Wednesday, 9 September 2015

Router Gateway hackers and internet

The device that connects us to the Internet is dangerously vulnerable, security experts say. And while there are some signs of impending improvements, not much has happened in the past several years, while the threats have grown

It is generally accepted in IT that the weakest link in the security chain is the fallible and frequently careless human.

But a close second, many experts say, is the router – the device that connects people to the Web, sometimes called “the backbone of the Internet” – which is dangerously vulnerable to skilled hackers.

Those experts have been issuing alarms for some time, but they say that, so far, things have not changed much.
Dan Geer, chief information security officer at the venture capital firm In-Q-Tel and an adviser to U.S. intelligence agencies, speaking to a conference in Cambridge, Mass., more than a year ago, said most routers are almost comically insecure, given that they have, “drivers and operating systems amounting to snapshots of the state of Linux, plus the lowest-end commodity chips extant at the time of the router’s design.”

The only way to fix the problem, he said, would be to, “unplug all the devices, throw them in the dumpster and install all new ones.”
MORE ON NETWORK WORLD: Free security tools you should try

And that wouldn’t fix it either, because the new ones are, “likely to have the same vulnerability spectrum that made this possible in the first place,” he said.

Jim Gettys, a systems architect, said last year that he had inventoried the age of the packages inside a number of routers, “and they are three to four years old on Day One. And without an update stream, you start with existing vulnerabilities, and it just gets worse from there.”

In an interview this past week, Gettys said he had, “seen little change in the market.”
Bruce Schneier, encryption guru and CTO at Resilient Systems, wrote more than a year ago in a blog post that, “the computers in our routers and modems are much more powerful than the PCs of the mid-1990s,” and warned that if security vulnerabilities in them are not fixed soon, “we're in for a security disaster, as hackers figure out that it's easier to hack routers than computers.”

Such security holes can allow hackers to access files, install malware on a network or use a victim’s security cameras to spy on him, without needing access to the computer hardware.

In a more recent interview with Network World this past April, Schneier said basically the same thing Geer had said a year earlier: “Do you know the way you patch your home router? You throw it away and buy a new one. And that is going to be a freakin' disaster … Low cost, binary blobs, no one knows how they work, there's no one to update them, lots of vulnerabilities, and we're just stuck with it.”

How to Find Hidden Malware Lurking in Your Systems
And even if updates are available, they are too difficult to install for the average user, said Lawrence Munro, director at Trustwave.

“The key issue is that upgrading is almost always a manual process that is likely beyond the skill level of a home-user,” he said, “and patches aren’t available quickly in many cases.”
"The key issue is that upgrading is almost always a manual process that is likely beyond the skill level of a home-user."

Lawrence Munro, director, Trustwave
Indeed, last December, US-CERT, part of the Department of Homeland Security, warned broadband router manufacturers about a vulnerability called “Misfortune Cookie” that been patched more than 10 years ago, but was still present on many deployed devices.

Researchers at Check Point’s malware and vulnerability group, who came up with the name, noted that, “if your gateway device is vulnerable, then any device connected to your network – including computers, phones, tablets, printers, security cameras, refrigerators, toasters or any other networked device in your home or office network – may have increased risk of compromise.”

And Mark Stanislav, senior security consultant at Rapid7, noted this week that in a contest at last year’s Def Con, hackers were able to demonstrate 15 zero-day vulnerabilities in more than a half-dozen of the most common Small Office/Home Office (SOHO) routers, including models from Asus, Netgear, DLink, Belkin, Linksys, Actiontec and Trendnet.

Not surprisingly, the contest was titled, “SOHOpelessly Broken.”
If it really is this bad, however, it would seem there would be more stories about disastrous takeovers of networks. Yet while mainstream media regularly report on major hacks, there are few, if any, headlines about router compromises.
"(Automatic firmware updates) can create new problems, especially if the user is unaware of the firmware being updated."
markstanislav

Mark Stanislav, senior security consultant, Rapid7
That, Stanislav said, is probably in part because the average consumer may not even know what a router is. And, “the impact to an individual or their home network isn't necessarily easy to determine without a very specific review of how their device was configured, what vendor it's from, and what firmware it's running,” he said.

