As was foretold, we've added advertisements to the forums! If you have questions, or if you encounter any bugs, please visit this thread: https://forums.penny-arcade.com/discussion/240191/forum-advertisement-faq-and-reports-thread/
Options

[Computer Security Thread] CVEs, or "Crap! Vulnerabilities! Eughhhhh..."

1656668707195

Posts

  • Options
    BucketmanBucketman Call me SkraggRegistered User regular
    Weird thing I noticed at work the last few days. A lot of our clients who normally use AWS VPNs have been logging in suddenly via Linode VPNs. All of them are Mac users. At first I thought something fishy was up and someone with a Mac was attacking our clients somehow, then I went through log in histories and yep, every one of them have been using a Mac for years. I wonder if there was a sale through Apple on Linode services or something,

  • Options
    TetraNitroCubaneTetraNitroCubane The Djinnerator At the bottom of a bottleRegistered User regular
    edited November 2019
    Oh hey, who else was baffled when they got logged out and couldn't log back in without a password reset?

    It was because vanilla had a vulnerability! (Edit: There's a forum banner for this now, so this post is highly redundant.)
    Some Background
    Vanilla stores records of user information in its databases, for display and authentication purposes. The full record is generally not visible to the public and is guarded by various permission checks through Vanilla's controllers and API endpoints.

    With Vanilla's APIv2 endpoints additional validation exists to ensure that only certain, predefined fields are returned from any particular endpoint. This is called a Schema.

    What happened
    A bug in sanitization logic caused the schema not to be applied to 1 APIv2 endpoint. This caused full user records to outputted to browser while quoting comments and discussions. While this data was not visible to the eye, it could be accessed by:

    Inspecting the network requests while quoting some user content.
    Calling the /api/v2/media/scrape endpoint directly (with permission to view the scraped discussion or comment).
    Inspecting the HTML of rich comment or discussion quotes.

    Honestly, comparatively speaking it looks like small potatoes. And really, Vanilla responded quite quickly and efficiently, with seriously good levels of detail. That's a rarity these days!

    TetraNitroCubane on
  • Options
    OrcaOrca Also known as Espressosaurus WrexRegistered User regular
    Yeah. I was confused until Tube put up the banner, at which point I followed the link and was frankly impressed at the detail of the timeline and how quickly they responded and how up-front they are with how to change the process to avoid such failures in the future. If only everybody would be that detailed.

  • Options
    Jebus314Jebus314 Registered User regular
    edited November 2019
    Dang son. Most google and Samsung phones have/had a vulnerability which let a rouge app access all photos and stored gps locations, as well as activate the camera and microphone whenever they wanted and without notifying the user, including when the phone was locked. All remotely. All that was required was to give the rogue app storage permissions.

    That seems like a pretty much a worst case scenario for a cell phone.

    Link.
    • Take a photo on the victim’s phone and upload (retrieve) it to the C&C server
    • Record a video on the victim’s phone and upload (retrieve) it to the C&C server
    • Parse all of the latest photos for GPS tags and locate the phone on a global map
    • Operate in stealth mode whereby the phone is silenced while taking photos and recording videos
    • Wait for a voice call and automatically record: Video from the victim’s side, Audio from both sides of the conversation

    Jebus314 on
    "The world is a mess, and I just need to rule it" - Dr Horrible
  • Options
    OrcaOrca Also known as Espressosaurus WrexRegistered User regular
    Jesus.

  • Options
    MugsleyMugsley DelawareRegistered User regular
    I still prefer Android phones but holy shit. Stuff like this makes it harder to recommend to others.

  • Options
    LostNinjaLostNinja Registered User regular
    Mugsley wrote: »
    I still prefer Android phones but holy shit. Stuff like this makes it harder to recommend to others.

    I hate how over priced Apple stuff is, but I respect their security, even if they have to establish their walled garden to do so.

  • Options
    LD50LD50 Registered User regular
    I wouldn't make the assumption that apple phones are more secure. There was very recently a similar vulnerability found in the apple facebook app.

  • Options
    InquisitorInquisitor Registered User regular
    Also, didn’t that unpatchable boot rom exploit for iOS just hit? Checkmate? Checkm8?

    Things might be a little different going forward.

  • Options
    LD50LD50 Registered User regular
    For a bunch of reasons entirely unrelated to google or apple, you shouldn't trust your phone to be entirely secure. Even in the best-case scenario, cell phones are incredibly complicated pieces of tech with huuuuuuuge attack surfaces. Your best bet is to select apps defensively and keep everything up to date.

  • Options
    TetraNitroCubaneTetraNitroCubane The Djinnerator At the bottom of a bottleRegistered User regular
    LD50 wrote: »
    For a bunch of reasons entirely unrelated to google or apple, you shouldn't trust your phone to be entirely secure. Even in the best-case scenario, cell phones are incredibly complicated pieces of tech with huuuuuuuge attack surfaces. Your best bet is to select apps defensively and keep everything up to date.

