기본 콘텐츠로 건너뛰기

A dumb security flaw let a hacker download US drone secrets

Sensitive files about the MQ-9 Reaper drone and M1 Abrams tank could be accessed because of an unpatched router. It was totally avoidable


A hacker used a basic security vulnerability to access highly sensitive files relating to the US military's spy drones and tanks, new research claims. Security firm Recorded Future says it discovered a criminal attempting to sell the secret information for only a few hundred dollars on a dark web forum last month. 
The documents, which were advertised at between $150 and $200, included technical details of the MQ-9 Reaper drone. The drone has been used for unmanned surveillance missions for the military and other organisations including border control. Maintenance manuals and a list of airmen who were assigned to work on repairs were allegedly being sold among a cache of classified data.




The information was exposed after two members of the US military connected to the internet through Netgear routers that still used the default log-in settings for file sharing. The bypass for the routers was first discovered two years ago and devices still vulnerable haven't had their firmware updated. 
Andrei Barysevich, a dark web expert at Recorded Future, says some of the documents were taken from the computer of an Air Force captain working at a base in Nevada. "Another thing he [the hacker] was claiming to have access to was a broad range of live CCTV cameras, including those installed on surveillance planes and across the US-Mexico border and checkpoints, highways, and the drone that surveys the Gulf of Mexico," Barysevich says. 




One of the files exposed was a certificate saying the captain had successfully completed cybersecurity training. A second member of the military was also impacted, with maintenance documents for the M1 Abrams tank and details of how to defend against improvised explosive devices (IEDs) being put up for sale. 
The files were advertised for sale on a dark web forum, Recorded Future says, though the firm believes nobody purchased the documents. Recorded Future would not provide the username of the alleged hacker or the forum that the details were being advertised on. Barysevich says the firm is continuing to work with law enforcement.

WIRED contacted the US Department of Defense for comment on supposed documents and details but had not received a response at the time of publication. Barysevich says he is "pretty much 100 per cent certain" the documents being advertised for sale were genuine.
The security researcher says he began talking to the hacker on the dark web forum but moved to an encrypted messaging app to be provided with screenshots of sample documents. These included potential images from drones and technical documents for other military equipment.
"Pretty much immediately after we reached out to law enforcement and passed information to the airforce, he deleted the advertisement saying he lost access to the vulnerable system," Barysevich says. He doesn't know how much of the data was downloaded by the hacker as it was claimed the person had a poor internet connection and low bandwidth. As a result, they allegedly didn't download everything which was available until a buyer had been found.




The incident is the latest case of insecure routers leading to security vulnerabilities. Barysevich says the hacker scanned the Shodan search engine, which shows internet-connected devices, for Netgear routers that may not have had their default details updated. 
Once a device has been located it can be accessed remotely and the File Transfer Protocol system could be accessed using the username 'admin' and password 'password'. Recorded Future says its scan of Shodan revealed 4,000 devices that could be compromised using the method. This is down from 6,000 when the problem was first reported in 2016. Shodan searches only show devices that are currently active and connected to the internet.
In April this year, cybersecurity officials in the UK and US issued a joint warning to individuals and businesses highlighting their belief that routers – as well as other technical equipment – were being compromised by Russian hackers. Millions of devices had been targeted through man-in-the-middle attacks and intellectual property could have been stolen. The routers were being targeted to "potentially lay a foundation for future offensive operations".
Separately, malware that's been dubbed VPNFilter has been found in more than 500,000 routers. The malware, which was first discovered by Cisco’s Talos security team, has the potential to completely shutdown the router and kill its internet connection. "The behaviour of this malware on networking equipment is particularly concerning, as components of the VPNFilter malware allows for theft of website credentials," Cisco wrote as it published details of the malware in May this year. 
In the most destructive incident so far, routers and other Internet of Things devices were used as part of a mass botnet that temporarily took down the internet for millions of people in October 2016
The continuing vulnerabilities in routers show how fragile connected devices can be. "He was abusing this system and method on a daily basis," Barysevich says of the hacker who targeted the US military. "He told us he scans Shodan for new victims and then spends the entire day dong from system to system to see if anything of any value could be obtained." It is claimed documents from a cryptocurrency company, a medical practice, a supply chain provider to oil and gas provider were all exposed using the same method. "He didn't know the true value of this data," Barysevich says.

 Wednesday 11 July 2018

댓글

이 블로그의 인기 게시물

지문 넘어 정맥·홍채로...4000억원 '생체인증' 선점경쟁

4000억원 규모 국내 생체인증 시장을 선점하기 위해 관련 업체 경쟁이 치열하다. 생체인증시스템이 현금자동입출금기( ATM )부터 공항 신분확인, 기업 출입관리까지 다양한 분야로 확대된다. 지문인증을 넘어 손바닥, 손가락 정맥(장정맥, 지정맥)과 안면, 홍채 등 다양한 신체 부위를 활용한 인증 솔루션이 각광 받는다. 25일 업계에 따르면  Sh 수협은행은 장정맥 기반 금융서비스를  ATM 에 먼저 적용한다. 자체 기기에 도입하는 데 그치지 않고, 장정맥 인증 확산을 위해 타행· GS 리테일과 제휴도 추진한다.  GS 25 편의점 내  ATM 에서 장정맥 인증으로 입·출금, 계좌이체 등이 가능해진다. 신협중앙회는 손가락 정맥패턴을 이용한 '지정맥' 인증 시스템을 고객 간편결제 서비스에 도입하는 방안을 검토한다. 지난해 시스템 통제와 임직원 확인용 지정맥 인증을 사내 도입했다. 생체인증은 금융권 중심으로  ATM 과 개인금고, 공항, 기업 출입 등 다양한 곳에 활용된다. 한국후지쯔는 신한은행 시작으로 국민은행, 우리은행,  NH 증권, 롯데카드, 케이뱅크 등에 장정맥 인증 서비스 '팜시큐어'를 공급했다. 제주·김포공항에 장정맥을 이용한 실명확인 시스템을 구축했다. 동서석유화학,  SK 텔링크 등 일반 기업도 도입했다. LG 히다찌는 지정맥 인증 서비스를 신협중앙회 사내통제시스템뿐 아니라  BNK 부산은행 스마트  ATM 에도 공급했다. 부산은행은  ATM 뿐 아니라 은행창구 등에도 지정맥을 활용한다.  LG 히다찌는 신한카드, 나이스정보통신 등과 업무협약을 맺고 오프라인 간편결제로 지정맥 활용 준비 작업에 나섰다. 계명대 동산의료원과도 업무협약을 맺고 병원 인증시스템 도입도 검토한다. 국내 스타트업 위닝아이는 카메라를 이용한 손바닥 인증 기술을 전북은행 '뉴스마트뱅킹', 한화손해보험 '스마트인슈', 신영증권 등에 공급했다. 현대모비스와 손잡고 차량용 인증 기술 개...

Cold Wallet Vs. Hot Wallet: What’s The Difference?

You may have heard about cold and hot digital wallets but do you know how they are different from each other? The simplest way to describe the difference between a cold wallet and a hot one is this: hot wallets are connected to the internet while cold wallets are not. Most people who hold digital assets have both cold and hot wallets because they are designed for different purposes. Hot wallets are like checking accounts while cold wallets are similar to savings accounts. People who have digital assets keep a small amount of money in their hot wallets for purchasing stuff. They keep the vast majority of their digital coins in their cold wallet. If you like Medium articles in video form, you’re in luck: SECURITY Q: Why do people keep most of their digital coins in a cold wallet? A: Hackers cannot steal digital assets that are not connected to the internet. Q: So then, how safe are hot wallets? A: The security of hot wallets is dependent upon the security ha...

Avoiding Cryptocurrency Scams

The Money Makers Club now has 6 of 15 available seats. Learn more here! Everyone is always focused on the potential upside of buying cryptocurrency, but they forget there are always going to be hidden downsides as well. The downside risk of investing in cryptocurrencies is huge. Not only do you need to worry about the high volatility of these assets, but you also need to bear in mind that theft is always a possibility, and the assets are poorly regulated.  Lack of Regulation Creates Opportunity for Thieves In the equity and debt markets, there are stringent controls on the way capital is invested and the rules that govern investors. The goal is to protect investors from any fraud or wrongdoing, and even though there are times where it takes regulators longer than normal to catch on (see: Bernie Madoff), the general effect is a safer investment marketplace.  Fraud can occur in a variety of ways. It can be the result of false claims by the company regarding the s...