'FLYING PIG' Soars Over Internet Privacy Protections
The British government has devised a method dubbed "FLYING PIG" to access encrypted Internet communications.
If you've ever consoled yourself by saying that the government will compromise secure email and browser servers "when pigs fly," take a deep a deep breath: that day has arrived. The British government has devised a method dubbed "FLYING PIG" to access encrypted Internet communications.
The National Security Agency (NSA) in the United States and the Government Communications Headquarters (GCHQ) in the United Kingdom have collaborated to gain unfettered access to citizens' private data. One of the only things standing in their way is data encryption.
A very common type of encryption, SSL (Secure Socket Layer), ensures secure communication between a user and the website that needs his or her information. If you send an email, the server needs to route the document; if you buy something online, the vendor needs your credit card information. SSL encryption renders this information unreadable in transit.
From a user standpoint, if you access an HTTPS version of a website, the site is using SSL (or TLS, a very close SSL relative) protocols to keep your data secure.
MORE: NSA Poisoned Internet Security from the Beginning
FLYING PIG can bypass SSL through what is known as a man-in-the-middle attack. By interposing itself between the user and the user's intended destination during such an attack, GCHQ can redirect the user to a spoof site, usually almost indistinguishable from the genuine article.
For example, a man-in-the-middle attack on an online store can steal a user's credit card information by making it appear that the order has gone through as planned.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
FLYING PIG, in particular, takes advantage of SSL's modus operandi, which requires a "handshake." SSL makes both the end user and the server provide security certificates before transmitting data. GCHQ can provide fake security certificates, rendering both a user and his or her system unaware that a third party has acquired the information.
Yahoo, Google and Hotmail all employ SSL encryption in their email servers. Even the purportedly secure Tor protocol uses SSL certificates to guarantee its users' safety and privacy. According to leaked GCHQ documents, the U.K. organization has compromised those three email providers as well as the specialized Tor browser.
Man-in-the-middle attacks — especially sophisticated ones like those GCHQ employs — are generally difficult to avoid, as the average user (and even the average browser) cannot detect subtle redirection.
Users have only limited recourse against such attacks, but changing a router's default password to something stronger is a start. Use an administrator on your PC or Mac account to install and uninstall programs, and a more limited-access user account for everyday computing. Install an Internet security suite on your computer, and ensure that a firewall is active at all times.
Note that these steps will not stop GCHQ or the NSA from acquiring your data, especially if they have you, specifically, in their crosshairs. But these moves may make the average user more trouble than he or she is worth for the government to target.
Follow Marshall Honorof @marshallhonorof. Follow us @tomsguide, on Facebook and on Google+.
Marshall Honorof is a senior editor for Tom's Guide, overseeing the site's coverage of gaming hardware and software. He comes from a science writing background, having studied paleomammalogy, biological anthropology, and the history of science and technology. After hours, you can find him practicing taekwondo or doing deep dives on classic sci-fi.
-
Sooooo, they're literally conning you in order to steal your data? Please remind me how this is legal.Reply
-
a20052020 This type of MITM attack only works if you control the certificates (you have to get the companies certs or get a cert authority to give you ones otherwise the users will know for sure that they are under attack). Companies do this regularly to monitor internet access (It is also very legal in most areas and has even been tested in court) as company workstations (their network, their hardware, their property, so its pretty clear cut for corporate monitoring) can have root certificates installed that are required and trusted for network access as well as transparent http/https proxy monitoring.Reply
Companies even install keyloggers, video recorders, time tracking software, remote admin/wipe/lockdown... (It is quite surprising that the NSA didn't have that in their network) -
Shaun o There banking on the fact people don`t read 1984 to be honest.Reply
Until it is too late to see that fiction, has become a fact.
-
ddpruitt Please check your article's for technical accuracy.Reply
This isn't an SSL attack this is a spoofing attack, this isn't a problem with the SSL protocol. And this isn't used by the NSA or GCHQ, this is mostly a hacker tactic to gain access to financial information. The advice is good but it applies to general hacking attacks. If the government wants your financials all they have to do is ask, very few banks will refuse this type of request. On top of that they already have access to most of this information, there are a number of companies that have made billions providing this type of information (think about it for minute will you?). -
agnickolov The only way this type of attack can work for the general public is when a Certificate Authority company (like VeriSign as the best known of the lot) is compromised so a third party can generate a malicious certificate. This most famously happened a couple of years ago to a less known CA courtesy of the Iranian Revolutionary Guard's cyber division and was used to target Iranian dissidents. Of course in the case of NSA they could very well control a few of the Certificate Authority companies directly, considering the biggest ones are American-based...Reply -
fixxxer113 @athulajpReply
Yeah, It's nice to see governments will even resort to using criminal methods in order to "protect us"... I feel so safe now, don't you?? -
Someone Somewhere Yep. Certificates are a guarantee that the other end is who you think you are. If the CAs hand out spoof certificates to the spies, it's all over.Reply