_data_exfil  geheimdienst_polizei_infiltration_tech  itsicherheit_malware_spyware  itsicherheit_firmware  unternehmen_supermicro  überwachung_backdoor_software  itsicherheit_exploit_flaw  itsicherheit_code_signing 
8 weeks ago by kraven
Voting Machine Used in Half of U.S. Is Vulnerable to Attack, Report Finds
Election machines used in more than half of U.S. states carry a flaw disclosed more than a decade ago that makes them vulnerable to a cyberattack, according to a report to be delivered Thursday on Capitol Hill. The issue was found in the widely used Model 650 high-speed ballot-counting machine made by Election Systems & Software LLC, the nation’s leading manufacturer of election equipment. It is one of about seven security problems in several models of voting equipment described in the report, which is based on research conducted last month at the Def Con hacker conference. The flaw in the ES&S machine stood out because it was detailed in a security report commissioned by Ohio’s secretary of state in 2007, said Harri Hursti, an election-security researcher who co-wrote both the Ohio and Def Con reports. “There has been more than plenty of time to fix it,” he said.
wsj, 27.09.2018
tech_hw_wahlcomputer  itsicherheit_exploit_flaw  land_usa 
10 weeks ago by kraven
DARPA Wants to Find Botnets Before They Attack
The Defense Advanced Research Projects Agency on Aug. 30 awarded a $1.2 million contract to cybersecurity firm Packet Forensics to develop novel ways to locate and identify these hidden online armies. The award comes as part of the agency’s Harnessing Autonomy for Countering Cyber-adversary Systems program, a DARPA spokesperson told Nextgov. Through the HACCS program, DARPA aims to build a system that can automatically pinpoint botnet-infected devices and disable their malware without their owners ever knowing. Launched in 2017, the program is investing in three main technologies: systems that uncover and fingerprint botnets across the internet, tools that upload software to infected devices through known security gaps, and software that disables botnet malware once it’s uploaded. Packet Forensics’ technology falls under that first category, the DARPA spokesperson said.The effort is scheduled to last to four years, with the first phase running 16 months. Later phases include additional funding.
defense one, 12.09.2018
militär_us_darpa_projekt_haccs  militär_allg_infiltration_tech  itsicherheit_botnetz_c&c  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  geheimdienst_us_nsa_treasure_map  geheimdienst_us_nsa_turbulence_genie_turbine  geheimdienst_us_nsa_tao_quantum  tech_dual_use  militär_allg_kriegsführung_elektro_it_ki  unternehmen_packet_forensics  land_usa  itsicherheit_botnetz_c&c_gchq_nsa 
september 2018 by kraven
UIDAI’s Aadhaar Software Hacked, ID Database Compromised, Experts Confirm
The authenticity of the data stored in India's controversial Aadhaar identity database, which contains the biometrics and personal information of over 1 billion Indians, has been compromised by a software patch that disables critical security features of the software used to enrol new Aadhaar users, a three month-long investigation by HuffPost India reveals. The patch—freely available for as little as Rs 2,500 (around $35)— allows unauthorised persons, based anywhere in the world, to generate Aadhaar numbers at will, and is still in widespread use. This has significant implications for national security at a time when the Indian government has sought to make Aadhaar numbers the gold standard for citizen identification, and mandatory for everything from using a mobile phone to accessing a bank account. HuffPost India is in possession of the patch, and had it analysed by three internationally reputed experts, and two Indian analysts (one of whom sought anonymity as he works at a state-funded university), to find that: The patch lets a user bypass critical security features such as biometric authentication of enrolment operators to generate unauthorised Aadhaar numbers. The patch disables the enrolment software's in-built GPS security feature (used to identify the physical location of every enrolment centre), which means anyone anywhere in the world — say, Beijing, Karachi or Kabul — can use the software to enrol users. The patch reduces the sensitivity of the enrolment software's iris-recognition system, making it easier to spoof the software with a photograph of a registered operator, rather than requiring the operator to be present in person. The experts consulted by HuffPost India said that the vulnerability is intrinsic to a technology choice made at the inception of the Aadhaar programme, which means that fixing it and other future threats would require altering Aadhaar's fundamental structure. HuffPost India could not establish just how many enrolment centres used the patch, but even the UIDAI has admitted that the enrolment process has been marred by corruption. In 2017, the UIDAI said it had blacklisted 49,000 enrolment centres for various violations, and in February 2018, the UIDAI terminated all contracts with common service centres as well. Henceforth, only banks and government institutions like the postal service can enrol Aadhaar users. As a consequence, tens of thousands of young men, with rudimentary education but great familiarity with the Aadhaar system, were put out of work.
