A Japanese hotel chain uses robots for nearly everything. Check in, room access, and most importantly, bedside service. What could possibly go wrong with putting embedded Android devices, complete with mics and cameras, right in every hotel room? While I could imagine bedside robots ending badly in many ways, today we’re looking at the possibility that a previous guest installed an app that can spy on the room. The kiosk mode used on these devices left much to be desired. Each bot has an NFC reader, and all it takes is an URL read by that reader to break out of the kiosk jail. From there, a user has full access to the Android system underneath, and can install whatever software they wish.
[Lance Vick] discovered this potential problem way back in July, and after 90 days of inaction has released the vulnerability. More of these hotels are being rolled out for the 2020 Olympics, and this sort of vulnerability is sure to be present in other similar kiosk devices.
In March 2018, a server in a Finnish data center was compromised through a remote management system. This was probably a Baseboard Management Controller (BMC), which is as dangerous as it is useful. Most BMCs have their own Ethernet adapter, not controlled by the host computer, and allows a remote user to access the machine just as if they had a monitor and keyboard connected to it. This particularly server was one rented by NordVPN, who was apparently not notified of the data center breach.
So what was captured from this server? Apparently the OpenVPN credentials stored on that server, as well as a valid TLS key. (Document mirror via TechCrunch) It’s been noted that this key is now expired, which does mean that it’s not being actively exploited. There were, however, about 7 months between the server break-in and the certificate expiration, during which time it could have been used for man-in-the-middle attacks.
NordVPN has confirmed the breach, and tried to downplay the potential impact. This report doesn’t seem to entirely match the leaked credentials. An attacker with this data and root access to the server would have likely been able to decrypt VPN traffic on the fly.
Named in honor of a certain sci-fi worm, Graboid is an unusual piece of malware aimed at Docker instances. It is a true worm, in that compromised hosts are used to launch attacks against other vulnerable machines. Graboid isn’t targeting a Docker vulnerability, but simply looking for an unsecured Docker daemon exposed to the internet. The malware downloads malicious docker images, one of which is used for crypto-currency mining, while another attempts to compromise other servers.
Graboid has an unusual quirk — the quirk that earned it the name: It doesn’t constantly mine or attempt to spread, but waits over a minute between bursts of activity. This was likely an attempt to mask the presence of mining malware. It’s notable that until discovered, the malicious Docker images were hosted on the Docker Hub. Be careful what images you trust, and look for the “Docker Official Image” tag.
Iran and Misdirection
Remember a couple weeks ago, when we discussed the difficulty of attack attribution? It seems a healthy dose of such paranoia might be warranted. The American NSA and British NCSC revealed that they now suspect Russian actors compromised Iranian infrastructure and deployed malware developed by Iranian coders. The purpose of this seems to have been redirection — to compromise targets and put the blame on Iran. To date it’s not certain that this particular gambit fooled any onlookers, but this is likely not the only such effort.
New Android handsets have had a rough week. First, the Samsung Galaxy S10 had an issue with screen protectors interfering with the under-the-screen fingerprint reader. This particular problem seems to only affect fingerprints that are enrolled after a screen protector has been applied. With the protector still in place, anyone’s fingerprint is able to unlock the device. What’s happening here seems obvious. The ultrasonic fingerprint scanner isn’t able to penetrate the screen protector, so it’s recording an essentially blank fingerprint. A patch to recognize these blank prints has been rolled out to devices in Samsung’s home country of South Korea, with the rest of the world soon to follow.
The second new handset is the Google Pixel 4, which includes a new Face Unlock feature. While many have praised the feature, there is trouble in paradise. The Pixel’s Face Unlock works even when the user is asleep or otherwise unmoving. To their credit, Apple’s Face ID also checks for user alertness, trying to avoid unlocking unless the user is intentionally doing so.
The humorous scenario is a child or spouse unlocking your phone while you’re asleep, but a more sobering possibility is your face being used against you unwillingly, or even while unconscious or dead. Based on leaks, it’s likely that there was an “eyes open” mode planned but cut before launch. Hopefully the bugs can be worked out of that feature, and it can be re-added in a future update. Until then, it’s probably best not to use Google’s Face Unlock on Pixel 4 devices.
10 thoughts on “This Week In Security: The Robots Are Watching, Insecure VPNs, Graboids, And Biometric Fails”
How about face unlocking and biometrics are just not a really good idea for security ?
And if and when they ever are, remember the scene from Demolition Man with the eyeball.
It may not work, but still people would try.
Don´t need to go that far. I know many people here that cannot use those ATMs that offer just fingerprint login, because due to age/skin condition/whatever their fingerprints are too faded .
Then they need to make a veeery big line in the only ATM that stills alow PIN logins.
And there are some agencies that don´t even have those old style ATMs anymore, just those shitty fingerprint ones.
Or the scene in Avengers with Loki in Germany.
What would Russia gain, by attacking US through Iran?
Russia does not want US to attack Iran. Someone else does …
Ask yourself “who benefits?”, and real culprit will be obvious.
At this point, I think Putin enjoys trolling whoever he can.
When in doubt, follow the money. There’s money in war, at least for the people making the equipment.
Russia would directly benefit by drawing the USA into a conflict with Iran. Iran, like North Korea, is a proxy. Proxy states have many uses. You can use them to attack your enemy, bait your enemy into a vulnerable position, wear down your enemy, force your enemy to field their latest battle tech and methods against someone you can closely observe and provide assistance to without much direct harm to yourself. Russia supplies Iran with a metric butt-ton of munitions. Any conflict Iran enters puts money in the Kremlin’s wallet.
Maybe you think US will became considered a peacefull country by deleting my comment critical to US “politics”. Well, not.
I have no problem with your criticism of US politics. However, racial slurs aren’t something we allow in the comments section. If you make your point without the slur, it won’t get removed.
On bio-metric access? You go to sleep eventually.
You gotta love [almost everyone] who don’t realize VPN is just a encrypted connection to a strangers proxy.. Not to be confused with [almost everyone] who don’t know about “eyes” compliance…
You know what you are using is safe with big-data vendors ban IPs for it rapidly… Like TOR and for whoever is still tunneling SOCKS 4&5
Please be kind and respectful to help make the comments section excellent. (Comment Policy)