Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Shifty Pony
Dec 28, 2004

Up ta somethin'


anthonypants posted:

is the secfuck thread going to get gassed or shutdown for too much off-topic posting already? it's just barely on page 3

is it off topic posting, or social engineering?

Adbot
ADBOT LOVES YOU

Shifty Pony
Dec 28, 2004

Up ta somethin'


spankmeister posted:

good, gooood


because that was wannacry's greatest flaw imo, it would _only_ spread through eternalblue

it also would fail to properly execute on XP, causing the computer to blue screen instead of becoming encrypted.

seems like that happens in this one too:

https://twitter.com/PolarToffee/status/879718578798436352

who knows how many people were saved by the accidental triggering of the kill switch in wannacry and thought that they weren't vulnerable as a result.

Shifty Pony
Dec 28, 2004

Up ta somethin'


spankmeister posted:

It wasn't even meant to be a kill switch, we got really lucky with that one

did they figure out what it was actually supposed to be?

the whole wannacry worm seemed like someone hosed up and shipped a beta build.

Shifty Pony
Dec 28, 2004

Up ta somethin'


a lot of reports from people dealing with infections of Petya seem to talk about affected systems rebooting to the ransom screen nearly simultaneously.

I wonder if there is some sort of coordination between infected systems to pull that off.

Shifty Pony
Dec 28, 2004

Up ta somethin'


doesn't it only spread via SMB? that's some level of containment. it probably jumped out of Ukraine on VPNs or that one computer in an organization that was used to do business in Ukraine and had the accounting software on it.

if you want to get a bit :tinfoil: Ukraine has basically become a live fire bombing range for Russian cyber weapons and "loving every company doing business with the Ukrainian government so people think twice about such associations in the future" would be kind of be a plus as far as the Russian government is concerned.

on the other hand you would expect the government to not run the risk of hitting Rosneft.

Shifty Pony
Dec 28, 2004

Up ta somethin'


what the gently caress...

https://twitter.com/0xAmit/status/879778335286452224

https://twitter.com/0xAmit/status/879789734469488642

Shifty Pony
Dec 28, 2004

Up ta somethin'


Ulf posted:

thats great! see you all again in a month

no you see this solved the problem forever and nothing bad will ever happen again.

Shifty Pony
Dec 28, 2004

Up ta somethin'


I just point the browser at proquest and go to town. institutional access owns.

Shifty Pony
Dec 28, 2004

Up ta somethin'


spankmeister posted:

Malware Tech refutes this:

https://www.malwaretech.com/2017/06/petya-ransomware-attack-whats-known.html


The fact remains that the installation ID is generated randomly though.

https://securelist.com/expetrpetyanotpetya-is-a-wiper-not-ransomware/78902/


I've looked at some samples today and the code does seem to support the theory, too early to tell though.

even if the installation ID wasn't just a random number and was actually generated in a way that would allow decryption, the whole decryption payment method stinks.

you have a well written customized piece of malware deployed in a sophisticated manner which combines multiple exploits and multiple payloads, and it relies on a single bitcoin address, the manual transcription of a huge installation ID which doesn't even avoid ambiguous characters, and email? there's a reason the ransomware industry standard procedure for payment is the creation of a per-machine bitcoin address with TOR being used to confirm payment and supply the decryption code automatically on payment.

whoever designed this thing didn't care about being paid. their goals were pretty clearly primarily to get credentials, to cause damage and disruption in Ukraine, or both.

Shifty Pony
Dec 28, 2004

Up ta somethin'


this is a pretty good rundown of it with links to the posts of the various security researchers who found the issues:

https://medium.com/@thegrugq/pnyetya-yet-another-ransomware-outbreak-59afd1ee89d4

Shifty Pony
Dec 28, 2004

Up ta somethin'


suffix posted:

seems sensible to milk the vuln it for what its worth while people still haven't updated

makes me think this is just a small taste of what someone could wreak if they were willing to blow a zero-day or two

the whole thing is probably intended as a demonstration of capabilities. there was a report not too long ago that the US has malware already in place to cripple Russia's networks on command, deployed in response to the election hacking.

even just the deployment method is scary. how many random auto-updaters are there out there that might be vulnerable? all it would take is one computer somewhere running improperly configured or user-installed software and your entire company is hosed.

Shifty Pony fucked around with this message at 21:53 on Jun 29, 2017

Shifty Pony
Dec 28, 2004

Up ta somethin'


wired has a story on it which isn't entirely awful. it goes over the pattern of the attacks starting out as largely manually executed against a particular system and then iterating until they are automated attacks based on modular tools which could be more easily adapted for use against other targets. if you dig a bit online about each of the incidents in the article there are usually a few blog posts by researchers.

Shifty Pony
Dec 28, 2004

Up ta somethin'


hah we haven't even gotten completely shifted over to a 60 day password rotation yet. in four years I look forward to not changing my password all the drat time.

smart-card based 2fa works pretty great though and make my life so much easier.

Shifty Pony
Dec 28, 2004

Up ta somethin'


we have 60 day rotation and warning emails about passwords expiring start getting sent out at 15 days from expiration.

1/4 of my working days I get a password reminder email.

Shifty Pony
Dec 28, 2004

Up ta somethin'


FAT32 SHAMER posted:

But enough about android

never. android will forever be a source of security fuckery.


or at least as long as the devices ship loaded with auto-updating un-deletable bloatware with permissions like this:

quote:

Peel Smart Remote TV Guide
Peel Technologies Inc.
Free
This app has access to:
In-app purchases

Device & app history
-retrieve running apps

Identity
-find accounts on the device

Calendar
-read calendar events plus confidential information
-add or modify calendar events and send email to guests without owners' knowledge

Contacts
-find accounts on the device
-read your contacts

Location
-approximate location (network-based)
-precise location (GPS and network-based)

Phone
-read phone status and identity

Photos/Media/Files
-read the contents of your USB storage
-modify or delete the contents of your USB storage

Storage
-read the contents of your USB storage
-modify or delete the contents of your USB storage

Microphone
-record audio

Wi-Fi connection information
-view Wi-Fi connections

Device ID & call information
-read phone status and identity

Other
-power device on or off
-transmit infrared
-receive data from Internet
-view network connections
-pair with Bluetooth devices
-access Bluetooth settings
-allow Wi-Fi Multicast reception
-connect and disconnect from Wi-Fi
-expand/collapse status bar
-full network access
-change your audio settings
-run at startup
-draw over other apps
-control vibration
-prevent device from sleeping

apparently after the most recent rounds of updates it uses the "draw over other apps" permission to cause full screen popup ads systemwide and send notifications even if people disable notifications. additionally it uses that permission combined with the "prevent the device from sleeping" and "power device on and off" permissions to effectively replace the device lockscreen with its own.

Shifty Pony
Dec 28, 2004

Up ta somethin'


mrmcd posted:

Google literally has a (completely different) EU antitrust investigation going on right now because they tried to tell manufacturers and telcos they couldn't ship Android phones with 10 GB of crapware and security holes.

idk, there's probably enough wiggle room for them to set up some sort of quarantine for all preinstalled apps until they are actually launched by the user. they would just have to include their own apps in it too.

Shifty Pony
Dec 28, 2004

Up ta somethin'


Volmarias posted:

Several years ago, a feature was added to Android so that garbage preload apps could be uninstalled. Apps that are required for phone functionality (Dialer, Settings, etc) could have a flag set that would mark them as "critical" and thus not allowed to be uninstalled.

Guess how long it took for the garbage to be marked "critical" as well?

and if they cracked down and actually applied standards for what is critical functionality the manufacturers would simply pool the dialer and settings app with the bloat apps into a single package such that the former depend on code from the latter for operation, similarly to how MS deeply integrated IE into windows.


hobbesmaster posted:

The antitrust concern is that google is using android to advance their advertising business and disallowing others from doing the same.

almost as though vertical integration is a Pandora's Box of anticompetitive awfulness even when you tag but with the internet onto the end.

