Skip to main content

Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed

NewsColony
Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed

© (Image: File photo)

As more governments turn to contact tracing apps to aid in their efforts to contain the coronavirus outbreak, cybersecurity experts are warning this may spark renewed interest in Bluetooth attacks. They urge developers to ensure such apps are regularly tested for vulnerabilities and release patches swiftly to plug potential holes, while governments should provide assurance that their databases are secure and the data collected will not be used for purposes other than as originally intended. 

Users should also take the necessary steps to safeguard their personal data and prevent their devices from becoming the target of cybercriminals.

According to Acronis’ co-founder and technology president Stas Protassov, Bluetooth has had several vulnerabilities in the past, including as recently as February when BlueFrag, a critical vulnerability that affected multiple Android and Apple iOS devices which then required patching. 

Left unpatched, devices could be breached by hackers within the vicinity and the user’s personal data stolen, Protassov warned. He also stressed the need for users to update their devices’ firmware to ensure vulnerabilities are promptly fixed. And as with any app, they also should check the permissions that all contact tracing apps requested. 

Most of these apps, including Singapore’s TraceTogether, use Bluetooth signals to detect others in close proximity, and security observers say it could leave the smartphone susceptible to threats, especially if there are undiscovered or unfixed vulnerabilities. 

“People will want to download these apps to help curb the pandemic, but they also need to be aware of the cyber protection risks they are taking on. Only install official apps,” Protassov said, noting that malicious lookalike apps likely are already being developed and would be released soon after the official ones.

HackerOne’s technical program manager Niels Schweisshelm also highlighted the critical vulnerabilities linked to the Bluetooth protocol and its implementations, which were exploitable by remote attackers and enabled arbitrary code execution on affected Android devices. 

While these have since been fixed, Schweisshelm said the fixes offer no guarantee that Bluetooth and its implementations would be free from future vulnerabilities. He added that security research in the near future was expected to focus heavily on wireless technology and this could uncover other similar vulnerabilities. 

Tom Kellermann, VMware Carbon Black’s head of cybersecurity strategy, also underscored the need for contact tracing apps to be regularly tested for vulnerabilities and critical updates to be released swiftly. He said they should be configured to be automatically updated and prevented from interacting with mobile smart assistants. 

Noting that Bluetooth attacks, similar to mobile app attacks, likely would remain in circulation, Kellermann said users should only turn on the wireless technology when they leave their home and limit the location settings to run only when in use. 

Governments, too, should ensure backend databases were secure and regularly conduct application testing to mitigation exploitation of contact tracing apps. 

Any personally identifiable information (PII) collected would need to be properly stored and encrypted, said Protassov, who noted that the data preferably should not be stored at all. He added that all possible precaution must be taken to avoid a massive data leak such as that involving Equifax

Pointing to Singapore where Acronis is headquartered, he said the government has been transparent in its communication about the country’s contact tracing app, TraceTogether. He said governments worldwide should clearly state what information is being gathered by contact tracing apps, how this data is collected, and who has access to the data. And where possible, the data should be anonymised, or at least pseudonymised, he noted.  

According to the Singapore government, its TraceTogether app does not collect any location data nor ask for the user’s mobile phone during setup. Meanwhile, any data collected is held by the Ministry of Health (MOH) and stored in “a highly secured server” along with a random anonymised user ID that is linked to the mobile number. 

When TraceTogether is running on the phone, it creates a temporary ID that is generated by encrypting the user ID with a private key, which is held by the Health Ministry. The temporary ID is then exchanged with nearby phones and renewed regularly, making it difficult for anyone to identify or link the temporary IDs to the user, said GovTech, the government agency behind the contact tracing app. It noted that the temporary ID could only be decrypted by the Health Ministry. 

It added that the TraceTogether app shows connections between devices, not their locations, and this data log is stored on the user’s phone and shared with the ministry — with the user’s consent — when needed for contact tracing

GovTech said: “Your phone will store the temporary IDs from nearby phones, together with information about the nearby phone’s model, Bluetooth signal strength, and time. All this information is stored locally on your phone, and not sent to MOH, unless you are contact traced.”

Bluetooth creates wider attack surface that must be properly reviewed

Synopsys Software Integrity Group’s senior security consultant Samantha Isabelle Beaumont cautioned that contact tracing apps allowed attackers to access users’ Bluetooth as well as read all Bluetooth communications on their connected devices, including their car, the music they listened to, household IoT (Internet of Things) devices, amongst others. 

Beaumont recommended that users protect themselves by limiting various components, such as the number of apps they download, the number of Bluetooth items with which they pair, the number of Bluetooth items they keep as whitelisted — or known devices — and the amount of information they transfer over Bluetooth.