“It’s a much more layered and nuanced story than, ‘Company X was hacked, your data is now a risk.’”

Robert Siciliano, online safety expert for Intel Security, agreed. “If the flaw is too complicated for mass media to break down for the general public, they avoid discussing it,” he said.

Munro agreed, but said it is also because the media don’t find it that exciting – at least yet. Remotely hacking a car and causing it to crash catches public attention much more than explaining how a router is vulnerable.

Gettys said he thinks it is because, “it hasn't yet hurt in the pocket book at sufficient scale in the U.S.,” but warns that the hurt is coming.

“People have not realized just how insecure these devices are, or what mischief this can cause for the customers and others – they are being increasingly used as part of botnets to attack others,” he said.
"People have not realized just how insecure these devices are, or what mischief this can cause for the customers and others."
jimgettys

Jim Gettys, systems architect
If there is any promising news to report, it is that there seems to be a growing awareness among developers and manufacturers that there is a problem.

“IoT (Internet of Things) devices in general are starting to focus more on easy firmware updates – automated processes that don't require user intervention, and overall longevity of hardware updates,” Stanislav said.

“This will, ideally, trickle down into the SOHO router market eventually. As design patterns and technical challenges are overcome, disseminating updates quickly will become easier for manufacturers.”

Gettys said he is hearing behind the scenes that there may be some improvements, “in not-yet-announced products; but I leave that to the manufacturers and service providers announcements to come.

“But even with these glimmers of hope, I'm discouraged, as the economic foundation of the problem has not changed,” he said, adding that changes in the law making the manufacturers of routers liable for security breaches is the only solution.

“The idea that someone can ship a product and not have any liability for even basic maintenance and upgrade of the software it contains for its expected lifetime must change,” he said. Without it, “new entrants who do a better job won't see a reward, and will have higher costs”

Stanislav said he has seen some vendors, “take a more cloud-based approach, where updates are an ongoing process that require less user intervention. But that can create new problems, especially if the user is unaware of the firmware being updated.

“We saw some outrage in 2012 for this type of auto-upgraded firmware from Linksys. This is a balancing act that vendors are still figuring out how to weigh,” he said.

Until major improvements occur, experts collectively recommend a number of steps consumers can take that won’t solve the problem entirely, but will make them less of a target than the average user:

Change the default password to one that is unique, long and complex.
If it is impossible to upgrade your router, buy a new one that does allow it. According to Munro, “the open-source community has offered alternatives for users by creating projects such as OpenWRT and Tomato, which provide open-source firmware to replace the vendor’s on common hardware platforms.” But, implementing them, “requires a reasonable level of IT skill,” he said.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

13 cool Chrome extensions for Gmail

We scoured the hundreds of Chrome extensions designed for Gmail — whether they modify the UI of the webmail service, or add new features to it — and picked the best ones. Emphasis was placed on extensions that are free, and not tied to another site, web app, or other online service.

Actions for Gmail
This extension adds up to four buttons to the right of the ‘checkbox’, ‘starring’, and ‘mark-as-important’ functions that are to the left of every message listed in your Gmail account main page. These extra buttons let you archive, delete, mark as spam, or mark as read/unread an email by simply clicking the button, without needing to open the message, or needing to click its checkbox first and then selecting whichever of these four operations you want.

Attachment Icons for Gmail
A paperclip icon to the right of a message listed in your Gmail main window represents that a file or files are attached to that email. This extension determines what kind of file is actually attached, and changes the paperclip icon to a more specific image. So, if it’s a PDF, the attachment icon becomes a tiny image of a PDF document symbol. Attachment Icons for Gmail can recognize and assign unique icons for several file formats, which include media (images, sound, video) and Microsoft Office (Excel, PowerPoint, Word).

Checker Plus for Gmail
This extension is the very popular, with over 800,000 users recorded by Google. Checker Plus for Gmail notifies you of new emails with pop-up windows, which show a preview of an email’s first few lines, in the lower-right corner of your OS’ desktop. By clicking its icon in the Chrome extensions toolbar, not only can you glance through first-line previews of your new emails, you can do most email management functions without ever needing to open the Gmail main page. You can even compose a new email directly from the extension — again, without having to go to the Gmail main page. The settings to adjust the UI of Checker Plus for Gmail are many, and intimidating to go through. Fortunately, its default settings will probably satisfy most of your needs.

CloudCodes Insertable
This is one of the most impressive Chrome extensions for Gmail that has been recently released: Copy cells from an Excel spreadsheet, and you can paste them into an email you’re writing by clicking a button that this extension adds to the email composer toolbar. The data and formatting of the cells, including their colors and sizes, will remain intact. (The email must be written with “plain text mode” off.) Your recipient will also see them in their original format. We found this extension also worked with other spreadsheet programs, like Google Sheets.

Gmail Label Column Resizer
In the Gmail main page, the email label categories and Google Hangouts chat windows share the left column, and you can adjust the sizing they share with one another by dragging down or up the horizontal border between them. This extension adds a resizable vertical line between this column and the panel listing your messages. So by dragging this boundary side-to-side, you can adjust to your liking the width of the first column in relation to the panel.

Gmelius
Gmelius provides settings to modify big and small details of the Gmail UI, such as: removing from the main page the Hangouts window or header, which contains the Google logo and search box). (The search button will then work as a switch that you click to hide and unhide the header.) It can also strip out the “People” widget that shows up whenever you view an opened email. Gmelius can add various things, some of which are handled by other extensions in this article: highlighting the listing of an email in the main page with a color when you move the pointer over it, and changing the paperclip icon to represent what exactly an attached file is.

multiNotifier
If you don’t need all the features of Checker Plus for Gmail, or prefer a Gmail checking extension that uses fewer system resources, then multiNotifier gets the job done. It can check up to five Gmail accounts, giving you a preview of the first line of each unread email when you click its extension button. Notification windows pop up from the lower-right corner of your OS’ desktop environment, each showing the first snippet of text from a newly arrived email.

PixelBlock
If you’d like a free tool to block email trackers, try PixelBlock. It automatically prevents a tracking service from being notified when you’ve opened an email sent to you through it. PixelBlock marks tracked emails with a crossed-out red-eye icon by the sender’s name listed in an opened email. Clicking this icon reveals the name of the tracking service, if it can be identified.

RightTasks for Gmail
Normally, when you turn on Google Tasks in Gmail, this to do tool appears as a pop-up window at the lower-right corner of the main page. RightTasks for Gmail sets Google Tasks inside a new column to the right of the panel listing your emails. This column can be neatly stowed away by clicking a button on its title bar, which turns it into a skinny vertical black bar. Clicking this bar brings back the column containing Google Tasks.

Row Highlighter for Gmail
From the developer of Attachments Icons for Gmail, this extension, like the Gmelius suite, highlights the listing of an email in the main page with a color when you hover the pointer over it. The highlight color can be customized to be whatever you want, and you can select two colors to differentiate between an email that’s marked as read or unread.

Smooth Checkbox for Gmail
After you install this extension: In Gmail’s main page, click the checkbox by the listing of an email, but continue holding down the mouse (or touchpad) button and then move down or up: The listings of other emails below or above will be highlighted and their respective checkboxes will become checked when the highlight sweeps over them, and unchecked as you move the highlighting away from them.

Strikethrough
For some reason, Google didn’t include the ability to format any of the text you write in an email with strikethroughs. This extension simply adds this; it seamlessly integrates a strikethrough button among the other styles in the text formatting toolbar of the email composer window.

UglyEmail
UglyEmail doesn’t block tracked emails from reporting back to their senders when you open them. Instead, in the main page, it marks received emails that are being tracked with a black eye icon by their listings. So you can see which are being tracked before opening them. The caveat in the present version of UglyEmail is that it doesn’t appear to mark emails that are being tracked from an anonymous source.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com