Language Selection

English French German Italian Portuguese Spanish

Hackers Demonstrate Their Skills in Vegas

Filed under
Misc

Even the ATM machines were suspect at this year's Defcon conference, where hackers play intrusion games at the bleeding edge of computer security.

With some of the world's best digital break-in artists pecking away at their laptops, sending e-mails or answering cell phones could also be risky.

Defcon is a no-man's land where customary adversaries - feds vs. digital mavericks - are supposed to share ideas about making the Internet a safer place. But it's really a showcase for flexing hacker muscle.

This year's hot topics included a demonstration of just how easy it may be to attack supposedly foolproof biometric safeguards, which determine a person's identity by scanning such things as thumb prints, irises and voice patterns.

Banks, supermarkets and even some airports have begun to rely on such systems, but a security analyst who goes by the name Zamboni challenged hackers to bypass biometrics by attacking their backend systems networks. "Attack it like you would Microsoft or Linux he advised.

Radio frequency identification tags that send wireless signals and that are used to track a growing list of items including retail merchandise, animals and U.S. military shipments_ also came under scrutiny.

A group of twentysomethings from Southern California climbed onto the hotel roof to show that RFID tags could be read from as far as 69 feet. That's important because the tags have been proposed for such things as U.S. passports, and critics have raised fears that kidnappers could use RFID readers to pick traveling U.S. citizens out of a crowd.

RFID companies had said the signals didn't reach more than 20 feet, said John Hering, one of the founders of Flexilis, the company that conducted the experiment.

"Our goal is to raise awareness," said Hering, 22. "Our hope is to spawn other research so that people will move to secure this technology before it becomes a problem."

Erik Michielsen, an analyst at ABI Research, chuckled when he heard the Flexilis claims. "These are great questions that need to be raised," he said, but RFID technology varies with the application, many of which are encrypted. Encryption technology uses an algorithm to scramble data to make it unreadable to everyone except the recipient.

Also on hand at the conference was Robert Morris Sr., former chief scientist for the National Security Agency, to lecture on the vulnerabilities of bank ATMs, which he predicted would become the next "pot of gold" for hackers.

The Internet has become "crime ridden slums," said Phil Zimmermann, a well-known cryptographer who spoke at the conference. Hackers and the computer security experts who make a living on tripping up systems say security would be better if people were less lazy.

To make their point, they pilfered Internet passwords from convention attendees.

Anyone naive enough to access the Internet through the hotel's unsecured wireless system could see their name and part of their passwords scrolling across a huge public screen.

It was dubbed the "The Wall of Sheep."

Among the exposed sheep were an engineer from Cisco Systems Inc., multiple employees from Apple Computer Inc. and a Harvard professor.

An annual highlight of the conference is the "Meet the Feds" panel, which this year included representatives from the FBI, NSA, and the Treasury and Defense departments. Morris and other panel members said they would love to hire the "best and brightest" hackers but cautioned that the offer wouldn't be extended to lawbreakers.

During the session, Agent Jim Christy of the Defense Department's Cyber Crime Center asked the audience to stand.

"If you've never broken the law, sit down," he said. Many sat down immediately - but a large number appeared to hesitate before everyone eventually took their seats.

OK, now we can turn off the cameras, Christy joked.

Some federal agents were indeed taking careful notes, though, when researcher Michael Lynn set the tone for the conference by publicizing earlier in the week a vulnerability in Cisco routers that he said could allow hackers to virtually shut down the Internet.

Lynn and other researchers at Internet Security Systems had discovered a way of exploiting a Cisco software vulnerability in order to seize control of a router. That flaw was patched in April, but Lynn showed that Cisco hadn't quite finished the repair job - that the same technique could be used to exploit other vulnerabilities in Cisco routers.

Cisco and ISS went to court to try to stop Lynn from going public, but Lynn quit ISS and spoke anyway. In the wake of his decision, Lynn has become the subject of an FBI probe, said his attorney Jennifer Granick.

Many at the conference praised Lynn.

"We're never going to secure the Net if we don't air and criticize vulnerabilities," said David Cowan, a managing partner at venture capital firm Bessemer Venture Partners.

And the vulnerabilities are plenty.

During his session on ATM machines, Morris said thieves have been able to dupe people out of their bank cards and passwords by changing the software in old ATM machines bought off eBay for as little as $1,000 and placing the machines out in public venues.

Associated Press

More in Tux Machines

AndEX Puts Android Marshmallow 6.0.1 64-Bit on Your PC with GAPPS and Netflix

GNU/Linux developer Arne Exton has released a new build of his Android-x86 fork AndEX that leverages Google's Android Marshmallow 6.0.1 mobile operating system for 64-bit PCs with various updates and improvements. Read more

today's leftovers

  • Future Proof Your SysAdmin Career: Advancing with Open Source
    For today’s system administrators, the future holds tremendous promise. In this ebook, we have covered many technical skills that can be big differentiators for sysadmins looking to advance their careers. But, increasingly, open source skillsets can also open new doors. A decade ago, Red Hat CEO Jim Whitehurst predicted that open source tools and platforms would become pervasive in IT. Today, that prediction has come true, with profound implications for the employment market. Participating in open source projects -- through developing code, submitting a bug report, or contributing to documentation -- is an important way to demonstrate open source skills to hiring managers.
  • FreeType Improvements For The Adobe Engine
    With FreeType 2.8.1 having been released last week, a lot of new code landed in the early hours of today to its Git repository. The code landed includes the work done this summer by Ewald Hew for Google Summer of Code (GSoC 17) adding support for Type 1 fonts to the Adobe CFF engine. Type 1 is an older, less maintained font format.
  • Are You Fond Of HDR Photography? Try Luminance HDR Application In Ubuntu/Linux Mint
    Luminance HDR is an graphical user interface that is used for manipulation and creation of High Dynamic Range(HDR) images. It is based on Qt5 toolkit, it is cross-platform available for Linux, Windows and Mac, and released under the GNU GPL license. It provides a complete workflow for High Dynamic Range(HDR) as well as Low Dynamic Range (LDR) file formats. Prerequisite of HDR photography are several narrow-range digital images with different exposures. Luminance HDR combines these images and calculates a high-contrast image. In order to view this image on a regular computer monitor, Luminance HDR can convert it into a displayable LDR image format using a variety of methods, such as tone mapping.
  • Opera Web Browser Now Has Built-in WhatsApp and FB Messenger, Install in Ubuntu/Linux Mint
  • Enterprise open source comes of age
    In the age of digitalisation and data centre modernisation, open source has come of age. This is demonstrated by the growth that enterprise open source software provider SUSE has enjoyed over the last months. “SUSE is in good shape,” says Nils Brauckmann, CEO of SUSE. “In the last year, revenue grew at 21%, and it was profitable growth.” Business is positive going forward, he adds, with SUSE now part of the larger mothership Micro Focus group following the completion this month of the HPE Software spin merger. “Micro focus is now the seventh-largest pure-play software vendor in the world, with revenues approaching $4,5-billion,” Brauckmann points out.
  • Red Hat, Microsoft Extend Alliance to SQL Server
  • UbuCon Europe 2017
    I’ve been to many Ubuntu related events before, but what surprises me every time about UbuCons is the outstanding work by the community organising these events. Earlier this month, I was in Paris for UbuCon Europe 2017. I had quite high expectations about the event/location and the talks, especially because the French Ubuntu community is known for hosting awesome events several times a year like Ubuntu Party and Ubuntu install parties.
  •  

today's howtos

Korora 26

  • Korora 26 is Here!
  • Linux Releases: “Lightweight” Tiny Core 8.2 And “Heavyweight” Korora 26 Distros Are Here
    Korora Linux distro is a derivative of popular Fedora operating system. It ships with lots of additional packages that are provided by Fedora community and helps the users to get a complete out-of-the-box experience. The developers of Korora Linux distro have just shipped Korora 26 “Bloat.” Bloat codename has been derived from the characters of the movie “Finding Nemo.”
  • Based on Fedora 26, Korora 26 Linux Debuts with GNOME 3.24, Drops 32-Bit Support
    Korora developer Jim Dean announced the release and general availability of the Korora Linux 26 operating system for personal computers, a release based on the latest Fedora Linux version and packed full of goodies. Dubbed "Bloat," Korora Linux 26 comes more than nine months after the release of Korora 25, it's based on Red Hat's Fedora 26 Linux operating system and ships with the latest versions of popular desktop environments, including GNOME 3.24. Also included are the KDE Plasma 5.10, Xfce 4.12, Cinnamon 3.4, and MATE 1.18 desktop environments, all of them shipping pre-loaded with a brand-new backup tool designed to keep your most important files safe and secure from hackers or government agencies.