• Risks Digest 32.03

    From RISKS List Owner@21:1/5 to you on Thu Jun 25 04:55:28 2020
    RISKS-LIST: Risks-Forum Digest Wednesday 24 June 2020 Volume 32 : Issue 03

    ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator

    ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as
    <http://catless.ncl.ac.uk/Risks/32.03>
    The current issue can also be found at
    <http://www.csl.sri.com/users/risko/risks.txt>

    Contents:
    Vehicle Attacks Rise As Extremists Target Protesters (npr.org)
    Chrome extensions with 33 million downloads slurped sensitive user data
    (Ars Technica)
    Millions of documents from >200 US police agencies published in BlueLeaks
    trove (Ars Technica)
    Wrongfully Accused by an Algorithm (NYTimes)
    If T-Mobile's giant outage affected you, now's your chance to tell the FCC
    (Ars Technica)
    This sneaky malware goes to unusual lengths to cover its tracks (ZDNet)
    Masked arsonist might've gotten away with it if she hadn't left Etsy review
    (Jon Brodkin)
    Crooks abuse Google Analytics to conceal theft of payment card data
    (Ars Technica)
    Bot mafias have wreaked havoc in World of Warcraft Classic (WiReD)
    The Pentagon's Bottomless Money Pit (RollingStone)
    Testing, testing, testing (Rob Slade)
    Coronavirus misinformation, and how scientists can help to fight it
    (Dave Farber)
    Wirecard, a Payments Firm, Is Rocked by a Report of Missing $2B (NYTimes) Social Media Giants Support Racial Justice. Their Products Undermine It.
    (NYTimes)
    Square, Jack Dorsey's Pay Service, Is Withholding Money Merchants Say They
    Need (NYTimes)
    Many Medical Decision Tools Disadvantage Black Patients
    Why Obsessive K-Pop Fans Are Turning Toward Political Activism (NYTimes)
    Re: TikTok Teens and K-Pop Fans Say They Sank Trump Rally (William Bader)
    Re: Silicon Valley Can't Be Neutral (John Levine)
    Abridged info on RISKS (comp.risks)

    ----------------------------------------------------------------------

    Date: Mon, 22 Jun 2020 10:16:32 +0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: Vehicle Attacks Rise As Extremists Target Protesters (npr.org)

    https://www.npr.org/2020/06/21/880963592/vehicle-attacks-rise-as-extremists-target-protesters

    That a kill switch cannot be prophylacticly applied to all non-emergency vehicles in the vicinity of a protest exposes pedestrian marchers to heinous and violent reprisals. A localized kill switch won't halt a '63 Chevy
    Impala.

    Kill switch vulnerabilities have appeared repeatedly in comp.risks:

    https://catless.ncl.ac.uk/Risks/27/11#subj3.1 https://catless.ncl.ac.uk/Risks/27/84#subj10.1 https://catless.ncl.ac.uk/Risks/28/24#subj12.1 https://catless.ncl.ac.uk/Risks/28/25#subj5.1 https://catless.ncl.ac.uk/Risks/30/29#subj4.1

    In https://catless.ncl.ac.uk/Risks/28/25#subj5.1, Jonathan Zittrain <zittrain@law.harvard.edu> states:

    "I know I've long inveighed against vendor (and, by proxy, government)
    control over consumer technology, and I still think that's a central
    threat to both open code and free speech. But all of that
    otherwise-worrisome tech applied to weapons seems to invert the equities."

    Given that kill switches are not readily viable solutions: Laying traffic spikes across intersections and at start/end points traversed by protesters might suppress vehicle ramming incidents.

    Public safety offices require advanced notification to deploy traffic spikes given a march route and duration estimate. Protest planning forbearance
    reduces flash-mob spontaneity, but can enhance pedestrian safety that
    appears absent today.

