EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

11.08.09

Windows Back Doors Spin Out of Control, End up in Black Market

Posted in Microsoft, Security, Windows at 9:18 pm by Dr. Roy Schestowitz

Everyone is a forensic expert now

Tank

Summary: Free access for everybody; Microsoft’s back-door keys are now available for everyone to download and new issues about Windows security raise serious questions about liability

Credit goes to Bruce Schneier, who warned about this when it was first introduced publicly. He predicted exactly what would happen with Microsoft's back doors (also learn about CIPAV), which it foolishly believed it could keep under exclusive police control. According to this from Gizmodo:

Apparently Microsoft’s COFEE software that helps law enforcement grab data from password protected or encrypted sources is leaking all over the internet. So not only can you steal the software, but break the law by using it too.

More here:

Siren.gif: Microsoft COFEE law enforcement tool leaks all over the Internet~!

[..]

It was one of the most sought after applications on the Internet until it was leaked earlier today. And now that it’s out there—and it is all over the place, easily findable by anyone able to use a search engine—we can all move on with our lives. Yes, Microsoft COFEE, the law enforcement tool that mystified so many of us (including Gizmodo~! and Ars Technica~!), is now available to download. If only there were a “bay” of some sort where, I don’t know, pirates hang out…

Law does not directly interfere with behaviour, so mere threats against COFEE downloaders will not undo the damage which is coming.

The amusing thing is that Robert Scoble mocked me for writing about this back in 2006 when it was secret. Being a Microsoft evangelist (lead AstroTurfer), it was probably his duty to deny the existence of such back doors, which are now available for access by anyone who is interested and determined enough to find the trap door binaries.

The police is said to be carrying the software on USB drives, so how inevitable was such a leak really? It’s a stupid idea to begin with, just like AutoRun, which was removed by Microsoft for doing more harm than good (infection upon insertion). That was Microsoft’s admission of failure with its security approach and the Washington Post has a whole new article about it:

What Windows Autorun Has Wrought

[...]

A new report by Microsoft shows that the two most prevalent threats to Windows PCs in the first half of 2009 were malicious programs that have been aided mightily in their spread by a decision by Microsoft to allow the contents of removable media — such as USB thumb drives — to load automatically when inserted into Windows machines.

In its latest “Security Intelligence Report,” Microsoft counted the number of threats detected by its anti-malware desktop products, and found that the Conficker worm, along with a Trojan horse program called Taterf which steals passwords and license keys for popular computer games, were detected on 5.21 million and 4.91 million Windows computers, respectively.

NASA’s operations in space were affected by this (computer viruses passing via USB drives in Windows, maybe with AutoRun doing its magic). It’s even too much for the FBI. Free Software Magazine now asks: “Are Microsoft to blame for ‘hidden’ malware costs and will Windows 7 make any difference?”

A couple of stories have hit the headlines this year concerning the huge cost that some UK Local Governments incurred when dealing with malware attack on their Windows machines. If you missed them, Manchester City Council had a single USB infected with the infamous Conficker worm and it cost them — brace yourself — £1.5m ($2.4m) of which £1.2m (US$1.9m) was spent on IT, of which a staggering £600,000 (US$980k) went on consultancy fees including money to Microsoft. A while later, Ealing Borough Council were hit with a cost of £500000 (about US$ 800k) when they were also hit by a single USB stick containing conficker. Some in the industry tweeted and blogged this as being a “hidden cost of using Microsoft Windows”. In the ensuing discussion, many pointed out that the high cost was really due to the lack of a proper patching and disaster recovery policy at the council. So which is right? Is dealing with malware a hidden cost of using Windows or of a poor IT strategy?

[...]

Regardless of your software choice, a poor patching policy is a very bad idea if you value system integrity. But if you going to argue your case on TCO, Microsoft, don’t then try to dodge talk of the additional costs for maintaining, patching and clearing a Windows-based system.

