USA TODAY US Edition

Don’t ignore those reminders to install security updates

Companies getting faster at fixing vulnerabil­ities

- Robert Pegoraro

LAS VEGAS – Complexity is the enemy of security, but prompt patching is its strongest ally.

Security profession­als have made those points for years, but two presentati­ons at the Black Hat USA conference here provided fresh arguments for them – and signs companies are getting snappier at fixing vulnerabil­ities.

What that means for you: When your computer, phone or tablet says it has an update available, install it. Don’t wait to benefit from the tighter focus of an Apple, Google or Microsoft on security issues.

Support for that came in one Black Hat briefing covering a “vuln” in Apple’s device-management system that lets organizati­ons configure Macs from afar.

Jesse Endahl, chief security officer at the device-management firm Fleetsmith, and Max Belanger, staff engineer with the cloud-storage company Dropbox, explained how they exploited the Mac operating system’s failure to double-check the identity of some sites in these remote-setup scenarios.

“This is a really complex system on macOS with a lot of moving parts,” Belanger said onstage. “What that means is vulnerabil­ities or bugs can appear at the borders.”

That let them force a new Mac into a scripted configurat­ion process that installed a hostile app without the user’s permission.

It’s not an easy tactic. As Endahl said during the talk, “This can’t be done without a lot of resources.” The attacker would need to get a developer certificat­e from Apple under false pretenses, then tamper with a Mac’s Internet connection to redirect it to a hostile site.

But as Belanger explained in a conversati­on afterward, countries that censor internet access and resent press coverage would have the motivation and means to attack foreign journalist­s this way.

The two presenters saved their good news for last: They reported the bug to Apple on April 28, and on July 9 Apple shipped an update fixing it.

Four other Black Hat presenters shared a similar story Wednesday afternoon. Israeli security researcher Ami- chai Shulman, KZen Networks cofounder Tal Be’ery and Israel Institute of Technology students Ron Marcovich and Yuval Ron showed how Windows 10’s Cortana voice-driven digital assistant could be exploited from the lock screen to reveal files and push malware.

In one attack, they showed how they could get Cortana to preview or run random files without unlocking the computer. The underlying problem: leaving too many Cortana functions exposed to anybody who talks to a locked PC.

Be’ery joked onstage: “Come on, lock screen, you had one job!”

In another, they demonstrat­ed how a “skill” for Cortana – as with Amazon’s Alexa, these formulas let the digital assistant tackle specific tasks – could make the PC’s browser go to a hostile site or open an infected Microsoft Office document.

Both attacks play into what security profession­als call the evil maid scenario: You leave the computer in your hotel room, leaving an attacker time to try to get in without your computer password.

But neither will work on a patched Win 10 PC. Microsoft fixed the first vulnerabil­ity June 12, just less than three months after the researcher­s reported it April 16. It fixed the second one almost as fast – although because that patch came in Microsoft’s cloud services, no formal announceme­nt came.

In the keynote opening Black Hat, Google engineerin­g director Parisa Tabriz voiced her optimism about the state of security, thanks in part to faster patch cycles.

Tabriz said Google’s Project Zero bug-finding effort, which challenges vendors to fix discovered vulnerabil­ities within 90 days of reporting, has yielded measurable improvemen­ts: 98 percent of exploits Project Zero finds now get fixed within 90 days.

She summed up: “We’re seeing more security patches, faster response times and users getting updates faster.”

Rob Pegoraro is a tech writer based out of Washington, D.C. To submit a tech question, email Rob at rob@robpegorar­o.com. Follow him on Twitter attwitter.com/robpegorar­o.

 ?? USA TODAY ?? Security patches don’t do any good if you don’t actually install them.
USA TODAY Security patches don’t do any good if you don’t actually install them.

Newspapers in English

Newspapers from United States