
Julian Assange’s WikiLeaks didn’t earn itself much love from the infosec community when it (incorrectly) claimed in its Vault 7 press release that encrypted chat apps like Signal and WhatsApp had been cracked by the CIA (they haven’t), and some in the media made the mistake of getting very excited with the concept that your Samsung TV might have been remotely hacked to spy on your conversations (it hasn’t).
The reality is that the vast majority of us should be worrying much more about being phished by the next email we receive than by WikiLeaks’s revelations of alleged zero-day vulnerabilities held only by the CIA.
Nonetheless, if there are unpatched vulnerabilities in Android, iOS, Windows etc that law enforcement agencies are aware of (and potentially using) but have not informed the software manufacturer about then that’s a big problem.
Because if an intelligence agency has worked out a way of hacking a smartphone remotely, for instance, then there’s a chance that others have worked it out too. Including criminal gangs or rogue nation states.
The best course of action for millions of innocent technology users around the world is for vulnerabilities to be responsibly reported and patched quickly by vendors.
Put simply: If, say, the CIA doesn’t share details with a technology firm about the exploitable flaws it has discovered there is a chance that the very people the CIA is trying to protect could themselves be hacked.
So, I was pleased to hear Assange say at an online press conference that WikiLeaks had decided to share details of the vulnerabilities with the relevant vendors so fixes could be rolled out:
“We have decided to work with them, to give them some exclusive access to the additional technical details we have so that fixes can be developed and pushed out so that people can be secured. And then, once this material is effectively disarmed by us, by removing critical components, we will publish additional details about what has been occurring.”
What a shame that Assange did not co-ordinate with vendors *before* releasing the “Vault 7” data dump. What a positive story that could have been.
As Forbes reports, WikiLeaks doesn’t yet seem to have shared any details with Google and Microsoft at least.
Let’s hope that this information-sharing is happening as we speak, so any remaining vulnerabilities are not left unpatched for any day longer than necessary. Any delay in sharing the details would reflect very poorly on Assange and his WikiLeaks organisation.
You can hear some of my personal views about WikiLeaks’s release of the “Vault 7” CIA data dump in this episode of the “Smashing Security” podcast where I was joined by Carole Theriault and special guest Paul Ducklin (better known as “Duck”).
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Smashing Security, Episode 11, for Thursday, the 9th of March, 2017. And I'm joined as always by my buddy Carole. Hello, Carole.
I work for Sophos where I have worked for many years, and most of what I do these days is to write security explanations—issues such as cryptography, malware, and so forth—for our Naked Security website, what I like to talk about as SESSI-COWIE, which is Security Explained So You Can Actually Understand It.
And is this acronym SESSI-COWIE, is that taking off in a big way at the moment?
It's done about as well, unfortunately, as Vorriwoggom, which I know is one of yours, which I still like and I still use and I used it today and I think it's kind of an important thing for security companies to get their heads around.
So I bought him a treat, which is Nintendo Entertainment System. Do you remember this? It's the old one from 1986, but it's been miniaturised to this palm-sized console.
And, you know, I think it's quite good to experience those kind of games in the old-fashioned way before you go and swap over to the Nintendo Switch and the latest Legend of Zelda and all the super duper graphics you get today.
So it sounds a lot of fun. What isn't so much fun, of course, is some of the stuff which happens in security sometimes. Sometimes it's not as smashing as we might like.
And the hot topic as we're recording this is the fact that WikiLeaks, God bless me, they've published thousands of pages of what appear to be leaked internal CIA documents.
Yep, Julian Assange has released what he calls Vault 7. He's, I don't know if there's a Vault 1, 2, 3, 4, 5, 6, where do they come up with these crazy names from, I don't know.
But he says it's the largest ever publication of confidential documents on the CIA.
Much of it is focused on how the CIA could attack and spy on devices, particularly smartphones, and in particular iPhones, which are generally thought to be more secure than Android.
Have you guys seen any of the headlines around this stuff?
So we saw, for instance, WikiLeaks claim that the CIA can use zero-day vulnerabilities to bypass the encryption of popular chat apps like WhatsApp, Signal, Telegram, and Confide, which is the one which is alleged that the Trump administration or some members of it might have been using to secretly communicate with each other.
