Episode 258 of the Transatlantic Cable kicks off with discussions around the Lazarus group, more specifically the new attack being attributed to them. From there, discussions move to talk around some crypto-exchanges sharing geo-tracking public information with ICE (the United States Immigrations and Customs show more ...
Enforcement agency). Moving to the penultimate story, which looks at an NFT-themed restaurant which (believe it or not) has stopped accepting crypto payments due to the market crash. Finally, the team discuss news coming out of China about a potential data breach which could possibly (if true) be one of the largest in the world (nearly 1 billion). If you liked what you heard, please consider subscribing. North Korean Lazarus hackers linked to $100M Harmony bridge theft Cryptocurrency titan coinbase providing geo tracking data to ice NFT-Themed Restaurant No Longer Accepting Cryptocurrency In a big potential breach, a hacker offers to sell a Chinese police database.
In June, researchers from three US universities published a paper describing a actual attack that abuses the fact that CPU frequency changes depend on the load thereon (standard behavior for modern CPUs). CPU frequency is measured in hertz, hence the name Hertzbleed, hinting that a change in this frequency leads to show more ...
data leakage. This method can be classified as a hardware attack; that is, one that exploits vulnerabilities or other specific weaknesses in hardware. There are many attacks of this type, but almost all require direct access to the target computer — or just a specific chip. But Hertzbleed can operate remotely! The study is of great interest and, despite its complexity, can be summarized in laymans terms. But for at least a basic understanding of its finer points, a bit of background knowledge is required. So we decided to do both: to post a simple explanation of Hertzbleed, and another slightly more complicated one (but still with no fancy graphs or abstruse calculations). As is now typical, Hertzbleed has its own site and logo. The logo captures the basic essence of the vulnerability: altering CPU frequency leads to leaks. Source. The simple explanation To save power, modern CPUs dont maintain the same frequency at all times. Instead, the frequency (as well as the CPU voltage) adjusts automatically according to its load. When the tasks are few, the frequency can be very low — for example, 900MHz instead of the nominal 3.2GHz. If there are many tasks, the frequency of one or all CPU cores can be raised above the baseline. In practice, the load (the number and complexity of tasks) is not the only criterion for changing the frequency. For instance, it can be lowered if the CPU overheats. The researchers managed to harness this native functionality to measure the state of the CPU when it was running a data encryption program, and thereby steal sensitive information. They found a feature of a modern encryption algorithm that forces the CPU to increase the frequency when processing certain data. As the frequency increases, the data is processed more quickly, and the attacked computer responds to requests faster. By measuring the response time, the researchers were able to reconstruct the secret encryption key. Armed with this key, they can theoretically intercept and decrypt data exchanged by the target system, for example, with other computers in a virtual private network. And all this without any chance whatsoever to register the theft of the key. Hertzbleed develops the idea of hardware attacks through so-called side channels. At the same time, it introduces the theoretical possibility of stealing data remotely — by sending requests to the potential victim over the network. But for the time being this remains a purely theoretical exercise in the search for complex vulnerabilities in modern CPUs. However its quite possible that in the future such attacks will be simplified. A slightly more complicated explanation Side-channel attacks are performed by indirectly observing the operation of a single chip or a whole computer. The classic side-channel attack method entails observing variations in electric current consumed by the chip. If the chip is busy encrypting data using a secret key, for example, changes in the power consumption in some cases can be used to reconstruct the key. Side channels can be software as well hardware-based. The well-known Spectre study uses such a side channel directly in the CPU, exploiting speculative execution features to steal sensitive information. Whats more, sometimes theres no need to hook up a voltmeter to the computer to monitor CPU power consumption, because they often have one built in. Using a system for monitoring average power consumption of Intel processors, a Hertzbleed-related attack has already been developed. Now lets take a look at dynamic adjustment of CPU frequency. This is made possible by the DVFS technique; that is, dynamic voltage and frequency scaling. Indeed, along with frequency, CPU voltage also varies to ensure optimal operating conditions (low power consumption at low load, stable operation at peak capability). The researchers describe in some detail how they carried out numerous DVFS experiments on Intel processors (Intel itself calls this technology Turbo Boost). They burdened the CPU with a negligible load (basic arithmetic calculations) and observed how the frequency changed. Several patterns emerged: to simplify as much as possible, with one set of calculation data, the CPU frequency tended to increase — but not with another. Also, an increased frequency led to faster calculations and, accordingly, a quicker result. Lets look at a third techie-term relevant to all this: constant-time programming. This is important when it comes to implementing an encryption algorithm in a program. Suppose we have a program thats given a certain phrase as input, and outputs the same phrase, but encrypted. We can input data, but dont know the secret encryption key, which, meanwhile, were trying to establish by observing the execution time, since the execution time of the function depends on the input data. This is comparable to attempting to break into a safe locked with a secret digital code that reacts slightly differently to sequences of numbers that are nearly right, giving us warm and cold clues. Most programs that implement encryption algorithms feature a protective mechanism to prevent attempts to determine the key in this way — the very principle of constant-time programming. The most important result of the Hertzbleed study is that dynamic adjustment of CPU frequency breaks the principle of constant-time programming — that is, time-invariance in encryption. And the authors showed how to take advantage of this fact. They did this by taking a system with real-life data encryption software and feeding in a sequence of characters, which the program then tried to decrypt. The inputs were chosen to create conditions allowing an attacker to reconstruct the encryption key. Moreover, the key is extracted through a side channel — that is, the data leakage occurs due to a change in the CPU frequency and, accordingly, in the program execution time and the response time to the attackers request. Missing consequences In our slightly more complicated explanation of Hertzbleed, weve covered approximately… 0.05% of the actual information presented by the researchers. There are countless other nuances also relevant to understanding how it works. In particular, they utilized a feature of the SIKE key encapsulation algorithm to create conditions for making leakage through response time or frequency change possible. This is similar to the aforementioned Spectre attack, which requires special conditions to be created in the attacked software to allow for stealing important data. Strictly speaking, based on the results of the study, its impossible to say unequivocally where the vulnerability is: in the CPU or in the program. And we need to mention a glaring aspect of the implementation: although the researchers demonstrated an actual, practical (not theoretical) attack, they carried it out under controlled conditions. The variation in response time as per the inputs was always constant. But what if the CPU is running other tasks simultaneously that also affect the response time and make the data noisier? Lastly, even in such ideal circumstances, the reconstruction of the encryption key (in two different experiments) took 36 and 89 hours! During this time, thousands of requests per second were sent to the encryption program, which was the only way to ensure that all the necessary features of software and hardware operation were aligned to produce the leakage. That is simply a very long time! Therefore, the reaction to the study was ambiguous. On the one hand, the vulnerabilities were assigned the usual identifiers: CVE-2022-23823 for Intel, and CVE-2022-24436 for AMD. It would seem that the problem is, after all, in the CPUs. But Intel and AMD have reported they have no plans to release any updates for the affected systems (for Intel, the 8th through 11th-gen CPUs). In fact, the change in the SIKE algorithm made the demonstrated attack impossible. Microsoft and Cloudflare, which use SIKE as one of the elements in their encryption systems, updated their own software. Nevertheless, the study is of huge significance. Like Spectre in 2018, it will not be the last of this new class of attacks. If one example of data leakage through dynamic adjustment of CPU frequency can be shown, others will surely follow. Its also an important body of work for cryptographers. SIKE is a fairly recent algorithm, a candidate for the title of post-quantum cryptography solution. It has actually been analyzed for robustness against any side-channel attack, and proved quite resilient. But the Hertzbleed study showed that new options have appeared. All in all, as is often the case with such studies, this attack was discovered but could not be implemented – fully and successfully – for real. Developers of CPUs and programs that are particularly sensitive to hacking will draw their own conclusions and make changes before it becomes possible to actually steal anything. But theres a small chance that next time these or other researchers find something that allows attackers, say, to intercept encrypted network traffic or crack the encryption while remaining anonymous. With a bit of imagination its possible to inflate the scheme depicted in this study to such proportions. But this remains to be proven, and the Hertzbleed study (and the trouble we had describing it in simple terms) shows that this is no easy task. For Spectre-class vulnerabilities, no such breakthrough has been demonstrated in more than four years. Here, too, things will most likely stay the same: in another year or so, another report will be released that slightly advances and clarifies the previous one. And thats a positive takeaway. After all, weve got enough problems with information security already!
Hacktivist group DragonForce Malaysia has been spotted working its way around a Confluence exploit to conduct some action in Windows servers that may lead to ransomware attacks. Network and system admins are suggested to audit and monitor anomalies in networks.
The U.K Army’s Twitter and YouTube accounts were hacked and modified to push crypto scams. While the Twitter account displayed fake NFTs and crypto giveaways, the YouTube account aired Ark Invest live streams. One should keep logging out of their accounts on a regular basis. If nothing, sessionIDs would get clear and stop the attack if an account is compromised.
Red Canary's Detection Engineering team has detected Raspberry Robin malware on the networks of various customers in the technology and manufacturing sectors. The worm can bypass UAC security on targeted systems with legitimate Windows tools. The attack could help hackers deploy additional malware within the victims' networks and escalate privileges.
Ukraine's cybersecurity defense and security agency SSSCIP reported that the country's government and private sector organizations have suffered nearly 800 cyberattacks since the start of the war. Most attacks focused on information harvesting (242 events), along with breach, take down, or malware deployment. show more ...
Private and government organizations are suggested to follow CERT-UA for recommendations and mitigation steps.
Resecurity registered an increase in malicious activity targeting law enforcement agencies at the beginning of Q2 2022. Threat actors are hacking email and other accounts which belong to law enforcement officers and their internal systems.
Researchers found a document that exploited CVE-2022-30190, aka Follina, then downloaded Rozena to deploy a fileless attack and leverage the public Discord CDN attachment service.
This joint advisory provides information—including tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs)—on Maui ransomware obtained from FBI incident response activities and industry analysis of a Maui sample.
The malware, which was delivered in the victim's spam email, includes an OLE object that points to an HTML file on an external resource that contains JavaScript code. This code exploits Follina.
It disguises itself as a legitimate Google Software Update application and uses a Microsoft web hosting service IP address as its command-and-control (C&C) server to circumvent detection.
According to researchers from Microsoft Threat Intelligence Center (MSTIC), the most notable update in the latest variant is the use of a more complex encryption method.
Recently, the malware used by Lazarus, VSingle, has been updated to retrieve C2 server information from GitHub. VSingle has two versions, one targeting Windows OS and the other targeting Linux OS.
It is not easy to obtain a blue badge, and threats of suspension can cause people to react without thinking. Over this uncertainty, such accounts are prime targets for threat actors.
The malicious activity, attributed to a software supply chain threat actor dubbed CuteBoi, involves an array of 1,283 rogue modules that were published in an automated fashion from over 1,000 different user accounts.
Multiple Russian influence networks have been running disinformation and influence campaigns since May designed to sow division in the West over its support for Ukraine, according to Recorded Future.
A group of 29 areas that represent a high risk in terms of vulnerability, abuse of power, mismanagement, or need for drastic changes was analyzed in a new report produced by the Federal Audit Court (TCU).
After the cyberattack, SHI added a message to its website warning customers and visitors that its information systems were undergoing maintenance due to a "sustained outage."
Lockdown Mode is designed for users, such as journalists or activists, who face serious digital threats from NSO Group and other private companies that are developing state-sponsored mercenary spyware.
The leaders of MI5 and the FBI shared the stage for the first time yesterday in a bid to warn business leaders and academics of the seriousness of the espionage threat from China.
Cybersecurity researchers have taken the wraps off a new and entirely undetected Linux threat dubbed OrBit, signally a growing trend of malware attacks geared towards the popular operating system.
Wedding officiant training company American Marriage Ministries (AMM) said it is dealing with another data security issue after reporting a breach of sensitive data to the FBI earlier this year.
QNAP says the attacks are focused on Internet-exposed QNAP devices with the SMB service enabled and accounts with weak passwords that can easily be cracked in brute-force attacks.
In advance of this year’s Amazon Prime Day set for July 12 and 13, Check Point said it has seen a 37% jump in Amazon-related phishing attacks at the start of July compared with the daily average for June.
The UK’s leading cybersecurity agency has urged organizations to follow best practices and take care of their infosecurity staff in order to weather an extended period of elevated cyber risk due to the ongoing war in Ukraine.
On Twitter and Facebook, the school explained that it is experiencing a system-wide outage of most online services but noted that programs such as Canvas, Adobe, and Microsoft Teams are still available to students.
The added value of ENISA threat intelligence efforts lies in offering updated information on the dynamically changing threat landscape. These efforts support risk mitigation, promote situational awareness and proactively respond to future challenges.
On Windows 11, the Kerberos SSP's KerbRetrieveEncodedTicketMessage message can be used to get an arbitrary service ticket and session key from an AppContainer even without the enterprise authentication capability leading to elevation of privilege.
Dovecot IMAP server version 2.2 suffers from a privilege escalation vulnerability. When two passdb configuration entries exist in the Dovecot configuration, which have the same driver and args settings, the incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied show more ...
settings can lead to an unintended security configuration and can permit privilege escalation with certain configurations involving master user authentication.
Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth show more ...
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5488-2 - USN-5488-1 fixed vulnerabilities in OpenSSL. This update provides the corresponding updates for Ubuntu 16.04 ESM. Chancen and Daniel Fiala discovered that OpenSSL incorrectly handled the c_rehash script. A local attacker could possibly use this issue to execute arbitrary commands when c_rehash is run.
Cybersecurity researchers have taken the wraps off a new and entirely undetected Linux threat dubbed OrBit, signally a growing trend of malware attacks geared towards the popular operating system. The malware gets its name from one of the filenames that's utilized to temporarily store the output of executed commands ("/tmp/.orbit"), according to cybersecurity firm Intezer. "It can be installed
Apple on Wednesday announced it plans to introduce an enhanced security setting called Lockdown Mode in iOS 16, iPadOS 16, and macOS Ventura to safeguard high-risk users against "highly targeted cyberattacks." The "extreme, optional protection" feature, now available for preview in beta versions of its upcoming software, is designed to counter a surge in threats posed by private companies
Cisco on Wednesday rolled out patches for 10 security flaws spanning multiple products, one of which is rated Critical in severity and could be weaponized to conduct absolute path traversal attacks. The issues, tracked as CVE-2022-20812 and CVE-2022-20813, affect Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) and "could allow a remote attacker to overwrite
Disclaimer: This article is meant to give insight into cyber threats as seen by the community of users of CrowdSec. What can tens of thousands of machines tell us about illegal hacker activities? Do you remember that scene in Batman - The Dark Knight, where Batman uses a system that aggregates active sound data from countless mobile phones to create a meta sonar feed of what is going on at any
In a new joint cybersecurity advisory, U.S. cybersecurity and intelligence agencies have warned about the use of Maui ransomware by North Korean government-backed hackers to target the healthcare sector since at least May 2021. "North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health
Researchers have disclosed a new large-scale cryptocurrency mining campaign targeting the NPM JavaScript package repository. The malicious activity, attributed to a software supply chain threat actor dubbed CuteBoi, involves an array of 1,283 rogue modules that were published in an automated fashion from over 1,000 different user accounts. "This was done using automation which includes the
Apple has previewed a new feature which aims to harden high-risk users from the serious threat of being spied upon by enemy states and intelligence agencies. Read more in my article on the Tripwire State of Security blog.
A hacked university might have made a profit after paying a cryptocurrency ransom, China suffers possibly the biggest data breach in history, and Reuters investigates digital mercenaries. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer show more ...
security veterans Graham Cluley and Carole Theriault, joined this … Continue reading "Smashing Security podcast #282: Raising money through ransomware, China’s mega-leak, and hackers for hire"