Categories
privacy security

WDMyCloud Multiple Vulnerabilities

Either terrible security practices or malicious intent. Some security research firm found serious backdoor in a range of Western Digital MyCloud devices aimed at personal home or office users.

Several serious security issues were uncovered during my research. Vulnerabilities such as pre auth remote root code execution, as well as a hardcoded backdoor admin account which can NOT be changed. The backdoor also allows for pre auth remote root code execution on the affected device.

WDMyCloud Multiple Vulnerabilities

Related:

Categories
privacy security

Critical flaws revealed to affect most Intel chips since 1995 | ZDNet

Another huge blow for Intel. The critical flaws in Intel processors allow attackers to gain access to the entire memory space, meaning it could read in-memory contents of running apps like password managers, browsers etc.

Most Intel processors and some ARM chips are confirmed to be vulnerable, putting billions of devices at risk of attacks. One of the security researchers said the bugs are “going to haunt us for years.”

Source: Critical flaws revealed to affect most Intel chips since 1995 | ZDNet

Categories
security

Acoustic Denial of Service Attacks on HDDs

Another interesting side-channel attack. Using essentially sound to degrade hard disk performance. In the extreme case you can cause applications or the OS to crash by directing certain sounds towards the hard disk of a running system.

Borrowing theoretical principles from acoustics and mechan-
ics, we propose a novel denial-of-service (DoS) attack against
HDDs that exploits a physical phenomenon, known as acoustic
resonance

Acoustic Denial of Service Attacks on HDDs

Categories
security

Huge security flaw lets anyone log into a High Sierra Mac

This is as bad as it gets. While Apple’s hardware is still top-notch, the quality of their software – especially on macOS – seems to be going down. Too much emphasis on iOS?

Wow, this is a bad one. On Macs running the latest version of High Sierra (10.13.1 (17B48)), it appears that anyone can log in just by putting “root” in the..

Source: Huge security flaw lets anyone log into a High Sierra Mac

Updates:
2017-11-30: Apple releases a fix
2017-11-30: The fix apparently broke file sharing on macOS. Software is hard. Period.

Categories
privacy security

Experts can hack most CPUs since 2008 over USB by triggering Intel Management Engine flaw

Gaining full privileged access to the CPU just by plugging in a USB device? This is as serious as it sounds.

Positive Technologies plans to demonstrate at the next Black Hat conference how to hack over USB into Intel Management Engine of most CPUs since 2008.

Source: Experts can hack most CPUs since 2008 over USB by triggering Intel Management Engine flaw

Categories
security

A penetration tester’s guide to sub-domain enumeration

Sub-domain enumeration is one of the techniques used in penetration testing. The following article gives a good guide on how to start.

As a penetration tester or a bug bounty hunter, most of the times you are given a single domain or a set of domains when you start a…

Source: A penetration tester’s guide to sub-domain enumeration

Categories
privacy security

Key Reinstallation Attacks – Breaking WPA2 by forcing nonce reuse

A serious weakness in WPA2 can cause sensitive information transmitted over Wifi to be read. KRACK attack is especially bad news for Android and Linux users.

This website presents the Key Reinstallation Attack (KRACK). It breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi.

via Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse

Categories
security

Accenture left a huge trove of sensitive data on exposed servers

Quite unforgiveable for a company that does cloud consultancy.

According to Vickery, the largest server contained over 137 gigabytes of data, which included large databases of credentials, some of which appeared to relate directly to Accenture customers. Vickery also found almost 40,000 passwords in one backup database — the vast majority were stored in plaintext.

Source: Accenture left a huge trove of sensitive data on exposed servers

Categories
security

Computer virus hits US Predator and Reaper drone fleet

What could possibly go wrong..

A computer virus has infected the cockpits of America’s Predator and Reaper …

Source: Computer virus hits US Predator and Reaper drone fleet

Categories
privacy security

Wanted: Weaponized exploits that hack phones. Will pay top dollar

Lucrative exploit market might just swing more people over to the dark side.

Exploit broker Zerodium ups the ante with $500,000 to target Signal and WhatsApp.

Source: Wanted: Weaponized exploits that hack phones. Will pay top dollar