https://www.washingtonpost.com/business/2019/08/12/def-con-hackers-lawmaker…
Hackers were told to break into U.S. voting machines. They didn’t have much trouble.
Taylor Telford
(Steve Marcus/Reuters)
LAS VEGAS — As Sen. Ron Wyden (D-Ore.) toured the Voting Village on Friday at Def Con, the world’s hacker conference extraordinaire, a roomful of hackers applied their skills to voting equipment in an enthusiastic effort to comply with the instructions they had been given: “Please break things.”
Armed with lock-pick kits to crack into locked hardware, Ethernet cables and inquiring minds, they had come for a rare chance to interrogate the machines that conduct U.S. democracy. By laying siege to electronic poll books and ballot printers, the friendly hackers aimed to expose weaknesses that could be exploited by less friendly hands looking to interfere in elections.
Wyden nodded along as Harri Hursti, the founder of Nordic Innovation Labs and one of the event’s organizers, explained that the almost all of the machines in the room were still used in elections across the United States, despite having well-known vulnerabilities that have been more or less ignored by the companies that sell them. Many had Internet connections, Hursti said, a weakness savvy attackers could abuse in several ways.
Wyden shook his head in disbelief.
“We need paper ballots, guys," Wyden said.
After Wyden walked away, a few hackers exchanged confused expressions before figuring out who he was.
“I wasn’t expecting to see any senators here,” one said with a laugh.
In the three years since its inception, Def Con’s Voting Village — and the conference at large — has become a destination not only for hackers but also for lawmakers and members of the intelligence community trying to understand the flaws in the election system that allowed Russian hackers to intervene in the 2016 election and that could be exploited again in 2020.
This year’s programming involved hacking voting equipment as well as panels with election officials and security experts, a demonstration of a $10 million experimental voting system from the Pentagon’s Defense Advanced Research Projects Agency, and a “part speed-dating, part group therapy" session where state and local election officials gathered with hackers to hash out challenges of securing elections.
Congregants spoke often of the need for thorough auditing of election results, increased funding and improved transparency from vendors. The call for paper ballots was a common refrain. At the time of the 2018 midterm elections, Delaware, Georgia, Louisiana, New Jersey and South Carolina had no auditable paper trails.
“Election officials across the country as we speak are buying election systems that will be out of date the moment they open the box,” Wyden said in the Voting Village’s keynote speech. “It’s the election security equivalent of putting our military out there to go up against superpowers with a peashooter.”
House Democrats have introduced two bills that would require paper records to back up voting machines, mandate post-election audits and set security standards for election technology vendors. But Senate Majority Leader Mitch McConnell (R-Ky.) has repeatedly blocked votes on the bills, saying election security is the province of the states.
Last month, the Senate Intelligence Committee released a report detailing how Russian hackers probably targeted all 50 states between 2014 and 2017. Although the report did not find evidence that Russian actors tampered with vote tallies on Election Day, the committee said that hackers “exploited the seams” between federal and state authorities and that states weren’t sufficiently prepared to handle such an attack.
“In 2016, cybersecurity for electoral infrastructure at the state and local level was sorely lacking,” the report reads. “Voter registration databases were not as secure as they could have been. Aging voting equipment, particularly voting machines that had no paper record of votes, were vulnerable to exploitation by a committed adversary. Despite the focus on this issue since 2016, some of these vulnerabilities remain.”
Local election officials at Def Con echoed these fears. Joel Miller, an election auditor in Linn County, Iowa, and repeat Def Con attendee, said he’ has had to file Freedom of Information Act requests and a Help America Vote Act complaint to try to get answers about security concerns in the state’s voter registration system from Iowa’s secretary of state. Russian hackers attempted to infiltrate the system in 2016, and while an overhaul of the 14-year-old system is impending, officials have said it will not be replaced before 2020.
“We don’t know what’s going on with the system,” Miller said. “I’m a former IT director, and I know more about what I don’t know, but that’s almost worse than if I didn’t have a tech background. I’m aware there’s more threats out there than we can handle.”
