Breaking
November 22, 2024

This Week in Security: Playing Tag, Hacking Cameras, and More Jonathan Bennett | usagoldmines.com

Wired has a fascinating story this week, about the length Sophos has gone to for the last 5 years, to track down a group of malicious but clever security researchers that were continually discovering vulnerabilities and then using those findings to attack real-world targets. Sophos believes this adversary to be overlapping Chinese groups known as APT31, APT41, and Volt Typhoon.

The story is actually refreshing in its honesty, with Sophos freely admitting that their products, and security products from multiple other vendors have been caught in the crosshairs of these attacks. And indeed, we’ve covered stories about these vulnerabilities over the past weeks and months right here on this column. The sneaky truth is that many of these security products actually have pretty severe security problems.

The issues at Sophos started with an infection of an informational computer at a subsidiary office. They believe this was an information gathering exercise, that was a precursor to the widespread campaign. That campaign used multiple 0-days to crack “tens of thousands of firewalls around the world”. Sophos rolled out fixes for those 0-days, and included just a bit of extra logging as an undocumented feature. That logging paid off, as Sophos’ team of researchers soon identified an early signal among the telemetry. This wasn’t merely the first device to be attacked, but was actually a test device used to develop the attack. The game was on.

Sophos managed to deploy it’s own spyware to these test devices, to stealthily keep an eye on this clever opponent. This even thwarted a later attack before it could really start. Among the interesting observations was a bootkit infection on one of these firewalls. This wasn’t ever found in the wild, but the very nature of such an attack makes it hard to discover.

There’s one more interesting wrinkle to this story. In at least one case, Sophos received the 0-day vulnerability used in an attack through their bug bounty program, right after the wave of attacks was launched. The timing, combined with the Chinese IP Address makes it pretty clear this was more than a coincidence. This might be a Chinese hacker making a bit of extra cash on the side. It’s also reminiscent of the Chinese law requiring companies to disclose vulnerabilities to the Chinese government.

PTA 0-Day

GreyNoise runs a honeypot and an AI threat detection system, and found something interesting with that combination. The PTZOptics network security camera was the intended target, and there were a pair of vulnerabilities that this attack was intended to exploit. The first is a simple authorization bypass, where sending HTTP packets without an authorization header to the param.cgi endpoint returns data without any authorization needed. Use the get_system_conf parameter, and the system helpfully prints out valid username and password hashes. How convenient.

Gaining arbitrary command execution is trivial, as the ntp configuration isn’t properly sanitized, and the ntp binary is called insecurely. A simple $(cmd) can be injected for easy execution. Those two were being chained together for a dead simple attack chain, presumably to add the IoT devices to a botnet. The flaws have been fixed, and law enforcement have been on the case, at least seizing the IP address observed in the attacks.

Speaking of camera hacks, we do have an impressive tale from Pwn2Own 2024, where researchers at Synacktiv used a format string vulnerability to pwn the Synology TC500 camera. The firmware in question had a whole alphabet of security features, like ASLR, PIE, NX, and Full RelRO. That’s Address Space Layout Randomization, Position Independent Executables, Non-Executable memory, and Full Relocation Read-Only protections. Oh, and the payload was limited to 128 characters, with the first 32 ASCII characters unavailable for use.

How exactly does one write an exploit in this case? A bit of a lucky break with the existing memory layout gave access to what the write-up calls a “looping pointer”. That seems to be a pointer that points to itself, which is quite useful to work from offsets instead of precise memory locations. The vulnerability allowed for writing a shell command into unused memory. Then finally a bit of Return Oriented Programming, a ROP gadget, manages to launch a system call on the saved command line. Impressive.

Maybe It Wasn’t a Great Idea

…to give LLMs code execution capabilities. That’s the conclusion we came to after reading CyberArk’s post on how to achieve Remote Code Execution on a Large Language Model. The trick here is that this particular example, LoLLMs, can run python code on the backend to perform certain tasks, like do math calculations. This implementation uses Python sandboxing, and naturally there’s a known way to defeat it. The trick can be pulled off just by getting the model to evaluate the right JSON snippet, but it’s smart enough to realize that something is off and refuse to evaluate the JSON.

