According to the recent Wikileaks documents, British spy agencies worked with the CIA to turn televisions and smart phones into bugging devices that can record conversations and even take photographs. IT security experts from Tripwire, FireMon, Vectra Networks, Core Security, Pushfor, Cylance, Varonis, Synopsys, Comapritech.com, Sentinelone, Balabit and Avast
Craig Young, Security Researcher at Tripwire:
End-users should recognize that there is always an inherent risk from connected devices having cameras or microphones as long as they are plugged in. Specifically, with Smart TVs, it is important to remember that pressing the power button is typically not going to perform a full power down as the device needs to receive signals from a remote control. This type of privacy issue is going to be increasingly important with the growing number of voice-first devices like Amazon Echo and Google Home. Consumers need to recognize that the only way to make certain that the device is not recording audio is to physically unplug them rather than simply pressing the mute button. Similar to how hackers have demonstrated the capability of activating web cams without turning on an indicator light, there is no guarantee that software on these devices is actually disabling the microphone.”
Paul Calatayud, CTO at FireMon:
.
Gunter Ollmann, CSO at Vectra Networks:
(2) As the tools and code are eventually released (by Wikileaks or accidently) it is guaranteed that they will be used worldwide within 48 hours of disclosure. By the time a business has read of the tool release in the news, they will have less than 24 hours to respond to the released threat. Since there appears to be a substantial number of “zero day” exploits – each of which may take weeks for vendors to investigate and provide fixes for, it is critical that organisations take preemptive steps to “dial up to 11” their anomaly threat detection systems and have their threat hunting teams working diligently pouncing on any new anomalies – with a perspective of zero-day exploits and false-flag malware attribution trails.
(3) The public disclosures of zero-days and attack tools for Samsung TVs and webcams will be very popular to all hackers – both criminal and hobbyists. Businesses that employ such technologies within their offices should preemptively be taking steps to selectively disable such video and sound capturing capabilities when not specifically needed for business operations. This may entail using electrical tape to cover TV video lens, physically disabling microphones when not in use, etc. Going in to the device administration settings and disabling video and audio functions are highly unlikely to be effective – as any hacks against such devices can easily bypass or present false configuration settings to the admin and user interfaces on the device.
Willis McDonald, Senior Threat Manager at Core Security:
The leak of these documents definitely has caused financial harm to the CIA. Response to the leak of the documents will require a massive research and retooling effort in the CIA. Everything from tradecraft to tools will need to be changed in order for operations to continue undetected which will cost millions of dollars and months of training and development.”
John Safa, Security Expert and Founder at Pushfor:
“It’s not enough to encrypt data in transit. Using the CIA methods, it can be stolen at the device level, before it gets encrypted. Thus making the new security improvements in WhatsApp easy to bypass.
“So many companies rely on free communications tools such as WhatsApp which use the public cloud. They are at risk and and these free messaging apps should be banned for corporate use. They need to take back control of their own data environments and secure data in a walled garden where they have more control.
“It’s similar to the Sony DRM Rootkit scandal that happened 12 years ago. The unintended consequence of Sony putting copy protection software on its CDs was that it created a massive backdoor for hackers to access and plant malware on PCs. The same will happen now. Ostensibly, the CIA uses hacking tools to prevent terrorism and crime. But the leaking of the source code for these tools, they’re opening the tools up to hackers and criminals.
“The ramifications of this are massive. It opens companies up to crime, data theft and corporate espionage.
“I find it fascinating that Deutsche Bank had banned corporate use of free messaging apps like WhatsApp just weeks ago. They’re looking pretty smart for doing that now.”
Jim Walter, Senior Researcher at Cylance:
.
.
Brian Vecci, Technical Evangelist at Varonis:
“In performing forensics on the actual breach, the important examination is to determine how 8,761 files just walked out of one of the most secretive and confidential organizations in the world. Files that were once useful in their operations are suddenly lethal to those same operations. We call this toxic data, anything that is useful and valuable to an organization but once stole and made public turns toxic to its bottom line and reputation. All you have to do is look at Sony, Mossack Fonseca and the DNC to see the effects of this toxic data conversion.
“Organizations need to get a grip on where their information assets are, who is using them, and who is responsible for them. There are just too many unknowns right now. They need to put all that data lying around in the right place, restrict access to it and monitor and analyze who is using it.”
Lee Munson, Security Researcher at Comapritech.com:
“Whether the alleged cyber weapons exist or not is largely immaterial at a time when I assume most people believe they do.
“What the Vault 7 leaks should do, however, is confirm that, while taking a nothing to hide, nothing to fear approach is hopelessly out of date, most citizens should not be any more concerned about surveillance today than they were yesterday.
“While exploits across a range of devices and the ability to turn on cameras and microphones is a touch chilling, they’re nothing new, and anyone with real concerns should already be going about their business with those possibilities in mind.
“The really interesting aspect to this leak, however, is how the alleged cyber spying tools all appear to have one thing in common – the need to acquire information over the wire.
“That means, for now at least, we can assume that messaging systems with strong end-to-end encryption are beyond the reaches of the security services; a win for everyone who is truly concerned about protecting their privacy today.”
Andy Norton, Risk Officer – EMEA at Sentinelone:
OSB chose Windows PowerShell as the execution vector because it is installed by default on all Microsoft’s operating systems since Windows Vista and it runs as trusted, Microsoft-signed process. RickyBobby 4.x can be installed remotely or with physical access to the target computers using batch files. This underlines the trend towards ¨fileless¨ attacks as strategies developed at this level filter down to a broader threat”
Matthew Ravden, VP at Balabit:
Perhaps the greatest irony here, then, is that despite all their technology might, the CIA is unable to properly monitor its own staff. They can hack Samsung TVs but can’t spot an unusual server access or abnormal data dump. It’s well known that an organisation’s so-called ‘privileged users’ are its greatest vulnerability, and it only takes one individual with the requisite ‘clearance’ to cause this kind of mayhem. Clearly the lessons from the Snowden affair have not been heeded, and better monitoring and analytics technology is needed to stop these leaks from happening. For once, we in the commercial sector can feel slightly smug.”
Sinan Eren, VP at Avast:
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.