A spokesman for the Iowa secretary of state defended the security of the state’s systems and noted that Secretary of State Paul D. Pate’s chief of staff also attended Def Con this year. “Iowa’s system is secure and we work every day to ensure it remains secure,” the spokesman, Kevin Hall, said in an emailed statement. “Cybersecurity threats are constantly evolving and we are constantly evaluating what’s in place and what gains we can make. This is a race without a finish line.”
At the Voting Village, nestled in a ballroom in the sprawling Planet Hollywood convention center, hackers put the machines’ weaknesses on display with playful flourishes, overtaking one electronic poll book to play the first-person shooter game Doom on it, or leaving Nyan Cat, a Japanese meme, sailing across the screen of another made by VR Systems. Ahead of the 2016 election, Russian hackers installed malware on VR Systems’ company network, The Washington Post reported.
The Voting Village has faced extreme pushback from voting equipment companies and government officials in the past. They’ve argued that the free-for-all environment at Def Con doesn’t replicate the realities of security on Election Day. The National Association of Secretaries of State condemned the exercise as “unrealistic” last year, and Election Systems & Software, one of the major voting machine vendors, sent a letter to its customers making the same argument.
"Physical security measures make it extremely unlikely that an unauthorized person, or a person with malicious intent, could ever access a voting machine,” ES&S wrote last year.
ES&S and VR Systems did not respond to requests for comment about this year’s village.
Hursti said vendors have used legal threats to “create a chilling effect” on research of their equipment, and that they were “actively trying to shoot the messengers” rather than reckon with the weaknesses in their products. That lack of cooperation has left organizers to search for machinery to use at the Voting Village: Some equipment was rescued from a warehouse where the roof collapsed, while other was snagged in government surplus auctions or on eBay, Hursti said.
“One rebuttal is to say we give a lot of access to the machines, but in reality, that’s how research works. Whether or not you can show me how to attack this machine in x or y setting is beside the point,” Hursti said. “This is about discovering vulnerability and stopping it before weaponization.”
The first primary votes of the 2020 election will be cast in the Iowa caucuses in just a few months, but it’s impossible to patch the gaping security holes in U.S. election security by then, or even by Election Day, Hursti said.
“Everyone claiming we can fix this by 2020 is giving a false sense of security,” Hursti said. “The aim should be, can we do something by 2022 or 2024?”
Hours after the Voting Village opened, it was packed with hackers sporting T-shirts with slogans such as, “If I’m not on the government watchlist, someone isn’t doing their job” and “Come to the Dork side" — all eager to test their skills as an act of civic service. By the end of the weekend, they would uncover a litany of new vulnerabilities in the voting equipment, ranging from gallingly obvious passwords to hardware issues and exposure to remote attacks.
On Friday afternoon, one conference attendee meandered through the labyrinth of tables covered in dusty voting equipment and Pabst Blue Ribbon cans, explaining the enterprise to his less-well-versed companion.
“So, this is how the Russians did it,” he said, as a hacker near him crowed about how easy it was to pick the lock on a machine. “The fate of our whole country rests on these machines.”
He shuddered.
Sent from my iPad 2018
Kakvi vrljavi programeri... :(
https://www.theregister.co.uk/2019/08/13/windows_notepad_flaw/
We checked and yup, it's no longer 2001. And yet you can pwn a Windows box via Notepad.exe
Google guru shows how WinXP-era text code grants total control
By <https://www.theregister.co.uk/Author/Shaun-Nichols> Shaun Nichols in San Francisco 13 Aug 2019 at 20:40
Patch Tuesday Software buried in Windows since the days of WinXP can be abused to take complete control of a PC with the help of good ol' Notepad and some crafty code.
