SlideShare a Scribd company logo
1 of 57
Download to read offline
Open Sesame: Picking Locks with Cortana
Ron Marcovich, Yuval Ron, Amichai Shulman, Tal Be'ery
1
Amichai Shulman
• Independent Security Researcher
• Advisor for multiple cyber security start up
companies
• Former CTO and Co-Founder of Imperva
• Blackhat, RSA, Infosec speaker
• @amichaishulman
Tal Be’ery
• Co-Founder @ Kzen Networks
• Formerly VP Research @Aorato (Acquired by
Microsoft), Imperva, Singtel Innov8 VC
• Blackhat, RSA, SAS speaker
• @talbeerysec
2
Who are we?
Also Featuring…
Yuval Ron
Twitter: @RonYuval
LinkedIn: ronyuval
Ron Marcovich
Twitter: @RonMarcovich
LinkedIn: ronmarcovich
B.Sc. Software Engineering students at the Technion,
Israel Institute of Technology. Both will start their M.Sc.
In Computer Science this year.
3
Agenda
• Understanding Cortana
• What is it, how does it work and key elements
• Attacking Cortana on all fronts
• Cortana agent: Open Sesame (CVE-2018-8140)
• Cortana actions: The voice of Esau
• Cortana cloud: Malicious skills
• Protecting against Cortana attacks
• Voice Firewalls: NewSpeak
• Summary and Conclusions
4
Understanding Cortana
5
What is Cortana?
• "Your intelligent assistant across
your life."
• Translate human intent into
computer actions
• Retrieve data
• Browse the web
• Launch programs
6
What is Cortana?
• Multi-platform: Mobile, PC,
devices
• Multi inputs (“intents”):
keyboard, mouse, voice, touch,
…
7
Cortana Architecture
8
Cortana
Service
Speech to
Text
Text to Intent
(Action)
Cortana
Skill
Internet
3rd party
web
service
Cortana
Client
Speech
Text
Text
Intent + p
Intent + p
Card data
Speech
Text
Resolve!
Card
Action
Provider
(Azure
Bot)
Intent to
Card
(Azure
Bot)
Cortana Architecture - Example
9
Cortana
Service
Speech to
Text
Text to Intent
(Action)
Action
Provider
(Azure
Bot)
Internet
3rd party
web
service
Cortana
Client
Speech
Who is George Washington
Who is George Washington
Search
Query = “George Washington”
Card data
Speech
Who is George Washington
Resolve!
Action
Provider
(Azure
Bot)
Intent to
Card
(Azure
Bot)
Search
Query = “George Washington”
Cortana Agent
• Very fat Client
• Can do a lot of stuff!
• Merely an execution engine
• Exposes a powerful Javascript API
• Works on a locked devices
• By Default!
• SpeechRuntime.exe listens for
“Hey Cortana”
• SearchUI.exe has the “Cortana
Logic”
10
Cortana Cloud Service
• Processing and decision making is done in the cloud
• Two phases
• Audio processing – Speech to Text
• wss://websockets.platform.bing.com/ws/cu/v3
• Binary + JSON
• Semantic processing – Text to Intent & Intent to Card
• https://www.bing.com/speech_render - GET request, HTML response
• https://www.bing.com/DialogPolicy - GET / POST request, Javascript response
• Machine Learning
• Improve speech recognition
• Extend intent resolution capabilities
11
Audio Processing Phase
Client Server
Connection.context(JSON)
Audio stream (BIN)
IntermediateResult (XML)
Audio stream (BIN)
IntermediateResult (XML)
Audio stream (BIN)
Audio.stream.hypothesis
PhraseResult (XML)
12
Semantic Processing Phase
13
Cortana Skills
• Cortana can be extended with
cloud based “skills”
• A Skill is an Azure bot registered
to the Cortana channel
• Receive all user input after an
invocation name
• Interacts with the Cortana client
using Cards that include voice,
text and LIMITED COMMANDS
14
Cortana Skills
15
• Fat client executes on locked screen
• Many possible actions
• Action choice by cloud logic
• Can be changed without any apparent sign on the device
• Might depend on Machine Learning
• Choice of action can be affected by unknown 3rd parties
Summary
16
17
Putting Murphy to Work
• Set up a research project with the
Technion
• Undergraduate students exploring
different aspects of the system
• Some avenues we explored
• Local input to Cortana
• Intents that invoke exploitable actions
• Intents that retrieve malicious
content
• Capabilities of 3rd party Cortana skills
18
Attacking Cortana
19
Cortana
Service
Speech to
Text
Text to Intent
(Action)
Cortana
Skill
Internet
3rd party
web
service
Cortana
Client
Speech
Text
Text
Intent + p
Intent + p
Card data
Speech
Text
Resolve!
Card
Action
Provider
(Azure
Bot)
Intent to
Card
(Azure
Bot)
Expressing bad
intents
Local commands
through lock screen
Malicious
skills
Bad content
provider
Open Sesame
20
CVE-2018-8140 (Open Sesame)
21
Grabbing
Information
CVE-2018-8140 (Open Sesame)
22
Taking
over
Open Sesame: Attack Model
• Impact:
• by Abusing The “Open Sesame” vulnerability, “Evil Maid” attackers can gain
full control over a locked machine
• Evil Maid attack model:
• Attackers have physical access for a limited time, but the Computer is locked
• Why it’s called Evil Maid?
• Think of the laptop you left in your room last night when you went out…
• But also borders control, computers in the office during breaks and night, …
• But isn’t that exactly what Locked Screen suppose to stop?
23
Lock Screen: You Had One Job
• Lock Screen is not magic!
• Lock Screen is merely another
“Desktop” ( Winlogon desktop )
with very limited access
• The security stems from the
reduced attack surface
• If Microsoft adds more apps on
Lock Screen: The attack surface
expands → security is reduced
24
Lock Screen Evolution : Then
25
Lock Screen Evolution: Now
26
“Open Sesame” Root Cause
• Lock screen restricts keyboard, but allows Cortana invocation through
voice
• Once Cortana is invoked, the Lock Screen no longer restricts it
• Cortana is free to accept input from the keyboard too
• The fix: Make Cortana Search UI state aware. Different behavior when
the UI is locked
• Shift of responsibility:
• In the past, the OS made sure the UI is not accessible when computer is
locked, therefore developers do not need to think about it.
• Now, it’s the developers’ responsibility
27
Disclosure Timeline
16 APR 18:
We report
CVE-2018-
8140 to MS
23 APR 18:
McAfee
reports
CVE-2018-
8140 to MS
12 JUN 18:
MS patch
(Very quick
+ Bug
Bounty!)
26 JUN 18:
We report
CVE-2018-
8369 to MS
28
“Open Sesame” Summary
• Impact: Evil Maid Attackers can gain full control on a locked machine
• The fix is
• Tactical: making Cortana Search aware of UI state
• Not Strategical: Cortana still gets keyboard input and launches processes from
a locked screen in some other scenarios
• There are more where it came from: CVE-2018-8369
• Design lessons: Adding more capabilities to Lock Screen is very
tempting, but dangerous
29
Cruel Intentions:
The Voice of Esau
30
Attacking Cortana: Cruel Intentions
31
Cortana
Service
Speech to
Text
Text to Intent
(Action)
Cortana
Skill
Internet
3rd party
web
service
Cortana
Client
Speech
Text
Text
Intent + p
Intent + p
Card data
Speech
Text
Resolve!
Card
Action
Provider
(Azure
Bot)
Intent to
Card
(Azure
Bot)
Expressing bad
intents
Local commands
through Lock Screen
Voice of Esau Attack
• Evil Maid Attack (First presented in Kaspersky SAS 2018)
• Attackers:
1. Achieve Man-in-the-Middle position: Plug into the network interface
2. Use Cortana on locked screen to invoke insecure (Non-HTTPS) browsing
3. Intercept request, respond with malicious payload
• Exploit browser vulnerabilities
• Capture domain credentials
32
The VOE Attack - Evil Maid (Local)
I’m in! but the
computer is locked!
Hi Cortana!
Go to bbc.com
Browse http://www.bbc.com
I’m BBC and here’s my
malicious payload!
http://www.bbc.com
33
The VOE Attack Demo
34
VOE Attack – Lateral movement
• Use initial compromise to install agent on compromised machine
• Achieve Man-in-the-Middle position
• Some local routing attack: e.g. ARP spoofing
• Invoke Cortana insecure browsing
• Play sound file – “GOTO BBC DOT COM”
• RDP (Remote Desktop Protocol) sound file to target
• NLA must be disabled for it to work
• Intercept traffic of targeted machines and compromise, as in before.
35
RDP: A Silent Killer
36
Cortana over RDP Demo
37
VOE Disclosure Timeline
16 JUN 17:
We report
VOE to MS
29 JUN 17:
MS Cloud
patch (no
CVE)
8 MAR 18:
