Breaking
January 11, 2025

This Week in Security: Backdoored Backdoors, Leaking Cameras, and The Safety Label Jonathan Bennett | usagoldmines.com

The mad lads at watchTowr are back with their unique blend of zany humor and impressive security research. And this time, it’s the curious case of backdoors within popular backdoors, and the list of unclaimed domains that malicious software would just love to contact.

OK, that needs some explanation. We’re mainly talking about web shells here. Those are the bits of code that get uploaded to a web server, that provide remote access to the computer. The typical example is a web application that allows unrestricted uploads. If an attacker can upload a PHP file to a folder where .php files are used to serve web pages, accessing that endpoint runs the arbitrary PHP code. Upload a web shell, and accessing that endpoint gives a command line interface into the machine.

The quirk here is that most attackers don’t write their own tools. And often times those tools have special, undocumented features, like loading a zero-size image from a .ru domain. The webshell developer couldn’t be bothered to actually do the legwork of breaking into servers, so instead added this little dial-home feature, to report on where to find all those newly backdoored machines. Yes, many of the popular backdoors are themselves backdoored.

This brings us to what watchTowr researchers discovered — many of those backdoor domains were either never registered, or the registration has been allowed to expire. So they did what any team of researchers would do: Buy up all the available backdoor domains, set up a logging server, and just see what happens. And what happened was thousands of compromised machines checking in at these old domains. Among the 4000+ unique systems, there were a total of 4 .gov. domains from governments in Bangladesh, Nigeria, and China. It’s an interesting romp through old backdoors, and a good look at the state of still-compromised machines.

The Cameras are Leaking

One of the fun things to do on the Internet is to pull up some of the online video feeds around the world. Want to see what Times Square looks like right now? There’s a website for that. Curious how much snow is in on the ground in Hokkaido? Easy to check. But it turns out that there are quite a few cameras on the Internet that probably shouldn’t be. In this case, the focus is on about 150 license plate readers around the United States that expose both the live video stream and the database of captured vehicle data to anyone on the Internet that knows where and how to look.

This discovery was spurred by [Matt Brown] purchasing one of these devices, finding how easy they were to access, and then checking a service like Shodan for matching 404 pages. This specific device was obviously intended to be located on a private network, protected by a firewall or VPN, and not exposed to the open Internet. This isn’t the first time we’ve covered this sort of situation, and suggests an extension to Murhpy’s Law. Maybe I’ll refer to it as Bennett’s law: If a device can be put on the public Internet, someone somewhere inevitably will do so.

Some related research is available from RedHunt Labs, who did a recent Internet scan on port 80, and the results are a bit scary. 42,000,000 IP addresses, 1% of the IPv4 Internet, is listening on port 80. There are 2.1 million unique favicons, and 87% of those IPs actually resolve with HTTP connections and don’t automatically redirect to an HTTPS port. The single most common favicon is from a Hikvision IP Camera, with 674,901 IPs exposed.

The Big Extension Compromise

One of the relatively new ways to deploy malicious code is to compromise a browser plugin. Users of the Cyberhaven browser plugin received a really nasty Christmas present, as a malicious update was pushed this Christmas. The Cyberhaven extension is intended to detect data and block ex-filtration attempts in the browser, and as such it has very wide permissions to read page content. The malicious addition looked for API keys in the browser session, and uploaded cookies for sites visited to the attacker. Interestingly the attack seemed to be targeted specifically at OpenAI credentials and tokens.

This started with an OAuth phishing attack, where an email claimed the extension was in danger of removal, just log in with your Chrome Developer account for details. The Cyberhaven clicked through the email, and accidentally gave attackers permission to push updates to the extension. This isn’t the only extension that was targetted, and there are other reports of similar phishing emails. This appears to be a broader attack, with the first observed instance being in May of 2024, and some of the affected extensions used similar techniques. So far just over 30 compromised extensions have been discovered to be compromised in this way.

