Under Armour: My FitnessPal Hack

On March 25, 2018, Under Armour was alerted of a breach that took place in February 2018. Under Armour notified the media, that 150 million MyFitnessPal user accounts were hacked from the breach of its database. However, since information like Social Security numbers and drivers license weren’t even asked for by the app, and since payment cards were processed separately, they were not stolen in the data breach. The stolen data consists of account usernames, as well as the email address associated with it and the hashed passwords. Meaning that though the passwords were obtained, they remained encrypted. The reason this is important to note is because, though the hackers have access to the above mentioned info, they still don’t have all the account passwords. Therefore, users still have time to change their passwords. Since many users use the same username and password across multiple sites and applications, it would be a good idea for them to change their passwords on their other accounts as well. Nevertheless, the risk still remains from this data breach. With the emails, the attackers are able to send phishing attacks to the user, making the email seem like its from the fitness app. Under Armour said it is working data security firms and law enforcement, but did not provide details on how the hackers got into its network or pulled out the data without getting caught in the act.

 

Sources:

https://www.reuters.com/article/us-under-armour-databreach/under-armour-says-150-million-myfitnesspal-accounts-breached-idUSKBN1H532W

https://www.slashgear.com/under-armour-myfitnesspal-hack-5-things-to-know-30525418/

-Noor Mohammad

Myfitnesspal.jpg

Advertisements

‘Gray Hat’ Hackers Can Be Good

With the internet becoming available on just about any device one can get their hands on, the incidents of hacking can rapidly increase. Smartphones and computers have been the main devices being hacked by cyberhackers before the internet has quickly become available in other machines and technologies. The vision of the future is seen with flying cars and robots, but these things would have to be connected to the internet to function. If any of these things in the future are connected to the internet, then cyberhackers will have more options of technologies to hack. Devices and machines, like cars, coffee makers, and thermostats were once not apart of the internet and that was a beneficial thing in society. But, vast new forms of technology and electronics that were once around as another form, are now more modern with today’s devices that are connected to the internet. We can easily access our cars, televisions, and thermostats with our cell phones now since they are all connected online. These new ways of interacting with electronics may seem fascinating to many in society but they don’t realize that this only gives hackers more opportunities to hack innocent people and businesses.

In the article, a famous hacker and former cybercriminal, Samy Kamkar, helped demonstrate how easy it is for hackers to gain access to other people’s electronic property, by hacking into a car. First of all, Samy is a “gray hat” hacker, meaning he is a good and bad hacker that hacks into devices to search for its weak vulnerabilities only to share with others his findings so they can patch up those weaknesses. Coming from a cybercriminal to a hacker who helps the world with hacking, just shows how much we might need to rely more on people like Samy. The world is becoming more connected through the internet with normal appliances used by people every day, to being used by hackers as cyberweapons and a new way to gain access to a victim’s wallet. Samy was able to use his own gadgets to hack into a random smart car by duplicating the connection with car’s actual key with Samy’s gadgets to be able to unlock the car. Samy showed that we aren’t taking our security as seriously as we should be. People often have weak passwords that they usually use for more than one of their accounts and devices that create a greater advantage for cyberhackers. I believe the world needs more good “gray hat” hackers like Samy Kamkar that can help teach and show others where there are weak vulnerabilities in smart appliances and devices. The more vulnerabilities that are fixed, the less hacking we will hopefully have in the world.

Image result for gray hat hacker  Related image

Sources: https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point

https://es.paperblog.com/samy-kamkar-hacker-piratear-es-positivo-la-necesidad-de-entender-al-hacker-para-estar-protegidos-3567883/

http://96eb74f3955cce95f97e138c47dfde41.blogspot.com/2015/03/grey-hat-hackers.html

-Matt Aiguier

Recently Found Glitch in iOS 11.2.6

In Apple’s latest iOS version, there’s a major security breach involving Siri.

To protect user’s privacy, users can set their notification contents to hidden, requiring them to unlock their phone in order to see the messages. However, if the user asks Siri to read the notifications, Siri will read the contents of the message. This is a pretty big issue, as anyone could access those messages when they were supposed to be secured.

Apparently the bug only works with third party apps such as Facebook Messenger, Skype, WhatsApp, Telegram, and Signal. The only app not affected is Apple’s own SMS texts and iMessage.

