The future that William Gibson imagines in the short story that inspired 1995’s Johnny Mnemonic essentially epitomizes cyberpunk: edgy, dangerous, extremely advanced, highly technical. The movie being set in early 2021, we decided to analyze the cinematic version from the viewpoint of cybersecurity, comparing show more ...
the fictional 2021 with our own. The setting of the movie The film plays out in a rather gloomy world, one controlled by megacorporations and plagued by a dangerous pandemic known as Nerve Attenuation Syndrome (NAS). The cause of the disease, in the words of one of the characters, is: “Information overload! All the electronics around you poisoning the airwaves.” Megacorporations, pandemics, conspiracy theories about new tech rollouts. Sound familiar? Well, it’s only partially accurate: In this cinematic 2021, microchips holding gigabytes of information can be implanted into the human brain; in reality, despite Elon Musk’s best efforts, we’re not there yet. We won’t bother dismantling the classic 1980s/90s movie depiction of the Internet as a wacky VR universe. That’s not the Internet, at least in 2021. Pharmakom Industries According to the movie’s plot, a cure for NAS actually exists, but Big Pharma is keeping it quiet — treating the symptoms is far more profitable than ridding humanity of the disease. Some Pharmakom employees disapprove and not only steal medical information, but also destroy the company’s data. That reveals a number of major flaws in Pharmakom’s security system: Its scientists’ data access permissions are too generous. Sure, drug developers need access to read operational information, and even to write to the server. But why give them permission to permanently delete classified information? Pharmakom has no backups (at least, nothing offline). That means much of the rest of the plot — involving the mad pursuit of the “mnemonic courier” (more about that below) — rests on the company needing the data back. With backups in place, Pharmakom could simply have restored the data, then eliminated the leak and the courier. Instead, the plot demanded the company try to saw off his head without damaging the implant inside. It’s also worth mentioning that the Pharmakom network contains a digital copy of the consciousness of the company’s founder. The AI not only possesses free will and access to the entire Internet, but also tends to disagree with the way the corporation is developing into something monstrous. Lo Teks A group known as the Lo Teks represents the resistance. In the original story, the Lo Teks were antitechnology, but in the movie adaptation they seem quite up to date. Living with them is Jones, a cyborg dolphin whose hacking skills help him extract valuable information, which the Lo Teks then transmit using a hijacked TV signal. At the center of the group’s shelter is a mountain of rubbish featuring wires and old cathode-ray-tube TVs. Despite the group’s on-air antics, no one pays much attention to the Lo Teks (or even locates them) until they come into contact with Johnny. Online communication Partway through the movie, Johnny tries to contact an acquaintance. That’s when we realize Pharmakom’s experts, working with the Yakuza, are tracking his regular contacts — fantasy 2021 privacy is even worse than present-day reality. One might think a hacker-smuggler can manage online anonymity, but no, everyone knows Johnny’s connections, and infosec experts immediately sniff him out (even though he goes online from a completely new, stolen computer and with some kind of stealth module) and pinpoint his location. Along the way, Pharmakom activates a “virus” to interfere with Johnny’s communication. As usual in movies, the terminology is rather loose, the virus seems more like some sort of DoS attack tool than an actual virus. Mnemonic courier At long last, let’s get to the main theme of the movie, which is related directly to information security — consider the title character’s profession. As a mnemonic courier, Johnny’s head is literally a data storage device. Such couriers are used to smuggle highly valuable information that cannot be entrusted to the Internet. The rebel scientists choose Johnny to convey the medical data they stole from Pharmakom to a team of doctors in Newark. How the implant works The technology here is incomprehensible: The data is stored directly in the brain, and to make room, Johnny has had to sacrifice most of his childhood memories. The nominal capacity is 80 GB, expandable to 160 GB by briefly connecting to an external box, but in fact it is possible to upload twice that amount, boosting capacity up to 320 GB. That squeezes the brain, causing the courier to suffer from seizures and nose bleeds, and the information can be damaged as well. In the movie, the implant is not hard to detect. For example, when crossing a border, people are scanned and the device appears in those scans. But the scans seem rather superficial; the system falsely reports the brain implant as a device for counteracting dyslexia. Why the device arouses no suspicion among the border guards is not clear. Data protection The data protection method is nothing if not original. During upload, the client randomly takes three TV screenshots. The images “dissolve in the data” and serve as the “download key.” Without them, it is impossible not only to download the data, but even to delete it, so the same screenshots must be sent to the recipient. By the look of it, then, this safeguard has to do with encrypting the actual data, but it’s also an implant-access mechanism. As soon as they upload the data, the scientists are attacked by Yakuza operatives working for Pharmakom. One screenshot for the key is destroyed in the ensuing firefight, Johnny keeps one, and one goes to the attackers. Sending the key The “key” is sent by fax. That’s not as funny as it sounds; although the technology is outdated in the real 2021 faxing the key makes some sense