But it's not really the case. It doesn't seem though that the CIA have really broken the encryption of these, which obviously would be huge news and alarming for many people.
Instead, it looks like what the CIA have been doing is they've been using zero-day vulnerabilities maybe to snoop on smartphones.
So to break smartphones and to commandeer smartphones. And of course, once they control a phone, then they can see anything which is going on it.
They can see the conversations, they can see what's happening through those sort of devices.
People are out there, they're reading the headlines, they're just reading the summaries and they're throwing out articles as fast as they can.
And I think in the coming days we're gonna find out, you know, what everything this stills down to, because there's going to be fake news.
I mean, for instance, the New York Times, right? Which most of us, I know there are some notable exceptions, respect as an august media organisation.
They ended up deleting some of their tweets because they got so carried away with this news.
I guess there's always this push, isn't there, to be the first with the breaking news in order to get the clicks?
And that's a big problem when you say, oh, we've got loads of zero days.
And for all we know, that might be, well, there was a zero day for a bit, and then that was patched 7 years ago, and this one worked for a few months, and then it was patched in April, and so on.
And that's the problem. Oh, there are loads of zero days.
Unfortunately, there are at least some zero days, maybe not as many as some people might want us to believe, that occur in products, that appear in products.
And those who don't patch, who don't use the latest versions, who don't adopt safe practices may get caught out long after the fact.
You know, the fact that ancient malware still gets a grip on some people's computers is evidence of that.
But this idea of, wow, giant zero-day storm, unfortunately there's an awful lot of work to do to put that into context and say when this thing was a zero-day and when it wasn't.
So you also get people going, oh well, there's all these zero-days. Like, have you got samples and do you detect them?
And so I'm thinking, well, if we did, by definition, they wouldn't really be zero days, would they?
So it's almost as though we get excited by the word zero day without considering that sometimes, fortunately, zero days are only there for a very short time, particularly if you're on the ball with patching.
And I believe they were also talking in some of the documents about alleged zero-day vulnerabilities in antivirus software.
And from the discussions I've had with some antivirus companies, it sounds like some of those certainly are old issues as well, which may have been resolved some time ago.
So people don't have to worry. Of course, people who might have to worry are those people who aren't updating, who aren't patching themselves.
And that makes me begin to think about what about all those Android users where if you've got a Google-branded device, there's a good chance that you're receiving security updates on it.
Well, I don't know about good, there's a chance. Well, okay, there's even less of a chance if you are using a device manufactured by some of the other vendors doing Android.
And I went on my way into work, I stopped at a popular mobile phone shop along the way, and I went in and I went straight to the budget table, you know, where you're going to pay $100 or less for your phone.
And I looked at these devices and some of them were quite neat, perfectly usable, and they were already using versions of Android that had not been— they were still using versions of Android that had not been supported for a year or so.
And this was two years ago, you know, when everyone was— you're supposed to be going towards version 5 and version 4.4.
Well, that's the LastPass, that's the oldest one you really want to consider.
You could buy an off-the-shelf device and it was, you know, it was well priced for that reason, I suppose. And it had, say, Android 4.2 on it.
And it was pretty clear that when you bought that device, not only was it already out of date, but you were never going to get updates. And that was sort of by design.
And it seems a bit of a pity that maybe it's not made a little bit clearer to the people who are buying them.
I mean, just this week we've seen Google, there's been another Android security bulletin, scores of vulnerabilities have been patched.
So, you know, the operating system has been patched. That's great that Google's done that and they fixed that.
But now we've got this challenge of how are we going to get those patches to those users?
And as you said, many of them simply there is no route whatsoever through which they're going to get it. And so they're going to remain vulnerable.
It's almost like personal due diligence where you go, you— so you need to learn with Android how you go into the settings page and how you find out what the Android version is.
And you know, all the relevant serial number details and the vendor and even perhaps the carrier, you know, the mobile phone company that's locked it to them, perhaps if that's legal in your country.
And then go online and have a look and see whether that device is ever going to get any more security updates.
Because if it isn't, you're going to be one of those guys who's at risk of security problems that to the rest of us are kind of considered written off and no longer existent.
Oh, don't. Yeah, one of the things which has come out of this release from WikiLeaks is alleged attack against smart televisions.
