
Hotel malware has been stealing guests’ payment card details… again, should businesses relay delay rolling out vulnerability patches, and Burger King’s Whopper TV ad campaign tries to take advantage of viewers’ Google Home devices with predictable results.
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by special guest Paul Ducklin.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Recorded Future are a real-time threat intel firm whose machine learning technology analyzes the open and darkweb to give you great insight into emerging threats.
Sign up for their cyber daily newsletter and get their latest insights at recordedfuture.com/intel.
Hello and welcome to Smashing Security episode 17 for the 20th of April 2017, and great to have everybody here. I'm joined as always by Carole Theriault. Hello, Carole.
Well, I won't say it's come up often or even that it's come up twice, but it did come up once and the person who brought it up thought it was quite amusing.
So, you know, I'm very happy for that.
Well, as always, we're looking back over the last 7 days, some of the things which have been going on in the world of computer security, some of the stories you may have missed, and some of the things which have caught our eye and just generally been interesting to us.
And I'm gonna kick off today because I'm going to talk to you about hotel hacking.
Now, chaps, how would you feel, how would you feel if a company has an advisory for you and they begin the advisory saying, "We value the relationship we have with our guests and we understand the importance of protecting payment card data."
The latest company to come out with that statement is the InterContinental Hotel Group, also known as IHG.
It's interesting actually, if you go to their website to try and find out which hotels have been hacked, they don't tell you, first of all, how many hotels have been hacked.
They don't include a number. You actually have to go through this process.
You go to a form on their website, you choose what state, in America you want to look at, what town, et cetera. And eventually you get the list.
So you have to go in, remember every state that you visited, every hotel you may have gone to.
Now, I was able to go into the source code of the webpage, and I worked out that there's at least 1,174 hotels who've been caught stealing, well, they weren't stealing, but the malware on their computers was stealing guests' payment card details as people checked in to the front desk.
If you're using an old school sort of terminal where the credit card numbers just wind up plaintext in memory, the malware can just snoop through memory every time anything changes, grab the credit card number, exfiltrate it.
And because the US doesn't widely use chip and PIN, it's kind of all over bar the shouting when that happens, isn't it?
All of that's been read from the magnetic strip, held on the computer.
And if the right security isn't in place on those devices, then the criminals are having an absolute payday, aren't they?
So literally, if you plug one of them into your computer and open Notepad and swipe your credit card, then in Notepad appears all the mag stripe, all the track data unencrypted.
And it's a simple unencrypted. So that's what gets shoved into memory.
And unless and until the software has grabbed hold of it, and, you know, done whatever processing is necessary, it's there where malware can find it in memory if it knows roughly where to look.
And of course, finding that you know, grepping or looking for that mag stripe pattern is actually pretty straightforward because even if it's in a huge lump of memory, the pattern of the data is kind of easy to recognize.
If you think what credit card numbers look like and then the spaces and then the name, you know, it's pretty easy to recognize that you've hit paydirt.
But one thing which of course worries me is that InterContinental Hotel Group have released this statement warning.
In fact, they originally warned back in February that 12 hotel locations have been affected. It's now gone up to over 1,100 locations.
So you may not have gone to an InterContinental Hotel, but you may have gone to a Hyatt or a Holiday Inn or a Crowne Plaza or et cetera, et cetera.
And so you have to work out, did I go to one of these hotels in this particular state during this time period?
It looks like they've identified between the end of September last year and the end of December, they had malware on the systems.
You know, this data could be swirling around in underground channels for some time to come. Now, Intercontinental, they say that they've informed the payment card operators.
They're also working with law enforcement as well. And since last September, they've been introducing more and more point-to-point encryption solutions.
So they have been rolling out technology to make it much harder, as Duck was just describing how easy it is to steal this information.
They have, as a result of the number of hacks which have been happening at hotels across the industry, introducing better technology to prevent this from succeeding.
I agree it should have happened earlier, but the difficulty for IHG, InterContinental Hotel Group, a lot of these hotels are run as franchise operations.
And my understanding is that some of the hotel branches have not actually allowed IHG to scan their systems to find out if the malware is there.
So that number of 1,174 may not be the end of it. We've gone from 12 to 1,174 plus. It may be larger and worse than that, and maybe it's outside the United States as well.
And that's where I think we can take action as well, because I mean, I travel around a bit and I stay in hotels, and I'm beginning to think this has happened at so many different hotels, so many different branches over the last few years.
Should it— would it be wiser to start paying in cash? Should we be paying with cards which have a very low sort of payment limit?
So if the details are lost, you know, we can sort of scrub that card.
I just went to check in and they said, oh, it's no problem, you know, because it was all prepaid.
That would have probably almost been worth it. Killed someone. And when I got up there, it was an LCD TV that was bolted to the wall, so I couldn't even have done that.
Yeah, because they're figuring on your credit card, if you run out with the lounge furniture and you drain the whole minibar and you set fire to the washing machine—
But good luck staying in a hotel, in a chain hotel, without a credit card, because it's, you know, it's the convenience for you.
So is that kind of that safety and security of your life?
And I think then they came down a bit and then fortunately a colleague showed up and said, oh, you can whack it on my card. It's no problem. Oh, thank you.
And it's very upsetting that we have really no advice for users other than, oh, well, if you did stay in a hotel during that time, watch your— watch— well, I also think maybe you could get your credit card canceled and get a new number if you want.
Right. I don't think it was at a hotel. I think someone— I always would, you know, had a chip and PIN card. But of course in the US they swipe.
I'd always made a point of taking it to the place where they pay and not doing the American thing of handing over your card and the waiter wanders off with it.
But of course they always have to turn, they always turn around and swipe it on something under the counter, so you can't see whether it's being swiped once or twice.
And in fact, the, my bank realized before I did. I got back to Oz and they called me up and it's very good.
They called me up and said, we're investigating a fraud right, which we think may have happened on your card. We're not going to give you any details about what to do.
We want you to go and get your card and phone the number on that card to get back to us. So they were doing the whole anti-phishing thing as well. It was great.
And, you know, they said, well, you've just been in the US, haven't you? And I said yes. And they said, did you take a driving test in the United Kingdom at the same time?
And I said, well, actually, it's not possible— not legally possible for me to take a UK driving test because I already have a UK driving license. So that'll be a no.
So sometimes the, you know, the payment card people, they're pretty good at this these days. They may actually notice that something untoward has happened.
But as Graham said, you know, this data could be sloshing around for ages.
If your card's expiring reasonably soon, then of course you'll get a new number when the new card comes, and that kind of partly makes the problem go away.
And I guess the reason why they haven't— why Graham had to go in and figure out how many hotels were involved and why, you know, to be fair to IHG, they're not saying it's exactly this, this list of hotels now signed and sealed is that list could change.
Yeah, some will be added and some may be on the list like they found the malware there, but it turns out that the malware wasn't able to grab the credit card data at that hotel.
They may have others where the malware wouldn't have worked if it had been there and wasn't. You know, there's all sorts of combinations.
And of course, they also want to avoid the headline keep on coming out of, oh, the number's gone up again, you know, which is obviously going to be bad news for them.
And sometimes a payment machine will break and maybe you unplug one and you plug in another, or you've got two check-in desks with different machines and the malware works on one or not on the other.
Golly, it can be tough.
If you go to the website, different hotels do have different dates where they believe that this was occurring, but it was largely between the end of September and the end of December when it was occurring.
And I was impressed with Duck's story there of when there was believed to be some fraud on his card that they contacted him and said, look, we're not gonna talk about this, call the number on the back of your card.
I thought that was great advice.
And it seems to me that there is this worry and lack of internal threat detection. You know, it isn't the hotels noticing that something is awry with their systems.
It's the people ultimately who are losing the cash who are going, whoa.
And then they notice that of the people who've reported it, a higher than average proportion have this commonality that they all shopped at this brand or they all stayed at that hotel or they all bought petrol at this kind of filling station.
And from that, they can kind of zoom in.
There was the recently patched Microsoft Word zero-day, the one where you pretend to send an RTF file but the web server says actually it's an HTA file and so it bypasses Word's protection.
