HackedIN: Double or nothin'

HackedIN: Double or nothin'

How I hacked two of Australia's largest Casino's (legally).

Disclaimer: Both Casino's have long since patched these issues.

Don't do crime.

House of cards

When most people think of a Casino, they think of high security, underground vaults, and an overall intimidating complexity.

But with great complexity comes great security consequences.

It’s easy to think of a casino as one big money-making machine.

But the reality is, under the hood, casinos are run by many individual moving parts, all relying on each other equally to function.

High-level summary of the modern casino technology ecosystem

This complexity represents an opportunity for hackers while resulting in obscurity for the people tasked with protecting the casino.

Eyes on the table, not on the door

To add to the already complex ecosystem is the fact that many of the responsibilities lie with external contractors, whether that be software developers, electrical engineers, or any other kind of vendor who is responsible for designing, delivering or supporting one or more parts of the ecosystem.

While all eyes are on the tables, in my experience, far less focus is on the people and technology that holds it all together.

Root cause

Although I won't share specifics, I can discuss the root cause (what exactly caused these casino's to be vulnerable) in detail.

This way as a reader you can understand how a criminal might exploit this in the real-world.

In both of the two examples I will share, the vulnerability existed thanks to a lapse in security of a third-party-developed mobile application.

Highlighting vulnerable components

Casino 1 - █████ ████ ████

To provide some context around the first example.

At the time I found this (2019), social gaming was big business.

The mobile application was created for patrons to play digital versions of various games, including but not limited to slot games.

Although winnings earned using the mobile app could not be converted to "real money", the game did offer an alternative type of virtual reward that was apparently awarded to players randomly and not related to the amount of real money spent or in-game winnings.

These alternative virtual reward points could then be traded for various goods within the casino premises.

After downloading the app, it didn't take long to go from client-side analysis to confirming a backend exposure.

Here's how it played out step by step.

  1. Installed mobile app
  2. Found development domain api.casino.3rdparty-dev.com
  3. Found exposed Git repo on third-party API developers web-server api.casino.3rdparty-dev.com/.git/config
  4. Analysed exposed source-code
  5. Found API keys, additional vulnerabilities, SSO/OAuth secrets and credentials for various services used by the backend API server, including production assets related to member database and royalty points
  6. Notified impacted parties and ensured the issue was resolved.

Casino 2 - █████ ████

This mobile application was targeted not to patrons, but to third-party vendors.

The application was designed to allow external vendors to request for permits to perform maintenance work at █████ ████ properties.

For example, if an external electrical engineer needed to request access to The Casino’s camera system or request access to cabling within the roof of a casino for repairs, according to the description of the application, the contractor would have to submit a permit to work application which would either be approved or denied by a team within the Casino’s contractor management area.

Here's how the attack path went.

  1. Installed mobile app
  2. Analysed API calls made by the app to and from the API server
  3. Found a way to list all members (vendor companies) who were registered in the backend (Id, Name, Mobile Number, Email, Casino Property Access (Location specific.), Casino Contract Controller Status)
  4. Checked e-mail domains of registered vendor businesses to see if any of the businesses had shutdown
  5. Found a Victorian building company that had been de-registered and claimed the business domain that had been left to expire
  6. Created a mailbox that belonged to the shutdown business (which hadn't been removed from the casino vendor management system)
  7. Issued a password reset to the mailbox that I now controlled
  8. Had the ability to access the Casino's vendor request portal including but not limited to request access to the Casino's data room
  9. Notified impacted parties and ensured the issue was resolved.

The Takeaways

  1. Mobile App Security Audits: Regular, in-depth security audits of all mobile applications associated with your infrastructure. This is NOT ONLY the mobile applications themselves, but all of the infrastructure that belongs to the developers who built your app.
  2. Securing API Endpoints: APIs are often the backbone of mobile apps. Orgs should enforce strict security on API endpoints. This involves implementing robust authentication, monitoring API traffic for unusual patterns, and encrypting the data transmitted between the app and the servers.OWASP's API Security Top 10 is a good start.
  3. Vendor Domain Management: In the case of Casino 2, an expired vendor domain was exploited. Casinos should maintain an up-to-date registry of all external vendors and regularly verify the status of their domains. If a vendor goes defunct, their access and associated domains should be promptly revoked or monitored for unusual activity.

To summarise, hackers won't just target you directly. They'll look at every moving part of your ecosystem and systematically attack them until they get in.

Make sure you do that first.


Edwin Bowers

Enterprise Security Sales @ Smarttech247 | Data Centric Security, 1 byte at a time.

1 年

Thanks for sharing.. It's the next script for Ocean's 14 ??

Neil Templeman

Founder and Director / Strategic Advisor/ Investor

1 年

This is interesting, thanks for sharing

Vincent Y.

Director | Offensive Security, Red Team, Threat Hunt, Incident Response, vCISO | Certified Red Team Master

1 年

Out of interest is the third party dev’s git repo in scope for a mobile app pentest? Not presuming it’s an open scope engagement of course! Great work!

The example you gave for casino 2 is super intersting. I bet there are lots of companies out their that don’t practice removal of old or stale vendors they no longer use and have this potential exposure. Thanks for sharing.

Sorin Ivanescu??

?? Life has pushed me beyond my limits, but your support can help me regain hope. Every contribution, big or small, makes a real difference. ???? Click below to support me today??

1 年

??????????????????

要查看或添加评论,请登录

Jamieson O'Reilly的更多文章

  • HackedIN: Ghost in the wires ?? (in Australia, even criminal telcos have crappy APIs)

    HackedIN: Ghost in the wires ?? (in Australia, even criminal telcos have crappy APIs)

    Introduction In September 2024, GhostChat—an encrypted communication platform used by criminal enterprises—was taken…

    6 条评论
  • HackedIN: ?? Ticket-in Cash-out The 3.2 Million Dollar Question?

    HackedIN: ?? Ticket-in Cash-out The 3.2 Million Dollar Question?

    Disclaimer: This document presents a speculative analysis based on publicly available information regarding the…

    3 条评论
  • HackedIN: Hack to the Future

    HackedIN: Hack to the Future

    In today's world, the very same features we rely on for integrity and security can be used against us by attackers…

    2 条评论
  • HackedIN: Poor man's SIM porting

    HackedIN: Poor man's SIM porting

    In today's world, where interconnectivity is not just a convenience but a necessity, the security of telecommunication…

    1 条评论
  • HackedIN: I See Dev People

    HackedIN: I See Dev People

    As someone who gets paid to break into companies legally - I've learned to take a step back and look at the whole…

    6 条评论
  • HackedIN: APT, easy as 1, 2, 3

    HackedIN: APT, easy as 1, 2, 3

    Having run 100s of red-team engagements on everything from federal government agencies to crypto exchanges, I've…

  • HackedIN: Thinking outside the phishing box

    HackedIN: Thinking outside the phishing box

    As we spend more time and resources towards technology and training with the goal of protecting our users from social…

    2 条评论
  • HackedIN: "You Shall Not Pass"—Unless You Exploit This Vulnerability

    HackedIN: "You Shall Not Pass"—Unless You Exploit This Vulnerability

    In an era where Large Language Models (LLMs) like those developed by OpenAI are becoming increasingly integrated into…

    2 条评论
  • Dude where's my code?

    Dude where's my code?

    HackedIN: Dude where's my code? Security extends beyond your office walls. When you involve third parties in your…

    3 条评论
  • Video Killed the Security Star

    Video Killed the Security Star

    Protecting your business online used to be more simple. You had your IPs, domains and devices; there wasn't much more…

社区洞察

其他会员也浏览了