Year: 2018

Apple Maps Mistakes: Misleading Maps and Directions in Rural Canada

As the summer holiday is almost upon us, and people will be traveling for it, we thought that it would only be right for us to let our readers know about a problem with Apple Maps and for those who are traveling to rural places in Canada.

While similar problems have been resolved in other parts of the world, Apple Maps is continuing to use mislabeled places in much of rural Canada, according to user complaints and a check by AppleInsider.

To read the rest of the article, click here.

Intel’s ‘Virtual Fences’ Spectre Fix Won’t Protect Against Variant 4

Spectre and Meltdown fixes for Intel chips announced in March, to be embedded into new CPUs, do not address the newly disclosed Variant 4, sources said.

Intel introduced hardware-based safeguards to its new chips to protect against the Spectre and Meltdown flaws that rocked the silicon industry when the vulnerabilities were made public in early 2018. However, those protections are specific to V2 and V3, and will not impact the newly-discovered Variant 4 as well as other potential speculative execution side channel-related flaws in the future, sources familiar with the situation told Threatpost.

That said, chip experts familiar with the situation said that while these “protective walls” will not impact Variant 4, Intel has added a functionality into its microcode – the Speculative Store Bypass Disable (SSBD) bit – to protect against Variant 4. This functionality will continue to be utilized on future hardware platforms.

On Monday, Intel acknowledged that its processors are vulnerable to Variant 4, which could give attackers unauthorized read access to memory. Similar to the Meltdown and Spectre vulnerabilities, Variant 4 (CVE-2018-3639) is also a side channel analysis security flaw. However, Variant 4 uses a different process to extract information and is more of a cache exploit and that can be used in browser-based attacks.

After the disclosure of Spectre and Meltdown, Intel said earlier this year it has designed a new set of CPU design features that work with the operating system to install “virtual fences” protecting the system from speculative execution attacks that could exploit a variant of the Spectre flaw.

“We have redesigned parts of the processor to introduce new levels of protection through partitioning that will protect against both Variants 2 and 3,” Brian Krzanich, CEO of Intel, said in a blog post at the time. “Think of this partitioning as additional ‘protective walls’ between applications and user privilege levels to create an obstacle for bad actors.”

Krzanich said the new safeguards will be built into Intel’s next-generation Xeon Scalable processors, code-named Cascade Lake, as well as Intel’s eighth-gen Core processors that are expected to ship in the second half of 2018.

Patrick Moorhead, principal analyst at Moor Insights and Strategy, said that Variant 4 would be much harder to “fix” architecturally than V1, V2, or V3a.

“You either have to turn memory disambiguation on or off, which will be a BIOS setting,” he told Threatpost in an email. “It’s important to note that browsers have already included mitigations and that from a severity standpoint, has been flagged as ‘medium’ severity, compared to V1, V2, and V3, which were flagged as ‘high.'”

Variant 4 is most similar to Spectre V1 as opposed to Variant 2 or Variant 3, Moorhead said: “GPZv1 was exploiting the nature of the processor’s branch prediction. GPZv4 is taking advantage of a performance feature where the processor reorders loads/stores (memory disambiguation) to gain performance,” he said.

Leslie Culbertson, executive vice president and general manager of Product Assurance and Security at Intel, said in a post on Monday,  that unlike Intel’s updates for other variants, the updates for Variant 4 will be optional and will be set to “off” by default.

“We’ve already delivered the microcode update for Variant 4 in beta form to OEM system manufacturers and system software vendors, and we expect it will be released into production BIOS and software updates over the coming weeks,” she wrote.

What Will GDPR’s Impact Be On U.S. Consumer Privacy?

Will General Data Protection Regulation rules that go in effect on Friday impact the privacy of U.S. citizens? It depends who you ask, but the odds-on-favorite answer is “not by much.”

The Facebook Cambridge Analytica scandal in March led to a firehose of rebuke against social media platforms, advertisers and data brokers over how they use consumer information they collect and how they sell it. U.S. consumers are hungry for change.

Privacy experts say, despite the outrage, not much has or will immediately change when it comes to how companies that profit from trading in consumer data do business. Existing U.S. privacy laws, experts say, haven’t been effective enough to protect privacy and the current gridlock in Washington D.C. makes the prospect of new tougher proposed federal privacy laws unlikely to pass anytime soon.

The glimmer of hope for many is a spillover effect of the European Union’s GDPR law aimed at protecting the EU members. It’s true that US citizens don’t directly benefit from the rules, but in the weeks leading up the introduction of GDPR there have been some promising signs that U.S. companies’ adoption of some GDPR requirements will also have an impact on U.S. consumer privacy.

“Strangely what may end up benefiting Americans concerned about their privacy is regulation being implemented in Europe,” said Alexander Abdo, senior staff attorney at the Knight First Amendment Institute. “The GDPR is going into effect very soon and… it may have spillover for us on this side of the pond.”

Under the GDPR law, EU citizens will have a right to know what’s being done with their data, and a right to access it. GDPR requires any company doing business in the EU that interacts with and processes data of people in the EU to get explicit consent from users for every possible use to their data. Users will have a right to be “forgotten;” as in being able to request that a company delete their data, stop sharing it and force third-party firms from using it as well.

There are also data portability rules allowing users to take their data from one service and give it to another. A breach notification rule requires firms to notify customers within 72 hours of an incident. Lastly, firms will need to have “data protection officers” that can demonstrate compliance with GDPR and transparency.

Companies that don’t comply face fines of up to 4 percent of their global profits.

Some Positive Impacts

Abdo said there are no parallel privacy rules that share the same goals as GDPR here in the U.S. But, he said, the fallout of the Facebook Cambridge Analytica scandal, coupled with the introduction of GDPR in Europe, is pushing into place some new privacy safeguards for U.S. citizens. It makes sense to implement new privacy rules globally, rather than to adopt a patchwork of privacy rules for each country, experts point out.

GDPR is credited for several changes to data-collecting practices by Microsoft, Google, Facebook and other firms. Google said it plans to commit to the Interactive Advertising Bureau’s GDPR approach. Earlier this week, Microsoft said it would extend GDPR protections to all its customers, not just those in EU countries. Facebook CEO Mark Zuckerberg said his firm would apply the “spirit” of the legislation globally.

In January, Facebook said it would revamp its privacy dashboard to be more user-friendly. In the weeks proceeding the Cambridge Analytica fallout, it also announced a new privacy control called “Clear History” that lets users flush their history so that it is no longer stored with their account.

Twitter joined Facebook and others and has been sending emails to users urging them to review how they apply data to target them with ads, and how public the profile information shared is in order to comply with GDPR disclosure requirements.

At the same time big tech companies have been quickly adopting GDPR rules, they have also been devising ways to reduce its impact on their business.

In April, The Guardian pointed out that Facebook shifted the responsibility of managing 1.5 billion user accounts located outside the U.S., Canada and the EU from its international headquarters in Ireland to its U.S. offices. The move is seen as an attempt to avoid GDPR rules impacting Ireland and placing the user data out of reach of EU law.

Earlier this week, Apple rolled out data and privacy tools for European customers that allowed them to download the data that Apple has collected about them and the devices they own. But here in the U.S., Apple has only promised to broaden the availability of the tools.

Google has also come under fire recently after Oracle alleged it receives information about people’s internet searches and user locations if they have a phone running Android. The web giant is under investigation currently by the Australian government.

Google didn’t responded to a request for comment from Threatpost on their commitment to handling and securing private data.

If GDPR Can’t Save Us, What Can?

The U.S. government can play a big role in holding platforms like Facebook, LinkedIn, and Twitter accountable for how they protect data privacy – but overarching challenges remain in the political landscape.

“There has been a change in the way that government – and in particular Congress – has looked at tech companies and their role in society and the democratic system,” Michelle De Mooy, director of the Privacy and Data Project at the Center for Democracy and Technology, told Threatpost.

She said the Cambridge Analytica scandal has caused regulators to look at core issues around data transparency and protection in the U.S. The incident has also forced politicians to acknowledge just how far the U.S. is behind the rest of the world when it comes to regulations around data – namely GDPR.

“For a long time these companies weren’t regulated, and they’ve avoided a fair amount of scrutiny… but Cambridge Analytica has been the apex of what’s occurred,” said De Mooy. “I’ve seen a more intense and greater call for regulation.”

In the U.S., there is no single, comprehensive federal law that regulates the collection and use of personal data.  “The regulatory environment in the U.S. is fairly weak… we’ve had laws that follow data in a different kind of context, like health, but nothing as a baseline of protection for personal data,” said De Mooy. “When there is any accountability for companies related to data privacy, it’s handled through the FTC, but that’s an agency with limited authority and resources.”

Currently, a Federal Trade Commission consent decree from 2011 requires the social network to receive explicit permission from users in regards to sharing their data with third parties.

Making the prospect of regulation more challenging, the U.S. technology industry thus far has been widely self-regulated – and the current U.S. government administration favors self-generated regulatory actions.

That political divide was highlighted during Zuckerberg’s Congressional Hearing in April. Some senators, like Sen. Susan Collins (R-ME), argued that Facebook didn’t need regulations at all, while others like Sen. Dan Sullivan (R-AK) worried that “regulations can also cement the dominant power.”

“You look at what happened with [The Dodd–Frank Wall Street Reform and Consumer Protection Act],” he said. “That was supposed to be aimed at the big banks. The regulations ended up empowering the big banks in keeping the small banks down.”

Regardless, privacy advocates like the Electronic Frontier Foundation think that data privacy regulations should be high up on the national agenda.

“As the details continue to emerge regarding Facebook’s failure to protect its users’ data from third-party misuse, a growing chorus is calling for new regulations… it’s crucial that we ensure that privacy protections for social media users reinforce, rather than undermine, equally important values like free speech and innovation,” said Corynne McSherry with EFF in a post.

Pinning Hopes on Future Crackdown

Even beyond the complex political landscape, new data regulations provoke difficult questions about the role of social media platforms and who inherently owns and can have control over data online.

There have been a multitude of bills surrounding data introduced in the past year, including the Honest Ads Act, which aims to provide more transparency for online political advertisements; and the Browser Act of 2017, which authorizes the FTC to enforce information privacy protections allowing users to opt out of the use of their user information depending on the sensitivity of the information.

After Zuckerberg’s hearing, meanwhile, senators also rolled out the CONSENT (Customer Online Notification for Stopping Edge-Provider Network Transgressions) Act, which would place restrictions on data collection by “edge providers” like Facebook and Google.

While the CONSENT Act comes closest to instilling GDPR-like policies, De Mooy said U.S. regulators need to take laws like GDPR one step further by looking at how they can “complement GDPR” – in particular by better outlining the risks and benefits of data sharing for end users.

An array of consent management tools available for online companies to check in on their compliance gap monitoring and policy management do exist – including PrivacyCheq and NGData.

But many, including John Callahan, CTO of security firm Veridium, have lost trust that Facebook and other online platforms would use these tools: “Time and time again we will continue to see private and sensitive information misused, improperly stored and stolen,” he told Threatpost.

States Fight For Their Own Privacy

Whether we’ll see regulation addressing data policies is dependent on several factors, said De Mooy – but one big factor is the Nov. 6 2018 midterm elections, when privacy initiatives are expected to appear on ballots across the country.

That could include decisions about the Honest Ads Act, as well as the CONSENT Act. California is also touting its California Consumer Privacy Act, another data regulation that could apply to Facebook and social media privacy. If approved, the act would enforce more transparency around data that is being stored by companies, as well as enable consumers to opt out of companies selling their data.

“For the time being we’ve gotten calls from both sides of the aisle in Congress, and there’s clear concern around data policies from both Republicans and Democrats,” De Mooy said. “No one wants to be heavy handed and knock these companies to the ground when it comes to regulations. But we want something that respects our ability to go online and have an expectation of privacy.”

For the time being, however, social media platform users need to be aware of the lack of data privacy.

“It is important that users understand there is no free service,”  said Ilia Kolochenko, CEO of High Tech Bridge.  “If you’re using a platform for free, it will monitor your data and preferences. When you’re sending something online you need to assume it will be shared. We hope eventually there will be a positive shift toward customers data protection.”

Schneider Electric Patches XXE Vulnerability In Software

Schneider Electric on Tuesday issued fixes for a vulnerability in its SoMachine Basic software, which could result in the disclosure and retrieval of arbitrary data.

The software in question is used to develop code for programmable logic controllers. Attackers can leverage a vulnerability within the XML parser tool within SoMachine Basic, and launch an out-of-band remote arbitrary data retrieval attack.

“SoMachine Basic suffers from an XML External Entity (XXE) vulnerability using the DTD parameter entities technique, resulting in disclosure and retrieval of arbitrary data on the affected node via out-of-band (OOB) attack,” Schnieder Electric said in a security notice. “The vulnerability is triggered when input passed to the xml parser is not sanitized while parsing the xml project/template file.”

Essentially, it means that several versions of SoMachine Basic have sites that accept XML documents as input. When an XML document is received, it needs to be parsed, which means turning it from a text file into structured data.

“The tools out there that do that are called XML parsers, and it turns out that in the XML spec, there’s support for features like adding a header in the doc, enabling the person creating the document to reference external documents or files,” explained Jeff Williams, CTO of Contrast Security, speaking to Threatpost.

Williams said an attacker could create a malicious XML file and upload it to this site, but when the XML parser reads this file, it also reads the malicious header that the attacker added, and attempts to bring in the external resource – which could be reference files on the disk, or other file servers on the networks.

“So an attacker could upload a malicious XML file, [and then] it pulls in resources from the disk, and then the program leaks those details out through the website,” said Williams. “That data could be anything on the internal network – including manufacturing data or personal data. A bigger risk is [the potential for] stealing IP, source code or files related to industrial processes.”

The vulnerability (CVE-2018-7783) was rated a CVSS score of 8.6, which is considered “high,” according to Schneider Electric. However, while the vulnerability may put data at risk, SoMachine Basic is not a production ICS system, but rather in a development environment. As such, it incurs no material downtime and therefore would not have any urgency from a business perspective, according to Tom Parsons, senior director of product management at Tenable.

“The attack requires… user interaction,” he told Threatpost. “The victim would have to actively load/import a malicious file crafted by an attacker. So, it’s not an easy attack to execute, because an attacker can’t just remotely connect to the system and execute the exploit.”

Schneider Electric did not respond to questions from Threatpost including whether there has been an exploit of the vulnerability discovered.

“The cybersecurity team at Schneider Electric has collaborated with Applied Risk to ensure the exploit had been addressed after identification with an effective patch,” a spokesperson at Applied Risk, whose researcher Gjoko Krstikj discovered the vulnerability, told Threatpost.

All versions of SoMachine Basic prior to v1.6 SP1 are impacted by the flaw. The manufacturing company said a fix is available for download online, or by using the Schneider Electric Software Update tool.

Schneider Electric has faced a bevy of vulnerabilities on its systems, including a critical remote code execution vulnerability in two Schneider Electric industrial control-related products in May and a critical vulnerability in its WonderWare Historian last year.

But security experts like Parsons said that industrial vendors, for their part, are becoming more aware of cybersecurity vulnerabilities on their operational technology-related hardware and software.

“Vulnerability types like remote service vulnerabilities are still common in OT systems, while in the IT world these have been displaced by application vulnerabilities,” Parsons told Threatpost. “This reflects that OT has only recently become a target for threat actors. But OT vendors are becoming much more aware and active in addressing vulnerabilities and providing patches, as OT becomes increasingly connected.”

You may have Missed:

Verified by MonsterInsights