Please can you stop the spam, I’m trying to do some work….

Aside from the poor Radiohead reference , really, please quit with the spam.  As I’m sitting in earnest trying to learn more about assembly language before returning to university, I have been peppered with spam.

Spam is much more interesting than an informative 1464 page PDF Assembly text.

This was one of the more poorly crafted Spam mails I’ve seen – the sender address is definitely not Paypal.  So why bother look further?

Curiosity or procrastination is the answer, I’ll let you decide.

So, I thought I’d fire the spam at a free online sandbox  in the interests of practical application of what I am about to study. The sandbox ultimately does some of the hard work and since I dont fully understand reverse engineering yet, I’ll let the tools do the heavy lifting. (I’m still trying to learn remember?)

The domain connected to the login scam was registered today – usually a good sign of something interesting

When one of the sandbox analysis execution had completed, I got some more good info.  The paylod will attempt “API Hooking”.  Effectively this is where a malicious process will attempt to “hook” into a system API call. This time the intention was most likely  to grab user credentials from the PayPal “login”

API hooking is fun right?

 

FYI – There is a great book on Windows API calls that is also part of my course pre-reading. It’s very accessible and worth a read.

You can also read more about this attack technique in simple terms from the good people over at Mitre.

Another aspect of the sandbox analysis is that it has uncovered the potential Command & Control server. This is where the malware “phones home” and awaits instruction/sends data. Once again my curiosity got the better of me, so I’ve turned on a sandboxed PC to try the link.  It didn’t disappoint – a great fake Paypal Login page. (aside from the URL)

The sandbox also outlined that there was manipulation of the Trusted Root certificate store, which might enable the malicious site to fool the user as there may be no “invalid certificate” browser warning. I haven’t had time to really investigate this certificate further. If you’re interested in reading why this might be an issue there is some more great content via Mitre.

The danger of using a “free” sandbox is that the output is shared and so within an hour of me starting the “investigation” it seems like the specific link has been shutdown.

The IP addresses uncovered have a poor history:

It’s likely there will already be another domain registration associated to this IP addresses  and some other lucky people wil be bombarded with SPAM.

Now that I’ve got this out of the way it’s time to mov eax, ebx and get on with the studying!

 



 

 

 

 

NHSx Contact Tracing

What is contact tracing?

Contact tracing is a process where an individual voluntarily installs an application onto their mobile device. The application is designed to use the functions of the mobile such as Bluetooth and networking capability. The application aims to create a record of other devices which have been in proximity. The operation of the application is explained further in Figure 1 below.

There are two main contact tracing scenarios, centralised and decentralised. NHSx has designed and published an application based on the centralised approach[1].  The focus of this assignment is on the centralised model.

Centralised Approach

The original diagram below outlines how the Centralised approach to tracing works. It summarises the information presented by NHSx.[2]

Figure 1 – Centralised Contact Tracing

Relevant Laws

There are several laws with which the application needs to comply.

Law

Why this is important

General Data Protection Regulations (GDPR) EU 2016/679

“GDPR sets out key principles, rights, and obligations for processing personal data”[3].  It is a European regulation which has been implemented in each member state. It remains in force for as long as Britain remains a member of the European Union and it will be written into the Withdrawal Agreement. There are some subtle differences between GDPR and DPA. However, it is the basis of the revised DPA 2018.

Personal data is information which relates to an individual or identifiable individual[4].  The data collected by the app is pseudonymised. However, there are sufficient constants within the data that may enable a technically skilled actor to seek out an individual effectively. The NHSx Data Privacy Impact Assessment highlights the rationale for declaring why it considers the data to be personal. This document is in “Approved” state.

Data Protection Act 2018 (DPA)

DPA 2018 is the UK government implementation of the GDPR. It is read in conjunction with GDPR. The fundamental reason for DPA applying to this application is that it is collecting information about individuals.

NHS is defined as a Data Controller under DPA. The DPA governs how any organisation must act with regards to their approach to obtaining and processing data.

There are several Data Protection Principles within the act, listed below.  The NHSx App must comply with these.

·         Lawfulness, fairness and transparency

·         Purpose limitation

·         Data minimisation

·         Accuracy

·         Storage limitation

·         Integrity and confidentiality

·         Accountability

 

 

European Human Rights Law

Article 8 – Right to respect for private and family life, home and correspondence. Users who have agreed to install the app expect privacy namely that any data harvested from the phone within the app will not be used for purposes other than tracking the spread of Covid-19 and advising whether there has been any contact with potentially infected individuals.

Health and Social Care Act 2012

The HASCA required the establishment of the Health and Social Care Information Centre. This later became known as NHSx or NHS Digital[5]. Within this act, NHS Digital is required to comply with the Code of Practice on Confidential Information[6] outlined in Section 263 (1-7) This is summarised as the Coldicott principles[7].

Freedom of Information Act 2000 (FOIA)

The FOIA sets out how Public authorities must publish certain information about their activities and grants member of the public access to information held by public authorities in Great Britain and Northern Ireland. In the context of Covid 19 application, NHSx has already, proactively, published substantial details on the application[8] . There will likely be future FOIA requests to release more detailed data.

