
Front Page • Latest • Perspectives • Slide
Part II – Are We Prepared for A Cyberwar? Everything Can Be Hacked to Leak Sensitive Data: Even People and Your Dumb Printer
Eshan Maitra
“We are in more dangerous place now, than we were in 20 years ago,” says Ang Cui in the interview with the Motherboard by Victoria Turk. As mentioned in the last part of the article, they are one of the white hat hackers, who are actually helping with hacking. Meaning they do not only invent different ways of hacking, they do so to find possible ways to sort out the security measure that should be taken against such prominent threat. His hacking group, the Red Balloon Security, based at Manhattan, New York, specializes on embedded bugging. By bugging, and gaining access of a particular device, we usually imagine someone sneaking in the place and actually mantling a bugged piece of hardware onto the device. But a Security Expert, Glenn Wilkinson says, that is so 2 years ago. Bugging does not require physical contact at all any more, while there are so many wireless networks right in the air in front of you. You might just need to pull the right thread to reach to other end. But Ang Cui took that even to a next level. He particularly invented this awesome device out of hobby that he calls, ‘Funtenna’ (though not so fun when you are getting hacked). It uses simple Morse code, hence the radio signal. He doesn’t even have to hack into the networking system of the device! He just need to be close enough, which can also be from miles’ distance. He explains that, no matter what the electronic device might be. All of them share some forms of common hardware, the basic construction blocks. That he can manipulate to become the bugged piece and then, access the device with full control. For land-phones, he can simply use the Funtenna to transmit signals to create fake calls or even manipulate it to seem as if it is not working. Also, he can receive the data directly from it, means turning it into an ear for eavesdropping.
This does not even have to be directly fromhis laptop hooked with the Funtenna. He can build connections with another laptop, then use that laptop to hack into another man’s printer and that printer can hack into the phone. Now, there it seems like it is crossing the Sci-Fi line. How can a printer transmit signal? He makes its hardware vibrate to send off Morse codes to the phone and talk to the phone’s hardware to do his bidding. Then, the received Morse codes can be translated into binary codes (the general computer language), then finally to human language to read, using the software he made. Hacking is no rocket science anymore, with the proper setup and simple knowledge. The biggest advantage of the Funtenna is that, none would even anticipate such hacking attack and there is no possible firewall against it. Regarding such current hacking advancements, Ang Cui strongly hinted that, if there is going to be another world war, it is definitely going to be a Cyberwar. But the tragic fact is that, by any means we are not prepared at all.
Thankfully, the numbers of hackers like David Kenedy and Ang Cui are increasing. These ethical hackers are at the side of the angels. They have their security farms who legally hack networks to find their vulnerability and validate the security level. Also consults to take certain procedures and measures against future possible cyber-attacks. One of such largest group of ethical hackers is, the RedTeam Security. They were recently hired by a power company in the Midwest, USA, to test their defenses. None but the company’s owner and the Network Advisor knew about their heist. This hacking project was covered in one of the Tech Insider episode, produced by Chris Snyder and Paul Szoldra. They followed around to see them doing the most unimaginably impossible hackings, in the simplest and easiest manners possible. ReadTeam Security Practice Director, Ryan Manship said as quote, “Easy as walking through the front door.” Just within 3 days, they took control over 12 office buildings and full network access of the power company, including their regional electrical grids. With given times, they confidently stated that, they can easily take over the national grid and shut down the power of whole USA, before anyone noticing. Just imagine, how powerful that makes these hackers. Most the times they easily broke into the offices with much no effort. They even encountered open doors, and created fake ids that none even bothered to verify. Once, they even copied a police id and accessed into the federal information too. None of these offices, or the locals (except just one suspicious guy, who never filed report to the police whatsoever) did not even realize the bugging, and the security invading. Again, despite of having 2 types of sensors and cameras, the power-grid had a big blind spot. Team used a simple drone to indentify that, just because walking around a forest was bit of a hustle. They even used shiny foil paper covered board to bypass infrared sensor. Such cheap disguise to bypass expensive security! One of their trained member, simply used a woolen sheet to climb over the barbed wired high voltage fence. To be actual, they made the company’s security system look pathetic. ReedTeam Security Founder/President, Jeremiah Talamantes commented, “Based on our experiences, it would seem that power companies need to step up their game in the fight against cyber attackers or it could be ‘lights out’.”
Given to the current conditions of the security system all over the world, are below necessary. If countries like US are not even well equipped, we can’t actually blame Bangladesh Bank in that contrast for this year’s insane $81M bank heist. Sadly, I doubt the cyber protection of other important institutions are any better. Right when a professional US network advisor would say, “You think everything just patched up, then someone finds other ways to get it.” Even back in 2006, two engineers from Los Angles, California, Gabriel Murillo and Kartik Patel hacked into city’s traffic gridlocks as part of Labor Strike. Yes, Watchdogs is just sounding like more than a game now, rather current reality. Also, the 9/11 was possible because of the same reasons. Another ethical hacker Josh Corman says to the Tech Insider in a recent interview, “Hacking is a form of power, that can even compromise the national security.” Fortunately, we have more cyber heroes like him who are trying get the attention of the authorities and warning them to be prepared for future. They are using their abilities to protect us, rather than causing disruption. We need more like them. Bangladesh is already producing thousands of CSE graduates each year. It is a dire time, they are organized under higher care, put into proper training and to the right path. Before, other whispers lure them to the darker side of hacking. With proper guiadance they can become resources not only to our country, but to the world as well. As Ang Cui said in his interview to the Motherboard, “Hacking field is like the Wild Wild West. Not many are dying, but people are hacking. Also it doesn’t take much effort to do so.” Therefore, we should be preparing for the upcoming future of information technology and the art of hacking.
