Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
Didn't see it in the past few pages, but have we discussed this yet?

https://www.popsci.com/vpnfile-malware-reboot-router

FBI is saying that VPNFilter has 3 stages, and rebooting your router kills the 3rd stage, but considering it doesn't claim to do anything for the 1st and 2nd stage infection....this suggestion doesn't really do anything?

The article on VPNFilter specifically states it persists of the router is rebooted (because of course it does)
https://en.wikipedia.org/wiki/VPNFilter

Adbot
ADBOT LOVES YOU

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Space Gopher posted:

I'm guessing that there's some level of two-person-rule code review in the merge to master, too.

There isn’t. master doesn’t work like that.

evil_bunnY
Apr 2, 2003

IIRC A factory reset kills the runtime, and after they seized the c2 domain the bootlader can’t grab the runtime and fails silently to normal operation. The problem is of course that none of these POS devices have any kind of security updates process, so they’re effectively just waiting for the next exploit to come along.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

evil_bunnY posted:

IIRC A factory reset kills the runtime, and after they seized the c2 domain the bootlader can’t grab the runtime and fails silently to normal operation. The problem is of course that none of these POS devices have any kind of security updates process, so they’re effectively just waiting for the next exploit to come along.

From what I'm reading, Stage II is the actual malware and for me would be the largest issue, because its active after every reboot and can receive instruction and actually carry out tasks. According to what I'm reading, Stage III is just optional modules that can be installed.

So unless you actually do get a full firmware update, its persistent.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

CommieGIR posted:

From what I'm reading, Stage II is the actual malware and for me would be the largest issue, because its active after every reboot and can receive instruction and actually carry out tasks. According to what I'm reading, Stage III is just optional modules that can be installed.

So unless you actually do get a full firmware update, its persistent.

Where's it going to receive commands from?

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Jabor posted:

Where's it going to receive commands from?

If the infection persists, someone will figure out how to send commands to them, abandoned or not.

Seems like a hard reset will wipe out stage 1, but also depends upon the default credentials being changed.

fordan
Mar 9, 2009

Clue: Zero

BGP is always is a state of overhaul.

There's Resource PKI to associate AS numbers with IP blocks issued run by ARIN and the other regional Internet registries which is useful along with BGP SIDR to prevent ASes announcing blocks they don't own from being believed, but that depends on both the correct source and the intermediate routers using SIDR. And it also doesn't prevent a malicious actor from faking the right ASN and saying they have the best path to that ASN and getting the traffic that way. BGPsec might help with that problem but is at the IETF draft stage.

And almost nobody runs either because there aren't many benefits to being the first to implement it and because when there's a BGP issue it's usually pretty easy to spot and point at the bad actor who is usually just someone who typo'ed something.

fordan fucked around with this message at 16:07 on Jun 1, 2018

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

https://forums.flightsimlabs.com/index.php?/topic/17444-flight-sim-labs-statement-on-cmdhost/ posted:

Over the past few hours we have become aware of rumours circulating on social media about the cmdhost file installed by the A320-X and wanted to clear up any confusion or misunderstanding.

cmdhost is part of our eSellerate infrastructure - which communicates between the eSellerate server and our product activation interface. It was designed to reduce the number of product activation issues people were having after the FSX release - which have since been resolved.

This is not a new discovery or something we have ever sought to hide away. Indeed, we directly addressed the nature of this file way back in February:

https://forums.flightsimlabs.com/index.php?/topic/16306-p3dv4-problems-with-installing-the-latest-spotlight-version-cmdhostexe/

The file has been passed to all the major antivirus houses in order for them to verify that it is legitimate, and is also reported clean by Virus Total. If you have any concerns, we urge you to submit it to your preferred antivirus company for testing.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

What, is FSLabs past time to just do really, really sketchy things to protect their products? Because that's sketchy as hell.

I cannot recall the last thing they did, but I know it pissed off a lot of their customer base.

E: Oh yeah, it scraped your Chrome passwords if activated improperly.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

They certainly learnt their lesson of course...

https://www.reddit.com/r/flightsim/comments/8nlrn6/another_fsl_scandal_debunked/

quote:

Although this thread has been approved, I would like to point out a few things:

  • This account was created today with the sole purpose of posting the thread
  • Sockpuppet accounts were created today, around the same time as this one, to post very pro-FSL comments
  • A handful of fake accounts were created and used to attack members of our community during the previous accusations of malware against FSL

Do with that information what you will.

The whole thread is just full of sock-puppetry.

Absurd Alhazred
Mar 27, 2010

by Athanatos

:regd08:

22 Eargesplitten
Oct 10, 2010



That’s directly to Reddit?

I bet they have a network share full of empty legal threats to laugh at.

Absurd Alhazred
Mar 27, 2010

by Athanatos
https://twitter.com/Reuters/status/1003611450240356352

:thunk:

SeaborneClink
Aug 27, 2010

MAWP... MAWP!
Facebook refutes all accusations that it was doing what it was accused of.

In the same breath, "[Facebook] also said that these cases were "very different" from the use of data by third party developers in the Cambridge row."

You see the thing you said we're doing, which we're not btw, is different than the other things we did that now we truly understand we shouldn't have, but IF we were doing what you said it's not the same because *looks at inside of hand* ... *looks at reporter* ... *gulp*"

astral
Apr 26, 2004

This is the NYT article referenced by the Reuters article that was linked to by that tweet if you want to read more about it:
https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html

Diametunim
Oct 26, 2010
Can we talk boring rear end USB Device Control Policy for a bit? I'm curious as to what y'all are using to encrypt removable USB devices. I'm looking for an easy, cross platform, and preferably free way to device encrypt USB Drives that are handed out to end users for temporary use. My company is by majority Windows but we do have ~100 OSX devices in circulation which makes using Bitlocker an issue. I know there are solutions out on Github for OSX and Bitlocker but lets be honest, there's no way your standard end user is going to take the time to figure that solution out.

e: I'm thinking Veracrypt is probably the solution to use, any other ideas?

Diametunim fucked around with this message at 19:51 on Jun 4, 2018

The Fool
Oct 16, 2003


Diametunim posted:

Can we talk boring rear end USB Device Control Policy for a bit? I'm curious as to what y'all are using to encrypt removable USB devices. I'm looking for an easy, cross platform, and preferably free way to device encrypt USB Drives that are handed out to end users for temporary use. My company is by majority Windows but we do have ~100 OSX devices in circulation which makes using Bitlocker an issue. I know there are solutions out on Github for OSX and Bitlocker but lets be honest, there's no way your standard end user is going to take the time to figure that solution out.

https://www.kingston.com/us/usb/encrypted_security

Use one of those. Some of the models support central management, but I've never used it before.

Even without the central management, any of those drives will come with the software necessary for the end-user to encrypt and decrypt the drive, and is mult-platform.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

If you're mostly Windows, I'd still look real close at BitLocker since you can manage the behavior through GPO and then use 3rd party software to handle mounting on OSX: https://www.m3datarecovery.com/mac-bitlocker/

Alternatively, you could buy self-encrypting USB hardware and then use device restriction policies through the OSX or AV to require people to use those as their mass storage devices and stop stuff from mounting.

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal

astral posted:

This is the NYT article referenced by the Reuters article that was linked to by that tweet if you want to read more about it:
https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html

"The [Facebook] officials added that they knew of no cases where the information had been misused."

Lol 'they didn't even abuse the privilege we gave them wtf are you whining about'

Harik
Sep 9, 2001

From the hard streets of Moscow
First dog to touch the stars


Plaster Town Cop
Somewhat esoteric question here, but is there a good read on why it's okay to lose the diffusion property of block ciphers by running them in xor stream mode?

I suspect it's along the lines of "there are so many ways to fuckup final block padding that it's overall safer" but that's just guessing.

fwiw I just use TLS when possible and NACL *_box otherwise.

Three-Phase
Aug 5, 2006

by zen death robot
Email opening question:

Gmail caches all image links in incoming messages. My understanding is that this prevents marketers (COUGHspammersCOUGH) from determining if a user has opened their message.

Is there any other way for someone to determine if an e-mail was opened if sent to a Gmail address besides a user interacting with the message (clicking on links)? I was reading some comments by marketers (COUGHspammersCOUGH) that there were other ways to determine that an e-mail was both delivered and opened.

ozymandOS
Jun 9, 2004

Harik posted:

Somewhat esoteric question here, but is there a good read on why it's okay to lose the diffusion property of block ciphers by running them in xor stream mode?

I suspect it's along the lines of "there are so many ways to fuckup final block padding that it's overall safer" but that's just guessing.

fwiw I just use TLS when possible and NACL *_box otherwise.

Diffusion is important in several common modes of creating a stream cipher from a block cipher. For example CTR mode would not generate a random stream if the block cipher did not have the diffusion property.

Harik
Sep 9, 2001

From the hard streets of Moscow
First dog to touch the stars


Plaster Town Cop

ozymandOS posted:

Diffusion is important in several common modes of creating a stream cipher from a block cipher. For example CTR mode would not generate a random stream if the block cipher did not have the diffusion property.
That's a property of the stream generation, not of the encryption. A one-bit change in the IV changes roughly 50% of the bits in the ciphertext. A one-bit change in the plaintext changes the corresponding ciphertext bit. (in general. There are ciphertext feedback modes that mean a single-bit change flips one bit in that block and completely alters every following block. It's a tradeoff between propagation of changes and ability to seek/parallel decrypt the stream)

That doesn't answer my question of why it's ok to lose the diffusion of plaintext bits.

whose tuggin
Nov 6, 2009

by Hand Knit
I applied for a position called "Digital Forensics Engineer Intern" recently (I'm still in college) at a government agency.

If you guys had to guess, how would you interpret that job title? I figure it could encompass on or more of the following things:

1) Recovering information off of physical media
2) Doing post analysis of security breaches
3) Deconstructing malware.

I'm studying computer engineering, and I'm into cyber security, so I'm hoping its heavy on the latter 2. Just wondering what you guys thought and looking for some good materials to review on the subjects.

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal
Intern is what throws the whole thing for a loop. You're at the mercy of the company and how cool they are.

My guess is you'll be reading tons of logs and sending filtered data to the actual forensics engineers.

Proteus Jones
Feb 28, 2013



Even better, you’ll be hooking evidence drives to a read-only connector, pressing a button to make a bit-level copy, and then sealing it in a custody bag with yours and your supervisor’s signatures.

Over and over.

Internet Explorer
Jun 1, 2005





Proteus Jones posted:

Even better, you’ll be hooking evidence drives to a read-only connector, pressing a button to make a bit-level copy, and then sealing it in a custody bag with yours and your supervisor’s signatures.

Over and over.

Yes, it's this.

Gromit
Aug 15, 2000

I am an oppressed White Male, Asian women wont serve me! Save me Campbell Newman!!!!!!!
Alternatively, my digital forensics graduates or cadets get to come out on raids and mess about until they get enough experience to go hands-on. However, we aren't pen-testing engineers or log jockeys, we're "client-facing" which means search warrants and the like.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...
You won't be handling actual investigation evidence, but you will be tasked with tracking down who deleted evidence of themselves microwaving fish in the break room

Sefal
Nov 8, 2011
Fun Shoe
https://www.educateddriver.org/uber-paid-hackers-to-cover-a-data-breach-affecting-millions/


quote:

Hackers stole personal data for more than 57 million Uber customers and drivers in 2016. This was one of the biggest data breaches that took place in 2016 and it’s likely you never heard about it until now. That’s because Uber responded by paying the hackers $100,000 to keep the breach quiet and to delete the data.

Edit: Nvm, old news. didn't look at the date

Sefal fucked around with this message at 09:20 on Jun 7, 2018

Kerning Chameleon
Apr 8, 2015

by Cyrano4747
Have something a little fresher: Researcher Finds Credentials for 92 Million Users of DNA Testing Firm MyHeritage

quote:

MyHeritage, an Israeli-based genealogy and DNA testing company, disclosed today that a security researcher found on the Internet a file containing the email addresses and hashed passwords of more than 92 million of its users.

MyHeritage says it has no reason to believe other user data was compromised, and it is urging all users to change their passwords. It says sensitive customer DNA data is stored on IT systems that are separate from its user database, and that user passwords were “hashed” — or churned through a mathematical model designed to turn them into unique pieces of gibberish text that is (in theory, at least) difficult to reverse.

MyHeritage did not say in its blog post which method it used to obfuscate user passwords, but suggested that it had added some uniqueness to each password (beyond the hashing) to make them all much harder to crack.

...

MyHeritage added that it is expediting work on an upcoming two-factor authentication option that the company plans to make available to all MyHeritage users soon.

“This will allow users interested in taking advantage of it, to authenticate themselves using a mobile device in addition to a password, which will further harden their MyHeritage accounts against illegitimate access,” the blog post concludes.

Why... yes... of course we... "salted" the passwords hashes protecting your extremely personal and identifying genealogical information, as the kids these days say. Oh, our hashing method? Why, it's, uh... mumblemumblemumble... Also, pay no attention to the fact we suddenly care very strongly about implementing 2FA that we definitely were planning to do before this incident!

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!

Kerning Chameleon posted:

Have something a little fresher: Researcher Finds Credentials for 92 Million Users of DNA Testing Firm MyHeritage


Why... yes... of course we... "salted" the passwords hashes protecting your extremely personal and identifying genealogical information, as the kids these days say. Oh, our hashing method? Why, it's, uh... mumblemumblemumble... Also, pay no attention to the fact we suddenly care very strongly about implementing 2FA that we definitely were planning to do before this incident!

I read this post and thought “I should turn on 2FA on my 23andme account.”

Turns out they don’t support it either.

Zil
Jun 4, 2011

Satanically Summoned Citrus


Boris Galerkin posted:

I read this post and thought “I should turn on 2FA on my 23andme account.”

Turns out they don’t support it either.

The willingness for a company to allow for 2FA is equal to their willingness to pay for a support team.

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!
I’m really considering deleting my data but the insights they give is really cool, as they’re constantly analyzing more genes.

Thanks Ants
May 21, 2004

#essereFerrari


I'm not sure I'd want to just hand over my DNA to a company along with the details needed to link it back to me, and also pay them for the privilege.

Last Chance
Dec 31, 2004

yeah, it'll be a cold day in hell before I send my DNA to a company just for it to be stolen because they left MySQL open to the world, and they use it to breed an army of strong, huge-dicked criminals to commit crimes that they eventually pin on me due to forensic DNA analysis.

Thanks Ants
May 21, 2004

#essereFerrari


lmao I laughed too much at that

Internet Explorer
Jun 1, 2005





Alternatively, I was raised Jewish and there's no way in hell I'm doing anything to make easier for someone to throw me in an oven.

Furism
Feb 21, 2006

Live long and headbang
Maybe they used the DNA sequence as the salt.

Internet Explorer posted:

Alternatively, I was raised Jewish and there's no way in hell I'm doing anything to make easier for someone to throw me in an oven.

I don't think you can tell from their DNA that someone is Jew because religion is not genetic. That's also why you can't tell someone is a Jew just by looking at them (clothing and other cultural signs aside), unlike what people who want to throw them in ovens would have you believe. I therefore suppose you mean Jew as in the ethnic group rather than the religious one (people with no Jewish heritage can convert to that religion is my point).

Ironically enough, Middle East Jews share more DNA with Palestinian Arabs than any other neighboring arabs. So I guess you can tell a Jew from their DNA if they stayed in the Middle East all that time (which makes sense since they tend to stay among themselves - this is just a factual observation, and I've traveled to Israel literally dozens of time and have many friends there). The rest of that paper I found is pretty fascinating actually.

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1274378/

quote:

The investigation of the genetic relationship among three Jewish communities revealed that Kurdish and Sephardic Jews were indistinguishable from one another, whereas both differed slightly, yet significantly, from Ashkenazi Jews. The differences among Ashkenazim may be a result of low-level gene flow from European populations and/or genetic drift during isolation. Admixture between Kurdish Jews and their former Muslim host population in Kurdistan appeared to be negligible. In comparison with data available from other relevant populations in the region, Jews were found to be more closely related to groups in the north of the Fertile Crescent (Kurds, Turks, and Armenians) than to their Arab neighbors.

tldr; if they throw you in an oven because of your DNA, at least take comfort in knowing it was just a wild guess.

Adbot
ADBOT LOVES YOU

Absurd Alhazred
Mar 27, 2010

by Athanatos

Boris Galerkin posted:

I read this post and thought “I should turn on 2FA on my 23andme account.”

Turns out they don’t support it either.

You were done when you gave a private company your DNA. :shrug:

https://twitter.com/naikrovek/status/1004818722165592066

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply