Top hacker dies days before scheduled Black Hat talk
Barnaby Jack was noted for his research on security flaws in ATMs and medical devices
Computerworld - Noted hacker Barnaby Jack, known for exposing vulnerabilities in ATM machines and medical devices, died in San Francisco Thursday, just days before he was scheduled to speak on deadly security shortcomings in medical implants at next week's Black Hat security conference.
The San Francisco Medical Examiner's Office confirmed Jack's death to Reuters, but wouldn't disclose the cause.
At the time of his death, 35-year-old Jack was director of embedded device security at IOActive, a security firm that specializes in industrial, supply chain, and medical device security.
IOActive had no immediate comment on Jack's death. In a statement issued Friday morning, Black Hat organizers expressed regret at Jack's sudden passing.
"Everyone would agree that the life and work of Barnaby Jack are legendary and irreplaceable," show organizers said. "Barnaby had the ability to take complex technology and intricate research and make it tangible and accessible for everyone to learn and grow from."
The statement went on to add that Black Hat will leave the time slot for Jack's speech vacant to commemorate his life and work. "Barnaby Jack meant so much to so many people, and we hope this forum will offer an opportunity for us all to recognize the legacy that he leaves behind," the statement noted.
Jack, a former security researcher at McAfee and Juniper, was perhaps best known for a demonstration at Black Hat three years ago on how exploiting security flaws made ATM machines from Triton and Tranax dispense money on demand.
The talk, titled "Jackpotting Automated Teller Machines," had been postponed from an earlier Black Hat conference to give the ATM vendors time to fix the flaws.
At a security conference in Melbourne last October, Jack demonstrated how wireless protocols used in modern pacemakers and other implantable devices, could be made exploited to deliver lethal shocks to users of the devices. In a video demonstration, Jack showed how an attacker, from 50 feet away, could use a laptop computer to get a pacemaker to deliver a lethal 830-volt shock.
As a researcher at McAfee, Jack showed how insulin pumps from medical device vendor Medtronic could be exploited wirelessly and made to deliver fatal doses of insulin to someone wearing the device.
Jack was scheduled to speak on "Implantable Medical Devices: Hacking Humans" at next week's conference in las Vegas. The talk was expected to highlight how, common bedside transmitters could be used to search for, interrogate and exploit individual medical implants from up to 300 feet away.
Numerous security researchers and hackers today took toTwitter to express their feelings at Jack's passing.
Dave Marcus, chief architect of advanced research and threat intelligence called Jack "one HELLUVA hacker" in a tweet, while Jay Radcliff, a security researcher who has also done considerable work on medical devices added that "While we didn't see eye to eye on several things, I am sad to hear the news that @barnaby_jack has passed away."
"Lost but never forgotten our beloved pirate, Barnaby Jack has passed," IOActive said in a tweet. "He was a master hacker and dear friend. Here's to you Barnes!"
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts