Cropped or edited images can be recovered

0
[ad_1]

A vulnerability in the Markup tool that comes pre-installed on Pixel phones allows anyone with access to the edited image to view parts of the original.

Most of us have a camera on us at all times, and so photo taking and image sharing has become almost ubiquitous. But when sharing an image, you want to have control over what you share. And that might lead you to crop images, or redact parts of them.

Maybe you cropped out a person that didn’t want their photo online, maybe you put a black mark across your address, or credit card number, or other personal information. You edited it out for a reason, but now it seems as though the original image might still be available for others to view.

Researchers have published a proof-of-concept (PoC) for a vulnerability in Google Pixel’s in-built editing tool Markup. The vulnerability allows anyone with access to the edited image to recover parts of the original, unedited, file.

Testing has shown that Microsoft’s image-snipping tools in both Windows 10 and 11 have a very similar vulnerability.

Markup is a built-in tool which was released with Android 9 Pie in 2018. It can be found on Pixel phones and its main purpose is to edit (crop, add text, draw, and highlight) screenshots.

Due to the vulnerability, known as aCropalypse (CVE-2023-21036), it is possible to, partially, retrieve the original image data of a cropped and/or edited image.

Not every image at direct risk of exposing sensitive information, but many of them will be. The problem is that the Markup tool passes the wrong argument to the parseMode() function. The consequence is that the “old” image does not get truncated and lives on in the redacted image. Simply put, if the altered image has a smaller file size than the original, the information about the original can be retrieved from the last part of the data which did not get overwritten.

So, cropped images are very likely to reveal information about the original file, because the main reason to crop them is often to decrease the image size. But also images where you redacted a part of the image with a marker may be recoverable. In the example below you will see an uploaded image of a credit card with the number masked, next is the image after downloading, and last is the image after going through the recovery tool. The 16 digit number is now visible again.

You can try the exploit for Markup yourself by uploading your own images to this online demonstration provided by the aCropalypse researchers. The demonstration tool only works for images edited with Markup, since the exploit script that works for images edited with Microsoft’s snipping tools is slightly different, according to one of the researchers.

What to do

Unfortunately, there is no way to change the way in which previously redacted images will behave. So if you know of some images that you have posted that could reveal anything you’d rather keep a secret, then you’ll have to find them and delete them. This is a daunting task, since there may be more backups of that image than you would care to imagine. For example, internet archives, backups, all types of caches, and downloads.

Before you go on a wild goose chase, it may be handy to know that you don’t have to worry about some images:

  • Most social media platforms recompress uploaded files, so anyone downloading your screenshots from Twitter will not get the exact same file you uploaded. So those can be left alone. But Discord, as shown in the example, and other messaging apps will give back the exact same file that was uploaded.
  • If the redacted information is in the upper section of the image (roughly the top fifth of the image) the original part has probably been overwritten and can’t be recovered.
  • The vulnerability the researchers found only affected the screenshot editor Markup. But as it turns out, other tools may have similar flaws.
  • The exploit only works for PNG files, but a similar vulnerability may exist in JPG files. Basically, if you crop an image and the file size of the saved result is the same as the original, your tool of choice might not be deleting the old image data.

For future images, you can install the March 2023 Google Pixel Update. We encourage you to check your Android version to make sure you are on the latest software. The vulnerability in Microsoft’s tools has not been fully worked out yet, and so for the moment all we know is that somehow the original data can be retrieved. A patch will be forthcoming in the probably not so distant future.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

You can now control who can join your WhatsApp group chat

0
[ad_1]

When you’re the admin of a WhatsApp group chat, you’ll want to be sure that it’s only full of people you want involved. This can be an issue with bigger group chats. However, WhatsApp now lets you control who can join your group chat.

WhatsApp is one of the most popular messaging platforms right now, and it has a host of useful features. You’re able to set up large group chats to bring people together and collaborate. However, there’s always the threat of unsavory people entering the chat and causing trouble.

So, WhatsApp now lets people control who can join the chat

This is a very welcome update, especially if you’re a frustrated admin who periodically deals with troublesome members. People were able to just pop into a group chat. However, thanks to a blog post from WhatsApp, that’s no longer the case.