Control of Patient Information 2002 (COPI)

These regulations set out the conditions under which confidential patient data may be shared within the healthcare setting. Although the app itself will not share personal indicators such as name, address and date of birth, there is a requirement to adhere to COPI.  Specifically, regulation 3 provides for the processing of confidential patient information for purposes relating to infectious disease and other risks to public health. The current thinking from NHSx is that “We are working on the basis that information about health symptoms that users report using the App may qualify”[9]

Data Privacy Impact Assessment

Since the introduction of GDPR and DPA 2018, PIA is now known as Data Privacy Impact Assessment. The DPIA structure has been obtained from ICO[10]

Covid

Image 1 of 1

Conclusion

There are several issues with the application and the presentation of related information:

  • The absence of specific legislation supporting how the application is governed. While existing legislation such as DPA and GDPR provide elements of governance and control around data, they do not necessarily align with Article 8 from the European Convention on Human Rights. There is a valid counterargument that application usage is voluntary, and users of the app are asked to consent to share data. However, it is beyond a reasonable expectation that most users of the application will fully understand the broader ramifications of the application data and the issues outlined in the DPIA above.
  • The decision to build a centralised application contravenes a recommendation of the Information Commissioner’s Office[13]. It also represents a conflicting approach in respect of major smartphone manufacturers who have opted to develop a decentralised model[14].
  • The right to be forgotten. While users can uninstall the application from their phone, and this removes data from the device, it is unclear whether that action removes server-side data. However, it should also be noted that as this application has been developed for public health reasons, it is unlikely that this applies.[15] The right to be forgotten is not an absolute right.
  • Application design is ambiguous. When reviewing the design document,[16] there is a reference to “other systems” these are undeclared at the time of writing. Risk is therefore introduced as to what these systems are, where they reside, what data is being transferred and who might have access to the data.
  • Due to how an application user can submit that they are experiencing symptoms of Covid-19, it is possible that malicious individuals could falsely report. Further to this, it would also be possible for a malicious individual to carry out an amplification attack whereby the number of contacts could be deliberately increased. This amplification could force NHS into deploying resources where they are not needed. A similar incident has happened recently in Berlin[17].
  • As a result of the previous point, there is also a potential impact on otherwise healthy individuals as they may receive a ‘false-positive’ notification that they have been in contact with a suspected Covid-19 positive individual. Because the decision making on the central servers is effectively automatic many individuals could be wrongly advised on their potential Covid-19 status.
  • There are numerous contradictory statements concerning the nature and classification of data. Matthew Gould, CEO NHSx[18] and Ian Levy[19] have said in independent reports that the application does not hold or generate any data which would be considered personal. However, this contradicts the NHSx DPIA for the application9

[1] https://covid19.nhs.uk/

[2] https://covid19.nhs.uk/how-the-app-works.html

[3] https://ico.org.uk/for-organisations/guide-to-data-protection/introduction-to-data-protection/about-the-dpa-2018/

[4] https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/key-definitions/what-is-personal-data/

[5] https://www.gov.uk/government/news/hscic-changing-its-name-to-nhs-digital

[6] http://www.legislation.gov.uk/ukpga/2012/7/part/9/chapter/2/enacted

[7] https://digital.nhs.uk/data-and-information/looking-after-information/data-security-and-information-governance/codes-of-practice-for-handling-information-in-health-and-care/code-of-practice-on-confidential-information

[8] https://github.com/nhsx/COVID-19-app-Documentation-BETA

[9] Data Protection Impact Assessment NHS COVID-19 App PILOT LIVE RELEASE Isle of Wight

[10] https://ico.org.uk/media/for-organisations/documents/2553993/dpia-template.docx

[11] It is not clear from the application documentation that possibility of location leakage has been contained. https://developer.android.com/guide/topics/connectivity/bluetooth#Permissions

[12] https://www.gov.uk/government/organisations/national-data-guardian

[13]https://ico.org.uk/global/data-protection-and-coronavirus-information-hub/blog-combatting-covid-19-through-data-some-considerations-for-privacy/

[14]https://ico.org.uk/global/data-protection-and-coronavirus-information-hub/blog-combatting-covid-19-through-data-some-considerations-for-privacy/

[15]https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-to-erasure/

[16]https://github.com/nhsx/COVID-19-app-Documentation-BETA/blob/master/Overview%20-%20External%20system%20linking%20with%20Privacy.pdf

[17]https://www.theguardian.com/technology/2020/feb/03/berlin-artist-uses-99-phones-trick-google-maps-traffic-jam-alert

[18] Q20  –  https://committees.parliament.uk/oralevidence/334/pdf/

[19] https://www.ncsc.gov.uk/blog-post/security-behind-nhs-contact-tracing-app

 

Hey Crypto, you aint so bad !

Movie fans might recognise the reference in the title. This is exactly how I feel having recently completed Cryptography module as part of MSc in Applied Cyber Security

It’s been a long time since I was in the world of academia. This was a baptism of fire. Over the course of 1 month, I had to go from zero to 100 m.p.h in cryptography as well as balancing work/personal life and the busy Christmas season!

I had a number of issues to overcome, the first and most challenging one was getting to grips with the mathematics. For the purists out there, you could say crypto is just prime numbers, and you’re right.  I began to say it was just hard sums ! However, understanding the many different permutations of symmetric and asymmetric crypto is not for the faint-hearted when trying to calculate these without a nuclear-powered computer!

Another challenge was quickly learning to write academic reports in LaTeX format.  The pre-cursor to that, of course, was checking out some books in the library. I felt truly embarassed that I had no idea how to actually check a book out of the university library.  I rarely used the library as an undergrad – a degree in Music Technology didn’t necessitate such heinous activity! Thankfully, the librarians were sympathetic and incredibly helpful.

Now, don’t mistake my lack of library usage for lack of knowledge! I have completed a boatload of technical and professional courses since graduation in 2003 – I’m just not a pleasure reader!

Now that the module has completed, I’m proud to say that I got  a distinction in the module.

So Crypto, you ain’t so bad!

Welcome back

So massive apologies for the recent neglect of the site… Sometimes life gets in the way…

I’ve found some useful Github content covering some of the areas I am interested in and this post is more like a permanent bookmark for me. I hope you find it useful too….

https://github.com/jivoi/awesome-osint – Some Good OSINT resources here and worth spending some time reviewing.

https://github.com/enaqx/awesome-pentest Another decent list on github

I’ve also started out on a malware analysis course via https://0verfl0w.podia.com/courses/malware-analysis-course

BT remove Huawei, or do they ?

Recently, BT have come out in public and declared that they will no longer tolerate Huawei’s devices on their 3g and 4g network.

Huawei have long been suspected of being a faction of the Chinese Intelligence services . However, the company themselves have always strenuously denied the allegation, Their European website doesn’t really confirm or deny any direct links to the Chinese government. This assertion, of course, is hardly a surprise. If you’re in any way proficient with internet search engines, you can research this more and draw your own conclusions.

This recent hype, led to me see what I could see on Shodan related to Huawei and BT.  Judging by the search, it seems to my uneducated eyes, that there is a proliferation of Huawei devices as part of the wider BT network. My understanding of the search, is that these are the older standalone modems which BT provided as part of their home broadband packages.

Digging a little deeper into the relationship between BT and Huawei and it appears that earlier in 2018 BT Openreach put a lot of their residential broadband eggs into the Huawei basket

What does this “new” relationship mean ?

Fibre to the Premises (FTTP) broadband will put BT into direct competition with providers such as Virgin Media who have had FTTP for a long time where as BT have offered Fibre to the Cabinet (FTTC) then copper to the home for an equally long time.

Ultimately the BT version of the  FTTP concept will be welcome competition against Virgin Media (and others) and will hopefully spark a price war in which the long suffering consumer “might” win with lower prices.

But wait – didn’t BT remove some of Huawei’s kit from their telephony network ?

Yes, they did. So isn’t it all a little contradictory that  one part of BT is very concerned about the telephony equipment, yet another part of the organisation has Huawei firmly at the centre of their broadband connectivity ?

Extrapolating out from this, and fueling the paranoia, it’s entirely possible that there could be any number of backdoors into these Huawei devices which would enable PLA61398 to launch cyber attacks on demand with this zombie network of devices…

Just some food for thought for whenever BT come calling with their new broadband offer “Hey, we’ve got this great new fibre broadband”.  It might just bring War Games into your living room….

 

 

Springsteen on Broadway – The proverbial free lunch

So as a more recent convert (in the last 10 years) to the great  songs that Bruce Springsteen and the eStreet Band have created, I was intrigued to hear about the recent run of shows on Broadway. 

I was even more excited to hear that there will be a range of recordings available from this residency.

By the time I found out that you could win a money can’t buy trip thanks to Sony Music,  I decided to sign up.

All you have to do is connect to the site via one of your social media apps. Most of us will have some form of account that could be used, right?

Let’s have a closer look at this

Connecting via Twitter and the very helpful people who run the Sony site will be able to potentially do a lot of things on your behalf

For now, we’ll have to assume they wont post any offensive tweets as you, but no guarantees here.  Imagine they get hacked and owned

In this social media world in which we live, where nothing you post gets forgotten,  a breached account and subsequent tweets will  potentially still be found even after they’re deleted from twitter.

However, this wasn’t the worst offender – let’s look at what they want to do via your spotify account.

Access your subscription details – wow! To do what? I am struggling to think of a reason why they’d need to see into your subscription details

But it’s OK, Sony Music have a Privacy Policy, outlining exactly how they will use your data

I don’t have the inclination to write more on that policy now.

What Sony  don’t appear to have is a policy for how they will ensure you’re adequately protected in the event of a breach on their site. Whilst this isnt necessarily something you’d expect any company which processes your data  to have,  we have to put trust in their security controls. (Did you ever think Sony Pictures could have been hacked? )

This is a classic “free lunch” tactic and people need better privacy awareness. I estimate the total trip value to be £2500. I’m not entirely sure how much value my privacy has in monetary terms,  but certainly it’s worth more than what Sony Music have to offer for it in return….

 

Website security