We’re Not Saying “I told you so” – PSW #850
In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough!
Hosts
- 1. Introducing a New Command-and-Control Feature in go-exploit: The ShellTunnel
- 2. Pacific Rim: Chronicling a 5-year Hacking Escapade
We spent an hour talking about this one on Below The Surface Episode 41 (https://eclypsium.com/podcasts/bts-41-pacific-rim/).
- 3. Introducing lightyear: a new way to dump PHP files
- 4. Attacking APIs using JSON Injection
By adding some Unicode characters to the end of a string in a JSON field, the researcher was able to fool the API and change the roles of an administrator. It turns out that JSON parsing and serialization/deserialization are funky processes. And no one reads all the fine print in an RFC.
- 5. CVE-2024-48074: RCE Flaw Discovered in DrayTek Vigor2960 Routers, PoC Published
Excellent example of unsanitized user input that is simply passed to a system() function call. Writing CGI applications for IoT systems in C/C++ is super challenging.
- 6. ‘Reflections on Trusting Trust’, but completely by accident this time
This is an extremely technical article. LLVM is a set of tools to build compilers, and the author found a bug in this process. Sorry I could not explain it better!
- 7. Analyzing Firmware: Hardware Hacking Part 3 – TCM Security
I love how strings is still a handy tool for reverse engineering. I've not used Bugprove, but it looks similar to EMBA. At some point I will do a comparison.
- 8. From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code
Google's Project Zero has taken their Project Naptime to the next level with Big Sleep, a collaboration with Google's DeepMind that's pushing the boundaries of what AI can do in vulnerability discovery. They've managed to use large language models to uncover a real-world, exploitable vulnerability in SQLite - one of the best examples I've seen of using LLMs to find software vulnerabilities. This isn't just theoretical stuff anymore; we're talking about AI finding bugs that traditional fuzzing techniques missed, potentially giving defenders a serious edge in the constant battle against cyber threats. Meta came up with the original model, Naptime (named because bug hunters can take a nap while the LLM finds vulns LOL) was Googles improvement with a 20x performance boost, and Big Sleep is the latest improvement that uncovered the SQLite 0-day.
- 9. Fuzzing between the lines in popular barcode software
This is a really in-depth article on how the Trail of Bits folks fuzzed the ZBar barcode open-source software. If you nerd out on fuzzing, this article is for you!
- 10. CRON#TRAP Phishing Attack: A Linux VM Backdoor Hides Inside Windows Systems
A neat way to hide and persist on Windows systems: Use qemu.exe to load a small Linux VM and conduct all operations from Linux rather than risk getting caught on Windows. The Securonix team was able to gain access to the Tiny Linux virtual image and give us a complete breakdown of the tools. Note to attackers: Please keep leaving your shell history commands in tact so we can all see what commands you ran prior to deployment!
- 11. A Deeper Look at FortiJump (FortiManager CVE-2024-47575)
The researchers behind this post get a round of applause! For many reasons:
- They worked hard to setup a lab environment and get devices communicating to each other
- They worked with the protocol enough to replicate registration with a Python script
- Pulled the chip off the hardware to read the SPI flash
- Ran into encryption of the firmware, both the file system and the kernel (!)
- Got the decryption figured out
- Diffed the patches to find the vulnerability
Ultimately they were not able to create a PoC. However, the research is valuable to the community. Some may not have even posted the information if they didn't create a PoC. So glad they posted anyway!
- 12. GitHub – EQSTLab/CVE-2024-46538: Proof-of-Concept for CVE-2024-46538
Keep in mind this requires authentication...
- 13. Cracking into a Just Eat / Takeaway.com terminal with an NFC card
This is hacking at its finest, I love it!
