Samy Kamkar (born December 10, 1985) is an American privacy and security researcher,
computer hacker
A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
and
entrepreneur
Entrepreneurship is the creation or extraction of economic value in ways that generally entail beyond the minimal amount of risk (assumed by a traditional business), and potentially involving values besides simply economic ones.
An entreprene ...
. At the age of 16, he dropped out of high school.
One year later, he co-founded Fonality, a unified communications company based on open-source software, which raised over $46 million in private funding. In 2005, he created and released the fastest spreading
virus
A virus is a submicroscopic infectious agent that replicates only inside the living Cell (biology), cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are ...
of all time,
the
MySpace
Myspace (formerly stylized as MySpace, currently myspace; and sometimes my␣, with an elongated Whitespace character#Substitute images, open box symbol) is a social networking service based in the United States. Launched on August 1, 2003, it w ...
worm
Samy, and was subsequently raided by the
United States Secret Service
The United States Secret Service (USSS or Secret Service) is a federal law enforcement agency under the Department of Homeland Security tasked with conducting criminal investigations and providing protection to American political leaders, thei ...
under the
Patriot Act.
He also created
SkyJack, a custom drone which hacks into any nearby
Parrot drones allowing them to be controlled by its operator
and created the
Evercookie
Evercookie (also known as supercookie) is an Open source, open-source JavaScript API, application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage. This behavior is known as ...
, which appeared in a top-secret
NSA
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
document
revealed by
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs.
Born in 1983 in Elizabeth ...
and on the front page of ''
The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
''.
He has also worked with ''
The Wall Street Journal
''The Wall Street Journal'' (''WSJ''), also referred to simply as the ''Journal,'' is an American newspaper based in New York City. The newspaper provides extensive coverage of news, especially business and finance. It operates on a subscriptio ...
'', and discovered the illicit
mobile phone tracking
Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be affected by a number of technologies, such as the multilateration of radio signals between (several) cell towers ...
where the Apple
iPhone
The iPhone is a line of smartphones developed and marketed by Apple that run iOS, the company's own mobile operating system. The first-generation iPhone was announced by then–Apple CEO and co-founder Steve Jobs on January 9, 2007, at ...
, Google
Android
Android most commonly refers to:
*Android (robot), a humanoid robot or synthetic organism designed to imitate a human
* Android (operating system), a mobile operating system primarily developed by Google
* Android TV, a operating system developed ...
and Microsoft
Windows Phone
Windows Phone (WP) is a discontinued mobile operating system developed by Microsoft Mobile for smartphones as the replacement successor to Windows Mobile and Zune. Windows Phone featured a new user interface derived from the Metro design languag ...
mobile devices transmit GPS and Wi-Fi information to their parent companies. His mobile research led to a series of class-action lawsuits against the companies and a privacy hearing on Capitol Hill. Kamkar has a chapter giving advice in
Tim Ferriss
Timothy Ferriss (born July 20, 1977) is an American entrepreneur, investor, author, podcaster, and lifestyle guru. He is known for his ''4-Hour'' self-help book series—including ''The 4-Hour Work Week'', ''The 4-Hour Body'', and ''The 4-Hour Ch ...
' book ''
Tools of Titans
''Tools of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers'' (2016) is a self-help book by Timothy Ferriss, an American entrepreneur. For the book, he interviewed more than one hundred "world-class pe ...
''.
Work
Samy worm
In 2005, Kamkar released
the Samy worm, the first publicly released self-propagating cross-site scripting worm, onto
MySpace
Myspace (formerly stylized as MySpace, currently myspace; and sometimes my␣, with an elongated Whitespace character#Substitute images, open box symbol) is a social networking service based in the United States. Launched on August 1, 2003, it w ...
. The worm carried a
payload
Payload is the object or the entity that is being carried by an aircraft or launch vehicle. Sometimes payload also refers to the carrying capacity of an aircraft or launch vehicle, usually measured in terms of weight. Depending on the nature of t ...
that would display the string "but most of all, Samy is my hero" on a victim's profile and cause the victim to unknowingly send a friend request to Kamkar. When a user viewed that profile, they would have the payload planted on their page. Within just 20 hours of its October 4, 2005 release, over one million users had run the payload, making it the fastest spreading
virus
A virus is a submicroscopic infectious agent that replicates only inside the living Cell (biology), cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are ...
of all time.
The MySpace team temporarily shut down MySpace to fix the problem that allowed the worm to operate.
In 2006, Kamkar was raided by the
United States Secret Service
The United States Secret Service (USSS or Secret Service) is a federal law enforcement agency under the Department of Homeland Security tasked with conducting criminal investigations and providing protection to American political leaders, thei ...
and Electronic Crimes Task Force, expanded from the
Patriot Act, for releasing the worm.
After being presented with a
plea bargain A plea bargain, also known as a plea agreement or plea deal, is a legal arrangement in criminal law where the defendant agrees to plead guilty or no contest to a charge in exchange for concessions from the prosecutor. These concessions can include a ...
for no prison time, but paying a fine of US$20,000, serving three years of probation, working 720 hours of community service, Kamkar pled guilty to a felony charge of computer hacking in Los Angeles Superior Court. Also per the aforementioned agreement, Kamkar was allowed to keep a single computer that was not connected to a network, but explicitly prohibited from any internet access during his sentence. Since 2008, Kamkar has been doing independent computer security and privacy research and consulting.
Notable works
In 2008, after Kamkar's restriction from computers was lifted, he demonstrated weaknesses in
Visa, MasterCard and Europay credit cards with
near field communication
Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of or less. NFC offers a low-speed connection through a simple setup that can be used for the boots ...
(NFC) and
radio-frequency identification
Radio-frequency identification (RFID) uses electromagnetic fields to automatically Automatic identification system, identify and Tracking system, track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, ...
(RFID) chips built in and released software demonstrating the ability to steal credit card information, including name, credit card number, and expiration date, wirelessly from these cards. He also released code demonstrating
wireless identity theft of
physical access control cards, including that of
HID Global
HID Global Corporation is an American manufacturer of secure identity products. The company is an subsidiary of Swedish multinational physical security conglomerate Assa Abloy. Björn Lidefelt was appointed CEO on 27 January 2020. He succeeded ...
cards, using
RFID
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
with the use of only a credit card sized device, removing the need for any computer to be connected.
In 2010, Kamkar traveled to more than a dozen countries speaking about his mobile security research and weaknesses he discovered from his
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
of the
PHP
PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. The PHP reference implementation is now produced by the PHP Group. ...
programming language, including speaking at some of the largest annual hacker conventions in the world such as
DEF CON
DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
,
Black Hat Briefings
Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together ...
and
ToorCon.
In late 2010, Kamkar traveled to
Bratislava
Bratislava (German: ''Pressburg'', Hungarian: ''Pozsony'') is the Capital city, capital and largest city of the Slovakia, Slovak Republic and the fourth largest of all List of cities and towns on the river Danube, cities on the river Danube. ...
to attend
Faraday Hack Day to help expose political and corporate corruption within
Slovakia
Slovakia, officially the Slovak Republic, is a landlocked country in Central Europe. It is bordered by Poland to the north, Ukraine to the east, Hungary to the south, Austria to the west, and the Czech Republic to the northwest. Slovakia's m ...
's government.
