Friday, January 4, 2013
Could Your Office Phone be Hacked Into an Eavesdropping Device?
The hack, demonstrated for NBC News, allows the researchers to turn on a telephone's microphone and listen in on conversations from anywhere around the globe. The only requirement, they say, is an Internet connection.
Doctoral candidate Ang Cui and Columbia Professor Sal Stolfo, who discovered the flaw while working on a grant from the U.S. Defense Department, say they can remotely order a hacked telephone to do anything they want and use software to hide their tracks. For example, they said they could turn on a webcam on a phone equipped with one or instruct the phone's LED light to stay dark when the phone's microphone has been turned on, so an eavesdropping subject wouldn’t be alerted that their phone has been hacked.
The flaw involves software running on Cisco's popular Internet Protocol telephones. Cisco acknowledged the flaw in a statement to NBC News, but wouldn't say how many of its phones were impacted. In a blog post earlier this year, the company -- the leading IP phone maker, with about one-third of the market -- said it had just surpassed 50 million in phone sales.
In a vulnerability announcement sent to paying customers in December, Cisco listed 15 phone models impacted by the problem.
Cisco's statement indicated that the company is working on a fix, and the firm told NBC News that it planned to issue a security bulletin next week. But Stolfo said he is "very worried about the speed with which Cisco is handling this."
The research was conducted under a grant from the Defense Advanced Research Projects Agency (DARPA), an arm of the Defense Department devoted to computer security, and conducted at the Computer Science Department of Columbia University’s School of Engineering and Applied Science. The same lab caused a global stir in 2011 when it published a hack of Hewlett Packard printers.
The Columbia lab focuses on so-called "embedded devices" -- computer chips in non-PC gadgets, such as televisions, thermostats or telephones. Increasingly, all these gadgets are networked and connected to the Internet, and therefore can be hacked remotely.
"These phones are really general purpose computers jammed into a plastic case that makes you think it's a phone," Cui said. "Just because it doesn't have a keyboard doesn't make it less of a computer.”
Cisco's IP phones -- and other models that use the same chipset -- are open to attack because they routinely connect to a central server looking for updated instructions, according to Cui. That creates an avenue for a hacker to insert rogue code, he said.
But he also maintained that there are multiple scenarios that would allow for a remote attack.
Escalation would be one way: An outsider could trick a worker into clicking on a virus-laden email attachment, infect the worker’s computer and then use that computer to attack a phone from inside a company’s network, he said. But the researchers say other flaws exist that would allow the phone to be attacked directly from outside the company.
"It also works the other way," Cui added. "You could attack the network, and then attack a single person's phone. Say, the CEO, at home."
Stolfo said it was critical to come forward with the Cisco flaw now because the company isn't working fast enough to fix it.
"What we're doing is trying to alert the manufacturer to not provide the opportunity to hackers to break into our phones," he said. "What we're asking them to do is like asking automakers to put seatbelts into cars to save lives."
The researchers have not released their attack code, so would-be criminals cannot simply copy their work and attack Cisco phone systems today, and there is no evidence that a hacker has exploited this vulnerability in the real world. They do believe others will successfully -- and independently -- duplicate their research, however, placing Cisco is in a race with hackers, and Cui thinks it’s possible that has already happened.
"I'd be surprised if someone else hasn't already done this," Cui said.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment