Feedback & Followups
- Apple have decided to end their case against the NSO Group (authors of the infamous Pegasus spyware) because disclosure could do more harm to users than letting the NSO group off the hook — appleinsider.com/…
- 🇺🇸 23andMe to pay $30 million in genetics data breach settlement — www.bleepingcomputer.com/… (Class action suit)
- Reminder, Apple’s promised changes to make iPhones easier to repair without triggering a boom in the market for stolen iPhone parts is happening: Stolen iPhones Will Be Even More Useless From iOS 18 Onwards — www.macobserver.com/…
Deep Dive — The Emerging Dark Side of PWAs
We’ve not discussed Progressive Web Apps, or PWAs in any kind of detail in this segment before because they’ve been quite niche and not had much of an impact on the security of regular users. That’s changing now, and not in a good way 🙁
While Allison was in Africa I mentioned a story about a malicious ad campaign on major sites targeting customers of major banks with fake requests to update their banking app with the advice never to believe any kind of call to action from your bank from an ad — if your bank really needed you to do something to protect your account their chosen method of communication would not be an ad!
I said to put a mental pin in that story and promised a deep dive when Allison was back, and here we are!
The ‘apps’ those malicious ads were pushing were not full on apps from some kind of App Store, nor were they links to some kind of side-loading request, they were links to Progressive Web Apps.
What are PWAs?
As their name may suggest PWAs are web apps with some extra powers.
At a technological level, they are just regular web apps written in HTML, CSS & JavaScript that run online like any other web app, but they have an extra metadata file with instructions for how their code and resources can be caches on-device so they can be ‘installed’ on a device for use both on and offline. When they get installed their JavaScript gets access to extra APIs that allow them to save data locally and request access to resources on the device like the camera and microphone.
From a user’s point of view, they are using some kind of app on a website, and they get the option to save the app to their ‘home Screen’ and when they do they get an icon that looks just like a real app. When they click on that icon they get the same app they had been using on a web page, but now full screen without any browser bits around it, and, they can use the app even when off-line. They can also approve camera and microphone access, and those permissions stick, just like on a regular app.
This can be really convenient for users. They get their favourite web app as something that behaves like a real app, and it just works!
From a developer point of view, it offers an interesting middle ground between an app that is trapped in the browser and only works online, and a full-blown App Store app with review and all that setup. They can only write in HTML, CSS & Javascript, they can’t use C++, Objective-C, Swift, Java, or and other ‘real’ programming languages. They also can’t use the vast vast vast majority of Android, iOS, Windows, macOS, or Linux APIs, but they can get some of that functionality through generic PWA APIs with cross-platform support. But, the biggest appeal is the freedom from the onerous task of registering as a developer (I’ve been through it, the proof of identity for yourself and your company is no joke, and there are fees), and, there is no app review between you and your users!
Where’s the Danger?
At a purely technical level, there is no vulnerability — all the OSes do a good job sandboxing PWAs, and Apple & Google enforce all their normal permissions dialogues on PWAs.
The problem lies with the squishy organic bit. Today, regular folk do not understand what a PWA is, and that leaves them exposed to social engineering attacks like those malicious ads mentioned at the start of this segment.
Users know app stores vet apps, they keep reading news stories about those evil anti-competitive gate keepers locking developers of innocent games like Fortnight out of their stores, so, they give things that look like apps more trust than they warrant.
What a victim who falls for one of these malicious ads sees is an app on their Home Screen with their bank’s logo that looks identical to their old app that the ad told them was out of date. When that app presents them with a familiar login screen, they don’t think twice!
Worse still, once a PWA is installed, there’s no easy way for helpful family members to recognise the app for what it is — a website in disguise, and, there’s no quick and easy way to see that disguised website’s evil URL, so my standard ‘look up’ advice does not work.
Best Advice?
There is no easy answer, but I am warning non-techie family members not to follow any ad anywhere ever, and not to let any website add itself to their Home Screen without checking with me first.
Links
❗ Action Alerts
- Patch Tuesday has been and gone yet again with 79 vulnerabilities patched, 7 of them critical, and 4 under active attack — isc.sans.edu/…
- Microsoft fixes Windows Smart App Control zero-day exploited since 2018 — www.bleepingcomputer.com/… (lets attackers bypass the protections that should make users accept a warning before an executable downloaded from the web can run)
- Bug Left Some Windows PCs Dangerously Unpatched — krebsonsecurity.com/… (a bug in some version checking code left some devices falsely thinking they were fully patched when they weren’t)
- Related: Microsoft to start force-upgrading Windows 22H2 systems next month — www.bleepingcomputer.com/…
- Adobe fixes Acrobat Reader zero-day with public PoC exploit — www.bleepingcomputer.com/…
- Google have released their September Android security updates, fixing 34 vulnerabilities including one under active exploitation, if you can, patch ASAP — www.bleepingcomputer.com/…
- Reminder — restart all browsers not managed by OS updates daily so they get vital fixes: Google tags a tenth Chrome zero-day as exploited this year — www.bleepingcomputer.com/…
- If you use the open-source multi-protocol messaging app Pidgin you need to read this: Malware infiltrates Pidgin messenger’s official plugin repository — www.bleepingcomputer.com/…
- If you use an obsolete D-Link DIR-846W router it’s got a critical vulnerability that is under active attack, and it won’t get the patch, so get it offline ASAP — www.bleepingcomputer.com/…
- Related — attacks on these kinds of known-vulnerable obsolete devices are common-place now: Quad7 Botnet Expands to Target SOHO Routers and VPN Appliances — thehackernews.com/…
Worthy Warnings
- Be aware that sextortion scammers have adopted two new techniques in recent weeks — these emails remain scams based on false claims!
