
A creepy teddybear leaks two million voicemail messages, Windows 10 pushes you into only installing vetted apps, and Boeing warns 36,000 employees their personal information could have been exposed after a worker sends a spreadsheet to his wife.
All this and more is discussed by cybersecurity veterans Graham Cluley, Vanja Svajcer and Carole Theriault.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Unique and its deep packet inspection technology that can be downloaded and deployed on a standard physical or virtual hardware, providing complete comprehensive visibility in minutes.
I actually know them and they are great guys.
Episode 10: The Dolls Must Be Destroyed. With Carole Theriault, Vanja Švajcer, and Graham Cluley.
Hello and welcome to another episode of Smashing Security, Episode 10 for Thursday, the 2nd of March, 2017. And it's a special transatlantic edition.
Yes, we are really pushing things to the limit today because it's the first time, I think, actually, that we've all been in different countries, haven't we?
And well, since we last issued a regular episode of Smashing Security, there have been some big stories which unfortunately didn't quite fit into our recording schedule, so we didn't cover them.
Researcher Tavis Ormandy discovered that sometimes, quite rarely, but every now and then, a tiny chance, Cloudflare or sites which were using Cloudflare would be sharing more information than maybe they should, and so private information could actually be contained.
There's no evidence that anyone's been exploited by that, but I wanted to ask you guys, have you been changing your passwords as a consequence of this?
But yes, I think if you find out that any of your apps you're using every day is using Cloudflare, which is very likely.
We'll link to it in the show notes where you can download a long, long list of the many hundreds of thousands, if not millions of sites which are using Cloudflare.
Frankly, my decision was I'm not gonna do anything. I think the chances, because this was only, it appears only a problem for a fairly short period of time.
And of course, in terms of passwords, it would only be if you're actually transmitting a password during one of those very rare sessions that this would potentially be an issue.
But I just thought there are so many major websites who depend upon Cloudflare these days, it would just be, you know, I think that's more of a hassle and potentially maybe even more of a risk, me changing all of those passwords, than thinking actually, you know what, I'm not going to worry about it.
So I'm not panicking about that particular one. I just thought it was, I put it in the too difficult box. Whether that will come back to bite me, I'm not sure.
Now, one thing I wanted to ask you, do you remember last year when VTech got hacked? Yeah, they're the electronic learning toy company and millions of families. Yeah, exactly.
It's the things you sell to kids like these sort of calculators and sort of things which help you learn how to spell and things like that.
And I've got a young child, and so we might have one or two of their toys lurking around in here.
Millions of families had their personal information exposed because of a serious security breach which took place last year.
Database access contained information about customers and their children. That was one failure of the Internet of Things when it came to toys.
And earlier this month, a German privacy watchdog told parents to destroy an internet-enabled toy doll called My Friend Cayla.
Because My Friend Cayla could be used too easily to eavesdrop and even talk to children without knowledge or consent.
And the latest one which is raising concern are some internet-connected stuffed animal toys called Cloud Pets from a company called Spiral Toys.
And these are toys which allow you people, children, family members to send voicemail messages to each other.
Now, rather than me try and describe what these do, I should actually just play you the advert, so I'm going to show you the YouTube video of this wonderful toy.
The CloudPets app uses Bluetooth technology to send your messages. Hi, this is Grandma. See you real soon.
But the problem is this. Turns out CloudPets, oh dear, there's been a breach in Teddy Town because they have leaked MongoDB, their MongoDB database.
We've talked about MongoDB before and how people have poorly configured it.
And as a consequence, potentially 2 million voice recordings of children and parents, email addresses, password data for more than 800,000 accounts have been exposed.
Because when you use these toys to spread messages to each other, of course, those voice recordings go up into the cloud.
But obviously the people who are making these devices aren't thinking of security in mind, just like VTech weren't, just like the other devices that my friend Kayla— they aren't thinking about the potential privacy and security issues.
And as a consequence, breaches this keep on happening.
And it's not just that anybody was able to access this database without a password, you know, no firewall, no passwords in place, you know, publicly accessible, but same old story, which we've talked about before with MongoDB databases and other database formats as well.
The hackers gain access, they wipe the information, and then they begin to demand ransom.
And I think it's probably big data dreams, greedy big data dreams that they might be able to use that information for a later purpose. And you know, fuck big data.
Yeah, that's the kind of decision which consumers need to make.
In fact, this is half the problem is that this problem was discovered and people kept telling them, saying, guys, your database, anyone can access it. And they didn't respond.
Multiple occasions people were getting in touch with them.
And the company, CloudPets, weren't paying, you know, Spiral Toys weren't paying any attention at all.
And we weren't really responding very well.
I wanted to share some advice, which is if you do have one of these CloudPets, log in if you can, delete your account, make sure you're not using the same password anywhere else.
One of the problems with CloudPets was that even though they were storing passwords as a bcrypt hash, which is considered quite hard to crack, there was no password strength rules in place at all, as Troy Hunt reported.
You could literally have a 1-character password of A or X. That would be enough.
And in the video where they described setting a password, they just use a 3-character password as well.