On Tuesday, ace bug-hunter Tavis Ormandy, of Google Project Zero, detailed how a component of the operating system's <https://docs.microsoft.com/en-us/windows/win32/tsf/text-services-framework> Text Services Framework, which manages keyboard layouts and text input, could be exploited by malware or rogue logged-in users to gain System-level privileges. Such level of access would grant software nasties and miscreants total control over, and surveillance of, the computer.
Advertisement
The flaw, designated <https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019…> CVE-2019-1162, is patched in this month's Patch Tuesday release of security fixes from Microsoft. The relevant update should be installed as soon as possible.
After a lengthy investigation, Ormandy <https://googleprojectzero.blogspot.com/2019/08/down-rabbit-hole.html> discovered that the component in question, CTextFramework aka CTF, which dates as far back as the Windows XP era, is riddled with security flaws, which can be exploited via applications that interact with it to handle text on screen.
"It will come as no surprise that this complex, obscure, legacy protocol is full of memory corruption vulnerabilities," Ormandy said. "Many of the Component Object Model objects simply trust you to marshal pointers across the Advanced Local Procedure Call port, and there is minimal bounds checking or integer overflow checking.
Advertisement
"Some commands require you to own the foreground window or have other similar restrictions, but as you can lie about your thread id, you can simply claim to be that Window's owner and no proof is required."
<https://www.theregister.co.uk/2019/08/12/microsoft_windows_bad_drivers/> READ MORE
With this in mind, Ormandy was able to develop a proof-of-concept tool that abused CTF, via Notepad, to launch a command-line shell with System-level privileges.
"The obvious attack is an unprivileged user injecting commands into an Administrator's console session, or reading passwords as users log in. Even sandboxed AppContainer processes can perform the same attack," Ormandy explained.
"Another interesting attack is taking control of the UAC consent dialog, which runs as NT AUTHORITY\SYSTEM. An unprivileged standard user can cause consent.exe to spawn using the 'runas' verb with ShellExecute(), then simply become System."
Advertisement
In the grand scheme of things, the uncovered flaws, while fascinating, are not totally Earth shattering. Elevation-of-privilege holes in Windows are a dime a dozen, and Microsoft patches what feels like scores of them a year. In order to abuse CTF, a scumbag has to be running code on your machine anyway, which is not a good situation.
Threat modeling aside, the fact that the vulnerability was found in a basic component of Windows that had been exposed to applications for more than a decade is both a testament to Ormandy's skill at bug-hunting and an example of just how complex and voluminous Windows has become over its thirty-year-plus lifetime, and what a massive challenge that complexity presents Microsoft's engineers from a security standpoint.
"These are the kind of hidden attack surfaces where bugs last for years," Ormandy noted. "It turns out it was possible to reach across sessions and violate NT security boundaries for nearly twenty years, and nobody noticed." ®
Sponsored: <https://go.theregister.co.uk/tl/1848/shttps:/www.mcubed.london/?utm_source=…> MCubed - The ML, AI and Analytics conference from The Register.
Sent from my iPad 2018
-----Original Message-----
From: Dejan Ristanovic <dejan(a)ristanovic.com>
Sent: Tuesday, August 13, 2019 1:24 PM
Subject: Evolution of the internet: Celebrating 50 years since Arpanet |
Network World
https://www.networkworld.com/article/3410588/evolution-of-the-internet-celeb
rating-50-years-since-arpanet.html
Sent from my iPad 2018=
Za objavu
_________
Ksenija Kostić
Marketing
www.pcpress.rs
PC Press | Osmana Đikića 4 | 11000 Beograd | Srbija
Tel: +381 11 2080-220 | Mob: +381 63 125 00 26
-----Original Message-----
From: nebojsa.raskovic(a)unitedcommunications.rs [mailto:nebojsa.raskovic@unitedcommunications.rs]
Sent: 13 August 2019 12:58
To: Ksenija Kostić <ksenija(a)pcpress.rs>
Subject: Coming saopštenje za avgust mesec
Pozdrav Ksenija,
možeš li ovo da pustiš danas-sutra. Ima i Vas :).
S poštovanjem,
Nebojša Rašković