There've been a lot of headlines about this so-called Weeping Angel attack.
Clearly they were Doctor Who fans, where allegedly law enforcement agents were able to compromise Samsung smart TVs.
And then even when the TVs appeared to be off, they would be secretly recording conversations.
Now, what most of these headlines haven't actually got across, however, is that that particular spyware could only be installed via USB.
In other words, the authorities needed physical access to your television, and many of the media have missed that point.
Yeah, if you read the documents, you can see clearly there, it's a USB-only thing. So in some ways, this is sort of same old, same old.
We, intelligence agencies have been using computers, using the internet to spy on each other for ages.
They've been perhaps hoarding zero-day vulnerabilities and not passing them on to vendors, which of course causes harm for all of us, particularly when those zero days then become public knowledge.
The interesting thing right now is WikiLeaks has actually sort of controlled itself a little.
It hasn't released everything which it knows just yet, which isn't always the way that they are. They're not terribly good at redacting themselves on occasion.
They actually aren't sharing details of all of the exploits right now.
Now, it may be that they will release that in the future.
My hope, and I don't know if it'll be a forlorn one, will be that they will actually share this information with the vendors because they're the people who actually have to protect against those things.
But yeah, that information has somehow been stolen from the CIA, and it does look as though this is from the CIA, and that means it could be in the hands of anybody, which means all of us potentially are at risk unless these bugs get fixed.
It's not a— this is not a particularly new family of malware, but it's a sort of interesting, if you like, almost a kind of community ransomware project known as Satan.
Now, as you and I know well from our from the old days of antivirus, sort of occultic themes have always been rather popular with virus writers.
We've had Dark Avenger, Necropolis, My Doom, Anaitas, if you remember, which is Satan backwards, Satan Bug. Those are written by the same guy.
So obviously that's kind of what attracts everyone's attention because there's all this doom-laden imagery.
Obviously it's anonymous. And what you do is instead of just downloading the ransomware or the source code and going off and doing your thing, you kind of join a club.
And basically the backend to Satan generates you a unique copy of the malware, which is tailored to the ransom that you want to ask.
So you can say, well, I want to charge half a bitcoin and then I want to wait a week and then I want to ramp the price up to one bitcoin. And you can set those parameters.
So you get the malware tailored to you, you get some delivery tools, script tools that it generates for you that you can copy and paste.
Then the crooks actually deal with collecting the bitcoins. And of course, you have complete faith in them to be quite honest about how much revenue they've generated.
And they take 30% of the proceeds and send the rest back out to you via bitcoin.
So they're running the infrastructure, they are doing the bitcoin processing, they're generating the malware, and there's even, oh dear.
It couldn't be that they thought, hey, it worked for iTunes, it'll work for us. And I guess that's exactly what they are doing.
They said there's no upfront fee, you just pay as you go, we take 30% just for doing the collection, and you get to decide.
And the minimum, the minimum payment is 0.1 bitcoins per go, which is the current rate about $125 US.
So they've got— fortunately, the malware it generates, you know, most products like decent antivirus products these days will mop it up.
But it's just this whole kind of, well, join the club and we'll take care of everything.
And you don't— all you have to do is worry about, think about how you're going to disseminate the malware to people.
It's just, okay, here's the Word document, it's going to tell me how to set up Tor and how to find this place.
But ultimately, the Satan service is basically white labeling some ransomware for you, isn't it? And then all you've got to do is, what, spam it out to people or plant it somewhere?
Wow.
So there's a page where you put in your localization strings for all the text, sentences like, "Your personal files have been encrypted," and "Don't think of trying to do this yourself," and "You've got 5 days," and all that stuff.
And you wanted to get back at your employer for whatever reason you're disgruntled.
I wonder if this is attractive from that point of view, that your involvement is pretty well hidden.
And in this one, I put this— the answer to that bit's really simple: don't. You know, don't get involved in this.
And if you do and you get caught, then please don't expect any sympathy.
The courts are not going to look kindly on you, and they're not going to say, oh well, someone else did the dirty work and I only clicked a few buttons. It's not like that.
You know, you're demanding money with menaces, and that's a pretty serious crime in any country.
You may as well start eating into the time you're going to have to serve while you're remanded in custody. That's my opinion anyway.
