DEF CON Kid and co-founder of R00tz Asylum also names the mobile apps affected by the 'Time Traveler' class of vulnerabilities she discovered two years ago

Most kids under the age of 16 spend the summer at the pool or at camp. Then there are those kids who also spend part of the school break soldering hardware circuitry, and finding and reporting security bugs in mobile apps and smart TVs.

Such is the summer of the DEF CON Kids, now under the new banner of R00tz Asylum, a nonprofit that educates kids on white-hat hacking. Now in its third year, the kid-friendly DEF CON conference held in Las Vegas earlier this month hit a few milestones with three of its pint-sized participants scoring cash bug bounties from Samsung, and others discovering more mobile apps vulnerable to the so-called "Time Traveler" class of flaws first discovered by a 10-year-old. Some 300 kids and parents attended the kids' hacking conference, and half of the parents are regular attendees of the adult DEF CON.

CyFi, 12, a co-founder of R00tz Asylum, at the first DEF CON Kids in 2011 announced that she had discovered and reported the new class of so-called "time traveler" vulnerabilities across iOS, Android, and BlackBerry mobile platforms, which basically let you restart the clock on a mobile gaming app's free trial. CyFi had stumbled onto a rare time acceleration weakness in the apps that impressed several renowned grown-up security researchers, and ultimately could let exploit code run on servers.

Since then, CyFi has continued to work the responsible disclosure process with a little help from her mom, the Electronic Frontier Foundation (EFF), and AT&T. She has also hosted her own Zero-Day Contest for fellow DEF CON Kids/R00tz attendees that has helped her detect some 120 mobile apps that are vulnerable to the Time Traveler class of bugs. According to CyFi -- who until now has kept the names of the apps under wraps -- some 20 mobile apps have now officially been fixed, but 100 others remain vulnerable.

The fixed apps include raiX UG Butterfly Farm; Phoenix Age Castle Age; and Team Lava's Zoo Story, City Story, Empire Story, Farm Story, Bakery Story, Dragon Story, Fashion Story, and others. CyFi reports that Candy Saga, Candy Island, City Friends, Fashion City, Monster Petshop, Mini pets, Mine craft lite, Pet Cafe, and Shen Games Zombie Farm, are among the 100 that remain vulnerable.

Fellow kid hackers Kryptina, zinc, xuberator, 0ldst3v3n, s0ftwire, and tb0ne all found apps with the flaws.

Meanwhile, CyFi also has been awarded her first bug bounty -- $1,000 from Samsung for finding a flaw in its smart TV during a contest at R00tz spearheaded by security researchers Aaron Grattafiori and Josh Yavor from iSecPartners. Grattafiori and Yavor earlier that week at Black Hat USA had shown how Samsung smart TVs could be abused and used to spy on their owners and viewers. While helping out with DEF CON Kids/R00tz, the researchers decided to get the kids involved, and CyFi and fellow R00tz kid participants Neil and Bryce found one Samsung App Store flaw and two bugs in Samsung's own Facebook app for its smart TVs.

Like any responsible white-hat hacker, CyFi won't reveal any details on the flaw until after it's fixed. She says she has put away one-third of her bounty award money for her education and donated another third of it to the EFF, which helped her with the legal aspect of her Time Traveler vulnerability reporting. She gets to keep the other third: "I'm not sure what I'm gonna spend it on," she says.

CyFi's pal Kryptina won this year's contest posed by CyFi for finding top-grossing mobile apps with Time Traveler flaws. "My newest research indicates that at least two of the top 15 grossing apps are vulnerable," CyFi said in her contest challenge. Kryptina found 29 of these top apps vulnerable: "We will work with AT&T and EFF to responsibly disclosure these vulnerabilities so we can name these apps next year," CyFi says.

Getting mobile app developers to fix the flaws has been a long process, especially since many of the app developers are small companies with little, if any experience, in dealing with security bugs. "The response was disappointing," says CyFi's mom, who is a DEF CON veteran. "The bug has been out there for a long time."

CyFi says she has learned a lot about the process of hacking and disclosure. "I learned that I could make money. I didn't know that before," she says. And making new friends at the hacking conference was "pretty awesome," she says.

She's now starting to code and write apps for Apple iOS, optimizing some of her favorite apps, like "My Little Pony" and others, she says. "I've been coding pretty hard," she says. "Most are little projects" so far, though, she says.

[Who says grown-ups should have all the fun with their DEF CON badges? See DEF CON Kids To Get Badges That Hack.]

Early registrants for DEF CON Kids/R00tz got badges that hack as well as a free Android tablet to use as a resource. "We're giving the compute resources to the kids and stepping back. We're handing them prerooted [tablets], and they can do whatever they want with [them]," says security expert James Arlen, who, with his 11-year-old daughter, Amelia, designed the badges.

Meanwhile, CyFi says she tries to school her friends back home who aren't security-savvy about hacking, security, and privacy, but they don't always take it seriously. "A lot of people think the government will go after you for hacking stuff," she says. "I've tried to explain" the difference between good and bad hackers many times, she says.

She gives her friends this sage advice: "If you put that [information] out there, it's going to be there forever," she says. Do they heed her counsel? "Not really," she admits.

CyFi, who is also training to become an Olympic skier and is an artist whose work has been featured in Rolling Stone, Time, and The Wall Street Journal, is now spending what's left of her summer like any other kid -- swimming.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author(s)

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights