All about Security, News, Events and Incidents

Discussion in 'Security and Anti-Virus Software' started by Dr. AMK, Apr 26, 2018.

  1. Mr. Fox

    Mr. Fox BGA Filth-Hating Elitist

    Reputations:
    32,570
    Messages:
    36,298
    Likes Received:
    59,546
    Trophy Points:
    931
    Security in this case referring to their financial position being such that they get to sell more trash. Need more RAM? No problem... buy another turdbook with more RAM. There is something for everyone. Kool-Aid is available in 6 exciting flavors.
     
    Ashtrix, jclausius and Papusan like this.
  2. Papusan

    Papusan JOKEBOOKs Sucks! Dont waste your $$$ on FILTHY

    Reputations:
    29,381
    Messages:
    25,806
    Likes Received:
    46,848
    Trophy Points:
    931
    Unfixable Flaw Found in Thunderbolt Port that Unlocks any PC in Less Than 5 Minutes techpowerup.com | April 11, 2020

    Before we get started, we should first let you know that while this security exploit is serious, it requires actual physical access to a device to execute. However, with that access comes unprecedented control over a device, once connected to a free Thunderbolt port. In fact, a hacker could theoretically access all data on a computer in under 5 minutes. On top of that, this data can be accessed even if the PC is locked, password protected, and has SSD/HDD encryption turned on... yikes.

    [​IMG]
    Dutch researcher from the Eindhoven University of Technology has found a new vulnerability in Thunderbolt port that allows attackers with physical access to unlock any PC running Windows or Linux kernel-based OS in less than 5 minutes. The researcher of the university called Björn Ruytenberg found a method which he calls Thunderspy, which can bypass the login screen of any PC. This attack requires physical access to the device, which is, of course, dangerous on its own if left with a person of knowledge. The Thunderbolt port is a fast protocol, and part of the reason why it is so fast is that it partially allows direct access to computer memory. And anything that can access memory directly is a potential vulnerability.

    The Thunderspy attack relies on just that. There is a feature built into the Thunderbolt firmware called "Security Level", which disallows access to untrusted devices or even turns off Thunderbolt port altogether. This feature would make the port be a simple USB or display output. However, the researcher has found a way to alter the firmware setting of Thunderbolt control chip in a way so it allows any device to access the PC. This procedure is done without any trace and OS can not detect that there was a change. From there, the magic happens. Using an SPI (Serial Peripheral Interface) programmer with a SOP8 clip that connects the pins of the programmer device to the controller, the attacker just runs a script from there. This procedure requires around $400 worth of hardware. Intel already put some protection last year for the Thunderbolt port called Kernel Direct Memory Access Protection, but that feature isn't implemented on PCs manufactured before 2019. And even starting from 2019, not all PC manufacturers implement the feature, so there is a wide group of devices vulnerable to this unfixable attack.



    Thunderspy Thunderbolt Security Exploit Can Steal Your Data In Minutes, Millions Of PCs Vulnerable Hothardware.com | Today

    Ruytenberg claims that Kernel DMA Protection doesn't provide full mitigation from attacks, and it cannot be fully patched with software. Also, he didn't find any Dell systems with full Kernel DMA Protection support, and only a handful of Lenovo and HP systems built in 2019 or later were found to be protected.

    The only way to fully prevent Thunderspy attacks is to disable your Thunderbolt ports from within BIOS according to the researcher. However, to see if your current Thunderbolt-equipped system is affected, you can use Ruytenberg's Spycheck utility for Windows or Linux.

    As I have stated before... No computer is or will be 100% secure. It's in their nature. Bash Intel processors for its recently discovered vulnerability issues etc and jump over on the Red side won't change this facts.


    Update 5/11/2020 3:13 PM ET: Intel has confirmed that the attack doesn’t work on computers that do have Kernal DMA protection enabled. “This attack could not be successfully demonstrated on systems with Kernel DMA protection enabled. As always, we encourage everyone to follow good security practices, including preventing unauthorized physical access to computers,” a spokesperson told Engadget in a statement. In addition, Intel has released a blog post giving its own perspective on the issue.
     
    Last edited: May 11, 2020
    jclausius likes this.
  3. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    4,672
    Messages:
    3,107
    Likes Received:
    2,209
    Trophy Points:
    231
    "Bluetooth flaw allows impersonation of trusted devices"

    - A flaw in a Bluetooth protocol is leaving millions of devices vulnerable to attacks, according to a study released by a Swiss research institute.

    - The vulnerability, called Bluetooth Impersonation AttackS (BIAS), allows an intrusion by an attacker posing as a previously trusted Bluetooth device.

    - More than 28 Bluetooth chips on nearly three dozen devices were found to be vulnerable. They include chips by Apple, Cypress, Qualcomm, Intel, Samsung and CSR.

    - The Bluetooth Special Interest Group (SIG) that oversee Bluetooth protocols says it will be updating the Bluetooth Core Specification covering mutual authentication rules and tightening security protocols.

    https://techxplore.com/news/2020-05-bluetooth-flaw-impersonation-devices.html

    First Thunderbolt, now Bluetooth. Device connectivity comes with its set of issues.
     
    Papusan likes this.
  4. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    4,672
    Messages:
    3,107
    Likes Received:
    2,209
    Trophy Points:
    231
    "New CrossTalk attack impacts Intel's mobile, desktop, and server CPUs"

    - Academics from a university in the Netherlands have published details today about a new vulnerability in Intel processors.

    - The security bug... enables attacker-controlled code executing on one CPU core to leak sensitive data from other software running on a different core.

    https://www.zdnet.com/article/new-crosstalk-attack-impacts-intels-mobile-desktop-and-server-cpus/

    Well, if its not one thing, it's always another!
     
