Security Medium 1 — SimJacker
A remotely exploitable vulnerability has been found in the firmware running on billions of SIM cards around the world. The vulnerability can be triggered by sending a malicious SMS message to the phone number served by the victim SIM card. Once the SIM card is infected it can then reach into the cellphone it is inserted into and exfiltrate sensitive data. The user won’t even see the SMS message that infected their SIM card because it’s a special type of SMS message used for network management and similar tasks by carriers.
There is nothing end users can do to protect themselves, or, as far as I can tell, to even detect that their SIM card is infected. Thinking about it, getting firmware updates to all SIM cards in the world seems an impossible task, so my first fear was that there would be nothing that can be done to protect the billions of us around the world who use GSM-based cellphone networks.
Thankfully, while end-users are powerless to protect themselves, there is someone who can protect us all — our carriers. The special SMS messages the attack relies on should only ever be used by carriers to manage their own network, so so such SMS messages should ever enter the network from outside. In fact, the carrier should know exactly which sources are valid for these messages since they should be the only source for them. This means that all that’s needed is some firewall config. Can we trust our carriers to actually follow through on this? I guess we’ll have to wait and see.
Links
- Simjacker silent phone hack could affect a billion users — nakedsecurity.sophos.com/…
- SimJacker is a Newly-Discovered SIM Card Vulnerability — www.macobserver.com/…
Security Medium 2 — iOS 13, Bluetooth Permission & Surreptitious Location Data Gathering
Apple have added a number of new privacy features into iOS 13, and one of them might seem a little strange at first glance, but it’s actually very sensible, and is having an immediate impact. Starting in iOS 13, apps will need your permission to make use of bluetooth.
What has that got to do with privacy? It’s not something that’s been high on our collective radars, but apps have been using bluetooth devices installed at known locations to track users, even when they have location services disabled.
So-called beacons are a good example of bluetooth being used to detect a person’s location. Just like with traditional location services, beacons are not inherently malicious, but they can be abused. Traditional location services based on cell towers, wifi signals, and GPS work well when you’re outside, and when you don’t need to know your position down to the nearest few feet, but, they’re useless in many indoor situations, especially when a price location is needed. Beacons were invented to solve this problem.
If you’re wondering what beacons were intended to be used for, it’s things like venue apps that can accurately guide you to the important indoor landmarks like specific rooms or perhaps the nearest bathroom. You can be guided towards the correct route to your seat in large stadiums, to the correct shop in large malls, or told about the specific exhibits you’re standing in front in a museum. Entering greyer areas they can be used within stores to guide you towards specific products you like, or to particularly good deals. They can of course also be used to track how long you spend in each isle, hence figuring out the kinds of things that interest you most.
In all these examples the user is interacting with an app that is explicitly providing them with location-based functionality. Where things go down-hill fast is when apps use bluetooth to infer your location behind your back without showing you what they are doing, let alone getting your permission. As users have become more and more hesitant about granting access to location information, seedy developers have started to rely on ever more indirect methods of inferring your location, including bluetooth.
The only way to stamp out abuses of a useful feature without killing the legitimate uses is to make it impossible to use the feature behind users backs, hence Apple’s move to make apps ask for permission before they can use bluetooth.
The bluetooth prompts aren’t the only location-related privacy changes iOS 13 brings. Apple are also introducing new notifications that will let you know how often and when apps that you grant location data access to make use of that access.
These privacy improvements are highlighting all sorts of shady practices, and frightening companies like Facebook into pre-emptively attempting to explain what their apps do before users get to see for themselves, and presumably revolt.
IMO Facebook deserve some extra criticism because not only were they using Bluetooth without telling users, their blog post ‘explaining’ their actions make it clear that even when you explicitly deny them location data they will still try to infer your location from information you can’t easily hide like you IP address. I can’t think of any way of describing doing the exact opposite of what the user explicitly told you to do is anything but user-hostile, and frankly obnoxious. I’m definitely more sure than ever that I made the right decision when I deleted my Facebook account about a decade ago.
Bottom line — unless an app has a clear need for bluetooth access, say no, it’s probably an attempt to track your physical location 🙁
Links
- Facebook’s blog post: Understanding Updates to Your Device’s Location Settings — newsroom.fb.com/…
- Facebook tries to preemptively defend its location tracking ahead of iOS 13 — www.imore.com/…
- Facebook says location data in iOS 13, Android 10 may be confusing — nakedsecurity.sophos.com/…
- Facebook: Remember how we promised we weren’t tracking your location? Psych! Can’t believe you fell for that — www.theregister.co.uk/…
- The new iPhone software update is already catching apps like Facebook being shady — www.businessinsider.com/…
- Here’s why so many apps are asking to use Bluetooth on iOS 13 — www.theverge.com/…
Security Medium 3 — DoH Rolls Out to Major Browsers
In a recent CCATP Lite I chatted with Allison about DNS over HTTPS, explaining the problems it solves, what it does, and how it does it. I ended by saying that DoH was ready for the vanguard of geekitude (nerds like us) to start experimenting with, that it was not quite ready for prime-time yet, but that it would be soon. Well, it turns out that ‘soon’ was much sooner than I imagined!
As we discussed on CCATP, FireFox has DoH support and it can be enabled in the browsers settings. By default it will use Cloudflare’s 1.1.1.1 DNS resolvers. Starting in late September FireFox will start automatically enabling DoH for desktop FireFox users in the US. The roll out will be slow, and Mozilla will keep a close eye on how it goes. If things go well they’ll them push DoH by default to all users.
Note that because of how iOS works, FireFox on iOS won’t be getting DoH via Mozilla. Apple will need to add DoH support to WebKit for that to be possible.
Google are a little behind FireFox, but not by much. Starting with Chrome 78 (due on October 22nd), Chrome on Windows, Mac & Android will start to automatically upgrade users to DoH if their currently configured DNS provider supports DoH. In other words, they won’t change your DNS provider, instead, they’ll upgrade to using encrypted communications with that same server.
There has been some criticism of browsers moving to DoH by default, (much of it ill-informed and utterly OTT IMO). Because Mozilla will be defaulting users to Cloudflare’s DNS resolves they are coming in for the strongest criticism.
While I think its reasonable to gripe with defaulting people to a given provider rather than pro-actively offering them a choice, the other common criticism I’ve heard is factually wrong. It has been widely asserted that DoH will ‘break’ people’s networks. This is hogwash! However, it’s hogwash based on a kernel of truth, so it warrants deeper examination.
It’s very common, especially in managed corporate environments, for the DNS resolvers computers are configured to use to have a so-called split horizon. This means that the resolvers host a bunch of private DNS records that don’t exist on the public internet, as well as resolving public DNS records. Without DoH browsers use the computer’s DNS services to do name lookups, so they will see the private records when there is a split horizon. If a browser starts to use DoH to a resolver that only resolvers public IPs (like the one from Cloudflare FireFox will use) for everything, then private sites will stop working in that browser. That could cause chaos within a corporate environment.
So, it is true that if FireFox were to simply enable DoH for all DNS queries in all situations they would break things, but that’s not what they’re doing! Firstly, they’re automatically detecting a number of common scenarios in which automatic DoH would not be desirable (including managed corporate environments and parental control software that filters DNS queries), and not automatically enabling DoH in those situations. Secondly, they are implementing OS-fallback, so if an address fails to resolve over DoH they’ll ask the OS for the same DNS query, just like they did before DoH. This means you get the security of DoH when ever possible, while retaining all the functionality you had before, including support for split horizons.
Bottom line, if you want DoH you’ll soon be able to pro-actively enable it on both FireFox and Chrome, and if you do nothing, you may well get some added security for free, and it’s extremely unlikely to cause you any problems what so ever. So basically, win-win as far as I’m concerned!
Links
- Mozilla increases browser privacy with encrypted DNS — nakedsecurity.sophos.com/…
- Google experiments with DNS-over-HTTPS in Chrome — nakedsecurity.sophos.com/…
- Firefox and Chrome rolling out DNS over HTTPS (DoH) feature — www.intego.com/…
Notable Security Updates
- Patch Tuesday, September 2019 Edition — krebsonsecurity.com/… & September 2019’s Patch Tuesday: 2 zero-days, 17 critical bugs — nakedsecurity.sophos.com/…
- Telegram fixes ‘unsend message’ bug that held on to your pictures — nakedsecurity.sophos.com/…
- Google fixes Chromebook 2FA flaw in ‘built-in security key’ — nakedsecurity.sophos.com/…
- LastPass 4.33.0 Fixes Bug That Leaked User Data — www.macobserver.com/…
Notable News
- 🧯 A partial lock screen bypass has been found in iOS 13. Someone with physical access to a locked iPhone can use the technique to access the full address book (but nothing more). As well as being limited in scope, the bypass is also cumbersome to execute – nakedsecurity.sophos.com/… & www.imore.com/…
- ⚠️ An as-yet-unpatched zero-day cross-site-request-forgery (CSRF) vulnerability in the very popular PHPMyAdmin MySQL/MariaDB web UI has been disclosed. The security researcher informed the project about the (sophomoric and trivially fixable) bug 3 months ago, but they failed to act, so he went public despite there being no patch yet. Thankfully we can protect ourselves from CSRF bugs quite trivially – only use PHPMyAdmin in a private tab (CSRF attacks require the victim to open a page controlled by the attacker in the same browser session they are logged into the target site in) — nakedsecurity.sophos.com/…
- A court in Denmark has suspended the use of cellphone location data in court. The reasoning is simple — the data is not accurate enough to reliably convict people! This judgement only applies in Denmark, but it highlights a fundamental flaw in the widespread practice of using cellphone data in court – the systems collecting the data were designed to aid cellphone network operations, not to act as evidence in courts! — nakedsecurity.sophos.com/…
- Spotify now requiring its Premium Family Plan customers to share their location data — www.imore.com/…
- Chrome bumps ineffective EV certificates off the omnibar — nakedsecurity.sophos.com/…
- Mozilla have released a free beta of FireFox Private Network, a new VPN-like tool which will route all network requests made by their browser through CloudFlare via an encrypted connection. The beta is only available through the desktop version of the browser to US users who are logged into FireFox using a FireFox sync account:
- The FireFox Private Network home page — private-network.firefox.com/…
- Mozilla Private Network VPN gives Firefox another privacy boost — nakedsecurity.sophos.com/…
Suggested Reading
- Notable Breaches & Privacy Violations
- ⭐️ Research by ProPublica finds that the medical industry as a whole is doing a terrible job securing sensitive patient information. Patient records and medical images for 737 millions of people in 52 countries can be easily accessed from the internet due to poor or absent security — www.propublica.org/… & nakedsecurity.sophos.com/…
- 🇪🇨 Leaky database spills data on 20 million Ecuadorians and businesses — nakedsecurity.sophos.com/…
- News
- ⭐️ Apple adds some more detail and nuance to their updated rules for advertising and tracking in kids apps and Sign in with Apple. The changes don’t alter the big-picture, but they do carve out some necessary exceptions to make the rules workable — www.imore.com/… & www.macobserver.com/…
- Wikipedia fights off huge DDoS attack — nakedsecurity.sophos.com/…
- 🇺🇸 Google faces a new antitrust probe by 50 attorneys general — www.cnbc.com/…
- 🇺🇸 An important court case to keep an eye on: Google & Apple pushed to reveal gun scope app users’ names to feds — nakedsecurity.sophos.com/…
- Report: Use of AI surveillance is growing around the world — nakedsecurity.sophos.com/…
- 🇺🇸 Air Force to offer up a satellite to hackers at Defcon 2020 — nakedsecurity.sophos.com/…
- 🇺🇸 Congress wants Facebook, Google, Apple, and Amazon emails as probe heats up — arstechnica.com
- Facebook News
- WhatsApp ‘Delete for Everyone’ Doesn’t Delete Media Files Sent to iPhone Users — thehackernews.com/…
- Facebook has a gaping loophole in its fight against fake news — mashable.com/…
- Facebook launches $10m deepfake detection project — nakedsecurity.sophos.com/…
- Facebook Libra rejected by France as “dangerous” — nakedsecurity.sophos.com/…
- New clues show how Russia’s grid hackers aimed for physical destruction — arstechnica.com
- 🇺🇸 US Treasury targets North Korean hacking groups — nakedsecurity.sophos.com/…
- 🇺🇸 NSA Publishes Threatening Letter Calling for Encryption Backdoors — www.macobserver.com/…
- 🇺🇸 California lawmaker trying to weaken privacy law is married to Ring executive – POLITICO — www.politico.com/…
- Opinion & Analysis
- ⭐️ A look at an interesting new push to make micropayments and reality, and hopefully provide a true alternative to privacy-destroying ads in the process: Is $100 million enough to save the web from ads? — nakedsecurity.sophos.com/…
- Common storage and router devices are still hopelessly broken — nakedsecurity.sophos.com/…
- WannaCry – the worm that just won’t die — nakedsecurity.sophos.com/…
- Propellor Beanie Territory
Note: When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.