To answer the main question, Vista 7 will make no difference. It is just as insecure as predecessors (one might say it is even less secure). Evidence includes:

  1. Cybercrime Rises and Vista 7 is Already Open to Hijackers
  2. Vista 7: Broken Apart Before Arrival
  3. Department of Homeland Security ‘Poisoned’ by Microsoft; Vista 7 is Open to Hijackers Again
  4. Vista 7 Security “Cannot be Fixed. It’s a Design Problem.”
  5. Why Vista 7 Could be the Least Secure Operating System Ever
  6. Journalists Suggest Banning Windows, Maybe Suing Microsoft Over DDoS Attacks
  7. Vista 7 Vulnerable to Latest “Critical” Flaws
  8. Vista 7 Seemingly Affected by Several More “Critical” Flaws This Month
  9. Reason #1 to Avoid Vista 7: Insecurity
  10. Vista 7 Left Hijackable Again (Almost a Monthly Recurrence)

To address the question of liability, here we have a collection of external references. Some journalists say that Microsoft should be held accountable for these damages.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

7 Comments

  1. Yuhong Bao said,

    November 9, 2009 at 12:24 am

    Gravatar

    Well, does COFEE really use any Windows backdoors? Has anyone disassembled or even used the software to see if it does.

    your_friend Reply:

    We shall see, but there’s no denying that Windows is backdoored. Schneier said, “it’s certainly not a back door, as TechDirt claims.” To his discredit, he offered no explanation of how encrypted data can be so easily cracked without the underlying encryption being intentionally weak or compromised, aka “backdoored.” It would also have been rash of him to dismiss the possibility of COFEE installing even more malicious software on the victim’s computer but it is not clear he meant that. Those interested will learn exactly what’s on the device, if the leaked version is not itself a trojan or missdirection. Schneier predicted something would get out because no one can share a secret it with hundreds of minimally trained staff and expect it to remain a secret. Eventually, he will be right.

    Jose_X Reply:

    Yes, Microsoft software’s weak security and Microsoft’s delays in fixing security problems or not addressing the underlying causes is effectively their support of backdoors while attempting to maintain Plausible Deniability http://en.wikipedia.org/wiki/Plausible_deniability .

    From the user’s pov there are many backdoors inside Microsoft software and many third parties exploiting these every day (Windows malware). Which of these backdoors are intentional to exploit the user or intentional to facilitate “justified remote overrides” and which are bugs is not that important if the goal is for the owner of the box and the data to avoid compromises and violations of privacy, period.

    OTOH, I think Microsoft _might_ lay claim over ownership to a lot of software and data created by their software. In this case, the accurate question would be, why use “their software to create their data” instead of using open source software (“your” software) to create your data?

    Since all software essentially has bugs, the choice between Microsoft software and open source software becomes one of degree. How easily can you be compromised when you use each system. And whom do you trust: a particular for-profit company with a dirty past or the public and yourself (who have access to open source)? I trust the public to take care of itself more than I trust Microsoft to take care of all of us.

    Roy Schestowitz Reply:

    There have been cases where Microsoft (and more infamously Yahoo!) collaborated with governments to suppress free speech.

    Yuhong Bao Reply:

    “Yes, Microsoft software’s weak security and Microsoft’s delays in fixing security problems or not addressing the underlying causes is effectively their support of backdoors”
    I don’t think so, but yes there is indeed an industry where 0-day security bugs are sold as “happy packs” instead of reported to the vendor:
    http://reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1
    http://reversemode.com/index.php?option=com_content&task=view&id=58&Itemid=1
    It is not MS’s fault, though, and it is not even limited to MS code security bugs either.
    “Since all software essentially has bugs, the choice between Microsoft software and open source software becomes one of degree. How easily can you be compromised when you use each system. And whom do you trust: a particular for-profit company with a dirty past or the public and yourself (who have access to open source)? I trust the public to take care of itself more than I trust Microsoft to take care of all of us.”
    AFRIK, open source projects do vary in how they handle security bugs, the worst is this case:
    http://www.coresecurity.com/content/open-bsd-advisorie
    But, yes, open source do make it better.