And while we’re on the topic of browser extensions, [Wladimir Palant] discovered the i18n trick that sketchy browser extensions use to show up in searches like this one for Wireguard.

The trick here is internationalization, or i18n. Every extension has the option to translate its name and description into 50+ languages, and when anyone searches the extension store, the search term can match on any of those languages. So unscrupulous extension developers fill the less common languages with search terms like “wireguard”. Google has indicated to Ars Technica that it is aware of this problem, and plans to take action.

Safety Labels

The US has announced the U.S. Cyber Trust mark, a safety label that indicates that “connected devices are cybersecure”. Part of the label is a QR code, that can be scanned to find information about the support timeline of the product, as well as information on automatic updates. There are some elements of this program that is an obviously good idea, like doing away with well known default passwords. Time will tell if the Cyber Trust mark actually makes headway in making more secure devices, or if it will be just another bit of visual clutter on our device boxes? Time will tell.

Bits and Bytes

SecureLayer7 has published a great little tutorial on using metasploit to automatically deploy known exploits against discovered vulnerabilities. If Metasploit isn’t in your bag of tricks yet, maybe it’s time to grab a copy of Kali Linux and try it out.

Amazon, apparently, never learns, as Giraffe Security scores a hat trick. The vulnerability is Python pip’s “extra-index-url” option preferring to pull packages from PyPi rather than the specified URL. It’s the footgun that Amazon just can’t seem to avoid baking right into its documentation. Giraffe has found this issue twice before in Amazon’s documentation and package management, and in 2024 found it the third time for the hat trick.

It seems that there’s yet another way to fingerprint web browsers, in the form of dynamic CSS features. This is particularly interesting in the context of the TOR browser, that turns off JavaScript support in an effort to be fully anonymous.

And finally, there seems to be a serious new SonicWall vulnerability that has just been fixed. It’s an authentication bypass in the SSLVPN interface, and SonicWall sent out an email indicating that this issue is considered likely to be exploited in the wild.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

$2,000,000 Drained From Customers’ Bank Accounts in Just 8 Days, Says Financial Giant, Warning Scamm...
In Praise of Simple Projects Elliot Williams | usagoldmines.com
Comparing Ways to Add Threads to Your 3D Prints Maya Posch | usagoldmines.com
Embedding Lenticular Lenses Into 3D Prints Donald Papp | usagoldmines.com
Tactility; The ESP32 Gets Another OS Jenny List | usagoldmines.com
AA Battery Performances Tested, So Get The Most For Your Money Donald Papp | usagoldmines.com
T-Mobile Sued Over Massive Data Breach That Leaked Sensitive Info on 79,000,000 Americans Henry Kana...
The Engineer Behind Mine Detection Al Williams | usagoldmines.com
Losses From Crypto Hacks and Scams Soar in 2024, Exceeding $3,010,000,000: Blockchain Security Firm ...
Springs and Things Make for a Unique Timepiece Dan Maloney | usagoldmines.com
Bit-Banging the USB-PD Protocol Bryan Cockfield | usagoldmines.com
Life Without Limits: A Blind Maker’s Take on 3D Printing Heidi Ulrich | usagoldmines.com
SerenityOS On Real Hardware Jenny List | usagoldmines.com
Hackaday Podcast Episode 303: The Cheap Yellow Display, Self-Driving Under $1000, and Don’t Remix th...
RISC-V Microcontroller Lights Up Synth with LED Level Meter Dan Maloney | usagoldmines.com
A Low Effort, Low Energy Doorbell Al Williams | usagoldmines.com
It’s IP, Over TOSLINK! Jenny List | usagoldmines.com
Engineering Lessons from the Super-Kamiokande Neutrino Observatory Failure Dan Maloney | usagoldmine...
Man Loses $188,000 in Crypto Scam to Fraudster Posing As Childhood Friend: Report Rhodilee Jean Dolo...
Sheet Metal Forming With 3D Printed Dies Maya Posch | usagoldmines.com
Toner Transfer, but Not for PCBs Al Williams | usagoldmines.com
Retrotechtacular: Soldering the Tek Way Dan Maloney | usagoldmines.com
Writing a RISC-V OS From Scratch Al Williams | usagoldmines.com
Physical Media is Dead, Long Live Physical Media Maya Posch | usagoldmines.com
3DBenchy Starts Enforcing its No Derivatives License Maya Posch | usagoldmines.com
All-Band Receiver Lets You Listen to All the Radio at Once Dan Maloney | usagoldmines.com
Retro Big Iron for You Al Williams | usagoldmines.com
A Street For Every Date Jenny List | usagoldmines.com
Investigators to Search Through Do Kwon’s Personal Emails, Twitter Messages and Mobile Devices in Te...
24-Year-Old Arrested for Alleged $4,600,000 Crypto Scam That Defrauded 300 People: Report Mehron Rok...
Try a PWMPot Al Williams | usagoldmines.com
38C3: It’s TOSLINK, Over Long Distance Fibre Jenny List | usagoldmines.com
FLOSS Weekly Episode 815: You Win Some, You Lose Some Jonathan Bennett | usagoldmines.com
Running AI Locally Without Spending All Day on Setup Al Williams | usagoldmines.com
Tech In Plain Sight: Security Envelopes Kristina Panos | usagoldmines.com
Remotely Controlled Vehicles Over Starlink Tom Nardi | usagoldmines.com
Making Sure Your Patch Cables Are Ready for RF Work Dan Maloney | usagoldmines.com
Toot-B-Gone, With The FartMaster 3000 Jenny List | usagoldmines.com
Regular (Expression) Chess Al Williams | usagoldmines.com
Bending Light, Bending Time: A DIY Polarizer Clock Heidi Ulrich | usagoldmines.com
The Helicone: Toy or Mathematical Oddity? Al Williams | usagoldmines.com
Gaze Upon This Omni-directional Treadmill’s Clever LEGO Construction Donald Papp | usagoldmines.com
Cleaning Up Bhopal: the World’s Worst Industrial Disaster Maya Posch | usagoldmines.com
Keebin’ with Kristina: the One with the Circuit Sculpture Keyboard Kristina Panos | usagoldmines.com
More Things to Do with Your Cheap Yellow Display Tom Nardi | usagoldmines.com
One To Watch For In 2025: Tanmatsu Jenny List | usagoldmines.com
Logging Baby’s Day in Linux Tom Nardi | usagoldmines.com
Thirty Years Later, The Windows 3.1 Video Driver You Needed Jenny List | usagoldmines.com
Rethinking Your Jellybean Op Amps Dan Maloney | usagoldmines.com
Is a Cheap Frequency Standard Worth It? Jenny List | usagoldmines.com
No Frills PCB Brings USB-C Power to the Breadboard Tom Nardi | usagoldmines.com
Growing Semiconductor Layers Directly With TMDs Maya Posch | usagoldmines.com
Before GPS There Was LORAN Al Williams | usagoldmines.com
Cassette Tape Plays MP3s Bryan Cockfield | usagoldmines.com
One Small Step: All About Stepper Motors Maya Posch | usagoldmines.com
Turns Out Humans Are Terrible At Intuiting Knot Strength Donald Papp | usagoldmines.com
Mechanical Calculator Finds Derivitives Al Williams | usagoldmines.com
Shining Through: Germanium and Gold Leaf Transparency Heidi Ulrich | usagoldmines.com
Perfecting 20 Minute PCBs with Laser Al Williams | usagoldmines.com
Hackaday Links: January 5, 2025 Dan Maloney | usagoldmines.com
Reverse-Engineering the Polynomial Constants in the Pentium’s FPU Maya Posch | usagoldmines.com
Bank Executive Accused of Stealing $345,664 From Lender in Three Months, Forging Documents and Direc...
Stacy’s Computer Has Got It Going On Al Williams | usagoldmines.com
Atari 65XE In Laptop Form Bryan Cockfield | usagoldmines.com
16-bit Linux-like Goodness Al Williams | usagoldmines.com
E-Bike Motor Gets New Life As Hydro Plant Bryan Cockfield | usagoldmines.com
All Aboard the Hack Train: Nottingham’s LED Revival Heidi Ulrich | usagoldmines.com
Self Driving Like it’s 1993 Al Williams | usagoldmines.com
U.S. Justice Department Hands $4,300,000,000 To 40,930 Victims of ‘History’s Largest Ponzi Scheme’ H...
PoE-Power Protection: The Hornet Nest Alarm Panel Heidi Ulrich | usagoldmines.com
U.S. Justice Department Hands $4,300,000,000 To 40,930 Victims of ‘History’s Largest Ponzi Scheme’ H...
How Crane Games are Playing Claw Games with the Player Maya Posch | usagoldmines.com
JPMorgan Chase Abruptly Freezes $43,000, Refuses To Release Funds To Scammed Bank of America Custome...
Pi Pico Makes SSTV Reception a Snap Dan Maloney | usagoldmines.com
Resolution: Share Inspiration Elliot Williams | usagoldmines.com
Button Debouncing With Smart Interrupts Bryan Cockfield | usagoldmines.com
A New Life For a Conference Badge, Weighing Bees Jenny List | usagoldmines.com
High Performance RISC-V Al Williams | usagoldmines.com
Math on a Checkerboard Bryan Cockfield | usagoldmines.com
Crypto Lawyer and XRP Defender John Deaton Issues Lengthy Warning to Traders: Beware of Scammers Meh...
US Treasury Confirms ‘Major Cybersecurity Incident’ As Chinese State-Sponsored Hackers Accused of In...
Custom Firmware Adds Capabilities to Handie Talkie Bryan Cockfield | usagoldmines.com
Landing Soon: This Beautiful Weather Display Kristina Panos | usagoldmines.com
Organizing Components, The Easy Way Al Williams | usagoldmines.com
3D Printed Case Turns Pixel 6 Pro into Palmtop Tom Nardi | usagoldmines.com
Hackaday Podcast Episode 302: Scroll Wheels, Ball Screws, and a New Year for USB-C Al Williams | usa...
This Week in Security: IOCONTROL, (Location) Leaking Cars, and Passkeys Jonathan Bennett | usagoldmi...
FPV Flying in Mixed Reality is Easier than You’d Think Tom Nardi | usagoldmines.com
Pico Pal Puts RP2350 Into Game Boy Color Shell Tom Nardi | usagoldmines.com
Dress Up Your 3D Prints with Toner-Transfer Labels Dan Maloney | usagoldmines.com
555 Timers Bring Christmas Charm to Miniature Village Tom Nardi | usagoldmines.com
T3 Financial Crime Unit Freezes $126,000,000 in USDT on Tron (TRX) Blockchain in Just Four Months Da...
The Ultimate Distraction Free Writing Environment Jenny List | usagoldmines.com
A Modern Battery For a Classic Laptop Bryan Cockfield | usagoldmines.com
Programming Ada: Atomics and Other Low-Level Details Maya Posch | usagoldmines.com
Crafting a Cardboard Tribute to Puzzle Bobble Heidi Ulrich | usagoldmines.com
2024: As The Hardware World Turns Tom Nardi | usagoldmines.com
DIYFPV: A New Home for Drone Builders Tom Nardi | usagoldmines.com
Light Brite Turned Sci-Fi Console on the Cheap Tom Nardi | usagoldmines.com
Broken USB Lamp Saved with a Bit of Woodworking Tom Nardi | usagoldmines.com

Leave a Reply