The jauntily named CVE-2017-0199 and the Easter announcement by the Shadow Brokers that most listeners will probably have heard of, saying, hey, we're dumping a whole load of zero days in Microsoft Windows.
And what was interesting to me is that I have read a couple of responses to, in both those cases, of people going, wow, this probably isn't really much of a hassle for consumers and end users because automatic updates will save them.
You know, the Word zero-day was patched really, really quickly, and the Shadow Brokers stuff, it's likely they only dumped that stuff because they realized, oh, darn, all the zero-days are useless now because Microsoft patched them a couple of months ago.
So let's put the cat among the pigeons. And people saying, well, so end users will be fine because they'll already be up to date.
They're unlikely to be two months out of date, but it's businesses. You know, a lot of companies still, they still like to think about patches for a couple of months.
And if there's a problem, well, then have a system that lets you roll back.
You know, I mean, if a system, a live, big live system for a big company goes down, it can have huge impact on revenues, everything.
And you imagine, well, you know, if you surely for 80% of your users, maybe you have 2 or 3 hours where they can't use Microsoft Word.
Is that likely to be a greater risk to your business, given that there's probably a workaround and it probably won't be catastrophic?
Is that actually worse for your business than being the low-hanging fruit that the crooks are now looking for because they know they're on borrowed time and they know about the exploit because it's all revealed?
I mean, we were seeing examples where malware was being spammed out pretending to come from your company's printer, for instance, claiming, oh, we've done the scan, you know, a fairly ordinary disguise, which we see time and time again.
But it was using this fairly new, it'd been around for a few months, fairly new vulnerability and exploit in order to infect people's computers.
Wasn't just being used in targeted attacks. So there were many business users who could have been put at risk.
I know that sometimes problems can happen, but certainly in my life on Mac and Windows and on my phone— I've got a Windows phone and an iPhone— I, for about the last 3 years, I just decided, right, I'm going to live my life that as soon as I know a patch is available, the instant I know, within seconds of getting Apple's email, I'll be the first guy to go and get it.
And I pride myself on getting it within minutes. And I've never had any trouble doing that.
Now I know that I'm looking after my own computer and I'm not part of some kind of giant IT regimen like you get at some companies.
And then when I look at it, I think, you know, I should probably go and throw that software away and find something new because that hasn't had a patch for 7 years.
You know, who am I kidding by saying the patch broke my system? It didn't. It actually was the impetus for me to go and bring myself more up to date.
And it's that always listening, ready to give you snippets of information if you say, OK Google, right? Now, do you have one of these, any of you? An Alexa or Google in your house?
I think that's the best idea in the world. I just wish it had video.
But there is one feature of the Google Home and Alexa that your phones don't have, and that's that it's not voice-specific in terms of when it reacts.
I could say, "Okay, Google, tell me about Paul Ducklin." And it could go to the Wikipedia page and tell me everything about you, because I'm sure you have your own page that you keep up to date, right?
And the concept was that the guy on screen who was behind a big Burger King desk thing or whatever, counter, was saying, "I obviously can't tell you all the wonderful ingredients that are in the Whopper." And he says, "Okay Google, what is the Whopper burger?" I'll tell you what, Kroll, stop right there.
And then it starts describing whatever is on Wikipedia because that's how Google Home works.
So kind of cool, although we know from old Amazon Alexa times when someone actually ordered, what was it, dollhouses. That was what we talked about.
We know this can be very annoying, but I don't know, from an ad perspective, I think it's kind of interesting, right?
15 seconds and you actually then get the continuation of the ad happening thanks to Google. Now, of course, Wikipedia, as we know, is editable by everybody.
You know, if you're going to have a surprise ending, then at least have one of three that you can choose from. That's my advice.
People edited the Wikipedia.
Do you think— this is Burger King— do you think Burger King knew that people would do that and maybe they would get more coverage as a result?
I'm going to— I mean, I have no proof of this, right? This is just a gut feeling.
But I think they did know because, look, their social conversation has gone up 300% according to the Register. Picture, right? With people putting in words. I'm going to do it now.
Are you ready? These are the kind of things people put in: 100% medium-sized child, rat and toenail clippings.
According to Wikipedia, the Whopper is a burger consisting of a flame-grilled patty made with 100% medium-sized child with no preservatives or fillers, topped with sliced tomatoes, onions, lettuce, cyanide, pickles, ketchup, and mayonnaise served on a sesame seed bun.
Oh yes, they contain, you know, and then rude words and stuff. I would have changed the wiki— well, no, I wouldn't.
I mean, one might have changed the Wikipedia article so that the first thing it said was, "okay, smart TV." And then you set Google or get Google Home to call on the Alexa and Alexa to call on the smart TV and get what I believe in the old days of malware was called an nth complexity infinite binary loop.
If you remember those, that would be great.
And it would certainly focus the mind on whether you really want these auto-stimulatable surveillance devices in your own home at your own expense. That's my theory.
I mean, that's the only reason I can think that they think this is worthwhile, to be able to go, "Oh, okay Google, what's the weather?" "Okay Alexa, put toilet paper on my shopping list." So what did Google think about this ad then?
So they don't really want, from what I've read in the articles I've seen, Google are not really happy with the whole ad industry taking advantage of their toys.
And I think it's a good warning to companies out there to make sure that you shouldn't be shamelessly promoting anything on your Wikipedia page.
And when you have something that can recognize any voice, then it may take commands from someone you did not expect.
But I forevermore now will think of a Whopper with rat and toenail clippings. Right? That's how successful they have been at this marketing campaign. That is now cemented in my brain.
Okay Google, subscribe to Smashing Security.
You can leave reviews if you like. We're also on Overcast and TuneIn, Stitcher, and Google Play Music. And you can even play us through your Amazon Echo. I know some people do that.
Be very careful with it. Thanks for tuning in.
You can go to our website at www.smashingsecurity.com smashingsecurity.com and you'll find an email contact form and a link to our Twitter as well. And until next time, toodloo.
Show notes:
- InterContinental Hotels Group (IHG) Notifies Guests of Payment Card Incident at IHG-Branded Franchise Hotel Locations in the Americas Region – IHG.
- Affected hotel look-up tool – IHG.
- Been to one of these 1170 IHG hotels? Your credit card details may have been stolen by malware – Bitdefender.
- Microsoft patches Word zero-day booby-trap exploit – Naked Security.
- Microsoft zero-day vulnerability was being exploited for cyber-espionage – Graham Cluley.
- The Shadow Brokers – Wikipedia.
- Burger King’s ‘OK Google’ sad ad saga somehow gets worse – The Register.
- Burger King Connected Whopper ad – YouTube.
This episode of Smashing Security is made possible by the generous support of Recorded Future – the real-time threat intelligence company whose patented machine learning technology continuously analyzes technical, open, and dark web sources to give organizations unmatched insight into emerging threats.
Sign up for free daily threat intelligence updates at recordedfuture.com/intel.
Thanks to Recorded Future for their support.
Hope you enjoy the show, and tell us what you think. You can follow the Smashing Security team on Bluesky.
Remember: Subscribe on iTunes to catch all of the episodes as they go live. Thanks for listening!
More on this story:
http://www.usatoday.com/story/tech/news/2017/04/19/intercontinental-hotels-group-breach-holiday-inn-crowne-plaza-front-desk-malware/100652570/
One thing you didn't mention Graham was that if you use Apple Pay it generates a unique card number per transaction so even if a retailer's system is compromised then you're safe. Obviously this can't be used for deposits but it can be used for everything else.
Another option is to get a pre-paid card such as:
https://uk.virginmoney.com/virgin/prepaid-card/
Of course the "nth-complexity infinite binary loop" is a "meaningless term"
https://en.wikipedia.org/wiki/Goodtimes_virus
https://www.sophos.com/ko-kr/press-office/press-releases/1999/11/va_hoaxes.aspx
Also:
http://www.theverge.com/circuitbreaker/2017/4/20/15364960/google-home-speaker-multi-user-new-feature