Sunday, October 2, 2022
HomeCyber SecurityThink about you went to the moon – how would you show...

Think about you went to the moon – how would you show it? [Audio + Text] – Bare Safety


With Doug Aamoth and Paul Ducklin.

DOUG.  Deadbolt – it’s again!

Patches galore!

And timezones… sure, timezones.

All that, and extra, on the Bare Safety Podcast.

[MUSICAL MODEM]

Welcome to the podcast, everybody.

I’m Doug Aamoth.

With me, as all the time, is Paul Ducklin.

Paul, a really glad a centesimal episode to you, my good friend!


DUCK.  Wow, Doug!

You already know, after I began my listing construction for Sequence 3, I boldly used -001 for the primary episode.


DOUG.  I didn’t. [LAUGHS]


DUCK.  Not -1 or -01.


DOUG.  Good…


DUCK.  I had nice religion!

And after I save right now’s file, I’m going to be rejoicing in it.


DOUG.  Sure, and I shall be dreading it as a result of it’ll pop as much as the highest.

Effectively, I’m going to should take care of that later…


DUCK.  [LAUGHS] You possibly can rename all the opposite stuff.


DOUG.  I do know, I do know.

[MUTTERING] Not wanting ahead to that… there goes my Wednesday.

Anyway, let’s begin the present with some Tech Historical past.

This week, on 12 September 1959, Luna 2, also referred to as the Second Soviet Cosmic Rocket, turned the primary spacecraft to succeed in the floor of the Moon, and the primary human-made object to make contact with one other celestial physique.

Very cool.


DUCK.  What was that lengthy title?

“The Second Soviet Cosmic Rocket”?


DOUG.  Sure.


DUCK.  Luna Two is significantly better.


DOUG.  Sure, significantly better!


DUCK.  Apparently, as you possibly can think about, provided that it was the space-race period, there was some concern of, “How will we all know they’ve truly executed it? They might simply say they’ve landed on the Moon, and perhaps they’re making it up.”

Apparently, they devised a protocol that may enable impartial statement.

They predicted the time that it might arrive on the Moon, to crash into the Moon, they usually despatched the precise time that they anticipated this to an astronomer within the UK.

And he noticed independently, to see whether or not what they stated *would* occur at the moment *did* occur.

So that they even considered, “How do you confirm one thing like this?”


DOUG.  Effectively, as regards to difficult issues, we now have patches from Microsoft and Apple.

So what’s notable right here on this newest spherical?


DUCK.  We definitely do – it’s patch Tuesday this week, the second Tuesday of the month.

There are two vulnerabilities in Patch Tuesday that had been notable to me.

One is notable as a result of it’s apparently within the wild – in different phrases, it was a zero-day.

And though it’s not distant code execution, it’s a little worrying as a result of it’s a [COUGHS APOLOGETICALLY] log file vulnerability, Doug!

It’s not fairly as dangerous as Log4J, the place you may not solely get the logger to misbehave, you may additionally get it to run arbitrary code for you.

However evidently in the event you ship some sort of malformed information into the Home windows Frequent Log File System driver, the CLFS, then you possibly can trick the system into selling you to system privileges.

All the time dangerous in the event you’ve obtained in as a visitor person, and you’re then capable of flip your self right into a sysadmin…


DOUG.  [LAUGHS] Sure!


DUCK.  That’s CVE-2022-37969.

And the opposite one which I discovered attention-grabbing…

…happily not within the wild, however that is the one which you actually need to patch, as a result of I guess you it’s the one which cybercriminals shall be specializing in reverse engineering:

“Home windows TCP/IP distant code execution vulnerability”, CVE-2022-34718.

If you happen to keep in mind Code Crimson, and SQL Slammer, and people naughty worms of the previous, the place they simply arrived in a community packet, and jammed their approach into the system….

That is a good decrease degree than that.

Apparently, the bug’s within the dealing with of sure IPv6 packets.

So something the place IPv6 is listening, which is just about any Home windows pc, could possibly be in danger from this.