In early 2011, Kamkar joined the Board of Directors of
Brave New Software, a non-profit organization originally funded by a multimillion-dollar
U.S. State Department
The United States Department of State (DOS), or simply the State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs ...
grant. The nonprofit is responsible for creating
uProxy
uProxy was an extension for Chrome and Firefox, which allowed users to access the Internet via a web proxy. This project has been superseded by Outline VPN. The extension works by enabling a user to share their Internet connection with someone ...
with the
University of Washington
The University of Washington (UW and informally U-Dub or U Dub) is a public research university in Seattle, Washington, United States. Founded in 1861, the University of Washington is one of the oldest universities on the West Coast of the Uni ...
and
Google Ideas
Jigsaw LLC (formerly Google Ideas) is a technology incubator created by Google. It formerly operated as an independent subsidiary of Alphabet Inc., but came under Google management in February 2020. Based in New York City, Jigsaw is dedicated ...
, a browser extension intended to allow users in repressive regimes to access the Internet without being monitored. The nonprofit also created
Lantern
A lantern is a source of lighting, often portable. It typically features a protective enclosure for the light sourcehistorically usually a candle, a oil lamp, wick in oil, or a thermoluminescence, thermoluminescent Gas mantle, mesh, and often a ...
, a network designed to circumvent Internet censorship and defeat the suppression of digital information and freedom of speech.
In addition to releasing the
Evercookie
Evercookie (also known as supercookie) is an Open source, open-source JavaScript API, application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage. This behavior is known as ...
as free and open source software, and exposing the surreptitious collection of data by Apple, Google and Microsoft,
in 2011, Kamkar also exposed KISSmetrics, an online advertising network, and Hulu as recreating tracking cookies after consumers deleted them by storing the unique tracking identifiers in Flash cookies and
HTML5 Local Storage, which were not automatically deleted when consumers cleared their browser cookies.
Several companies identified as performing cookie respawning were subsequently sued by class-action lawyers. In January 2013, KISSmetrics settled its cookie respawning related lawsuit for $500,000.
Flaw in PHP
In early 2010, Kamkar discovered a major flaw in all versions of the
PHP
PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. The PHP reference implementation is now produced by the PHP Group. ...
programming language, specifically in the
pseudorandom number generator
A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), is an algorithm for generating a sequence of numbers whose properties approximate the properties of sequences of random number generation, random n ...
, which allowed an attacker to hijack the
session ID
In computer science, a session identifier, session ID or session token is a piece of data that is used in network communications (often over HTTPS) to identify a session, a series of related message exchanges. Session identifiers become necessar ...
of a user and take over their session. Kamkar released a patch and once fixed, released exploit code demonstrating the attack which was possible on major banks, social networks, and forums.
Evercookie
In 2010, Kamkar released
Evercookie
Evercookie (also known as supercookie) is an Open source, open-source JavaScript API, application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage. This behavior is known as ...
, a cookie that "apparently cannot be deleted", which subsequently was documented on the front page of ''
The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
''.
In 2013, a top-secret
NSA
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
document was leaked
by
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs.
Born in 1983 in Elizabeth ...
citing Evercookie as a method of tracking
Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
users.
Mobile research
In 2011, Kamkar discovered the iPhone, Android and Windows Phone mobile devices were continuously sending GPS coordinates, correlated to Wi-Fi MAC addresses, back to Apple, Google and Microsoft respectively, and released his research through several front page ''
The Wall Street Journal
''The Wall Street Journal'' (''WSJ''), also referred to simply as the ''Journal,'' is an American newspaper based in New York City. The newspaper provides extensive coverage of news, especially business and finance. It operates on a subscriptio ...
'' articles.
The iPhone would continue to send location data "even when the location services were turned off".
The Windows Phone would also continue to send location data "even when the user has not given the app permission to do so". He discovered that some of this data was exposed by Google and he release
Androidmap a tool exposing Google's database of Wi-Fi MAC addresses correlated to the physical coordinates populated by Android phones.
Parrot AR Drone research
In 2013, Kamkar created
SkyJack, a combination of open source software and hardware to run on an
unmanned aerial vehicle
An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as a drone, is an aircraft with no human pilot, crew, or passengers onboard, but rather is controlled remotely or is autonomous.De Gruyter Handbook of Dron ...
which was "engineered to autonomously seek out, hack, and wirelessly take over other
Parrot drones within wifi distance, creating an army of zombie drones".
The entire software and hardware specification was released as open source and detailed on his website.
The software was released one day after
Amazon.com
Amazon.com, Inc., doing business as Amazon, is an American multinational technology company engaged in e-commerce, cloud computing, online advertising, digital streaming, and artificial intelligence. Founded in 1994 by Jeff Bezos in Bellevu ...
announced
Amazon Prime Air
Amazon Prime Air, or simply Prime Air, is a drone delivery service operated by Amazon. The service uses delivery drones to autonomously fly individual packages to customers, and launched in 2022. The service currently operates in two cities in ...
, a possible future delivery service using drones to deliver small packages in as early as 2015.
Automotive security research
On July 30, 2015, Kamkar introduced OwnStar - a small electronic device that could be concealed on or near a
General Motors
General Motors Company (GM) is an American Multinational corporation, multinational Automotive industry, automotive manufacturing company headquartered in Detroit, Michigan, United States. The company is most known for owning and manufacturing f ...
vehicle to interpose itself between the vehicle's
OnStar
OnStar Corporation is a subsidiary of General Motors that provides subscription-based telecommunication, communications, in-vehicle security, emergency services, turn-by-turn navigation, and remote diagnostics systems throughout the United States, ...
link and the driver's OnStar RemoteLink
app. In this classic
man-in-the-middle attack
In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
, Kamkar, or any unauthorized user, could substitute his OnStar commands to locate, unlock, or start the vehicle. By August 11, General Motors had released upgrades to the OnStar server software and RemoteLink app to block such attacks.
In 2015, it was reported that Kamkar had built an inexpensive electronic device about the size of a wallet that could be concealed on or near a locked vehicle to capture a single
keyless entry
A remote keyless system (RKS), also known as remote keyless entry (RKE) or remote central locking, is an electronic lock that controls access to a building or vehicle by using an electronic remote control (activated by a handheld device or aut ...
code to be used at a later time to unlock the vehicle. The device transmits a jamming signal to block the vehicle's reception of
rolling code
A rolling code (or sometimes called a hopping code) is used in keyless entry systems to prevent a simple form of replay attack, where an eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock'. Such ...
signals from the owner's fob, while recording these signals from both of his two attempts needed to unlock the vehicle. The recorded first code is sent to the vehicle only when the owner makes the second attempt, while the recorded second code is retained for future use. Kamkar stated that this vulnerability had been widely known for years to be present in many vehicle types, but was previously undemonstrated.
A demonstration was announced for
DEF CON
DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include comp ...
23.
Magnetic stripe and credit card emulation device
On November 24, 2015, Samy Kamkar released MagSpoof; a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers by generating a strong electromagnetic field that emulates a traditional magnetic stripe card.
In his own words, MagSpoof can be used as a traditional credit card and simply store all of your credit cards (and with modification, can technically disable chip requirements) in various form factors, or can be used for security research in any area that would traditionally require a magstripe, such as readers for credit cards, drivers licenses, hotel room keys, automated parking lot tickets, etc.
Internet traffic hijacking
On November 16, 2016, Samy Kamkar released PoisonTap; a USB Ethernet emulator that can be used to hijack all Internet traffic on a target machine, even if the computer was password protected and locked.
A backdoored device can be remotely forced to make a request with its user's cookies on HTTP (unsecured) websites that have no security flags, meaning that the attacker can remotely impersonate a local user.
On May 2, 2022, a suspected North Korean spy recruited a 38-year-old South Korean crypto exchange executive and a 29-year-old military officer to use PoisonTap in order to hack into the Korean Joint Command and Control System (KJCCS).
References
External links
*
{{DEFAULTSORT:Kamkar, Samy
Living people
American computer programmers
American computer scientists
Place of birth missing (living people)
Computer systems researchers
Hackers
American people of Iranian descent
1985 births
Radio-frequency identification