Our talk @
Kaspersky
SAS
25 JUN 18:
We report
CVE-2018-
8271 (and
more) to MS
38
The Voice of Esau
• Impact: Evil Maid or even remote attacker can invoke unsafe
browsing on a locked machine. Using additional vulns attacker can
gain full control
• The fix is
• Tactical: making Cortana cloud aware of UI state and safely Bing instead of
direct browse in certain scenarios
• Not Strategical: Cortana may still allow unsafe browsing in some other
scenarios
• There are more where it came from: CVE-2018-8271 (and more)
• Design lessons: Adding more capabilities to Lock Screen is tempting
but dangerous
39
Skill of Death
40
Skill of Death
• VOE attack took advantage of
existing intent resolution
mechanisms
• What about adding our own
interpretation mechanism?
• Skills interact with client through
cards
• Cards have “limited
functionality”
41
Navigate to an attacker controlled
server
Open malicious MS Office document
Skill of Death – Limited Functionality
42
Skill of Death
43
Skill of Death
• How can attacker invoke a
“malicious” skill?
• Invoking a new skill on a machine
requires user consent
• Cortana Skill can be invoked and
granted consent from locked
screen!
44
Skill of Death
45
Skill of Death
• Timeline
• Authorization of skills in locked screen detected March 2018
• Guy Feferman and Afik Friedberg of The Technion, Israel
• Takeover methods detected June 2018
• Natanela Brod and Matan Pugach of the Technion, Israel
• Fixed on June 25th 2018
• Fixed in the cloud
• No formal announcement of fix
• Skills can no longer be INVOKED (authorized or not) from locked screen
• Adding functionality on locked screen is a slippery slope
• Soon you find yourself allowing NON Microsoft code to run over locked screen
46
Protection
47
Preventing Voice Attacks:
Speaker Identification
• Respond only to me
• “try” doesn’t sound very
reassuring
• “Hey Cortana” can be easily
recorded
• Can be subverted, see other talk
48
Preventing Voice Attacks:
Compensating Controls Take 1
• Take 1: Put a security
Microphone on each room?
• Disadvantages:
• Privacy
• Cost
• Audio directionality
• Audio semantics
• Not all attacks are audible
• Detection only
49
Preventing Voice Attacks:
Compensating Controls Take 2
• NewSpeak: a Network-based Intercepting proxy
• TLS/SSL certificate must be installed on monitored devices
• In many organization already exists for web gateway monitoring, DLP
• Can monitor all Cortana requests and responses
• Origin details: IP, computer name, user, UI State, etc.
• Request audio and Text to Speech results
• Intents and Action cards
• Can block or modify all Cortana requests and responses
• Much better than previous suggestion: Centrally located, does not
rely on audio analogic capture, can mitigate not just detect
50
Network monitoring with NewSpeak
51
I’m the NewSpeak Proxy
Hi Cortana!
Go to cnn.com
Browse http://www.cnn.com
Browse
http://www.foxnews.com
NEWspeak: DEMO
52
Summing up
53
Summary: Attacking Cortana
54
Cortana
Service
Speech to
Text
Text to Intent
(Action)
Cortana
Skill
Internet
3rd party
web
service
Cortana
Client
Speech
Text
Text
Intent + p
Intent + p
Card data
Speech
Text
Resolve!
Card
Action
Provider
(Azure
Bot)
Intent to
Card
(Azure
Bot)
Expressing bad
intents
Local commands
through Lock Screen
Malicious
skills
Bad content
provider
Takeaways: Defenders
• For the time being:
• Disable Cortana voice in corporate
environments
• Or at least on locked screen
• Reconsider when compensating
controls are there
• “voice firewall”: If voice
becomes mainstream,
considering specialized solutions
is a must for corporate adoption
55
https://www.pcgamer.com/how-to-disable-cortana/
Takeaways: Builders & Breakers
• New interfaces are much more than “just an interface”
• When introducing innovative concept into existing environments
• Secure Coding is not enough
• We need Secure System Engineering
• We found 3 different CVEs and numerous issues that enables
attackers to bypass the lock screen
56
Questions?
57

More Related Content

What's hot

Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applicationsmgianarakis
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testingeightbit
 
Mobile Security Assessment: 101
Mobile Security Assessment: 101Mobile Security Assessment: 101
Mobile Security Assessment: 101wireharbor
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
 
Security Best Practices for Mobile Development @ Dreamforce 2013
Security Best Practices for Mobile Development @ Dreamforce 2013Security Best Practices for Mobile Development @ Dreamforce 2013
Security Best Practices for Mobile Development @ Dreamforce 2013Tom Gersic
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of ThingsDavid Strom
 
CNIT 128: Android Implementation Issues (Part 2)
CNIT 128: Android Implementation Issues (Part 2)CNIT 128: Android Implementation Issues (Part 2)
CNIT 128: Android Implementation Issues (Part 2)Sam Bowne
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)Justin Hoang
 
CNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android ApplicationsCNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android ApplicationsSam Bowne
 
Dark Side of iOS [SmartDevCon 2013]
Dark Side of iOS [SmartDevCon 2013]Dark Side of iOS [SmartDevCon 2013]
Dark Side of iOS [SmartDevCon 2013]Kuba Břečka
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...eightbit
 

What's hot (11)

Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
 
Mobile Security Assessment: 101
Mobile Security Assessment: 101Mobile Security Assessment: 101
Mobile Security Assessment: 101
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Security Best Practices for Mobile Development @ Dreamforce 2013
Security Best Practices for Mobile Development @ Dreamforce 2013Security Best Practices for Mobile Development @ Dreamforce 2013
Security Best Practices for Mobile Development @ Dreamforce 2013
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
CNIT 128: Android Implementation Issues (Part 2)
CNIT 128: Android Implementation Issues (Part 2)CNIT 128: Android Implementation Issues (Part 2)
CNIT 128: Android Implementation Issues (Part 2)
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)
 
CNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android ApplicationsCNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android Applications
 
Dark Side of iOS [SmartDevCon 2013]
Dark Side of iOS [SmartDevCon 2013]Dark Side of iOS [SmartDevCon 2013]
Dark Side of iOS [SmartDevCon 2013]
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
 

Similar to Open Sesame: Picking Locks with Cortana

THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES   THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES Tal Be'ery
 
Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Priyanka Aash
 
CS155 Computer Security at Stanford University
CS155 Computer Security at Stanford UniversityCS155 Computer Security at Stanford University
CS155 Computer Security at Stanford UniversityRick Patterson
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsn|u - The Open Security Community
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCanSecWest
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine LearningAvast
 
IBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointLuis Grangeia
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon chinaPeter Hlavaty
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...Felipe Prado
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface DevicePositive Hack Days
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Zoltan Balazs
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud preventionYury Leonychev
 
Alexa and Cortana in Windowsland - OWASP Global AppSec Tel-Aviv, May 2019
Alexa and Cortana in Windowsland - OWASP Global AppSec Tel-Aviv, May 2019Alexa and Cortana in Windowsland - OWASP Global AppSec Tel-Aviv, May 2019
Alexa and Cortana in Windowsland - OWASP Global AppSec Tel-Aviv, May 2019Yuval Ron
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 

Similar to Open Sesame: Picking Locks with Cortana (20)

THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES   THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
 
Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.
 
BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet
 
CS155 Computer Security at Stanford University
CS155 Computer Security at Stanford UniversityCS155 Computer Security at Stanford University
CS155 Computer Security at Stanford University
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
Internet security
Internet securityInternet security
Internet security
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine Learning
 
Luis Grangeia IBWAS
Luis Grangeia IBWASLuis Grangeia IBWAS
Luis Grangeia IBWAS
 
IBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's Standpoint
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon china
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
 
Alexa and Cortana in Windowsland - OWASP Global AppSec Tel-Aviv, May 2019
Alexa and Cortana in Windowsland - OWASP Global AppSec Tel-Aviv, May 2019Alexa and Cortana in Windowsland - OWASP Global AppSec Tel-Aviv, May 2019
Alexa and Cortana in Windowsland - OWASP Global AppSec Tel-Aviv, May 2019
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 

Open Sesame: Picking Locks with Cortana

  • 1. Open Sesame: Picking Locks with Cortana Ron Marcovich, Yuval Ron, Amichai Shulman, Tal Be'ery 1
  • 2. Amichai Shulman • Independent Security Researcher • Advisor for multiple cyber security start up companies • Former CTO and Co-Founder of Imperva • Blackhat, RSA, Infosec speaker • @amichaishulman Tal Be’ery • Co-Founder @ Kzen Networks • Formerly VP Research @Aorato (Acquired by Microsoft), Imperva, Singtel Innov8 VC • Blackhat, RSA, SAS speaker • @talbeerysec 2 Who are we?
  • 3. Also Featuring… Yuval Ron Twitter: @RonYuval LinkedIn: ronyuval Ron Marcovich Twitter: @RonMarcovich LinkedIn: ronmarcovich B.Sc. Software Engineering students at the Technion, Israel Institute of Technology. Both will start their M.Sc. In Computer Science this year. 3
  • 4. Agenda • Understanding Cortana • What is it, how does it work and key elements • Attacking Cortana on all fronts • Cortana agent: Open Sesame (CVE-2018-8140) • Cortana actions: The voice of Esau • Cortana cloud: Malicious skills • Protecting against Cortana attacks • Voice Firewalls: NewSpeak • Summary and Conclusions 4
  • 6. What is Cortana? • "Your intelligent assistant across your life." • Translate human intent into computer actions • Retrieve data • Browse the web • Launch programs 6
  • 7. What is Cortana? • Multi-platform: Mobile, PC, devices • Multi inputs (“intents”): keyboard, mouse, voice, touch, … 7
  • 8. Cortana Architecture 8 Cortana Service Speech to Text Text to Intent (Action) Cortana Skill Internet 3rd party web service Cortana Client Speech Text Text Intent + p Intent + p Card data Speech Text Resolve! Card Action Provider (Azure Bot) Intent to Card (Azure Bot)
  • 9. Cortana Architecture - Example 9 Cortana Service Speech to Text Text to Intent (Action) Action Provider (Azure Bot) Internet 3rd party web service Cortana Client Speech Who is George Washington Who is George Washington Search Query = “George Washington” Card data Speech Who is George Washington Resolve! Action Provider (Azure Bot) Intent to Card (Azure Bot) Search Query = “George Washington”
  • 10. Cortana Agent • Very fat Client • Can do a lot of stuff! • Merely an execution engine • Exposes a powerful Javascript API • Works on a locked devices • By Default! • SpeechRuntime.exe listens for “Hey Cortana” • SearchUI.exe has the “Cortana Logic” 10
  • 11. Cortana Cloud Service • Processing and decision making is done in the cloud • Two phases • Audio processing – Speech to Text • wss://websockets.platform.bing.com/ws/cu/v3 • Binary + JSON • Semantic processing – Text to Intent & Intent to Card • https://www.bing.com/speech_render - GET request, HTML response • https://www.bing.com/DialogPolicy - GET / POST request, Javascript response • Machine Learning • Improve speech recognition • Extend intent resolution capabilities 11
  • 12. Audio Processing Phase Client Server Connection.context(JSON) Audio stream (BIN) IntermediateResult (XML) Audio stream (BIN) IntermediateResult (XML) Audio stream (BIN) Audio.stream.hypothesis PhraseResult (XML) 12
  • 14. Cortana Skills • Cortana can be extended with cloud based “skills” • A Skill is an Azure bot registered to the Cortana channel • Receive all user input after an invocation name • Interacts with the Cortana client using Cards that include voice, text and LIMITED COMMANDS 14
