Showing posts with label def con. Show all posts
Showing posts with label def con. Show all posts

Monday, August 10, 2015

Hackers Can Use a $32 Device to Break Into Your Car and Garage Undetected - http://clapway.com/2015/08/10/hackers-can-use-a-32-device-to-break-into-your-car-and-garage-undetected123/

For most consumers, the DEF CON hacker convention is a place to hear about how vulnerable every single electronic device in your home is, but it serves a very useful purpose: it educates developers on how to code smarter. One of the latest scare stories to come from the conference was presented by a hacker named Samy Kamkar. Kamkar has developed a device that allows him to hack into any modern car or garage.


Taking a Look at the RollJam


During the hacker conference, Kamkar introduced a relatively cheap device he called the “RollJam.” It’s a $32 radio jamming device that is incredibly small, and designed to exploit the “rolling codes” that are so prevalent in the keyless entry systems of most vehicles. Worse yet, this same device can also be used to deactivate car alarms outright, making them largely useless.


How Does It Work?


The concept behind RollJam is incredibly simple. Kamkar said that a would-be hacker would simply plant the device near the target vehicle and wait. The victim would come out to the vehicle and press the key fob in an attempt to unlock it, but it will not work the first time. The second attempt will be successful, and while the victim may think it strange for a few minutes, they’ll likely continue about their day without giving it a second thought. The hacker would then return to the vehicle, replay the recorded code, and viola, they then have access to the car.


Rolling codes are a security measure that automakers have been using in an attempt to throw off “code grabbers” that hackers have been using for years. Vehicles that use rolling codes never reuse the same code twice, so each code should technically be unique, but RollJam has a clever way around this.


The first time the victim attempts to unlock the car, the RollJam jams the signal using two radios that emit noise onto the most common radio frequencies used by auto manufacturers. A third radio then intercepts the code needed to gain access to the car. In the second attempt the RollJam blocks the signal again, but signals the first code it picked up so the car will unlock for the victim. Meanwhile, the device retains the second code it picked up so it can be used again when the hacker retrieves the device. Scary, huh?


RollJam has Successfully Hacked a Wide Range of Vehicles from Manufacturers like Volkswagen, Toyota, and Cadillac


In the presentation, Kamkar has said he has already tested the device on multiple vehicles and had success with a decent amount of major auto manufacturers, and a few garage door openers. Kamkar believes that there are millions of automobiles out on the road today that are susceptible to hackers using this vulnerability, but many auto manufacturers are already working on alternatives to rolling codes.



 


https://www.youtube.com/watch?v=qu3Z6AbM2D0


 



Hackers Can Use a $32 Device to Break Into Your Car and Garage Undetected

Sunday, August 9, 2015

Here are some reasons we shouldn"t take #hacking problems lightly and reasons #hackers might want to do the extreme things they do. - http://clapway.com/2015/08/09/how-hackers-are-killing-people-virtually245/

If you read the news enough then you might begin to think that hackers are making the real world a pretty dangerous place to live in. Whether it’s hacking vehicles or guns, it’s becoming clear that no element of technology is completely safe.


Chris Rock, founder and CEO of security firm Kustodian (and no, not that Chris Rock), has recently reported that hackers are beginning to kill people off virtually, and the victims don’t even know it until they try to apply for something that requires their ID.


The Entire Process Can be Completed Without Leaving Your Computer


In the report, Rock goes into some good technical detail on the whole process, but here is the short of it.


There is a lot of sensitive information about doctors that is easily accessible to just about anyone online. Information like their license number, address, and more can all be used to set up a doctor’s account in the Electronic Death Registration System. In the report, Rock uses California’s online license verification to set up his account.


Once someone has a doctor’s account, they can fill out both death and birth certificates. That’s right. Not only can hackers technically kill someone, they can also create someone as well. There are several resources available online that instructs users on how to properly fill out a death certificate. Rock humorously suggests people not select a cause of death that might warrant a look from the coroner.


The next step of the process involves a funeral director, but guess what? Conveniently enough, you can also spend a little time online going through a process that will allow you to become a registered funeral director. In the report, Rock demonstrates the process by creating a funeral home website and filling out Australia’s funeral director application. Moments after the application is sent off, Rock receives a confirmation email that he is now permitted to submit online death registrations. This won’t work everywhere, though. The UK doesn’t have any requirements to become a funeral director, but some states in the US require certain qualifications to be met.


Why Kill Someone Off?


Rock says there are numerous reasons a hacker might want to kill someone off, but each person is going to have their own reason for wanting it to be done. Some examples he listed were people trying to claim life insurance money, or trying to commandeer their elderly parent’s estate before they actually pass.


To “hinder” people was another reason Rock said a hacker might want to off someone. Perhaps they hold a grudge against someone and want to prevent them from traveling, or maybe they’re involved in an investigation and the hacker wants to interfere with the case by killing off a judge or detective.


Virtual Birthing


Sitting on the opposite spectrum of death is life, and Rock says creating someone virtually is even easier than killing them off. Here in the US a midwife can submit a birth registration application, and there are processes in place that allow people to register home births as well.


A virtual death would typically have instant results, but virtual life is basically committing to the long con. Most people who would want to create a fake birth certificate are typically looking to create a new identity for themselves. Whether it’s trying to erase a criminal record or debt, having a hacker create a new identity would certainly do the trick.



You’ll want to protect your data with Nanoform:




How Hackers Are Killing People Virtually