Kinko's Spy Case Illustrates Public Terminal Risk 383
tealwarrior writes "CNN reports in this
story that a hacker by the name of Jiang was charged with installing keystroke loggers to record passwords in 14 differnet kinkos in New York. These were then used to open bank accounts online. The article mentions Jiang signing people up for accounts with GoToMyPC then then using their own machine to open bank accounts. Also mentioned are similar schemes perpetrated at Boston College." Be careful out there, folks. Sometimes there's even sneakier things than just stealing one's cookies.
Funny thing, the name... (Score:3, Funny)
Adobe's eBook reader was cracked : Skylarov.
and now, Jiang.
Why isn't it Rob or Pete or Chris, ever??
-
Re:Funny thing, the name... (Score:2, Interesting)
Re:Funny thing, the name... (Score:5, Insightful)
More interesting question: why is it never Amy, or Meiying, or Fatimah?
Re:Funny thing, the name... (Score:3, Funny)
Re:Funny thing, the name... (Score:3, Insightful)
Pakistan?!? What kind of history do they teach at your school?
Re:Funny thing, the name... (Score:2, Funny)
Do you mean "whatever formerly related to the France" ?
Rather by the people who love freedom (Score:3, Insightful)
Sklyarov was a victim of exactly same illusion as you have - he thought that USA is free country, he come there and was put into jail for the action which do not constitute crime at all by Russian laws - publishing information about security flaws in eBook, nd was done on Russian territory.
Note that Alan Cox of UK shares almost same opinion - he refuse to go to USENIX because after Sklyarov case
Clarification Please! (Score:3, Insightful)
What is a Kinkos????
Thanks!
Re:Clarification Please! (Score:3, Informative)
Don't quote me on that though.
Re:Clarification Please! (Score:2)
Re:Clarification Please! (Score:5, Informative)
Re:Clarification Please! (Score:3, Informative)
Google finds quite a lot. My guess is it's http://www.kinkos.com/:
Document Solutions - Done Right, Anytime, Anywhere
Core Values
1. Alignment and accountability: We accept responsibility for our actions. We make and support business decisions through experience and good judgment.
2. Customer Service Excellence: We are dedicated to satisfying customer needs and honoring commitments that we have made to them.
3. Teamwork: Our team is supportive of each other's effor
Re:Clarification Please! (Score:3, Informative)
Re:Clarification Please! (Score:3, Informative)
My first thought was like "Huh? Kino Kiosk?", because that's what it sounds like to me, but if you check out http://www.kinkos.com/ [kinkos.com] you can see that they offer a service where they print and ship documents (or photos) for you. Apparently they have a set of terminals around in the US where you may log on to, download and e-mail them your documents, and pay by credit card.
Re:Clarification Please! (Score:3, Informative)
The better answer: It's like a business office you can rent by the hour.
I think they started doing "just photocopying jobs," but they'll also print large glossy posters and other stuff too. They have basically offices for rent -- you can videoconference from a Kinkos, and you can use computers to access the Internet, etc.
Re:Clarification Please! (Score:3, Funny)
Jiang was charged with installing keystroke loggers to record passwords in 14 differnet kinkos in New York.
Make that statement seem so much worse if you saw it like I did....
Re:Clarification Please! (Score:2)
Apparently he had been managing a slow burn for about 2 months since the first bill arrived, with regular charges for weekly visits to 'Kinkos'. All her tutorial notes were arranged by the professors for pickups at the local copy-
What do people expect? (Score:5, Insightful)
It's amazing. 99% of people have the sense not to give out their CC # over a payphone in a crowded bus terminal. Online Banking however, why not. Silly.
Re:What do people expect? (Score:5, Interesting)
Are you sure? I've been sitting on a train as a guy opposite sat with his card on the table shouting the numbers into his mobile phone (he was ordering flowers for his wife - anniversary - £100 bunch - no ribbon - she hates ribbon - thinks its a waste - and nothing with those really thick stems - she always complains about those too - and just put 'hey' on the card - yes - just 'hey') gave his address for delivery, his postcode, his home and mobile numbers and his wifes name (Ruth - kind of old fashioned a name I thought) and a few other bits. Practically enough to get a passport with!
Maybe he was the 1%. So far as I could tell I was the only one logging all this info into a palm at the time tho - so no harm done!
Re:What do people expect? (Score:2, Insightful)
Re:What do people expect? (Score:3, Interesting)
Banks should know better as well. Over here, banks are liable to some extend when a customer's online account is hacked or accessed illegaly. That is why all banks go to some lengths to prevent simple password sniffers to gain access to online banking services. They all use some sort of challenge-response system with a small device that turns the cha
is this viable for a class-action lawsuit? (Score:5, Interesting)
I called their customer support line on Wednesday as soon as I saw this article, and they said they didn't know anything about it- the person I spoke to called me back and said that their corporate office would get back to me by the end of the day.... I'm still waiting.
I called the store directly last night and the manager, sounding like he was lying through his teeth, told me that they were absolutely not one of the stores.
So, I've very interested in knowing if this has class-action lawsuit potential since Kinko's was prosecuting this case and obviously had no intentions of notifying their customers of the risk they were at while using their store. If there is an existing lawsuit, how do I find it? Thanks!!!!
Re:is this viable for a class-action lawsuit? (Score:3, Funny)
Re:is this viable for a class-action lawsuit? (Score:2, Insightful)
If you don't do the above, why should Kinko's clean up your mess for you?
Re:is this viable for a class-action lawsuit? (Score:3, Funny)
This is not a situation I wanted to be in, but I was in NY for the conference and conside
Out-of-order username & password entry (Score:5, Insightful)
Re:Out-of-order username & password entry (Score:2, Funny)
Some help, but not 100% effective (Score:5, Informative)
The real solution, though, is don't enter your passwords on an untrusted machine! I went to visit my aunt, uncle, and cousins in Nebraska last month. They know I work online and were totally perplexed as to why I wouldn't use their computer to check my email, my PayPal account, etc. "Well it's gonna take awhile to charge your laptop back up, why don't you just use our computer till then?"
"Because I don't trust your computer" isn't the kind of thing your relatives want to hear, so I emphasized the fact that I have no idea what's running on their computer. We did have a good discussion about spyware, and I downloaded Ad-Aware and showed 'em how to use it. They actually came up fairly clean (just that "satellite" program, I forget who makes it) but I still wouldn't use their machine for anything sensitive.
Magic Lantern (Score:3, Insightful)
It is rumored that the FBI's Magic Lantern key logger does just this, and has specific hooks for the password entry dialog of known `terrorist` applications like PGPdisk, BestCrypt, KGB, etc.
You`re right that most key logging programs are stupid, though. The best way to detect a key logger is to go in Windows Explorer, do a search for files modified in the last day, then sort the list by modification date descending. Open any unusually named fil
Re:Magic Lantern (Score:2, Funny)
Re:Magic Lantern (Score:5, Insightful)
but not necessarly on the PC.
http://www.thinkgeek.com/gadgets/electronic/5a0
Re:Some help, but not 100% effective (Score:3, Insightful)
For a lot of people, places like public libraries are their only Internet access. They have to use them to file unemployment claims, check their email, apply for student financial aid, look up medical information, apply for jobs... You get the idea.
In such cases, people essentially have to trust the security and/or take as much evasive action as possible.
The best way to handle this? Educating people how to
Re:Out-of-order username & password entry (Score:4, Informative)
I used to use this exact same technique, then tried it on a couple of loggers I suspected. Some coders have too much time on their hands
Re:Out-of-order username & password entry (Score:5, Informative)
Instead of trying to be clever, you're probably better off not trusting a publically accessible computer.
Re:Out-of-order username & password entry (Score:2)
Recently, you'd have read about the Passport Password reset bug - how can you be sure if it isn't secret any longer? The best thing, I guess, is to keep using the internet normally, at home, stay with Linux, Mozilla Firebird, stop the pop-ups and stay secure.
heh (Score:2)
You'd better just copy and paste the letters from around the page you're looking at. I mean if you're going for paranoid you might as well go all out.
