BlackBerry hacking peril exposed

Blackjacking circumvents corporate defences


A hacking program, due to be released next week, will demonstrate how to use a connection from BlackBerry devices to potentially bypass enterprise security defences.

Jesse D'Aguanno, director of security research at German firm Praetorian Global, gave a presentation on how to use the BlackBerry environment to circumvent perimeter defenses and directly attack hosts on a corporate intranet at last week's DefCon conference in Vegas. The demo included a live presentation. Next week D'Aguanno plans to release source code for BBProxy, the tool used to conduct the attack, which he describes as "Blackjacking".

BBProxy can be installed on a BlackBerry or sent in an email attachments to potential targets. The code can be hidden in something apparently innocuous such as a naughts and crosses game, D'Aguanno suggests. Once activated, BBProxy opens a covert channel between hackers and compromised hosts on improperly secured corporate networks. The communications channel between the BlackBerry server and handheld device is encrypted and cannot be properly inspected by typical security products.

D'Aguanno said that he's publishing information about the attack, along with details on possible defences, in order to highlight the dangers of treating BlackBerry environments as more secure than external connections from corporate laptops. Other security experts, along with Research In Motion, the supplier of BlackBerry devices and associated enterprise server products, stress the need to establish properly segmented networks to defend against such attacks.

Paul Henry, vice president at net security firm Secure Computing, commented: "Servers connecting to the public internet have an inherent risk. Isolating these Internet facing servers reduces the risk of a compromised server providing access to other critical servers. Hence due diligence would require that any internet facing server like a BlackBerry server should be isolated [behind a firewall] on its own DMZ segment.

"Only those connections necessary to facilitate the operation of the BlackBerry server should be permitted. The BlackBerry server should not be permitted to open arbitrary connections to the internal network or internet. The mail server that is working with the BlackBerry server... should also be isolated on it’s own separate DMZ," he added.

RIM is playing down the risk of the attack demonstrated by D'Aguanno by saying that network administrators can deny users the ability to run third-party applications, such as games sent by email, the main vector for attack suggested by D'Aguanno. The firm has published guidelines on how to defend BlackBerry environments against compromise on the security segment of its BlackBerry website here. ®


Other stories you might like

  • China is trolling rare-earth miners online and the Pentagon isn't happy
    Beijing-linked Dragonbridge flames biz building Texas plant for Uncle Sam

    The US Department of Defense said it's investigating Chinese disinformation campaigns against rare earth mining and processing companies — including one targeting Lynas Rare Earths, which has a $30 million contract with the Pentagon to build a plant in Texas.

    Earlier today, Mandiant published research that analyzed a Beijing-linked influence operation, dubbed Dragonbridge, that used thousands of fake accounts across dozens of social media platforms, including Facebook, TikTok and Twitter, to spread misinformation about rare earth companies seeking to expand production in the US to the detriment of China, which wants to maintain its global dominance in that industry. 

    "The Department of Defense is aware of the recent disinformation campaign, first reported by Mandiant, against Lynas Rare Earth Ltd., a rare earth element firm seeking to establish production capacity in the United States and partner nations, as well as other rare earth mining companies," according to a statement by Uncle Sam. "The department has engaged the relevant interagency stakeholders and partner nations to assist in reviewing the matter.

    Continue reading
  • California's attempt to protect kids online could end adults' internet anonymity
    Websites may be forced to verify ages of visitors unless changes made

    California lawmakers met in Sacramento today to discuss, among other things, proposed legislation to protect children online. The bill, AB2273, known as The California Age-Appropriate Design Code Act, would require websites to verify the ages of visitors.

    Critics of the legislation contend this requirement threatens the privacy of adults and the ability to use the internet anonymously, in California and likely elsewhere, because of the role the Golden State's tech companies play on the internet.

    "First, the bill pretextually claims to protect children, but it will change the Internet for everyone," said Eric Goldman, Santa Clara University School of Law professor, in a blog post. "In order to determine who is a child, websites and apps will have to authenticate the age of ALL consumers before they can use the service. No one wants this."

    Continue reading
  • Is computer vision the cure for school shootings? Likely not
    Gun-detecting AI outfits want to help while root causes need tackling

    Comment More than 250 mass shootings have occurred in the US so far this year, and AI advocates think they have the solution. Not gun control, but better tech, unsurprisingly.

    Machine-learning biz Kogniz announced on Tuesday it was adding a ready-to-deploy gun detection model to its computer-vision platform. The system, we're told, can detect guns seen by security cameras and send notifications to those at risk, notifying police, locking down buildings, and performing other security tasks. 

    In addition to spotting firearms, Kogniz uses its other computer-vision modules to notice unusual behavior, such as children sprinting down hallways or someone climbing in through a window, which could indicate an active shooter.

    Continue reading
  • Arm says its Cortex-X3 CPU smokes this Intel laptop silicon
    Chip design house reveals brains of what might be your next ultralight notebook

    Arm has at least one of Intel's more capable mainstream laptop processors in mind with its Cortex-X3 CPU design.

    The British outfit said the X3, revealed Tuesday alongside other CPU and GPU blueprints, is expected to provide an estimated 34 percent higher peak performance than a performance core in Intel's upper mid-range Core i7-1260P processor from this year.

    Arm came to that conclusion, mind you, after running the SPECRate2017_int_base single-threaded benchmark in a simulation of its CPU core design clocked at an equivalent to 3.6GHz with 1MB of L2 and 16MB of L3 cache.

    Continue reading

Biting the hand that feeds IT © 1998–2022