huffington post, 11.09.2018
datenbank_biometrie_in_aadhaar  land_indien  itsicherheit_by_obscurity  datenbank_population  itsicherheit_authentisierung_biometrie  biometrie_täuschung  itsicherheit_implementierung  itsicherheit_exploit_flaw  datenschutz_id_management  itsicherheit_datensicherheit  staat_outsourcing  in_uidai  in_nciipc  biometrie_erfassung  video_youtube  gesellschaft_armut  staat_politik_desinformation  staat_allg_inkompetenz 
september 2018 by kraven
Worries arise about security of new WebAuthn protocol
At the end of last month, the team of security researchers at Paragon Initiative, known for their strong background in cryptography, have taken a close look at this new protocol making its way into browsers like Chrome, Edge, and Firefox. In a security audit, researchers say they identified various issues with the algorithms used to generate the attestation keys (signatures). They point out that the W3C WebAuthn specification recommends the use of outdated algorithms such as the FIDO Alliance's Elliptic Curve (EC) Direct Anonymous Attestation (DAA), or RSASSA-PKCS1-v1_5. The Paragon team detailed a long list of issues with both algorithms in a technical report, here, but in short, they are vulnerable to quite a few known cryptographic attacks. In particular, they took an issue with the use of RSASSA-PKCS1-v1_5. But the FIDO Alliance's custom ECDAA crypto algorithm is not that safe either. "If converted into a practical exploit, the ECDAA attacks discussed in the article would allow attackers to steal the key from a [server's] TPM, which would allow attackers to effectively clone the user's hardware security token remotely," Arciszewski said. "The scenarios that follow depend on how much trust was placed into the hardware security token," he added. "At minimum, I imagine it would enable 2FA bypasses and re-enable phishing attacks. However, if companies elected to use hardware security tokens to obviate passwords, it would allow direct user impersonation by attackers." In subsequent email exchanges with the Paragon team, ZDNet understands that at the heart of the issue may be the confusing WebAuthn documentation released by the FIDO Alliance team, which, for legacy purposes, categorizes both algorithms as "required" (for RSASSA-PKCS1-v1_5) and "recommended" (two ECDAA-based algorithms). This may lead to situations where implementers may believe the two algorithms may be minimal thresholds for implementation and support only these. "There are plenty of COSE algorithms to choose from," Arciszewski said.
zdnet, 09.09.2018
internet_spezifikation_w3c_webauthn  itsicherheit_by_obscurity  itsicherheit_exploit_flaw  itsicherheit_implementierung  itsicherheit_authentisierung_2fa_u2f_fido  itsicherheit_authentisierung_id_token  internet_spezifikation_cose  internet_spezifikation_jose  krypto_algo_fido_ecdaa  krypto_algo_rsassa_pkcs1v15  unternehmen_paragonie 
september 2018 by kraven
Chaos Computer Club fordert strikt defensive Cyber-Sicherheitsstrategie
Die Bundesregierung hat heute die Gründung einer „Agentur für disruptive Innovationen in der Cybersicherheit“ verkündet. Die Ausrichtung unter der Ägide von Innen- und Verteidigungsministerium lässt große Zweifel aufkommen, ob es hier wirklich um Cybersicherheit und nicht vielmehr um die Ausweitung der Cyber-Bewaffnung geht. Der Chaos Computer Club fordert, die deutsche Cybersicherheits-Strategie strikt defensiv auszurichten. Eine sinnvolle Strategie für eine sichere digitale Welt für Bürger und Wirtschaft erfordert, unabhängige zivile Organisationen und auch das Bundesamt für Sicherheit in der Informationstechnik (BSI) zu stärken, und gerade keine weitere Militarisierung und Vergeheimdienstlichung des Themas. „Wenn die Bundeswehr und die Geheimdienste den Ton bei der Agentur angeben, wird der Schwerpunkt auf Cyber-Offensiv-Waffen liegen“, sagte CCC-Sprecher Frank Rieger. „Dies ist das falsche Signal und wird die desolate Situation in der IT-Sicherheit verschlechtern und nicht verbessern.“ Ob ein „Zurückhacken“ und offensive digitale Angriffe, zumal durch das deutsche Militär, überhaupt mit geltendem deutschen Recht und dem Völkerrecht vereinbar ist, steht ohnehin in Zweifel. Darüber kann auch die euphemistische Verbrämung des Vorhabens durch die irreführende Namensgebung der Agentur nicht hinwegtäuschen. Dass offenbar militärische, geheimdienstliche und polizeiliche Interessen weiter vermengt werden, wenn die Agentur diese aus gutem Grund rechtlich getrennten Bereiche bedient, ist nicht akzeptabel.
