- Security TWENTY
- Women in Security
Digital kiosks and interactive terminals used in cities can be used for paying for services through to entertainment. An IT security product company’s discovered that a lot of them contain vulnerabilities that can expose private user data and be used to spy or spread malicious code. Besides kiosks, Kaspersky Lab researchers looked at speed cameras used in cities and their supporting infrastructure. As a result, they discovered that malicious users could access these cameras and manipulate the data collected.
Modern cities, the IT firm says, are complicated ecosystems made up of hundreds of components, including digital ones. Aimed towards making life more convenient and safer for citizens, they can also pose a certain degree of threat to people’s data and safety – as illustrated in the findings of the research by Kaspersky.
Ticket terminals in cinemas, bike rental terminals, service kiosks in government buildings, booking and information terminals at airports and passenger infotainment terminals in city taxis may all have a different appearance, but inside, most of them are the same. Each such terminal is a Windows-based or an Android-based device. The main difference in comparison to ordinary devices is the special kiosk-mode software that runs on public terminals and serves as the user interface. This software gives the user access to specific features of the terminal while restricting access to other features of the device’s operating system, including launching a web browser followed by a virtual keyboard.
Accessing these functions provides an attacker with numerous opportunities to compromise the system, as if he was in front of a PC. The research showed that almost any digital public kiosk contains one or multiple security weaknesses which allow an attacker to access hidden features of the OS. In one case, the user interface of the terminal contained a web-link. The attacker only needed to tap on it, to launch the browser and then, through the standard help dialogue, launch a virtual keyboard. In another case – at an e-government service kiosk – the scenario required the user to touch the “print” button. After that, for several seconds, the usual browser’s print dialogue window would be opened and, if quick enough, the attacker would tap the “change” [printing parameters] button to enable him to jump into the help section. From there, they could open the control panel and launch the on-screen keyboard. As a result, the attacker gets all of the devices needed to enter information (the virtual keyboard and the mouse pointer) and can use the computer for their own mercenary purposes, such as to launch malware, get information on printed files, or obtain the device’s administrator password. These are just a few weaknesses discovered by Kaspersky Lab researchers.
Denis Makrushin at Kaspersky Lab said: “Some public terminals we’ve investigated were processing very important information, such as user’s personal data, including credit card numbers and verified contacts (for instance, mobile phone numbers). Many of these terminals are connected with each other and with other networks. For an attacker, they may be a very good surface for very different types of attacks – from simple hooliganism, to sophisticated intrusion into the network of the terminal owner. Moreover, we believe that in the future, public digital kiosks will become more integrated in other city smart infrastructure, as they are a convenient way to interact with multiple services. Before this happens, vendors need to make sure that it is impossible to compromise terminals through the weaknesses we’ve discovered.”
Another part of the research covered cities’ speed control cameras. Using the Shodan search engine, researchers were able to identify multiple IP addresses belonging to such devices which were accessible from the web: no passwords were in use and anyone would be able to see the footage from cameras, and more. Researchers discovered that some tools used to control these cameras are also available to anyone on the web.
Vladimir Dashchenko at Kaspersky Lab said: “In some cities, speed control camera systems track certain lines on the highway – a feature which could be easily turned off. So, if an attacker needs to shut down the system at a certain location for a period of time, they would be able to do that. Considering that these cameras can be, and sometimes are, used for security and law enforcement purposes, it is really easy to imagine how these vulnerabilities can assist in crimes like car theft and others. It is therefore really important to keep such networks protected at least from direct web access.”