Breaking
March 10, 2025

This Week in Security: Zen Jailbreak, Telegram Exploit, and VMware Hyperjack Jonathan Bennett | usagoldmines.com

The fine researchers at Google have released the juicy details on EntrySign, the AMD Zen microcode issue we first covered about a month ago. And to give away the punchline: cryptography is hard. It’s hard in lots of ways, but the AMD problem here is all about keeping track of the guarantees provided by cryptographic primitives.

The vulnerability is in the verification of microcode updates for AMD’s Zen processor family. To understand microcode, you have to understand that X86-64 processors are actually built out of proprietary Reduced Instruction Set Computer (RISC) cores, that then emulate the more complex X86-64 complex instruction set computer (CISC) cores. Microcode is the firmware that controls that emulation step. For the security guarantees of modern computing, it’s rather important that CPUs only run signed microcode from the CPUs vendor. AMD has a pretty straightforward system to sign and then verify microcode patches.

Each patch includes a 2048-bit RSA public key and signature, verifying that the microcode was actually signed by the holder of the corresponding private key. The CPU hashes that public key, and compares it to a 128-bit value that was burned into the CPU at manufacture time. The intent is that if the hash matches, the public key must be the same. The problem was the hashing algorithm used for this step.

For this scheme to work, it would need a collision resistant cryptographic hashing function. The security of the scheme relies on the idea that it’s effectively impossible to find another public key that results in the same hash output. Finding a collision on that output value completely breaks the scheme.

AMD chose the AES Cipher Message Authentication Code (AES-CMAC) hash algorithm. AES-CMAC takes a message and key, and generates a Message Authentication Code (MAC). That MAC can then be used to verify that the message has not been tampered with. It can be thought of as a keyed hash with conditional collision resistance. But most importantly, if the secret key is known, none of those guarantees are valid. If the key is known, AES-CMAC fails to provide effective collision resistance in its output. And of course, the specific AES-CMAC key used in AMD Zen processors could be extracted, and turned out to be a NIST example key. To be clear, there is nothing wrong with AES-CMAC itself, it’s just the wrong algorithm for this use.

There’s one more clever trick that was needed to pull this together. The AES-CMAC collision only generates a public RSA key. How would an attacker take this arbitrary public key and produce the private key needed to sign these microcode updates? Isn’t one of the primary guarantees of RSA itself, that the private key can’t be derived from the public key? Only if the keypair is actually based on large prime numbers. After generating a few of these candidate public keys, one was discovered that was relatively easy to factor, as it was the product of more than just two primes. AMD’s fix replaces this hashing function with an appropriate cryptographic hash, preventing any microcode tampering.

Telegram and EvilLoader

The Telegram app has a weird problem deciding what to do with a .htm file sent as a video using the telegram API. Telegram tries to treat it as a video, and offers to open an external program to play the video. Because it’s actually HTML content, the “video” is opened in the browser, potentially running malicious JavaScript in that context.

This can be further used to trick an unsuspecting user into downloading a fake video player APK, to try to play this video, potentially leading to device compromise. This vulnerability is still unpatched as of time of writing, but has been widely known in the expected places. It may not be a 0-click RCE, but this one still has the potential for misuse.

More Info on The Heist

Last week we told you about the biggest heist in history, with Bybit getting hacked for cryptocurrency worth $1.5 billion. We know a bit more now, as the Bybit CEO has published the preliminary security report. The short story is that the North Korean Lazarus Group compromised a Safe{Wallet} developer workstation and gained access to an AWS or CloudFront API key. This was used to serve malicious JavaScript to Bybit, and that JavaScript disguised a malicious transaction, leading to the loss.

In retrospect there’s a glaring security problem with the Safe{Wallet} system that Bybit used: The reliance on JavaScript served from an outside server. It should take more than simple access to an AWS account to pull off a $1.5 billion heist.

Hyperjack

What happens when a process in a Virtual Machine (VM) can escape the virtual environment and take over the hypervisor? Nothing good. It’s known as hyperjacking, and VMware has a trio of vulnerabilities that makes it possible, across every version of ESXi, Workstation, Fusion, and Telco platforms — everything containing the ESX hypervisor.

And VMware says the vulnerabilities are being used in-the-wild. Patches are available, and this seems like a definite hair on fire scenario for anyone that may have untrusted tenants on VMware powered VMs.

Bits and Bytes

Have you ever wondered if a Stingray was operating in your area? That’s the cell tower simulator used to capture and analyze cell traffic, potentially breaking cell phone call encryption. EFF has released Rayhunter, and open source tool that captures cellular traffic and tries to detect Stingray-style traffic manipulation. The best part is that it runs on the Orbic RC400L mobile hotspot, a $20 piece of hardware.

How long does it take for your infrastructure to be probed after accidentally posting an AWS key online? As little as 10 hours, according to tests done by Clutch Security. Some forums are a bit friendlier, with Reddit users pointing out the leaked key and the post eventually getting deleted for the same reason.

And finally we have the four horsemen of WordPress Backdoors. About a thousand WordPress sites were infected with a JavaScript file, and this campaign spared no expense with adding backdoors to the sites. The infection added a malicious plugin, code into wp-config.php, new SSH keys, and what looks like a reverse shell. Somebody really wants to maintain access to those WordPress sites.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

ZX Spectrum, Soviet Style: A 44-IC Clone You Can Build Heidi Ulrich | usagoldmines.com

IPV4, IPV6… Hey! What Happened to IPV5? Al Williams | usagoldmines.com

Clock Mechanism Goes Crazy for Arduino Al Williams | usagoldmines.com

Hackaday Links: March 9, 2025 Dan Maloney | usagoldmines.com

Deep Drawing with Ultrasonics Al Williams | usagoldmines.com

Old Chromebooks Get Second Life as Video Wall Tom Nardi | usagoldmines.com

Taming the Wobble: An Arduino Self-Balancing Bot Heidi Ulrich | usagoldmines.com

Fixing an Unpleasant SD Card Slot Issue In a NanoVNA Maya Posch | usagoldmines.com

The Coolest Batteries You’ve Never Heard Of Heidi Ulrich | usagoldmines.com

Retrotechtacular: Better Living Through Nuclear Chemistry Dan Maloney | usagoldmines.com

Fictional Computers: EMERAC was the Chatbot of 1957 Al Williams | usagoldmines.com

Writing an OLED Display Driver in MicroZig Maya Posch | usagoldmines.com

Expensive Camera, Cheap 3D-Printed Lens Jenny List | usagoldmines.com

Bank of America Warns Social Security Numbers, IDs and Other Sensitive Customer Data Potentially Exp...

Transceiver Reveals Unusual Components Al Williams | usagoldmines.com

$830,000 Drained From Wells Fargo As Customer Executes Brazen Attack, Triggers Fraudulent Bank Trans...

Physical Computing Used to be a Thing Elliot Williams | usagoldmines.com

The Pentium Processor’s Innovative (and Complicated) Method of Multiplying by Three, Fast Donald Pap...

Retail Pharmacy Giant Handing $6,800,000 To Customers After Hackers Trigger Massive Data Breach Dail...

Get Into Meshtastic On the Cheap With This Tiny Node Kit Dan Maloney | usagoldmines.com

The Road to Lucid Dreaming Might be Paved With VR Donald Papp | usagoldmines.com

This Laser Knows about Gasses Al Williams | usagoldmines.com

Trump Sues Capital One After Slamming Bank of America, JPMorgan Chase Over Abrupt Bank Account Termi...

Tearing Down a Vintage Word Processor Al Williams | usagoldmines.com

Trio of Mods Makes Delta Printer More Responsive, Easier to Use Dan Maloney | usagoldmines.com

Run Xbox 360 Games on Your PC With XenonDecomp Maya Posch | usagoldmines.com

Open Source Hardware, How Open Do You Want It To Be? Jenny List | usagoldmines.com

Hackaday Podcast Episode 311: AirTag Hack, GPS Rollover, and a Flat-Pack Toaster Tom Nardi | usagold...

GNSS Signals Tracked on the Moon By LuGRE Maya Posch | usagoldmines.com

The Long Goodbye: More Instruments Shut Down on the Voyagers as End Nears Maya Posch | usagoldmines....

Open Safety In The Auto Business: Renault Shares Its Battery Fire Suppression Tech Jenny List | usag...

Repairing a 1955 Classic Radio Al Williams | usagoldmines.com

Combined Crypto, Anglo-American Style Al Williams | usagoldmines.com

The Strange Afterlife of the Xbox Kinect Dave Rowntree | usagoldmines.com

Plastic Gear Repair Al Williams | usagoldmines.com

Custom Touchpad PCBs Without The Pain Jenny List | usagoldmines.com

Hackaday Europe 2025 Welcomes David Cuartielles, Announces Friday Night Bring-a-Hack Elliot Williams...

Hacking Digital Calipers for Automated Measurements and Sorta-Micron Accuracy Dan Maloney | usagoldm...

Why 56k Modems Relied On Digital Phone Lines You Didn’t Know We Had Lewin Day | usagoldmines.com

The Future We Never Got, Running a Future We Got Jenny List | usagoldmines.com

Rackmount all the Things, Hi-Fi Edition Heidi Ulrich | usagoldmines.com

A TV With Contrast You Haven’t Seen For Years Jenny List | usagoldmines.com

Ptychography for High Resolution Microscopy Al Williams | usagoldmines.com

Designing a Toy Conveyor Belt For Fun and Profit Kristina Panos | usagoldmines.com

Piggyback Board Brings Touch Sensing to USB Soldering Iron Dan Maloney | usagoldmines.com

FLOSS Weekly Episode 823: TuxCare, 10 Years Without Rebooting! Jonathan Bennett | usagoldmines.com

Haptic Displays Bring Sports To The Vision Impaired Lewin Day | usagoldmines.com

Is This The Oldest HD Video Online? Jenny List | usagoldmines.com

Big Chemistry: Glass Dan Maloney | usagoldmines.com

China Claims Commercial Nuclear Fusion by 2050 as Germany Goes Stellarator Maya Posch | usagoldmines...