Email information can also be read directly off the lock screen. Details such as sender, subject, and message content are accessible.

According to Apple, the issue will be resolved in a future update.

iphone-x-lock-screen-notifications

-Jessica Prost

Sources:

https://threatpost.com/apple-to-fix-glitch-allowing-siri-to-read-hidden-messages-out-loud/130721/

https://mashable.com/2018/03/21/siri-iphone-lock-screen-bug-exposes-messages/#rRWd0iW6Saqa

Pre-Installed Malware Found on Nearly 5 Million Android Devices

A malware referred to as RottenSys has been discovered to have infected nearly 5 million devices since 2016. It is possible that the malware could have been installed on older devices as well.

Check Point Software Technologies, the company that discovered the infections, found that 49.2% of the infected devices had been shipped through Tian Pai, a Hangzhou based mobile phone distributor. At this point, it is not clear if Tian Pai is directly involved or not. The manufacturers that have been affected are Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung and GIONEE.

The malware is disguised as a System Wi-Fi service app that has no malicious code and doesn’t initially perform any malicious activity, in order to go unnoticed. After a set amount of time, the program communicates with its Command and Controller (C&C) server to download the components required for its activity. RottenSys then is able to use multiple open-source Android frameworks to ensure the continued functionality of the RottenSys and to feed advertisements to the user. From March third to March twelfth, the malware had generated over $115,000 in ad-click revenue.

It is unclear what the developers of RottenSys plan to use their massive botnet for besides aggressively serving people ads, but they do have the ability to send any code they want to the infected phones. This means they would be able to have the phones participate in large-scale botnet attacks.

In order to remove the malware from a device, a user has to remove four separate packages.

Package Name App Name
com.android.yellowcalendarz 每日黄历
com.changmi.launcher 畅米桌面
com.android.services.securewifi 系统WIFI服务
com.system.service.zdsgt

There is nothing that consumers are able to do to prevent an attack of this nature from occurring. The only thing we can do is be extremely paranoid about the applications that come pre-installed on our phones. We need to check the permissions that the applications request and determine if the permission is something that the application should need. Of course, this is not a reasonable thing to ask of most people to do, and so most people are left at the mercy of the industry to keep their devices safe.

– Zachary Campanella

Sources:

https://research.checkpoint.com/rottensys-not-secure-wi-fi-service/

https://thehackernews.com/2018/03/android-botnet-malware.html

http://securityaffairs.co/wordpress/70299/malware/rottensys-botnet.html

@fail0verflow(twitter) and the Nintendo Switch running Linux.

@fail0verflow did not put up a full write-up of his exploit, but he uses some key phrases to explain what is going on.

‘coldboot exploit’

‘bootrom’

‘no modchip’

A cold boot attack is an attack that yields access to the pre-boot physical memory. This is commonly done to obtain keys that are stored in this memory. One form of this attack uses extremely low temperatures to prevent the data degradation of the volatile memory. Data degradation in volatile memory is simply the part of the process where the memory is erased. The extremely low temperature of the memory can slow this degradation from milliseconds to an interval of time that allows the memory to be moved and or read by the attacker.

BootROM is the code that is first executed when the device is turned on. The BootROM may authenticate the boot image via some encryption form. Secure BootROM coding is VERY important because it is usually not updatable by the upper layer of software. This is why @fail0verflow claims that the Switch cannot be patched to prevent what he is doing.

A modchip is something pretty common to some of the console hacks of the past. A modchip is just a motherboard, chip, or otherwise other physical add-on that circumvents the limitations of the stock hardware. Modchips can help to get around DRM and allow full control of the already owned hardware.

There’s a lot of hype over this exploit, as there’s a huge Nintendo home-brew community. Obviously Nintendo doesn’t want this to go public, as these types of exploits have been used in the past to spread free copies of copyrighted content (games).

 

-Matthew J. Harris

 

REFERENCES
Source

Cold Boot
https://en.wikipedia.org/wiki/Cold_boot_attack

BootROM
https://www.design-reuse.com/articles/38778/how-to-ensure-a-bug-free-bootrom.html

modchip
https://en.wikipedia.org/wiki/Modchip