Stories
Slash Boxes
Comments

SoylentNews is people

posted by n1 on Tuesday July 15 2014, @09:25PM   Printer-friendly
from the security-was-always-an-illusion dept.

Ars Technica reports:

The US Secret Service is warning hotel operators to be on the lookout for malware that steals passwords and other sensitive data from guests using PCs in business centers, according to a published report.

The non-public advisory was issued on last Thursday, KrebsOnSecurity reporter Brian Krebs reported Monday. Krebs said the notice warned that authorities recently arrested suspects who infected computers at several major hotel business centers around Dallas. In that case, crooks using stolen credit card data to register as hotel guests used business center computers to access Gmail accounts. From there, they downloaded and installed keylogging software. The malware then surreptitiously captured login credentials for banking and other online services accessed by guests who later used the compromised PCs.

The report is a poignant reminder why it's rarely a good idea to use public PCs for anything more than casual browsing of websites. Even when PCs are within eyesight of a business center employee, librarian, or other supervisor, and even when it is locked down with limited "guest" privileges, there are usually a host of ways attackers can compromise machines running either Windows or Mac OS X.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Insightful) by Grishnakh on Tuesday July 15 2014, @09:30PM

    by Grishnakh (2831) on Tuesday July 15 2014, @09:30PM (#69449)

    Maybe if these chains used a locked-down Linux distro with Firefox's privacy mode forced on and a guest account which doesn't store any data, they wouldn't have these problems.

    • (Score: 3, Informative) by Nerdfest on Tuesday July 15 2014, @09:33PM

      by Nerdfest (80) on Tuesday July 15 2014, @09:33PM (#69450)

      No, even this won't necessarily help. There are also hardware keyloggers that you can just plug into a port on the back of the machine. Using a live Linux boot is certainly better than using a "business centre" computer though. Your best bet is using your own laptop or tablet (although tablets likely won't be able to do all tasks).

      • (Score: 2) by Tramii on Tuesday July 15 2014, @10:24PM

        by Tramii (920) on Tuesday July 15 2014, @10:24PM (#69469)

        Simple solution: Seal up all the USB / Serial ports with a hot glue gun!

      • (Score: 1) by Buck Feta on Tuesday July 15 2014, @11:56PM

        by Buck Feta (958) on Tuesday July 15 2014, @11:56PM (#69496) Journal

        > Your best bet is using your own laptop

        That has always been my strategy, although I'm unconvinced that it's terribly safe either. What say you, my fellow Soylents? Safe, safe enough, or not so safe?

        --
        - fractious political commentary goes here -
        • (Score: 2, Informative) by dr_barnowl on Wednesday July 16 2014, @10:10AM

          by dr_barnowl (1568) on Wednesday July 16 2014, @10:10AM (#69694)

          I tend to tunnel all my traffic in hotels through a VPN of one kind or another. I don't trust their network infrastructure not to be evil. And I'd never use their hardware for anything demanding security.

    • (Score: 2) by PinkyGigglebrain on Tuesday July 15 2014, @09:38PM

      by PinkyGigglebrain (4458) on Tuesday July 15 2014, @09:38PM (#69452)

      Or at least a VM that would be reloaded from a read only image when a new user logged in. Simplify patching too.

      Now a VM running a locked down Linux distro, that would be even better.

      --
      "Beware those who would deny you Knowledge, For in their hearts they dream themselves your Master."
      • (Score: 1) by cyrano on Tuesday July 15 2014, @09:46PM

        by cyrano (1034) on Tuesday July 15 2014, @09:46PM (#69458) Homepage

        I'd think that was obvious. Lots of software around to do that. But, apparently, being sloppy is still standard. Wonder if they'll allow you to run wireshark or nessus from their "business" PC's. Ah, well, their wireless probably isn't private either?

        --
        The quieter you become, the more you are able to hear. - Kali [kali.org]
  • (Score: 2) by Kilo110 on Tuesday July 15 2014, @09:47PM

    by Kilo110 (2853) on Tuesday July 15 2014, @09:47PM (#69459)

    I remember my old library had computers back in the day that would revert to a fresh state every time they were restarted. This would prevent the computers from getting too cluttered up and would also prevent any nasty bits of code. I don't see why all public terminals don't use this approach.

    • (Score: 3, Insightful) by frojack on Tuesday July 15 2014, @10:03PM

      by frojack (1554) Subscriber Badge on Tuesday July 15 2014, @10:03PM (#69464) Journal

      Probably because it didn't work that well, and still didn't prevent key-loggers.

      --
      No, you are mistaken. I've always had this sig.
      • (Score: 2) by Kilo110 on Tuesday July 15 2014, @10:11PM

        by Kilo110 (2853) on Tuesday July 15 2014, @10:11PM (#69466)

        Well I'm picturing a hypervisor that loads a windows vm that discards changes to the hdd image. I know vmware has that ability, I'm sure others do as well.

        • (Score: 2) by frojack on Wednesday July 16 2014, @06:27AM

          by frojack (1554) Subscriber Badge on Wednesday July 16 2014, @06:27AM (#69633) Journal

          Yes, I understand the principal.
          But that shady character working at the front desk plugged a little shim device into the keyboard slot, and then plugged the keyboard into that, and its recording everything you type. Logins, passwords, account numbers, etc.

          --
          No, you are mistaken. I've always had this sig.
          • (Score: 2) by maxwell demon on Wednesday July 16 2014, @06:38AM

            by maxwell demon (1608) Subscriber Badge on Wednesday July 16 2014, @06:38AM (#69636) Journal

            Are there still computers where the keyboard is an integrated part (like those old home computers)? That would at least make it impossible to put anything in between keyboard and computer without opening the computer (which would probably not be as easy to perform without being noticed).

            On the other hand, even the most secure computer setup would not prevent a hidden camera pointed at the keyboard. Indeed, if there's a dedicated place to put your laptop on (that is a fixed table with chair and connectors which would be the place where you'd most likely put your laptop), even using your own laptop would not help against that type of attack.

            (And BTW, it's "principle", not "principal".)

            --
            The Tao of math: The numbers you can count are not the real numbers.
          • (Score: 2) by aristarchus on Wednesday July 16 2014, @08:39AM

            by aristarchus (2645) on Wednesday July 16 2014, @08:39AM (#69669) Journal

            Yes, I understand the Principal as well. But was it not the Principle that was in question? Merci beaucoups if not.

    • (Score: 2) by Alfred on Tuesday July 15 2014, @10:11PM

      by Alfred (4006) on Tuesday July 15 2014, @10:11PM (#69467) Journal

      Saw that in college. They had some bit of hardware effectively doing a man in the middle with the HD. Because of this the computers were really unlocked and loose on the software side. I could walk up to a machine download and install something like kazaa (this is way back) and let it get stuff for me on the fast university connection since at home I only had dial up. And of course the reboot erased all local evidence.

      • (Score: 2) by Tramii on Tuesday July 15 2014, @10:33PM

        by Tramii (920) on Tuesday July 15 2014, @10:33PM (#69471)

        I used to work in one of the computer labs (many, many years ago) while I was attending college, and they had a similar setup. Every time you rebooted a computer, it would completely restore the local HD image. However, they were all connected to various network drives which did NOT get wiped. So we would keep the install files for games like Warcraft and Doom II in a hidden directory. So we would just install whatever game we wanted to play at the time, and then rebooted when we were done. Was able to play networked games for years and no one else every caught on.

  • (Score: 2) by c0lo on Tuesday July 15 2014, @09:55PM

    by c0lo (156) on Tuesday July 15 2014, @09:55PM (#69460) Journal
    Because using my own USB-bootable live OS [boum.org] is hard to intercept by the US SS brigades?
    --
    https://www.youtube.com/watch?v=aoFiw2jMy-0
  • (Score: 2) by DECbot on Tuesday July 15 2014, @11:29PM

    by DECbot (832) on Tuesday July 15 2014, @11:29PM (#69485) Journal

    Used condoms may still not be safe. Perhaps the headline should be, "Secret Service Just Figures Out Hotel PCs Aren't Safe." (No we weren't downloading porn from untrusted sites, that malware was there before we got here, just like those hookers in our hotel rooms.) Was there ever a time when hotel PCs could be trusted?

    --
    cats~$ sudo chown -R us /home/base
    • (Score: 1) by anubi on Wednesday July 16 2014, @12:59AM

      by anubi (2828) on Wednesday July 16 2014, @12:59AM (#69519) Journal

      As far as I am concerned, just use it to obtain status. I have no business accessing secure stuff from insecure terminals. And - heavens no - do not engage in anything that requires a logon or a payment of any sort. Maps? fine. Obtain inventory/pricing info? fine. Pirating a music? fine. Even paying a "micropayment" for a read of a news article... NOT! You cannot leave anything identifiable to you or use any codes which authenticate you. This is the one thing to me that hampers internet marketing the most... lack of trust. And our TLA's aren't helping that image one bit. ( Neither is LifeLock, who runs ads showing how a little info in the wrong hands will wreck your life instead of how the person who didn't do due vigilance and make sure the transaction was valid had to eat it.)

      You might as well assume any time you are using public internet, its gonna be worse than eating a sandwich you found in the bathroom, with absolutely no accountability for who or what prepared it, or if it has been tampered with, and worse yet, make the assumption while you are at it that it is far more likely to have been tampered with than that hypothetical sandwich you found.

      What you do have going for you is that you most likely will not get sick if you stick to the sealed items in the package, but stuff like honoring scripts can really ruin your day.

      --
      "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]
  • (Score: 2) by prospectacle on Wednesday July 16 2014, @05:55AM

    by prospectacle (3422) on Wednesday July 16 2014, @05:55AM (#69617) Journal

    It seems like a good general guideline to follow.

    Where do you draw the line though? On the one hand, using a hotel computer, with windows on it, to do internet banking, seems fairly incautious.

    On the other hand using an ATM at a service station is still essentially putting your password into a stranger's computer.

    Sometime in the next century or so we should really stop and consider how to make a secure and trustworthy internet.

    --
    If a plan isn't flexible it isn't realistic