The start of ENIAC. A “sophisticated attack” (somebody obtained phished). A cryptographic hack enabled by a safety warning. Valentine’s Day Patch Tuesday. Apple closes spyware-sized 0-day gap.
DOUG. Patching bugs, hacking Reddit, and the early days of computing.
All that, and extra, on the Naked Security podcast.
[MUSICAL MODEM]
Welcome to the podcast, everyone.
I’m Doug Aamoth.
He is Paul Ducklin.
Paul, how do you do?
DUCK. Very properly, Douglas.
DOUG. Alright, I’ve an thrilling This Week in Tech History phase for you at this time.
If this had been a spot on the planet, it could be Rome, from the place all civilisation started.
Sort of.
It’s controversial.
Anyhow…
DUCK. Yes, that’s undoubtedly controversial! [LAUGHS]
DOUG. [LAUGHS] This week, on 14 February 1946, ENIAC, or Electronic Numerical Integrator and Computer, was unveiled.
One of the earliest digital basic goal computer systems, ENIAC crammed a complete room, weighed 30 tonnes and contained 18,000 vacuum tubes, 70,000 resistors, 10,000 capacitors, and round 5 million hand-soldered joints.
ENIAC was used for a wide range of calculations, together with artillery shell trajectories, climate predictions, and thermonuclear weapons analysis.
It paved the best way for commercially viable digital computer systems, Paul.
DUCK. Yes, it did!
The enormous irony, in fact, is that we British obtained there first, with the Colossus in the course of the Second World War, at Bletchley Park.
And then, in a match of fantastic governmental knowledge, we determined to: [A] smash all of them into tiny items, [B] burn all of the documentation ([QUIETLY] although a few of it survived), and [C] hold the truth that we had used thermionic valves to construct quick digital digital computer systems secret.
[PAUSE] What a foolish factor to do… [LAUGHS]
DOUG. [AMAZED] Why would they do this?
DUCK. [TRAGIC] Aaaaargh, I don’t know.
In the US, I consider, on the time of ENIAC, it was nonetheless not clear whether or not electromechanical relays or thermionic valves (vacuum tubes) would win out, as a result of vacuum tubes had been zillions of occasions sooner…
…however they had been scorching, they used huge quantities of energy, and so they tended to blow randomly, which stopped the pc working, et cetera, et cetera.
But I feel it was ENIAC that lastly sealed the destiny of all of the electromechanical computer systems.
DOUG. Speaking of issues which have been round for some time…
..Reddit says that it was hacked due to a classy phishing assault that, it seems, wasn’t all that refined.
Which may be the rationale it really works so properly, sarcastically.
Reddit admits it was hacked and information stolen, says “Don’t panic”
DUCK. [LAUGHS] I’m glad you mentioned that fairly than me, Doug!
But, sure, I feel you’re proper.
Why is it that so many senior execs who write breach notifications really feel obliged to sneak the phrase “sophisticated” in there? [LAUGHS]
The complete factor about phishing assaults is that they’re *not* refined.
They *aren’t* one thing that mechanically units alarm bells ringing.
DOUG. Reddit says:
As in most phishing campaigns, the attacker despatched out plausible-sounding prompts pointing workers to a web site that cloned the conduct of our intranet gateway in an try and steal credentials and second-factor tokens. After efficiently acquiring a single worker’s credentials, the attacker gained entry to inside docs, code…
So that’s the place it will get easy: trick one individual into clicking on a hyperlink, getting taken to a web page that appears like considered one of your programs, and handing over a 2FA code.
DUCK. And then they had been capable of bounce in, seize the stuff and get out.
And so, like within the LastPass breach and the current GitHub breach, supply code obtained stolen, together with a little bit of different stuff.
Although that’s signal, inasmuch because it’s Reddit’s stuff that obtained stolen and never its customers’ stuff (so it’s their drawback to wrestle with, if what I imply)… we do know that inamongst that stuff, even if you happen to solely get supply code, not to mention inside documentation, there could also be hints, scripts, tokens, server names, RESTy API endpoints, et cetera, that an attacker may use later.
But it does look as if the Reddit service itself, in different phrases the infrastructure behind the service, was circuitously affected by this.
So, the crooks obtained in and so they obtained some stuff and so they obtained out, however it wasn’t like they broke into the community after which had been capable of wander round all the opposite locations.
DOUG. Reddit does provide three items of recommendation, two-thirds of which we agree with.
We’ve mentioned numerous occasions on the present earlier than: Protect towards phishing through the use of a password supervisor, as a result of it makes it tougher to place the appropriate password into the flawed website.
Turn on 2FA if you happen to can, so you might have a second issue of authentication.
This one, although, is up for debate: Change your passwords each two months.
That may be a bridge too far, Paul?
DUCK. Yes, Chester Wisniewski and I did a podcast (when was it? 2012?) the place we busted that fantasy.
And NIST, the US National Institute of Standards and Technology, agrees with us.
It *is* a bridge too far, as a result of it’s change for change’s sake.
And I feel there are a number of issues with simply, “Every two months, I’ll change my password.”
Firstly, why change your password if you happen to genuinely don’t suppose there’s any purpose to?
You’re simply losing your time – you possibly can spend that point doing one thing that instantly and genuinely improves your cybersecurity.
Secondly, as Chester put it in that outdated podcast (which we’ve put within the article, so you may go and hearken to it), “It kind-of gets people into the habit of a bad habit,” since you’re attempting to program their attitudes to passwords as a substitute of embracing randomness and entropy.
And, thirdly, I feel it leads folks to considering, “You know what, I should change my password, but I’m going to change them all in six weeks’ time anyway, so I’ll leave it until then.”
I might fairly have an strategy that claims, “When you think you need to change your password, *do it in five minutes*.”
BUSTING PASSWORD MYTHS
Even although we recorded this podcast greater than a decade in the past, the recommendation it accommodates remains to be related and considerate at this time. We haven’t hit the passwordless future but, so password-related cybersecurity recommendation can be helpful for whereas but. Listen right here, or click on via for a full transcript.
DOUG. There is a sure irony right here with recommending using a password supervisor…
…when it’s fairly clear that this worker wouldn’t have been capable of log into the faux website had she or he been utilizing a password supervisor.
DUCK. Yes, you’d suppose so, wouldn’t you?
Because it could simply go, “Never heard of the site, can’t do it, don’t have a password.”
And you’d be going, “But it looks so right.”
Computer: “No, never heard of it.”
DOUG. And then, when you’ve logged right into a bogus website, 2FA does no good if you happen to’re simply going to enter the code right into a kind on the bogus website that will get despatched to the criminal!
DUCK. If you’re planning to make use of 2FA as an excuse for being extra informal about safety, both [A] don’t do this, or [B] select a two-factor authentication system that doesn’t rely merely on transcribing digits out of your cellphone onto your laptop computer.
Use a token-based system like OAuth, or one thing like that, that’s extra refined and considerably tougher for the crooks to subvert just by getting you to inform them the magic digits.
DOUG. Let’s keep on the irony theme.
GnuTLS had a timing flaw within the code that was imagined to log timing assault errors.
How do you want that?
Serious Security: GnuTLS follows OpenSSL, fixes timing assault bug
DUCK. [LAUGHS] They checked to see whether or not one thing went flawed in the course of the RSA session setup course of by getting this variable referred to as okay
.
It’s TRUE
if it’s OK, and it’s FALSE
if it’s not.
And then they’ve this code that goes, “If it’s not OK, then report it, if the person’s got debugging turned on.”
You can see the programmer has considered this (there’s even a remark)…
If there’s no error, then do a faux logging train that isn’t actually logging, however let’s try to burn up precisely the identical period of time, utterly redundantly.
Else if there was an error, go and really do the logging.
But it seems that both there wasn’t adequate similarity between the execution of the 2 paths, or it may have been that the half the place the precise logging was taking place responded in a special period of time relying on the kind of error that you just intentionally provoked.
It seems that by doing 1,000,000 or extra intentionally booby-trapped, “Hey, I want to set up a session request,” you possibly can principally dig into the session setup with the intention to retrieve a key that will be used later for future stuff.
