Breaking
May 31, 2025

This Week in Security: Signal DRM, Modern Phone Phreaking, and the Impossible SSH RCE Jonathan Bennett | usagoldmines.com

Digital Rights Management (DRM) has been the bane of users since it was first introduced. Who remembers the battle it was getting Netflix running on Linux machines, or the literal legal fight over the DVD DRM decryption key? So the news from Signal, that DRM is finally being put to use to protect users is ironic.

The reason for this is Microsoft Recall — the AI powered feature that takes a snapshot of everything on the user’s desktop every few seconds. For whatever reason, you might want to exempt some windows from Recall’s memory window. It doesn’t speak well for Microsoft’s implementation that the easiest way for an application to opt out of the feature is to mark its window as containing DRM content. Signal, the private communications platform, is using this to hide from Recall and other screenshotting applications.

The Signal blogs warns that this may be just the start of agentic AI being rolled out with insufficient controls and permissions. The issue here isn’t the singularity or AI reaching sentience, it’s the same old security and privacy problems we’ve always had: Too much information being collected, data being shared without permission, and an untrusted actor having access to way more than it should.

Legacy Malware?

The last few stories we’ve covered about malicious code in open source repositories have featured how quickly the bad packages were caught. Then there’s this story about two-year-old malicious packages on NPM that are just now being found.

It may be that the reason these packages weren’t discovered until now, is that these packages aren’t looking to exfiltrate data, or steal bitcoin, or load other malware. Instead, these packages have a trigger date, and just sabotage the systems they’re installed on — sometimes in rather subtle ways. If a web application you were writing was experiencing intermittent failures, how long would it take you to suspect malware in one of your JavaScript libraries?

Where Are You Calling From?

Phone phreaking isn’t dead, it has just gone digital. One of the possibly apocryphal origins of phone phreaking was a toy bo’sun whistle in boxes of cereal, that just happened to play a 2600 Hz tone. More serious phreakers used more sophisticated, digital versions of the whistle, calling them blue boxes. In modern times, apparently, the equivalent of the blue box is a rooted Android phone. [Daniel Williams] has the story of playing with Voice over LTE (VoLTE) cell phone calls. A bug in the app he was using forced him to look at the raw network messages coming from O2 UK, his local carrier.

And those messages were weird. VoLTE is essentially using the Session Initiation Protocol (SIP) to handle cell phone calls as Voice over IP (VoIP) calls using the cellular data network. SIP is used in telephony all over the place, from desk phones to video conferencing solutions. SIP calls have headers that work to route the call, which can contain all sorts of metadata about the call. [Daniel] took a look at the SIP headers on a VoLTE call, and noticed some strange things. For one, the International Mobile Subscriber Identity (IMSI) and International Mobile Equipment Identity (IMEI) codes for both the sender and destination were available.

He also stumbled onto an interesting header, the Cellular-Network-Info header. This header encodes way too much data about the network the remote caller is connected to, including the exact tower being used. In an urban environment, that locates a cell phone to an area not much bigger than a city block. Together with leaking the IMSI and IMEI, this is a dangerous amount of information to leak to anyone on the network. [Daniel] attempted to report the issue to O2 in late March, and was met with complete silence. However, a mere two days after this write-up was published, on May 19th, O2 finally made contact, and confirmed that the issue had finally been resolved.

ARP Spoofing in Practice

TCP has an inherent security advantage, because it’s a stateful connection, it’s much harder to make a connection from a spoofed IP address. It’s harder, but it’s not impossible. One of the approaches that allows actual TCP connections from spoofed IPs is Address Resolution Protocol (ARP) poisoning. Ethernet switches don’t look at IP addresses, but instead route using MAC addresses. ARP is the protocol that distributes the MAC Address to IP mapping on the local network.

And like many protocols from early in the Internet’s history, ARP requests don’t include any cryptography and aren’t validated. Generally, whoever claims an IP address first wins, so the key is automating this process. And hence, enter NetImposter, a new tool specifically designed to automate this process, sending spoofed ARP packets, and establishing an “impossible” TCP connection.

Impossible RCE in SSH

Over two years ago, researchers at Qualsys discovered a pre-authentication double-free in OpenSSH server version 9.1. 9.2 was quickly released, and because none of the very major distributions had shipped 9.1 yet, what could have been a very nasty problem was patched pretty quietly. Because of the now-standard hardening features in modern Linux and BSD distributions, this vulnerability was thought to be impossible to actually leverage into Remote Code Execution (RCE).