Like I stated, that one will not be within the wild, so the crooks haven’t discovered it but, however I don’t doubt that they are going to be taking the patch and attempting to determine if they will reverse engineer an exploit from it, to catch out individuals who haven’t patched but.

As a result of if something says, “Whoa! What if somebody wrote a worm that used this?”… that’s the one I’d be apprehensive about.


DOUG.  OK.

After which to Apple…


DUCK.  We’ve written two tales about Apple patches just lately, the place, out of the blue, all of the sudden, there have been patches for iPhones and iPads and Macs in opposition to two in-the-wild zero-days.

One was a browser bug, or a browsing-related bug, in order that you may wander into an innocent-looking web site and malware may land in your pc, plus one other one which gave you kernel-level management…

…which, as I stated within the final podcast, smells like spy ware to me – one thing {that a} spy ware vendor or a very critical “surveillance cybercrook” could be fascinated with.

Then there was a second replace, to our shock, for iOS 12, which all of us thought had been lengthy deserted.

There, a type of bugs (the browser associated one which allowed crooks to interrupt in) obtained a patch.

After which, simply after I was anticipating iOS 16, all these emails all of the sudden began touchdown in my inbox – proper after I checked, “Is iOS 16 out but? Can I replace to it?”

It wasn’t there, however then I obtained all these emails saying, “We’ve simply up to date iOS 15, and macOS Monterey, and Huge Sur, and iPadOS 15″…

… and it turned on the market had been a complete bunch of updates, plus a model new kernel zero-day this time as nicely.

And the fascinating factor is that, after I obtained the notifications, I assumed, “Effectively, let me examine once more…”

(So you possibly can keep in mind, it’s Settings > Basic > Software program Replace in your iPhone or iPad.)

Lo and behold, I used to be being provided an replace to iOS 15, which I already had, *or* I may bounce all the best way to iOS 16.

And iOS 16 additionally had this zero-day repair in it (regardless that iOS 16 theoretically wasn’t out but), so I suppose the bug additionally existed within the beta.

It wasn’t listed as formally being a zero-day in Apple’s bulletin for iOS 16, however we will’t inform whether or not that’s as a result of the exploit Apple noticed didn’t fairly work correctly on iOS 16, or whether or not it’s not thought-about a zero-day as a result of iOS 16 was solely simply popping out.


DOUG.  Sure, I used to be going to say: nobody has it but. [LAUGHTER]


DUCK.  That was the massive information from Apple.

And the essential factor is that whenever you go to your cellphone, and also you say, “Oh, iOS 16 is obtainable”… in the event you’re not fascinated with iOS 16 but, you continue to must be sure to’ve obtained that iOS 15 replace, due to the kernel zero-day.

Kernel zero days are all the time an issue as a result of it means someone on the market is aware of tips on how to bypass the much-vaunted safety settings in your iPhone.

The bug additionally applies to macOS Monterey and macOS Huge Sur – that’s the earlier model, macOS 11.

Actually, to not be outdone, Huge Sur truly has *two* kernel zero-day bugs within the wild.

No information about iOS 12, which is sort of what I anticipated, and nothing to date for macOS Catalina.

Catalina is macOS 10, the pre-previous model, and as soon as once more, we don’t know whether or not that replace will come later, or whether or not it’s fallen off the sting of the world and received’t be getting updates anyway.

Sadly, Apple doesn’t say, so we don’t know.

Now, most Apple customers may have computerized updates turned on, however, as we all the time say, do go and examine (whether or not you’ve obtained a Mac or an iPhone or an iPad), as a result of the worst factor is simply to imagine that your computerized updates labored and stored you secure…

…when in actual fact, one thing went fallacious.


DOUG.  OK, excellent.

Now, one thing I’ve been wanting ahead to, shifting proper alongside, is: “What do timezones should do with IT safety?”


DUCK.  Effectively, quite a bit, it seems, Doug.


DOUG.  [LAUGHING] Yessir!


DUCK.  Timezones are quite simple in idea.

They’re very handy for operating our lives in order that our clocks roughly match what’s occurring within the sky – so it’s darkish at evening and lightweight within the day. (Let’s ignore daylight saving, and let’s simply assume that we solely have one-hour timezones all around the globe in order that all the things is de facto easy.)

The issue comes whenever you’re truly maintaining system logs in an organisation the place a few of your servers, a few of your customers, some components of your community, a few of your prospects, are in different components of the world.

Once you write to the log file, do you write the time with the timezone factored in?

Once you’re writing your log, Doug, do you subtract the 5 hours (or 4 hours for the time being) that you simply want since you’re in Boston, whereas I add one hour as a result of I’m on London time, but it surely’s summer time?

Do I write that within the log in order that it is smart to *me* after I learn the log again?

Or do I write a extra canonical, unambiguous time utilizing the identical timezone for *everyone*, so after I evaluate logs that come from completely different computer systems, completely different customers, completely different components of the world on my community, I can truly line up occasions?

It’s actually essential to line occasions up, Doug, significantly in the event you’re doing risk response in a cyberattack.

You really want to know what got here first.

And in the event you say, “Oh, it didn’t occur till 3pm”, that doesn’t assist me if I’m in Sydney, as a result of my 3pm occurred yesterday in comparison with your 3pm.

So, I wrote an article on Bare Safety about some methods that you could take care of this downside whenever you log information.

My private suggestion is to make use of a simplified timestamp format referred to as RFC 3339, the place you place a 4 digit 12 months, sprint [hyphen character, ASCII 0x2D], two digit month, sprint, two digit day, and so forth, in order that your timestamps truly kind alphabetically properly.

And that you simply report all of your time zones as a tme zone often known as Z (zed or zee), brief for Zulu time.

Which means mainly UTC or Coordinated Common Time.

That’s nearly-but-not-quite Greenwich Imply Time, and it’s the time that just about each pc’s or cellphone’s clock is definitely set to internally today.

Don’t attempt to compensate for timezones whenever you’re writing to the log, as a result of then somebody should decompensate once they’re attempting to line up your log with everyone else’s – and there’s many a slip twixt the cup and the lip, Doug.

Maintain it easy.

Use a canonical, easy textual content format that delineates precisely the date and time, proper right down to the second – or, today, timestamps may even go down today to the nanosecond in order for you.

And eliminate timezones out of your logs; eliminate daylight saving out of your logs; and simply report all the things, for my part, in Coordinated Common Time…

…confusingly abbreviated UTC, as a result of the title’s in English however the abbreviation’s in French – one thing of an irony.


DOUG.  Sure.


DUCK.  
I’m tempted to say, “Not that I really feel strongly about it, once more”, as I normally do, laughingly…

…but it surely actually is essential to get issues in the appropriate order, significantly whenever you’re attempting to trace down cyber criminals.


DOUG.  All proper, that’s good – nice recommendation.

And if we stick as regards to cybercriminals, you’ve heard of Manipulator-in-the-Center assaults; you’ve heard of Manipulator-in-the-Browser assaults…

..now prepare for Browser-in-the-Browser assaults.


DUCK.  Sure, this can be a new time period that we’re seeing.

I needed to write down this up as a result of researchers at a risk intelligence firm referred to as Group-IB just lately wrote an article about this, and the media began speaking about, “Hey, Browser-in-the-Browser assaults, be very afraid”, or no matter…

You’re considering, “Effectively, I ponder how many individuals truly know what is supposed by a Browser-in-the-Browser assault?”

And the annoying factor about these assaults, Doug, is that technologically, they’re terribly easy.

It’s such a easy concept.


DOUG.  They’re virtually inventive.


DUCK.  Sure!

It’s not likely science and expertise, it’s artwork and design, isn’t it?

Mainly, in the event you’ve ever executed any JavaScript programming (for good or for evil), you’ll know that one of many issues about stuff that you simply stick into an internet web page is that it’s meant to be constrained to that net web page.

So, in the event you pop up a model new window, you then’d count on it to get a model new browser context.

And if it masses its web page from a model new web site, say a phishing web site, then it received’t have entry to all of the JavaScript variables, context, cookies and all the things that the primary window had.

So, in the event you open a separate window, you’re sort of limiting your hacking skills in the event you’re a criminal.

But in the event you open one thing within the present window, you then’re considerably restricted as to how thrilling and “system-like” you may make it look, aren’t you?

As a result of you possibly can’t overwrite the tackle bar… that’s by design.

You’ll be able to’t write something exterior the browser window, so you possibly can’t sneakily put a window that appears like wallpaper on the desktop, prefer it’s been there all alongside.

In different phrases, you’re corralled contained in the browser window that you simply began with.

So the concept of a Browser-in-the-Browser assault is that you simply begin with a daily web site, and you then create, contained in the browser window you’ve already obtained, an internet web page that itself appears precisely like an working system browser window.

Mainly, you present somebody a *image* of the actual factor, and persuade them it *is* the actual factor.

It’s that straightforward at coronary heart, Doug!

However the issue is that with slightly little bit of cautious work, significantly in the event you’ve obtained good CSS abilities, you *can* truly make one thing that’s inside an present browser window appear like a browser window of its personal.

And with a little bit of JavaScript, you possibly can even make it in order that it could possibly resize, and in order that it could possibly transfer round on the display screen, and you’ll populate it with HTML that you simply fetch from a 3rd occasion web site.

Now, chances are you’ll marvel… if the crooks get it lifeless proper, how on earth are you able to ever inform?

And the excellent news is that there’s a fully easy factor you are able to do.

If you happen to see what appears like an working system window and you’re suspicious of it in any approach (it might primarily seem to pop up over your browser window, as a result of it needs to be inside it)…

…attempt shifting it *off the actual browser window*, and if it’s “imprisoned” contained in the browser, you realize it’s not the actual deal!

The attention-grabbing factor in regards to the report from the Group-IB researchers is that once they got here throughout this, the crooks had been truly utilizing it in opposition to gamers of Steam video games.

And, after all, it needs you to log into your Steam account…

…and in the event you had been fooled by the primary web page, then it might even observe up with Steam’s two-factor authentication verification.

And the trick was that if these really *had been* separate home windows, you may have dragged them to at least one aspect of your fundamental browser window, however they weren’t.

On this case, happily, the cooks had not executed their CSS very nicely.

Their art work was shoddy.

However, as you and I’ve spoken about many instances on the podcast, Doug, generally there are crooks who will put within the effort to make issues look pixel-perfect.

With CSS, you actually can place particular person pixels, can’t you?


DOUG.  CSS is attention-grabbing.

It’s Cascading Type Sheets… a language you employ to fashion HTML paperwork, and it’s very easy to be taught and it’s even tougher to grasp.


DUCK.  [LAUGHS] Appears like IT, for positive.


DOUG.  [LAUGHS] Sure, it’s like many issues!

Nevertheless it’s one of many first stuff you be taught when you be taught HTML.

If you happen to’re considering, “I need to make this net web page look higher”, you be taught CSS.

So, taking a look at a few of these examples of the supply doc that you simply linked to from the article, you possibly can inform it’s going to be actually exhausting to do a very good faux, except you’re actually good at CSS.

However in the event you do it proper, it’s going to be actually exhausting to determine that it’s a faux doc…

…except you do as you say: attempt to pull it out of a window and transfer it round your desktop, stuff like that.

That leads into your second level right here: study suspect home windows fastidiously.

Lots of them are most likely not going to move the attention take a look at, but when they do, it’s going to be actually robust to identify.

Which leads us to the third factor…

“If unsure/Don’t give it out.”

If it simply doesn’t fairly look proper, and also you’re not capable of definitively inform that one thing is unusual is afoot, simply observe the rhyme!


DUCK.  And it’s price being suspicious of unknown web sites, web sites you haven’t used earlier than, that all of the sudden say, “OK,we’re going to ask you to log in along with your Google account in a Google Window, or Fb in a Fb window.”

Or Steam in a Steam window.


DOUG.  Sure.

I hate to make use of the B-word right here, however that is virtually sensible in its simplicity.

However once more, it’s going to be actually exhausting to drag off a pixel excellent match utilizing CSS and stuff like that.


DUCK.  I feel the essential factor to recollect is that, as a result of a part of the simulation is the “chrome” [jargon for the browser’s user interface components] of the browser, the tackle bar will look proper.

It could even look excellent.

However the factor is, it isn’t an tackle bar…

…it’s a *image* of an tackle bar.


DOUG.  Precisely!

All proper, cautious on the market, everybody!

And, talking of issues that aren’t what they appear, I’m studying about DEADBOLT ransomware, and QNAP NAS gadgets, and it feels to me like we simply mentioned this actual story not way back.


DUCK.  Sure, we’ve written about this a number of instances on Bare Safety to date this 12 months, sadly.

It’s a type of circumstances the place what labored for the crooks as soon as seems to have labored twice, thrice, 4 instances, 5 instances.

And NAS, or Community Connected Storage gadgets, are, in the event you like, black-box servers that you could go and purchase – they sometimes run some sort of Linux kernel.

The concept is that as a substitute of getting to purchase a Home windows licence, or be taught Linux, set up Samba, set it up, discover ways to do file sharing in your community…

…you simply plug on this machine and, “Bingo”, it begins working.

It’s a web-accessible file server and, sadly, if there’s a vulnerability within the file server and you’ve got (accidentally or design) made it accessible over the web, then crooks might be able to exploit that vulnerability, if there’s one in that NAS machine, from a distance.

They are able to scramble all of the recordsdata on the important thing storage location on your community, whether or not it’s a house community or small enterprise community, and mainly maintain you to ransom with out ever having to fret about attacking particular person different gadgets like laptops and telephones in your community.

So, they don’t must fiddle with malware that infects your laptop computer, they usually don’t want to interrupt into your community and wander round like conventional ransomware criminals.

They mainly scramble all of your recordsdata, after which – to current the ransom word – they simply change (I shouldn’t giggle, Doug)… they simply change the login web page in your NAS machine.

So, whenever you discover all of your recordsdata are tousled and also you assume, “That’s humorous”, and also you bounce in along with your net browser and join there, you don’t get a password immediate!

You get a warning: “Your recordsdata have been locked by DEADBOLT. What occurred? All of your recordsdata have been encrypted.”

After which come the directions on tips on how to pay up.


DOUG.  And so they have additionally kindly provided that QNAP may put up a princely sum to unlock the recordsdata for everyone.


DUCK.  The screenshots I’ve within the newest article on nakedsecurity.­sophos.com present:

1. Particular person decryptions at 0.03 bitcoins, initially about US$1200 when this factor first turned widespread, now about US$600.

2. A BTC 5.00 choice, the place QNAP get informed in regards to the vulnerability to allow them to repair it, which clearly they’re not going to pay as a result of they already know in regards to the vulnerability. (That’s why there’s a patch out on this explicit case.)

3. As you say, there’s a BTC 50 choice (that’s $1m now; it was $2m when this primary story first broke). Apparently if QNAP pay the $1,000,000 on behalf of anyone who might need been contaminated, the crooks will present a grasp decryption key, in the event you don’t thoughts.

And in the event you take a look at their JavaScript, it truly checks whether or not the password you place in matches one among *two* hashes.

One is exclusive to your an infection – the crooks customise it each time, so the JavaScript has the hash in it, and doesn’t give away the password.

And there’s one other hash that, in the event you can crack it, appears as if it might get well the grasp password for everybody on this planet…

… I feel that was simply the crooks thumbing their noses at everyone.


DOUG.  It’s attention-grabbing too that the $600 bitcoin ransom for every person is… I don’t need to say “not outrageous”, however in the event you look within the feedback part of this text, there are a number of people who find themselves not solely speaking about having paid the ransom…

…however let’s skip forward to our reader query right here.

Reader Michael shares his expertise with this assault, and he’s not alone – there are different folks on this remark part which are reporting comparable issues.

Throughout a few feedback, he says (I’m going to sort of make a frankencomment out of that):

“I’ve been by way of this, and got here out OK after paying the ransom. Discovering the precise return code with my decryption key was the toughest half. Realized essentially the most priceless lesson.”

In his subsequent remark he goes by way of all of the steps he needed to take to really get issues to work once more.

And he dismounts with:

“I’m embarrassed to say I work in IT, have been for 20+ years, and obtained bitten by this QNAP uPNP bug. Glad to be by way of it.”


DUCK.  Wow, sure, that’s fairly an announcement, isn’t it?

Nearly as if he’s saying, “I’d have backed myself in opposition to these crooks, however I misplaced the guess and it value me $600 and a complete load of time.”

Aaargh!


DOUG.  What does he imply by “the precise return code along with his description key”?


DUCK.  Ah, sure, that may be a very attention-grabbing… very intriguing. (I’m attempting to not say amazing-slash-brilliant right here.) [LAUGHTER]

I don’t need to use the C-word, and say it’s “intelligent”, however kind-of it’s.

How do you contact these crooks? Do they want an e mail tackle? Might that be traced? Do they want a darkweb web site?

These crooks don’t.

As a result of, keep in mind, there’s one machine, and the malware is customised and packaged when it assaults that machine in order that has a novel Bitcoin tackle in it.

And, mainly, you talk with these crooks by paying the required quantity of bitcoin into their pockets.

I suppose that’s why they’ve stored the quantity comparatively modest…

…I don’t need to counsel that everybody’s obtained $600 to throw away on a ransom, but it surely’s not such as you’re negotiating up entrance to determine whether or not you’re going to pay $100,000 or $80,000 or $42,000.

You pay them the quantity… no negotiation, no chat, no e mail, no immediate messaging, no help discussion board.

You simply ship the cash to the designated bitcoin tackle, they usually’ll clearly have a listing of these bitcoin addresses they’re monitoring.

When the cash arrives, they usually see it’s arrived, they know that you simply (and also you alone) paid up, as a result of that pockets code is exclusive.

And so they then do what’s, successfully (I’m utilizing the largest air-quotes on this planet) a “refund” on the blockchain, utilizing a bitcoin transaction to the quantity, Doug, of zero {dollars}.

And that reply, that transaction, truly features a remark. (Bear in mind the Poly Networks hack? They had been utilizing Ethereum blockchain feedback to attempt to say, “Pricey, Mr. White Hat, received’t you give us all the cash again?”)

So that you pay the crooks, thus giving the message that you simply need to interact with them, they usually pay you again $0 plus a 32-hexadecimal character remark…

…which is 16 uncooked binary bytes, which is the 128 bit decryption key you want.

That’s the way you speak to them.

And, apparently, they’ve obtained this right down to a T – like Michael stated, the rip-off does work.

And the one downside Michael had was that he wasn’t used to purchasing bitcoins, or working with blockchain information and extracting that return code, which is mainly the remark within the transaction “fee” that he will get again for $0.

So, they’re utilizing expertise in very devious methods.

Mainly, they’re utilizing the blockchain each as a fee automobile and as a communications instrument.


DOUG.  All proper, a really attention-grabbing story certainly.

We are going to regulate that.

And thanks very a lot, Michael, for sending in that remark.

When you have an attention-grabbing story, remark or query you’d prefer to submit, we’d like to learn it on the podcast.

You’ll be able to e mail suggestions@sophos.com, you possibly can touch upon any one among our articles, or you possibly can hit us up on social: @NakedSecurity.

That’s our present for right now – thanks very a lot for listening.

For Paul Ducklin, I’m Doug Aamoth, reminding you, till subsequent time, to…


BOTH.  Keep safe.

[MUSICAL MODEM]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments