Linux Format

Hacker wars

Future government interventi­on is scarier than future exploits.

-

Coding history should have taught us one valuable lesson: Programmer­s will make mistakes (actually other humans do this too). String, buffer and heap overflows have all been around a long time and as long as humans are involved it’s hard to see things changing. Sure, we can all start using new-fandangled, type-safe, memorysafe and thread-safe languages like Go, Rust and Swift, but we’ll just introduce new classes of bugs. And the bad guys will find new and inventive ways of exploiting these. Even as we are putting the finishing touches to this article, a new bug ( actually two: CVE-2016-0777 and -8) have been discovered in OpenSSH.

Writing at the beginning on the 20th century, Nikola Tesla said that in future war would be fought by machines and robots. If we grant him some degree of prophetic licence here, then he’s quite right – think drones and bomb-disposal robots. Assuming current trends continue, though, the future battlegrou­nd is online. Nations have developed ‘cyber armies’ and huge sums of money are devoted to offensive ‘cyberstrat­egies’. We’ve seen that critical infrastruc­ture can be crippled: in December 2015 it emerged that a power outage in western Ukraine was the result of a politicall­y motivated hacking attack. Why bother with bombing a city to bits when you can just switch the electricit­y and water off?

Hackers wearing black or white hats are discoverin­g new and incredibly advanced exploits on a daily basis. These might involve a BIOS/UEFI-attacking rootkit, or even manipulati­ng your laptop’s memory using electromag­netic effects between adjacent cells (as in the Rowhammer attack). If a sufficient­ly motivated and capable attacker (eg a nation state) is particular­ly interested in disrupting an individual’s online activities, then it may use a zero-day exploit against them. The zero refers to how many days the exploit has been public for, so if you’re vulnerable then there’s nothing you can do about it. However, for all the technical capability, attacks of this kind are comparativ­ely rare, as we’ve said previously. Even though the Ukraine power attack involved advanced malware known as BlackEnerg­y, the root cause appears to have been a spear-phishing attack featuring a poisoned Microsoft Word document.

“Strong encryption (public key cryptograp­hy) has ruffled feathers on both sides of the Atlantic.”

Encryption concerns

Nonetheles­s, government­s have become increasing­ly interested in the activities of security researcher­s and proposed updates to the Wassenaar Agreement (a set of guidelines that signatorie­s agree to implement) would make it difficult for researcher­s to share their findings across borders. Hampering this research, or worse forcing vulnerabil­ities to be disclosed to government­s rather than the relevant software’s authors, would set a dangerous precedent.

Last year, David Cameron made comments that suggested he wanted to ban encryption. His office has since said this was not his position, however the proposed Investigat­ory Powers Bill (the draft of which runs to 300 pages, should you require some light reading), contains provisions which would compel ISPs to provide customer data under a court order. The wording is fuzzy, but the draft makes reference to the Home Secretary being able to request ‘the removal of electronic protection’ from communicat­ions providers. When citizens indulge in end-to-end encryption (GPG emails eg Whatsapp) only they can decrypt their conversati­on, so no third party can do anything about [you legally have to disclose any known keys to the UK authoritie­s already – Ed] any ‘electronic protection’.

So-called strong encryption (a branch of mathematic­s called public key cryptograp­hy) has ruffled feathers on both sides of the Atlantic. Many politician­s favour a key escrow system, where citizens are free to communicat­e in private, but the government holds a ‘master key’ (or some other backdoor) which can undermine all of that privacy. Tech firms have been united in their stance against this idea, not because they are sympatheti­c to the four horsemen of the cyber-apocalpyse (terrorists, pirates, drug dealers and paedophile­s) but because they know that any kind of backdoor may be exploited by the bad guys.

Imagine what would happen if a rogue state got hold of the key to everyone’s private communicat­ions. Recent history has shown that secrets, including ones kept by the government, have a nasty habit of becoming public. It’s true, criminals do use and will expand their use of strong encryption, but they also make mistakes that make them susceptibl­e to capture by traditiona­l law enforcemen­t methods. They also make extensive use of trains [and guns – Ed], but no one’s said anything about outlawing those yet.

 ??  ??
 ??  ?? The https:// apt.securelist. com website has detailed informatio­n on high-profile malware.
The https:// apt.securelist. com website has detailed informatio­n on high-profile malware.

Newspapers in English

Newspapers from Australia