194 lines
16 KiB
Plaintext
194 lines
16 KiB
Plaintext
|
|
Episode: 3828
|
||
|
|
Title: HPR3828: The Oh No! News.
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3828/hpr3828.mp3
|
||
|
|
Transcribed: 2025-10-25 06:09:43
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
This is Hacker Public Radio Episode 3,828 for Wednesday, 5 April 2023.
|
||
|
|
Today's show is entitled, The Oh No, News.
|
||
|
|
It is hosted by some guy on the internet, and is about 18 minutes long.
|
||
|
|
It carries a clean flag.
|
||
|
|
The summary is, Oh No, News is Good News.
|
||
|
|
Hello and welcome to another episode of HPR.
|
||
|
|
I'm your host, some guy on the internet.
|
||
|
|
Let's begin the Oh No News.
|
||
|
|
We're going to start off with Threat Analysis, Your Attack Surface.
|
||
|
|
The first story we're going to cover under Threat Analysis is going to be the Plex and
|
||
|
|
Last Pass story.
|
||
|
|
In the last episode of The Oh No News, I covered Last Pass in their vulnerability history,
|
||
|
|
or I should say their recent vulnerability history.
|
||
|
|
I did not want to include the name Plex back then, I wanted to read some more on it,
|
||
|
|
so that way when I reported using the name Plex, I would have a little bit more
|
||
|
|
details and I felt like that was a more responsible approach.
|
||
|
|
Now I just want to be clear, currently it is pure speculation that Plex Media Server
|
||
|
|
was involved in the Last Pass data breach.
|
||
|
|
A Plex vulnerability dubbed CVE 2020 5741 was patched in May of 2020, but a bleeping computer
|
||
|
|
article states, quote, close quote, later in that same bleeping computer article, which
|
||
|
|
you can find in the show notes, all articles mentioned here will be in the show notes.
|
||
|
|
I just wanted to state that bleeping computer linked to an ARS Technica article, the
|
||
|
|
ARS Technica article states, quote, according to a person briefed on a private report from
|
||
|
|
Last Pass, who spoke on conditions of anonymity, the media software package that was exploited
|
||
|
|
on the employee's home computer was Plex, close quote, ARS Technica also mentioned in
|
||
|
|
this article, quote, interestingly, Plex reported its own network intrusion,
|
||
|
|
on August 24, just 12 days after the second incident commenced.
|
||
|
|
Close quote, the second incident being the second Last Pass incident, just keep in mind,
|
||
|
|
we're not saying the two are linked, but it's very interesting that right after Last Pass
|
||
|
|
had their incident suddenly Plex has a data breach of their own, we're going to move on over
|
||
|
|
to Plex and the security announcement that they've made regarding the CVE 2020 5741.
|
||
|
|
Now, let's go ahead and read a message from the Plex security team from May 2020, quote,
|
||
|
|
we have recently been made aware of a security vulnerability related to Plex media server.
|
||
|
|
This issue allowed an attacker with access to the server administrator Plex account to upload a
|
||
|
|
malicious file via the camera upload feature and have the media server executed.
|
||
|
|
This could be done by setting the server data directory to overlap with the content location
|
||
|
|
for a library on which the camera upload was enabled. This issue could not be exploited
|
||
|
|
without first gaining access to the server's Plex account.
|
||
|
|
Close quote, Plex also mentioned that they're going to start mitigation in version
|
||
|
|
1.19.3 of the Plex media server. So there's one thing that I'm going to point out here,
|
||
|
|
the attacker has to first have admin access on the system to the Plex media server.
|
||
|
|
Most people already, you know, we give a pass to anyone or anyone's software when an attacker
|
||
|
|
has rude access on the machine. Kind of hard to just only blame Plex there, you know what I mean?
|
||
|
|
What makes this bug a little more dangerous is, like they mentioned earlier, once the attacker
|
||
|
|
has rude access they exploit this vulnerability within Plex and use Plex to then execute code
|
||
|
|
without the user knowing it. Plex is being used as a link in the attack chain.
