Tag Archive for GOOG

CAPTCHAs Broken

CAPTCHAs BrokenMims Bits on MIT‘s Technology Review reports that researchers at UC San Diego have figured out how spammers use low-cost workers in Russia, Southeast Asia, and China to solve millions of CAPTCHAs in near real-time. A CAPTCHA is that bit of distorted text you have to type back at a webpage when you’re trying to sign up for a new email account or leave a blog comment.

CAPTCHAIn order to prevent spammers from flooding the web with their malware researchers developed CAPTCHAs. CAPTCHAs are designed to be easy for humans to solve but challenging enough for computers to get right that automated systems would not be effective.

In what Mims calls an epic new analysis by the UC San Diego researchers, they uncovered the “seedy underbelly” of a sophisticated, highly automated, worldwide network of services that help spammers get past the CAPTCHAs. The article says that the inventors of CAPTCHA probably didn’t expect thousands of laborers working for less than $50 a month would be recruited by spammers to solve an endless stream of CAPTCHAs. Automated middlemen deliver the  CAPTCHAs to the workers and then sell the results to spammers in real-time so that their spambots can use those solutions to post to blogs and set up fraudulent email accounts according to a paper (PDF) delivered at the USENIX Security 10 Symposium.

The UC San Diego researchers analyzed where the workers involved in this scheme were located and found that they are based in India, Russia, Southeast Asia, and China. The system is so efficient at delivering CAPTCHAs to workers in these remote locales that the average time for delivery of a solution hovers around 20 seconds. ImageToText, one of the CAPTCHA services the researchers experimented with was able to deliver correct results in “a remarkable range of languages,” including Dutch, Korean, Vietnamese, Greek, and Arabic.

Klingon,Even setting the sample CAPTCHAs to Klingon, as a control in their experiment, could not stop ImageToText, according to Technology Review. The workers managed to solve a handful of the Klingon CAPTCHAs despite odds of less than one in one thousand of their randomly getting the right answer.

The results of this landmark study, says Mims, show that a number of sites, including those run by Microsoft (MSFT), AOLGoogle (GOOG), and the widely used reCAPTCHA, are regularly compromised by spammers employing these services. The researchers conclude that their investigation with an anonymous “Mr. E” who actually runs one of these services, proves that for advanced spammers, CAPTCHAs aren’t so much a barrier as a cost of doing business.

DarkReading has a report that independent security researcher Chad Houck recently demonstrated his work on solving Google’s reCAPTCHA. reCAPTCHA was designed to stop software bots attempts to create free accounts on the Google services for their malware ways.  Despite recent enhancements made by Google, DarkReading says Houck came up with algorithms that could beat reCAPTCHA 30 percent of the time.

Google logoA 30% success rate means that automated software using Mr. Houck’s algorithm will be able to create one Google account out of just three attempts. Multiply those odds by the endless attempts by tens of thousands of zombies in a typical botnet, reCAPTCHA is broken.

In the DarkReading article, Houck notes that “[ReCAPTCHA] has never been wholly secure. There are always ways to crack it.” The researcher has since published a white paper on it, and has also released his algorithms online. For now, at least, a Google spokesperson says there has not been any sign of this particular attack being actively used.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Google Remotely Removes Apps

Google Remotely Removes Apps– Updated 03-19-2011 – After the recent discovery of some 50+ malicious applications on the official Android Marketplace, Google removed the malware as soon as they became aware of their existence. According to Help Net Security, this was four days too late to prevent the tainted applications from being downloaded over 50,000 times.

In response, Google remotely executed its Android kill switch to delete the apps in question. Google is pushing an update to close the software hole.

In an official confirmation of the incident, Rich Cannings, Android Security Lead says that Google will notify the owners of the affected devices after the malicious app(s) are deleted and the update is installed, “You are not required to take any action from there; the update will automatically undo the exploit,” he explained. </update>

Over at the Android Developers Blog, Rich Cannings, Android Security Lead details how Google (NASDAQ: GOOG) can remotely remove applications from an Android phone. The article explains how the Android Security team removed two applications that violated the Android Market Terms of Service.

The Google article says, “...we’ve also developed technologies and processes to remotely remove an installed application from devices.”  The article says that Google chose to remove the applications because they knew better, “ … we decided … to exercise our remote application removal feature…”. Google does try to minimize the impact of this ability in Chrome by stating,  While we hope to not have to use it, we know that we have the capability to take swift action …

I wrote about Google’s and Apple’s control of the OS in 2009. The master marketers at Google have spun this ability to delete any file to be a good thing. However, nowhere in the article does Google state that it will not remove files in an arbitrary fashion like Amazon’s 2009 big brother-like overnight removal of George Orwell’s 1984 and Animal Farm from Kindles.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Google Aims For Driverless Printing

Google Aims For Driverless PrintingGoogle (GOOG) is looking to leverage its infrastructure to move printing to the cloud. Development is underway for a new feature in Chromium where Google will communicate directly with printers to generate the output. The Google Cloud Print project is a service that enables any application (web, desktop, or mobile) on any device to print to any printer.

HP 9000 printerGoogle says that it will work with direct (USB or parallel) and network-attached printers using a Google ‘print proxy’. The app would send the document and details of the printer into the Google Cloud Print (or another cloud) service which will then send back a correctly formatted print request to the printer using the PC operating system’s native print stack and sends job status back to the printer.

Google Cloud Print project infographic

rb-

As with most things Google, there is good and bad. The good is that printer management can now be off-loaded. The proposal can decrease the headache of print drivers for grandparents and network admins. Now even hand-held devices can print (think Android, Chrome, tablet, Chrome on a tablet) a document without having to worry about printer drivers or third-party applications.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Mobile Botnet

Mobile BotnetTwo researchers from TippingPoint’s Digital Vaccine Group duped thousands of smartphone users into joining a mobile botnet by spreading a seemingly innocuous weather application. Kelly Jackson Higgins at DarkReading writes that Derek Brown and Daniel Tijerina created a smartphone application called WeatherFist. Over 8,000 users downloaded WeatherFist, which grabbed users’ PII. The info they grabbed included GPS coordinates and telephone numbers, before displaying local weather information.

TippingPointThe researchers did not distribute their application via the official iPhone and Android application stores. Rather, they distributed the WeatherFist application via third-party app markets like Cydia, SlideME, and Modmyi. The apps could only be installed on jailbroken iPhones or Android devices where users had specifically given permission for non-approved applications to be run. “We wanted people to feel comfortable using the application and putting it on their phone so we would have permission to do a lot of things like pass GPS coordinates, write to the file system, and surf,” Brown told DarkReading.

Mobile Botnet

At the 2010 RSA Security Conference the researchers claimed they also wrote a malicious version of their mobile botnet, which they dubbed WeatherFistBadMonkey. According to DarkReading, the malicious app behaves more like traditional botnet code, stealing information and capable of distributing spam. “We could enable or disable system services [with a malicious app],” Brown says. The TippingPoint researchers told DarkReading they wanted to prove how an app could behave like much of the traditional Windows malware which, steals information, and allows hackers to gain remote control of hijacked devices.

rb-

Smartphones are a part of today’s network and Brown and Tijerina claim that this research shows a security hole in networks. Some of the ways to plug these new holes are to:

  1. Update policies for the  proper use of smartphones
  2. Prohibit unsafe modifications of smartphones
  3. Allow apps only from reputable app stores
  4. Provide training on smartphone application usage
  5. Lockdown the Wi-Fi network settings to keep smartphones from ‘phoning home’ any information that shouldn’t leave the firm.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

YouTube Goes IPv6

 YouTube, one of the most popular, biggest time-wasters and bandwidth hogs on the web is now IPv6 too. Hurricane Electric, whose IPv6 backbone is the largest in the world, reports a 30x increase in IPv6 traffic originating from YouTube. Martin Levy, Director of IPv6 Strategy at Hurricane Electric told PCWorld in a recent article

On Thursday, midday California time, we saw a large amount of inbound IPv6 traffic, which we knew came from Google .. IPv6 traffic came into ISPs from all over the world when Google turned up its IPv6 traffic on YouTube.” Levy continued, “IPv6 is being supported at many different Google data centers. We’re talking about a traffic spike that is 30-to-1 type ratios. In other words, 30 times more IPv6 traffic is coming out of Google’s data centers than before.

The YouTube IPv6 traffic appears to be production, as opposed to a test because it has remained steady since it started and is following normal usage patterns, Levy told PCWorld, “This IPv6 traffic is mimicking classic end-user bandwidth shaping … It’s not machine driven; it’s human eyeball driven.”

Industry observers hailed the YouTube upgrade as a sign of the growing momentum for the next-generation Internet protocol, “This is not some IPv6-enabled scientific site…This is the mainstream media” Levy observes.

NetworkWorld reports that Google is anticipating IPv6 traffic growth as more devices such as LTE handsets and set-top boxes ship with IPv6 support. Google already supports IPv6 with its Search, Alerts, Docs, Finance, Gmail, Health, iGoogle, News, Reader, Picasa, Maps, Wave, Chrome, and Android products.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.