The interesting detail here is that it is the LLM itself that is refusing, so it’s the LLM that needs bypassed. There has been very interesting work done on LLM jailbreaks, like DAN, the Do Anything Now prompt. That would probably have worked, but this exploit can be even sneakier than that. Simply ask the LLM to help you write some JSON. Specify the payload, and ask it to add something to it. It gladly complies, and code is executed. Who knew that LLMs were so gullible?

More Quantum Erratta

This story just keeps on giving. This time it’s [Dan Goodin] at Ars Technica that has the lowdown, filling in the last few missing details about the much over-hyped quantum computing breakthrough. One of the first of those details is that the story of the compromise of AES was published in the South China Morning Post, which has over-hyped Chinese quantum progress before. What [Goodin]’s article really adds to the discussion is opinions from experts. The important takeaway is that the performance of the D-Wave quantum computer is comparable to classical approaches.

Bits and Bytes

Remember the traffic light hacking? And part two? We now have the third installment, which is really all about you, too, can purchase and hack on one of these traffic controllers. It may or may not surprise you that the answer is to buy them on Ebay and cobble together a makeshift power supply.

It’s amazing how often printers, point of sale, and other IoT gadgets are just running stripped-down, ancient versions of Android. This point of sale system is no exception, running an old, custom Android 6 system, that seems to actually be rather well locked down. Except that it has an NFC reader, and you can program NFC tags to launch Android apps. Use this creative workaround to get into Android settings, and you’re in business.

