Files

194 lines
16 KiB
Plaintext
Raw Permalink Normal View History

Episode: 3828
Title: HPR3828: The Oh No! News.
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3828/hpr3828.mp3
Transcribed: 2025-10-25 06:09:43
---
This is Hacker Public Radio Episode 3,828 for Wednesday, 5 April 2023.
Today's show is entitled, The Oh No, News.
It is hosted by some guy on the internet, and is about 18 minutes long.
It carries a clean flag.
The summary is, Oh No, News is Good News.
Hello and welcome to another episode of HPR.
I'm your host, some guy on the internet.
Let's begin the Oh No News.
We're going to start off with Threat Analysis, Your Attack Surface.
The first story we're going to cover under Threat Analysis is going to be the Plex and
Last Pass story.
In the last episode of The Oh No News, I covered Last Pass in their vulnerability history,
or I should say their recent vulnerability history.
I did not want to include the name Plex back then, I wanted to read some more on it,
so that way when I reported using the name Plex, I would have a little bit more
details and I felt like that was a more responsible approach.
Now I just want to be clear, currently it is pure speculation that Plex Media Server
was involved in the Last Pass data breach.
A Plex vulnerability dubbed CVE 2020 5741 was patched in May of 2020, but a bleeping computer
article states, quote, close quote, later in that same bleeping computer article, which
you can find in the show notes, all articles mentioned here will be in the show notes.
I just wanted to state that bleeping computer linked to an ARS Technica article, the
ARS Technica article states, quote, according to a person briefed on a private report from
Last Pass, who spoke on conditions of anonymity, the media software package that was exploited
on the employee's home computer was Plex, close quote, ARS Technica also mentioned in
this article, quote, interestingly, Plex reported its own network intrusion,
on August 24, just 12 days after the second incident commenced.
Close quote, the second incident being the second Last Pass incident, just keep in mind,
we're not saying the two are linked, but it's very interesting that right after Last Pass
had their incident suddenly Plex has a data breach of their own, we're going to move on over
to Plex and the security announcement that they've made regarding the CVE 2020 5741.
Now, let's go ahead and read a message from the Plex security team from May 2020, quote,
we have recently been made aware of a security vulnerability related to Plex media server.
This issue allowed an attacker with access to the server administrator Plex account to upload a
malicious file via the camera upload feature and have the media server executed.
This could be done by setting the server data directory to overlap with the content location
for a library on which the camera upload was enabled. This issue could not be exploited
without first gaining access to the server's Plex account.
Close quote, Plex also mentioned that they're going to start mitigation in version
1.19.3 of the Plex media server. So there's one thing that I'm going to point out here,
the attacker has to first have admin access on the system to the Plex media server.
Most people already, you know, we give a pass to anyone or anyone's software when an attacker
has rude access on the machine. Kind of hard to just only blame Plex there, you know what I mean?
What makes this bug a little more dangerous is, like they mentioned earlier, once the attacker
has rude access they exploit this vulnerability within Plex and use Plex to then execute code
without the user knowing it. Plex is being used as a link in the attack chain.
Then after the latest last pass incident in August of 2022, don't worry, I'm not going to cover
all of the details that were mentioned in the last oh no news, but shortly after last pass
is data breach in August of 2022. Approximately 12 days later Plex also had a data breach in August
of 2022. The Plex data breach was just as bad. I mean, last pass is worse because again,
it's the keys to everyone's kingdom. However, the Plex data breach, the attacker had access to
passwords, user names and emails of over 30 million customers. Plex of course went through the
usual methods of requiring all of its customers to reset their passwords and other security measures.
They also snuck in a little message at the bottom saying, no payment data was leaked. Like that's
going to do anybody any good, especially when it's tied to last pass, right? I don't mean to laugh
because this is a terrible thing that has happened, but I can just imagine trying to recover your
reputation when something like this gets out. After having ARS Technica mentioned that a
confidential informant from last pass stated that it was Plex's fault this whole thing happened.
Which is kind of funny, right? It does feel like pointing the finger here.
You know, last pass with all their terrible policies, now trying to go, no, no, it wouldn't us,
you know, Plex and their their software is why this whole thing occurred. Plex did not respond
in the way that we're used to within the online slash Linux community.
Thank you for calling Lesbos. How may I help you? How dare you try to drag Plex into your nonsense?
You and your buggy half big beta software. We didn't.
Now we didn't get that. Instead, Plex gave us something a little bit more classy and professional.
Quote. We have not been contacted by last pass, so we cannot speak to the specifics of their incident.
We take security issues very seriously and frequently work with external parties who report
issues big or small using our guidelines and bug bounty program. When vulnerabilities are reported,
following responsible disclosure, we addressed them swiftly and thoroughly and we've never had a
critical vulnerability published for which there wasn't already a patched version released.
Close quote. So there you have it folks, that's what I have so far on this whole Plex and last pass
debacle. Last pass attempting a graceful landing. Only problem is they're moving at about
400 kilometers per hour, so I don't know how graceful it's going to be. They attempted to pull
the Plex parachute at the last second and eat the evidence that came from it all does kind of
suggest. Plex may have had a part in it, however, I cannot state enough. This is like circumstantial
evidence, right? These are things that are just happening around the same time period,
and currently last pass has not released any sort of actual data that they've gathered from
the employee's home computer that that would suggest that yes indeed Plex did play a part in this,
so this is all just mere speculation. So let's move on from here. If there's more details in the
future, I'll bring you back in on it. On next story, not to be confused with key pass XC
vulnerability allows attackers with right access to the XML config to export clear text passwords.
This door was brought to us by NIST, the National Institute of Standards and Technology. All right,
I'm going to boil this one down. This is vulnerability with the key pass database file,
but in order for it to be exploited, the attacker would need to have physical access to the machine
with the user that controls the password database file being already logged in,
so like if you were to walk away from your PC and just left it logged in and someone walked up to
that PC and found your key pass database, they can then exploit this vulnerability. So either that
or an attacker with root access to your machine. In other words, your PC was already owned,
so this vulnerability is just sort of side effect of your PC being owned. Now with that said,
it's still pretty rough because you expect your password to vault to keep your passwords secure.
Key pass has patched this by the way, and I have some supporting articles down in the show notes
that will take you to the different articles showing the patched versions, which I believe is 2.53
is the version that is patched or 2.53.3 something like that. I just wanted to report this and
what I feel to be a more responsible manner before it gets out there that, oh no!
Key pass XC is super vulnerable and you're going to lose all your passwords because other stories
with last pass and everything else that's happening out there. So you know now, if you're using
Key pass, just make sure you keep it up to date. Don't let anybody, you don't know access to your
computer, right? And you'll be just fine. All right, let's go ahead and pivot on over to the user
space version of the show. First article. How to delete yourself from the internet. Bye bye!
I'm going to go ahead and spoil it for you here folks. You cannot actually delete yourself from
the internet. Yeah, once you've uploaded something to someone else's computer, just because you made
a request for them not to display it to you anymore, does it mean it's not there anymore? But the
article goes on telling you different methods about sending requests over to Google to remove
information because it reveals very private information like your phone number, your home address
or things like that. And Google will remove it from the search results. They also go on to show
you how to, you know, delete social media accounts and other chat service accounts. One of the good
things about the articles, they talked about Firefox relay a little bit, you know, just for a teeny
bit, which yay, Firefox, right? Mention some information about using VPNs, which is good
information, but it doesn't, you know, it keeps you private on the internet. It won't actually
delete you. This is just preemptive measures and remaining anonymous on the internet. And understand
that's still very limited, depending on who's coming after you or who's looking for you. If they
have enough time and resources, they'll find you. But I thought it was still a nice little article
to mention for user space. If you were looking to clean up your trail just a little bit and you
wanted a nice method to go about that, I thought this article was, it was decent, especially if you
can find your personal information in a Google search, like right on the search page, your phone
number or something just pops up and you don't know why. Yeah, you might want to take care of that.
And our next article, Mark Zuckerberg's meta exploring plans to launch Twitter rival.
Yeah, I included this one in user space because I thought it was funny Facebook's basically
from what it sounds like. Facebook's basically playing around with a mastodon like
instance. So there's the idea written in the story that meta aka Facebook is going to be launching
a Twitter alternative, something like mastodon, but of course it's going to be centralized instead
of decentralized. And it's just plans for now. There's no real evidence of it. Apparently he's
nervous about how TikTok's taking over, drawing a bunch of his Instagram models and things
away from the platform. So got to come up with something fresh and hip and you know all the other
cliche nonsense. My throat's starting to give out here and drinking a ton of water, but I'm
going to we're going to push on folks. We're going to keep going. Let's go ahead and change over
to the next segment, which is toys for text. All right, we were the last time we did this. It's
kind of hard to find cool toys for text, but the first one I found was a nice little E ink
display, which is mounted to a Raspberry Pi P cool wireless board. And it's called the Inky
Frame 4. It has a Wi-Fi connectivity. You can mount extra storage using an SD card. Very low
power usage. Now for some details on that E ink display is the E ink gallery palette 4000 E paper.
I don't know if that makes sense to you or not, but I got some links in the description if it doesn't.
It's an ACEP, which stands for Advanced Color E Paper 7 color with black, white, red, green, blue,
yellow, and orange. And it looks pretty cool. It looks like a nice little wall mount system or whatever
if you wanted, like just a little E display somewhere. So you can imagine this thing is going to be
super low power because of that E ink technology. And it's colored. They have some of the
some little images displaying the color palette and they show things like the pillars of creation
and a few other really cool images that look fairly nice. But you know, just take a look at it.
I didn't see any availability on it like they're out of stock at the moment. So yes,
might be supplies, chain issues or who knows, but it looks really cool and I thought I'd show it
off here. Oh, and I almost forgot. Phil King, the author of the of the article, he gave it a
wonderful review quote. A classy color E ink display whose Wi-Fi connectivity greatly extends
the possible uses, including as a digital photo art frame, life organizer, a low powered smart
dashboard. Close quote. Now, because I don't know anything about C or C++ or micropython,
I can't give you a ton of detail on that, but I have included links in the description for the
the libraries. I think it links to GitHub and shows you some code examples and stuff like that.
I was just poking around and obviously I can't really make sense of what I'm looking at,
but it's there. If you can, you can look at it and have this schematic. So it's pretty nice.
I think that's a nice little toys for techs. I think it comes in the whole device with the pie
pico and everything comes in at about 70 US dollars, I think it was. So if that's something you're
interested in, that whole E ink thing, I remember that was big a little while ago. Yeah, take a look
at that. All right, last but not least, our last toy and story for today. We're looking at the
ubiquo UBS HM2, which is like one of their really, really small form factor ubiquies. This one was
created specifically for the public sector and they go into detail about all the different
changes that they're making for this device. It's not a very podcast friendly story and I'll just
give you an example of why it's got a lot of alphabet soup and it's so here's a quick little line
from the story here. Support for advanced encryption standards AES in electronic codebook ECB
and cypher block chaining CBC modes, right? So then when you want to read further into that
and you go with AS is one of the most widely used symmetric cryptograph algorithms and can be
used in several several modes such as ECB CBC CCM and GCM. All right, I'm going to stop there
because you know, like I mentioned, this isn't a very podcast friendly thing to read, but it's
it's ubiquo, it's more security and they go they talk some about the different threats that are
out there. It's all usual one zero day exploits other type of malware that's out there. It's not
going to help you against something like ransomware, but still, you know, somebody's trying to break
in and get credentials. Yeah, this low device super low profile. For me personally, I'd have to
keep it on the land here because I got kind of, you know, fat fingers. I can't really pinch down to
pull such a small device out of the USB slot once it's inserted. So like if you take a look at it
in the show notes down there, it is it's quite the the form factor. All right, ladies and gentlemen,
now my closing thoughts here before we end the show. I just wanted to mention that I reconfigured
the way the show notes are so that it is more accessible to to listeners who want to go through
the show notes. I had some help from HPR members want to give a shout out to Mike Ray for assisting me
via email. No, I must have been annoying the crap out of him. Just blasting him. You know,
hey, Mike, take Mike, would you take a look at this? You know, just constantly sending emails back
and forth trying to get him to look at stuff as I'm as I'm making changes. So I thank him for
for assisting me with that. And Dave as well, Dave, give me some help. He pointed me in direction
that would allow me to, you know, learn other features using a pan doc. And yeah, I mean,
I believe we got the show notes looking pretty good. And I included an additional information
section at the bottom of the notes. You can go through that to learn more if you're new to HPR
and all of the security and technology. I've got some some standardized notes I'd like to continue
including with future shows, future, all-no news shows. So that's about it. Thank you guys for listening.
And I'll see you guys in the next episode. Goodbye!
You have been listening to Hacker Public Radio at Hacker Public Radio does work. Today's show was
contributed by a HPR listener like yourself. If you ever thought of recording podcast,
you can click on our contribute link to find out how easy it really is. Hosting for HPR has been
kindly provided by an honesthost.com, the internet archive and our sings.net. On the Sadois
stages, today's show is released on their creative comments, attribution, 4.0 International