Tinfoil Hat Linux (Score:4, Interesting)
And this should surprise us? (Score:2, Insightful)
Re:And this should surprise us? (Score:5, Informative)
If I was to do this I would use one of the versions that uses a a private IRC channel to communcicate, that way you never have to go back to the machine again, yet can control it from almost anywhere with a lesser chance of being found.
Re:And this should surprise us? (Score:5, Informative)
Review one [dansdata.com]. Review two [dansdata.com].
Stupid users, Stupid Kinkos (Score:5, Interesting)
Easy Everything, now with a site in NY as well, essentially netboots all the PCs after each user so even if the previous performed some evil, the next user gets a new system free of any malware. This doesn't seem like it would be too hard for Kinkos to do as well. If you've been to a Kinkos in NY, you would know that the copy specialists in the stores are not maintaining the machines.
Re:Stupid users, Stupid Kinkos (Score:2, Funny)
If those addresses are valuable to you, I could probably sell you a book or two full of them. I'll even throw in the phone numbers for free!
Re:Stupid users, Stupid Kinkos (Score:3, Informative)
Easy Everything, now with a site in NY as well, essentially netboots all the PCs after each user so even if the previous performed some evil, the next user gets a new system free of any malware.
That works great, unless the Bad Person has installed a hardware keylogger. They are pretty cheap these days ... as low as $80 [thinkgeek.com].
Some neat features of this gadget:
* Records more than 130,000 keystrokes
* 64K of non-volatile memory. Now with 128K memory ($100)!
* It is Portable - move it from computer to computer
Virutal keyboards (Score:5, Interesting)
Comment removed (Score:5, Insightful)
Re:Virutal keyboards (Score:3, Insightful)
Am I the only one not surprised? (Score:5, Interesting)
I mean, come on, there have to be tons of computer geeks like me out there that look at public libraries, kinkos, office max, internet cafes, etc; and think that a keystroke logger could be infinitely damaging.
Considering any schmuck could pick up a completely software undetectable and almost completely visually/physically undetectable hardware keystroke logger for under $100, this doesn't surprise me. Does anyone think the employee at kinkos getting paid $6/hr cares enough to learn about keystroke logging or check it out?
Again this brings me back to the opinion that allowing any idiot to do whatever they please on a computer is a rediculous idea. I know this is beating a dead horse, but, do we let people drive a car or fly a plane without a license? Before you jump on my case I'm not saying people should need licenses to use computers, or that computers can physically kill a boatload of people like a car or plane could. What I am saying is that banks might require some for education or training, or even just provide literature, something, ANYTHING to let people know that it's probably not the best idea to do your internet banking from KINKOS!.
I'd also like to point out that gotomypc.com sucks, if I see one more ad for them, I'm going to gototheirpc and smash the living crap out of it
I am typing this now from a Kinkos (Score:3, Insightful)
Re:I am typing this now from a Kinkos (Score:4, Interesting)
The majority of the training goes into learning how to work the supplementary process machines (folders, tape and coil binders, bookletizers, etc.) because those are the large batch jobs that bring in the most money. Very few employees, depending on the location and the shift, will actually know how to set up specialized features on the large DocuCenter machines. Day shifters and second shifters will typically run the small batch jobs that need to get out that day, and leave the rest of the work for the night shift. If you want the job done right, bring it there at 3am for a morning pickup. The night shift is usually only 2 people, many times just one (as was the case when it was my shift) and they need to know how to work everything in the shop.
The computers, however, are not upkept by the individual branch employees. There are regional network engineers who do the initial installation at a branch. After that, there is a Kinko's central hub help desk to take care of any questions that the manager/employees have, and a central station for remote administration of branch networks for a region. The managers are expected to be able to follow a colour coded wall chart in the network closet if they want to move equipment or add machines. Ours was an absolute nightmare. Serious technicolour spaghetti, and totally misconnected according to the wall chart. The managers and employees receive zero training on any network essentials, so don't expect them to know anything about security measures. The manager at the branch I worked at couldn't tell you the difference between a keystroke logger and a timber logger.
Re:Am I the only one not surprised? (Score:5, Insightful)
Why is it that the general idea of most people that how much you get paid is directly related to how much effort you put into the job? I worked at Staples in high school, i was paid 6.25 an hour, and I did a pretty damn good job I might say. I didn't mope around my whole shift, I'd help people out, learn about things i didn't know (like printers, i don't print anyhting ever so i didn't know much about the technology in em), took time to learn how do work the machines in our copy center, etc etc. You trying to say that becuase Kinko's employees get paid x amount of dollars they won't bother with this stuff? They could be a budding geek like you and me, still in high school or college something, and they certainly would take an interest in it.
Re:Am I the only one not surprised? (Score:3, Insightful)
How did he install? (Score:2)
Re:How did he install? (Score:2)
Re:RTFA (Score:4, Informative)
Read it yourself. From the article:
Jiang had secretly installed, in at least 14 Kinko's copy shops, software that logs individual keystrokes.
Back in the day.. (Score:2)
He left it running on the lab on the VT100s. It worked. He used the first account to get more accounts. He didn't do anything with the accounts.. (I think the worst he did was some inflamitory emails to some band fan club..)
It did get traced back to him however, but he denied denied denied and they just took his account away.
Ever since then I always
Re:Back in the day.. (Score:3, Informative)
Re:Back in the day.. (Score:2)
You where supposed to always press [5F] (break) before opening a session on a VT terminal.
Sloppy. (Score:5, Interesting)
Whoever was doing support for Kinko's didn't do their job.
Same goes for any other publicly available PCs. Slap policy editor on the system and lock down the ability to install any additional applications, as well as the ability to change the look of the computer. How fscking hard is that to understand?
Failure to do so leads to incidents like this, as well as makes it easier for someone to install pirated software, pr0n, etc. on your systems.
Re:Sloppy. (Score:2)
Re:Sloppy. (Score:2)
Where MY PCs were, they were in a 'library' of sorts at my company. Someone (the admin) was *always* in the room when the 'library' was open.
Re:Sloppy. (Score:2, Insightful)
Don't forget about the ability to click a link to an executable in a browser and run it from location rather than saving it. Bottom line is that if someone has physical access to a machine, if you can't stand behind them and watch them as they use it, it's insecurable. Best bet for a safer internet terminal is a custom diskless
Re:Sloppy. (Score:3, Interesting)
They offer MS Word as a legitimate app. They let users open
Re:Sloppy. (Score:2)
Now, I don't know if you're being serious or if you're just ignorant about Windows PCs.
Yes, they're not 100% secure. But, there are ways to limit access based on the type of userid.
Even if they weren't NT-based PCs, POLEDIT can be used to keep users from installing *anything*, changing the look/feel of the system, etc.
Combine this with Altiris' Lab Management Suite [altiris.com] (formerly LabExpert; An application that allows
Re:Sloppy. (Score:3, Interesting)
I'd say its safe to assume that Kinko's didn't have anything in place to prevent this.
It seems a little absurd to expect someone to walk around and physically inspect every cord on every computer several times a day. Do you do this for any/all computers you're in charge of?
True, but if they took basic preventative measures like securing the CPU in such a way that the keyboard/mouse cables were inaccessible as we
RTA -- He did not sign up for GoToMyPC... (Score:5, Informative)
Who did he call? (Score:3, Interesting)
I'll bite -- who are these "authorities"? Just curious ... so here I am, sitting at home in front of my computer, I've got my bag of corn nuts on one side and my 40 oz. of Olde English 800 on the other ... and my cursor starts moving by itself. OK, I establish that somebody is using my
Passwords are an obsolete form of authentication (Score:5, Interesting)
The most practical alternative at the present time appears to be use of a magnetic stripe card in addition to the password, similar to the authentication process for an ATM. Magnetic stripe readers are now quite common and could be installed on public terminals at minimal expense. Probably the most significant barrier to their widespread adoption is the lack of standard protocols and software packages.
Re:Passwords are an obsolete form of authenticatio (Score:2)
Re:Passwords are an obsolete form of authenticatio (Score:2)
Re:Passwords are an obsolete form of authenticatio (Score:3, Insightful)
By anyone. Most banks are moving away from magnetic stripes exactly because the readers are so inexpensive and easy to install on public terminals and ATMs. In addition to the official readers. The smartcards are coming.
Re:Passwords are an obsolete form of authenticatio (Score:3, Interesting)
The most practical alternative at the present time appears to be use of a magnetic stripe card in addition to the password, similar to the authentication process for an ATM.
What you refer to is known as multi factor authentication, IIRC. I agree that deploying authentication using the "need to have" and "need to know" dualism is way more secure than simple password authentication in principle. Besides that, the Kinko incident suffers from the problem that a public terminal cannot be trusted, and it wouldn
USB even better (Score:2)
USB is even more ubiquitous. Almost all (if not in fact all) new hardware comes with USB, and all modern operating systems support it. It is cross platform, accessible to GNU/Linux, OS X, and even that other obscure operating system from Redmond, WA.
Banks have to provide thei
Re:Passwords are an obsolete form of authenticatio (Score:4, Informative)
Multos [multos.com]
EMV (Europay-Mastercard-Visa) Specifications [visa.com]
JavaCard [sun.com]
OpenCard [opencard.org]
PC/SC Workgroup [smartcardsys.com]
Standards Committees and Standards Related to Smart Cards [demon.co.uk]
I attended the 10th annual smartcard convention in 1999, yet have not seen a smartcard outside of the places I used to work programming them. Maybe its time... The cards then were 1 or 2 dollars and the readers were about 6 or 7, hardly an expensive periferal on your computer.
Let me reiterate. Passwords have nothing to do with authentication, they only say that someone knows your password. Even having a magstripe card at least says that you know a password and were able to obtain phyisical access to the card. The best is a biometric reader with a smartcard. I think bioreaders are about 50 dollars.
root permissions? (Score:2, Insightful)
By taking out floppy/CD drive and simply applying user privileges, I can't imagine that anybody would be able to pull this off on linux terminals.
Therefore, isn't this typically a windows problem? Insecurity by design?
This is why some banks... (Score:5, Insightful)
For example, here in the UK, NatWest bank's online service will ask you for the following secure information to login:
Three digits from your four digit online PIN (in a random order, like second, first, fourth).
Three characters from your password, again a random selection in a random order.
While it initally irritated me that logging on to the system took a little more thought than normal (I have a long password and it's easier to type it out in full than work out what the eighth, fifth, and eleventh characters are), it's probably a much more secure system when people are going to be using public terminals.
It also makes people less liable to some sort of 'sniffer' attack, since the system dictates which characters to ask for and locks you out after several incorrect attempts. It would probably require somebody to observe more than one login session before they had enough information to do repeat it themselves, and unless you know which order the characters and PIN were requested, a plain keyboard capture program would be ineffective.
More info on this case (Score:5, Informative)
And what have we learned? (Score:3, Insightful)
The corallary to this maxim is to make sure that the password of an account that you access from a public terminal is different from any password that you access from a non-public terminal. Then again, the truly paranoid have different password anyway....
Keyboard Loggers... (Score:5, Informative)
Re:Keyboard Loggers... (Score:2)
Bring your own OS? (Score:5, Insightful)
Now, obviously, that didn't work (they were big, slow, and buggy). But today it should be even easier, almost trivial, to do something. Just bring a Knoppix CD with you whenever you go to a public access sytem (assuming they don't lock down the CD-ROM drive). If you can fit it on a business card CD, you can even keep it in your wallet.
They could even do this at the system-provider level -- have branded, mass-produced, customized versions of Knoppix in each machine, and encourage people to check the CD and reboot before they use it. Of course, this wouldn't work as well with the systems intended for graphic editing, etc. (with AI, Photoshop, etc.), but for simple internet access systems, it'd be pretty good...
Re:Bring your own OS? (Score:2, Insightful)
Here's a tip. If you have to use a kinkos to print something [e.g. massive quantity] just burn a copy to a CD [or put it on a floppy disk] and bring it with you instead remotely logging into something to fetch it.
Tom
Ham the can man? Troll.
What about hardware loggers? (Score:5, Informative)
Re:Bring your own OS? (Score:2, Informative)
Re:Bring your own OS? (Score:3, Informative)
Won't help you against hardware loggers.
