FDA, ICS-CERT issue warnings for medical device, hospital network security

Reports that medical devices implanted in patients or used for their treatment may have dangerous vulnerabilities are not new, but a new “safety communication” is focusing more attention on the issue. Ars Technica points out that the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) group that works along with private industry to protect the nation’s infrastructure issued its own alert alongside the FDA’s, focusing on the many embedded devices that are protected only by hard-coded passwords.

The ICS-CERT message recommends restricting physical access to sensitive hardware, improved designs that are more resistant to potential attacks and increased network security. The FDA lists various vulnerabilities it’s become aware of like network connected devices being infected by malware, mobile devices being targeted to access patient data, the previously mentioned hard-coded passwords issue and more. Going forward, the FDA is collecting reports of “adverse events” to determine if security has been compromised, and will issue new guidelines on mobile health technology later this year. We’ve seen examples of potential security solutions for pacemakers in the past, and the more connected healthcare devices become we’re sure patients expect any potential vulnerabilities to be addressed as well.

Filed under: ,

Comments

Source: Ars Technica, FDA, ICS-CERT

Raspberry Pi gets Ben Heck’d into portable gaming unit

In case you haven’t heard, Ben Heck makes cool stuff, and he has his own show. His creations span a range of devices, with his works including everything from an Xbox 360 laptop to a custom toilet illuminator. As such, it isn’t surprising that he’s taken to the Raspberry Pi, turning it into a nifty

Read The Full Story

Microsoft teams up with financial services industry, FBI to take down hacker botnets

It turns out Microsoft was serious when it declared war on botnets: the company just announced that its Digital Crimes Unit has successfully disrupted more than 1,400 criminal networks. The company says the action was a coordinated effort between Microsoft and the financial services industry, noting that the FBI chipped in to help out with legal hurdles — giving Redmond the leverage it needed to shut down malicious servers in both New Jersey and Pennsylvania. These machines had been infecting computers with Citadel malware, a keylogger that allowed cyber criminals to skim account information from victims. According to Reuters, authorities don’t yet know the identities of the criminals involved, but Microsoft thinks the ringleader lives in eastern Europe, and may be working with 80 or more accomplices. The company has already filed a civil lawsuit, listing the lead hacker as “John Doe No. 1” in the complaint.

Microsoft says it will use the data it collected from the operation to help ISPs find more efficient ways to detect and notify users if their computer is infected. The company also pledges to make the information available through its own cyber threat intelligence program. Check out the firm’s full press announcement for yourself after the break.

Filed under: ,

Comments

Source: Reuters

Google Glass gets XE6 updated ClockworkMod Recovery

While the official Google Glass team is embroiled in a bit of controversy over which apps will and wont be allowed on the device’s official build this week, the folks behind ClockworkMod Recovery push forward with a new release for hacking the device. As it is on Android, so too does this software allow for

Read The Full Story

iPhone vulnerable to hacking with malware-infested charger

You might think the only way malware could ever get onto your phone is if you installed an app or some piece of software that was infested with malicious code, but it turns out that modified wall chargers can be used to hack phones as well. Researchers say they’ve built a custom iPhone wall charger that can install malware when connected to a device.

phone-charging

During the annual Black Hat security conference later in July, researchers from the Georgia Institute of Technology will be showing off a prototype wall charger that they say is capable of installing malware onto iOS devices when plugged into the wall and connected to a device at the same time, which they found the results to be quite “alarming.”

The researchers aren’t saying much about the charger yet, as they reveal most of their findings next month, but they say that the charger is built around an open-source single-board computer known as a Texas Instruments BeagleBoard that costs around $45. Essentially, the researchers wanted to show just how easy and cheap it can be to cause a lot of virtual destruction in an innocent package.

iphone-adapter-580x411

However, it’s noted that a BeagleBoard is too big to fit inside an Apple 5W charger, so it’s unclear how exactly the research team has disguised the board. Perhaps they hid it in a docking station or an external battery pack. However, the team says that other hackers will most likely take their findings and advance the work to fit the necessary components into the tiny iPhone charger.

The Georgia Tech researchers say that this kind of hack could break into an iPhone running the latest firmware in less than a minute. However, this isn’t the first hack to utilize the iPhone’s Lighting/3-pin port. Most commonly, jailbreak software uses the connector to remove many of Apple’s restrictions from iOS, allowing users to install custom apps and themes that Apple would otherwise ban.

VIA: Forbes


iPhone vulnerable to hacking with malware-infested charger is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Raspberry Pi used to circumvent China’s internet firewall

The Raspberry Pi has seen a lot of different uses, and it’s one of the most popular DIY toys for electronic hobbyists. In a Reddit thread where users post about all of their different uses for the credit card-sized circuit board, one user in particular has an interesting use: circumventing China’s internet firewall to get censor-less WiFi.

raspberry_pi-580x386

Essentially, he connects his Raspberry Pi board to a WiFi dongle and connects that to his own VPN server running OpenVPN. Once he plugs the Raspberry Pi module into ethernet and into a USB port, he instantly has censor-free WiFi internet access. And the best part is, he doesn’t need to configure anything on his devices, as built-in VPN offerings on iOS and Android are quite poor.

Of course, though, VPNs are common in China, as they give users access to blocked websites in the country, but if you’re not at home, you always need to install and open a VPN client eveytime you use a new device, which isn’t a huge problem, but it’s inconvenient. This Redditor, however, made things quite simple.

Model-A-1024x709-580x401

However, he says that connecting to his VPN server that’s located in France takes a while, but once it’s up and running, it can remain stable for a long time, getting speeds up to 4Mbps, although he says it’s generally a lot slower than that most of the time, but we wouldn’t be complaining if that meant we could access blocked websites.

The Redditor says that it’s a “fight against censorship everyday,” and the government is always finding new ways to crack down on VPNs, including shutting down UDP connections and throttling TCP connections. Plus, he says that China purposely slows down websites that use any kind of Google product such as Adwords or Analytics.

VIA: The Register

SOURCE: Reddit


Raspberry Pi used to circumvent China’s internet firewall is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Pentagon report: Chinese hackers accessed F-35B and other advanced US weapons systems

Pentagon report China hacked F35B and other advanced US weapons systems

Many of the Pentagon’s most advanced weapon systems — including the F-35 Joint Strike Fighter and PAC-3 Patriot missile system — were compromised by Chinese hackers, according to a classified document obtained by the Washington Post. The list of weapons was part of an earlier DoD report condemning Chinese cyber-espionage activities, but had been confidential until now. Other systems hacked are said to include the Terminal High Altitude Area Defense (THAAD), the Navy’s Aegis ballistic-missile defense system, the F/A-18 fighter, V-22 Osprey and the Littoral Combat Ship used for shore patrol. Many of these form the foundation of defense systems from Europe to the Persian Gulf — and their breach goes a long way toward explaining Washington’s unprecedented dressing-down of China.

Filed under:

Comments

Via: The Verge

Source: Washington Post

Chinese hackers steal US advanced weapons blueprints according to report

It seems you can’t go a day without hearing a new report about hackers, whether they’re of the annoying Twitter-hijacking variety or the more troublesome DDoSing type. Some, however, are more insidious, including the Iranian hackers who are actively attacking the United States’ energy industry. Now a leaked government document shows that Chinese hackers have accessed designs for some of the nation’s most advanced weapons.

Blueprints

The information is said to come from a report that was made for the Pentagon detailing a breach of data in which Chinese hackers gained access to the blueprints of advanced US weapons systems. According to The Washington Post, in excess of two dozen “major” systems were compromised, including ones said to be essential to the nation’s defense against missiles.

The report was created by the Defense Science Board, which is comprised of a combination of civilian and government experts. Such experts say that the Chinese government getting its hands on such sensitive data as weapons designs could have two-fold ramifications: on one side of the scale, it could fuel China’s development of such weapons, and on the other side it could weaken the US’ advantage that results from having these systems.

According to officials who are said to have knowledge of the situation, most of these breaches are parts of China’s overall cyberattacks that have been hitting companies – particularly of the media variety – for some time now. The attacks are said to be against both the US government’s various agencies, as well as its defense contractors.

While specific information on what the hackers acquired isn’t available, it is said that the missile system PAC-3, ballistic missile system Terminal High ALtitude Area Defense/THAAD, and ballistic missile defense Aegis of the US Navy were all compromised. Likewise, the F/A-18, Black Hawk heli, V-22 Osprey, and Littoral Combat Ship all had designs compromised.

SOURCE: The Washington Post


Chinese hackers steal US advanced weapons blueprints according to report is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

US energy industry under cyberattack by Iranian hackers

Unnamed United Stated officials, both current and former, spoke with the folks at the Wall Street Journal, revealing that hackers backed by the Iranian government have ramped up cyberattacks against the US, specifically zeroing in on the control systems that manage the energy industry. Unlike the Chinese hackers who have infiltrated various US companies, the intent behind the Iranian hackers appears to be sabotage.

DoE

The United States is no stranger to cyberattacks from Iran, which has been carrying on DDoS attacks against various bank websites for some time now. The difference with the latest attack from the nation is the potential for damage it provided, as well as showing a different area of intent behind the hackers’ motives, one that points toward wrecking havoc and causing disruption.

Reportedly, this newest attack by the hackers, according to a former US official, provided them with access to the control system for various gas and oil pipelines. Such a breach went “far enough to worry people.” That’s not all, however, with it also being reported that the hackers are using surveillance to access data, having accessed information on how to destroy or otherwise harm the systems controlling company operations.

It was suggested by one official that Iran could end up provoking a response from the United States if it does not back off its cyberattacking efforts: “This is representative of stepped-up cyber activity by the Iranian regime. The more they do this, the more our concerns grow. What they have done so far has certainly been noticed, and they should be cautious.”

Which oil, gas, and electric companies are being targeted was not specified, with the officials only saying that some of them lie along the US and Canadian border. Likewise, the proof that Iran is behind the attacks wasn’t specified either, with the officials merely saying that there is “technical evidence.” Not surprisingly, Iran denies having engaged in any such activities, but did point out that it has suffered these kind of attacks from the US.

SOURCE: Wall Street Journal

Image via Energy.gov


US energy industry under cyberattack by Iranian hackers is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

UK’s ITV News hacked by Syrian Electronic Army

It has been a week to the dot since the Syrian Electronic Army has last commandeered an unsuspecting Twitter account, this time going after the United Kingdom’s ITV News media company, which owns the UK’s largest TV station. Earlier this evening, half a dozen unusual tweets were sent out via the account, with a couple of them referencing the SEA hacking collective.

SEA

The messages were deleted a short while later, followed by a confirmation from ITV News that it had, in fact, been cyberattacked, making it the latest victim in what has been a long and ever-growing list replete with other big-name companies. Until today, The Financial Times was its latest victim, and before that The Guardian, which was hit on April 29.

According to Businessweek, the six tweets included one insulting the French, saying, “Francois Hollande to double aid to rebels, including a complementary French flag with every aid package.” Included in that tweet was an image of a white flag. The tweets eventually pointed towards the SEA as being the source, with one linking to an article said to concern Twitter’s victory over the hacking group. Shortly after that one was another that read: “Just kidding. The Syrian Electronic Army was here.”

The last two tweets perhaps referred to the brief battle between the SEA and Twitter on April 23, with Twitter banning accounts as fast the Syrian Electronic Army could make them. The hackers created at least 6 Twitter accounts that day, with the social network eventually banning each of them.

As we’ve previously noted, humor fake-news website The Onion, which had also fallen victim earlier this year, posted a write up explaining the result of its investigation into the matter. As had been stated by victims before it, the Syrian Electronic Army managed to get the social media account’s credentials after sending out phishing emails to a few employees, with it usually only taking one to fall for it in order for the plan to be successful. As such, media companies are encouraged to teach their workers how to recognize phishing schemes to help prevent such an attack.

SOURCE: Businessweek


UK’s ITV News hacked by Syrian Electronic Army is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.