The Register® — Biting the hand that feeds IT

Feeds

Now you can be the NSA: Snoop on a Google Glass hipster with a QR code

Point and - oh s**t

5 ways to prepare your advertising infrastructure for disaster

A security flaw discovered in Google Glass ultimately allowed miscreants to eavesdrop on the wearer's wireless internet connection - using just a QR code.

Mobile security firm Lookout discovered that the techno goggles automatically processed QR codes present anywhere in photographs captured by the built-in camera.

The barcode-like images could, by design, instruct the Glass hardware to connect to a rogue Wi-Fi network that snoops on connections made to the web, or tell its browser to visit a malicious website that exploits any other security holes in the gadget's Android operating system.

The vulnerability was reported by Lookout on 16 May. It was quickly fixed by Google in an update issued on 4 June (version XE6), which was pushed out to all devices before posters featuring mischievous codes could pop up at Glass hipster hangouts.

Lookout held back on details about the flaw until it published a blog post today; it explained that any attacks stemmed from the ability to configure a Google Glass using QR codes, a type of barcode that can contain instructions to send an SMS and set device settings among other data:

While it’s useful to configure your Glass QR code and easily connect to wireless networks, it’s not so great when other people can use those same QR codes to tell your Glass to connect to their Wi-Fi Networks or their Bluetooth devices. Unfortunately, this is exactly what we found.

We analyzed how to make QR codes based on configuration instructions and produced our own “malicious” QR codes. When photographed by an unsuspecting Glass user, the code forced Glass to connect silently to a “hostile” Wi-Fi access point that we controlled. That access point in turn allowed us to spy on the connections Glass made, from web requests to images uploaded to the cloud. Finally, it also allowed us to divert Glass to a page on the access point containing a known Android 4.0.4 web vulnerability that hacked Glass as it browsed the page.

Glass was hacked by the image of a malicious QR code. Both the vulnerability and its method of delivery are unique to Glass as a consequence of it becoming a connected thing.

Lookout has posted a short 50-second animation on YouTube* (below) explaining how the vulnerability allowed hackers to force Google Glass users to connect to dodgy wireless access points and cause it to visit an exploit-ladened website.

Google resolved the flaw by programming Glass to grok QR codes at the user's request, as per a recommendation put forward by Lookout. Neither rogue wireless network trickery nor QR code exploits by themselves are anything new, but Google Glass was perhaps a little too eager to trust QR codes placed before its camera.

Glass is currently a limited beta product: it’s meant to be tinkered with and holes are there to be discovered now before it goes on mainstream release. Lookout praised Google's responsiveness in dealing with the QR code exploit problem.

Up to now most of the security-related talk about Google Glass has focused on privacy issues. But the emergence of the so-called Internet of Things - which covers all web-connected gadgets from thermostats to wearable computers, such as the Google goggles - will present new security challenges that vendors and users are only just starting to grapple.

"While connected devices that capture and transmit data to each other will open tremendous capabilities and benefits, they will also broaden the attack surface and up the stakes for security," said Marc Rogers, principal researcher at Lookout.

A blog post by Rogers reviewing the Google Glass vulnerability as well as taking a wider look at security the Internet of Things can be found here. ®

Bootnote

* Viewer discretion advised. You may wish to temporarily mute or at least turn down the sound.

Email delivery: 4 steps to get more email to the inbox

Whitepapers

Microsoft’s Cloud OS
System Center Virtual Machine manager and how this product allows the level of virtualization abstraction to move from individual physical computers and clusters to unifying the whole Data Centre as an abstraction layer.
5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Email delivery: Hate phishing emails? You'll love DMARC
DMARC has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name..
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?

More from The Register

next story
EU move to standardise phone chargers is bad news for Apple
Faster than a speeding glacier but still more powerful than Lightning
NSA in new SHOCK 'can see public data' SCANDAL!
What you say on Twitter doesn't stay on Twitter
Great Britain rebuilt - in Minecraft: Intern reveals 22-BEEELLION block map
Cunning Ordnance Survey bod spent the summer bricking it
Google's boffins branded 'unacceptably ineffective' at tackling web piracy
'Not beyond wit' to block rip-offs say MPs demanding copyright safeguards
Hundreds of hackers sought for new £500m UK cyber-bomber strike force
Britain must rm -rf its enemies or be rm -rf'ed, declares defence secretary
Michael Gove: C'mon kids, quit sexting – send love poems instead
S.W.A.L.K.: Education secretary plugs mate's app
Report says PRISM snooped on India's space, nuclear programs
New Snowden doc details extensive NSA surveillance of 'ally' India
Highways Agency tracks Brits' every move by their mobes: THE TRUTH
We better go back to just scanning everyone's number-plates, then?
The target: 25% of UK gov IT from small biz... The reality: Not even close
Proud mandarins ignoring Cabinet Office's master plan, note MPs
NSA's Project Marina stores EVERYONE'S metadata for A YEAR
Latest Snowden leak shows government economical with the truth
prev story