Nokia Extorted For Millions Over Stolen Encryption Keys 89
jppiiroinen writes: At the end of 2007, when Nokia still had huge market share with Symbian devices, they failed to disclose that somebody had stolen their encryption keys and extorted them for millions of Euros. The Finnish National Bureau of Investigation has not been able to figure out who did it. "The blackmailer had gotten hold of the Symbian encryption key used for signing. The code is a few kilobytes in size. Had the key been leaked, Nokia would not have been able to ensure that the phones accept only applications approved by the company."
I wonder if motorcycles were involved (Score:1)
all good ransom getaways seem to involve motocycles
Beema all the way. (Score:1)
Needs more Spy Thrilling (Score:4, Insightful)
The money was left in a bag at a parking lot nearby Särkänniemi amusement park. Then things went wrong. The blackmailer took the bag. Police, however, lost track of the blackmailer and the money was gone.
What, no GPS transmitter in the filament of each paper Euro? Amateurs.
Re: (Score:1)
The euro banknotes are pure cotton fibre
Re: (Score:1)
What, no GPS transmitter in the filament of each paper Euro? Amateurs.
Actually, the 1 and 2 unit currencies here on this side of the lake are not bills but coins. And while I wouldn't be surprised if our information hungry governmental overlords have tried putting GPS electronics in there, luckily the all-metal outside should keep us safe from any such spying activities.
Re: (Score:2)
What, no GPS transmitter in the filament of each paper Euro? Amateurs.
They have planned to add RFID [eetimes.com]. However AFAIK this has never been realized (yet).
Feature or bug? (Score:3, Insightful)
Nokia would not have been able to ensure that the phones accept only applications approved by the company.
Sounds more like a feature than a bug. Do device "owners" really want phones that "accept only applications approved by the company".
Re: (Score:3)
Also, the Tooth Fairy insisted. We don't know why.
Re: (Score:2)
Re: (Score:3)
And we know the key would never be used because the blackmailer pinkie swore.
Re: (Score:3)
That's just it. The summary says "Had the keys been leaked..." when in reality it is very obvious that they were leaked, Nokia just paid somebody and hoped they wouldn't use it. Encryption keys aren't something you can just give back, and a giant certificate revocation would have been noticed by a lot of security researchers.
Basically, this story boils down to the fact that Nokia is out millions of dollars and their infrastructure is STILL compromised. Pinky swear indeed...
Re:Feature or bug? (Score:5, Insightful)
Of course they do. You may not have heard of it, but there's a device called an iPhone that's tremendously popular, and this feature is one of the reasons.
Locked down devices are not for me, but one would have to really have their head in the sand to not notice that safer to use devices are popular with many, many people.
Re: (Score:2)
And most ordinary users that use Android are doing so because they are cheap, or they are the phone that the salesman at the store pushed at them. They aren't doing it because they think they have access to multiple app stores. Of the Android minority that ever download an app, most of them will never go outside Google Play.
When there's no app for that (Score:2)
Re: Feature or bug? (Score:2)
What does a fleshlight app do? How does it... um... work?
Re: (Score:2)
Sounds more like a feature than a bug. Do device "owners" really want phones that "accept only applications approved by the company".
On phones, yes. Phone users don't want their data compromised, or to end up being scammed for money. The thought that they are limited to one store doesn't even register as an issue. In fact they mostly like the idea of a single store where they can find every app.
The Slashdot user's ideas of free software come from a RMS. Ordinary people have never heard of him let alone care what he thinks.
The benefit of freedom is flexibility (Score:2)
The Slashdot user's ideas of free software come from a RMS.
Where you see "freedom" in arguments for free software, read "flexibility". The iPhone is less flexible in some ways than some other platforms. For example, there's no app for helping contribute to an access point database [slashdot.org] because Apple refuses to make the needed APIs public.
Re: (Score:1)
Carriers that hide the Unknown sources checkbox (Score:2)
Symbian had a toggle in the settings to disable signed app requirement.
So does Android. But that doesn't stop carriers from forcing that signature requirement toggle on, just as AT&T did for the first several months that it sold Android phones (Motorola Backflip, HTC Aria, Samsung Galaxy S "Captivate"). And the vast majority of phones sold in the U.S. market during the Symbian era had carrier branding on them.
Re: (Score:3)
The story is badly told. Symbian never restricted apps. I believe it did check their signatures on install, informing users (kinda like UAC in Windows).
Re: (Score:3)
Yeah it did - my N95 (Symbian OS v9.2, S60 3rd Edition) was unable to play OGGs via the stock media player as the codecs weren't signed. Previous versions were able to fine, apparently.
Re: (Score:2)
I believe my N97 had an option to allow unsigned apps (which were blocked by default, for obvious reasons).
The stock media player not accepting new codecs is also different from the OS not accepting new apps that are unsigned.
Delegation of vetting (Score:2)
Do device "owners" really want phones that "accept only applications approved by the company".
Yes.
As BasilBrush and CronoCloud have explained here several times, the majority of people are not geeks and don't want to have to spend time doing their own vetting of safety, usefulness, and battery efficiency of apps. Instead, they choose to delegate this vetting to Nokia, Apple, Microsoft, Sony, Nintendo, etc. I've summarized the purported advantages of closed platforms [pineight.com].