So we set it all up for him, and he went around to everyone and told them, everyone, the password: 1, 2, 3, 4, 5, skull. There you are.
You know, that's the end of CloudPets as far as I'm concerned. And vote with your wallet.
Apparently a new version of Windows 10 called Creator's Update or whatever it's going to be called by April when it's supposed to be released.
Can run only applications from Windows Store, so-called UWP or Universal Windows Platform applications.
So it seems that Microsoft may release a new version of Windows 10 called Windows 10 Cloud, which will compete with Chrome OS.
So in the latest leak, this feature with Universal Windows Platform apps that can only be run is extended. And so you can also run other Windows applications.
Applications that are installed from Windows Store. So these are not your typical Win32 applications we used to know.
They have to be converted so they're compatible with the new user interface.
So it seems that Microsoft is pushing for all the Windows developers to slowly cross to this new model because there are quite a few advantages to developers.
For example, if you create a UWP, you can run the same app without any change on different devices on your Xbox or phone on tablets or whatsoever.
But what concerns us, of course, is what does it bring from the security point of view? So there are a lot of the advantages of this new format.
And one of the advantages is that the app, when you install it, it cannot chain install other applications.
So that's one of the security benefits of this. The second one is an obvious Apple-like control and vetting of applications by Microsoft.
It seems these apps, they have no access to the Windows file system, to the operating system or the registry. And so they are very much isolated one from each other.
And you really, it's much more difficult for malicious app to appear.
For instance, you will get malware inside Word documents and macro malware and scripting malware and things like that, which wouldn't be programs which you would download from this store or anywhere else on the net.
But if let's say Office or a browser is a UWP app or a new platform universal it doesn't have access to other apps or any other files that would actually be required for any kind of malicious behaviour.
So you're saying, so if I'm using Windows 10, I'm on the internet, I want to download some app that's not within their walled garden, what are you saying will happen?
That's the first one. And no other apps will be run.
Your second option is to say, warn me if any application that's not from Windows Store wants to be installed or is trying to be installed. So you have this sort of similar as today.
You have the user account control where you say, well, okay, you know, I pretty much know what this is, so I will allow it to run.
And the third one, which basically is the same as more or less as today, you don't have any kind of warning, so you are free to install any kind of app.
So it's going to be interesting to see how Microsoft will push this feature forwards.
Where you get apps which have been vetted by Apple and they have tight control over what those apps can do. A lot of low-level stuff the apps aren't allowed to do.
One of the issues has been, of course, that Apple, and I don't know what Microsoft is planning to do with this, but Apple takes a chunk of the change.
So they will take some of the money for the cost of your apps. They will earn that as commission.
And that's one of the way in which they rake in money, just like they do with the iOS App Store.
Actually, automated updating is included and your user management through this central store.
Suddenly, some of the apps which I run on the Macs which I own, I have a choice of either buying them from the App Store or buying them directly from the developer.
And quite often you will find there are additional features in the version which is available from the developer because they weren't able to get it past the App Store guidelines.
They were doing things—
It's not like I'm trying to do something nerdy on my computer. But the versions in the App Store, it's just like, oh, sorry, we can't do that because of Apple's restrictions.
So if there is a vulnerability, if there's a flaw, if there's an urgent bug fix, quite often you will get that bug fix much quicker if you've got the software directly from the developer.
And that would make me nervous about these Microsoft programs as well.
I get all these, I get the drawbacks, but I prefer to have that extra sense of, this app has been vetted before I would get my Auntie Hilda, for example, to go and download something.
I mean, there was a comparative advantage of Windows was that it was open to developers that you can actually use some of the system stuff that you can have drivers and so on.
There are obviously security drawbacks to that, but you know, as a very powerful system, I don't know, it worked in the past.
It's going to be interesting to see how the users and how the developers will react to this.
Carole, what have you got?
So let me set the scene for you guys.
So November 21st last year, a Boeing employee sent a work spreadsheet to his wife, who does not work at Boeing, to get help with a formatting issue.
The employee's wife, it seems, was a bit of a whiz at the old Excel spreadsheet stuff. I bet you it was a pivot table, don't you? It's totally a pivot table.
Now, these days, with all the breaches we hear, that's not a huge number. That's employees.
Now the information that was in the spreadsheet that you could see, that the employee could see was first and last names, place of birth, their ID, employee ID, and accounting department codes.
But there were hidden columns, Vanja, exactly as you said, Social Security numbers and date of birth were in the hidden columns.
Anyway, so I couldn't find any information on how Boeing actually became aware of the infringement because I imagine the employee sent this to his wife, his wife fixed whatever issue was going on, sent it back, everyone's happy, no one's the wiser.
But I suspect there are probably some—
So looking at this, I was thinking, actually, I think Boeing seems to have done everything right.
And I'll just walk through these and you tell me if they've missed anything because you guys know this stuff a little bit better than I do.
So Boeing obviously had the tools in place to uncover the unintended infraction, right? It was able to find out what happened, if my assumption is correct.
Boeing also seems to have gotten to the bottom of the problem and has not publicly named and shamed the employee publicly from anywhere I've seen.
