Subscribe to this bi-weekly newsletter here!
Welcome to the latest edition of Pardon The Intrusion, TNWâ€™s bi-weekly newsletter in which we explore the wild world of security.
COVID-19 accelerated the use of Zoom for video calling. But so did the security problems and revelations that it didnâ€™t actually support end-to-end encryption (E2EE), misleading users about the security of the platform.
In the aftermath, it promised to invest in E2EE on its platform, and acquired encrypted chat service Keybase in an attempt to secure its communications. All seemed well until yesterday: Zoom confirmed that it plans to offer stronger encryption features only for its paying users. It wonâ€™t be extended to the free tier.
â€œFree users, for sure, we donâ€™t want to give that [end-to-end encryption] because we also want to work it together with FBI and local law enforcement, in case some people use Zoom for bad purpose [sic],â€ Zoom CEO Eric Yuan said in an earnings call this week.
The idea that encryption could hamper law enforcementâ€™s ability to fight criminal acts â€” widely known as the â€œGoing Darkâ€ problem â€” is not new.
Last year, Facebook ran into troubled waters after governments in the US, UK, and Australia called on the company to delay its plans to implement E2EE across its messaging apps until â€œthere is no reduction to user safety and without including a means for lawful access to the content of communications to protect our citizens.â€
But by putting a premium on privacy, Zoom seems to be aiming for a tricky balancing act that improves security but also minimizes the risk of abuse. The move also puts it at odds with wider attempts to embrace encryption on the web.
Alex Stamos, former Facebookâ€™s chief security officer whoâ€™s now working as an outside consultant on Zoomâ€™s security strategy, elaborated on this further in a Twitter thread:
Zoom is dealing with some serious safety issues. When people disrupt meetings (sometimes with hate speech, CSAM, exposure to children and other illegal behaviors) that can be reported by the host. Zoom is working with law enforcement on the worst repeat offenders.
â€” Alex Stamos (@alexstamos) June 3, 2020
But by choosing to turn a basic security feature into a premium paid offering, Zoom is setting a wrong precedent wherein privacy is limited to those who can afford to pay for it.
Whatâ€™s trending in security?
Apple fixed a critical security flaw in its â€œSign In With Appleâ€ feature, Google found more evidence of credential-stealing attacks exploiting COVID-19, and new details emerged about an iPhone spyware app, called Hide UI, used by law enforcement to unlock devices when it doesnâ€™t have the userâ€™s passcode.
- Hacktivist group Anonymous has returned from the shadows,Â and has promised retribution against the Minneapolis Police Department (MPD) over the death of George Floyd. The MPDâ€™s website was then temporarily taken offline in a suspected Distributed Denial of Service (DDoS) attack, but researcher Troy Hunt said the leaked data â€œhas almost certainly been pulled out of existing data breaches in an attempt to falsely fabricate a new one.â€ [Troy Hunt]
- For everyone who is protesting in support of Black Lives Matter and against George Floydâ€™s death at the hands of the Minneapolis Police Department â€” and those who are planning to attend one â€” here are some handy precautions to take before you go. Also make sure you turn off biometrics on your phone. [TNW]
- The baddies behind REvil (Sodinokibi) ransomware launched an eBay-like auction site to sell data stolen from the companies they hack. [ZDNet]
- Apple fixed a flaw in â€œSign In With Appleâ€ that could have allowed attackers to hijack any userâ€™s accounts on third-party apps that offer the login option. [The Hacker News]
- A hacking group that calls itself ShinyHunters has been selling 200 million stolen records on the dark web from over a dozen companies. [WIRED]
- COVID-19 themed malware attacks are still on the rise. Google said it found new activity from Indian â€œhack-for-hireâ€ firms that have been impersonating the WHO in credential-stealing email campaigns to target business leaders in financial services, consulting, and healthcare corporations across the US, Slovenia, Canada, India, Bahrain, Cyprus, and UK. [Google]
- A vigilante hacker group called â€œCyberWareâ€ has been targeting â€œscamâ€ companies with ransomware and denial of service attacks. [Bleeping Computer]
- New â€œOctopus Scannerâ€ malware was found compromising open-source GitHub projects to spread to Windows, Linux, and macOS systems, and deploying malicious backdoor. [GitHub
- A new study â€” (How) Do People Change Their Passwords After a Breach? â€” found that only around a third of users usually change their passwords following a data breach. [IEEE Security (PDF)]
- Sandworm, the hackers working for Russiaâ€™s military intelligence agency, have been exploiting a vulnerability in Exim Mail Transfer Agent software since August of last year for malicious motives. The NSA recommends patching Exim servers immediately by installing version 4.93 or newer. [NSA / WIRED]
- Kaspersky researchers uncovered a steganography-themed attack targeting industrial enterprises in Japan, Italy, Germany, and the UK to steal Windows account credentials. The hackersâ€™ ultimate motive remains unclear. [Kaspersky]
- An Android malware called Strandhogg 2.0 mimics appsâ€™ login screens to hijack passwords and grant extensive permissions. It affects all versions of Android prior to 10. Google has already patched the flaw in a security update pushed last month. [Ars Technica]
- A new version of Valak malware has been found targeting Microsoft Exchange servers in the US and Germany to steal enterprise mailing information and passwords. [Cybereason]
- Amnesty International discovered a critical flaw in Qatarâ€™s mandatory-to-use EHTERAZ contact-tracing app, which had it not been reported and fixed, couldâ€™ve allowed attackers access to highly sensitive data, â€œincluding the name, national ID, health status and location data of more than one million users.â€ [Amnesty International]
- US authorities arrested a Ukranian national, Denys Iarmak, an alleged member of the FIN7 cybercrime group thatâ€™s been accused of hacking Chipotle, Whole Foods, and Trump Hotels. FIN7 (also called Carbanak Group) has been tied to a string of financially-motivated attacks since 2015 to conduct fraudulent wire transfers to offshore accounts. [Motherboard]
- The fortnight in breaches and leaks: Thailand cellular network AIS, Livejournal, Mathway, Minted, Truecaller, Indonesian voter records, and Indiaâ€™s BHIM mobile payments platform.
Tweet of the Week
Obviously I donâ€™t think you should have to pay for E2E encryption.
â€” Matthew Green (@matthew_d_green) June 3, 2020
Thatâ€™s it. See you all in two weeks. Stay safe!
Ravie x TNW (ravie[at]thenextweb[dot]com)