Posts Tagged ‘Germany’
Friday, March 7, 2014 @ 05:03 PM gHale
Manufacturing data determine the production process for a product, and are just as valuable today as the design.
They contain distinctive information about the product and how it ends up manufactured. Whoever possesses this information just needs the right equipment and a pirated or counterfeit product is ready to go.
While design data end up well-protected from unauthorized outside access today, production data often lie exposed and unsecured in the computer-assisted machinery.
An infected computer on the network, or a well-placed USB stick, are all a thief would need to steal data. Or hackers could directly attack the IT network – for instance, through unsecured network components, like routers or switches.
In the growing manufacturing automation industry, an increasing number of unsecured, computer-guided production machinery and networks in production facilities are gradually evolving into gateways for data theft. New security technologies may directly shield the sensitive data kept there.
There is a software application that immediately encrypts manufacturing data as soon as they emerge.
Integrated into computer and equipment, they ensure that both communicate with each other through a protected transportation channel and that only licensed actions end up executed.
“To the best of our knowledge, no comparable safeguard has previously existed for manufacturing data that reside directly in the machine tool,” said Thomas Dexheimer from the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt Security Testlab.
Digital Rights Management (DRM) controls all important parameters of the assignment, such as designated use and quantity, among others. This way, brand manufacturers are able to guarantee that even external producers can only produce an authorized quantity, as instructed in advance – and no additional pirated units.
Dexheimer’s SIT colleague, Dr. Carsten Rudolph, is more involved with secured networks.
At the upcoming CeBIT show March 10-14 in Hannover, Germany, Rudolph will showcase his “Trusted Core Network.”
“Hackers can also gain access to sensitive production data via unsecured network components,” Rudolph said. “These are small computers themselves, and can be easily manipulated.”
In order to prevent this, he called upon one piece of technology that, for the most part, lies dormant (in deep slumber) and, for all intents and purposes, unused on our PCs: the Trusted Platform Module. This relates to a small computer chip that can encrypt, decrypt, and digitally sign the data. Installed into a network component, it indicates which software is running on the component, and assigns a distinct identity to it.
“As soon as the software changes in a component, the adjacent component registers this occurrence and notifies the administrator. Hacker attacks can be exposed quickly and easily this way,” Rudolph said.
“Both security technologies are important building blocks for the targeted Industry 4.0 scenario,” Dexheimer said. The term “Industry 4.0” stands for the fourth industrial revolution. After water and steam power, followed by electrical energy, electronics and information technology, now, the cyber-physical systems (IT systems embedded in machinery that communicate with each other via wireless or cabled networks) and the Internet of Things should move into the factory halls.
“This revolution can only work if the intellectual property is sufficiently protected. And that’s a tall order, because the targets of production IT will increase exponentially, due to ever growing digitization and networking,” Dexheimer said.
At CeBIT, Dexheimer and Rudolph will present a computer-assisted machine tool using a CAD computer and a 3D printer. SIT’s security software is on the computer and the printer; the data encrypted on the computer, and decrypted by the printer. The printer also validates the licensed authorization to conduct the print job. To ensure the data are also secure in the network, the scientists built a Trusted Platform Module into multiple routers.
Wednesday, February 26, 2014 @ 03:02 PM gHale
Using the Pony botnet, bad guys have been able to garner a nice cache of information from websites, email accounts, FTP servers and virtual currency, new research found.
Between September 2013 and mid-January 2014, these cyber bad guys stole over 700,000 credentials, 600,000 of which are for websites, 100,000 for email accounts, 16,000 for FTP servers, 900 for SSH, and 800 for Remote Desktop, according to a report from Trustwave’s SpiderLabs.
Based on data from the control panel of the attack, researchers found after four months of stealing information, the cybercriminals decided to stop the operation.
Most stolen credentials were in Germany (41,177), then Poland (17,214), Italy (15,672), the Czech Republic (14,835), Bulgaria (7,063), France (5,513), Croatia (4,725), Peru (4,616), India (2,761) and Vietnam (2,234).
Close to 80,000 Facebook accounts have felt the impact, followed by ones on accounts.google.com (13,740), nk.pl (13,169), seznam.cz (11,712), profil.wp.pl (8,036), abv.bg (6,589), yahoo.com (6,554), szn.cz (6,175), google.com (5,842) and pl-pl.facebook.com (3,974).
The Pony botnet has also targeted Bitcoin and other virtual currency wallets. Experts found the cybercriminals have stolen $220,000 worth of virtual currencies.
In addition to Bitcoin, the list also includes Litecoin, Feathercoin, Fastcoin, Bytecoin, Namecoin, Mincoin, Zetacoin and many others. In total, around 30 virtual currencies ended up targeted.
Because of the high value of Bitcoin, the attackers didn’t even have to compromise a large number of wallets. They only hijacked 85, out of which they transferred 355 Bitcoins, 280 Litecoins, 33 Primecoins and 46 Feathercoins.
