[liberationtech] Tunisian government hacks into gmail and Facebook accounts

Daniel Colascione dan.colascione at gmail.com
Wed Jan 12 16:59:18 PST 2011


This story makes me livid. In this age of inexpensive CPU cycles and fast networks, a company like Facebook has no excuse for not protecting its users with cryptography. If you want to talk about corporate responsibility, *this* is where we start.

On Jan 12, 2011 4:33 PM, Terry Winograd <winograd at cs.stanford.edu> wrote: 

http://www.fastcompany.com/1715575/tunisian-government-hacking-facebook-gmail-anonymous



Tunisian Government Allegedly Hacking Facebook, Gmail Accounts of

Dissidents and Journalists

BY Neal UngerleiderMon Jan 10, 2011



> A strange bit of JavaScript has found its way onto Tunisian Internet users' internet login screens. Some are now in jail in a country known for torture. But they've been adopted by an unlikely ally: Anonymous.



Massive riots and protests have rocked Tunisia this past month. After

a 26-year-old street vendor named Mohammed Bouazizi attempted to kill

himself by self-immolation (he survived and later died of his burns),

hundreds of thousands took to the North African nation's streets. The

protesters complain of unemployment, economic woes, and an omnipresent

dictatorship. Tunisia's government has stumbled upon a new method of

combating the protesters: hacking into their social media accounts.



According to a report by the Committee to Protect Journalists, the

Tunisian government appears to be breaking into the Facebook, Google,

and Yahoo accounts of dissidents and journalists. Hackers with unusual

levels of access to Tunisia's state-control network infrastructure

have managed to gain access to Facebook accounts belonging to

individuals such as journalists Sofiene Chourabi of al-Tariq al-Jadid

(New Path; a newspaper affiliated with the opposition Movement

Ettajdid party) and independent video journalist Haythem El Mekki,

while gaining the passwords of others. Hack targets found that

Facebook groups they founded were deleted, as were pictures of

protests. In CPJ's words, "Their accounts and pictures of recent

protests have been deleted or otherwise compromised.” Blogs hosted on

Blogspot and elsewhere are also being targeted. Here is an excerpt

from a post by Lina Ben Mhenni of the A Tunisian Girl blog:



> Well, I can understand ... No I can't understand that some stupid person has hacked my e-mail then, my Facebook account. This stupid person has also deleted some pages in which I am an administrator. Pages like that of 7ellblog (launch a blog) which has been largely promoted even by official media, the page of the Tunisian singer Amel Mathlouthi, Reading Books is Better than Staring at others (yes they hate reading and culture uin my country), the Tunisian blogosphere, and may be a page against censorship ' la censure nuit à l 'image de mon pays' (I don't have the confirmation yet) and many other pages were deleted. What happened is so shameful because the internet police is again confirming its stupidity and useless stubbornness. Sofiene Chourabi and Azyz Amami are experiencing the same problem now. They have been hacked.



Already, in-depth information is surfacing on how the hacks were

committed. It appears that the Agence tunisienne d'Internet, a

government agency which supervises all of Tunisia's ISPs, or someone

with access to the agency committed them. Tunisian ISPs are running a

Java script that siphons off login credentials from users of Facebook,

Yahoo and Gmail. According to the Tech Herald's Steve Ragan:



> Daniel Crowley, Technical Specialist for Core Security, and Rapid7’s Josh Abraham, broke the code down further. Crowley explained that the JavaScript is customized for each site’s login form. It will pull the username and password, and encode it with a weak crypto algorithm. The newly encrypted data is placed into the URL, and a randomly generated five character key is added. The randomly generated key is meaningless, but it is assumed that it’s there to add a false sense of legitimacy to the URL. The random characters and encrypted user information are delivered in the form of a GET request to a non working URL.



The code only targeted users accessing HTTP sites instead of HTTPS,

which appears to be why Facebook was so heavily ravaged by the hack

plan. Facebook users default to using HTTP to access the site.



Much of this information has been released to the public by the

quasi-4Chan allied Anonymous group, which has launched an

anti-Tunisian government hacker campaign called Operation: Tunisia.



Amamou was taken into police custody this past week after authorities

apparently found his location via Foursquare. His current whereabouts

are unknown.



The Agence tunisienne d'Internet has long been one of the most

censorship-happy government agencies in all of Africa. Tunisia's net

firewalls and intricate IP tracking mechanisms have been compared to

China's, while popular sites like YouTube and DailyMotion were banned

due to hosting videos alleging human rights abuses in Tunisian

prisons. In one of the WikiLeaks cables on Tunisia, an anonymous

diplomat notes endemic government corruption and refers to the

government of President-for-life Zine al-Abidine Ben Ali as a

“quasi-mafia” and a police state.”



While Facebook, Google and Yahoo have not spoken publicly on the

alleged Tunisian government hacking campaign yet, the State Department

has. In a press conference on Friday, January 7, spokesperson Philip

Crowley stated:



> We are concerned about recent reports that Tunisian ISP providers, at the direction of the government, hacked into the accounts of Tunisian users of American companies including Facebook, and providers of email such as Yahoo and Google, and stealing passwords. This kind of interference threatens the ability of civil society to realize the benefits of new technologies. Cyber intrusions of all kinds, including reported attacks on government of Tunisia websites, disrupt the free flow of information and reduce overall confidence in the reliability and security of vital information networks.



During the past week, in addition to Amamou, at least three other

members of Tunisia's hacker and blogger communities were taken into

custody by Tunisian police.





----------------------------------



http://www.thetechherald.com/article.php/201101/6651/Tunisian-government-harvesting-usernames-and-passwords



Tunisian government harvesting usernames and passwords

by Steve Ragan - Jan 4 2011, 20:08





The Tunisian Internet Agency (Agence tunisienne d'Internet or ATI) is

being blamed for the presence of injected JavaScript that captures

usernames and passwords. The code has been discovered on login pages

for Gmail, Yahoo, and Facebook, and said to be the reason for the

recent rash of account hijackings reported by Tunisian protesters.



ATI is run by the Tunisian Ministry of Communications. They supply all

of the privately held Tunisian ISPs, making them the main source of

Internet access in the country. They’ve been under scrutiny for years,

due to the fact that they make use of their authority to regulate the

entire national network. Last April, ATI earned international

attention by blocking access to sites such as Flickr, YouTube, and

Vimeo.



According to Reporters Without Borders, authorities claim to target

only pornographic or terrorist websites. “However, censorship applies

above all to political opposition, independent news, and human rights

websites.”



“When an Internet user attempts to access a prohibited website, the

following automatic error message appears: “Error 404: page not

found,” without displaying the familiar “Error 403” more typical of a

blocked site...This strategy equates to a disguised form of

censorship.”



As for the JavaScript itself, The Tech Herald has seen examples of the

embedded script during live surfing sessions with sources in Tunisia,

and in posted source code made available to the Web. The source for

the GMail injection is here, the Yahoo injection is here, and Facebook

is here.



Four different experts consulted by The Tech Herald independently

confirmed our thoughts; the embedded code is siphoning off login

credentials.



On Twitter, security researcher Gerry Kavanagh and Errata Security CTO

David Maynor told us that you can tell the code is capturing login

information by how it references the login element for the form.



“Suffice to say, the code is definitely doing something

surreptitious,” Kavanagh noted.



Daniel Crowley, Technical Specialist for Core Security, and Rapid7’s

Josh Abraham, broke the code down further. Crowley explained that the

JavaScript is customized for each site’s login form. It will pull the

username and password, and encode it with a weak crypto algorithm.



The newly encrypted data is placed into the URL, and a randomly

generated five character key is added. The randomly generated key is

meaningless, but it is assumed that it’s there to add a false sense of

legitimacy to the URL.



The random characters and encrypted user information are delivered in

the form of a GET request to a non working URL. In the Gmail example,

you see this URL listed as http://www.google.com/wo0dh3ad. Abraham

noted that the encryption makes it easy to capture usernames and

passwords that would include special characters such as ‘%’ or ‘/’.



Considering that the backbone of the Tunisian Internet is full of

state run filters and firewalls designed to block access, configuring

one to log the GET commands with the harvested data would be trivial.

But is this a government sponsored action?



The likelihood that a group of criminals compromised the entire

Tunisian infrastructure is virtually nonexistent. Code planting on

this scale could only originate form an ISP. With their history of

holding an iron grip on the Internet, ATI is the logical source of the

information harvesting.



There is an upside however, as the embedded JavaScript only appears

when one of the sites is accessed with HTTP instead of HTTPS. In each

test case, we were able to confirm that Gmail and Yahoo were only

compromised when HTTP was used. For Facebook on the other hand, the

default is access is HTTP, so users in Tunisia will need to visit the

HTTPS address manually.



Another interesting note is that it appears the embedded code has

targeted Tunisian users for several months. Slim Amamou, of the Global

Voices Advocacy blog, reported his findings on the code last July, and

at the time, ATI was blocking Google’s HTTPS port, forcing users to

default to HTTP.



The information surrounding the embedded JavaScript came to our

attention thanks to a user on the IRC server where supporters for

Anonymous’ Operation: Tunisia gathered to show support for Tunisian

protesters. When word spread of embedded code and account hijackings,

Anonymous offered Tunisian users help via Userscripts.org, with a

browser add-on that strips the added JavaScript code.



The ATI website has been offline for more than a day. The outage

started after Anonymous launched Operation: Tunisia. Our coverage on

their actions and the problems in Tunisia is here.



--

_______________________________________________

liberationtech mailing list

liberationtech at lists.stanford.edu



Should you need to change your subscription options, please go to:



https://mailman.stanford.edu/mailman/listinfo/liberationtech



If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?"



You will need the user name and password you receive from the list moderator in monthly reminders.



Should you need immediate assistance, please contact the list moderator.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20110112/9e207295/attachment.html>


More information about the liberationtech mailing list