By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Several Critical Vulnerabilities Patched in AI ChatBot Plugin for WordPress
    Several Critical Vulnerabilities Patched in AI ChatBot Plugin for WordPress
    2 months ago
    High Severity File Upload Vulnerability in Elementor Patched
    High Severity File Upload Vulnerability in Elementor Patched
    23 hours ago
    2016 Stat: 75% of ransomware comes from Russian-speaking criminal underground
    1 year ago
    Latest News
    Is macOS as secure as its users think?
    21 hours ago
    High Severity File Upload Vulnerability in Elementor Patched
    23 hours ago
    Letters with Remcos RAT hosted in Discord
    2 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (November 27, 2023 to December 3, 2023)
    2 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Google fixed a 0-day vulnerability in Chrome
    1 year ago
    How to check your PC’s UEFI version on Windows 11
    1 year ago
    How to reset WSL Linux distro on Windows 11
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    ML Ops Platform at Cloudflare
    ML Ops Platform at Cloudflare
    2 days ago
    La nouvelle décision en matière de droit d’auteur en Allemagne rejette le blocage par le biais des résolveurs DNS mondiaux
    La nouvelle décision en matière de droit d’auteur en Allemagne rejette le blocage par le biais des résolveurs DNS mondiaux
    3 days ago
    How we used OpenBMC to support AI inference on GPUs around the world
    How we used OpenBMC to support AI inference on GPUs around the world
    3 days ago
    Latest copyright decision in Germany rejects blocking through global DNS resolvers
    Latest copyright decision in Germany rejects blocking through global DNS resolvers
    4 days ago
    Restricted Settings in Android 13 and 14
    4 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    Download tiktok without watermark
    1 year ago
    Checking a suspicious file for viruses
    1 year ago
    Apple keeps a map of your most visited locations
    1 year ago
    Latest News
    How to check GPU temp on Windows 11
    1 day ago
    How to disable Defender Antivirus permanently on Windows 11
    2 days ago
    How to check CPU temp on Windows 11
    4 days ago
    How to disable news feed from Widgets on Windows 11
    5 days ago
  • Glossary
  • My Bookmarks
Reading: Small hacks: Free coffee, spying taxis, and a vulnerable airport
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Threats

Small hacks: Free coffee, spying taxis, and a vulnerable airport

Tom Grant
Last updated: 7 October
Tom Grant 1 year ago
Share
5 Min Read

News websites often feature stories about computer errors and vulnerabilities used to perpetrate sophisticated large-scale incidents like last year’s WannaCry and NotPetya attacks. But experts know that most successful hacks and cracks are the result of very basic blunders by system developers or installers.

Contents
Free coffeeUber-style trackingAirport (in)security

Incorrectly configured systems are everywhere, and only a few hours separate the moment when a hacker first sniffs out such a system and its total surrender to the human intellect. Speaking at the Security Analyst Summit 2018, Israeli researcher Inbar Raz gave a host of examples confirming this sad fact.

Free coffee

Many coffee shop loyalty cards work as follows: the customer receives a card, tops it up like a bank card, and then uses it to pay in the café, earning bonuses for large or frequent purchases. The customer can check the balance on the coffee chain’s website by entering the card number.

Having got hold of such a card for himself, Inbar Raz noted that the website lets users check cards with any number as many times as they like. So, using a tiny program that took him half an hour to write, Raz went through a bunch of different card numbers and identified ones that were topped up with plenty of cash.

Next, after reading the magnetic strip of his card with a cheap USB reader, Raz found that the number had been written to the card in unencrypted form, and the only security was a control bit that was quite easy to compute. The task of replacing the number on the card’s mag stripe with one of the numbers found in the previous step and using someone else’s funds was child’s play.

Ethically minded, Raz proved the concept in practice by buying another card, topping it up, and writing its number to the first card. It worked. In theory, an eagle-eyed café employee could still spot the deception by comparing the number printed on the card with the one on the receipt. But in practice, that ain’t gonna happen. So, it’s basically unlimited free coffee for the hacker — and perhaps a muffin for good measure.

Uber-style tracking

A while back, Uber was hit by a scandal involving claims that employees had misused the mobile app to track high-profile passengers.

It turns out that other taxi services let you do it without the hassle of having to work for them. Inbar Raz discovered that when a taxi is booked online, its status can be tracked using the contact phone number — and as in the free coffee case, there is no protection against brute-force searches.

He wrote a small number-busting program and ended up with a handy map indicating the addresses of all recent taxi orders for this service.

Airport (in)security

Standard free Wi-Fi sometimes harbors hidden surprises. In the business lounge of one East European airport, Inbar Raz decided to check out the configuration of the local access point.

The router settings, he found, could be opened at the standard Web address with no need for an administrator password. Having studied the settings, Raz realized it wasn’t simply a guest access point, but the airport’s main router with vital dispatch and security systems hooked up to it. These services could be disabled by anyone with a laptop or even a smartphone.

Programmers and system administrators, take heed. Don’t assume that your little café (or taxi service, or airport) is too niche for hackers. Standard settings, simple passwords like “admin” or “12345,” and no CAPTCHA or other measures against automated attacks are the most common security faux pas, and the simplest way in for intruders. Even lowly hackers can exploit them. And guys like Inbar Raz — people who responsibly disclose vulnerabilities to you instead of exploiting them for their own profit — are few and far between.


Source: kaspersky.com

Translate this article

TAGGED: Authentication, Security, Threats, Vulnerabilities
Tom Grant October 7, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Is macOS as secure as its users think?
Threats 24 hours ago
High Severity File Upload Vulnerability in Elementor Patched
High Severity File Upload Vulnerability in Elementor Patched
Wordpress Threats 1 day ago
How to check GPU temp on Windows 11
News 1 day ago
ML Ops Platform at Cloudflare
ML Ops Platform at Cloudflare
Apps 2 days ago
Letters with Remcos RAT hosted in Discord
Threats 2 days ago

You Might Also Like

Threats

Is macOS as secure as its users think?

24 hours ago
High Severity File Upload Vulnerability in Elementor Patched
Wordpress Threats

High Severity File Upload Vulnerability in Elementor Patched

1 day ago
ML Ops Platform at Cloudflare
Apps

ML Ops Platform at Cloudflare

2 days ago
Threats

Letters with Remcos RAT hosted in Discord

2 days ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Wordfence Intelligence Weekly WordPress Vulnerability Report (November 27, 2023 to December 3, 2023)
Check out The Critical Thinking Podcast
How to disable Defender Antivirus permanently on Windows 11
WordPress 6.4.2 Security Release – Patchstack
La nouvelle décision en matière de droit d’auteur en Allemagne rejette le blocage par le biais des résolveurs DNS mondiaux
How we used OpenBMC to support AI inference on GPUs around the world
Previous Next
Hot News
Is macOS as secure as its users think?
High Severity File Upload Vulnerability in Elementor Patched
How to check GPU temp on Windows 11
ML Ops Platform at Cloudflare
Letters with Remcos RAT hosted in Discord
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?