I have long maintained that printers are terrible. That sentiment apparently is extending into security research on printers, with Lexmark moving to a new encrypted filesystem for printer firmware. Thankfully, like most of these schemes, it’s not foolproof, and [Peter] has the scoop on getting in. May you never need it. Because seriously, printers are the worst.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Quick and Very Dirty Repair Gets Smoked PLC Back in the Game Dan Maloney | usagoldmines.com
Creating and Control of Magnetic Skyrmions in Ferromagnetic Film Demonstrated Maya Posch | usagoldmi...
Gear Up: A 15-Minute Intro on Involute Gears Heidi Ulrich | usagoldmines.com
Custom Mouse Rocks Neat Thumbstick Design Lewin Day | usagoldmines.com
FREE-WILi Turns DC32 Badge Into Hardware Dev Tool Tom Nardi | usagoldmines.com
USB-C For Hackers: Reusing Cables Arya Voronova | usagoldmines.com
There’s Now a Wiki For Hacking Redbox Machines Lewin Day | usagoldmines.com
Blended Wing Body Passenger Airplanes and the End of Winged Tubes Maya Posch | usagoldmines.com
Measuring the Mighty Roar of SpaceX’s Starship Rocket Tom Nardi | usagoldmines.com
Simple Hydrogen Generator Makes Bubbles and Looks Cool Lewin Day | usagoldmines.com
Simple Stack of Ferrites Shows How Fluxgate Magnetometers Work Dan Maloney | usagoldmines.com
Stepping On LEGO For Science Kristina Panos | usagoldmines.com
A Tube Stereo Amplifier, From Scratch Jenny List | usagoldmines.com
A Cyberpunk Pocketwatch Navarre Bartz | usagoldmines.com
If Life Gives You Lemons, Build this Lemontron Heidi Ulrich | usagoldmines.com
FLOSS Weekly Episode 810: Pi4J – Stable and Boring on the Raspberry Pi Jonathan Bennett | usagoldmin...
With Core ONE, Prusa’s Open Source Hardware Dream Quietly Dies Tom Nardi | usagoldmines.com
FreeCAD Version 1.0 Released Maya Posch | usagoldmines.com
Boss Byproducts: Calthemites Are Man-Made Cave Dwellers Kristina Panos | usagoldmines.com
An Animated Walkthrough of How Large Language Models Work Donald Papp | usagoldmines.com
Junk Box Build Helps Hams with SDR Dan Maloney | usagoldmines.com
Most Extreme Hypergravity Facility Starts Up in China With 1,900 Times Earth’s Gravity Maya Posch | ...
Alleged Corrupt Los Angeles Police Officers Implicated in Crypto ‘Godfather’ Extortion Scheme Daily ...
Batteries Not Included: Navigating the Implants of Tomorrow Heidi Ulrich | usagoldmines.com
Dial-up Internet Using the Viking DLE-200B Telephone Line Simulator Maya Posch | usagoldmines.com
Raspberry Pi Compute Module 5 Seen in the Wild Elliot Williams | usagoldmines.com
Supercon 2024 SAO Petal KiCad Redrawing Project Chris Lott | usagoldmines.com
The Vecdec Cyberdeck is More than a Pretty Case Tom Nardi | usagoldmines.com
Supercon 2024 SAO Petal KiCad Redrawing Project Chris Lott | usagoldmines.com
The Great Redbox Cleanup: One Company is Hauling Away America’s Last DVD Kiosks Lewin Day | usagoldm...
Power Supply With Benchtop Features Fits In Your Pocket Donald Papp | usagoldmines.com
The Barcode Beast Likes Your CDs Jenny List | usagoldmines.com
Tearing Down A SLA Printer With The Engineers Who Built It Danie Conradie | usagoldmines.com
Hacking Haptics: The 19-Sensor Patch Bringing Touch to Life Heidi Ulrich | usagoldmines.com
A Very Fast Camera Slider For The Glam Shot Danie Conradie | usagoldmines.com
Crowdsourcing Ionosphere Data with Phones Al Williams | usagoldmines.com
Gloriously Impractical: Overclocking the Raspberry Pi 5 to 3.6 GHz Maya Posch | usagoldmines.com
Do You Dream in Color? Al Williams | usagoldmines.com
Exploring the Gakken FX Micro-Computer Alexander Rowsell | usagoldmines.com
Keebin’ with Kristina: the One With the Typo Kristina Panos | usagoldmines.com
The Laser Shadow Knows Al Williams | usagoldmines.com
Ruined 1993 ThinkPad Tablet Brought Back From The Brink Lewin Day | usagoldmines.com
Analog Shift Register Revealed Al Williams | usagoldmines.com
Completing the UE1’s Paper Tape Reader and First Squiggles Maya Posch | usagoldmines.com
Hackaday Links: November 17, 2024 Dan Maloney | usagoldmines.com
US’s UFO-Hunting Aerial Surveillance System Detailed In Report Maya Posch | usagoldmines.com
Schooling ChatGPT on Antenna Theory Misconceptions Dan Maloney | usagoldmines.com
ESP32 hosts a USB keyboard in this Typewriter Adam Fabio | usagoldmines.com
A Handheld Gaming PC With Steam Deck Vibes Bryan Cockfield | usagoldmines.com
