What Happens If Time Gets Hacked

  /     /     /  
Publicated : 23/11/2024   Category : security


What Happens If Time Gets Hacked


Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.



BLACK HAT EUROPE 2021 - London - Most people take time synchronization for granted, but it operates on what hardware security expert Adam Laurie calls a fragile ecosystem. Laurie, a renowned hardware hacker, here today demonstrated an unnervingly simple way to alter time on a clock.
I was curious if I could spoof the time synchronization signal, he explained in a keynote on his research. So he built his own simulated time-signal system using an open source tool called txtempus, which simulates signals for syncing the time on clocks and watches, and ran it on Raspberry Pi outfitted with a radio-frequency identification (RFID) antenna.
Lauries contraption overrode the UK regions official low-frequency, radio broadcast-based clock synchronization signal. During his demo, he ultimately reset a red clocks hands to show a mirror-image rendering of the real time on a white clock: The hacked red clock was instructed to display the time as 4:18 while the untouched clock read 9:48, the correct time (see photo).
The white clock was set to operate normally, communicating with the Network Time Protocol (NTP) that transmits local atomic clock broadcasts to timekeeping devices. The red clock, also was set to communicate with National Physical Laboratory, the UK atomic clock feed via NTP, but Laurie commandeered the feed on that link. 
I overrode the signal and forced it to display the incorrect time, he said in an interview.
The hack underscored how easily RFID can be abused and how that potentially could wreak havoc by altering time on a wider scale. And unlike other security issues, this risk to time-hacking isnt rooted in software or hardware vulnerabilities: Its more about an aging technology and process.
Its more of an existential vulnerability because its the way the technology evolved and the way it was adopted before anyone was worrying that its not an actual secure method, said Laurie, whose time research is independent of his employer IBM X-Force, where he is the lead hardware hacker.
Time Out
Correct time synchronization affects wide swaths of society: everything from financial transactions that rely on accurate timing of payments, to industrial systems, forensics, and time-stamped network packets on the Internet. Internet of Things (IoT) devices rely on the atomic clock. In his keynote, Laurie cited a 2017 UK report that estimated the cost of time-synchronization failure was a stunning 1 billion British pounds per day.
He also noted government and industry efforts to shore up the security of time synchronization, including that of The Resilient Navigation and Timing Foundation, an international nonprofit advisory council. The foundation has proposed hardening GPS and Global Navigation Satellite System (GNSS) systems to protect spoofing and jamming signals, and adding legal teeth to enforce it.
The Internets NTP and PTP distribute time updates and currently could be duped into transmitting spoofed information, he pointed out.
Theyre not the source of time, but they need the external source that tells them the time, namely the atomic clock, which broadcasts over RF and GPS, Laurie explained.
Ransomware attacks are an obvious threat here, he added.
If I can take out a financial organization by DOSing their atomic clock feed, that would be a very powerful attack, he said.
The security risks of RF long have been illuminated by Laurie and other researchers. The bottom line: RF transmits data in plain text.
The strongest signal wins, and theres no authentication in most of these transmissions, he said. There are technologies for validating signals, but most of the existing RF infrastructure remains insecure, he added.
Theres a huge, deployed infrastructure that relies on these insecure technologies. This [time] is one of those hidden nasties waiting to bite us, he said.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
What Happens If Time Gets Hacked