  • 16. • Fat client executes on locked screen • Many possible actions • Action choice by cloud logic • Can be changed without any apparent sign on the device • Might depend on Machine Learning • Choice of action can be affected by unknown 3rd parties Summary 16
  • 17. 17
  • 18. Putting Murphy to Work • Set up a research project with the Technion • Undergraduate students exploring different aspects of the system • Some avenues we explored • Local input to Cortana • Intents that invoke exploitable actions • Intents that retrieve malicious content • Capabilities of 3rd party Cortana skills 18
  • 19. Attacking Cortana 19 Cortana Service Speech to Text Text to Intent (Action) Cortana Skill Internet 3rd party web service Cortana Client Speech Text Text Intent + p Intent + p Card data Speech Text Resolve! Card Action Provider (Azure Bot) Intent to Card (Azure Bot) Expressing bad intents Local commands through lock screen Malicious skills Bad content provider
  • 23. Open Sesame: Attack Model • Impact: • by Abusing The “Open Sesame” vulnerability, “Evil Maid” attackers can gain full control over a locked machine • Evil Maid attack model: • Attackers have physical access for a limited time, but the Computer is locked • Why it’s called Evil Maid? • Think of the laptop you left in your room last night when you went out… • But also borders control, computers in the office during breaks and night, … • But isn’t that exactly what Locked Screen suppose to stop? 23
  • 24. Lock Screen: You Had One Job • Lock Screen is not magic! • Lock Screen is merely another “Desktop” ( Winlogon desktop ) with very limited access • The security stems from the reduced attack surface • If Microsoft adds more apps on Lock Screen: The attack surface expands → security is reduced 24
  • 27. “Open Sesame” Root Cause • Lock screen restricts keyboard, but allows Cortana invocation through voice • Once Cortana is invoked, the Lock Screen no longer restricts it • Cortana is free to accept input from the keyboard too • The fix: Make Cortana Search UI state aware. Different behavior when the UI is locked • Shift of responsibility: • In the past, the OS made sure the UI is not accessible when computer is locked, therefore developers do not need to think about it. • Now, it’s the developers’ responsibility 27
  • 28. Disclosure Timeline 16 APR 18: We report CVE-2018- 8140 to MS 23 APR 18: McAfee reports CVE-2018- 8140 to MS 12 JUN 18: MS patch (Very quick + Bug Bounty!) 26 JUN 18: We report CVE-2018- 8369 to MS 28
  • 29. “Open Sesame” Summary • Impact: Evil Maid Attackers can gain full control on a locked machine • The fix is • Tactical: making Cortana Search aware of UI state • Not Strategical: Cortana still gets keyboard input and launches processes from a locked screen in some other scenarios • There are more where it came from: CVE-2018-8369 • Design lessons: Adding more capabilities to Lock Screen is very tempting, but dangerous 29
  • 31. Attacking Cortana: Cruel Intentions 31 Cortana Service Speech to Text Text to Intent (Action) Cortana Skill Internet 3rd party web service Cortana Client Speech Text Text Intent + p Intent + p Card data Speech Text Resolve! Card Action Provider (Azure Bot) Intent to Card (Azure Bot) Expressing bad intents Local commands through Lock Screen
  • 32. Voice of Esau Attack • Evil Maid Attack (First presented in Kaspersky SAS 2018) • Attackers: 1. Achieve Man-in-the-Middle position: Plug into the network interface 2. Use Cortana on locked screen to invoke insecure (Non-HTTPS) browsing 3. Intercept request, respond with malicious payload • Exploit browser vulnerabilities • Capture domain credentials 32
  • 33. The VOE Attack - Evil Maid (Local) I’m in! but the computer is locked! Hi Cortana! Go to bbc.com Browse http://www.bbc.com I’m BBC and here’s my malicious payload! http://www.bbc.com 33
  • 34. The VOE Attack Demo 34
  • 35. VOE Attack – Lateral movement • Use initial compromise to install agent on compromised machine • Achieve Man-in-the-Middle position • Some local routing attack: e.g. ARP spoofing • Invoke Cortana insecure browsing • Play sound file – “GOTO BBC DOT COM” • RDP (Remote Desktop Protocol) sound file to target • NLA must be disabled for it to work • Intercept traffic of targeted machines and compromise, as in before. 35
  • 36. RDP: A Silent Killer 36
  • 37. Cortana over RDP Demo 37
  • 38. VOE Disclosure Timeline 16 JUN 17: We report VOE to MS 29 JUN 17: MS Cloud patch (no CVE) 8 MAR 18: Our talk @ Kaspersky SAS 25 JUN 18: We report CVE-2018- 8271 (and more) to MS 38
  • 39. The Voice of Esau • Impact: Evil Maid or even remote attacker can invoke unsafe browsing on a locked machine. Using additional vulns attacker can gain full control • The fix is • Tactical: making Cortana cloud aware of UI state and safely Bing instead of direct browse in certain scenarios • Not Strategical: Cortana may still allow unsafe browsing in some other scenarios • There are more where it came from: CVE-2018-8271 (and more) • Design lessons: Adding more capabilities to Lock Screen is tempting but dangerous 39
  • 41. Skill of Death • VOE attack took advantage of existing intent resolution mechanisms • What about adding our own interpretation mechanism? • Skills interact with client through cards • Cards have “limited functionality” 41
  • 42. Navigate to an attacker controlled server Open malicious MS Office document Skill of Death – Limited Functionality 42
  • 44. Skill of Death • How can attacker invoke a “malicious” skill? • Invoking a new skill on a machine requires user consent • Cortana Skill can be invoked and granted consent from locked screen! 44
  • 46. Skill of Death • Timeline • Authorization of skills in locked screen detected March 2018 • Guy Feferman and Afik Friedberg of The Technion, Israel • Takeover methods detected June 2018 • Natanela Brod and Matan Pugach of the Technion, Israel • Fixed on June 25th 2018 • Fixed in the cloud • No formal announcement of fix • Skills can no longer be INVOKED (authorized or not) from locked screen • Adding functionality on locked screen is a slippery slope • Soon you find yourself allowing NON Microsoft code to run over locked screen 46
  • 48. Preventing Voice Attacks: Speaker Identification • Respond only to me • “try” doesn’t sound very reassuring • “Hey Cortana” can be easily recorded • Can be subverted, see other talk 48
  • 49. Preventing Voice Attacks: Compensating Controls Take 1 • Take 1: Put a security Microphone on each room? • Disadvantages: • Privacy • Cost • Audio directionality • Audio semantics • Not all attacks are audible • Detection only 49
  • 50. Preventing Voice Attacks: Compensating Controls Take 2 • NewSpeak: a Network-based Intercepting proxy • TLS/SSL certificate must be installed on monitored devices • In many organization already exists for web gateway monitoring, DLP • Can monitor all Cortana requests and responses • Origin details: IP, computer name, user, UI State, etc. • Request audio and Text to Speech results • Intents and Action cards • Can block or modify all Cortana requests and responses • Much better than previous suggestion: Centrally located, does not rely on audio analogic capture, can mitigate not just detect 50
  • 51. Network monitoring with NewSpeak 51 I’m the NewSpeak Proxy Hi Cortana! Go to cnn.com Browse http://www.cnn.com Browse http://www.foxnews.com
  • 54. Summary: Attacking Cortana 54 Cortana Service Speech to Text Text to Intent (Action) Cortana Skill Internet 3rd party web service Cortana Client Speech Text Text Intent + p Intent + p Card data Speech Text Resolve! Card Action Provider (Azure Bot) Intent to Card (Azure Bot) Expressing bad intents Local commands through Lock Screen Malicious skills Bad content provider
  • 55. Takeaways: Defenders • For the time being: • Disable Cortana voice in corporate environments • Or at least on locked screen • Reconsider when compensating controls are there • “voice firewall”: If voice becomes mainstream, considering specialized solutions is a must for corporate adoption 55 https://www.pcgamer.com/how-to-disable-cortana/
  • 56. Takeaways: Builders & Breakers • New interfaces are much more than “just an interface” • When introducing innovative concept into existing environments • Secure Coding is not enough • We need Secure System Engineering • We found 3 different CVEs and numerous issues that enables attackers to bypass the lock screen 56