Breaking
February 21, 2025

This Week in Security: The UK Wants Your iCloud, Libarchive Wasn’t Ready, and AWS Jonathan Bennett | usagoldmines.com

There’s a constant tension between governments looking for easier ways to catch criminals, companies looking to actually protect their users’ privacy, and individuals who just want their data to be truly private. The UK government has issued an order that threatens to drastically change this landscape, at least when it comes to Apple’s iCloud backups. The order was issued in secret, and instructed Apple to provide a capability for the UK officials to access iCloud backups that use the Advanced Data Protection (ADP) system. ADP is Apple’s relatively new end-to-end encryption scheme that users can opt-into to make their backups more secure. The key feature here is that with ADP turned on, Apple themselves don’t have access to decrypted user data.

If this order wasn’t onerous enough, it seems to explicitly include all ADP-protected data, regardless of the country of origin. This should ring alarm bells. The UK government is attempting to force a US company to add an encryption backdoor to give them access to US customer data. Cryptographer [Matthew Green] has thoughts on this situation. One of the slightly conspiratorial theories he entertains is that portions of the US government are quietly encouraging this new order because the UK has weaker protections against unreasonable search and seizure of data. The implication here is that those elements in the US would use this newfound UK data access capability to sidestep Fourth Amendment protections of citizens’ data. This doesn’t seem like much of a stretch.

[Matthew] does have a couple of suggestions. The first is passing laws that would make it illegal for a US company to add backdoors to their systems, specifically at the request of foreign nations. We’ve seen first-hand how such backdoors can backfire once accessed by less-friendly forces. In an ironic turn of fate, US agencies have even started recommending that users use end-to-end encrypted services to be safe against such backdoors. Technically, if this capability is added, the only recourse will be to disable iCloud backups altogether. Thankfully Apple has pushed back rather forcefully against this order, threatening to simply turn off ADP for UK users, rather than backdoor the rest of the world. Either way, it’s a scary bit of overreach.

Github Actions Can Be Dangerous

This is a bit of tag-team research between [Lupin] and [Snorlhax]. The pair went from competitors on the French Hackerone leaderboard, to co-conspirators looking for bugs. And this is the story of finding the big one. The pair went searching for flaws at a specific unnamed company, and found a docker image that contained an entire copy of some proprietary server-side code. That was certainly worthy of a bug bounty, but there was more. The .git folder hadn’t been properly scrubbed, and contained a token from a Github Actions run. That probably shouldn’t be a problem, as these tokens expire at the end of the run. But our protagonists found something interesting: a race condition where the docker image gets uploaded before the action completes. (Here is Palo Alto’s independent discovery and coverage.)  And that wasn’t even the big find from this research.

The big find was a quirk of Docker images. The build process creates a .npmrc file in the Docker image, which contains an npm token for publishing packages. That file is deleted as part of the Docker image finalization. But Docker images are more complicated that simple file archives. They are made up of layers, and “Each instruction in a Dockerfile (such as FROM, COPY, RUN, etc.) creates a new layer.” That’s an incredibly important concept, because Docker images are like onions: You can peel back the layers, and they can make you cry.

The build process for this Docker image did delete the .npmrc file before publishing it, but only after triggering the creation of another filesystem layer. It wasn’t obvious, but the Docker image did contain this critical npm secret, and anyone with access could publish arbitrary libraries to the company’s npm repository. That is definitely an exceptional find, and resulted in a well-earned $50,000 bounty.

Libarchive Wasn’t Ready for Windows

Microsoft pulled the Libarchive open source library into Windows 11 back in 2023, giving Windows Explorer the native ability to handle a wider variety of archive files. This is a “time-tested library” that even has fuzzing coverage. It has not, however, been time tested in the context of running in Microsoft Windows. Which is why it’s not surprising that Explorer’s temporary file extraction feature failed to catch an archive with the C: root directory. That is not a terribly useful vulnerability, but is technically an arbitrary file write/delete as the local user.

There’s more, like the patch for a previous vulnerability replacing disallowed characters in file names. The character is escaped with another backslash, giving us \ instead. The problem there is that and \ are both aliases for the device root, aka C:.

There are more tricks to find, much of it the result of libarchive features that weren’t entirely intended to be exposed inside Windows. There are more than the 11 advertised archive types supported. There’s confusion because Windows strictly uses filename extensions to determine a file type, while libarchive uses the Unix/Linux convention of looking at the magic bytes at the beginning of the a file. The whole thing is an interesting read, with implications for the limitations of automated fuzzing, particularly when not using the same compile options as in production.