|
||
|
|
Then after the latest last pass incident in August of 2022, don't worry, I'm not going to cover
|
||
|
|
all of the details that were mentioned in the last oh no news, but shortly after last pass
|
||
|
|
is data breach in August of 2022. Approximately 12 days later Plex also had a data breach in August
|
||
|
|
of 2022. The Plex data breach was just as bad. I mean, last pass is worse because again,
|
||
|
|
it's the keys to everyone's kingdom. However, the Plex data breach, the attacker had access to
|
||
|
|
passwords, user names and emails of over 30 million customers. Plex of course went through the
|
||
|
|
usual methods of requiring all of its customers to reset their passwords and other security measures.
|
||
|
|
They also snuck in a little message at the bottom saying, no payment data was leaked. Like that's
|
||
|
|
going to do anybody any good, especially when it's tied to last pass, right? I don't mean to laugh
|
||
|
|
because this is a terrible thing that has happened, but I can just imagine trying to recover your
|
||
|
|
reputation when something like this gets out. After having ARS Technica mentioned that a
|
||
|
|
confidential informant from last pass stated that it was Plex's fault this whole thing happened.
|
||
|
|
Which is kind of funny, right? It does feel like pointing the finger here.
|
||
|
|
You know, last pass with all their terrible policies, now trying to go, no, no, it wouldn't us,
|
||
|
|
you know, Plex and their their software is why this whole thing occurred. Plex did not respond
|
||
|
|
in the way that we're used to within the online slash Linux community.
|
||
|
|
Thank you for calling Lesbos. How may I help you? How dare you try to drag Plex into your nonsense?
|
||
|
|
You and your buggy half big beta software. We didn't.
|
||
|
|
Now we didn't get that. Instead, Plex gave us something a little bit more classy and professional.
|
||
|
|
Quote. We have not been contacted by last pass, so we cannot speak to the specifics of their incident.
|
||
|
|
We take security issues very seriously and frequently work with external parties who report
|
||
|
|
issues big or small using our guidelines and bug bounty program. When vulnerabilities are reported,
|
||
|
|
following responsible disclosure, we addressed them swiftly and thoroughly and we've never had a
|
||
|
|
critical vulnerability published for which there wasn't already a patched version released.
|
||
|
|
Close quote. So there you have it folks, that's what I have so far on this whole Plex and last pass
|
||
|
|
debacle. Last pass attempting a graceful landing. Only problem is they're moving at about
|
||
|
|
400 kilometers per hour, so I don't know how graceful it's going to be. They attempted to pull
|
||
|
|
the Plex parachute at the last second and eat the evidence that came from it all does kind of
|
||
|
|
suggest. Plex may have had a part in it, however, I cannot state enough. This is like circumstantial
|
||
|
|
evidence, right? These are things that are just happening around the same time period,
|
||
|
|
and currently last pass has not released any sort of actual data that they've gathered from
|
||
|
|
the employee's home computer that that would suggest that yes indeed Plex did play a part in this,
|
||
|
|
so this is all just mere speculation. So let's move on from here. If there's more details in the
|
||
|
|
future, I'll bring you back in on it. On next story, not to be confused with key pass XC
|
||
|
|
vulnerability allows attackers with right access to the XML config to export clear text passwords.
|
||
|
|
This door was brought to us by NIST, the National Institute of Standards and Technology. All right,
|
||
|
|
I'm going to boil this one down. This is vulnerability with the key pass database file,
|
||
|
|
but in order for it to be exploited, the attacker would need to have physical access to the machine
|
||
|
|
with the user that controls the password database file being already logged in,
|
||
|
|
so like if you were to walk away from your PC and just left it logged in and someone walked up to
|
||
|
|
that PC and found your key pass database, they can then exploit this vulnerability. So either that
|
||
|
|
or an attacker with root access to your machine. In other words, your PC was already owned,
|
||
|
|
so this vulnerability is just sort of side effect of your PC being owned. Now with that said,
|
||
|
|
it's still pretty rough because you expect your password to vault to keep your passwords secure.
|
||
|
|
Key pass has patched this by the way, and I have some supporting articles down in the show notes
|
||
|
|
that will take you to the different articles showing the patched versions, which I believe is 2.53
|
||
|
|
is the version that is patched or 2.53.3 something like that. I just wanted to report this and
|
||
|
|
what I feel to be a more responsible manner before it gets out there that, oh no!
|
||
|
|
Key pass XC is super vulnerable and you're going to lose all your passwords because other stories
|
||
|
|
with last pass and everything else that's happening out there. So you know now, if you're using
|
||
|
|
Key pass, just make sure you keep it up to date. Don't let anybody, you don't know access to your
|
||
|
|
computer, right? And you'll be just fine. All right, let's go ahead and pivot on over to the user
|
||
|
|
space version of the show. First article. How to delete yourself from the internet. Bye bye!
|
||
|
|
I'm going to go ahead and spoil it for you here folks. You cannot actually delete yourself from
|
||
|
|
the internet. Yeah, once you've uploaded something to someone else's computer, just because you made
|
||
|
|
a request for them not to display it to you anymore, does it mean it's not there anymore? But the
|
||
|
|
article goes on telling you different methods about sending requests over to Google to remove
|
||
|
|
information because it reveals very private information like your phone number, your home address
|
||
|
|
or things like that. And Google will remove it from the search results. They also go on to show
|
||
|
|
you how to, you know, delete social media accounts and other chat service accounts. One of the good
|
||
|
|
things about the articles, they talked about Firefox relay a little bit, you know, just for a teeny
|
||
|
|
bit, which yay, Firefox, right? Mention some information about using VPNs, which is good
|
||
|
|
information, but it doesn't, you know, it keeps you private on the internet. It won't actually
|
||
|
|
delete you. This is just preemptive measures and remaining anonymous on the internet. And understand
|
||
|
|
that's still very limited, depending on who's coming after you or who's looking for you. If they
|
||
|
|
have enough time and resources, they'll find you. But I thought it was still a nice little article
|
||
|
|
to mention for user space. If you were looking to clean up your trail just a little bit and you
|
||
|
|
wanted a nice method to go about that, I thought this article was, it was decent, especially if you
|
||
|
|
can find your personal information in a Google search, like right on the search page, your phone
|
||
|
|
number or something just pops up and you don't know why. Yeah, you might want to take care of that.
|
||
|
|
And our next article, Mark Zuckerberg's meta exploring plans to launch Twitter rival.
|
||
|
|
Yeah, I included this one in user space because I thought it was funny Facebook's basically
|
||
|
|
from what it sounds like. Facebook's basically playing around with a mastodon like
|
||
|
|
instance. So there's the idea written in the story that meta aka Facebook is going to be launching
|
||
|
|
a Twitter alternative, something like mastodon, but of course it's going to be centralized instead
|
||
|
|
of decentralized. And it's just plans for now. There's no real evidence of it. Apparently he's
|
||
|
|
nervous about how TikTok's taking over, drawing a bunch of his Instagram models and things
|
||
|
|
away from the platform. So got to come up with something fresh and hip and you know all the other
|
||
|
|
cliche nonsense. My throat's starting to give out here and drinking a ton of water, but I'm
|
||
|
|
going to we're going to push on folks. We're going to keep going. Let's go ahead and change over
|
||
|
|
to the next segment, which is toys for text. All right, we were the last time we did this. It's
|
||
|
|
kind of hard to find cool toys for text, but the first one I found was a nice little E ink
|
||
|
|
display, which is mounted to a Raspberry Pi P cool wireless board. And it's called the Inky
|
||
|
|
Frame 4. It has a Wi-Fi connectivity. You can mount extra storage using an SD card. Very low
|
||
|
|
power usage. Now for some details on that E ink display is the E ink gallery palette 4000 E paper.
|
||
|
|
I don't know if that makes sense to you or not, but I got some links in the description if it doesn't.
|
||
|
|
It's an ACEP, which stands for Advanced Color E Paper 7 color with black, white, red, green, blue,
|
||
|
|
yellow, and orange. And it looks pretty cool. It looks like a nice little wall mount system or whatever
|
||
|
|
if you wanted, like just a little E display somewhere. So you can imagine this thing is going to be
|
||
|
|
super low power because of that E ink technology. And it's colored. They have some of the
|
||
|
|
some little images displaying the color palette and they show things like the pillars of creation
|
||
|
|
and a few other really cool images that look fairly nice. But you know, just take a look at it.
|
||
|
|
I didn't see any availability on it like they're out of stock at the moment. So yes,
|
||
|
|
might be supplies, chain issues or who knows, but it looks really cool and I thought I'd show it
|
||
|
|
off here. Oh, and I almost forgot. Phil King, the author of the of the article, he gave it a
|
||
|
|
wonderful review quote. A classy color E ink display whose Wi-Fi connectivity greatly extends
|
||
|
|
the possible uses, including as a digital photo art frame, life organizer, a low powered smart
|
||
|
|
dashboard. Close quote. Now, because I don't know anything about C or C++ or micropython,
|
||
|
|
I can't give you a ton of detail on that, but I have included links in the description for the
|
||
|
|
the libraries. I think it links to GitHub and shows you some code examples and stuff like that.
|
||
|
|
I was just poking around and obviously I can't really make sense of what I'm looking at,
|
||
|
|
but it's there. If you can, you can look at it and have this schematic. So it's pretty nice.
|
||
|
|
I think that's a nice little toys for techs. I think it comes in the whole device with the pie
|
||
|
|
pico and everything comes in at about 70 US dollars, I think it was. So if that's something you're
|
||
|
|
interested in, that whole E ink thing, I remember that was big a little while ago. Yeah, take a look
|
||
|
|
at that. All right, last but not least, our last toy and story for today. We're looking at the
|
||
|
|
ubiquo UBS HM2, which is like one of their really, really small form factor ubiquies. This one was
|
||
|
|
created specifically for the public sector and they go into detail about all the different
|
||
|
|
changes that they're making for this device. It's not a very podcast friendly story and I'll just
|
||
|
|
give you an example of why it's got a lot of alphabet soup and it's so here's a quick little line
|
||
|
|
from the story here. Support for advanced encryption standards AES in electronic codebook ECB
|
||
|
|
and cypher block chaining CBC modes, right? So then when you want to read further into that
|
||
|
|
and you go with AS is one of the most widely used symmetric cryptograph algorithms and can be
|
||
|
|
used in several several modes such as ECB CBC CCM and GCM. All right, I'm going to stop there
|
||
|
|
because you know, like I mentioned, this isn't a very podcast friendly thing to read, but it's
|
||
|
|
it's ubiquo, it's more security and they go they talk some about the different threats that are
|
||
|
|
out there. It's all usual one zero day exploits other type of malware that's out there. It's not
|
||
|
|
going to help you against something like ransomware, but still, you know, somebody's trying to break
|
||
|
|
in and get credentials. Yeah, this low device super low profile. For me personally, I'd have to
|
||
|
|
keep it on the land here because I got kind of, you know, fat fingers. I can't really pinch down to
|
||
|
|
pull such a small device out of the USB slot once it's inserted. So like if you take a look at it
|
||
|
|
in the show notes down there, it is it's quite the the form factor. All right, ladies and gentlemen,
|
||
|
|
now my closing thoughts here before we end the show. I just wanted to mention that I reconfigured
|
||
|
|
the way the show notes are so that it is more accessible to to listeners who want to go through
|
||
|
|
the show notes. I had some help from HPR members want to give a shout out to Mike Ray for assisting me
|
||
|
|
via email. No, I must have been annoying the crap out of him. Just blasting him. You know,
|
||
|
|
hey, Mike, take Mike, would you take a look at this? You know, just constantly sending emails back
|
||
|
|
and forth trying to get him to look at stuff as I'm as I'm making changes. So I thank him for
|
||
|
|
for assisting me with that. And Dave as well, Dave, give me some help. He pointed me in direction
|
||
|
|
that would allow me to, you know, learn other features using a pan doc. And yeah, I mean,
|
||
|
|
I believe we got the show notes looking pretty good. And I included an additional information
|
||
|
|
section at the bottom of the notes. You can go through that to learn more if you're new to HPR
|
||
|
|
and all of the security and technology. I've got some some standardized notes I'd like to continue
|
||
|
|
including with future shows, future, all-no news shows. So that's about it. Thank you guys for listening.
|
||
|
|
And I'll see you guys in the next episode. Goodbye!
|
||
|
|
You have been listening to Hacker Public Radio at Hacker Public Radio does work. Today's show was
|
||
|
|
contributed by a HPR listener like yourself. If you ever thought of recording podcast,
|
||
|
|
you can click on our contribute link to find out how easy it really is. Hosting for HPR has been
|
||
|
|
kindly provided by an honesthost.com, the internet archive and our sings.net. On the Sadois
|
||
|
|
stages, today's show is released on their creative comments, attribution, 4.0 International
|