Computer security, Internet privacy: What should we worry about? Sebastian Lopienski CERN Deputy Computer Security Officer Polish Teachers Programme, October 2014 Disclaimer What follows are my opinions and not necessarily those of CERN. Sebastian Lopienski 2 A cloud hack Digital life of a “Wired” journalist destroyed in one hour: (http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking) – Amazon, Apple, Google, Twitter accounts compromised – all Apple devices wiped-out remotely Sebastian Lopienski 3 A cloud hack How?? – call Amazon and add a new credit card • needed: name, billing address, e-mail address – call again, say you lost password, and add a new e-mail • needed: name, billing address, current credit card – reset password - get the new one to this new e-mail address – login and see all registered credit cards (last 4 digits) – call Apple, say you lost password, and get a temp one • needed: name, billing address, last 4 digits of a credit card – reset Google password - new one sent to Apple e-mail • (Apple e-mail was registered as an alternate e-mail) – reset Twitter password - new one sent to Google e-mail • (Google e-mail was linked to the Twitter account) Sebastian Lopienski 4 A cloud hack Multiple security flaws and issues: • Interconnected accounts – Which one of your accounts is the weakest link? • Our full dependence on digital – digital information, devices, cloud services etc… • Very weak identity check procedures – – – – … and often not even followed correctly some procedures have changed as an outcome of this case enable 2-step authentication (Google, LinkedIn, Apple, …) “security“ questions with answers often trivial to find (remember Sarah Palin’s yahoo account hack in 2008?) 5 Sebastian Lopienski From http://www.bizarrocomics.com Sebastian Lopienski 6 E-mail account before e-bank account? From http://elie.im/blog/security/45-of-the-users-found-their-email-accounts-more-valuable-than-their-bank-accounts Sebastian Lopienski 7 Passwords lost, or easy to guess… – – – – – – – – – – password welcome qwerty monkey jesus love money freedom ninja writer Sebastian Lopienski From http://www.zdnet.com/the-top-10-passwords-fromthe-yahoo-hack-is-yours-one-of-them-7000000815/ • Top 10 words used in passwords 8 Outline • Where we are? • Who are they? • What is ahead? Sebastian Lopienski 9 Vulnerabilities Sebastian Lopienski 10 Trying to sell a Yahoo XSS for 700$ Sebastian Lopienski 11 Selling a Command Execution vulnerability in MS Office for $20k Sebastian Lopienski 12 Vulnerability market shift • Finding vulnerabilities – difficult, time consuming • Selling to vendors, or publishing (mid 2000s) – limited money - 1s-10s thousands$, e.g. Mozilla up to $3000, Google up to $3133.7 – vulnerabilities eventually patched (good!) • Selling to underground (late 2000s) – – – – busy and active “black market” more profitable – 10s-100s thousands of USD sometimes buyers are governments or their contractors used in 0-day exploits (no patch) Sebastian Lopienski 13 Botnets From http://www.f-secure.com/weblog/archives/00002430.html (networks of infected machines) Sebastian Lopienski 14 Outline • Where we are? • Who are they? • What is ahead? Sebastian Lopienski 15 Who are they? criminals hacktivists governments motivation: motivation: motivation: profit ideology, revenge control, politics Sebastian Lopienski 16 Criminals Usual stuff: • Identity theft • Credit-card frauds • Malware targeting e-banking, e.g. Zeus, Gozi etc. • Scareware, e.g. fake AV, fake police warnings • Ransomware: taking your data hostage (soon: accounts?) • Mobile malware, e.g. sending premium rate SMSes • Denial of Service (DoS) • Spam • etc. Sebastian Lopienski 17 From symantec.com 2-in-1: Scare and demand ransom Sebastian Lopienski From http://www.zdnet.com/sopa-reincarnates-to-hold-your-computer-hostage-7000005684 18 From http://www.bangkokpost.com Cyber criminals Thai police have arrested Algerian national Hamza Bendelladj – wanted by the FBI for allegedly operating the Zeus botnet (e-banking malware) Sebastian Lopienski 19 From krebsonsecurity.com Gangsters… A hacker nicknamed “vorVzakone”, allegedly related to Gozi malware Sebastian Lopienski 20 From krebsonsecurity.com … employing “mules” “Become a foreign agent in the US” advertisement Sebastian Lopienski 21 Hacktivists Attacking to protest, to pass the message etc. Sebastian Lopienski 22 The Anonymous, LulzSec, … … many groups, varying agendas, from ideologists to criminals Sebastian Lopienski 23 Do you know this guy? Sebastian Lopienski 24 Aaron Swartz A software developer, an open-access activist – 2001 (aged just 14!): helped developing RSS – 2002: working with Tim Berners-Lee on semantic web – 2008: released 20% of the Public Access to Court Electronic Records (PACER) database of United States federal court – 2011: arrested for retrieving scientific articles from JSTOR, believed in open access to results of publicly-funded research, risked 35 years of prison / $1m fine sentence – 2012: campaigned against the SOPA – 2013: committed suicide (because of the ongoing criminal investigation?) Sebastian Lopienski 25 Google – a freedom activist? Sebastian Lopienski https://www.google.com/takeaction/ 26 …but governments? Sebastian Lopienski 27 Spying on (some) citizens • Israel demands e-mail passwords at borders • German police infects criminals’ PCs with Trojans/backdoors – buying surveillance code and services for 2M EURO (!) – or developing in-house – unfortunately, full of security holes Sebastian Lopienski 28 From http://www.f-secure.com/weblog/archives/00002423.html Network encryption? Infect computers or go after services • Syrian activists’ PCs infected with Trojans/backdoors • Tibetan rights activists often targeted PRISM mass online surveillance program Sebastian Lopienski 29 Privacy vs. control “If you are doing nothing wrong, then you shouldn’t worry if we watch you.” “If I am doing nothing wrong, then you shouldn’t be watching me!” Cryptography/encryption (HTTPS) is still a good defense Sebastian Lopienski 30 From F-Secure Agencies & contractors turning offensive Sebastian Lopienski 31 Agencies & contractors turning offensive From http://www.f-secure.com/weblog/archives/00002372.html • Northrop Grumman looks for "Cyber Software Engineer" for “an Offensive Cyberspace Operation mission" Sebastian Lopienski 32 Stuxnet (the worm that targeted Iranian uranium-enriching centrifuges, discovered 2010) Estimated development effort: 10 man-years Result: sabotage 30,000 Iranian computers infected, some HW damage, nuclear program set back by ~2 years Cui bono? (New York Times, June 2012: a joint US-Israel operation “Olympic Games” started by Bush and accelerated by Obama) Sebastian Lopienski 33 Outline • Where we are? • Who are they? • What is ahead? Sebastian Lopienski 34 Does Stuxnet make us all more vulnerable? 35 Sebastian Lopienski http://www.nytimes.com/roomfordebate/2012/06/04/do-cyberattacks-on-iran-make-us-vulnerable-12 Thank you Sebastian Lopienski 36