    Yuhong Bao Reply:

    Well, live data capture would make a BitLocker backdoor unnecessary, and that is indeed how MS claims COFFE works:
    From http://government.zdnet.com/?p=3781:
    “While COFEE doesn’t break BitLocker or open a back door, it captures live data on the computer, which is why it’s important for agents not to shut down the computer first, Fung said. A law enforcement agent connects the USB drive to a computer at the scene of a crime and it takes a snapshot of important information on the computer. It can save information such as what user was logged on and for how long and what files were running at that time, Fung said. It can be used on a computer using any type of encryption software, not just BitLocker. Previously, an officer might spend three or four hours digging up the information manually, but COFEE lets them do it in about 20 minutes, he said.”

  2. uberVU - social comments said,

    November 9, 2009 at 5:07 am

    Social comments and analytics for this post…

    This post was mentioned on Twitter by Gumblar: Blog: Windows Back Doors Spin Out of Control, End up in Black Market … http://bit.ly/3BEV9q

What Else is New


  1. Intellectual Discovery and Microsoft Feed Patent Trolls Like Intellectual Ventures Which Then Strategically Attack Rivals

    Like a swarm of blood-sucking bats, patent trolls prey on affluent companies that derive their wealth from GNU/Linux and freedom-respecting software (Free/libre software)



  2. The European Patent Office Has Just Killed a Cat (or Skinned a 'Kat')

    The EPO’s attack on the media, including us, resulted in a stream of misinformation and puff pieces about the EPO and UPC, putting at risk not just European democracy but also corrupting the European press



  3. Yann Ménière Resorts to Buzzwords to Recklessly Promote Floods of Patents, Dooming the EPO Amid Decline in Patent Applications

    Battistelli's French Chief Economist is not much of an economist but a patent maximalist toeing the party line of Monsieur Battistelli (lots of easy grants and litigation galore, for UPC hopefuls)



  4. Even Patent Bullies Like Microsoft and Facebook Find the Patent Trial and Appeal Board (PTAB) Useful

    Not just companies accused of patent infringement need the PTAB but also frequent accusers with deep pockets need the PTAB, based on some new figures and new developments



  5. Links 21/4/2017: Qt Creator 4.2.2, ROSA Desktop Fresh R9

    Links for the day



  6. At the EPO, Seeding of Puff Piece in the Press/Academia Sometimes Transparent Enough to View

    The EPO‘s PR team likes to 'spam' journalists and others (for PR) and sometimes does this publicly, as the tweets below show — a desperate recruitment and reputation laundering drive



  7. Affordable and Sophisticated Mobile Devices Are Kept Away by Patent Trolls and Aggressors That Tax Everything

    The war against commoditisation of mobile computing has turned a potentially thriving market with fast innovation rates into a war zone full of patent trolls (sometimes suing at the behest of large companies that hand them patents for this purpose)



  8. In Spite of Lobbying and Endless Attempts by the Patent Microcosm, US Supreme Court Won't Consider Any Software Patent Cases Anymore (in the Foreseeable Future)

    Lobbyists of software patents, i.e. proponents of endless litigation and patent trolls, are attempting to convince the US Supreme Court (SCOTUS) to have another look at abstract patents and reconsider its position on cases like Alice Corp. v CLS Bank International



  9. Expect Team UPC to Remain in Deep Denial About the Unitary Patent/Unified Court (UPC) Having No Prospects

    The prevailing denial that the UPC is effectively dead, courtesy of sites and blogs whose writers stood to profit from the UPC



  10. EPO in 2017: Erroneously Grant a Lot of Patents in Bulk or Get Sacked

    Quality of patent examination is being abandoned at the EPO and those who disobey or refuse to play along are being fired (or asked to resign to avoid forced resignations which would stain their record)



  11. Links 21/4/2017: System76 Entering Phase Three, KDE Applications 17.04, Elive 2.9.0 Beta

    Links for the day



  12. Bristows-Run IP Kat Continues to Spread Lies to Promote the Unitary Patent (UPC) and Advance the EPO Management's Agenda

    An eclectic response to some of the misleading if not villainous responses to the UPC's death knell in the UK, as well as other noteworthy observations about think tanks and misinformation whose purpose is to warp the patent system so that it serves law firms, for the most part at the expense of science and technology



  13. Links 20/4/2017: Tor Browser 6.5.2, PacketFence 7.0, New Firefox and Chrome

    Links for the day



  14. Patents on Business Methods and Software Are Collapsing, But the Patent Microcosm is Working Hard to Change That

    The never-ending battle over patent law, where those who are in the business of patents push for endless patenting, is still ongoing and resistance/opposition is needed from those who actually produce things (other than litigation) or else they will be perpetually taxed by parasites



  15. IAM, the Patent Trolls' Voice, is Trying to Deny There is a Growing Trolling Problem in Europe

    IAM Media (the EPO's and trolls' mouthpiece) continues a rather disturbing pattern of propaganda dressed up as "news", promoting the agenda of parasites who drain the economy by extortion of legitimate (producing) companies



  16. The Patent Microcosm Keeps Attacking Every Patent Office/System That is Doing the Right Thing

    Patent 'radicals' and 'extremists' -- those to whom patents are needed solely for the purpose of profit from bureaucracy -- fight hard against patent quality and in the process they harm everyone, including individual customers



  17. Another Final Nail in the UPC Coffin: UK General Election

    Ratification of the UPC in the UK can drag on for several more years and never be done thereafter, throwing into uncertainty the whole UPC (EU-wide) as we know it



  18. Links 19/4/2017: DockerCon Coverage, Ubuntu Switching to Wayland

    Links for the day



  19. Links 18/4/2017: Mesa 17.0.4, FFmpeg 3.3

    Links for the day



  20. Patents Roundup: Microsoft, Embargo, Tax Evasion, Surveillance, and Censorship

    An excess of patents and their overutilisation for purposes other than innovation (or dissemination of knowledge) means that society has much to lose, sometimes more than there is to gain



  21. How I Learned that Skype is a Spy Campaign (My Personal Story) -- by Yuval Levental

    Skype is now tracking serial numbers, too



  22. Links 17/4/2017: Devil Linux 1.8.0, GNU IceCat 52.0.2

    Links for the day



  23. EPO Patent Quality and Quality of Service Have Become a Disaster, Say EPO Stakeholders

    Stakeholders of the EPO, in various sites that attract them, are complaining about the service of the EPO, the declining quality of patents (and the rushed processes), including the fact that Battistelli's blind obsession with so-called 'production' dooms the already-up-in-flames EPO and makes it uncompetitive



  24. IAM is a Think Tank for Patent Trolls, Software Patents, the EPO, Microsoft, and Whoever Else is Willing to Pay

    The site where you get what you pay for continues to promote highly damaging agenda, which threatens to disrupt operations at a lot of legitimate companies that employ technical people



  25. An Australian Patent Troll, Global Equity Management (SA) Pty Ltd (GEMSA), is a Bully Not Just in the Patent Sense, Explains the EFF

    The mischievous troll GEMSA, which doesn't seem to get enough out of bullying real companies, is now attacking a civil rights group's free speech rights



  26. Alice Decision and PTAB Are Both Constantly Under Attack From the Patent Microcosm and Its Lobbyists

    A Supreme Court (SCOTUS) decision against software patents, combined with a chopping block of software patents (whose efficiency is still increasing), is causing trolls and their facilitators (like patent law firms) to resort to dirty tricks and attempt to reshape the system to better suit them, averting irrelevancy



  27. Apple's Legal Actions Against Android and Against Qualcomm Could Eventually Weaken Patents at Two Levels

    By tackling the practices of Qualcomm and by dragging companies to court over ridiculous design patents (potential of blanket ban by the Supreme Court) Apple weakens the very business model it will need to rely on as its market diminishes, leaving it with nothing but patents



  28. IRC Proceedings: March 12th, 2017 – April 8th, 2017

    Many IRC logs



  29. IRC Proceedings: February 12th, 2017 – March 11th, 2017

    Many IRC logs



  30. IRC Proceedings: January 15th, 2017 – February 11th, 2017

    Many IRC logs


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts