Updated: 24.11.2002; 13:03:11 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Thursday, August 9, 2001

Hacked caller ID?

Two-and-a-half years ago I received an unexpected telephone call at about 2230 on my British Telecom phone. The caller was adamant that I had called him at about 2020 the same night, from my phone -- he had used "1471" when he arrived home himself, to access the CLID of the last call to his number.

But I had been out of the house until 2200, and the house had been empty. It took some effort to persuade my unknown caller that I hadn't called him earlier that evening. So the following day I asked on the BT fault reporting line how this could have happened. I was told that this sort of thing happens quite often. I may well have been in trouble if a crime had been committed at the other house that night.

BT don't advertise this failure mode at all.

Andrew Hilborne [Andrew Hilborne via risks-digest Volume 21, Issue 60]
0:00 # G!

Danish police: Safeguard Easy not broken; weak passwords (R 21 58)

This is to elaborate and correct the initial mentioning of Safeguard Easy in RISKS-21.58.

It was reported in national media - including tv - that the police had successfully broken the encryption. This, it seems, is not the case. The police have managed to find the passwords of the five encrypted computers. The information concerning the successful decryption of the five computers protected with Safeguard Easy was presented in court by chief prosecutor Poul Gade. Investigation is lead by chief of police in Holstebro, Jens Kaasgaard.

I have just interviewed Jens Kaasgaard. He says: 'To avoid misunderstandings, we haven't broken Safeguard by technically breaking down the encryption. We have located the passwords in different ways. We have done it like any hacker would have done, by trying to figure out the most probable passwords. This has payed success in five cases.' 'After doing that we entered the document-parts, the harddisk of the computer. Here we found some of the files unencrypted and other files further encrypted.' 'When you use Safeguard you put a sort of shell around your data. This is the first part you need to enter. This is what is claimed to be impossible. It is impossible. We have had six private companies looking at this, and they have all failed.' 'We have used completely ordinary police investigation methods. We know precisely who have had access to the encrypted machines. Then we can start assessing probabilities and calculate upon this and set up models for how, if you were a hacker, you'd find your way into the machines. That's what we have done.' You did this yourself? 'Yes. We did this inside the police system.'

To conclude: Be careful when you choose your password.

Bo Elkjaer [Bo Elkjaer via risks-digest Volume 21, Issue 59]
0:00 # G!

Possibility of a Warhol Worm: Complete infection in 15 minutes!

Michael Constant and I have performed a basic analysis of a possible worst-case virulence for an active worm like Code Red. By simply changing the infection strategy, a "Warhol Worm" could be developed, able to infect all vulnerable machines in 15 minutes from the moment of initial infection of a single machine!

http://www.cs.berkeley.edu/~nweaver/warhol.html Nicholas Weaver, nweaver@cs.berkeley.edu

[And in Case you have not heard, Code Red III is now operating. PGN] http://news.cnet.com/news/0-1003-200-6835996.html ["Nicholas C. Weaver" via risks-digest Volume 21, Issue 59]
0:00 # G!

Danish police break "Safeguard" encryption program in tax case

[From the cryptography mailing list. --Declan; lightly-PGN-ed for RISKS]

> Date: Tue, 7 Aug 2001 22:51:08 +0200 
> From: bo.elkjaer@eb.dk
> Subject: Utimacos Safeguard Easy broken by Danish police in tax evasion case

> The German encryption program Safeguard Easy has been broken by the Danish > police. Today the police from the city Holstebro in Jutland presented > evidence in court, that was provided after breaking the encryption on five > out of sixteen computers that where seized april 25 this year.

> All 16 computers were protected with Safeguard Easy from the german > encryption provider Utimaco. It is not known whether DES, 128-bit IDEA, > Blowfish or Stealth was used as algorithm on the computers. All four > algorithms are built in Safeguard Easy. Details are sparse. It is not > known how the encryption was broken, whether it was brute forced or flaws > in the program was exploited.

> The computers where seized from the humanitarian (leftwing) foundation > Tvind (Humana) in connection with a case about tax evasion. Among the > evidence provided from the encrypted computers were e-mails sent among the > leaders of the foundation, Poul Jorgensen and Mogens Amdi Petersen > describing transfers of large sums of money.

> Apparently, but not confirmed, British Scotland Yard has been involved in > breaking the encryption. The Danish police doesn't have the capacity to > break encryption by themselves. Neither has the Danish civilian > intelligence service. Routine is that cases concerning encryption is > handed over to the Danish defence intelligence service DDIS. This > procedure has been described earlier this year by the Danish minister of > justice in connection with another case. DDIS denies involvement with the > Tvind case.

> Employees and leaders at Tvind has denied handing over their passwords to > the computers. One even wrote a public letter mocking the chief of police > in Holstebro, describing how he changed his password weekly, and stating > that he'd probably even forgotten his password by now. At a time, the > police considered putting employees in custody until passwords were handed > over.

> Bo Elkjaer, Denmark

[followed by a response]

> Date: Tue, 7 Aug 2001 16:25:03 -0700 (PDT)
> From: "Jay D. Dyson" 
> Subject: Re: Utimacos Safeguard Easy broken by Danish police in tax evasion case

> If the OS used was Windows, it's quite likely that the plaintext and/or > passphrases were recovered in the Windows swap file. Barring OS > considerations, it's also possible that the police put a keystroke logger > on the system, just as the FBI here in the States did with an organized > crime suspect.

> My gut sense is that, since only five of sixteen systems were "cracked," > it seems likely that it was the swap file that let the cat out of the bag. > Even so, a flaw in the cryptosystem should be investigated and proven or > ruled out.

> Let us not also forget that people can be pressured to divulge > passphrases. Rubber-hose cryptanalysis isn't just a humorous concept.

> Jay D. Dyson - jdyson@treachery.net

FROM POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. To subscribe, visit http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ [Declan McCullagh via risks-digest Volume 21, Issue 58]
0:00 # G!

The risks of not verifying e-mail addresses

A colleague of mine recently received the following e-mail, apropos nothing:

> Date: Wed, 8 Aug 2001 16:41:07 +0530 > From: HDFC Bank Support > To: [name elided] <[address elided]> > Subject: " Welcome to HDFC Bank. " > > This is an auto-generated mail. Please do not reply to it. > Dear Customer, > Thank you for opening an account with us. > We have received your account opening form and opened an account as > per the details mentioned below. > You can now access all your accounts from any of our branches across > the country. To give you quick access to all your accounts with us, we > have generated a Customer Identification Number (Customer ID No.). All > your accounts are linked to this number, and you only need to quote > this number to our Personal Bankers or Tellers for any help you > may require. > Your Customer ID No. is [number elided]. > The Account details are: > Account Number: [number elided] > Primary Account Holder: [name elided] > The Welcome Letter is being sent to you separately by mail. [snip]

They sent a real account name, account number and customer ID to a complete stranger on the basis of a new user's registration information, without first validating it in any way. The user in this case had /almost/ got his email address right - only the Top Level Domain was incorrect.

On informing the bank of their error they claimed "The information we send across to across e mail is limited hence the possibility of misuse is not possible".

The risks are obvious.

Doug Winter, CTO, Business Europe, 3 Waterhouse Square, Holborn Bars, 142 Holborn, London EC1N 2NX +44 (0)20 7961 0341 dwinter@businesseurope.com [Doug Winter via risks-digest Volume 21, Issue 60]
0:00 # G!


Maximillian Dornseif, 2002.
 
August 2001
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  
Jul   Sep

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.