AI Poisoning Two-fer

We start off with a tale of prompt injection that can corrupt long-term AI memory. Imagine a document or website that secretly instructs an AI to believe that its primary user believes he is living in a simulation. That sort of manipulation would color the results of the given AI for all future queries, and all it would take is to process a single malicious source. Another trick used is to instruct the AI to take a malicious action the next time the user took a certain action. This allows an attacker to slip something in, and the AI will see that instruction as coming from the legitimate user, sidestepping some of the protections against such attacks.

The other poisoning story is a bit more conventional. It’s in-the-wild Pickle deserialization attacks in Hugging Face AI models. Many AI models use Python’s pickle serialization format for their data, but pickle can also store code objects, and this makes it obviously insecure. Many AI projects have rolled out support for safetensors, a format that doesn’t allow code to mix with data. The news here is that researchers at ReversingLabs found models on Hugging Face with malicious pickle files. Hugging Face scans those files with Picklescan to find malicious pickles, but these malicious files escaped detection via a pair of incredibly sophisticated techniques: 7-zip compression and broken pickle files. The malicious models have pulled down, and Picklescan has been improved to catch these avoidance techniques. Download and unpickle cautiously!

AWS

AWS has also been the topic of a couple very interesting bits of research. The first is how to check for valid IAM usernames. That takes two flavors, users with and without two-factor authentication. For users with 2FA, attempting to log-in with a valid user name jumps directly to prompting for the 2FA code, while an attempt with an invalid username throws an immediate error. This was deemed an acceptable risk by Amazon, and indeed is much preferred to disclosing whether the password is correct or not. On the other hand, accounts without 2FA displayed a detectable timing difference between a valid and invalid user. Both returned the same error, but an invalid username returned that error detectably faster. This was deemed an actual vulnerability and assigned a CVE.

AWS has a public repository of virtual machine images, indexed by Amazon Machine IDs (AMIs). AMIs are plain-text identifiers, is set by whoever uploads the image, and AMIs can be duplicated by different users. If that sounds like the recipe for some sort of name confusion attack, you’d be exactly correct. Any API call that references an image using the AMI and not specifying the owner can be hijacked by creating another image with the same AMI. Surely this is theoretical, and never happens in practice, right? The authors wondered that, too. And to find out, they created an image using an internal Amazon AMI, just to see if it would actually get used. And it did, confirmed by Amazon itself.

Bits and Bytes

The zkLend money lending service lost $9.5 million in an interesting cryptocurrency heist. This decentralized finance system uses Ethereum smart contracts to deposit and lend money. A rounding error in one of those smart contracts allowed an attacker to siphon money off of multiple transactions. zkLend has made a public offer to the attacker that they can keep 10% of the total as a bounty, if they return the other 90%. This would be in exchange for not considering the action theft and informing law enforcement.

At least one Swatting as a Service (SaaS?) offering is finally offline. Alan Filion ran a swatting service for nearly two years, committing the potentially deadly crime a staggering 375 times. While it’s a good thing that his reign of terror has finally ended, the paltry 48-month prison sentence is shamefully short in my opinion.

Sitevision is the content management system that seems to run most of the Swedish government. And for more than two years, it’s had a really nasty footgun in the intersection between WebDav, SAML, and Java keystores. To put it simply, the https:///webdav/files/saml-keystore endpoint on multiple Sitevision sites contained the public and private keys for SAML authn requests, encrypted with a random 8-character alphanumeric password. It’s not quite the entire keys to the kingdom, but still not something you really want to leak.

I warn new Linux users all the time not to copy instructions from the Internet into their bash terminals without understanding what the commands actually do. It turns out that this is not just a Linux problem, as that’s the exact attack that North Korean attackers used against a handful of targets. “To register your device, please paste the commands below into an admin PowerShell prompt.” No thank you.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Open-Source Random Numbers Bryan Cockfield | usagoldmines.com

Two Men Plead Guilty to ‘Massive’ $577,000,000 Crypto Mining Fraud Scheme: DOJ Rhodilee Jean Dolor |...

DIY Yagi Antenna Sends LoRa Signals Farther Lewin Day | usagoldmines.com

UNIX Archaeology Turns Up 1972 “V2 Beta” Jenny List | usagoldmines.com

Microwave Motion Detector Notifies Your Smart Phone Lewin Day | usagoldmines.com

Pico Gets a Speed Bump Al Williams | usagoldmines.com

You’ve Got All Year To Print This Marble Machine Ornament For Your Christmas Tree Lewin Day | usagol...

Water Jets Will Carve Your Pumpkin Lewin Day | usagoldmines.com

Reconstructing 3D Objects With a Tiny Distance Sensor Lewin Day | usagoldmines.com

Add a Little WOPR to Your Server Rack Tom Nardi | usagoldmines.com

Pulsed Deposition Points a Different Path to DIY Semiconductors Dan Maloney | usagoldmines.com

The US Military’s Unsecured UFO Satellites and Their Use By Russia Maya Posch | usagoldmines.com

Homebrew CPU Gets a Beautiful Rotating Cube Demo Donald Papp | usagoldmines.com

FLOSS Weekly Episode 821: Rocky Linux Jonathan Bennett | usagoldmines.com

Be Careful What You Ask For: Voice Control Al Williams | usagoldmines.com

Retrotechtacular: Yamming CRT Yokes Dan Maloney | usagoldmines.com

In a World Without USB… Al Williams | usagoldmines.com

MIT Demonstrates Fully 3D Printed, Active Electronic Components Donald Papp | usagoldmines.com

Belfry OpenSCAD Library (BOSL2) Brings Useful Parts and Tools Aplenty Donald Papp | usagoldmines.com

Vacuum Forming With 3D Printed Moulds And Sheets Jenny List | usagoldmines.com

A Unique Linear Position Sensor Using Magnetostriction Dan Maloney | usagoldmines.com

$1,200,000,000 in Crypto Sent to FTX Creditors Through Kraken and Bitgo: Arkham Daily Hodl Staff | u...

Auto-Download Your Kindle Books Before February 26th Deadline Navarre Bartz | usagoldmines.com

Let There Be Light: The Engineering of Optical HDMI Heidi Ulrich | usagoldmines.com

Hackaday Europe 2025: Speakers, Lightning Talks, and More! Elliot Williams | usagoldmines.com

Series Hybrid Semi-Trucks: It Works for Locomotives So Why Not? Maya Posch | usagoldmines.com

Hack On Self: One Minute Blitz Arya Voronova | usagoldmines.com

Give Your Animal Crossing Villagers the Gift of Linux Tom Nardi | usagoldmines.com

Space Monitor Points Out Celestial Objects Tom Nardi | usagoldmines.com

Get Ready For KiCAD 9! Jenny List | usagoldmines.com

Integrated Micro Lab Keeps Track of Ammonia in the Blood Dan Maloney | usagoldmines.com

A Forgotten Consumer PC Becomes a Floating Point Powerhouse Jenny List | usagoldmines.com

Probably The Most Esoteric Commodore 64 Magazine Jenny List | usagoldmines.com

Argentinian President Javier Milei Potentially Facing Impeachment Trial From Opposition Over LIBRA L...

Measuring Local Variances in Earth’s Magnetic Field Bryan Cockfield | usagoldmines.com

Keebin’ with Kristina: the One with the Cutting Board Keyboard Kristina Panos | usagoldmines.com

Decoy Killswitch Triggers Alarm Instead Bryan Cockfield | usagoldmines.com

The “Unbreakable” Beer Glasses Of East Germany Lewin Day | usagoldmines.com

Parametric Design Process Produces Unique Speakers Bryan Cockfield | usagoldmines.com

USB Stick Hides Large Language Model Bryan Cockfield | usagoldmines.com

DaVinci’s New Threads Al Williams | usagoldmines.com

Using Antimony To Make Qubits More Stable Maya Posch | usagoldmines.com

Hackaday Links: February 16, 2025 Dan Maloney | usagoldmines.com

How Hard is it to Write a Calculator App? Al Williams | usagoldmines.com

$80,000 Abruptly Drained From JPMorgan Chase Account – Why the Bank Says Reimbursement Is Not Happen...

Graphene Tattoos: The Future of Continuous Health Monitoring? Heidi Ulrich | usagoldmines.com

[Quinn Dunki] Makes a Screw Shortener Fit for Kings Elliot Williams | usagoldmines.com

Piano Gets an Arduino Implant Al Williams | usagoldmines.com

Scrapyard Vacuum Dehydrator Sucks the Water from Hydraulic Oil Dan Maloney | usagoldmines.com

Curious Claim of Conversion of Aluminium into Transparent Aluminium Oxide Maya Posch | usagoldmines....

Chop, Chop, Chop: Trying Out VR for Woodworking Heidi Ulrich | usagoldmines.com

You Know This Font, But You Don’t Really Know It Jenny List | usagoldmines.com

Octet of ESP32s Lets You See WiFi Like Never Before Dan Maloney | usagoldmines.com

$374,068 Drained From Bank Accounts As Bank Employee Allegedly Uses Customer Funds To Pay Husband’s ...

How To Find Where a Wire in a Cable is Broken Maya Posch | usagoldmines.com

Valentine’s Day…Hacks? Elliot Williams | usagoldmines.com

Adding USB-C (Kinda) to a PowerMac G4 Tom Nardi | usagoldmines.com

Game Bub Plays ROMs and Cartridges Bryan Cockfield | usagoldmines.com

A Guide to Making the Right Microcontroller Choice Dan Maloney | usagoldmines.com

569,012 Americans Exposed As Massive Data Breach Reveals Names, Financial Account Numbers, Credit an...

Most Energetic Cosmic Neutrino Ever Observed by KM3NeT Deep Sea Telescope Maya Posch | usagoldmines....

Wells Fargo Refuses To Return Woman’s Life Savings After Bank Account Gutted by Fraudsters – Here’s ...

Magnetic Vise Makes Positioning Your Workpiece Easier Lewin Day | usagoldmines.com

3DBenchy Sets Sail into the Public Domain Maya Posch | usagoldmines.com

Satellite Internet On 80s Hardware Bryan Cockfield | usagoldmines.com

Hackaday Podcast Episode 308: The Worst 1 Ever, Google’s Find My Opened, and SAR on a Drone Jenny Li...

Home Depot Lamp Gets a Rainbow Upgrade Lewin Day | usagoldmines.com

Lathe and Laser Team Up to Make Cutting Gear Teeth Easier Dan Maloney | usagoldmines.com

3D Printed Air Raid Siren Sounds Just Like The Real Thing Lewin Day | usagoldmines.com

Understanding The Miller Effect Al Williams | usagoldmines.com

Cute Face Tells You How Bad The Air Quality Is Lewin Day | usagoldmines.com

Hacker Offered 10% Bounty After Stealing Over $9,000,000 in Ethereum (ETH) From Lending Platform Rho...

What the Well-Dressed Radio Hacker is Wearing This Season Al Williams | usagoldmines.com

The Nokia 3310 Finally Gets A USB-C Upgrade Lewin Day | usagoldmines.com

A 3D printed Camera You Can Now Download, Shutter and All Jenny List | usagoldmines.com

Why AI Usage May Degrade Human Cognition and Blunt Critical Thinking Skills Maya Posch | usagoldmine...

Tiny Typing Tutor Tuts At Your Incorrect Shift Usage Lewin Day | usagoldmines.com

NASA Taps Webb to Help Study 2032 Asteroid Threat Tom Nardi | usagoldmines.com

Budget-Minded Synthetic Aperture Radar Takes to the Skies Dan Maloney | usagoldmines.com

A Transparent BB-8 Build Using Christmas Ornaments Lewin Day | usagoldmines.com

Ponzi Scheme Mastermind Sentenced To 45,376 Years in Prison Over $131,000,000 ‘Farm Bank’ Scam Alex ...

On the Original Punched Cards Al Williams | usagoldmines.com

Automatic Pill Dispenser Is Cheap and Convenient Lewin Day | usagoldmines.com

Florida Man Ordered To Pay $7,600,000 in Restitution After Promoting Supposed ‘Gold-Backed’ Cryptocu...

DIY Microwave Crucibles Al Williams | usagoldmines.com

Will Embodied AI Make Prosthetics More Humane? Heidi Ulrich | usagoldmines.com

FLOSS Weekly Episode 820: Please Don’t add AI Clippy to Thunderbird Jonathan Bennett | usagoldmines....

PCB Design Review: M.2 SSD Splitter Arya Voronova | usagoldmines.com

Safer and More Consistent Woodworking With a Power Feeder Maya Posch | usagoldmines.com

Plastic On The Mind: Assessing the Risks From Micro- and Nanoplastics Maya Posch | usagoldmines.com

Laser Cut Acrylic Provides Movie-Style Authentication Tom Nardi | usagoldmines.com

New Documentary Details Ventilator Development Efforts During COVID Donald Papp | usagoldmines.com

It’s Always Pizza O’Clock With This AI-Powered Timepiece Dan Maloney | usagoldmines.com

Push Your Toy Train No More, With This Locomotive! Jenny List | usagoldmines.com

Google FindMy Tools, Run on an ESP32 Elliot Williams | usagoldmines.com

A Tiny Computer With a 3D Printed QWERTY Keyboard Jenny List | usagoldmines.com

A Tiny Tapeout SDR Jenny List | usagoldmines.com

Hearing What the Bats Hear Elliot Williams | usagoldmines.com

Improving Aluminium-Ion Batteries With Aluminium-Fluoride Salt Maya Posch | usagoldmines.com

The Science Behind Making Buildings Comfortably Non-Combustible Maya Posch | usagoldmines.com

Leave a Reply