Hacker News new | past | comments | ask | show | jobs | submit login
Sharking: High-Rollers in the Crosshairs (f-secure.com)
142 points by sdoering on Dec 11, 2013 | hide | past | favorite | 41 comments



Another great read from the F-Secure folks.

From the code snippet, it seems Toolkit.getDefaultToolkit.getScreensize() doesn't account for external monitors - only the primary display. Targeted malware you'd think would use getScreenDevices() or something to account for that - I'd always imaged professional online poker player 'sat' at many tables at once ...presumably using multiple monitors.


I've known online poker players who can play up to 8 at a time, just flipping around on individual windows in 1 screen. I think a lot depends on the stakes of the table, and the style of play. Someone playing aggressive with small stacks on moderate stakes doesn't need to pay attention to the level of someone playing with a large pile in high stakes games.

Since poker is a zero sum game, many pros find it more profitable to be spread out amongst multiple games of amateurs at modest stakes, than at a high risk high stakes table. (Collecting pennies rather than fighting over dollars, or predictable farming versus unpredictable hunting)


High stakes players (best targets for such attacks) usually don't play more than 3-4 tables at once - there just isn't enough action nowadays, and with hundreds of thousands of dollars on the line, even they (they are often multitasking gods by an ordinary human standard) ackonwledge that focusing on smaller number of tables might be a good idea...


That's an interesting catch. I'm guessing the gap was because the attacker commissioned the software at low cost, and didn't spot the problem. That said, the attack would still work well because Jeans plays nosebleed stakes[1], so he's not likely to be playing a huge number of games at a time, and he travels regularly for live games so he's likely to be on a standalone laptop.

Multi-monitor setups are very common in the poker world, but the primary monitor would get you a long way. After all, if you sit with him and realize your table isn't on his main screen, you could sit out.

I'm quite glad he thought to drop his computer at F-Secure.

[1] example hands from his online games: http://www.highstakesdb.com/poker-hands.aspx?=&sort=potsize&...


For those not into poker slang (like me, I had to google it):

Nosebleed refers to very high stakes games where the minimum stake is usually over 200$/400$ per round and more, with an open end ;).


And for those who have a slightly better poker vocabulary, it's games where the blinds (antes) are $200/$400.

Your actual stake on the table will be ~$40,000 in that game.


F-Secure is a prime example how company blogging should be done. They have a lot of interesting posts about and around their core subject, but they manage to avoid the vibe that you get from typical startup blog posts that somebody is trying to sell you something.

And it isn't just blogging, it's their public presence in general- Mikko Hyppönen's talks (like his TEDx talk about NSA) are genuinely interesting.


It would be interesting to know what type of door locks the hotel used. There's been numerous attacks on hotel door locks recently [1], and the current situation appears to be that a sizeable proportion of hotel door locks are incredibly vulnerable. It's a good reminder that if you have a security requirement, use full disk encryption.

[1]: http://www.extremetech.com/computing/133448-black-hat-hacker...


>It's a good reminder that if you have a security requirement, use full disk encryption

If someone can gain repeated access to your hotel room, full disk encryption is vulnerable to the so-called "evil maid attack". Basically, someone comes to your room, boots from a thumb drive, and installs their own bootloader on the machine. When you return, everything will appear normal to you, but the bootloader can do any amount of mischief. For example, it can log the password you enter to log in and store it. Or they can have the spyware mentioned in the article install once you log in.

Later, they come back, wipe the bootloader, and leave your system apparently in its original state (but with spyware installed). The only difference now is that you may think you've foiled their attack because of the full disk encryption, and fail to investigate further.


Easy: use cloud storage with 2-factor authentication.


That will weaken the attack, make it a little more difficult, but it won't thwart it.


Easy: buy a new computer every day.


  "use another laptop/device for that, they're relatively cheap"


That still won't matter if you leave the important laptop in your hotel room.


Having following this story since July, it was almost certainly an inside job and the perpetrator had access to the rooms (cleaner or other staff).


That was my first thought when I read the story too.

I bet non casino hotels pay way less attention to security I suspect that the vegas hotels would have caught the perp on camera - and in these more enlightend times they might even have survived :-)


not necessarily. since he had to rekey the card... someone just showed up with any for of ID, or not even that, on the front desk and claimed that another random card they acquired by any other means (i collect those when i stay) wasn't opening the door. easy as that.


I came into a Las Vegas hotel one morning around 7am... literally drunk as a skunk and looking really rough... I told the concierge I didn't have any ID or a key to my room... She asked me what was in the room, I said a backpack. She then proceeded to give me a new key and open my door for me.

I could have been any random drunk who stumbled into that hotel that morning.


Security was sent up every time I have been locked out of a hotel room. They're always happy to open the door for me, but won't leave until I satisfactorily identify myself (with ID that is usually locked in the room).


Wow, that never happened to me. I always get the card re-keyed without any kind of security. And that is from low 3 stars to 4 stars hilton and Cliff in SF to name a few.


Maybe I look sufficiently sketchy for enhanced screening!



> if you have a security requirement, use full disk encryption

By this do you mean something along the lines of "if you have something worth protecting, do it the right way / all the way"? Interesting phrase.


Yes, basically. Having your computer actually at risk of physical attack is very unlikely for most people (given that most people aren't worth the bother), but if you are in a situation where an attacker could gain physical access to your computer, and that physical access could lead to significant loss (whether of property, money or valuable information) then the hassle involved in full disk encryption is minimal compared to the potential for loss.


They probably should have checked the term "sharking" before calling it - http://www.urbandictionary.com/define.php?term=sharking - big in Japan a few years ago.



I'd assume it derives from "card shark", a term which long predates any crazy Japanese thing.

("Card shark" is, of course, a corruption of "card sharp", but an old and well-established one.)


I had heard of casino "sharks" before, but I'd never heard of what you linked to before.

Also, I hope offenders are treated to severe punishment or jail time in Japan (unless it's done with the woman's consent, which I doubt). I can't believe it's serious enough to merit its own term.


How does a particular type of sexual assault become so commonplace that it warrants its own slang term?


Welcome to the Patriarchy.


Maybe it was done deliberately?


I'd say: both activities involve the exposure of bits the owner wants to keep private.


The innovation of criminal enterprises continues to impress me. This is why I love reading about security, espionage, and crime. It's industries like these that open me up to the possibility that maybe my laptop is compromised, my line is insecure, my servers are tapped, my phones are tapped, my car is bugged, people who contact me might be social engineers, and so on and so forth. You get a much better handle on reality by looking at what the dark side is doing.


Putting the computer in a safe is a good idea, assuming it doesn't have a backdoor. Full disk encryption alone won't be good enough in a hotel, due to the "Evil Maid Attack": https://www.schneier.com/blog/archives/2009/10/evil_maid_att...


Lots of hotel safes (with the electronic locks) have a default password known to the staff, so they can get in after a guest has checked out and forgotten an item in the safe, or the guest has forgotten the password they chose. I would regard hotel safes as only slightly better than leaving your laptop on the nightstand.


Exactly. So if you want to avoid an evil maid attack, you're basically going to have to lug around your own safe, or keep your laptop with you at all times.


Perhaps this would be the sort of situation where you boot from read-only USB stick, or LiveCD.


Fine, but how would you verify your read-only USB stick or LiveCD before use?

Theoretically someone could sneak and replace the LiveCD with one that looks identical but is infected with the required malware[1].

Carrying it on you, or locking it in the safe in the room[2], might mitigate that I suppose.

1. Sneak in once, steal a copy of the USB/LiveCD contents, go away and create a new version infected with malware, sneak in again and swap them over.

2. Not really safe as one previous link on HN showed.


This seems like something where Secure Boot, with user-provided keys, would really be handy. Create a key pair and tell your computer to only boot from stuff signed with your own key, then it will refuse to boot from a tampered USB stick or CD.


AFAIK, that can be somewhat problematic for windows. Why windows you ask? Most poker clients are windows only. It's probably possible to boot windows from a LiveCD, but when I looked at it in the past, it wasn't straightforward.


Stars and Tilt are both native to Windows and OS X and both can run on Linux with Wine.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: