Breaking
December 28, 2024

This Week in Security: License Plates, TP-Link, and Attacking Devs Jonathan Bennett | usagoldmines.com

We’re covering two weeks of news today, which is handy, because the week between Christmas and New Years is always a bit slow.

And up first is the inevitable problem with digital license plates. Unless very carefully designed to be bulletproof, they can be jailbroken, and the displayed number can be changed. And the Reviver plates were definitely not bulletproof, exposing a physical programming port on the back of the plate. While it’s not explicitly stated, we’re guessing that’s a JTAG port, given that the issue is considered unpatchable, and the port allows overwriting the firmware. That sort of attack can be hardened against with signed firmware, and using an MCU that enforces it.

This does invite comparisons to the James Bond revolving license plate — and that comparison does put the issue into context. It’s always been possible to swap license plates. If someone really wants to cause mischief, traditional plates can be stolen, or even faked. What a digital plate adds to the equation is the ability to switch plate numbers on the fly, without stopping or turning a screwdriver. Regardless, this seems like it will be an ongoing problem, as so many manufacturers struggle to create secure hardware.

Malicious RDP

There’s a clever attack, that uses Microsoft’s Remote Desktop Protocol (RDP), to give away way too much control over a desktop. That’s accomplished by sending the target a .rdp file that shares local resources like the clipboard, filesystem, and more. What’s new is that it seems this theoretical attack has now shown up in the wild.

The attack campaign has been attributed to APT29, CozyBear, a threat actor believed to be associated with Russia’s Foreign Intelligence Service. This attribution tracks with the victims of choice, like government, research, and Ukrainian targets in particular. To escape detection, the malicious RDP endpoints are set up behind RDP proxies, running on services like AWS. The proxies and endpoints are accessed through TOR and other anonymous proxies. The .rdp files were spread via spear-phishing emails sent through compromised mail servers. The big push, with about 200 targets, was triggered on October 22nd. Researchers at TrendMicro believe this was the end of a targeted campaign. The idea being that at the end of the campaign, it no longer matters if the infrastructure and methods get discovered, so aim for maximum impact.

Free* Mcdonalds?

Here we learn that while McDonald’s USA dosn’t have a bug bounty program, McDonald’s India does — and that’s why researcher [Eaton Zveare] looked there. And found a series of Broken Object Level Authorization (BOLA) bugs. That’s a new term to this column, but a concept we’ve talked about before. BOLA vulnerabilities happen when a service validates a user’s authentication token, but doesn’t properly check that the user is authorized to access the specific resources requested.

In the McDonald’s case, any user of the web app is issued a guest JWT token, and that token is then valid to access any Order ID in the system. That allows some interesting fun, like leaving reviews on other users’ orders, accessing delivery maps, and getting copies of receipts. But things got really interesting when creating an account, and then ordering food. A hidden, incomplete password login page allowed breaking the normal user verification flow, and creating an account. Then after food is added to the cart, the cart can be updated to have a total price of a single rupee, about the value of a penny.

This research earned [Eaton] a $240 Amazon gift card, which seems a little stingy, but the intent behind the gesture is appreciated. The fixes landed just over 2 months after reported, and while [Eaton] notes that this is slower than some companies, it’s significantly faster than some of the less responsive vendors that we’ve seen.

Banning TP-Link

The US Government has recently begun discussing a plan to ban TP-Link device purchases in the United States. The reported reason is that TP-Link devices have shipped with security problems. One notable example is a botnet that Microsoft has been tracking, that primarily consists of TP-Link devices.

This explanation rings rather hollow, particularly given the consistent security failings from multiple vendors that we’ve covered on this very column over the years. Where it begins to make more sense is when considered in light of the Chinese policy that all new vulnerabilities must first be reported to the Chinese government, and only then can fixes be rolled out. It suggests that the US Commerce Department suspects that TP-Link is still following this policy, even though it’s technically now a US company.

I’m no stranger to hacking TP-Link devices. Many years ago I wrote a simple attack to put the HTTPD daemon on TP-Link routers into debug mode, by setting the wifi network name. Because the name was used to build a command run with bash, it was possible to do command injection, build a script in the device’s /tmp space, and then execute that script. Getting to debug mode allowed upgrading to OpenWRT on the device. And that just happens to be my advice for anyone still using TP-Link hardware: install OpenWRT on it.

Developers Beware

We have two separate instances of malware campaigns directly targeting developers. The first is malicious VSCode extensions being uploaded to the marketplace. These fakes are really compelling, too, with lots of installs, reviews, and links back to the real pages. These packages seem to be droppers for malware payloads, and seem to be targeting cryptocurrency users.

If malware in your VSCode extensions isn’t bad enough, OtterCookie is a campaign believed to come from North Korea, spreading via fake job interviews. The interview asks a candidate to run a Node.js project, or install an npm package as part of prep. Those are malicious packages, and data stealers are deployed upon launch. Stay frosty, even on the job hunt.

Bits and Bytes

PHP has evolved over the years, but there are still a few quirks that might trip you up. One of the dangerous ones is tied up in $_SERVER['argv'], a quick way to test if PHP is being run from the command line, or on a server. Except, that relies on register_argc_argv set to off, otherwise query strings are enough to fool a naive application into thinking it’s running on the command line. And that’s exactly the footgun that caught Craft CMS with CVE-2024-56145.

Australia may know something we don’t, setting 2030 as the target for retiring cryptography primitives that aren’t quantum resistant. That’s RSA, Elliptic-curve, and even SHA-256. It’s a bit impractical to think that those algorithms will be completely phased out by then, but it’s an interesting development to watch.

Fuzzing is a deep subject, and the discovery of 29 new vulnerabilities found in GStreamer is evidence that there’s still plenty to discover. This wasn’t coverage-guided fuzzing, where the fuzzer mutates the fuzzing input to maximize. Instead, this work uses a custom corpus generator, where the generator is aware of how valid MP4 files are structured.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

FallingWater Clock Puts New Spin on a Common LCD Tom Nardi | usagoldmines.com
Nearly $1,700,000,000 in Crypto Lost Through Private Keys Theft As Access Control Exploits Becomes M...
Creating a Mechanical Qubit that Lasts Longer Than Other Qubits Maya Posch | usagoldmines.com
Playing Around with the MH-CD42 Charger Board Tom Nardi | usagoldmines.com
Lathe Gears Make a Clock Al Williams | usagoldmines.com
20 GHz LNB Testing and Teardown Al Williams | usagoldmines.com
Do You Know Vail Code? Al Williams | usagoldmines.com
LDU Decoded: The Untold Tale of LEGO Dimensions Heidi Ulrich | usagoldmines.com
Minecraft in…COBOL? Al Williams | usagoldmines.com
Minecraft in…COBOL? Al Williams | usagoldmines.com
Uncanny Valley of Clean Conquered by Clever Chair Navarre Bartz | usagoldmines.com
Blast Away the Flux — With Brake Cleaner? Dan Maloney | usagoldmines.com
Stream Deck Plus Reverse Engineered Al Williams | usagoldmines.com
A LoRa Rain Gauge from the Ground Up Dan Maloney | usagoldmines.com
A Mechanical Calculator For The Modern Age Jenny List | usagoldmines.com
The Focus Dial Never Shipped, but You Can Build One From Scratch Maya Posch | usagoldmines.com
Hacker Hijacks 15 Accounts on X, Launches Memecoin Scams and Steals $500,000 in One Month: Blockchai...
Battery-Electric Ships: Coming Soon to a Harbor Near You? Maya Posch | usagoldmines.com
Blinded by the Light: the Problem with LED Headlights Maya Posch | usagoldmines.com
Tech in Plain Sight: Incandescent Bulbs Al Williams | usagoldmines.com
OpenWRT, But On An Unsupported Router Jenny List | usagoldmines.com
Open Source Lemontron 3D Printer is Ready to Build Tom Nardi | usagoldmines.com
Taking “Movies” of Light in Flight Elliot Williams | usagoldmines.com
Time Management for Toddlers Kristina Panos | usagoldmines.com
Tweezers Probe Reviewed Al Williams | usagoldmines.com
When It Comes To DOS, Don’t Forget DR-DOS. Jenny List | usagoldmines.com
Esperanto: The Language That Hoped to Unite the World Heidi Ulrich | usagoldmines.com
Open Source Multimeter Raises the Bar for DIY Tools Tom Nardi | usagoldmines.com
Break Me Off a Piece of That Open Source Serial Adapter Tom Nardi | usagoldmines.com
Going Digital: Teaching a TI-84 Handwriting Recognition Heidi Ulrich | usagoldmines.com
Pi’s Evil Twin Goes for Infinity Al Williams | usagoldmines.com
FBI and Other Federal Agencies Identify Hacker Behind $308,000,000 Hack of DMM Crypto Exchange Daily...
Holiday Jukebox Gets ESP32, Home Assistant Support Tom Nardi | usagoldmines.com
A Twenty-Segment Display, Artistically Elliot Williams | usagoldmines.com
Keeping Track of Old Computer Manuals with the Manx Catalog Maya Posch | usagoldmines.com
The Mystery of the Messed-Up Hammond X5 Elliot Williams | usagoldmines.com
Retrotechtacular: Quest for the “Big Boy” CRT Finds New Home in Mini Doc Drew Littrell | usagoldmine...
Bank Executive Allegedly Drains $4,277,227 From Customers’ Accounts in 11-Year Scheme: Report Alex R...
Calling Pink Floyd Al Williams | usagoldmines.com
Watch Any Video on Your Game Boy, Via Link Cable Elliot Williams | usagoldmines.com
ALSEP: Apollo’s Modular Lunar Experiments Laboratory Maya Posch | usagoldmines.com
Camera Slider Uses Repositionable Rail To Do Rotational Moves Lewin Day | usagoldmines.com
Crawler Challenge: Building Rope-Traversing Robots Heidi Ulrich | usagoldmines.com
A Pi Pico Makes A Spectrum Laptop Jenny List | usagoldmines.com
Atoms For Peace: the US Nuclear Fleet Build-Out and Modern-Day Revival Maya Posch | usagoldmines.com
Silicone Tubing as Springs for Capacitive Touch Buttons Maya Posch | usagoldmines.com
Keebin’ with Kristina: the One With the Keyboard-Mouse Kristina Panos | usagoldmines.com
Handheld Satellite Dish is 3D Printed Bryan Cockfield | usagoldmines.com
E-Paper Anniversary Counter Is A Charming Gift With Minimal Power Draw Lewin Day | usagoldmines.com
Faster Integer Division with Floating Point Al Williams | usagoldmines.com
DIY Camera Slider Moves And Rotates For Slick Shots Lewin Day | usagoldmines.com
Hackaday Links: December 22, 2024 Dan Maloney | usagoldmines.com
3D Printed Forklift Is A Cute Desk Toy Lewin Day | usagoldmines.com
240,000 Credit Union Customers Exposed As Hackers Access Trove of Sensitive Data: Report Alex Richar...
Optimizing Your Linux Shell Experience Al Williams | usagoldmines.com
Old 3D Printer Parts Repurposed Into DIY Camera Slider Lewin Day | usagoldmines.com
Dog Plays Chess on ESP32 Bryan Cockfield | usagoldmines.com
Vintage Audio Amp Gets LED Lighting Upgrade Lewin Day | usagoldmines.com
Inside a Diamond Plant Al Williams | usagoldmines.com
Nanoscale Imaging and Control of Altermagnetism in MnTe Maya Posch | usagoldmines.com
An LCD, Touch Sensor, USB-C, And A Microcontroller for a Buck Lewin Day | usagoldmines.com
Records of Nearly 1,000,000 Americans Exposed As Massive Data Breach Reveals Names, Phone Numbers, M...
The Bendix G-15 Runs 75,000 Lines of Code Adam Fabio | usagoldmines.com
Over $225,000,000 in Crypto Distributed To Hack Victims of Collapsed Exchange Cryptopia After Years ...
Custom Firmware For Even Cheaper Bluetooth Thermometers Tom Nardi | usagoldmines.com
8,358 Bank Customers Exposed As Billion-Dollar Lender Reveals Data Breach, Warns Social Security Num...
Intel Terminates X86S Initiative After Formation of New Industry Group Maya Posch | usagoldmines.com
Building A Custom Swiss Army Knife Lewin Day | usagoldmines.com
Training a Self-Driving Kart Bryan Cockfield | usagoldmines.com
JPMorgan Chase Refuses To Reimburse Customer After $7,000 Abruptly Drained From Bank Account: Report...
US Banks Witness 1,000% Surge in Digital Scams As JPMorgan Chase, Wells Fargo and Bank of America Cu...
Man Posing As Uber Driver Allegedly Steals Over $300,000 in Crypto From Unsuspecting Passengers: Rep...
Nigeria Arrests Nearly 800 Over ‘Pig Butchering’ Crypto Scam Targeting North Americans and Europeans...
Crypto Platforms Suffered $2,200,000,000 in Losses From Hacks in 2024 – But There’s a Catch: Chainal...
3D Printing A Big Lego Christmas Tree Lewin Day | usagoldmines.com
It’s Official: The North Pole is Moving Al Williams | usagoldmines.com
Rudolph’s Sleigh on a North Pole PCB Heidi Ulrich | usagoldmines.com
Making a Mechanical Watch From Scratch Is Fine Work Lewin Day | usagoldmines.com
Building a Diet Coke Button Lewin Day | usagoldmines.com
Embossing Leather With a Pipe Bender and 3D Printed Tooling Lewin Day | usagoldmines.com
Hackaday Podcast Episode 301: Hacking NVMe into Raspberry Pi, Lighting LEDs with Microwaves, and How...
Subchannel Stations: The Radio Broadcasts You Didn’t Know Were There Lewin Day | usagoldmines.com
Multimeter Gets Socket Upgrade To Use Nicer Probes Lewin Day | usagoldmines.com
Watch a 3D Scan Become a Car Body Model Donald Papp | usagoldmines.com
Old BBC Micro Gets Some Disk Help From A Raspberry Pi Lewin Day | usagoldmines.com
Getting Dial-Up To Work Over VOIP Isn’t Always Easy Lewin Day | usagoldmines.com
Fixing 1986 Sinclair Spectrum+2 With a High-Score of Issues Maya Posch | usagoldmines.com
Fibonacci Clock Looks Like Beautiful Modern Art Lewin Day | usagoldmines.com
Measuring a Well with Just a Hammer and a Smartphone Dan Maloney | usagoldmines.com
The Battle Over Vanishing Spray Lewin Day | usagoldmines.com
Better C Strings, Simply Al Williams | usagoldmines.com
Human Civilization and the Black Plastic Kitchen Utensils Panic Maya Posch | usagoldmines.com
Where This Xmas Card’s Going, We Don’t Need Batteries! Jenny List | usagoldmines.com
Homebrew Electron Beam Lithography with a Scanning Electron Microscope Dan Maloney | usagoldmines.co...
Back to the Future of Texting: SMS on a Panasonic Typewriter Heidi Ulrich | usagoldmines.com
Bacterium Demonstrates Extreme Radiation Resistance Courtesy of an Antioxidant Maya Posch | usagoldm...
Simple Fluorometer Makes Nucleic Acid Detection Cheap and Easy Dan Maloney | usagoldmines.com
FLOSS Weekly Episode 813a: Happy Holidays! Jonathan Bennett | usagoldmines.com
Push for On, Hold for Off, AC Edition Al Williams | usagoldmines.com
Upper Room UV-C Keeps Air Cleaner Lewin Day | usagoldmines.com

Leave a Reply