The Singapore government, however, said it was unlikely hackers could breach a device without the targeted user’s knowledge.

GovTech said Bluetooth transmits signals within a range of some 10 metres and it would be “difficult for anyone to get close enough to you, and use a computer to extract information from your phone without you noticing”.  It did urge users to ensure their phone’s operating system was updated. 

Acronis CISO Kevin Reed noted that it was the belief amongst developers that attacks needed to be carried out in close range and, hence, would be less exposed to attacks.

Although, opportunistic hackers did not care whether they launched attacks via Bluetooth or internet by scouting devices in a crowded place, which he acknowledged, was less easy to do in Singapore with the current social distancing rules

Reed added that developers might have less experience with Bluetooth, compared to online platforms, and could overlook certain elements that might result in a bug or vulnerability. 

Furthermore, with Bluetooth now an additional functionality that needed to be activated, this would create a wider attack surface, he said. 

Schweisshelm said governments should properly assess the entire attack surface created by contact tracing apps, including static source code reviews as well as dynamic application testing, to discover any vulnerabilities. 

RSA CTO Zulfikar Ramzan took a more moderate view of Bluetooth’s security risks, acknowledging that while the wireless technology had several security issues since it was introduced some two decades ago, it now was a mature protocol and more trustworthy than recent ones. 

However, no digital system is immune to attacks, but this could improve over time, Ramzan said. He added that systems designers should continuously improve their products and advised users to ensure all software on their phones are updated. They also should examine the settings on the mobile device, particularly those associated with privacy, to check whether any unnecessary activity is running. 

He explained that because Bluetooth provided a mechanism to identify the proximity of two individuals without requiring actual knowledge of the location, it would be a preferred option against other approaches such as GPS, which revealed not just proximity but also the location of individuals.

“From a privacy perspective, it is desirable to build contact tracing apps that collect the minimum information needed to determine two individuals are in contact with each other,” he said. “Doing so does not actually require collecting precise location information, but rather involves determining if two people are in the same place.”

Beyond security and privacy, a bigger concern involved fairness, he noted. For instance, could systems be implemented in a way to ensure the data collected would not be abused and used for purposes other than what was originally intended? 

For these apps to gain traction and earn trust, he stressed that governments needed to implement checks and balances to reduce the likelihood of the data collected being misused. More so, organisations involved in the design of these systems and their components should have robust procedures in place for responding to new security issues expeditiously, he added.

Ramzan said: “We live today in a golden age of surveillance where our actions leave behind a trail of digital breadcrumbs. By correlating data collected from contact tracing apps with other surveillance data, the level of privacy exposure can be magnified in substantial ways.”

Contact tracing app development will pique hacker interest

None of the security vendors ZDNet spoke with noted a significant increase in attacks targeting Bluetooth devices, but most agreed the recent initiatives around contact tracing apps were likely to renew interest amongst cybercriminals. 

Protassov said: “Bluetooth is just a vessel. The real attacks are happening on the applications operating with Bluetooth data. Exploiting those applications is the attackers’ ultimate goal. Such attacks are often opportunistic and close-range.”

He further noted that with millions now downloading such apps, a database of information that previously was difficult to obtain has now opened up to potential attackers. “As we have seen with COVID-19 scams, attackers follow trends and millions new users moving to a rapidly developed platform makes it a great target,” he said. 

With so many devices now with Bluetooth capabilities, this would fuel interest amongst hackers, he added.

Ramzan concurred, noting that while there had been little indication so far of increased attacks, there likely would be renewed interest in contact tracing apps as these become more widespread. In fact, it was “virtually a certainty” that new attacks would be published, but the more salient question will be whether these attacks are pragmatic, he said.

latest developments

Coronavirus: Business and technology in a pandemic © Provided by ZDNet Coronavirus: Business and technology in a pandemic

He explained that cybersecurity researchers often conceived of creative and spectacular attacks, but, oftentimes, these attacks only worked under very precise conditions and required tremendous resources. At that point, no reasonable threat actor would implement them, he said. 

Kellermann also revealed that the Carbon Black Threat Analysis Unit had yet to see an increase in attacks targeting Bluetooth devices, but expressed concerns for low frequency attacks due to the ubiquity of mobile payments. He, too, cautioned of a strong likelihood that such attacks could spike as more contact tracing apps are deployed, since this created a nefarious business model for coercion and extortion. 

Beaumont also noted the likely increase in such attacks, adding: “The more backdoors built into a system, the more access and holes an attacker can use as leverage to compromise a device. Therefore, if we can limit the amount of contact tracing added or required on a system, the more we can lock down the mechanism from external threats.”

