Cracking the BlackBerry with a $100 Key 94
Hit Reply writes "Eweek is running the contents of a Symantec white paper that details how easy it is for a hacker to manipulate BlackBerry applications. Using a developer key that can be purchased by anyone for $100, an attacker can launch e-mail worms, SMS interception and backdoor attacks, and compromise the integrity of contacts, events and to-do items. The white paper has been yanked from Symantec's Web site." From the article: "Signed applications can send e-mail and read incoming e-mail. A malicious application could be used to allow third parties to send messages from the infected BlackBerry and also read all received messages. A malicious application could also use e-mail as a command and control channel to receive instructions to send and receive e-mails; send and receive SMS messages; add, delete and modify contacts and PIM data; read dialed phone numbers; initiate phone calls; and open TCP/IP connections."
Heh. (Score:5, Insightful)
Personally it doesn't bother me in the least that a security company is interested in, well, security. Having them actually detail vulnerabilities and produce papers like this would at least be a useful function for them.
Of course, so would producing a worthwhile product that doesn't devour processor cycles, hog system resources, and create system instability upon removal.
Re: (Score:2)
Re: (Score:2)
Well, the article mentions that you could do this by getting an anonymous pre-paid credit card. Does anyone have further information on this? That sounds interesting....
I googled for a couple, but, most seemed to be overseas 'banks' that have you send $250 or $1K or more to them, and they send you a working 'number'. I'm just a little hesitant to try something like
Re: (Score:2, Informative)
"One thing that seems funny in all of this to me, someone that is going to crack your blackberry is going to legally buy the developer key? "
Well, the article mentions that you could do this by getting an anonymous pre-paid credit card. Does anyone have further information on this? That sounds interesting....
I googled for a couple, but, most seemed to be overseas 'banks' that have you send $250 or $1K or more to them, and they send you a working 'number'. I'm just a little hesitant to try something like that I'd not heard of before.
Anyone have experience with things like that?
Search for [CC Brand] Gift Card. For example, Amex Gift Cards ( http://www10.americanexpress.com/sif/cda/page/0,16 41,16130,00.asp [americanexpress.com] )
You can even pick them up at many stores
Re:Heh. (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Re:But what if... (Score:4, Interesting)
Re: (Score:2)
So what? (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
Maybe not.
Re: (Score:1)
Furthermore, when I install applications from a browser onto my blackberry, they are typically
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
repeat 5x: (Score:5, Funny)
Re: (Score:1)
Wow major FUD (Score:3, Insightful)
I should mention that yes, indeed, these situations are almost identical. A root password *can* be changed, to whatever you want, even without knowledge of what previous password was, quite easily.
Re:Wow major FUD (Score:5, Informative)
Also it's not trivial to get additional keys. The Blackberry signing certificate program is managed by humans and they catch on pretty quickly. If you even use the signing keys from more than one computer, their signature server will become upset and you'll probably get a phone call from RIM operations.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
what you do is create another account, call it root2 or backupop or something like that, set your own password for it and make it user 0 as well as root.
Now you have root access with a different username and password that doesn't look as suspicious.
This is also good for admins with bad memories who change root passwords often. Set up a second root account with a complex pas
Re: (Score:1)
Re: (Score:1)
will it be used maliciously? (Score:2, Funny)
Re: (Score:1, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
I realize that they did it most likely to keep customers locked into paying for service,
Re: (Score:2)
Re: (Score:3, Informative)
Properly configured, that account gives you access to every mailbox on the system, but nothing else. No worse than a mail admin account, and generally with a lot stronger password.
Re: (Score:2)
Right, but what I'm getting at is that most admins don't generally set up hundreds of remote devices to do things in the context of their mail admin account.
Because of the BES architecture, isn't a compromised handheld connected to a server running the default configuration a gateway for an attacker to read the email of everyone i
Re: (Score:2)
A compromised handheld WILL give lan access and email access to the user of that handheld until the device is disconnected from the BES. But the device itself has no permissions.
Since there are no offline password attacks (yet) and you only get 10 tries before a BBerry disconnects itself from its BES, compromising a BBerry always comes down to a bad password/no pas
Re: (Score:2)
Re: (Score:1)
Besides, I couldn't imagine everybody's blackberry e-mails passing through Canada, that'd be the number one contribution to global warming!
Re: (Score:2)
all non-wap blackberry data travels along the blackberry-cell provider-RIM-BES-wherever (and the reverse for data sent to a blackberry)
Re: (Score:1)
Re: (Score:2)
Your BES doesn't have a cell network router attached to it does it? Did you put up your own cell phone towers?