The bug was famously discovered by attempting to SSH into a modern Linux machine from a Windows 98 machine, and Tavis Ormandy claimed he would switch to Windows 98 on his main machine if someone did actually manage to exploit it for RCE. [Perri Adams] thought this was a hilarious challenge, and started working an exploit. Now we have good and bad news about this effort. [Perri] is pretty sure it is actually possible, to groom the heap and with enough attempts, overwrite an interesting pointer, and leak enough information in the process to overcome address randomization, and get RCE. The bad news is that the reward of dooming [Tavis] to a Windows 98 machine for a while wasn’t quite enough to be worth the pain of turning the work into a fully functional exploit.

But that’s where [Perri’s] OffensiveCon keynote took an AI turn. How well would any of the cutting-edge AIs do at finding, understanding, fixing, and exploiting this vulnerability? As you probably already guessed, the results were mixed. Two of the three AIs thought the function just didn’t have any memory management problems at all. Once informed of the problem, the models had more useful analysis of the code, but they still couldn’t produce any remotely useful code for exploitation. [Perri’s] takeaway is that AI systems are approaching the threshold of being useful for defensive programming work. Distilling what code is doing, helping in reverse engineering, and working as a smarter sort of spell checker are all wins for programmers and security researchers. But fortunately, we’re not anywhere close to a world where AI is developing and deploying exploitations.

Bits and Bytes

There are a pair of new versions of reverse engineering/forensic tools released very recently. Up first is Frida, a runtime debugger on steroids, that is celebrating its 17th major version release. One of the major features is migrating to pluggable runtime bridges, and moving away from strictly bundling them. We also have Volatility 3, a memory forensics framework. This isn’t the first Volatility 3 release, but it is the release where version three officially has parity with the version two of the framework.

The Foscam X5 security camera has a pair of buffer overflows, each of which can be leveraged to acieve arbitrary RCE. One of the proof-of-concepts has a very impressive use of a write-null-anywhere primitive to corrupt a return pointer, and jump into a ROP gadget. The concerning element of this disclosure is that the vendor has been completely unresponsive, and the vulnerabilities are still unaddressed.

And finally, one of the themes that I’ve repeatedly revisited is that airtight attribution is really difficult. [Andy Gill] walks us through just one of the many reasons that’s difficult. Git cryptographically signs the contents of a commit, but not the timestamps. This came up when looking through the timestamps from “Jia Tan” in the XZ compromise. Git timestamps can be trivially rewritten. Attestation is hard.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

A CRT Display for Retro Weather Forecasting Aaron Beckendorf | usagoldmines.com

Making a Treadmill Into a 3D Printer Lewin Day | usagoldmines.com

17 Year Old Hellboy II Prop Still Amazes Heidi Ulrich | usagoldmines.com

White LED Turning Purple: Analyzing a Phosphor Failure Maya Posch | usagoldmines.com

184,000,000 Usernames and Passwords Exposed in Extraordinary Data Breach – Apple, Microsoft, Faceboo...

You Wouldn’t Download A Skateboard? Fenix Guthrie | usagoldmines.com

Tidy LED Matrix Displays GIFs On Demand Lewin Day | usagoldmines.com

2025 Pet Hacks Contest: Keep The Prey At Bay With The Cat Valve Jenny List | usagoldmines.com

DIY Solar Generator Inspired By James Webb Telescope Lewin Day | usagoldmines.com

Hackaday Podcast Episode 323: Impossible CRT Surgery, Fuel Cells, Stream Gages, and a Love Letter to...

This Week in Security: CIA Star Wars, Git* Prompt Injection and More Jonathan Bennett | usagoldmines...

Sustainable 3D Prints with Decomposable Filaments Heidi Ulrich | usagoldmines.com

Today in Edinburgh: The Open Source Hardware Summit Elliot Williams | usagoldmines.com

What does Linux Need? A Dial! Jenny List | usagoldmines.com

364,333 Americans At Risk As Data Giant Discovers Breach – Social Security Numbers, Names and Other ...

