Tuesday, August 17, 2010

Android Game Doubles as Spy Application...

The application, known as Tap Snake, is a version of a 1970s video game called ‘Snake.’ What u probably didn't know, was that Tap Snake is also a client for a commercial spying application known as GPS Spy. Tap Snake looks like an average game, but there are two hidden features. First, the game won't exit. Once installed, it runs in the background forever, and restarts automatically when you boot the phone. And secondly, every 15 minutes the game secretly reports the GPS location of the phone to a server.

Once the game is installed, an attacker with physical access to the Android device can program the game to report the device’s location to another system running GPS Spy. While the game is free, GPS Spy costs $4.99, and install the Tap Snake game on whatever device u want to spy on.  GPS Spy downloads the data from the device running Tap Snake and displays it as location points in Google Maps.  For it to work, an email address and “key” must be typed into the phone running AndroidOS.Tapsnake, The same registration information must later be typed into the phone running GPS Spy.

Like all Android applications, Tap Snake requires users grant permission for it to do what it does so well.

Monday, August 16, 2010

iPhone Jailbreak Exploit Code Goes Public


The mind behind a new jailbreak for the iPhone released source code for his tool, which leverages two vulnerabilities in Apple’s iOS mobile operating system that can be used to take over iPhone, iPad and iPod touch devices. He posted source code attackers could use to compromise devices. "Comex," posted code for JailbreakMe 2.0 on the Web Aug. 11 after Apple released a pair of fixes for the iOS bugs the jailbreak leverages (patches). The first issue exploited is a FreeType CFF (Compact Font Format) handling issue, exploitable via Mobile Safari to gain access to affected devices. The second issue exploited is an IOSurface framework issue that allows for administrative privileges to be obtained.  If the bugs are exploited successfully, they could allow an attacker to remotely compromise a device and take full control.

According to an advisory from Apple, the patches–which came roughly a week after JailbreakMe 2.0 hit the street - are available for: iOS 2.0 through 4.0.1 on iPhone 3G and later, iOS 2.1 through 4.0 on the iPod touch (second generation) and later and iOS 3.2 and 3.2.1 for the iPad.  See my earlier post on iPhone jailbreak (http://darkcell9.blogspot.com/2010/07/jailbreaking-apple-iphone-gets.html)

Monday, August 9, 2010

The Hacker Manifesto

Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...

Damn kids. They're all alike.

But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...

Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me.. . Damn underachiever. They're all alike.

I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..."  Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me.. Or thinks I'm a smart ass.. Or doesn't like teaching and shouldn't be here...

Damn kid. All he does is play games. They're all alike.

And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all...

Damn kid. Tying up the phone line again. They're all alike...

You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.

This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.

A new zero-day bug affecting Windows.

Poor Microsoft. 2010 just has not started off looking good. Microsoft is investigating a "new" report of a vulnerability in Windows that can be exploited to gain elevated privileges. Microsoft confirmed that the bug, a privilege escalation issue in the operating system's kernel, is being analyzed. Danish security firm Secunia published an advisory on the bug Aug. 6, identifying the issue as a boundary error in Win32k.sys that can be exploited via the "GetClipboardData()" API to cause a buffer overflow. If successful, attackers will be able to execute code with kernel privileges, according to Secunia, which warned organizations to only grant "access to trusted users." Microsoft is of course investigating reports of a possible vulnerability in Windows Kernel," said Jerry Bryant, at MRC.  The bug has been confirmed to work on most editions of the operating system, including Windows 7, Windows XP SP3 (Service Pack 3) and Windows Server 2008 SP2. The danger comes from the fact that this vulnerability affects "all" Windows versions including Windows 7, However, exploitation is not trivial due to the nature of the flaw and due to a hardcoded value of 4 being written into the buffer every fourth byte of the source data to be copied.