Classic LED Bubble Displays Ride Again Dan Maloney | usagoldmines.com
Register Renaming: The Art of Parallel Processing Heidi Ulrich | usagoldmines.com
Open Source Universal ROM Programmer Grows Up Al Williams | usagoldmines.com
Nearly One-Third of All Customers at US Banks Have Experienced Fraud in Last 12 Months: Study Alex R...
Ethernet From First Principles Bryan Cockfield | usagoldmines.com
World’s First Virtual Meeting: 5,100 Engineers Phoned In Heidi Ulrich | usagoldmines.com
$500,000 Drained From American Bank Accounts As Insider Allegedly Steals Customers’ Sensitive Inform...
Playing Chess Against LLMs and the Mystery of Instruct Models Maya Posch | usagoldmines.com
Hackers, Patents, and 3D Printing Elliot Williams | usagoldmines.com
Spotted at Supercon: Glowtape Wearable Display Tom Nardi | usagoldmines.com
WiFi Status Indicator Keeps Eye on the Network Tom Nardi | usagoldmines.com
It’s a Soldering Iron! It’s A Multimeter! Relax! It’s Both! Al Williams | usagoldmines.com
BASIC Co-Inventor Thomas Kurtz Has Passed Away Jenny List | usagoldmines.com
Six US Banks Issue Urgent Debit Card Alerts, Forcing Mandatory Replacements for Many, After Third-Pa...
RISC-V Pushes 400 Million Forth Words Per Second Al Williams | usagoldmines.com
Bypassing Airpods Hearing Aid Georestriction With a Faraday Cage Maya Posch | usagoldmines.com
I Want To Believe: How To Make Technology Value Judgements Jenny List | usagoldmines.com
Hackaday Podcast Episode 296: Supercon Wrapup with Tom and Al, The 3DP Brick Layering Controversy, a...
This Week in Security: Hardware Attacks, IoT Security, and More Jonathan Bennett | usagoldmines.com
Homebrew pH Meter Uses Antimony Electrode Dan Maloney | usagoldmines.com
Desert Island Acetylene from Seashells and Driftwood Dan Maloney | usagoldmines.com
Retro Calculator Build Proves the Space Age Isn’t What It Used to Be Dan Maloney | usagoldmines.com
Nebraskan Farmers Were Using Wind Turbines Before Environmentalism Was Invented Jenny List | usagold...
Repairing The Questionable £25,000 Tom Evans Audiophile Pre-Amp Maya Posch | usagoldmines.com
Bluetooth Dongle Gives Up Its Secrets with Quick Snooping Hack Dan Maloney | usagoldmines.com
US DOE Sets New Nuclear Energy Targets Navarre Bartz | usagoldmines.com
Microfluidic Motors Could Work Really Well For Tiny Scale Tasks Lewin Day | usagoldmines.com
Retrotechtacular: The TV Bombs of WWII Dan Maloney | usagoldmines.com
The Life Cycle of Nuclear Fission Fuel: From Stars to Burn-Up Maya Posch | usagoldmines.com
Smart Thermostats Pitched for Texas Homes to Relieve Stressed Grid Maya Posch | usagoldmines.com
Building a Reproduction Apple I Al Williams | usagoldmines.com
Laser Sound Visualizations Are Not Hard To Make Lewin Day | usagoldmines.com
AI Face Anonymizer Masks Human Identity in Images Donald Papp | usagoldmines.com
Man Set Up and Extorted of $500,000 Worth of USDT by Criminals in Hotel Room: Report Daily Hodl Staf...
Open Cardiography Signal Measuring Device Navarre Bartz | usagoldmines.com
Landscape Motif Makes This E-Ink Weather Display Easy to Understand Dan Maloney | usagoldmines.com
FLOSS Weekly Episode 809: Pi4J – Stable and Boring on the Raspberry Pi Jonathan Bennett | usagoldmin...
Making Sense of Real-Time Operating Systems in 2024 Maya Posch | usagoldmines.com
A Vintage Radiator Core, From Scratch Jenny List | usagoldmines.com
A Teletype by Any Other Name: The Early E-mail and Wordprocessor Al Williams | usagoldmines.com
NASA Announces New Trials for In-Space Laser Welding Maya Posch | usagoldmines.com
Intuition about Maxwell’s Equations Al Williams | usagoldmines.com
Remember the Tri-Format Floppy Disk? Lewin Day | usagoldmines.com
The End of Ondsel and Reflecting on the Commercial Prospects for FreeCAD Maya Posch | usagoldmines.c...
WAV2VGM Plays Audio Via OPL3 Synthesis Lewin Day | usagoldmines.com
Founder of Security Firm SlowMist Warns Against Copy-and-Pasting Sensitive Crypto Information Daily ...
Teaching Computers to Read — Sort Of Al Williams | usagoldmines.com
A Brief History of Cyrix, or How to Get Sued By Intel a Lot Maya Posch | usagoldmines.com
Retrotechtacular: Color TV Al Williams | usagoldmines.com
You Wouldn’t Download a Chair…But You Could Lewin Day | usagoldmines.com
Ubiquitous Successful Bus: Version 3 Arya Voronova | usagoldmines.com

Leave a Reply