Governments are actively spying on peopleâs smartphones. Your carâs infotainment system can now be hacked. And cybercriminals are actively stealing credit card numbers from other cybercriminals.
These were among the uplifting subjects presented at this weekâs Kaspersky Annual Summit in San Juan, P.R. (Kaspersky Labs, the Russian company that holds the conference, requires that presenters take shots of rum after each talk, perhaps to deal with the stress).
One of the scarier presentations was delivered by Ang Cui, a Columbia Ph.D. student, who demonstrated how to spy on calls made with Ciscoâs VoIP phone. Yes, that is the same phone pictured here next to President Obama aboard Air Force One.
In Mr. Cuiâs presentation â" titled âJust because you are paranoid doesnât mean your phone isnât listening to everything you sayâ â" he demonstrated ow to exploit a loophole in the phoneâs kernel, the core of its operating system that manages communication between a deviceâs hardware and software. By doing so, Mr. Cui could spy on the phone remotely, turning it into a listening device. Using Googleâs voice-to-text translation feature, he demonstrated how he could transcribe any call and even search for keywords, like ânuclearâ or âmissile strike.â
âThereâs no defense against this,â Mr. Cui told the audience. âEvery single Cisco phone in the world has this vulnerability.â
Mr. Cui and his adviser, Salvatore J. Stolfo, informed Cisco of the vulnerability last October. Two days later, Cisco confirmed the problem and within a week issued a fix.
But almost immediately, Mr. Cui told Cisco he had found five ways around the patch. Three weeks later, on Nov. 20th, Cisco released a new patch. (Curiously, the patch was not available for download from Ciscoâs Web site. To get it, you had to call Cisco customer su! pport and request the patch by name.)
But once again, Mr. Cui found a way around it. Since then, Cisco seems to have given up, leaving 50 million of its phones vulnerable to spying. (To be fair, Cisco has been busy developing a fix for a serious vulnerability in its widely used Java software - which led to a successful attack at Twitter last week).
Cisco did not immediately respond to requests for comment but in a statement last November said: âWe can confirm that workarounds and a software patch are available to address this vulnerability, and note that successful exploitation requires physical access to the device serial port, or the combination of remote authentication privileges and non-default device settings.â
Mr. Cui said he had been working on his own fix â" with funds from the Defese Advanced Research Projects Agency, or DARPA â" and plans to introduce it at the RSA security conference in San Francisco later this month.