    And for the love of $Deity, don't use a mobile banking app. Ever.

  • Options
    BucketmanBucketman Call me SkraggRegistered User regular
    LD50 wrote: »
    For a bunch of reasons entirely unrelated to google or apple, you shouldn't trust your phone to be entirely secure. Even in the best-case scenario, cell phones are incredibly complicated pieces of tech with huuuuuuuge attack surfaces. Your best bet is to select apps defensively and keep everything up to date.

    And for the love of $Deity, don't use a mobile banking app. Ever.

    Hi I work at a bank and am in charge on fraud for mobile banking. Its not all that bad, however do expect we might call you to check on thing if your using 4 different VPNs every time you log in.

  • Options
    TetraNitroCubaneTetraNitroCubane The Djinnerator At the bottom of a bottleRegistered User regular
    Bucketman wrote: »
    LD50 wrote: »
    For a bunch of reasons entirely unrelated to google or apple, you shouldn't trust your phone to be entirely secure. Even in the best-case scenario, cell phones are incredibly complicated pieces of tech with huuuuuuuge attack surfaces. Your best bet is to select apps defensively and keep everything up to date.

    And for the love of $Deity, don't use a mobile banking app. Ever.

    Hi I work at a bank and am in charge on fraud for mobile banking. Its not all that bad, however do expect we might call you to check on thing if your using 4 different VPNs every time you log in.

    It's more that you should never protect your financial accounts with a single factor.

    If you are using your mobile device to log into your bank, once your phone is compromised, oops! That's it. It's over.

    If you're using your phone as a secondary device to get One Time Codes, and logging in through a different machine, now if either gets compromised you've still got a layer of security.

  • Options
    CarpyCarpy Registered User regular
    Inquisitor wrote: »
    Also, didn’t that unpatchable boot rom exploit for iOS just hit? Checkmate? Checkm8?

    Things might be a little different going forward.

    Google's Project Zero has really in-depth write-ups on a group that did the same thing on iPhones for years with different sets of exploit chains. Some of which merely required navigating to an attacker controlled site.

  • Options
    InquisitorInquisitor Registered User regular
    Carpy wrote: »
    Inquisitor wrote: »
    Also, didn’t that unpatchable boot rom exploit for iOS just hit? Checkmate? Checkm8?

    Things might be a little different going forward.

    Google's Project Zero has really in-depth write-ups on a group that did the same thing on iPhones for years with different sets of exploit chains. Some of which merely required navigating to an attacker controlled site.

    Yeah that was a pretty fantastic write up. If I remember correctly the website based exploit had to live in active memory so a restart could flush it out but people actually restart their phones very rarely.

  • Options
    CarpyCarpy Registered User regular
    Inquisitor wrote: »
    Carpy wrote: »
    Inquisitor wrote: »
    Also, didn’t that unpatchable boot rom exploit for iOS just hit? Checkmate? Checkm8?

    Things might be a little different going forward.

    Google's Project Zero has really in-depth write-ups on a group that did the same thing on iPhones for years with different sets of exploit chains. Some of which merely required navigating to an attacker controlled site.

    Yeah that was a pretty fantastic write up. If I remember correctly the website based exploit had to live in active memory so a restart could flush it out but people actually restart their phones very rarely.

    I think that might be a different one, or if it's the same I missed the in-memory bit in all the RE talk . These went up last month and were about 5 different exploit chains seen in the wild since 2015 that were all used to deliver the same implant.

    https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html?m=1

  • Options
    CantidoCantido Registered User regular
    School: Okay class, now that you passed Linux, we're moving on to Windows. This is Powershell.

    Class: This is pretty sweet!

    School: Now that you have the basics of Powershell, we have to teach you WMIC

    Class: WTF IS THIS SHIT, I JUST WANNA DIE

    3DS Friendcode 5413-1311-3767
  • Options
    dav3ybdav3yb Registered User regular
    So I'll probably be re-building my computer (case swap) over the next few weeks, and I figured i'd take the time and update my BIO's. I'm basically on the first release of my motherboards BIO's, which is from... 2015ish? I haven't ever felt a need to, but I figure I'd do it anyways. My main curiosity is how much I might need to worry about doing a FULL update of it, as it's an Intel (Z170), so the full updates would be patching the intel exploits found a couple years back. I'd certainly hate to lose much performance, although what I do these day's probably wouldn't be too effected honestly.

    Just wanted to get some opinions on this kind of thing, and if anyone's seen any major performance hits.

    PSN: daveyb1337 || XBL: dav3yb360 || Steam: dav3yb || Switch: SW-5274-1897-8495 || 3DS FC: 2079-7419-8843
  • Options
    tsmvengytsmvengy Registered User regular
    Personally I think there's zero reason to update your bios unless you've bought a cpu that requires it.

    steam_sig.png
  • Options
    ShadowfireShadowfire Vermont, in the middle of nowhereRegistered User regular
    Or unless there's a specific problem you're having that requires it.

    WiiU: Windrunner ; Guild Wars 2: Shadowfire.3940 ; PSN: Bradcopter
  • Options
    LD50LD50 Registered User regular
    The intel security patches are likely being applied by windows already.

  • Options
    dav3ybdav3yb Registered User regular
    tsmvengy wrote: »
    Personally I think there's zero reason to update your bios unless you've bought a cpu that requires it.

    That's largely been what I follow, if it's not broken, don't fix. Although I will say, I built it with an i7-6700, and there was some random thoughts about trying to upgrade to a 7700, but prices are over what a much better CPU would cost, so I'm not sure if that will ever happen. There are a few updates I've seen that update some M.2 and memory support, along with the update for 7th gen CPU's.

    I had considered building a completely new computer as well, but I really don't see that happening right now, as much as i'd like a new one.

    PSN: daveyb1337 || XBL: dav3yb360 || Steam: dav3yb || Switch: SW-5274-1897-8495 || 3DS FC: 2079-7419-8843
  • Options
    MugsleyMugsley DelawareRegistered User regular
    tsmvengy wrote: »
    Personally I think there's zero reason to update your bios unless you've bought a cpu that requires it.

    You're not wrong, but the growing pains with the X570 chipset almost require regular updates right now.

  • Options
    dav3ybdav3yb Registered User regular
    Mugsley wrote: »
    tsmvengy wrote: »
    Personally I think there's zero reason to update your bios unless you've bought a cpu that requires it.

    You're not wrong, but the growing pains with the X570 chipset almost require regular updates right now.

    This is partly the reason I've put off a new build, to allow new stuff time to mature.

    PSN: daveyb1337 || XBL: dav3yb360 || Steam: dav3yb || Switch: SW-5274-1897-8495 || 3DS FC: 2079-7419-8843
  • Options
    LostNinjaLostNinja Registered User regular
    Are there any issues with the Edge Adblock, or should I go with a Chrome Adblock combo? I’m setting up a new laptop, and I have used Firefox in the past but it just feels dated now.

  • Options
    Inquisitor77Inquisitor77 2 x Penny Arcade Fight Club Champion A fixed point in space and timeRegistered User regular
    Why does Firefox feel dated? Works just as good as any other browser... I'd recommend using Firefox + UBlock Origin. Alternatively, you can also use Brave + UBlock Origin if you want to use a Chrome-based browser that has working adblocking.

    Notice how I don't mention Adblock anywhere. :P

  • Options
    ShadowfireShadowfire Vermont, in the middle of nowhereRegistered User regular
    Why does Firefox feel dated? Works just as good as any other browser... I'd recommend using Firefox + UBlock Origin. Alternatively, you can also use Brave + UBlock Origin if you want to use a Chrome-based browser that has working adblocking.

    Notice how I don't mention Adblock anywhere. :P

    Firefox + uBlock Origin + Facebook Container

    WiiU: Windrunner ; Guild Wars 2: Shadowfire.3940 ; PSN: Bradcopter
  • Options
    LD50LD50 Registered User regular
    You shouldn't use edge as it's sunsetted already. I'd stay away from chrome due to their changes to adblocking addons. Firefox has been working well for me.

  • Options
    DisruptedCapitalistDisruptedCapitalist I swear! Registered User regular
    I use Firefox with noscript. It's really illuminating to see how many scripts and where they come from on every website. (Also disappointing to discover a lot of broken webpages that just can't function without Javascript.)

    "Simple, real stupidity beats artificial intelligence every time." -Mustrum Ridcully in Terry Pratchett's Hogfather p. 142 (HarperPrism 1996)
  • Options
    bowenbowen How you doin'? Registered User regular
    I hate how slow firefox is with any HTML5 and CSS3 stuff.

    It feels like a slug compared to chrome.

    not a doctor, not a lawyer, examples I use may not be fully researched so don't take out of context plz, don't @ me
  • Options
    SolventSolvent Econ-artist กรุงเทพมหานครRegistered User regular
    So if I buy a new lappy - what's the go-to free antivirus these days? I've had Avira on my old one.

    I don't know where he got the scorpions, or how he got them into my mattress.

    http://newnations.bandcamp.com
  • Options
    ShadowfireShadowfire Vermont, in the middle of nowhereRegistered User regular
    Solvent wrote: »
    So if I buy a new lappy - what's the go-to free antivirus these days? I've had Avira on my old one.

    Windows Defender.

    If you want something to feel good about that's maybe overzealous but is also great, Malwarebytes continues to be excellent.

    WiiU: Windrunner ; Guild Wars 2: Shadowfire.3940 ; PSN: Bradcopter
  • Options
    Inquisitor77Inquisitor77 2 x Penny Arcade Fight Club Champion A fixed point in space and timeRegistered User regular
    Bitdefender paid can be found very cheap, for something like $25 a year if you look around. Otherwise Windows Defender works great as a free solution.

    Malwarebytes is still trying to become a "full endpoint protection suite" but by-and-large is mostly useful as an on-demand supplemental scanner (i.e. the free functionality).

  • Options
    TetraNitroCubaneTetraNitroCubane The Djinnerator At the bottom of a bottleRegistered User regular
    edited December 2019
    So it turns out that Visa is warning against a rash of Credit Card theft/fraud occurring at gas station pumps.

    "But TetraNitroCubane," you say, "credit card skimmers are nothing new. Particularly at gas stations. And what does this have to do with computer security anyway?"

    Correct! But this new vector doesn't even have to be installed on the pump to skim your card. It's actually something far different, and doesn't involve a physical component. Details can be found in Visa's report on the issue (Link goes to a PDF report).
    In the first incident, PFD analyzed the compromise of a North American fuel dispenser merchant. The threat actors compromised the merchant via a phishing email sent to an employee. The email contained a malicious link that, when clicked, installed a Remote Access Trojan (RAT) on the merchant network and granted the threat actors network access. The actors then conducted reconnaissance of the corporate network, and obtained and utilized credentials to move laterally into the POS environment. There was also a lack of network segmentation between the Cardholder Data Environment (CDE) and corporate network, which enabled lateral movement. Once the POS environment was successfully accessed, a Random Access Memory (RAM) scraper was deployed on the POS system to harvest payment card data.

    Malicious parties have essentially phished gas station employees (unclear what employees, or at what level), and from there have managed to get into the Point Of Sale system (which really should be an isolated network). And because just about everydamn gas station (in the US) uses magstripe instead of Chip and Pin for transactions, the data for every Credit Card that gets swiped is transmitted through the POS system unencrypted. Changes to POS systems to eliminate magstripe readers are being mandated by Visa, but will take until October of 2020 to roll out.

    So once again, a case of the greatest modern vulnerability to user data: Companies not giving two shits about your privacy and security.

    TetraNitroCubane on
  • Options
    DisruptedCapitalistDisruptedCapitalist I swear! Registered User regular
    edited December 2019
    😔😔😔

    sighhhhhhhhhhhhh

    time to go to cash only.

    DisruptedCapitalist on
    "Simple, real stupidity beats artificial intelligence every time." -Mustrum Ridcully in Terry Pratchett's Hogfather p. 142 (HarperPrism 1996)
  • Options
    a5ehrena5ehren AtlantaRegistered User regular
    I keep waiting for gas pumps to get NFC so that I can use phone payments instead, but it still hasn't happened.

  • Options
    SiliconStewSiliconStew Registered User regular
    The functional problem with gas pumps is you need to authorize the card first to activate the pumps to prevent drive offs, but you also don't know how much the transaction will be until it's done pumping. So for a chip card you'd have to leave the card in for the entire duration, which can cause problems for shared card readers and allow physical card theft.

    Just remember that half the people you meet are below average intelligence.
  • Options
    bowenbowen How you doin'? Registered User regular
    a5ehren wrote: »
    I keep waiting for gas pumps to get NFC so that I can use phone payments instead, but it still hasn't happened.

    Byrne Dairy here in NY uses them, it's great, I am almost exclusively using them for gas now. I'm not sure if they're phone compatible but it works my waving my wallet at it so there's that.

    not a doctor, not a lawyer, examples I use may not be fully researched so don't take out of context plz, don't @ me
  • Options
    LaOsLaOs SaskatoonRegistered User regular
    The functional problem with gas pumps is you need to authorize the card first to activate the pumps to prevent drive offs, but you also don't know how much the transaction will be until it's done pumping. So for a chip card you'd have to leave the card in for the entire duration, which can cause problems for shared card readers and allow physical card theft.

    That's not how it works up here (Canada). It does ask you to enter the cash amount you want to purchase, pre-authorizes for that amount (after you enter your pin), and then gives you your card back before dispensing fuel from the pump. You're only actually charged for the amount you pump. It's a smooth, quick process that only sucks because being outside in winter sucks. :P

  • Options
    BronzeKoopaBronzeKoopa Registered User regular
    The shell pumps at the service plazas along the FL turnpike had those NFC things, but it declined the transaction when I waved my phone. Wish I had one of those NFC credit cards.

Sign In or Register to comment.