    ------------------------------

    Date: Tue, 23 Jun 2020 18:49:30 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Chrome extensions with 33 million downloads slurped sensitive user
    data (Ars Technica)

    https://arstechnica.com/information-technology/2020/06/chrome-extensions-with-33-million-downloads-slurped-sensitive-user-data/

    The extensions, which Google removed only after being privately notified of them, actively siphoned data such as screenshots, contents in device clipboards, browser cookies used to log in to websites, and keystrokes such
    as passwords, researchers from security firm Awake told me. Many of the extensions were modular, meaning once installed, they updated themselves
    with executable files, which in many cases were specific to the operating system they ran on. Awake provided additional details in this report.

    https://cdn2.hubspot.net/hubfs/3455675/wp-the-internets-new-arms-dealers-malicious-domain-registrars.pdf

    ------------------------------

    Date: Tue, 23 Jun 2020 18:34:10 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Millions of documents from >200 US police agencies published in
    BlueLeaks trove (Ars Technica)

    Document dump comes almost 4 weeks after murder by police of George Floyd.

    https://arstechnica.com/tech-policy/2020/06/blueleaks-airs-private-data-from-more-than-200-us-police-agencies/

    ------------------------------

    Date: Wed, 24 Jun 2020 14:49:41 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Wrongfully Accused by an Algorithm (NYTimes)

    In what may be the first known case of its kind, a faulty facial recognition match led to a Michigan man's arrest for a crime he did not commit.

    https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html

    ------------------------------

    Date: Tue, 23 Jun 2020 18:32:41 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: If T-Mobile's giant outage affected you, now's your chance to tell
    the FCC (Ars Technica)

    FCC asks public to describe experiences during last week's 13-hour outage.

    https://arstechnica.com/tech-policy/2020/06/if-t-mobiles-giant-outage-affected-you-nows-your-chance-to-tell-the-fcc/

    ------------------------------

    Date: Wed, 24 Jun 2020 14:20:40 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: This sneaky malware goes to unusual lengths to cover its tracks
    (ZDNet)

    *Glupteba creates a backdoor into infected Windows systems - and researchers think it'll be offered to cyber criminals as an easy means of distributing other malware.*

    A malware campaign which creates a backdoor providing full access to compromised Windows PC, while adding them to a growing botnet, has developed some unusual measures for staying undetected.

    Glupteba first emerged in 2018 and started by gradually dropping more components into place on infected machines in its bid to create a backdoor
    to the system.

    The malware is continuously in development and in the last few months it appears to have been upgraded with new techniques and tactics to coincide
    with a new campaign which has been detailed by cybersecurity researchers at Sophos. <https://www.zdnet.com/article/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software/>

    The paper <https://news.sophos.com/en-us/?p=67447> describes Glupteba as "highly self-defending malware" with the cyber criminal group behind it
    paying special attention to "enhancing features that enable the malware to evade detection".

    However, its method of distribution is relatively simple: it's bundled in pirated software, including cracked versions of commercial applications, as well as illegal video game downloads. The idea is simply to get as many
    users to download compromised applications which contain the Glupteba
    payload as possible.

    To ensure the best possible chance of a successful compromise, the malware
    is gradually dropped, bit-by-bit onto the system to avoid detection by any anti-virus software the user may have installed. The malware also uses the EternalBlue SMB vulnerability to help it secretly spread across networks. <https://www.zdnet.com/article/why-the-fixed-windows-eternalblue-exploit-wont-die/>

    But that isn't where the concealment and self-defence ends, because even
    after installation Glupteba goes out of its way to stay undetected. [...] https://www.zdnet.com/article/this-sneaky-malware-goes-to-unusual-lengths-to-cover-its-tracks/

    ------------------------------

    Date: Sun, 21 Jun 2020 17:00:58 -0600
    From: Jim Reisert AD1C <jjreisert@alum.mit.edu>
    Subject: Masked arsonist might've gotten away with it if she hadn't left
    Etsy review (Jon Brodkin)

    Jon Brodkin, Ars Technica, 18 Jun 2020
    Woman who burned two police cars IDed by tattoo and Etsy review of her
    T-shirt.