Now, Boeing have also performed forensic analysis both on the employee's computer and the wife's computer to ensure that all the information is properly destroyed.
And they have confirmation from the couple that neither forwarded the information to anyone else.
Now, this is pretty standard these days, but the company is also offering employees two years access to free identity theft protection services.
I'm not sure why it's just two years. I'm not sure why that isn't just a standard across for any employee that works at company.
Why wouldn't you just offer it as part of the package?
Do they know if someone else accessed that account?
So now of course, now this all comes through, the Boeing is now, Deputy Chief Privacy Officer Marie Olson is in the process of officially informing the attorney generals of each of the affected states about the infringement, which is by law.
I think 47 states, if I remember correctly, now require by law that you declare, you know, if people, if they've been, if they've—their information has been leaked in a way.
But the thing is, you can see how easy this happened. And it reminded me of this time when I remember trying to send an email to a colleague whose name was Eve.
Can you guess what happened? It autocorrected to everybody. And that's not just everybody that was in the particular building I was working.
That was everyone in the organization globally.
That was my emergency automatic response, although I was too late and everyone received it.
Now, all I can say is, thank God I didn't write anything in there that impacted privacy or confidentiality.
But, you know, these things can happen, and I think they can happen to anyone.
When that happened, I actually wrote to the CIO and said, look, we need to have this mechanism in place to say, are you sure you want to email everybody in the company?
And they actually implemented it. So these kind of things can help to go, oh no, I just wanted to email Eve.
They're going to offer extra training on how to deal with—but again, if the employee didn't know that there was PII in there because it was in hidden columns.
I know that most of the people did and most of the people would use Gmail or whatever for something that, you know, just quickly to send because I'm not able to connect to the company system at the moment.
I mean, he didn't know the data was there or maybe he didn't realize the seriousness of the data which was contained, 'cause some of it was hidden.
But it was an intentional sending of it. So I was thinking of how would I fix this? And the story you've just told, Carole, of yanking out the cable, I have a similar problem, right?
I send an email, I hit send, and only then do I go, "Ooh, I shouldn't have said that." So I actually have a system in place with my email client where it goes into limbo for about 90 seconds.
And it goes into that limbo folder before it really sends it.
And every day I'm going into that limbo box before it gets sent and quickly editing things, maybe to make myself sound a little bit friendlier and less blunt, or, you know, thinking maybe that joke was a little bit off-color.
Not only have they handled this properly, but it sounds like they had the tools in place to actually notice that the sensitive information had leaked out of the company.
So, I mean, kudos to them for handling it.
And I think rather than hiding everything under the carpet and hoping no one finds out, it kind of makes me think, okay, good on you, Boeing.
And it was, do you say 36,000 workers were included in this? That's right.
So that would have definitely been valuable to some of the criminals at the moment who are targeting big firms like Boeing through things like CEO fraud or business email compromise.
Potentially, it could have been bad.
Do you think you would— how concerned would you be about your information in this case if you were an employee at Boeing?
And maybe it'd also make me an awful lot more careful.
You may not even be aware that all this software is available, but you know, they can, when you're on a work computer, it is, you know, you are, it is there. It's theirs.
So be careful what you send.
Something for us all to think about, right? Oh, thanks for that, Carole.
So we move on to the section of the other show, which I've put in our little template here as any other business.
So I have, I'm very sad to say that I will be taking a break from the Smashing Security podcast because I'm changing the employer and I have to make sure that employer is happy with whatever I do.
So I'm hoping to come back, certainly, but for the moment, it's going to be a break.
We need him.
And say, I can't believe Vanja isn't on a Smashing Security podcast anymore.
And the way to make sure that you don't miss out on our future podcast adventures is, of course, to subscribe to the podcast.
We are on iTunes and Google Play Music, Stitcher on Android, Podcast apps as well. Go and look for Smashing Security there and leave a review and say something nice about us.
We really appreciate it if you do. It makes a big, big difference. That just about wraps it up. Thanks for tuning in. And I think I should leave the final words to Vanja Švajcer.
Actually, Vanja, do you want to do the big wind-up at the end of the episode, seeing as you may not be here for a little bit longer?
That's N-E-T-F-O-R-T.
Show notes:
- Announcing the first SHA1 collision
- Tavis Ormandy: Cloudflare Reverse Proxies are Dumping Uninitialized Memory
- Incident report on memory leak caused by Cloudflare parser bug
- List of Sites possibly affected by Cloudflare’s #Cloudbleed HTTPS Traffic Leak
- Quantifying the impact of “CloudBleed”
- CloudPets commercial
- Data from connected CloudPets teddy bears leaked and ransomed, exposing kids’ voice messages
- Microsoft slaps Apple Gatekeeper-like controls on Windows 10: Install only apps from store
- Boeing Notifies 36,000 Employees Following Breach
Thanks to NetFort – https://www.netfort.com/ – for sponsoring this episode of Smashing Security.
Hope you enjoy the show, and tell us what you think. You can follow the Smashing Security team on Bluesky.
Remember: Subscribe on iTunes to catch all of the episodes as they go live and thanks for listening!