Probably not.
Re: (Score:3, Informative)
Re: (Score:3, Interesting)
I guess this is as good a place as any to ask - how did RIM ever sell the idea of having all corporate email and web traffic for Blackberries routed through their servers?
The alternative would be to work the way that MS Mobile 5 does and have the device in the field connect directly into the Exchange Server (or whatever) via an access mechanism that you maintain. That means that you have to do the work to "keep the bad guys out" rather than RIM. Which one is "better" will depend on your point of view, and what you want to use mobile devices for. Personally, the RIM model makes a lot of sense to me, as you're already trusting your data to "someone else's network" (the wire
Re: (Score:2)
Fair enough. My employer already maintains a server on the perimeter for Outlook Web Access, so your argument doesn't apply to us, but absent that I would be more likely to agree with you.
Also
In other news (Score:5, Funny)
And just like all the other BlackBerry "exploits" (Score:2)
Just like the last attempt I saw to create a 3rd party BlackBerry security market by saying hey you can write a proxy to use a blackberry as a bridge to a company LAN via MDS... Of course you can (if i install your software)... Now if you can install this software without me letting you, then I'll worry... Until then, it's just FUD to create a market for a 3rd party security product.
Re:And just like all the other BlackBerry "exploit (Score:2)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:1)
Amazing! (Score:2, Insightful)
Why is this even posted like it's some kind of new concept?
If you install an application to your desktop machine, it can do all of those things. Why do you think the phone is any different? If you don't like the idea of malicious software then don't use a smartphone of any variety.
In fact, this should be good news. A person has to go to the extra length of signing their application before it has this access. Of course, on my smartphone
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
bizarre.
I found it on RIM's site, but I can't seem to find a place to purchase one of these. RIM just has a "have someone contact you" link.
Re: (Score:2)
Huh? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
I guess you could run it through some kind of third party provider like clickatel or some such, but once you got to any level of worthwhile volume (Remember, the carriers take 50% right off the top of that $1, and most only pay out quarterly) you would never be able to collect.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Ok, this one says Wal-mart, this one says ACE, this one says Dexter....
That's nothing! (Score:3, Funny)
I can do it for free with my fist, but that kinda hurts.
Re: (Score:1)
Duh (Score:2)
Nobody's that stupid... (Score:3, Funny)
No way! (Score:3, Interesting)
Stock Tip: Symantec downgraded to Strong Sell (Score:3, Insightful)
What an absolutely pathetic attempt at marketing from the once grand antivirus company.
Re: (Score:2)
"You're running Solaris 8. The default install of the first release of Solaris 8 had an obscure FTP bug and so YOU'RE GOING TO GET HACKED!!!!" This bulletin applies to every release of Solaris 2.5.1, 2.6, 2.7, 7, 8, 8.1, 9.0, 10; HP-UX... Linux...AIX...NCFTPD...WU-FTPD..." and so forth.
Usually it's a single bug in a single version that we've alread
Re: (Score:1)
It's even harder to write a blackberry worm... (Score:4, Insightful)
Even if you DO write a program that reads/sends email or connects to the internet.
And then pay the money and SIGN your malicious app--
and then somehow get somebody to INSTALL it..
Well on the BB releases I use - you will also get WARNINGS when you execute the program.
When the program first tries to access your email folder - it will pop up a warning asking you "do you want to allow this program to acesss your email folder?"
First time the application tries to open a TCP/IP connection to the outside world - same thing: "The application is attempting to open a conneciton to X.X.X.X - do you wish to allow it?". You can type "Allow" or "Deny" or "Allow always".
So BE WARNED: A person can a malicous program, that is signed with his name on it (RIM takes your info before they give you the keys), which you MIGHT install and then you MIGHT accidentally give it access to your emails, and address book, and access to internet. If all those things happen - then it would be bad!
I will never by an AV for a smartphone (Score:1)
Re: (Score:1)
Slashdot/eWeek/etc - Welcome to last summer!! (Score:1)
Developer keys or developer tax? (Score:2)
It sounds like Blackberry are using developer keys as a tax on development for their platform. Developer keys should not work on any device, you should have to configure your device to accept them, either configuring it as a "development device", or better, configuring it to accept a specific developer key. In the latter case, the device manufacturer, network operator, or whoever controls the production keys, can get out of the way, and let developers create their own self-signed keys for development. Unfor
Re: (Score:1)
Get the white paper here .. (Score:2)
Blackberry security overview [virginia.edu]
Re: (Score:2)
so it is ... (Score:2)