Tag Archives | information security

Everybody can hack into your Blink wireless router!

It’s not a secret anymore that the routers you get from Ogero once you subscribe to their Blink DSL service can easily be hacked since their WiFi password is very easy to retrieve.

First of all, Blink routers are by default secured using WEP encryption which is very weak and can be cracked using wireless penetration tools. Second, they can easily be identified since they all have an SSID (network name) following this pattern “BlinkXXXXXX” where XXXXXX is a 6 character code, and this isn’t just any random code as it is derived from the router’s serial number. Unfortunately, the same applies to the WiFi password, it isn’t generated randomly but rather derived from the router’s serial number as well.

Logically speaking, if you encounter a Blink network and were able to reverse the operation in a way that lets you guess the router’s serial number from the 6 character code in the SSID, retrieving the password would then be a piece of cake since it can be derived from this serial. That’s basically what some people have been doing for a while now since several tools are already available online allowing you enter the 6 character code once you stumble across a Blink network, and gives you the password in a few seconds.

Up until lately, I was thinking the usage of these tools was somehow minimal and limited to techies since you will rarely find them on Lebanese website, until I lately came across this new Android application called “Hack Blink” with a download count of over 10,000 and rapidly increasing.

hack blink

Using the application is very straight forward, you enter the code and wait for the password, I tried it and it does work. So if you have a blink subscription, be sure someone around you will soon or later have this application and eventually start consuming your bandwidth.

Fortunately, there is a way to stop people from doing that by reconfiguring your router using this manual I found on Ogero’s website (which applies to Thomson routers). I strongly recommend you use that manual to change your SSID and setting the encryption algorithm to WPA2, in addition to of course changing the default wireless password. If you encounter any difficulty, make sure to either contact their customer support or just head to the nearest Ogero office in order for some support person to help you do it.

Best solution is definitely for Ogero to stop ordering their routers to be configured this way!

Thanks to @ZuZ for the information he previously provided in this post.

Update:

@AbirGhattas just informed me “Hack Blink” was removed from the Play Store. I still recommend you change your router’s default settings.

17

No, our banks are still vulnerable to cyber attacks

Remember when it was revealed back in August that many Lebanese bank have been targeted by a malware called “Gauss”? I bet people are starting to forget about the matter and there’s really nothing wrong about that. I mean you can’t expect people to keep talking about the issue for ever, but what’s really worrying is when regulators disregard the threat this malware is still posing to the information systems at our banks.

On September 15th, an article was published in The Daily Star aiming to assure everyone that Lebanese banks are safe and no one will be able to break into their systems because of the “preventive measures” they’re taking. What measures you may ask? Updating their antivirus programs.

Lebanese banks have upgraded their software security systems to block any virus designed to spy on transactions and operations, the Central Bank and IT experts said Thursday.

Jonny Torbey, the head of the IT department at Credit Libanais, said Lebanese banks have developed a security system to prevent any outside party from penetrating their computers regardless of how strong the virus. Read more here

I don’t claim to be a security professional, but I work in the IT sector, and if you also have some basic knowledge in IT and Information Security, you’ll know that updating programs and virus definitions is not sufficient to be protect yourself from cyber attacks. Even the biggest organizations in the world are not immune to attacks, but the difference is in how these organizations react when facing such issue, and that can only be done with proper policies, standards, processes, and systems in place.

A group of independent security professionals wrote this reply to let people know why these actions are insufficient and I decided to publish it here for you guys to read.

Lebanese banks upgrading anti-virus systems: Isn’t it business as usual? Are they truly willing to fight back?

First and foremost, the authors are speaking as Lebanese banking customers who happen to be subject matter experts!

Some of us have had first hands experience reacting to the Gauss Malware in Lebanese banks, and we have taken notice of the Central Bank memorandum released to the IT Departments of all Lebanese banks as well as last week’s related press release.

We can quite understand the need for such communication. It was surely aimed at re-increasing the level of confidence in Lebanese banks in the media and reassuring the general public, who are mostly illiterate in the works of Gauss.

However, knowing how lethal and stealthy the Gauss malware is, we are afraid that such an analysis, if considered sufficient and remained unchallenged, is hurting the Lebanese Banking’s sector reputation rather than increasing confidence in it.

Indeed, the quoted explanations might be misleading and give the impression that the Lebanese Central Bank might have not fully understood the dynamics of the Gauss malware, specially that the latter targets customers’ workstations rather than the banks’ Information Systems.

The reported solution consisting of upgrading the anti-virus systems alone will not prevent future sophisticated malware from targeting the Lebanese banking sector again! More dangerously it might encourage more lethal and frequent hacking and cyber-espionage…

Gauss falls into the category of highly advanced cyber-espionage attacks, more commonly known as Advanced Persistent Threats (APT), and is far from being a playground for script-kiddies.
By only conveying simplistic views about Gauss, the banking sector might not be showing enough readiness to fight back.

Moreover, when it comes to the Lebanese banking sector intrinsic sensitivity, it is quite shocking to read “Other bankers confidently say that they are not concerned about any virus because they insist that they have nothing to hide.”

Is the Lebanese Central Bank enforcing security standards as it should? Is it emphasizing more on implementing policies and procedures? Is there enough security awareness preached and are banks investing enough in this area?

Regulatory authorities should really focus more on pushing Lebanese Banks to become ISO 27001 certified with a clear Information Security Management System (ISMS).

Such a continuous improvement lifecycle will concretely increase Lebanese Banks’ reputation when it comes to operational risk management.

Apparently, much more work needs to be done there, and it’s not that great to hear about these attacks targeting same assets once again. We sincerely hope this will trigger some sort of a more serious action! An information security program must exist, and must be based on a well-established strategy with measured deliverables, and clear accountability for all the involved parties.

As too much time has elapsed between the Gauss info disclosure from Kaspersky and the “public” reaction from the Lebanese Central Bank, one could legitimately look for an officially appointed crisis management spokesperson. Such speaker would rely on a Computer Security Incident Response Team (CISRT) and/or relevant structure in order to protect the sector and the public from unverified media delivery and from misleading information.

It’s not a shame to admit our shortcomings as long as we are determined to work on eliminating them and reassuring the customers in parallel about all sorts of required actions taken to contain and eradicate this malware from the internal workspace.

Remember, big worldwide financial and non-financial companies got compromised too. Even the most sophisticated information security organizations’ operations got hacked as well, but with proper ISMS in place, they were able to stand on their feet and react quickly and expertly.

Remember the Confidentiality, Integrity, Availability (CIA) triad? It’s a great model, but we prefer CIAA instead – Last “A=Accountability” is what matters everywhere used…

To end on a lighter note, we all recall that Lebanese applause when the plane lands safely in Beirut airport but isn’t it business as usual to have a successful landing? The same applies to bankers “continuously updating their antivirus systems”: Isn’t it business as usual?

Sustainable security can only happen with a process enhancement security program!

4

iPhone applications violating our privacy

I saw that coming the minute a friends of mine showed me two databases that can query all info related to a registered car or phone line (be it mobile or land line) in Lebanon!


That’s how much info you can get by supplying the cars database with a car plate number


The phones database gives less info and can be queried using either the phone number or the number owner

According to Now Lebanon, Blogging Beirut, and Blog Baladi, these two database went online via two mobile applications and are now available to iPhone, iPod, and iPad users on the Apple Store, which is of course a disastrous news for each and everyone of us, as it is a pure invasion of privacy!

The fact that the two databases were stolen from the ministry of interior affairs is nothing weird, but taking advantage of it by a development company is RUDE, and it’s our privacy they’re selling!

Here’s some info about the development company (taken from their domain whois):

Ziad Salameh
DoubleU S.A.L
81St. George Bld. – Maarad Str.
Nejmeh Square ,
Beirut, Downtown, Beirut 00961
Lebanon
(961) 198-8883

Domain Name: UUAPPS.COM
Created on: 04-Mar-10

Please do report the applications to Apple by following Blogging Beirut‘s steps:

  1. Load the App Store
  2. Search for “Lebanon Directory”
  3. Select any of the following apps:
    – Lebanon Directory
    – Lebanon Cars Directory
  4. Click on the “Report a Problem” link in the top right corner
  5. Select either:
    – This application is offensive
    – My concern is not listed here
  6. Enter your Comments, something along the lines of:
    “This application uses a stolen database of confidential personal records from the Interior Ministry of Lebanon. The use of the database outside of the Ministry is illegal. The possession of this data by a non-government agency is illegal.”
  7. Click the blue Report button in the top right corner

http://itunes.apple.com/us/app/lebanon-directory/id389756749?mt=8
http://itunes.apple.com/us/app/lebanon-cars-directory/id394077287?mt=8

15

Powered by WordPress. Designed by WooThemes