IEEE Cipher --- Items from security-related news (E168)






  • Russia Aims to Protect Its Cyberspace with Domestic Software
    Putin promises to bolster Russia's IT security in face of cyber attacks
    Publisher: Reuters
    Date: May 20, 2022
    Editing By: Kevin Liffeye

    Summary:
    Stung by a barrage of attacks against its state and private websites, Russia talked of relying on domestic software for protection. This shift seemed to be motivated by refusal of Western software providers to deal with Russia at all, rather than the thought that Russian could write better software.


  • Big Guns to Respond to Hacking?
    Russia says West risks 'direct military clash' over cyber attacks
    Publisher: Reuters
    Date: June 9, 2022

    Summary:
    As more Russian websites were hacked to show pro-Ukrainian messages, Moscow accused the West of "militarizing" cyberspace and indicated that unspecified military responses ensure.


  • The Australian Four-Character Encryption Key
    'Tough to Forge' Digital Driver's Licenses Are - Yep - Easy to Forge
    Researchers found a litany of security flaws that allow simple, quick, and cheap forgeries in Australia.
    Publisher: Ars Technica
    Date: May 25, 2022
    By: Dan Goodin

    Summary:
    There were so many security mechanisms built into the Australian digital driver's license system that you'd think it would take a world-class expert to find a flaw, let alone an exploitable flaw. But the anti-forgery mechanism in the app depended on a 4 digit PIN (so convenient!) and nothing else. A little searching on the device (no need to jailbreak!) would cough up the key, and the user could alter any information.


  • Apple Core Rot
    Researchers discover a new hardware vulnerability in the Apple M1 chip
    Publisher: MIT CSAIL
    Date: June 10, 2022
    By: Rachel Gordon

    Summary:
    Wouldn't it be nice if pointer errors, which are the root of so many exploitable software vulnerabilities, were impossible to exploit because the hardware prevented the access via the bad pointer? Of course it would, and the Apple M1 chip tries to do just that. But speculative execution undermines the pointer protection mechanism by allowing an attacker to guess the "pointer authentication code" and use it to bypass the protection. The hardware giveth and the hardware taketh away.


  • Spy vs. Spy
    Ron Wyden says White House right to raise doubts about possible deal for contractor L3Harris to take over surveillance technology
    Key Democrat warns of major security risk if US firm acquires NSO hacking code
    Publisher: The Guardian
    Date: 16 Jun 2022
    By: Stephanie Kirchgaessner

    Summary:
    US defense contractor L3Harris announced plans to acquire controversial surveillance technology by purchasing the Israeli firm NSO. Its tools have been used by governments around the world tracks the activities of mobile device user through surreptitiously introduced software. Senator Ron Wyden noted the danger of relying on foreign hacking tools, saying "If the US plans on using foreign-made surveillance technology, it might as well bcc the country that produces it on every intercept."

    L3 and NSO apparently have "issues" yet to be resolved in the negotiations.


  • US TikTok Users Get the Oracle Treatment
    TikTok moves US users' data to Oracle servers to address security concerns
    Publisher: CNN Business
    Date: June 17, 2022
    By: Brian Fung

    Summary:
    The social media video sharing company TikTok has Chinese ties, and that concerns the US Defense Department. Although the Trump administration failed in its efforts to ban the app, last year the Biden administration issued a more general order regulating software produced by "foreign adversaries." To comply, TikTok is moving the data for US users to Oracle servers based in the US, and Oracle will audit the servers to check for anomalous activity.


  • Italian Spyware Enters the Fray
    Apple and Android phones hacked by Italian spyware, says Google
    Report claims Milan-based RCS Lab developed tools to spy on private messages and contacts of targeted devices
    Publisher: The Guardian
    Date: 23 Jun 2022

    Summary:
    The Alphabet company Google has reported on hacking tools that were used to spy on both Apple and Android smartphones in Italy and Kazakhstan. The Italian software firm RCS is at the center of revelation, and it says that its software (named Hermit) complies with all applicable regulations. Google seemed upset that the software could be used on it Android operating system for mobile devices, and it has taken steps to secure the system against Hermit's means of entry.


  • A Billion Here, A Billion There, Soon the Whole Earth
    Hacker claims to have obtained data on 1 billion Chinese citizens
    Personal information allegedly taken from Shanghai police database would be one of biggest data breaches in history
    Publisher: The Guardian
    Date: July 4, 2022

    Summary:
    An anonymous hacker, "ChinaDan", last week posted an offer to sell the more than 23 terabytes (TB) of data for 10 Bitcoin, equivalent to about $200,000. The leak was unverified at the time of the Guardian publication, but other sources have said that the police database was installed without enabling a password for remote access.


  • Singular, but Not So Super
    Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour
    Publisher: Ars Technica
    Date: August 2, 2022
    By:

    Summary:
    One of the post-quantum algorithms selected for consideration by the U.S. National Institute of Standards and Technology is the The Supersingular Isogeny Key Encapsulation (SIKE) algorithm. Unfortunately, the algorithm turned out to be pre-quantum unsafe. KU Leuven researchers used a single classical computer to break it in only one hour using a previously known attack. How had this escaped notice in prior vetting allegedly done by NSA?