Spectre/Meltdown Update
- Microsoft have removed the special registry flag which prevented the Spectre/Meltdown patches being applied on machines without AV that explicitly declares itself compatible with the patch. This approach made sense early in the response to these bugs, but it did have an undesirable side-effect, a machine with no AV would never get patched. That’s no longer the case now — arstechnica.com/…
- Intel outlines plans for Meltdown and Spectre fixes, microcode for older chips — arstechnica.com/…
Security Medium 1 — AMD Gets Its Turn in the Spotlight (RyzenFall, MasterKey, Fallout & Chimera)
Details are still a little sketchy, and the more we learn, the more some aspects of this story begin to smell a bit fishy, but regardless, it does seem that there are indeed 13 critical security vulnerabilities affecting many AMD CPUs, and they 13 vulnerabilities can be grouped into four named collections of related bugs, RyzenFall, MasterKey, Fallout & Chimera.
At the moment it seems none of these bugs can be remotely exploited, so an attacker would need another way into the computer before they can leverage one or more of these bugs to get up to mischief. Put another way, on their own these bugs don’t seem to pose an imminent danger, but combined with a remove code execution bug they could prove quite potent.
The first thing that really smells fishy about this story is that the security firm that published the flaws registered the domain name for the bug a month ago, but only gave AMD and handful of other companies including Microsoft 24 hours notice before going public. The next thing that really smells fishy is that it appears the security firm which published the bugs directly profited from doing so by shorting AMD on the stock market.
Many security researchers are describing these bugs as ‘overhyped’, and Linus Torvalds has been absolutely scathing in his condemnation of how this all went down — “It looks more like stock manipulation than a security advisory to me”.
The bugs affect AMD’s EPYC server CPUs, Ryzen workstation CPUs, and Ryzen Pro & Ryzen mobile CPUs. Some of the bugs affect the security gatekeeper AMD’s equivalent of Apple’s Secure Enclave, and others affect AMD’s Ryzen chipset which provides connectivity between the affected CPUs and connected peripherals like network and wifi chips. Most of the bugs are firmware bugs, but some are hardware bugs, and hence, possibly un-fixable. Some are being described as intentional back doors.
Right not it’s not at all clear whether or not this is anything near as big a deal as it sounded initially. For now there are no actual attacks in the wild, and no patches of any kind (how could there be with such irresponsible disclosure!). There doesn’t seem to be any reason to panic, all we can really do for now is wait and see how this develops over the coming days, weeks, and months.
Links
- AMD Investigating Reports of 13 Critical Vulnerabilities Found in Ryzen, EPYC Chips — threatpost.com/…
- AMD Investigating RyzenFall, MasterKey, Fallout, and Chimera CPU Vulnerabilities — www.bleepingcomputer.com/…
- 13 Critical Flaws Discovered in AMD Ryzen and EPYC Processors — thehackernews.com/…
- CTS Labs defends its public disclosure of AMD vulnerabilities — techreport.com/…
- AMD CPU vulnerabilities published by unknown security firm after 24 hours notice — www.techrepublic.com/…
- AMD allegedly has its own Spectre-like security flaws — www.cnet.com/…
- Researchers Point to an AMD Backdoor—And Face Their Own Backlash | WIRED — www.wired.com/…
- Can AMD Vulnerabilities Be Used to Game the Stock Market? – Motherboard — motherboard.vice.com/…
- Linus Torvalds slams CTS Labs over AMD vulnerability report — www.zdnet.com/…
Security Medium 2 — GrayKey
Last time we reported on controversial Israeli security firm Cellebrite’s new product offering which claims it can unlock modern iPhones running modern versions of iOS, including the iPhone 8 and the iPhone X running iOS 11.
Details of exactly what Cellebrite can do, how long it takes, and what its success rate are were unclear then, and remain so now. Really, we just have marketing materials to go on. Cellebrite offer their unlocking product as a service, not as a device or piece of software that law enforcement agencies can use themselves. Instead, they have to send the phones they want un-locked to Cellebrite who then do their thing in private.
There have been reports circulating about a physical device known as GrayKey being sold to law enforcement agencies for use at their own facilities by a US security firm named Grayshift. Details of this product have been really sketchy because no even the marketing materials are publicly available, instead, they are protect by a portal that only allows law enforcement agencies enter.
However, this week, details of GrayKey have leaked out, so we now know a lot more about how the product works.
It’s a physical box with two lightning ports. You plug two phones to be cracked into the box at the same time, wait two minutes, then remove the phones. They won’t be immediately cracked, instead, it will take a few hours for a phone locked with a 4-digit PIN, and a few days for a phone locked with a 6-digit PIN. One assumes it would take much longer for a phone with a strong alphanumeric password, if it works at all.
When the crack succeeds the phones display some information on their screens including a passcode that can be used to unlock the device. At that point all the data can be downloaded from the phone into the GrayKey device, from whence it can be accessed by the crackers. The entire disk appears to be decrypted, as does the keychain.
The bottom line remains the same as it was last time — no need to panic at the moment. This could develop into a real problem facing regular folks in the real world, but it hasn’t done so yet, and may very well never do so. For now, we need to simply wait and see how things develop.
Links
- Second company claims it can unlock iPhone X — nakedsecurity.sophos.com/…
- GrayKey iPhone unlocker poses serious security concerns — blog.malwarebytes.com/…
Notable Security Updates
- March’s Patch Tuesday has been and gone with critical updates for Flash, and Windows — krebsonsecurity.com/…
- The Windows patches include an important update for RDP (Remote Desktop Protocol) users — nakedsecurity.sophos.com/…
Notable News
- The US Treasury Department has issued a scam alert to warn users that the US Government will never ask citizens to pay back-taxes with iTunes gift cards. This is in response to a spate of phishing attacks attempting to trick Americans into believing they owe back-taxes, and, paying them to the attackers in the form of iTunes gift cards. (Editorial by Bart: while this is an American story, I’m pretty sure the same advice applies world-wide, no legitimate government agency is going to demand you pay your taxes in the for of iTunes gifts!) — www.macobserver.com/…
- The US government has blamed the Russian government for a years-long campaign of cyber attacks against the US power grid — www.reuters.com/…
- Facebook publicly promises not to share WhatsApp data with Facebook unless and until it can do so without breaking GDPR — nakedsecurity.sophos.com/…
- Facebook have started to automatically upgrade links posted by users to HTTPS when possible — nakedsecurity.sophos.com/…
Suggested Reading
- PSAs, Tips & Advice
- Apple Intros ‘Families’ Webpage with Kid-safe Computing Tips — www.macobserver.com/…
- A chilling practical example of how iPhone thieves use social engineering to try trick victims into giving up their iCloud login details, and hence, into defeating activation lock — www.loopinsight.com/…
- Private Browsing Mode isn’t Just for Porn — www.macobserver.com/…
- Here’s How to Disable Face ID for Specific Apps — www.macobserver.com/…
- Notable Breaches & Privacy Violations
- News
- A bug in Memcached combined with a glut of insecurely configured instances leads to record-breakingly massive new DDOS attacks
- FireFox continue to improve privacy in their browser
- The latest version improves control over push notification requests — nakedsecurity.sophos.com/…
- From version 62 onwards, two privacy-sapping but rarely legitimately used APIs will be removed — nakedsecurity.sophos.com/…
- YouTube conspiracy videos to get links to Wikipedia and other sources — nakedsecurity.sophos.com/…
- The MoviePass CEO plunged the company into controversy when he bluntly stated that the company tracks users as the go to and from cinemas. The company later clarified his remarks, saying it was just something they company was considering. (Editorial by Bart: It’s hard to know what’s really going on here, so I’ll just link to some coverage of the story and let you make up your own mind)
- Opinion & Analysis
- Month in Review: Apple Security in February 2018 — www.intego.com/…
- How Facebook Uses Web Trackers, Third Party Advertising Data, Loyalty Cards and More to Watch Us — www.macobserver.com/…
- Face ID on the iPhone is Cool. What About When the Police Use it? — www.macobserver.com/…
- With 4 months to switch on HTTPS, are web hosting companies ready? — nakedsecurity.sophos.com/…
- Look-Alike Domains and Visual Confusion — krebsonsecurity.com/…
- Can U.S. States Hang on to Net Neutrality? — tidbits.com/…
- Propellor Beanie Teritory
- macOS: How to Update Your Mac in the Terminal — www.macobserver.com/…
- Patch now! Half a million Exim mail servers need an urgent update — nakedsecurity.sophos.com/…
- Whois data to be redacted to comply with GDPR, access might be restored to some vetted groups including journalists and security researchers by December 2018 — krebsonsecurity.com/…
- The Chrome extension that knows its you by the way you type — nakedsecurity.sophos.com/…