- In addition to using leaked passwords to make their bogus claims more legit, attackers are now also using leaked physical addresses along with publicly available mapping imagery to add a photo of your actual home/front yard to their emails — krebsonsecurity.com/…
- Attackers are now using leaked data to include actual names in false claims that a victim’s spouse is cheating on them — www.bleepingcomputer.com/… (Due to typos in some of the names observed in the campaign, there is a strong suspicion the source of the data is the wedding planning site The Knot)
- Beware! Attackers have found another way to attack the open source community: GitHub comments abused to push password stealing malware masked as fixes — www.bleepingcomputer.com/… (TL;DR — don’t run any commands you don’t understand, even if they come from a comment on the GitHub project for the software/code library you’re currently struggling with)
Notable News
- It seems that, at least on Android (we don’t know if there’s any effect on Windows), ad company Cox Media Group who work with big companies like Facebook had a product that injected audio bugs (eavesdropping code) into ads — appleinsider.com/…
- The feature was branded Active Listening and advertised in a PowerPoint deck for potential customers under the heading “The power of voice (and our devices’ microphones)”
- The bullets under that heading went on to promise “Smart devices capture real-time intent data by listening to our conversations” … “advertisers can pair this voice-data with behavioural data to target in-market customers” 😱
- These kinds of things are not possible on iOS or macOS due to how camera and microphone access is gated by permission dialogues
- 🇪🇺 🇳🇱 The Dutch data protection authority (Autoriteit Persoonsgegevens) has fined two major companies for breaching the GDPR:
- Uber (for a third time), this time for €290M (~$325M) for moving data on EU users to the US without putting the proper data protection processes in place — www.bleepingcomputer.com/…
- Clearview AI for €30.5M (~$34M) for collecting photos of Dutch citizens and using them for biometric profiles without consent — www.bleepingcomputer.com/…
- 🇪🇺 🇮🇪 Ireland’s Watchdog Launches Inquiry into Google’s AI Data Practices in Europe — thehackernews.com/…
- WordPress.org to require 2FA for plugin developers by October — www.bleepingcomputer.com/…
- Another legacy technology beloved by cybercriminals is going away: Microsoft Office 2024 to disable ActiveX controls by default — www.bleepingcomputer.com/… 🎉
Excellent Explainers
- Adversary in the Middle (AiTM) is now available as Malware-as-a-Service and it is one of the most effective attacks I see in the real world at the minute — this post is written by a vendor so the last 20% is an ad, but the first 80% is a superb explanation of how AiTM works and will help everyone stay on guard: How AitM Phishing Attacks Bypass MFA and EDR—and How to Fight Back — thehackernews.com/… (TL;DR — the most effective advice remains to always check the address bar before doing any kind of authentication)
- Apple Intelligence Promises Better AI Privacy. Here’s How It Actually Works — www.wired.com/…
Interesting Insights
- Apple have released a detailed academic paper outlining their safety testing of Apple Intelligence, the paper itself is not accessible to regular folk, but this is an excellent overview: Apple shows why it’s ahead in AI, not behind — www.cultofmac.com/… (TL;DR — by putting a lot of effort into cleaning the training data Apple’s models are functionally en-par with the rest, but much safer, it seems to be more effective to stop models from learning dangerous things than trying to stop them blurting out dangerous things they have learned)
- 🎧 The arrest of the Telegram CEO is cybersecurity adjacent, but not quite in our bailiwick, but if you want a well informed reasoned analysis, I can recommend this TED interview: [TED Talks Daily: The arrest of Telegram CEO Pavel Durov – and why you should care with Eli Pariser — overcast.fm/…](https://overcast.fm/+AAAAAQKIrik]
Palate Cleansers
- Allison: The hardest Problems in the Computer Science — mastodon.social/…
- Bart: 🎧 Season 2 of the BBC Uncharted podcast with mathematician and STEM communicator extraordinaire Hannah Fry is out — my favourite episode features my favourite Irish woman in STEM Jocelyn Bell Burnell, and I hope this inspires lots of interested young girls to follow their hearts into STEM: Uncharted with Hannah Fry: 14. Whispers from the Cosmos — overcast.fm/…
Legend
When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.
Emoji | Meaning |
---|---|
🎧 | A link to audio content, probably a podcast. |
❗ | A call to action. |
flag | The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country. |
📊 | A link to graphical content, probably a chart, graph, or diagram. |
🧯 | A story that has been over-hyped in the media, or, “no need to light your hair on fire” 🙂 |
💵 | A link to an article behind a paywall. |
📌 | A pinned story, i.e. one to keep an eye on that’s likely to develop into something significant in the future. |
🎩 | A tip of the hat to thank a member of the community for bringing the story to our attention. |
🎦 | A link to video content. |