Do you really check that the keyboard cable plugs directly into the keyboard socket on the motherboard on each public machine that you use?
South African users get nailed (Score:2, Informative)
we can be reassured.... (Score:4, Funny)
They obviously really understand security...
note (for the humour-impaired) : this is irony
Re:we can be reassured.... (Score:3, Interesting)
irony
2 a : the use of words to express something other than and especially the opposite of the literal meaning
sarcasm : 2 a : a mode of satirical wit depending for its effect on bitter, caustic, and often ironic language that is usually directed against an individual
according to : http://humanities.byu.edu/rhetoric/Figures/I/iron y
irony : Speaking in such a way as to imply the contrary of what one says, often for the purpose of derision, mockery, or jest.
http://humanities.byu.ed
One time passwords? (Score:5, Informative)
OP is wrong (Score:5, Informative)
No, the article does not mention that. The article says that Jiang used a keylogged password to gain access to someone's home machine via GoToMyPC. He then took control of the machine and used it to open a bank account. Similar, but wrong enough to warrant correcting.
Well, I guess if the OPs aren't going to read the articles they submit, and the editors aren't going to read the articles they post, why should the rest of us read the articles we comment on? Let's just have one massive offtoipc flame-fest! Yay!
Why can't more public terminals just use Ghost? (Score:3, Informative)
easy everything solution (Score:5, Interesting)
last time i went to an easyeverything cybercafe i noticed that on logout the pc would reboot and re-install a fresh image of the whole os on the disk. I think it got the image from the network but i can't recall what soft they used to do it (it had a strange name)...
Of course it takes some more time on rush hour (like 10-20mn) but they have lots of pc so ...
and also, too bad for installing key loggers then ..
Re:easy everything solution (Score:4, Informative)
From a Kinko's employee (Score:5, Interesting)
You really would be shocked to see the kind of stuff people leave behind on the hard disks and in the copy machines. At least a dozen I.D. cards, birth certificates, credit cards, confidential company files, etc.. are left every day.
Just yesterday a customer came in and asked if we'd found her credit card. She said she'd left it in the copy machine a week ago and just noticed it gone. We couldn't find it and told her she'd probably wanna go ahead and cancel the damn thing. She replied, "nahh... too much trouble.. it'll turn up someplace".
What a world.
Kinko's Security (Score:5, Insightful)
1. Windows 2000 with the user logged in as poweruser or administrator.
2. Pop up software installed (unknown spyware).
3. I could not find a USB port so I stood up and moved the PC and plugged in in the back. No comment from staff.
The only "security" I saw was protecting the billing app.
SD
solution: one-time passwords (Score:3, Informative)
A more sophisticated version are challenge-response systems or time-based systems like SecurID, but they require extra hardware and don't give you any extra security.
S/Key OTP (Score:4, Interesting)
Don't use Kinko's machines... use your own! (Score:4, Interesting)
In a Kinko's that doesn't have laptop stations? You can usually unhook the ethernet cable from one of their pay-for-use machines and use the connection yourself for no charge, as long as it's not busy.
Why would anyone bother? Well, it's a (relatively) fast connection, and an IP address no one can trace back to you because you didn't pay for it and all the cameras at Kinko's (last time I checked) are pointed at the registers rather than the computers.
I'd think the warez/Kazaa/terrorist crowds would find that plenty useful.
Re:risky business (Score:3, Insightful)
Still, everyone is perfectly entitled to judge the risk themselves and do what they want. I'm intrigued though - do you drive? smoke? drink? have sex? Those things are much more likely to cause problems (and they can be much more serious problems) than online banking. Do you exercise the same level of caution t
Re:risky business (Score:2)
well, anyone using a public terminal to do online banking should know they're taking a huge risk anyway.
To add to the other replies...do you ever pay with a credit card (especially in a restuarant)? Do you follow the clerk around to be sure they don't copy your numbers? Do you keep your bank records in a safe at home? Do you only use cash?
Doing your online banking from a public terminal is pretty stoopid. But being afraid of doing it at home (especially if you know computers and have a relatively s
Re:Duh (Score:2)
Nice try ate the Windows bashing, but you'll have to be more creative than that.