    To some extent, every Internet user leaves a digital trail. So when a
    masked arsonist was seen on video setting fire to a police car on the day
    of a recent protest in Philadelphia, the fact that her face was hidden
    didn't prevent a Federal Bureau of Investigation agent from tracking down
    the suspect. The keys ended up being a tattoo and an Etsy review the
    alleged arsonist had left for a T-shirt she was wearing at the scene of
    the crime, according to the FBI.

    https://arstechnica.com/tech-policy/2020/06/masked-arsonist-mightve-gotten-away-with-it-if-she-hadnt-left-etsy-review/

    ------------------------------

    Date: Tue, 23 Jun 2020 18:37:40 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Crooks abuse Google Analytics to conceal theft of payment card data
    (Ars Technica)

    Ecommerce site's blind trust makes the service a perfect place to dump data.

    https://arstechnica.com/information-technology/2020/06/google-analytics-trick-allows-crooks-to-hide-card-skimming/

    ------------------------------

    Date: Tue, 23 Jun 2020 18:39:21 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Bot mafias have wreaked havoc in World of Warcraft Classic (WiReD)

    Blizzard has suspended or closed over 74,000 accounts in the last month.

    https://www.wired.com/story/world-of-warcraft-classic-russian-bots/

    ------------------------------

    Date: Mon, 22 Jun 2020 15:32:39 -0500
    From: <bmeacham01@earthlink.net>
    Subject: The Pentagon's Bottomless Money Pit (RollingStone)

    When the Defense Department flunked its first-ever fiscal review, one of our government's greatest mysteries was exposed: Where does the DoD's $700
    billion annual budget go?

    Contains numerous mentions of huge IT project failures.

    https://www.rollingstone.com/politics/politics-features/pentagon-budget-myst ery-807276/

    Just over 50 years ago, Dwight Eisenhower gave his famous farewell address warning of the power of the "military-industrial complex." The former war commander bemoaned the creation of a "permanent armaments industry of vast proportions," and said the "potential for the disastrous rise of misplaced power exists and will persist."

    Eisenhower's warning is celebrated by the left as a caution against the overweening political power of war-makers, but as we're now seeing, it was predictive also as a fiscal conservative's nightmare vision of the future.
    The military has become an unstoppable mechanism for hoovering up taxpayer dollars and deploying them in the most inefficient manner possible.

    ------------------------------

    Date: Mon, 22 Jun 2020 11:24:04 -0700
    From: Rob Slade <rmslade@shaw.ca>
    Subject: Testing, testing, testing

    Recently, a certain national leader has directed that testing for the SARS-CoV-2 virus be "slowed" so that the numbers of new cases of the disease will be reduced. This is, of course, flatly ridiculous. Testing does not cause problems, it just reveals existing problems. And the lack of testing doesn't prevent problems, it only blinds you to the scope of the problem. I have told my "testing" story before ...

    Oh, well, what the hey:

    I am reminded of a situation where sales and marketing was supposed to carry out virus scans before they installed our product. They had previously been using an inferior product, and I mandated that they using a more accurate product. At one point a machine was brought in as a problem. First step in
    my process was to scan the machine, and, sure enough, it was infected.

    "Did you scan it?"

    "Yes."

    "Did you use the right scanner?"

    "Well, no, we used the old one."

    "Why did you use the old scanner, when I've specified that you have to use
    the new one?"

    "Well, when we use the one you told us to, it finds viruses ..."

    ------------------------------

    Date: Tue, 23 Jun 2020 10:29:33 +0900
    From: Dave Farber <farber@gmail.com>
    Subject: Coronavirus misinformation, and how scientists can help to fight it

    https://www.nature.com/articles/d41586-020-01834-3?utm_source=Nature+Briefing&utm_campaign=761bed091d-briefing-dy-20200622&utm_medium=email&utm_term=0_c9dfd39373-761bed091d-43758197

    ------------------------------

    Date: Tue, 23 Jun 2020 08:10:03 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Wirecard, a Payments Firm, Is Rocked by a Report of Missing $2B
    (NYTimes)

    The German company's share price has plunged 80 percent, and its longtime
    chief executive has resigned.

    https://www.nytimes.com/2020/06/19/business/wirecard-scandal.html

    ------------------------------

    Date: Tue, 23 Jun 2020 08:13:18 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Social Media Giants Support Racial Justice. Their Products
    Undermine It. (NYTimes)

    Shows of support from Facebook, Twitter and YouTube don't address the way those platforms have been weaponized by racists and partisan provocateurs.

    https://www.nytimes.com/2020/06/19/technology/facebook-youtube-twitter-black-lives-matter.html

    ------------------------------

    Date: Tue, 23 Jun 2020 09:16:55 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Square, Jack Dorsey's Pay Service, Is Withholding Money Merchants
    Say They Need (NYTimes)

