{"id":11210,"date":"2016-01-28T17:27:42","date_gmt":"2016-01-28T23:27:42","guid":{"rendered":"http:\/\/hcstx.org\/?p=11210"},"modified":"2016-01-28T17:27:42","modified_gmt":"2016-01-28T23:27:42","slug":"device-opsec-if-you-use-an-lg-device-read-this","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/01\/28\/device-opsec-if-you-use-an-lg-device-read-this\/","title":{"rendered":"Device OPSEC: If You Use an LG Device, Read This!"},"content":{"rendered":"<h1 class=\"headline \" style=\"text-align:center;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-11211\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/01\/lg-635x357.jpg?w=620\" alt=\"lg-635x357\" width=\"620\" height=\"349\" \/><\/h1>\n<h1 class=\"headline \" style=\"text-align:center;\">Millions of LG phones at risk, Israeli team discovers<\/h1>\n<h2 class=\"underline\" style=\"text-align:center;\">For the second time in a month, researchers at cyber-security firms BugSec and CyNet have discovered a major security problem that leaves tens of millions of users at risk<\/h2>\n<p>For the second time in a month, an Israeli team has uncovered a major security breach built in smartphone hardware that millions of users depend upon \u2013 and expect to be safe to use. A joint team of researchers from Israeli cyber security firms Cynet and BugSec announced their find on Thursday.<\/p>\n<p>Just three weeks ago, the same team unveiled a security flaw allowing hackers to breach through firewalls and control computers and laptops.<\/p>\n<p>\u201cWe were doing research on apps that we believed had vulnerabilities, and were using an LG G3 device to do it,\u201d Idan Cohen, CTO of BugSec, told The Times of Israel exclusively. \u201cBut we noticed that there seemed to be a security hole in all the apps we were testing \u2013 and it was then we realized we were dealing with a security problem endemic to the device.\u201d<\/p>\n<p>That problem, called the SNAP vulnerability, takes advantage of a built-in feature on LG\u2019s most popular model. \u201cIt uses a flaw in one of the LG applications, Smart Notice, which is pre-installed automatically on every new LG device. Smart Notice displays to users the recent notifications that can be forged to inject unauthenticated malicious code.\u201d<\/p>\n<p>The team has known about the vulnerability for several months, said Cohen, but waited until LG developed a patch to protect phones before going public with the information. It should be noted that there are no documented cases of a hacker using the vulnerability \u2013 but given the potential use, LG immediately began working on a fix, which was released this week, prior to the Cynet\/BugSec announcement.<\/p>\n<p>Although now superseded by the G4, LG\u2019s G3 model remains very popular with its users. \u201cThe G4 has only been on the market for a few months, and most users haven\u2019t upgraded yet, so there are still many G3s in use. Because the vulnerability is in the built-in Smart Notice application, any app that uses it \u2013 and almost every app that gets messages does \u2013 is a potential vehicle for hackers to use to reach an individual\u2019s device, stealing data, sending revealing photos stored on the device to social media, grabbing saved credit card information, etc.,\u201d Cohen said.<\/p>\n<p>The vulnerability allows hackers to use a JavaScript routine to run server side code, allowing them to extend the reach of code to take control of a device. In a blog post, the researchers detail and demonstrate how they were able to grab phone numbers and ID information out of a phone\u2019s memory, access a phishing site with a device\u2019s browser to download malware, or even to run a denial of service hack attack against a web site \u2013 directly from the device, without its owner even being aware of what was going on. \u201cThe malicious code could be delivered by apps that utilize messaging services,\u201d said Cohen. \u201cWe created two \u2013 one that informed users of WhatsApp messages, and one that prompted them to scan a QR code \u2013 but many other methods could be used as well.\u201d<\/p>\n<p>Upon discovering the problem, Cohen said that the team \u2013 led by researchers Liran Segal and Shachar Korot \u2013 did the responsible thing and informed LG. \u201cThey were very professional about it, and worked with us to understand the problem and ways to fix it,\u201d said Segal. \u201cAs to how they allowed such a vulnerability into their device, they didn\u2019t explain and we didn\u2019t ask,\u201d as the matter was an internal LG one. \u201cI imagine they are doing their own internal reckoning right now,\u201d he said.<\/p>\n<p>Acknowledging the issue wasn\u2019t necessarily the way firewall makers reacted last month when another team of BugSec and CyNet researchers informed them about the massive design flaw in next-generation firewalls, which examine application communications instead of port access to determine whether or not a hacker is trying to break through.<\/p>\n<p>In that case, as well, a JavaScript flaw allowed hackers to waltz through the firewall\u2019s protective shield and take control of computers and servers. \u201cThis vulnerability could potentially be a big risk for organizations,\u201d said Stas Volfus, Head of Offensive Security for the team. \u201cIt\u2019s built into all next generation firewalls, and if we were able to exploit it, hackers will be able to do so as well.\u201d<\/p>\n<p>Instead of thanking the team, though, some manufacturers \u2013 Cohen won\u2019t say which ones \u2013 responded by saying that they knew all about the vulnerability, and they weren\u2019t worried about it. The hacker community had been aware of the problem for several years, but no attacks using the vulnerability had yet been reported \u2013 meaning that other security measures were sufficiently protecting the systems.<\/p>\n<div class=\"FIOnDemandWrapper\">\n<div class=\"apd_static_banner \">\u201cWe were a bit surprised, too,\u201d said Cohen, declining to elaborate. The criticism of the team\u2019s \u201cparanoia\u201d was a topic of discussion among a (very geeky) segment of the cyber-security community last month, with experts weighing on both sides \u2013 and to bolster its arguments, the team released a video showing the potential damage that could result from the vulnerability, despite the other protective measures in a device.<\/div>\n<\/div>\n<p>With the discovery of two major breaches under their belt, the Israeli companies are on a roll. \u201cApparently there are other such \u2018design flaws\u2019 in products on different levels \u2013 hardware and software \u2013 and we are in the middle of working on several others, details of which we will reveal soon,\u201d said Cohen. \u2018This one was unique because it potentially could affect so many people.\u201d<\/p>\n<p>Read the Original Article at <strong><a href=\"http:\/\/www.timesofisrael.com\/millions-of-lg-phones-at-risk-israeli-team-discovers\/?utm_source=Start-Up+Daily&amp;utm_campaign=96016c913a-2016_01_28_SUI1_28_2016&amp;utm_medium=email&amp;utm_term=0_fb879fad58-96016c913a-55376653\">Times of Israel<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Millions of LG phones at risk, Israeli team discovers For the second time in a month, researchers at cyber-security firms BugSec and CyNet have discovered a major security problem that leaves tens of millions of users at risk For the second time in a month, an Israeli team has uncovered a major security breach built&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2805,2122,13,74,1317,883,65],"tags":[4148,4149,4150,4151,4152,3464],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11210"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=11210"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11210\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=11210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=11210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=11210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}