VUPEN and Secunia rated the vulnerability as a "moderate risk" and "less critical," respectively.  The bug was first reported by a researcher going by the name "Arkon," who has posted a proof-of-concept exploit on the Web.

As a side note, microsoft also stated that they have no plans to pay researcher-per-bug rewards as Mozilla and Google do, though the company has spent a lot of time in the past several weeks dealing with issues around bug disclosure. As part of its monthly Patch Tuesday update, Microsoft plans to release a total of 14 security bulletins tomorrow, the most on record for the company ever .

Friday, August 6, 2010

MS Patch Tuesday heads-up: 14 bulletins, 34 vulnerabilities

Just when you thought you were in the clear and done with patching..Microsoft is planning a very busy Patch Tuesday this month: 14 bulletins, patches for 34 vulnerabilities in Windows, Microsoft Office, Internet Explorer, SQL and Silverlight. According to Microsoft’s advance notice for the August batch of patches, eight of the bulletins carry a “critical” severity rating.  The other six are rated “important.” A critical bulletin typically covers vulnerabilities that could be exploited to launch remote code execution or drive-by-download attacks.  All versions of Windows are affected by the patches this month — from Windows XP SP3 through Windows 7 and Windows Server 2008 R2. The patches will ship on August 10, 2010.

Inside the Botnet Business: Getting Rich Quick

Starting a career in Cyber-crime is relatively simple, but, just how do attackers go about building a botnet into a multimillion dollar business? Of course, the biggest concern for botnet builders lies with attribution i.e., things that can be tracked directly back to the individual. As such, budding botnet builders (at least those who have thought about things before tinkering), will focus on how to acquire free malware-building tools "anonymously of course" and how to use other free services to host critical infrastructure components. the most-common process tends to be for builders to develop kit-based, botnet malware such as Zeus, SpyEye and PoisonIy , and have the malware hosted on free Web services.

Many early-stage botnet builders utilize deception to trick their victims into installing the malware on their computers—but most eventually evolve into more sophisticated campaigns that involve fake Websites and Web browser exploitation, A key component in building botnets lies with the management of Domain Name System (DNS). As such, free Dynamic DNS providers are preferred service providers for botnet builders, especially when [the botnets] can be set up and managed anonymously.

From there, it’s time to talk business plan. There are botnets involved in spamming, rogue antivirus, and other schemes. Today, however, the highest cash reward versus the likelihood of being noticed by law enforcement would be “identity laundering.”

“Identity laundering is the process of taking all of the identity information observed on a botnet victim’s machine, and laundering the information through gray-market and legitimate sites/services that pay for the information and resell [it] to legitimate companies, Through this laundering process, a botnet operator can turn a 0.1 cent record into 30 cents, and that information gets consumed by legitimate organizations. By making use of existing lead-affiliate programs [also known as "lead-generation" programs], it’s possible to earn up to $20 per record. Most importantly, though, the likelihood of detection by the victims is practically nonexistent, and in many ways no financial fraud is being perpetuated.

Most botnets are run by professional teams, who may be involved with multiple botnets at any one time. Many of the botnets are around 2,000-strong, with those operating within enterprises being even smaller—typically having only a few hundred bots. That’s not to say that the large named botnets—e.g., Koobface, Conficker, Bobax, etc. don’t also penetrate enterprise networks and aren’t large. These botnets can reach the millions in size—but are only a tiny fraction of the botnet business. The vast majority of criminal botnet operators intentionally focus on avoiding detection, and size will get you noticed the quickest.

Managing a botnet is usually easy, especially if the botnet builder uses popular do-it-yourself construction kits. These management consoles come equipped with functionality to manage stolen identity information, coordinate and batch instructions to infected computers, as well as other capabilities. The tools are very plentiful and, if they’re not free, they’re cheap. Even the most expensive, fully supported, cutting-edge, criminal do-it-yourself kits can be acquired for a few thousand dollars, with a lesser annual subscription-renewal fee.