So imagine them snooping through your apps, your accounts, social media feeds, calendars, emails, etc.
No, I wouldn't like it at all.
This is what they're calling these searches during border inspections.
So in other words, they're worried that more travelers are being asked to surrender their devices and passcodes. Now, so I wanted to see how bad this problem was.
It turns out that in 2015, about 5,000 electronic devices were inspected. So this is a teeny tiny percentage of the 400 million US arrivals during 2015.
However, in 2016, there was a sharp rise. It went up to 23,000 searches as opposed to 5,000.
So I'm not surprised that the growing number of travelers entering the US, be they citizens or not, are looking to try and control this type of data leak at the border crossings.
So looking around the web, there's a number of articles on this with a lot of people providing advice.
But the advice got me thinking that perhaps we weren't really discussing the consequences of carrying out this advice, and I wanted to get your take on this, right?
So we've got, for example, carrying no devices or carrying wiped devices, encrypting sensitive files, refusing to comply, and then basically saying that you don't have your master password or you don't have your two-factor device with you.
So these are the types of popular advice that we're seeing. And I wanted to get your take. So what do you think about carrying no devices?
I mean, I think ultimately no one wants to get on that persons of interest list, right?
And I think the whole thing here is about basically what you're doing is trying to deny customs and border control officers access to your data, right?
You're trying to say, and I think the passwords are just a way for them to get access to your data.
So by denying them access to your password, I don't know, you're risking being detained, you're risking your devices being seized.
And I just think it's important for people to understand this, right, before they kind of decide to exercise their civil rights.
I once had a trip, I had to fly from Iceland to Seattle to go to— it was a device driver fest at Microsoft. And you think, well, that's great.
I'm coming from the UK, I'm going to Iceland, and I'm going on to Seattle. Iceland's kind of halfway-ish.
But it turned out that the easiest way to fly from Iceland to Seattle is via Heathrow, believe it or not.
But I never entered the UK, and I was in this bus on the wrong side of this chain-link fence in amongst some sort of place where trucks get serviced. And clearly I wasn't in the UK.
I never had to show my passport. I never, as far as I can see, legally entered the UK.
And if I'd made a break for it and jumped over the fence, then I would have been doing something very bad, even though I have a right to be in the UK.
And I kind of figured, well, you know, what happens when you're in immigration? Where are you?
And so I think it's very— if you want to be one of those people who go, "Oh, I know my rights," maybe you don't.
Because it's not quite the same as if you'd actually gone across the line.
You're in this area where they're saying, well, we're deciding whether you go, whether we're going to let you go forward and take those rights.
You know, I mean, the thing to understand is that these border searches are backed by immigration and terrorism legislation.
So that's, that's what, that's the reason they're doing this.
So in other words, being prepared to dispel any of these concerns to officers if they may, if, you know, if they occur, is a smart approach to right?
So you want to be prepared for questions like, what's the purpose of your visit? How long is the visit?
You know, have proof that you're not planning to stay in the US indefinitely, like a return ticket.
Have a clear schedule of where you're going to be, where you're going to be staying during your visit, and review what's on your devices and delete data or accounts that you don't need anymore or that you don't think is appropriate for this trip.
And encrypt anything sensitive.
It's not very fun for them to do. And I'm sure they feel that they've provided the same amount of information.
It's just, if you're on a list to be flagged, you know, and you're gonna be on that list indefinitely, and that makes international travel or travel to the US, it's gonna be pretty difficult.
And there's also that problem that if you do try too hard to stick up for your rights and you say, well, I'm not going to let you do it, then they can just shrug and go, okay, then you can't come in.
And they're perfectly entitled to do that.
And then the next time you go to the US or the UK or France or wherever, you have to tick that little box that says, "Have you ever been denied entry?" Yes, exactly.
And then underneath, "Tell us why."
So if you are on a list, if you are someone who you think, you know, you'd be concerned if you were stopped.
Obviously, we recommend on this podcast that people encrypt their hard drives and encrypt any sensitive information. You know, it just makes general good sense.
But I've also heard this idea of you should use an encryption program which accepts more than one password. And so you have the password to decrypt your regular working computer.
But maybe the encryption software could take another password, which is the one you use at border control, which maybe opens a different image. TrueCrypt, if you remember that.