Before downloading such apps, Check Point Software Technologies’ Asia-Pacific CTO Tony Jarvis said he would want to know what data is collected, who has access to the data, and what they plan to do with the information. “I would also want to know what other applications or permissions on the phone this app has access to. Some sort of official statement indicating personal data is protected will be necessary before I download and use such apps.”

Ramzan highlighted the need to know what data specifically would be collected, how it would be kept confidential, and whether it would be shared or correlated with other data. He also would ask about what checks and balances would be in place to ensure the data is not misused, as well as the procedures that would be put in place to respond to security incidents. 

Kellermann also would want to ascertain if developers performed Open Web Application Security Project (OWASP) testing, and if vulnerabilities were uncovered, whether these were remediated, and whether users could limit the app’s access to GPS location and smart assistant services. 

When asked, GSM Association would not comment directly on the developments around contact tracing apps, noting that such efforts were driven mainly by governments. The industry body, however, urged the adoption of best practice recommendations such as the GSMA Privacy Design Guidelines for App Development to enable app developers, operating systems developers, and consortia such as PEPP-PT to design privacy and security into their software.

PEPP-PT, or Pan-European Privacy Preserving Proximity Tracing, was established to support the tracing of infection chains across national borders by providing “standards, technology, and services” to countries and developers. The organisation describes itself as a “large and inclusive European team” and its members include Heartbeat Labs, PocketCampus, Vodafone, 3db, and ISI. 

Source: MSN

The post Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed appeared first on NewsColony.
NewsColony



from WordPress https://ift.tt/2W4J7rb

Comments

Popular posts from this blog

Volunteers book hotel room for homeless man with SingapoRediscovers vouchers

NewsColony Volunteers book hotel room for homeless man with SingapoRediscovers vouchers © The Independent Singapore Singapore — A group of volunteers from the Mummy Yummy Singapore welfare organisation donated their SingapoRediscovers Vouchers to book a hotel room for a homeless man. The man, who was identified as Jayden, did not have a place to live while waiting for the Housing Board (HDB) to allocate him a rental flat. In a Facebook post on Mummy Yummy Singapore’s page on Wednesday (Dec 16), the volunteers said: “We used our $100 Rediscover Singapore vouchers to redeem hotel stay for him and successfully booked 9 days worth of stay at 3 days per voucher.” They added that they were unable to book a longer stay because of higher hotel rates over Christmas and New Year. The volunteers hoped that they would be able to bridge Jayden’s stay until he got a flat. “Thanks our government for giving us these vouchers which in return we can put them to good use for people in need,” th...

Chinese stars moonlighting as live-streamers

NewsColony Chinese stars moonlighting as live-streamers Li JIaqi and Yang Mi joined forces to sell products online during coronavirus, blurring the boundaries between conventional celebrities and live streamers. Photo: @TrendingWeibo/Twitter The line between Chinese celebrities and live streamers continues to blur these days. Luxury brands are expanding their pool of friend-of-the-brand endorsements with top live streamers – Louis Vuitton, for example, tapped both actress Song Jia and “lipstick king” live streamer Li Jiaqi for its much anticipated 520 Chinese Valentine’s Day campaign. Celebrities, actors and singers are jumping on the bandwagon to test out their commercial values on e-commerce platforms, with Yang Mi, Li Xiaolu and Michelle Ye Xuan just a few of the screen stars moonlighting on live streaming portals including Taobao, TikTok and Red Book. So why are Chinese celebrities so eager to embrace the battlefield of live streaming e-commerce, and how are they getting on so...

90 Day Fiance: How To Watch Happily Ever After & B90 Strikes Back

NewsColony 90 Day Fiance: How To Watch Happily Ever After & B90 Strikes Back After the runaway success of 90 Day Fiancé: Before the 90 Days , TLC is blessing us with more 90 Day Fiancé spin-offs. This summer, 90 Day Fiancé: The Other Way , B90 Strikes Back , and 90 Day Fiancé: Happily Ever After? will all be on the air. Here is when to watch each of them: 90 Day Fiancé: The Other Way premiered on June 1, but there is plenty of drama still ahead. The show airs on TLC on Monday nights at 9pm EST, and the third episode is scheduled for June 15. TLC is running reruns regularly, and you can always catch up online on several streaming services . 90 Day Fiancé: The Other Way reverses the original concept of 90 Day Fiancé, where people travel from around the world to the United States to meet and marry their partners. Instead, people from the United States travel to meet and marry their partners in other countries. The season 2 cast includes season 1 fan favorites Jenny a...