Cryptic Studios suffered a database breach, but we’ve got more questions than answers, more vulnerabilities have been found in critical infrastructure hardware, and a WiFi hack you can so easy its fun!
Plus why you might have had trouble downloading Jupiter Broadcasting shows, and so much more!
All that and more on this week’s TechSNAP!
Use our codes TechSNAP10
to save 10% at checkout, or TechSNAP20
to save 20% on hosting!
Limited time offer: $5.99 .coms, up to 5 domains! just use our code 599com7
Want to save money on your entire order? Use our code spring7 and save 15%!
Support the Show:
- Rugged OS makes devices for controlling SCADA systems, including enabling management of non-networked SCADA devices via an IP-to-Serial interface
- Rugged OS devices are used to manage traffic control systems, railroad communications systems, power plants, electrical substations, and even US military sites
- The issue is that all Rugged OS devices contain an account with the username ‘factory’, that cannot be disabled
- This account is obviously meant to allow the manufacturer to service the device, however it is insufficiently secured
- Instead of using strong cryptography or SSL/SSH keys or something like that, the Factory Account uses a password derived from the MAC address of the device (so, the password is unique per device)
- However, this password is simple the MAC address run through a short perl script that reverses the octets and takes the modulus of a static constant
- This means that all of the factory user passwords are at most 9 digits in length and always contain only numeric values
- The RuggedCom devices appear to use plain Telnet, rather than SSH, so all communications to and from the device are in the clear, meaning the password to the device could be sniffed by another with access to the network segment
- The MAC address of the device is presented automatically as part of the login banner, making the compromise of these devices extremely trivial
- Researchers notified the manufacturer more than a year ago, but rarely got a response
- The researchers forced the issue via US-CERT in February of this year, and in the beginning of April CERT set a disclosure date due to a lack of response
- This vulnerability was discovered by analyzing the firmware of a used Rugged OS device bought on eBay by the researchers
- RuggedCom was acquired by the Canadian subsidiary of Siemens last month
- Full Disclosure Mailing List Post
- The database that was compromised contained user login names, game handles, and ‘encrypted’ passwords
- The official notice is sparse on details and does not explain what type of ‘encryption’ was used for the passwords
- “Even though the passwords were encrypted, it is apparent that the intruder has been able to crack some portion of the passwords in this database”
- Given the fact that it has been more than a year since the database was compromised before a string of accounts started being compromised suggests that the passwords may have been properly hashed
- The delay suggests that the attackers had to brute force the password database, and that this took significant time, however the time factor is relative, if the attacker only used a single machine to crack the passwords, or was unaware of Rainbow Tables, plain MD5 sums could easily take this long
- Cryptographically hashed MD5 (meaning, with a salt) or better yet SHA256 would take significantly longer to crack and would be immune to rainbow tables
- Salted passwords mean that even if two users have the same password, you have to brute force each hash separately (if you use plain MD5 sums, then all users with the same password can be cracked in one attempt)
- It is also very likely that the attacker saved up the passwords they were able to crack in order to compromise all of the accounts at once, to avoid Cryptic taking the step they have taken now, and forcing a password reset on all affected accounts
- The risk in waiting is that users will change their passwords over time, and the cracked passwords will then be rendered useless
- Even cryptographic hashes can be cracked eventually, that is why it is important to change your passwords periodically
- The flaw, which was likely originally in place as a debugging tool, allows any user to authenticate to your network using the WPS pin 12345670
- This attack is worse than the previous WPS attach that reduced the keyspace, because it does not require someone to press the WPS button on the device
- Worse, this override pin still works even if the WPS feature is disabled in the settings on the router
- Arcadyan makes routers specifically for ISPs, and there are more than 100,000 of these $275 routers deployed in Germany alone, all of which are vulnerable
- Both the stock shipped 1.08 and the latest downloadable version 1.16 of the firmware are vulnerable
- The only available workaround is to disable wireless entirely
- Since the routers are often white labeled to the name of your ISP, Arcadyan devices will have MAC addresses that start with one of the following:
Q: The entire Internet writes….
Why can’t I download JB shows? My world is ending!
A: Blip.tv (our video CDN) has made changes, that are stupid. We are moving off blip.tv and will keep you updated. If you want to grab something that is still hosted on blip.tv and are having issues downloading the files, here are some example work arounds: