Breaking
February 28, 2025

This Week in Security: Malicious Themes, Crypto Heists, and Wallbleed Jonathan Bennett | usagoldmines.com

It’s usually not a good sign when your downloaded theme contains obfuscated code. Yes, we’re talking about the very popular Material Theme for VSCode. This one has a bit of a convoluted history. One of the authors wanted to make some money from all those downloads. The original Material Theme was yanked from the VSCode store, the source code (improperly) re-licensed as closed source, and replaced with freemium versions. And this week, those freemium versions have been pulled by Microsoft for containing malware.

Now there’s a quirk to this story. No one has been able to answer a simple yet vital question: What exactly did the theme plugin do that was malicious? The official response is that “A theming extension with heavily obfuscated code and unreasonable dependencies including a utility for running child processes”. Looking at the official statements and unofficial security reviews, I can’t find confirmation that the plugins have actually been observed doing something malicious. The only concrete problem is that the plugin shipped obfuscated JavaScript. There are several incomplete statements about a problem with a sanity.io dependency that may have been compromised.

The conclusion at this point is that a thorough security review of these plugins has not been published. The Microsoft team found enough problematic elements in the plugins to trigger pulling them. But I join the chorus of voices calling on Microsoft to clearly answer the vital question: Have any users of Material Theme plugins actually been compromised?

Low-hanging Backups

NAKIVO backup has an interesting endpoint, the getImageByPath call that’s used for loading the system’s logo, and is accessible for unauthenticated users. It’s pretty simple, just taking a path to a file on the appliance filesystem, and returning the byte array for use as an image. And of course, it doesn’t check whether the requested file is actually an image. Nor is it limited to a list of allowed paths.

So hence we essentially have an arbitrary file read. It’s not entirely arbitrary, as the file is first loaded into memory before being served. So the backups themselves are likely too big to successfully exfiltrate in this way. There are still some rather interesting targets, including the system logs. But the real juicy target is the system database itself. Thankfully, the user credentials for the NAVIKO system itself seem to be properly hashed to avoid casual theft. But setting up useful backups will require all sorts of integrations, like SSH and AWS credentials. And those are stored in plain text inside the database. Whoops.

Apple Did What?

A couple weeks ago we talked about Apple and the UK government having a tussle over iCloud backup encryption. Apple has finally rolled out end-to-end encryption for those backups, and the UK’s Snooper’s Charter has been used to require Apple to add an encryption backdoor in that system. That’s problematic for multiple reasons, and Apple has opted to not quietly oblige the UK government. You may have seen headlines that Apple has pulled access to the new Advanced Data Protection (ADP) for UK users. This seems to be the next step of anti-compliance with the new UK rule.

The logic here seems to be that not offering any end-to-end encrypted backup system for UK users is a better choice than claiming to offer such a system that actually contains a backdoor. That’s doubly true, as the law in question doesn’t seem to limit itself to UK users. If the UK government doesn’t back down on their extremely questionable demands, the next major step may be for Apple to pull sales from the country entirely.

Crypto Heist

We have a pair of crypto heist stories this week, with the first one being the largest in history. At a staggering $1.5 Billion, this seems like the biggest single theft of any kind to ever be successfully pulled off. And the details of how it was done are still a bit murky. The funds were stolen out of a Bybit “multisig” cold wallet. Those are clever currency stores that actually include smart contracts in the storage mechanism, requiring multiple owners to sign off on transactions.

It’s believed that this hack was pulled off by North Korean agents, through the use of very clever but simple techniques: Social engineering, and UI manipulation. In essence, a request for digital signature that claimed to do something benign, that actually unlocked the funds for theft. Some things never seem to change.

And that’s not all that’s happening with Cryptocurrency these days. It turns out that there’s another dead-simple attack that is targeting job-seeking individuals, instead of huge companies. “We may have a job for you, go to this website and run this application to apply!” Rather than a legitimate videoconferencing or interviewing application, the download is a simple backdoor. It’s used primarily to find crypto wallets and siphon the funds out.

Wallbleed

Remember Heartbleed? That’s the glitch in OpenSSL from 2014, where the TLS heartbeat implementation could trivially leak large amounts of system memory. Wallbleed is a strangely similar bug in the implementation of the Chinese Great Firewall system. One way the Great Firewall does censorship is via DNS injection. Request the DNS information for a blocked domain, and the firewall will intercept that request in real time, and return a spoofed response with a bogus IP address for the requested domain. Importantly for this discussion, that spoofing is bi-directional. You can send DNS requests to Chinese IP addresses, and get spoofed responses from the Great Firewall.

DNS request and response packets use an interesting variable length transport system, where the domain name being requested is turned into a set of length-value pairs. example.com is represented as 07example03com00. 7 bytes for the domain, then 3 bytes for the TLD, and a terminating null. Many of us are immediately wondering, what happens if that query was packed incorrectly: 07example20com00? There aren’t actually 20 bytes in the query, so what do various DNS responders do when handed such a query? Well-written DNS servers recognize that this is garbage, and just drop the packet. Some of the great firewall infrastructure did something far more interesting. It spoofs the DNS response, and performs a buffer over-read when constructing the response. Yes, leaking a few bytes of raw system memory back to the requester, a la Heartbleed.

And when we say “a few bytes”, the maximum observed leakage in a single spoofed response was 125. As you might imagine, that’s quite a bit of data. Enough data, in fact, to learn quite a bit about the Great Firewall and what sort of traffic it sees. There were also what appeared to be x86_64 pointers and Linux stack frames.

This attack was first discovered by researchers in 2021 and finally completely fixed in March 2024. In the intermediate time, those researchers used the vulnerability quite heavily to mine the Great Firewall infrastructure for data. This is an interesting ethical question. Normally it’s considered completely unacceptable to weaponize a vulnerability beyond what’s needed as a proof of concept. The Great Firewall is in some ways an adversarial device, making exploitation a bit murkier. On the other hand, vulnerabilities like this a usually disclosed in order to get them fixed. What is a researcher’s responsibility in this case, when the vulnerability is in a censorship device? It seems the Chinese authorities discovered the Wallbleed vulnerability themselves, excusing researchers from needing to fully answer this particular ethical question.

Bits and Bytes

It’s not surprising to open up an electronic device, and find an ugly glob of potting compound spread over one or several of the key chips inside. Or for some devices, the compound is ubiquitous, covering everything. [Graham Sutherland] has some thoughts on how to defeat the stuff. And while some is obvious, like using a drill press to very carefully expose a target interface, there are some really inventive ideas I would never have considered, like throwing an entire board into a pressure cooker for an hour!

How long does it take for a cyber criminal to go from initial access on an internal machine, to full access to a privileged computer? In the ReliaQuest case, it was 48 minutes. The hack was simple and clever. Start a mass spam and phishing campaign, and then pose as a helpful IT worker who could help end the carnage. All it takes is one employee to fall for the fake help desk routine, and 48 minutes.

Let’s say you wanted to pirate music from a streaming service like Deezer, but you really didn’t want your IP address or machine associated with the piracy. What would you do? Use Tor? VPNs? How about create a malicious PyPi package that does your downloading for you. That seems to be the bizarre case of automslc, a reasonably popular package that secretly downloads and scrapes from the music platform.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Lost Foam Aluminium Alloy Casting Dave Rowntree | usagoldmines.com

Hackaday Podcast Episode 310: Cyanotypes, Cyberdecks, and the Compass CNC Kristina Panos | usagoldmi...

Tech in Plain Sight: Shopping Cart Locks Al Williams | usagoldmines.com

Gonzo Film Making With The Raspberry Pi Lewin Day | usagoldmines.com

Copying Commodore Data Tapes, 40 Years Late Bryan Cockfield | usagoldmines.com

Bringing a Current Dumping Amplifier Back To Life Jenny List | usagoldmines.com

AI Helps Researchers Discover New Structural Materials Navarre Bartz | usagoldmines.com

Convert a Cheap Tube Preamp Into A Headphone Amp With Jenny Lewin Day | usagoldmines.com

Bybit Hackers Launder $335,000,000 in Ethereum (ETH) With ‘No Friction, No Risk’: Report Rhodilee Je...

Bybit Launches Community Effort To Fight North Korean Hackers Lazarus Group After $1,400,000,000 Hei...

Thermorphs: Self-Folding 3D Prints Navarre Bartz | usagoldmines.com

esp-hal, a Stable-API ESP32 HAL Gift For Your Rust Code Arya Voronova | usagoldmines.com

Linux Fu: USB Everywhere Al Williams | usagoldmines.com

A Precisely Elegant Cyberdeck Handheld Donald Papp | usagoldmines.com

What Game Should Replace Doom As The Meme Port Of Choice? Lewin Day | usagoldmines.com

How Do Air Fryers Work? Navarre Bartz | usagoldmines.com

Shelved Kindle Gets New Life as Weather Display Bryan Cockfield | usagoldmines.com

SHOUT For Smaller QR Codes Jenny List | usagoldmines.com

District Heat Pump Systems Save Money and Gas Utilities Navarre Bartz | usagoldmines.com

Bybit Forensic Investigation Determines $1,480,000,000 Hack Stemmed From Vulnerability in Safe Walle...

Building a DIY Muon Tomography Device for About $100 Maya Posch | usagoldmines.com

Want a Truck with a Short Bed and a Long Camper Shell? Navarre Bartz | usagoldmines.com

FLOSS Weekly Episode 822: Nand2Tetris Jonathan Bennett | usagoldmines.com

Too Smooth: Football and the “KnuckleBall” Problem Lewin Day | usagoldmines.com

UL Investigates the Best Way to Fight EV Fires Navarre Bartz | usagoldmines.com

New Camera Does Realtime Holographic Capture, No Coherent Light Required Donald Papp | usagoldmines....

Hackaday Europe 2025: Workshops and More Speakers Elliot Williams | usagoldmines.com

A Ten Band SDR Transceiver For Homebrewers Jenny List | usagoldmines.com

DIY Open-Source Star Tracker Gets You Those Great Night Shots Donald Papp | usagoldmines.com

Import GPU: Python Programming with CUDA Bryan Cockfield | usagoldmines.com

$200,000 Exits Dead Man’s Bank Account As Bank Employee Allegedly Pilfers Massive Pile of Cash for P...

Taking Cues From a Gramophone To Make a Better Marble Music Machine Donald Papp | usagoldmines.com

Reverse-Engineering SKS Airspy Tire Pressure Sensors for Custom Firmware Maya Posch | usagoldmines.c...

Infill Injection Experiment Makes Stronger Parts Donald Papp | usagoldmines.com

We’re Hiring: Come Join Us! Elliot Williams | usagoldmines.com

Tech In Plain Sight: Magsafe, and How To Roll Your Own Al Williams | usagoldmines.com

Custom Frame Grabber Gets Vintage Kodak Digital Camera Back in the Game Dan Maloney | usagoldmines.c...

BlackBerry Keyboard Makes This Handheld Pi Stand Out Jenny List | usagoldmines.com

PCB Dielectric Constant Measurements, Three Ways Dan Maloney | usagoldmines.com

To Test a (Smart) LED Al Williams | usagoldmines.com

Hackable Cities Navarre Bartz | usagoldmines.com

Wells Fargo Allegedly Does Nothing As Fraudsters Drain $40,000 From Bank Account, Ignoring Urgent Wa...

Bybit Promises up to $140,000,000 Bounty To Hunt Down Perpetrators of ‘Largest Heist’ in Crypto Hist...

Kansas Town Rocked by Former Banker Who Was Duped by $47,100,000 Crypto Scam: Report Alex Richardson...

Bybit Ethereum (ETH) Reserves Steadily Recovering Following Massive Hack, According to CryptoQuant M...

3D Print An Instant Camera Jenny List | usagoldmines.com

Atmospheric Water Harvesting With High Voltage Maya Posch | usagoldmines.com

Keebin’ with Kristina: the One with All the Green Keyboards Kristina Panos | usagoldmines.com

Old iPad To New Screen Jenny List | usagoldmines.com

Line Power with No Transformer Al Williams | usagoldmines.com

The Importance of Current Balancing With Multi-Wire Power Inputs Maya Posch | usagoldmines.com

Where No E. Coli Has Gone Before Navarre Bartz | usagoldmines.com

Unhacked Mattress Phones Home Al Williams | usagoldmines.com

Does the 12VHPWR Connector Really Wear Out After 30 Mating Cycles? Maya Posch | usagoldmines.com

Learn Assembly the FFmpeg Way Al Williams | usagoldmines.com

Hackaday Links: February 23, 2025 Dan Maloney | usagoldmines.com

Over the Counter Glucose Monitor Dissected Al Williams | usagoldmines.com

Impostor Drains $87,000 From JPMorgan Chase Account – Bank Refuses To Reimburse One Penny: Report He...

Bybit CEO Says Crypto Exchange Is Solvent, All User Assets Backed 1:1 Following ‘Largest Heist of Al...

Behind the Lens: Tearing Down a Rare Soviet Zenit 19 Heidi Ulrich | usagoldmines.com

How Rutherford Proved That Atoms Are Mostly Empty Space Maya Posch | usagoldmines.com

LCD Stackup Repair: Not For the Faint of Heart Elliot Williams | usagoldmines.com

Handheld Compass CNC Lets Teensy Do the Driving Tom Nardi | usagoldmines.com

NEMA Releases Standard for Vehicle-to-Grid Applications Navarre Bartz | usagoldmines.com

Cyanotype Prints on a Resin 3D Printer Tom Nardi | usagoldmines.com

DataSaab: Sweden’s Lesser-Known History in Computing Heidi Ulrich | usagoldmines.com

JPMorgan Chase Employee Allegedly Steals $857,000, Abusing Insider Status To Manipulate Hundreds of ...

KiCad 9 Moves Up In The Pro League Arya Voronova | usagoldmines.com

A Web-Based Graphics Editor For Tiny Screens Tom Nardi | usagoldmines.com

Multitasker or Many Monotaskers? Elliot Williams | usagoldmines.com

The Perfect Pi Pico Portable Computer Adam Fabio | usagoldmines.com

Tricked Out Miter Fence Has All the Features Dan Maloney | usagoldmines.com

Retrotectacular: Ham Radio As It Was Al Williams | usagoldmines.com

Genetic Algorithm Runs on Atari 800 XL Bryan Cockfield | usagoldmines.com

Hacking Flux Paths: The Surprising Magnetic Bypass Heidi Ulrich | usagoldmines.com

$1,400,000,000 Drained From Crypto Exchange Bybit As Hackers Crack Ethereum (ETH) Contract Address: ...

Reviewing a Very Dodgy BSK-602 Adjustable Power Supply Maya Posch | usagoldmines.com

Pocket Device Tracks Planets And The ISS Lewin Day | usagoldmines.com

Building a One Wheel With Tracks Lewin Day | usagoldmines.com

Hackaday Podcast Episode 309: Seeing WiFi, A World Without USB, Linux in NES in Animal Crossing Tom ...

This Week in Security: OpenSSH, JumbledPath, and RANsacked Jonathan Bennett | usagoldmines.com

A New 8-bit CPU for C Al Williams | usagoldmines.com

Acoustic Engine Harnesses the Power of Sound Dan Maloney | usagoldmines.com

3D Print Yourself A Split Flap Display Lewin Day | usagoldmines.com

Microsoft (Again) Claims Topological Quantum Computing With Majorana Zero Mode Anyons Maya Posch | u...

Two Men Plead Guilty to ‘Massive’ $577,000,000 Crypto Mining Fraud Scheme: DOJ Rhodilee Jean Dolor |...

Hackers Drain Bank Accounts in New Global Attack on Apple and Google Android Devices: Report Daily H...

Open-Source Random Numbers Bryan Cockfield | usagoldmines.com

Two Men Plead Guilty to ‘Massive’ $577,000,000 Crypto Mining Fraud Scheme: DOJ Rhodilee Jean Dolor |...

DIY Yagi Antenna Sends LoRa Signals Farther Lewin Day | usagoldmines.com

UNIX Archaeology Turns Up 1972 “V2 Beta” Jenny List | usagoldmines.com

Microwave Motion Detector Notifies Your Smart Phone Lewin Day | usagoldmines.com

Pico Gets a Speed Bump Al Williams | usagoldmines.com

You’ve Got All Year To Print This Marble Machine Ornament For Your Christmas Tree Lewin Day | usagol...

Water Jets Will Carve Your Pumpkin Lewin Day | usagoldmines.com

Reconstructing 3D Objects With a Tiny Distance Sensor Lewin Day | usagoldmines.com

Add a Little WOPR to Your Server Rack Tom Nardi | usagoldmines.com

Pulsed Deposition Points a Different Path to DIY Semiconductors Dan Maloney | usagoldmines.com

The US Military’s Unsecured UFO Satellites and Their Use By Russia Maya Posch | usagoldmines.com

Homebrew CPU Gets a Beautiful Rotating Cube Demo Donald Papp | usagoldmines.com

Leave a Reply