When you share a group, people, instead of joining right away, will send a request to join the group. The admin will see a Pending Participants page. There, they will see the accounts of the people who want to join. On that page, you’ll have the ability to either approve or decline them.

This gives you the opportunity to check out the user before they have access to the information in the chat. This is perfect for companies that chat about sensitive information on a group chat.

The new update also brings another feature to help you filter who can join your group. This doesn’t only apply to people asking to join groups. When you search a user’s name, the app will show you all of the groups that you have in common. This is useful because it lets you know if the person you’re searching shares the same interests as you.

The company launched this feature, so chances are that it’s available for you. However, since it’s still a new update and roll-outs vary depending on region, there’s a chance that you won’t see it yet. Keep an eye out for the update.


[ad_2]
Source link

Aichatting and ArtGuru, your digital companion in 2023

0
[ad_1]

In the advanced technology world we are living in today, everything is becoming more digitized and technology itself has become an essential part of our daily lives. From smartphones and computers to smart homes, we are surrounded by various digitalized gadgets and devices that increase the efficiency of our life. However, as technology continues to evolve, some things are becoming more and more complex to understand, especially for those who are not tech-savvy.

This is also one of the reasons why many people are looking for a user-friendly AI platform that can help them. Recently, we found two platforms that are very innovative that can help us in any aspect of our life, starting from information seeking to entertainment. These platforms are called Aichatting and ArtGuru AI Art Generator.

Learn more about it in this post.

Aichatting, Your Digital Friend

ArtGuru image 298392881

We named this platform ‘your digital friend’ as it can answer any of your inquiries in seconds. You can use it to ask for information you’re seeking, for instance, “how many continents are there?”, or simply because you’re bored and want a companion, then you can type ‘Hi, I’m bored”, then it will reply to you as if you’re chatting with a friend.

Specifically, Aichatting is a digital technology that integrates humans and machines into a more natural response. This platform uses natural language processing (NLP) to interpret and analyze the language used in a conversation. Therefore, it can work as a virtual assistant to understand the intent of users and respond to them in a way that feels like a conversation with a human being. Additionally, it is also equipped with a machine learning algorithm to learn from previous conversations and improve them over time.

Hence, whether you’re looking for convenience, personalization, efficiency, or accessibility, Aichatting is the perfect solution for you. It is freely available for anyone who wants to improve their interaction with digital devices.

Here is how to use it:

Open your browser and go to the official website of AI chat and AI writing generator. Once the page loads, type anything in the white box and press enter. In a few seconds, it will generate an answer to your inquiries.

ArtGuru, Your Personalized Image Guru

Next, we have ArtGuru as your personalized image generator. Just like the appellation we have given, this platform can generate various images you’re seeking to the images of your own avatar. The website is actually divided into two sections, namely AI Image and AI Aniself.

The former one, which is AI Image, is a tool to generate any images you’re looking for. For instance, if you’re wondering about a mountain landscape painting, you can simply type these keywords on the box and wait for a few seconds, it will display the most suitable image for you.

Subsequently, AI Aniself is a tool to generate personalized avatar images. You can even upload your own selfies to create an avatar of yourself. Additionally, it has an advanced settings feature that allows you to describe the style for your avatar, for instance, in a traditional way, modern, or others.

With these two features, ArtGuru allows users to explore the world of art in a new and exciting way, finding out hidden insights and learning more about their favorite artists and artworks. So whether you’re a curious newcomer or an art lover, ArtGuru has something to offer you.

For AI Image, here is how to utilize it:

1. Navigate to the website of ArtGuru AI drawing generator.
2. Tap on the ‘Create AI Image’ button.

ArtGuru image 298392883

3. Type any keyword on the “Describe your image” box, then tap on the ‘Create AI Image’ button. Wait for a moment as it loads your image.

ArtGuru image 298392882

For AI Aniself, here is how to utilize it:

1. Similar to the previous one, navigate to Artguru official site.
2. Tap on the ‘Create Aniself’ button.
3. Upload your photos or selfies by tapping on the + button, enter the specific criteria you want (optional), then tap the ‘Create Aniself’ button. Wait for a few seconds as it loads.

ArtGuru image 298392884

Ending

With these two platforms available for free to accompany you in your daily life, we promise you will not get bored easily and at the same time can increase the efficiency of your time. For Your Digital Friend, find Aichatting; as for Your Personalized Image Guru, find ArtGuru.

Do not miss out and try it out now!


[ad_2]
Source link

ShellBot DDoS Malware Targets Linux SSH Servers

0
[ad_1]

As per a report from AhnLab Security Emergency Response Center (ASEC), poorly managed Linux SSH servers are becoming the targets of a new campaign in which different variants of ShellBot malware are being deployed.

What is meant by Poorly Managed Servers?

Poorly managed services refer to weak account credentials, which make the server vulnerable to dictionary attacks. Services such as MS-SQL and RDP (remote desktop protocol) are often targeted.

In Linux servers, SSH (secure shell) services are the primary targets. In IoT environments, dictionary attacks are targeted against the Telnet service installed on an embedded Linux OS or an old Linux server.

What is ShellBot?

ShellBot, also known as PerIBot, is an old DDoS bot malware developed in Perl. The malware typically uses Internet Relay Chat/IRC protocol to establish communication with its C2 server.

Currently, the malware is being used to launch attacks against insecure Linux systems, targeting servers with weak credentials. It is deployed on a system after attackers use scanner malware to determine whether the system has SSH port 22 open.

Attack Details

ASEC researchers noted that ShellBot was used in attacks targeting Linux servers that were distributing cryptocurrency miners through a shell script compiler.

“If ShellBot is installed, Linux servers can be used as DDoS Bots for DDoS attacks against specific targets after receiving a command from the threat actor,” ASEC’s report read.

The attack begins by using a list of SSH credentials to launch a dictionary attack and breach the server. Once this is accomplished, the threat actor deploys the payload and leverages the IRC protocol to communicate with the C2 server and receive commands that instruct ShellBot to conduct DDoS attacks and steal data.

Different ShellBot Variants Used in the Campaign

According to ASEC researchers, three variants of ShellBot were identified, including LiGhT’s Modded perlbot v2, DDoS PBot v2.0, and PowerBots (C) GohacK. The first two versions feature a wide range of DDoS attack commands with HTTP, UDP, and TCP protocols.

Conversely, PowerBots are equipped with backdoor-like capabilities that can provide shell access and upload arbitrary files from the infected host. Threat actors can use these backdoor capabilities for the installation of additional malware and launch different types of attacks, abusing the server.

  1. Windows, Linux and macOS Users Hit by APT Group
  2. Multi-platform SysJoker backdoor hits Linux Devices
  3. DDoS Malware ‘Chaos’ Hits Linux and Windows Devices

[ad_2]
Source link

Moto G Stylus 2023 official renders leaked, key specs detailed

0
[ad_1]

Motorola is readying a couple of new stylus-equipped budget smartphones. The Moto G Stylus 2023 and Moto G Stylus 5G 2023 have been making rounds of the rumor mill for a few months now. While we still don’t have an official launch date for either model, the Lenovo-owned company may not keep the duo under wraps for much longer. A massive leak has already revealed plenty about the Moto G Stylus 2023. We have detailed specs and leaked official renders showing the phone’s design from all angles.

Shared by The Tech Outlook, the renders show the Moto G Stylus 2023 in two colors: blue and copper. The rectangular camera module houses two sensors and an LED flash unit, with “50MP” printed on it. The primary sensor should have an aperture of F/1.8 with 2µm pixels. Specs of the secondary camera are not known but Motorola’s marketing materials reportedly mention features such as portrait shots, close-up shots, and low-light images. We don’t have any information about the selfie camera as well.

The selfie sensor on the Moto G Stylus 2023 resides within a tiny punch-hole on the top of the screen. It’s a 6.5-inch display with an HD+ resolution and a 90Hz refresh rate. Bezels on the sides and the top are fairly minimal but the chin is quite big. The phone has its volume rockers and the power button on the right. The latter is recessed, confirming the presence of a side-mounted fingerprint scanner. The SIM tray can be seen on the left, while we have a 3.5mm headphone jack, USB Type-C port, microphone, speaker, and stylus slot at the bottom.

Helio G88 will power the Moto G Stylus 2023

A Geekbench listing earlier this month revealed that the Moto G Stylus 2023 will be powered by MediaTek’s Helio G88 chipset. It has two ARM Cortex-A75 CPU cores clocked at 2.0GHz and six Cortex-A55 cores clocked at 1.80GHz. Motorola may offer the handset in 4GB and 6GB RAM options. It will run Android 13 out of the box. Fueling the whole package is a 5,000mAh battery. The report doesn’t mention the charging speed, though. Both 4G and 5G models topped out at 10W last year.

With the majority of key specs known already, the Moto G Stylus 2023 should be nearing its launch. Its 5G sibling should accompany it out of Motorola’s doors. The company launched last year’s 4G model in February, with the 5G model coming in April. Both versions may arrive in April this year.


[ad_2]
Source link

TikTok updates its community guidelines amid the fear of ban in the US

0
[ad_1]

The Chinese video-sharing app TikTok has announced an update to its community guidelines that aim to make the platform safer. The update is coming in days when TikTok is in hot water by US lawmakers, and it might be banned in the country due to national security concerns.

Revamping community guidelines is a part of the company’s efforts to prevent a potential ban in the United States. TikTok has now made it more clear how creators and content will be treated. The app also made specific guidelines for AI-generated content and synthetic media.

The update will take effect on April 21, and the app describes it as the “most comprehensive update to our Community Guidelines to date.”

TikTok community guidelines put a restriction on AI-generated media

According to the new policies, any synthetic or manipulated media showing realistic scenes must be clearly disclosed. Users can use stickers and captions, such as “synthetic,” “fake,” “not real,” or “altered,” to distinguish synthetic content.

Additionally, TikTok bans the use of synthetic media that contains the likeness of any real private figure. TikTok defines synthetic media as “highly realistic” content created or modified by AI. A public figure is someone who is over 18 years old and holds a significant public role, like celebrities and government officials, etc.

“We do not allow synthetic media of public figures if the content is used for endorsements or violates any other policy. This includes prohibitions on hate speech, sexual exploitation, and serious forms of harassment.” TikTok added.

TikTok continues that using synthetic media of public figures is only allowed in certain contexts like educational content. Any use for political or commercial purposes is forbidden.

Besides regulating AI-generated content and synthetic media, TikTok also adds more transparency to existing policies. Each rule now has a brief section that clarifies what the app allows and doesn’t allow. For example, TikTok bans any misinformation on civic and electoral processes like voting, eligibility requirements of candidates, counting the ballots, etc.

TikTok hopes to prevent a potential ban in the United States by greater adherence to the country’s laws and becoming more transparent about its operations. The app CEO will appear before congress on March 23 to address national security concerns and relationships with the Chinese government.


[ad_2]
Source link

New Kritec Magecart skimmer found on Magento stores

0
[ad_1]

Compromised online stores have been injected with skimmers hiding around the Google Tag Manager script. We identified a new one that looked similar at first but is part of a different campaign.

Threat actors often compete for the same resources, and this couldn’t be further from the truth when it comes to website compromises. After all, if a vulnerability exists one can expect that it will be exploited more than once.

In the past, we have seen such occurrences with Magecart threat actors for example in the breach of the Umbro website. Recently, while reading a blog post from security vendor Akamai, we spotted a similar situation. In the listed indicators of compromise, we noticed domains that we had seen used in a distinct skimming campaign which didn’t seem to be documented yet.

In fact, we saw instances of compromised stores having both skimmers loaded, which means double trouble for victims as their credit card information is stolen not just once but twice. In this blog post, we show how the newly found Kritec skimmer was found along side one of its competitors.

Original campaign using WebSockets

Researchers at Akamai reported on a Magecart skimmer campaign disguised as Google Tag Manager that also made the news with the compromise of one of Canada’s largest liquor store (LCBO). While details were not shared at the time, we were able to determine thanks to an archived crawl on urlscan.io that the skimmer was using WebSockets and is the same one as described in Akamai’s blog. 

Kritec campaign

Akamai notes that they identified multiple compromised websites that had similarities. They also list nebiltech[.]shop in their IOCs which is a domain we sometimes saw injected near the Google Tag Manager script, but not within it.

We believe this is a different campaign and threat actor altogether. Here are some reasons why:

  • No WebSocket being used
  • Domains abusing Cloudflare
  • Intermediary loader
  • Completely different skimming code

To complicate things, we observed some stores that had both skimmers at the same time, which is another reason why we believe they are not related:

We started calling this new skimmer ‘Kritec’ after one of its domain names. It has an interesting way of loading the malicious JavaScript we had not seen before either. The injected code calls out a first domain (seen above encoded in Base64) and generates a Base64 response:

Decoding it reveals a URL pointing to the actual skimming code, which is heavily obfuscated (likely via obfuscator.io):

The data exfiltration is also done differently as seen in the image below. On the left, the stolen credit card data is sent via a WebSocket skimmer while on the right, it is a POST request:

Google Tag Manager variants

In the past months there have been several Magecart skimmers abusing Google Tag Manager in one way or another. We mentioned Akamai’s blog but it was also documented by Recorded Future. In those instances, the malicious was actually embedded in the Google Tag Manager library itself, which is very clever and difficult to detect.

While the Kritec skimmer hangs around the Google Tag Manager script, we believe it is not related to the other active campaigns. We have been documenting it recently and are reporting the abuse to Cloudflare which it uses to hide its real infrastructure.

Malwarebytes customers are shielded against this campaign via our web protection in Endpoint Protection (EP)Endpoint Detection and Response (EDR) and Malwarebytes Premium.

Indicators of Compromise

WebSocket Skimmer:

cloud-cdn[.]org

Kritec skimmer:

kritec[.]pics

vitalmob[.]pics

flowit[.]pics

flagmob[.]quest

entrydelt[.]sbs

sanpatech[.]shop

prijetech[.]shop

nebiltech[.]shop

kruktech[.]shop

lavutele[.]yachts

tochdigital[.]pics

smestech[.]shop

klstech[.]shop

shotsmob[.]sbs

gemdigit[.]pics

nevomob[.]quest

vuroselec[.]quest

apexit[.]yachts

sorotele[.]yachts

bereelec[.]quest

bereelec[.]quest/ww[.]min[.]js

apexit[.]yachts/apex[.]min[.]js

vuroselec[.]quest/dych[.]min[.]js

nevomob[.]quest/elan-loader[.]js

gemdigit[.]pics/wpp-loader[.]js

gemdigit[.]pics/sun-loader[.]js

klstech[.]shop/opencart-cache-worker[.]min[.]js

tochdigital[.]pics/digital[.]min[.]js

vitalmob[.]pics/pre-loader[.]js


[ad_2]
Source link

Galaxy Z Fold 5 concept visualizes gap-less design

0
[ad_1]

Samsung‘s fifth-gen foldables are starting to take shape, literally. A couple of days back, we saw a design concept depicting the Galaxy Z Flip 5. The same source has now shown us what the Galaxy Z Fold 5 could look like.

As expected, this concept Galaxy Z Fold 5 design features a Galaxy S23-like rear camera layout. We have three cameras aligned vertically and all protruding out of the back panel individually. There’s no camera bump here. This has been Samsung’s design philosophy across its smartphone lineup in 2023, including budget models. The company is seemingly trying to create a brand identity for Galaxy smartphones here, irrespective of a device’s price bracket.

Rumors have long suggested that Samsung will introduce a new type of hinge with its 2023 foldables. The so-called waterdrop hinge allows the devices to fold flat with no gap. Effectively, it reduces the thickness of the foldable and also makes the display crease less visible. This has been one of the biggest requests from Samsung fans and foldable enthusiasts, and the company has responded. This design concept visualizes this much-anticipated change for everyone to see.

The rest of the stuff is fairly standard. We have a tall cover display, which is said to measure 6.2 inches diagonally, the same as last year’s Galaxy Z Fold 4. The 23.1:9 aspect ratio will likely remain unchanged as well. On the inside, we have an almost square folding display that should retain its 7.6-inch diagonal measurement. That’s based on early rumors that the Galaxy Z Fold 5 will not see any changes in length and breadth. It will only come thinner and lighter thanks to the redesigned hinge.

Snapdragon 8 Gen 2 for Galaxy will power the Galaxy Z Fold 5

Apart from the redesigned camera array and new hinge, the only other major upgrade that Galaxy Z Fold 5 will bring could be the processor. Rumors are that Samsung will ship the new foldables, including the Galaxy Z Flip 5, with the Snapdragon 8 Gen 2 for Galaxy chipset under the hood. That’s the same processor that powered the Galaxy S23 series. It’s an overclocked version of Qualcomm’s latest flagship chipset.

The rest of the package should include a 4,000mAh battery with 25W fast charging, a side-mounted fingerprint scanner, an IPX8 rating for water resistance, a 50MP primary camera, a 10MP zoom camera, a 12MP ultrawide lens, stereo speakers, and S Pen support (Fold Edition). The Galaxy Z Fold 5 will lack a built-in S Pen slot, though. Stay tuned for more information about the upcoming Samsung foldable duo.


[ad_2]
Source link

ChatGPT bug reportedly exposed user histories

0
[ad_1]

It’s no surprise that ever since its release OpenAI’s ChatGPT has taken the world by storm, gathering over 100 million users in just two months. However, this popularity has come with its fair share of concerns, particularly when it comes to user privacy, as users recently discovered a bug in ChatGPT, which allowed users to see the chat history titles of other people.

The incident first came to light when many ChatGPT users and security researchers reported the issue on Reddit and Twitter, as they observed that the sidebar that usually displays user history was showing the history titles of other users too.

OpenAI confirmed the incident to Bloomberg, noting that the bug did not expose confidential information and that they are still investigating the cause of the issue. However, reports suggest that an “unnamed, open-source software” caused the bug.

In response, OpenAI took down the chatbot on Monday for a few hours and replaced the chat history sidebar with a message stating, “History is temporarily unavailable. We’re working to restore this feature as soon as possible.” And although OpenAI’s status page says that they have restored the chatbot, the company is still working to restore the chat history feature.

Major security issue

This incident raises some serious privacy concerns regarding AI chatbots. And while ChatGPT maker OpenAI claims to remove personally identifiable information from the data and promises not to use the data from companies that pay for its API, this bug highlights that regular users are still vulnerable, and OpenAI can still access their data. Users of ChatGPT and other AI chatbots must be aware that the information they are sharing with the chatbot might not be as private as they previously thought. Therefore, it is always important to keep in mind the information you are sharing.


[ad_2]
Source link

Google Assistant development team is assigned to work on Bard

0
[ad_1]

According to 9to5google, the team working on Google Assistant is now assigned to work on the company’s conversational chatbot Bard.

ChatGPT created momentum in tech that is reshaping the whole industry in a short time. Google, whose reign was in danger because of ChatGPT, launched Bard to catch up with the competition. The company has now tasked the Google Assistant development team to work on Bard and make it better.

While Google Assistant and Bard might seem like two separate services, they have many similarities. Both rely on conversational AI to perform tasks, and advanced language processing is the core part of both. Google Assistant has over 700 million monthly active users, and Google hopes the Assistant team could apply its experience and knowledge to turn Bard into a tough rival of ChatGPT.

The Google Assistant development team is now working on Bard

Vice president and general manager of Google Assistant Sissie Hsiao has just announced that early access to Bard is opening up in certain regions. This means Google is gradually preparing to open Bard to the public in the near future.

The Google Assistant development team is one of the most experienced teams within the company. Sissie Hsiao has been on Google since 2006 and has worked on various projects like Analytics, Search, and advertising. Appointing such an experienced team to work on Bard shows Google’s determination to AI competition, especially with ChatGPT and Microsoft Bing.

In the past few years, Hsiao and her team have been focused on improving the conversational features of Google Assistant. The app is now much better at processing language and understanding speeches at a high level.

Google also brought the Look and Talk feature to Nest Hub Max to replace the “Hey Google” hotword. To start a conversation, the feature looks for particular parameters like gaze direction, face match, and head orientation.

Bard is yet another experimental project for Google that serves as a data collection tool. Given the rapid growth of AI and its integration into different services, Bard might later find its way toward Google services.


[ad_2]
Source link