Another Doom Port To The Atari ST Lewin Day | usagoldmines.com

IcePI Zero: A Pi Zero for FPGA Tyler August | usagoldmines.com

IcePI Zero: A Pi Zero for FPGA Tyler August | usagoldmines.com

Sui Community Launches Vote on Recovering $162,000,000 in Stolen Crypto From Hacker Conor Devitt | u...

A Simple Tip for Gluing Those LED Filaments Donald Papp | usagoldmines.com

You Can Make Your Own Ribbon Mic With A Gum Wrapper Lewin Day | usagoldmines.com

2025 Pet Hacks Challenge : Poopopticon Is All Up In Kitty’s Business Tyler August | usagoldmines.com

Researchers Are Slowly Finding Ways To Stem The Tide Of PFAS Contamination Lewin Day | usagoldmines....

3D Print ABS Without a Screaming Hot Bed Donald Papp | usagoldmines.com

Forced E-Waste PCs and the Case of Windows 11’s Trusted Platform Maya Posch | usagoldmines.com

Bring Back The BIOS! (To UEFI Systems, That Is) Jenny List | usagoldmines.com

The Cost of a Cheap UPS is 10 Hours and a Replacement PCB Maya Posch | usagoldmines.com

Tool Turns SVGs into Multicolor 3D Prints Donald Papp | usagoldmines.com

A Love Letter to Embedded Systems by V. Hunter Adams John Elliot V | usagoldmines.com

Invisible PC Doubles As Heated Seat Tyler August | usagoldmines.com

From Burnt to Brilliant: A Toaster’s Makeover Matt Varian | usagoldmines.com

FLOSS Weekly Episode 834: It Was Cool in 2006 Jonathan Bennett | usagoldmines.com

Supercon 2024: Using an Oscilloscope to Peek Below the Noise Floor Lewin Day | usagoldmines.com

Bubble Displays Make a Neat Retro Clock Jenny List | usagoldmines.com

Remotely Interesting: Stream Gages Dan Maloney | usagoldmines.com

Washington Consumers Gain Right to Repair for Cellphones and More Maya Posch | usagoldmines.com

Stamp: Modular Breakout Boards for SMD Prototyping John Elliot V | usagoldmines.com

A 100-Year-Old Electronic Musical Instrument Brought Back to Life Bryan Cockfield | usagoldmines.com

New Supermaterial: As Strong as Steel and as Light as Styrofoam John Elliot V | usagoldmines.com

Look to the Sky With This Simple Plane Tracker Ian Bos | usagoldmines.com

67,947 Americans Warned as US City Data Breach May Have Exposed Names, Dates of Birth, Social Securi...

Hand Truck Turned Into Motorcycle Bryan Cockfield | usagoldmines.com

2025 Pet Hacks Contest: Fytó – Turn Your Plant Into a Pet Matt Varian | usagoldmines.com

Fixing a Fatal Genetic Defect in Babies With a Bit of Genetic Modification Maya Posch | usagoldmines...

Reconditioning a Vintage CRT Tube Jenny List | usagoldmines.com

‘Your Bank Account Is Under Attack’ – Police Warn Against New Bank Fraud Scheme Targeting Seniors by...

Hands-On: eufyMake E1 UV Printer Tom Nardi | usagoldmines.com

A Forth OS in 46 Bytes Aaron Beckendorf | usagoldmines.com

Automated Blinds Opener On The Cheap Matt Varian | usagoldmines.com

Vintage Intel 8080 runs on a Modern FPGA Heidi Ulrich | usagoldmines.com

A RISC-V Operating System Instruction Manual Bryan Cockfield | usagoldmines.com

Wayback Proxy Lets Your Browser Party Like It’s 1999 Tyler August | usagoldmines.com

2025 Pet Hacks Contest: A Barrel Of Fun For Your Dog Jenny List | usagoldmines.com

Man Allegedly Held Hostage for Three Weeks in Manhattan Apartment, Tortured In Attempt To Gain Acces...

Mouse Model Suggests Starch-Based Plastics Are Still Bad For You Maya Posch | usagoldmines.com

Intercepting and Decoding Bluetooth Low Energy Data for Victron Devices John Elliot V | usagoldmines...

NASA Is Shutting Down the International Space Station Sighting Website Maya Posch | usagoldmines.com

Pico-mac-nano Fits Working Macintosh on Barbie’s Desk Tyler August | usagoldmines.com

2025 Pet Hacks Contest: A Water Fountain For Your Cat Jenny List | usagoldmines.com

How to Build an STM32 Web Dashboard Using the Mongoose Wizard John Elliot V | usagoldmines.com

Hackaday Links: May 25, 2025 Dan Maloney | usagoldmines.com

210,140 Americans Warned As Major Data Breach Disclosed – Stolen Names, Social Security Numbers and ...

Police Hunting for Woman Who Allegedly Deposited $185,000 in Fraudulent Checks Before Going on the R...

Unreleased Amiga Hardware Plays MP3s Bryan Cockfield | usagoldmines.com

Scammer Drains $5,050 From Bank of America Account – Why the Bank Says Reimbursement Is Not Happenin...

NES Zapper Becomes Telephone Bryan Cockfield | usagoldmines.com

The Commodore 64 Gets An HDMI Upgrade Lewin Day | usagoldmines.com

A Quick Introduction to TCP Congestion Control Aaron Beckendorf | usagoldmines.com

2025 Pet Hacks Contest: Feline Facial Recognition Foils Food Filching Tyler August | usagoldmines.co...

Making a Backyard Observatory Replete With Retractable Roof John Elliot V | usagoldmines.com

AI Art Installation Swaps Diffusion for Reflection Tyler August | usagoldmines.com

Reverse Engineering LEGO Island Fenix Guthrie | usagoldmines.com

A Presence-sensing drive for Securely Storing Secrets Aaron Beckendorf | usagoldmines.com

Nearly Half of All Zelle Scams at JPMorgan Chase and Other US Banks Traced To a Single Source: Repor...

Nerf Blaster Becomes Remote Control Turret Lewin Day | usagoldmines.com

437,329 Americans Hit by Massive Data Breach – Customer’s Names, Addresses, Social Security Numbers,...

The Need For Speed? Elliot Williams | usagoldmines.com

Who Needs 100K Speakers When You’ve Got a 3D Printer? Tyler August | usagoldmines.com

LED Matrix Built For M.2 Interface Lewin Day | usagoldmines.com

TeensyROM NFC Game Loading on the C64 Heidi Ulrich | usagoldmines.com

EMF Forming Was A Neat Aerospace Breakthrough Lewin Day | usagoldmines.com

2025 Pet Hacks Contest: Aquassist Fish Feeder Matt Varian | usagoldmines.com

JPMorgan Chase, TD Bank Issue Data Breach Alerts After Rogue Workers Steal Sensitive Info, Triggerin...

Thief Behind Massive Coinbase Exploit Swaps Stolen Crypto and Trolls On-Chain Sleuth ZachXBT Conor D...

Retail Giant To Lose $403,000,000 After ‘Highly Sophisticated and Targeted’ Cyberattack Exposes Sens...

Tearing Down And Hacking The T2S+ Thermal Camera Lewin Day | usagoldmines.com

2025 Pet Hacks Contest: Keep Your Hound Toasty Warm With This Heated Dog Bed Jenny List | usagoldmin...

Hacker Plunders $223,000,000 Worth of Crypto from Sui-Based Decentralized Exchange Rhodilee Jean Dol...

Hackaday Podcast Ep 322: Fake Hackaday Writers, New Retro Computers, and a Web Rant Jenny List | usa...

POV On The Flipper Zero Lewin Day | usagoldmines.com

Behold Self-Synchronizing, Air-Flopping Limbs That Hop and Swim Donald Papp | usagoldmines.com

Foil Leyden Jar Helps Bring Crookes Tube to Life Seth Mabbott | usagoldmines.com

Running DOOM on an Atari ST Heidi Ulrich | usagoldmines.com

Recovering Water From Cooling Tower Plumes With Plume Abatement Maya Posch | usagoldmines.com

You Can 3D Print These Assistive Typing Tools Lewin Day | usagoldmines.com

Department of Justice Charges Two Men in Alleged $227,000,000 Medicare Scam Daniell Marlow | usagold...

Building a Tiny Table Saw Lewin Day | usagoldmines.com

2025 Pet Hacks Contest: Loko Tracks Fido with LoRa and GPS Tyler August | usagoldmines.com

Hackaday Supercon 2025 Call For Participation: We Want You! Elliot Williams | usagoldmines.com

Hackaday Supercon 2025 Call For Participation: We Want You! Elliot Williams | usagoldmines.com