More stories

  • in

    XSS vulnerability patched in Directus data engine platform

    A cross-site scripting (XSS) vulnerability has been patched in the popular Directus engine. Directus is an open source, modular content management system (CMS) promoted as a “flexible powerhouse for engineers.” The platform can be used to wrap SQL databases with GraphQL and REST APIs. Directus has achieved 14.9k stars on GitHub and there are approximately 1,700 forks. Discovered by Synopsys Cybersecurity Research Center (CyRC) researcher David Johansson, the vulnerability is tracked as CVE-2022-24814 and can lead to account compromise.  Impacting Directus v9.6.0 and earlier, CVE-2022-24814 was found in the file upload functionality of the CMS.  “Unauthorized JavaScript can be executed by inserting an iframe into the rich text HTML interface that links to a file uploaded HTML file that loads another uploaded JS file in its script tag,” Directus explained. “This satisfies the regular content security policy header, which in turn allows the file to run any arbitrary JS.” According to Synopsys, authenticated users can create a stored XSS attack that triggers when other users try to view “certain” collections or files on the platform.  A similar issue, tracked under CVEs CVE-2022-22116 and CVE-2022-22117, was previously disclosed in the Directus App. However, the mitigation improvements did not go far enough and so could be bypassed, the researchers added. 

    Synopsys disclosed its findings to Directus on January 28. The platform’s team triaged the vulnerability and released v3.7.0 on March 18 to resolve the security issue. In addition, Directus improved a “very permissive’ default value for CORS configuration which could lead to unauthorized access when configurations had not been changed.  The latest build is v3.9.0.  “Synopsys would like to commend the Directus team for their responsiveness and for addressing this vulnerability in a timely manner,” the company said.  In related news, VMware published a security advisory on April 6 urging customers to patch software including VMware Workspace ONE Access, Identity Manager (vIDM), and vRealize Automation (vRA) to patch bugs leading to remote code execution (RCE), among other issues.  See alsoHave a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Spring4Shell flaw is now being used to spread this botnet malware

    Security researchers have observed attackers exploiting the Spring4Shell Java-related flaw to install malware on target systems.   Researchers at security firms Trend Micro and Qihoo 360 watched the attacks emerge almost as soon as the bug become public. 

    ZDNet Recommends

    While Spring4Shell isn’t quite as dire as Log4Shell, most security firms, the US Cybersecurity and Infrastructure Security Agency (CISA), and Microsoft are urging developers to patch it if they’re using Java Development Kit (JDK) from version 9.0 and upwards if the system is also using Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and earlier versions.SEE: Windows 11 security: How to protect your home and small business PCs”After March 30, we started to see more attempts such as various webshells, and today, 2022-04-01 11:33:09(GMT+8), less than one day after the vendor released the advisory, a variant of Mirai, has won the race as the first botnet that adopted this vulnerability,” Qihoo 360 researchers noted.Trend Micro researchers have also seen something similar. “We observed active exploitation of Spring4Shell wherein malicious actors were able to weaponize and execute the Mirai botnet malware on vulnerable servers, specifically in the Singapore region,” said Trend Micro’s researchers.  “We also found the malware file server with other variants for different CPU architectures,” they warned.The Mirai sample is downloaded to the “/tmp” folder.Trend says most of the vulnerable setups were configured with the following features:Spring Framework versions before 5.2.20, 5.3.18, and Java Development Kit (JDK) version 9 or higherApache TomcatSpring-webmvc or spring-webflux dependencyUsing Spring parameter binding that is configured to use a non-basic parameter type, such as Plain Old Java Objects (POJOs)Deployable, packaged as a web application archive (WAR)Writable file system, such as web apps or ROOTResearchers at Palo Alto Networks’ Unit 42 team believe that Spring4Shell will almost certainly be weaponized because it was straightforward to exploit and all the details how to do it were public on March 31. “Since exploitation is straightforward and all the relevant technical details have already gone viral on the internet, it’s possible that SpringShell will become fully weaponized and abused on a larger scale,” it said. The chief vulnerabilities related to Spring4Shell are CVE-2022-22965, which is a bypass for the 2010 patch CVE-2010-1622, and CVE-2022-22963. Mirai and its many variants remain one of the biggest threats on the internet. They are used for distributed denial-of-service attacks, attacks on passwords, and the deployment of ransomware and cryptocurrency miners.  More

  • in

    How this former robot pizza unicorn reinvented itself around sustainable packaging

    Worker inspects sustainable packaging.
    Zume
    A fleet of robots and some fancy sustainable material may point the way to solving a vexing problem: How to reduce harmful single-use packaging materials, which include not just plastics and polystyrene but also chemicals used to line cardboard packaging.

    The company in question is Zume, and you might remember the name from its first life as a pizza-making robotics firm once valued in the billions. After trying to scale its end to end automated pizza business too quickly, the Softbank-backed brand pivoted went through major layoffs and then pivoted to sustainable packaging. With a breakthrough partnership with global robotics leader ABB, as well as a new partnership with Solenis, a leading global producer of speciality chemicals, Zume is launching a line of 100% PFAS-free compostable packaging for the food packaging industry, capping off a major brand reinvention.Why is this important? Ever looked closely at the inside of a cardboard takeout box? That sheen keeping your lo mein from soaking into the cardboard is most likely PFAS (per- and polyfluoroalkyl substances), widely used chemicals commonly found in sustainable food packaging. These toxic chemicals bind to proteins in the soil, transmit up the food chain and have been linked to a slew of health risks.”Until now, an economically viable solution for brands to transition from plastic and foam packaging hasn’t been available,” said Zume CEO and Chairman Alex Garden. “Our patented molded fiber manufacturing equipment system and technology enable us to offer sustainable packaging at the same price or less than plastic. This partnership with Solenis advances efforts to eliminate single-use plastic and enables brands to keep commitments to stop using PFAS.”Also: Robot fry cook gets job at 100 White Castle locationsZume and Solenis have been working together to innovate molded fiber solutions to replace entire categories of single-use plastic without harmful chemicals. Part of the breakthrough here is a robotics-enabled manufacturing process, something that’s given single-use plastics manufacturers a leg up when it comes to pricing single-use packaging. Under the terms of the new partnership, Zume will provide its advanced molded fiber manufacturing capabilities and professional services, and Solenis will supply expertise in functional additives and surface coatings to increase the strength and functionality of Zume’s fiber recipes making them adequate for a broad array of commercial uses.Initial products will include cups, bowls, plates, premium egg cartons, coffee cup lids, protein trays, and yogurt cups. ABB’s robots will automate production and enable the scale and speed needed to make Zume’s sustainable packaging. More

  • in

    Singapore begins licensing cybersecurity vendors

    Vendors offering two categories of cybersecurity services in Singapore now must apply for a licence to continue providing such services. They have up to six months to do so or will have to cease the provision of such services, if they do not wish to face the possibility of a jail term or fine.Specifically, companies that provide penetration testing as well as managed security operations centre (SOC) monitoring services will need a licence to offer these services in Singapore. These include companies and individuals directly engaged in such services, third-party vendors that support these companies, and resellers of the licensable cybersecurity services, according to Cyber Security Authority (CSA) Singapore. The industry regulator said the licensing framework, effective from April 11, was parked under the country’s Cybersecurity Act and aimed to better protect consumers’ interests. It also served to improve service providers’ standards and standing over time.

    CSA added that the two service categories were prioritised to kickstart the licensing regime because providers of these services had significant access into their customers’ ICT systems and sensitive data. Should such access be abused, the client’s operations could be disrupted, the regulator noted. It added that because these services were widely available and adopted, they also had the potential to cause significant impact on the wider cybersecurity landscape. Existing vendors currently engaged in the provision of either or both service categories had up to October 11, 2022, to apply for a licence. Those that failed to do so on time would have to stop providing the service until a licence was obtained. Services providers that submitted their application for a licence within six months would be permitted to continue delivering the licensable service until a decision on the application was made. Any person who provided the licensable services without a licence after October 11, 2022, would face a fine not exceeding SG$50,000 ($36,673) or a jail term of up to two years, or both. Individuals would have to pay SG$500 for their licence, while businesses would have to fork out SG$1,000. Each licence would be valid for two years. CSA said there would be a one-time 50% fee waiver for applications submitted within the first year, before April 11, 2023. A Cybersecurity Services Regulation Office had been set up to administer the licensing framework and facilitate communications between the industry and wider public on all licensing-related issues. Its responsibilities include enforcing and managing licensing processes and sharing resources on licensable cybersecurity services with the public, such as providing the list of licensees.Commenting on other cybersecurity services that might be licensable in future, CSA said it would “continue to monitor international and industry trends” as well as engage the industry, where necessary, to assess if new service categories should be included.The launch of the licensing framework comes after a four-week consultation period that ended last October. CSA said it received 29 responses from both local and international market players as well as industry associations and members of the public. One such feedback pertained to information required, upon request, to facilitate the regulator’s investigations into matters such as breaches by licensees or related to the licensee’s continued eligibility. There were suggestions that the language of the proposed licence conditions be tightened, so requests were not overly generic, and for there to be more clarity on the types of information that might be requested.CSA said it had revised the language of the licence conditions to reduce uncertainty for licensees and that requests for such information would be limited to what was necessary for the purpose of the investigation. RELATED COVERAGE More

  • in

    OpenSSH now defaults to protecting against quantum computer attacks

    Post-quantum cryptography has arrived by default with the release of OpenSSH 9 and the adoption of the hybrid Streamlined NTRU Prime + x25519 key exchange method. “The NTRU algorithm is believed to resist attacks enabled by future quantum computers and is paired with the X25519 ECDH key exchange (the previous default) as a backstop against any weaknesses in NTRU Prime that may be discovered in the future. The combination ensures that the hybrid exchange offers at least as good security as the status quo,” the release notes said. “We are making this change now (i.e. ahead of cryptographically-relevant quantum computers) to prevent ‘capture now, decrypt later’ attacks where an adversary who can record and store SSH session ciphertext would be able to decrypt it once a sufficiently advanced quantum computer is available.” As work on quantum computers inches forward, protecting against future attacks has similarly increased. Thanks to the massive parallelism expected from workable quantum computers, it is believed traditional cryptography will be trivial to crack once such a machine is built. Last month, the NATO Cyber Security Centre did a test run of its quantum-proof network. “Securing NATO’s communications for the quantum era is paramount to our ability to operate effectively without fear of interception,” principal scientist Konrad Wrona said at the time. “The trial started in March 2021. The trial was completed in early 2022. Quantum computing is becoming more and more affordable, scalable and practical. The threat of ‘harvest now, decrypt later’ is one all organizations, including NATO, are preparing to respond to.” Elsewhere in the OpenSSH release that was mostly focused on bug fixes, the SCP command has been moved from its default legacy protocol to using SFTP even though it brings with it several incompatibilities, such as not supporting wildcards with remote filenames or expanding a ~user path, although the latter is supported through an extension. Related Coverage More

  • in

    Ads, NFTs and other badness: Pour one out for the decline of dumb TVs

    Image: Vizio
    In my particular lounge room sits a relic of a time long gone, a 15-year-old plasma TV that is dumb as a box of hammers, and thankfully so. As the years go by, I am increasingly grateful that this piece of technology continues to kick on.Of course at some stage, I will need to trudge into the increasingly awful world of smart TVs, but the longer that takes the better.

    ZDNet Recommends

    The best TVs

    Brands like Samsung, LG, and TCL have models at different price points to meet your entertainment needs.

    Read More

    In recent weeks, TV makers have upped the annoyance and intrusion factor in their so-called smart devices.Vizio announced it had started a beta with Fox in the US to insert ads during the credits of a show in an effort to push users onto the broadcaster’s streaming service.”Jump ads give participating programmers and brands the ability to present an interactive overlay at the conclusion of linear TV programs, directing viewers into a supporting app on Vizio’s operating system to continue their viewing experience,” Vizio said.”The Jump Ads will prompt viewers to continue watching additional episodes of the program or catch up on past episodes on the Fox Now App … this allows viewers to seamlessly extend their viewing experience with a single click of a button, enhancing the smart TV experience for both viewers and content providers alike.”Vizio said ad buyers can control at what point the ads appear, how often they do, and which app the ad points to — and as we’ve learnt after some years at the nexus of advertising and technology, there is no way this seemingly helpful pointer to users will be extended to promote anything, at any time, anywhere in a broadcast. I’d suggest asking, “Why stop at one ad?”, but I really don’t want to give marketers any ideas.Not to have the likes of Vizio offering equal functionality, fellow TV ads inserter Samsung has taken a step into the world of blockchains and TV.The Korean behemoth said last week it has partnered with crypto exchange Gemini and its Nifty Gateway to integrate NFTs on its smart TV platform, allowing users to buy, sell, and view the assets on its 2022 premium TV lines including QLED and Neo QLED.Get a new one anyway: Best OLED TVMost pleasingly from Samsung is this helpful guide to stop your smart TV from being hacked or running malicious code — it involves turning on “smart security”, and call me a cynic but it probably doesn’t do what it says on the tin.The problem with TVs, as my venerable Panasonic display shows, is the lifespan of such devices. No one is going to support a non-desktop consumer device’s operating system and make sure it is secure for almost 15 years after it was made. To give an idea of the longevity of this TV, when it arrived, Android 1.0 was being released. Imagine how long it would take to pop this device if it was able to browse the internet.Samsung needs to be on top of its security to ensure its TVs remain safe, because wherever you find crypto assets, you bet there’s someone who has worked out a way to steal it, and is maybe even using it on OpenSea.Beyond this pair of TV makers, it is not as though the industry has any saints, LG was doing ads years ago, and Sony says in a support article that users cannot turn ads off and points the finger at Google.Besides, there is no reason for manufacturers to make anything but smart TVs for consumers, especially when the answer to those who have issues about smart features is to retort with a line about not connecting it to the internet in the first place.That could work — unless you live near a radio telescope and cannot have a device spamming out Wi-Fi and Bluetooth signals as long as it is connected into a power socket, and the suggested answer is to open the TV and cut its antenna off — but it doesn’t solve the issue of potentially paying thousands of dollars for a device that upgrades itself and pushes increasing amounts of advertising at you. That sort of user experience is best left in the hands of Microsoft to pioneer on its own.After living with smart Wi-Fi for a number of years where setting options are being increasingly pared back by Google, I was recently blasted back into a world where the user can overwrite the so-called artificial intelligence. It didn’t fix everything, but it was delightful to have options again.The TV landscape is far beyond that point, search for dumb options and you’ll end up thinking about buying commercial signage devices or looking to use a big computer monitor as a TV — neither of which are proper fits.It’s a shame TVs have become purchases that cost possibly in the thousands of dollars and for their coin, new owners end up with yet another ad-serving device that will have firmware updates end in a couple of years, if they are lucky. Because as a base concept, TVs exist purely to show someone what they want to see. It shouldn’t be this hard.But if you want to see a low-res pixel art NFT upscaled to glorious 8K resolution, you know which Korean tech giant you need to buy from.ZDNet’s Monday Morning Opener is our opening take on the week in tech, written by members of our editorial team. We’re a global team so this editorial publishes on Monday at 8:00am AEST in Sydney, Australia, which is 6:00pm Eastern Time on Sunday in the US, and 11:00PM in London.PREVIOUSLY ON MONDAY MORNING OPENER :  More

  • in

    3G is shutting down: Here are the gadgets that still rely on it. Do you have one?

    Image: Getty Images
    3G is shutting down and some of your most essential tech may soon become unusable. What steered the evolution of how we use, interact, and communicate with technology 20 years ago will officially retire by the end of 2022, with major US carriers repurposing their satellites over the course of the year. In its place: 5G, the next-generation network that promises considerably faster speeds than 4G LTE and a more unified system for Artificial Intelligence (AI) and Internet of Things (IoT) expansion.

