πŸ”’
❌
There are new articles available, click to refresh the page.
Before yesterdayResearch Blog by Security Research Labs

A decade of hacking – meet the people behind SRLabs

It almost seems like eons ago when we were just some geeks having fun solving tech puzzles.Β Ten years on, we have grown into a global network of over fifty experts across offices in Berlin, Hong Kong, and Jakarta. Let’s look back and ahead.

New SIM attacks de-mystified, protection tools now available

SIM cards are at the heart of mobile network security. Vulnerabilities including the 2013 remote applet installation hack and the recent β€˜Simjacker’ vulnerability put millions of users at risk.Β 

Banking regulation has an effect on Hackability

Banks are known for their strong security efforts and better-than-average protection from hacking. As we discussed previously when introducing a metric to compare the Hackability of different organizations, banks are among the top three.Β 

The Hackability of organizations can be measured and compared

As security researchers and consultants, we often get asked, β€˜How does the security of my organization compare to others?’. In this blog post, we introduce a metric to help answer this question: The Hackability Score.Β 

Legacy booking systems disclose travelers’ private information

Travel bookings worldwide are maintained in a handful of systems.Β Today’s GDSs go back to the 70s and 80s. The systems have since been interwoven with web services, but still lack several web security best practices.

SIM cards are prone to remote hacking

SIM cards are the de facto trust anchor of mobile devices worldwide. The cards protect the mobile identity of subscribers, associate devices with phone numbers, and increasingly store payment credentials.

Fingerprints are not fit for secure device unlocking

Fingerprint sensors have sought to replace password- and PIN-based authentication for years. Apple's iPhone 5 sensors continue to fail their marketing claim of secure device unlocking.

Incorrectly patched ZyXEL vulnerability becomes zero-day again

We dug deeper into the vulnerability and patch for CVE-2020-9054, a pre-auth command injection in ZyXEL NAS devices. We found that the patched vulnerability was still exploit-able due to incomplete patching.

Smart Spies: Alexa and Google Home expose users to vishing and eavesdropping

Smart speakers from Amazon and Google offer simple access to information through voice commands. The capability of the speakers can be extended by third-party developers through small apps. The apps currently create privacy issues.

Simple fuzzing goes a long way, even for critical blockchain software

Blockchain technology is used to store and transmit billions in value. Security issues in blockchain software puts this value at risk. One software underpinning billions in value is Parity, an Ethereum client written in Rust.

The blockchain ecosystem has a patch problem

SRLabs research suggests that security vulnerabilities remain unpatched for many Ethereum blockchain participants for extended periods of time, putting the blockchain ecosystem at risk.

Achieving Telerik Remote Code Execution 100 Times Faster

A cryptographic vulnerability in the development software Telerik UI from 2017 turned out to be impractical to exploit until now. This blogpost details the optimization techniques deployed, which can be applied to similar issues in other software.

Honeypot research shows variety of DDoS amplification methods

13 September 2021 at 14:39
UDP protocol design makes it easy to hide the real origin of requests, making it the perfect candidate for DDoS amplification and leaving prevention as the only protection against these threats

Blockchain security – Best practices for your next review

15 December 2021 at 09:22
Over the past years and in over a dozen audits we gained extensive experience in auditing Substrate-based Blockchain technologies. In this blog post we share our methodology that helped to identify many critical vulnerabilities.

Balancing long-term technology evolution with short-term side-effects - Vulnerability disclosure best practices

21 December 2021 at 07:30
Responsible disclosure is the best practice to handle and fix unknown vulnerabilities. This blog includes real-world experience and advice from over a decade of SRLabs disclosing vulnerabilities responsibly.

Blockchain security – Six common mistakes found in Substrate chains

There is relatively little guidance on security mistakes to expect when working on blockchain projects. This post lists six mistakes we regularly find when auditing Substrate-based chains along with hands-on advice on how to mitigate the issues.

Decrypting GSM phone calls

GSM telephony is the world’s most popular communication technology spanning most countries and connecting over four billion devices. The security standards for voice and text messaging date back to 1990 and have never been overhauled.

The physical access control market is ripe for an upgrade to modern technology

Physical access control systems today predominantly use access badges with weak cryptography or no cryptography at all despite better building blocks being available.

Cryptographic problems are reduced to their true hardness by SAT solvers

Many industrial ciphersβ€”including those in today’s access control and NFC applicationsβ€”use algebraically insecure cryptographic functions that can be broken using SAT solvers in an automated process.

❌