stolen – Michmutters
Categories
Technology

Researchers Find Stolen Algorithms in Commercial Cybersecurity Products

LAS VEGAS – BLACK HAT USA 2022 – An analysis conducted by two researchers has revealed that some commercial cybersecurity products rely on algorithms that have been taken from other security tools without authorization.

The results of the research will be presented on Thursday at the Black Hat conference in Las Vegas by Tom McGuire, instructor at Johns Hopkins University, and Patrick Wardle, macOS security expert and founder of the Objective-See Foundation, a non-profit that provides free and open source macOS security resources.

The analysis focused on OverSight, a free tool offered via the Objective-See Foundation. The app enables users to monitor a Mac’s microphone and webcam, and alerts them whenever the mic is activated or the camera is accessed by a process.

The analysis led to the discovery of three security tools — developed by three different companies — that used OverSight algorithms without authorization. OverSight has been available as a free tool since 2016, but it was only made open source in 2021. Reverse engineering it in an effort to create commercial products would be unethical, if not illegal.

Using Google and Yara rules, the researchers identified commercial products using the same method names, paths, strings, undocumented registry keys, and parsing logic as OverSight.

Code stolen by commercial security application from OverSight

The offending companies were contacted and provided with proof that OverSight algorithms had been used in their products without authorization. They acknowledged the issue — even though one of the firms only took the researchers seriously after being faced with the possibility of public backlash — and promised to remove the code, and even offered financial compensation.

wardle awning SecurityWeek that the compensation offered by the companies was reasonable — even if it was only a ‘drop in the bucket’ for them. The money will be used by the Objective-See Foundation for its Objective by the Sea conference, books and free tools.

However, Wardle said, the most important aspect is that all of the companies seemed eager to make changes and ensure that such practices are avoided in the future, which was one of the project’s main goals, along with bringing attention to the issue.

The companies that used the algorithms without authorization have not been named, but Wardle told SecurityWeek that they were both small and larger companies that had been using the stolen intellectual property for various products, including simple utilities and bigger macOS security products. A majority were dedicated cybersecurity companies, but the algorithms were also misused by a tech company.

On the other hand, it’s worth mentioning that the researchers concluded that in a majority of cases the infringement is the work of a single — possibly naive — developer, rather than ‘malice of the entire corporation’.

“I went in thinking the entire corp. was likely conspiring to steal from my non-profit, whereas that really wasn’t the case,” Wardle said.

The goal of this research was to encourage others to look into these practices and help developers find out if their code has been stolen — the researchers believe this practice is likely more common than we think. However, Wardle noted that you need both a software developer and a competent reverse engineer to identify this type of theft.

“It doesn’t matter if your code is closed-source — if people want to steal it they will,” Wardle said. “I knew that technically this wasn’t complicated, but figured the fact that it wasn’t open-source (originally) would be a clear ‘hey, this is private, don’t steal’. Apparently not.”

Related: Repurposing Mac Malware Not Difficult, Researcher Shows

Related: Hackers Can Bypass macOS Security Features With Synthetic Clicks

view counter

Edward Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:
Tags:

.

Categories
Australia

Beloved 87yo Roth violin stolen from outside Alice Springs restaurant leaving musician devastated

An outback musician and dedicated Northern Territory music school teacher has not only had her 1999 Toyota troop carrier stolen from a popular restaurant overnight, but also her beloved 1935 Roth violin.

Gleny Rae has lived in Alice Springs for two years and is a regular on the music scene in Alice Springs and across Australia, recently appearing in the documentary I’m Wanita.

“I’ve just stopped into Simply Korean on Gap Road for a quick bite to eat with a friend between about 6:45 and 7:30pm,” she said.

“When we came out there were three cars with their windows smashed. I was cleaning my friend’s car and I was looking at that going ‘oh no!'”

It was at that moment that Rae realized that her car had been stolen.

“That’s the moment when your heart just about leaps out of your mouth and I can see the smashed glass where it was parked,” she said.

violin gone

Rae’s prized possessions of a 1935 Roth violin and two bows were also in the car.

She is desperate for the instrument to be returned.

A woman holding her violin on stage.
Gleny Rae and her beloved violin stolen this week in Alice Springs.(Supplied: Gleny Rae)

“I very rarely go anywhere without my violin and I left it in the car, in the back, out of sight,” she said.

It is the sentimental worth that has Rae desperate to find the 87-year-old instrument.

“It’s just a part of my body. It’s an extension of me,” she said.

“It was a violin that my mum bought for me when I was still at the [Sydney] Conservatory High School.”

Rae was 16 years old and was told that she needed a better violin.

“So off we went to the violin shop. And we chose that one,” she said.

Rae is deeply upset that the violin might get damaged.

“I hear that when vehicles are stolen stuff gets thrown out of them,” she said.

“It breaks my heart to think that it could be smashed or damaged for no reason.”

Crime taking its toll

A Totoya troop carrier with the doors open.
Gleny Rae’s troopy was stolen at a local restaurant on Tuesday evening along with her violin.(Supplied: Gleny Rae)

Rae’s car window was also smashed several weeks ago outside a popular bar where she had been performing.

“You can’t even go to dinner without feeling safe, or that your vehicle is safe,” she said.

“And that’s really sad.”

loading

She said that it is having a direct effect on lifestyles in the outback town and she has now questioned why she remains in Alice Springs.

“It’s sad for all the businesses, it’s sad for the residents,” she said.

“It’s sad for entertainers, because I know a lot of times people won’t go out to gigs because they don’t want to leave their car.”

The violin case is blue canvas and the registration number for the vehicle is C35UL.

blue canvas violin case
Gleny Rae’s missing violin case. (Supplied: Gleny Rae)

.