    So, what does this all mean for older hardware like cellphones, alarms, and GPS systems that thrive on the 3G spectrum? To put it bluntly, many of the network-driven features will become obsolete, presenting some unforeseen dangers. Fortunately, there are steps that you and your loved ones can take to safely transition from aging to future-proof tech. In some cases, manufacturers may even be able to give your older gadgets new life through software upgrades. Here is everything you need to know about the “3G sunset”, how it will affect the technology that you use, and what you can do to stay afloat in the ever-changing landscape.

    When are carriers shutting down 3G?

    While carriers have been planning the closure of 3G since 4G LTE took the reins (and the prospect of 5G being another catalyst) the agenda took a pause during the pandemic. Over the past two years, 3G-reliant services like home security systems and tech for the elderly have become more essential than ever, keeping telecommunications companies from pulling the plug. That is, until 2022, with major US carriers finally giving in and setting new shutdown dates that span across the year. AT&T is the first of the big three, closing its 3G network on February 22, 2022. T-Mobile has pushed its 3G shutdown to July 1, 2022, after initially planning for an October closing in 2021. Sprint, now merged with T-Mobile, will close its 3G network on May 31, 2022. Verizon’s 3G network will shut off on December 31, 2022. The carrier has made it clear that “the date will not be extended again.”You can find more information regarding when the 3G networks close on FCC’s website.

    Will my phone still work?

    Image: Getty Images

    For the greater portion of the 3G era, smartphones enabled users to browse the web, share viral videos, update statuses, and connect with people from around the world. That all remains possible through 4G LTE, 5G, and Wi-Fi networks. With 3G turned off, the iPhone 3GS, for example, won’t be able to make calls or text messages, but can still connect to Wi-Fi to access internet-based applications. According to the CTIA, “fewer than nine percent of the US wireless connections are 2G or 3G subscriptions.” If you’re using a smartphone that launched after 2014, you likely won’t experience any setbacks from the 3G shutdown. The same applies to flip phones that were released after 2017. Unsure of what year your device was manufactured? The best solution is to check with your local carrier — in person or online — to see if there are any compatibility issues. More: ZDNet’s top picks for cheap 5G phonesCarriers like T-Mobile and Verizon are also reaching out to 3G customers to help with the transition to 4G and 5G service plans. We’re seeing trade-in offers and incentives that will have your 3G-supported phone swapped with a 5G-supported one for free. And for low-income consumers, the FCC’s Lifeline program will discount qualifying monthly telephone and internet services, making the conversion all the more accessible. In general, if you or a loved one are using an older phone, this is your call to upgrade.

    How will the 3G shutdown affect my car?

    Besides ushering in the revolution of smartphones, 3G has played a foundational role in the navigation and alarm-based systems that we rely on during our everyday commutes. With the institution of faster and more reliable 5G, roadside assistance and emergency crash alerts are among the many network-based features that will be affected by the shutting down of 3G. Many cars also have an emergency SOS button that, when pressed, dials to first responders via 3G. That, too, will lose functionality. Vehicles from popular automakers like Toyota, Lexus, Nissan, Hyundai, Dodge, and more released before 2019 are susceptible to the issues mentioned above. The main reason that newer models still carry 3G receivers, according to Roger Lanctot, director of automotive connected mobility at Strategy Analytics, is for automakers to save on manufacturing costs. To stay ahead of the curve, you’ll want to ensure that your car supports or can receive hardware upgrades to connect to 4G. As with smartphones, your best bet to stay in the know is by consulting with your local car dealer. While the modification may come in the form of downloadable software or physical spare parts, it will help to keep your vehicle up to date and functioning — especially during times of danger. More: Why 5G is a crucial technology for autonomous vehicles

    How will it affect my home security?

    Evgeniykleymenov — Shutterstock

    For the past decades, home security and alarm systems have relied on 3G to communicate and monitor suspicious activities. With the 3G shutdown, that line of communication between the home and its service’s central monitoring station becomes non-existent, leaving people who live alone and elders vulnerable. Fortunately, over the course of the pandemic, many home security companies have proactively been migrating customers from 3G to 4G networks, ensuring that their services remain operational, even after the 3G spectrum is taken down. Unlike smartphones and cars that require disassembling or full-on upgrades, adding 4G functionality to security systems is as simple as having a technician install an external receiver (usually a box or panel). If you or someone you know is subscribed to a home security plan (ADT, Vivint, SimpliSafe, etc.) a customer representative should have reached out by phone or mail regarding the transition. If not, services like ADT allow you to schedule a free appointment via phone or website to get the conversion started. More: Our top picks for home security monitoring

    Other tech that will be affected

    Besides the categories mentioned above, there is a plethora of gadgets and services that rely on the older-generation network which you may not have been aware of. If you own any of the following, make sure to contact the manufacturer and ask what the next steps are. Depending on how old the product is, you may be eligible for a hardware or software upgrade. Medical alert devices (fall detectors, communicators, etc.)Fire alarmsInventory trackersSmartwatchesE-readers (Kindles, Nooks, etc.)GPS trackers (including for pets)Marine safety devices

    Bottom line

    With the imminent sunset of 3G, take a moment out of your day to check your devices (as well as those of your loved ones) to ensure that everything is up to date and geared for the future. As technology progresses and new advances replace the old, businesses and customers alike must learn, adapt, and embrace the change so the tech we rely on every day can continue to keep ourselves and those around us safe and informed. More

  • in

    FIN7 hacking group member sentenced to five years behind bars

    A Ukrainian national has been sentenced as a member of the FIN7 hacking group.

    On Thursday, the US Department of Justice (DoJ) announced the sentencing of Denys Iarmak to five years in prison for working as a FIN7 penetration tester.FIN7, also known as Carbanak, is a prolific cybercriminal group that focuses on financial theft. Active since at least 2015, FIN7 has tended to target the retail and banking sector through Business Email Compromise (BEC) scams, attacks against point-of-sale (PoS) systems, and supply chain compromise. The group is constantly evolving its tactics and improving its toolkit. The malware used by the group includes backdoors, information stealers, Trojans, RDP access modules, and even malicious USB drives that are physically mailed to unsuspecting businesses. Blueliv researchers say that FIN7 is one of the top threats to today’s financial sector. The DoJ estimates that at least $1 billion in damages has been done to US organizations and consumers. Prosecutors say that Iarmak worked as a pentester for the group. In cybersecurity, pen testers may be tasked with testing software and security, but in this case, the 32-year-old was responsible for managing network intrusions. Among his tasks was creating intrusion ‘projects’ in JIRA to track cyberattacks, including the initial access, surveillance progress, and data theft. Group members could comment on each project and offer each other advice. “As one example, Iarmak created a JIRA issue, to which he and other members of the cybergroup had access, for a specific victim company, and, on or about March 3, 2017, Iarmak updated that JIRA and uploaded data he had stolen from that company,” the DoJ says. While prosecutors didn’t say how much Iarmak earned, they noted his paycheck “far exceeded comparable legitimate employment in Ukraine.” Iarmak was apprehended and arrested in Bangkok, Thailand, in 2019. The hacker fought extradition but was sent to the US in 2020. He was charged and pleaded guilty to one count of conspiracy to commit wire fraud and one count of conspiracy to commit computer hacking. The DoJ began arresting FIN7 members in 2018. To date, three have been sentenced in the United States. Iarmak joins Fedir Hladyr, who was sentenced to 10 years behind bars, and Andrii Kolpakov, who will serve a seven-year prison term. “Iarmak was directly involved in designing phishing emails embedded with malware, intruding on victim networks, and extracting data such as payment card information,” commented US Attorney Nicholas Brown of the Western District of Washington. “To make matters worse, he continued his work with the FIN7 criminal enterprise even after the arrests and prosecution of co-conspirators.” See alsoHave a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More