this post was submitted on 11 Aug 2023
463 points (98.5% liked)

Technology

59323 readers
5183 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 36 comments
sorted by: hot top controversial new old
[–] harry315@feddit.de 99 points 1 year ago (1 children)

If teens can hack your stuff, you should be really thankful to find out they did, because our stuff is insecure as fuck then.

[–] Gork@lemm.ee 9 points 1 year ago

Better our college students than nefarious actors.

[–] xodoh74984@lemmy.world 92 points 1 year ago

"Known MBTA security flaw remains unpatched after being publicly disclosed 15 years ago. Boston mad. More at 11."

[–] Stephen304@lemmy.ml 48 points 1 year ago (2 children)

Article text:

Teens Hacked Boston Subway’s CharlieCard to Get Infinite Free Rides—and This Time Nobody Got Sued Andy Greenberg 8 - 11 minutes

In early August of 2008, almost exactly 15 years ago, the Defcon hacker conference in Las Vegas was hit with one of the worst scandals in its history. Just before a group of MIT students planned to give a talk at the conference about a method they’d found to get free rides on Boston’s subway system—known as the Massachusetts Bay Transit Authority—the MBTA sued them and obtained a restraining order to prevent them from speaking. The talk was canceled, but not before the hackers’ slides were widely distributed to conference attendees and published online.

In the summer of 2021, 15-year-olds Matty Harris and Zachary Bertocchi were riding the Boston subway when Harris told Bertocchi about a Wikipedia article he’d read that mentioned this moment in hacker history. The two teenagers, both students at Medford Vocational Technical High School in Boston, began musing about whether they could replicate the MIT hackers’ work, and maybe even get free subway rides.

They figured it had to be impossible. “We assumed that because that was more than a decade earlier, and it had got heavy publicity, that they would have fixed it,” Harris says.

Bertocchi skips to the end of the story: “They didn’t.”

Four young people posing together

The Boston subway hackers (from left to right) Scott Campbell, 16; Noah Gibson, 17; Matty Harris, 17; and Zack Bertocchi, 17.Photograph: Roger Kisby

Now, after two years of work, that pair of teens and two fellow hacker friends, Noah Gibson and Scott Campbell, have presented the results of their research at the Defcon hacker conference in Las Vegas. In fact, they not only replicated the MIT hackers’ 2008 tricks, but took them a step further. The 2008 team had hacked Boston’s Charle Ticket magstripe paper cards to copy them, change their value, and get free rides—but those cards went out of commission in 2021. So the four teens extended other research done by the 2008 hacker team to fully reverse engineer the CharlieCard, the RFID touchless smart cards the MBTA uses today. The hackers can now add any amount of money to one of these cards or invisibly designate it a discounted student card, a senior card, or even an MBTA employee card that gives unlimited free rides. “You name it, we can make it,” says Campbell.

To demonstrate their work, the teens have gone so far as create their own portable “vending machine”—a small desktop device with a touchscreen and an RFID card sensor—that can add any value they choose to a CharlieCard or change its settings, and they’ve built the same functionality into an Android app that can add credit with a tap. They demonstrate both tricks in the video below:

In contrast to the Defcon subway-hacking blowup of 2008—and in a sign of how far companies and government agencies have come in their relationship with the cybersecurity community—the four hackers say the MBTA didn’t threaten to sue them or try to block their Defcon talk. Instead, it invited them to the transit authority headquarters earlier this year to deliver a presentation on the vulnerabilities they’d found. Then the MBTA politely asked that they obscure part of their technique to make it harder for other hackers to replicate.

The hackers say the MBTA hasn’t actually fixed the vulnerabilities they discovered and instead appears to be waiting for an entirely new subway card system that it plans to roll out in 2025. When WIRED reached out to the MBTA, its director of communications, Joe Pesaturo, responded in a statement that “the MBTA was pleased that the students reached out and worked collaboratively with the fare collection team.”

“It should be noted that the vulnerability identified by the students does NOT pose an imminent risk affecting safety, system disruption, or a data breach,” Pesaturo added. “The MBTA's fraud detection team has increased monitoring to account for this vulnerability [and] does not anticipate any significant financial impact to the MBTA. This vulnerability will not exist once the new fare collection system goes live, due to the fact that it will be an account-based system versus today’s card-based system.”

The high schoolers say that when they started their research in 2021, they were merely trying to replicate the 2008 team’s CharlieTicket hacking research. But when the MBTA phased out those magstripe cards just months later, they wanted to understand the inner workings of the CharlieCards. After months of trial and error with different RFID readers, they were eventually able to dump the contents of data on the cards and begin deciphering them.

Unlike credit or debit cards, whose balances are tracked in external databases rather than on the cards themselves, CharlieCards actually store about a kilobyte of data in their own memory, including their monetary value. To prevent that value from being changed, each line of data in the cards’ memory includes a “checksum,” a string of characters computed from the value using the MBTA’s undisclosed algorithm.

The hackers figured out how to reproduce a “checksum” calculation intended to prevent the value stored on CharlieCards from being changed, circumventing that anti-hacking protection.Photograph: Roger Kisby

By comparing identical lines of memory on different cards and looking at their checksum values, the hackers began to figure out how the checksum function worked. They were eventually able to compute checksums that allowed them to change the monetary value on a card, along with the checksum that would cause a CharlieCard reader to accept it as valid. They computed a long list of checksums for every value so that they could arbitrarily change the balance of the card to whatever amount they chose. At the MBTA’s request, they’re not releasing that table, nor the details of their checksum reverse engineering work.

Not long after they made this breakthrough, in December of last year, the teens read in the Boston Globe about another hacker, an MIT grad and penetration tester named Bobby Rauch, who had figured out how to clone CharlieCards using an Android Phone or a Flipper Zero handheld radio-hacking device. With that technique, Rauch said he could simply copy a CharlieCard before spending its value, effectively obtaining unlimited free rides. When he demonstrated the technique to the MBTA, however, it claimed it could spot the cloned cards when they were used and deactivate them.

Early this year, the four teenagers showed Rauch their techniques, which went beyond cloning to include more granular changes to a card’s data. The older hacker was impressed and offered to help them report their findings to the MBTA—without getting sued.

In working with Rauch, the MBTA had created a vulnerability disclosure program to cooperate with friendly hackers who agreed to share cybersecurity vulnerabilities they found. The teens say they were invited to a meeting at the MBTA that included no fewer than 12 of the agency’s executives, all of whom seemed grateful for their willingness to share their findings. The MBTA officials asked the high schoolers to not reveal their findings for 90 days and to hold details of their checksum hacking techniques in confidence, but otherwise agreed that they wouldn’t interfere with any presentation of their results. The four teens say they found the MBTA’s chief information security officer, Scott Margolis, especially easy to work with. “Fantastic guy,” say Bertocchi.

The teens say that as with Rauch’s cloning technique, the transit authority appears to be trying to counter their technique by detecting altered cards and blocking them. But they say that only a small fraction of the cards they’ve added money to have been caught. “The mitigations they have aren’t really a patch that seals the vulnerability. Instead, they play whack-a-mole with the cards as they come up,” says Campbell.

“We’ve had some of our cards get disabled, but most get through,” adds Harris.

So are all four of them using their CharlieCard-hacking technique to roam the Boston subway system for free? “No comment.”

For now, the hacker team is just happy to be able to give their talk without the heavy-handed censorship that the MBTA attempted with its lawsuit 15 years ago. Harris argues that the MBTA likely learned its lesson from that approach, which only drew attention to the hackers’ findings. “It’s great that they’re not doing that now—that they’re not shooting themselves in the foot. And it’s a lot less stressful for everyone,” Harris says.

He’s also glad, on the other hand, that the MBTA took such a hardline approach to the 2008 talk that it got his attention and kickstarted the group’s research almost a decade and a half later. “If they hadn’t done that,” Harris says, “we wouldn’t be here.”

Update 5 pm ET, August 10, 2023: Added a statement form an MBTA spokesperson. Update 11:25 am, August 11, 2023: Clarified when the teens' meeting with the MBTA took place.

[–] makingStuffForFun@lemmy.ml 15 points 1 year ago (1 children)

Ouch, so the new system will be account based. Say goodbye to your privacy.

[–] rustyricotta@lemmy.ml 5 points 1 year ago (1 children)

Unfortunately, that does seem to be the easiest solution.

~~Though how much that imposes on your privacy depends on how they implement it~~ There is no saving privacy. If it was me, I would keep everything the same, except have the checksum tied to an account and it can be checked and updated remotely.

This way, most of your transport usage informed would not be stored. In theory they could still log when the checksum is checked or changed by an official machine, leading to a vague idea of when you travel.

The points of attack would then be:

  • Somehow spoofing an official machine to talk with the server and modify the stored checksum. Very difficult if done properly.
  • Cloning someone's card and using their account credits. Relatively easy to do. To prevent this they would have to implement usage tracking so the users can check for fraudulent activity. And there goes privacy.
[–] makingStuffForFun@lemmy.ml 2 points 1 year ago

I appreciate your detailed reply, but I believe the fight for privacy is not over. It takes a lot of time, dedication and money to fight for privacy, but it must be done.

I'm glad MBTA were more accommodating to the high school hackers.

I'm also glad there's bug bounties and a process that connects ethical hackers and rewards them. And any company that retaliates against a security concern from a ethical hacker should burn.

[–] Elderos@lemmings.world 23 points 1 year ago* (last edited 1 year ago) (2 children)

I guess I am just and old grinch, but I feel like this is written to feel more epic and crazy than it really is, and to accuse the subway engineers of incompetence, rather than what seem to be a conscious architectural decision.

The subway system basically encodes how much money you have on your RFID card, and merely overwrites that value when you recharge it or use it. To me, this sounds like a cost-saving measure and a cheap way to have a fault-tolerant system. It is vulnerable to hackers tho, sort of by design. The alternative is to build a very complex and expensive centralized system with higher maintenance cost and points of failure. Both options work, but it is a tradeoff.

To me, the reason they didn't want word of this to get out is because the system is really good at doing what it is doing otherwise, and the small amount of fraud is probably costing them less than having to build a centralized system.

Kudos for students to even figure that out, but the feat in itself is almost equivalent to learning how to print counterfeit tickets to trick a clerk. It feels more crooked than technically impressive. Those responsibles for the system already knew of this "flaw". They just don't need the instructions how to make counterfeit cards out there.

[–] matter@lemmy.world 2 points 1 year ago

The flaw is that the checksum is so bad.

[–] Hazdaz@lemmy.world 1 points 1 year ago

I knew someone who worked at a company that handled e-payments for a certain service (purposefully being vague). They're system functioned similar-ish to what you describe, but it also checked the amount on the card with the amount on a database, and also kept a history both on the card and on the database. If they all didn't match up, they knew there was some tampering going on.

[–] InvertedParallax@lemm.ee 22 points 1 year ago (1 children)

Those 4 teens should get a scholarship for this, paid for by mbta's IT security budget.

[–] masterairmagic@sh.itjust.works 11 points 1 year ago (2 children)

Those 4 teens should first fix mbta's IT issues. It sounds like they are smarter than the folks at mbta.

[–] Ape550@lemmy.world 5 points 1 year ago

It probably has less to do with how smart the MBTAs IT team is and more likely how much the MBTA is willing to spend on IT.

I dunno about that. There's a difference between people who can find flaws and people who architect systems.

That's like saying a escape artist should be in charge of building the prison. Ideally they work together and provide both perspectives.

[–] aard@kyu.de 21 points 1 year ago (3 children)

It's amazing how much NFC stuff is still badly done - and how bad the response to discoveries is. I recently got a police report filed against me here in Finland for pointing out that guarding personal details of kids and parents on a phone used in daycare by an empty tag, just by the tags UID is probably a stupid idea.

[–] dhork@lemmy.world 16 points 1 year ago (1 children)

It doesn't surprise me, the vendor probably thinks they're Agile, their team delivered a Minimum Viable Product and then their Management sold it. Security was always meant to be in a future Sprint.

If that model works for web services, it ought to work for anything, right?

[–] aard@kyu.de 6 points 1 year ago

Agile, their team delivered a Minimum Viable Product

I guess that's kind of what got me into this mess.

They have some shitty web application where you're supposed to log times your kids will be in daycare. I logged in, looked around - and told the wife she can chose to log times herself, or tell daycare to do it themselves. I'm paid to deal with broken shit in my main job, I'm not doing that for free in my spare time.

At that point I assumed the web app was some prototype their intern had thrown together for the sales pitch, and they were now desperately trying to get it functional - to my surprise I later learned that it was an older product, with quite a few customers already.

Few weeks later wife came back upset from kindergarten over an argument about missing times - which forced me to actually deal with that dungheap, and prompted me to have a closer look at other components, like the android app they're using on their phones as well. There's a lot of stupid beginners mistakes in all components - not necessarily exploitable, but I also didn't really check as in my opinion the tag thing would be sufficient to have this taken out of use.

[–] r00ty@kbin.life 9 points 1 year ago (1 children)

Reading the article it seems they made two mistakes. The first was to make the card authoritive instead of having a account data to ensure the information matched. The second was to use a proprietary checksum algorithm instead of using an open secure signature method.

I'd put money on the information they're holding back being details on the checksum algorithm.

[–] masterairmagic@sh.itjust.works 5 points 1 year ago (1 children)

Doesn't having an account require an online system? By making the card authoritive you can build and offline system.

[–] r00ty@kbin.life 6 points 1 year ago

It wouldn't need an account. The card can have all the data (in case it is used in an offline situation) but also have a unique serial number.

So when an official ticket machine charges the card, it also logs the balance/tickets on the card with that ID in a central database too. Yes, it needs to be "online" within their own network. But, I'd be concerned if a large city transit didn't have their own network already.

Whenever it is used, provided the ticket reader has a connection it would be verified against the stored record. If the connection is offline then it uses the local stored information.

I do wonder in a transit system like this what the advantage to an offline system is. If someone works out your "CRC32 except I xored the result with 1337" algorithm, then you're boned and a lot of kit is "offline" and thus cannot easily be upgraded too.

[–] vlad76@lemmy.sdf.org 1 points 1 year ago

If there aren't enough people that are knowledgeable enough to take advantage of something to have an impact on revenue, then you just ignore it.

[–] gornar@lemmy.world 19 points 1 year ago (2 children)

“The MBTA's fraud detection team has increased monitoring to account for this vulnerability [and] does not anticipate any significant financial impact to the MBTA."

Oh well thank goodness the business isn't hurt!

[–] Gork@lemm.ee 5 points 1 year ago

Won't somebody think of the shareholders??!!

[–] raptir@lemm.ee 3 points 1 year ago* (last edited 1 year ago) (1 children)

The MBTA is a public agency that is funded by both fares and tax dollars. So you shouldn't be worried about the business, but the citizens of Boston.

[–] andrew@midwest.social 2 points 1 year ago

Roads aren't funded by fares, why should public transit?

[–] alienanimals@lemmy.world 16 points 1 year ago

Give the teens free passes for life and fire the executives responsible for the lapse in security.

[–] aegis_sum@lemmy.world 13 points 1 year ago (2 children)

The MBTA sued some MIT students a while back when they discovered the same thing. So the MBTA hasn't fixed this in over a decade.

https://www.universalhub.com/2023/some-medford-kids-figured-out-how-hack

[–] twotone@lemmy.world 18 points 1 year ago

If you had read the first paragraph, or even the subheader, you would have seen that the article covers that and that the kids were working off the 2008 research.

[–] Bartsbigbugbag@lemmy.ml 10 points 1 year ago* (last edited 1 year ago)

Yep, we must have read the same article or something… ;)

[–] buckykat@lemmy.blahaj.zone 7 points 1 year ago

Denver just made all RTD service free to teens for at least the next year

[–] popemichael@lemmy.sdf.org 4 points 1 year ago

I hope that they give these kids a job after college.

[–] Gutless2615@ttrpg.network 2 points 1 year ago