To start my second day at Black Hat, I attended a briefing about how a researcher hacked his fiance’s identity through GDPR (General Data Protection Regulation) requests. I thought this was fascinating and especially relevant to my practice because of the upcoming CCPA (California Consumer Privacy Act). Both the GDPR and CCPA are privacy laws that are going to greatly impact business and cybersecurity now and in the coming years. After he experienced a lengthy delay on a European budget airline, the speaker and his fiance talked about how they could get back at the airline by making a GDPR request and wasting their time. While discussing it, they decided he should turn it into a social engineering hacking experience. The results were interesting and show how easily the GDPR can be exploited. He was able to get a considerable amount of information from various companies using information he could easily find about his fiance on the web.
The next speaker was Bruce Shneier who writes the Schneier on Security blog. He talked about the need for more people doing what he does as a “public interest technologist.” One of the major points he started off with was that there is a communication barrier between technologists and policy makers. To quote him, “Almost no policy makers understand the tech.” He said this dates back to the early days of computers in the 1960s and has persisted through today. He elaborated that policy makers need to have someone on their side with a technology background to help them understand. Right now, technology has greater power than policy makers–for example, if Google makes a censorship decision, it will have an almost immediate impact and is more effective than law. The same is not true for government which takes ages to pass a law that is no longer relevant by the time it is enacted. He compared public-interest technology to public interest law, suggesting that just as the latter didn’t really exist 50 years ago, there is a path for making this reality.
Another briefing I attended dealt with how some researchers hacked BMW vehicles and how BMW went about responding to the breach. One interesting point from this was that the researchers presented their findings based on 4 car models. The BMW response team had to verify and address the threat in those four as well as in the hundreds of different iterations of those models. The issue and response varied based on where the cars were located, what kind of parts they had, etc. Although they did not go into great detail, it was neat to see a glimpse into real incident response from a corporation with global reach.
Part of my afternoon was spent wandering the business hall trying to talk about Magecart. Magecart was the topic of an article I did earlier this year for Dark Reading. Throughout Black Hat I was listening and watching for any mention of Magecart or credit card skimming, but I just was not hearing it. The only prominent place I even saw the word “Magecart” was on the RiskIQ booth. One of RiskIQ’s researchers (who was unfortunately not at Black Hat) is a leader in the Magecart field. I asked his colleagues at that booth why I was not hearing more about Magecart. They had no definitive answer. As I asked other people around the expo floor, it seemed few people had even heard of Magecart, let alone knew what it was. This is concerning to me for the same reason it was concerning to me when I wrote about it: how is it that this hacking practice which has been around for over 5 years now and has stolen more credit card numbers than the Home Depot and Target breaches combined does not have more awareness? A big part of it could be that many people at Black Hat are just focused on other things. Another possibility is that it is not as big of a deal as I perceive it to be. Either way, I still believe it is a legitimate concern about which online retailers should be very wary.
The second to last session I attended talked about how misinformation is used and was called “Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project.” This focused on how easy it is to use misinformation to achieve certain desired or undesired outcomes. There were several comparisons to the Soviet propaganda machine. This is obviously a big deal these days as a big part of incident response is public relations.
The last session of the day was one of my favorites. It was called Lessons and Lulz: The 5th Annual Black Hat NOC report. It was a presentation by the guys who run the NOC (Network Operations Center) at Black Hat. They talked about how they created the NOC, what kind of architecture they used, and then they told us some of the funny things they found in observing Black Hat traffic. This was fascinating to me given my initial concern about device security at Black Hat and my observation that many of the security professionals at the conference were not practicing what they preach.
Prior to the two days of briefing I attended, Black Hat had some sessions where people do hands on training with computers and hacking. Apparently during one of the trainings, a student decided to try and infiltrate and exploit a law enforcement website. The NOC caught this and quickly made their way to the classroom to politely ask the hacker to not do that. They bring all of their own equipment in for Black Hat (provided by business partners) and set it up so that the only network infrastructure they were using that belonged to Mandalay Bay was the wires in the walls (on account that they are control freaks). Funny enough, the only real network problem they had during Black Hat ended up being due to one of the wires in the wall–literally the only things that were not completely within their control.
There was a public conference wifi at Black Hat. I never used it, but apparently many did and the NOC monitored it and said that 70% of traffic on it was encrypted. (They mentioned that at Black Hat Asia, 90% of traffic is encrypted. When they asked someone why that was, he said it was because they implicitly do not trust their government.) Of the unencrypted traffic, they found some personal information being transmitted in clear text. For example, they found an email to one attendee from Southwest Airlines and pointed out that with her last name and the confirmation number that was not encrypted, they could have changed her flight. They also found one guy who was transmitting photos of financial documents like his mortgage statement to get his freshman college student some financial aid. When they talked to him about it, he thought he was logged into a VPN and protected. While his VPN showed that it was connected, it turns out it was not and his data was exposed. These were very real reminders about how easily our information can be snatched up. The last thing the NOC guys disclosed was about the surprising amount of traffic going to porn sites on the conference wifi. They noted that one guy was visiting a porn site with very long videos with no ads whatsoever on the site–with the reason for no ads being that the site was displaying the video, but using the user’s computer to mine cryptocurrency in the background.
I’ll wrap up my thoughts about Black Hat in my next post.