because it makes direct use of the telephone network, which can, in theory, be safer than using the Internet. Unfortunately, faxing tends to degrade image quality. Also, in the movie, all fax machines are available from the Internet, so there goes that. After escaping from the Yakuza, Johnny tries to recover the missing screenshots. He finds the originating fax machine and its logs in a hotel’s information systems, the password for which he brute-forces on his third attempt. The password can’t have been very strong. That, it must be said, corresponds perfectly with our 2021: For many hotels, security still means a guard at the door. In any case, Johnny manages to get the recipient’s fax machine address. Connecting to the fax requires no authentication. Moreover, by connecting remotely, anyone can read data from the buffer, thus rendering this communication channel totally unsuitable for confidential data. Extracting the data without the key The situation seems hopeless. Without the key, Johnny can neither download nor delete data from his head, and with the maximum allowable capacity twice exceeded, he will soon die and the cure for the pandemic will be lost. But wait, there are, in fact, many ways to extract information without the key (leading to consequences of varying severity): The Yakuza try to saw off Johnny’s head so they can take it to a “quantum interference detector” to extract the data. A doctor who specializes in implants has some “decryption codes” that, with a little luck, should enable data retrieval. It doesn’t work in this case, but everything seems to suggest that sometimes it does, which raises a ton of questions about the reliability of the encryption algorithm. Next, the same doctor proposes extracting the data and the implant surgically, though that carries a considerable risk to the life of the patient (not to mention guaranteed health problems). Having been trained by the US Navy to hack enemy submarines remotely, Jones the cyborg dolphin can try the technique on Johnny’s skull. A Yakuza operative mentions that even after download and deletion, “mnemonic sensors” can still recover residual traces of the data. Bottom line Using mnemonic couriers seems pointless. The scheme apparently uses symmetric encryption (no matter how complex the key is, it still has to be transferred to the recipient), the key transfer occurs over unprotected channels, and the implant’s overload capability violates all safety regulations, jeopardizing both the courier’s health and the integrity of the data. But the method’s main weakness is that it leaves a plethora of ways to get the data without the key. Moreover, with only two of the screenshots, Johnny, with the help of his aquatic sidekick, hacks into his own brain and extracts the third. That means the key is stored with the encrypted information, a highly insecure practice. In the real 2021, sending the data over the Web using a reliable asymmetric encryption algorithm would be easy. Even if the fact of a data transfer cannot be hidden, the strategy would guarantee delivery to the addressee. And 320 GB is not such a large volume by our 2021 standards. What came true and what didn’t? The real 2021 is not as bleak as the filmmakers imagined — or, at least, it’s not as bleak in the same ways as the filmmakers imagined. Cybersecurity has come a long way. So, which of the above could actually happen? In the real 2021, multiterabyte archives of confidential information, including vaccine data, are leaked almost regularly. The Pharmakom data leak is plausible and very possible. Insider attacks and sabotage are similarly not at all unusual. This recent incident also related to healthcare, for example. Artificial intelligence, self-aware and living online, does not (as far as we know) exist yet. A cyborg dolphin with hacking skills is a little far-fetched. Contra many sci-fi predictions, dolphins have not yet learned to perceive human information and use electronics. Broadcast signal intrusion, on the other hand, is real. But it is usually done on a small scale, and the intruders are quickly identified. Identifying a person online based on a connection to a certain address is a real thing, but it requires extensive groundwork. A DoS attack on the link between two network clients is real, but done not with a virus, but rather by disabling the communication channel. Implanting a chip into a person’s brain is not yet reality. Current experiments focus on creating a neural interface for communication with a computer, not on data storage. Here’s the big one: Transferring data by pumping information directly into a human courier’s brain is not only unrealistic but nonsensical. Thanks to encryption, we can easily and securely transmit data over the Internet.
In this interview, Camille Stewart, Google’s Head of Security Policy for Google Play and Android explains how understanding how systemic racism influences cyber security is integral to protecting the American people and defending the country from cyber adversaries. The post Episode 205 – Google’s Camille show more ...
Stewart: InfoSec’s Lack of...Read the whole entry... » Related StoriesEpisode 192: It’s Showtime! Are Local Governments Ready To Turn Back Election Hacks?Episode 203: Don’t Hack The Water and Black Girls Hack Founder Tennisha MartinEpisode 202: The Byte Stops Here – Biden’s Cyber Agenda
Cybercrime groups often have complex supply chains, like real software firms, and they regularly develop relationships with the rest of the e-crime ecosystem to acquire access to essential technology.
Ransomware was the top attack type, making up ~40% of all cyberattacks, but digital currency mining and server access attacks too hit Indian companies last year, according to an IBM Security report.
The extensive document was published on Feb. 12 under the mention “500,000 French hospital records” and it was shortly after posted on other dark web sites, including a Russian forum.
Linux is more secure than most OSes, but that doesn't mean it can take security for granted. So, Google and the Linux Foundation are funding a pair of top Linux kernel developers to focus on security.
According to cybersecurity researchers at Dragos, four new hacking groups, dubbed Stibnite, Talonite, Kamacite, and Vanadinite, targeting industrial systems have been detected over the past year.
The Senate Intelligence Committee's hearing Tuesday about the SolarWinds supply chain attack answered some questions about what went wrong but also raised four key issues.
On Wednesday, the U.S. CISA along with its counterparts in the U.K., Australia, New Zealand, and Singapore warned that hackers are exploiting unpatched vulnerabilities in Accellion FTA.
To make sure the attackers did not modify their code, Microsoft created CodeQL queries that were used to scan their codebase for malicious implants matching the SolarWinds IOCs.
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry.
In research presented on Wednesday at the NDSS conference, researchers describe flaws in the process Amazon uses to review third-party Alexa applications known as Skills.
Almost half of phishing attacks in 2020 aimed to swipe credentials using Microsoft-related lures – from the Office 365 enterprise service lineup to its Teams collaboration platform.
The vulnerability, tracked as CVE-2021-22681 with a CVSS score of 10, was independently reported to Rockwell by researchers at the Soonchunhyang University, Kaspersky, and Claroty.
78% percent of senior IT and security leaders believe their organizations lack sufficient protection against cyberattacks, according to research by IDG Research Services on behalf of Insight.
ENISA issued a study to help IT professionals in healthcare security to establish and maintain cloud security while selecting and deploying appropriate technical and organizational measures.
A novel alternative to traditional HTTP request smuggling that spotlighted an obsolete, hitherto obscure protocol has been recognized as 2020’s top web hacking technique.
Recently, 360 Security Center detected a ransomware that disguised as commonly used software and appeared on the network. The virus called itself DarkWorld in the ransom letter.
Polish video games maker CD Projekt is delaying the release of a patch for its Cyberpunk 2077 game until the second half of March, after a cyberattack slowed down work on fixes for the troubled game.
eBPF enables auditing and filtering of high-volume events, such as network packets or system calls, without the security or the stability overhead of a custom kernel module.
Over the past year, there’s been an increasing trend of WordPress malware using SQL triggers to hide malicious SQL queries within compromised databases to infiltrate them.
The settlement, if approved, would lay to rest claims that the video sharing app, owned by ByteDance, wrongfully collected the private and biometric data of users including teenagers and minors.
Oxford reported on Thursday that one of its research labs dedicated to studying COVID-19 suffered a cyberattack, following a Forbes investigation indicating external access to a number of its systems.
A report revealed that a Chinese APT has been abusing a Windows zero-day exploit, stolen from the NSA’s Equation Group even before The Shadow Brokers group leaked it.
The same cryptocurrency exchange has been hacked again, and this time the attackers stole USD 45,000 (NZD 62,000) worth of crypto, reported local news network Stuff.co.NZ.
On the website Clop Leaks, the threat actors behind the Clop ransomware are claiming to have in their possession an unspecified amount of information belonging to the Steris Corporation.
With browsers clamping down on third-party tracking, advertising technology companies are embracing a DNS technique to evade such defenses, thereby posing a threat to web security and privacy.
Ubuntu Security Notice 4754-2 - USN-4754-1 fixed a vulnerability in Python. The fix for CVE-2021-3177 introduced a regression in Python 2.7. This update reverts the security fix pending further investigation. It was discovered that Python incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code or cause a denial of service.
Ubuntu Security Notice 4754-1 - It was discovered that Python incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code or cause a denial of service.
Ubuntu Security Notice 4755-1 - It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.
This whitepaper is a guide to performing memory forensics using volatility. It goes into depth on using the Volatility framework to analyze memory dumped from a live system.
WordPress Under Construction, Coming Soon, and Maintenance Mode plugin version 1.1.1 suffers from cross site scripting and server-side request forgery vulnerabilities.
Researchers have uncovered gaps in Amazon's skill vetting process for the Alexa voice assistant ecosystem that could allow a malicious actor to publish a deceptive skill under any arbitrary developer name and even make backend code changes after approval to trick users into giving up sensitive information. The findings were presented on Wednesday at the Network and Distributed System Security
Cisco has addressed a maximum severity vulnerability in its Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO) that could allow an unauthenticated, remote attacker to bypass authentication on vulnerable devices. "An attacker could exploit this vulnerability by sending a crafted request to the affected API," the company said in an advisory published yesterday. "A successful
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry. Attributing the attacks with high confidence to the Lazarus Group, the new findings from Kaspersky signal an expansion of the APT actor's tactics by going beyond the usual gamut of financially-motivated
UK energy firm Npower has scrapped its smartphone app following an attack by hackers that saw some users' accounts accessed and personal information stolen.