Shifty Pony
Dec 28, 2004

Up ta somethin'


ate all the Oreos posted:

i wouldn't mind this so much if I could just put a stock install on the phone or whatever via a process that's not "download some skeevy poo poo from xda-forums"

i'd think they could do something with the branding at least, like you can't use the Android name or call your phone a Certified Google Android(tm) Compatible Device or whatever if you don't allow users to run stock or uninstall poo poo or whatever

the latter is exactly what they do: you can't call your phone an android phone or include any google apps (including the play store framework) without signing into a huge largely secret device manufacturer agreement. the agreement ties all google apps together (so you can't install YouTube without also including Google Now) and mandates integration down to things like the google search bar being top center on the default home screen and having chrome be the default browser and be on the quick access bar.

you might be thinking that maybe google doesn't want to include bloatware controls for fear of antitrust prosecution but they already do include bans on preinstalling particular app types in the agreement, they just only do so when the apps compete directly with google (they prohibit including any competing search bars for example). and the other terms of the agreement are much much worse than any app restrictions, with the real nasty bit being that it straight up prohibits an android manufacturer from making any device based on open source android code, even if they don't brand it as Android or include google apps. that's why Samsung made Tizen instead of just using AOSP.

so in short google could probably make android less of a privacy and security nightmare but they apparently dgaf about anything past ensuring they get first crack at collecting user data.

Shifty Pony
Dec 28, 2004

Up ta somethin'


Powaqoatse posted:

don't use floating points for money.

rest is :wow: tho

e lol

pretty much my reaction as well. completely omitting the ability to use floats means someone had a moment of insight into the inevitability of some *coiner using them in a dumb way if they were present. it's like realizing that kids will be in the kitchen and taking away everything sharper than a silicone spatula.

or, given the shitshow of the rest of the language... someone hosed up in a way that for once turned out to be good.

Shifty Pony
Dec 28, 2004

Up ta somethin'


edit: dammit

slickest part imo:

https://twitter.com/pwnallthethings/status/888060321365209088

crash the server with the arresting swat team ready to go and then send them in when you see him log in to reboot it so you know his personal system isn't powered down and encrypted.

Shifty Pony
Dec 28, 2004

Up ta somethin'


anthonypants posted:

nfc isn't going to fail inside your body unless you are actually a mutant and grow callouses that block rf signals

it is potentially a secfuck, despite what Subjunctive believes, because reading nfc from a distance is a fun trick people like to do for fun, and sitting out in the parking lot of that building is way easier than hanging out at the international terminal at your airport

the ones used in pets and other animals last multiple decades.

they also afaik are extremely simple inductively coupled devices with hard coded ID numbers and zero authentication. the inductive coupling makes it hard to overload and the simple data structure doesn't take a fancy chip that could be hiding fun security vulnerabilities.

maskenfreiheit posted:

I have a friend who's an employment loler lawyer I'll have to see if you can argue religious discrimination or something if they fire you for refusing

i suspect his response will be lol employment at will

nah. you can't even require employees to use biometrics like hard scanning for ID without running into religious discrimination issues. requiring an implant would be completely off limits.

Shifty Pony
Dec 28, 2004

Up ta somethin'


mrmcd posted:

Get Global Entry. It comes with PreCheck which means you get to skip the pornoscanner, and go through the super fast line where you keep shoes on and don't unpack all your electronic poo poo. Also super fast through passport and customs coming back on international trips.

I mean sure it's hosed that the government is basically asking for a bribe to treat you with basic human dignity.. but like $20/yr to sail through... Cheap bribe.

I really should get this. my credit card covers the cost.

Shifty Pony
Dec 28, 2004

Up ta somethin'



burying the lede:

quote:

The second method of operation spotted by the Dark Web community involves so-called "locktime" files that were downloaded from the Hansa Market before Dutch authorities shut it down on July 20.

Under normal circumstances a locktime file is a simple log of a vendor's market transaction, containing details about the sold product, the buyer, the time of the sale, the price, and Hansa's signature. The files are used as authentication by vendors to request the release of Bitcoin funds after a sale's conclusion, or if the market was down due to technical reasons.

According to people familiar with Hansa's inner workings who shared their knowledge with Bleeping Computer, Hansa locktime files were usually just a simple text file.

Before the market went down, these locktime files were replaced with Excel files that contained a hidden image. When the vendor opened the file to view transaction details, the image would load on the vendor's computer.

This image was hosted on the Hansa Market, and once loaded, the server would log the user's IP address. If the user didn't use a VPN, proxy, or funneled all OS-level traffic through Tor, the Hansa server would log his real IP address.

Even if the Hansa Market went down, some vendors might still have the files laying around their computers. After Hansa went down, vendors most certainly opened the files looking into ways to retrieve any funds still locked in Hansa's accounts.

I wonder if the image URL was unique so they could tie IP addresses to usernames.

Shifty Pony
Dec 28, 2004

Up ta somethin'


Powerful Two-Hander posted:

there is an EU law coming in called GDPR that includes right to be forgotten and stuff and it is going to gently caress. poo poo. up. because good luck finding which of your 100 old rear end hosed up document stores with 800Pb of data has my personal information in it when i vindictively pull that on you when i leave.


edit: gently caress this just reminded me that legal used to .pst peoples entire mailboxes and dump them on a shared drive when they left lol

hopefully a few big companies get hosed by this and it serves as an effective counterweight to the vague promises about some future big data powered magical algorithm payoff that companies use to justify mindlessly collecting and storing everything possible about everyone.

Shifty Pony
Dec 28, 2004

Up ta somethin'


Chalks posted:

The proposed legislation is absurd. It has the potential to require you to retroactively redact the email address of a customer stored in a PDF file inside a database, and every copy of that information, including offline tape backups. And you'll need any third party provider, regardless of their location, to be able to do the same.

"sure people regularly get their lives utterly wrecked by our collected information getting into the hands of the wrong people, but have you considered that complying with this regulation would be really hard if we don't actually address the root cause of the problem in our industry's complete disregard for securing or even keeping track of where that sort of information is located?"

Shifty Pony
Dec 28, 2004

Up ta somethin'


French Canadian posted:

Can you explain a bit more how this would apply to me clicking a shameful link?

I am not professional computer toucher as evidenced by my phishing 101 failure.

normally when your computer gets infected with malicious software the hacker is after your login and password because once they have that they can use it to log into other systems and either take the data they have or infect them to get more login information. but if you have a second authentication factor (for example you need to enter in a constantly changing code from a little keyfob in addition to your password whenever you log in) they can't do that.

they are still able to access anything on your machine and (when you are logged into the network) anything your machine can access like network shares. that's where additional layers come into play: your machine should only have read access to what you need to do you job and write access to things you need to change often. ideally your machine and something valuable like the payroll database server shouldn't be able to even figure out that the other exists, the network infrastructure should simply drop every attempt at communications between the two while also alerting the admins that the attempt was made.

Shifty Pony
Dec 28, 2004

Up ta somethin'


gonadic io posted:

let me tell you about row-hammering, where other users running in other vms on the same physical hardware can alter and read your data

still loving amazing that someone managed to whip up a working reasonably high bitrate covert communications channel between vms using that sort of behavior in the CPU cache

https://cmaurice.fr/pdf/ndss17_maurice.pdf

Shifty Pony
Dec 28, 2004

Up ta somethin'


BangersInMyKnickers posted:

lol I got a Symantec platform health report back from my account rep and 70% of the "Virus Detections" in my network were from one misbehaving desktop who kept quarantining a bad .js file then detecting its own quarantine as bad and re-quarantining the file it it already had in an endless loop this product is such a clown show



in college I had that happen on a pc I was working on, but it spawned a new window each time it detected the file and the entire screen just filled up with them until the computer hard froze (I imagine from lack of resources).

made an awful sound too.

Shifty Pony
Dec 28, 2004

Up ta somethin'


here's a thought about the Kaspersky poo poo: the example being discussed is a single hop where the antivirus was on the machine with the target files. is it not also nearly a certainty that Russian intelligence used this as a starting point for much deeper infiltration?

I was thinking that if you had the means and dedication of a state actor the antivirus network would be very useful as part of an operation to break into a secured system. Even if the secured system didn't have the antivirus it is likely that one of the software or hardware providers for the secured system would and you could use it to easily get source code for that software or firmware to find 0-days. or even worse you could potentially use the root access of the antivirus to place an exploit or even an air-gap jumping data collector like Stuxnet in a relatively difficult to notice manner.

jfc what a nightmare.

Shifty Pony
Dec 28, 2004

Up ta somethin'


cinci zoo sniper posted:

unrelated, but how would airgap exfil happen here?

versions of the software on air gapped systems would hide data packets on the hand carried USB drives used to carry data/updates to or from the air gapped systems. then when that drive was attached to a system which was internet connected and also infected the data is gotten out using more traditional means.

this is not some theoretical PoC either, it has been seen in the wild :nsa:

Shifty Pony
Dec 28, 2004

Up ta somethin'


ThePeavstenator posted:

my premium browser purchase

why wouldn't you spring for the Gold version of Netscape 3.0?!

Shifty Pony
Dec 28, 2004

Up ta somethin'


Netscape also pushed hard to incorporate their own proprietary solutions to lock in developers and users because at the time everyone was crowing about how soon the OS and native applications wouldn't matter at all and everything would be via web browser. then whenever people decided to not use whatever they were pushing they came up with horrible performance and stability killing hack jobs to make Navigator "work" with whatever actually became standard.

iirc a page which had the gall to use both tables and css would almost guarantee a crash. that was solvable by disabling css which was accomplished by disabling JavaScript (because the browser rendered css by translating css into JavaScript and executing that).

Shifty Pony
Dec 28, 2004

Up ta somethin'


mrmcd posted:

what the gently caress I'm eating here dude.

JavaScript based style sheets were almost a standard

https://www.w3.org/Submission/1996/1/WD-jsss-960822

Shifty Pony
Dec 28, 2004

Up ta somethin'


Pikavangelist posted:

i now hate the 90s

it is really the only proper response to that decade in tech. also all other decades.

Shifty Pony
Dec 28, 2004

Up ta somethin'


pseudorandom name posted:

presumably they feed the images into the child pornography recognition algorithm and just store the output in a different result set

and no doubt compare it against the child pornography set

nah this is Facebook.


they'll ban the account of the victim for uploading nudity in violation of the TOS.

Shifty Pony
Dec 28, 2004

Up ta somethin'


evil_bunnY posted:

If you're laughing at this remember which timeline we're in, and also what twitter's currently doing.

I was not joking. I fully expect people to get banned by trying to use this "feature".

Space Skeleton posted:

they were infected via stuff given away at a trade show for property managers and have reinfected themselves at least twice so far

drat, that's kind of impressive and can't be a one man show.

I'm not seeing any warnings in the real estate press about it either, I wonder how many have been infected and don't know it.

Shifty Pony
Dec 28, 2004

Up ta somethin'


jfc why would you put that root vulnerability into a public tweet?

MALE SHOEGAZE posted:

imagine the sinking feeling the programmer responsible for that bug is feeling right about now

or anyone involved in the response. imagine seeing this whopper pop up on the bug tracker at 7:00 AM PST while most of the main team is probably en route to work.

it would be legitimately interesting to see a timeline of how long this took to get to the response team.

Shifty Pony
Dec 28, 2004

Up ta somethin'


akadajet posted:

because it's funny and now apple has to clean it up

definitely don't disagree there. this is hilarious.

Shifty Pony
Dec 28, 2004

Up ta somethin'


Ciaphas posted:

dangit qbitorrent is gonna be one isn't it

if it wasn't already

all withers under the roving eye of Tavis.

we'll be lucky if he doesn't find some way to cause the protocol itself to trigger remote execution

Adbot
ADBOT LOVES YOU

Shifty Pony
Dec 28, 2004

Up ta somethin'


DrPossum posted:

these are useful and lots of aparement complexes have their own version too

a local apartment complex added those but you now have to pay a monthly fee to get any packages lol

  • Locked thread