- 14. Thousands of hacked TP-Link routers used in yearslong account takeover attacks
I think we all have favorite movies that are so bad they are actually good. Cult classics that you enjoy watching, but perhaps not everyone enjoys watching them 117 times as you do. For me, that movie is How High (2001), don't judge me! There is a scene in the movie where Method Man says: "You Predicted that S**t". Well, here's a story where I believe I predicted that as hacked TP-Link routers are being used in a botnet to conduct password-spraying attacks. Pretty much in the same way I described in my 2010 BruCon talk (https://www.youtube.com/watch?v=CrHifNseIMQ). Now, I don't want to pat myself on the back, quite the contrary. I am displeased that we have not secured IoT devices and allowed this to happen. We can do better.
- 15. GreyNoise Labs – CVE-2024-8956, CVE-2024-8957: How to Steal a 0-Day RCE (With a Little Help from an LLM)
This is such a great post, and I am glad it is available now (last week, it disappeared from the Internet). Now that it's back, we get to talk about nerd sniping, the cool stuff being done by Greynoise, and crappy security on PTZ cameras exposed to the Internet. You get the full details in this post. Unsurprisingly, both authentication bypass and command injection vulnerabilities exist and are being exploited by attackers.
- 16. Hackers demand France’s Schneider Electric pay a $125k ransom in baguettes
I'm not really interested in the purported Schneider Electric breach (I think they are great company). I would like to discuss the hilarity of paying a ransom in baguettes. Also, there is this: "However, the hacker(s) indicated, that should Schneider publicly admit to this latest data breach, the ransom would be cut in half. Thus, the ransom demanded would decrease to $62,500 worth of baguettes, we would presume. Even with a 50% deduction, that’s still a lot of dough." - Thanks to Aaron for pointing out this story. Also, Tom's Hardware is on point with the dough comment.
- 17. Zero-Day FOMO: The Fear of Missing Out on the Next Big Exploit
I want to discuss this in particular: "With the rise in cyberattacks, the pressure to stay ahead of these threats is intense. This leads to what some call “Zero-Day FOMO” — a unique fear among cybersecurity teams of missing out on detecting or defending against the next big exploit. It’s a blend of excitement, pressure, and, yes, stress, as defenders aim to stay one step ahead in an unpredictable game of digital cat and mouse." - Is this really a thing? Why is it a thing? Should it be a thing?
- 18. Fired Disney worker accused of hacking into restaurant menus, replacing them with Windings and false peanut allergy information
After a bad work break-up, Disney did not change credentials to their menu system. Then this happened: "Disney discovered some time later that it had suffered a security breach, and uncovered that several changes had been made to its menu creation software. These included the changing of all fonts in the app to the Windings symbols font which made all of the menus unusable, the redirection of QR codes to a website calling for a boycott of Israel, and the potentially dangerous removal of allergy information. As a consequence, Menu Creator was unusable for 1-2 weeks and manual processes had to be introduced by Disney to create menus for its restaurants." - While some of the activity is hilarious, some is hactivism, the altering of allergy information is dangerous. I don't agree with any of it, but do want to point out the Wingdings font is hilarious. Oh, there was also the DoS attack: "Beginning August 29 2024, 14 Disney employees found themselves blocked from accessing their accounts by a denial-of-service attack which used an automated script to attempt 100,000 logins - causing the accounts to lockdown." This attack was specifically targeting Disney employees he had beef with. But then, it gets even creepier as the former employee visited the home of one of the Disney employees, who for safety reasons stayed in a hotel shortly thereafter. The only good news: "Scheuer remains in federal custody awaiting his motion hearing for bond on 5 November 2024. " - Something tells me that once the judge sees the Ring doorbell footage he may not be eligible for bail.
- 1. SatDump.Org/_posts/2024-10-28-1.2.1-release.md at master · SatDump/SatDump.Org
- 2. Inside a Firewall Vendor’s 5-Year War With the Chinese Hackers Hijacking Its Devices
- 3. From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code
- 4. College helmet comms not secure, sources say
- 5. Inside the Massive Crime Industry That’s Hacking Billion-Dollar Companies
- 1. Cybersecurity Job Market Stagnates, Dissatisfaction Abounds
Even though 90% of organizations have unfilled positions or underskilled workers on their cybersecurity teams, hiring for those jobs has, for the first time in six years, ground to a halt. A full 67% of respondents to the ICS2 survey cited budget as their top cause for staffing shortages, replacing last year's No. 1 cited reason for empty positions, which was a lack of qualified talent.
- 2. Over 500 Amazon workers decry “non-data-driven” logic for 5-day RTO policy
More than 500 Amazon workers reportedly signed a letter to Amazon Web Services' (AWS) CEO this week, sharing their outrage over Amazon's upcoming return-to-office (RTO) policy that will force workers into offices five days per week. In September, Amazon announced that starting in 2025, workers will no longer be allowed to work remotely twice a week.
- 3. 300 percent price hikes push disgruntled VMware customers toward Broadcom rivals
Numerous VMware customers I spoke with said their VMware costs rose 300 percent after Broadcom's takeover. Some companies have cited even higher price hikes—including AT&T, which claimed that Broadcom proposed a 1,050 percent price hike. This will force small and medium-sized business to migrate to another solution, while large customers will probably just accept paying more.
- 4. Inside a Firewall Vendor’s 5-Year War With the Chinese Hackers Hijacking Its Devices
For more than five years, the UK cybersecurity firm Sophos engaged in a cat-and-mouse game with a single network of vulnerability researchers in Chengdu, China. Sophos researchers even eventually obtained from the hackers' test machines a specimen of “bootkit” malware designed to hide undetectably in the firewalls' low-level code used to boot up the devices, a trick that has never been seen in the wild.
- 5. Exposing the Danger Within: Hardcoded Cloud Credentials in Popular Mobile Apps
Several widely-used apps have been found to contain hardcoded and unencrypted cloud service credentials within their codebases, including Amazon Web Services (AWS) and Microsoft Azure Blob Storage credentials.
- 6. Russian court fines Google $20,000,000,000,000,000,000,000,000,000,000,000
A Russian court has ruled that Google owes Russian media stations around $20 decillion in fines for blocking their content. The court imposed a fine of 100 thousand rubles ($1,025) per day, with the total fine doubling every week.
- 7. Inside the Massive Crime Industry That’s Hacking Billion-Dollar Companies
Modern infostealers are so powerful that a download of an innocent-looking piece of software by a single person can lead to a data breach at a multibillion-dollar company. The article doesn't discuss ways to protect companies, but I think the best one is zero-trust solution like Zscaler.
- 8. Windows infected with backdoored Linux VMs in new phishing attacks
Phishing emails include a large 285MB ZIP archive to install a Linux VM with a pre-installed backdoor. Since QEMU is a legitimate tool that is also digitally signed, Windows does not raise any alarms about it running, and security tools cannot scrutinize what malicious programs are running inside the virtual machine.
- 9. An Okta login bug bypassed checking passwords on some long usernames
The vulnerability is fixed now, but Okta said that for three months it could’ve been used to access accounts with usernames stretching at least 52 characters long.
- 10. Facial Recognition That Tracks Suspicious Friendliness Is Coming to a Store Near You
Israel-based Corsight AI has a new service aimed at rooting out what the retail industry calls “sweethearting,”—instances of store employees giving people they know discounts or free items. “When someone is planning a sweethearting theft, they will always go to the same cashier, which is most of the time a relative of theirs, and this is an anomaly in the behavior compared to the other customers. Our system is able to identify this anomaly and alert on that.”
- 11. Fired Employee Allegedly Hacked Disney World’s Menu System to Alter Peanut Allergy Information
A disgruntled former Disney employee changed allergy information on menus to say that foods that had peanuts in them were safe for people with allergies, added profanity to menus, and at one point changed all fonts used on menus to Wingdings. He did this using passwords that he still had access to on several different systems. How can Disney be using shared passwords these days? Is this a failure of PCI compliance?