With record sales of 4 million copies during the first week, Watch Dogs instantly entered the top ranks of the videogaming industry, thanks to immersive gameplay and a quite unusual concept. The entire game mechanics are based on hacking smart city devices ― ATMs, gates, traffic lights, surveillance cameras ― to achieve the player’s goals. Ubisoft developers were aiming to be realistic in their script, allowing the player only kinds of hacking that are actually achievable in real life. No wonder they’ve asked Kaspersky Lab experts to assess the game script and adjust the hacking aspect. Now, when the game is out, many players keep asking, what are the IRL analogues of the game hacks, do such hacking tricks really exist. We’ve gathered your questions from our Facebook page and asked Igor Soumenkov, a Kaspersky Lab security expert, to tell the truth about Watch Dogs hacks.
How close is our reality from the fiction in the game?
Although some of the hacks are very similar to those happening in the real world, it’s still a game, a simulation. It’s crucial to understand that Watch Dogs doesn’t teach you hacking, but you can experience how powerful a hacking tool could be.
Among hacks that we see in the game and that can be met in real life are:
– interception (Sniff Passwords and Wifi Packets on Android),
– ATM/POS hacks (ATM malware, controlled by a text message, spews cash),
– Hacking cars (Charlie Miller and Chris Valasek demonstrated this);
– Controlling the city – traffic lights / blackouts (Has New York’s traffic light system been HACKED?)
Here is the list of #Watchdogs hacks that can be met in real life: read onTweet
Is it really possible to hack all these things using a mobile phone?
Of course, in real life, hacks are about a lot more preparation from the criminals’ side – it’s not about tapping on smartphone, using ready-to-go exploits.
For example, how ATM attacks happen: criminals load an exploit and some malware onto a removable USB device. After connecting the USB device to the ATM, the exploit allows the intruders to gain high-level system privileges and launch the malware. It could be a backdoor controlling the ATM’s OS, for instance. After that the ATM is effectively hacked – all that remains is for the criminals to pick up the money from this ATM. The final stage ― making an ATM spill out banknotes ―could be activated by a smartphone too.
Don`t you think that cybercriminals can use the game for their own ideas to hack and control a big city?
We hope that this game will be a chance for people to think about the security of future city operating systems. Security must be considered seriously in such cases. The game is an interesting simulation of how this might run if it’s misused.
Can you name one real-life security incident which can be considered the scariest?
Most of the hacks that you see in the game are about automated control systems being compromised. This is a new and scary trend that started several years ago, since the appearance of the Stuxnet worm, which hit industrial control systems. It was an example of how a computer program can break things in the real world. They actually broke physical equipment. And that’s what we see in the game. It’s becoming more and more realistic.
How high are the possibilities of a cyberattack on an online game
Such a risk does exist, and its graveness depends on the type of the game you are playing and the way you behave both when gaming and in real life. For over 10 years Trojans have been able to steal, for instance, a gamer’s virtual properties of characters. Nowadays, Trojans are incredibly flexible, with numerous options targeting different realms of your digital life: they can choose whether or not they wish to steal you Skype password, or have a separate setting to target specifically game passwords. The latter helps them to hack and hijack gaming accounts.
It happens so that the hackers aim at game developers as well as at gamers, but with a different purpose of stealing intellectual property, creating illegal online gaming servers and so on.
In Decryption multiplayer mode… When different players are close to each other, it speeds up the process of decryption. Can that be done in real life as I’ve heard different devices can pair wirelessly to share their processing power! How’s that?
That is correct. There are computational processes which are handled more quickly when using shared resources. The password attack is a workload of this type. One can distribute a single workload for simultaneous processing on different devices. There is a choice of readily available software, but also it is quite doable to develop a separate app which would help to share the task on a number of devices found on a wireless network.
What do you think the single biggest obstacle toward implementing a true “smart city” as seen in #Watch Dogs would be?
The obstacles of the technology realm are not that significant. It all boils down to administrative rights. In Watchdogs’ virtual Chicago, stop lights, gas pipes, ATM machines, surveillance systems, and bascule bridges are all interconnected in a single network. What it means is that a single organization is responsible for the entire infrastructure and has a single data center.
In real life, all these systems are managed by different organizations. Take ATM machines: each bank has a separate network of ATMs. So, the biggest obstacle in real life would most likely lie in the process of uniting all these disparate businesses and organizations under the same roof in the same data center.
On the other hand, on bringing the systems together the soft spot is in the price of a mistake: when hacked, a system runs a higher risk of grave and negative consequences. But at the same time, the interconnected nature of a system makes it easier to protect. There is a concept of ‘the attack surface’: the less the number of companies, the fewer servers there are, and the less the attack surface. Or, in other words, a security company has to protect a single data center spending fewer resources.
Rumor has it that today’s hardware used for hacking requires minimal budget yet can be successfully used for hacking entire city infrastructure. What is your opinion on that?
Speaking about hacking ‘the entire city infrastructure’, as I have already said, we have no single system to manage the life of a city in its entirety. We have many disparate infrastructures: a network of speed cameras, a network of ATMs, and so on. That makes it impossible to hack the entire city infrastructure. On the question of the hardware, it is in most cases a secondary thing – a hacker can work even with an entry-level PC that costs $100. What you really need is a monitor, a keyboard, an operational system, and knowledge and tools. The tools are easily found on the Internet, both freeware and premiumware, or otherwise created.
Which mobile device is the best one for hacking?
Manipulation of this kind require a smartphone with special privileges to OS, whether a rooted Android phone or a jailbroken iPhone. Such devices allow a hacker to change the MAC address of the line card and, among other things, to work on a deeper level of the network. But it is not the device that matters; the most important thing is a set of apps, and specialized tools are available both for Android and iOS.
Do you think it could be possible in the future that one company could control a whole city and a small group of rebels could be trying to hack into their system?
A company taking control over the entire city… Sounds not likely to me. At least it does not go in line with the interest of the business community: each organization wants to have control over its realm, and is not really into monopolies. So the idea for this kind of future for Chicago is not realistic: granting control over everything to one company contradicts the rules of healthy competition, after all. So there is no reason to think that the idea of the game can be applied in real life.
But when speaking of the so-called ‘smart cities’, we are gradually getting there. But this is another thing: even in this case, the infrastructure will be managed by different organizations with difference zones of responsibility.
What are your tips for players trying to hack other’s single-player games?
We were responsible for topics covering game and security in the real world, so please address the questions on the gaming process and tips to Ubisoft 🙂
Do physical hacking devices exist? Like blue boxes from the late 70s.
Of course, and there are many. Take ‘plug computers’ which are the size of a tablet or old phone chargers! They are just plugged into the electric outlet and connect to Internet. There is a whole family of these devices: guru plug, dream plug, etc. They all are fully functional tiny PCs designed with the purpose of running safety tests for networks, for one instance. There is a so-called ‘pawn plug’ – this little box is set to automatically scan the network, find vulnerabilities and prepare reports, respectfully.
Is there a difference between hacking a PC and hacking, let’s say, an air conditioner or a traffic light?
All these devices, though not sure about the air conditioner, are connected, in some respect – and I am talking of stop lights, lift gates, bascule bridges. They are connected to computers, or controllers, which are, in turn, managed by operators. That means hacking the stop light requires hacking the operator’s PC. This is the most feasible approach, and it is, in its essence, applied in Watch Dogs – it is about hacking operators’ or the managing organization’s computers.
Were there any interesting hacks wiped out from the game and why?
Since we specialize in stopping cyber threats and people wishing to manipulate or abuse hyper connectivity/IT systems, we were able to provide technical consultation and recommendations for the theoretical cyber-scenarios in the game, both during in-game play and in character/plot developments. We reviewed the script and provided suggestions on what we thought was accurate or what could be tweaked, edited or changed to make the gameplay or plot development more authentic (technically).
We did not delete anything from the scenario. When we were given a script, there was some set of hacks already in place. We studied it, approved some of them, and corrected some of them, but we never deleted anything. But we cannot speak for Ubisoft, of course.
How does it feel to have a professional knowledge of all current and potential cyberthreats? Do you sleep well?
Yes, we sleep well. Everything is alright. Of course, we understand that there cannot be any fully secure systems. That means a hack is a matter of time, budget, and will. There will always be vulnerabilities. One cannot be sure about everything: nor their PCs, nor routers, nor enterprise networks, nor Wi-Fi networks, nor even TVs! But we know how to act when hacked or even have a feeling of being hacked. It makes us more confident.
Is there a database that allows such kind of easy “person look-up”, which is pictured in the game? Or will such a database be created in the next decade?
There are several databases of the kind, and you all know them. They are called Facebook, LinkedIn, and Vkontakte, for instance. It would just take a certain technology to correlate the person to this database to make it happen.
You don’t have to work for a secret service to be able to do that. There are open source intelligence companies who analyze open data. They create virtual accounts on social networks, urge people to befriend or add them and then, having several thousands of friends, you have access to practically any available profile, as on adding a friend, you can get access to his friends’ profiles. Having several friends with thousands of connections, you can cover, in fact, the entire social network population.
As you may know, there is a belief that two random individuals on Earth can be connected through six handshakes. What it means, it would take just several friends to find any person on the network – then you’ll just have to correlate the discovered information to the real world. There are many methods easily accessible to anyone: geolocation, face recognition, voice recognition, etc. When used together, they are quite efficient and are able to get rid of unnecessary information, find a person and identify him of her by profile.