ccc, 29.08.2018
land_deutschland  de_ministerium_bmi  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  geheimdienst_polizei_infiltration_tech  militär_allg_infiltration_tech  sicherheitsforschung_de  staat_propaganda_itsicherheit  staat_politik_desinformation  militär_allg_kriegsführung_elektro_it_ki  de_ministerium_bmvg_adic_cyberagentur 
august 2018 by kraven
Neue Behörde: Agentur für Hackbacks und Quantenkryptographie
Die Bundesregierung will mit der Gründung einer neuen Agentur für Innovationen in der Cybersicherheit "völlig neue Wege" in der Forschungsförderung gehen. Das sagte Bundesverteidigungsministerin Ursula von der Leyen (CDU) bei der Vorstellung der neuen Behörde am Mittwoch in Berlin. Nach Darstellung von Bundesinnenminister Horst Seehofer (CSU) soll die Agentur "Schlüsseltechnologien mit hohem Innovationspotenzial fördern". Da die Förderung in einem sehr frühen Stadium erfolgen solle, sei ebenso wie bei privaten Risikokapitalgebern das Scheitern von Projekten einkalkuliert. Laut von der Leyen sollen der Agentur in den kommenden fünf Jahren 200 Millionen Euro zur Verfügung stehen. Davon sollen 80 Prozent in Förderprojekte fließen. Weitere Details sind noch offen.
golem, 29.08.2018
land_deutschland  de_ministerium_bmi  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  geheimdienst_polizei_infiltration_tech  militär_allg_infiltration_tech  sicherheitsforschung_de  staat_propaganda_itsicherheit  staat_politik_desinformation  staat_politik_wirtschaft_förderung_schutz  unternehmen_allg_start_up  militär_allg_kriegsführung_elektro_it_ki  de_ministerium_bmvg_adic_cyberagentur 
august 2018 by kraven
The Problems and Promise of WebAssembly
This blog post gives an overview of the features and attack surface of WebAssembly, as well as the vulnerabilities we found. WebAssembly binaries consist of a series of sections (binary blobs) with different lengths and types. If a section has a code that is not specified in the above table, it is called a custom section. Some browsers use custom sections to implement upcoming or experimental features. Unrecognized custom sections are skipped when loading a Module, and can be accessed as TypedArrays in JavaScript. Module loading starts off by parsing the module. This involves going through each section, verifying its format and then loading the needed information into a native structure inside the WebAssembly engine. Most of the bugs that Project Zero found in WebAssembly occured in this phase. There are two emerging features of WebAssembly that are likely to have a security impact. One is threading. Currently, WebAssembly only supports concurrency via JavaScript workers, but this is likely to change. Since JavaScript is designed assuming that this is the only concurrency model, WebAssembly threading has the potential to require a lot of code to be thread safe that did not previously need to be, and this could lead to security problems. WebAssembly GC is another potential feature of WebAssembly that could lead to security problems. Currently, some uses of WebAssembly have performance problems due to the lack of higher-level memory management in WebAssembly. If WebAssembly GC is implemented, it will increase the number of applications that WebAssembly can be used for, but it will also make it more likely that vulnerabilities related to memory management will occur in both WebAssembly engines and applications written in WebAssembly.
project zero, 16.08.2018
software_browser_allg_wasm  software_javascript  itsicherheit_exploit_flaw  itsicherheit_speicher  itsicherheit_software_browser 
august 2018 by kraven
Three more data-leaking security holes found in Intel chips as designers swap security for speed
Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory. These secrets can include passwords, personal and financial records, and encryption keys. They can be potentially lifted from other applications and other customers' virtual machines, as well as SGX enclaves, and System Management Mode (SMM) memory. SGX is Intel's technology that is supposed to protect these secrets from snooping code. SMM is your computer's hidden janitor that has total control over the hardware, and total access to its data. Across the board, Intel's desktop, workstation, and server CPUs are vulnerable. Crucially, they do not work as documented: where their technical manuals say memory can be marked off limits, it simply is not. This means malicious software on a vulnerable machine, and guest virtual machines on a cloud platform, can potentially lift sensitive data from other software and other customers' virtual machines. Here are the three cockups, which Intel has dubbed its L1 Terminal Fault (L1TF) bugs because they involve extracting secret information from the CPU level-one data cache: CVE-2018-3615: This affects Software Guard Extensions (SGX). This vulnerability was named Foreshadow by the team who uncovered it. CVE-2018-3620: This affects operating systems and SMM. CVE-2018-3646: This affects hypervisors and virtual machines. The upshot is malware or a malicious guest operating system can exploit this to ascertain data it shouldn't be able to read, by forcing pages to be marked as not present and observing what's fetched speculatively from the L1 cache before the page fault circuitry in the processor can step in and halt proceedings. This requires the exploit code to run on the same physical CPU core as the victim code, because it needs to observe the L1 data cache.
register, 14.08.2018
unternehmen_intel  itsicherheit_cpu_meltdown_spectre  itsicherheit_seitenkanal_analyse_angriff  tech_hw_chip_cpu_smm_smi  tech_hw_chip_intel_sgx  tech_virtualisierung  tech_hw_chip_cpu_cache  itsicherheit_by_obscurity  itsicherheit_malware_spyware  itsicherheit_exploit_flaw 
august 2018 by kraven
Police Bodycams Can Be Hacked to Doctor Footage
At the DefCon security conference in Las Vegas on Saturday, one researcher will present findings that many body cameras on the market today are vulnerable to remote digital attacks, including some that could result in the manipulation of footage. Josh Mitchell, a consultant at the security firm Nuix, analyzed five body camera models from five different companies: Vievu, Patrol Eyes, Fire Cam, Digital Ally, and CeeSc. The companies all market their devices to law enforcement groups around the US. Mitchell's presentation does not include market leader Axon—although the company did acquire Vievu in May. In all but the Digital Ally device, the vulnerabilities would allow an attacker to download footage off a camera, edit things out or potentially make more intricate modifications, and then re-upload it, leaving no indication of the change. Or an attacker could simply delete footage they don't want law enforcement to have.
wired, 11.08.2018
überwachung_video_mobil  itsicherheit_by_obscurity  itsicherheit_exploit_flaw  itsicherheit_datensicherheit  itsicherheit_authentisierung  itsicherheit_firmware_peripherie  itsicherheit_hardware  polizei_allg_streife_patrouille 
august 2018 by kraven
Seehofer und von der Leyen planen Cyberwaffen-Agentur
Verteidigungsministerin Ursula von der Leyen (CDU) und Innenminister Horst Seehofer (CSU) treiben die Entwicklung von staatlichen Cyberwaffen voran. Am kommenden Mittwoch soll das Bundeskabinett die Gründung einer gemeinsamen "Agentur für Innovation in der Cybersicherheit" zur Stärkung der Sicherheit nach außen und im Inneren beschließen. Was sich erst einmal harmlos anhört, markiert den Einstieg in die staatliche Forschung auf der Suche nach defensiven aber auch offensiven Cyberwaffen. Ziel der Agentur soll es sein, Forschungs- und Entwicklungsvorhaben mit hohem Innovationspotenzial auf dem Gebiet der IT-Sicherheit zu fördern und zu finanzieren, soweit an diesen ein Interesse des Bundes besteht.
spiegel, 11.08.2018
land_deutschland  de_ministerium_bmi  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  geheimdienst_polizei_infiltration_tech  militär_allg_infiltration_tech  sicherheitsforschung_de  militär_allg_kriegsführung_elektro_it_ki  de_ministerium_bmvg_adic_cyberagentur 
august 2018 by kraven
Aktivitäten der Bundeswehr im digitalen Raum und gesetzgeberische Maßnahmen der Bundesregierung
Im Kommando Cyber- und Informationsraum der Bundeswehr sind derzeit 13.989 Dienstposten eingerichtet, von denen 10.364 besetzt sind. Die teilt die Bundesregierung in ihrer Antwort (19/3420) auf eine Kleine Anfrage der Fraktion Bündnis 90/Die Grünen (19/2618) mit. Bedingt durch die Neuaufstellung des Kommandos zum 1. April 2017 befinde sich noch Personal in der Ausbildung, das auf den unbesetzten Dienstposten eingesetzt werden soll. Der Aufbau einer "Cyber-Reserve" zur bedarfsorientierten Unterstützung des aktiven Personals soll bis Ende 2019 abgeschlossen sein. Derzeit seien 635 Interessenten nach fachlichen Kriterien und Verfügbarkeit erfasst worden.
hib, 10.08.2018
land_deutschland  militär_de_bundeswehr_kdocir  itsicherheit_angriff_zuschreibung  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  militär_allg_infiltration_tech  staat_politik_geheimhaltung  unternehmen_allg_exploit_malware_dealer  militär_de_bundeswehr_kdocir_itbw_zcsbw  de_ministerium_bmvg  de_bundestag_dip  de_bundesamt_bsi  de_ministerium_bmvg_cih  unternehmen_allg_start_up  unternehmen_bwi  sicherheitsforschung_de  militär_nato_coc  staat_politik_sicherheit_rüstung_kontrolle_wettlauf  militär_allg_kriegsführung_elektro_it_ki  de_ministerium_bmvg_adic_cyberagentur 
august 2018 by kraven
Voice Authentication is Broken, Researchers Say
According to two researchers John Seymour and Azeem Aqil, both with Salesforce’s research team, voice authentication for account access is extremely insecure. At a Black Hat session Thursday, the two showed how easy it is to spoof someone’s voice well enough to access protected accounts. Voice synthesis, a technology that creates life-like synthesized voices, can be used to recreate any person’s voice. The results are astounding, thanks to artificial intelligence technology such as Google’s WaveNet and other technologies such as Adobe’s Project VoCo. “Recent advances in machine learning have shown that text-to-speech systems can generate synthetic, high-quality audio of subjects using audio recordings of their speech,” researchers said. “Current techniques for audio generation are good enough to spoof voice authentication algorithms.” The hurdle for attacks attempting to spoof a voice well enough to bypass voice authentication methods is that the sample set of voice data needs to be huge. Some systems require of up to 24 hours of high-quality voice samples before machine learning programs can process and recreate a voice. But researchers found that voice quality didn’t need to be perfect. It only needed to be good enough in order to trick a voice-protected feature, service or account. In a technique developed by Seymour and Aqil, they were able to use a tiny sample set of 10 minutes of audio in order to create a synthesized voice of a target and spoof their voice using text-to-speech. That was enough, in many cases, to fool voice authentication systems and access a protected account.
threatpost, 10.08.2018
itsicherheit_authentisierung_biometrie  biometrie_stimme  software_sprachsynthese  itsicherheit_by_obscurity  itsicherheit_exploit_flaw  tech_ki_maschinelles_lernen_deep_learning  tech_ki_sprache 
august 2018 by kraven

Copy this bookmark:





to read