SWITCH security report on the latest IT security and privacy trends

Page created by Brenda Sharp
 
CONTINUE READING
SWITCH security report on the latest IT security and privacy trends
SWITCH security report on the latest IT
security and privacy trends
July/August 2020

 I. Aimless navigation – Garmin scrambling to regain
    its bearings after hacking incident
     How utterly ironic when one of the most well-known and biggest makers of smartwatches,
     wearables and receivers for land, marine and aeronautical navigation leaves its customers in
     the lurch without any direction. Which is exactly what happened in late July when users noticed
     that the systems of the US/Swiss multinational Garmin had basically stopped working on its
     fitness trackers, golf and sport watches, as well as the FlyGarmin aviation navigation services.
     Instead of providing clear route navigation, for a while there was just a vague notification
     under the guise of nebulous maintenance work.

     Several internal memos and external social media posts from Garmin employees made it
     increasingly clear, however, that the company and several of its services and platforms had
     obviously fallen victim to a targeted cyber attack with WastedLocker, a piece of ransomware
     that had appeared for the first time in the spring. Although the reports at that point had not
     yet been verified or even acknowledged by Garmin, ZDnet had already reported on it on
     23 July. According to the report, not only virtual services and communities but also production

  SWITCH • PO Box • 8021 Zurich, Switzerland • +41 44 268 15 40 • cert@switch.ch
            securityblog.switch.ch • security.switch.ch • © SWITCH 2020
operations had been taken out to a large extent. Only after this report came out did Garmin
    admit in an official statement that it had, indeed, fallen victim to a ransomware attack. In the
    days that followed, Bleeping Computer reported that internal informants had confirmed and
    reported the WastedLocker attack. Garmin is also rumoured but not officially confirmed to
    have paid the ransom to the tune of USD 10 million in order to quickly get the systems up and
    running again. And that was probably only because so many customers were apparently
    extremely aggravated by the Schaffhausen-based company’s policy of non-communication.
    Garmin claimed that, based on its current knowledge, at no point had customer data been
    stolen (the Garmin Connect service saves health and fitness data, and Garmin Pay saves
    payment information). Yet in many cases, it is often a standard ‘business practice’ of cyber
    extortionists to first siphon off data before encryption in order to get away with an additional
    data breach ransom – demanding payment of a sort of hush-money so that this data is not
    released to the public. Most services are now working again. However, just how big the blow
    was for Garmin financially, how many customers it lost and how far off course it veered in just
    a few days due to the cyber attack and its own inept communication is not likely to be made
    public either.

    Read more:
    https://www.tagesanzeiger.ch/sytemausfall-legt-garmin-uhren-lahm-279497191954
    https://www.zdnet.com/article/garmin-services-and-production-go-down-after-ransomware-attack
    https://www.nzz.ch/wirtschaft/cyberopfer-garmin-macht-keine-gute-figur-
    ld.1568606?mktcval=OS%20Share%20Hub&mktcid=smsh&reduced=true#register
    https://www.bleepingcomputer.com/news/security/garmin-outage-caused-by-confirmed-wastedlocker-ransomware-attack
    https://www.androidcentral.com/garmin-connect-suffers-multi-hour-outage

II. Hacking with a heavy hand: German intelligence is
    making a push to install hardware directly with
    internet providers and reroute internet traffic
    Making citizens informal agents of the state was fundamental to the ‘success’ of the
    surveillance carried out by the East German Ministry of State Security (Ministerium für
    Staatssicherheit, popularly referred to as the ‘Stasi’), which was headed in its final days by Erich
    Mielke in the former GDR. A good 30 years after Germany’s reunification, Horst Seehofer’s
    Federal Ministry of the Interior, Building and Community (BMI) now appears keen to adopt the
    same model. Evidence of this provocative claim is draft legislation, which the BMI already
    proposed in mid-2019 with the aim of harmonising constitutional protection law. It includes
    provisions for internet providers to assist German intelligence authorities in sneaking govware
    onto the computers of their customers. Specifically, the idea is not only to export a copy of
    data but instead to route data through the authorities’ hacking proxy, where it is then

 SWITCH • PO Box • 8021 Zurich, Switzerland • +41 44 268 15 40 • cert@switch.ch
           securityblog.switch.ch • security.switch.ch • © SWITCH 2020
manipulated and passed on to recipients without them noticing the manipulation. The slogan
    of FinFisher – a major provider of govware – reads as follows: ‘FinFly ISP is able to patch files
    that are downloaded from the destination on-the-fly or to send fake software updates for
    popular software.’ The accompanying promotional video is included in the netzpolitik.org
    article cited below. Because the Federal Criminal Police Office (BKA) and other German
    intelligence authorities have purchased govware from FinFisher, it has to be assumed that they
    are using it, even if information about it is not even available to the Bundestag’s intelligence
    oversight committee.

    Against this backdrop, the rhetorical sop offered up by former SPD Minister of the Interior and
    current SPD party leader in the Landtag of Schleswig-Holstein, Ralf Stegner, smacks of outright
    cynicism: Stegner had attempted to downplay the proposed ‘serious encroachment’ (quote
    from eco – Association of the Internet Industry) on the private sphere with his remark that no
    one need worry because the surveillance would, of course, be under parliamentary control.

    So, it is no surprise that the two umbrella organisations of Germany’s digital industry, eco and
    bitkom, appear concerned and accuse Horst Seehofer’s Ministry of the Interior of attempting
    to turn its members into deputy sheriffs. He appears to have become numb to the issue of
    privacy altogether: in the draft legislation just mentioned, he intends not only to allow police
    but also domestic intelligence officials to break into private homes and install spyware there.
    Moreover – and this is where Seehofer is testing the limits of legality and, in the eyes of many
    critics, goes far beyond them – this is to occur without any judicial ruling in the matter.

    In view of all these developments, it is fortunate that Seehofer’s BMI has performed rather
    poorly in terms of efficiency. While there are now several new drafts of security legislation
    waiting in the wings, some of which are drastic, none of them has taken centre stage yet.

    Read more:
    https://netzpolitik.org/2020/staatstrojaner-provider-sollen-internetverkehr-umleiten-damit-geheimdienste-hacken-
    koennen/?utm_source=pocket-newtab-global-de-DE
    https://www.heise.de/tp/features/Dringende-Anpassung-an-neue-digitale-Moeglichkeiten-4722312.html
    https://www.sueddeutsche.de/politik/gesetzentwurf-bundesamt-fuer-einbruch-1.4564401
    https://www.tagesspiegel.de/politik/umstrittene-sicherheitsgesetze-die-baustellen-des-herrn-seehofer/25481314.html

III. A protection shield minus the protection – ECJ
     declares Privacy Shield unlawful
    What rules must companies follow when transferring their customers’ data to the United
    States and storing it there? This question, which has been at the centre of lengthy negotiations
    between the EU Commission and the US Department of Commerce, has led to two agreements

 SWITCH • PO Box • 8021 Zurich, Switzerland • +41 44 268 15 40 • cert@switch.ch
           securityblog.switch.ch • security.switch.ch • © SWITCH 2020
so far – both of which have since been invalidated by the European Court of Justice. In 2015,
   ‘Safe Harbour’ failed after a lawsuit brought by an Austrian law student named Max Schrems.
   Schrems had hoped to find out what data Facebook had been collecting from him and saving,
   as well as who else had received this data. Mark Zuckerberg’s social media empire, which has
   its European headquarters in Ireland, initially refused to provide this information. This was
   followed in 2014 by the lawsuit that ultimately led to the collapse of the agreement.

   The lawsuit brought to the ECJ by Schrems, who is now a practising lawyer, also led to the
   overturning of the subsequent ‘Privacy Shield’ agreement. The EU’s supreme court ruled that,
   given the existence of state surveillance programmes run by the NSA and other intelligence
   agencies, the data of European citizens would be less secure on American servers than in
   Europe. In particular, due to inadequate access restrictions, it would be possible for US
   government agencies to access the personal data of European citizens without offering them
   the same degree of legal recourse to defend against this as they would have in Europe.
   Moreover, the ECJ reprimanded Ireland’s data protection agency for its lax treatment of
   ‘standard contractual clauses’, which were the basis for allowing Facebook to continue
   transferring its international customers’ data to the United States, storing it there and using it
   for advertising purposes.

   Facebook is not the only one affected by the demise of the Privacy Shield agreement. To the
   contrary, companies on both sides of the Atlantic that exchange data both ways under the
   terms of the Privacy Shield agreement are faced with the question of what they are and are
   not allowed to do now. Given the fact that the European Commission currently holds that there
   are only 12 other countries that protect data against misuse and access by government
   authorities to the same extent as the EU, the issue is certainly more urgent than ever. But
   considering the dominance of cloud providers like Amazon, Microsoft and Dropbox, it is also
   proving difficult for users to quickly find European alternatives. On the other hand, because
   the United States is unlikely to tone down its surveillance practices, the conflict surrounding
   Big Brother and data protection when it comes to Big Data has yet to be resolved. Potential
   consequences and specific recommendations for Swiss companies and organisations are
   covered in the SWITCHlegal statement cited below.

   Read more:
   https://netzpolitik.org/2020/datentransfers-eu-gericht-zerschlaegt-privacy-shield
   https://t3n.de/news/privacy-shield-gekippt-muessen-1305303
   https://www.sueddeutsche.de/digital/privacy-shield-eugh-urteil-amazon-microsoft-1.4976977
   https://nzzas.nzz.ch/wirtschaft/privacy-shield-am-ende-eu-und-usa-ringen-um-datenschutz-ld.1566991?reduced=true
   https://info.switch.ch/e/f2d46892293eab88/nl/-/webversion-version/704ddf04c3892c70041774c5/de.html

SWITCH • PO Box • 8021 Zurich, Switzerland • +41 44 268 15 40 • cert@switch.ch
          securityblog.switch.ch • security.switch.ch • © SWITCH 2020
IV. A night(mare) of celebrities – The ‘biggest Twitter
    hack of all times’ raises questions about the
    security of the network
     Anyone who always thought that computer nerds had rather poor social instincts received a
     rude awakening in mid-July when two young Americans and a British man showed how money
     can be made through a combination of cluelessness, profiteering and fame on the right
     platform. In short, the three hackers are strongly suspected of hacking the Twitter accounts of
     several famous people, including Barack Obama, Bill Gates, Elon Musk, Joe Biden and Kanye
     West. The imposters then used the hijacked accounts to tweet their ploy: they promised to
     double the value of every bitcoin sent to them before returning it, under the guise of wanting
     to ‘give something back to the community’. Soon enough, over USD 100,000 worth of bitcoin
     flowed into the scammers’ accounts.

     That they did not make off with more money and that the authorities caught onto the cyber
     criminals surprisingly fast may perhaps be related to the fact that they both lacked some
     sophistication in terms of the human factor, and also weren’t quite nerdy enough to compete
     with celebrities in this league. For wherever that much power, money and influence is involved
     at the same time, law enforcement authorities will do everything they can to investigate a
     crime as quickly as possible. And had the hackers been more professional, they would certainly
     have noticed that the dubious OGUsers internet forum where they had set up shop offering to
     hijack any Twitter account for the price of about USD 3,000 had itself been hacked. A few days
     later, the login details of all forum users and even some chat histories were available for all to
     see – including the FBI, which was more than happy to accept the gift and quickly struck gold.

     Twitter might have also been happy about the speedy investigation – after all, the hackers
     apparently had gained direct access to the system administration. Yet the operators of the
     microblogging site admitted only that employees with access to internal systems ‘had been
     manipulated’ using social engineering. According to the definition found on the website of the
     security company Kaspersky (link below), the goal of social engineering is to exploit human
     weaknesses, such as the desire for power, greed, stupidity, vanity and so on in order to gain
     access to information, passwords or systems. That such a thing could happen to Twitter
     employees, and how, is what eventually motivated chair of the American Trade Committee,
     Roger Wicker, to get involved as well. After all, the United States is in the middle of the
     presidential election, and considering the current incumbent’s media proclivities, Twitter will
     play a key role in how it unfolds. In a letter to Twitter CEO Jack Dorsey, Wicker therefore wrote:
     ‘It cannot be overstated how troubling this incident is, both in its effects and in the apparent
     failure of Twitter’s internal controls to prevent it.’ Wicker gave Dorsey eight days to furnish
     the committee with information about the incident and how it plans to move forward.
     MarketWatch.com, the financial news site run by Dow Jones & Co., also wrote that the most

  SWITCH • PO Box • 8021 Zurich, Switzerland • +41 44 268 15 40 • cert@switch.ch
            securityblog.switch.ch • security.switch.ch • © SWITCH 2020
disturbing fact about the Twitter hack was the revelation that staff were able to access the
   accounts. And the website cryptonews.com maintained in its 23 July story that the bitcoin
   scam was not the real problem with the Twitter hack. Far worse was the fact that access to the
   personal data and direct messages of at least 36 of the 130 high-profile Twitter accounts posed
   a risk that these people could be blackmailed for much larger sums of money to withhold the
   release of these messages – much like the Garmin data breach ransom discussed in the first
   section.

   Read more:
   https://www.zeit.de/news/2020-07/31/nach-massivem-twitter-hack-17-jaehriger-in-den-usa-gefasst
   https://www.tagesschau.de/ausland/twitter-festnahme-hack-101.html
   https://www.tagesanzeiger.ch/wie-die-polizei-den-twitter-hackern-auf-die-spur-kam-892682301157
   https://usa.kaspersky.com/resource-center/definitions/what-is-social-engineering
   https://www.zeit.de/digital/internet/2020-07/twitter-accounts-prominente-bitcoin-betrug
   https://www.marketwatch.com/story/the-most-disturbing-part-of-the-twitter-hack-many-of-its-employees-have-access-to-accounts-2020-07-25

   This SWITCH security report was written by Dieter Brecheis and Frank Herberg.

   The SWITCH security report discusses current topics in the field of cybersecurity. It is aimed at interested
   internet users, and seeks to make them aware of current threats. Despite careful review, SWITCH accepts no
   liability for accuracy.

SWITCH • PO Box • 8021 Zurich, Switzerland • +41 44 268 15 40 • cert@switch.ch
          securityblog.switch.ch • security.switch.ch • © SWITCH 2020
You can also read