Speaking Computers from the 1970s Al Williams | usagoldmines.com

Build a Parametric Speaker of Your Own Jenny List | usagoldmines.com

Smartwatches Could Flatten the Curve of the Next Pandemic Navarre Bartz | usagoldmines.com

Shortwave Resurrection: A Sticky Switch Fix on a Hallicrafters Heidi Ulrich | usagoldmines.com

Lawsuit Accusing JPMorgan Chase, Wells Fargo, Bank of America and Zelle of Failing To Protect Custom...

Interposer Helps GPS Receiver Overcome Its Age Arya Voronova | usagoldmines.com

Inexpensive Powder Coating Al Williams | usagoldmines.com

Keebin’ with Kristina: the One with the Schreibmaschine Kristina Panos | usagoldmines.com

It’s 2025, and Here’s a New Film Format Jenny List | usagoldmines.com

LTA’s Pathfinder 1: the Dawn of a New Age of Airships? Maya Posch | usagoldmines.com

Cheap Hackable Smart Ring Gets a Command Line Client Arya Voronova | usagoldmines.com

CNC Router and Fiber Laser Bring the Best of Both Worlds to PCB Prototyping Dan Maloney | usagoldmin...

It’s SSB, But Maybe Not Quite As You Know It Jenny List | usagoldmines.com

Hijacking AirTag Infrastructure To Track Arbitrary Devices Arya Voronova | usagoldmines.com

Make Your Own Air Knife and Air Amplifier Maya Posch | usagoldmines.com

JPMorgan Chase Loses Package Containing Customers’ Sensitive Data, Warns Bank Account Info Could Be ...

Here’s A Spy Movie-Grade Access Card Sniffing Implant Arya Voronova | usagoldmines.com

Deep Space DX Hack Chat Dan Maloney | usagoldmines.com

Sensory Substitution Device Tingles Back Of Your Hand Arya Voronova | usagoldmines.com

12VHPWR Watchdog Protects You From Nvidia Fires Arya Voronova | usagoldmines.com

FOSDEM 2025, A Hardware Hacker’s Haven Arya Voronova | usagoldmines.com

A MicroPython Interpreter For Flipper Zero Arya Voronova | usagoldmines.com

Wake, Boot, Repeat: Remote OS Selection with GRUB and ESP Heidi Ulrich | usagoldmines.com

Flat Pack Toaster Heats Up the Right to Repair Navarre Bartz | usagoldmines.com

Making The Alarmo Customizable, By Any Means Necessary Arya Voronova | usagoldmines.com

Hackaday Links: March 2, 2025 Dan Maloney | usagoldmines.com

On Sensory Weaver Building Arya Voronova | usagoldmines.com

Make Ice Spheres in a Copper Press Navarre Bartz | usagoldmines.com

A CaptionCall Phone Succumbs To Doom, Again Arya Voronova | usagoldmines.com

24,041 Americans Affected As Billion-Dollar Bank Suffers Data Breach Mark Emem | usagoldmines.com

“Some Assembly Required” Makes Us Love Things More Navarre Bartz | usagoldmines.com

Skype is Shutting Down on May 5th Maya Posch | usagoldmines.com

This Gesture Sensor Is Precise, Cheap, Well-Hidden Arya Voronova | usagoldmines.com

Using Four Rolls Of Film To Make One Big Photo Lewin Day | usagoldmines.com

The Bus Pirate 5 Sure Can Glitch Arya Voronova | usagoldmines.com

$350,000,000 Payment To T-Mobile Customers Incoming After Massive Hack and Data Breach Settlement Da...

Why Are Cassette and CD Players So Big Now? Navarre Bartz | usagoldmines.com

Bank Employee Allegedly Steals $1,000,000 in Cash From New York Bank Vault, Fleeing With Stacks of M...

SteamVR Controller Controlling Addressable LEDs Lewin Day | usagoldmines.com

Practice While You Work Elliot Williams | usagoldmines.com

Making a PCR Machine Crypto Sign Its Results Arya Voronova | usagoldmines.com

Building a Nerf-like Rocket Launcher With Airburst Capability Lewin Day | usagoldmines.com

Phytoremediation to Clean the Environment and Mine Critical Materials Navarre Bartz | usagoldmines.c...

Building an Interferometer With Lego Lewin Day | usagoldmines.com

Illicit Crypto Addresses Received $40,900,000,000 Worth of Digital Assets Last Year: Chainalysis Con...

A Different Take on the River Table Does it in Bronze Navarre Bartz | usagoldmines.com

Cheap Fiber Optic Wand Toy Becomes Tiny Weird Display Lewin Day | usagoldmines.com

Lost Foam Aluminium Alloy Casting Dave Rowntree | usagoldmines.com

Hackaday Podcast Episode 310: Cyanotypes, Cyberdecks, and the Compass CNC Kristina Panos | usagoldmi...

Tech in Plain Sight: Shopping Cart Locks Al Williams | usagoldmines.com

Leave a Reply