Re: (Score:3)
I disagree. I do not think this is a major consideration for most users. The idea of multiple software stores, some of which may or may not be trustworthy, is not high on the list when comparing phones.
Issues they do care about in general order of importance:
* Cost of the phone
* Provider support (e.g., will I be able to use this phone with my carrier)
* Features of the phone (does it have a keyboard, or a camera, and what does it look like)
* App support (can I download apps I am interested in?)
The fact is, m
Re: Feature or bug? (Score:2)
Also - "Had the key been leaked Nokia would not have been able to ensure that the phones accept only applications approved by the company."
This choice of words implies that the money somehow miraculously prevented the key from leaking. The key already HAD LEAKED. All nokia got for the money was a promise that the leaked key won't be misused.
Re: (Score:2)
In the alternate universe where nokia execs say "Fuck you, disseminate the key" we have nokia with a hacker friendly smartphone platform OR an instantly obsoleted platform thanks to evil hackers. I guess they would be better off than this nokia.
"Being broken" was the business model of microsoft windows and they became number one with it.
Re: (Score:2)
No, and if this feature were dropped, a lot of us would want Symbian phones even now. This is the "feature" that killed Symbian. However, it was mandated by the carriers. It took Google to kill it, and Android gets stick daily for not having this "feature".
Re: (Score:2)
Nokia would not have been able to ensure that the phones accept only applications approved by the company.
Sounds more like a feature than a bug. Do device "owners" really want phones that "accept only applications approved by the company".
The dive can run any code, the signing key makes it look "officially approved" by Nokia.
Why no key revocation strategy? (Score:1)
Keys get compromised, expire, etc. They should have had a process for updating keys, and then it would have cost nothing but a little egg on the face for letting someone steal it.
Re: (Score:1)
There should have been a scenario test where keys were released, or perhaps RSA or ECC itself gets cracked.
Perhaps the best solution would be devices having both a symmetric key for the individual device, and a symmetric key for that model. That way, if all public keys were blown, there could be a mechanism for updates that would essentially use symmetric encryption to "sign" code [1].
Of course, if the symmetric key database is compromised, it is a bad thing, but a company as big as Nokia can easily keep a
Load of BS (Score:1)
I don't get why they actually paid people for this. Even if they received the key _back_ the attacker could have still used them.
"nokia would not have been able to ensure that the phones accept only applications approved by the company"
is complete BS, they could not verify that at the point they realized they screwed up key security.
Re: (Score:2)
Re: (Score:1)
How do you know ? They probably got an email signed with their own key, containing the ransom letter.
Re: (Score:2)
Execs can trust criminals for the same reason that sharks don't eat lawyers...professional respect ;-)
No funny business (Score:2)
From a strategic point of view this is a clusterfuck. Why did Nokia put real money in the bag if they were planning to arrest the person that came to pick it up? If the police had succeeded then it wouldn't matter if the money was real. If the blackmailer gets away, then maybe, if you are lucky, he might keep his promise if he thinks you acted in good faith. But now I am reading a story on slashdot about how they tried to catch this guy and botched the plan, so now the blackmailer knows that Nokia was no
Re: (Score:1)
Regarding keeping the code, you'd have to hide it really well such that only you can retrieve it. You should encrypt or otherwise scramble it for starters. It's not that hard. Criminals are usually caught because they're either stupid, or because easy money is addictive, so they keep doing it, and eventually, something happens outside their calculations (and they tend to get more careless over time too).
Re: (Score:1)
Too many potential points of failure - you could be quickly restrained or knocked out (like by a taser). They could cell jam you or otherwise intercept your data. Or they could have already hacked your phone in the time you picked up the bag and took it somewhere to check its contents. Better would be to set up some servers to send out the code at a certain time. If anything happens to you, then there's no one to disable that system.
I agree that the blackmailer, once the money is in hand, is incentivize
Trust... (Score:2)
So how do you trust a company? Profit is their primary goal, and if they feel that hiding a breach like this will be more profitable than disclosing it that's exactly what happens... Meanwhile, you now potentially have to also trust some criminals who have already demonstrated their willingness to commit blackmail.
And now for the news... (Score:2)
Re: (Score:1)
Actually, paying the ransom was the best bet to protect the user. However, they also should have let everyone know they had been compromised, and that's the part where they put corporate greed before their customers.
Re: (Score:2)
Corporations commonly pay ransoms to blackhats, it just doesn't get reported. I heard of a CEO once paying a 100kUS ransom to prevent his customer database from being released - with no evidence!
Unimaginable horror (Score:3)
Damn you just have to feel sorry for Nokia...
I couldn't imagine the pain and suffering must be associated with selling devices and then losing the ability to control what software can be installed on them.
Sherlock vs Moriarty (Score:1)
Extort the extorer? (Score:5, Funny)
Pay me, or you don't get to extort your users with your locking scheme! :)
they should have encouraged the hacker (Score:1)
since nobody wrote or used symbian in the android era anyways.
Sounds like the Keystone Cops (Score:2)