Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds (www.wired.com)
from floofloof@lemmy.ca to cybersecurity@sh.itjust.works on 09 Aug 00:08
https://lemmy.ca/post/49444979

archive.is/1NWAe

Omo and Rowley say they informed Securam about both their safe-opening techniques in spring of last year, but have until now kept their existence secret because of legal threats from the company. “We will refer this matter to our counsel for trade libel if you choose the route of public announcement or disclosure,” a Securam representative wrote to the two researchers ahead of last year’s Defcon, where they first planned to present their research.

Only after obtaining pro bono legal representation from the Electronic Frontier Foundation’s Coders’ Rights Project did the pair decide to follow through with their plan to speak about Securam’s vulnerabilities at Defcon.

#cybersecurity

threaded - newest

boatswain@infosec.pub on 09 Aug 00:21 next collapse

Gotta love the EFF. Just threw a bunch of cash to them.

ThatGuyNamedZeus@feddit.org on 09 Aug 00:42 next collapse

Mechanical safes only, no electricity needed, no hacking possible…just like the computers we used to use to control nukes. Which could literally only do the one thing they were designed to do and nothing else, they couldn’t be hacked

floofloof@lemmy.ca on 09 Aug 00:45 collapse

they couldn’t be hacked

That sentence is a sibling to “What could possibly go wrong?”

rainwall@piefed.social on 09 Aug 01:16 collapse

I've worked in a heavy industry space where the "computers" were just slightly complicated circuit boards working together. No OS, no networking, nothing but circuit logic running hilariously important machines. The cabinets were locked in a small area deep in the facility that was manned 100% of the time, and were rarely accessed, so it would be a big event for anyone to interact with them. There were no windows for "someone with a clipboard" to just be waived in to mess with them.

There was no remote access, and no social engineering possible. Anyone who could work on them was well known by everyone who would be in the room. An insider threat was basically the only kind possible, but the only "hacked" output would just be a failed "off" state, which wouls be replaced.

There really are "unhackable" computerized machines out there, but only because calling them "computerized" is a stretch.

ThatGuyNamedZeus@feddit.org on 09 Aug 03:50 next collapse

An insider threat was basically the only kind possible, but the only “hacked” output would just be a failed “off” state, which wouls be replaced.

Exactly, the computers that used to control our nukes were so old and so simple that they literally can’t do anything but what they were designed to do, they require physically inserting old floppy disks and manually entering codes to access, no network access, no ability to multitask, so malware can’t run in parallel with the other process…singular for the word “process” because those old computers can’t multitask

now they’re using modern computers that just recently got hacked with a sharepoint vulnerability…by the way, a whitelisting application that indiscriminately blocks everything that hasn’t already been allowed to run would’ve blocked the processes of that exploit and prevented anything from happening…I actually use something like that on my windows PCs

All those prehistoric old farts in our government thought that would be an “upgrade” and then they probably just used norton to secure it because they’re too stupid to research anything that might be better

floofloof@lemmy.ca on 09 Aug 06:01 next collapse

All those prehistoric old farts in our government thought that would be an “upgrade”

Even younger politicians can’t be expected to have a clue about this kind of security. And younger tech people might not remember how it used to be done. You need some prehistoric tech farts to tell the prehistoric political farts what’s what.

fibojoly@sh.itjust.works on 09 Aug 08:50 collapse

If you think software devs are any better… The more complex our systems become, the more it becomes someone else’s problem. The shit I hear coming out of some of my younger colleagues is just embarrassing sometimes. And they just don’t care. They couldn’t be arsed doing a quick search for a solution, trying to understand things from the other side’s perspective, nothing.
And then they wonder if AI gonna replace them? If you ain’t using your brain, what are you there for?

ThatGuyNamedZeus@feddit.org on 09 Aug 20:42 collapse

I’ll give you that, but I blame the public schools for conditioning kids into not using their brains

lemming741@lemmy.world on 09 Aug 14:02 collapse

Just rows and rows of 7400 series ttl logic chips

DemBoSain@midwest.social on 09 Aug 01:06 next collapse

If you’re in the market for an electronic safe, here’s a list of brands to skip:

Beyond Liberty Safe, Securam ProLogic locks are used by a wide variety of safe manufacturers including Fort Knox, High Noble, FireKing, Tracker, ProSteel, Rhino Metals, Sun Welding, Corporate Safe Specialists, and pharmacy safe companies Cennox and NarcSafe, according to Omo and Rowley’s research. The locks can also be found on safes used by CVS for storing narcotics and by multiple US restaurant chains for storing cash.

roguetrick@lemmy.world on 09 Aug 01:26 next collapse

The specialized equipment the safe maker says is needed is a Python script, lol.

ThatGuyNamedZeus@feddit.org on 09 Aug 03:51 next collapse

but a safe that doesn’t have anything digital inside of it wouldn’t run a python script

roguetrick@lemmy.world on 09 Aug 04:07 collapse

I’m talking about what’s used to discover the keys based on what the safe displays on the screen. The safe maker is implying you need esoteric equipment to crack their safes but really all you need is the already cracked algorithm. You don’t have to get the safe to run anything.

zqps@sh.itjust.works on 09 Aug 13:06 collapse

Phew, how fortunate that people who try to crack safes never think to use readily available equipment. That would be a real challenge for those poor manufacturers.

sturger@sh.itjust.works on 09 Aug 05:26 next collapse

Well, before I can read how to break into safes, I have to break into the website that says it won’t show me the article without a subscription. That should keep those safes…er… safe.

Whostosay@sh.itjust.works on 09 Aug 05:31 next collapse

Archived link in body

sturger@sh.itjust.works on 09 Aug 05:35 collapse

Ha ha ha! Nope! Following that link, I have to click a captcha to prove I’m not a robot.

The layers of security theater are stacking higher and higher. What’s next? They send me through TSA to make sure I’m not carrying a tube of toothpaste that is too big?!

anyhow2503@lemmy.world on 09 Aug 06:54 collapse

Sounds like someone is trying to get randomly selected for a cavity search.

ArcaneSlime@lemmy.dbzer0.com on 09 Aug 12:42 next collapse

No cavities, they’re a robot as evidenced by their inability to answer the captcha.

jaemo@sh.itjust.works on 09 Aug 12:50 collapse

What?! How about the JTAG port?

[deleted] on 10 Aug 00:52 collapse

.

black_flag@lemmy.dbzer0.com on 09 Aug 11:10 collapse

Firefox reader mode did it for me. Just block js on the page somehow.

fibojoly@sh.itjust.works on 09 Aug 08:52 next collapse

If I’ve learnt anything from the Lock Picking Lawyer : the fancier the supposed safety feature the easier it is to circumvent.
Every time he looks at a Web 3.0 piece of junk, it gets opened even faster than any of the physical locks. It’s kinda terrifying, honestly.
Like, a magnet in the right spot and you’re good to go, is what I’m saying.

black_flag@lemmy.dbzer0.com on 09 Aug 11:13 next collapse

“Just pop the battery and you’ll find a JTAG port where you can kindly ask for the manufacturer’s master key” is fucking wild

db0@lemmy.dbzer0.com on 09 Aug 15:20 collapse

Oh but you need a password to do that. Unfortunately that password was something like 12345

AmericanSuppremacistDetekta@sh.itjust.works on 10 Aug 09:56 next collapse

You don’t need to be a hacker to find backdoors. You just have to turn it around

Tar_alcaran@sh.itjust.works on 10 Aug 14:06 collapse

Funfact, safe makers: It’s not libel if it’s true.