And, in concept, that may allow you to decrypt classes.
DOUG. And that’s the place we get the time period “oracle bug” (lowercase oracle, to not be confused with the corporate Oracle).
You’re capable of see issues that you just shouldn’t be capable of see, proper?
DUCK. You basically get the code to offer you again a solution that doesn’t instantly reply the query, however offers you some hints about what the reply may be.
You’re letting the encryption course of give away somewhat bit about itself every time.
And though it feels like, “Who could ever do a million extra session setup requests without being spotted?”…
…properly, on trendy networks, 1,000,000 community packets shouldn’t be truly that a lot, Doug.
And, on the finish of it, you’ve truly realized one thing concerning the different finish, as a result of its behaviour has simply not been fairly constant sufficient.
Every at times, the oracle has given away one thing that it was supposed to maintain secret.
DOUG. Alright, we’ve obtained some recommendation about easy methods to replace if you happen to’re a GnuTLS consumer, so you may head over to the article to verify that out.
Let’s speak about “Happy Patch Tuesday”, everyone.
We’ve obtained quite a lot of bugs from Microsoft Patch Tuesday, together with three zero-days.
DUCK. Yes, certainly, Doug.
75 CVEs, and, as you say, three of them are zero-days.
But they’re solely rated Important, not Critical.
In truth, the essential bugs, fortuitously, had been, it appears, fastened responsibly.
So it wasn’t that there’s an exploit already on the market within the wild.
I feel what’s extra essential about this listing of 75 CVEs is that nearly half of them are distant code execution bugs.
Those are typically thought of essentially the most severe types of bug to fret about ,as a result of that’s how crooks get in within the first place.
Then comes EoP (elevation of privilege), of which there are a number of, together with considered one of them being a zero-day… within the Windows Common Log File System driver
Of course, RCEs, distant code executions, are sometimes paired up by cybercriminals with elevation of privilege bugs.
They use the primary one to interrupt in with no need a password or with out having to authenticate.
They get to implant code that then triggers the elevation of privilege bug, so not solely do they go *in*, they go *up*.
And sometimes they find yourself both as a sysadmin (very unhealthy, as a result of then they’re principally free to roam the community), or they find yourself with the identical privilege because the native working system… on Windows, what’s referred to as the SYSTEM account (which just about means they will do something on that laptop).
DOUG. There are so many bugs on this Patch Tuesday that it compelled your hand to commit a bit of this text referred to as Security Bug Classes Explained
…
…which I might deem to be required studying if you happen to’re simply moving into cybersecurity and wish to know what kinds of bugs are on the market.
So we talked about an RCE (distant code execution), and we talked about EoP (elevation of privilege).
You subsequent defined what a Leak is…
DUCK. Indeed.
Now, specifically, reminiscence leaks can clearly be unhealthy if what’s leaking is, say, a password or your complete contents of a super-secret doc.
But the issue is that some leaks, to somebody who’s not aware of cybersecurity, sound actually unimportant.
OK, so that you leaked a reminiscence deal with of the place such-and-such a DLL or such-and-such a kernel driver simply occurred to be loaded in reminiscence?
How unhealthy is that?
But the issue is that distant code execution exploits are typically a lot simpler if precisely the place to poke your knitting needle in reminiscence on that individual server or that individual laptop computer.
Because trendy working programs virtually all use a factor referred to as ASLR (deal with area format randomisation), the place they intentionally load applications, and DLLs, and shared libraries, and kernel drivers and stuff at randomly chosen reminiscence addresses…
…in order that your reminiscence format in your check laptop, the place your exploit labored completely, is not going to be the identical as mine.
And it’s a lot tougher to get an exploit to work generically when you might have this randomness constructed into the system than if you don’t.
So there are some tiny little reminiscence leaks, the place you may simply leak eight bytes of reminiscence (and even simply 4 bytes if it’s a 32-bit system) the place you give away a reminiscence deal with.
And that’s all of the crooks want to show an exploit that may simply work, in the event that they’re actually fortunate, into one which they will abuse each single time, reliably.
So watch out of leaks!
DOUG. Please inform us what a Bypass means.
DUCK. It sort-of means precisely what it says.
You’ve obtained a safety precaution that you just anticipate the working system or your software program to kick in with.
For instance, “Hey, are you really sure that you want to open this dastardly attachment that came in in an email from someone you don’t know?”
If the crooks can discover a means to try this unhealthy behaviour however to bypass the safety verify that’s imagined to kick in and offer you a preventing likelihood to be a well-informed consumer doing the appropriate factor…
…consider me, they are going to take it.
So, safety bypasses might be fairly problematic.
DOUG. And then alongside these traces, we talked about Spoofing.
In the Reddit story, luring somebody to a web site that appears like a legit web site however isn’t – it’s a spoof website.
And then, lastly, we’ve obtained DoS, or denial of service.
DUCK. Well, that’s precisely what it says.
It’s the place you cease one thing that’s imagined to work on the sufferer’s laptop from doing its job.
You kind-of suppose, “Denial of service, it should be at the bottom of the list of concerns, because who really cares? We’ve got auto-restart.”
But if the crooks can choose the appropriate time to do it (say, 30 seconds after your server that crashed two minutes in the past has simply come again up),then they could truly be capable of use a denial of service bug surprisingly sometimes to trigger what quantities to virtually a steady outage for you.
And you may think about: [A] that might truly value you enterprise if you happen to depend on your on-line providers being up, and [B] it may make an interesting smokescreen for the crooks, by creating this disruption that lets the crooks come steaming in some place else.
DOUG. And not content material to be omitted of the enjoyable, Apple has come alongside to repair a zero-day distant code execution bug.
DUCK. This bug, and I’ll learn out the CVE only for reference: it’s CVE-2023-23529…
…is a zero-day distant code execution gap in WebKit, which I for one, and I feel many different folks infer to imply, “Browser bug that can be triggered by code that’s supplied remotely.”
And in fact, significantly in iPhones and iPads, as we’ve spoken about many occasions, WebKit is required code for each single browser, even ones that don’t use WebKit on different platforms.
So it kind-of smells like, “We found out about this because there’s some spyware going around,” or, “There’s a bug that can be used to jailbreak your phone and remove all the strictures that let the crooks in and let them wander around at will.”
Obviously, on a cellphone, that’s one thing you undoubtedly don’t need.
DOUG. Alright, and on this story, Naked Security reader Peter writes:
I attempt to replace as quickly as I’ve seen your replace alerts in my inbox. While I do know little to nothing concerning the technical points concerned, I do understand it’s essential to maintain software program up to date, and it’s why I’ve the automated software program replace choice chosen on all my units. But it’s seldom, if ever, that I obtain software program alerts on my iPhone, iPad or MacBook earlier than receiving them from Sophos.
So, thanks, guys!
That’s good!
DUCK. It is!
And I can solely reply by saying, “Glad to be of assistance.”
I fairly like writing these articles, as a result of I feel they supply a good service.
Better to know and be ready than to be caught unawares… that’s my opinion.
DOUG. And to not present how the sausage is made round right here an excessive amount of, however the purpose Paul is ready to bounce on these Apple updates so shortly is as a result of he has a giant crimson siren in his front room that’s linked through USB cable to his laptop, and checks the Apple safety replace web page each six seconds.
So it begins blaring the second that web page has been up to date, after which he goes and writes it up for Naked Security.
DUCK. [LAUGHS] I feel the reason being in all probability simply that I are likely to go to mattress fairly late.
DOUG. [LAUGHS] Exactly, you don’t sleep…
DUCK. Now I’m huge, I don’t have a hard and fast bedtime.
I can keep up as late as I need! [LAUGHTER]
DOUG. Alright, thanks, Peter, for sending that in.
If you might have an attention-grabbing story, remark or query you’d wish to submit, we’d like to learn it on the podcast.
You can electronic mail ideas@sophos.com, you may touch upon any considered one of our articles, or you may hit us up on social: @NakedSecurity.
That’s our present for at this time – thanks very a lot for listening.
For Paul Ducklin, I’m Doug Aamoth, reminding you till subsequent time to…
BOTH. Stay safe.
[MUSICAL MODEM]