The idea is that, you know, you refuse and you refuse and refuse and they beat you a little bit and you crack and you go, oh, and you give them a bit of the password, you give them a bit more and then they go, yes, we've got it.
And then they go in and there's this fake persona. Do you know how hard it is to create? Firstly, you've got a 1 terabyte hard drive, which has half a terabyte hard disk on it.
Well, that's interesting. What's in the other half? And you don't know how hard it is to build a likely image if you only keep it there for occasional stuff. I mean, think about it.
If you've got a Mac and you've split it so you've got Windows and Mac, and then after a while, possibly several minutes, you'll realize that there's not much point in booting Windows and you'll just stick in macOS all the time, right?
And so you'll boot Windows once a month, once every two months when you need to.
You're always going to be— and you know what a pain that is because you're always so far out of date, and then you have to sit for 4.5 hours while the partition you use less frequently.
Or if you have virtual machines and you only boot them once a month, you know what a pain it is. You boot them up, you think, oh, now I have to go through all the updates.
I really better do it that would have happened throughout the month. It's really hard to keep two lives in sync, intact.
We can't deal with this any longer.
Well, of course, once they can make an image of your files after you've decrypted them, I suppose that they don't, if they think you're not going to vanish off the face of the earth, they could always just take an image and then let you go and then deal with it later.
They can copy your whole hard drive, right?
So I guess what's changed the game a lot, and I can understand this, is the fact that at least the premium versions of Windows and all the Linuxes and all MacOses have— well, in macOS, FileVault, for example, BitLocker on Windows— they have this strong full disk encryption.
And man, you should be using that. It's not there because you're a crook or a terrorist.
It's there because people lose laptops, and it shouldn't be so easy that a crook can wander up, boot your device off a USB key and copy off every single file without even needing to know how that works.
Can be automated. It shouldn't be that easy. So you should be using full disk encryption.
But then I guess the flip side is that means that at the border they can't just go, okay, we're going to take an image, we're going to image your disk, because then they get the encrypted image and it would be no use.
So I guess that's also, as more and more people try to comply with what say the Information Commissioner's Office would love them to do and not have unencrypted laptops wandering around in public, as you try and do the right thing from one side of the government's viewpoint, then the other side is in this position that they actually have to sort of stop you and say, look, you need to put in your password.
He's a security and counterintelligence expert, and he deals with the consequences pretty honestly, I felt. So there's a note in the show links for anyone who wants to read more.
And finally, if anyone actually feels like they've been a victim of unwarranted digital invasion, the EFF would love to hear from you.
So do email if you have a story to tell. Was that a pun, unwarranted?
That actually when you're in that, what you might call the no man's land, then the usual stuff about warrants and First, Second, Third, Fourth, Fifth Amendments don't really apply.
You're in a kind of, you're in a zone with sort of its own laws, its own different regulations.
It does get, and of course we've got Mr. Assange in the Ecuadorian flat in Kensington, and he's not in the UK, but he's certainly in the British Isles.
So it gets a bit legally crazy in places like that, doesn't it? It does.
Don't forget, folks, we're on iTunes and Google Play Music and Stitcher and Overcast and all kinds of other podcast apps as well.
Even if you have one of those ghastly Amazon Echos, you can get us — if you have one of them, oh, that's the ever-seeing eye of Sauron in your kitchen.
If you're using one of those things, you can also listen to the podcast there. So check us out. Please leave a review. It really, really helps.
We really appreciate everybody who's leaving us reviews on iTunes.
It's fantastic and gives us more exposure to other people and hopefully spreads the word and really makes a big difference. So thanks for tuning in.
If you the show, tell your friends. And follow us on Twitter. We are @SmashingSecurity. That's "smashin" without a G "security" because Twitter wouldn't give us enough characters.
Why isn't our podcast name Smashin Security? Because we're on episode 11 now, Carole. It's going to be confusing. Do you think we should change the name of the podcast?
Tell us on Twitter if we should change the name of the podcast. Why not? Thanks, chaps. And we'll be back with you next week. Toodaloo. Bye. Bye.
If you go to foursys.co.uk/toolkit, you can download their pack which gives you everything you need to raise awareness about computer security issues inside your organization and train your staff.
Do you remember the URL, Carole?