    Papusan likes this.
  5. Papusan

    Papusan JOKEBOOKs Sucks! Dont waste your $$$ on FILTHY

    Reputations:
    29,381
    Messages:
    25,806
    Likes Received:
    46,848
    Trophy Points:
    931
    Or from another company.

    [​IMG]
    Arm CPUs Impacted by Straight-Line Speculation (SLS) Vulnerability techpowerup.com | Yesterday, 09:21

    When Spectre and Meltdown were discovered, the whole industry got on its legs and started to question CPU security more seriously. There are a plethora of attacks that exploit the CPU function called branch prediction, which predicts paths of code execution so it can ready them and execute them faster. This approach is one part of the microarchitectural techniques used to add performance to the CPU design. However, nothing comes without a cost. Despite adding more performance, the branch prediction had taken a toll on the security of CPUs, making them vulnerable to side-channel attacks. Spectre and Meltdown where both discovered in 2018 and they impact millions of CPUs around the world.

    Today, a new side-channel vulnerability was discovered, and on Arm CPUs. Called the Straight-Line Speculation (SLS), the speculation bug is haunting all of Arm Armv-A based processors. This represents a wide range of devices being powered by these CPUs, so Arm is taking action to prevent it. The way SLS works is that whenever there is a change in instruction flow, the CPU just starts processing instructions found linearly in memory, instead of changing the path of flow. This action is resulting in a new SLS vulnerability marked as CVE-2020-13844. The vulnerability was discovered by Google SafeSide project last year and they have reported it to Arm. In the meantime, Arm was working on a fix and they already send them upstream to important operating systems and firmware suppliers so it can be resolved. Arm says that the chances of this attack are low, however, they can not be dismissed.
     
    jclausius likes this.
  6. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    4,672
    Messages:
    3,107
    Likes Received:
    2,209
    Trophy Points:
    231
    "UPnP vulnerability lets attackers steal data, scan internal networks"

    - A vulnerability (CVE-2020-12695) in Universal Plug and Play (UPnP), which is implemented in billions of networked and IoT devices – personal computers, printers, mobile devices, routers, gaming consoles, Wi-Fi access points, and so on – may allow unauthenticated, remote attackers to exfiltrate data, scan internal networks or make the devices participate in DDoS attacks.

    - ... in short, the vulnerability can be used to bypass DLP and network security devices to exfiltrate data, scan internal ports, and force millions of Internet-facing UPnP devices to become a source of amplified reflected TCP DDoS.
    https://www.helpnetsecurity.com/2020/06/09/cve-2020-12695/

    Plug and Pray??
     
    Papusan likes this.
  7. Papusan

    Papusan JOKEBOOKs Sucks! Dont waste your $$$ on FILTHY

    Reputations:
    29,381
    Messages:
    25,806
    Likes Received:
    46,848
    Trophy Points:
    931
    [​IMG]
    New SMM Callout Privilege Escalation Vulnerability Affects AMD Platforms techpowerup.com | June 18, 2020

    AMD on Wednesday disclosed a new security vulnerability affecting certain client- and APU processors launched between 2016 and 2019. Called the SMM Callout Privilege Escalation Vulnerability, discovered by Danny Odler, and chronicled under CVE-2020-12890, the vulnerability involves an attacker with elevated system privileges to manipulate the AGESA microcode encapsulated in the platform's UEFI firmware to execute arbitrary code undetected by the operating system. AMD plans to release AGESA updates that mitigate the vulnerability (at no apparent performance impact), to motherboard vendors and OEMs by the end of June 2020. Some of the latest platforms are already immune to the vulnerability.
     
    jclausius likes this.
  8. Papusan

    Papusan JOKEBOOKs Sucks! Dont waste your $$$ on FILTHY

    Reputations:
    29,381
    Messages:
    25,806
    Likes Received:
    46,848
    Trophy Points:
    931
    Unpatched vulnerability identified in 79 Netgear router models zdnet.com | June 18, 2020
    Bug lets attackers run code as "root" on vulnerable routers. Impacted routers go back to 2007

    A whopping 79 Netgear router models are vulnerable to a severe security flaw that can let hackers take over devices remotely.

    The vulnerability has been discovered by two security researchers independently, namely Adam Nichols from cyber-security GRIMM and a security researcher going by the nickname of d4rkn3ss, working for Vietnamese internet service provider VNPT.

    According to Nichols, the vulnerability impacts 758 different firmware versions that have been used on 79 Netgear routers across the years, with some firmware versions being first deployed on devices released as far back as 2007.
     
    jclausius likes this.
  9. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,170
    Messages:
    1,986
    Likes Received:
    4,215
    Trophy Points:
    281
    Why Does Intel Keep Having Problems?
     
    jclausius and Papusan like this.
  10. Papusan

    Papusan JOKEBOOKs Sucks! Dont waste your $$$ on FILTHY

    Reputations:
    29,381
    Messages:
    25,806
    Likes Received:
    46,848
    Trophy Points:
    931
    DATA PROTECTION
    Is Microsoft Edge filching Firefox, Chrome users' data? Here's what Microsoft says
    Microsoft Edge earned a negative spotlight this weekend thanks to how it handles importing browser data.
    https://www.windowscentral.com/micr...x-chrome-users-data-heres-what-microsoft-says

    Microsoft Edge was a hot topic over the weekend as a result of a Reddit post alleging the browser imports browser data from Chrome and Firefox without permission. The text of the original post has since been deleted, but many comments echo the same sentiment, alleging that Microsoft Edge gathers data from Chrome and Firefox without permission.
     
    jclausius, Dr. AMK and jc_denton like this.
Loading...

Share This Page