Followups
- 🇪🇺 EU Copyright Directive:
- Italy Wikipedia shuts down in protest at EU copyright law — www.bbc.com/…
- Copyright Directive legislation voted down by European Parliament — nakedsecurity.sophos.com/… (This is not the end of this legislation, but it is a significant setback.)
- Spectre/Meltdown
- Another variant has been discovered, but it’s similar enough to previous ones that the existing mitigations seem to cover it — arstechnica.com/…
Security Medium — USB Protected Mode
USB Protected mode has made an appearence in a number of iOS betas, but had never made it into a final release until iOS 11.4.1 was released this week.
What this feature does is put the Lightning/USB port on iOS devices into a charge-only mode opportunistically. USB cables/ports have two distinct sets of cables/connectors, a pair for sending data, and a pair for sending power. Normally a lightning port passes both USB power and USB data. In USB restricted mode the data connectors are disabled, so it becomes as if the cable being used is a charge-only cable.
Most of the time, most users only use their lightning port to charge their devices, so Apple saw an opportunity to add some additional security without inconveniencing users. When ever it’s clear that USB data is not needed by the user, the OS has an opportunity to harden itself a little by locking the port down.
Opportunistic is the key word here — the idea is to add security only in situations where users won’t be inconvenienced. The idea is not to provide an absolute security control, but to make more users more secure more of the time than they were before. Just like a seatbelt that save many lives is a great safety feature even if it doesn’t save all lives.
How does it work? If you leave the feature enabled, then each time your iOS device locks a 1 hour timer starts to count down. If you plug a device into your lightning port that uses USB data the timer stops. If the timer makes it down to zero USB data is disabled until the next time you unlock your device.
Stopping the counter when USB data is used is vital to this feature’s un-intrusiveness. Imagine if Apple had not gone the opportunistic route and opted for an absolute security control instead — after an hour, BAM, USB is disabled. What effect would that have?
Firstly, lightning headphones would stop working after an hour — that in itself would be so catastrophic the feature could never fly!
Secondly, data transfers using the card reader adaptor would fail after an hour. Imagine not being able just leave your iPad transferring photos without having to worry about the port killing itself while in use?
This is why USB Protected mode only kicks in if the USB data pins have not been used within the first hour of the phone being locked.
USB protected mode is not purely opportunistic though — you can explicitly trigger it by enabling SOS mode (by tapping the lock button 5 times in quick succession).
So what’s this bypass the media are prattling on about? They are describing the expected and sane behaviour of this feature as a bypass, which is just nuts IMO. If you get your hands on an iOS devices that is not in USB restricted mode, and if you plug a device that uses USB data into it, then USB restricted mode will not activate. That’s not a bypass, that’s how it’s supposed to work!
What would be a bypass would be a way of disabling USB restricted mode without either unlocking the device via the password or biometrics, or factory restoring the device (which destroys all the data contained on the device). Ironically, the report from Elcomsoft that so much of the media are using as their source for claiming a bypass actually says that they were unable to get a device that is in restricted mode out of restricted mode without unlocking the phone or wiping it completely. In other words, the report used to support the bypass actually says they couldn’t find a bypass! Elcomsoft are not innocent though, their spin and headline are pure click-bait too!
Links
- Apple releases iOS 11.4.1 and blocks passcode cracking tools used by police — www.theverge.com/…
- How to use USB Restricted Mode on your iPhone or iPad — www.imore.com/…
- USB Restricted Mode FUD and how to avoid it — www.imore.com/…
- The Elcomsoft report on their experiments with USB Restricted Mode — blog.elcomsoft.com/…
Notable Security Updates
- Patch Tuesday has been and gone with the usual updates from Microsoft and Adobe — krebsonsecurity.com/…
- The Adobe patch for Flash is particularly important to get installed ASAP — nakedsecurity.sophos.com/…
- Apple Releases Wi-Fi Update for Boot Camp 6.4.0, Can Be Updated Through Windows — www.macobserver.com/…
- Apple Releases iOS 11.4.1, tvOS 11.4.1, and watchOS 4.3.2 — tidbits.com/…
Notable News
- Three packages in the Arch Linux software repository were poisoned with malware. The packages are not part of the core OS, but they are published through official Arch Linux channels. Unlike Gentoo, Arch’s response leaves a lot to be desired, the best they’ve had to offer so far is snark — nakedsecurity.sophos.com/…
- A report from the NYT details how Samba Interactive TV (a service built into TVs from many manufacturers including Sony, Sharp, Magnavox, Toshiba & Philips) uses network sniffing to track people as they move from place to place. The company say 90% of users opt in to the service which is presented as a way to get show recommendations and special offers — www.nytimes.com/…, nakedsecurity.sophos.com/… & tidbits.com/…
- Some Samsung phones have been hit by a bizarre bug that sends a users photos to seemingly random people in their contacts without permission — mashable.com/…
- Google have quietly pushed out a new security feature in Chrome that keeps tabs at different domains in separate processes to help stop data leaking between sites through vulnerabilities that can be remotely triggered like some Spectre/Meltdown variants — www.bleepingcomputer.com/…
- 🇺🇸 WIRED are reporting that the US government secretly sold boobytrapped spy phones to suspects, and they may not have had appropriate wiretapping warrants before doing so — www.wired.com/…
- A timely warning — security researchers from the University of Hertfordshire bought 100 second hand SD cards to see how many would contain sensitive personal data, the answer? Two thirds of them! — nakedsecurity.sophos.com/…
Suggested Reading
- PSAs, Tips & Advice
- Beware of a novel new use for leaked passwords — more convincing extortion scams! Extortionists are actively using username & password combinations form password breaches to add apparent legitimacy to extortion letters claiming to have webcam video of the victim watching pornography on their device. It’s a scam, don’t hand over any bitcoins! — nakedsecurity.sophos.com/…
- (iOS) Health Records: Everything you need to know! — www.imore.com/…
- Notable Breaches & Privacy Violations
- By publishing too much info without enough anonymization the Polar fitness tracking app made it possible for reporters to de-anonymize the data and find the real names of people who’s real names really shouldn’t be findable including military personnel — nakedsecurity.sophos.com/…
- Typeform data breach hits thousands of survey accounts — nakedsecurity.sophos.com/…
- Timehop Breach Exposes Millions of Phone Numbers — www.macobserver.com/…
- Marketing Firm Exactis Leaked a Personal Info Database with 340M Records — www.wired.com/…
- Megan Morrone interviews Troia on Tech News Weekly (at 41:02) twit.tv/…
- Thousands of iOS and Android apps are leaking your data through their Firebase backend — www.imore.com/…
- Second former Equifax staffer charged with insider trading — nakedsecurity.sophos.com/…
- ExxonMobil bungles the launch of their latest rewards program and accidentally directs customers to a page pushing crapware and premium rate phone numbers — krebsonsecurity.com/…
- News
- Facebook gave certain companies special access to customer data — nakedsecurity.sophos.com/…
- 🇩🇪 Facebook ordered to let grieving mother in to dead daughter’s account — nakedsecurity.sophos.com/…
- 🇺🇸 Apple and Google questioned by Congress over user tracking — nakedsecurity.sophos.com/…
- Security researchers have released a tool for scrubbing the invisible metadata many printers add into the documents they print. This could be a big help for whistleblowers — nakedsecurity.sophos.com/…
- Default router password leads to spilled military secrets — nakedsecurity.sophos.com/…
- Opinion & Analysis
- Social media apps are ‘deliberately’ addictive to users — www.bbc.com/…
- The WSJ highlight some of the ways many developers abuse the access users give them to their email accounts — www.wsj.com/…
- Why the airplane romance that went viral should worry everyone — nakedsecurity.sophos.com/…
Very interesting
Thanks for the information. I think I understand everything.
This plate forum is a helpful overview of the particular topic and very actionable. Interesting approach!