    Small businesses say the Twitter chief's other company is holding on to 30 percent of their customers' payments during the pandemic.

    https://www.nytimes.com/2020/06/23/technology/square-jack-dorsey-pandemic-withholding.html

    ------------------------------

    Date: Tue, 23 Jun 2020 09:22:30 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Many Medical Decision Tools Disadvantage Black Patients (NYTimes)

    Doctors look to these digital calculators to make treatment decisions, but
    they can end up denying black patients access to certain specialists, drugs
    and transplants.

    https://www.nytimes.com/2020/06/17/health/many-medical-decision-tools-disadvantage-black-patients.html

    ------------------------------

    Date: Tue, 23 Jun 2020 07:47:12 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Why Obsessive K-Pop Fans Are Turning Toward Political Activism
    (NYTimes)

    After claiming some credit for the fizzling of President Trump's rally in Oklahoma, the online armies of Korean pop music listeners are feeling
    prepared and empowered.

    https://www.nytimes.com/2020/06/22/arts/music/k-pop-fans-trump-politics.html

    ------------------------------

    Date: Sun, 21 Jun 2020 22:21:24 +0100
    From: William Bader <william.bader@gmail.com>
    Subject: Re: TikTok Teens and K-Pop Fans Say They Sank Trump Rally
    (PGN comment in RISKS-32.02)

    The title Monty sent me is the one online, which says `Stans' instead of `Fans'.

    "A crazed and or obsessed fan. The term comes from the song Stan by eminem.
    The term Stan is used to describe a fan who goes to great lengths to obsess over a celebrity." https://www.urbandictionary.com/define.php?term=Stan

    [Thanks to at least a dozen readers for helping my education. I stans
    corrected. But I remember Stan Laurel and Oliver Hardy, whom all but the
    oldest RISKS readers probably don't. PGN]

    ------------------------------

    Date: June 24, 2020 6:22:20 JST
    From: John Levine <johnl@iecc.com>
    Subject: Re: Silicon Valley Can't Be Neutral (Via Dave Farber)

    In article <566E5F5C-2B19-4E1E-AF1D-0F1194EDC43B@keio.jp> you write:

    Silicon Valley Can't Be Neutral in the U.S.-China Cold War -- https://foreignpolicy.com/2020/06/22/zoom-china-us-cold-war-unsafe

    In other words, Zoom is rolling out a ``one-company, two-systems model'' -- participants in China would be subject to censorship, but those outside of China would not.

    I agree this is pretty creepy, but how is this fundamentally different from
    the way that EU laws like right to be forgotten make search engines results
    in Europe omit stuff that is included other places?

    If you're going to operate in a country at all, you have to follow the country's rules. I expect I would have a different answer to whether I'd operate in China.

    ------------------------------

    Date: Mon, 1 Jun 2020 11:11:11 -0800
    From: RISKS-request@csl.sri.com
    Subject: Abridged info on RISKS (comp.risks)

    The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
    comp.risks, the feed for which is donated by panix.com as of June 2011.
    SUBSCRIPTIONS: The mailman Web interface can be used directly to
    subscribe and unsubscribe:
    http://mls.csl.sri.com/mailman/listinfo/risks

    SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that
    includes the string `notsp'. Otherwise your message may not be read.
    *** This attention-string has never changed, but might if spammers use it.
    SPAM challenge-responses will not be honored. Instead, use an alternative
    address from which you never send mail where the address becomes public!
    The complete INFO file (submissions, default disclaimers, archive sites,
    copyright policy, etc.) is online.
    <http://www.CSL.sri.com/risksinfo.html>
    *** Contributors are assumed to have read the full info file for guidelines!

    OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's
    searchable html archive at newcastle:
    http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
    Also, ftp://ftp.sri.com/risks for the current volume
    or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
    If none of those work for you, the most recent issue is always at
    http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-32.00
    ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001)
    *** NOTE: If a cited URL fails, we do not try to update them. Try
    browsing on the keywords in the subject line or cited article leads.
    Apologies for what Office365 and SafeLinks may have done to URLs.
    Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

    ------------------------------

    End of RISKS-FORUM Digest 32.03
    ************************

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)