While stealing money from bank accounts is becoming increasingly difficult for cybercriminals, when it comes to Bitcoin heists, there are a number of advantages. First of all, while all transactions are public, they’re also irreversible.
This means if someone empties your wallet, there’s nothing you can do about it. There’s no one who can put the “money” back into the wallet and the accounts cannot end up frozen to prevent theft.
Cybercriminals simply need to transfer the funds into their account on a trading website, convert the virtual coins to a real currency and move the money into their bank account.
Click here for more information from SpiderLabs.
Wednesday, October 23, 2013 @ 02:10 PM gHale
Anyone can interpret numbers however they want, and when it comes to sending out spam there are volume leaders and then there are per capita leaders.
Needless to say, the United States continues to be the top spam-relaying country in the by volume category, according to the Sophos spam report for the third quarter.
The U.S. (14.6 percent) leads the pack, followed by Belarus (5.1 percent), India (4.7 percent), Italy (4.7 percent), and China (4.6 percent). Rest assured Taiwan, Argentina, Spain, Iran, Peru, Germany and Russia are also on the list.
However, the chart is a bit different for the “per capita” category. Here, the spam contribution of each country ends up calculated based on its population.
In this class , Belarus tops the chart. The country sends 11.1 times more spam than the U.S., Uruguay sends 4.7 times more spam than the U.S., and Taiwan sends 3.8 times more.
The countries included in this category are Luxembourg, Macedonia, Peru, Kuwait, Bahamas, Kazakhstan, Bulgaria, Argentina and Israel. Countries with a population below 300,000 were not a part of the survey.
Wednesday, October 9, 2013 @ 06:10 PM gHale
Graphene has extreme conductivity and is completely transparent while being inexpensive and nontoxic, which makes it perfect for transparent contact layers for use in solar cells to conduct electricity without reducing the amount of incoming light.
That is theory, but the real world remains questionable because there is no such thing as “ideal” grapheme, which is a free floating, flat honeycomb structure consisting of a single layer of carbon atoms: Interactions with adjacent layers can change graphene’s properties dramatically.
“We examined how graphene’s conductive properties change if it is incorporated into a stack of layers similar to a silicon based thin film solar cell and were surprised to find that these properties actually change very little,” said Dr. Marc Gluba of the HZB Institute for Silicon Photovoltaics in Berlin, Germany.
To this end, researchers grew graphene on a thin copper sheet, next transferred it to a glass substrate, and finally coated it with a thin film of silicon.
They examined two different versions commonly used in conventional silicon thin-film technologies: One sample contained an amorphous silicon layer, in which the silicon atoms are in a disordered state similar to a hardened molten glass; the other sample contained poly-crystalline silicon to help them observe the effects of a standard crystallization process on graphene’s properties.
Even though the morphology of the top layer changed completely as a result of heating it to a temperature of several hundred degrees centigrade, the graphene is still detectable.
“That’s something we didn’t expect to find, but our results demonstrate that graphene remains graphene even if it is coated with silicon,” said Prof. Dr. Norbert Nickel of the HZB Institute for Silicon Photovoltaics.
Their measurements of carrier mobility using the Hall-effect showed the mobility of charge carriers within the embedded graphene layer is roughly 30 times greater than that of conventional zinc oxide based contact layers.
“Admittedly, it’s been a real challenge connecting this thin contact layer, which is but one atomic layer thick, to external contacts,” Gluba said. “We’re still having to work on that.”
“Our thin film technology colleagues are already pricking up their ears and wanting to incorporate it,” Nickel said. The researchers obtained their measurements on one square centimeter samples, although in practice it is feasible to coat much larger areas than that with graphene.
Friday, June 21, 2013 @ 03:06 PM gHale
Anyone that uses their iPhone as a mobile hotspot should do so with a weary eye because there could be cyber problems.
There is a weakness in the way iOS generates default passwords for connections that can leave a user’s device vulnerable to man-in-the-middle attacks, information leakage or abuse of the user’s Internet connection, said researchers at the University of Erlangen-Nuremberg in Germany.
Andreas Kurtz, Felix Freiling and Daniel Metz published a paper that describes the inner workings of how an attacker can exploit the PSK (pre-shared key) authentication iOS uses to establish a secure WPA2 connection when using the Apple smartphone as a hotspot.
Attackers could find the least resistance attacking the PSK setup rather than trying their hand at beating the operating system’s complex programming layers, the researchers said.
During the PSK setup, users have to establish a password to protect the session. In previous versions, users were able to choose their own passwords, but in iOS 6, the operating system proposes four-to-six-character passwords generated from a default list of 1,842 words and then tags on a random four-digit number.
The mechanism relies on words vulnerable to dictionary or brute-force attacks, and builds primarily from a list of 10 common words such as “suave,” “head,” “coal,” and “coach.” Using additional hardware to guess the four-digit number, the researchers were able to crack the tethering passwords in less than a minute.
“The process of selecting words from that word list is not random at all, resulting in a skewed frequency distribution and the possibility to compromise a hotspot connection in less than 50 seconds,” the paper said. “Spot tests show that other mobile platforms are also affected by similar problems. We conclude that more care should be taken to create secure passwords even in PSK scenarios.”
WPA2 supports two authentication methods: A RADIUS server or a shared key. For mobile hotspots, the paper said session authentication and encryption relies on a password used to derive a PSK which sees use with in a four-way handshake to create temporary keys used to encrypt sessions and do integrity checks. An attacker would need to capture one of the four-way handshakes between the Wi-Fi device and hotspot and conduct a brute-force attack to crack the password.
“It should be noted that all generated keys are only valid for the lifetime of a single session and that generation of those keys only relies on the PSK,” the paper said. “This implies that the security level of the whole mobile hotspot depends on the quality of the passphrase.”
Mobile devices already have a significant attack surface exacerbated by the multiple ways end up enabled to connect to the Internet, via everything from Wi-Fi to Bluetooth, NFC, RFID, and over cellular radio standards such as GSM and CDMA. Once the hotspot feature ends up enabled, a software-based access point churns up allowing other wireless devices to connect using PSK. This can lead to a number of additional risks, elevated by weak passwords.
The researchers said they were able to find not only the password scheme but the relatively short list of words used by iOS to develop default passwords by reverse engineering iOS mobile hotspots. Initial attempts against a pre-determined list of more than 52,000 words took close to an hour to crack, which is not a realistic attack against a business traveler. Deeper digging eventually extracted the exact word list from the official Preferences system app which generates the default passwords, the paper said.
“We found out, that every time a new hotspot password is generated an English-language dictionary file is accessed from the file system,” the paper said. “Consequently, we monitored all accesses to the file system by intercepting all open() system calls to the iOS kernel and analyzed the corresponding backtrace of the method calls that caused this file access.”
In order to pull off an attack, someone would have to monitor Wi-Fi traffic and wait for a wireless client to connect to a mobile hotspot, de-authenticate a client, forcing the user to reconnect, which increases the possibility of capturing the four-way handshake necessary to snare the PSK. An attacker, the researchers said, could use freely available tools to pull off each step of the attack, including identifying iOS targets, de-authenticating wireless clients, capturing the WPA handshake and cracking the passwords.
The researchers said they built an app called Hotspot Cracker which automates the generation of the word list used for default passwords.
“The app also gives explanations and hints on how to crack a captured WPA handshake using well-known password crackers,” the paper said. “Future releases might also automate the process of capturing and cracking hotspot passwords. As computing power on smart devices is limited, one solution is to involve online password cracking services like CloudCracker, to crack hotspot passwords on-the-fly.”
Click here to download the paper.
Thursday, May 16, 2013 @ 07:05 PM gHale
A data fuzzing library of open source software called Fuzzino is now up and running.
This library allows existing test tools to prepare for fuzzing and looks to eliminate the need to reinvent the wheel and make developing new fuzzing tools unnecessary, said researchers from FOKUS (Fraunhofer Institute for Open Communication Systems in Germany). Fuzzing is the process of testing a system for hidden weaknesses by presenting the system with random and sometimes erroneous input data.
Fuzzino uses models of protocols or interfaces to generate test cases and then uses “Smart Fuzzing” heuristics to generate Data fuzzing and Behavioral fuzzing.
This reduces the number of test cases needed over purely random fuzzing, researchers said. An example given is work done by FOKUS and system experts on a risk assessment for a money-processing machine.
The experts examined the system’s protocols, developed functional test cases and then used those test cases to fuzz the system. The results of that fuzzing generated more test cases from which specific security tests could generate. This process offered a far higher coverage of risk than a user could normally manage in the same time.
Eclipse is the underlying technology behind Fuzzino and users will need Eclipse EMF 2.7 and JUnit 4 to compile it and integrate it with their testing tools.
FOKUS developers said users should keep in mind Fuzzino is not a full featured fuzzing tool. They describe it as “a test data generator for enabling your testing tool to perform fuzzing.” Users can receive fuzz data from the tool as XML documents or directly within Java to avoid the processor intensive serialization and deserialization process. Users can also directly instantiate fuzzing heuristics from Fuzzino in their testing tool.
More information on how to use the tool is available in the documentation folder of the source code. Fuzzino has a license under version 2.0 of the Apache License.
As mentioned, fuzzing is a software testing technique, often automated or semi-automated, that involves providing invalid, unexpected, or random data to the inputs of a computer program. The program then undergoes monitoring for exceptions such as crashes, or failing built-in code assertions or for finding potential memory leaks. Fuzzing commonly sees use to test for security problems in software or computer systems.