{"id":29447,"date":"2015-03-05T08:44:25","date_gmt":"2015-03-05T13:44:25","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-flaw-opened-android-and-apple-smartphones-to-online-drive-by-attacks.php"},"modified":"2015-03-05T08:44:25","modified_gmt":"2015-03-05T13:44:25","slug":"encryption-flaw-opened-android-and-apple-smartphones-to-online-drive-by-attacks","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-flaw-opened-android-and-apple-smartphones-to-online-drive-by-attacks.php","title":{"rendered":"Encryption flaw opened Android and Apple smartphones to online drive-by attacks"},"content":{"rendered":"<p><p>    Ninety-five per cent of the world's smartphones in use today    have been wide open to a decade-old flaw that would have    enabled attackers to steal passwords and other sensitive data.  <\/p>\n<p>    The security flaw, dubbed \"Freak\", would have exposed visitors    to US government websites - and possibly many more - to    drive-by attacks. The websites that exploited the flaw included    Whitehouse.gov, NSA.gov and FBI.gov.  <\/p>\n<p>    News of the flaw was made public when internet company Akamai    revealed in a corporate blog for customers that it was working    to provide a fix. The flaw was discovered following last year's    discovery of a catastrophic flaw in OpenSSL.  <\/p>\n<p>    \"The problem is that, until CVE 2015-0204 was    raised - and fixed - an OpenSSL client using strong ciphers    (anything other than export) could be tricked into accepting    such a weak key. An attacker connects to the web server    with an export cipher and gets a message signed with the weak    RSA key, wrote Akamai's Rich Salz.  <\/p>\n<p>    He continued: \"He then cracks that key. The following day, for    future connections from innocent browsers, he can act as a man    in the middle. The attacker will use the cracked key to connect    to clients, who will accept it. The attacker will then have    access to all communication between the client and server. A    server that does not support the export ciphers will never use    the export RSA key and never send it to a client. A client that    has the CVE fixed will never accept such a key.\"  <\/p>\n<p>    The security flaw was found by a team of researchers from    Microsoft and IT security organisations in the US, France and    Spain. It was the result of a ban on US exports of \"strong\"    encryption until the late 1990s, which saw much weaker security    standards adopted in widely used software instead. The use of    that software continued as a result of inertia in the IT    industry, even after the US export ban was lifted.  <\/p>\n<p>    \"Researchers discovered in recent weeks that    they could force browsers to use the old export-grade    encryption then crack it over the course of just a few    hours. Once cracked, hackers could steal passwords and    other personal information and potentially launch a broader    attack on the Web sites themselves by taking over elements on a    page, such as a Facebook 'Like' button,\" reported the Washington Post.  <\/p>\n<p>    John Hopkins University cryptographer Matthew Green, one of the    researchers who helped uncover the flaw, said that it    demonstrated the folly of governments attempt to mandate    backdoors into secure software so that they could eavesdrop on    people's online and communications activities.  <\/p>\n<p>    Weakening security, he said, added complexity that attackers    with nefarious intent could - and would - exploit. \"When we say    this is going to make things weaker, we're saying this for a    reason.\"  <\/p>\n<p>    The name \"Freak\" stands for \"factoring related attack on RSA    keys\" and describes how the attack works against the Data    Encryption Standard (DES) when one system authenticates with    another.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.computing.co.uk\/c\/554\/f\/538923\/s\/44064cb6\/sc\/23\/l\/0L0Scomputing0O0Cctg0Cnews0C23980A270Cencryption0Eflaw0Eopened0Eandroid0Eand0Eapple0Esmartphones0Eto0Eonline0Edrive0Eby0Eattacks\/story01.htm\/RK=0\/RS=1N5w2pwFcsoEKcAZoe_633xEwfE-\" title=\"Encryption flaw opened Android and Apple smartphones to online drive-by attacks\">Encryption flaw opened Android and Apple smartphones to online drive-by attacks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ninety-five per cent of the world's smartphones in use today have been wide open to a decade-old flaw that would have enabled attackers to steal passwords and other sensitive data. The security flaw, dubbed \"Freak\", would have exposed visitors to US government websites - and possibly many more - to drive-by attacks. The websites that exploited the flaw included Whitehouse.gov, NSA.gov and FBI.gov<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29447","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29447"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29447"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29447\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}