Blog

Cortana May Have Flaw Allowing Unauthorized System Access 

Aug 22, 2018 | Blog

Researchers at McAfee have demonstrated a method that hackers could use to perform an end-run around Cortana and access data, run malicious code, or even change a locked computer’s password.  In this case, however, the emphasis is on the word “could.”

The researchers readily admit that this attack is high risk, has never been seen in the wild, and has little possibility of going undetected for a variety of reasons.  Even so, the research is disturbing and does point to a valid weakness that bears further investigation.

The setup process alone is daunting.  First, the attacker would need to perform a significant amount of advance preparation. This includes going so far as to create a Wikipedia entry that could get past that site’s army of talented editors and fact checkers, and then somehow inserting a link to a poisoned/compromised domain in the entry.  That alone would be a challenge.

Once the Wiki page was up, with the poisoned link at the ready, the attacker would need physical access to the device in question.

Then, the user would have to have Cortana enabled from the lock screen.

Assuming that hurdle was also cleared, the attacker could begin asking Cortana questions, which would prompt her to search the web for information about the topic being inquired after.

Cortana is designed in such a way that if web-based resources are needed to answer the query, it will look for a Wiki Page and display the link found there.

If the hacker succeeded in doing all of that, Cortana would access the poisoned web page via a scaled down version of Internet Explorer 11, which would then allow the hackers to send malicious code via the now-established connection.

Is this a real threat?  Absolutely.  It is within the realm of possibility that a hacker could do everything described above.

Is this even remotely plausible?  No.  There are simply too many points of failure for this to be considered a genuine threat, as underscored by the fact that nobody has ever seen anything like this in the wild.

Hackers tend to prefer simple, elegant solutions.  While it’s not outright impossible to imagine a hacker giving this a go just for fun, it’s hard to see this as an emerging threat, or something to be greatly concerned about.

FBI Program Tasked with Infrastructure Security Compromised

FBI Program Tasked with Infrastructure Security Compromised

The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program's data on the dark web. The breach was initially disclosed by Brian Krebs of Krebs on Security, who claims that the data was for...

Streamline Your Business with the Latest Smart Home Technology

Streamline Your Business with the Latest Smart Home Technology

Are you a business owner looking to get the most out of your Google smart home devices? If so, you're in luck! Google has enabled its Nest products and Android OS with the initial rollout of the Matter smart home standard. This means that businesses now have the...

Data Breach at Sequoia One Exposes Sensitive Customer Information

Data Breach at Sequoia One Exposes Sensitive Customer Information

What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they were informed that the company had been hacked. Sequoia One specializes in the management of...

Cisco Reports Critical IP Phone Vulnerability

Cisco Reports Critical IP Phone Vulnerability

As a business owner, it's important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability, tracked as CVE-2022-20968, affecting its IP Phone 7800 and 8800 Series. This new vulnerability...

Google Chrome Releases Two New Features

Google Chrome Releases Two New Features

Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer's memory. This can be a problem if you're running other resource-intensive tasks and don't want to slow...

Get a Free Consultation

 

Fill out the form below to receive a free consultation and learn how we can make your technology worry-free!

 

Contact Information

  • 39301 Badger Street, Suite 500
    Palm Desert, CA 9221
  • (760) 333-8523
  • info@icn.tech