Tag Archive for: decrypt

OneLogin hack exposed sensitive US customer data and ability to decrypt data

OneLogin, an identity management company which provides a single sign-on platform for logging into multiple apps and sites, was hacked. US customer data was potentially compromised,“including the ability to decrypt encrypted data.”

The company, which claims “over 2000+ enterprise customers in 44 countries across the globe trust OneLogin,” announced the security incident on May 31. It was short on details, primarily saying the unauthorized access it detected had been blocked and law enforcement was notified.

To read this article in full or to leave a comment, please click here

Network World Security

Once again, you can decrypt your CryptXXX ransomware files for free

Cryptxxx thumb

Ransomware authors are human. They make mistakes.

And their mistakes mean that you might be able to recover your encrypted data.

Read more in my article on the Tripwire State of Security blog.

Graham Cluley

HTTPS and OpenVPN face new attack that can decrypt secret cookies

Enlarge / From an upcoming paper laying out a new attack against 64-bit block ciphers used by HTTPS and OpenVPN. (credit: Karthikeyan Bhargavan and Gaëtan Leurent)

Researchers have devised a new attack that can decrypt secret session cookies from about 1 percent of the Internet’s HTTPS traffic and could affect about 600 of the Internet’s most visited sites, including nasdaq.com, walmart.com, match.com, and ebay.in.

The attack isn’t particularly easy to carry out because it requires an attacker to have the ability to monitor traffic passing between the end user and one of the vulnerable websites and to also control JavaScript on a webpage loaded by the user’s browser. The latter must be done either by actively manipulating an HTTP response on the wire or by hosting a malicious website that the user is tricked into visiting. The JavaScript then spends the next 38 hours collecting about 785GB worth of data to decrypt the cookie, which allows the attacker to log into the visitor’s account from another browser. A related attack against OpenVPN requires 18 hours and 705GB of data to recover a 16-byte authentication token.

Impractical no more

Despite the difficulty in carrying out the attack, the researchers said it works in their laboratory and should be taken seriously. They are calling on developers to stop using legacy 64-bit block-ciphers. For transport layer security, the protocol websites use to create encrypted HTTPS connections, that means disabling the Triple DES symmetric key cipher, while for OpenVPN it requires retiring a symmetric key cipher known as Blowfish. Ciphers with larger block sizes, such as AES, are immune to the attack.

Read 7 remaining paragraphs | Comments

Technology Lab – Ars Technica

Apple CEO Cook: Judge’s order to decrypt shooter’s iPhone is more than an encryption issue

A court order for Apple to help the FBI carry out a brute-force attack on the iPhone used by shooters in last year’s San Bernardino terrorist attack would set a precedent with broad implications, experts say.

For one, it could mean that in the future makers of encryption products might have to modify them to meet similar orders if they can’t otherwise access the encrypted data they contain. This raises the concern of privacy advocates who say encryption is important not only to protect personal data but also to safeguard transactions and industrial secrets.

On the flip side, if the order is overturned, it could leave law enforcement without a tool it desperately wants until a federal law passes that clearly spells out that product manufacturers must be able to meet the demands of such orders. Given the contentious nature of federal politics this year, that could be a long process.

To read this article in full or to leave a comment, please click here

Network World Tim Greene